Results for 'Linux'

22 found
Order:
  1.  15
    Application of embedded Linux in the design of Internet of Things gateway.Rajeev Kumar, Poonam Rani, Renu Popli, Pengfei Yan, Li Wang & Tao Wang - 2022 - Journal of Intelligent Systems 31 (1):1014-1023.
    To study the development trend of embedded platforms in home appliances Internet of Things, an application of embedded Linux in the design of IoT gateway is designed. ARM microprocessor S3C2410, EM310 radio frequency module, and Ethernet DM9000A module are used to realize the home network information-processing platform. The platform utilizes existing network facilities, RF modules, and network interface modules to realize the interconnection of the home perception network through wireless or wired links. For experimental analysis, Ping the central server (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  26
    NASD Rule 2110 and the VA Linux IPO.Tim Loughran - 2005 - Journal of Business Ethics 62 (2):141-146.
    On December 9, 1999, VA Linux issued shares to the public and left over $900 million on the table for investors. In the prospectus, the investment banker Credit Suisse First Boston (CSFB) stated it would receive a 7% gross spread as its compensation for underwriting the shares. Yet the SEC alleges some investors paid enormous commissions to CSFB in the form of a kick-back immediately after obtaining the IPO shares. Hence, CSFB had an economic interest in the IPO and (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  3.  15
    Research on WiFi Penetration Testing with Kali Linux.He-Jun Lu & Yang Yu - 2021 - Complexity 2021:1-8.
    Aiming at the vulnerability of wireless network, this paper proposed a method of WiFi penetration testing based on Kali Linux which is divided into four stages: preparation, information collection, simulation attack, and reporting. By using the methods of monitoring, scanning, capturing, data analysis, password cracking, fake wireless access point spoofing, and other methods, the WiFi network penetration testing with Kali Linux is processed in the simulation environment. The experimental results show that the method of WiFi network penetration testing (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  4.  12
    Open source standardization: The rise of linux in the network era.Joel West & Jason Dedrick - 2001 - Knowledge, Technology & Policy 14 (2):88-112.
    To attract complementary assets, firms that sponsor proprietary de facto compatibility standards must trade off control of the standard against the imperative for adoption. For example, Microsoft and Intel in turn gained pervasive adoption of their technologies by appropriating only a single layer of the standards architecture and encouraging competition in other layers. In reaction to such proprietary strategies, the open source movement relinquished control to maximize adoption. To illustrate this, we examine the rise of the Linux operating system (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  5.  19
    Coordination processes in open source software development: The Linux case study.Federico Iannacci - 2005 - Emergence: Complexity and Organization 7 (2).
    Direct download  
     
    Export citation  
     
    Bookmark  
  6.  26
    The Performativity of Code.Adrian Mackenzie - 2005 - Theory, Culture and Society 22 (1):71-92.
    This article analyses a specific piece of computer code, the Linux operating system kernel, as an example of how technical operationality figures in contemporary culture. The analysis works at two levels. First of all, it attempts to account for the increasing visibility and significance of code or software-related events. Second, it seeks to extend familiar concepts of performativity to include cultural processes in which the creation of meaning is not central, and in which processes of circulation play a primary (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   13 citations  
  7. Setting Up LAMP on a Debian Machine A Step-by-Step Guide on Seting Up LAMP on a GCP Compute Engine with a Debian Instance.Fernando Enad - manuscript
    This electronic document serves as a guide on how to get a LAMP stack running on a Google Compute Engine virtual machine instance running Debian.
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  8. Open Source Software: A New Mertonian Ethos?Paul B. de Laat - 2001 - In Anton Vedder (ed.), Ethics and the Internet. Intersentia.
    Hacker communities of the 1970s and 1980s developed a quite characteristic work ethos. Its norms are explored and shown to be quite similar to those which Robert Merton suggested govern academic life: communism, universalism, disinterestedness, and organized scepticism. In the 1990s the Internet multiplied the scale of these communities, allowing them to create successful software programs like Linux and Apache. After renaming themselves the `open source software' movement, with an emphasis on software quality, they succeeded in gaining corporate interest. (...)
    Direct download  
     
