Close

Articles Posted in Information Technology

Updated:

Recent Comments on Google and the Future of the Book

Sometimes it seems as though Google has become ubiquitous in the world of searching and may want to repeat its act in the world of books. While thinking about this, two articles, one forthcoming and one published Febrary 1 have come to our attention> The forthoming article Google and the…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Updated:

Results from Marshall Breeding’s 2008 Library Automation Survey

In case you missed it, the results from the 2008 version of Marshall Breeding’s Library Automation Survey are available at http://www.librarytechnology.org/perceptions2008.pl. This Survey is international in scope. There were 1,450 responses.

Updated:

Upgraded Library Web Resource Announcement

State of New York Supreme Court Criminal Term Library (New York County) Inspired by the recent New York Unified Court System Report Green Justice: An environmental Action Plan for the New York State Court System*, the New York Supreme Court Law Library, Criminal Term (New York County) is pleased to…

Updated:

Technology: What’s Coming in 2009?

Michael Gartenberg’s predictions as reported in Computerworld – December 17. 2008. “Well, it’s that time of the year again. Time to enjoy the glow of a nice LED-backlit display and huddle with the warmth that only an overclocked PC can produce. Yep, it’s time to take a look at what’s…

Updated:

Technology Escrow Agreements: Safeguarding Technology Investments

“What happens to your mission-critical… application source code should the vendor go bankrupt? This is when you need a Technology Escrow service.Tech Escrow requires vendors to deposit source code into an account held by a third party agent to ensure ongoing accessibility of the software. Recent research by IDG research…

Updated:

CLLB Information Security Newsletter. December 2008 Volume 1.

December 2008 Volume 1 Pop-Ups From the Desk of David Badertscher We’ve all experienced Pop-up windows, or “pop-ups,” while browsing the Internet. Pop-ups may appear without any interaction or prompting by the end user. They can be innocuous, such as when used for advertising, but they can be used for…

Updated:

U.S. News and World Report Names Librarianship as “Best Career” in 2009

Source: AALL: From the Desk of James E. Duggan, December 18, 2008. Some welcome news is today’s tough economy, U.S. News and & World Report last week named librarianship as a “Best Career 2009.” The overview dispels the image of librarians as “mousy bookworms,” reporting that librarians have become “high-tech…

Updated:

New York State Archives: E-Mail Policy Guidelines

From: New York State Archives – Region 1 Newsletter, December 2008 The New York State Archives is pleased to announce the release of its email policy development guidelines. These guidelines are intended as a starting point for state agencies and local governments to use for writing policies and procedures that…

Contact Us