Volume 3 Number 6 June 2010 From the Desk of David Badertscher Home Personal Computer (PC) Maintenance for Windows Operating Systems Why do I need to maintain my home PC? As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good…
Articles Posted in Information Technology
Developing an Addition to Your Blackberry in 13 Easy Steps
We recemty receoved the following e-mail from the ABA Judicial Division and are grateful for the opportunity to share this column by Judge Dixon with you our colleagues and friends.: Judge Herbert Dixon’s technology column, Developing an Addition to Your BlackBerry in 13 Easy Steps, is available free to the…
NISO Announces Six Recommended Practice Development Projects for Information Standards
Ellen McGrath of the Charles P.Sears Law Library at the University of Buffalo has forwarded the following announcement from the National Information Standards Organization (NISO). We are posting it here in recognition and appreciation of the importance of NISO’s ongoing work to the library community: David Badertscher Date: Fri, 18…
Murdoch On How to Get People to Pay for Content
In a video of an interview with his Fox Business Network, Rupert Murdoch, News Corp. Chairman discusses what he considers the future of media and the Company’s plan to charge for content. During the interview Mr. Murdoch said that in order to get people to pay for content online you…
The Third Way: A Narrowly Tailored Broadband Framework
David Badertscher This posting is essentially a followup of two of our earlier postings on this topic which you can find here and here. It begins with two statements released by the U.S. Federal Communications Commission (FCC) on May 6, 2010 in partial response to the recent decision in the…
CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.
Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…
Department of Technology NYC: How Are We Doing?
An Internet Society NYC update with video: ISOC-NY on May 8 2010, hosted a seminar “dot nyc – How are we doing?” at NYU. NYC Council Member Gale Brewer delivered keynote remarks, then vendor Eric Brunner-Williams of CORE Internet Council of Registrars revealed details of their proposal to the City,…
Intro to Cloud Computing and Its Ethical Implications –Is There a Silver Lining – Part I of II
Much is being written about the application development and information security aspects of cloud computing but there has been comparatively little discussion about how cloud computing relates to ethical issues that may arise from a lawyer’s use of this technology. In their two part article I n t r o…
FBI Finding Criminal Data on Cell Phones and Game Consoles is Tough
Non-traditional communications devices such as smartphones and game consoles pose a particular problem to law enforcement agencies trying to milk them for forensic data that reveals criminal activity, attendees were told at the 2010 Computer Forensics Show in New York City. From: Greene, Tim. FBI: Finding Criminal Data on Cell…
CLLB Information Security Newsletter. Volume 3 Number 4 April 2010.
Volume 3 Number 4 April 2010. Cloud Computing From the Desk of David Badertscher What is Cloud Computing? Cloud computing is a growing trend in information technology as organizations look for ways to save money and add flexibility to their operations. Cloud computing, while still an evolving service, provides on-demand…