Net Neutrality: Why the Internet Can’t Remain Free * “Most users want a free Internet, but that’s not going to be possible by 2010, Gary Beach argues. Without a major investment by those who own the pipes, the likes of Verizon, AT&T and Comcast, Internet traffic will come to resemble…
Articles Posted in Information Technology
Business Skills and the Organization Professional
From Global Knowledge eNews April 1, 2008 “In today’s business world, deep technical or specialized knowledge is not enough – especially for those moving up the corporate ladder. IT professionals [and those in other professions, including librarians] must complement this knowledge with business acumen – or general knowledge of the…
Metadata: The Ghosts Haunting E-Documents
From Findlaw, March 28, 2008. “David Hricik & Chase Edward Scott) – Metadata is not new, but it has become pervasive in the digital world in which lawyers (and their clients) live. Many programs commonly used in the office create data about data and then save that unseen information along…
Google, MySpace, Yahoo Form OpenSocial Foundation
“The core idea here is that developers will create more applications for social networks if there is a fair amount of interoperability between the platforms. Of course, Facebook, and by extension Microsoft, don’t seem to want to endorse this concept. But Microsoft did come out strongly in favor of making…
Most Common Database Design Mistakes
Brian Prince of e-Week has compiled a list and slide show of what he considers some of the more common mistakes and a few general tips for avoiding them. Over the years as we were either disigning or helping to design a number of library related research and applications databases,…
Windows Vista Virtulization: What You Need to Get Started
BY: Ruest, Danielle and Nelson Ruest. ‘Windows Vista Virtulization: What You Need to Get Started,” Informationweek.com News. (March 10, 2008). “Running Vista in a virtual machine gives users access to all of the operating system’s features while avoiding hardware and application-compatibility obstacles. Here’s a primer to get you started, with…
CLLB Information Security Newsletter. March 2008 Volume 1, Issue 2.
CLLB Information Scurity Newsletter March 2008 Volume 1, Issue 2 Annual Maintenance For Computers From the Desk of David Badertscher Perform Annual Maintenance in Conjunction With Daylight Savings Time Change In addition to your routine security and maintenance processes, you should perform an annual PC “tune up” or maintenance to…
Internet Society (ISOC) Participates in the Open Consultations of the Internet Governance Forum
The following was contributed by Bill Graham* The Internet Society played a significant role in the second meeting of the Internet Governance Forum (IGF) in Rio de Janeiro in December, 2007. ISOC hosted an Open Forum on ISOC’s work and worked with partners to organize or participate in nine other…
Implementing Virtualization: Techniques and Tools for Microsoft Windows
From Symantec Summary: Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and how are likely under investigation. Some organizations will decide that virtualization isn’t necessary. Others will find that they want to implement it…
Stop Criminals from Using Your Website As a Gateway to Fraud
“The Web has exploded as medium for commerce and communication, but it’s also become a favorite attack vector for criminals. And while the bad guys are motivated by money, the damage they wreak transcends the balance sheet: loss of reputation, lawsuits, loss of investor confidence and sometimes crippling liability.” “Click…