Close

Articles Posted in Information Technology

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Updated:

Results from Marshall Breeding’s 2008 Library Automation Survey

In case you missed it, the results from the 2008 version of Marshall Breeding’s Library Automation Survey are available at http://www.librarytechnology.org/perceptions2008.pl. This Survey is international in scope. There were 1,450 responses.

Updated:

Upgraded Library Web Resource Announcement

State of New York Supreme Court Criminal Term Library (New York County) Inspired by the recent New York Unified Court System Report Green Justice: An environmental Action Plan for the New York State Court System*, the New York Supreme Court Law Library, Criminal Term (New York County) is pleased to…

Updated:

Technology: What’s Coming in 2009?

Michael Gartenberg’s predictions as reported in Computerworld – December 17. 2008. “Well, it’s that time of the year again. Time to enjoy the glow of a nice LED-backlit display and huddle with the warmth that only an overclocked PC can produce. Yep, it’s time to take a look at what’s…

Updated:

Technology Escrow Agreements: Safeguarding Technology Investments

“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research…

Updated:

CLLB Information Security Newsletter. December 2008 Volume 1.

December 2008 Volume 1 Pop-Ups From the Desk of David Badertscher We’ve all experienced Pop-up windows, or “pop-ups,” while browsing the Internet. Pop-ups may appear without any interaction or prompting by the end user. They can be innocuous, such as when used for advertising, but they can be used for…

Updated:

U.S. News and World Report Names Librarianship as “Best Career” in 2009

Source: AALL: From the Desk of James E. Duggan, December 18, 2008. Some welcome news is today’s tough economy, U.S. News and & World Report last week named librarianship as a “Best Career 2009.” The overview dispels the image of librarians as “mousy bookworms,” reporting that librarians have become “high-tech…

Updated:

New York State Archives: E-Mail Policy Guidelines

From: New York State Archives – Region 1 Newsletter, December 2008 The New York State Archives is pleased to announce the release of its email policy development guidelines. These guidelines are intended as a starting point for state agencies and local governments to use for writing policies and procedures that…

Updated:

The Lawyer’s Guide to Microsoft® Excel 2007

By John C. Tredennick ABA Publication Announcment: ——————————————————————————– “Spreadsheet programs are one of the most powerful but underutilized tools in the trial lawyer’s toolbox. John Tredennick’s concise, clear book shows you how to use spreadsheets powerfully and quickly. I believe that every litigator should be familiar with the contents of…

Contact Us