wiby  
Settings



Human Knowledge: Foundations and Limits

http://humanknowledge.net/Thoughts.html

How fast and small can computers get? How does a plane fly? How does a satellite stay up in the sky? How does a battery work? How does a refrigerator work? How does a microwave ov

Robert J. Marks II

https://marksmannet.com/RobertMarks/REPRINTS/Marks-Pubs.htm

on Communications, Computers and Signal Processing, pp.517-519, Victoria, B.C. Canada, June 4-5, 1987. K.F. Cheung, R.J. Marks II and L.E. Atlas, " Neural net associative mem

The Retrocomputing Museum

http://www.catb.org/retro/

Reduced Instruction Set Computers? Well, here is the concept taken to its logical extreme — an emulator for a computer with just one (1) instruction (Subtract and Branch if
A museum of archaic computer languages

Readspike - Simple news aggregator

https://readspike.com/

therapy Quantum computers simulated their biggest molecule yet – with help Honey has been used as medicine for centuries – does it really work? A lost ancient script reveals how w
Aggregating the news from around the web every minute

Qualia (Stanford Encyclopedia of Philosophy/Summer 2008 Edition)

https://plato.sydney.edu.au/archives/sum2008/entries/qualia/

hooked up to banks of computers. As time passes, Mary acquires more and more information about the physical aspects of color and color vision. (For a real life case of a visual sc

Bookmarks for grin

https://grin.hu/bookmarks.html

Yahoo! - Computers and Internet:Operating Systems:Unix:Linux The Linux Game Tome Linux Mama Linux ISP FTP Directory: ftp://gated.merit.edu/net-research/gated/ Window Managers for

The Secrets of Mind Control

https://www.jesus-is-savior.com/Disturbing%20Truths/mind_control.htm

concept of mind-reading computers is no longer science fiction. Neither is their use by Big Brotherly governments. Major Edward Dames of Psi-Tech said in April 1995 on NBC's The O
The Secrets of Mind Control - Mind Control Cover-up!

PulkoMandy's home on the web

http://pulkomandy.tk/

rarely used in modern computers. Instead we will consider that the elements are stored next to each other, in consecutive memory addresses. This results in the following definitio

XML Linking Language (XLink) Version 1.1

https://www.w3.org/TR/xlink/

for consumption by computers. 2.2 Arcs, Traversal, and Behavior [ Definition : Using or following a link for any purpose is called traversal .] Even though some kinds of link can

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today mi
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.

SenseAntisense - Site Sightings

https://senseantisense.com/sitesightings/

Raspberry Pi Vintage Computers - Collector's Weekly Vintage Computer Sale Email exchange between Edward Snowden and former GOP Senator Gordon Humphrey For a Future-Friendly Web U.
SenseAntisense is a collection of curated works and notes.

T E X T F I L E S

http://textfiles.com/music/

Interface for Macintosh Computers (May 1993) madonna.txt 1584 Like a Loser, Parody of Like a Virgin, by The Slipped Disk man-mach 45034 The Man Machine Interface by Metlay (Interf


Find more...