Articles Posted in Information Technology

Net Neutrality: Why the Internet Can’t Remain Free *

“Most users want a free Internet, but that’s not going to be possible by 2010, Gary Beach argues. Without a major investment by those who own the pipes, the likes of Verizon, AT&T and Comcast, Internet traffic will come to resemble rush hour traffic in Los Angeles.”
________________________________ *From CIO Insider April 3, 2008

From Global Knowledge eNews April 1, 2008
“In today’s business world, deep technical or specialized knowledge is not enough – especially for those moving up the corporate ladder. IT professionals [and those in other professions, including librarians] must complement this knowledge with business acumen – or general knowledge of the “rules of engagement” in business – and the ability to apply that knowledge to maneuver through the business environment”.

To see the complete article, Upward Mobility in IT: Business Skills for the Technical Professional, click here.

From Findlaw, March 28, 2008.

“David Hricik & Chase Edward Scott) – Metadata is not new, but it has become pervasive in the digital world in which lawyers (and their clients) live. Many programs commonly used in the office create data about data and then save that unseen information along with the visible text of the document in a single file”

To see the complete article click here

“The core idea here is that developers will create more applications for social networks if there is a fair amount of interoperability between the platforms. Of course, Facebook, and by extension Microsoft, don’t seem to want to endorse this concept. But Microsoft did come out strongly in favor of making data more portable between social network sites on a limited basis. What all this means is that new battle lines are being drawn between Google and Microsoft unless, of course, peace unexpectedly breaks out as some still hope. Either way, it won’t be too long before the Generation Y folks that make heavy use of these services start to make their presence felt on traditional IT.”

See March 25, 2008 article by Clint Boulton here.

Brian Prince of e-Week has compiled a list and slide show of what he considers some of the more common mistakes and a few general tips for avoiding them. Over the years as we were either disigning or helping to design a number of library related research and applications databases, we could certainly have used such a compilation and are glad to share this one with you.

To see Brian Prince’s presentation, click here.

BY: Ruest, Danielle and Nelson Ruest. ‘Windows Vista Virtulization: What You Need to Get Started,” Informationweek.com News. (March 10, 2008).

“Running Vista in a virtual machine gives users access to all of the operating system’s features while avoiding hardware and application-compatibility obstacles. Here’s a primer to get you started, with a link to a free, downloadable e-book.”

To see complete article and links referenced, click here.

The following was contributed by Bill Graham*

The Internet Society played a significant role in the second meeting of the Internet Governance Forum (IGF) in Rio de Janeiro in December, 2007. ISOC hosted an Open Forum on ISOC’s work and worked with partners to organize or participate in nine other sessions, including the Opening and Closing Panels of the IGF itself.

Planning has now begun for the 2008 IGF, which will be held in Hyderabad, India from 3-6 December. ISOC Board of Trustees members, ISOC staff members, and a large number of ISOC members participated in the IGF Open Consultations held in Geneva on 26 February 2008. The meeting was convened in the United Nations headquarters and was attended by

From Symantec

Summary:

Most IT professionals know or suspect that virtualization of computer systems may have an important role in their organization’s evolving infrastructure – though where and how are likely under investigation. Some organizations will decide that virtualization isn’t necessary. Others will find that they want to implement it in places, but not across the board. Sill others will move to implement it on a large scale. For those who decide to implement virtualization, the question is how to do it. Many people are not aware that a number of conversion tools and techniques are available now in the Microsoft Windows environment.

“The Web has exploded as medium for commerce and communication, but it’s also become a favorite attack vector for criminals. And while the bad guys are motivated by money, the damage they wreak transcends the balance sheet: loss of reputation, lawsuits, loss of investor confidence and sometimes crippling liability.”

“Click below to get a new whitepaper from FinJan that highlights the new techniques hackers use to infiltrate your networks, with critical steps you can take to prevent them by using real-time content inspection technologies.”

From: CIO Security Alert, February 23, 2008

Contact Information