/tech/ - Technology - Page 1https://zzzchan.xyz/tech/index.html
far broader field than computers and digital software alone, and in practice the way these latter two are used have produced far greater surveilence, insecurity, and hypercentrali
Technology & Computing
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Juergen Schmidhuber's AI Bloghttps://people.idsia.ch/~juergen/blog.html
of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'
C-Kermit Unix Hints and Tipshttps://www.kermitproject.org/ckubwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they
Jeff Duntemann's ContraPositive Diaryhttp://www.duntemann.com/november2008.htm
introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is
2blowhards.com: The Mencius Visionhttp://www.2blowhards.com/archives/2007/04/_trial_version.html#004052
taxes, writing, computers, these kids these days, and lousy educations. E-Mail Donald Demographer, recovering sociologist, and arts buff E-Mail Fenster College administrator and a
2blowhards.com - a weblog
2019: November - February Political Notes - Richard Stallmanhttp://stallman.org/archives/2019-nov-feb.html
February 2020 ( Use of computers and software in elections ) The use of untrustworthy computers and software in elections — in other words, any computers and software &mdash
T E X T F I L E Shttp://textfiles.com/politics/
A Trip Report on the Computers, Freedom and Privacy Report by R. T. Mercuri (April 1, 1991) cfp2-sum 40674 Computers, Freedom, and Privacy-2: A Report by Steve Cisler (1992) cgw.t
Daring Fireballhttps://daringfireball.net/
because those are baby computers . They just are. So if you want to jump in as an early adopter on desktop AI, it needs to be on a Mac. And if you want a headless always-on Mac to
Commentary on Apple, technology, design, politics, and more.
Spyware, Adware, and Malware-- Research, Testing, Legislation, and Suitshttps://www.benedelman.org/spyware/
installed on their computers. See Simios v. 180solutions complaint (PDF) and coverage (including 180's claim that the case has "no merit"). This suit was voluntarily dis
Index of original research on 'spyware' programs, their transmissions, the ads displayed, and their target sites. Specifically tracks legislative efforts and pending lawsuits.
untitled1.htmlhttp://larch-www.lcs.mit.edu:8001/~corbato/turing91/
as more and more computers are tailored for special applications and for parallelism. Complicating matters too is that parallelism is not a solution for every problem. Certain cal
BiMAVs; Bipedal Mechanized Assault Vehicleshttp://www.bimavs.com/
to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen
Find more...