Forgot your password?

+ - Machine-Learning Algorithm Ranks the World's Most Notable Authors

Submitted by (3830033) writes "Every year the works of thousands of authors enter the public domain, but only a small percentage of these end up being widely available. So how do organizations such as Project Gutenberg choose which works to focus on? Allen Riddell has developed an algorithm that automatically generates an independent ranking of notable authors for any given year. It is then a simple task to pick the works to focus on or to spot notable omissions from the past. Riddell’s approach is to look at what kind of public domain content the world has focused on in the past and then use this as a guide to find content that people are likely to focus on in the future.

Riddell’s algorithm begins with the Wikipedia entries of all authors in the English language edition (PDF)—more than a million of them. His algorithm extracts information such as the article length, article age, estimated views per day, time elapsed since last revision, and so on. This produces a “public domain ranking” of all the authors that appear on Wikipedia. For example, the author Virginia Woolf has a ranking of 1,081 out of 1,011,304 while the Italian painter Giuseppe Amisani, who died in the same year as Woolf, has a ranking of 580,363. So Riddell’s new ranking clearly suggests that organizations like Project Guttenberg should focus more on digitizing Woolf’s work than Amisani’s. Of the individuals who died in 1965 and whose work will enter the public domain next January in many parts of the world, the new algorithm picks out TS Eliot as the most highly ranked individual. Others highly ranked include Somerset Maugham, Winston Churchill, and Malcolm X."

+ - Dealing with VOIP Fraud/Phising Scams 1

Submitted by Anonymous Coward
An anonymous reader writes "I run the IT department for a medium-sized online retailer, and we own a set of marketing toll-free numbers that route to our VOIP system for sales. Yesterday we began receiving dozens and now hundreds of calls from non-customers claiming that we're calling out from our system and offering them $1 million in prizes and asking for their checking account details (a classic phishing scheme).

After verifying that our own system wasn't compromised, we realized that someone was spoofing the Caller ID of our company on a local phone number, and then they were forwarding call-backs to their number to one of our 1-800 numbers.

We contacted the registered provider of the scammer's phone number, Level3, but they haven't been able to resolve the issue yet and have left the number active (apparently one of their sub-carriers owns it). At this point, the malicious party is auto-dialing half of the phone book in the DC metro area and it's causing harm to our business reputation.

Disabling our inbound 800 number isn't really possible due to the legitimate marketing traffic. Does Slashdot have any suggestions?"

Comment: Re:spittake (Score 1) 74

by Z00L00K (#48396605) Attached to: Machine Learning Used To Predict Military Suicides

If it's possible to find persons at risk and counter their behavior it's good. Most interesting are the high-skilled persons that joins late. It's not easy to put a diagnosis straight on each case, and if someone is depressed the cause may vary, ranging from bipolar disorder to post traumatic stress reaction and adrenaline junkies.

Sudden relief from stress to a mode of passivity can be highly problematic for some persons.

Comment: Re:Call Comcast? (Score 1) 404

by Z00L00K (#48380121) Attached to: Ask Slashdot: How To Unblock Email From My Comcast-Hosted Server?

They are likely to use some kind of block list service. So if you can find out which service that they are using you can get on.

There is also a possibility that Comcast do a "man in the middle" intervention on your mail traffic that you aren't aware of yet. Check the IP addresses that can be involved, and if you have account on servers elsewhere it might help.

But often whole net blocks are marked as dynamic addresses in anti-spam services even though they aren't.

+ - Microsoft closes '19-year-old' vulnerability with emergency patch->

Submitted by IgnitusBoyone
IgnitusBoyone (840214) writes "Given recent discussions on bash and openssl it seemed that many of our fellow posters ignored that long term vulnerabilities exist in all software open or closed. The main difference in open vs closed source seems to be the length at which the development teams can keep zero-day bugs secret. One wonders if it is better to keep these zero-day vulnerabilities secret for long periods of time making things like the Struxnet virus possible or if open acknowledgment and rapid response is the preferred method as we saw with shell shock."
Link to Original Source

Comment: Re:MS Office Incompatibility (Score 1) 170

by Z00L00K (#48366145) Attached to: What Happens When Nobody Proofreads an Academic Paper

That's why you have some review features of a document.

However it is proven earlier that even deleted text often lingers around in the Microsoft Document file format, so the only way to make sure that you come clean is to only publish as a PDF.

In addition to this - use some kind of "keyword" in your texts for sections that you need to revisit when writing. Use a word that's unlikely to be in the final document that you can search for.

And even when you write - don't use words like "crappy" unless actually referring to fecal matter, use a more civil word like "questionable".

I'm all for computer dating, but I wouldn't want one to marry my sister.