wiby  
Settings



/tech/ - Technology - Page 1

https://zzzchan.xyz/tech/index.html

far broader field than computers and digital software alone, and in practice the way these latter two are used have produced far greater surveilence, insecurity, and hypercentrali
Technology & Computing

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Juergen Schmidhuber's AI Blog

https://people.idsia.ch/~juergen/blog.html

of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'

C-Kermit Unix Hints and Tips

https://www.kermitproject.org/ckubwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

2blowhards.com: The Mencius Vision

http://www.2blowhards.com/archives/2007/04/_trial_version.html#004052

taxes, writing, computers, these kids these days, and lousy educations. E-Mail Donald Demographer, recovering sociologist, and arts buff E-Mail Fenster College administrator and a
2blowhards.com - a weblog

2019: November - February Political Notes - Richard Stallman

http://stallman.org/archives/2019-nov-feb.html

February 2020 ( Use of computers and software in elections ) The use of untrustworthy computers and software in elections — in other words, any computers and software &mdash

T E X T F I L E S

http://textfiles.com/politics/

A Trip Report on the Computers, Freedom and Privacy Report by R. T. Mercuri (April 1, 1991) cfp2-sum 40674 Computers, Freedom, and Privacy-2: A Report by Steve Cisler (1992) cgw.t

Daring Fireball

https://daringfireball.net/

because those are baby computers . They just are. So if you want to jump in as an early adopter on desktop AI, it needs to be on a Mac. And if you want a headless always-on Mac to
Commentary on Apple, technology, design, politics, and more.

Spyware, Adware, and Malware-- Research, Testing, Legislation, and Suits

https://www.benedelman.org/spyware/

installed on their computers. See Simios v. 180solutions complaint (PDF) and coverage (including 180's claim that the case has "no merit"). This suit was voluntarily dis
Index of original research on 'spyware' programs, their transmissions, the ads displayed, and their target sites. Specifically tracks legislative efforts and pending lawsuits.

untitled1.html

http://larch-www.lcs.mit.edu:8001/~corbato/turing91/

as more and more computers are tailored for special applications and for parallelism. Complicating matters too is that parallelism is not a solution for every problem. Certain cal

BiMAVs; Bipedal Mechanized Assault Vehicles

http://www.bimavs.com/

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen


Find more...