SCORM and eLearning

In my new job at “Agilix Labs” I have been introduced a lot of new –
and unknown to me – electronic learning technologies. We have
recently partnered with Blackboard, one of the leading creators of e-Education software and systems. I have also been educated about WebCT, another leader in this same space. In the Open Source community, there are also Open Source solutions like Sakai that are gaining ground at various higher education facilities.

Overall, I had no idea that so much was going on in the automation and
computerization of education systems. Of course it only makes
sense, but it is the extent of it – and the growing maturity – that I
was oblivious to.

Today I was quickly educated about SCORM
– the Sharable Courseware Object Reference Model. Amazing.
There is a good SCORM “brief description” here. It is actually a rich specification for the creation of courseware –
educational software – that includes the course material, coupled with
exercises and exams (assessments), and even some metadata about the
“flow” of the course – the order that students have to accomplish
different parts before progressing, and even scores that must be
attained – along with where to send the results.

I had my first demonstration of SCORM today in the form of a government
course being given by the Navel Postgraduate School. It was
pretty cool … a .zip file contained the entire SCORM course
(something on marine navigation) and once loaded into Blackboard there
was all of the course material, the exams, and for the student a way to
begin learning.

Towards the 1TB (Terabyte) disk drive

Wow … the doubling continues. There are two key points that I
like about this article. The first is that 500GB PC disk drives
will be on the market this year. That is now 100,000 times the
capacity of my first hard disk drive that I ever had! The 100,000 times growth in capacity has occurred in less than 30 years.

The second key point is that it shows no sign of stopping. From this article:

Desktop drive capacity will top out at around 1 terabyte by late 2006,
before running into technological problems in maintaining data
stability.

We are on track to again double by the end of next year! It is
difficult to image that common, and eventually commodity, hard disk
drives will reach these sizes. That is a huge amount of
data. In addition, as humans we will simply solve the tough
problems and continue the growth rates with newer technologies.

A last point is that there are currently numerous solutions – the most
popular referred to as RAID – that allow you to aggregate multiple disk
drives into a redundant array that appears as one, even larger, disk
drive. I have been tracking solutions like this over the years to
mentally track the cost of a terabyte of storage. I am now
stunned that in the next year, I might be buying one terabyte of hard
disk storge in a single PC disk drive.

PC World: PC Drive Reaches 500GB.
Demand for greater capacity continues to rise due in large part to a
growing need for music and video storage on PCs and consumer
electronics devices. To meet that need, storage vendors are turning to
new recording technologies. The first of these, perpendicular
recording, will debut from Toshiba this year. [Tomalak’s Realm]

More dynamic collage applications

My friend Todd Dailey just sent me a link to more applications similar to 10×10.
I have to warn that this one is very cool, however there are sometimes
images with nudity that some people would find offensive. It’s
not that it is designed to include these images … it’s just designed
not to discriminate.

As long as you are ok with a wide range of possible images, then you can go and look at WebCollage … an application developed by Jamie Zawinski.
Unlike 10×10 where the images are grabbed from news services,
WebCollage grabs images by doing random searches on various search
engines, and then finding the images on the resulting pages.
These images are then combined into a collage that updates about once a
minute.

Unlike visual collages, there are also the written collages … like DadaDodo. This project is creating text based on other text, in a format that is designed to “Exterminate All Rational Thought”. To see a sample you can click here.
I see this as a variation, at a lower level, to the concepts of
“multidisciplinary exposure” … something alluded to in the recent
book Medici Effect – Breakthrough Insights at the Intersection of Ideas, Concepts, and
Cultures.

Lastly, Jamie also refers to DriftNet … something I really want to install and play with! A version of EtherPeg for UNIX/Linux.

Ten By Ten

I always like various ways that information is rendered
graphically.  I am a very visual person, and love to see images
that reflect and represent information.

Quite a while ago, I loved hearing about the use of EtherPeg
and its use at various conferences.  EtherPeg would monitor the
local network, and detect the images from the web pages that people
were looking at.  In real time, EtherPeg would display these
images on the screen as a constantly evolving collage of of activity.

Now there is Ten By Ten (or 10×10?)
which is a very cool way to view the current events of our society …
based on the RSS news feeds of some top sources of current-event
news.  If you go and view the site, you’ll see a 10×10 grid of
images that have been grabbed form the various news services, based on
the popularity of the words detected in news.  Move your mouse
over the images, and you’ll see the list of words … click on an image
and see the articles that contributed to that word and image making the
“top 100” for the hour.

It is projects like this that blend technology, society, and art … in
a way that I really appreciate.  It is both an experiment in
science, and a piece of art being molded by society.

