Search
- Did you mean
- compulsory
Search results
-
Toxic wastes flooding Asia
contaminated metal waste, contaminated plastic waste and a growing amount of computer waste to Asia in the past ...
-
Mickey and Malory go to Hollywood
makes it all seem unreal 鈥 rather like a computer game. The main characters are two-dimensional; there ...
-
Successful women's cultural night
computer-based musical equipment at school. This project resulted in the release of a CD called ...
-
Radio highlights
communities" linked by computers, or will on-line government mean a form of "knee-jerk" ...
-
Homage to the labourer
before manual workers are replaced by computers and robots, Salgado spent the years from 1986 to 1991 ...
-
Antiwar fighter seeks to return to US
draft files of poor and working class kids and destroyed the computer network of Dow Chemical ...
-
'Netwars': Politics and the Internet
Through computer and communication networks, especially via the worldwide Internet, grassroots campaigns ... non-state actors". Ronfeldt is basically arguing that the efforts of activists on computers have been ... a number of computer networks, so far confined to Europe, have been attacked or completely shut down. In ...
-
UN conference on plant genetic resources
subregional meetings, collaboration with a wide range of scientific institutions, and international computer ...
-
Nostradamus' Media Watch
sophisticated computer modelling that has already been used to prove Hitler's diaries were fake, and that ...
-
Education should be free: Increase funding now!
inadequate library resources. The use of computers in virtually every discipline has also made students ... reliant on inadequate university computer facilities. Students on low incomes can't afford to buy ... books and computers and have to waste a lot of time trying to access them. Another result of funding ...
-
On the box
FBI's use of high technology and how its state-of-the-art computers threaten civil liberties and ...
-
Talking union
weekly earnings of $561.40. Computer giant IBM has announced plans to cut 1000 jobs, about 25% of its ...
-
Racism on the rise in US
killing of "Black bucks", while another was caught using the National Crime Information Computer ...
-
'Labor Inc' alleged at Melbourne Uni
interests of students by privatising union building space for a commercial computer retailer half-owned by ...
-
British government on a racist binge
groups. Hence the arrest of computer salesperson Ali al-Saleh, who has lived in Britain for 20 years. It ...
-
Costs or gains?
numbers were projected by an Access Economics computer model by academic Robert Ackland, it was found that ...
-
Slapstick in higher realms
(Isabella Rossellini). Exciting computer images allow Madeline to break her neck and twist her head ...
-
One plum pudding would have been enough
Wenders' brainchild starts as an exciting road movie with computer technology. Claire (Solveig Dommartin) ...
-
Radio highlights
a growing number of computer-based or electronic works. Its latest creation is a modern version of the Thai ...
-
Soviet environmentalists face big odds
organisations, through computer networks. For the present, she thinks, the most effective things for the movement ...
-
What鈥檚 driving US-China trade tensions?
For example, the Trump administration has carefully avoided talking about placing tariffs on computers ...
-
In Gaza, Israel is normalising war crimes
computer labs鈥, as well as art exhibition galleries. 鈥淎 cultural centre is civilian property enjoying ...
-
The hidden life of garbage laid bare
mobile phones and computers. Obsolescence is a guaranteed feature. Rogers finishes her book with an ...
-
Roxon plans one warrant to snoop us all
allow ASIO to use a single 鈥渟uper warrant鈥 to tap phones, computers, programs, tablets and even video ... agent to retrospectively search your emails, internet use, text messages and computer data at any time ...
-
Police caught spying on Adelaide activists
private computers. On January 13, a spokesperson for the attorney-general's department told聽media ... that: 鈥淭he purpose of this power is to allow ASIO to access the computer[s] of suspected terrorists and ...