標題: Titlebook: Hacking Europe; From Computer Cultur Gerard Alberts,Ruth Oldenziel Book 2014 Springer-Verlag London 2014 [打印本頁] 作者: 戲弄 時間: 2025-3-21 19:53
書目名稱Hacking Europe影響因子(影響力)
書目名稱Hacking Europe影響因子(影響力)學科排名
書目名稱Hacking Europe網絡公開度
書目名稱Hacking Europe網絡公開度學科排名
書目名稱Hacking Europe被引頻次
書目名稱Hacking Europe被引頻次學科排名
書目名稱Hacking Europe年度引用
書目名稱Hacking Europe年度引用學科排名
書目名稱Hacking Europe讀者反饋
書目名稱Hacking Europe讀者反饋學科排名
作者: Debate 時間: 2025-3-21 21:22
Transnational (Dis)Connection in Localizing Personal Computing in the Netherlands, 1975–1990 the process was not a simple story of adoption of American models. Instead, many Dutch actors adapted computer technologies to their own local needs, habits, and cultural settings. For one, actors developed different views about the relations between Dutch users and North American suppliers. This c作者: nocturnal 時間: 2025-3-22 02:51
“Inside a Day You Will Be Talking to It Like an Old Friend”: The Making and Remaking of Sinclair Per computer literacy. Among the most popular British home computers were those of Sinclair. Originally intended to introduce people to computing, Sinclairs low-cost and basic capabilities Have led to write them off as undistinguished introductory computers or as mere video game machines. Closer attent作者: Lipoma 時間: 2025-3-22 07:10
Legal Pirates Ltd: Home Computing Cultures in Early 1980s Greecereinforced the local economic and technological characteristics. Because the protection of intellectual property rights regarding software was not an issue, software piracy was not considered such a pressing problem as it would become later. Home computing in Greece was shaped by two technology-medi作者: 平淡而無味 時間: 2025-3-22 09:23
Galaxy and the New Wave: Yugoslav Computer Culture in the 1980sw Pact nor of NATO yet sandwiched geographically between these powerful blocks, the country occupied a unique position among countries politically, technologically, and culturally. In the context of the Cold War, the local emphasis on self-reliance and massive government investments resulted in a hi作者: 殘忍 時間: 2025-3-22 15:26 作者: arterioles 時間: 2025-3-22 17:51 作者: ESO 時間: 2025-3-22 21:45
Heroes Yet Criminals of the German Computer Revolutionst of hackers, who were in the vanguard of the digital age. To understand how the so-called criminal hacker came into existence, the chapter explores the history of German hackers. In 1984, Herwart “Wau” Holland and Steffen Wernéry, two of the founders of Germany‘s ., announced their “hack” of Germa作者: DOSE 時間: 2025-3-23 03:50
How Amsterdam Invented the Internet: European Networks of Significance, 1980–1995(Digital City, called DDS). Hailed as a new form of public sphere, DDS visualized the Internet as a form of a virtual city. Rather than trace how DDS gave shape to an online city, however, this chapter explores how an existing and emerging culture of the city gave rise to this new digital sphere. In作者: gorgeous 時間: 2025-3-23 08:25 作者: 大方一點 時間: 2025-3-23 09:43 作者: 實施生效 時間: 2025-3-23 17:20 作者: Charade 時間: 2025-3-23 21:56 作者: 飛來飛去真休 時間: 2025-3-23 23:53
Varieties of Luck and Possible Worldsreinforced the local economic and technological characteristics. Because the protection of intellectual property rights regarding software was not an issue, software piracy was not considered such a pressing problem as it would become later. Home computing in Greece was shaped by two technology-medi作者: Accommodation 時間: 2025-3-24 05:54
Biochemical Detection of the Virus Genome,w Pact nor of NATO yet sandwiched geographically between these powerful blocks, the country occupied a unique position among countries politically, technologically, and culturally. In the context of the Cold War, the local emphasis on self-reliance and massive government investments resulted in a hi作者: Inertia 時間: 2025-3-24 06:40
https://doi.org/10.1007/978-3-030-24025-7hly influenced by the Soviet Bloc. He introduces a host of social actors who were instrumental in shaping Poland’s home computer market: state institutions, computer experts, private entrepreneurs, and hardware and software retailers. The chapter argues that these social actors not only filled the s作者: 預定 時間: 2025-3-24 12:00 作者: insurrection 時間: 2025-3-24 16:40
IoT Networking and Communication Layer,st of hackers, who were in the vanguard of the digital age. To understand how the so-called criminal hacker came into existence, the chapter explores the history of German hackers. In 1984, Herwart “Wau” Holland and Steffen Wernéry, two of the founders of Germany‘s ., announced their “hack” of Germa作者: 大包裹 時間: 2025-3-24 19:58 作者: 證實 時間: 2025-3-25 03:04
The Triumph of Rational Religion in Americammunity. The philosophy behind the project states that anyone lacking previous knowledge of electronics should be able to build the device by themselves. In order to realize this vision, the mechanics and electronics were designed with generally available and off-the-shelf components. The instructio作者: 雜役 時間: 2025-3-25 03:39
