The NSA - The Super Secret National Security Agencyhttps://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm
to Infect 'Millions' of Computers with Malware - How the NSA Spies on Your Google and Yahoo Accounts - Inside TAO - Documents Reveal Top NSA
Privacy Policy – The Markuphttps://themarkup.org/privacy
whether via personal computers, mobile devices, or otherwise, and other interactive features, applications (including mobile applications), or downloads that are operated by The M
Data-driven investigations of tech and how it influences society
Against an Increasingly User-Hostile Web - Neustadt.frhttps://neustadt.fr/essays/against-a-user-hostile-web/
network that allowed computers around the world to communicate—was already in place but it remained inaccessible to most people. You had to know how to use a local client to conne
We are quietly replacing an open web that connects and empowers with one that restricts and commoditizes people. We need to stop it.
Capitalism will die - but will it take us with it?http://digdeeper.love/articles/capitalism.xhtml
experience in using computers and in completing tasks similar to those encountered in our study. Even if they could switch jobs, why should they have to ? Maybe someone just doesn
Don't Trust the Census.http://www.toad.com/gnu/census.html
industries utilize computers to sharply lower their costs of operation, the Census Bureau has repeatedly botched its operations and squandered millions. The bureau will need to re
Smartphonehttps://www.billdietrich.me/Smartphone.html
my Android page Home Computers Smartphone Basics Combinations [Ignores Apple.] Android phone with stock OS, run Android apps. Android phone with AOSP-compatible third-party OS ( L
Smartphone types, security, privacy, use
Ace of Spades HQhttp://ace.mu.nu/
people who want to own computers - can fuck off and die I guess. The creator of Ruby on Rails says that AI can not yet replace junior programmers. (Final Round) He notes that some
How to Block Forced Updateshttps://backlit.neocities.org/how-to-block-forced-updates
all attacks on domestic computers - including forced updates - are triggered from within the computer itself, and rely on outbound network calls, not inbound . Nearly. All. If you
NLnet; All projectshttps://nlnet.nl/project/index.html
ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent
NLnet; Interview With Simon Descarpentries from Meta-Press.eshttps://nlnet.nl/news/2023/20231012-meta-press.html
one side and plenty of computers on the other. And that is how the internet works. No central point that we all have to cross. The more people use Meta-Press the better it will wo
Coraidhttp://coraid.com/
starting back when computers were slow and their memories small. To make anything at all, we had to learn the computing-trade secrets: how to write software so efficiently that it
SIGSOFT - ACM Special Interest Group on Software Engineeringhttp://www.sigsoft.org/dissertations.html
Hierarchical Abstract Computers . University of Maryland (1985, advisor: Marvin Zelkowitz ). Abstract . 1984 David Notkin . Interactive Structure-Oriented Computing . Carnegi
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts
Find more...