Louisville Courier Journal
Archivist also fond of what's useless
By day, Mary Margaret Bell is a mild-mannered archivist with the Jefferson
County Public Schools. By night, she is a trivia virtuoso.
"She is a franchise player — just phenomenal," said Keith "Cloudy" MacLeod, a
stockbroker by day and player-coach of the satellite TV trivia team at Louisville's
Linn Station Road TGI Friday's on Tuesday nights.
http://www.courier-journal.com/localnews/2004/04/28ky/B1-byron0428-5376.html (
The Daily Texan
Ransom Center gets acting
coach's work
Collection includes teaching notes, video,
audio tapes, scripts
By Zein Basravi
Forty years of the work of Stella Adler, who greatly influenced the way American
theater actors are trained, now resides in the Harry Ransom Humanities Research
Center.
The Ransom Center recently acquired teaching notes, marked-up copies of plays, notes
on characters and more than 700 hours of audio and video tapes of Adler's classes,
beginning in the early 1940's. The collection will be made available to students within
the year and will be located at the Ransom Center reading room once the tapes have
been processed and preserved, said collection curator Helen Adair.
http://www.dailytexanonline.com/news/2004/04/28/University/Ransom.Center.Gets.Acting.Coachs.Work-673120.shtml
Daily Yomiuri
Kanagawa cops shredded documents
Yomiuri Shimbun
The Kanagawa prefectural police disposed of accounting documents it had been
ordered to keep, police officials said Wednesday.
According to an internal investigation, about 10 sections, including the general
affairs section of the criminal investigation department at the prefectural police
headquarters and several police stations, destroyed documents on investigation
costs and rewards paid out that they had been ordered to keep by the National
Police Agency in March.
http://www.yomiuri.co.jp/newse/20040429wo22.htm
The Wagin Argus
Help rescue Wa's
historical records
Wednesday, 28 April 2004
THE JS Battye Library of West Australian
History (part of the State Library of WA)
collects, preserves and makes available to
the community material on Western
Australia's heritage.
These priceless historical records include
books, newspapers, photographs, private
papers, films and oral histories, some dating
from before white settlement.
http://wagin.yourguide.com.au/detail.asp?class=news&subclass=local&category=general%20news&story_id=302863&y=2004&m=4
The Post and Courier
Employees of bankrupt firm found in
contempt for destroying records
Associated Press
ANDERSON--Calling one of them "arrogant" and saying he didn't trust much of
what the other one said, a federal judge found two former HomeGold employees
contempt of court Tuesday for destroying documents relating to the bankrupt Upstate
financial company.
U.S. District Judge Ross Anderson ticked off about two dozen reasons why he didn't
believe explanations by Tony Park and one-time HomeGold Chief Executive Ronnie
Sheppard on how tons of documents ended up at a recycling center.
http://www.charleston.net/stories/042804/sta_28carolina.shtml
ctv.ca
Air India judge slams destruction of records
Canadian Press
VANCOUVER — CSIS's destruction of tapes and transcripts from conversations with an Air India
bombing source is "unacceptable negligence," a B.C. Supreme Court judge ruled Tuesday.
And, said Judge Ian Josephson, the action constitutes a violation of the Charter rights of co-accused
Ajaib Singh Bagri. "It is clear that a procedure should have been in place for the preservation of this
clearly relevant evidence," Josephson said.
http://www.ctv.ca/servlet/ArticleNews/story/CTVNews/1083108813004_78518013/?hub=TopStories
Forbes
Quattrone's Two-Minute Warning
Dan Ackman, 04.28.04, 8:33 AM ET
NEW YORK - Frank Quattrone could always tell where he was and what
he was doing by checking his old e-mail.
If he was in the office, his e-mail was in all lower case letters, because he
was too busy to capitalize. If he was on the road, the first letter of his
e-mail was in upper case, because his Research In Motion (nasdaq: RIMM
- news - people ) BlackBerry device, which he used on the road, capped
first letters automatically. And if he wasn't e-mailing he was likely in his
car on his cell phone. Or maybe he was in court, which is where he was
yesterday, no BlackBerry, no cell phone, testifying in his own defense
against federal obstruction of justice charges. If he beats the rap, which
seems likely, his e-mail records will be credited with an assist.
http://www.forbes.com/business/2004/04/28/cx_da_0428topnews.html (
Forbes
The Insider
Chana R. Schoenberger, 05.10.04
When a top employee is suspected of stealing data, things can
get messy.
