wiby  
Settings



Networking in the Mind Age - future of distributed intelligence

http://www.ethologic.com/sasha/mindage.html

With advanced technology and sufficient interest in infomorph world, you would still have to modify your mental structures beyond recognition to understand it. In other words, you
Essay on long-term future of intelligent distributed systems. Discussed topics include post-identity intelligent architectures, transhumanist philosophy

Agile and the Long Crisis of Software

https://logicmag.io/clouds/agile-and-the-long-crisis-of-software/

work. Peter Varhol, a technology industry consultant, estimates that in the early 1990s, the average application took three years to develop, from idea to finished product. Techno
What is Agile? And where does it come from?

Misha Verbitsky

http://verbit.ru/

of Science and Technology, International conference "Geometry, Topology and Integrability", Skolkovo, 20-25 October 2014. 04.12.2014, "Pseudoholomorphic curves with boundaries on

Good times create weak men @ tonsky.me

https://tonsky.me/blog/good-times-weak-men/

Guys at Annoying.Technology have some great examples. Clicking one thing shows another : The Music.app header is rendering wrong : The problem is not limited to just Music. In Pod
Software abstraction ladder becomes too tall and starts to fall

NLnet; 55 New Projects Awarded NGI0 Grants

https://nlnet.nl/news/2023/20231123-announcing-projects.html

ten layers of the NGI technology stack, from trustworthy open hardware to services and applications which provide autonomy for end-users. Currently there are two NGI Zero programm

It's Now Crucial to Understand what We're Up Against

https://www.bibliotecapleyades.net/sociopolitica2/sociopol_greatreset124.htm

on control through technology and algorithm. This is a very important difference. In short, there will be no individual to blame or hold accountable. The "dictator" is a

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

based on a powerful new technology called "public key" cryptography. PGP combines the convenience of the Rivest-Shamir-Adleman (RSA) public key cryptosystem with the speed of conv

(SFC) David Sadler For Congress - If the Disc Is Ours

https://www.david-sadler.org/pages/bigQuestions/discIsOurs.htm

developed with UFO technology] is available to everybody. So secrecy about the UFOs is because of the energy issue. When this knowledge is found out by the people, they will deman

Fish disks 1 - 1120

https://www.amiga-stuff.com/pd/fish.html

Software & Technology Inc. BbsListA list of Bulletin Board Systems which support the Amiga. The list was compiled from a list on Delphi, Compuserve, bathroom walls, etc. Autho

Isaac Asimov FAQ

http://asimovonline.com/asimov_FAQ.html

of Science and Technology Humor Isaac Asimov's Treasury of Humor The Sensuous Dirty Old Man Asimov Laughs Again What is the source of the title of the novel The Gods Themselves? T
Answers to frequently asked questions about Isaac Asimov and his works

The Cultural Evolution of Suffering

http://www.socrethics.com/Folder2/Culture.htm

  The Ambivalence of Technology 6.3   Social Illusions 6.4   The Threat of Human Extinction 7.      Conclusion   References         &n

Hypercosm and Web 3D

http://www.highprogrammer.com/alan/hypercosm/

place to work and the technology, while imperfect, had a great deal of promise. For all of the weaknesses we had some great applets. We had an impressive 3-D cut-away lock that sh


Find more...