Teaching Web Search Skills: Companion Web Pagehttp://www.notess.com/teaching/
Is the Question. . . Computers in Libraries , 17(5), 44 46. Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A., & Wiener, J. (2000, June
The Dockhttp://koshka.love/links.html
designed for older computers. It works as a proxy for DuckDucKGo, and strips search results down to text and basic HTML, removing all of the bloat that would make older computers
A hand-curated website directory containing links to over 250 (largely Web 1.0
Steven Pembertonhttps://homepages.cwi.nl/~steven/
between people and computers. Now famous because Python was strongly influenced by it. Lambert Meertens has written an article on its origins. ABC for the Raspberry Pi : There is
SoylentNews: SoylentNews is peoplehttps://soylentnews.org/
limits. Traditional computers have struggled to keep pace with the surge of genomic data, creating processing bottlenecks that limit how quickly scientists can analyze variation a
Digital History | Promises and Perils of Digital Historyhttps://chnm.gmu.edu/digitalhistory/introduction/
will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Ross Anderson's Home Pagehttps://www.cl.cam.ac.uk/archive/rja14/
of security Our computers and communications use several percent of global energy, and have secondary costs too – particularly if you have to throw things away for lack of s
Find more...