Thu, 1 December 2011
This is Gordon's December 2, 2011 presentation for a series of mobile boot camps being run by The Commonwealth Alliance for Information Technology Education (CAITE); and the Boston-Area Advanced Technological Education Connections (BATEC) at the University of Massachusetts. High school students take a day at locations across Massachusetts, working with faculty and business/industry people to learn how to program, design, and market mobile apps using mobile programming platforms. Students will also have an opportunity to enter an app programming contest to be sponsored by BATEC in the spring. |
Wed, 23 November 2011
Back in September I had the chance to interview Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In the interview we discussed a paper he published with Public Service Librarian Jeremy Green, also at Moraine Valley Community College. Here's the abstract from that paper published at ScienceDirect. In the Fall of 2009, the Moraine Valley Community College Library, using guidelines developed by Jakob Nielsen, conducted a usability study to determine how students were using the library Web site and to inform the redesign of the Web site. The authors found that Moraine Valley's current gateway design was a more effective access point to library resources than a mock-up site which incorporated a central-search box on the site homepage. This finding stands in contrast to the observed trends of library Web site design that emphasizes a “Googlized” search. Troy's findings are very interesting, especially if you are managing/mdifying an existing site or are considering creating one. Here's the links Troy refers to in the podcast. The Next Level (Blockbuster article)by James Surowiecki http://www.newyorker.com/talk/financial/2010/10/18/101018ta_talk_surowiecki useit.com: Jakob Nielsen's Website The Googlization of Everything (book review) http://www.googlizationofeverything.com/ Why We Are Not Google: Lessons from a Library Web site Usability Study http://www.sciencedirect.com/science/article/pii/S0099133311000280 (link to Elsevier's Science Direct) |
Mon, 28 March 2011
In this episode, we discuss a wide range of topics, including: - The Jesters denial of service attack on the Westboro Baptist Church website. - How one might prevent such attacks - The seizure of domain names by the Department of Homeland Security - The treatment of Bradley Manning - Google and bugs in Flash - A 16-year old girl that may have hacked HBGary - Skype and encryption data leaks and, finally - How the events in Japan may effect iPad2 availability. Layer 7 Denial of Service attacks: th3j35t3r's assault on Westboro Baptist Church Website Continues Live Performance Report for Westboro Church Website: four sites held down 24 days from a single 3G cellphone: http://uptime.netcraft.com/perf/graph?site=www.godhatesfags.com Defense techniques: Protecting a Web server with a Load-Balancer http://samsclass.info/124/proj11/proj15-haproxy.html Protecting a Web server with mod_security (a Web Application Firewall) http://samsclass.info/124/proj11/p16-mod-security.html Protecting a Web server with iptables (a firewall) http://samsclass.info/124/proj11/p5x-iptables-layer7.html Westboro Spoof for a Good Purpose -------------------------------------------------------------------------------- DHS siezure of domain names: Web seizures trample due process http://arstechnica.com/tech-policy/news/2011/03/ars-interviews-rep-zoe-lofgren.ars -------------------------------------------------------------------------------- Bradey Manning's Continuing Abuse in Captivity Ellsberg on Obama’s View that Manning’s Treatment is “Appropriate” http://www.ellsberg.net/archive/ellsberg-obama-manning WH forces P.J. Crowley to resign for condemning abuse of Manning http://www.salon.com/news/opinion/glenn_greenwald/2011/03/13/crowley -------------------------------------------------------------------------------- Google and Flash Bugs Google first to patch Flash bug with Chrome update http://www.computerworld.com/s/article/9214689/Google_first_to_patch_Flash_bug_with_Chrome_update -------------------------------------------------------------------------------- "Anonymous" Hacker Speaks Is This The Girl That Hacked HBGary? 16 years old, and in hiding for a felony http://blogs.forbes.com/parmyolson/2011/03/16/is-this-the-girl-that-hacked-hbgary/ -------------------------------------------------------------------------------- Skype Encryption Leaks Data Uncovering spoken phrases in encrypted VoIP conversations http://www.cs.unc.edu/~fabian/papers/oakland08.pdf -------------------------------------------------------------------------------- Shortages of Apple's iPad and iPhone to bleed into June quarter -- caused by Japan's disasters |
Sat, 5 March 2011
In December at the Convergence Technology Center's Winter Retreat at Collin College in Frisco Texas, John had the chance to shoot an IPv6 (Internet Protocol version 6) workshop given by Sam Bowne, from City College of San Francisco. Here's the 35 minute and 47 second Part 1 of the 4 part series.
|
Mon, 21 February 2011
In this podcast, Mike Qaissaunee, Sam Bowne and Gordon Snyder discuss recent HB Gary and Aaron Barr news, Verizon Wireless Voice over LTE, along with a recent WiFi Breakthrough. Here's some of the questions we discuss and answer in the podcast:
|
Fri, 18 February 2011
Gordon talks with Dr Troy Swanson, an Associate Professor / Teaching and Learning Librarian at Moraine Valley Community College in Palos Hills, IL. In December Troy completed his PhD in Community College Leadership at Old Dominion University. His dissertation was titled The Administration of Community College Blogs: Considering Control and Adaptability in Loosely Coupled Systems. In the podcast, Troy discusses some of his findings.
|
Sat, 12 February 2011
We talk with Sam Bowne from City College of San Francisco about how a man tracked down Anonymous and paid a heavy price, Stuxnet, The Jester and how U.S. Chamber lobbyists solicited and used hackers. Links: How one man tracked down Anonymous—and paid a heavy priceUS Chamber’s Lobbyists Solicited Hackers To Sabotage Unions, Smear Chamber’s Political OpponentsUS Chamber’s Lobbyists Solicited Firm To Investigate Opponents’ Families, Children
|