wiby  
Settings



Open Source Software (OSS) in U.S. Government Acquisitions

https://dwheeler.com/essays/oss-government-acquisitions.html

software configuration management tools), but they must submit their changes to a trusted developer to get their changes into the trusted repository. Figure 1: Typical OSS Develop

BITNET

https://bit.net/

CREN developed list-management software for use on low-cost Unix platforms, which was optimized to the Internet protocols and compliant with Internet standards. This software (Lis

2022 - Strange Loop

https://thestrangeloop.com/2022/sessions.html

Bitemporal Data Management with XTDB Jeremy Taylor Head of Product Data Modeling for Developers Alexis McKenzie Data Engineering Leader | Passionate Tinkerer| Teacher Susan King S
Strange Loop is a conference for software developers covering programming langs, databases, distributed systems, security, machine learning, creativity, and more!

John Seely Brown: Publications

https://www.johnseelybrown.com/pubs.html

Organizations and Management , John Seely Brown, Stephen Denning, Katalina Groh, Laurence Prusak, Butterworth-Heinemann; August 2004 The Social Life of Information , John Seely Br

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2022/

with Kendy, monthly management call, more project mgmt bits. Mail chew. Put up curtains for J. Not entirely surprised by the amount of back-lash to: libreoffice and blockchain . W

USE CASH

https://usecash.ca/

to budgeting or money management apps and companies, so that a customer can pool different bank accounts and credit cards into one place." Video How Banks are Forcing a Cashless S

Russia fight for multipolarity

https://softpanorama.org/Skeptics/Political_skeptic/Fighting_russophobia/multipolarity.shtml

models of global management, and all this so as to guarantee their [the US’] exceptional position and reap political and economic dividends.  But these attempts are increasin

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

patching through energy management to fighting wildlife crime Economics, psychology and criminology of information security – from dependability to deception detection Peer-


Find more...