Results 41 to 50 of about 205,649 (344)

Espíritu hacker: empoderando ciudadanos digitales

open access: yesEdutec, 2022
Abordamos la educación a partir de la perspectiva de los primeros hackers, aquellos apasionados por la programación compartida y el código abierto, pero también de todos los que entienden el conocimiento humano como un bien común.
Nelson De Luca Pretto   +2 more
doaj   +1 more source

Review of Douglas Thomas, “Hacker Culture” [PDF]

open access: yes, 2005
This article reviews the book '“Hacker Culture” by Douglas ...
Legg, Catherine
core   +1 more source

Price Premiums for Single‐Name and Compound‐Name Geographical Indications in Swiss Cheese Trade

open access: yesAgribusiness, EarlyView.
ABSTRACT Geographical indications (GIs) have become increasingly important in agri‐food markets, especially in Europe. For Swiss cheese imports and exports, we analyze whether GIs are associated with higher trade prices. We find that price premiums can be obtained for both exports and imports. However, this is only the case for cheeses with single name
Judith Irek
wiley   +1 more source

Cybercrime and Digital Transformation

open access: yesТеоретическая и прикладная юриспруденция, 2021
Cyberspace crime is a critical threat to the information security of the state and civil society institutions. Inside global network the abuse of computer user’s trust allows organized criminal groups to achieve their economic and political goals by ...
V. P. Kirilenko, G. V. Alekseev
doaj   +1 more source

Newspaper of the university of alaska southeast juneau campus [PDF]

open access: yes, 1988
Center seeks student funds -- Council springs for microwave -- Nov. ballot raises community college issue anew -- Strong turnout marks USUAS balloting -- Lure of Alaska hooks and holds Griswold -- 'Date rape' growing problem; help available -- Hacker ...

core  

The Interoperability Challenge in DFT Workflows Across Implementations

open access: yesAdvanced Intelligent Discovery, EarlyView.
Interoperability and cross‐validation remain major challenges in the computational materials science. In this work, we introduce a common input/output standard that enables internal translation across multiple workflow managers—AiiDA, PerQueue, Pipeline Pilot, and SimStack—while producing results in a unified schema.
Simon K. Steensen   +13 more
wiley   +1 more source

A Novel Parameter Estimation Method for Pneumatic Soft Hand Control Applying Logarithmic Decrement for Pseudo‐Rigid Body Modeling

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
In this research, a paradigm of parameter estimation method for pneumatic soft hand control is proposed. The method includes the following: 1) sampling harmonic damping waves, 2) applying pseudo‐rigid body modeling and the logarithmic decrement method, and 3) deriving position and force control.
Haiyun Zhang   +4 more
wiley   +1 more source

Predatory Business Practices: Automobile Financing [PDF]

open access: yes, 2008
Poverty is an ever-growing problem affecting much of the country. People fall into financial holes and certain industries make sure that they stay there. Low-income individuals are targets for businesses that make their money by providing needed benefits
Jones, Rachel
core   +1 more source

The impact of a preprescribing formative assessment on learning in final‐year medical students using hospital inpatient electronic prescribing systems

open access: yesBritish Journal of Clinical Pharmacology, EarlyView.
Aims Graduating medical students consistently report being unprepared for the complexity of prescribing in clinical practice. Current clinical prescribing teaching and authentic assessment are limited due to patient safety concerns. We aimed to examine the educational utility of supervised preprescribing as a learning process and potential authentic ...
Kellie A. Charles   +7 more
wiley   +1 more source

La scénographie numérique du discours hacktiviste des Anonymous

open access: yesCommunication, 2016
This discourse analysis looks at the digital staging of hacktivist discourse by members of Anonymous. The authors study the staging of a group of anonymous hackers who have risen to prominence through their counter-discourse and anti-government ...
Warda Baba Hamed, Sabiha Benmansour
doaj   +1 more source

Home - About - Disclaimer - Privacy