wiby  
Settings



Joseph Campbell with Bill Moyers "The Power of Myth"

https://carljung.ru/Library/CampMoye.htm

going to save us. Our computers, our tools, our machines are not enough. We have to rely on our intuition, our true being."      "Isn't that an affront to

SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

synthcode blog

http://synthcode.com/blog/

computers</a to consistently represent and manipulate <a href="http://en.wikipedia.org/wiki/Character_(computing)" title="Character (computing)" text<

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline

Fedora, secure boot, and an insecure future [LWN.net]

https://lwn.net/Articles/500231/

race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]

Piet Beertema's website

https://godfatherof.nl/

a wild variety of computers worldwide, speaking the same "language" to communicate: the Internet Protocol, or in short IP. And ' www ', CERN's first and in fact sort of 'prehistor

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

Quote Anthology

https://quotes.pouyakary.org/

to the original microcomputers like the Apple II, late 70s, early 80s, we’re living in a lot of the design patterns that were established then. Those computers were made by people

Garbage Collection

http://synthcode.com/blog/2009/06/Garbage_Collection

interactions between computers and human (natural) languages.</p ')" Natural Language Processing . sexp sexp_cons ( sexp ctx, sexp head, sexp tail) { sexp pair = sexp_alloc_typ

40th Anniversary Kermit protocol

https://kermitproject.org/fortieth.html

possible variety of computers and operating systems including our own DEC-20 mainframes , our IBM mainframes , and the " Superbrain " CP/M microcomputer we were about to place in

security-snake-oil

http://linuxmafia.com/faq/Essays/security-snake-oil.html

millions of infected computers connecting to them, and counting the increasing number of Mac machines. Can you say "this was a religious debate?" Well, I can, which is why the res


Find more...