Amorphous Computing Paper Listinghttps://groups.csail.mit.edu/mac/projects/amorphous/paperlisting.html
Hierarchy from Persistent Nodes , Beal, AI Memo 2003-012, May 2003 Bachrach, Nagpal, Salib, Shrobe, Experimental Results and Theoretical Analysis of a Self-Organizing Global Coord
The Kermit 95 2.0 GUIhttps://www.kermitproject.org/k95gui.html
and manages a persistent database of connections and their settings for you, so once you set up a connection the way you want it, all its characteristics are remembered and you ca
Fourmilog: None Dare Call It Reason: September 2018 Archiveshttps://www.fourmilab.ch/fourmilog/archives/Monthly/2018/2018-09.html
tells him that his persistent headaches may be due to a brain tumour found on a CT scan, and that two members of his team had been found, in autopsy, to have rare and malignant br
The Information Philosopher - dedicated to the new information philosophyhttps://www.informationphilosopher.com/
SkyBuilders TimeLines persistent archive, as suggested to me and my son Derek by Tim Berners-Lee in the late 1990's. You can also see the version of any of the site's thousands of
Information Philosopher is dedicated to the new Information Philosophy, with explanations for Freedom, Values, and Knowledge.
The Design and Implementation of the Tor Browser [DRAFT]https://2019.www.torproject.org/projects/torbrowser/design/
is allowed to retain a persistent value for the lifespan of a browser tab. It is possible to utilize this property for identifier storage . In order to eliminate non-consensual li
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
not happening: a persistent threat actor who specifically targeted your iPhone or home network and is now moving laterally across your 10 devices like it's a corporate pentest. Un
Best practices and information about computer and smartphone security and privacy
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
Given that, Red Hat's persistent attempts to get signed module enforcement into the kernel despite some interesting resistance make more sense. Much of the coverage of this plan i
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
Clean Up your Windows Desktop and Start Menuhttps://www.zisman.ca/simple95/
at startup. Persistent Tray icons can be turned off from here, though it may take a bit of experimentation to find what to turn off. If you use a different Windows version that la
Loper OS ยป "Cryostat" Genesis.http://www.loper-os.org/?p=3791
safe and reliable persistent storage to Ada data structures. It makes use of memory-mapped disk I/O via the MMap() system call , present in Linux (kernel 2.4 and newer) and all co
untitled1.htmlhttp://larch-www.lcs.mit.edu:8001/~corbato/turing91/
first time users had persistent on-line storage of programs and data. Suddenly the issues of privacy, protection and backup of information had to be faced. Another byproduct of th
OpenBSD Router Guidehttps://openbsdrouterguide.net/
pass list Using a persistent table Loading the rules Logging and monitoring Don't try to block DHCP DNS I present to you, Unbound Blocking with DNS NXDOMAIN vs redirecting The pro
GuestArticles index [LWN.net]https://lwn.net/Archives/GuestIndex/
2015) Containers and persistent data (May 28, 2015) A report from PGCon 2015 (June 24, 2015) News and updates from DockerCon 2015 (July 1, 2015) A preview of PostgreSQL 9.5 (July
Find more...