The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research: ________________________ Professional librarians and researchers will tell you that the Web has…
Articles Posted in Commentary and Opinion
Sharing, Privacy and Trust in Our Networked World
As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world…
A Group of Internet and Media Companies Push for Principles Regarding User Generated Services to Protect Copyrights
On October 18, 2007 a coalition of major media and technology companies released a set of guidelines designed to halt online piracy. Media companies involved include CBS, NewsCorp, Fox Enertainment Group, NBC Universal, Viacom Disney, and MySpace. Google was notable absent from the list. A You Tube spokesperson who asked…
Video from Thomson West Regarding Comprehensive Changes to the Federal Civil Rules of Procedure
I”n response to the discussion about the far-reaching changes to the Federal Civil Rules of Procedure, we have posted a 5 minute video featuring the authors of the Federal Civil Rules Handbook. The authors, Steven Baicker-McKee and Professor William Janssen, discuss the dramatic amendments to the Federal Rule of Civil…
30 Books Every IT Leader Must Read
By Eric Chabrow Society for Information Management’s 2008 list of leadership books covers a wide-range of subjects, except IT itself. Books ranging from How to Read a Book to The Prince are among 30 books every CIO wannabe should read, according to an annual list of must-read books issued by…
Review: Five Security Suites You May Not Know About
It seems everywhere we turn when it comes to information technology the topic sooner or later always turns to computer security. As mentioned below in this Review published on November 7, 2007 by InformationWeek, Norton and McAfee still dominate this field. The Review as posted consists of a major part…
Information Retrieval and Records Management: The 2007 Sedona Conference
Best Practices in Information Retrieval and Records Management: Analysis and Recommendations from the 2007 Sedona Conference By Steven Essig The Sedona Conference Journal, Volume 8, Fall 2007, includes much relevant commentary on possible best practices and other important concerns on effective information retrieval of legal documents. Issues raised range from…
California Law Bans Forced RFID Tagging
From: E-Week.com, October 15, 2007 October 15, 2007 By Renee Boucher Ferguson It’s illegal now for California employers to force anyone to have an RFID device implanted under his or her skin as a condition of receiving something-such as a paycheck or government benefits. Gov. Arnold Schwarzenegger signed Senate Bill…
Torture’s Paper Trail
Source: FindLaw Legal News and Commentary. By JOANNE MARINER, Terrorism and Counterrorism Director at Human Rights Watch. —- Wednesday, Oct. 10, 2007 Last week, the New York Times published a front-page article describing two legal memoranda issued secretly by the Bush Administration in 2005 that purported to provide guidance regarding…
Internet Inventor Says It Works Like a Charm
Recently a number of articles devoted to the history of technology and the internet have been published. Given the significant developments in these areas over the past 20+ years and the societal demands which continue to drive further research and development it is certainly appropriate to take some time to…