Internet Software Patentshttp://philip.greenspun.com/business/internet-software-patents
were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I
Dan Connolly's Index of Eventshttps://www.w3.org/People/Connolly/events/
Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto
The Kernel Hacker's Bookshelf: Ultimate Physical Limits of Computation [LWN.net]https://lwn.net/Articles/286233/
existing quantum computers have already attained the ultimate limit on computational speed - on a very small number of bits and in a research setting, but attained it nonetheless.
Moore's Law - we all know it (or at least think we do). To be annoyingly exact, Moore's Law i [...]
Palaeolithic Venus figures - their purposehttps://www.donsmaps.com/venusfigurespurpose.html
I got much better computers and software over the years, Adobe Photoshop and Illustrator for example, and my maps became colourised and had more detail. I did a lot of maps of the
Venus figures from the stone age - Venus figurines is an umbrella term for a number of prehistoric statuettes of women sharing common attributes (many depicted as apparently obese
Loper OS » "Pest" v. 0xFB.http://www.loper-os.org/?p=4003
Really Fast, or How Computers Only Come in Two Speeds." Stanislav on "Seven Laws of Sane Personal Computing" tuhdo on "Seven Laws of Sane Personal Computing" Anonymous on "The Thr
Character Model for the World Wide Web 1.0https://www.w3.org/TR/2003/WD-charmod-20030822/
To be of any use in computers, in computer communications and in particular on the World Wide Web, characters must be encoded. In fact, much of the information processed by comput
PET index - Transfer files to the PET and backhttps://6502.org/users/andre/petindex/transfer.html
all 8-bit Commodore computers that are equipped with a cassette interface (PET series, VIC-20, C64, C128, 264 series, PET-II series) and any computer that has a 38400 bps RS-232 i
PET index - Transfer files to the PET and back
Athena's blog - Athena's Sitehttps://www.alm.website/blog/
How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard
Ian! D. Allen - Personal Home Pagehttp://www.idallen.com/
language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp
Ed Bott: Bought by Microsofthttp://techrights.org/o/2008/11/09/ed-bott-laptop-bribe/
companies give out computers on long term loan, etc, but that’s not the same thing. It’s their product for a start (Microsoft doesn’t make computers) and they’re loaners, not keep
Microsoft faithfuls receive free gifts from Microsoft as well
The Value of Gnutella and Freenethttp://www.praxagora.com/andyo/wr/gnutella_freenet_policy.html
shut down all computers within its jurisdiction that run a Gnutella or Freenet site, and could force routing points to filter out packets from Gnutella or Freenet sites outside it
Let's Decentralizehttps://letsdecentralize.org/
of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn
Find more...