Articles Posted in Information Technology

“A Look at the best and worst of the years Technology implementations and innovations” as reported by Douglas Bartholomew et. al. in the November 30, 2007 issue of Baseline:

Triumphs and Travails of 2007 November 30, 2007

By Doug Bartholomew, David F. Carr, Ericka Chickowski, Mel Duvall, Deborah Gage, Laton McCartney and Lawrence Walsh

The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research:

________________________

Professional librarians and researchers will tell you that the Web has many unexplored opportunities for finding more information on business topics. Pursue these six techniques to improve your research results:

As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world .

Although this report was prepared primarily for OCLC member libraries the topic being addressed is of obvious importance to all of us, regardless of occupation, who are working in this highly interractive world of networks and are confronted daily with the necessity of reconciling matters related to information sharing, information security, and privacy. Recognizing this importance we are posting the entire document below. Since it is quite large we have created three links for your convenience. The first links only to the Introduction, the second only to the Conclusion, and the third links to the complete report in pdf format.

The report is divided into 15 sections including the following:

On October 18, 2007 a coalition of major media and technology companies released a set of guidelines designed to halt online piracy. Media companies involved include CBS, NewsCorp, Fox Enertainment Group, NBC Universal, Viacom Disney, and MySpace. Google was notable absent from the list. A You Tube spokesperson who asked not to be named said that Google had talked to Disney and You Tube about the guidelines but decided not to join the group out of concdrn that ‘ “industry-wide mandates would stifle innovation’ “. I

In a posting on LEXOLOGY by four attorneys from Arent Fox LLP “…The joint collaboration aims to eliminate infringing content on services providing user-uploaded and user-generated audio and video content (UGC) services, encourage uploads of wholly original and authorized user-generated content, and accommodate fair use of copyrighted content, and protect user privacy interests.” It is interesting to note that many of the concerns reflected in the guidelines are similar (except perhaps in context) to those confronted by libraries in their own efforts to resolve issues the reproduction and transfer of materials.

To provide added context for those interested in this topic, this posting includes the full text of an article published on FindLaw Corporate Counsel by Julie Hilden. Finally,some additional links to other sources are listed.

From Citrix Systems

Summary:

The threat profile facing enterprise organizations has undeniably shifted from network-layer exploits to more formidable attacks against applications, primarily Web and Web services applications. This radical change has been recognized by numerous IT security vendors, which have rushed to deliver products that shield Web applications from a new generation of attacks.

By Eric Chabrow

Society for Information Management’s 2008 list of leadership books covers a wide-range of subjects, except IT itself.

Books ranging from How to Read a Book to The Prince are among 30 books every CIO wannabe should read, according to an annual list of must-read books issued by the Society of Information Management’s Regional Leadership Forum.

“Email’s ease of use, speed and scale of distribution make it an invaluable business tool. However, these same attributes can also cause severe difficulties for employers if employees’ use of email and internet is not controlled adequately. This white paper outlines email risks employers face and how to address them.”

Legal Risks E-Mail…



Source:
CIO Newsletter, November 13, 2007.

Contact Information