TED Talk: Taryn Simon

My favorite quote from Taryn is, “Photography threatens fantasy.” Disney uses intricate interior design, photography, and video to construct fantasy. Advertisements, magazines, weddings, and portraits are about showing others the ideal instead of the reality. Have you seen the Dove Evolution video? (This one has music and singing by a Baha’i musician Devon Gundry.) What about the Ralph Lauren photo?

Reality bites. Hard.

(See Taryn Simon photographs secret sites on the TED site)

TED About this talk: Taryn Simon exhibits her startling take on photography — to reveal worlds and people we would never see otherwise. She shares two projects: one documents otherworldly locations typically kept secret from the public, the other involves haunting portraits of men convicted for crimes they did not commit.

Also: Taryn on Charlie Rose, Discomfort Zone (Telegraph)

Useful User Agents

Rather than depend on end users to accurately report the browser used, I look for the user-agent in the web server logs. (Yes, I know it can be spoofed. Power users would be trying different things to resolve their own issues not coming to us.)

Followers of this blog may recall I changed the Weblogic config.xml to record user agents to the webserver.log.

One trick I use is the double quotes in awk to identify just the user agent. This information is then sorting by name to count (uniq -c) how many of each is present. Finally, I sort again by number with the largest at the top to see which are the most common.

grep <term> webserver.log | awk -F\” ‘{print $2}’ | sort | uniq -c | sort -n -r

This is what I will use looking for a specific user. If I am looking at a wider range, such as the user age for hits on a page, then I probably will use the head command to look at the top 20.

A “feature” of this is getting the build (Firefox 3.011) rather than just the version (Firefox 3). For getting the version, I tend to use something more like this to count the found version out of the log.

grep <term> webserver.log | awk -F\” ‘{print $2}’ | grep -c ‘<version>’

I have yet to see many CE/Vista URIs with the names of web browsers. So these are the most common versions one would likely find (what to grep – name – notes):

  1. MSIE # – Microsoft Internet Explorer – I’ve seen 5 through 8 in the last few months.
  2. Firefox # – Mozilla Firefox – I’ve seen 2 through 3.5. There is enough difference between 3 and 3.5 (also 2 and 2.5) I would count them separately.
  3. Safari – Apple/WebKit – In searching for this one, I would add to the search a ‘grep -v Chrome’ or to eliminate Google Chrome user agents.
  4. Chrome # – Google Chrome – Only versions 1 and 2.

Naturally there many, many others. It surprised me to see iPhone and Android on the list.

Name Collisions

Blackboard has a conference they call BbWorld. I noticed there are some odd tweets with the same #bbworld hashtag lately. These appear to be about a Blackberry conference to be held next month.

Collisions on names are common enough. For example, here are a couple names our clients use to brand their sites which other places also use.

My own project, GeorgiaVIEW is not immune. Some time ago I noticed the GeorgiaView Consortium (geological remote sensing) at the University of West Georgia.

I guess it is a good thing one Bbworld is in July and the other is in September.

For now I’ll just drop my RSS feed for the hashtag.

Weblogic Diagnostics

I noticed one the nodes in a development cluster was down. So I started it again. The second start failed, so I ended up looking at logs to figure out why. The error in the WebCTServer.000000000.log said:

weblogic.diagnostics.lifecycle.DiagnosticComponentLifecycleException: weblogic.store.PersistentStoreException: java.io.IOException: [Store:280036]Missing the file store file “WLS_DIAGNOSTICS000001.DAT” in the directory “$VISTAHOME/./servers/$NODENAME/data/store/diagnostics”

So I looked to see if the file was there. It wasn’t.

I tried touching a file at the right location and starting it. Another failed start with a new error:

There was an error while reading from the log file.

So I tried copying to WLS_DIAGNOSTICS000002.DAT to WLS_DIAGNOSTICS000001.DAT and starting again. This got me a successful startup. Examination of the WLS files revealed the the 0 and 1 files have updated time stamps while the 2 file hasn’t changed since the first occurance of the error.

That suggests to me Weblogic is unaware of the 2 file and only aware of the 0 and 1 files. Weird.

At least I tricked the software into running again.

Some interesting discussion about these files.

  1. Apparently I could have just renamed the files. CONFIRMED
  2. The files capture JDBC diagnostic data. Maybe I need to look at the JDBC pool settings. DONE (See comment below)
  3. Apparently these files grow and add a new file when it reaches 2GB. Sounds to me like we should purge these files like we do logs. CONFIRMED
  4. There was a bug in a similar version causing these to be on by default.

Guess that gives me some work for tomorrow.


I’m surprised I have not blogged here about the student lawsuit against Turnitin.com? An anti-plagiarism service, Turnitin has students or faculty members upload papers into the database. By comparing new papers to the database, it gives ratings as to whether it is likely a student plagiarized.

