Results for ' linux debian'

9 found
Order:
  1. Setting Up LAMP on a Debian Machine A Step-by-Step Guide on Seting Up LAMP on a GCP Compute Engine with a Debian Instance.Fernando Enad - manuscript
    This electronic document serves as a guide on how to get a LAMP stack running on a Google Compute Engine virtual machine instance running Debian.
    Download  
     
    Export citation  
     
    Bookmark  
  2. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  3. Oyun: A New, Free Program for Iterated Prisoner’s Dilemma Tournaments in the Classroom.Charles H. Pence & Lara Buchak - 2012 - Evolution Education and Outreach 5 (3):467-476.
    Evolutionary applications of game theory present one of the most pedagogically accessible varieties of genuine, contemporary theoretical biology. We present here Oyun (OY-oon, http://charlespence.net/oyun), a program designed to run iterated prisoner’s dilemma tournaments, competitions between prisoner’s dilemma strategies developed by the students themselves. Using this software, students are able to readily design and tweak their own strategies, and to see how they fare both in round-robin tournaments and in “evolutionary” tournaments, where the scores in a given “generation” directly determine contribution (...)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Online Deliberation: Design, Research, and Practice.Todd Davies & Seeta Peña Gangadharan (eds.) - 2009 - CSLI Publications/University of Chicago Press.
    Can new technology enhance purpose-driven, democratic dialogue in groups, governments, and societies? Online Deliberation: Design, Research, and Practice is the first book that attempts to sample the full range of work on online deliberation, forging new connections between academic research, technology designers, and practitioners. Since some of the most exciting innovations have occurred outside of traditional institutions, and those involved have often worked in relative isolation from each other, work in this growing field has often failed to reflect the full (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  5. SAR-BSO meta-heuristic hybridization for feature selection and classification using DBNover stream data.Dharani Talapula, Kiran Ravulakollu, Manoj Kumar & Adarsh Kumar - forthcoming - Artificial Intelligence Review.
    Advancements in cloud technologies have increased the infrastructural needs of data centers due to storage needs and processing of extensive dimensional data. Many service providers envisage anomaly detection criteria to guarantee availability to avoid breakdowns and complexities caused due to large-scale operations. The streaming log data generated is associated with multi-dimensional complexity and thus poses a considerable challenge to detect the anomalies or unusual occurrences in the data. In this research, a hybrid model is proposed that is motivated by deep (...)
    Download  
     
    Export citation  
     
    Bookmark  
  6. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  96
    La eficacia registral de las escrituras notariales de Estados miembros de la Unión Europea en España.Joaquin Sarrión - 2012 - Ceflegal. Revista Práctica de Derecho 143:5-20.
    Recientemente el Pleno de la Sala de lo Civil del Tribunal Supremo ha venido a resolver, en Sentencia de 18 de junio de 2012 (rec. núm. 489/2007), un recurso de casación en el que se planteaba la cuestión de la eficacia en España, a efectos registrales, de una escritura otorgada ante notario alemán, dándole validez, y, por tanto, estableciendo su aptitud para generar la oportuna inscripción en el Registro de la Propiedad español. -/- Los argumentos fundamentales de la sentencia que (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8. Cómo los siete sociópatas que gobiernan China están ganando la Tercera Guerra Mundial y tres maneras de detenerlos.Michael Starks - 2019 - In Suicidio por la Democracia - un Obituario para América y el Mundo 4ª edición. Las Vegas, NV USA: Reality Press. pp. 52-57.
    Lo primero que debemos tener en cuenta es que cuando decimos que China dice esto o China hace eso, no estamos hablando del pueblo chino, sino de los sociópatas que controlan el PCC -- Partido Comunista Chino, es decir, los Siete Asesinos En Serie Seniláticos (SSSSK) de th e Comité Permanente del PCC o de los 25 miembros del Politburó, etc. -/- Los planes del PCC para la Tercera Guerra Mundial y la dominación total están muy claro en las publicaciones (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9. DDoS Protection With IPtables.Constantin Oesterling - 2016 - InfoSec:15.
    Research on the most effective Linux iptables rules to mitigate Distributed Denial of Service (DDoS) attacks.
    Download  
     
    Export citation  
     
    Bookmark