Computing Regime: Difference between revisions

From P2P Foundation
Jump to navigation Jump to search
No edit summary
 
(One intermediate revision by the same user not shown)
Line 14: Line 14:
#[[Socially Robust and Enduring Computing]]
#[[Socially Robust and Enduring Computing]]


[[Category:Protocols and Algorithms]]


[[Category:Standards]]
[[Category:Standards]]
Line 20: Line 21:


[[Category:Technology]]
[[Category:Technology]]
[[Category:P2P Hierarchy Theory]]

Latest revision as of 12:30, 6 July 2017

= how Protocollary Power is embedded in the very structure of computing, and the social effects it has


More Information

  • Computing and the Current Crisis: The Significant Role of New Information Technologies in Our Socio-Economic Meltdown David Hakken, tripleC, Vol. 8. No. 2, pp 205-220 [1]: how the current computing regime is responsible for the financial meltdown of 2008
  • Citron, Danielle Keats, Technological Due Process. U of Maryland Legal Studies Research Paper No. 2007-26; Washington University Law Review, Vol. 85, pp. 1249-1313, 2007. [2]

Concepts:

  1. Protocollary Power
  2. Architecture of Control
  3. Socially Robust and Enduring Computing