wiby  
Settings



Richard A. Bartle: Players Who Suit MUDs

https://mud.co.uk/richard/hcds.htm

four typical playing preferences associated with each quadrant. To see how the graph works, it is appropriate to consider each of the four styles in detail: i) Achievers are inter

555 timer teardown: inside the world's most popular IC

http://www.righto.com/2016/02/555-timer-teardown-inside-worlds-most.html

a divider generating references voltages of 1/3 and 2/3 of the supply voltage. The external capacitor will charge and discharge between these limits, producing an oscillation. In

Viruses of the Mind

https://www.dankalia.com/science/mnd146.htm

style on every page. References Browne, Sir T. (1635) Religio Medici, I, 9 Dawkins, R. (1976) The Selfish Gene. Oxford: Oxford University Press. Dawkins, R. (1982) The Extended Ph

https://www.ietf.org/rfc/rfc1979.txt

https://www.ietf.org/rfc/rfc1979.txt

9 REFERENCES ............................................... 9 ACKNOWLEDGEMENTS ......................................... 9 CHAIR'S ADDRESS .......................................

releases

http://9front.org/releases/

nil OTHER all: update references to the repo to its new location /lib/theo: everything is a nail /lib/ucd: Update to v17.0 /sys/doc: add unicode.ms /sys/lib/dist/mkfile: enable co

Computer Criticism vs. Technocentric Thinking

http://papert.org/articles/ComputerCriticismVsTechnocentric.html

choices.   References Clement, D., and Gullo, D. (1984). "Effects of Computer Programming on Young Children's Cognition," Journal of Educational Psychology (vol. 76, no. 6).

https://www.ietf.org/rfc/rfc2130.txt

https://www.ietf.org/rfc/rfc2130.txt

24 Appendix D: References........................................... 25 Appendix E: Recommended reading.................................. 27 Appendix F: Workshop attendee list....

LLEK Bookmarks-Scientific Search Engines

http://llek.de/english/

Gateways .... Online References Abbrevations, Enzyclopedia, Dictionaries, Reference Collections .... Current Affairs (Politics) Afghanistan, Chechnya, Iraq, Middle East, former Yu
Scientific Search Engines and Media worldwide. Browsing by region and subject

Educational Informatics: A laboratory for the study of educational informatics

http://www.educationalinformatics.org/

of commercial radiology references and decision support tools) 1995 - Virtual Computer Museum - an online computer museum for The Computer Museum 1995 - MedicalStudent.com - a dig
A laboratory for the study of educational informatics

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

source of energy. References and endnotes James Massey (1994). “Guessing and entropy” (PDF). Proceedings of 1994 IEEE International Symposium on Information Theory. IEEE. p. 204.
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.

Superintelligent AI and Skepticism

http://jetpress.org/v27.1/corabi.htm

of this paper.   References   Bonjour, L. 1985. The structure of empirical knowledge . Cambridge, MA: Harvard University Press.   Bostrom, N. 2014. Superintelligenc

Hygiene for a computing pandemic: separation of VCs and ocaps/zcaps from Christopher Lemmer Webber on 2020-12-05 (public-credentials@w3.org fr

https://lists.w3.org/Archives/Public/public-credentials/2020Dec/0028.html

make the effects out of references to things they have which cause effects. (They can combine cool effect-causing things together in new ways though.) For a brief moment, imagine


Find more...