wiby  
Settings



a register vm for guile — wingolog

http://wingolog.org/archives/2013/11/26/a-register-vm-for-guile

america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s

02. Why bother?

https://joeclark.org/book/sashay/serialization/Chapter02.html

do disabled people use computers?”) But let’s approach this quantitative objection qualitatively. To use the old terminology from modems, the Web is about feature nego
Explains how to design, develop, and program Websites (Web sites) that are accessible to people with disabilities (blind

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Tom Heneghan Explosive Intelligence Briefings

http://www.tomheneghanbriefings.com/

international banking computers on Floors 1 and 2 in the North Tower from initiating the new U.S. Treasury Bank system. Explosives in the World Trade Center were planted by operat
tom heneghan,NSA,Nazi Paperclip,DHS,false flag,constitution,treason,wanta,syria,protocols,bush,nazi,zionist,mossad,benghazi,terrorist,adamus group

XKeyCaps

https://www.jwz.org/xkeycaps/

fact that the crummy computers I had to use still didn't have this basic utility that my 128k Macintosh had in 1984, I hacked it together, taught it about the four or five keyboar

Mataroa Collection

https://collection.mataroa.blog/

http://ajroach42.com/ Computers Tao Bojlén https://btao.org/ Software, security, philosophy Matt Keeter https://www.mattkeeter.com/ Graphics Vegard Stikbakke https://www.vegardsti

missing the point of webassembly — wingolog

http://wingolog.org/archives/2024/01/08/missing-the-point-of-webassembly

america bdw compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme s

Terms of Service - LibraryHost

https://libraryhost.com/tos/

Access to Other Computers or Networks: Accessing, illegally or without authorization, computers, accounts or networks belonging to another party, or attempting to penetrate securi

Collected Essays, by Rudy Rucker

https://www.rudyrucker.com/transrealbooks/collectedessays/

A Brief History of Computers Games, Intelligence, Enlightenment Adventures in Gnarly Computation Web Mind Lifebox Immortality Selling Your Personality The Great Awakening Everythi

Rudy Rucker, "Notes For THE BIG AHA"

https://www.rudyrucker.com/thebigaha/notesforthebigaha/Text/notesforthebigaha.xhtml

for the backstory. Chip computers are long gone, and biotech devices have been the rule. But now the popularity of biotech devices is dying out as well. My character evolves into

Chez Scheme vs. SBCL: a comparison :: Elmord's Magic Valley

https://elmord.org/blog/?entry=20191114-sbcl-chez

Elmord's Magic Valley Computers, languages, and computer languages. Às vezes em Português , sometimes in English . Chez Scheme vs. SBCL: a comparison 2019-11-14 11:06 -0300. Tags:

T E X T F I L E S

http://textfiles.com/politics/

A Trip Report on the Computers, Freedom and Privacy Report by R. T. Mercuri (April 1, 1991) cfp2-sum 40674 Computers, Freedom, and Privacy-2: A Report by Steve Cisler (1992) cgw.t


Find more...