wiby  
Settings



History of Computing Science: ENIAC

http://lecture.eingang.org/eniac.html

automated calculators/computers. ENIAC also was the first machine to use more than 2,000 vacuum tubes, using nearly 18,000 vacuum tubes. Storage of all those vacuum tubes and the
Part of a multipage presentation on the history of computers. This page talks about the development of the ENIAC machine.

Great Green Room: A Partial History of Computer Conferencing in Ann Arbor

http://greatgreenroom.org/item_19.html

study methods of using computers in education. He started experimenting with existing computer conferencing systems in 1972, but found them expensive and restrictive to use. In re

Andrew Holme's projects

http://www.aholme.co.uk/Projects.htm

Exchange | FORTH Computers | VB Profiler | Wireless Thermostat | Ethernet Receiver | Frequency Synthesizers | Core Memory | Spread Spectrum | Avalanche Pulse Generator | Delta Loo

Hikyaku (Free World-Wide Japanese E-Mailer)

http://www.hikyaku.com/jpmail/jpmail.html

messages on no-Japanese computers, useful for Japanese speaking people who wish to keep a contact with their home base by e-mails outside Japan. Thanks to our technology, you can
Hikyaku is a web based E-mailer able to process Japanese mails without Japanese computersdeveloped by Free Light Software. Free service!

BTI Computer Systems History

http://btihistory.org/

BTI 4000, BTI 5000 Computers   (link) The following history comes from Ron Crandall. The first [customer for BTI hardware] was Arne Cantrell who wanted to make software for a

My projects — Gamliel Fishkin

https://fishk.in/projects.html

 ◉  Esperanto  ◉  Русский  ◉  Gopher version  ◉  My projects — Gamliel Fishkin I was and is occupied with different
Gamliel Fishkin: sysadmin, a bit programmer, former cinema actor, user of GNU

“Storm Watch”

https://qsl.net/kb1h/storm/Watch7.3.htm

done gang.   New Computers   Chris was able to get 5 new computers from work. All five are Pentium II and came with monitors and keyboards. As soon as Boxboro is out of

Unix philosophy description by The Linux Information Project (LINFO)

https://www.linfo.org/unix_philosophy.html

on a wide variety of computers; rather, each computer manufacturer developed a separate operating system for its own hardware. Another important factor in Thompson's desire for ma

PHYS771 Lecture 8: Crypto

https://www.scottaaronson.com/democritus/lec8.html

in a world with quantum computers! So can we base the security of PRG's on a more quantum-safe assumption? Yes, we can. There are many, many ways to build a candidate PRG, and we

20th Century Video Games

https://20thcenturyvideogames.com/

century Handhelds Pongs Computers Consoles Handheld consoles A B C D E F G H I J K L M N O P Q R S T U V W Y Z 3DGames ArcadeMini AtariClone BarcodeGames BlackPointFamil BoardGame

Emergent Technologies Inc. -- Security Kernel</TITLE

http://mumble.net/~jar/pubs/secureos/secureos.html

available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR

Why | Quit Social Media

https://quitsocialmedia.club/why/

are super powerful computers connected to the internet all of the day, everyday; they are responsible for the effective publication of what we share, and they make sure everything
The heart of the matter: all of the reasons why we should quit Social Media


Find more...