You are here: Home

Search results

331 items matching your search terms.
Filter the results.
Item type







New items since



Sort by relevance · date (newest first) · alphabetically
File MP3 audio Tech Talk With Hawke Kyrs 014 20070223
Located in Show Archives
File MP3 audio Tech Talk With Hawke KYRS 20070107 Vista DRM and Synthetic Zen 2 hours
Located in Show Archives
File MP3 audio Tech Talk With Hawke Show 0007 Vista DRM 20070107
First full dedicated show of Tech Talk With Hawke. Duration: 1 hour 0 minutes Filesize: 63.3 MB Covers Microsoft Vista's DRM (Digital Rights Management) implementation. See details for information on show contents...Size: 63.3 MB File type: MPEG-1 Audio Layer 3 (audio/mpeg) Bit rate: 128 Kbps Frequency: 22 Khz Track length: 01:09:06 (hh:mm:ss)Tech Talk With Hawke Track number: 0 Album: 20070107 Year: 2006
Located in Show Archives
Tech Talk With Hawke Talk Show Topics for Episode 150
Here is a quick preview of the upcoming discussion topics for the next episode of Tech Talk With Hawke...
Tech Talk With Hawke Website Moving
Over time I have accumulated far too many domains. I am attempting to cut back (again). So I will be letting the various hawketechtalk.com and related domains expire rather than renewing. I have had all along the same site running at http://techtalk.hawkenterprising.com. So update your bookmarks and RSS feeds accordingly.
The Content Providers 67% Ownership Revolution: How ClimbHigh.AI and Its Community Are Rewriting EdTech's Rules
At ClimbHigh.AI (https://www.climbhigh.ai), our team, led by CEO Jake Douglass, is building something revolutionary: a platform where creators own 67% of the content equity. Not revenue sharing. Actual ownership...
The Fifth AND Second Age of Computing?
Now counting predecessors to electronic processors (mechanical, water, and other computers), nor the "human computer", we are arguably, perhaps by some measures, now in the Fifth (but also back in the Second) Age of computing?
The iPhone is defective by design.
"Our Advice about the iPhone is simple: it's defective by design. It deprives you of your freedom. Nobody should buy it. Nobody should write software for it." --FSF
Image PNG image The many hats of a CTO 8-circle Venn diagram circles Hawke Robinson
Located in Documents / images
The NSA hack proves Apple was right to fight the FBI
After the unprecedented breach of hacking tools and exploits stolen from the US National Security Agency's elite hacking unit, some privacy advocates see it as clear vindication of Apple in its fight with the FBI earlier this year.