Close

Articles Posted in Information Technology

Updated:

Technology Triumphs and Travails of 2007

“A Look at the best and worst of the years Technology implementations and innovations” as reported by Douglas Bartholomew et. al. in the November 30, 2007 issue of Baseline: Triumphs and Travails of 2007 November 30, 2007 By Doug Bartholomew, David F. Carr, Ericka Chickowski, Mel Duvall, Deborah Gage, Laton…

Updated:

Should the Web Be Changed From WWW to GGG (Giant Global Graph) ?

David Badertscher “Why we need to move from thinking about Web pages to thinking about the information on those pages.” http://www.gcn.com/blogs/tech/45477.html The above quote and link refer to a recent posting by Joab Jackson in which he discusses an idea recently put forward in a posting by the “father of…

Updated:

Six Techniques to Get More from the Web than Google Will Tell You

The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research: ________________________ Professional librarians and researchers will tell you that the Web has…

Updated:

Sharing, Privacy and Trust in Our Networked World

As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world…

Updated:

A Group of Internet and Media Companies Push for Principles Regarding User Generated Services to Protect Copyrights

On October 18, 2007 a coalition of major media and technology companies released a set of guidelines designed to halt online piracy. Media companies involved include CBS, NewsCorp, Fox Enertainment Group, NBC Universal, Viacom Disney, and MySpace. Google was notable absent from the list. A You Tube spokesperson who asked…

Updated:

Protecting Web Based Applications from Attack or Misuse

From Citrix Systems Summary: The threat profile facing enterprise organizations has undeniably shifted from network-layer exploits to more formidable attacks against applications, primarily Web and Web services applications. This radical change has been recognized by numerous IT security vendors, which have rushed to deliver products that shield Web applications from…

Updated:

30 Books Every IT Leader Must Read

By Eric Chabrow Society for Information Management’s 2008 list of leadership books covers a wide-range of subjects, except IT itself. Books ranging from How to Read a Book to The Prince are among 30 books every CIO wannabe should read, according to an annual list of must-read books issued by…

Updated:

Legal Risks of Uncontrolled E-mail and Web Content

“Email’s ease of use, speed and scale of distribution make it an invaluable business tool. However, these same attributes can also cause severe difficulties for employers if employees’ use of email and internet is not controlled adequately. This white paper outlines email risks employers face and how to address them.”…

Contact Us