John Seely Brown: Speakinghttps://www.johnseelybrown.com/speeches.html
- Where Have All the Computers Gone ? by John Seely Brown - Borderline Issues: Social And Material Aspects Of Design , by John Seely Brown and Paul Duguid - Keeping It Simple , by
CIA - The Central Intelligence Agency - Information Is The Most Dangerous Weapon of Allhttps://www.bibliotecapleyades.net/sociopolitica/sociopol_cia.htm
Teams are Hacking into Computers Worldwide - How Much did CIA and NSA have to do with the Founding of Google ? - How the CIA Helped Disney Co
How to Evaluate Open Source Software / Free Software (OSS/FS) Programshttps://dwheeler.com/oss_fs_eval.html
it to Windows. Today's computers and OSS/FS operating systems are so inexpensive that it's often cheaper to buy special-purpose computers for a task than to try to change the appl
This paper describes how to evaluate open source software
SoftRAM95: "False and Misleading"http://ftp.st.ryukoku.ac.jp/pub/published/oreilly/windows/win95.update/softram.html
to double Windows 95 computers' RAM. What they got was a snazzy looking software package that didn't increase RAM one bit." Bernstein added, "consumers shopping for high tech prod
Draft-leach-cifs-v1-spec-02http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html
in use by personal computers and workstations running a wide variety of operating systems. Table Of Contents STATUS OF THIS MEMO...................................................
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
4. The case of the computers is physically locked, and the computers and monitors are secured by security cables. 5. Internet access _severely_ restricted - FTP/web access to prox
Find more...