6915
Research Object Bundle: a file format for storage and distribution of Research Objects as a ZIP archive
> This specification defines a file format for storage and distribution of Research Objects as a ZIP archive; called a Research Object Bundle (RO Bundle). RO Bundles allow capturing a Research Object to a single file or byte-stream by including its manifest, annotations and some or all of its aggregated resources for the purposes of exporting, archiving, publishing and transferring research objects.
yesterday
Cree 4 Flow LED Bulb Review and Teardown: race to the bottom, 2nd entrant [compared to Philips SlimStyle] | YouTube
Cree 4 Flow LED Bulb Review and Teardown: race to the bottom, 2nd entrant [compared to Philips SlimStyle] | YouTube
2 days ago
Launching in 2015: A Certificate Authority to Encrypt the Entire Web | Electronic Frontier Foundation
Today EFF is pleased to announce Let’s Encrypt, a new certificate authority (CA) initiative that we have put together with Mozilla, Cisco, Akamai, Identrust, and researchers at the University of Michigan that aims to clear the remaining roadblocks to transition the Web from HTTP to HTTPS.
3 days ago
Photographing Europe's Abandoned Border Crossings | CityLab
After nearly 20 years of passport-free travel in parts of Western and Central Europe, many former checkpoints resemble ghost towns.
4 days ago
Hospitals race to sign up schools for athletic-training and medical-services | Columbus Dispatch
Ohio State University’s new athletic-training and medical-services agreement with Upper Arlington schools is upping the ante in the bidding war among central Ohio’s hospital systems, which are seeking greater access to high-school athletes and their families.
4 days ago
Does football still have a place at the university? [opinion] ~ Detroit Free Press
The long-term physical effects, plus questions about academic payoff for athletes means it's time to re-think where football fits at Michigan.
4 days ago
Top 10 Causes of Death: 1900 vs. 2010. Top 10 Causes of Death: 1900 vs. 2010; The Burden of Disease and the Changing Task of Medicine — NEJM
Perspective from The New England Journal of Medicine — The Burden of Disease and the Changing Task of Medicine
4 days ago
Amazon Wins Auction for .Book Domain | Publishers Weekly
Despite opposition from the AAP, Amazon.com has won the right to operate the .book top-level domain name in a private auction.
book 
8 days ago
Untitled (https://deals.tuaw.com/giveaways/the-golden-apple-giveaway?gid=792778)
Just entered to win a gold iPad Air 2 + gold iPhone 6. Enter here... via
from twitter
8 days ago
A Proper Server Naming Scheme | Codeship blog
Server Naming Schemes need to be scalable and unique. This article is the ultimate guide to easily remembering and naming your servers.
10 days ago
Darkhotel offers yet another reason not to use hotel Wi-Fi | PandoDaily
RT : Uh, great. Darkhotel offers yet another reason not to use hotel Wi-Fi
from twitter
10 days ago
Net Neutrality: President Obama's Plan for a Free and Open Internet | The White House
RT : I'm urging the to keep the internet open and free. Here's my plan to protect for everyone: –bo
NetNeutrality  from twitter
11 days ago
How I write software | Programming is Terrible
I like to think I write good code, or that I write more good code than bad code. My favourite property of good code is boredom. Dull statements one after another, no surprises, no...
12 days ago
DARPA funds $11 million tool that will make coding a lot easier | Engadget
DARPA is funding a new project by Rice University called PLINY, and it's neither a killer robot nor a high-tech weapon. PLINY, named after Pliny the
12 days ago
Happy 100th birthday Hedy Lamarr, inventor of the wireless network | Una Sinnott
Hedy Lamarr, whose acting career spanned Hollywood’s golden age of the forties and fifties, was widely regarded as one of the most beautiful women to grace the silver screen. However she was much, much more than just a pretty face. As an inventor, Hedy Lamarr was responsible for developing the technology that underpins today’s wireless …
12 days ago
How Did The FBI Break Tor? [in breaking Silk Road 2.0] | Forbes
Global law enforcement conducted a massive raid of the Dark Web this week. It started with the FBI takedown of Silk Road 2.0 and the arrest of its alleged operator Blake Benthall in San Francisco on Wednesday. But it quickly exploded from there, as European counterparts seized over 400 black market 'hidden [...]
