wiby  
Settings



#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

TELNET: The Mother of All (Application) Protocols

https://XeNT.com/4K-Associates/IEEE-L7-v2.html

spectrum of host computers connected to the ARPANET were a motley crew: varying keyboards, character sets, display sizes, line lengths, speeds, and those were just the physical in

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I

Metadata Activity

https://www.w3.org/Metadata/Activity

can purchase books, computers, clothes, and any number of other items; you can book seats on planes and rooms in hotels. The possible uses of the Web seem endless, but there the t

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

Loper OS » "Pest" v. 0xFB.

http://www.loper-os.org/?p=4003

Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

Archive

https://jxself.org/archive.shtml

digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software

3D Gopher, by McCahill and Erickson

http://www.pliant.org/personal/Tom_Erickson/GopherVR.html

of RISC-based personal computers, the time seems ripe. Finally, we would like to put our beliefs about the advantages of 3-D spatial interfaces to the test. We see two possible ad

https://www.ietf.org/rfc/rfc2277.txt

https://www.ietf.org/rfc/rfc2277.txt

when working with computers. Note that negotiating English is NOT the same as Default Language; Default Language is an emergency measure in otherwise unmanageable situations. In m

Cyborgs, transhumans and neuroelectronics

https://www.wireheading.com/brainstim/cyborgs.html

connecting brains and computers—from producing robotic limbs controlled directly by brain activity to altering memory and mood with implanted electrodes to the far-out prospect of

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why


Find more...