users' cooperative

  • 121Legality of cannabis — Map of the legality of cannabis. The legality of cannabis has been the subject of debate and controversy for decades. Cannabis is illegal to consume, use, possess, cultivate, transfer or trade in most countries. Since the beginning of widespread… …

    Wikipedia

  • 122Cochlear implant — A cochlear implant (CI) is a surgically implanted electronic device that provides a sense of sound to a person who is profoundly deaf or severely hard of hearing. The cochlear implant is often referred to as a bionic ear. As of December 2010,… …

    Wikipedia

  • 123Apple IIGS — Mac specs Introduced=September 1986 MSRP=999 CPU=65C816 CPUspeed=2.8 MHz OS=Apple ProDOS, Apple GS/OS RAM=256 KB or 1 MB (expandable up to 8 MB) RAMtype= Discontinued=December 1992The Apple sc|IIgs, the fifth model inception of the Apple II, was… …

    Wikipedia

  • 124Windows 9x — Windows 4.x redirects here. For the operating system in the NT family, see Windows NT 4.0. Windows 9x Screenshot of Windows 95, the first version of Windows in the 9x series Company / developer …

    Wikipedia

  • 125Decision support system — Example of a Decision Support System for John Day Reservoir. A decision support system (DSS) is a computer based information system that supports business or organizational decision making activities. DSSs serve the management, operations, and… …

    Wikipedia

  • 126Peer-to-peer (meme) — Peer to Peer or P2P for short, in this context refers to the meme of egalitarian networking that is currently emerging throughout society, made possible by internet technologies and a critical look at current authoritarian and centralised social… …

    Wikipedia

  • 127Tvättstuga — (or Laundry room) is a room in an apartment block in Sweden providing communal laundry facilities for the residents. Typically the room is located in the basement ( sv. källare). In Finland it s called pesutupa .FacilitiesMore than one washing… …

    Wikipedia

  • 128Computational trust — In Information security, computational trust is the generation of trusted authorities or user trust through cryptography. In centralised systems, security is typically based on the authenticated identity of external parties. Rigid authentication… …

    Wikipedia