Articles Posted in Information Technology

The U.S. government’s CIO recently appointed by President Obama told Congress this week that obsolete regulations are blocking agencies from serving the people by participating in top Web sites and social media. Regulations governing the use of cookies and — ironically — disclosure laws are keeping government stuck in the 20th Century. See:

Obsolete Regulations Block Government Adoption Of Social Media

According to C.G. Lynch’s provocative artice in the CIO Insider Newsletter,Twitter’s growing popularity is exposing a considerable “fraility” of writing among those tweet. He observes that Twitter’s 140 character message format demands concise, engaging writing “and that’s a skill that a lot of people don’t have. To read more of Mr. Lynch’s practical, expert advice click here.

As for where to write, sometimes it seems as though tweeting or twittering is almost universal. Amy Hale-Jenke, Head of Reference at the 5th Circuit Court of Appeals has found many fellow twittering, or tweeting, law librarians by going to the Twitter Yellow Pages. To “meet” all types of legal professionals, including law librarians who like to tweet, you can also go to Justia’s Legal Birds, a “Twitter Community.” Perhaps all of this gives the quotation, “birds of a feather flock together” a special meaning. Thinking of all this one wonders if tweets are becoming sort of information age variations of haiku that are being spread around the web.

BY Philip Y. Blue, Senior Law Librarian New York Supreme Court Criminal Term Library

In a move that could reshape the library automation landscape, OCLC has expanded WorldCat Locals existing cataloging and discovery tools with new circulation, delivery, and acquisitions features. This new project, which OCLC calls “the first Web-scale, cooperative library management service,” will ultimately bring into WorldCat Local the full complement of functions traditionally performed by a locally installed integrated library system (ILS).

Libraries that subscribe to FirstSearch WorldCat will get, for no additional charge, the WorldCat Local quick start service: a locally branded catalog interface and simple search box that presents localized search results for print and electronic content along with the ability to search the entire WorldCat database and other resources via the Web. Further automation support would come next year.

http://www.msisac.org/April 2009 Volume 2 Number 4.

From the Desk of David Badertscher

The use of credit cards to pay for goods and services is a common practice around the world. It enables business to be transacted in a convenient and cost effective manner. However, more than 100 million personally-identifiable, customer records have been breached in the US over the past two years[1]. Many of these breaches involved credit card information. Continued use of credits cards requires confidence by consumers that their transaction and credit card information are secure. The following provides information as to how the credit card industry has responded to security issues and steps you can take to protect your information.

“A new zero-day remote code execution vulnerability has come to light, this time affecting Microsoft Office PowerPoint.

The software giant has issued a security advisory about the potential exploit, which affects older Microsoft Office versions up through Office 2003. The current flagship Office 2007 product is not vulnerable.”

For more details see article by Jabulani Lefall, “PowerPoint Security Bug Found in Office 2003” at:

The new Information and Communications Index of the International Telecommunications Union (ITU) compares developments in information and communication technologies (ICT) in 154 countries over a five year period from 2002 to 2007.

The Index combines 11 indicators into a single measure that can be

used as a benchmarking tool globally, regionally and at the country

Written by: Ira Winkler March 24, 2009. For the Internet Revolution Blog:

“The ‘CSI Effect’ is what people call juror expectations of forensic evidence that unequivocally proves the defendant guilty. Unfortunately, there is now a “Twitter Effect,” where defense attorneys hope for mistrials because jurors just can’t control themselves and have to tweet what’s going on inside courtrooms or deliberation areas….” See entire posting at:

http://www.internetevolution.com/author.asp?section_id=515&doc_id=173990&

Contact Information