Douglas W. Jones's punched card indexhttp://homepage.divms.uiowa.edu/~jones/cards/history.html
Before Computers The punched card as used for data processing, originally invented by Herman Hollerith, was first used for vital statistics tabulation by the New York City Board o
A brief technical history of punched cards
2023: November - February Political Noteshttp://stallman.org/archives/2023-nov-feb.html
These cars are full of computers with nonfree software and little security. But the insecurity (like the surveillance) depends on their attempt to communicate by radio . If you de
Implementation Issues of the WIPO Copyright Treaty and the WIPO Permformances and Phonograms Treaty: Technical Protection Measures: the Interhttps://cryptome.org/wipo-imp99-3.htm
electronic devices, computers, satellites and global networks such as the Internet. ____________________ 1 The authors have participated actively in the legislative and technology
Linux FAQhttps://www.linfo.org/faq_linux.html
Linux on as many computers as desired. Q: I have a book about Red Hat Linux 8 which contains the installation CDROMs. Would it be better to buy a new book for a more recent versio
SoftRAM95: "False and Misleading"http://ftp.st.ryukoku.ac.jp/pub/published/oreilly/windows/win95.update/softram.html
to double Windows 95 computers' RAM. What they got was a snazzy looking software package that didn't increase RAM one bit." Bernstein added, "consumers shopping for high tech prod
Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org frhttps://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html
we should design our computers this way. But here we run into the same problem we do that results in me not being able to trust my computer: every program runs *as me*. Solitaire,
Find more...