The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html
Network, is a system of computers in the domain musenet.org providing access to Educational MUSEs (Multi-User Simulated Environments), such as MicroMUSE and MariMUSE. It is based
Digital Vegan Bookhttps://digitalvegan.net/
by over-reliance on computers and misuse of digital communications tools. A metaphor of digital diet is used to explore more minimal and mindful use. Digital Vegan implores us to
Without Systemdhttps://without-systemd.org/wiki/index_php/Main_Page.html
some small single board computers. FSF-approved OpenWRT ( 2 ) (xref: LEDE Project) provides a fully writable filesystem, and package management. PiBox ( BusyBox init) an embedded
Balisage 2018 - Participant Bioshttps://www.balisage.net/2018/Bios.html
of the Association for Computers and the Humanities, the editorial board of Markup languages: theory and practice , and the Text Encoding Initiative Council. Much of his electroni
Memory part 2: CPU caches [LWN.net]https://lwn.net/Articles/252125/
it does not matter. But computers do not have large main memories for no reason. The working set is bound to be larger than the cache. This is especially true for systems running
The second part of Ulrich Drepper's 'What every programmer should know about memory' document [...]
The Biointelligence Explosion as conceived by ChatGPThttps://www.biointelligence-explosion.com/chatgpt/
DP] Classical computers cannot explore the nature, varieties, causal-functional efficacy and phenomenal binding of consciousness. Why does superintelligence.com argue that full-sp
Matt Blaze's Exhaustive Searchhttps://www.mattblaze.org/blog/
targets' phones and computers to install surreptitious "spyware" that records conversations and text messages before they can be encrypted. In other words, wiretapping today incre
The Second Psalmhttps://www.ldolphin.org/psalmtwo.html
now has tremendous computers that can review any number of records and might catch us. That is a factor, and many more people are honest about their taxes because of it, but that
PuTTY Download Keys and Signatureshttps://www.chiark.greenend.org.uk/~sgtatham/putty/keys.html
on a team member's home computers, before being uploaded to the web server from which you download them. Therefore, a signature from the Development Snapshots key DOES protect you
FJP: Freedom & Justice Partyhttps://www.bitbarn.co.uk/fjp/
and write but he had no computers and no spreadsheets - only clerks with quill pens! After building over 500 motte and bailey castles, and suppressing most rebellions, it took les
WA8LMF Mobile Ham Radio Pagehttp://wa8lmf.net/ham/
on home and ham shack computers, Kenwood most likely decided it wasn't worth redeveloping the software for this slow-moving product and and killed it instead. ] About the same tim
HomePage for Brian Harvey (bh@cs.Berkeley.EDU)http://people.eecs.berkeley.edu/~bh/index.html
in the use of computers in pre-college education; I used to be a high school teacher, and was involved in the development of the Logo programming language. More recently I've been
Find more...