wiby  
Settings



Douglas Engelbart

http://www.ibiblio.org/pioneers/engelbart.html

was touting the use of computers for online conferencing and collaboration. Engelbart's most famous invention is the computer mouse, also developed in the 1960s, but not used comm

AllA’s Grand Unified Theory

http://www.omniscientcomputers.org/

determined by our super computers which look for any intelligible pattern in text of any language, audio of any language, or video of things streamed continuously. Therefore we ar
A Grand Unified Theory: A fundamental framework of the Fullverse, fractal of universes, implementing string theory, Einstein’s Theory of General and Special Relativity, and wormhol

SAGE

https://ed-thelen.org/sage-1.html

interconnected set of computers through which everyone could quickly access data and programs from any site. In spirit, the concept was very much like the Internet of today. Lickl

RFC 959 - File Transfer Protocol

https://www.ncftp.com/ncftp/rfc959.html

programs) use of remote computers, 3) to shield a user from variations in file storage systems among hosts, and 4) to transfer data reliably and efficiently. FTP, though usable di

Open Voices Podcast with Linus Torvalds - WackoWiki

https://wackowiki.org/doc/Org/Articles/LinusTorvalds

completely new uses of computers and that might just happen because computers get pushed down and become cheaper and that might change the whole picture of operating systems. But

SPACEWAR - by Stewart Brand - Fanatic Life and Symbolic Death Among the Computer Bums.

https://www.wheels.org/spacewar/stone/rolling_stone.html

Beer! Ready or not, computers are coming to the people. That’s good news, maybe the best since psychedelics. It’s way off the track of the “Computers - Threat or

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

What's New! January 1994

http://home.mcom.com/home/whatsnew/whats_new_0194.html

different indices to Human-Computer Interaction (HCI) related material are now online, each with its own focus. They are the HCI Launching Pad , which focuses on Hypertext and Com

Why | Quit Social Media

https://quitsocialmedia.club/why/

are super powerful computers connected to the internet all of the day, everyday; they are responsible for the effective publication of what we share, and they make sure everything
The heart of the matter: all of the reasons why we should quit Social Media

Health Assurance Policies

https://www.heartcom.org/HealthAssurance.htm

laptops and desktop computers. The USC alliance, aka AHA! ( A merica's H olistic A lliance) provides numerous AHA! apps for personalized health assessment and choice fulfillm
United Self Care introduces Health Assurance Policies

Anti-Nietzsche : A Critique of Friedrich Nietzsche

https://mats-winther.github.io/nietzscheen.htm

particle collisions on computers. The particles are so tightly bound by mathematically describable rules that quantum physics has emerged as the most successful branch of science.
Nietzsche's irrational doctrines have led to self-destructive right-wing and left-wing extremism.

SOME CRUCIAL ISSUES OF MIND-BODY MONISM

https://ditext.com/feigl/mbm.html

this age of electronic computers, robots, etc., it has been argued that the human observer and his immediate experience could be replaced by machines that do the 'observing'. The


Find more...