Since the beginning of the last century when physicists determined that light could be considered as consisting of particles (photons) as well as waves, there have been efforts, with varying degrees of success, to use light to further the development of technology and communications. One of the latest attempts as…
Articles Posted in Information Technology
CLLB: Information Security Newsletter. Volume 2 Number 11 November 2009.
Volume 2 Number 11 November 2009 Online Holiday Shopping Tips From the Desk of David Badertscher Online Holiday Shopping Tips The holiday season is approaching quickly and many of us will be shopping online. comScore estimates that in one day alone last year –Cyber Monday on December 1–$846 million was…
Windows 7: Tips and Best Practices for Simplified Migration
White Paper by Nelson Reust and Danielle Reust The authors write: ” Migration to Windows 7 is a future reality for most. With XP approaching its end of life, and many organizations choosing to skip Vista as an interim step, the new Windows 7 release holds the promise of new…
Results of National Center for State Courts e-Filing Survey
Rick Snow of the National Center for State Courts (NCSC) has just announced that results of the NCSC e-filing survey conducted earlier this year are available at . Also, a brief summary of the findings is available on our Court Technology Bulletin at . He writes: “We hope you find…
CLLB Information Security Newsletter. Volume 2 Number 10 October 2009.
Volume 2 Number 10 October 2009. Top Ten Cyber Security Tips From the Desk of David Badertscher October is Cyber Security Awareness Month – Our Shared Responsibility In recognition of the 2009 National Cyber Security Awareness Month, this edition of the newsletter is designed to provide you with the TOP…
ABA Program – Cybercrime, Data Breaches and Red Flags: The Next Wave
As we becme increasingly dependant on information transmitted and stored in digital formats, ssues related to cybercrime are rapidly becoming central to all areas of the law. This is not stated as a criticism but rather as a fact that must be addressed by whatever means possible, including programs such…
CLLB Information Security Newsletter – Cyber Ethics
September 2009 Volume 2, Issue 9 Cyber Ethics From the Desk of David Badertscher What is Cyber Ethics? Cyber ethics refers to the code of responsible behavior on the Internet. Just as we are taught to act responsibly in everyday life, with lessons such as “Don’t take what doesn’t belong…
The Emerging Field of Electronic Discovery Project Management
By Brett Burney Principal Burney Consultants LLC We are proud to reprint the following article “The Emerging Field of Electronic Discovery Project Management” which first appeared as a TechnoLawyer TechnoFeature exclusive on September 1. It is being reprinted here with the written permission of both the author Brett Burney, a…
New on LLRX.Com August 2009
**The Government Domain: Tracking Congress 2.0 http://www.llrx.com/columns/govdomain42.htm With the 111th Congress of the United States reconvening on September 8th, e-gov expert Peggy Garvin highlights new tools and sources that enhance and expand your ability to track and monitor the action. **Re-Hashing the Hash Tag – Crowd Competition and Community Standards…
Responding to Real Time Information, Open Systems, and the Obama IT Vision
Change 2010: August 27, 2009, Washington, DC –“The Obama administration has challenged Federal information technology managers to explore more open systems,” said Arpan Patel, Director of Somat’s Information Engineering practice. “Federal managers face a compelling need to understand the differences between traditional approaches to information technology and increasingly important open…