Now the search goes out for any student who has a paper that’s being held by TurnItIn that they did not upload themselves. Students Settle with TurnItIn

In theory I could be someone in this situation. Back in 2005, a coworker asked my mother if someone by my name was related to her. This coworker was taking some classes at the university I attended. Turnitin had threw up a cautionary flag on the Originality Report because it was somewhat similar to something with my name on it. The problem is this product came into use at the university after the time I was a student. So I never submitted anything to it. The department from which I got my degree kept a copy of my papers (many submitted by email) and used this product at the time.

Another possibility is this tidbit about the product: Over 11 Billion Web Pages Crawled & Archived. I was actively blogging before and at the time of the incident. Assuming it could identify my name out of all that content, this match could have come from my blogging.

When I contacted Turnitin about this back in 2005, they told me I would have to remove my paper. I re-explained that I didn’t submit the paper. So Turnitin explained that whoever did put the paper in the system would have to remove it. The guy acknowledged the difficulty of the situation in identifying who posted it.

TED Talk: Dangers of Serotonin

He’s associated damage to the temporal lobe with psychopathic killers. The epigenetic effects, brain damage, and environments appears to be an MAOA variant on the X chromosome with experiencing violence around 3 years old.

Males only get the X from their mother. Men are much more likely. Girls get one X from mother and one from father which dilutes. Bathing the brain in serotonin too early makes the brain insensitive to the calming serotonin later.


TED Jim Fallon: Exploring the mind of a killer

BBworld From Afar

Staying true to tradition, Blackboard found a great speaker, Seth Godin, with a positive message. Notes people took…

Scott found the best point, I think.

Compliance doesn’t work to create value. Compliant work will always go to the lowest bidder. We can always find someone cheaper to follow the manual. Value is created by doing something different.

See! This is a mind numbingly positive message.

I liked some people on Twitter pointed to Jeff Longland’s role with VistaSWAT as a leader in the vacuum Blackboard has left open in the community.

Created a Yahoo Pipe for Bbworld09.

UPDATED 2009-07-15:

This TED video has much of the same substance as Godin’s Bbworld keynote.

Stalking Students

On the BLKBRD-L email list is a discussion about proving students are cheating. Any time the topic comes up, someone says a human in a room is the only way to be sure. Naturally, someone else responds with the latest and greatest technology to detect cheating.

In this case, Acxiom offers identity verification:

By matching a student’s directory information (name, address, phone) to our database, we match the student to our database. The student then must answer questions to verify their identity, which may include name, address and date of birth.

The institution never releases directory information so there are no Family Educational Rights and Privacy Act (FERPA) violations.

However, to complete the course work the student is forced to hand over the information to Acxiom, an unknown and potentially untrusted party. Why should students trust Acxiom when institutions cannot be trusted?

Due to the decentralized nature of IT departments, higher education leads all industries in numbers data breach events. Acxiom’s verification capabilities were designed so that student and instructor privacy is a critical feature of our solution. Institutions never receive the data Acxiom uses in this process. They are simply made aware of the pass/fail rates.

In other words, high education institutions cannot be trusted to handle this information. No reason was provided as to why Acxiom can be better trusted. Guess the people reading this would never check to see whether Acxiom has also had data breaches.

This Electronic Freedom Foundation response to Acxiom’s claims their method is more secure was interesting:

True facts about your life are, by definition, pre-compromised. If the bio question is about something already in the consumer file, arguably the best kind of question is about something that is highly unlikely to be in one’s consumer file and even useless commercially–like my pet’s name.

Answering these kinds of questions feels like more of violation of than a preservation of privacy.

Voting Rights Act

The Voting Rights Act of 1965 protects people from malicious actions by state and local governments to prevent people from voting. Yes, we have a president of African-American descent. Yes, the United States Supreme Court took no action. However, the majority opinion statement that, “We are a very different nation,” suggests it could be repealed. The argument against maintaining the law seems to be since governments are behaving now no law is needed.

Are they? The DOJ disallowed a Georgia program to cull voters from the databases who might not be citizens. This strikes me as just like the Florida Central Voter File program in 1998-2006 to cull ex-felons from voter lists. Since they just used names, it was highly inaccurate and wrongly disenfranchised thousands in 2000… in Florida… the state which made international headlines as the place unable to count ballots. When Congress renewed it in 2006, “It held extensive hearings and produced voluminous evidence that minority voters continue to face significant obstacles.” [NYT] I may have to go looking for this in the Congressional Record.

With the protests happening in Iran right now about voter irregularities, is this the time to repeal one of the few deterrents against future abuses to erode the significant improvements over the past 40 years?