I’m supervising a capstone project right now where students are providing data analysis and visualization support for a local organization, and the following set of links have been queueing up in my feed as to-read items for me related to that project (and, hopefully, to-read items for them): eagereyes has a nice summary of ISOTYPE (International System of Typographic Picture Education) which in the roughest strokes is those charts where the number of an item is represented not by a bar but as a collection of images or icons representing the thing being counted. But it’s a lot more complicated … Continue reading Data Vis Roundup
I’m helping organize a panel of faculty at my school who have been using a range of different technologies to support student interaction in and out of class. With so many options out there, we want to focus on what has worked for us, what hasn’t worked, and start some conversations around how to make the jump from looking at your course, with its content, outcomes, and pedagogy, and draw on others experience with these tools on the ground with our systems and our students to have some idea what options might be appropriate. Independently of this, I’ve got a … Continue reading Discourses
I don’t know if this weblog entry about bug hunting in large scale game development is more appropriate for my spring games course or my spring project management course. The stories are great for both directions. Team members with poorly defined roles! Frantic timelines leading to bugs! The reality of entire days lost to a bug that won’t be found, let alone fixed! Bugs explained in simple code a novice student can understand! I particularly enjoyed the explanation of why the live server compiler ran without debug capabilities, violating the ideal that the dev and live servers are identically configured, … Continue reading Sometimes you can blame the compiler. Sort of.
My security class is talking about the types of commonly seen mistakes that can crop up when writing programs that lead to security flaws, and while I usually introduce the ideas using “normal” programming examples because it is the common background I can assume my students have, I’m trying to help the students map these ideas to what they’ve seen of database or web development as well. So I finally went back in my saved links and read through a Google blog post from a month ago about security issues in hosting user content, specifically web content. After a brief … Continue reading Risks in user content
A colleague sent me an article about a U.S. university accepting transfer credit for a Udacity course – something described in the headline and the first few paragraphs as being a breakthrough in a school accepting a free, online course for full transfer credit. The article gets interested when you dig into it though. The course in question is a intro level “Introduction to Computer Science” course. And, in order to get the transfer credit, students have to not only get a certificate of completion from Udacity showing that they completed the course, but also pass an exam administered at … Continue reading What are you getting credit for?
Interesting story of the life webcast of the Hugo Awards being blocked by copyright enforcement bots. Short version: the live webcast included clips of the television episodes up for best script (as award ceremonies do) and UStream’s bots for detecting copyrighted work spotted it and blocked the entire rest of the broadcast. The article points out that not only is that fair use but, the clips were provided by the copyright holders who were happy the content was being promoted as award winning. The whole thing is reminiscent of NASA’s footage of the Curiosity landing being removed from NASA’s YouTube … Continue reading Robots run amok
An article on how reading is important for leadership feels appropriate for the start of the semester, particularly with it’s mention in the second paragraph of the difference between literacy and the ability for deep reading. A fun exercise is applying a bit of that “deep reading” to this article. You’ll probably notice that there’s lots of fine anecdotal accounts of great leaders also being great readers. When the evidence starts coming out, things get shakier. The supporting link for the claim that reading offers the best stress-reduction is to a newspaper article about the study that doesn’t make clear … Continue reading Let’s read some books!
For some reason, this article about Best Buy as a showroom (from earlier this year but I only just read it) made me think about the conversation going on about MOOCs. I had to ask myself if my willingness to turn to online stores for a deal rather than spending more for a more robust experience (being able to try out products, get advice, have it immediately) revealed my feeling that small, in-person classes are still worth the money hypocritical or, at least, motivated by self-interest. So I thought about what I do buy in-person, rather than online. Clothes, obviously … Continue reading Brick-and-mortar college
I recommend both this article about plagiarism in Coursera’s courses but also the comment thread, which makes a few interesting connections between the specific issue of plagiarism happening in these courses, and the broader discussion about MOOCs and their role in the higher education universe. The obvious question, posed but not answered in any of this, is why would students plagiarize in a free, non-credit course that they are taking entirely voluntarily? If you want to just watch the lectures, or just do the reading, there’s absolutely nothing in the structure of these courses to prevent it. And, completing the … Continue reading Rethinking courses
This security critique of the Tesco website is a hoot. It walks through an increasingly deep, and increasing damning, look at what is wrong with their setup, and how you can tell. The critique is well peppered with links to additional content about the problems being described, so it’s not a bad starting place to learn something about web security. It is also an accessible illustration of the type of exploration and deduction that can be used to profile a system and its vulnerability. Finally, to me, it reads as a nice lesson in why you can’t just “throw some … Continue reading This entry readable in lynx 2.8.3 or higher.