Self-Reporting

When I read something like this, I start to question the validity of the method. Psychologist Sam Gosling analyzed the Facebook profiles of 236 college-aged people, who were also asked to fill out personality questionnaires… surveys that were designed to assess not only how study participants viewed themselves in reality, but also what their personalities… Continue reading Self-Reporting

Useful User Agents

Rather than depend on end users to accurately report the browser used, I look for the user-agent in the web server logs. (Yes, I know it can be spoofed. Power users would be trying different things to resolve their own issues not coming to us.) Followers of this blog may recall I changed the Weblogic… Continue reading Useful User Agents

Tracking Specific File Use

CE/Vista Reports and Tracking displays summaries of activity. If an instructor seeks to know who clicked on a specific file, then Reports and Tracking falls down on the job. Course Instructor can produce a report of the raw tracking data. However, access to the role falls under the Administration tab so people running the system… Continue reading Tracking Specific File Use

Stalking Students

On the BLKBRD-L email list is a discussion about proving students are cheating. Any time the topic comes up, someone says a human in a room is the only way to be sure. Naturally, someone else responds with the latest and greatest technology to detect cheating. In this case, Acxiom offers identity verification: By matching… Continue reading Stalking Students

Email Harvesters

I missed the story about brothers convicted of harvesting emails the first time. Well, I noticed a followup. Back around 2001, the CIO received complaints about performance for the web server. So, I went log trolling to see what the web server was doing. A single IP dominated the HTTP requests. This one IP passed… Continue reading Email Harvesters

TED Talk: Clay Shirky: How cellphones, Twitter, Facebook can make history

The tumult in Iran is huge news of late. As a Baha’i, news of the persecution of Baha’s in Iran has stepped up because of the Internet. Stories crossed the ocean through email. News agencies almost never picked up these stories. As fast as the Iran government could shut down CNN and NYT and BBC… Continue reading TED Talk: Clay Shirky: How cellphones, Twitter, Facebook can make history

Expression Costs

(This started out as a blog comment for Sania’s post Facebook Killed Your Blog. I’m posting it here first.) We share blogs with the whole world. So our blogs get lost in the noise, bolstering the need for a whole industry optimizing getting found in search engines. Its a concerted effort just get noticed. That’s… Continue reading Expression Costs

The LMS is So Web 1.5

The claims Blackboard’s Learn 9 provides a Web 2.0 experience has bothered me for a while now. First, it was the drag-n-drop. While cool, that isn’t Web 2.0 in my opinion. A little more on track is the claim: The all-new Web 2.0 experience in Release 9 makes it easy to meaningfully combine information from… Continue reading The LMS is So Web 1.5

Relative Truth

Found an interesting comment on an article the state of Georgia observing the Confederate Memorial Day…. The truth of history means very little to those who are dead set against learning anything from it. No matter what the history books used in our public school system say, most will never believe anything other than their… Continue reading Relative Truth

LMS Security

This morning there was a flurry of effort to locate an article called “Hacking WebCT.” My coworker was able to locate it. We were disappointed.  The main points of the article were: Lazy administrators make compromising user accounts easy. Lazy instructors make getting questions for assessments easy. These apply to any LMS. So, here is some… Continue reading LMS Security