Skip to main content

Home/ Brian links/ Group items matching "research" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Kevin DiVico

Research--You're Doing It Wrong. How Uncovering The Unconscious Is Key To Creativity | Co.Create: Creativity \ Culture \ Commerce - 0 views

    • Kevin DiVico
       
      I had to share this !
  •  
    "Businesses invest billions of dollars annually in market research studies developing and testing new ideas by asking consumers questions they simply can't answer. Asking consumers what they want, or why they do what they do, is like asking the political affiliation of a tuna fish sandwich. That's because neuroscience is now telling us that consumers, i.e., humans, make the vast majority of their decisions unconsciously. Steve Jobs didn't believe in market research. When a reporter once asked him how much research he conducted to develop the iPad, he quipped, "None. It isn't the consumers' job to know what they want." And according to some measures, the iPad became the most successful consumer product launch ever and Apple went on to become the most valuable company of all-time."
Kevin DiVico

Who's Reading Your Research? Academia.edu Offers an Analytics Dashboard For Scholars - 0 views

  •  
    "Academia.edu, a social network for scholars, is unveiling a new feature today that its founder Richard Price hopes will help address part of the "credit gap" for research. Academia.edu allows users to upload and share their research papers, and the site is launching its Analytics Dashboard for Scientists today that Price says will let scholars see the "real-time impact" of their work. Academic publishing has long been a black-box in terms of both who's reading and who's citing. Publishing in journals may be expected (required, even), but the delays in the publishing process can make it challenging to ascertain how much influence work has. "It typically takes about 3 to 5 years for citations to actually appear back in the process," argues Price, pointing to the lengthy time between researching, writing, peer-reviewing, and publishing."
Kevin DiVico

Hacker uses malware built-in chat to toy with researchers | Ars Technica - 0 views

  •  
    Malware researchers investigating a Trojan linked in a gaming forum as a how-to video for Diablo III got a surprise when the hacker started chatting with them-through a feature in the malware. Franklin Zhao & Jason Zhou of antivirus company AVG were looking for keylogging code in the malware with a debugger after downloading it to a virtual machine when a chat box popped up. The hacker asked, in Chinese, "What are you doing? Why are you researching my Trojan?"
Kevin DiVico

Fraud, failure, and FUBAR in science - Boing Boing - 0 views

  •  
    "Here's an issue we don't talk about enough. Every year, peer-reviewed research journals publish hundreds of thousands of scientific papers. But every year, several hundred of those are retracted - essentially, unpublished. There's a number of reasons retraction happens. Sometimes, the researchers (or another group of scientists) will notice honest mistakes. Sometimes, other people will prove that the paper's results were totally wrong. And sometimes, scientists misbehave, plagiarizing their own work, plagiarizing others, or engaging in outright fraud. Officially, fraud only accounts for a small proportion of all retractions. But the number of annual retractions is growing, fast. And there's good reason to think that fraud plays a bigger role in science then we like to think. In fact, a study published a couple of weeks ago found that there was misconduct happening in 3/4ths of all retracted papers. Meanwhile, previous research has shown that, while only about .02% of all papers are retracted, 1-2% of scientists admit to having invented, fudged, or manipulated data at least once in their careers."
Kevin DiVico

"The scientific literature must be cleansed of everything that is fraudulent, especially if it involves the work of a leading academic" « Statistical Modeling, Causal Inference, and Social Science - 0 views

  •  
    "Someone points me to this report from Tilburg University on disgraced psychology researcher Diederik Stapel. The reports includes bits like this: When the fraud was first discovered, limiting the harm it caused for the victims was a matter of urgency. This was particularly the case for Mr Stapel's former PhD students and postdoctoral researchers . . . However, the Committees were of the opinion that the main bulk of the work had not yet even started. . . . Journal publications can often leave traces that reach far into and even beyond scientific disciplines. The self-cleansing character of science calls for fraudulent publications to be withdrawn and no longer to proliferate within the literature. In addition, based on their initial impressions, the Committees believed that there were other serious issues within Mr Stapel's publications . . . This brought into the spotlight a research culture in which this sloppy science, alongside out-and-out fraud, was able to remain undetected for so long. . . . The scientific literature must be cleansed of everything that is fraudulent, especially if it involves the work of a leading academic. Sounds familiar? I think it also applies to recipients of the Founders Award from the American Statistical Association. There's more: The most important reason for seeking completeness in cleansing the scientific record is that science itself has a particular claim to the finding of truth. This is a cumulative process, characterized in empirical science, and especially in psychology, as an empirical cycle, a continuous process of alternating between the development of theories and empirical testing. . . . My first reaction was that all seems like overkill given how obvious the fraud is, but given what happened with comparable cases in the U.S., I suppose this "Powell doctrine" approach (overwhelming force) is probably the best way to go."
Kevin DiVico

