On Mon, Jun 11, 2012 at 10:45 PM, Michael Norrish <
[email protected]> wrote:
> Please follow the instructions at
>
> http://hol.sourceforge.net/InstallKananaskis.html
>
> (This includes a download link for Moscow ML.)
>
> By the way, on Linux I'd strongly recommend using Poly/ML instead; it's
> much faster.
>
Perhaps that page should list Poly/ML first then. And/or a sentence about
trade-offs.
>
> If things go wrong, please post copies of the errors you get, and we can
> try to help.
>
> Michael
>
> On 11/06/2012, at 20:14, Aisha Khan <[email protected]> wrote:
>
> > hey. kindly send us a link from where we download moscow ML on linux.
> because we do not get proper installation steps.
> >
> > --
> > Best regards,
> > Aisha Khan,
> > BEE5-A,
> > SEECS-NUST.
> >
> >
> ------------------------------------------------------------------------------
> > Live Security Virtual Conference
> > Exclusive live event will cover all the ways today's security and
> > threat landscape has changed and how IT managers can respond. Discussions
> > will include endpoint security, mobile security and the latest in malware
> > threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> > _______________________________________________
> > hol-info mailing list
> > [email protected]
> > https://lists.sourceforge.net/lists/listinfo/hol-info
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> hol-info mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/hol-info
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
hol-info mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/hol-info