Category: Contests
-

Open for Submissions: the 2017 Reaxys PhD Prize
Today marks an important day in the chemistry calendar: the launch of the 2017 Reaxys PhD Prize! From now until March 13, talented and ambitious chemistry PhD students from all around the world will be sending their submissions, all hoping to show the Review Board that they deserve a place on the list of finalists.…
Written by
·
2–3 minutes -

Mendeley Brainstorm – Hacking – We Have a Winner!
Many thanks to all those who entered the Mendeley Brainstorm related to Hacking; picking a winner given the well thought out answers was not easy, however in the end, we selected Dr. Frances Buontempo’s post. Dr Frances Buontempo is a post-doc at City, University of London in the Centre for Software Reliability, http://www.city.ac.uk/centre-for-software-reliability working as…
Written by
·
1–2 minutes -

Mendeley Brainstorm: Open Data – The Wave of the Future?
“Pirate Politics” are on the march. The Pirate Party of Iceland tripled their representation in the October election. Many organisations, including the Mozilla Foundation, are clamouring for copyright reform to allow more data sharing. Is Open Data the wave of the future? What are the downsides? We are looking for the most well thought out…
Written by
·
2–3 minutes -

Mendeley Brainstorm – Climate Change – We Have a Winner!
Many thanks to all those who entered the Mendeley Brainstorm related to Climate Change; picking a winner given all the well thought out answers was not a straightforward matter, however in the end, we selected Vinisha Varghese’s (of the Indian Institute of Science (IISc), Bangalore) response: The answer is slightly more complex than a simple…
Written by
·
2–3 minutes -

Mendeley Brainstorm: Hacking – How Secure Are We?
Recently, a nuclear power plant was hacked. According to Reuters, the director of the International Atomic Energy Agency said the attack “caused some problems” and the plant had to “take some precautionary measures.” Given the increased prevalence of internet-enabled applications, how vulnerable are we to cyber-attacks and what can be done to prevent them? We…
Written by
·
2–3 minutes