Archive for October 6th, 2003

Two BloggerCon Requests

3

 

I got several interesting replies to my query
on patient care blogs
.
Sebastien Paquet writes with a link to a project called World
Wide Pursuing Perfection
in In Whatcom County, WA, where providers are working with paients
to design and build a comprehensive total healthcare system which seems
to include something like what I had in mind.

Enoch Choi noted some shortcomings in the WWPP implementation and pointed
me towards his work as described in his blog medmusings (Enoch, I cant
see the sidebar either, in Safari). He laments my inability to attend the
Blogs in Medicine session, but it conflicted with my own session (on Day
2 EVERY session conflicted with my session). Luckily the ever-reliable (and lovely)
Jessica B. took extensive notes.

First request: Anybody else blog this session? Was it webcast, and if so,
how can I access the archive?

Second request: SOMEBODY took my picture at the Fabulous
Friday Night Opening Bash
at the Hong Kong in Harvard Square. I was
sitting at the same bar where I spent a significant portion of my undergraduate
years, deeply immersed
in a hybrid acid flashback/deja vu. Next to me, smiling for the camera,
was our sacrificial Pop Icon, Adam Curry. I would give just about anything
for a copy of that photo, but was so taken by the moment I don’t even remember
who took it! Does anyone? Help! Thanks.

Front-line Security – Screen Savers

1

Activating
a password-protected screensaver on users’ desktops often provides more
protection from unauthorized access than by issuing them with strong
network login passwords, according to TruSecure.

Their logic is interesting; most corporate security violations are internal
and involve no hacking, just unothorized use and access.With strong network
login technology people tend to login when they start working and leave
the connection up and open throughout the day.  They also have a
tendency to write down those long passwords further increasing vulnerability.

However, the article concludes that the greatest practical level of
security available is through tokens or smartcard technology, on the
theory that with a physical key you know when it has been lost, stolen
or compromised.  Maybe.

from
ZDnet

Archetypes for Adult Learners

ø

Here is an interesting instructional unit from Jedlet, via CAREO.  “Outlined here is a classification of adult learner archetypes using animal analogies.” Content is so/so but the interface design is ingenious and accessible.Another example of web-based multimedia delivery, although with the extremely high noise-to-signal ratio typical of slide-show type presentations.