Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!https://dwheeler.com/oss_fs_why.html
that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software
Asterisk™: The Definitive Guidehttp://www.asteriskdocs.org/en/3rd_Edition/asterisk-book-html/asterisk-book.html
of doing something with computers and voice communication to the point where you’re able to stun everyone you know with your phone system’s sophisticated tricks. You’re encouraged
Epicyon ActivityPub serverhttps://libreserver.org/epicyon/
on single board computers. No timeline algorithms. No javascript. No database. Data stored as ordinary files. No fashionable web frameworks. "Boring by design" . No blockchain or
ActivityPub server written in Python, HTML and CSS, and suitable for self-hosting on single board computers
E-Books Directory - Categorized Links to Free Bookshttp://www.e-booksdirectory.com/
& Graphic Novels Computers & Internet Business & Culture Certification Central Computer Science Databases Digital Music Graphic Design Hardware Home Computing Microsof
E-Books Directory is a categorized index of freely available online books. It is daily updated with new links to free e-books and short reviews. This directory is maintained regula
Security Now! Transcript of Episode #387https://www.grc.com/sn/sn-387.htm
system. About 10 computers were affected, ICS-CERT said. An outside technician used a USB drive to upload software updates during equipment upgrades, CERT said. The malware delaye
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The
Order Without the State: Theory, Evidence, and the Possible Future Ofhttp://www.daviddfriedman.com/Academic/Order_without_the_state/Order_Without_the_State.htm
fool people or their computers, but one cannot get a bullet through a T-1 line. It is in that sense a world of entirely voluntary interaction. In order to use force against an onl
Welcome to the Retrocomputing Archive!http://www.retroarchive.org/
the IBM PC and PC/XT computers. See PC Hardware & Software Documentation
John Seely Brown: Publicationshttps://www.johnseelybrown.com/pubs.html
Have All the Computers Gone?,” MIT Technology Review , John Seely Brown, January/February 2001, pp 86-87. “Ecological Computing.” The Industry Standard , John Se
PANDORA Web Archivehttp://pandora.nla.gov.au/
Computer Science Computers & Internet Conferences Constitution & Referenda Construction Crime & Justice Cultural Heritage Management Dance Decorative Arts Defence Desi
C-Kermit 9.0 Update Noteshttps://www.kermitproject.org/ckermit90.html
trouble is, different computers, or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same cha
https://www.ietf.org/rfc/rfc5228.txthttps://www.ietf.org/rfc/rfc5228.txt
of SI units that computers frequently use, "K" specifies kibi-, or 1,024 (2^10) times the value of the number; "M" specifies mebi-, or 1,048,576 (2^20) times the value of the numb
Purchase AQL Products - AQL Security Softwarehttp://www.aqlsoft.com/buynow.htm
the product on 10 computers in your company or organization. Unlimited Site License : You may install the product on every computer in your company or organization. CD Option Once
You can buy the AQL Secure Password Manager & .htpasswd & .htaccess Password Manager with your credit card via Internet, the telephone or fax order, paying by check via postal mail
Find more...