wiby  
Settings



Programs and Equipment That I Use | Pilledtexts.com

https://pilledtexts.com/my-computer-setup/

of graphical interface applications that don't use the command line. Computer Hardware: My personal computer as of Jan 2025 is a 16 inch 2021 M1 Macbook Pro with 16 gb of RAM with
Bottom line up front: For my hardware I use an Apple laptop with third-party peripherals that can be easily transported. I try to use open-source software when …

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

We need more sites, applications, and protocols designed with security and privacy as priorities from the foundation up. Maybe "mesh" networking, peer-to-peer systems, distributed
Best practices and information about computer and smartphone security and privacy

Juergen Schmidhuber's AI Blog

https://people.idsia.ch/~juergen/blog.html

Since 2012: applications to real robots. ★ Dec 2020 (updated 2025). Metalearning Machines Learn to Learn (1987-). For the cover of my 1987 thesis on metalearning I drew a ro
'AI Blog of Juergen Schmidhuber'

C-Kermit 9.0 Update Notes

https://www.kermitproject.org/ckermit90.html

or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same characters. Usually ASCII is safe, b

Draft-leach-cifs-v1-spec-02

http://www.ubiqx.org/cifs/rfc-draft/draft-leach-cifs-v1-spec-02.html

access to files. Applications that lock files can not be improperly interfered with by applications that do not; once a file or record is locked, non-locking applications are deni

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

involved higher-level applications such as credit card payment and inventory management. The 2038 bug, on the other hand, affects the basic time-keeping function. "I would guess t


Find more...