Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged specifications

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

U.S. Congress must act on government hacking, reject Rule 41 - Access Now - 0 views

  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
  •  
    "Washington D.C. - Access Now today calls upon the U.S. Congress to reject a new rule that will expand the Federal Bureau of Investigation's (FBI) hacking operations. The call comes as the Supreme Court of the United States reported a change in the Federal Rules of Criminal Procedure, specifically Rule 41, to Congress. The change enables the FBI to hack into computers regardless of where they are located, and to hack into the computers belonging to the victims of botnet operations. Access Now strongly opposes the update to Rule 41."
Gonzalo San Gil, PhD.

Experimenting with open science: Open source in the field and in the lab | Opensource.com - 0 views

  •  
    "Practicing science means more then adopting a particular set of tools-even more than following a specific methodology."
Gonzalo San Gil, PhD.

Linux vs. Windows device driver model: architecture, APIs and build environment compari... - 0 views

  •  
    "Last updated on May 31, 2016 Authored by Dennis Turpitka 4 Comments Device drivers are parts of the operating system that facilitate usage of hardware devices via certain programming interface so that software applications can control and operate the devices. As each driver is specific to a particular operating system, you need separate Linux, Windows, or Unix device drivers to enable the use of your device on different computers. "
Gonzalo San Gil, PhD.

Transaction Publishers: Altruism, Narcissism, Comity - 2 views

  •  
    [Description How does the sense of basic fairness--or selflessness versus selfishness--arise? How is it exhibited behaviorally? How is it maintained? Few topics hold more contemporary significance or have proved more elusive to specification in precise scientific terms. Current research perspectives on altruism, narcissism, and comity by distinguished behavioral scientists from around the world were brought together in a special issue of Current Psychology (Summer 1998) and are offered here in a useful compendium. ]
Wildcat2030 wildcat

Digital Distinction - Status-Specific Types of Internet Usage - 1 views

  •  
    Objective. Sociologists of technology propose that not only a technological artifact, as such, but also patterns of usage should be considered when studying the social implications of technologies. Accordingly, we explore how people's online activities are influenced by users' socioeconomic status and context of use. Methods. We analyze data from the Allensbacher Computer and Technology Analysis (ACTA) 2004 survey with uniquely detailed information about people's Internet uses and context of usage to explore this relationship. Results. Findings suggest that highstatus and low-status individuals cultivate different forms of ''Internet-in-practice.'' High-status users are much more likely to engage in so-called capital-enhancing activities online than are their less privileged counterparts. Conclusion. Results suggest differential payoffs from Internet use depending on a user's socioeconomic background. Digital inequalities might be mitigated by improving people's Internet equipment and digital experience, but they do not account for all the status differential in use.
Wildcat2030 wildcat

The Knowledge Conduit | Knowledge Matters - 3 views

  •  
    "First, you should observe that there are two distinct domains - the descriptive domain and the predictive domain - and that data and information belong to the descriptive domain. I like Davenport and Prusaks' (1998, pp 2-3) definition of data as being "a set of discrete, objective facts existing in symbolic form that have not been interpreted". The symbolic form may be text, images, or pre-processed code. Data is usually organised into structured records, however it lacks context. The declaration 'Iron melts at 1,538 degrees Celsius.' is a data statement because it has no context. In this model when data is enriched by adding context it may become information. Information is data with a message, and therefore has a receiver and sender. It is data with relevance and purpose that is useful for a particular task, and is meant to enlighten the receiver and shape their outlooks or insights. Information results in an action that allows the data to be applied to a specific set of circumstances and to be employed effectively. Data only becomes information after it has been interpreted by the receiver. Furthermore information is descriptive. For example the statement 'Newcastle steel-mill's smelter temperature has been set at 2,300 degrees Celsius.' conveys information because it has been enriched by context. The enrichment from data to information is a 'know what and how' procedure that results in an understanding of relationships and patterns. However, information by itself remains descriptive and without additional data or information it cannot be used to predict an event or outcome."
Gonzalo San Gil, PhD.

Konsthack | KH000 // Kopimashin - 0 views

  •  
    "2015 // Peter Sunde Kolmisoppi The Kopimashin creates an endless amount of copies of a specific audio track (gnarls barkley's crazy). The audio track is copied to /dev/null, a unix data pipe for avoiding permanent storage. The Kopimashins lcd display consists of three rows of information, the serial number of the mashin, amount of copies created and the dollar value it represents in losses for the record labels (Downtown Records / Warner Music), currently represented by USD1,25 per copied piece."
Gonzalo San Gil, PhD.

Top Open Source Creativity Apps - Datamation - 0 views

  •  
    "There is a common belief among non-Linux users that there aren't any good creative applications from the open source camp. In truth, this is absolutely false. The key is knowing which applications are needed to complete a specific task. In this article, I'll share my recommendations for the top open source creativity apps."
Gonzalo San Gil, PhD.

NCoC: Two Special Generations: The Millennials and the Boomers - 0 views

  •  
    "The Baby-Boomers and the Millennials are both worthy of special attention. They are large groups: there are 77 million Boomers and 82 million Millennials. Millennials are showing strong interest in civic participation and reversing some of the declines observed among youth since the 1970s. Meanwhile, the Boomers are reaching the period of life when typically we see the highest levels of civic engagement, thanks in part to resources such as savings, networks, community ties, and knowledge that accumulate over time. The two generations are linked in that most of the Millennials' parents are Boomers. "
1 - 10 of 10
Showing 20 items per page