You are currently browsing articles tagged single.

Single & Happy: The Party of OnesSingle & Happy: The Party of Ones by J. Victoria Sanders

My rating: 4 of 5 stars

Back in late 2011, I ran across the Single & Happy blog. had drawn me in, but I started looking at various tags including dating. Lots were people talking about current dates and especially the horror that is online dating web sites. Single & Happy was a better, maturer different.

My only other experiences with blog writers who publish a book is to collect the best blog posts, give them to an editor, maybe expand a bit upon them, and publish the collection. Instead we get an actual book influenced by prior work and so something new and exciting.

While not a single black woman, I am single and almost black. I strongly sympathize with the plight of attempting online dating. The dating stories seem eerily familiar. And the advice Victoria gives on being a friend to yourself is good advice. It happens I a friend posted on Facebook on why she hates the question, “Why are you single?” so I referenced a quote from this book.

Somehow after decades of being single, I think I am happy. Well, happy-ish. There is room for improvement. It is good to know there are others out there working on the same issues willing to talk about the challenges.

View all my reviews

Tags: , , , , , , , , ,

Twitter, Facebook, LiveJournal and other sites all admitted to suffering from a DDoS attack. It seem to me the purpose of a Denial-of-Service attack (DoS) against a web site is to flood it with so much traffic the site becomes unusable. The DDoS is where multiple other computers are coordinated into launching the attack.

All three of the above mentioned sites have had recent issues keeping up with growing usage. The USA inauguration and Iran demonstrations peaked traffic so much the sites seemed like they suffered from a DoS. Already at the edge, an attack tipped the barely making it social media sites over it. Some users abandon them for less popular (so more stable sites). Those who stick around suffer from learned helplessness.

Causing all this hullabaloo over a single user seems odd to me. I don’t speak Russian, so I don’t know if this guy from Georgia (the country) deserved it. Also, it is almost the one year anniversary since Russia invaded Georgia. During the invasion, DDoS attacks disabled Georgian web sites. So, maybe this is to show Georgia the Russians are still capable of causing problems? This is why security evangelists want us to be able to deal with threats.

Various computer viruses over the years have turned millions of computers into zombies for botnets. So… If you are upset about your favorite social media site getting taken down, then maybe you should act on ensuring your computer and others in your social network were not enlisted into a botnet?

Tags: , , , , , , , , , , , , , , , , , , , , , ,

Good Sign I missed the story about brothers convicted of harvesting emails the first time. Well, I noticed a followup.

Back around 2001, the CIO received complaints about performance for the web server. So, I went log trolling to see what the web server was doing. A single IP dominated the HTTP requests. This one IP passed various last names into the email directory. Some quick research revealed Apache could block requests from that IP. That calmed things down enough for me to identify the owner of the IP. The CIO then bullied the ISP to provide contact information for the company involved.

Previous little adventures like this landed me a permanent job, so I jumped at similar challenges.

Well, a few years later, it happened again. This time my boss had made me develop a script for the dissemination of the anti-virus software package to home users. Basically, it used email authentication for verification if someone could get the download link. So, I applied the same technique to the email directory. Well, this upset some people who legitimately needed email addresses. So the human workers would provide email addresses to people with a legitimate need.

I’m glad since I’ve left, VSU no longer looks up email addresses for people. (I thought some of the requests questionable.) Also, my little email authentication script was before LDAP was available to the university. I think the new solution much better.

One the more vocal complainers about my having stopped non-VSU access to the email directory was my current employer. We apparently list email addresses for employees freely. Which makes me wonder how much spam we get is due to the brothers described at the beginning of this story? Or other email harvesters? Just hitting the send button potentially exposes the email address.

No worries. I’m sure Glenn is protecting me. :)

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,

If you cannot find me, then you are not looking. If you search on Facebook for Ezra Freelove, then I am the only result at the moment. Maybe all you knew was Ezra and the city where I lived? Facebook search is not so great you could find me through my first name plus something else you knew about me (other than email or city). Probably this is for the best. We don’t want to make it too easy to stalk people, right?

Allowing users to make a username is a promotion. The blogosphere making a fuss over all this is a Chicken Little-esque. Sure Myspace, Twitter, and a number of other sites have addresses with usernames in them. No one is forcing people opposed to having one to make one. Only in the past month could one choose a username for one’s Google profile. Prior to that it was a hefty large number of numbers.

I think the reason some people prefer usernames comes down to elaborative encoding. To retain something in memory, we associate that something with existing items in memory. Short-term memory has only about 7 slots and digits are each a single item. Assuming a single incrementation per account created and over 200 million users, using a numbers means there ought to be 9 digits worth of numbers to memorize. Words occupy a single slot in short term memory, by far simplifying remembering. Which would you rather try to remember 46202460 or ezrasf?

An argument against usernames comes down to using the memory of the Facebook database or other computer memory. Computer memory is better than human memory for stuff like this.

All of these work and go to the same place:


Pick your poison. Enjoy.

Tags: , , , , , , , , , , , , , , , , , , ,

Writing a Blog Post About This Scam I noticed a little black and white sign: “Single?” a while ago. A couple weeks ago it came up in conversation. Today I saw it again. So I visited the site.

First impression: A local site should have images to represent something about the locality. Generic stock photography doesn’t cut it for me. The signup for wanted my home and cell phone numbers.

That sounded phishy to me. is a great site for looking up who runs a site. If the owner has selected privacy options with their registrar, then that would be a snag. Fortunately for us, the owner of isn’t hiding.

