wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

/retro/ - Y2K - Page 1

https://trashchan.xyz/retro/index.html

553x792) >>5218 Computers Thread Fellow Time Traveler 21/08/2020, 04:41:24 No. 803 [Open] Hide Filter Name Filter Subject Moderate Watch Playlist 1521577129072.jpg [ Hide ]
1990s and 2000s Nostalgia

A List Of Games By Trans People Before 2010

https://dotmaetrix.neocities.org/classictranslist

(1989, Various home computers) Developed by Rebecca Heineman. Originally intended as a Bard's Quest game but rights issues got in the way Dragon Dive (2003, Gamecube) Kotori Yoshi

Kevsoft RISC OS Software Credits and Acknowledgement Page

http://kevsoft.co.uk/credit.php

Software for RISC OS Computers Quiz Engine First Release Want to create your own quizzes for RISC OS now you can with the first release of my Quiz Engine as used by FlagQuiz. On t
Kevsoft RISC OS software

ii.com · Procmail Quick Start: An introduction to email filtering with a focus on procmail by Nancy McGough

http://www.ii.com/internet/robots/procmail/qs/

or serves — other computers or computer programs. Whether the word “server” means “server software” or “server computer” is usually clear from t
This article will quickly get you up and running with Procmail.

2019 - Strange Loop

https://thestrangeloop.com/2019/sessions.html

of Texas at Austin How Computers Misunderstand the World Meredith Broussard New York University How to teach programming (and other things)? Felienne Hermans Leiden University Clo
Strange Loop is a conference for software developers covering programming langs, databases, distributed systems, security, machine learning, creativity, and more!

Few people give thought to how we interact with today’s portabledevices, and fewer recognize that the user experience in acce

https://friedmanarchives.com/dataegg/everyday_usage_scenarios.htm

accessing these small computers is lacking.   Because the Data Egg can be so far-reaching in application and so fundamental in improving ease-of use, it is wise to devote some spa

board.goeshard.org

https://board.goeshard.org/

/tech/ :: 💾 for computers, hardware, software, gadgets, and devices apps 0x00000a chat_bubble_outline 6 ansi art going into another rabbit hole and found a bbs (cool) and found so

Nelson Minar

http://alumni.media.mit.edu/~nelson/

looking at 175,000 computers to see how they know what time it is. There's a paper, some code, and lots of data. Mobile Agents for Dynamic Multi-Hop Networks I worked with Kwin Kr
Nelson Minar's home page. Includesinformation about me and my research, particularly on distributed agents.

Quick Mention: Marketing Linux Not with FUD

http://techrights.org/o/2007/11/18/fud-marketing-linux/

to do, sometimes computers Microsoft Windows Used to be Identified on Over 99% of Web Requests From Benin. Now It's Around 50%. Or a lot less Microsoft 'Open' 'AI' Has Severe Fina
Using FUD as a marketing tool. That is just what Novell does against competitors, such as Red Hat and others. This is well recorded.

School's out?

http://papert.org/articles/SchoolsOut.html

Mindstorms: Children, Computers and Powerful Ideas , which had a tremendous influence on teachers and schools by giving them a conceptual framework for how computers could be used

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.


Find more...