100R — weathering software winterhttp://100r.co/site/weathering_software_winter.html
software, you need slow computers, and we've tried to espouse this as much as we could. We spend our time sailing around, and doing experiments with resilience, that covers comput
Welcome to Matthieu Benoit electrical engineering home pagehttp://matthieu.benoit.free.fr/
microprocessors microcomputers memories interfaces Competitive Cross ref. Data sheets Selection cross/data_sheets/ Devices resources by part number pn Parts and Electronic
Introduction: Why Lisp?https://gigamonkeys.com/book/introduction-why-lisp.html
father got his start in computers writing an operating system in assembly for the machine he used to gather data for his doctoral dissertation in physics. After running computer s
Loper OS » "Cryostat" Genesis.http://www.loper-os.org/?p=3791
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
My impressionshttp://galexander.org/laptops/mac/impressions.html
In the PC world, the computers feel shallow because I understand a little bit of almost every layer. I am familiar with the hardware from a user perspective and also (somewhat) an
How to Block Forced Updateshttps://backlit.neocities.org/how-to-block-forced-updates
all attacks on domestic computers - including forced updates - are triggered from within the computer itself, and rely on outbound network calls, not inbound . Nearly. All. If you
Garbage Collectionhttp://synthcode.com/blog/2009/06/Garbage_Collection
interactions between computers and human (natural) languages.</p ')" Natural Language Processing . sexp sexp_cons ( sexp ctx, sexp head, sexp tail) { sexp pair = sexp_alloc_typ
Linux Gazette Indexhttps://www.linuxdoc.org/LDP/LG/lg_index.html
Things We Do With Our Computers , by Mike "Iron" Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writin
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys/pdf/DEBUG.TXT
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
Klausmeier's Blog on Computers, Programming, and Mathematics I write about computers (mostly Linux), programming (mostly Perl, PHP, COBOL, C) and mathematics (mostly numerical ana
blumanualhttp://SigmaSevenSystems.com/blumanual.html
to connect the two computers. If you need to make a serial cable, see APPENDIX B Serial Cables. BLU is configured to use the Serial B port, with a default setting of 57600 baud, 8
Find more...