Victims In Progress Of Technology
.... from
the truth. The reason that societies aid "undeveloped" countries is to
gain access to their resources. Technological cultures are ones of mass
consumption. As we have learned over the past few decades, are resources
are limited and must be conserved properly. Tribal societies are a shining
example of how to manage these resources, because they only use and eat
what they need without wasting valuable resources. To demonstrate let us
examine Bodley's study of the Maori tribe. The Maori tribe, sett .....
|
|
Coping With Computers
.... has her own column in Windows magazine. Her experiences with
modern computer technologies range from the terminals of the 1970's all the
through today with the Internet and e-mail.
One of her first experiences with a computer involved sending a message
over the AP news wire. As it turns out, she expressed her candid opinion on
some very sensitive topics at the time, including but not limited to the Vietnam
War. Consequently, the AP was not amused with the message and she was fired.
At the time, this .....
|
|
Computers In Math
.... following steps are the way the computer "thinks" when it is
calculating the equation.
1.Select x
2.Multiply x by x and store x2
3.Multiply x2 by x and store x3
4.Multiply x3 by x and store x4
5.Multiply x by 6 and store 6x
6.Multiply stored x2 by 5 and store 5x2
7.Multiply stored x3 by 4 and store 4x3
8.Multiply stored x4 by 6 and store 6x4
9.Add 6x4
10.Add 4x3
11.Subtract 5x3
12.Add 6x
13.Add 4
Binary Coded Deci .....
|
|
OpenVMS: Using A Virtual Operating System By The International Securities Exchange
.... Cutler and Dick Hustvedt, it was
designed entirely within Digital Equipment Corporation (DEC). OpenVMS is a
32-bit, multitasking, multiprocessing virtual memory operating system.
OpenVMS currently runs on Digital's VAX and Alpha computer systems.
Digital Equipment Corporation owned the operating system. It
wasn't until January 25, 1998 Compaq computers acquired Digital Equipment
at a tremendous price of 9.6 billion dollars. "This is a marriage made in
heaven," says Sateesh Lele, CIO at the European di .....
|
|
CyberPorn: On A Screen Near You
.... While groups like the Family Research Council insisdt that online
child molesters represent a clear and present danger, there is no evidence that
it is any greater than that thousands of other threats children face everyday.
The Exxon bill proposed to outlaw obscene material and impose fines uo to
$100,000and prison term up to two years on anyone who knowinglymakes "indecent"
material available to children under the age of 18.
Robert Thomas spends his days like any other inmate at the U.S. Medicalcenter
f .....
|
|
Computers In Business
.... and run quite slow on a previous
system that was 'top of the line' in 1991. That's why it is important for
companies to understand that they must think years down the road before
spending thousands of dollars on the technology of today. The best way is
to prepare for the future such as making sure your mainframe is upgradeable
and contains at least 8 expansion slots, which should already be loaded
with enhanced graphics cards, the necessary amount of serial ports etc..
Networks are everywhere in th .....
|
|
Cyberspace And The American Dream: A Magna Carta For The Knowledge Age
.... and the politics of nations, wealth -- in the form of physical
resources -- has been losing value and significance. The powers of mind are
everywhere ascendant over the brute force of things.
In a First Wave economy, land and farm labor are the main "factors of
production." In a Second Wave economy, the land remains valuable while the
"labor" becomes massified around machines and larger industries. In a Third Wave
economy, the central resource -- a single word broadly encompassing data,
information, i .....
|
|
The Computer Underground
.... readings of those with the power to interpret
and stigmatize behaviors as inappropriate. "Moral crusades" that lead to
definitions of criminalized deviance tend to reduce the meanings of
polysemic acts to unidimensional ones that limit understanding of both the
nature of the acts and their broader relationship to the culture in which
they occur. This has occured with the criminalization of computer
phreaking and hacking. In this paper, we examine the computer underground
as a cultural, rathe .....
|
|
Othello: Game Strategy
.... computer cannot capitalize
when you turn 5 black stones white, and the computer your seven whites
black.
Always play within your set "square". If you had on the bottom row 3
white, and on the second row 2 blacks, you would only play within that
designated square, which is 3 x 3 stones. (see diagram.) This ensures
that the computer can only play one stone past the square at any time,
which will help you in predicting where the computer will move and a basic
strategy.
Always try to keep your .....
|
|
William Gibson's Neuromancer: Cyberspace
.... with one another. some users even think of on-line services as a community.
The second catagory involves Bulletin Boards or (BBS's). These services
allow the user accounts like their larger on-line service cousins. These BBS's
have less users because they run on smaller computers. The system operators,
more commonly known as sysops, are running the boards. Since most BBS's are
hobbies there is usually no charge for an account. The same as on-line services,
users use BBS's for trades, games .....
|
|
BBS Piracy And The Copyright
.... electronically.
Yves Roy, sergeant of RCMP stated that charges will be laid in early
December under paragraph 42 of The Copyright Act. Conviction under this
act carries a maximum punishment of a fine of $1 million dollars, and/or 5
years imprisonment.
Because newspaper articles are very biased in one point-of- view, it
is difficult to look at both sides of this situation. But let us discuss
piracy in a more general manner. Software piracy is the act in which
someone takes a copyri .....
|
|
Computer Science
.... mathematics known as numerical analysis, which examines the accuracy and
precision of calculations.
As the use of computers expanded between the 1950s and the 1970s,
the focus of computer science broadened to include simplifying the use of
computers through programming languages—artificial languages used to
program computers, and operating systems—computer programs that provide a
useful interface between a computer and a user. During this time, computer
scientists were also experimenting with new .....
|
|
Experiencing Cyberspace
.... connect to a host. When I travel from place
to place (site to site), I do not cover any known physical distances, but
instead I cover visual distance. Just as many people do, I refer to the places
that I visit as virtual worlds. I like calling them this because I never
actually get to see the reality of the "world". I only get to see it
electronically and digitally. The feeling that I experience while in cyberspace
is knowing that I possess the power to visit any where I want. When I click
one of th .....
|
|
What Is A Robot
.... of
tasks."
The key wor ds in their definition are "reprogrammable" and
"multifunctional." By "reprogrammable" they mean that if a robot gets a new
assignment, it will need new instructions, but its basic structure will not
change (except maybe a new mechanical hand). By "multifunctional" they
mean a robot is the mechanical counter part of a computer that can handle
various problems without any major hardware modifications. The only thing
that changes when a robot is reassigned is its pro .....
|
|
Development Of Computers And Technology
.... system. Computer speeds have
taken a huge increase as well, in 1995 when a normal computer was a 486
computer running at 33 MHz, to 1997 where a blazing fast Pentium (AKA 586)
running at 200 MHz plus. The next generation of processors is slated to come
out this year as well, being the next CPU from Intel, code named Merced, running
at 233 MHz, and up. Another major innovation has been the Internet. This is a
massive change to not only the computer world, but to the entire world as well.
The Internet .....
|
|
|
|