Computing : using computers technology and writing programs for them. It is part of the Information Technology.
Computer science is the study of computing and the application of its theories. Scientific computing is concerned with constructing mathematical models or simulations with the aid of computers in order to analyze and solve scientific, economic, social and engineering problems.
Computing has dramatically influenced progress in science, engineering, business, and many other areas of human endeavor. In today’s world, nearly everyone needs to use computers, and many will want to study computing in some form. Computing will continue to present challenging career opportunities, and those who work in computing will have a crucial role in shaping the future. 
Prescient Quotes on Computing Surveillance
- "The progress of science in furnishing the government with means of espionage is not likely to stop with wiretapping. Ways may some day be developed by which the government, without removing papers from secret drawers, can reproduce them in court, and by which it will be enabled to expose to a jury the most intimate occurrences of the home. Advances in the psychic and related sciences may bring means of exploring unexpressed beliefs, thoughts and emotions. 'That places the liberty of every man in the hands of every petty officer' was said by James Otis of much lesser intrusions than these. 1 To Lord Camden a far slighter intrusion seemed 'subversive of all the comforts of society.' Can it be that the Constitution affords no protection against such invasions of individual security?"
- Louis Brandeis (1856-1941), United States Supreme Court Associate Justice Dissenting, Olmstead v. United States, 277 U.S. 438 (1928).
- Binary Code
- Tails Anonymous Secure Operating System
- IBM, HP, Dell and Microsoft Windows
- Apple Computer MacOS for Apple Macintosh
- Apple iOS for iPhone-iPod-iPad
- Computer Crime and Cyberwarfare:
- Hackers: China, Russia and others
- Bradley Manning - Homosexual Hacker Traitor of State secrets
- Wikileaks and Julian Assange - Australian leftist hacker
- Dangers of Social Media: Facebook, Twitter, Google Plus, YouTube, Yahoo
- Security Software and Security-Focused Operating Systems to protect unalienable Fifth Amendment - Fourth Amendment Right to Privacy (Internet privacy, Information privacy, Expectation of privacy) and Second Amendment - First Amendment (Freedom of information and Political freedom) rights against unconstitutional Gun control - Internet censorship Big government Police state, hackers, and "all enemies, foreign and domestic" of American liberty.
- Anonymity with Tails Operating System: Linux-based with Tor (anonymity network), Firefox Iceweasel browser, HTTPS Everywhere encryption
- Prism-Break.org: Opt out of global data surveillance programs like PRISM, ECHELON, XKeyscore and Tempora.
- Open Source Free software not over-priced tracking by Microsoft-Apple-Google-Android
- Privacy Search Engines: Duck Duck Go and Ixquick: Privacy-oriented Search engines instead of tracking by Google, Yahoo and Bing
- Glossary of Computer Terms
- The History of Computing
- Scientific Computing Software
- https://charlescarrollsociety.com/2014/02/12/amrd-t-a-i-l-s-plastic-gloves-for-your-computer-american-redoubt - Tails operating system
- https://charlescarrollsociety.com/2014/01/29/amrd-introducing-the-tor-browser-bundle/ - Tor browser
- https://prism-break.org/en - "Opt out of global data surveillance programs like PRISM, XKeyscore and Tempora."
- https://www.eff.org - "Leading the fight against the NSA's illegal mass surveillance program"
- Online Guide to Privacy Resources
- http://www.nocards.org - Coalition Against Unsolicited Commercial Email
- ↑ "Help make mass surveillance of entire populations uneconomical! We all have an unalienable right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary products and services."
- ↑ "Help make mass surveillance of entire populations uneconomical. We all have a right to privacy, which you can exercise today by encrypting your communications and ending your reliance on proprietary services."
- ↑ "Organization formed in 1990 to maintain and enhance intellectual freedom, privacy, and other values of civil liberties and democracy in networked communications. Publishes newsletters, Internet Guidebooks and other documents, provides mailing lists and other online forums, and hosts a large electronic document archive. Contact: email@example.com. 454 Shotwell Street, San Francisco, CA 94110-1914. Tel: (415) 436-9333. Fax: (415) 436-9993. Executive Director: Sheryl Steele."
- ↑ "EPIC was established in 1994 to focus public attention on emerging privacy issues relating to the National Information Infrastructure, such as the Clipper Chip, the Digital Telephony proposal, medical records privacy and the sale of consumer data. EPIC conducts litigation, sponsors conferences, produces reports, publishes the EPIC Alert and leads campaigns on privacy issues. For more information email: firstname.lastname@example.org, or contact EPIC, 1718 Connecticut Avenue, NW, Suite 200, Washington, DC 20009. Tel: (202) 483-1140. Executive Director: Marc Rotenberg."
- ↑ "CAUCE is an all volunteer, entirely web-based organization, created by Netizens to advocate for a legislative solution to the problem of UCE (spam). CAUCE began as a discussion group called SPAM-LAW, formed of members who felt that legislation was necessary to stop spam from choking the life out of the Internet. In 1997 CAUCE proposed an amendment to the Federal statute which outlaws junk "faxes" (47 USC 227) to also prohibit junk e-mail, and since then has remained a pre-eminent voice in the anti-spam community. Email: email@example.com. President: Edward Cherlin."