The Global Consciousness Project

My friend Joe Skehan sent me a link today to this article – “Can this black box see into the future?” –  on The Gobal Consciousness Project
Amazing stuff.  I had no idea that anyone was working on anything
like this.  Yes, even the researchers are skeptical … however
they are also seeing patterns.

These researchers are digging deeper into the possibility that there
could be ways to monitor, or more specifically detect, the presence of
a “global consciousness” using a distrbuted set of monitoring nodes
they refer to as “eggs”.  These devices are designed to generate
random numbers, and yet the researchers are able to detect deviations
in these numbers that seem to coincide with major events on
earth.  The first set of quotes that caught my attention was:

Using the internet, he [Dr. Roger Nelson] connected up 40 random event generators from all over
the world to his laboratory computer in Princeton. These ran constantly, day in
day out, generating millions of different pieces of data. Most of the time, the
resulting graph on his computer looked more or less like a flat line.

But then on September 6, 1997, something quite extraordinary happened: the
graph shot upwards, recording a sudden and massive shift in the number sequence
as his machines around the world started reporting huge deviations from the
norm. The day was of historic importance for another reason, too.

For it was the same day that an estimated one billion people around the world
watched the funeral of Diana, Princess of Wales at Westminster Abbey.

The article goes on to give other examples, and the web site
has even more information about the research.  What is even more
interesting is the blend of both scientific and artistic personalities
that are joining on this research.  All of this exploring the
possibility that there are forces at work – detectable forces – that
might indicate that humans have more abilities then we are taught to
believe.

Cool stuff …

A Fourth Axiom of Identity

I can completely understand the natural human tendency to want to claim
ownership of our identity.  I constantly see the statements “It’s mine!  I want to control it!  I want to determine who can see it!”

After years of looking at this space, however, I have become convinced
that our identity, as we know it, is already spread across the
communities that gave us that identity.  That the basis of the First and Second Axioms that I posited.  I see identity as an accumulated thing … and it only exists with language.  It is language that allows us to distinguish identity.

It is this train of thought that takes me to the Fourth Axiom of Identity:

I posit that for an
effective community to exist there must be verified agreement, which
requires a minimum of three community members.

As I stated above, I believe it is language that allows us to
distinguish identity.  Language requires agreement on the meaning
of words.  The only way to have verified agreement is to have a
third party as a “tiebreaker.”  This does not prevent
disagreement, however it allows for the verification of a previous
agreement.

Where I see this relating to identity is in the area of verification, or authentication
of identity attributes.  Here, I mean authentication as in
“verifying the authenticity of.”  I can always choose to accept
the identity information that I receive from another entity, however
the value and accuracy of that identity information is always in
question until I am able to verify it.  How I verify identity
information will always occur using some other member of a common
community that is able to provide the verification.

When applying for a financial loan, I can tell a bank about my employer
and salary information, however they are probably going to verify the
information with my employer.  All three of us exist within a
common community that enables this, and this community has defined the
language and protocols to enable this verification process to
occur.  There is the ability to generate a verified agreement.

Even in a conversation with my employer, we could potentially disagree
about my salary.  So what do we do?  We get lawyers involved
– the third party – to examine the contracts and employment agreement
to verify the information.  This can only occur within a community
that has the same language and contract law.  Verified agreement.

In the digital identity world, this quickly becomes an important aspect
of  any system that is going to replace our paper-based
systems.  Often, just as in paper-based systems, it is not enough
to communicate only the identity information.  It is often
critical to also communicate the sources of verification … some third
party that can provide verified agreement.  This, in most cases,
is also the source of that identity attribute.

Couple Linux with Zigbee

Very nice … Open Source drivers for ZigBee
This is going to even further propel the standard forward.  I
believe that the recent adoption of ZigBee by even the local companies
here in Utah – Control4 and MaxStream – coupled with projects like this
are going to generate a lot of momentum.

The Linux Wireless Sensor LAN Project 0.1. 802.15.4 Linux drivers and utilities. [freshmeat.net]

Directory technolgies and Identity Management

I saw that Mark Wahl and Kim Cameron have been talking
a while back, and I like to see that. With Mark’s background in
LDAP directory technologies, I know that he has been thinking about
this space for a long time.

When working on digitalMe at Novell, I really wanted to see directory
technologies extended to become a primary platform for Identity.
When I say “extended” it was because there are a lot of issues that we
found when attempting to store identity in a directory.

