It seems like this article is saying that when your computer is powered on the decryption keys are in memory. The only difference here is that because it's a self encrypting drive it seems to be vulnerable to some odd tricks to still be able to read data from it when you shouldn't be (unplugging the SATA for example).
Although I think the research here is valuable I hope it doesn't turn people off from using Bitlocker with our without a self encrypting drive. It is the easiest way to encrypt drives and can give you certain guarantees in the boot process that TrueCrypt cannot.