Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror

Comment: Re:several valid pushbacks from this article (Score 1) 194

by drDugan (#45030601) Attached to: Science Magazine "Sting Operation" Catches Predatory Journals In the Act

and two more

"Bohannon’s article is hostile. He submitted articles only to OA journals and by omission thereby erroneously links the failure of peer review to a single business model"
https://www.martineve.com/2013/10/03/whats-open-got-to-do-with-it/

"worthless travesty"
http://gavialib.com/2013/10/which-is-it/

Comment: several valid pushbacks from this article (Score 4, Informative) 194

by drDugan (#45030321) Attached to: Science Magazine "Sting Operation" Catches Predatory Journals In the Act

This article is being widely panned as lacking controls, published without any critical review, and driven by self-interest from a traditional publisher with the most to lose from Open Access taking off (as it is). Some have gone so far to assert it's an over-reach for how badly it was done, and will make Science as a journal look partisan.

For example, quick scan brought up these three scathing responses:

Mike Eisen (HHMI Berkeley Professor)
http://www.michaeleisen.org/blog/?p=1439

Peter Suber (Author of the book "Open Access", Director of the Harvard Open Access Project, Faculty Fellow at the Berkman Center)
https://plus.google.com/u/0/109377556796183035206/posts/CRHeCAtQqGq

Mike Taylor (programmer with Index Data and a research associate at the department of earth sciences, University of Bristol)
http://svpow.com/2013/10/03/john-bohannons-peer-review-sting-against-science/

I'm sure this will heat up some much needed debate about poor quality journals and the failings of peer review, but with the lack of any controls at all, it says basically nothing about open access as a model for publishing.

Education

+ - BitTorrent and Khan Academy to distribute eduction-> 1

Submitted by drDugan
drDugan (219551) writes "BitTorrent, Inc. announced this morning they launched a partnership with Khan Academy to distribute open education videos.

They launched with more than 2,000 videos, covering high school and college level curriculum, across science, math, history, finance and test prep. All the videos are free to download and open licensed with Creative Commons."

Link to Original Source

Comment: *sigh* (Score 0) 782

by drDugan (#34383848) Attached to: US Army Unveils 'Revolutionary' $35,000 Rifle

I know it's trite, but violence really isn't the answer. It has dramatic effects, and short terms it gets one ahead, but more often then not it causes more violence and hate back on the initiator.

While in a dangerous world, with dangerous people all around, having a military is essential, we also need to be spending much more on making the world a safer place with diplomacy and solutions, not with better and bigger weapons and endless wars.

Comment: that's not how copyright law works (Score 0) 724

by drDugan (#34313962) Attached to: <em>Witcher 2</em> Torrents Could Net You a Fine

as much as people would like to believe they are entitled to a given business, they are not. making a business work and making money are hard.

breaking the law is a crime, and if one proves that another has broken the law, there are extremely stiff penalties, especially for breaking the laws around copyright.

the law does not entitle the owners of copyright to a fine. that's just threats, and threatening your customers and the consumers of your product is bad business.

Comment: Re:It's not open source (Score 1) 406

by drDugan (#33819748) Attached to: G2 Detects When Rooted and Reinstalls Stock OS

I am in exactly this situation, and I'm NOT happy. I bought the G2 and the lockdowns are multiple and very annoying. I cannot delete any pre-loaded apps, including Amazon MP3, FaceBook, web2GO, and like 20 other branded apps, all sitting on there with the "uninstall" button grayed out. WTF? I was told point blank at time of sale: "This is stock Android 2.2". Totally not true.

I went back to the TMO store today to return it, only to find one rep at the store tell me flat out: just wait, and root it. This person said, "I can't wait until I can root mine. What we did is so annoying. They will figure it out, and it will be rooted." If not, I was told I have 30 days to send it back without penalty. If I can't control a computer I bought for $500, I most certainly will return it with a little fuck you to TMO going to everyone I know telling them of my experience. I got her card, and I'll be back in there on day 25 talking about rooting options or returns.

I hope TMO execs read this. I've been a loyal customer for 8 years.

