Categories
Academia Technology

Short review of “Spamming in Scholarly Publishing: A Case Study”

Interesting: a researcher, Marcin Kozak, gets a lot of unsollicited email (spam) trying to convince him to publish in a journal or with a publisher and decides to check out these journals and publishers. Kozak, M., Iefremova, O. and Hartley, J. (2015), Spamming in scholarly publishing: A case study. Journal of the Association for Information […]

Categories
Ideas Linked (Open) Data Technology

Terms of Semantics

From the “just throwing it out there” dept. in cooperation with the “I’m too lazy to do some research into existing efforts” dept. It is generally known that people rarely read all terms of use and privacy statements of all involved parties providing a service. South Park used that knowledge as a storyline in The […]

Categories
Ideas Technology

Email wish list

Things I might find interesting in an email client or environment. Raw thoughts. fast search search inside encrypted emails get related and linked stuff easily at any time during reading easily organise windows and content, e.g. when you select to reply to an email, put the draft next to the original so that you don’t […]

Categories
Technology

New hobby: “You’re vulnerable as in CVE-2009-3555”

I started a new hobby: pointing out vulnerabilities for a particular man-in-the-middle attack. It is described in CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla […]

Categories
Uncategorized

Canoe campsite view

I won’t forget this view soon, as part of a fantastic week of canoeing and surviving in Sweden between Gustavsfors and Bengtsfors.

Categories
Uncategorized

Can you really refine DC elements in HTML as explained in the Metadata MOOC?

I originally posted this as a question in the Coursera MOOC on Metadata’s discussion forums on 2014-07-30. So far I have received no written responses at all, but I did get 5 points (upvotes) for posting. I hope someone outside the MOOC may be able to answer and please correct me if I’m wrong. If […]

Categories
Technology

Uitgevers van closed-accesstijdschriften moeten niet zeuren

Uitgevers die bang zijn voor een lagere Impact Factor moeten hand in eigen boezem steken. Zeker uitgevers van wetenschappelijke tijdschriften die niet Open Access zijn, want zij helpen de afhankelijkheid van Thomson Reuters en de Journal Citation ReportsĀ® in de hand. Thomson Reuters legt op hun website uit hoe de simpele formule achter de IF […]

Categories
Uncategorized

Claim uw prijs!

Beste vriend Dit is een persoonlijke e-mail gericht aan jou. Ik ben Ben, mijn vriend Ivar en ik heb een prijs van grote waarde, en hebben vrijwillig besloten om te doneren een groot deel van grote waarde aan jou als een deel van onze eigen goede doel project om het lot van 60 onbekende geluk […]

Categories
Uncategorized

Claim your prize!

Dear friend This is a personal email directed to you. I’m Ben, my friend Ivar and I got a prize of great value, and have voluntarily decided to donate a large portion of great value to you as a part of our own charity project to improve the happiness of 60 unknown people plus 25 […]

Categories
Academia

Short review of the International Journal of Digital Library Services

If you do not like Elsevier’s misinterpretation of the Creative Commons licences, then stay away from the International Journal of Digital Library Services. Reviewing this journal was easy. (I was partially inspired by Jeffrey Beall’s list of things to look for to determine ‘predatoriness’.) The website features animated GIF images and other very general images […]