    Export citation  
     
    Bookmark   3 citations  
  9.  49
    Language, Proof, and Logic.Dave Barker-Plummer - 1999 - New York and London: CSLI Publications. Edited by Jon Barwise & John Etchemendy.
    __Language Proof and Logic_ is available as a physical book with the software included on CD and as a downloadable package of software plus the book in PDF format. The all-electronic version is available from Openproof at ggweb.stanford.edu._ The textbook/software package covers first-order language in a method appropriate for first and second courses in logic. An on-line grading services instantly grades solutions to hundred of computer exercises. It is designed to be used by philosophy instructors teaching a logic course to (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   4 citations  
  10.  23
    Hacker ethics in the marketplace: the example of freeware.Andy Bissett - 2003 - Journal of Information, Communication and Ethics in Society 1 (1):31-38.
    An intriguing development in the realm of commercial software has arisen over the last decade, from highly improbable beginnings. From its inception in the ‘hacker ethic’, freeware has had a huge impact on IT businesses around the world, most strongly in the guise of its spin‐off, open source software. The eventual consequences are that, for example, more than 60% of all the servers on the World Wide Web are running the Apache open source system, and Linux, the open source (...)
    No categories
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  11.  12
    Can Communities Produce Complex Technology? Looking Into Space for Insight.Chris Giotitsas & Lucas Lemos - 2021 - Bulletin of Science, Technology and Society 41 (2-3):35-45.
    This article examines a community producing complex space technology. We attempt to highlight which aspects of the community’s activities can help democratize high-tech development while providing a context for similar cases involved in developing and manufacturing nonhigh-technological artefacts. We discuss how this has been made possible by using a technology-determined organizational approach based on the CubeSat open platform infrastructure, blending formal and hands-on education, open communication, specific recruitment and working practices, and a genuine passion for technology. We identify as critical (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  8
    (1 other version)Technical Objects in the Biological Century.Adrian Mackenzie - 2012 - Zeitschrift für Medien- Und Kulturforschung 3 (1):151-168.
    Wie unterscheidet sich ein Betriebssystem wie bspw. Linux von einer Mikrobe? Der Beitrag untersucht, wie technische Objekte im »Jahrhundert der Biologie« aufgefasst werden. Anhand des Werks von Gilbert Simondon wird gefragt, welche Existenzweisen biotechnische Objekte aufweisen. Die Prozesse von Abstraktion und Konkretisierung, die auf dem Feld der Synthetischen Biologie stattfinden, können einen Weg aufweisen, diese Fragen zu beantworten. How does a computer operating system such as Linux differ from a microbe? This paper explores how technical objects are envisaged (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  13.  25
    Public private partnerships to build low cost rural access.Daryl Martyris - 2003 - Journal of Information, Communication and Ethics in Society 1 (2):81-86.
    Every year thousands of computers deemed obsolete by companies upgrading to newer models are kept out of landfills by organizations like World Computer Exchange 1 which recycle them to schools in developing countries. It is possible to set up at a very low cost, clusters of recycled PCs, using Linux software to substantially reduce the cost of establishing school‐based community Internet centers. In the case of such an implementation in Goa, India by a WCE partner‐NGO the key to its (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  14.  59
    An Exploration of the Ideologies of Software Intellectual Property: The Impact on Ethical Decision Making.Matthew K. McGowan, Paul Stephens & Dexter Gruber - 2007 - Journal of Business Ethics 73 (4):409-424.
    This article helps to clarify and articulate the ideological, legal, and ethical attitudes regarding software as intellectual property (IP). Computer software can be viewed as IP from both ethical and legal perspectives. The size and growth of the software industry suggest that large profits are possible through the development and sale of software. The rapid growth of the open source movement, fueled by the development of the Linux operating system, suggests another model is possible. The large number of unauthorized (...)
    Direct download (5 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  15. System availability optimization for production and embedding of bitumen bounded materials.Milan Mirkovic - 2016 - Dissertation, University of Belgrade
    Application of the reliability of repairable systems on solving problems from constructing production systems takes an important place in the process of finding the optimal solution among the suggested system choices. The basic hypothesis when using the reliability of the repairable systems is that every machine is representing a component, a fact that is debatable when talking about technical sciences. However, considering the second assumption of the stationary process, the function of the availability is introduced. It represents the measure between (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  16.  21
    The future of ppen source software: Let the market decide.R. A. Spinello - 2003 - Journal of Information, Communication and Ethics in Society 1 (4):217-233.
    According to its supporters open source software is more secure and reliable than proprietary code, and even tends to foster more innovation. Its technical superiority can be linked to the ongoing peer review process which typifies the open source model. In addition, programs such as Linux offer a potential challenge to the hegemony of Microsoft. Open source holds out the possibility of restraining platform leaders such as Microsoft from acting opportunistically. Some even argue that the open source code model (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  17.  14
    Improving the efficiency of intrusion detection in information systems.Bouderah Brahim, Nacer Eddine Yousfi, Bourenane Malika & Lounis Ouarda - 2022 - Journal of Intelligent Systems 31 (1):835-854.
    Policy Interaction Graph Analysis is a Host-based Intrusion Detection tool that uses Linux MAC Mandatory access control policy to build the licit information flow graph and uses a detection policy defined by the administrator to extract illicit behaviour from the graph. The main limitation of this tool is the generation of a huge signature base of illicit behaviours; hence, this leads to the use of huge memory space to store it. Our primary goal in this article is to reduce (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  18.  50
    The Open-Source Everything Manifesto: Transparency, Truth, and Trust by Robert David Steele.Martin Paul Eve - 2016 - Utopian Studies 27 (1):121-124.
    What is there not to like about “openness”? The premise seems to have virtue, particularly in the space of critique of government. From totalitarianism through to oligarchies, it can be argued that it is opacity and secrecy that have contributed to abuses of power for many centuries. In other spaces, the notion has caught hold. In several scientific fields, it appears that a lack of openness can lead to misconduct and in some cases a slowness that may cost lives. In (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  19. Oyun: A New, Free Program for Iterated Prisoner’s Dilemma Tournaments in the Classroom.Charles H. Pence & Lara Buchak - 2012 - Evolution Education and Outreach 5 (3):467-476.
    Evolutionary applications of game theory present one of the most pedagogically accessible varieties of genuine, contemporary theoretical biology. We present here Oyun (OY-oon, http://charlespence.net/oyun), a program designed to run iterated prisoner’s dilemma tournaments, competitions between prisoner’s dilemma strategies developed by the students themselves. Using this software, students are able to readily design and tweak their own strategies, and to see how they fare both in round-robin tournaments and in “evolutionary” tournaments, where the scores in a given “generation” directly determine contribution (...)
    Direct download (7 more)  
     
