29 lines
1.3 KiB
Markdown
29 lines
1.3 KiB
Markdown
# Technologoical Sovereignty, vol. 2.
|
|
|
|
* [Technological Sovereignty: What are we talking about?](content/01preface.md)
|
|
* [Technological Sovereignty: Learning to love machines again](content/02intro.md)
|
|
|
|
## Part 1: Technological sovereignty initiatives
|
|
|
|
* [Code is political, algorithms are weapons of math destruction](content/03algos.md)
|
|
* [A seed sprouts when it is sown in fertile soil](content/04rizomatica.md)
|
|
* [COATI: Simultaneous interpreting using radio frequencies](content/05coati.md)
|
|
* [Whistleblowing: A double edged sword](content/06leaks.md)
|
|
* [Let's develop peasant computing, let's breed “kittens”](content/07chatons.md)
|
|
|
|
## Part 2: Characterising technological sovereignty
|
|
|
|
* [Encrypting mails with usable tools: The mass adoption of encryption technologies](content/08leap.md)
|
|
* [Keeping technological sovereignty: The case of Internet Relay Chat](content/09irc.md)
|
|
* [Digital Governance: Once upon a time...](content/10gamification.md)
|
|
* [From appropriate technologies to re-appropriated technologies](content/11rats.md)
|
|
* [Hacklabs to technological cooperatives](content/12cooperatives.md)
|
|
|
|
## Acknowledgements + Contributions
|
|
|
|
* [Contributions](content/13contributions.md)
|
|
* [Acknowledgements](content/14acknowledgements.md)
|
|
|
|
* * *
|
|
|
|
* [Back cover](content/15back.md)
|