Comment: Breaking! mlpm (Score 5, Insightful) 1042

by drDugan (#32503212) Attached to: 2 In 3 Misunderstand Gas Mileage; Here's Why

Breaking: In an astounding fit of partial international cooperation and scientific rationality, the US adopts a mostly metric measure of resource use: the milliliter per mile, or the mlpm

For example:
10MPG = 378 mlpm
20MPG = 189 mlpm
33MPG = 115 mlpm
50MPG = 76 mlpm
90MPG = 42 mlpm

The unit is linear, easy to understand, with numbers everyone can grasp (40-400 ish), and most important, it slowly creeps the US mind toward the metric system, one small step at a time! What a breakthrough! When the cars fly, we can try for using km, not miles.

Also, mlpm helps put the idea that gasoline is a great resource, to be used sparingly, by the milliliter, as opposed to "by the gallon" like 7eleven slurpies.

Sadly, in all seriousness, from TFA "Consumption instead of mileage? Nah. Dumb idea. Never work. [sigh]" Probably have to agree with this. Not because it's a dumb idea, but because Americans with the social and business systems in place have shown repeatedly that they will hold onto current ideas so strongly even in the face of overwhelming and obvious evidence showing them to be wrong. Only the real American idol will effect real change in the US system, the dollar.

Comment: ISP accountability (Score 2, Interesting) 95

by drDugan (#32492226) Attached to: Botnets Using Ubiquity For Security

It seems to me there is an accountability gap for ISPs. Those providing network connections are not held accountable for machines on their network. Yet another example of prices and business practices not matching the real costs of activities.

To me, I would think the real solution, long term, to fixing botnets is creating a tight loop with internal scanning, reporting, warnings, verification, and then turning off Internet connection to machines that are infected. ISPs will need to be "motivated" to take responsibility for actions taken on their network, and they will have to have fully automated systems that take infected machines offline.

It doesn't seem like this is a priority for ISPs yet. Its easier and cheaper to simply ignore the problem.

Comment: wow (Score 1) 526

by drDugan (#32215158) Attached to: Judge Orders Gizmodo Search Warrant Unsealed

After reading over the pdf, "Witness Katerine Martinson" seems like a complete and total douchbag / asshole.

Repeatedly calling police to tattle on her roommate, actively trying to "catch them" in the act of "removing evidence" (which wasn't evidence at the time)... taking pictures and sending them to the police! - all total BS behavior. Then letting police officers into their home to search their place, again trying actively to fuck over her roommate. Then providing license and vehicle information to the police about the roommates, so the police can hunt them down. With enemies like that living with you, you're totally screwed.

Then HIS OWN FATHER let the police into his home. Are these people totally and completely insane? Stupid? Brainwashed? I can't understand it.

Immediately after all that, the police office starts seizing his property.

http://www.youtube.com/watch?v=6wXkI4t7nuc
http://www.youtube.com/watch?v=08fZQWjDVKE

Comment: nonlocal results and human weak links (Score 4, Insightful) 45

by drDugan (#32197032) Attached to: Position-Based Quantum Cryptography Proved Secure

The position based exchange, of individual qubits, as describing in TFA is for key exchange, leading to a one-time pad . The interesting thing is that once the one time pad is securely created and delivered, the locality is then longer restricted, the " can then be used to send a perfectly secure message" from TFA can then be anywhere.

But from a security point of view, this is nice, but a major part of security holes don't come from technology, they come from personnel and the ability to trick people. Unless you completely restrict the physical location of the people, information encrypted this "perfect" technology still falls prey to human foibles. As stated in TFA " theoretical security is not the same as practical security"

Comment: financial fraud? (Score 5, Insightful) 215

by drDugan (#32186826) Attached to: FBI To Prosecute "Money Mules"

So let's make sure we're all clear: The FBI, the federal US law enforcement, is cracking down on financial fraud. Great.

They are going after dumb people who set up a bank account to launder a couple thousand dollars?

But they're not going after institutional traders who now offer co-location services with enhanced market data feeds, fueling high frequency trading? They are not going after the banking cartels who manipulate the whole economy? They are not going after Paypal for (among numerous things) blatantly lying about international exchange rates? or on and on and on from examples of large, institutionalized financial fraud?

All the simple programs have been written.

Working...