Articles Posted in Information Technology

“Who’s reading magazines and how do they flip through the pages? One research company is using RFID technology to find out.” Question: What are the implications of this development, both positive and negative? Comments welcome.

To read the complete article in the December 12, 2007 CIO Insider, click here.

“A Look at the best and worst of the years Technology implementations and innovations” as reported by Douglas Bartholomew et. al. in the November 30, 2007 issue of Baseline:

Triumphs and Travails of 2007 November 30, 2007

By Doug Bartholomew, David F. Carr, Ericka Chickowski, Mel Duvall, Deborah Gage, Laton McCartney and Lawrence Walsh

The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research:

________________________

Professional librarians and researchers will tell you that the Web has many unexplored opportunities for finding more information on business topics. Pursue these six techniques to improve your research results:

As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world .

Although this report was prepared primarily for OCLC member libraries the topic being addressed is of obvious importance to all of us, regardless of occupation, who are working in this highly interractive world of networks and are confronted daily with the necessity of reconciling matters related to information sharing, information security, and privacy. Recognizing this importance we are posting the entire document below. Since it is quite large we have created three links for your convenience. The first links only to the Introduction, the second only to the Conclusion, and the third links to the complete report in pdf format.

The report is divided into 15 sections including the following:

On October 18, 2007 a coalition of major media and technology companies released a set of guidelines designed to halt online piracy. Media companies involved include CBS, NewsCorp, Fox Enertainment Group, NBC Universal, Viacom Disney, and MySpace. Google was notable absent from the list. A You Tube spokesperson who asked not to be named said that Google had talked to Disney and You Tube about the guidelines but decided not to join the group out of concdrn that ‘ “industry-wide mandates would stifle innovation’ “. I

In a posting on LEXOLOGY by four attorneys from Arent Fox LLP “…The joint collaboration aims to eliminate infringing content on services providing user-uploaded and user-generated audio and video content (UGC) services, encourage uploads of wholly original and authorized user-generated content, and accommodate fair use of copyrighted content, and protect user privacy interests.” It is interesting to note that many of the concerns reflected in the guidelines are similar (except perhaps in context) to those confronted by libraries in their own efforts to resolve issues the reproduction and transfer of materials.

To provide added context for those interested in this topic, this posting includes the full text of an article published on FindLaw Corporate Counsel by Julie Hilden. Finally,some additional links to other sources are listed.

From Citrix Systems

Summary:

The threat profile facing enterprise organizations has undeniably shifted from network-layer exploits to more formidable attacks against applications, primarily Web and Web services applications. This radical change has been recognized by numerous IT security vendors, which have rushed to deliver products that shield Web applications from a new generation of attacks.

Contact Information