“The core idea here is that developers will create more applications for social networks if there is a fair amount of interoperability between the platforms. Of course, Facebook, and by extension Microsoft, don’t seem to want to endorse this concept. But Microsoft did come out strongly in favor of making…
Articles Posted in Information Technology
Most Common Database Design Mistakes
Brian Prince of e-Week has compiled a list and slide show of what he considers some of the more common mistakes and a few general tips for avoiding them. Over the years as we were either disigning or helping to design a number of library related research and applications databases,…
Windows Vista Virtulization: What You Need to Get Started
BY: Ruest, Danielle and Nelson Ruest. ‘Windows Vista Virtulization: What You Need to Get Started,” Informationweek.com News. (March 10, 2008). “Running Vista in a virtual machine gives users access to all of the operating system’s features while avoiding hardware and application-compatibility obstacles. Here’s a primer to get you started, with…
CLLB Information Security Newsletter. March 2008 Volume 1, Issue 2.
CLLB Information Scurity Newsletter March 2008 Volume 1, Issue 2 Annual Maintenance For Computers From the Desk of David Badertscher Perform Annual Maintenance in Conjunction With Daylight Savings Time Change In addition to your routine security and maintenance processes, you should perform an annual PC “tune up” or maintenance to…
Internet Society (ISOC) Participates in the Open Consultations of the Internet Governance Forum
The following was contributed by Bill Graham* The Internet Society played a significant role in the second meeting of the Internet Governance Forum (IGF) in Rio de Janeiro in December, 2007. ISOC hosted an Open Forum on ISOC’s work and worked with partners to organize or participate in nine other…
Implementing Virtualization: Techniques and Tools for Microsoft Windows
From Symantec Summary: Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and how are likely under investigation. Some organizations will decide that virtualization isn’t necessary. Others will find that they want to implement it…
Stop Criminals from Using Your Website As a Gateway to Fraud
“The Web has exploded as medium for commerce and communication, but it’s also become a favorite attack vector for criminals. And while the bad guys are motivated by money, the damage they wreak transcends the balance sheet: loss of reputation, lawsuits, loss of investor confidence and sometimes crippling liability.” “Click…
Information Security Update: February 21, 2008
The following is some updated information that we thought might be of interest. This is not a separate issue of the Newsletter: NEW YORK STATE OFFICE OF CYBER SECURITY AND CRITICAL INFRASTRUCTURE COORDINATION CYBER INFORMATION BULLETIN DATE ISSUED: February 21, 2008 SUBJECT: Malicious Email Messages Referencing the Lunar Eclipse One…
Wireless Technology for Oregon Courts
Jackson, William. “Wireless Rules for Oregon Courts,” Government Computer News, (February 1, 2008). “Officials at the Oregon Judicial Department (OJD) ran into a problem several years ago when they began looking for a new home for the department’s information technology staff and equipment. ” “Managers had to figure out how…
Top Ten Reasons Hackers Use the Web for Attacks
This technology brief by Blue Coat Systems details the vulnerabilities hackers use to take advantage of the web for attacks. To see entire document click on the link below: Top Ten Reasons Hackers Use the Web for Attacks