13 days ago
Go To Hellman: If your website still uses HTTP, the X-UIDH header has turned you into a snitch
RT : From last night: "If your website still uses HTTP, the X-UIDH header has turned you into a snitch"
from twitter
15 days ago
How I Reverse Engineered Google Docs To Play Back Any Document’s Keystrokes | James Somers blog
How James Somers reverse-engineered Google Docs to play back any document's keystrokes
15 days ago
Where’ve you been? Your smartphone’s Wi-Fi is telling everyone | Ars Technica
Ars performs a DIY signals intelligence teste with smartphone "probe" requests.
15 days ago
Adobe's e-reader software collects less data now, EFF says | NetworkWorld
Digital Editions 4.0.1 doesn't send data on e-books without DRM and uses encryption
book 
18 days ago
The Green Monster How the Border Patrol became America’s most out-of-control law enforcement agency | POLITICO Magazine
Gil Kerlikowske was hoping to make it through at least his first week on the job without being awakened in the middle of the night. President Barack Obama’s new head of Customs and Border Protection, Kerlikowske could have used a week of quiet as he began to figure out the nation’s largest law enforcement agency, with its 46,000 gun-carrying...
19 days ago
Building Libraries Together: New Tools for a New Direction | Internet Archive blog
Building Libraries Together: New Tools for a New Direction | Internet Archive blog
20 days ago
Simple test page for Cellular ISP tracking beacons - by Kenn White
Simple test page for Cellular ISP tracking beacons - by Kenn White
20 days ago
The Privacy Lowdown On Verizon and AT&T's Smartphone 'Permacookies' | Forbes
This week, researchers discovered that smartphone carriers have started inserting a unique code into their customers' network activity so that their customers can be tracked as they browse the Web and use smartphone apps; Verizon uses a customer's unique tag to deliver personalized ads to users, and AT&T plans to [...]
20 days ago
Somebody’s Already Using Verizon’s ID to Track Users | ProPublica
Twitter is using a newly discovered hidden code that the telecom carriers are adding to every page you visit – and it's very hard to opt out.
20 days ago
osquery: SQL powered operating system instrumentation and analytics
osquery: SQL powered operating system instrumentation and analytics
21 days ago
Are Online Vendors Giving You Their Best Price? Maybe Not, Research Says [and is this different from non-online?] | Wall Street Journal
A new study found that e-commerce sites vary online pricing depending on whether customers use mobile or desktop devices, iOS or Android, and other factors.
21 days ago
Happy 45th Birthday, Internet! | Gizmodo
Happy birthday, Internet! You may be turning 45 today, but we swear you don't look a day over 30. And not to embarrass you, but we thought we'd celebrate by sharing some of your baby photos. Or, more accurately, perhaps some of your sonograms.
22 days ago
In Open Access Publishing There Are No Free Lunches….. but it is really really cheap. | Doug's Archaeology
In Open Access Publishing There Are No Free Lunches….. but it is really really cheap. | Doug's Archaeology
from twitter
26 days ago
In Open Access Publishing There Are No Free Lunches….. but it is really really cheap. | Doug's Archaeology
In my last post, I mentioned that not all Open Access publishing involves authors paying $2,000. In fact, many journals neither charge the authors or readers and if they do some will waive fees. This led to this very thoughtful comment from Anders- "Excellent that there are OA publishers that do not charge the authors…
26 days ago
Why companies that rely on open-source projects must insist on a strong, enforceable code of conduct | Gigaom
With strong personalities at play and a lack of any legal recourse, companies involved with open-source projects may get more than they bargain for when harassment and even death threats occur. But in these situations, it may help to have an enforceable code of conduct to stop problems before they happen.
26 days ago
Google's fully driverless car looking less realistic by the day | NetworkWorld
It's starting to look like the driverless car might not look like we had once hoped.
