Douglas Engelbarthttp://www.ibiblio.org/pioneers/engelbart.html
was touting the use of computers for online conferencing and collaboration. Engelbart's most famous invention is the computer mouse, also developed in the 1960s, but not used comm
AllA’s Grand Unified Theoryhttp://www.omniscientcomputers.org/
determined by our super computers which look for any intelligible pattern in text of any language, audio of any language, or video of things streamed continuously. Therefore we ar
A Grand Unified Theory: A fundamental framework of the Fullverse, fractal of universes, implementing string theory, Einstein’s Theory of General and Special Relativity, and wormhol
SAGEhttps://ed-thelen.org/sage-1.html
interconnected set of computers through which everyone could quickly access data and programs from any site. In spirit, the concept was very much like the Internet of today. Lickl
RFC 959 - File Transfer Protocolhttps://www.ncftp.com/ncftp/rfc959.html
programs) use of remote computers, 3) to shield a user from variations in file storage systems among hosts, and 4) to transfer data reliably and efficiently. FTP, though usable di
Open Voices Podcast with Linus Torvalds - WackoWikihttps://wackowiki.org/doc/Org/Articles/LinusTorvalds
completely new uses of computers and that might just happen because computers get pushed down and become cheaper and that might change the whole picture of operating systems. But
SPACEWAR - by Stewart Brand - Fanatic Life and Symbolic Death Among the Computer Bums.https://www.wheels.org/spacewar/stone/rolling_stone.html
Beer! Ready or not, computers are coming to the people. That’s good news, maybe the best since psychedelics. It’s way off the track of the “Computers - Threat or
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
What's New! January 1994http://home.mcom.com/home/whatsnew/whats_new_0194.html
different indices to Human-Computer Interaction (HCI) related material are now online, each with its own focus. They are the HCI Launching Pad , which focuses on Hypertext and Com
Why | Quit Social Mediahttps://quitsocialmedia.club/why/
are super powerful computers connected to the internet all of the day, everyday; they are responsible for the effective publication of what we share, and they make sure everything
The heart of the matter: all of the reasons why we should quit Social Media
Health Assurance Policieshttps://www.heartcom.org/HealthAssurance.htm
laptops and desktop computers. The USC alliance, aka AHA! ( A merica's H olistic A lliance) provides numerous AHA! apps for personalized health assessment and choice fulfillm
United Self Care introduces Health Assurance Policies
Anti-Nietzsche : A Critique of Friedrich Nietzschehttps://mats-winther.github.io/nietzscheen.htm
particle collisions on computers. The particles are so tightly bound by mathematically describable rules that quantum physics has emerged as the most successful branch of science.
Nietzsche's irrational doctrines have led to self-destructive right-wing and left-wing extremism.
SOME CRUCIAL ISSUES OF MIND-BODY MONISMhttps://ditext.com/feigl/mbm.html
this age of electronic computers, robots, etc., it has been argued that the human observer and his immediate experience could be replaced by machines that do the 'observing'. The
Find more...