Search
- Did you mean
- compulsory
Search results
-
A new attack on civil liberties
secret searches of people's homes and computers, and plant surveillance devices in people's ...
-
NORTHERN IRELAND: Protesters arrested after Raytheon occupation
Socialist Worker reported that "Raytheon's computer system was 'completely disabled', ...
-
Networker: Broken promises
A smart card is a plastic card which has a very primitive computer pasted on to it. Its predecessor is the ... is linked to computer software. In the past couple of years, a new category of broken promise has ... The exception may be computer products themselves, but the evidence is clouded by self-interest (the ...
-
Market of one
be profiled and advertising targeted at them individually (by a computer, of course). This is ... short pieces of information, are sent to your computer constantly to mark you as having previously ... you have already viewed certain pages of the site. The heart of your computer is the central processor ...
-
Networker: Whatever happened to the 'information superhighway'?
capacity to deliver the internet via a mobile phone, palm-top computer, or other sorts of 聯roaming聰 device. ... Six months ago the fad was XML (the ability of computers of talk to each other over the internet). ... to run national or global computer networks over the internet). None of these has delivered the ...
-
Networker: The charmless god
which makes sense of whatever hardware and other bits and pieces are connected together in a computer ... on to the heart of the computer, the central processor unit or CPU. CPUs have names like Pentium II. ... Operating systems have names like Windows98 or Linux. In a large computer site, where many PCs are connected ...
-
networker: The internet's origins
exchange information and computing resources. (Only "relatively", as much of the research being ... Soviet Union.) This theory has some gaping holes: First, why were Honeywell DDP-516 computers selected to ... perform the networking function at each site? These were "ruggedised" computers designed to ...
-
MUA struggle continues
Meanwhile, Patrick computer records released by the MUA reveal that Brisbane's union work force is ...
-
Anarchist newspaper launched
interesting piece on a proposal to set up an anarchist computer network. The paper is to be sold by donation ...
-
Armed police raid Porgera villagers
computer. Documentation prepared for a compensation claim against the PJV in the National Court was also ...
-
News by telephone
whose Brazilian member, IBASE, will provide the host computer services for UNCED. From Brazil, ...
-
Microsoft blocks Cuba from using Messenger
the 1960s, the US has prevented major world computer makers, such as Intel, Hewlett Packard, IBM or ... Microsoft programs on many of its computers, but it is working towards replacing them with open-source ...
-
Three books take up Assange story
execution, Julian Assange, the once obscure Australian computer hacker now editor-in-chief of WikiLeaks, ... of early-Internet computers and the delights of hacking. Joining a group of Melbourne teenagers ... called The International Subversives, Assange broke into the computer systems of top-secret US military ...
-
Activist harassed by customs
computer, diary and flash drive searched. "After reading my diary, they wanted to check my computer ...
-
On the box
search. ABC, Wednesday, May 28, 9.30pm. In the Realm of the Hackers 鈥 Two Melbourne computer hackers ... entered one of the most powerful and secure computer systems in the world, NASA. ABC, Thursday, May 29, ...
-
Loose cannons
Spring Computer Show in Chicago. Prefers secrecy "The Prime Minister has demanded that State police ... computer company General Magic, on the firm's new program, Magic Talk, intended to replace ...
-
Gearing up
for layout. We've modernised our system, geared up for the computer age, with some of the latest ... production technology, we need a scanner. We also need a faster computer to run it efficiently. The human ...
-
Action updates
government's computer networks. Computer giants IBM and EDS are bidding for the contract. Workers oppose the ...
-
An introduction to the global household
play a vital role in demystifying computer communications and information technologies used by ... at beginners to the field of computer communications", explaining "in clear, non-technical ...
-
Loose cannons
high-tech San Joaquin County Jail in California experienced a computer glitch according to the electronic ... newsletter Risk-Forum Digest. As a result the computer system automatically unlocked all of the cell doors in ...
-
Alison Pennington: 鈥楾ime to embrace a pro-worker concept of work'
workforce could work from home, based on the types of work tasks undertaken such as working on a computer ...
-
Making (cyber)space for women
by Patricia Brien Dale Spender's most recent book deals with computer-based technology and its ... print towards computer technology. Spender suggests that the print-based revolution did little for women ... why young girls are not using computers to the same extent as young boys is the plethora of violent ...
-
Farewell to Australian hero Bill Ryan 1922鈥2019
he wondered. Using a specially modified computer, Bill was able to stay on top of the latest science ...
-
Boycott HP products to show solidarity with Palestinians
revoked arbitrarily. HP provides computer hardware to the Israeli army that maintains the illegal ...
-
On bitcoin and blockchain 鈥 a response
bitcoin. It is used by criminals, invented by computer nerds, supported by libertarians, is environmentally ... 鈥渂asement-dwelling鈥 鈥computer nerds鈥 are not 鈥渞eal people鈥. While a disproportionately high number of information ...