Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged article

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

P2P Foundation's blog » Blog Archive » How does the idea of p2p and the commo... - 0 views

  •  
    "Michel Bauwens 30th November 2010 In the article for the Argentinian national daily "Pagina 12″, journalist Mariano Blejman writes that I equate open hardware with socialism. and this is also the message that is being retweeted. This is not explicitely my position, so I'd like to take up the occasion to republish an earlier article on how our position is related to the historical movement of socialism. What is the connection between the historical tradition of socialism/communism and the contemporary emergence of ideas and practices centered around p2p dynamics and the commons?"
  •  
    "Michel Bauwens 30th November 2010 In the article for the Argentinian national daily "Pagina 12″, journalist Mariano Blejman writes that I equate open hardware with socialism. and this is also the message that is being retweeted. This is not explicitely my position, so I'd like to take up the occasion to republish an earlier article on how our position is related to the historical movement of socialism. What is the connection between the historical tradition of socialism/communism and the contemporary emergence of ideas and practices centered around p2p dynamics and the commons?"
Gonzalo San Gil, PhD.

7 Excuses For Not Using Linux -- And Why They're Wrong - Datamation [# ! 2 notes] - 0 views

    • Gonzalo San Gil, PhD.
       
      # ! Oh, many people complain about the lack of features that... have never used... ;)
    • Gonzalo San Gil, PhD.
       
      # ! ... bla, bla: essentially, is that people are misinformed... probably with the intention to keep 'em trapped in the proprietary -limiting and flippant- clutches...
    • Gonzalo San Gil, PhD.
       
      [... For example, you still can't fill out PDF forms...] # ! ??? wth! :( try pdfedit... :)
  •  
    [ Posted May 6, 2015 By Bruce Byfield Submit Feedback » More Articles » Every since Linux first became popular, articles have been condemning its shortcomings. Hardly a month goes by without someone explaining what Linux lacks, or how it needs a particular feature, application, or service to be usable-- and, as often as not, the complaints are misguided.]
  •  
    [ Posted May 6, 2015 By Bruce Byfield Submit Feedback » More Articles » Every since Linux first became popular, articles have been condemning its shortcomings. Hardly a month goes by without someone explaining what Linux lacks, or how it needs a particular feature, application, or service to be usable-- and, as often as not, the complaints are misguided.]
Gonzalo San Gil, PhD.

Windows 10 doesn't matter to desktop Linux | Jim Lynch - 0 views

  •  
    "January 26, 2015 by Jim Lynch 14 Comments Image credit: Straight.com Well folks, it's that time again. Yes, there's another one of those silly "the linux desktop is dead" kind of articles floating around out there. As usual the article is quite wrong, and I'll tell you why in this post."
  •  
    "January 26, 2015 by Jim Lynch 14 Comments Image credit: Straight.com Well folks, it's that time again. Yes, there's another one of those silly "the linux desktop is dead" kind of articles floating around out there. As usual the article is quite wrong, and I'll tell you why in this post."
Gonzalo San Gil, PhD.

4 desktop note taking apps for Linux | Opensource.com - 0 views

  •  
    "In a previous article, I looked at four web-based alternatives to Evernote. I realize, however, that not everyone wants or needs to have their notes available on the web. Many people just want to do everything locally on their computers. That's not a problem since there are more than a few open source note taking applications for your desktop. In this article, I take a look at four of those applications."
Gonzalo San Gil, PhD.

Russian Copyright Law Allows Entire News Site To Be Shut Down Over A Single Copied Arti... - 0 views

  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
  •  
    "from the funny-how-that-works dept We've noted for a long time now that copyright laws are regularly used as a tool for censorship. In Russia, abusing copyright law for censorship and to harass political opponents has become standard. Remember how the Russian government teamed up with Microsoft to use questionable copyright claims to intimidate government critics? And then how the MPAA gleefully got into bed with Russia's media censor to celebrate copyright? Of course, Russia also expanded its ability to use copyright to censor the internet, following pressure from short-sighted US diplomats, demanding that Russia better "respect" copyright laws. "
Gonzalo San Gil, PhD.

5 signs your Web application has been hacked | ITworld - 0 views

  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
  •  
    "hacked FREE Become An Insider Sign up now and get free access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content from the best tech brands on the Internet: CIO, CSO, Computerworld, InfoWorld, IT World and Network World Learn more. Other Insider Recommendations Java 101 primer: Composition and inheritance 6 simple tricks for protecting your passwords Free course: "JavaScript: The Good Parts" Free Course: The Dark Side of Technology Careers Website defacements? Database dumps? Mysterious files? Here's how to tell if your Web application has been hacked -- and how to secure it once and for all"
Gonzalo San Gil, PhD.