There are numerous reasons that a directory is a logical place to store identity:

  • fully extensible schema for objects and attributes
  • authentication for verifying the user
  • access control down to the attribute level
  • flexible multi-protocol access

An extensible schema gave us
the ability to quickly create a core identity representation. A
“user” object with a list of attributes. What was powerful here
was when a user interacted with a new entity and was prompted for some
previously “unknown” attribute. This would be some attribute that
might be common, but had not been pre-defined in our list of user
attributes. With a directory we were able to ask the user for the
value of that attribute, extend the schema, and populate the
value. In a later iteration, we also looked for a way to allow
the user to “alias” the new attribute to simply point at an existing
attribute. This is the case where some attribute is called
different things by different communities.

With directory authentication, we are able to verify who is talking to the directory and then enforce access control on that connection.

Access control, down to the
attribute level, was one of the most powerful features that a directory
provides. With this, we were able to determine the “visibility”
of any particular identity attribute to any requestor. With most
directories there is even the concept of a “public” or “anonymous” user
making requests, and so we were able to expose those attributes that
are considered “public.” This is also what allows me to expose
more information to people that I want to. These access controls
could also determine who was able to modify any attribute of any
object. So, for example, I might have an object that represents you in my directory, and I might choose to allow you to update and maintain some of your own attributes. It is important to see that I might choose to
… because I also might choose not to allow you to update your
object. After all … it’s my directory. However if I trust
you, why not allow you to keep me up to date on your identity if you
want to?

Lastly, it is multi-protocol
access that offered the ability to integrate with a wide range of
identity solutions. At Novell we had internal proprietary
protocols, LDAP, and even some HTTP/HTML/XML methods of access. I
worked on a protocol that I called XDAP just before we announced
digitalMe. It is almost a LID/FOAF parallel. What I did was to have XML data returned – in DSML format – when a request was received in the IETF RFC 2255
format. Even after leaving Novell I had a lot of fun
experimenting with this further and using CSS and XSL to then directly
render identity information as “documents” in the browser that looked
just like the “real” documents in the paper world.

Over all … I believe that directories could be one of the possible
stores for identity information. There are, however, some
limitations in their implementations that don’t allow for many of the
common identity request patterns … like versioning and timestamping
of attributes. Directories are not very well designed to account
for how our identities evolve and change over time. I believe
this is necessary to have effective identity management.

The real game of bin Laden

There are few people that can really understand the breadth of the
campaign that al Qaeda and Osama bin Laden are waging against the
United States of America.  This CNN article, about bin Laden’s newest message,
is a good indicator of what we are up against.  We are living in a
day and age where he is using extremely powerful patterns of attack …
not against us as individuals or our armies … but against our economy
and overall will as a nation.

Every time that I hear people minimize the value of being in Iraq, or
even our efforts in Afghanistan, I can’t believe that they realize who
we are up against.  We are living in an age where a group of
people felt that it was “appropriate” to issue “a warning” to our
country by flying jetliners filled with human beings, into skyscrapers
filles with human beings … killing thousands of them.  I have no
idea what people are thinking … a warning??  This was flat out
murder.  It was a blatant attack, and one that occurred on our
lands.

The amazing thing to me is that few of the American people seem to see
the long-term economic impact that the attacks on the World Trade
Center has caused.  There are the occasional news blurbs on the
victims being paid for their losses.  There are also the issues
that we see from time to time about the American airlines and their
negotiations with government and unions.  But few people are
really aware that the attacks of 9/11 caused differences in our
country, our freedoms, and our economy that will never be
corrected.  My children will never experience the world that I
grew up with … not that I expected that the world would not be
different … however I have to admit that I did not think they would
grow up in a world where the attacks of 9/11 would be diminished so
quickly in the press and the minds of the average American.  We
are now living in a new age where there are going to be more of these
acts of brutality … unless someone takes aggressive moves toput a stop to it.

Our way of life is under attack … I am not a person who feels that
falling back into a defensive position is how to deal with these
attacks.  We are going to see more of them … until we choose to
destroy the source of them.  If we don’t destroy it … it will
destroy us.  For those of us who believe that “destroy” is too
harsh a word … then consider the possibility that the consequences
for behavior that generates attacks like 9/11 have to become too severe
for the behavior to continue.

What the BLEEP do we know!?

On Friday night, my wife and I went to see a movie that was recommended by a friend. What the BLEEP do we know!?
is an amazing film that is like no other. Do not expect passive
entertainment, or the typical story lines. This is a film that
explores the reaches of science into quantum mechanics, and it’s
effects on our perception of reality. It begins to explore our
ability to “cause” in the universe, and how we shape our own reality by
our own behaviors.

The movie is receiving mixed reviews … and that is a good indicator
of controversy! Anyhow … I would recommend this movie to anyone
… and be prepared to think … not just watch!