#youbroketheinternet (YBTI)https://youbroketheinternet.org/
obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet
TELNET: The Mother of All (Application) Protocolshttps://XeNT.com/4K-Associates/IEEE-L7-v2.html
spectrum of host computers connected to the ARPANET were a motley crew: varying keyboards, character sets, display sizes, line lengths, speeds, and those were just the physical in
Internet Software Patentshttp://philip.greenspun.com/business/internet-software-patents
were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I
Metadata Activityhttps://www.w3.org/Metadata/Activity
can purchase books, computers, clothes, and any number of other items; you can book seats on planes and rooms in hotels. The possible uses of the Web seem endless, but there the t
Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Sharehttps://ils.unc.edu/callee/gopherpaper.htm
human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.
Loper OS » "Pest" v. 0xFB.http://www.loper-os.org/?p=4003
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
Prof. Dr. Guido Salvaneschi | Programming Grouphttps://programming-group.com/members/salvaneschi
IEEE Transactions on Computers Elsevier Journal of Computer Languages Elsevier Knowledge-based Engineering IEEE Internet Computing ACM Transactions on Autonomous and Adaptive Syst
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.
Archivehttps://jxself.org/archive.shtml
digital age, our computers have become central to so many aspect of our lives. Yet, how much control do we have over the software that powers these machines? Proprietary software
3D Gopher, by McCahill and Ericksonhttp://www.pliant.org/personal/Tom_Erickson/GopherVR.html
of RISC-based personal computers, the time seems ripe. Finally, we would like to put our beliefs about the advantages of 3-D spatial interfaces to the test. We see two possible ad
https://www.ietf.org/rfc/rfc2277.txthttps://www.ietf.org/rfc/rfc2277.txt
when working with computers. Note that negotiating English is NOT the same as Default Language; Default Language is an emergency measure in otherwise unmanageable situations. In m
Cyborgs, transhumans and neuroelectronicshttps://www.wireheading.com/brainstim/cyborgs.html
connecting brains and computers—from producing robotic limbs controlled directly by brain activity to altering memory and mood with implanted electrodes to the far-out prospect of
the djb way: the djb why?http://thedjbway.b0llix.net/djbwhy.html
Soekris single board computers, to rack-mounted blade servers and the "big-iron" mainframes of research and industry. No matter what package it comes in, these Unix and "Unix-like
the djb why
Find more...