Skip to content

wandyezj/reference

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Reference

Bobbitt, John Franklin. What the schools teach and might teach. Vol. 4. Survey Committee of the Cleveland Foundation, 1916.

Doctorow, Cory. “Unauthorized Bread: Real Rebellions Involve Jailbreaking IoT Toasters.” Ars Technica. Ars Technica, January 22, 2020. https://arstechnica.com/gaming/2020/01/unauthorized-bread-a-near-future-tale-of-refugees-and-sinister-iot-appliances/.

Weiser, Mark. "The Computer for the 21 st Century." Scientific american 265.3 (1991): 94-105.

Stonebraker, Michael, and Joey Hellerstein. "What goes around comes around." Readings in Database Systems 4 (2005): 1724-1735.

Codd, Edgar F. "A relational model of data for large shared data banks." Communications of the ACM 13.6 (1970): 377-387.

Thompson, Ken. "Reflections on trusting trust." Commun. ACM 27, no. 8 (1984): 761-763.

Stroustrup, Bjarne. "Thriving in a crowded and changing world: C++ 2006–2020." Proceedings of the ACM on Programming Languages 4, no. HOPL (2020): 1-168.

Armour, Phillip G. "The five orders of ignorance." Communications of the ACM 43, no. 10 (2000): 17-20.

Flexner, Abraham "The Usefulness of Useless Knowledge" Harpers, Issue 179 (1939): 544-552.

The facts depend on where you are coming from

System Does Matter

The Freedom to Read

Frankfurt, Harry G. On bullshit. Princeton University Press, 2005.

Kalven Committee. "Report on the university’s role in political and social action. 1967."

Links

Selingo, Story by Jeffrey. “The False Promises of Worker Retraining.” The Atlantic. Atlantic Media Company, January 8, 2018. https://www.theatlantic.com/education/archive/2018/01/the-false-promises-of-worker-retraining/549398/.

Nakamoto, Satoshi. Bitcoin: A peer-to-peer electronic cash system. Manubot, 2019.

Hunt, Galen, George Letey, and Ed Nightingale. "The seven properties of highly secure devices." tech. report MSR-TR-2017-16 (2017).

Nineteen cybersecurity best practices used to implement the seven properties of highly secured devices in Azure Sphere

Original Links

The facts depend on where you are coming from

System Does Matter

The Freedom to Read Statement

Releases

No releases published

Packages

No packages published