Popular Articles
Working with Systems that Prevent Credential Sharing
Some applications prevent credential sharing by disconnecting a user from all other locations when they sign in. When working with a system that does not allow login sharing, special care must be taken so that a user does not inadvertently log in and ...
Clio Data Restore: Read Me First - Calendar Permissions
These instructions must be followed by each user in the firm. Permission Changes are only necessary during the migration Once the migration is complete, you can remove firm-wide access to your calendar. Prior to calendar entries being imported, each ...
How to Extract an Icon Image from an EXE File
This guide will walk you through extracting icon images from an executable (EXE) file using 7-Zip. This method allows you to access icon resources within EXE files and save them as .ico files. Requirements 7-Zip: Ensure 7-Zip is installed on your ...
If a task is related to an archived matter, mark it as complete
The following will mark all tasks that are related to a closed/archived matter as Complete. --The client has a bunch of tasks related to archived matters. --These tasks are NOT follow-ups and they NEVER intend on completing them. --The client would ...
Linearize Notes
Some systems support note comments(notes-on-notes). On systems like this, you might see notes organized as follows: |-Matter ABC.001 +-Note 1 (2021-01-01) +-Note 2 (2021-01-02) +-Note 2A (2021-01-04) +-Note 2B (2021-01-05) +-Note 2C (2021-01-06) ...