Skip to main content

Home/ Collective Intelligence theory research/ Group items tagged text

Rss Feed Group items tagged

Gonzalo San Gil, PhD.

Translate Any Text You Select On Your Linux Desktop With A Keyboard Shortcut And Notifi... - 0 views

  •  
    "I recently stumbled upon an interesting tiny old script which can translate any text you select. After highlighting the text, be it in a web browser, Libreoffice or PDF document and so on, upon using a keyboard shortcut, its translation is displayed in a desktop notification."
Gonzalo San Gil, PhD.

How to get started with Vim | Opensource.com [# ! 8-) Note...] - 0 views

  •  
    "For years, I've wanted to learn Vim, now my preferred Linux text editor and a favorite open source tool among developers and system administrators. And when I say learn, I mean really learn. Master is probably too strong a word, but I'd settle for advanced proficiency. For most of my years using Linux, my skillset included the ability to open a file, use the arrow keys to navigate up and down, switch into insert mode, change some text, save, and exit."
Wildcat2030 wildcat

Carnegie Mellon uses social networking to tap collective intelligence of online study g... - 2 views

  •  
    "Taking their cue from social media, educators at Carnegie Mellon University have developed a social networking application called Classroom Salon that engages students in online learning communities that effectively tap the collective intelligence of groups. Thousands of high school and university students used Classroom Salon (CLS), http://www.classroomsalon.org/, this past academic year to share their ideas about texts, news articles and other reading materials or their critiques of each others' writings. With the support of the Next Generation Learning Challenges initiative, funded by the Bill & Melinda Gates Foundation and the William and Flora Hewlett Foundation, CLS will be used in an innovative experiment at the University of Baltimore to see if it can help students who are in danger of failing introductory courses or otherwise dropping out of college. "Sites such as Facebook and Twitter have captured the attention of young people in a way that blogs and online discussion forums have not," said Ananda Gunawardena, associate teaching professor in the Computer Science Department, who developed CLS with David S. Kaufer, professor of English. "With Classroom Salon, we've tried to capture the sense of connectedness that makes social media sites so appealing, but within a framework that that allows groups to explore texts deeply. So it's not just social networking for the sake of socializing but enhancing the student experience as readers and writers.""
Gonzalo San Gil, PhD.

Decent speech recognition software for Linux - Unix & Linux Stack Exchange - 0 views

  •  
    "The short version of the question: I am looking for a speech recognition software that runs on Linux and has decent accuracy and usability. Any license and price is fine. It should not be restricted to voice commands, as I want to be able to dictate text."
Gonzalo San Gil, PhD.

Linux Security Guide (extended version) - Linux Audit - 0 views

  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
  •  
    "With so many articles about Linux security on the internet, you may feel overwhelmed by how to properly secure your Linux systems. With this guide, we walk through different steps, tools, and resources. The main goal is to have you make an educated choice on what security defenses to implement on Linux. For this reason, this article won't show any specific configuration values, as it would implicate a possible best value. Instead, related articles and resources will be available in the text. The goal is to make this guide into a go-to article for when you need to secure your Linux installation. If you like this article, help others and share it on your favorite social media channels. Got feedback? Use the comments at the bottom. This document in work in progress and last updated in September 2016"
Gonzalo San Gil, PhD.

How to master the Linux terminal with core commands | TechRadar - 0 views

  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
  •  
    "By Linux Format How To Discover the core commands for file and text handling and networking"
Gonzalo San Gil, PhD.

5 systemd Tools You Should Start Using Now | Linux.com | The source for Linux information - 0 views

  •  
    "Once you get over systemd's rude departure from the plain-text, script-laden System V of yore, it turns out to be quite nifty and comes with an equally nifty toolbox. In this article, we'll be looking at four of those tools, plus one you're probably already familiar with but haven't used in the way you will see here."
Gonzalo San Gil, PhD.

Hacker culture(s): New hacker ethics - 1 views

  •  
    [New hacker ethics Steve Mizrach of the dept. of Anthropology, University of Florida, analyzed several recent hacker texts in the paper Is there a hacker ethic for 90s hackers? (1997). He summarizes his findings in a new set of ethical principles. Above all else, do no harm. Do not damage computers or data if at all possible. Much like the key element of the Hippocratic Oath.]
Gonzalo San Gil, PhD.

