wiby  
Settings



Greg A. Woods

http://www.weird.com/~woods/

name to look up. Old Computers Once upon a time (before I moved most recently) I had a small collection of old computers. Well maybe it wasn't all that small.... Sadly most of it

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

Chernobyl happened, Computers were still mostly 8-bit, Asbestos was still being used, and, despite the numbers declining already, cigaretts were still way more common. All that as
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

Qualia (Stanford Encyclopedia of Philosophy/Summer 2008 Edition)

https://plato.sydney.edu.au/archives/sum2008/entries/qualia/

hooked up to banks of computers. As time passes, Mary acquires more and more information about the physical aspects of color and color vision. (For a real life case of a visual sc

Bit permutations

http://programming.sirrida.de/bit_perm.html

as was done on ancient computers. Today only base 2 (i.e. bits) is used, and this is what is crucially needed for all bit operations. If signed numbers are present, it is assumed
An essay about bit permutations in software

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Linux WPA Supplicant (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

http://w1.fi/wpa_supplicant/

for both desktop/laptop computers and embedded systems. Supplicant is the IEEE 802.1X/WPA component that is used in the client stations. It implements key negotiation with a WPA A
WPA Supplicant for Linux, BSD, and Windows (IEEE 802.1X, WPA, WPA2, WPA3, RSN, IEEE 802.11i)

Two Types Of Mechanical Reversible Logic

https://www.zyvex.com/nanotech/mechano.html

to design reversible computers. Mechanical Computation The earliest example of a mechanical computer is Babbage's Analytical Engine [1, 30]. This device, had it been built, would

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

Dragon Data Archive Home

http://dragondata.co.uk/

, of Malta's 'Dragon Computers and Software' shop fame has kindly done a Q&A on his time with the Dragon. It provides an insight into to what was happening at the time and how dif


Find more...