Articles Posted in Information Technology

With spam and virus attacks at record levels, and spammers using increasingly sophisticated techniques, Google commissioned Osterman Research to conduct a study of organizations to assess the performance of their on-demand and on-premise email security solutions. Osterman Research shares what they uncovered in their research of companies using Google Message Security compared to companies using other solutions.

Click here to download complete paper

QUESTION:

“I am in the process of trying to convert to a less paper driven office. We have occasion to verify information on Web pages and typically copied it and placed it in the hard file. I cannot seem to save it to a file on the computer and view it after the fact. Any suggestions? I have tried copy and paste and send it to.”

RESPONSE:

Net Neutrality: Why the Internet Can’t Remain Free *

“Most users want a free Internet, but that’s not going to be possible by 2010, Gary Beach argues. Without a major investment by those who own the pipes, the likes of Verizon, AT&T and Comcast, Internet traffic will come to resemble rush hour traffic in Los Angeles.”
________________________________ *From CIO Insider April 3, 2008

From Global Knowledge eNews April 1, 2008
“In today’s business world, deep technical or specialized knowledge is not enough – especially for those moving up the corporate ladder. IT professionals [and those in other professions, including librarians] must complement this knowledge with business acumen – or general knowledge of the “rules of engagement” in business – and the ability to apply that knowledge to maneuver through the business environment”.

To see the complete article, Upward Mobility in IT: Business Skills for the Technical Professional, click here.

From Findlaw, March 28, 2008.

“David Hricik & Chase Edward Scott) – Metadata is not new, but it has become pervasive in the digital world in which lawyers (and their clients) live. Many programs commonly used in the office create data about data and then save that unseen information along with the visible text of the document in a single file”

To see the complete article click here

“The core idea here is that developers will create more applications for social networks if there is a fair amount of interoperability between the platforms. Of course, Facebook, and by extension Microsoft, don’t seem to want to endorse this concept. But Microsoft did come out strongly in favor of making data more portable between social network sites on a limited basis. What all this means is that new battle lines are being drawn between Google and Microsoft unless, of course, peace unexpectedly breaks out as some still hope. Either way, it won’t be too long before the Generation Y folks that make heavy use of these services start to make their presence felt on traditional IT.”

See March 25, 2008 article by Clint Boulton here.

Brian Prince of e-Week has compiled a list and slide show of what he considers some of the more common mistakes and a few general tips for avoiding them. Over the years as we were either disigning or helping to design a number of library related research and applications databases, we could certainly have used such a compilation and are glad to share this one with you.

To see Brian Prince’s presentation, click here.

BY: Ruest, Danielle and Nelson Ruest. ‘Windows Vista Virtulization: What You Need to Get Started,” Informationweek.com News. (March 10, 2008).

“Running Vista in a virtual machine gives users access to all of the operating system’s features while avoiding hardware and application-compatibility obstacles. Here’s a primer to get you started, with a link to a free, downloadable e-book.”

To see complete article and links referenced, click here.

Contact Information