Computing Regime: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
| (One intermediate revision by the same user not shown) | |||
| Line 14: | Line 14: | ||
#[[Socially Robust and Enduring Computing]] | #[[Socially Robust and Enduring Computing]] | ||
[[Category:Protocols and Algorithms]] | |||
[[Category:Standards]] | [[Category:Standards]] | ||
| Line 20: | Line 21: | ||
[[Category:Technology]] | [[Category:Technology]] | ||
[[Category:P2P Hierarchy Theory]] | |||
Latest revision as of 12:30, 6 July 2017
= how Protocollary Power is embedded in the very structure of computing, and the social effects it has
More Information
- Computing and the Current Crisis: The Significant Role of New Information Technologies in Our Socio-Economic Meltdown David Hakken, tripleC, Vol. 8. No. 2, pp 205-220 [1]: how the current computing regime is responsible for the financial meltdown of 2008
- Citron, Danielle Keats, Technological Due Process. U of Maryland Legal Studies Research Paper No. 2007-26; Washington University Law Review, Vol. 85, pp. 1249-1313, 2007. [2]
Concepts: