soberania_tecnologica_v2/en/SUMMARY.md

29 lines
1.3 KiB
Markdown

# Technologoical Sovereignty, vol. 2.
* [Technological Sovereignty: What are we talking about?](content/00preface.md)
* [Technological Sovereignty: Learning to love machines again](README.md)
## Part 1: Technological sovereignty initiatives
* [Code is political, algorithms are weapons of math destruction](content/03algos.md)
* [A seed sprouts when it is sown in fertile soil](content/04rizomatica.md)
* [COATI: Simultaneous interpreting using radio frequencies](content/05coati.md)
* [Whistleblowing: A double edged sword](content/06leaks.md)
* [Let's develop peasant computing, let's breed “kittens”](content/07chatons.md)
## Part 2: Characterising technological sovereignty
* [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/08leap.md)
* [Keeping technological sovereignty: The case of Internet Relay Chat](content/09irc.md)
* [Digital Governance: Once upon a time...](content/10gamification.md)
* [From appropriate technologies to re-appropriated technologies](content/11rats.md)
* [Hacklabs to technological cooperatives](content/12cooperatives.md)
## Acknowledgements + Contributions
* [Contributions](content/13contributions.md)
* [Acknowledgements](content/14acknowledgements.md)
* * *
* [Back cover](content/15back.md)