The 2013 IEEE International Conference on Internet of Things (iThings2013) | the internet of things - 0 views

  •  
    The 2013 IEEE International Conference on Internet of Things (iThings2013): These conferences will provide a high-profile, leading-edge forum for researchers, engineers and practitioners to present state-of-art advances and innovations in theoretical foundations, systems, infrastructure, tools, testbeds, and applications for the internet of things, cyber, physical and social computing, green communications and computing, as well as to identify emerging research topics and define the future.    This is a good chance which aims at exchanging research experience in such fields. It will bring together experts from the areas of computational intelligence, communications, networks, distributed systems, and computer science. 
Kevin DiVico

How to reinforce learning while you sleep | KurzweilAI - 0 views

  •  
    Memories can be reactivated during sleep and strengthened in the process,  Northwestern University research suggests. In the Northwestern study, research participants learned how to play two artificially generated musical tunes with well-timed key presses. Then while the participants took a 90-minute nap, the researchers presented one of the tunes that had been practiced, but not the other
Kevin DiVico

Making K* work for your research findings - OurWorld 2.0 | OurWorld 2.0 - 0 views

  •  
    UNU Media Centre head Brendan Barrett shares insights derived from a UNU Institute for Water, Environment and Health conference that focused on K* (K-Star) - a spectrum of ideas that covers research communication, science push, knowledge translation, adaptation, transfer and exchange, knowledge brokering and mobilization, and policy pull. * * * To sum up the underlying need for the recent K* Conference 2012, I borrow the words of a co-participant who explained that "as we are seeing with the climate debate and other 'wicked problems', it is not sufficient to assume that scientific consensus about the facts will be influential in policy or the wider community".
Kevin DiVico

Research ethics: 3 ways to blow the whistle : Nature News & Comment - 0 views

  •  
    "Are more people doing wrong or are more people speaking up? Retractions of scientific papers have increased about tenfold during the past decade, with many studies crumbling in cases of high-profile research misconduct that ranges from plagiarism to image manipulation to outright data fabrication. When worries about somebody's work reach a critical point, it falls to a peer, supervisor, junior partner or uninvolved bystander to decide whether to keep mum or step up and blow the whistle. Doing the latter comes at significant risk, and the path is rarely simple. Some make their case and move on; others never give up. And in what seems to be a growing trend, anonymous watchdogs are airing their concerns through e-mail and public forums. Here, Nature profiles three markedly different stories of individuals who acted on their suspicions. Successful or otherwise, each case offers lessons for would-be tipsters."
Kevin DiVico

Cybercriminals using digitally signed Java exploits to trick users | Security - InfoWorld - 0 views

  •  
    "Security researchers warn that cybercriminals have started using Java exploits signed with digital certificates to trick users into allowing the malicious code to run inside browsers. A signed Java exploit was discovered Monday on a website belonging to the Chemnitz University of Technology in Germany that was infected with a Web exploit toolkit called g01pack, security researcher Eric Romang said Tuesday in a blog post. "
Kevin DiVico

Computational center will study the past and future of knowledge | UChicago News - 0 views

  •  
    The march of science is stumbling and easily sidetracked, fraught with bias, fads and dead ends. A new research initiative based at the University of Chicago and the Computation Institute will use the latest computational tools to scrutinize this imperfect path and better understand how knowledge was and is created. Such understanding could transform the process of research, calling out past missteps while revealing unanticipated new directions for the future.
Kevin DiVico

China claims successful test of microwave relativity engine | DVICE - 0 views

  •  
    "Researchers in China say that they've successfully managed to test an engine that runs on electricity, requires no propellant and produces no exhaust. It's called the EmDrive, and it's able to convert microwave energy directly into thrust inside a sealed chamber. Oh, it's totally silent and highly efficient, too. If it seems too good to be true, well, you're not the only one who feels that way. But the Researchers have a prototype that apparently works, and they've just published a paper detailing it."
Kevin DiVico

Harbor Research Newsletter: Data Constellations and the Magic of Emergence | the internet of things - 0 views

