This Linux tool is my new best friend. We get thousands of XML files from our clients for loading user, class, and enrollment information. Some of these clients customize our software or write their own software for generating the XML. This means we frequently get oddities in the files which cause problems. Thankfully I am…
When I read something like this, I start to question the validity of the method. Psychologist Sam Gosling analyzed the Facebook profiles of 236 college-aged people, who were also asked to fill out personality questionnaires… surveys that were designed to assess not only how study participants viewed themselves in reality, but also what their personalities…
Rather than depend on end users to accurately report the browser used, I look for the user-agent in the web server logs. (Yes, I know it can be spoofed. Power users would be trying different things to resolve their own issues not coming to us.) Followers of this blog may recall I changed the Weblogic…
CE/Vista Reports and Tracking displays summaries of activity. If an instructor seeks to know who clicked on a specific file, then Reports and Tracking falls down on the job. Course Instructor can produce a report of the raw tracking data. However, access to the role falls under the Administration tab so people running the system…
On the BLKBRD-L email list is a discussion about proving students are cheating. Any time the topic comes up, someone says a human in a room is the only way to be sure. Naturally, someone else responds with the latest and greatest technology to detect cheating. In this case, Acxiom offers identity verification: By matching…
I missed the story about brothers convicted of harvesting emails the first time. Well, I noticed a followup. Back around 2001, the CIO received complaints about performance for the web server. So, I went log trolling to see what the web server was doing. A single IP dominated the HTTP requests. This one IP passed…