Accurate, Focused Research on Law, Technology and Knowledge Discovery Since 2002

Category Archives: Intellectual Property

Fair Use Under Copyright Law: Fair Use Books, Websites and Database Search Results

Via Reference Librarian David Dillard, Temple University: “I have a new Fair Use under Copyright Law Research guide that provides books with links to related content, websites, database search results for this topic as well as database search results for guides in fair use and a list of databases with fair use content and the number of sources found in each.  This database list is currently under construction.”

White Paper – Empowering librarians with fact-based analytics

Playing “Moneyball” in Librarianship:  The Winning Strategy of Gap Analysis By Tommy Doyle Senior Vice President, Elsevier “…Researchers and students need both journals and books to build their knowledge around a topic. Journal content provides results of the latest research, while book content provides an interdisciplinary view, along with fundamental and comprehensive knowledge. Book contentContinue Reading

EY, LANL make new cybersecurity tools available to private sector

News release: “Ernst & Young LLP and Los Alamos National Laboratory have formed a strategic alliance to deliver some of the most advanced behavioral cybersecurity tools available to the commercial market. “Cybersecurity attacks are ever more frequent and more sophisticated, and they destroy the trust needed to conduct business,” said Duncan McBranch, Chief Technology OfficerContinue Reading

Intelligence Community and Its Use of Contractors: Congressional Oversight Issues

CRS via FAS – The Intelligence Community and Its Use of Contractors: Congressional Oversight Issue. L. Elaine Halchin, Specialist in American National Government. August 18, 2015. “Contractors have been and are an integral part of the intelligence community’s (IC’s) total workforce (which also includes federal employees and military personnel). Yet questions have been raised regardingContinue Reading

Smithsonian Institution’s Plan for Increased Public Access to Results of Federally Funded Research

“PURPOSE: This document outlines the Smithsonian Institution’s plan to provide increased public access to certain peer-reviewed scholarly publications and supporting digital research data that arise from research funded, in whole or in part, by a federal funding source (hereinafter “Federally Funded Research Materials” or “FFRM”), consistent with the principles of access under the Office ofContinue Reading

Centre for Study of Existential Risk

“The Centre for Study of Existential Risk is an interdisciplinary research centre focused on the study of human extinction-level risks that may emerge from technological advances. We aim to combine key insights from the best minds across disciplines to tackle the greatest challenge of the coming century: safely harnessing our rapidly-developing technological power.” One ofContinue Reading

Where has the competitive intelligence gone? No worries – Call your Librarian!

Another day, another reason why librarians are mission critical – we are the multifaceted subject matter experts with multiple expertise – this would not have slipped by colleagues in the law library/news/business sectors if Google had asked (add other expert colleagues as you will – this is not about exclusion – but a request forContinue Reading

ViewPoint – Great New Possibilities for the Library of Congress

Colleagues – we have worked for many years, often many decades, as members of a profession to which we have a deep and abiding commitment and through which we have, under often the most challenging of circumstances, helped to usher in the future without forsaking the past. So this snippet (the rest is behind aContinue Reading

IP JUSTICE JOURNAL: Internet Infrastructure and IP Censorship

By David G. Post – August 1, 2015 Full Article as .PDF “Many scholars and other observers of developments in Internet governance, law, and policy have commented upon an unusual and important phenomenon that has become more widespread in recent years: using control over access to critical portions of the Internet’s technical infrastructure – theContinue Reading

FireEye – Uncovering Malware Backdoor that Uses Twitter

FireEye announcement: “It hides in network communications, in all the noise—designed so that defenders can neither detect nor characterize its activity. But its purpose is transparent: to use Twitter, GitHub, and cloud storage services to relay commands and extract data from compromised networks. Download the report [reg. req’d] and read about the recently discovered HAMMERTOSS,Continue Reading

EFF – Europe Blocks Progress for Libraries and Educators at WIPO

EFF – “Last week negotiators from around the world came together as the World Intellectual Property Organization’s (WIPO) standing committee on copyright (SCCR) resumed consideration of its two current work items: the on-again, off-again broadcasters’ rights treaty, and the harmonization of minimum copyright limitations and exceptions for libraries, archives, and education. EFF has opposed theContinue Reading

Commentary – Why Protecting Data Privacy Matters, and When

Data Science Central – (A Wake-Up Call to Data Geeks Who Doubt) by Anne Russell “It’s official. Public concerns over the privacy of data used in digital approaches have reached an apex. Worried about the safety of digital networks, consumers want to gain control over what they increasingly sense as a loss of power overContinue Reading