"Open Data Excuse" Bingo
We might want to use it in a paper People may misinterpret the data Thieves will use it There's no API
I don't mind, but someone else might Lawyers want a custom License It's too complicated We will get too many enquiries
It's too big Terrorists will use it Poor Quality There's already a project to...
What if we want to sell it later It's not very interesting Data Protection We'll get spam
For open data teams; print out a copy and put it on your office wall. Cross out each excuse people give you. There are no prizes, but you can tweet "bingo! #openDataExcuses" if you think it might make you feel better
Generate your own bingo grids at http://data.dev8d.org/devbingo/
The rise of artificial intelligence has recently led to bots writing real news stories about sports, finance and politics. As yet, bots have not turned their attention to science, but the changes AI bots could unleash in science writing are remarkable.
We are proud to announce the beta release series of JupyterLab, the next-generation web-based interface for Project Jupyter. Project Jupyter exists to develop open-source software, open standards…
For what reasons do academics follow one another on Twitter? Robert Jäschke, Stephanie B. Linek and Christian P. Hoffmann analysed the Twitter activity of computer scientists and found that while the quality of information provided by a Twitter account is a key motive for following academic colleagues, there is also evidence of a career planning motive. As well as there being reciprocal following between users of the same academic status (except, remarkably, between PhD researchers), a form of strategic politeness can be observed whereby users follow those of higher academic status without necessarily being followed back. The emerging academic public sphere facilitated by Twitter is largely shaped by dynamics and hierarchies all too familiar to researchers struggling to plot their careers in academia.
“All these papers were deliberately bad. They were created with the purpose of exposing exploitative publishing practices. That is, the works collected here were sting operations on predatory journals.” So says the introduction to the book Stinging the Predators: A collection of papers that should never have been published, assembled by Zen Faulkes.
B. Schaefermeier, T. Hanika, and G. Stumme. Proceedings of the 16th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, ACM, (November 2019)
M. Stubbemann, T. Hanika, and G. Stumme. Advances in Intelligent Data Analysis XVIII - 18th International Symposium on Intelligent Data Analysis, IDA 2020, Konstanz, Germany, April 27-29, 2020, Proceedings, volume 12080 of Lecture Notes in Computer Science, page 496--508. Springer, (2020)