wiby  
Settings



Teaching Web Search Skills: Companion Web Page

http://www.notess.com/teaching/

Is the Question. . . Computers in Libraries , 17(5), 44 46. Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., & Wiener, J. (2000, June

The Dock

http://koshka.love/links.html

designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0

Steven Pemberton

https://homepages.cwi.nl/~steven/

between people and computers. Now famous because Python was strongly influenced by it. Lambert Meertens has written an article on its origins. ABC for the Raspberry Pi : There is

SoylentNews: SoylentNews is people

https://soylentnews.org/

limits. Traditional computers have struggled to keep pace with the surge of genomic data, creating processing bottlenecks that limit how quickly scientists can analyze variation a

Digital History | Promises and Perils of Digital History

https://chnm.gmu.edu/digitalhistory/introduction/

will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s


Find more...