    Export citation  
     
    Bookmark  
  20.  62
    Detecting evolving patterns of self‐organizing networks by flow hierarchy measurement.Jianxi Luo & Christopher L. Magee - 2011 - Complexity 16 (6):53-61.
    Hierarchies occur widely in evolving self‐organizing ecological, biological, technological, and social networks, but detecting and comparing hierarchies is difficult. Here we present a metric and technique to quantitatively assess the extent to which self‐organizing directed networks exhibit a flow hierarchy. Flow hierarchy is a commonly observed but theoretically overlooked form of hierarchy in networks. We show that the ecological, neurobiological, economic, and information processing networks are generally more hierarchical than their comparable random networks. We further discovered that hierarchy degree has (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  21.  18
    Language, Proof and Logic: Text and Cd.Jon Barwise & John Etchemendy - 2002 - Center for the Study of Language and Inf.
    This textbook/software package covers first-order language in a method appropriate for first and second courses in logic. The unique on-line grading services instantly grades solutions to hundred of computer exercises. It is specially devised to be used by philosophy instructors in a way that is useful to undergraduates of philosophy, computer science, mathematics, and linguistics. The book is a completely rewritten and much improved version of The Language of First-order Logic. Introductory material is presented in a more systematic and accessible (...)
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  22.  29
    (1 other version)Evaluating the potential for using affect-inspired techniques to manage real-time systems.W. Scott Neal Reilly, Gerald Fry, Sean Guarino, Michael Reposa, Richard West, Ralph Costantini & Josh Johnston - forthcoming - Philosophical Explorations.
    We describe a novel affect-inspired mechanism to improve the performance of computational systems operating in dynamic environments. In particular, we designed a mechanism that is based on aspects of the fear response in humans to dynamically reallocate operating system-level central processing unit (CPU) resources to processes as they are needed to deal with time-critical events. We evaluated this system in the MINIX® and Linux® operating systems and in three different testing environments (two simulated, one live). We found the affect-based (...)
    Direct download  
     
    Export citation  
     
    Bookmark