The best tools and techniques for finding data on Unix systems | ITworld - 0 views

  •  
    "Sometimes looking for information on a Unix system is like looking for needles in haystacks. Even important messages can be difficult to notice when they're buried in huge piles of text. And so many of us are dealing with "big data" these days -- log files that are multiple gigabytes in size and huge record collections in any form that might be mined for business intelligence."
Wildcat2030 wildcat

The Knowledge Conduit | Knowledge Matters - 3 views

  •  
    "First, you should observe that there are two distinct domains - the descriptive domain and the predictive domain - and that data and information belong to the descriptive domain. I like Davenport and Prusaks' (1998, pp 2-3) definition of data as being "a set of discrete, objective facts existing in symbolic form that have not been interpreted". The symbolic form may be text, images, or pre-processed code. Data is usually organised into structured records, however it lacks context. The declaration 'Iron melts at 1,538 degrees Celsius.' is a data statement because it has no context. In this model when data is enriched by adding context it may become information. Information is data with a message, and therefore has a receiver and sender. It is data with relevance and purpose that is useful for a particular task, and is meant to enlighten the receiver and shape their outlooks or insights. Information results in an action that allows the data to be applied to a specific set of circumstances and to be employed effectively. Data only becomes information after it has been interpreted by the receiver. Furthermore information is descriptive. For example the statement 'Newcastle steel-mill's smelter temperature has been set at 2,300 degrees Celsius.' conveys information because it has been enriched by context. The enrichment from data to information is a 'know what and how' procedure that results in an understanding of relationships and patterns. However, information by itself remains descriptive and without additional data or information it cannot be used to predict an event or outcome."
Wildcat2030 wildcat

Virtual Reality and Social Networks Will Be a Powerful Combination - IEEE Spectrum - 3 views

  •  
    "Half a billion people around the world spend more than 20 hours a week "wearing" avatars, that is, using digital representations of themselves. Did you know that a virtual representation of a politician could be more convincing than the politician himself? That your heart beats just as fast when your girlfriend winks at you from your computer screen as when she walks into the room? That if you make your onscreen surrogate mimic your friend's head movements, he's more likely to do what you say? Within three years, many online interactions will not simply involve passages of text typed on a keyboard but will instead be rich exchanges involving sophisticated representations of ourselves. Those digital beings are called avatars, and today at least half a billion people around the world are routinely socializing through them over the Internet, for example in online games."
Gonzalo San Gil, PhD.

History of Copyright: Statute of Anne, 1710 - 0 views

  •  
    "The Statute of Anne, 1710 (1/6) (transcription below image) This is the first copyright act in the world, the British Statute of Anne, from 1710. This facsimile is taken from British Library, 8 Anne c. 19. Several monographs on copyright date this text to 1709. However, 1710 is the correct date, see John Feather, The Book Trade in Politics: The Making of the Copyright Act of 1710, "Publishing History", 19(8), 1980, p. 39 (note 3). Transcription from fraktur is available below the image. Words in roman type in the original are formatted here as italics."
Gonzalo San Gil, PhD.

How to find and install open source fonts | Opensource.com - 0 views

  •  
    "Fonts, like any other digital asset on your computer, come with their own rules for licensing."
thinkahol *

The Coming Insurrection « Support the Tarnac 10 - 2 views

  •  
    From whatever angle you approach it, the present offers no way out. This is not the least of its virtues. From those who seek hope above all, it tears away every firm ground. Those who claim to have solutions are contradicted almost immediately. Everyone agrees that things can only get worse. "The future has no future" is the wisdom of an age that, for all its appearance of perfect normalcy, has reached the level of consciousness of the first punks. 
Gonzalo San Gil, PhD.

An introduction to GitHub for your open source project | Opensource.com - 0 views

  •  
    "From Google to The White House, everyone is on GitHub. If you don't know what GitHub is, keep reading, because I'm also going to talk about why it's one of my favorite websites and share some of its most popular features."
  •  
    "From Google to The White House, everyone is on GitHub. If you don't know what GitHub is, keep reading, because I'm also going to talk about why it's one of my favorite websites and share some of its most popular features."
1 - 15 of 15
Showing 20 items per page