Slashdot turned 20 this month, which is ancient in internet years. How far have we come?
Also, we've set up a page to coordinate user meet-ups around the world to celebrate. Read on for the full 20-year history of Slashdot.
Horback and fellow researcher Willem Halffman wanted to know how extensive the phenomenon of misidentified cell lines really was, so they searched for evidence of what they call "contaminated" scientific literature. Using the research database Web of Science, they looked for scientific articles based on any of the known misidentified cell lines as listed by the International Cell Line Authentication Committee's (ICLAC) Register of Misidentified Cell Lines.There are currently 451 cell lines on this list, and they're not what you think they are -- having been contaminated by other kinds of cells at some point in scientific history. Worse still, they've been unwittingly used in published laboratory research going as far back as the 1950s.
The study found that cetaceans had complex alliances and communications, played and worked together for mutual benefit, and could even work with other species, like humans. Some also have individual signifiers, sounds that set them apart from others, and can mimic the sounds of others. In addition, it found that brain size predicted the breadth of social and cultural behaviors of these marine creatures (though ecological factors, like prey diversity and latitudinal range, also played a role). The researchers concluded there was a tie between cetacean encephalization, social structure, and group size.
[M]aybe we should rethink the whole impulse to centralize such data collection, for starters. And, after such a thought experiment, then further focus on obvious measures to safeguard such information -- such as installing regular software patches that could have prevented the Equifax hack -- should be the priority. And, how about bringing back a concept in rather short supply in C-suites -- that of accountability? Perhaps measures to increase that might be a better idea than gee whiz misdirected techno-wizardry... The Equifax hack has revealed the sad and sorry state of cybersecurity. But inviting the biometric ID fairy to drop by and replace the existing Social Security number is not the solution.
The article calls biometric identification systems "another source of data to be mined by corporations, and surveilled by those who want to do so. And it would ultimately not foil identity theft." It suggests currently biometric ids are a distraction from the push to change the credit bureau business model -- for example, requiring consumers to opt-in to the collection of their personal data.
That "information gap" refers to the data around who helped create a song. Publishers might keep track of who wrote the underlying composition of a song, or the session drummer on a recording, but that information doesn't always show up in a digital file's metadata. This disconnect between the person who composed a song, the person who recorded it, and the subsequent plays, has led to problems like writers and artists not getting paid for their work, and publishers suing streaming companies as they struggle to identify who is owed royalties. "It's a simple question of attribution," says Berklee College of Music's vice president of innovation and strategy, Panos A. Panay. "And payments follow attribution."
Over the last year, members of the OMI -- almost 200 organizations in total -- have worked to develop just that. As a first step, they've created an API that companies can voluntarily build into their systems to help identify key data points like the names of musicians and composers, plus how many times and where tracks are played. This information is then stored on a decentralized database using blockchain technology -- which means no one owns the information, but everyone can access it.