Close

Articles Posted in Information Technology

Updated:

CLLB Information Security Newsletter August 2008

NEWSLETTER AUGUST 2008 Volume 1, Issue 4 Firewalls From the Desk of David Badertscher What is a firewall and why should I use one? A firewall is a software program or hardware device that filters the inbound and outbound traffic between your network or computer and the Internet. Firewalls add…

Updated:

Real Time Text Aims to Improve Internet accdessibility for the Deaf and Hard of Hearing

From: The Internet Society Newsletter, July 31, 2008. The blossoming of multimedia content on the Internet in recent years has revolutionised personal interactions, business communications, and other online services. But for millions of Internet users with sensory disabilities, many of the communication tools remain frustratingly out of their reach. Arnoud…

Updated:

New York City Mayor’s Office: Upcoming Public Broadband Advisory Committee Meeting

From: Internet Society, New York. Announcement July 28, 2008. On Wednesday, July 30th at 11:00am there will be a briefing from the Mayor’s Office and iamond Consultants for the Broadband Advisory Committee regarding the Bloomberg administration’s plans for bridging the digital divide in New York City. The Broadband Advisory Committee…

Updated:

How Trustworthy Are State-Level Primary Legal Resources on the Web?

David Badertscher* How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the results of…

Updated:

Regisration for Web 2.0 Challenge

Bonnie Shucha has asked us to “spead the word” about the exciting Web 2.0 Challenge that is being sponsored by the Computer Services Special Interest Group of the American Association of Law Libraries. We are happy to do so. Here is part of Bonnie’s announcement: Are you interested in learning…

Updated:

Microsoft’s Top Ten Innovationss by James Rapoza

” Let’s face it, during the reign of Bill Gates, Microsoft hasn’t exactly been Xerox Parc when it comes to inventing and creating new technologies. For the most part, Microsoft has been content to buy or copy new technologies and focus on incremental improvements to its products. But that doesn’t…

Updated:

Report: 2008 Internet Security Trends

“For a time, security controls designed to manage spam, viruses, and malware were working. Loud, high-impact attacks abated. But, as a result of this success, the threats they protected against were forced to change. In 2007, many of these threats underwent significant adaptation. Malware went stealth, and the sophistication increased.”…

Updated:

State Security Breach Notification Legislation: State Laws Chart

The following link is to a Chart prepared by Perkins Cole to provide information regarding information security breach notification legislation which has been enacted in U.S. jurisdictions. It has been updated to May 14, 2008: Chart indicating state-by-state legislation relating to information securirty breach notification as of 5-14-08

Updated:

AALL State-by-State Survey and Report on Authentication of Online Legal Resources

An Introduction* David Badertscher How trustworthy are state-level primary legal resources on the Web? The American Association of Law Libraries (AALL) published the State-by-State Report on Authentication of Online Legal Resources (Authentication Report) that answers this very important and timely question. The comprehensive report examines and draws conclusions from the…

Contact Us