Open Source Software (OSS) in U.S. Government Acquisitionshttps://dwheeler.com/essays/oss-government-acquisitions.html
software configuration management tools), but they must submit their changes to a trusted developer to get their changes into the trusted repository. Figure 1: Typical OSS Develop
BITNEThttps://bit.net/
CREN developed list-management software for use on low-cost Unix platforms, which was optimized to the Internet protocols and compliant with Internet standards. This software (Lis
2022 - Strange Loophttps://thestrangeloop.com/2022/sessions.html
Bitemporal Data Management with XTDB Jeremy Taylor Head of Product Data Modeling for Developers Alexis McKenzie Data Engineering Leader | Passionate Tinkerer| Teacher Susan King S
Strange Loop is a conference for software developers covering programming langs, databases, distributed systems, security, machine learning, creativity, and more!
John Seely Brown: Publicationshttps://www.johnseelybrown.com/pubs.html
Organizations and Management , John Seely Brown, Stephen Denning, Katalina Groh, Laurence Prusak, Butterworth-Heinemann; August 2004 The Social Life of Information , John Seely Br
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2022/
with Kendy, monthly management call, more project mgmt bits. Mail chew. Put up curtains for J. Not entirely surprised by the amount of back-lash to: libreoffice and blockchain . W
USE CASHhttps://usecash.ca/
to budgeting or money management apps and companies, so that a customer can pool different bank accounts and credit cards into one place." Video How Banks are Forcing a Cashless S
Russia fight for multipolarityhttps://softpanorama.org/Skeptics/Political_skeptic/Fighting_russophobia/multipolarity.shtml
models of global management, and all this so as to guarantee their [the US’] exceptional position and reap political and economic dividends. But these attempts are increasin
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
patching through energy management to fighting wildlife crime Economics, psychology and criminology of information security – from dependability to deception detection Peer-
Find more...