This morning there was a flurry of effort to locate an article called “Hacking WebCT.” My coworker was able to locate it. We were disappointed. The main points of the article were: Lazy administrators make compromising user accounts easy. Lazy instructors make getting questions for assessments easy. These apply to any LMS. So, here is some…
The Long Tail claims consumers, given more options, will reflect their widely varied interests. Physical stores cannot fill all of the demand, so bytes stored on disk are the fastest, cheapest method for getting stuff to consumers. We see a mostly example of this shift in the shift to digital music. Vinyl records were the…
A book on time management in talking about long-term goal planning suggests we define the legacy we wish to leave. Coming from academia, I typically think of a legacy as a name on a building, an applicant with an alum for a parent, or a scholarship. However, the artifacts left behind by previous cultures are…
A few weeks ago, NPR aired a piece where McCain and Obama advisors about technology expressed the policy intentions of each candidate. Also, Obama was described as being a Crackberry addict. McCain was described as personally being technology illiterate, but he looked forward to someone showing him some web sites. So now, Google purports to…
Do you talk about computers, software, or web sites as manifesting human-like behaviors? Personally, I have. At work, we manage several machines who collectively provide the GeorgiaVIEW service. When a machine is completely unresponsive, then we refer to it as having died. When a machine stops a performance issue, we refer to it as happy.…
Kentucky’s Bill HB775 would require those operating web sites or blogs or message boards in the state to enforce a policy to collect legal names, postal addresses, and email addresses to use the service. The legal name would, of course, be posted on the web site. Should the poster cross someone else, then the operators…