Transistor Museum Oral History Walter MacWilliams Bell Labs Page9 PointContact Transistorshttp://www.semiconductormuseum.com/Transistors/BellLabs/OralHistories/MacWilliams/MacWilliams_Page9.htm
for a Simulated Warfare Computer”, Bell Laboratories Record , March, 1957. Walter’s five page article offers his first hand account, with photos, schematics and concise commenta
The Analytical Enginehttps://www.fourmilab.ch/babbage/
The First Computer Introduction Seldom, if ever, in the history of technology has so long an interval separated the invention of a device and its realisation in hardware as that w
The Analytical Engine
General Terms of Servicehttps://squareup.com/us/en/legal/general/ua
mobile devices and computer(s). You will immediately notify us of any unauthorized use of your password or Square Account or any other breach of security. You will immediately tak
THE DEADLY FRUIT OF KABBALAHhttps://www.jesus-is-savior.com/False%20Religions/Kabbalah/kabbalah-deadly.htm
had taken a course in computer programming and was thinking of starting a business designing Web pages. But there were disturbing signs.
Compactron Tubes: A Junkbox Guidehttps://www.junkbox.com/electronics/CompactronTubesIndex.shtml
sources like records or computer sound cards into classic radios. This sort of gadget was once popular for playing phonograph records into a nearby radio (which generally had
JMNCO Home Pagehttp://flounder.com/
received his Ph.D. in Computer Science from Carnegie-Mellon University, and spent several years on the CMU CS faculty. He was a founding scientist of the Software Engineering Inst
Autopsy of a quixotic dream | (、ᐛ)ヘ_/ Nadim's Bloghttps://nadz.xyz/autopsy-of-a-quixotic-dream/
is more akin to a computer (VBA might be a better analogy, if you're familiar with it). Note that "ledger" and "state machine" are the more appropriate words in this context. What
Blog Post by Nadim Chamoun titled Autopsy of a quixotic dream.
Rationale for a Large Text Compression Benchmarkhttp://www.mattmahoney.net/dc/rationale.html
can be simulated by a computer. For example, an agent could be a person or computer whose goal is to accumulate money or some other reward signal in an unknown world. Formally, th
The NSA, NIST and the AMS | Not Even Wronghttps://www.math.columbia.edu/~woit/wordpress/?p=7045
Felten (professor of computer science at Princeton, specializing in computer security) defines a “pure trapdoor” as one in which “NSA is the only party who can p
Among the many disturbing aspects of the behavior of the NSA revealed by the Snowden documents, the most controversial one directly relevant to mathematicians was the story of the
Telephone numbering planhttps://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Telephone_numbering_plan.html
satellite Computer network Drums Electrical telegraph Fax Heliographs Hydraulic telegraph Internet Mass media Mobile phone Optical telecommunication Optical telegraphy Photophone
Open-source tests of web browser privacyhttps://privacytests.org/about.html
has leaked from your computer, phone or tablet, there is not much you can do to control it. But how does data leave your device in the first place? Your web browser is a likely ro
An open-source privacy audit of popular web browsers.
Nazi influence on NATO - Defensive Treaty? - North Atlantic Treaty Organisation - Why we should say no to NATOhttp://www.bilderberg.org/nato.htm
putting them into the computer or, in cases where the purely personal element was especially strong, onto the desks of players who had been drilled in the personal characteristics
Find more...