27 days ago
Librarians Are Dedicated to User Privacy. The Tech They Have to Use Is Not. | Slate
Adobe has made it extremely easy for unwanted eyes to read over the shoulders of library patrons. Last week reports surfaced about how Adobe’s Digital Editions e-book software collects and transmits information about readers in plain text. That insecure transmission allows the government, corporations, or potential hackers to intercept information...
book 
28 days ago
What Role Does Technology Play in Record Levels of Income Inequality? | MIT Technology Review
The disparity between the rich and everyone else is larger than ever in the United States and increasing in much of Europe. Why?
4 weeks ago
Douchebag: The White Racial Slur We’ve All Been Waiting For | Medium
by Michael Mark Cohen “The white folks had sure brought their white to work with them that morning.” Chester Himes, If …
4 weeks ago
‘Unlawful’ WiFi hotspot blocking ruling highlights academic IT headaches | NetworkWorld
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots – the sort that provide wireless data access from the same -- it’s not the best of times.
4 weeks ago
"If systemd will be substituting sysvinit in Debian, we will fork the project and create a new distro."
A website made by Veteran Unix Admins to organize and protest against the decision to impose SystemD to Debian users.
4 weeks ago
Adobe, Privacy and the Big Yellow Taxi | Go To Hellman
Adobe, Privacy and the Big Yellow Taxi | Go To Hellman
4 weeks ago
Free Music Downloads Online for Educational Use | Royalty Free Music
Free Music Downloads Online for Educational Use | Royalty Free Music
audio  free 
5 weeks ago
Free Music Archive: an interactive library of high-quality, legal audio downloads
Free Music Archive: an interactive library of high-quality, legal audio downloads
audio  creativecommons 
5 weeks ago
fedora4vagrant: Simple setup for fedora commons 4 and Vagrant | GitHub
fedora4vagrant: Simple setup for fedora commons 4 and Vagrant | GitHub
5 weeks ago
Quora Keeps the World's Knowledge For Itself
RT : Until unblocks the Internet Archive, I won't be contributing to them further. Why it's important:
from twitter
5 weeks ago
Notes From A Boner | Captain Awkward
I wrote this to maybe read at last night's (EPIC!) Story Club, but the name-draw for open mic slots did not go my way. Still, I didn't want it to go to waste. So here, without ado (and without comments enabled , b/c it's a performance piece, not a discussion piece) you go. Notes From A…
5 weeks ago
Well Sorted - "Card Sorting tools for research and industry, allowing you to organise your world."
Well Sorted - "Card Sorting tools for research and industry, allowing you to organise your world."
5 weeks ago
“The Fifth ‘S’ – Strategy” or “Why We Must Proceed with KualiCo” [Foundation board member view] | Kuali 2.0 Blog
“The Fifth ‘S’ – Strategy” or “Why We Must Proceed with KualiCo” [Foundation board member view] | Kuali 2.0 Blog
5 weeks ago
Week #5 and I’m Still Listening | Kuali 2.0 Blog
Week #5 and I’m Still Listening | Kuali 2.0 Blog
5 weeks ago
At Educause conference, Kuali leaders attempt to assure college leaders about shifts | Inside Higher Ed
At Educause conference, Kuali leaders attempt to assure college leaders about shifts | Inside Higher Ed
5 weeks ago
KualiCo acquires rSmart to boost hosting capabilities | Inside Higher Ed
KualiCo acquires rSmart to boost hosting capabilities | Inside Higher Ed
5 weeks ago
Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online | Techdirt
Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online | Techdirt
from twitter
5 weeks ago
Revealed: ISPs Already Violating Net Neutrality To Block Encryption And Make Everyone Less Safe Online | Techdirt
ISPs Are Throttling Encryption, Breaking Net Neutrality And Making Everyone Less Safe | TechDirt
from twitter
5 weeks ago
Password Security: Why the horse battery staple is not correct | diogomonica
Password Security: Why the horse battery staple is not correct | diogomonica
5 weeks ago
What's CoreOS? An existential threat to Linux vendors | InfoWorld
By changing the meaning of a Linux distribution, CoreOS is making life difficult for Red Hat, Canonical, and the rest
5 weeks ago
Kuali Student Sunsetting $40 million project, moving to KualiCo | Phil Hill on e-Literate
The changes with Kuali are accelerating, and there are some big updates on the strategy. Earlier this week the Kuali Foundation distributed an Information Update obtained by e-Literate on many of the details of the transition to Kuali 2.0 and the … Continue reading →
5 weeks ago
Correcting Misinformation on the Adobe Privacy Gusher | Go To Hellman
Correcting Misinformation on the Adobe Privacy Gusher | Go To Hellman
6 weeks ago
Lessons from Swets: Libraries Need Subscription Security | Peer to Peer Review
I participated in a series of meetings last week to determine how the Duke Libraries would respond to the bankruptcy filing made by subscription agent Swets. We have been through this before, when Faxon/RoweCom failed, and many libraries lost a lot of money. Unfortunately, more money is going to be lost this time around. Perhaps it is time for us to think about how we got into this situation——and how to make sure we never end up back here again.
