Listing 1 - 7 of 7 |
Sort by
|
Choose an application
Protocol --- Network --- Communication --- Data Base --- Arpanet
Choose an application
Computer architecture. Operating systems --- Arpanet --- Architecture --- Annotated Bibliography --- Local Network --- Network --- Distributed systems --- Protocol
Choose an application
"Starting in the early 1960s, there was fear in America about the proliferation of computer database and networking technologies. People worried that these systems were going to be used by both corporations and governments for surveillance and control. Indeed, the dominant cultural view at the time was that computers were tools of repression, not liberation -- and that included the ARPANET, the military research network that would grow into the Internet we use today. Surveillance Valley starts in the past, but moves into the present, looking at the private surveillance business that powers much of Silicon Valley and the overlap between the Internet and the military-industrial complex. It also investigates and uncovers the close ties that exist between U.S. intelligence agencies and the anti-government privacy movement that has sprung up in the wake of Edward Snowden's leaks. The Internet was developed as a weapon, and remains a weapon today. American military interests continue to dominate all parts of the network, even those that supposedly stand in opposition."--Provided by publisher
Electronic surveillance --- Internet --- Civil-military relations --- Military research --- ARPANET (Computer network) --- Domestic intelligence --- Subculture --- Internet --- Privacy, Right of --- Intelligence service
Choose an application
Does Silicon Valley deserve all the credit for digital creativity and social media? Joy Rankin questions this triumphalism by revisiting a pre-PC time when schools were not the last stop for mature consumer technologies but flourishing sites of innovative collaboration—when users taught computers and visionaries dreamed of networked access for all.
Computer systems --- Computer networks --- Information commons --- History --- History --- History --- ARPANET. --- BASIC. --- PC. --- Silicon Valley. --- computer history. --- computers. --- digital culture.
Choose an application
Germanistik --- Internet --- Zeitschrift --- Online-Ressource --- Literaturwissenschaft --- Computerunterstütztes Verfahren --- Netzpublikation --- Online-Publikation --- Computerdatei im Fernzugriff --- Online-Dokument --- On-line-Dokument --- On-line-Publikation --- Elektronische Publikation --- Periodikum --- Zeitschriften --- Presse --- Fortlaufendes Sammelwerk --- Computergestütztes Verfahren --- Computerunterstützte Methode --- Rechnerunterstütztes Verfahren --- Rechnergestütztes Verfahren --- Computer aided method --- Computer assisted method --- Computer based method --- Computerbasiertes Verfahren --- Rechnerunterstützte Methode --- Rechnerunterstützung --- Computerunterstützung --- Computer aid --- Computer assistance --- Datenverarbeitung --- Literaturwissenschaften --- Philologie --- Datenautobahn --- ARPANet --- Webwissenschaft --- Rechnernetz --- TCP/IP --- Deutsche Philologie --- Deutsch --- Computergestütztes Verfahren --- Computerunterstützte Methode --- Rechnerunterstütztes Verfahren --- Rechnergestütztes Verfahren --- Rechnerunterstützte Methode --- Rechnerunterstützung --- Computerunterstützung
Choose an application
Dem raketenhaften Aufstieg der Piratenpartei folgte ihr ebenso schneller Niedergang. Ist das mit ihr verbundene Experiment politischer Willensbildung - Liquid Democracy - also ebenso gescheitert? Auf dem originellen Weg der Grounded Theory nähert sich Anja Adler der jüngsten deutschen Politikgeschichte, um sich mit dem ambitionierten Vorschlag zur Entwicklung eines neuen Betriebssystems für die Politik auseinanderzusetzen. Durch zahlreiche Interviews mit den Akteurinnen internet-gestützter Beratungs- und Entscheidungsverfahren zeichnet sie ein lebendiges und durchaus zukunftstaugliches Portrait sowohl der konkreten Verfahren als auch der Einstellungen und Visionen von Demokratieentwicklerinnen.
