Search

Did you mean
compulsory

Search results

  1. A new attack on civil liberties

    secret searches of people's homes and computers, and plant surveillance devices in people's ...

  2. NORTHERN IRELAND: Protesters arrested after Raytheon occupation

    Socialist Worker reported that "Raytheon's computer system was 'completely disabled', ...

  3. MUA struggle continues

    Meanwhile, Patrick computer records released by the MUA reveal that Brisbane's union work force is ...

  4. Networker: Broken promises

    A smart card is a plastic card which has a very primitive computer pasted on to it. Its predecessor is the ... is linked to computer software. In the past couple of years, a new category of broken promise has ... The exception may be computer products themselves, but the evidence is clouded by self-interest (the ...

  5. Market of one

    be profiled and advertising targeted at them individually (by a computer, of course). This is ... short pieces of information, are sent to your computer constantly to mark you as having previously ... you have already viewed certain pages of the site. The heart of your computer is the central processor ...

  6. Networker: Whatever happened to the 'information superhighway'?

    capacity to deliver the internet via a mobile phone, palm-top computer, or other sorts of 聯roaming聰 device. ... Six months ago the fad was XML (the ability of computers of talk to each other over the internet). ... to run national or global computer networks over the internet). None of these has delivered the ...

  7. Networker: The charmless god

    which makes sense of whatever hardware and other bits and pieces are connected together in a computer ... on to the heart of the computer, the central processor unit or CPU. CPUs have names like Pentium II. ... Operating systems have names like Windows98 or Linux. In a large computer site, where many PCs are connected ...

  8. networker: The internet's origins

    exchange information and computing resources. (Only "relatively", as much of the research being ... Soviet Union.) This theory has some gaping holes: First, why were Honeywell DDP-516 computers selected to ... perform the networking function at each site? These were "ruggedised" computers designed to ...

  9. Armed police raid Porgera villagers

    computer. Documentation prepared for a compensation claim against the PJV in the National Court was also ...

  10. Anarchist newspaper launched

    interesting piece on a proposal to set up an anarchist computer network. The paper is to be sold by donation ...

  11. News by telephone

    whose Brazilian member, IBASE, will provide the host computer services for UNCED. From Brazil, ...

  12. Three books take up Assange story

    execution, Julian Assange, the once obscure Australian computer hacker now editor-in-chief of WikiLeaks, ... of early-Internet computers and the delights of hacking. Joining a group of Melbourne teenagers ... called The International Subversives, Assange broke into the computer systems of top-secret US military ...

  13. Activist harassed by customs

    computer, diary and flash drive searched. "After reading my diary, they wanted to check my computer ...

  14. Microsoft blocks Cuba from using Messenger

    the 1960s, the US has prevented major world computer makers, such as Intel, Hewlett Packard, IBM or ... Microsoft programs on many of its computers, but it is working towards replacing them with open-source ...

  15. On the box

    search. ABC, Wednesday, May 28, 9.30pm. In the Realm of the Hackers 鈥 Two Melbourne computer hackers ... entered one of the most powerful and secure computer systems in the world, NASA. ABC, Thursday, May 29, ...

  16. Loose cannons

    Spring Computer Show in Chicago. Prefers secrecy "The Prime Minister has demanded that State police ... computer company General Magic, on the firm's new program, Magic Talk, intended to replace ...

  17. Gearing up

    for layout. We've modernised our system, geared up for the computer age, with some of the latest ... production technology, we need a scanner. We also need a faster computer to run it efficiently. The human ...

  18. Action updates

    government's computer networks. Computer giants IBM and EDS are bidding for the contract. Workers oppose the ...

  19. An introduction to the global household

    play a vital role in demystifying computer communications and information technologies used by ... at beginners to the field of computer communications", explaining "in clear, non-technical ...

  20. Loose cannons

    high-tech San Joaquin County Jail in California experienced a computer glitch according to the electronic ... newsletter Risk-Forum Digest. As a result the computer system automatically unlocked all of the cell doors in ...

  21. Alison Pennington: 鈥楾ime to embrace a pro-worker concept of work'

    workforce could work from home, based on the types of work tasks undertaken such as working on a computer ...

  22. Making (cyber)space for women

    by Patricia Brien Dale Spender's most recent book deals with computer-based technology and its ... print towards computer technology. Spender suggests that the print-based revolution did little for women ... why young girls are not using computers to the same extent as young boys is the plethora of violent ...

  23. Farewell to Australian hero Bill Ryan 1922鈥2019

    he wondered. Using a specially modified computer, Bill was able to stay on top of the latest science ...

  24. Boycott HP products to show solidarity with Palestinians

    revoked arbitrarily. HP provides computer hardware to the Israeli army that maintains the illegal ...

  25. On bitcoin and blockchain 鈥 a response

    bitcoin. It is used by criminals, invented by computer nerds, supported by libertarians, is environmentally ... 鈥渂asement-dwelling鈥 鈥computer nerds鈥 are not 鈥渞eal people鈥. While a disproportionately high number of information ...

Pages