Close

Articles Posted in Information Technology

Updated:

CLLB Information Security Newsletter. Volume 2 Number 5 May 2009.

Volume 2 Number 5 May 2009. Rogue (Fake) Anti-Virus Software: How to Spot It & Avoid It!* From the Desk of David Badertscher Your PC May Be Infected! Click here to clean it! Have you seen this advertisement or similar pop-up messages? A free PC scan or an offer to…

Updated:

Employee Web Use: What is OK and What is Not

A White Paper from MessageLabs. Although this white paper was written primarily for IT managers we think it has considerable broader applicability and are therefore posting it here. Summary: Where do you draw the line when it comes to employee Web use? Is it okay to send the occasional personal…

Updated:

List: Law Library Blogs

We are delighted to see the updated List of Law Library Blogs. It was originally compled by Bonnie Shucha, University of Wisconsin Law School, and has been updated by Michael Robak, University of Illinios College of Law. When viewing this list it is important to note that it contains only…

Updated:

Amazon Has Now Released the Latest Version of It’s Wireless eBook Reader: Kindle DX

Amazon has now released Kindle DX, a larger, more versatile veriion of its wireless Kindle ebook device. The new DX version has a larger display and a screen which rotates from portrait to landscape to view Web pages and spreadsheets, etc. Kindle DX and other wireless ebook reading devices certainly…

Updated:

Obama CIO Apointee: Obsolete Regulations Block Government Adoption of Social Media

The U.S. government’s CIO recently appointed by President Obama told Congress this week that obsolete regulations are blocking agencies from serving the people by participating in top Web sites and social media. Regulations governing the use of cookies and — ironically — disclosure laws are keeping government stuck in the…

Updated:

Comments on How and Where to Write Better Tweets

According to C.G. Lynch’s provocative artice in the CIO Insider Newsletter,Twitter’s growing popularity is exposing a considerable “fraility” of writing among those tweet. He observes that Twitter’s 140 character message format demands concise, engaging writing “and that’s a skill that a lot of people don’t have. To read more of…

Updated:

Library of Congress Report: Information Technology Strategic Planning

Library of Congress Report: Information Technology Strategic Planning: A Well Developed Framework is Essential to Support the Library’s Current and Future Information Technology (IT) Needs The Library of Congress Office of the Inspector General. Library-Wide Report No. 2008-PA-105 March 2009. “The intent of this review was to access the effectiveness…

Updated:

In Challenge to Integrated Library System Industry, OCLC Extends WorldCat By Launcing New Library System

BY Philip Y. Blue, Senior Law Librarian New York Supreme Court Criminal Term Library In a move that could reshape the library automation landscape, OCLC has expanded WorldCat Locals existing cataloging and discovery tools with new circulation, delivery, and acquisitions features. This new project, which OCLC calls “the first Web-scale,…

Updated:

CLLB Information Security Newsletter. April 2009 Volume 2 Number 4.

http://www.msisac.org/April 2009 Volume 2 Number 4. From the Desk of David Badertscher The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer…

Updated:

PowerPoint Security Bug Found in Microsoft Office 2003

“A new zero-day remote code execution vulnerability has come to light, this time affecting Microsoft Office PowerPoint. The software giant has issued a security advisory about the potential exploit, which affects older Microsoft Office versions up through Office 2003. The current flagship Office 2007 product is not vulnerable.” For more…

Contact Us