Category «KM»

The OCLC v Clarivate Dilemma

Librarian and tech expert Karen Coyle provides insight into the evolving conflict that caused OCLC to file suit against the company Clarivate which owns Proquest and ExLibris. The suit focuses on a metadata service proposed by Ex Libris called “MetaDoor.” MetaDoor isn’t a bibliographic database à la WorldCat, it is a peer-to-peer service that allows its users to find quality records in the catalog systems of other libraries.

Subjects: Information Architecture, KM, Librarian Resources, Libraries & Librarians, Library Software & Technology, Search Engines

Pete Recommends – Weekly highlights on cyber security issues, June 18, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Your connected car could be putting your privacy at risk; Deepfakes on Trial: a Call to Expand the Trial Judge’s Gatekeeping Role to Protect Legal Proceedings from Technological Fakery; Genetic paparazzi are right around the corner, and courts aren’t ready to confront the legal quagmire of DNA theft; and Why You Should Delete (All) Your Tweets.

Subjects: Courts & Technology, Cybercrime, Cybersecurity, Ethics, Healthcare, KM, Legal Research, Privacy, Search Engines, Social Media, Technology Trends

How to Future

Kevin Kelly is a Web Maverick and by his own definition, a futurist. This discipline is comprised of really keen historians who study the past to see the future. They look carefully at the past because most of what will happen tomorrow is already happening today. In addition, most of the things in the future will be things that don’t change, so they are already here. The past is the bulk of our lives, and it will be the bulk in the future. It is highly likely that in 100 years or even 500 years, the bulk of the stuff surrounding someone will be old stuff, stuff that is being invented today. All this stuff, plus our human behaviors, which are very old, will continue in the future. For those who are engaged in understanding revisionist history in real time (the War in Ukraine, the January 6th Insurrection, the 2020 election, gun violence in America to name just a few issues), studying the past and the present gives us great insight into our future. Kelly’s multi disciplinary subject matter expertise make his work timely, relevant, significant and consequential.

Subjects: KM

LLRX May 2022 Issue

Articles and Columns for May 2022 If the Democratic Party is serious about preserving America as a constitutional republic, they better act fast – Thom Hartmann is a podcast personality, author, former psychotherapist, businessman, and progressive political commentator. He untangles the history of the Electoral College and unequal representation in the U.S. Senate to starkly …

Subjects: KM

Pete Recommends – Weekly highlights on cyber security issues, May 30, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Cyber security 101: Protect your privacy from hackers, spies, and the government; Inside the Government Fiasco That Nearly Closed the U.S. Air System; My Instagram account was hacked and two-factor authentication didn’t help; Serious Warning Issued For Millions Of Google Gmail Users; and Report: Russian Botnet Can Spam Social Media on ‘Massive Scale’.

Subjects: Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, E-Government, Economy, KM, Privacy, Social Media, Technology Trends, Travel

Language matters when Googling controversial people

Ahmed Al-Rawi, Assistant Professor, News, Social Media, and Public Communication, Simon Fraser University – identifies and explains how features of search engine autocomplete functions enables users to find fast answers to their questions or queries. However, autocomplete search functions are based on ambiguous algorithms that have been widely criticized because they often provide biased and racist results.

Subjects: AI, KM, News Resources, Search Engines, Search Strategies, Social Media

The Practice of People Law

Jim Calloway is the Director of the Oklahoma Bar Association’s Management Assistance Program. He informs us about the range of legal services delivered by what have been designated as “primary-care lawyers.” From Calloway’s perspective, there is people law, and there is business/corporate law. Over the years, there has been a greater divergence in these two types of law practice focuses. He makes the case that increasingly, these are completely different types of law practices, with different types of challenges and processes. Calloway believes this is not only true but profound. He views it as profound because consideration of the differences should inform and impact the method of legal service delivery depending on the type of client.

Subjects: Communications, Education, KM, Law Firm Marketing, Legal Marketing, Legal Profession, Management

Pete Recommends – Weekly highlights on cyber security issues, May 21, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. – Four highlights from this week: How Often Do Ads Share Your Data Every Day? Hundreds of Times; Threat actors compromising US business online checkout pages to steal credit card information; Your Bosses Could Have a File on You, and They May Misinterpret It; and Hackers are Hijacking Phone Numbers to Empty Crypto Accounts.

Subjects: AI, Criminal Law, Cybercrime, Cybersecurity, Economy, Financial System, KM, Privacy, Social Media, Technology Trends