The U.S. government’s CIO recently appointed by President Obama told Congress this week that obsolete regulations are blocking agencies from serving the people by participating in top Web sites and social media. Regulations governing the use of cookies and — ironically — disclosure laws are keeping government stuck in the…
Articles Posted in Information Technology
Comments on How and Where to Write Better Tweets
According to C.G. Lynch’s provocative artice in the CIO Insider Newsletter,Twitter’s growing popularity is exposing a considerable “fraility” of writing among those tweet. He observes that Twitter’s 140 character message format demands concise, engaging writing “and that’s a skill that a lot of people don’t have. To read more of…
Library of Congress Report: Information Technology Strategic Planning
Library of Congress Report: Information Technology Strategic Planning: A Well Developed Framework is Essential to Support the Library’s Current and Future Information Technology (IT) Needs The Library of Congress Office of the Inspector General. Library-Wide Report No. 2008-PA-105 March 2009. “The intent of this review was to access the effectiveness…
In Challenge to Integrated Library System Industry, OCLC Extends WorldCat By Launcing New Library System
BY Philip Y. Blue, Senior Law Librarian New York Supreme Court Criminal Term Library In a move that could reshape the library automation landscape, OCLC has expanded WorldCat Locals existing cataloging and discovery tools with new circulation, delivery, and acquisitions features. This new project, which OCLC calls “the first Web-scale,…
CLLB Information Security Newsletter. April 2009 Volume 2 Number 4.
http://www.msisac.org/April 2009 Volume 2 Number 4. From the Desk of David Badertscher The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer…
PowerPoint Security Bug Found in Microsoft Office 2003
“A new zero-day remote code execution vulnerability has come to light, this time affecting Microsoft Office PowerPoint. The software giant has issued a security advisory about the potential exploit, which affects older Microsoft Office versions up through Office 2003. The current flagship Office 2007 product is not vulnerable.” For more…
Rescuecom Corp. v. Google Inc.
From: Findlaw Case Summaries, Second Circuit U.S. Court of Appeals: CYBERSPACE LAW, INTELLECTUAL PROPERTY, TRADEMARK Rescuecom Corp. v. Google Inc. , No. 06-4881 In an action brought under the Lanham Act for trademark infringement, false designation of origin, and dilution, the district court’s dismissal for failure to state a claim…
Information and Communication Technologies Development Index
The new Information and Communications Index of the International Telecommunications Union (ITU) compares developments in information and communication technologies (ICT) in 154 countries over a five year period from 2002 to 2007. The Index combines 11 indicators into a single measure that can be used as a benchmarking tool globally,…
CLLB Information Security Newsletter. March 2009 Volume 2 Number 3.
March 2009 Volume 2 Number 3. Social Networking Sites: How To Stay Safe From the Desk of David G. Badertscher The popularity of social networking sites–such as MySpace, Facebook, Twitter and others–has exploded in recent years, with usage in the United States increasing 93% since 2006, according to Netpop Research.…
An Appeal to A Jury of Your Twittering Peers
Written by: Ira Winkler March 24, 2009. For the Internet Revolution Blog: “The ‘CSI Effect’ is what people call juror expectations of forensic evidence that unequivocally proves the defendant guilty. Unfortunately, there is now a “Twitter Effect,” where defense attorneys hope for mistrials because jurors just can’t control themselves and…