History of Computing Science: ENIAChttp://lecture.eingang.org/eniac.html
automated calculators/computers. ENIAC also was the first machine to use more than 2,000 vacuum tubes, using nearly 18,000 vacuum tubes. Storage of all those vacuum tubes and the
Part of a multipage presentation on the history of computers. This page talks about the development of the ENIAC machine.
Great Green Room: A Partial History of Computer Conferencing in Ann Arborhttp://greatgreenroom.org/item_19.html
study methods of using computers in education. He started experimenting with existing computer conferencing systems in 1972, but found them expensive and restrictive to use. In re
Andrew Holme's projectshttp://www.aholme.co.uk/Projects.htm
Exchange | FORTH Computers | VB Profiler | Wireless Thermostat | Ethernet Receiver | Frequency Synthesizers | Core Memory | Spread Spectrum | Avalanche Pulse Generator | Delta Loo
Hikyaku (Free World-Wide Japanese E-Mailer)http://www.hikyaku.com/jpmail/jpmail.html
messages on no-Japanese computers, useful for Japanese speaking people who wish to keep a contact with their home base by e-mails outside Japan. Thanks to our technology, you can
Hikyaku is a web based E-mailer able to process Japanese mails without Japanese computersdeveloped by Free Light Software. Free service!
BTI Computer Systems Historyhttp://btihistory.org/
BTI 4000, BTI 5000 Computers (link) The following history comes from Ron Crandall. The first [customer for BTI hardware] was Arne Cantrell who wanted to make software for a
My projects — Gamliel Fishkinhttps://fishk.in/projects.html
◉ Esperanto ◉ Русский ◉ Gopher version ◉ My projects — Gamliel Fishkin I was and is occupied with different
Gamliel Fishkin: sysadmin, a bit programmer, former cinema actor, user of GNU
“Storm Watch”https://qsl.net/kb1h/storm/Watch7.3.htm
done gang. New Computers Chris was able to get 5 new computers from work. All five are Pentium II and came with monitors and keyboards. As soon as Boxboro is out of
Unix philosophy description by The Linux Information Project (LINFO)https://www.linfo.org/unix_philosophy.html
on a wide variety of computers; rather, each computer manufacturer developed a separate operating system for its own hardware. Another important factor in Thompson's desire for ma
PHYS771 Lecture 8: Cryptohttps://www.scottaaronson.com/democritus/lec8.html
in a world with quantum computers! So can we base the security of PRG's on a more quantum-safe assumption? Yes, we can. There are many, many ways to build a candidate PRG, and we
20th Century Video Gameshttps://20thcenturyvideogames.com/
century Handhelds Pongs Computers Consoles Handheld consoles A B C D E F G H I J K L M N O P Q R S T U V W Y Z 3DGames ArcadeMini AtariClone BarcodeGames BlackPointFamil BoardGame
Emergent Technologies Inc. -- Security Kernel</TITLEhttp://mumble.net/~jar/pubs/secureos/secureos.html
available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR
Why | Quit Social Mediahttps://quitsocialmedia.club/why/
are super powerful computers connected to the internet all of the day, everyday; they are responsible for the effective publication of what we share, and they make sure everything
The heart of the matter: all of the reasons why we should quit Social Media
Find more...