Articles Posted in Information Technology

An article by Brian Prince, “On-Demand Trend Touching the Database.” describes a growing trend in the marketplace toward migration to web-based databases. Some of the new or forthcoming databases discussed are SimpleDB beta of Amazon.com, Dabble DB, and Trackvia. A company also mentioned, Kognitio, provides on-demand data warehousing.

One person quoted in the article states that “[Data-as-a-service] is driven by the fact that business the business users cannot get what they need from their IT departments in a timely manner.” Even for those not experiencing IT problems, this is a positive trend because for many users, including online service providers, because of its being incorporated more directly into the seemingly all encompassing web.

Database-as-a-service (DAAS) is based on cloud computing technology. To see the entire article, click here.

A paper prepared by Hillel L. Parness, Professor, Columbia University Law School and Of Counsel, Lovells (New York) for MessageLabs (http://www.messagelabs.com) ; it includes the following sections: Introduction, The Risks, Harassment, Child Pornography, Defamation, 3rd Party Intellectual Property Rights, Contract Formation, Confidentiality, Dealing With Risks, and a Summary.

Introduction “Email is critical to many businesses; its ease of use, combined with the speed and scale of distribution, make it an invaluable business tool. Today, many businesses could not function without consistent and unfettered access to the Internet.

However, these same attributes can also cause severe difficulties for employers if employees’ use of email and the Internet is not controlled adequately. This short summary considers some of the risks that employers face. It is not a comprehensive study of the topic; therefore, detailed legal advice should always be sought in specific situations.”

Library Technology Reports 43:6 2007 By Brad Eden

Excerpts from ALA TechSource publication announcment:

“As library technologists and librarians are well aware, since the advent of the Internet, the relationship between the user and his/her library has changed”.

This white paper explores the emerging crimeware industry, examining web based techniques and methods being used to perpetuate cybercrime, with a focus on the business impact of these attacks. The paper also explores the benefits of real time content inspection technology as a possible solution to help secure enterprises frm the growing crimeware threat..

See the complete whitepaper by clicking on the link below:

Impact of Cybercrime

“Who’s reading magazines and how do they flip through the pages? One research company is using RFID technology to find out.” Question: What are the implications of this development, both positive and negative? Comments welcome.

To read the complete article in the December 12, 2007 CIO Insider, click here.

“A Look at the best and worst of the years Technology implementations and innovations” as reported by Douglas Bartholomew et. al. in the November 30, 2007 issue of Baseline:

Triumphs and Travails of 2007 November 30, 2007

By Doug Bartholomew, David F. Carr, Ericka Chickowski, Mel Duvall, Deborah Gage, Laton McCartney and Lawrence Walsh

The following is from an article by Margaret Locher, published in the November 26, 2007 issue of CIO Insider. We especially call your attention to item 2 where she discusses the importance and usefulness of blogs in research:

________________________

Professional librarians and researchers will tell you that the Web has many unexplored opportunities for finding more information on business topics. Pursue these six techniques to improve your research results:

As part of its mission, OCLC a worldwide library cooperative prepares in depth studies and topical surveys of issues and trends of interest and concern to all types of libraries, including law libraries. One of their latest reports addresses the topic of sharing, privacy and trust in our networked world .

Although this report was prepared primarily for OCLC member libraries the topic being addressed is of obvious importance to all of us, regardless of occupation, who are working in this highly interractive world of networks and are confronted daily with the necessity of reconciling matters related to information sharing, information security, and privacy. Recognizing this importance we are posting the entire document below. Since it is quite large we have created three links for your convenience. The first links only to the Introduction, the second only to the Conclusion, and the third links to the complete report in pdf format.

The report is divided into 15 sections including the following:

Contact Information