The Anatomy of a Search Enginehttp://infolab.stanford.edu/~backrub/google.html
As the capabilities of computers increase, it becomes possible to index a very large amount of text for a reasonable cost. Of course, other more bandwidth intensive media such as
Curiosity Blog – Elliot Templehttps://curi.us/
(come from multiple computers), but he didn't mention these requests being distributed, and a non-distributed DoS is still a crime. In September 2025, Hackethal decided to pub
Curiosity blog about philosophy and reason
Shawn's Presentationshttp://www.uiaccess.com/pres.html
Conference on Computers Helping People with Special Needs, July 2012, Linz, Austria "Accessibility in Tomorrow's Web" tutorial - WWW 2012 Conference, April 2012, Lyon, F
About Shawn - Publications
alt.2600 FAQ, Beta .013 - Part 1/1http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt
Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo
YOU are the Dead Internet.https://lukesmith.neocities.org/vids/dead_net
unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co
Doom as an Interface for Process Managementhttps://www.cs.unm.edu/~dlchao/flake/doom/chi/chi.html
Metaphors. The Art of Human-Computer Interface Design , edited by Brenda Laurel. Addison-Wesley Publishing Company, Inc., New York, 1990. 10 Evard, R. Collaborative Networked Comm
Doom as an Interface for Process Management
What's New! December 1993http://home.mcom.com/home/whatsnew/whats_new_1293.html
Int'l Conference on Human-Computer Interaction . A Web server is up at Calvin College . A Web server is online at University of Hartford . A new Web server is up at SUNY Institute
Website Accessibility Conformance Evaluation Methodology (WCAG-EM) 1.0https://www.w3.org/TR/WCAG-EM/
both the users and the computers used to access the website are known, this baseline may be limited to the operating systems, web browsers and assistive technologies used within t
The New York Times: Circuits - Game Theory Indexhttps://archive.nytimes.com/www.nytimes.com/library/tech/reference/indexgametheory.html
life on powerful modern computers through an emulator known as Mame. A few of the games might give Generation X'ers flashbacks. Subtleties of Governing a Virtual World ( Febr
Computation isn't Consciousness: The Chinese Room Experimenthttps://lukesmith.neocities.org/vids/chinese_room
alking about AI and computers and all this kind of stuff, right? I don’t want to speak disparagingly, but stuff. So, the question is this: can a machine think? Now, that obviously
Character Model for the World Wide Web 1.0https://www.w3.org/TR/2001/WD-charmod-20010928/
To be of any use in computers, in computer communications and in particular on the World Wide Web, characters must be encoded . In fact, much of the information processed by compu
3D Gopher, by McCahill and Ericksonhttp://www.pliant.org/personal/Tom_Erickson/GopherVR.html
Icons. Journal of Human-Computer Interaction , 4:1. Lawrence Erlbaum Associates. Gaver, W. W., O'Shea, T. & Smith, R. B. (1991) Effective Sounds in Complex Systems: The ARKola
Find more...