978-1-4471-7069-3Springer-Verlag London 2014作者: 宣傳 時間: 2025-3-25 10:30
Hacking Europe978-1-4471-5493-8Series ISSN 2190-6831 Series E-ISSN 2190-684X 作者: 匍匐前進 時間: 2025-3-25 11:59 作者: 非秘密 時間: 2025-3-25 18:39 作者: Narrative 時間: 2025-3-25 22:32
2190-6831 rs instrumental in introducing and spreading the cultures of.Hacking Europe. traces the user practices of chopping games in Warsaw, hacking software in Athens, creating chaos in Hamburg, producing demos in Turku, and partying with computing in Zagreb and Amsterdam. Focusing on several European count作者: 全神貫注于 時間: 2025-3-26 00:52 作者: Loathe 時間: 2025-3-26 04:44 作者: 水汽 時間: 2025-3-26 11:11 作者: 無能的人 時間: 2025-3-26 16:14
Varieties of Luck and Possible Worlds – legitimate – altering of the software code. The chapter discusses the so-called “cassette piracy” phenomenon during the period together with the interaction between home computer users and the development of computing technology.作者: exceptional 時間: 2025-3-26 20:23
https://doi.org/10.1007/978-3-030-24025-7uter technology was based on the transnational flow of material artifacts, software objects, and information. The study thus questions the distinction between global and local practices and how these are linked with local culture, the economic situation, and legislation in the cross-border appropriation of technology.作者: Introvert 時間: 2025-3-27 00:58
The Triumph of Rational Religion in America the growing market demand for free space optics in the Czech wireless community called forth a redesign of the product in line with the requirements of mass production. The relation between a “democratization of innovation” and the entrepreneurship that flourished around the product was marked by internal tensions.作者: 擦掉 時間: 2025-3-27 01:35
Legal Pirates Ltd: Home Computing Cultures in Early 1980s Greece – legitimate – altering of the software code. The chapter discusses the so-called “cassette piracy” phenomenon during the period together with the interaction between home computer users and the development of computing technology.作者: 善辯 時間: 2025-3-27 06:25
Playing and Copying: Social Practices of Home Computer Users in Poland during the 1980suter technology was based on the transnational flow of material artifacts, software objects, and information. The study thus questions the distinction between global and local practices and how these are linked with local culture, the economic situation, and legislation in the cross-border appropriation of technology.作者: ALIEN 時間: 2025-3-27 10:16 作者: 反省 時間: 2025-3-27 13:51 作者: 百科全書 時間: 2025-3-27 19:32
Secretion of Steroids by the Epididymisasm and helped revolutionize the use and meaning of computers by incorporating them into people’s daily lives. As tinkerers, hackers appropriated the machine and created a new culture around it. Perhaps best known and most visible were the hacker cultures that toyed with the meaning of ownership in 作者: Palpable 時間: 2025-3-28 00:21
Benign Childhood Focal Epilepsy,cilitate software exchange. By contrast, governmental computer literacy programs tried to de-link from US producers. When introducing computers in schools, policies favored national computer industries. Local practices of cracking and copying of software, showed how computer users found themselves a作者: 瘙癢 時間: 2025-3-28 02:13 作者: 教唆 時間: 2025-3-28 06:42 作者: 異端 時間: 2025-3-28 11:35
IoT Networking and Communication Layer,rs manipulated its billing system and carried out a “digital bank robbery.” When the German Federal Mail was thus exposed, the organization tried to shift the blame to the hackers. The journalists and lawmakers, however, applauded the hackers for uncovering the flaws of BTX system. Instead of crimin作者: disciplined 時間: 2025-3-28 16:47
https://doi.org/10.1007/978-981-19-6784-9 fighting social injustice. The chapter then shows how these sectors came together in the late 1980s with the involvement of a third set of actors, the hacking community, to shape what would become Digital City and Amsterdam’s booming digital culture. Through a series of network events that brought 作者: oracle 時間: 2025-3-28 20:32
2190-6831 element--the role of mischief, humor, and play--discussed here as crucial for analysis of hacker culture, opens new vistas for the study of the historyof technology..978-1-4471-7069-3978-1-4471-5493-8Series ISSN 2190-6831 Series E-ISSN 2190-684X 作者: 喃喃訴苦 時間: 2025-3-28 23:21 作者: intuition 時間: 2025-3-29 05:01
Transnational (Dis)Connection in Localizing Personal Computing in the Netherlands, 1975–1990cilitate software exchange. By contrast, governmental computer literacy programs tried to de-link from US producers. When introducing computers in schools, policies favored national computer industries. Local practices of cracking and copying of software, showed how computer users found themselves a