Human Knowledge: Foundations and Limitshttp://humanknowledge.net/Thoughts.html
How fast and small can computers get? How does a plane fly? How does a satellite stay up in the sky? How does a battery work? How does a refrigerator work? How does a microwave ov
Robert J. Marks IIhttps://marksmannet.com/RobertMarks/REPRINTS/Marks-Pubs.htm
on Communications, Computers and Signal Processing, pp.517-519, Victoria, B.C. Canada, June 4-5, 1987. K.F. Cheung, R.J. Marks II and L.E. Atlas, " Neural net associative mem
The Retrocomputing Museumhttp://www.catb.org/retro/
Reduced Instruction Set Computers? Well, here is the concept taken to its logical extreme — an emulator for a computer with just one (1) instruction (Subtract and Branch if
A museum of archaic computer languages
Readspike - Simple news aggregatorhttps://readspike.com/
therapy Quantum computers simulated their biggest molecule yet – with help Honey has been used as medicine for centuries – does it really work? A lost ancient script reveals how w
Aggregating the news from around the web every minute
Qualia (Stanford Encyclopedia of Philosophy/Summer 2008 Edition)https://plato.sydney.edu.au/archives/sum2008/entries/qualia/
hooked up to banks of computers. As time passes, Mary acquires more and more information about the physical aspects of color and color vision. (For a real life case of a visual sc
Bookmarks for grinhttps://grin.hu/bookmarks.html
Yahoo! - Computers and Internet:Operating Systems:Unix:Linux The Linux Game Tome Linux Mama Linux ISP FTP Directory: ftp://gated.merit.edu/net-research/gated/ Window Managers for
The Secrets of Mind Controlhttps://www.jesus-is-savior.com/Disturbing%20Truths/mind_control.htm
concept of mind-reading computers is no longer science fiction. Neither is their use by Big Brotherly governments. Major Edward Dames of Psi-Tech said in April 1995 on NBC's The O
The Secrets of Mind Control - Mind Control Cover-up!
PulkoMandy's home on the webhttp://pulkomandy.tk/
rarely used in modern computers. Instead we will consider that the elements are stored next to each other, in consecutive memory addresses. This results in the following definitio
XML Linking Language (XLink) Version 1.1https://www.w3.org/TR/xlink/
for consumption by computers. 2.2 Arcs, Traversal, and Behavior [ Definition : Using or following a link for any purpose is called traversal .] Even though some kinds of link can
Becoming physically immune to brute-force attacks - Seirdyhttps://seirdy.one/posts/2021/01/12/password-strength/
get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today mi
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
SenseAntisense - Site Sightingshttps://senseantisense.com/sitesightings/
Raspberry Pi Vintage Computers - Collector's Weekly Vintage Computer Sale Email exchange between Edward Snowden and former GOP Senator Gordon Humphrey For a Future-Friendly Web U.
SenseAntisense is a collection of curated works and notes.
T E X T F I L E Shttp://textfiles.com/music/
Interface for Macintosh Computers (May 1993) madonna.txt 1584 Like a Loser, Parody of Like a Virgin, by The Slipped Disk man-mach 45034 The Man Machine Interface by Metlay (Interf
Find more...