瀏覽代碼

Final order of English articles

maxigas 6 年之前
父節點
當前提交
1845372c27

+ 14 - 14
en/SUMMARY.md

@@ -1,28 +1,28 @@
 # Technologoical Sovereignty, vol. 2.
 
  * [Dedication](content/00dedication.md)
- * [Technological Sovereignty: What are we talking about?](content/01preface.md)
- * [Technological Sovereignty: Learning to love machines again](content/02intro.md)
+ * [Preface: Technological Sovereignty – What are we talking about?](content/01preface.md)
+ * [Introduction: Technological Sovereignty – Learning to love machines again](content/02intro.md)
 
-## Part 1: Technological sovereignty initiatives
+## Part 1: Characterising technological sovereignty initiatives
 
  * [Code is political, algorithms are weapons of math destruction](content/03algos.md)
- * [A seed sprouts when it is sown in fertile soil](content/04rizomatica.md)
- * [COATI: Simultaneous interpreting using radio frequencies](content/05coati.md)
- * [Whistleblowing: A double edged sword](content/06leaks.md)
- * [Let's develop peasant computing, let's breed “kittens”](content/07chatons.md)
+ * [Digital Governance: Once upon a time...](content/04gamification.md)
+ * [Keeping technological sovereignty: The case of Internet Relay Chat](content/05irc.md)
+ * [Hacklabs to technological cooperatives](content/06cooperatives.md) 
+ * [From appropriate technologies to re-appropriated technologies](content/07rats.md)
 
 ## Part 2: Characterising technological sovereignty
 
- * [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/08leap.md)
- * [Keeping technological sovereignty: The case of Internet Relay Chat](content/09irc.md)
- * [Digital Governance: Once upon a time...](content/10gamification.md)
- * [From appropriate technologies to re-appropriated technologies](content/11rats.md)
- * [Hacklabs to technological cooperatives](content/12cooperatives.md)
+ * [A seed sprouts when it is sown in fertile soil](content/08rizomatica.md)
+ * [COATI: Simultaneous interpreting using radio frequencies](content/09coati.md)
+ * [Whistleblowing: A double edged sword](content/10leaks.md)
+  * [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/11leap.md)
+ * [Let's develop peasant computing, let's breed “kittens”](content/12chatons.md)
 
-## Credits
+## Contributions
 
- * [Credits](content/13contributions.md)
+ * [Contributions](content/13contributions.md)
 
 * * *
 

+ 0 - 0
en/content/10gamification.md → en/content/04gamification.md


+ 0 - 0
en/content/09irc.md → en/content/05irc.md


+ 0 - 0
en/content/09irc.pan → en/content/05irc.pan


+ 0 - 0
en/content/12cooperatives.md → en/content/06cooperatives.md


+ 0 - 0
en/content/11rats.md → en/content/07rats.md


+ 0 - 0
en/content/04rizomatica.md → en/content/08rizomatica.md


+ 0 - 0
en/content/05coati.md → en/content/09coati.md


+ 0 - 0
en/content/06leaks.md → en/content/10leaks.md


+ 0 - 0
en/content/08leap.md → en/content/11leap.md


+ 0 - 0
en/content/07chatons.md → en/content/12chatons.md