wiby  
Settings



Introduction: Why Lisp?

https://gigamonkeys.com/book/introduction-why-lisp.html

father got his start in computers writing an operating system in assembly for the machine he used to gather data for his doctoral dissertation in physics. After running computer s

Greg A. Woods

http://www.weird.com/~woods/

name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

Daring Fireball

https://daringfireball.net/

Dads Just Got Us Crummy Computers.’   ★ Back in March 1991, Saturday Night Live ran what I consider the best Apple parody ad ever made: “McIntosh Jr.” Siracusa and I ta
Commentary on Apple, technology, design, politics, and more.

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

http://w1.fi/wpa_supplicant/

for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA A
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

Dragon Data Archive Home

http://dragondata.co.uk/

, of Malta's 'Dragon Computers and Software' shop fame has kindly done a Q&A on his time with the Dragon. It provides an insight into to what was happening at the time and how dif

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s


Find more...