Get LISNews via email! Enter Your Email Address:
When we read the past, we acknowledge that we stand not only, as Isaac Newton put it, on the shoulders of giants, but also on those of scholars of smaller stature who were no less passionate about their subjects and determined in their own way to contribute to the intellectual conversation. The 12th-century philosopher and educator Bernard of Chartres is said to have observed that we are all dwarfs when we attempt to climb atop gargantuan flesh. I am glad to have met more of them online, and to have profited from their vantage point.
The CRT Television
Blowing on a Nintendo Cartridge
The Telephone Slam
The Dot Matrix Printer
Advancing Film in a Camera
Friction-Shifting a Bike
Phishing attacks targeting academia aren’t the most high-profile of attacks, though they’re more common than you might think. Student populations in themselves constitute a sizeable pool of potential victims for money mule recruitment and other job scams, in fact anything that promises an easy supplemental income, unfeasibly cheap or free trendy gadgetry, and so on. But I’m talking about attacks against the institutions, rather than their ‘customers’: for example, targeted social engineering attacks as a means of accessing intellectual property. Some academic research has appreciable monetary value in its own right, and much of it is developed in partnership with and funded by businesses with a direct interest in monetizing it: that makes it of interest to people with an interest in getting in first.
A decade or so ago, ISI's EndNote bought out most of the competition, practically obtaining a monopoly on the reference manager business. In the early Library 2.0 boom, web-based products like Zotero and CSA's RefWorks became the norm. Thomson Reuters played catch up by introducing EndNote Web, and NoodleBib and other adware/freemium clones cropped up in what is now again a crowded marketplace.
Mendeley, recently purchased by Elsevier, has gained fame by offering social media integration and and sharing cababilities. It notably works on the old Questia model of selling itself directly to individual users, not institutions. ProQuest is also putting the finishing touches on RefWorks Flow, which features similar collaboration tools.
The way these newer products allow users to share articles with peers raises interesting questions about them potentially being used as a new "Napster for subscription journals," especially since they are now both owned by major publishers. See my comment for some more philosophical questions....
If you’ve ever heard someone complaining that “this system doesn’t support double-byte characters”, or asking whether “this data’s in Unicode”, and felt as though you really ought to understand what those things mean, then this post is for you.
How ASCII Lost and Unicode Won...
Paul Solman speaks with Jaron Lanier, widely regarded as the father of virtual reality and the author of "Who Owns the Future?", about how big computers -- and the government and businesses they empower -- are creating more economic inequality.
"I'm not blaming Microsoft," said Cerf, who is Google's vice president and chief Internet evangelist. "What I'm saying is that backward compatibility is very hard to preserve over very long periods of time."
The data objects are only meaningful if the application software is available to interpret them, Cerf said. "We won't lose the disk, but we may lose the ability to understand the disk."
Good News Everyone... The Digital Divide has now been bridged by smartphones - the most advanced personal computing devices ever. While personal computers were disproportionally used by the rich, the white and the male, smartphones are more likely to be used by Blacks and Hispanics than Whites, and by girls as equally as boys.
Schmidt and Cohen authored a book - The New Digital Age