Articles Posted in Information Technology

“The core idea here is that developers will create more applications for social networks if there is a fair amount of interoperability between the platforms. Of course, Facebook, and by extension Microsoft, don’t seem to want to endorse this concept. But Microsoft did come out strongly in favor of making data more portable between social network sites on a limited basis. What all this means is that new battle lines are being drawn between Google and Microsoft unless, of course, peace unexpectedly breaks out as some still hope. Either way, it won’t be too long before the Generation Y folks that make heavy use of these services start to make their presence felt on traditional IT.”

See March 25, 2008 article by Clint Boulton here.

Brian Prince of e-Week has compiled a list and slide show of what he considers some of the more common mistakes and a few general tips for avoiding them. Over the years as we were either disigning or helping to design a number of library related research and applications databases, we could certainly have used such a compilation and are glad to share this one with you.

To see Brian Prince’s presentation, click here.

BY: Ruest, Danielle and Nelson Ruest. ‘Windows Vista Virtulization: What You Need to Get Started,” Informationweek.com News. (March 10, 2008).

“Running Vista in a virtual machine gives users access to all of the operating system’s features while avoiding hardware and application-compatibility obstacles. Here’s a primer to get you started, with a link to a free, downloadable e-book.”

To see complete article and links referenced, click here.

The following was contributed by Bill Graham*

The Internet Society played a significant role in the second meeting of the Internet Governance Forum (IGF) in Rio de Janeiro in December, 2007. ISOC hosted an Open Forum on ISOC’s work and worked with partners to organize or participate in nine other sessions, including the Opening and Closing Panels of the IGF itself.

Planning has now begun for the 2008 IGF, which will be held in Hyderabad, India from 3-6 December. ISOC Board of Trustees members, ISOC staff members, and a large number of ISOC members participated in the IGF Open Consultations held in Geneva on 26 February 2008. The meeting was convened in the United Nations headquarters and was attended by

From Symantec

Summary:

Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and how are likely under investigation. Some organizations will decide that virtualization isn’t necessary. Others will find that they want to implement it in places, but not across the board. Sill others will move to implement it on a large scale. For those who decide to implement virtualization, the question is how to do it. Many people are not aware that a number of conversion tools and techniques are available now in the Microsoft Windows environment.

“The Web has exploded as medium for commerce and communication, but it’s also become a favorite attack vector for criminals. And while the bad guys are motivated by money, the damage they wreak transcends the balance sheet: loss of reputation, lawsuits, loss of investor confidence and sometimes crippling liability.”

“Click below to get a new whitepaper from FinJan that highlights the new techniques hackers use to infiltrate your networks, with critical steps you can take to prevent them by using real-time content inspection technologies.”

From: CIO Security Alert, February 23, 2008

Jackson, William. “Wireless Rules for Oregon Courts,” Government Computer News, (February 1, 2008).

“Officials at the Oregon Judicial Department (OJD) ran into a problem several years ago when they began looking for a new home for the department’s information technology staff and equipment. ”

“Managers had to figure out how to connect the network operations center (NOC) with the state’s data center and support more than 2,000 department employees at 70 locations statewide without requiring IT staff members to spend all their time on the road….”

Contact Information