"Open Data Excuse" Bingo
We might want to use it in a paper People may misinterpret the data Thieves will use it There's no API
I don't mind, but someone else might Lawyers want a custom License It's too complicated We will get too many enquiries
It's too big Terrorists will use it Poor Quality There's already a project to...
What if we want to sell it later It's not very interesting Data Protection We'll get spam
For open data teams; print out a copy and put it on your office wall. Cross out each excuse people give you. There are no prizes, but you can tweet "bingo! #openDataExcuses" if you think it might make you feel better
Generate your own bingo grids at http://data.dev8d.org/devbingo/
The rise of artificial intelligence has recently led to bots writing real news stories about sports, finance and politics. As yet, bots have not turned their attention to science, but the changes AI bots could unleash in science writing are remarkable.
We are proud to announce the beta release series of JupyterLab, the next-generation web-based interface for Project Jupyter. Project Jupyter exists to develop open-source software, open standards…
For what reasons do academics follow one another on Twitter? Robert Jäschke, Stephanie B. Linek and Christian P. Hoffmann analysed the Twitter activity of computer scientists and found that while the quality of information provided by a Twitter account is a key motive for following academic colleagues, there is also evidence of a career planning motive. As well as there being reciprocal following between users of the same academic status (except, remarkably, between PhD researchers), a form of strategic politeness can be observed whereby users follow those of higher academic status without necessarily being followed back. The emerging academic public sphere facilitated by Twitter is largely shaped by dynamics and hierarchies all too familiar to researchers struggling to plot their careers in academia.
“All these papers were deliberately bad. They were created with the purpose of exposing exploitative publishing practices. That is, the works collected here were sting operations on predatory journals.” So says the introduction to the book Stinging the Predators: A collection of papers that should never have been published, assembled by Zen Faulkes.
J. Huang, Z. Zhuang, J. Li, и C. Giles. Proceedings of the 2008 International Conference on Web Search and Data Mining, стр. 107--116. New York, NY, USA, ACM, (2008)
T. Crook, B. Frasca, R. Kohavi, и R. Longbotham. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, стр. 1105--1114. New York, NY, USA, ACM, (2009)
S. Pujari, A. Hadgu, E. Lex, и R. Jäschke. Proceedings of the 15th International Conference on Knowledge Technologies and Data-driven Business, New York, NY, USA, ACM, (2015)