Advanced Search
Search Results
1352 total results found
Microsoft VHD Test Drive Program
( Quoting ) " The Microsoft Virtual Hard Disk (VHD) format is the common virtualization file format that provides a uniform product support system, and provides more seamless manageability, security, reliability and cost-efficiency for customers.Using the powe...
Files, File Types, File Extensions, and Folders
File – A computer file is a way to store information on a computer so it can be used later, and perhaps exchanged with other people. Depending on what you are doing, you might have different types of files. For example if you write an essay for a class, then y...
cron job examples
Here are some interesting examples of cron job use. http://www.thegeekstuff.com/2009/06/15-practical-crontab-examples/ – I didn’t know about @monthly, @yearly, and @reboot, or changing the MAIL destination setting. http://www.pantz.org/software/cron/croninfo.h...
How to get an image to show with your shared link on Facebook
Have you ever tried to share a link in an FB post and were frustrated when a thumbnail image didn’t show up with the blurb? Those all-text posts sure look boring…If so, try putting the URL in Facebook’s Debugging tool: https://developers.facebook.com/tools/deb...
jQuery Tutorial
Learn the basic building blocks of jQuery in a two hour combination of videos, and interactive console challenges. – http://try.jquery.com/Please list any other useful jQuery Tutorials you know of.
Digital Research Tools
http://dirt.projectbamboo.org/ – “collection registry of digital research tools for scholarly use.” organized by task Six Data Analysis Tools Anyone Can Use GGobi – “is an open source visualization program for exploring high-dimensional data.”Please add other...
adding date to bash history command
Coming from Solaris to Linux, one thing I’ve missed for years was that the Linux bash history command doesn’t show timestamps. Thanks to my colleague, Shinn, I learned about this config settings that can go into .bashrc to solve that problem, and add a few ot...
Digital Public Library of America
http://www.nybooks.com/articles/archives/2013/apr/25/national-digital-public-library-launched/
Install Sophos on Mac OS 10.8
By default, Mac OS 10.8 only allows users to install applications from ‘verified sources’. BOL downloads are not verified; therefore, upon installation you will receive the error message: “Downloaded Program.mpkg” can’t be opened because it is from an unident...
capture data from PDF tables
Upload a PDF, get back tabular CSV data. Introducing Tabula Tabula Demo Site Tabula source codeEDIT:I just used this application with great success to convert the data from old instructor evaluations into csv form. It took some jury-rigging to get the output i...
Making Screenshots in Windows
In Windows, most users are at least familiar with the “Print Screen” button, which copies the ENTIRE screen to the pasteboard and can be copied into emails, manuals, etc.But if you want to capture a selection, you need to use the SNIPPING TOOL. (and have at l...
Mac OS Printing on Dell 2130cdn
Download and install the following (order matters!) http://www.openprinting.org/download/printdriver/macosx/gplgs-8.64so-ub.dmg http://www.openprinting.org/download/printdriver/macosx/foomatic-rip-4.0.2.211.dmg http://www.openprinting.org/download/printdr...
GDELT: Global Data on Events, Location and Tone
April 2013: Researchers have released the GDELT: Global Data on Events, Location and Tone dataset which promises to be an important addition to the social science research community.In a blog post entitled, The Future of Political Science Just Showed Up, Jay U...
Free web content: sounds/sound effects you can add to your non-commercial sites
Reprinted from the Internet Scout (http://scout.wisc.edu)http://www.soundgator.com/If you are looking for sound effects for just about any situation, look no further than the solid aural content right here at the SoundGator website. The offerings here are cont...
Symantec's Annual Internet Security Threat Report
The Internet Security Threat Report (ISTR) provides an overview and analysis of the year in global threat activity. The report is based on data from the Symantec Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide comme...
Sophos Security Threat Report
See the threats through the hype, with the latest research and commentary from SophosLabs. http://www.sophos.com/ThreatReportSee also, 2013, http://www.sophos.com/en-us/security-news-trends/reports/security-threat-report.aspx 2012, http://www.sophos.com/threat...
Accessing Pew Research Data
Most of the Pew Research Center survey and other quantitative data is freely available for secondary analysis by researchers. (Experience with SPSS, SAS, or STATA software is helpful.)http://www.pewresearch.org/2013/04/18/how-to-access-pew-research-datasets/
Command Line Tools to Monitor Linux Performance
If you have any tools for monitoring Linux, or have comments or limitations on these, please add them to this article. Thanks, 15 Command Line Tools to Monitor Linux Performance