  •  
    Harbor Research Newsletter: Data Constellations and the Magic of Emergence Data Constellations and the Magic of Emergence: "Is there really an image of a bear in the nighttime sky? How about an archer, or some girls, or a big and little dipper? Across the planet and the centuries, people have seen pictures in the stars-and more or less the same pictures, too. It takes a special kind of intelligence to do that. Dogs, for example, are intelligent creatures, but they don't see the pictures.
Kevin DiVico

Android apps used by millions vulnerable to password, e-mail theft | Ars Technica - 0 views

  •  
    Android applications downloaded by as many as 185 million users can expose end users' online banking and social networking credentials, e-mail and instant-messaging contents because the programs use inadequate encryption protections, computer scientists have found. The researchers identified 41 applications in Google's Play Market that leaked sensitive data as it traveled between handsets running the Ice Cream Sandwich version of Android and webservers for banks and other online services. By connecting the devices to a local area network that used a variety of well-known exploits, some of them available online, the scientists were able to defeat the secure sockets layer and transport layer security protocols implemented by the apps. Their research paper didn't identify the programs, except to say they have been downloaded from 39.5 million and 185 million times, based on Google statistics.
Kevin DiVico

'Personal Cloud' to Replace PC by 2014, Says Gartner | Share on LinkedIn - 0 views

  •  
    There's no doubting the cloud invasion. But the research firm Gartner believes the personal cloud will replace the PC as the center of our digital lives sooner than you might think: 2014. "Major trends in client computing have shifted the market away from a focus on personal computers to a broader device perspective that includes smartphones, tablets and other consumer devices," Steve Kleynhans, research vice president at Gartner, said in a statement on Monday. "Emerging cloud services will become the glue that connects the web of devices that users choose to access during the different aspects of their daily life."
Kevin DiVico

Canada to science: Drop dead - Boing Boing - 0 views

  •  
    Not long ago, Cory told you about how the Canadian government has been muzzling scientists-refusing to let them speak freely with the press and, thus, controlling what research the public gets to know about. Not surprisingly, it's research on topics that are politically inconvenient to Prime Minister Stephen Harper's government-climate change, for instance-that end up getting frozen.
Kevin DiVico

Open Science and Access to Medical Research | Guest Blog, Scientific American Blog Network - 0 views

  •  
    It is rather odd how often I hear the expression paradigm shift during contemporary scientific presentations and seminars. The expression was popularized by Thomas Kuhn's book The Structure of Scientific Revolutions. In that book, Kuhn referred to ground-breaking and revolutionary changes in scientific thought as paradigm shifts, but the expression is so over-used today that even minor discoveries are sometimes marketed as paradigm shifts.
Kevin DiVico

Security researcher: I found secret reprogramming backdoors in Chinese microprocessors - Boing Boing - 0 views

  •  
    Sergei Skorobogatov, a postdoc in the Security Group at the Computer Laboratory of the University of Cambridge has written up claims that reprogammable microchips from China contained secret back-doors that can be used to covertly insert code:
Kevin DiVico

Projects - Conference: Mobilizing Knowledge Networks for Development - 0 views

  • The goal of the workshop is to explore ways to become better providers and connectors of knowledge in a world where the sources of knowledge are increasingly diverse and dispersed. At the World Bank, for example, we are seeking ways to connect with new centers of research, emerging communities of practice, and tap the practical experience of development organizations and the policy makers in rapidly developing economies. Our goal is to find better ways to connect those that have the development knowledge with those that need it, when they need it.
  •  
    The goal of the workshop is to explore ways to become better providers and connectors of knowledge in a world where the sources of knowledge are increasingly diverse and dispersed. At the World Bank, for example, we are seeking ways to connect with new centers of research, emerging communities of practice, and tap the practical experience of development organizations and the policy makers in rapidly developing economies. Our goal is to find better ways to connect those that have the development knowledge with those that need it, when they need it.
Kevin DiVico

'Super-Entity' Of 147 Companies At Center Of World's Economy, Study Claims - 0 views

  •  
    "A Swiss study appears to have uncovered what anti-capitalist activists have been claiming for years -- that the global economy is controlled by a small group of deeply interconnected entities. But don't grab a pitchfork and head to the nearest Occupy protest just yet. Systems researchers say this isn't the result of an Illuminati-type global conspiracy, but rather a natural force to be expected. "Such structures are common in nature," complex systems expert George Sudihara told NewScientist."
1 - 20 of 51 Next › Last »
Showing 20 items per page