Discontinued Softwarehttps://almy.us/softwaredeath.html
Software I've used computers for over 50 years so I've seen my share of computer programs, and computers, come and go. But it's always disconcerting when long used programs go awa
Discontinued Software
Kernel Planethttps://planet.kernel.org/
with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu
It looks like a product but is secretly a subscriptionhttps://calpaterson.com/printers.html
example occurs in business-to-business deals. If one party to the deal is stronger than the other they will often make the weaker party apply their capital rather than invest thei
The mental minefield of capex and opex
My Sailboat 'Magnolia'https://www.billdietrich.me/Magnolia.html
and other public computers in the USA. Yes, theoretically it is possible that an ISP or internet cafe could capture your info. Probably most likely threat is that a computer in an
My sailboat 'Magnolia', a 1973 Gulfstar 44 motor-sailer pilothouse ketch in the Caribbean
Virus Fightershttp://webarchive.me/geocities/SiliconValley/Bridge/3691/nerds.htm
per Month per 1,000 Computers, Top Viruses, 1996-1998 ????????????????????? 12 Sources of Infection, Boot and Macro Viruses, 1997 ??????????????????????????????????????????????? 2
NetHack 3.6.0: Guidebook for NetHack 3.6http://www.nethack.org/v360/Guidebook.html
Are you sure this is the page you want? This is not the current version. Go to the NetHack Home Page. This Guidebook is also available in pdf and ASCII formats. Table of Contents
Documentary: The LoserUsershttp://rmitz.org/bbsloser.html
"We are down cuz the computers broke", or "We'll be down for 3 weeks 'til we get these amazing new mods done!". Another method of detecting this type of person is to examine the h
Junk Email Filter Spam Blocking Servicehttp://www.junkemailfilter.com/spam/terms_and_conditions.html
very few people had computers. It was a UNIX standard an ran on computers that people accessed from serial terminals. SMTP sent messages directly from the senders computer to the
Junk Email Filter - Front End Spam
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
IBM SAGEhttps://ed-thelen.org/comp-hist/vs-ibm-sage.html
by people and not computers... To aid that idea SAC even instituted the "failSafe"; program. What made it automatic was the program flow of the SAGE computer.... In simple terms t
((lambda (x) (create x)) '(knowledge))https://lambdacreate.com/posts/26
using only their oldest computers. For most this meant something with a gig of ram (which was then software limited down to 1/2gb), and some sort of 2000's CPU on old 5400rpm hdds
Liveness.com - Biometric Liveness Detection Explainedhttps://www.liveness.com/
Turing test to tell Computers and Humans Apart", is a simple challenge-response test used in computing to determine whether the user is human or a spam bot. In an article on
Liveness Detection is an AI computer system’s ability to determine that it is interfacing with a physically present human being and not an inanimate spoof
Find more...