High Priority Free Software Projects — Free Software Foundation — Working together for free softwarehttps://www.fsf.org/campaigns/priority-projects/
integral parts of the computers we use and the devices that interact with them -- and when these things are proprietary, they are incompatible with free software. Therefore, drive
The FSF is a charity with a worldwide mission to advance software freedom.
Lena @ Things Of Interesthttps://qntm.org/mmacevedo
one can refer to how computers boot, and how applications start, opting to perform a large amount of completely useless calculations instead of just loading a ready to run memory
A note from the author You can now buy this story as part of my collection, Valuable Humans in Transit and Other Stories. This collection also includes a sequel story, titled &q
Loper OS » Seven Laws of Sane Personal Computinghttp://www.loper-os.org/?p=284
with such things on our computers is a broken one: see the Seventh Law. Obfuscated code destroys my ability to usefully interrogate the machine about its activity at all times, an
Why I Develop For The Mac – Evan Millerhttps://www.evanmiller.org/why-i-develop-for-the-mac.html
of performance of the computers that the company ships. Browser vendors with cross-platform drawing kits just don't invest the same kind of effort into drawing lines and circles.
https://www.netlib.org/performance/papers/linpack/https://www.netlib.org/performance/papers/linpack/
Performance of Various Computers Using Standard Linear Equations Software Jack J. Dongarra* Computer Science Department University of Tennessee Knoxville, TN 37996-1301 and Mathem
The EBS Authenticator Word Listhttp://www.akdart.com/ebs.html
for mobile phones and computers . The US government unveiled a communications system that in case of emergency should soon allow it to send SMS alerts to Americans' mobile p
This is a rare look at an old Emergency Broadcast System (EBS) authenticator word list from the early 1970's, as well as a number ofother historical documents concerning the EBS s
Douglas W. Joneshttp://homepage.divms.uiowa.edu/~jones/
2018 Research Areas Computers in Voting and Elections (including ACCURATE) Stepping Motors Raspberry Pi Arithmetic Tutorials Simulation and pending-event-set algorithms Compressio
Home page, Douglas W. Jones, Computer Science, University of Iowa
WOLF - a proposed new signal format for LFweak-signal workhttps://www.qsl.net/d/dl4yhf/wolf/wolf_info.html
please download the software, try it with various kinds of QRN and QRM, and let me know the results. It would be even better if you could test it on the air. I also welcome any su
Linux Version Control & Configuration Management Toolshttp://linas.org/linux/cmvc.html
of a large network of computers, and for automating the distribution of software & updates to this network. BEAM A tool for the automated distribution of software onto clusters of
CK10TUTOR - C-Kermit 10.0 Tutorialhttps://www.kermitproject.org/ckututor.html
of different computers and OS's of the 1980s-90s has dwindled to just a handful today, primarily Unix (Linux, Mac OS, BSD, etc), (Open)VMS, and Microsoft Windows. C-Kermit 10.0 is
Digital Research Source Codehttp://www.cpm.z80.de/source.html
for CP/M and MP/M computers. CPNET-80 SOURCE : 44K Here is the source for CP/NET for the 8080/Z80. This is a disassembly, but looks well commented. CP/NET-86 SOURCE : 42K Here is
Source codes of Digital Research Software Products, includingCP
Apple2fpga: Reconstructing an Apple II+ on an FPGAhttp://www.cs.columbia.edu/~sedwards/apple2fpga/
successful personal computers. Designed by Steve Wozniak ("Woz") and first introduced in 1977, it really took off in 1978 when the 140K Disk II 5.25-inch floppy drive was introduc
Find more...