Volume 3 Number 6 June 2010 From the Desk of David Badertscher Home Personal Computer (PC) Maintenance for Windows Operating Systems Why do I need to maintain my home PC? As with most types of equipment, you must perform periodic maintenance on your home PC to keep it in good…
Articles Posted in Technology News
Developing an Addition to Your Blackberry in 13 Easy Steps
We recemty receoved the following e-mail from the ABA Judicial Division and are grateful for the opportunity to share this column by Judge Dixon with you our colleagues and friends.: Judge Herbert Dixon’s technology column, Developing an Addition to Your BlackBerry in 13 Easy Steps, is available free to the…
Murdoch On How to Get People to Pay for Content
In a video of an interview with his Fox Business Network, Rupert Murdoch, News Corp. Chairman discusses what he considers the future of media and the Company’s plan to charge for content. During the interview Mr. Murdoch said that in order to get people to pay for content online you…
CLLB Information Security Newsletter. Volume 3 Number 5 May 2010.
Volume 3 Number 5 May 2010 Identity Theft From the Desk of David Badertscher What is Identity Theft? Identity theft is a crime in which your personal information such as your name, social security number, date of birth, and address is stolen and may be used by someone to assume…
CLLB Information Security Newsletter. Volume 3 Number 1 January 2010.
Volume3 Number 1 January 2010 From the Desk of David Badertscher As we begin the new year, it’s an opportune time to assess the cyber security landscape and prepare for what new challenges may lie ahead, as well as what current threats may continue. What Are the Cyber Trends for…
2009 End of Year Message from Internet Society President and CEO
Although addressed primarily to Internet Society members, the following message contains information which should be of interest to librarians, lawyers and other important stakeholders in the internet community who need to follow ongoing developments. Dear Members, Friends, and Colleagues, The end of 2009 is here – and what a year…
CLLB: Information Security Newsletter. Volume 2 Number 12 December 2009.
Volume 2 Number 12 December 2009. Automatic Software Updates and Patching From the Desk of David Badertscher Security vulnerabilities are flaws in the software that could allow someone to potentially compromise your system. Each year, the volume of software security vulnerabilities discovered increases, and the hacking tools available to exploit…
Voting Has Begun in the ABA Journal’s Third Annual Blawg 100
I received the following letter from the ABA Journal along with a request to send it along to our readers. I urge all of you to contribute to the Blawg 100 conversation. David Badertscher Dear Blawgger, As proprietor of one of the more than 2,500 blawgs in the ABA Journal’s…
PC Devices Connected Using Light
Since the beginning of the last century when physicists determined that light could be considered as consisting of particles (photons) as well as waves, there have been efforts, with varying degrees of success, to use light to further the development of technology and communications. One of the latest attempts as…
CLLB: Information Security Newsletter. Volume 2 Number 11 November 2009.
Volume 2 Number 11 November 2009 Online Holiday Shopping Tips From the Desk of David Badertscher Online Holiday Shopping Tips The holiday season is approaching quickly and many of us will be shopping online. comScore estimates that in one day alone last year –Cyber Monday on December 1–$846 million was…