Book Impagliazzo, John; Jäervi, Timo; Paju, Petri (2009) History of Nordic computing 2: Second IFIP WG 9.7 conference, HINC2, Turku, Finland, August 21--23, 2007, revised selected papers.
Chapter
Lundin, Per;
Dussauge, Isabelle;
Gribbe, Johan;
Kaijser, Arne;
Peralta, Julia;
Sjöblom, Gustav;
Thodenius, Björn;
(2011)
Precursors of the IT nation: Computer use and control in Swedish society, 1955--1985
(/isis/citation/CBB001181593/)
Article
Shunryu Colin Garvey;
(January-March 2021)
The “General Problem Solver” Does Not Exist: Mortimer Taube and the Art of AI Criticism
(/isis/citation/CBB628101227/)
Article
Edwards, Paul N.;
(2007)
Revolutionary secrets: Technology's role in the South African anti-apartheid movement
(/isis/citation/CBB001181668/)
Article
Nathan Ensmenger;
(October 2018)
The Environmental History of Computing
(/isis/citation/CBB959146795/)
Article
Cortada, James W.;
(2004)
How did computing go global? The need for an answer and a research agenda
(/isis/citation/CBB001180895/)
Article
Cortada, James W.;
(2006)
Looking at technology through industry eyes
(/isis/citation/CBB001180887/)
Article
Devin Kennedy;
Gerardo Con Diaz;
(April-June 2021)
Computing Capitalisms—Part 2
(/isis/citation/CBB378297576/)
Chapter
Edwards, Paul N.;
(2006)
L'électronique rêvera pour vous: L'informatique rencontre l'information au cours années Pompidou
(/isis/citation/CBB001181667/)
Book
Tatnall, Arthur;
(2010)
History of Computing: Learning from the Past: IFIP WG 9.7 International Conference, HC 2010, held as part of WCC 2010, Brisbane, Australia, September 20--23, 2010: Proceedings
(/isis/citation/CBB001180682/)
Article
Mirowski, Alexander;
(2017)
At the Electronic Crossroads Once Again: The Myth of the Modern Computer Utility in the United States
(/isis/citation/CBB369914463/)
Article
Lewis, Nicholas;
(2017)
Purchasing Power: Rivalry, Dissent, and Computing Strategy in Supercomputer Selection at Los Alamos
(/isis/citation/CBB909353193/)
Article
Dongwon Jo;
(2022)
Vernacular Technical Practices Beyond the Imitative/Innovative Boundary: Apple II Cloning in Early-1980s South Korea
(/isis/citation/CBB993842623/)
Article
Baker, Kevin T.;
(2017)
Simulation and “Seduction” at the Policy Interface
(/isis/citation/CBB450364367/)
Article
Theodora Vardouli;
David Theodore;
(April-June 2021)
Walking Instead of Working: Space Allocation, Automatic Architecture, and the Abstraction of Hospital Labor
(/isis/citation/CBB134939420/)
Article
Yost, Jeffrey R.;
(2016)
The March of IDES: Early History of Intrusion-Detection Expert Systems
(/isis/citation/CBB570334134/)
Article
Downey, Greg;
(2004)
Jumping contexts of space and time in the history of computers and computing
(/isis/citation/CBB001180038/)
Book
Malinovskij, B. M.;
(1995)
Istorija vycislitel'noj techniki v licach
(/isis/citation/CBB001180064/)
Article
Spicer, Dag;
(July-September 2016)
Interview: Raymond Tomlinson: Email Pioneer, Part 2
(/isis/citation/CBB113069755/)
Article
Day, John;
(2016)
The Clamor Outside as INWG Debated: Economic War Comes to Networking
(/isis/citation/CBB243873737/)
Article
Yost, Jeffrey R.;
(2016)
Computer Security, Part 2 -- Editor's Introduction
(/isis/citation/CBB453922047/)
Be the first to comment!