Search

Did you mean
compulsory

Search results

  1. TAFE workers act on COVID-19 safety

    maintaining full social distancing and sanitising computers and other equipment. They will continue to come to ...

  2. Work and virtual reality

    device, the digital computer, and its minor offspring, the industrial robot. In the old story, ... engineering" concentrates, in effect, on producing scrap more quickly. Enter the computers Many of the current ... predictions of worklessness hinge on the idea that computers will shortly "make everything". ...

  3. ASIO plans to 'defend Sydney Olympics'

    acceptance for his own right-wing agenda. Computer encryption Walsh also expressed concern about the ... widespread use of computer encryption (which protects data from tapping), which could hamper the security ... Walsh's pronouncement is setting the stage for the government to outlaw computer encryption, which would ...

  4. Will leftist Andr茅s Arauz be the next president of Ecuador?

    information from computers seized from ELN commander Andr茅s Felipe Vanegas Londo帽o (aka 鈥淯riel鈥), killed in ... information that the Colombian government claimed to have received from Londo帽o鈥檚 computers. Ecuador had ...

  5. Activists push back against incitement charges

    arrested me. They seized my phone and computers, including my 15-year-old son鈥檚 computer,鈥 Breen said. ...

  6. Australia dumps toxic waste on Hong Kong

    department impounded a shipment of computer scrap until authorities can arrange for its return to Australia. ... The export of computer scrap, which contains highly toxic substances, is illegal. Under the Hazardous ...

  7. Fred Nile鈥檚 鈥業mportant research鈥

    his parliamentary computer had been used to access pornographic sites. The September 2 Daily Telegraph ... said: 鈥淎n audit of parliamentary computers conducted two months ago identified the Christian Democrat MP ...

  8. Women and technology

    Radio National's Coming Out Show in March will examine the work practices and ethics of computer ... of technology and computers. They are seeking input from women involved in this field. Anyone who ...

  9. NGOs explore email

    line to an intermediate computer, where the receiving party can pick it up with their computer, also ... over a telephone line. The intermediate computer is called an email host, or simply a host. Email, like ... important ways: 1) Email messages are sent and received as computer files and not as paper printouts. ...

  10. FRANCE: 130,000 high school students protest

    in effect, reading, writing, calculating and using a computer. Under pressure from mass protest, the ...

  11. Y2K nuclear warning

    The letter expresses concern about the possibility that computers affected by the Y2K millennium bug ... Pacific islands. It highlights three near disasters: a 1980 malfunction in a computer chip in the US sent ... likely to affect the computer systems that coordinate strategic nuclear weapons systems. Many respected ...

  12. Woolworths workers strike against speed-ups

    for ongoing time and motion techniques. In the morning a stone worker logs onto the warehouse computer ... the task, the worker logs back onto the computer and it calculates how long the job took and issues ... system was introduced in Melbourne warehouses, the computers were programmed to continually ratchet ...

  13. Networker: Monopolies don't need to innovate

    operating system, had been anticipated as the saviour of the personal computer industry. (An operating ... system is a piece of software that turns a computer from a box of electronics into a potentially useful ... gadget.) As the number of personal computers sold in the US has been declining this year for the first time ...

  14. Cambodia: Where is Thai dissident Wanchalearm Satsaksit?

    computer-related Crime Act by operating a Facebook page critical of Thai government. He published a video clip ...

  15. Is time running out for the NSW Premier?

    through a forensic investigation of computer records. NSW Greens MLC David Shoebridge, who is leading ...

  16. V for Vendetta's prescient dark visions

    computer that analyses a massive network of surveillance cameras. Illustrator David Lloyd's ...

  17. Live Blog: Catalonia's Independence Struggle Continues...

    Dick Nichols Comarcas-de-Catalua.gif Note to readers This live blog will end on Sunday, January 21. It will be replaced from Monday, January 22 by a new live blog covering the Catalan national struggle and its impact on Spanish and European pol铆tics. The ...

  18. The Report: CIA torture exposed

    literally years聽in a windowless room in front of a computer can be so compelling. The fact that what is on ...

  19. Getting sacked and surviving under COVID-19

    those working in computing. I鈥檓 unsure what percentage of the workforce was casual, but I do know that ... the computers and website were down and then, as the lockdown restrictions became more extreme, ...

  20. Networker: Personal and insecure

    a standard endorsed by dozens of the world's largest computer corporations. It allows two computerised ... marketing commercial, a user with a portable laptop computer in a bag walks down a hallway and the computer ... phone or computer that they are confident of its security. Otherwise an unfriendly outsider could take ...

  21. Networker: What's in a name?

    computer network spanning the world with no one in control (more or less) and anyone is able to connect up ... a friend at a university computer department who would be able to connect them, so the ISPs came along, ... an ASP is that there are probably people out there who want to connect to big computer applications ...

  22. Networker: Ignoring people and wasting technology

    storing a year in computer memory 鈥 70 instead of 1970, for example. So when the clock ticks over from ... December 31, 1999, to 2000, computers running these programs will think that the time is 1900. This means ... save a little time and computer memory. They didn't know how popular computers would become. But ...

  23. Networker: Why prosecute Microsoft?

    "16-bit" or "32-bit". This is the size of the data "word" that a computer can process ... computer. Spend $2000 on a PC and you will be getting a lower performance 32-bit computer. Why? Because ... Microsoft doesn't have software ready for a 64-bit computer, so it used its market weight to prevent ...

  24. Pastors in second attempt to deliver aid to Cuba

    including computers into Mexico for their shipment to Cuba. The ecumenical group's previous shipment of ... 325 computers was seized by the US Customs Service on January 31. "The US is spending tens of ... world in a show of unified opposition to an unjust policy." Computers seized by Customs were to ...

  25. DSS bans over system failure

    public contact hours over the past several weeks in protest at computer system failures, which have ... other work. Anger at the computer failures which accompanied the department's attempt to introduce ... back the public sector, reduce expenditure on computer system infrastructure by contracting out work ...

Pages