IT Trends October 13, 2005

Contact the Editor | Sponsor this Newsletter | Subscribe | Change email address | Unsubscribe

In This Issue

OPINION

Where Is Away? Or, What Happens When You Flush the Toilet

By Terry Calhoun

And perhaps more importantly, what happens when campus IT throws away old PCs.

Well, the answer is that there is no “away.” Just like the social construction of “race,” which for human beings really has no scientific biological sense but is a real social force due to the often subconscious beliefs (social facts) of humans in various societal contexts, there really is no such place as “away” as used in the term “throw away.” Yet we all use the term and, until a certain level of maturity is reached, young people may even assume there is such a place.


Read more


IT NEWS

The AIM Virus Hits the University of Illinois

What a perfect world for a virus that depends on people clicking a bad link--a world of haste and distracted attention. In less than a month Campus Information Technologies and Educational Services (CITES) at Illinois had to remove more than 600 infected computers from the network. (Daily Illini) Read more

Hack Attacks at Florida State Cause Security to be Rethought

The two computers recently attacked were apparently just being used to store large files, but the names of 26,000 FSU alumni were potentially compromised. (Tallahassee Democrat) Read more

Game Time at Ithaca College

Computer games, that is. "Serious Gaming," not an oxymoron, and it’s not just for Nobel Prize winners. It really is a new class aimed at creating eLearning games to be offer by the Roy H. Park School of Communications. (The Ithacan Online) Read more

Microsoft Ends Feud With Real

Microsoft agrees to support Real's digital-music and games businesses and give the Seattle-based company $761 million. Can one standard for digital audio be far behind? (The Seattle Times) Read more

RESOURCES

iPod Subway Maps Help Commuters

This new website is intended for people to share their iPod-able subway maps with each other. Lots of potential. (iPodSubwaymaps.com) Find out more


DEALS, CONTRACTS, AWARDS

Blackboard Acquires WebCT

Blackboard announced Wednesday that it is acquiring WebCT. Blackboard says it is paying approximately $180 million for WebCT, but the ultimate price depends on WebCT's cash balance when the deal closes. “The combined companies' 3,700 academic clients will create an unparalleled Community of Practice enabling collaboration and innovation around the world,” according to Blackboard. More information is available at a new Website for the two companies: http://www.blackboard.com/webct


Jeff Hawkins Funds New Research Center at UC Berkeley

Hawkins, a famed computer pioneer has used a $m gift to begin the Redwood Center for Theoretical Neuroscience. Research is focused on, among other things, developing a new computer memory system modeled after the human neocortex. (UC Berkeley News) Read more


Yale's Web Mail Changes Get Mixed Reviews

Yale University (CN) has completely replaced its Webmail system using software from Horde, an open source consortium. Reactions prove once again that change can be uncomfortable. (Yale Daily News) Read more


Microsoft Adds Yahoo to Its Buddy List

Microsoft. and Yahoo! partner to let their users instant message each other for the first time, challenging America Online dominance of Internet messaging. (Bloomberg) Read more


Thursday, October 13, 2005

Sponsored by:
Today's Lesson from NEC: Dynamic Communication of Information with Potential for Revenue Generation
NEC's Digital Signage Solution - powerful visual communication network that demands attention through effective video-based revenue-generating messages!

When You Add It All Together, the Answer is NEC's Digital Signage Solution for Your Campus!

Click here for details



Upcoming Events


TechMentor
in San Jose, October 17-21, 2005

TDWI World Conference,
Orlando, October 30-November 4, 2005

Events Calendar



Sponsored by:
Email Headaches Exhausting Your IT Department?
Many universities today are faced with the ongoing problem of email systems including complex management, high support costs and unreliable performance. Mirapoint solves these issues.

Read specific deployment scenarios from seven universities including the University of Georgia, Temple University, California State University at Northridge and Virginia Tech.

Click here for details


Sponsored by:
Keynotes and Highlights from Syllabus2005 Online Now
See and hear the keynotes and general sessions from Syllabus2005, featuring Tracy Futhey, Diana Oblinger, Lev Gonick, and other higher ed visionaries and leaders. It's the next best thing to being able to attend.

Click here for details


NEW TECHNOLOGY

New iPod D'es Video on 2.5-inch Screen

Going boldly where no one else has gone before, Apple brought out its new iPod. It stores up to 150 hours of video, as well as music and images. Next-day availability of top TV shows is part of the package. (Financial Times) Read more


Online Resources :

More Resources


Current Topics in Our forums include:
Networking

Collaboration in the Education Space

Mobile Computing

Campus IT Security

Tablet PCs

Discuss with us

Featured

  • open laptop in a college classroom with holographic AI icons like a brain and data charts rising from the screen

    4 Ways Universities Are Using Google AI Tools for Learning and Administration

    In a recent blog post, Google shared an array of education customer stories, showcasing ways institutions are using AI tools like Gemini and NotebookLM to transform both learning and administrative tasks.

  • illustration of a human head with a glowing neural network in the brain, connected to tech icons on a cool blue-gray background

    Meta Launches Stand-Alone AI App

    Meta Platforms has introduced a stand-alone artificial intelligence app built on its proprietary Llama 4 model, intensifying the competitive race in generative AI alongside OpenAI, Google, Anthropic, and xAI.

  • three main icons—a cloud, a user profile, and a padlock—connected by circuit lines on a blue abstract background

    Report: Identity Has Become a Critical Security Perimeter for Cloud Services

    A new threat landscape report points to new cloud vulnerabilities. According to the 2025 Global Threat Landscape Report from Fortinet, while misconfigured cloud storage buckets were once a prime vector for cybersecurity exploits, other cloud missteps are gaining focus.

  • Stylized illustration showing cybersecurity elements like shields, padlocks, and secure cloud icons on a neutral, minimalist digital background

    Microsoft Announces Security Advancements

    Microsoft has announced major security advancements across its product portfolio and practices. The work is part of its Secure Future Initiative (SFI), a multiyear cybersecurity transformation the company calls the largest engineering project in company history.