11 Hits in 8.0 sec

The Future Was Here: The Commodore Amiga by Jimmy Maher. MIT Press, Cambridge, MA, U.S.A., 2012. 344 pp., illus. Trade. ISBN: 978-0-262-01720-6

John F. Barber
2013 Leonardo: Journal of the International Society for the Arts, Sciences and Technology  
It is difficult to justify the outrageous cost of commercial office software suites when OSS applications such as Open Office are totally free, equally as good and completely compatible!  ...  be reduced to the dichotomy of "bad" drugs and "good" crime-fighters.  ...  Spector The modern world of chemistry is vast and its connection to art strong.  ... 
doi:10.1162/leon_r_00537 fatcat:g5idfilbkzfppg2n7aajfd6tna

Towards Institutional Infrastructures for e-Science: The Scope of the Challenge

Paul A. David, Michael J. Spence
2003 Social Science Research Network  
THE INSTITUTIONAL DESIGN CHALLENGE: ANALYTICS Seen in properly broad perspective, the global e-Science system design challenge is one of finding the set of technical and social and mechanisms that will  ...  INTRODUCTION -THE OPPORTUNITIES AND CHALLENGES OF E-SCIENCE BACKGROUND, MOTIVATION AND PURPOSE The opportunity exists today for unprecedented connections between scientists, information, data, computational  ...  The first release contained 150 entries and, for a time, my colleagues in Leeds continued to give support.  ... 
doi:10.2139/ssrn.1325240 fatcat:a4bogiz2wbf7lggq5ijwonshua

Software Development Process Mining: Discovery, Conformance Checking and Enhancement

Joao Caldeira, Fernando Brito e Abreu
2016 2016 10th International Conference on the Quality of Information and Communications Technology (QUATIC)  
The results show that forking is mainly used for making contributions of original repositories, and it is beneficial for OSS community.  ...  In reality, without them, nothing in this work would have been made possible. • My parents and closest family members, for being a catalyst to my determination. • Finally, to my wife and sons, for their  ...  This Appendix presents the tools used to perform current research and in writing this dissertation. A.1 Companion Tools  ... 
doi:10.1109/quatic.2016.061 dblp:conf/quatic/CaldeiraA16 fatcat:acb3seoe7vh6hamsvwor2qzcou

Conference Program

2021 2021 International Conference on Innovation and Intelligence for Informatics, Computing, and Technologies (3ICT)  
His research focuses on ways to optimize resources in civil and infrastructure projects.  ...  Khalafalla has worked in various fields of the industry, including Commercial construction and Oil & Gas. Dr. Khalafalla has an MBA degree, and he is Professional Project Management (PMP) certified.  ...  Lina is from Saudi Arabia and has been working as a faculty member within the College of Sciences and Human Studies at Prince Mohammad Bin Fahd University for more than 6 years.  ... 
doi:10.1109/3ict53449.2021.9581455 fatcat:zgaclsoapjbhbmjmki7bjltre4

The Nuremberg Legacy in the New Millennium [chapter]

Winton Higgins
2012 Genocide Perspectives IV  
Those working for Donovan at the OSS included Franz Neumann, the author of the groundbreaking 1942 study of the nature of the Nazi state, Behemoth, and Raphael Lemkin, who gave genocide its name and contributed  ...  and motives clear.  ...  The associated human rights project has been developing for much longer, and has been greatly strengthened by the monitoring or 'watch' practices that have arisen out of the Helsinki accords of 1975.  ... 
doi:10.5130/978-0-9872369-7-5.g fatcat:cxwpdckzijcjla4bjofd466jgy

Evaluation of Auditory Interface Metaphors

M Kaltenbrunner, Xavier Serra
2002 Zenodo  
I will also present some questions and concepts for my near future work leading towards my PhD dissertation.  ...  The document additionally provides a rough introduction into the field of auditory user interfaces in order to allow the reader to position the commented publications within that context.  ...  Acknowledgements The authors would like to acknowledge the efforts of Thierry Nabeth of the Department of Technology Management at the Centre for Advanced Learning Technologies, INSEAD, France.  ... 
doi:10.5281/zenodo.3736236 fatcat:v7xgiwwegnhctc6mvv3b74phqu

Who Can Find My Devices? Security and Privacy of Apple's Crowd-Sourced Bluetooth Location Tracking System [article]

Alexander Heinrich, Milan Stute, Tim Kornhuber, Matthias Hollick
2021 arXiv   pre-print
We experimentally show that unauthorized access to the location reports allows for accurate device tracking and retrieving a user's top locations with an error in the order of 10 meters in urban areas.  ...  In particular, OF aims to ensure finder anonymity, untrackability of owner devices, and confidentiality of location reports.  ...  , Research and the Arts within their joint support of the National Research Center for Applied Cybersecurity ATHENE.  ... 
arXiv:2103.02282v1 fatcat:vxjvtoaf6vgptltxlih5gvkyoa

Google as a de facto privacy regulator: Analyzing Chrome's removal of third-party cookies from an antitrust perspective

Damien Geradin, Dimitrios Katsifis, Theano Karanikioti
2020 Social Science Research Network  
So how do you combine, I'm going to make a Venn diagram with my fingers, socialism ('everything must be free') [with] capitalism (we have to have tech heroes).  ...  links to say "Do Not Sell or Share My Info", and new obligations of data minimization and data retention. 133 V.  ...  The browser is responsible for keeping these two requests uncorrelated, so that no third party may associate them and find out that they refer to the same person.  ... 
doi:10.2139/ssrn.3738107 fatcat:ljpftxnvkjbpbdbas4qn3byyfa


Informática na Educação: Teoria & prática
2016 Informática na educação: teoria & prática  
We would like to thank the BMBF, Federal Ministry of Education and Research and the DLR as well as the project partners Agentur für Arbeit Karlsruhe (agency for employment Karlsruhe) and their collaboration  ...  Further we would like to thank the (GMK), an incorporate society concerned with media education and communication culture to support the idea of MediaArtLab@School.  ...  This period was precipitated by two years of graduate classes prior to leaving for São Paulo.  ... 
doi:10.22456/1982-1654.65199 fatcat:pjsxumgsifhjlexs3oimopwca4

Evil Offspring - Ransomware and Crypto Technology

Hilarie Orman
2016 IEEE Internet Computing  
Out of an abundance of caution and foolish faith in my own memory, I had not written it down. I had to start all over to create the file.  ...  My brush with denial of service by encryption didn't suggest a new business venture, but that just shows my lack of imagination.  ...  The award, which consists of a certificate and a US$2,000 honorarium, is presented annually to an individual for "an outstanding contribution in the application of high performance computers using innovative  ... 
doi:10.1109/mic.2016.90 fatcat:v5zmzx7qrba5dkqxweoo3ifvry

Miscellaneous Surveillance: Computers [chapter]

2000 Understanding Surveillance Technologies  
of events for security professionals.  ...  Nonproliferation and International Security Division (NIS) -NIS centers report to the Associate Laboratory Director for Threat Reduction and respond to proliferation threats involving weapons of mass destruction  ...  Technology contributed to the social order with gramophones, music boxes, telephones, and radios.  ... 
doi:10.1201/9781420038811-22 fatcat:zceparnonbgynhzl5braxfh6au