Chris Meadows discusses the ongoing case by four publishers, Hachette Book Group, HarperCollins Publishers, John Wiley & Sons and Penguin Random House, against the Internet Archives Open Library respective to the scanning, public display, and distribution of entire literary works. As noted, this is “a potentially sensitive, and complex litigation.” The future of the Internet Archive may hang in the balance. This case is shining light on the heightened importance of evaluating fair use during a pandemic that is keeping vast books collections out of users reach for the unforeseeable future, while most education is confined to distance learning.
This expansive listing by Marcus P. Zillman focuses on statistics and big data datasets available free on the internet, covering multiple disciplines, for teaching, learning and reference. These data are published and maintained by sources that include: the U.S. and foreign governments, academic, corporate, NGOs, and open source communities.
Data mining is a constantly evolving discipline applied in many fields including finance, law, healthcare, marketing, science and engineering, the retail industry, telecommunications, social media, and government. This guide by Marcus P. Zillman encompasses free, fee based and consultancy related sources to assist info pros, researchers, data analysts, knowledge managers and CI/BI experts to effectively identify, analyze and apply reliable, value added data within the scope of their respective work products.
Federal prosecutors in New York have arrested former senior Trump adviser Steve Bannon and three other men, and charged them with allegedly defrauding hundreds of thousands of donors to an online fundraising campaign to build portions of wall along the U.S. border with Mexico. Lloyd Hitoshi Mayer, a University of Notre Dame law professor who researches nonprofits, explains what’s going on and what the consequences could be.
Across most sectors, customer support is no longer provided by human contacts but rather leads customers into endless telephone loops of menus, dealing with chatbots, or receiving emails from “no-reply” addresses. Finding email addresses for actual people is very difficult but Michael Ravnitzky’s article features proven tools and techniques to locate and use the email address of individuals within organizations who should be responding to your issues and complaints and providing you with a satisfactory resolution.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Instagram requires government ID to verify suspicious accounts; How to Clean Up Your Social Media Accounts Without Deleting Them; CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders; and Amazon shares your private info unless you do these steps.
Law Firm Research Manager Dean Mason shares his thoughts on how KM teams successfully drive law firm business using actionable-intelligence, business development, productivity, cost management and billing.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: New ‘Shadow Attack’ can replace content in digitally signed PDF files; Election admins vulnerable to email attacks; A Test and Trace Strategy for Reconnecting to Government Networks; and Is That ‘Contact Tracer’ Really a Scammer? How to Tell.
Prof. Lorrie Cranor, Carnegie Mellon University and Hana Habib, Graduate Research Assistant at the Institute for Software Research, Carnegie Mellon University, highlight their research on how many people who use private browsing have misconceptions about what protection they’re gaining. A common misconception is that these browser modes allow you to browse the web anonymously, surfing the web without websites identifying you and without your internet service provider or your employer knowing what websites you visit. The tools actually provide much more limited protections.
As a law librarian, law and technology expert, professor, writer and speaker, with significant work experience in multiple sectors, David Whelan is uniquely positioned to discuss the critical question – What does it take to make a service sticky enough for people to stay?