Home Tags Command

Tag: command

Profanity: The Command Line Instant Messenger

1
Profanity is a text based instant messaging application which uses Command line Interface (CLI), which beats many GUI (Graphical User Interface) applications of a...

Apache OpenNLP: A Command Line Approach

0
Natural language processing (NLP) is a field of computer science, artificial intelligence and computational linguistics that explores the relationship between computers and natural languages....

Explore LaTeX and Syntax Highlighting with Scilab

0
This article, the last of a four-part series on Scilab, takes a look at LaTeX and syntax highlighting with Scilab. It is aimed at...

Linux Without Wires The Basics of Bluetooth

2
Bluetooth technology is used for short range (1 metre to 100 metres) communication. It is the most widespread wireless technology, and is divided into...

A Peek Into Open Source Verilog Simulator

0
Verilog, a hardware description language, is used to model electronic systems, and to design and verify digital circuitry at the register-transfer level of abstraction....

Carry Out Data Mining and Machine Learning with WEKA

0
WEKA is a collection of visualisaton tools and algorithms for data analysis and predictive modelling. It is very popular among users and developers as...

Jumpstart Linux Kernel Module Programming

3
Here's an introduction to the Linux kernel module, along with an explanation on how to write a simple pluggable module to the Linux kernel...

The CloudSim Framework: Modelling and Simulating the Cloud Environment

3
CloudSim provides a generalised and extensible simulation framework that enables seamless modelling and simulation of app performance. By using CloudSim, developers can focus on...

Secure Your Network with Firewall Builder

1
A firewall isolates a trusted, secure internal network from another network like the Internet, which is not regarded as either trusted or secure. Firewall...

Set Up a Certificate Authority in RHEL5

0
Security certificates are widely used for authentication. This article explores how to set up a Certificate Authority in RHEL5. Security certificates are basically used for...