wiby  
Settings



Transistor Museum Oral History Walter MacWilliams Bell Labs Page9 PointContact Transistors

http://www.semiconductormuseum.com/Transistors/BellLabs/OralHistories/MacWilliams/MacWilliams_Page9.htm

for a Simulated Warfare Computer”, Bell Laboratories Record , March, 1957.   Walter’s five page article offers his first hand account, with photos, schematics and concise commenta

The Analytical Engine

https://www.fourmilab.ch/babbage/

The First Computer Introduction Seldom, if ever, in the history of technology has so long an interval separated the invention of a device and its realisation in hardware as that w
The Analytical Engine

General Terms of Service

https://squareup.com/us/en/legal/general/ua

mobile devices and computer(s). You will immediately notify us of any unauthorized use of your password or Square Account or any other breach of security. You will immediately tak

THE DEADLY FRUIT OF KABBALAH

https://www.jesus-is-savior.com/False%20Religions/Kabbalah/kabbalah-deadly.htm

had taken a course in computer programming and was thinking of starting a business designing Web pages.         But there were disturbing signs.

Compactron Tubes: A Junkbox Guide

https://www.junkbox.com/electronics/CompactronTubesIndex.shtml

sources like records or computer sound cards into classic radios. This sort of gadget was once popular for playing phonograph records into a nearby radio (which generally had

JMNCO Home Page

http://flounder.com/

received his Ph.D. in Computer Science from Carnegie-Mellon University, and spent several years on the CMU CS faculty. He was a founding scientist of the Software Engineering Inst

Autopsy of a quixotic dream | (、ᐛ)ヘ_/ Nadim's Blog

https://nadz.xyz/autopsy-of-a-quixotic-dream/

is more akin to a computer (VBA might be a better analogy, if you're familiar with it). Note that "ledger" and "state machine" are the more appropriate words in this context. What
Blog Post by Nadim Chamoun titled Autopsy of a quixotic dream.

Rationale for a Large Text Compression Benchmark

http://www.mattmahoney.net/dc/rationale.html

can be simulated by a computer. For example, an agent could be a person or computer whose goal is to accumulate money or some other reward signal in an unknown world. Formally, th

The NSA, NIST and the AMS | Not Even Wrong

https://www.math.columbia.edu/~woit/wordpress/?p=7045

Felten (professor of computer science at Princeton, specializing in computer security) defines a “pure trapdoor” as one in which “NSA is the only party who can p
Among the many disturbing aspects of the behavior of the NSA revealed by the Snowden documents, the most controversial one directly relevant to mathematicians was the story of the

Telephone numbering plan

https://ipfs.io/ipfs/QmXoypizjW3WknFiJnKLwHCnL72vedxjQkDDP1mXWo6uco/wiki/Telephone_numbering_plan.html

satellite Computer network Drums Electrical telegraph Fax Heliographs Hydraulic telegraph Internet Mass media Mobile phone Optical telecommunication Optical telegraphy Photophone

Open-source tests of web browser privacy

https://privacytests.org/about.html

has leaked from your computer, phone or tablet, there is not much you can do to control it. But how does data leave your device in the first place? Your web browser is a likely ro
An open-source privacy audit of popular web browsers.

Nazi influence on NATO - Defensive Treaty? - North Atlantic Treaty Organisation - Why we should say no to NATO

http://www.bilderberg.org/nato.htm

putting them into the computer or, in cases where the purely personal element was especially strong, onto the desks of players who had been drilled in the personal characteristics


Find more...