Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×

Comment Re: wait (Score 4, Informative) 259

It isn't clear here whether the papers in question were the pre- or post-editing versions

They are going after the final, published versions (including Elsevier formatting and all), commercial use of accepted manuscripts, systematic distribution and the like (some of which applies to academia.edu). In other words, what you said was fair game still is - you are allowed to share the accepted manuscript with others (including on your website where Google Scholar will pick it up and render it discoverable in a matter of days, so it's not like this restricts you), you (or anyone else) just can't make money off it and you can't use their typesetting.

For the accepted manuscript version, let me just quote from Elsevier's author rights:

Elsevier believes that individual authors should be able to distribute their AAMs for their personal voluntary needs and interests, e.g. posting to their websites or their institutionâ(TM)s repository, e-mailing to colleagues. However, our policies differ regarding the systematic aggregation or distribution of AAMs to ensure the sustainability of the journals to which AAMs are submitted. Therefore, deposit in, or posting to, subject-oriented or centralized repositories (such as PubMed Central), or institutional repositories with systematic posting mandates is permitted only under specific agreements between Elsevier and the repository, agency or institution, and only consistent with the publisherâ(TM)s policies concerning such repositories. Voluntary posting of AAMs in the arXiv subject repository is permitted.

So you can see how academia.edu falls foul of this while your right to share your work does not.

(Some of my papers are published in Elsevier journals - they are however also all open access. In case you're wondering.)

Comment Re: Never gonna happen. (Score 1) 472

Having the automated car set up in a manner that it won't drive into situations it gauges to be high risk, and it offers control to the driver or pulls over to the next safe location and stops isn't hard.

Hi, some of my research is in human/car interaction and work closely with people who spend a lot of time thinking about just the problem you dismiss as not hard. It is incredibly hard. Imagine you have an unforeseen emergency (only considering foreseeable risks and avoiding them like you seemed to imply isn't very useful) arising from a complex situation and, let's be generous, 10 seconds before everyone dies to hand control back to the human who, at this moment is maybe asleep or reading the newspaper while sipping his tea. He has no clue at this point what is going on. How exactly do you not only get him in control but make sure he has the complete overview of the situation, including where and what the danger is exactly, so that he can react appropriately in the time remaining? Until there is an answer to that, until we can be sure that a human can always retake control if needed, no matter what, automated vehicles are going nowhere. And if that means the driver will continue to have to pay attention throughout, then so be it. And this is why handing control back to the driver is one of the really big research areas in automated vehicles right now.

Comment Re:Security (Score 4, Interesting) 114

I suppose the one worry is that if someone has the ability to impersonate your e-mail and has access to your friends list, he could then impersonate you and ask *all* your friends for codes. The attacker doesn't need to know who the trusted friends are since your circle of friends would not easily be able to detect that everyone's been contacted. The attacker may mine the publicly available info on the friends to personalise the message a bit, if not, keep it short and very simple. It's not like this request would come in a long personal message anyway. It IS likely that it will come by e-mail though since you'll already be at the computer, trusted friends may be around the globe and so on. In short, you need your friends to be capable of detecting an impersonation attempt, even if brief and potentially conveying a sense of urgency. Remember, your trusted friends may be the same people who click on links that appear to be from you *because* they trust you. So in summary, while I do think this is pretty neat, I also wonder if this is not rather vulnerable to social engineering (perhaps not so much among the /. crowd - but generally)?

Comment Never (Score 5, Interesting) 255

It used to be all the time. I was running windows and so was everyone else. I eventually switched completely to Linux (and started using the "I don't use windows anymore, no clue"... excuse) but that didn't stop the tech support calls.

Moving the family to OSX however did. That was 3 years ago and there has not been a single tech support issue since then.

Comment Additional conditions (Score 5, Insightful) 467

Not to disagree with anything in the paper and certainly not with the message, but personally, I would definitely have wanted to see at least one more condition: same resumes with no names at all. That should give nice baseline against which to compare both conditions (e.g. are female salaries marked down or are male salaries marked up).

Also, I wonder what would happen if one were to replace the names with simply an indication of gender (male/female). Unlike the neutral condition, I don't think this would improve the study... I'm just curious if the gender is enough or if there's something specific about reading male vs female names.

Comment Re:For God's Sake (Score 5, Interesting) 160

I'm a scientist. I write papers that are published in academic journals and I review such papers for journals. Journals use editorial managers to, well, manage, the entire process and you'd be surprised how often those send out automated e-mails that, helpfully, contain my login and password IN PLAINTEXT, just in case I might have forgotten (even if I did not request the password).

In general terms, if you use a website that is able to remind you of your password if you forgot, consider that password known to the world and all other accounts that use the same or a similar password at high risk of being compromised.

Oh and I have an Obligatory XKCD too.

Comment Re:Comments in here are one of three categories (Score 1) 544

I see your 1 and 1b and raise you:

1c Heart: to be implanted alongside my existing one so I can go to Dr Who conventions and freak the crap out of them (alt: get laid by the Amy / Rose lookalikes).

(and for other the /. angle: I do wonder what hooking up a second heart would actually do to a human - assuming it was hooked up correctly (for whatever definition of "correctly" makes sense here) and space wasn't an issue.)

Submission + - Selling used software licenses legal in Europe, even if downloaded

teslar writes: The Court of justice of the European Union has ruled that An author of software cannot oppose the resale of his "used" licences allowing the use of his programs downloaded from the internet (PDF). This follows a legal battle between German company UsedSoft (which does just that) and Oracle. From the press release: "By its judgment delivered today, the Court explains that the principle of exhaustion of the distribution right applies not only where the copyright holder markets copies of his software on a material medium (CD-ROM or DVD) but also where he distributes them by means of downloads from his website" (the principle of exhaustion of the distribution right means that "A rightholder who has marketed a copy in the territory of a Member State of the EU loses the right to rely on his monopoly of exploitation in order to oppose the resale of that copy").

Comment Moth eye coating (Score 3, Informative) 112

Philips has a television with a moth-eye coating (just that though; not a combination with other coatings as in Sony's approach) available. Just read the review this morning. Seems a bit fragile though - I wonder if this will also apply to Sony's new film (I guess it won't since that'd be rubbish on a smartphone, but TFA does not actually address it):

Amazingly, it works - but thereâ(TM)s a caveat. The filter requires extreme care, so much so that Philips supplies a proprietary cleaning solution to remove any thumbprint smudges. This fragility makes the screen a questionable purchase for those with young families.

Slashdot Top Deals

"When the going gets tough, the tough get empirical." -- Jon Carroll

Working...