Close

Articles Posted in Technology News

Updated:

Comments on How and Where to Write Better Tweets

According to C.G. Lynch’s provocative artice in the CIO Insider Newsletter,Twitter’s growing popularity is exposing a considerable “fraility” of writing among those tweet. He observes that Twitter’s 140 character message format demands concise, engaging writing “and that’s a skill that a lot of people don’t have. To read more of…

Updated:

In Challenge to Integrated Library System Industry, OCLC Extends WorldCat By Launcing New Library System

BY Philip Y. Blue, Senior Law Librarian New York Supreme Court Criminal Term Library In a move that could reshape the library automation landscape, OCLC has expanded WorldCat Locals existing cataloging and discovery tools with new circulation, delivery, and acquisitions features. This new project, which OCLC calls “the first Web-scale,…

Updated:

CLLB Information Security Newsletter. April 2009 Volume 2 Number 4.

http://www.msisac.org/April 2009 Volume 2 Number 4. From the Desk of David Badertscher The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer…

Updated:

PowerPoint Security Bug Found in Microsoft Office 2003

“A new zero-day remote code execution vulnerability has come to light, this time affecting Microsoft Office PowerPoint. The software giant has issued a security advisory about the potential exploit, which affects older Microsoft Office versions up through Office 2003. The current flagship Office 2007 product is not vulnerable.” For more…

Updated:

An Appeal to A Jury of Your Twittering Peers

Written by: Ira Winkler March 24, 2009. For the Internet Revolution Blog: “The ‘CSI Effect’ is what people call juror expectations of forensic evidence that unequivocally proves the defendant guilty. Unfortunately, there is now a “Twitter Effect,” where defense attorneys hope for mistrials because jurors just can’t control themselves and…

Updated:

Two Twitter Stories

Stories about popular, exciting topics, often appear almost together , sometimes on the same day. On March 13 two stories published in the InformationWeek Daily Newsletter caught our attention and we wanted to pass them on to our readers: In “The Intruder Story: Man At His Best”, Michael Hickins writes:…

Updated:

From the Americqan Libraries Direct

American Libraries Direct is the e-newsletter of the American Library Association (ALA), March 11, 2009. Highlights: Library technology unconference Have you ever been “speed-geeking”? Struck by “lightning-talks”? Join keynoters Joan Frye Williams and John Blyberg at the first-ever LITACamp, “The Everywhere Library: Creating, Communicating, Integrating,” May 7–8, in Dublin, Ohio.…

Updated:

CLLB Information Security Newsletter. February 2009 Volume 2 Number 2.

February 2009 Volume 2 Number 2. CLLB Information Security Newsletter Monthly Cyber Security Tips NEWSLETTER February 2009 Volume 2, Issue 2 Cyber Security Trends for 2009 From the Desk of David Badertscher The volume and complexity of cyber threats continue to increase. More of our activities-whether at home, school or…

Updated:

New Online Journal: Legal Information and Technology eJournal

Georgia K. Briscoe* of the University of Colorado School of Law Library has sent the following announcement which we are please to post here for the benefit of all law librarians and perhaps some others as well. Here is her announcement: In case you haven’t heard, there is a new…

Updated:

CLLB Information Security Newsletter. January 2009 Volume 2 # 1.

January 2009 Volume 2 # 1 Challenge or Secret Questions From the Desk of David Badertscher What are Challenge or Secret Questions? Knowledge-based authentication or the use of “Challenge or Secret Questions” helps computer users access their accounts when they forget their password. The questions are often designed as simple,…

Contact Us