DDoS of Social Media

Twitter, Facebook, LiveJournal and other sites all admitted to suffering from a DDoS attack. It seem to me the purpose of a Denial-of-Service attack (DoS) against a web site is to flood it with so much traffic the site becomes unusable. The DDoS is where multiple other computers are coordinated into launching the attack. All… Continue reading DDoS of Social Media

The LMS is So Web 1.5

The claims Blackboard’s Learn 9 provides a Web 2.0 experience has bothered me for a while now. First, it was the drag-n-drop. While cool, that isn’t Web 2.0 in my opinion. A little more on track is the claim: The all-new Web 2.0 experience in Release 9 makes it easy to meaningfully combine information from… Continue reading The LMS is So Web 1.5

Blame It on Oprah

Ev said, “To those asking: Site slowness today had nothing to do with @Oprah.” Social networks are amusing and fun at times. I’m just a fan of moderation. Too much of anything will ruin it. Ever since Twitter became the new Golden Tool of PR, I knew it would be a matter of time. Friends and… Continue reading Blame It on Oprah

LMS Security

This morning there was a flurry of effort to locate an article called “Hacking WebCT.” My coworker was able to locate it. We were disappointed.  The main points of the article were: Lazy administrators make compromising user accounts easy. Lazy instructors make getting questions for assessments easy. These apply to any LMS. So, here is some… Continue reading LMS Security

The Digital Switch

The Long Tail claims consumers, given more options, will reflect their widely varied interests. Physical stores cannot fill all of the demand, so bytes stored on disk are the fastest, cheapest method for getting stuff to consumers. We see a mostly example of this shift in the shift to digital music. Vinyl records were the… Continue reading The Digital Switch

Digital Legacy

A book on time management in talking about long-term goal planning suggests we define the legacy we wish to leave. Coming from academia, I typically think of a legacy as a name on a building, an applicant with an alum for a parent, or a scholarship. However, the artifacts left behind by previous cultures are… Continue reading Digital Legacy

How Do Technology Illiterates Read Blogs?

A few weeks ago, NPR aired a piece where McCain and Obama advisors about technology expressed the policy intentions of each candidate. Also, Obama was described as being a Crackberry addict. McCain was described as personally being technology illiterate, but he looked forward to someone showing him some web sites. So now, Google purports to… Continue reading How Do Technology Illiterates Read Blogs?

Anthropomorphism

Do you talk about computers, software, or web sites as manifesting human-like behaviors? Personally, I have. At work, we manage several machines who collectively provide the GeorgiaVIEW service. When a machine is completely unresponsive, then we refer to it as having died. When a machine stops a performance issue, we refer to it as happy.… Continue reading Anthropomorphism

Fall in Love With Cyberbullying

Kentucky’s Bill HB775 would require those operating web sites or blogs or message boards in the state to enforce a policy to collect legal names, postal addresses, and email addresses to use the service. The legal name would, of course, be posted on the web site. Should the poster cross someone else, then the operators… Continue reading Fall in Love With Cyberbullying

One Feed to Rule Them All

There is a slight difference between FriendFeed and an RSS aggregator? According to the site, “FriendFeed enables you to keep up-to-date on the web pages, photos, videos and music that your friends and family are sharing.” It is using the RSS feeds of the various sites. So, like an RSS aggregator, FF pulls information from… Continue reading One Feed to Rule Them All