TAOS Operating Systemhttp://www.uruk.org/emu/Taos.html
which computation and communications model to use. Features & Benefits Taos is a software response to the challenge of harnessing parallel hardware. Parallel systems are compl
John Seely Brown: Publicationshttps://www.johnseelybrown.com/pubs.html
reshape the U.S. mobile communications business (co-authored with John Hagel) BusinessWeek , January 2008 Embrace the Edge -- or Perish (co-authored with John Hagel) BusinessWeek
Linrad home page. Download Linrad or update Linrad here.http://www.sm5bsz.com/linuxdsp/linrad.htm
Possibilities for the Communications Experimenter Part 1 (237422 bytes, PDF file) Discussion opens with analog versus digital RF-input techniques and attendant performance conside
History of the Internet & World Wide Web : 1) Internet Before Webhttps://www.netvalley.com/cgi-bin/intval/net_history.pl
Ancient Roads of Telecommunications & Computers 11 They said it ... People Wrote About This Book History of the Internet. We all need it. We all want it. But how did it hap
'Internet before World Wide Web: Atlantic cable, Sputnick, ARPANET,Information Superhighway, ...'
What's So Bad About Microsoft?http://www.kmfms.com/whatsbad.html
which protected their communications with your web browser in order to keep things like your bank account and credit card number safe, the protection was compromised and your sens
The Kermit Script Library and Tutorialhttps://www.kermitproject.org/ckscripts.html
was targeted at communications and file-transfer tasks, but over time is has developed into a general-purpose programming language on a scale somewhere between shell scripts and P
gpg - kotahttps://kota.nz/gpg.html
use in securing email communications. Famously, it was used by Edward Snowden to whistleblow on the NSA's illegal spying regime . For setting up and using GPG with email I highly
Resume -- Chip Morningstarhttp://www.fudco.com/chip/resume.html
design and translation, communications protocol design, and asynchronously coupled distributed systems, including highly scalable, high performance servers. Effective leader of te
Electt: Running Auditable and Verifiable Elections in Untrusted Environments - Kirill's journalhttps://kirill.korins.ky/articles/electt-running-auditable-and-verifiable-elections-in-untrusted-environments/
and digital pseudonyms. Communications of The ACM, 24(2):84-90, February 1981. DOI: 10.1145/358549.358563 . ↩︎ Masayuki Abe. Mix-networks on permutation network
We present a system for running auditable and verifiable elections in untrusted environments. Votes are anonymous since the order of candidates on a ballot sheet is random. Tellers
Find more...