“A Look at the best and worst of the years Technology implementations and innovations” as reported by Douglas Bartholomew et. al. in the November 30, 2007 issue of Baseline: Triumphs and Travails of 2007 November 30, 2007 By Doug Bartholomew, David F. Carr, Ericka Chickowski, Mel Duvall, Deborah Gage, Laton…
Articles Posted in Information Technology
Should the Web Be Changed From WWW to GGG (Giant Global Graph) ?
David Badertscher “Why we need to move from thinking about Web pages to thinking about the information on those pages.” http://www.gcn.com/blogs/tech/45477.html The above quote and link refer to a recent posting by Joab Jackson in which he discusses an idea recently put forward in a posting by the “father of…
Six Techniques to Get More from the Web than Google Will Tell You
The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research: ________________________ Professional librarians and researchers will tell you that the Web has…
Sharing, Privacy and Trust in Our Networked World
As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world…
A Group of Internet and Media Companies Push for Principles Regarding User Generated Services to Protect Copyrights
On October 18, 2007 a coalition of major media and technology companies released a set of guidelines designed to halt online piracy. Media companies involved include CBS, NewsCorp, Fox Enertainment Group, NBC Universal, Viacom Disney, and MySpace. Google was notable absent from the list. A You Tube spokesperson who asked…
Amazon Device Doesn’t Need Computers
The following was published as an article in the November 20, 2007 New York Times. By SAUL HANSELL Published: November 20, 2007 Jeff Bezos knows that the world is not exactly clamoring for another way to read electronic books. “If you go back in time, the landscape is littered with…
McAfee Sees Cyber Criminals Targeting Web 2.0, Windows Vista, and Online Games
McAfee Sees Cybercriminals Targeting Web 2.0, Windows Vista, and Online Games McAfee also is predicting a 50% increase in VoIP attacks in 2008, compared to this year. Click here to see complete article in the InformationWeek Daily Newsletter.
Protecting Web Based Applications from Attack or Misuse
From Citrix Systems Summary: The threat profile facing enterprise organizations has undeniably shifted from network-layer exploits to more formidable attacks against applications, primarily Web and Web services applications. This radical change has been recognized by numerous IT security vendors, which have rushed to deliver products that shield Web applications from…
30 Books Every IT Leader Must Read
By Eric Chabrow Society for Information Management’s 2008 list of leadership books covers a wide-range of subjects, except IT itself. Books ranging from How to Read a Book to The Prince are among 30 books every CIO wannabe should read, according to an annual list of must-read books issued by…
Legal Risks of Uncontrolled E-mail and Web Content
“Email’s ease of use, speed and scale of distribution make it an invaluable business tool. However, these same attributes can also cause severe difficulties for employers if employees’ use of email and internet is not controlled adequately. This white paper outlines email risks employers face and how to address them.”…