background preloader

The Digital Object Identifier System

The Digital Object Identifier System
Related:  acallai

Página Inicial da Biblioteca Digital Mundial Science Commons The more we understand about science and its complexities, the more important it is for scientific data to be shared openly. It’s not useful to have ten different labs doing the same research and not sharing their results; likewise, we’re much more likely to be able to pinpoint diseases if we have genomic data from a large pool of individuals. Since 2004, we’ve been focusing our efforts to expand the use of Creative Commons licenses to scientific and technical research. Science Advisory Board Open Access The Scholars’ Copyright Project Creative Commons plays an instrumental role in the Open Access movement, which is making scholarly research and journals more widely available on the Web. We’re also expanding Open Access to research institutions. We’ve created policy briefings and guidelines to help institutions implement Open Access into their frameworks. Open Data At Creative Commons, we believe scientific data should be freely available to everyone. Learn more

Amazon Standard Identification Number The Amazon Standard Identification Number (ASIN) is a 10-character alphanumeric unique identifier assigned by Amazon.com and its partners for product identification within the Amazon.com organization.[1] Amazon.ca,[1] Amazon.co.uk,[2] Amazon.de,[3] Amazon.fr,[4] Amazon.it,[5] Amazon.co.jp,[6] Amazon.cn,[7] and Amazon.es[8] also use ASINs. Although ASINs used to be unique worldwide, global expansion has changed so that ASINs are only guaranteed unique within a marketplace. The same product may be referred to by several ASINs though, and different national sites may use a different ASIN for the same product. In general, ASINs are likely to be different between the country sites unless they are for a class of product where the ASIN is based on an externally defined and internationally consistent identifier, such as ISBN for books. Each product sold on Amazon.com is given a unique ASIN. ASIN in Amazon URLs[edit] References[edit]

Researcher cracks Wi-Fi passwords with Amazon cloud A security researcher has tapped Amazon's cloud computing service to crack Wi-Fi passwords in a fraction of the time and for a fraction of the cost of using his own gear. Thomas Roth of Cologne, Germany told Reuters he used custom software running on Amazon's Elastic Compute Cloud service to break into a WPA-PSK protected network in about 20 minutes. With refinements to his program, he said he could shave the time to about six minutes. With EC2 computers available for 28 cents per minute, the cost of the crack came to just $1.68. “People tell me there is no possible way to break WPA, or, if it were possible, it would cost you a ton of money to do so,” Roth told the news service. Roth is the same researcher who in November used Amazon's cloud to brute force SHA-1 hashes. As the term suggests, brute force cracks are among the least sophisticated means of gaining unauthorized access to a network.

SweoIG/TaskForces/CommunityProjects/LinkingOpenData - W3C Wiki News 2014-12-03: The 8th edition of the Linked Data on the Web workshop will take place at WWW2015 in Florence, Italy. The paper submission deadline for the workshop is 15 March, 2015. 2014-09-10: An updated version of the LOD Cloud diagram has been published. Project Description The Open Data Movement aims at making data freely available to everyone. The goal of the W3C SWEO Linking Open Data community project is to extend the Web with a data commons by publishing various open data sets as RDF on the Web and by setting RDF links between data items from different data sources. RDF links enable you to navigate from a data item within one data source to related data items within other sources using a Semantic Web browser. The figures below show the data sets that have been published and interlinked by the project so far. Clickable version of this diagram. Project Pages The project collects relevant material on several wiki pages. Meetings & Gatherings LOD Community Gatherings See Also Demos 1.

PlayStation Network hack launched from Amazon EC2 High performance access to file storage The hackers who breached the security of Sony's PlayStation Network and gained access to sensitive data for 77 million subscribers used Amazon's web services cloud to launch the attack, Bloomberg News reported. The attackers rented a server from Amazon's EC2 service and penetrated the popular network from there, the news outlet said, citing an unnamed person with knowledge of the matter. The hackers supplied fake information to Amazon. The account has now been closed. Neither Sony nor Amazon commented on the claims. Bloomberg doesn't say how Amazon's cloud service was used to mount the attack. German security researcher Thomas Roth earlier this year showed how tapping the EC2 service allowed him to crack Wi-Fi passwords in a fraction of the time and for a fraction of the cost of using his own computing gear. In both cases, those tapping the Amazon cloud did so as paid customers. The Bloomberg article is here

Seven rules of successful research data management in universities | Higher Education Network | Guardian Professional The availability of research data – the digital data or analogue sources that underpin research findings – is high on the agenda of higher education policy makers, funders and researchers committed to open practice. Sound research rests on the ability to evidence, verify and reproduce results. If this sounds obvious, the practice of making reseach data available is surprisingly limited. The drivers for greater research data availability are not just to do with verifying results and uncovering errors. Let's be clear though, not all research data can or should be made openly available. The recent Engineering and Physical Sciences Research Council (EPSRC) policy places emphasis on the research organisation and its responsibility to promote research data management (RDM) practice and provide tools and resources that enable this. Over the last two years, Jisc's Managing Research Data (MRD) programme has run a set of 17 projects to pilot research data management services in universities.

Sony hit with attacks in Greece and Japan - Faster Forward Posted at 09:53 AM ET, 05/24/2011 May 24, 2011 01:53 PM EDT TheWashingtonPost Hackers said they breached the Japanese site to embarrass Sony. (Kiyoshi Ota - BLOOMBERG) More bad news for Sony as the embattled electronics company struggles to reassure its customers that its systems are safe after a major hacker attack brought down the Sony PlayStation Network and Online Entertainment for three weeks. Reports surfaced Sunday and Monday that the company has suffered another breach, this time through its music services in Greece and Japan. The security company Sophos and the Hacker News identified two attacks on Sony’s music sites in Greece and Japan. The Japanese attack, believed to have occurred Monday by the group Lulz Security, accessed user databases on the sites. “Stupid Sony, so very stupid,” the message said before linking to two unprotected Sony databases. According to Sophos, the leaked database information does not contain names, passwords or other personally identifiable information.

Risk REPORT Governo dos EUA alerta falha de segurança na Siemens O governo dos Estados Unidos alertou clientes da Siemens de que sistemas de gestão de controle industrial que compraram da empresa apresentam uma falha de segurança que, de acordo com um pesquisador, poderia permitir que hackers prejudiquem infraestrutura essencial. A Siemens ainda está se recuperando das consequências da descoberta do vírus Stuxnet, no ano passado, um worm criado especificamente para atacar seus sistemas de controle industrial. Ataques aos sistemas da empresa poderiam ter impacto amplo. O conglomerado alemão, que minimizou a importância das falhas depois que estas foram reveladas na semana passada pela NSS Labs, uma empresa de segurança na computação, afirmou na terça-feira que está desenvolvendo atualizações de software para resolver os mais recentes problemas de segurança em seus sistemas de controle industrial.

March RSA Hack Hits Lockheed, Remote Systems Breached A March attack on RSA's SecurID authentication service has possibly claimed its first big victim: Lockheed Martin. According to a source speaking to Reuters, unknown hackers have broken into Lockheed Martin's security systems by using duplicate SecurID tokens to spoof legitimate authentications into the network. These SecurID tokens are analogous to Blizzard's World of Warcraft Authenticators: Tiny little keyfobs that display an ever-changing code one must enter to log into a protected service. Lockheed hasn't issued comment on alleged breach itself, leading only to speculation as to what data, if any, those breaching the company's network were able to acquire. But the plunder could be vast: Lockheed is the nation's largest military contractor, and it undoubtedly has treasure troves of data about existing and future weapons systems as well as information related to the various cybersecurity services the company provides. So how did the hackers do it?

Related: