I started a new hobby: pointing out vulnerabilities for a particular man-in-the-middle attack. It is described in CVE-2009-3555: The TLS protocol, and the SSL protocol 3.0 and possibly earlier, as used in Microsoft Internet Information Services (IIS) 7.0, mod_ssl in the Apache HTTP Server 2.2.14 and earlier, OpenSSL before 0.9.8l, GnuTLS 2.8.5 and earlier, Mozilla […]
Canoe campsite view
I won’t forget this view soon, as part of a fantastic week of canoeing and surviving in Sweden between Gustavsfors and Bengtsfors.
I originally posted this as a question in the Coursera MOOC on Metadata’s discussion forums on 2014-07-30. So far I have received no written responses at all, but I did get 5 points (upvotes) for posting. I hope someone outside the MOOC may be able to answer and please correct me if I’m wrong. If […]
Uitgevers die bang zijn voor een lagere Impact Factor moeten hand in eigen boezem steken. Zeker uitgevers van wetenschappelijke tijdschriften die niet Open Access zijn, want zij helpen de afhankelijkheid van Thomson Reuters en de Journal Citation Reports® in de hand. Thomson Reuters legt op hun website uit hoe de simpele formule achter de IF […]
Claim uw prijs!
Beste vriend Dit is een persoonlijke e-mail gericht aan jou. Ik ben Ben, mijn vriend Ivar en ik heb een prijs van grote waarde, en hebben vrijwillig besloten om te doneren een groot deel van grote waarde aan jou als een deel van onze eigen goede doel project om het lot van 60 onbekende geluk […]
Claim your prize!
Dear friend This is a personal email directed to you. I’m Ben, my friend Ivar and I got a prize of great value, and have voluntarily decided to donate a large portion of great value to you as a part of our own charity project to improve the happiness of 60 unknown people plus 25 […]
If you do not like Elsevier’s misinterpretation of the Creative Commons licences, then stay away from the International Journal of Digital Library Services. Reviewing this journal was easy. (I was partially inspired by Jeffrey Beall’s list of things to look for to determine ‘predatoriness’.) The website features animated GIF images and other very general images […]
While I’m preparing for presenting standards for and certification of Trustworthy Digital Repositories in a workshop about preservation metadata, which is about demonstrating trustworthiness of DRs, others are discussing trust and quality too. (This is not an extensive or necessarily balanced review – this is what caught my attention.) Richard Smith asks how researchers can […]
Dear Cataloguing librarians, It is time to realise that using punctuation as a way of marking sub-field boundaries is bad practice. You must not want to put title and “responsible entity” in one field and then try to split the field contents using punctuation like ” / “. You must not want to use an […]
This is interesting: the CSV ontology to describe the columns of a CSV file and the file itself. I can definitely see the value in rich descriptions of CSV files, or spreadsheets in general. But I’m also really tempted to ask “if you use RDF for the file ‘header’, why not the ‘body’ too?” There […]