|
You are here |
www.boundary2.org | ||
| | | | |
illiterate.nekoweb.org
|
|
| | | | | ||
| | | | |
feministkilljoys.com
|
|
| | | | | Content Warning: The following post includes a discussion of transphobia and transmisogyny. How has gender become a map of a moment? Why do so many movements present themselves as against gender? In a recent article, Judith Butler shows how the difficulty of giving an account of the anti-gender movement tells us something about how that... | |
| | | | |
majesticflywhisk.blogspot.com
|
|
| | | | | SOB, SOB by Kerry James Marshall "For this too is what W. E. B. Du Bois might have us think of as the gift of black culture, the gift of bla... | |
| | | | |
uwaterloo.ca
|
|
| | | When it comes to cybersecurity, humans are often seen as the weakest link, but new research suggests that with a little help, people can do a surprisingly effective job at identifying malware. In a first-of-its-kind study, researchers from the University of Waterloo's Cheriton School of Computer Science teamed up with University of Guelph cybersecurity experts to test how | ||