Search
- Did you mean
- compulsory
Search results
-
Business as usual for NSW Labor
accessing adult and gambling websites on his parliamentary computer. 鈥淓ven by the standards of the eternally ...
-
A new attack on civil liberties
secret searches of people's homes and computers, and plant surveillance devices in people's ...
-
NORTHERN IRELAND: Protesters arrested after Raytheon occupation
Socialist Worker reported that "Raytheon's computer system was 'completely disabled', ...
-
Networker: Broken promises
A smart card is a plastic card which has a very primitive computer pasted on to it. Its predecessor is the ... is linked to computer software. In the past couple of years, a new category of broken promise has ... The exception may be computer products themselves, but the evidence is clouded by self-interest (the ...
-
Market of one
be profiled and advertising targeted at them individually (by a computer, of course). This is ... short pieces of information, are sent to your computer constantly to mark you as having previously ... you have already viewed certain pages of the site. The heart of your computer is the central processor ...
-
Networker: Whatever happened to the 'information superhighway'?
capacity to deliver the internet via a mobile phone, palm-top computer, or other sorts of 聯roaming聰 device. ... Six months ago the fad was XML (the ability of computers of talk to each other over the internet). ... to run national or global computer networks over the internet). None of these has delivered the ...
-
Networker: The charmless god
which makes sense of whatever hardware and other bits and pieces are connected together in a computer ... on to the heart of the computer, the central processor unit or CPU. CPUs have names like Pentium II. ... Operating systems have names like Windows98 or Linux. In a large computer site, where many PCs are connected ...
-
networker: The internet's origins
exchange information and computing resources. (Only "relatively", as much of the research being ... Soviet Union.) This theory has some gaping holes: First, why were Honeywell DDP-516 computers selected to ... perform the networking function at each site? These were "ruggedised" computers designed to ...
-
MUA struggle continues
Meanwhile, Patrick computer records released by the MUA reveal that Brisbane's union work force is ...
-
Armed police raid Porgera villagers
computer. Documentation prepared for a compensation claim against the PJV in the National Court was also ...
-
Anarchist newspaper launched
interesting piece on a proposal to set up an anarchist computer network. The paper is to be sold by donation ...
-
News by telephone
whose Brazilian member, IBASE, will provide the host computer services for UNCED. From Brazil, ...
-
United States: The virus is colour blind, humans are not
computers are also less plentiful in low-income homes. Diabetes and hypertension is prevalent in Black ...
-
Three books take up Assange story
execution, Julian Assange, the once obscure Australian computer hacker now editor-in-chief of WikiLeaks, ... of early-Internet computers and the delights of hacking. Joining a group of Melbourne teenagers ... called The International Subversives, Assange broke into the computer systems of top-secret US military ...
-
Microsoft blocks Cuba from using Messenger
the 1960s, the US has prevented major world computer makers, such as Intel, Hewlett Packard, IBM or ... Microsoft programs on many of its computers, but it is working towards replacing them with open-source ...
-
Activist harassed by customs
computer, diary and flash drive searched. "After reading my diary, they wanted to check my computer ...
-
On the box
search. ABC, Wednesday, May 28, 9.30pm. In the Realm of the Hackers 鈥 Two Melbourne computer hackers ... entered one of the most powerful and secure computer systems in the world, NASA. ABC, Thursday, May 29, ...
-
Loose cannons
Spring Computer Show in Chicago. Prefers secrecy "The Prime Minister has demanded that State police ... computer company General Magic, on the firm's new program, Magic Talk, intended to replace ...
-
Gearing up
for layout. We've modernised our system, geared up for the computer age, with some of the latest ... production technology, we need a scanner. We also need a faster computer to run it efficiently. The human ...
-
Action updates
government's computer networks. Computer giants IBM and EDS are bidding for the contract. Workers oppose the ...
-
An introduction to the global household
play a vital role in demystifying computer communications and information technologies used by ... at beginners to the field of computer communications", explaining "in clear, non-technical ...
-
Loose cannons
high-tech San Joaquin County Jail in California experienced a computer glitch according to the electronic ... newsletter Risk-Forum Digest. As a result the computer system automatically unlocked all of the cell doors in ...
-
Assange鈥檚 case 'a threat to free speech worldwide'
computer" and proper internet access to help prepare his defence case. Robinson slammed Australia鈥檚 refusal ...
-
Making (cyber)space for women
by Patricia Brien Dale Spender's most recent book deals with computer-based technology and its ... print towards computer technology. Spender suggests that the print-based revolution did little for women ... why young girls are not using computers to the same extent as young boys is the plethora of violent ...
-
Human rights and environmental activists targeted in Victoria Police raids
arrested, detained and interrogated and had phones, computers and other belongings seized. The Latin ...