[# ! #Open #Tech:] How to Use 'cat' and 'tac' Commands with Examples in Linux - 0 views

  •  
    "This article is a part of our Linux Tricks and Tips series, in this article we will cover some basic usage of cat command (most frequently used command in Linux) and tac (reverse of cat command - print files in reverse order) with some practical examples"
Gonzalo San Gil, PhD.

Is Open Source Design a Thing? - Freedom Penguin - 0 views

  •  
    "October 14, 2016 Sean LeRoy 2 Comments Opinion The prowess and power of Open Source is undeniable. From servers, to the desktop, mobile, to the underpinnings of the so-called "Internet of Things", Open Source spans sectors and continents, public and private. One profession, however, that has traditionally been dominated by closed, proprietary software solutions - and usually very expensive ones at that! - is the field of design. In this article, we'll take a look at some free and open source options"
  •  
    "October 14, 2016 Sean LeRoy 2 Comments Opinion The prowess and power of Open Source is undeniable. From servers, to the desktop, mobile, to the underpinnings of the so-called "Internet of Things", Open Source spans sectors and continents, public and private. One profession, however, that has traditionally been dominated by closed, proprietary software solutions - and usually very expensive ones at that! - is the field of design. In this article, we'll take a look at some free and open source options"
Gonzalo San Gil, PhD.

Julia Reda - Freedom to link threatened by EU court decision and copyright plans [Date:... - 1 views

  •  
    "Today, the European Court of Justice significantly curtailed the freedom to hyperlink - one of the basic building blocks of the web. Together with the new special copyright protection for news articles the European Commission is planning to propose next week, the ability of Europeans to point to things online without having to fear breaking a law is in peril. Could the following message soon be commonplace on the European internet? Read on for details."
  •  
    "Today, the European Court of Justice significantly curtailed the freedom to hyperlink - one of the basic building blocks of the web. Together with the new special copyright protection for news articles the European Commission is planning to propose next week, the ability of Europeans to point to things online without having to fear breaking a law is in peril. Could the following message soon be commonplace on the European internet? Read on for details."
Gonzalo San Gil, PhD.

Linux and the Second Goal - Datamation - 0 views

  •  
    "Posted April 20, 2016 By Bruce Byfield Submit Feedback » More Articles » Ask advocates what their goal is for Linux, and many will say, half-seriously and half-joking, "World domination." However, there is another goal that few seem interested in today -- the creation of a com"
  •  
    "Posted April 20, 2016 By Bruce Byfield Submit Feedback » More Articles » Ask advocates what their goal is for Linux, and many will say, half-seriously and half-joking, "World domination." However, there is another goal that few seem interested in today -- the creation of a com"
Gonzalo San Gil, PhD.

IT resume makeover: Don't try to please everyone | CIO [# ! Note] - 0 views

  •  
    " Become An Insider Sign up now and get FREE access to hundreds of Insider articles, guides, reviews, interviews, blogs, and other premium content. Learn more. Latest Insider tabtops 2 InfoWorld Invasion of the tabtops: The new hybrid tablets reviewed Top 25 Windows 10 Free Tools CIO Your step-by-step guide to repairing Windows 10 ted talk CSO 10 security Ted Talks you can't miss Hashtag chalk marks Computerworld A look inside the Microsoft Local Administrator Password... See all Insider Writing a resume means knowing your audience. If you try to please everyone, you'll only wind up with an unfocused and disjointed document filled with unconnected work experience and accomplishments."
Gonzalo San Gil, PhD.

Who's winning the race to power and truth: Science or spirituality? - National Holistic... - 0 views

  •  
    "June 25, 2014 Deepak Chopra in a June 24, 2014 article, "Skepticism and a Million Dollar Challenge," brings our attention to a new age of skepticism. He states: "Skepticism, of the kind advanced by characters as diverse as James "The Amazing" Randi, Richard Dawkins, Laurence Krauss, and Jerry Coyne, does far more harm than good."
Gonzalo San Gil, PhD.

The Eco-Technic Civilization - 0 views

  •  
    [Michel Bawens shares thru Nathan Lewis an article of Øyvind Holmstad] Tags: echo-technic vs.retro-echo "March 2, 2014 The notion of an "eco-technic civilization" is popular these days. It is a good alternative to the "retro-eco" idea which is everywhere today -- that to be in harmony with the earth, one should live in some sort of 19th century pioneer subsistence-farmer fashion."
  •  
    [Michel Bawens shares thru Nathan Lewis an article of Øyvind Holmstad] Tags: echo-technic vs.retro-echo "March 2, 2014 The notion of an "eco-technic civilization" is popular these days. It is a good alternative to the "retro-eco" idea which is everywhere today -- that to be in harmony with the earth, one should live in some sort of 19th century pioneer subsistence-farmer fashion."
Gonzalo San Gil, PhD.