Owner: NuStar Solutions

The note “Email address is associated with about 4,690 domains” caught my eye. So I looked up NuStar and found this article about these popping up everywhere. (At least DomainTools gave me the info in one shot without having to do the same extensive research.) Lots of stuff online about these signs, who is placing them, and whether or not this is a scam.

I’m just going to assume it is a scam.

Picture info: Writing a Blog Post About This Scam on Flickr from sneezypb

Tags: , , , , , , , , , , , , , , , , , , ,

William borrowed my camera to go on his honeymoon. He also lost the photos with a poorly timed crash & drive reformat. So he wants to borrow the card and recover the data. Thankfully I have not used the camera since he returned it despite thinking I should.

Luckily I ran across A Computer Repair Utility Kit You Can Run From a Thumb Drive

I didn’t like the setup of Photorec as it runs through the command line. Navigating the tree was confusing at best. It did recover 1,166 photos / 3.62GB for me.

Not trusting a single method, I also tried Recuva. That worked a little better. It reported 1,395 files found. However, 177 were unrecoverable. Getting 1,218 pictures / 3.78GB back was 52 / 160MB better than Photorec. Though many of the “recovered” pictures just say: Invalid Image. Maybe they really are Raw?

While trying to use Restoration, it crashed the first time. Not sure why. It was fine the next time, though it only found 4 photos.

Filename: Photorec doesn’t restore files with anything like the original name. Recuva and Restoration do.

Meta Data: OSes and image editors know about the EXIF data in pictures. All the Photorec pictures have date taken. Most of the Recuva pictures do. Guess I could see if only 52 pictures are missing the EXIF? That might explain why Photorec lost some of them.

All in all, it was an fun experiment. I am not curious how these stack up against of the proprietary software? Why pay $40 when these are better?

Tags: , , , , , , , , , , , , , ,

17. What is the single most important thing Blackboard can do to create a better client experience for your institution?

Provide successful workarounds or bug fixes to the identified issues in a timely manner. A timely manner means within 5 days to the user and 180 days to me. By the end of 5 days, the affected users have given up on ever getting a solution. We know we have lost that user ever giving us the benefit of the doubt about our service again. We only keep the ticket open in hopes of preventing the same issue from happening to another user and losing them as well.

All you other Blackboard customers out there. What did you put here? Or any of the other freeform answers. If you didn’t get to do the survey, then what would you have liked to put there?

Tags: , , , , , , , ,

People who are single are diseased, unhealthy. People with spouses or in relationships are all experts who know how to heal the disease.

At least, that is the impression I get.

Tags: , ,

A statement by a faculty member to the effect of, “There isn’t anything our IT people can do to resolve this problem. The web application is overloaded,” puts the people running the application on the defensive. The problem turned out to be resolved with changes to the local browser environment (remove all the installs of Java and replace with a single known good version). In other words, it wasn’t only because the web application was overloaded and could have been resolved by their IT people consulting the knowledge base intended to provide the information to resolve exactly this kind of stuff.

The last situation we want to have is an overloaded server before we even hit the heavy usage period.

Tags: , , , , , , , , , , ,

Something brought up my abandoned Friendster blog, which had a link to fiftymillimeter which used to be my favorite photography site by people in Athens prior to me even moving here. Why “used to be”? Well over a year ago, they stopped posting to the site. Sad, I know. Still, I was curious, Where are they now? I ran across Twitter-Free Fridays looking for Toby Joe Boudroux.

What I found interesting about this post was his approach to whether or not Twitter is or is not a monopoly. I agree with the first part. The last sentence surprised me.

Being at the top of an emerging market segment does not constitute a monopoly. Unfair practices, abuses of that dominance to limit fair access to resources and outlets – those are monopolistic. If Twitter struck a deal with Mozilla that blacklisted other microblogging services, we’d have something to talk about. Opening APIs freely and allowing supplemental markets to emerge hardly seems consistent with railroad barons.

Supplemental markets would be the equivalent of a railroad baron allowing new train stations or business to sell to the customers using the trains. Open APIs allow other corporations to find a niche. However, they are not a direct competitor. For example, with Twitter, the API is not used by Pownce or Jaiku. Friendfeed who fits in both the lifestream market and the micro-blog markets does use the API. More commonly, the Twitter API is used by companies like Summize or Twitpic in searching or posting content.

If economists or lawyers determining whether a company with a large market share is monopolistic are influenced by open APIs creating supplemental markets, then this could be a strategy to avoiding DOJ further scrutiny? At Bbworld / DevCon, a frequent point of pride from the Blackboard folks was the anticipation of Bb9 to have a more open, accessible, and useful API. This API will be able to do everything the current one in the Classic line can currently do. The anticipated additions to this API could benefit many supplemental markets. (Let’s just forget at the same time, they are saying API for the CE/Vista products is a dead-end development path.)

Scoring points with the DOJ (and more importantly the court of public opinion) could never hurt while trying to sue a much smaller competitor like Desire2Learn. Some characterize Bb as not likely to stop until D2L no longer exists. Who knows? I doubt even Chasen knows. Still, it would far fetched to characterize just this as making Blackboard a monopoly.

There are pleny of alternative LMS products to the Blackboard Learning System: Moodle, Sakai, ANGEL, eCollege, and many, many more. Heck, the rumor mill would indicate more and more higher education institutions are considering and even changing to the alternatives. Blackboard acknowleges institutions likely run multiple products. With Bb 9, they encourage people to use the Learning Environment Connector to single sign-on to into the other products. With the Bb9 frame remaining so they know who got them there, of course.  Don’t forget about a Personal Learning Environment,

Certainly I dislike that Blackboard hears my objections and continues to act in ways contrary to them. However, that happens within my own team. Neither group are criminal for ignoring me.

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

« Older entries