Technology

The Fresh Prince of Bel-Where? Academic Publishing Scams

Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other job scams, in fact anything that promises an easy supplemental income, unfeasibly cheap or free trendy gadgetry, and so on. But I’m talking about attacks against the institutions, rather than their ‘customers’: for example, targeted social engineering attacks as a means of accessing intellectual property. Some academic research has appreciable monetary value in its own right, and much of it is developed in partnership with and funded by businesses with a direct interest in monetizing it: that makes it of interest to people with an interest in getting in first.

Mendeley and RefWorks Flow: The next, next generation of citation management software

A decade or so ago, ISI's EndNote bought out most of the competition, practically obtaining a monopoly on the reference manager business. In the early Library 2.0 boom, web-based products like Zotero and CSA's RefWorks became the norm. Thomson Reuters played catch up by introducing EndNote Web, and NoodleBib and other adware/freemium clones cropped up in what is now again a crowded marketplace.

Mendeley, recently purchased by Elsevier, has gained fame by offering social media integration and and sharing cababilities. It notably works on the old Questia model of selling itself directly to individual users, not institutions. ProQuest is also putting the finishing touches on RefWorks Flow, which features similar collaboration tools.

The way these newer products allow users to share articles with peers raises interesting questions about them potentially being used as a new "Napster for subscription journals," especially since they are now both owned by major publishers. See my comment for some more philosophical questions....

How ASCII Lost and Unicode Won

If you’ve ever heard someone complaining that “this system doesn’t support double-byte characters”, or asking whether “this data’s in Unicode”, and felt as though you really ought to understand what those things mean, then this post is for you.
How ASCII Lost and Unicode Won...

How Technology Widens Class Divisions

Paul Solman speaks with Jaron Lanier, widely regarded as the father of virtual reality and the author of "Who Owns the Future?", about how big computers -- and the government and businesses they empower -- are creating more economic inequality.

 

Today's digital data could be gone tomorrow

"I'm not blaming Microsoft," said Cerf, who is Google's vice president and chief Internet evangelist. "What I'm saying is that backward compatibility is very hard to preserve over very long periods of time."

The data objects are only meaningful if the application software is available to interpret them, Cerf said. "We won't lose the disk, but we may lose the ability to understand the disk."

Smartphones Have Bridged The Digital Divide

Good News Everyone... The Digital Divide has now been bridged by smartphones - the most advanced personal computing devices ever. While personal computers were disproportionally used by the rich, the white and the male, smartphones are more likely to be used by Blacks and Hispanics than Whites, and by girls as equally as boys.

Gadgets you can borrow at the library

Gadgets you can borrow at the Stanford Law Library. Interesting collection of items. Five Fuji bicycles are on the list.

What gadgets does your library lend? Successes? Problems?

Google's Schmidt, Cohen Describe a 'New Digital Age'

Schmidt and Cohen authored a book - The New Digital Age

Next-Generation Search: Software Bots Will Anticipate Your Needs

Now things have changed. First, and most obviously, mobile devices are everywhere. Second, there are now legions of interesting Web services to automate. The final ingredient is the most important: With the rise of Big Data, there is now enough information available for a software agent to actually use to perform anticipatory actions. In that context, the challenges of applying software agents and artificial intelligence to business solutions is nothing compared to the potential payoff to users.
The combination of automated agents, contextual search and a sea of data from our devices, services and the Internet of Things, search is poised to become vastly more useful and efficient than it already is. The pieces are getting there with agents like Siri and contextual search like Google Now. If it all works as promised, information we need will be delivered to us just when we need it, without our having to invest time and effort looking for it."

Reading a Bedtime Story Together from Afar

Kindoma Storytime combines e-books with video sharing features. So now you can share a bedtime story with your child or grandchild from anywhere, if you both have iPads, good Wi-Fi, and have downloaded the free app from iTunes.

Originally a research initiative at Nokia, the project has been spun off as an independent company with the project leader, Tico Ballagas. According to Mr. Ballagas, the iPad was not around when the project was conceived, but has become the ideal device for delivering synchronous storytimes.

Full article

Syndicate content