We replaced the old ticketing system with a new one. Naturally there are people who are concerned about losing access to old tickets. So we looked at exporting all the tickets. My coworker had the better method of getting out the data with one issue. Because the old sytem used an HTML editor for a…
Saw a tweet about and interesting piece in ABC News Australia Digital disruption: How science and the human touch can help employees resist the march of the machines. Basically, many jobs are going away due to automation. W.I.R.E.D. has a similar story: Robots Will Steal Our Jobs, But They’ll Give Us New Ones. One of the long…
I get a daily report about backups for each of the projects. One particular one has shown some odd results. The report has columns for: Completed, Successful, Partial, Failed, Missed, and Active. The particular problem is that backups show up in none of those columns when it is actually still actively running. (So it should show up…
I really enjoyed this TED Talk on hacktivists the first couple times I watched it a year ago and a few months ago. Not sure why I have not yet posted it. The beauty of hackers, says cybersecurity expert Keren Elazari, is that they force us to evolve and improve. Yes, some hackers are bad…
I found a statement in Twitter is your IT support interesting: For reasons I won’t go in to, I haven’t been able to get [a WordPress install with the FeedWordPress plugin] done at the Open University, despite trying since last July. I’ve spoken to people at others unis and it isn’t isolated to the OU, it…
UPDATE: I hung this on a pinboard in my work cube on May 4, 2007. I am surprised no one has asked me to pull it. by +++The Mentor+++ Written January 8, 1986 Another one got caught today, it’s all over the papers. “Teenager Arrested in Computer Crime Scandal”, “Hacker Arrested after Bank Tampering”… Damn kids.…
Surprised the term “Blackboard” has not been Googlewashed to Moodle or Sakai. Or Blackboard doing the same to Instructure. P.S. I am too scared of using the other term and getting more visitors here from the CIA and NSA.
With a black box system a person working with it sees what goes in and what comes out. The machine’s decision making process is obfuscated. Theories are made based on incomplete evidence on the behavior. More data points on more situations confirming the behavior is my way of being more comfortable the theory is correct. Sometimes…
Found I develop free software because of CUNY and Blackboard following the Blackboard security issues story. It is a really good blog post. This conclusion made me smile. I am certain there are plenty of people in the system I support who strongly agree. I just wish there was an easier way of finding and…