scholarly journals BluePyOpt: Leveraging Open Source Software and Cloud Infrastructure to Optimise Model Parameters in Neuroscience

2016 ◽  
Vol 10 ◽  
Author(s):  
Werner Van Geit ◽  
Michael Gevaert ◽  
Giuseppe Chindemi ◽  
Christian Rössert ◽  
Jean-Denis Courcol ◽  
...  
2012 ◽  
Vol 2 (1) ◽  
pp. 44-57 ◽  
Author(s):  
Yannis Siahos ◽  
Iasonas Papanagiotou ◽  
Alkis Georgopoulos ◽  
Fotis Tsamis ◽  
Ioannis Papaioannou

The authors present their experience and practices of introducing cloud services, as a means to simplify the adoption of ICT (Information Communication and Technology) in education, using Free/Open Source Software. The solution creates a hybrid cloud infrastructure, in order to provide a pre-installed (Ubuntu and Linux Terminal Server Project) virtual machine, acting as a server inside the school, providing desktop environment based on the Software as a Service cloud model, where legacy PCs act as stateless devices. Classroom management is accomplished using the application “Epoptes.” To minimize administration tasks, educational software is provided accordingly, either on-line or through repositories to automate software installation (including patches and updates). The advantages of the hybrid cloud implementation, include services that are not completely dependent on broadband connections’ state, minimal cost, reusability of obsolete equipment, ease of administration, centralized management, patches and educational software provisioning and, above all, facilitation of the educational procedure.


Author(s):  
Pau Fonseca i Casas ◽  
Raül Tormos

We present a methodology to enable users to interact with statistical information owned by an institution and stored in a cloud infrastructure. Mainly based on R, this approach was developed following the open-data philosophy. Also, since we use R, the implementation is mainly based on open-source software. R gives several advantages from the point of view of data management and acquisition, as it becomes a common framework that can be used to structure the processes involved in any statistical operation. This simplifies the access to the data and enable to use all the power of R in the cloud information. This methodology was applied successfully to develop a tool to manage the data of the Centre d’Estudis d’Opinió, but it can be applied to other institutions to enable open access to its data. The infrastructure also was deployed to a cloud infrastructure, to assure the scalability and a 24/7 access.


2010 ◽  
Author(s):  
Stephanos Androutsellis-Theotokis

Author(s):  
Passakorn PHANNACHITTA ◽  
Akinori IHARA ◽  
Pijak JIRAPIWONG ◽  
Masao OHIRA ◽  
Ken-ichi MATSUMOTO

2018 ◽  
Author(s):  
Mengyi Zheng ◽  
Hong Duc Doan ◽  
Kazuyoshi Fushinobu

Author(s):  
Christina Dunbar-Hester

Hacking, as a mode of technical and cultural production, is commonly celebrated for its extraordinary freedoms of creation and circulation. Yet surprisingly few women participate in it: rates of involvement by technologically skilled women are drastically lower in hacking communities than in industry and academia. This book investigates the activists engaged in free and open-source software to understand why, despite their efforts, they fail to achieve the diversity that their ideals support. The book shows that within this well-meaning volunteer world, beyond the sway of human resource departments and equal opportunity legislation, members of underrepresented groups face unique challenges. The book explores who participates in voluntaristic technology cultures, to what ends, and with what consequences. Digging deep into the fundamental assumptions underpinning STEM-oriented societies, the book demonstrates that while the preferred solutions of tech enthusiasts—their “hacks” of projects and cultures—can ameliorate some of the “bugs” within their own communities, these methods come up short for issues of unequal social and economic power. Distributing “diversity” in technical production is not equal to generating justice. The book reframes questions of diversity advocacy to consider what interventions might appropriately broaden inclusion and participation in the hacking world and beyond.


2015 ◽  
Vol 4 (1) ◽  
pp. 1224-1228 ◽  
Author(s):  
Debasish Chakraborty ◽  
◽  
Debanjan Sarkar ◽  
Shubham Agarwal ◽  
Dibyendu Dutta ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document