wiby  
Settings



http://www.call-with-current-continuation.org/rants/system-software-research.txt

http://www.call-with-current-continuation.org/rants/system-software-research.txt

decided how it wants computers to be. The systems software research community influenced that decision somewhat, but very little, and now it is shut out of the discussion. It has

Peter Neumann's Home Page

https://www.csl.sri.com/users/neumann/

of the ACM Committee on Computers and Public Policy (CCPP), which I chaired since 1985 -- until it was disbanded in 2018 as part of a complete reorganization of ACM committees. (T

Nintendo 64 Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/nintendo-64/

for Windows-based computers as well [41] . Furthermore, there were third-party tools such as custom cartridges housing a long ribbon cable that connected to the workstation. These
An in-depth analysis that explains how this console works internally

Molecular Expressions: Images from the Microscope

https://micro.magnet.fsu.edu/

modern high-performance computers. This interactive tutorial explores multi-laser fluorescence and differential interference contrast ( DIC ) confocal imaging using the Olympus Fl
The Molecular Expressions website features hundreds of photomicrographs (photographs through the microscope) of everything from superconductors, gemstones, and high-tech materials

DistroWatch.com: Put the fun back into computing. Use Linux, BSD.

https://distrowatch.com/

of popular single-board computers , as well as standard 32-bit and 64-bit PCs; here are the links to download the "Generic" 64-bit variants: Lakka-Generic.x86_64-6.1.img.gz (1,145
News and feature lists of Linux and BSD distributions.

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

ForwardCom: Forward compatible computer architecture

https://forwardcom.info/

as well as large supercomputers and vector processors without losing binary compatibility. The instruction set is fully orthogonal. The same instruction can be coded with integer

SmithForth

https://dacvs.neocities.org/SF/

A Forth for x86-64 personal computers David Smith 2022 david.a.c.v.smith@gmail.com New: Check out Andrei Duma's explanation of SmithForth ! He has implemented in RISC-V the machin

Bandai Pippin

http://www.computercloset.org/BandaiPippin.htm

cheaper real personal computers. Around the same time, the internet was really taking off. Anyone who introduced a product without an internet spin on it would be largely ignored.

http://lkcl.net/laptop.html

http://lkcl.net/laptop.html

danger of clinging onto computers that will be difficult to run, let alone maintain. This article therefore advocates the combination of three powerful approaches, to meet the upc

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

25 Years of Linux — so far [LWN.net]

https://lwn.net/Articles/698042/

in moving down from minicomputers, had become much more widespread, but it also lost the code-sharing culture that had helped to make it Unix in the first place. The consequences
On August 25, 1991, an obscure student in Finland named Linus Benedict Torvalds posted a messag [...]


Find more...