wiby  
Settings



Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

Asterisk™: The Definitive Guide

http://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html

of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged

Epicyon ActivityPub server

https://libreserver.org/epicyon/

on single board computers. No timeline algorithms. No javascript. No database. Data stored as ordinary files. No fashionable web frameworks. "Boring by design" . No blockchain or
ActivityPub server written in Python, HTML and CSS, and suitable for self-hosting on single board computers

E-Books Directory - Categorized Links to Free Books

http://www.e-booksdirectory.com/

& Graphic Novels Computers & Internet Business & Culture Certification Central Computer Science Databases Digital Music Graphic Design Hardware Home Computing Microsof
E-Books Directory is a categorized index of freely available online books. It is daily updated with new links to free e-books and short reviews. This directory is maintained regula

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Order Without the State: Theory, Evidence, and the Possible Future Of

http://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm

fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl

Welcome to the Retrocomputing Archive!

http://www.retroarchive.org/

the IBM PC and PC/XT computers. See PC Hardware & Software Documentation

John Seely Brown: Publications

https://www.johnseelybrown.com/pubs.html

Have All the Computers Gone?,” MIT Technology Review , John Seely Brown, January/February 2001, pp 86-87. “Ecological Computing.” The Industry Standard , John Se

PANDORA Web Archive

http://pandora.nla.gov.au/

Computer Science Computers & Internet Conferences Constitution & Referenda Construction Crime & Justice Cultural Heritage Management Dance Decorative Arts Defence Desi

C-Kermit 9.0 Update Notes

https://www.kermitproject.org/ckermit90.html

trouble is, different computers, or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same cha

https://www.ietf.org/rfc/rfc5228.txt

https://www.ietf.org/rfc/rfc5228.txt

of SI units that computers frequently use, "K" specifies kibi-, or 1,024 (2^10) times the value of the number; "M" specifies mebi-, or 1,048,576 (2^20) times the value of the numb

Purchase AQL Products - AQL Security Software

http://www.aqlsoft.com/buynow.htm

the product on 10 computers in your company or organization. Unlimited Site License : You may install the product on every computer in your company or organization. CD Option Once
You can buy the AQL Secure Password Manager & .htpasswd & .htaccess Password Manager with your credit card via Internet, the telephone or fax order, paying by check via postal mail


Find more...