background preloader

Software for social network analysis

Software for social network analysis

UCINET Software Customer Support For customer support (e.g., ordering info, billing etc) contact roberta@analytictech.com. For tech support join the users group or contact support@analytictech.com. We prefer you try the users group first since the answer to your question may benefit others. In addition, you should check out the support page, which includes useful things like tutorial exercises. Fixes, improvements, upgrades UCINET is constantly being upgraded to fix problems, provide new capabilities, or generally make things better. Download and/or Purchase The program can be downloaded and used for free for 90 days. Requirements and Specifications Windows operating system Vista or later. nsa-observer Mosh: the mobile shell S Routines for Social Network Analysis in the R Environment Most of which involve social network analysis, though a wee bit 'o other stuff is available as well.... Introduction and Caveats This page serves, as one might expect, to allow other researchers to access some of the data analysis tools I've developed in the S language. The implementation of S used here is that of the R Statistical Computing Environment , rather than the common alternative of S-PLUS ; the intrepid could doubtless port these routines from one flavor of the language to the other, however. Caveats: This software is provided on an unsupported, as-is basis, under the terms of the GNU Public License . Getting and Using R The R statistical computing environment is distributed under the GNU Public License , and can be freely obtained either as source or as precompiled binaries for a wide range of platforms. The Statnet Project Most of the material contained here is now part of the Statnet Project , a collaborative effort to develop Free Software tools for network analysis.

[Tutorial] Antena Casera Direccional de alta sensibilidad "Belgrano 2NI" 11.9db's. Construcción de Antena Casera Direccional Wifi de alta sensibilidad (11.9db's.)Buenas Compañeros foreros, los saludos y les presento una antena wifi direccional de fácil construcción, casera y que da excelentes resultados si se construye bien, esta antena a enlazado a 910km en condiciones ideales, con ella podrán recibir señales en muy buena calidad y poder explorar otras. Espero que posteen sus creaciones aquí

Create Your Own Automated Twitter Robot in PHP The ultimate guide to creating your own personalized twitterfeed clone! Kidding… Actualy this is just a mockup, a simple prototype, which is way too fresh for any actual use. We’ll take this forward step by step. I’m not going to give out all my sources but I’ll guide you through authentication, rss lookup, parsing, thanking for retweets, and shooting random stuff at people that mention your robot. Here’s a brief list of features we will implement: Runs in console, no HTTP accessAuthentication via OAuth, tweeting via OAuthRSS lookup, parsing, forming tweets in bound of 140 characters including a postfix (hashtag or RT)Tweeting ‘thank you for retweeting’ to users that retweet the robotFollowing people that retweet the robotActing strange on users that mention the robot All this is going to be setup on a linux box running crond and acting every 15 minutes or so. Registering an App at Twitter OAuth Clients Setting up the Environment What environment? Authentication: Storing the Access Tokens

Gephi, an open source graph visualization and manipulation software La ética del hacker y el espíritu de la era de la información La ética del hacker y el espíritu de la era de la información es un libro escrito por el finés Pekka Himanen. El libro contiene un prólogo de Linus Torvalds y un epílogo de Manuel Castells, analiza la ética hacker.[1] Autores[editar] La obra[editar] En el prefacio, Castell compara la ética hacker con la ética protestante del trabajo que gobierna las vidas de la mayoría de la población. En el prólogo, Torvalds presenta su ley. Primera parte: la ética del trabajo[editar] En el primer apartado Himanen ahonda en la comparación entre la la ética hacker con la ética protestante del trabajo y la ética cristiana preprotestante. El segundo apartado comenta como en la época previa a la revolución industrial el trabajo (manual principalmente) era flexible. Segunda parte: la ética del dinero[editar] El tercer capítulo destaca la importancia del capital en las empresas. Se describe como un programa libre es el estado del arte, pues incluye todo el conocimiento informático sobre una materia.

Related: