Close

Articles Posted in Information Technology

Updated:

CLLB Information Security Newsletter. October 2008.

October 2008 October is National Cyber Security Awareness Month Volume 1, Issue 6 Phishing – How to Avoid Getting Hooked! From the Desk of David Badertscher What is Phishing? Phishing is a scam which attempts to entice email recipients into clicking on a link that takes them to a bogus…

Updated:

CLLB Information Security Newsletter. Volume 1 Issue 5.

Volume 1 Issue 5 Personal Privacy – How to Protect Your Information From the Desk of David Badertscher As we continue to conduct more business online, such as banking, shopping and other activities, our personal information (such as name, credit card account, address, etc) is increasingly utilized. Personal information has…

Updated:

Feature Articles from LLRX.Com, September 2008

Sabrina I. Pacifici Founder, Editor, Publisher: **LLRX Book Review by Heather A. Phillips – We’re All Journalists Now: The Transformation of the Press and Reshaping of the Law in the Internet Age http://www.llrx.com/columns.bookreview11.htm Heather A. Phillips highlights attorney John Gant’s contention that one’s title, income, and employer are at best…

Updated:

Perspectives: Why Google Won’t Focus on Business Software

Vembu, Sridhar, “Annother View: Why Google Won’t Focus on Business Software”, Government Computer News. (September 27, 2008). “So what is Google’s plan? It is fairly obvious the company is in it to put Microsoft on the defensive on its home turf, to diminish that company’s offensive capability in the Internet.…

Updated:

Legislator’s Son at Center of Sarah Palin Hack Talk, Report says

Legislator’s Son at Center of Sarah Palin Hack Talk, Report Says “Tennessee Rep. Mike Kernell says that his son, David Kernell, is at the center of speculation about the identity of the hacker who gained access to Palin’s account.” From: CIO Insider News, September 2008

Updated:

Robert Pear Highlights Concerns of Loss of Federal Electronic Government Information*

One of the historic functions of libraries has been preserving and providing access to information in various media. In many ways, digitization of information has positively altered the information landscape. However, with the dynamic nature of such information, vital information preservation issues arise. In a timely September 13, 2008, New…

Updated:

The Jury Expert: The Art and Science of Litigation and Advocacy

Volume 20 Issue 3 September 2008 Table of Contents The Preparation of Narcissistic Witnesses Solution Focused Mediation Some Juror Rules for Determining Damages The 3 Cs in Using Visual Communication to Tell Legal Stories: Communication, Credibility, and the Central Image Using the Science of Persuasion in the Courtroom Our Favorite…

Updated:

Highlights and Lowlights of the Mozilla Firefox 3.1, Google Chrome and Microsoft Internet Explorer 8 Web Browsers

From: Government Computer News, September 19, 2008. “InfoWorld breaks down the highlightsand the lowlightsfor the Mozilla Firefox 3.1, Google Chrome and Microsoft Internet Explorer 8 Web browsers. and lowlights of each offering and where it stands as far as a full release”.

Updated:

A First Look at Internet Explorer 8 Beta 2

From: eWeek Emerging, Technologies August 29, 2008 Slide show: First Look: IE 8 Beta 2 By Jim Rapoza August 29, 2008 “Despite its market dominance, Internet Explorer has been in many ways the browser that was left behind. Beta 2 of IE 8 shows promise with strong privacy controls and…

Updated:

Sharing Microsoft Files the Easy Way

From: CIO Insider, Posting by Esther Schindler, August 26, 2008. Sharing Microsoft Office Files the Easy Way: A Five Minute Productivity Tip “Need to create a report or presentation with the input of several people? Don’t e-mail that large file to all the participants. Microsoft Office makes it simple to…

Contact Us