6 weeks ago
Not Your Mother's Library - The Atlantic
Not Your Mother's Library [on the Columbus Ohio library system] | The Atlantic
from twitter
6 weeks ago
Not Your Mother's Library [on the Columbus Ohio library system] | The Atlantic
How Columbus, Ohio, is building community spaces for the 21st century
6 weeks ago
Usus: a community website offering help on COUNTER/SUSHI library usage standards
Usus: a community website offering help on COUNTER/SUSHI library usage standards
6 weeks ago
New and Old: Serious Reader Privacy Concerns Both Inside and Outside the Library | InfoDocket
UPDATE 2 October 7 (8:00 pm) Adobe just provided us with the portion of the End User License Agreement (EULA) that appears when you install the software that they say is most relevant to today s story. Full text below. UPDATE October 7 (5:30 pm) At the bottom of this post you ll find the full text of a statement released by Adobe about the Digital Editions story.
6 weeks ago
ADE4_and_overdrive - Andromeda_Y's library
RT : Downloaded Wireshark, ADE4, and a public library ebook. Went to see what I could see.
from twitter
6 weeks ago
Adobe is Spying on Users, Collecting Data on Their eBook Libraries | The Digital Reader
Adobe is Spying on Users, Collecting Data on Their eBook Libraries | The Digital Reader
6 weeks ago
Is Encrypting Phones OK? | Tim Bray
Is Encrypting Phones OK? | Tim Bray
6 weeks ago
The Andrew W. Mellon Foundation
RT : Mellon has a new Web site at with a searchable grants database and a summary of our strategic plan. Feedback welcome.
from twitter
6 weeks ago
« earlier      
access accessibility advertising agile ajax ala ala12 ala2007 alamw10 amazon amazon_ec2 apache api apple architecture audio barcode blog book browser business career citation cloudcomputing cmh code4lib collaboration color commerce comparison conference copyright creativecommons css culture data database datamining description design development digital digital_libraries digitization directory discovery disruption disruptive dltj dns dpla dr drc drm drupal dspace ebook ebooks eclipse economics education ejb3 ejournal email encryption etextbook facebook fedora fedora_dr finance firefox flash flying foss4lib frbr free funstuff future gbs gentoo google googlebooksearch government graphics gtd hardware hcod highered history howto html html5 http humor identifier iii ils imaging innovation internet internetarchive interview j2ee j2karclib java javascript jisc jpeg2000 kindle koha legal legislation libraries library library2.0 library20 librarysoa licensing linkeddata linux lita litaforum loc maps marc marketing mashup metadata metasearch microformats mobile monitoring mswindows music mysql networking news ngc4lib niso oai oaiore oclc odcecon ohiolink opac open openaccess openlibrary opensource osx paper pdf perl pgp phone photography photoshop php pipa politics presentation preservation printondemand privacy productivity programming protect-ip publishers publishing python rdf reference repair repository research resource resourcesync rest retail rootstrikers sakai scalability schoss science screencast seam search searchengine security semanticweb service shibboleth soa socialmedia socialnetworking software sopa source spam specification standards statistics storage streaming subversion support sysadmin tedtalk television textbook tools travel trends tutorial twitter unconference univsysohio unread usability utilities video visualization weather web web2.0 webarchitecture webdesign webdev webservices wikipedia wireless wordpress worldcat writing xml xslt

Copy this bookmark:



description:


tags: