Amiga technology came into being decades ago. The concepts (and some of the actual system components) had staying power despite the failure of the original manufacturer. Developers and users around the world continue to push and use Amiga derived and expanded technology. This is more than retrocomputing as a desire to simply reclaim past computing technology. This is an example of continued technology development by a community of invested users, a sort of consumer-led development.
...More
Article
Cortada, James W.;
(2002)
Studying the increased use of software applications: Insights from the case of the American petroleum industry, 1950--2000
(/isis/citation/CBB001180897/)
Chapter
Misa, ThomasJ.;
(2010)
Gender codes: Defining the problem
(/isis/citation/CBB001180018/)
Chapter
Haigh, Thomas;
(2010)
Masculinity and the machine man
(/isis/citation/CBB001180016/)
Book
Aspray, William F.;
Ceruzzi, Paul E.;
(2008)
The Internet and American business
(/isis/citation/CBB001180684/)
Article
Richardson, Thom;
(2013)
The King and the Astronaut
(/isis/citation/CBB001200560/)
Article
Janet Abbate;
(October 2018)
Code Switch: Alternative Visions of Computer Expertise as Empowerment from the 1960s to the 2010s
(/isis/citation/CBB903684763/)
Article
Söderberg, Johan;
(2010)
Misuser Inventions and the Invention of the Misuser: Hackers, Crackers and Filesharers
(/isis/citation/CBB001034652/)
Article
Saarikoski, Petri;
(2014)
Great Northern Machine Wars: Rivalry Between User Groups in Finland
(/isis/citation/CBB001214451/)
Article
Coughlon, Joseph F.;
Brady, Samanatha;
(Spring 2019)
Planning, Designing, and Engineering Tomorrow’s User-Centered, Age-Ready Transportation System
(/isis/citation/CBB234362307/)
Article
Prescott, Heather Munro;
(July 2019)
We Must Not Allow a Contraception Gap: Planned Parenthood's Campaign for New Birth Control and Feminist Health Activism in the 1990s
(/isis/citation/CBB657794137/)
Article
Jack, Caroline;
(2016)
Meaning and Persuasion: The Personal Computer and Economic Education
(/isis/citation/CBB148010275/)
Article
Park, Dongoh;
(2016)
The Korean Character Code: A National Controversy, 1987-1995
(/isis/citation/CBB705437460/)
Article
Peters, Benjamin;
(2008)
Betrothal and betrayal: The Soviet translation of Norbert Wiener's early cybernetics
(/isis/citation/CBB001180043/)
Book
Jessa Lingel;
(2021)
The Gentrification of the Internet: How to Reclaim Our Digital Freedom
(/isis/citation/CBB153399179/)
Article
DuPont, Quinn;
Fidler, Bradley;
(2016)
Edge Cryptography and the Codevelopment of Computer Networks and Cybersecurity
(/isis/citation/CBB760734420/)
Article
Kneuper, Ralf;
(2017)
Sixty Years of Software Development Life Cycle Models
(/isis/citation/CBB236951329/)
Article
Fidler, Bradley;
Currie, Morgan;
(2016)
Infrastructure, Representation, and Historiography in BBN's Arpanet Maps
(/isis/citation/CBB826738719/)
Book
Latil, Pierre de;
(1957)
Thinking by machine: A study of cybernetics
(/isis/citation/CBB001180074/)
Article
Laer, Arthe Van;
(2010)
Developing an EC computer policy, 1965--1974
(/isis/citation/CBB001181582/)
Article
Edwards, Paul N.;
(April 2002)
Pourquoi fabriquer des ordinateurs? (Why make computers? )
(/isis/citation/CBB001181676/)
Be the first to comment!