Gordon And Mike's ICT Podcast
Perspectives on Technology and Education from Gordon F. Snyder, Jr. & Mike Qaissaunee
Mobile Devices and Application Development [28:14]

This is Gordon's December 2, 2011 presentation for a series of mobile boot camps being run by  The Commonwealth Alliance for Information Technology Education (CAITE); and the Boston-Area Advanced Technological Education Connections (BATEC) at the University of Massachusetts.

High school students take a day at locations across Massachusetts, working with faculty and business/industry people to learn how to program, design, and market mobile apps using mobile programming platforms. Students will also have an opportunity to enter an app programming contest to be sponsored by BATEC in the spring.

Direct download: Mobile_Camp_Dec_2_2011mono.mov
Category:podcasts -- posted at: 2:05pm EDT

Why We Are Not Google: Lessons from a Library Web site Usability Study [22:40]

Back in September I had the chance to interview Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In the interview we discussed a paper he published with Public Service Librarian Jeremy Green, also at Moraine Valley Community College. Here's the abstract from that paper published at ScienceDirect.

In the Fall of 2009, the Moraine Valley Community College Library, using guidelines developed by Jakob Nielsen, conducted a usability study to determine how students were using the library Web site and to inform the redesign of the Web site. The authors found that Moraine Valley's current gateway design was a more effective access point to library resources than a mock-up site which incorporated a central-search box on the site homepage. This finding stands in contrast to the observed trends of library Web site design that emphasizes a “Googlized” search.

Troy's findings are very interesting, especially if you are managing/mdifying an existing site or are considering creating one. Here's the links Troy refers to in the podcast.

The Next Level (Blockbuster article)by James Surowiecki


useit.com: Jakob Nielsen's Website


The Googlization of Everything (book review)



Why We Are Not Google: Lessons from a Library Web site Usability Study


(link to Elsevier's Science Direct)

Direct download: Troy_Swanson_9_19_11.mp3
Category:podcasts -- posted at: 10:33am EDT

In this episode, we discuss a wide range of topics, including: 

- The Jesters denial of service attack on the Westboro Baptist Church website.

- How one might prevent such attacks

- The seizure of domain names by the Department of Homeland Security

- The treatment of Bradley Manning

- Google and bugs in Flash

- A 16-year old girl that may have hacked HBGary 

- Skype and encryption data leaks

and, finally

- How the events in Japan may effect iPad2 availability.

Layer 7 Denial of Service attacks:

th3j35t3r's assault on Westboro Baptist Church Website Continues


Live Performance Report for Westboro Church Website: four sites held down 24 days from a single 3G cellphone: 


Defense techniques:

Protecting a Web server with a Load-Balancer 


Protecting a Web server with mod_security (a Web Application Firewall)


Protecting a Web server with iptables (a firewall)


Westboro Spoof for a Good Purpose



DHS siezure of domain names:

Web seizures trample due process 



Bradey Manning's Continuing Abuse in Captivity

Ellsberg on Obama’s View that Manning’s Treatment is “Appropriate”


WH forces P.J. Crowley to resign for condemning abuse of Manning



Google and Flash Bugs

Google first to patch Flash bug with Chrome update



"Anonymous" Hacker Speaks

Is This The Girl That Hacked HBGary?  16 years old, and in hiding for a felony



Skype Encryption Leaks Data

Uncovering spoken phrases in encrypted VoIP conversations



Shortages of Apple's iPad and iPhone to bleed into June quarter -- caused by Japan's disasters


Direct download: G_M_and_S_Podcast_3-17-11.mp3
Category:podcasts -- posted at: 9:35am EDT

In December at the Convergence Technology Center's Winter Retreat at Collin College in Frisco Texas, John had the chance to shoot an IPv6 (Internet Protocol version 6) workshop given by Sam Bowne, from City College of San Francisco. Here's the 35 minute and 47 second Part 1 of the 4 part series.


Direct download: Ipv6_1_of_4_Sam_Bowne.m4v
Category:podcasts -- posted at: 1:15pm EDT

HB Gary, Voice over LTE and WiFi Breakthroughs [26:50]

In this podcast, Mike Qaissaunee, Sam Bowne and Gordon Snyder discuss recent HB Gary and Aaron Barr news, Verizon Wireless Voice over LTE, along with a recent WiFi Breakthrough.

Here's some of the questions we discuss and answer in the podcast:

Gordon: Sam any new news on the HBGary/Anonymous situation?
Mike: Sam, I see Anonymous has released decompiled Stuxnet code - what does that mean? What's the difference between soucre and a decompiled binary?
Sam: Gordon, you wrote something about Verizon and Voice over LTE - could you tell us about that?
Mike: Sam, one of my former students got a letter from his ISP after download a movie from a torrent site. #1 What do you have to say about the legal and ethical issues of what he's doing? and #2 How could he better anonymize his connection?
Gordon: Mike - you've been writing about Qwiki.com and Khan Academy this past week. Your thoughts?
Gordon: Mike, you had a student point me too some interesting WiFi research being done at Stanford University. Can you describe?





















Direct download: February_18_2011.mp3
Category:podcasts -- posted at: 4:35pm EDT

Community College Blogging: A Conversation with Dr Troy Swanson [30:40]

Gordon talks with Dr Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In December Troy completed his PhD in Community College Leadership at Old Dominion University. His dissertation was titled The Administration of Community College Blogs: Considering Control and Adaptability in Loosely Coupled Systems. In the podcast, Troy discusses some of his findings.

Here’s some dissertation background from Troy:

Web 2.0 technologies present an unlimited potential for outreach to the public by college employees. This presents a conundrum for community college administrators that David Weinberger calls "the conundrum of control." This conundrum is that organizations need to find a way to organize people around technology to ensure that it is used to further the organization’s mission. Yet, in terms of 2.0 technologies, the more controls that are put in place, the less useful the tools become.
There is also a second conundrum around technology that challenges mangers. This is that the more controls that are in place around a technology, the easier it is to communicate and transfer that technology across the organization. But, the more difficult it is for organization members to adapt the technology to meet new needs.
As one of oldest form of 2.0 technology, the management of blogs presents lessons that we can use for other, newer, 2.0 technologies.
I interviewed administrators and blog authors at community colleges across the US to see how colleges were managing their blogs. The focus was on administrative blogs as opposed to course-related or faculty blogs that discussed their research.  The larger purpose of the study was to see how easily the technology could adapt to new needs and whether campuses were restricting the use of blogs. What kinds of guidance were campus leaders giving to bloggers who were representing the college?
The study’s findings offer a peak into how the administrative structures of community colleges impact technology and Web 2.0.

Troy’s Email: swanson@morainevalley.edu
Troy on Twitter: http://twitter.com/t_swanson
Moraine Valley Library Link (includes blogs, podcasts, Facebook, etc): http://www.morainevalley.edu/library/













Direct download: Troy_Swanson_2_17_11.mp3
Category:podcasts -- posted at: 3:43pm EDT

We talk with Sam Bowne from City College of San Francisco about how a man tracked down Anonymous and paid a heavy price, Stuxnet, The Jester and how U.S. Chamber lobbyists solicited and used hackers. 


How one man tracked down Anonymous—and paid a heavy price


US Chamber’s Lobbyists Solicited Hackers To Sabotage Unions, Smear Chamber’s Political Opponents 


US Chamber’s Lobbyists Solicited Firm To Investigate Opponents’ Families, Children






Direct download: Feb_12__2011.mp3
Category:podcasts -- posted at: 4:50pm EDT