Decision-making. --- Democracy. --- Demokratie. --- Entscheidungsfindung. --- Grounded Theory. --- Liquid Democracy. --- Political Science. --- Political System. --- Political Theory. --- Politics. --- Politik. --- Politikwissenschaft. --- Politische Theorie. --- Politisches System. --- Software. --- Politische Willensbildung --- Demokratie --- Internet --- Grounded theory --- POLITICAL SCIENCE / Political ideologies / Democracy. --- Qualitative Sozialforschung --- Datenautobahn --- ARPANet --- Webwissenschaft --- Rechnernetz --- TCP/IP --- Volksherrschaft --- Demokratischer Staat --- Democracy --- Herrschaftssystem --- Parteienstaat --- Republik --- Volkssouveränität --- Demokratische Bewegung --- Demokrat --- Postdemokratie --- Politik --- Politische Entscheidung --- Willensbildung --- Piratenpartei; Liquid Democracy; Grounded Theory; Software; Entscheidungsfindung; Politik; Demokratie; Politische Theorie; Politics; Politisches System; Politikwissenschaft; Pirate Party; Decision-making; Democracy; Political Theory; Political System; Political Science --- Piratenpartei Deutschland --- Influence --- PIRATEN (Political party : Germany) --- Pirate Party (Germany) --- Pirates (Political party : Germany)
Choose an application
"Everything from law enforcement to space exploration relies on code written by people who, at the time, made choices and assumptions that would have long-lasting, profound implications for society. Torie Bosch brings together many of today’s leading technology experts to provide new perspectives on the code that shapes our lives. Contributors discuss a host of topics, such as how university databases were programmed long ago to accept only two genders, what the person who programmed the very first pop-up ad was thinking at the time, the first computer worm, the Bitcoin white paper, and perhaps the most famous seven words in Unix history: “You are not expected to understand this.” This compelling book tells the human stories behind programming, enabling those of us who don’t think much about code to recognize its importance, and those who work with it every day to better understand the long-term effects of the decisions they make. With an introduction by Ellen Ullman and contributions by Mahsa Alimardani, Elena Botella, Meredith Broussard, David Cassel, Arthur Daemmrich, Charles Duan, Quinn DuPont, Claire L. Evans, Hany Farid, James Grimmelmann, Katie Hafner, Susan C. Herring, Syeda Gulshan Ferdous Jana, Lowen Liu, John MacCormick, Brian McCullough, Charlton McIlwain, Lily Hay Newman, Margaret O’Mara, Will Oremus, Nick Partridge, Benjamin Pope, Joy Lisi Rankin, Afsaneh Rigot, Ellen R. Stofan, Lee Vinsel, Josephine Wolff, and Ethan Zuckerman." -- Publisher's description.
Computer programming --- Computer science --- COMPUTERS / Programming / General. --- Social aspects --- ARPANET. --- Addition. --- Advertising. --- Adviser. --- Amplitude. --- Analogy. --- Association for Computing Machinery. --- Attendance. --- Binary number. --- Black people. --- COBOL. --- Capability. --- Censorship. --- Certificate authority. --- Charles Babbage. --- Collaboration. --- Communication. --- Computation. --- Computer Fraud and Abuse Act. --- Computer. --- Computing. --- Consideration. --- Conspiracy theory. --- Data processing system. --- Debug (command). --- Detection. --- Digital Equipment Corporation. --- Edsger W. Dijkstra. --- Ellen Ullman. --- Email. --- Espionage. --- Fake news. --- Flight controller. --- Fortran. --- Fragility. --- GLIMPSE. --- Gravity well. --- Hidden Figures. --- Hyperlink. --- Identifier. --- Imagination. --- Infrasound. --- Ingenuity. --- Instrumentation. --- Intermediary. --- JPEG. --- Jacquard loom. --- Kapton. --- Katie Hafner. --- Larry Page. --- Law enforcement. --- Low-budget film. --- Magnetic field. --- Malware. --- Mathematician. --- Michael Mandiberg. --- Molecule. --- Morris worm. --- Nickname. --- Operating system. --- Orbital eccentricity. --- PDP-1. --- PL/I. --- Password. --- Perforated paper. --- Personalization. --- Pixel. --- Plumbing. --- Pollution. --- Pop-up ad. --- Popularity. --- Prediction. --- Process control. --- Profanity. --- Programmer. --- Programming language. --- Publication. --- Ray Tomlinson. --- Risk assessment. --- Screenshot. --- Server (computing). --- Shortage. --- Sobriquet. --- Software. --- Source lines of code. --- Spacecraft. --- Spacewar (video game). --- Spamming. --- Surveillance. --- System administrator. --- TX-0. --- Technology. --- Telegraphy. --- Teleprinter. --- The Misunderstanding. --- Thought. --- Unemployment. --- Unix. --- Verb. --- Vulnerability (computing). --- Informatics --- Science --- Computers --- Electronic computer programming --- Electronic data processing --- Electronic digital computers --- Programming (Electronic computers) --- Coding theory --- Programming --- Sociology of knowledge --- COMPUTERS / Programming / General --- SOCIAL SCIENCE / Technology Studies
Listing 1 - 7 of 7 |
Sort by
|