Digital History | Promises and Perils of Digital Historyhttps://chnm.gmu.edu/digitalhistory/introduction/
will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R
WWII - Creditshttp://www.sihope.com/~tipi/credits.html
Middle School in the computer department. He helped to obtain and forward photos with which I could create graphics for this site. Incidently, Patrick attended McKinley School in
Using a Hosts File To Make The Internet Not Suck (as much)https://someonewhocares.org/hosts/
file to prevent your computer from connecting to selected # internet hosts. This is an easy and effective way to protect you from # many types of spyware, reduces bandwidth use, b
Instructions on how to use a hosts file to avoid viewing ads and to make your internet experience more pleasant.
PYL Board Configurations: PYL Strategyhttp://users.btes.tv/syoder/pylboard/articles/strategy.html
strategy and running computer simulations of the game to test its effectiveness. Acknowledgements: I would like to thank Mr. Bruce Winokur, my Intel Mathematics teacher, for givin
Kojak - Season 2 Episode Guide & Reviewshttps://www.kojak.tv/kojak-2.htm
in the show which is "a computerized information bank in which all stolen stocks are listed by serial number." Paulus gets Oliver to override this when the Sheikh is visiting his
Kojak - Season 2 Episode Reviews
Theiling Online: Debian Linux (Wheezy) on Lenovo Thinkpad L420http://www.theiling.de/l420-wheezy.html
power down my computer cleanly. I do not want X interfering, because the one time when I really need it is when X hangs for whatever reason. (E.g. a login screen that only appears
ERBzine 6725a: 3. Pushing the Envelope IIIhttps://www.erbzine.com/mag67/6725a.html
I did not have was a computer, so I was still using Stone Age tools to put images onto covers. I had to reduce this J. Allen St. John image in size on a photocopy machine a few ti
Michael Constantine Dimopouloshttps://mcdim.xyz/
of computation, Unix, computer architechture, hacking, making & cracking. Yes, that greasy wog with messy pomade hair is me. This photo is from the Andreas cave in the Nautilus ha
Papers on ML/I and related topicshttp://www.ml1.org.uk/papers.html
- The Journal of the Computer Conservation Society , 84 , Winter 2018-2019. Portable software Brown, P.J., ' Using a macro processor to aid software implementation ', Computer Jou
<![CDATA[Disc Coverers]]>https://anchor.fm/s/3ffac1b8/podcast/rss
RADIO ARRAY, DUBIOUS COMPUTERS: https://pretty.dubious.computer/ ANTONIO VIVALDI'S "THE FOUR SEASONS": https://www.youtube.com/watch?v=GRxofEmo3HA THE VIDEO GAME "FORTUNE'S RUN":
We are brainwashed even by things we hate and resist.https://lukesmith.neocities.org/vids/brainwashed
ave to ever use a computer again. The modern internet is unusable to anyone who has the habit of opening YouTube or Twitter or any social media at all. Deliberating on what to do w
GTK2 Software Directoryhttp://www.lakiweb.net/article/gtk2/software-directory.html
use a laptop screen or computer monitor. The number of people using a phone or tablet on Linux is very low, and not what the actual operating system was designed for. GTK2 is desi
A list of all good useful GTK2 software, with links to download and install. Includes some forks I have developed.
Find more...