Close

Articles Posted in Information Technology

Updated:

State of Telecom Conference: Matching Supply and Demand for the Next Generation of Broadband

The Columbia Institute for Tele-Information (CITI) “State of Telecom” conference will be held on October 15 at the Columbia University Business School, Davis Auditorium in theShapiro Center (just behind Uris Hall). This year’s focus will be on “Matching Supply and Demand for the Next Generation of Broadband.” The conference will…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 9 September 2010.

Volume 3 Number 9 September 2010. September 2010 Detecting and Avoiding Fake Anti-Virus Software From the Desk of David Badertscher Your Computer Is Infected with Malware! You may be familiar with this or similar messages appearing on a website, urging you to take action purportedly designed to clean your allegedly…

Updated:

Ten Ways IT Departments May Enable Cybercrime

Kapersky laboratories has produced a special whitepaper focused on how IT unknowingly enables cybercrime by giving cybercriminals access to systems and data through a series of misconceptions and false assumptions. To view this paper click on the link below: Ten Ways IT Departments Enable Cybercrime

Updated:

CLLB Information Security Newsletter. Volume 3 number 8 August 2010.

Volume 3 number 8 August 2010. From the Desk of David Badertscher Protecting Children Online. What are the threats online? Children are spending more of their time online than ever before. According to one study, 8-18 year-olds spend an average of 1.5 hours a day using a computer outside of…

Updated:

No Crackdown but Questions in Europe About Data Protection and the Cloud

By Alex Williams / September 4, 2010 11:18 PM* German authorities have recently expressed skepticism about cloud computing and the potential it has for breaking data protection laws. According to the Information Law Group, there is no imminent danger of a European crackdown, but legal experts are advising international companies…

Updated:

Digitizing the World’s Laws: Authentication and Preservation

BY: Claire M Germain, Edward Cornell Law Librarian and Professor of Law Cornell University and Director, Dual Degree Programs, Paris & Berlin Publishers Note: Claire Germain is interested in all aspects of legal information, from rare books to digital libraries, and often writes on these topics, most recently “Digitizing the…

Updated:

Network Neutrality: Some Background and Perspectives (Updated August 26, 2010)

David Badertscher Introduction In an August 6, 2010 posting on the AALL Washington Blawg, “As Talks Break Down, What is Next for Neutrality”, Emily Feldman discussed the implication of talks on network neutrality between the Federal Communications Commission (FCC) and stakeholders of network neutrality falling apart, or at least being…

Updated:

CLLB Information Security Newsletter. Volume 3 Number 7 July 2010.

Volume 3 Number 7 July 2010 July 2010 PROTECTING DATA CONTAINED IN COPIERS AND PRINTERS From the Desk of David Badertscher What kind of data can be stored in copiers and printers? You are probably familiar with many of the standard best practices for safeguarding your data, such as avoid…

Contact Us