Introduction: Why Lisp?https://gigamonkeys.com/book/introduction-why-lisp.html
father got his start in computers writing an operating system in assembly for the machine he used to gather data for his doctoral dissertation in physics. After running computer s
Greg A. Woodshttp://www.weird.com/~woods/
name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it
xx80 | Opinionated Guideshttps://opguides.info/posts/xx80/
Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m
Daring Fireballhttps://daringfireball.net/
Dads Just Got Us Crummy Computers.’ ★ Back in March 1991, Saturday Night Live ran what I consider the best Apple parody ad ever made: “McIntosh Jr.” Siracusa and I ta
Commentary on Apple, technology, design, politics, and more.
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)http://w1.fi/wpa_supplicant/
for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA A
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)
Dragon Data Archive Homehttp://dragondata.co.uk/
, of Malta's 'Dragon Computers and Software' shop fame has kindly done a Q&A on his time with the Dragon. It provides an insight into to what was happening at the time and how dif
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s
Find more...