top of page

If you need to generate a list of random numbers in Excel you may want to avoid using the RANDBETWEEN formula. It will return duplicate numbers:



This is not ideal if your aim is to select numbered entries on a spreadsheet to review at random. You can generate a random list of numbers without duplicates by using the RAND formula instead. Enter the RAND formula in a column adjacent to the data set you are QCing.



The RAND formula will generate new numbers each time the spreadsheet is edited. To get a static list of randomly generated numbers copy the results and use the paste values option. Then you can sort the data by the formula results to randomly select entries to review:



A Windows operating system uses an API (application programming interface) called DirectX to allow programs installed on your PC to work with the video and audio of your computer. You can bring up the diagnostics tool for DirectX by going to Run and entering: dxdiag



The DirectX Diagnostic Tool will have tabs for each set of monitors and speakers connected to your computer. A tab named 'Render' will display information for the dedicated graphics card on your PC. It will show the VRAM for your PC - the amount of computer memory dedicated to graphics:



The very first tip of the night on April 12, 2015 warned to never try to use Trial Director or other presentation software for a courtroom electronic presentation without confirming that your laptop has sufficient VRAM. Trust me, I know from bitter experience that video clips for deposition designations with multiple segments will not play back correctly on a laptop without sufficient VRAM. The current version of Trial Director requires a graphics card with 4 GB of dedicated graphics memory. See the specs posted here.


Use the DirectX Diagnostic Tool to check how much VRAM the monitors and projectors you are connected to will require.


HIPS software, Host-based Intrusion Prevention System, checks a server, computer, or workstation for events occurring on that host which indicate there is a cybersecurity threat. One of the features of a HIPS program is that it monitors files for changes in content. It's not a firewall, looking for intrusions into the host, but a system that checks for changes within. It will also keep track of which programs installed on the host have been verified, and block them from taking restricted actions. HIPS differs from anti-virus software which checks for known viruses. It is not limited by only being able to check for malware that has been identified, but it will look for attacks following known patterns.


HIPS should flag cases in which interprocess communications (IPC) - data exchanged between programs - becomes a means by which a trusted program becomes infected with malware. HIPS will monitor protocols, such as HTTP or TCP, for deviations from their normal content. It will also watch for when something alters registry keys, installs drivers, or terminates other applications.


A system which detects threats that have already occurred is a host-based intrusion detection system - HIDS.






Sean O'Shea has more than 20 years of experience in the litigation support field with major law firms in New York and San Francisco.   He is an ACEDS Certified eDiscovery Specialist and a Relativity Certified Administrator.

​

The views expressed in this blog are those of the owner and do not reflect the views or opinions of the owner’s employer.

​

If you have a question or comment about this blog, please make a submission using the form to the right. 

Your details were sent successfully!

© 2015 by Sean O'Shea . Proudly created with Wix.com

bottom of page