The ring of the phone at her Laguna Beach house, near Los Angeles, woke
Denise DeMan-Williams at 7:30 on the Saturday of the July 4th long
weekend in 2003. It was her lawyer, telling her that five policemen from
East Whiteland Township, Pa. had just raided the home of one of her
employees, Dr. John Goldener. The cops searched for four hours and left
with armfuls of documents, electronic equipment and CDs.
http://www.forbes.com/home/free_forbes/2004/0510/082.html (
Forbes
Data of Reckoning
Quentin Hardy, 05.10.04
Business gets more information than ever. This is just the start.
How to survive?
We, or rather the electronic devices we employ, are data pack rats,
accumulating e-mails, Web pages, credit card swipes, phone messages,
stock trades, memos, address books and radiology scans. It's impossible to
count all these bits, but people make good guesses, and they have come up
with one for 2002. During that year the world created 5 exabytes of
information. An exabyte is the digital equivalent of a trillion novels. The
yearly total amounts to somewhat more than all the words ever spoken by
human beings--and it was up 68% from two years earlier.
http://www.forbes.com/home/free_forbes/2004/0510/151.html
Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Legal lottery
Organisations are taking chances on compliance and penalties when they delegate the responsibility of
retention and management of email messages to their employees.
By Melanie Liew
Be aware of the risks, liability and exposure associated with corporate information. The retention
and management of email messages is a corporate responsibility. Today, many companies have
relegated this responsibility to users and this has long term implications for organisations when it
comes to compliance and general best business practice.
http://www.computerworld.com.sg/pcwsg.nsf/0/FE2F7F02D371905048256E840023FF55?OpenDocument (
Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Outsourcing email storage
The basic premise of outsourcing is that, for business components that do not offer a strategic advantage to the
company, cost savings can be achieved by outsourcing these business components to a professional third party
that can offer cheaper cost structure by leveraging on the economy of scale. And email storage archiving is
approaching the level of maturity for outsourcing to make sense.
By Lucas Mearian and Louis Chua
The basic premise of outsourcing is that, for business components that do not offer a strategic
advantage to the company, cost savings can be achieved by outsourcing these business
components to a professional third party that can offer cheaper cost structure by leveraging on the
economy of scale. And email storage archiving is approaching the level of maturity for outsourcing
to make sense.
Many international telecommunications companies are entering the email archiving service market
and are trying to persuade their corporate users to add outsourcing and managed storage service to
their voice and data contracts.
http://www.computerworld.com.sg/pcwsg.nsf/unidlookup/2184D09EB756C29848256E840026A407?OpenDocument
Computerworld
COMPUTERWORLD TECHGUIDE STORAGE PART 2
Engineering ILM
Data classification aligns data value according to business drivers such as performance and availability,
regulatory compliance, information protection, budgets, and new directions for business growth.
By Melanie Liew
As information becomes an ever-more important aspect in the enterprise, it becomes subject to
changing business, legal, and regulatory requirements that make its value fluctuate throughout its
life.
Organisations have to look into all aspects _ hardware, data protection software and data
management software to ensure that their data are preserved according to the requirements or risk
running foul of the law when they are required to produce the data.
This is where the concept of information lifecycle management (ILM) comes in. ILM is a model for
managing information throughout its life, from creation and use to archival and disposal. The goal of
ILM is to help obtain the maximum value at the lowest total cost of ownership at every stage in the
life of information.
http://www.computerworld.com.sg/pcwsg.nsf/unidlookup/88C2AEC37971ECB548256E840027AC0F?OpenDocument
FCW
GAO finds holes in HUD records
BY Dibya Sarkar
April 26, 2004
The Department of Housing and Urban Development did a poor job of managing and
accounting for purchases of computers and related equipment over a three-year period,
according to congressional auditors.
In reviewing HUD's internal accountability systems and controls during fiscal years 2001,
2002 and 2003, the General Accounting Office found that department officials consistently
failed to record computer equipment purchases in its asset management system, adequately
maintain or reconcile records, and conduct regular inventory checks of the locations and
quantities of the equipment.
http://www.fcw.com/fcw/articles/2004/0426/web-hud-04-26-04.asp
Press Release
Mobius Acquires E-mail Archiving and Records Management Technology from
eManage Inc.
http://biz.yahoo.com/prnews/040427/cgtu099_1.html
Computerworld
Opinion by Kelly Martin, Symantec
Corp.
APRIL 22, 2004
(COMPUTERWORLD) - In a perfect
world, corporate laptops and desktops
would be outfitted with only authorized
software that was appropriately
configured, always up to date and
patched, and protected by layers of
security. Corporate information security
policies would be painstakingly followed
by professionals who never failed to
employ best practices. IT audits, in turn,
would be a formality -- a regular activity
that simply confirmed a flawless IT
environment.
http://www.computerworld.com/securitytopics/security/story/0,10801,92554,00.html
Peter A. Kurilecz CRM, CA
Richmond, Va
[log in to unmask]
|