Performance reviews the open source way | Opensource.com - 0 views

  •  
    "Jim Whitehurst recently wrote about the performance management approach we use at Red Hat for the Harvard Business Review. In his article, Whitehurst details one aspect of the performance management process that differentiates Red Hat from other companies-its flexibility."
  •  
    "Jim Whitehurst recently wrote about the performance management approach we use at Red Hat for the Harvard Business Review. In his article, Whitehurst details one aspect of the performance management process that differentiates Red Hat from other companies-its flexibility."
Gonzalo San Gil, PhD.

Science Fraud Getting You Down? Here's Who You Can Trust | WIRED - 0 views

  •  
    "You don't have to look very far to get head-bangingly upset about the current state of medical and scientific research. Pfizer (maybe) hid evidence that Zoloft use by pregnant women caused heart defects in babies. GlaxoSmithKlein paid $3 billion in fines for a) generating a fake journal article"
  •  
    "You don't have to look very far to get head-bangingly upset about the current state of medical and scientific research. Pfizer (maybe) hid evidence that Zoloft use by pregnant women caused heart defects in babies. GlaxoSmithKlein paid $3 billion in fines for a) generating a fake journal article"
Gonzalo San Gil, PhD.

TTIP: El trampolín del sector transgénico hacia Europa [# ! Nota Crítica] - 0 views

  •  
    "Sus planes no han salido como deseaban. Cuando la industria agroquímica decidió abrir nuevos mercados y dar el salto al ámbito biotecnológico, no esperaba encontrar las barreras legales, sociales y políticas que le están dificultando el camino." _______________ Riesgos de los cultivos transgénicos http://www.ecologistasenaccion.org/article3176.html
  •  
    "Sus planes no han salido como deseaban. Cuando la industria agroquímica decidió abrir nuevos mercados y dar el salto al ámbito biotecnológico, no esperaba encontrar las barreras legales, sociales y políticas que le están dificultando el camino."
Wildcat2030 wildcat

Carnegie Mellon uses social networking to tap collective intelligence of online study g... - 2 views

  •  
    "Taking their cue from social media, educators at Carnegie Mellon University have developed a social networking application called Classroom Salon that engages students in online learning communities that effectively tap the collective intelligence of groups. Thousands of high school and university students used Classroom Salon (CLS), http://www.classroomsalon.org/, this past academic year to share their ideas about texts, news articles and other reading materials or their critiques of each others' writings. With the support of the Next Generation Learning Challenges initiative, funded by the Bill & Melinda Gates Foundation and the William and Flora Hewlett Foundation, CLS will be used in an innovative experiment at the University of Baltimore to see if it can help students who are in danger of failing introductory courses or otherwise dropping out of college. "Sites such as Facebook and Twitter have captured the attention of young people in a way that blogs and online discussion forums have not," said Ananda Gunawardena, associate teaching professor in the Computer Science Department, who developed CLS with David S. Kaufer, professor of English. "With Classroom Salon, we've tried to capture the sense of connectedness that makes social media sites so appealing, but within a framework that that allows groups to explore texts deeply. So it's not just social networking for the sake of socializing but enhancing the student experience as readers and writers.""
Gonzalo San Gil, PhD.

Fear Dominates Politics, Media and Human Existence in America-And It's Getting Worse | ... - 0 views

  •  
    Today, AlterNet launches a series of articles and investigations on fear, and how to combat it.
  •  
    Today, AlterNet launches a series of articles and investigations on fear, and how to combat it.
Gonzalo San Gil, PhD.

Take Control of Your PC with UEFI Secure Boot | Linux Journal - 0 views

  •  
    "Nov 30, 2015 By Greig Paul in HOW-TOs Security UEFI (Unified Extensible Firmware Interface) is the open, multi-vendor replacement for the aging BIOS standard, which first appeared in IBM computers in 1976. The UEFI standard is extensive, covering the full boot architecture. This article focuses on a single useful but typically overlooked feature of UEFI: secure boot. "
  •  
    "Nov 30, 2015 By Greig Paul in HOW-TOs Security UEFI (Unified Extensible Firmware Interface) is the open, multi-vendor replacement for the aging BIOS standard, which first appeared in IBM computers in 1976. The UEFI standard is extensive, covering the full boot architecture. This article focuses on a single useful but typically overlooked feature of UEFI: secure boot. "
1 - 20 of 141 Next › Last »
Showing 20 items per page