Most of us are taught that individual items that comprise electronically stored information (ESI) each have a unique «fingerprint» that may be used as the basis to automatically identify and
filter exact duplicates that inevitably exist within a universe of collected ESI.