Close

Articles Posted in Information Technology

Updated:

Internet Poised For Significant Changes in 2009 Says Dr. Vint Cerf

The Internet in 2009 is undergoing the most significant set of changes of its entire history, ccording to one of the men who helped create it, Dr. Vint Cerf. At the official opening of the Internet Society’s (ISOC) new offices in Geneva, on 26 February, Dr Cerf explained that technical…

Updated:

Ribert Richards Updates Legal Information Systems & Legal Informatics Resources

Legal Information Systems & Legal Informatics Resources, http://home.comcast.net/~richards1000/LegalInformationSystemsBibliography.htm , has been updated with new content. This site aggregates resources of interest to those conducting research on legal information systems. Materials listed include the following: • Articles, Preprints, Journals, Blogs, and Indexes • Conferences and Conference Proceedings • Dissertations & Theses…

Updated:

New, Powerful, State-Of-The-Art Learning Technology Coming to the American Association of Law Libraries

The American Association of Law Libraries (AALL) is proud to announce it is adopting a new, powerful, state-of-the-art learning technology, which will provide a new learning gateway to all AALL members. The new Ed2Go @AALLNET site will provide members with: Online access to the AALL Annual Meeting program recordings, as…

Updated:

CLLB Information Security Newsletter. February 2009 Volume 2 Number 2.

February 2009 Volume 2 Number 2. CLLB Information Security Newsletter Monthly Cyber Security Tips NEWSLETTER February 2009 Volume 2, Issue 2 Cyber Security Trends for 2009 From the Desk of David Badertscher The volume and complexity of cyber threats continue to increase. More of our activities-whether at home, school or…

Updated:

Q&A: Electronic Signatures*

QUESTION: Does any one use electronic signatures for documents? We conduct video arraignments with detention facilities around our county and this would be most helpful and much more efficient. Any information you can provide will be appreciated. RESPONSE: There is a difference between electronic and digital. We use a live…

Updated:

Chain of Custody: Authenticating Digital Evidence

The transition of evidence from paper to digital imposes new challenges to ensuring a proper “chain of custody'” in the authentication of digital evidence. The legal group of Merrill Corporation has recently compiled a report which addresses this and related issues: Report: AUTHENTICATING DIGITAL EVIDENCE: IDENTIFY AND AVOID THE WEAK…

Updated:

New Online Journal: Legal Information and Technology eJournal

Georgia K. Briscoe* of the University of Colorado School of Law Library has sent the following announcement which we are please to post here for the benefit of all law librarians and perhaps some others as well. Here is her announcement: In case you haven’t heard, there is a new…

Updated:

Recent Comments on Google and the Future of the Book

Sometimes it seems as though Google has become ubiquitous in the world of searching and may want to repeat its act in the world of books. While thinking about this, two articles, one forthcoming and one published Febrary 1 have come to our attention> The forthoming article Google and the…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Contact Us