wiby  
Settings



E-mail providers - which one to choose?

http://digdeeper.love/articles/email.xhtml

of mail to your computer ; they keep the control in your hands , instead of a big corpo. A good mail client will surely outcompete webmail in terms of features. It also takes the

Lisp Curriculum

https://alexalejandre.com/programming/lisp/lisp-curriculum/

and Interpretation of Computer Programs: https://sarabander.github.io/sicp/html/index.xhtml (perhaps the bible of CS, even giving up half way through, it’s really worth it)
Learn Scheme, Common Lisp -

Contemporary Home Computing

http://contemporary-home-computing.org/

are wrongly applied to computers. Maintained by Olia Lialina Idioms suggests backward idioms that come from computers into RL (real life). Maintained by Dragan Espenschied Article

What's a Terminal?

https://kermitproject.org/terminals.html

and dominated the human-computer interface from the early 1970s (when they began to displace hardcopy terminals such as the Teletype and DECwriter shown above) until the mid-1980s

Computation without Electricity

http://infolab.stanford.edu/pub/voy/museum/pictures/display/2-5-Mechanical.html

numerals. The IBM 650 computer of 1963 used the Japanese format form of bi-quinary [Console picture from ]. [Some of this information is due to Thomas B. Steel, jr., provided at a

You can leave the dead internet. EXODUS NOW! | Agora Road's Macintosh Cafe

https://forum.agoraroad.com/index.php?threads/you-can-leave-the-dead-internet-exodus-now.8473/

group of early personal computer users, but these people were anomalous and bizarre. Social media is probably the newest digital medium made, but has displaced the natural medium
The dead internet theory is barely a theory.As we know the internet is a shadow of a shell of it's former self. But the decay came in two stages, first...

viznut

http://viznut.fi/en/

: New text: Inverted computer culture 2023-01-06 : New text: Of computing and growth 2022-10-31 : New game project: Bouldercraft 2022-07-12 : New text: A non-fossil alternate hist
Viznut a.k.a. Ville-Matias Heikkilä

Ken Thompson Really Did Launch His "Trusting Trust" Trojan Attack in Real Life

https://niconiconi.neocities.org/posts/ken-thompson-really-did-launch-his-trusting-trust-trojan-attack-in-real-life/

of controversy in computer folklore. If one reads the original paper , one only finds a description of this attack as a thought experiment, leading one to conclude that any claim
Ken Thompson's "Trusting Trust" compiler Trojan attack was not just a thought experiment. In fact, Usenet poster Jay Ashworth stated that, from personal communications,

CK10TUTOR - C-Kermit 10.0 Tutorial

https://www.kermitproject.org/ckututor.html

of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is

Intermediary Architecture

http://www.objs.com/workshops/ws9801/papers/paper103.html

System."  IEEE Computer , October 1992] used sentries to install new behaviors like persistence and versioning and treated querying as a service.  OMG's security archite

Ken's HP Museum Page

https://www.kennethkuhn.com/hpmuseum/

started building small computers to augment their test equipment. Because of their high reliability, demand for these computers exceeded expectations as businesses other than test

The Rouen UFO Photograph of 1954

https://aenigmatis.com/rouen-ufo-1954/rouen.htm

first scanned in to my computer software using the scanner’s highest resolution mode of 400 dots per inch.  Since it is seen banking to starboard (right) the image was then l
An attempt to produce a three-view drawing of the Rouen UFO, which was allegedly photographed in 1954


Find more...