Narrow your search
Listing 1 - 7 of 7
Sort by

Book
Sixth Data communications symposium, November 27-29, 1979, Asilomar conference grounds, Pacific Grove, California
Author:
Year: 1979 Publisher: Long Beach, Calif.: IEEE Computer society,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Keywords

Protocol --- Network --- Communication --- Data Base --- Arpanet

Linked local area networks
Author:
ISBN: 0471801526 9780471801528 Year: 1986 Publisher: New York: Wiley,

Loading...
Export citation

Choose an application

Bookmark

Abstract


Book
Surveillance valley : the rise of the military-digital complex
Author:
ISBN: 9781610398022 1610398025 Year: 2018 Publisher: New York, N.Y.: PublicAffairs,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Starting in the early 1960s, there was fear in America about the proliferation of computer database and networking technologies. People worried that these systems were going to be used by both corporations and governments for surveillance and control. Indeed, the dominant cultural view at the time was that computers were tools of repression, not liberation -- and that included the ARPANET, the military research network that would grow into the Internet we use today. Surveillance Valley starts in the past, but moves into the present, looking at the private surveillance business that powers much of Silicon Valley and the overlap between the Internet and the military-industrial complex. It also investigates and uncovers the close ties that exist between U.S. intelligence agencies and the anti-government privacy movement that has sprung up in the wake of Edward Snowden's leaks. The Internet was developed as a weapon, and remains a weapon today. American military interests continue to dominate all parts of the network, even those that supposedly stand in opposition."--Provided by publisher


Book
A people's history of computing in the United States
Author:
ISBN: 0674988515 0674988531 Year: 2018 Publisher: Cambridge, MA : Harvard University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Does Silicon Valley deserve all the credit for digital creativity and social media? Joy Rankin questions this triumphalism by revisiting a pre-PC time when schools were not the last stop for mature consumer technologies but flourishing sites of innovative collaboration—when users taught computers and visionaries dreamed of networked access for all.


Periodical

Book
Liquid Democracy in Deutschland : Zur Zukunft digitaler politischer Entscheidungsfindung nach dem Niedergang der Piratenpartei
Author:
ISBN: 3839442605 3837642607 Year: 2018 Publisher: Bielefeld transcript Verlag

Loading...
Export citation

Choose an application

Bookmark

Abstract

Dem raketenhaften Aufstieg der Piratenpartei folgte ihr ebenso schneller Niedergang. Ist das mit ihr verbundene Experiment politischer Willensbildung - Liquid Democracy - also ebenso gescheitert? Auf dem originellen Weg der Grounded Theory nähert sich Anja Adler der jüngsten deutschen Politikgeschichte, um sich mit dem ambitionierten Vorschlag zur Entwicklung eines neuen Betriebssystems für die Politik auseinanderzusetzen. Durch zahlreiche Interviews mit den Akteurinnen internet-gestützter Beratungs- und Entscheidungsverfahren zeichnet sie ein lebendiges und durchaus zukunftstaugliches Portrait sowohl der konkreten Verfahren als auch der Einstellungen und Visionen von Demokratieentwicklerinnen.


Book
You are not expected to understand this : how 26 lines of code changed the world
Authors: --- ---
ISBN: 9780691230818 0691230811 9780691208480 0691208484 Year: 2022 Publisher: Princeton, New Jersey : Princeton University Press,

Loading...
Export citation

Choose an application

Bookmark

Abstract

"Everything from law enforcement to space exploration relies on code written by people who, at the time, made choices and assumptions that would have long-lasting, profound implications for society. Torie Bosch brings together many of today’s leading technology experts to provide new perspectives on the code that shapes our lives. Contributors discuss a host of topics, such as how university databases were programmed long ago to accept only two genders, what the person who programmed the very first pop-up ad was thinking at the time, the first computer worm, the Bitcoin white paper, and perhaps the most famous seven words in Unix history: “You are not expected to understand this.” This compelling book tells the human stories behind programming, enabling those of us who don’t think much about code to recognize its importance, and those who work with it every day to better understand the long-term effects of the decisions they make. With an introduction by Ellen Ullman and contributions by Mahsa Alimardani, Elena Botella, Meredith Broussard, David Cassel, Arthur Daemmrich, Charles Duan, Quinn DuPont, Claire L. Evans, Hany Farid, James Grimmelmann, Katie Hafner, Susan C. Herring, Syeda Gulshan Ferdous Jana, Lowen Liu, John MacCormick, Brian McCullough, Charlton McIlwain, Lily Hay Newman, Margaret O’Mara, Will Oremus, Nick Partridge, Benjamin Pope, Joy Lisi Rankin, Afsaneh Rigot, Ellen R. Stofan, Lee Vinsel, Josephine Wolff, and Ethan Zuckerman." -- Publisher's description.

Keywords

Computer programming --- Computer science --- COMPUTERS / Programming / General. --- Social aspects --- ARPANET. --- Addition. --- Advertising. --- Adviser. --- Amplitude. --- Analogy. --- Association for Computing Machinery. --- Attendance. --- Binary number. --- Black people. --- COBOL. --- Capability. --- Censorship. --- Certificate authority. --- Charles Babbage. --- Collaboration. --- Communication. --- Computation. --- Computer Fraud and Abuse Act. --- Computer. --- Computing. --- Consideration. --- Conspiracy theory. --- Data processing system. --- Debug (command). --- Detection. --- Digital Equipment Corporation. --- Edsger W. Dijkstra. --- Ellen Ullman. --- Email. --- Espionage. --- Fake news. --- Flight controller. --- Fortran. --- Fragility. --- GLIMPSE. --- Gravity well. --- Hidden Figures. --- Hyperlink. --- Identifier. --- Imagination. --- Infrasound. --- Ingenuity. --- Instrumentation. --- Intermediary. --- JPEG. --- Jacquard loom. --- Kapton. --- Katie Hafner. --- Larry Page. --- Law enforcement. --- Low-budget film. --- Magnetic field. --- Malware. --- Mathematician. --- Michael Mandiberg. --- Molecule. --- Morris worm. --- Nickname. --- Operating system. --- Orbital eccentricity. --- PDP-1. --- PL/I. --- Password. --- Perforated paper. --- Personalization. --- Pixel. --- Plumbing. --- Pollution. --- Pop-up ad. --- Popularity. --- Prediction. --- Process control. --- Profanity. --- Programmer. --- Programming language. --- Publication. --- Ray Tomlinson. --- Risk assessment. --- Screenshot. --- Server (computing). --- Shortage. --- Sobriquet. --- Software. --- Source lines of code. --- Spacecraft. --- Spacewar (video game). --- Spamming. --- Surveillance. --- System administrator. --- TX-0. --- Technology. --- Telegraphy. --- Teleprinter. --- The Misunderstanding. --- Thought. --- Unemployment. --- Unix. --- Verb. --- Vulnerability (computing). --- Informatics --- Science --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Sociology of knowledge --- COMPUTERS / Programming / General --- SOCIAL SCIENCE / Technology Studies

Listing 1 - 7 of 7
Sort by