wiby  
Settings



Internet Pioneers

http://www.ibiblio.org/pioneers/

believed that computers could be used to augment human thinking and suggested that a computer network be established to allow ARPA research contractors to communicate information
Ten individuals who made significant contributions to the development of the Internet and world wide web.

Dan Connolly's Index of Events

https://www.w3.org/People/Connolly/events/

Eighth Conference on Computers, Freedom & Privacy CFP'98 in Jan 1998 San Jose, CA 7th Advisory Commitee Meeting 1997 in Dec 1997 Washington, DC 40th IETF in Dec 1997 Washingto

The Kernel Hacker's Bookshelf: Ultimate Physical Limits of Computation [LWN.net]

https://lwn.net/Articles/286233/

existing quantum computers have already attained the ultimate limit on computational speed - on a very small number of bits and in a research setting, but attained it nonetheless.
Moore's Law - we all know it (or at least think we do). To be annoyingly exact, Moore's Law i [...]

Character Model for the World Wide Web 1.0

https://www.w3.org/TR/2003/WD-charmod-20030822/

To be of any use in computers, in computer communications and in particular on the World Wide Web, characters must be encoded. In fact, much of the information processed by comput

PET index - Transfer files to the PET and back

http://www.6502.org/users/andre/petindex/transfer.html

all 8-bit Commodore computers that are equipped with a cassette interface (PET series, VIC-20, C64, C128, 264 series, PET-II series) and any computer that has a 38400 bps RS-232 i
PET index - Transfer files to the PET and back

Athena's blog - Athena's Site

https://www.alm.website/blog/

How I back up my computers Published on 2025-09-04 I have four computers that I use personally on a regular basis: A laptop ( spock ), a home server ( hestia ), and a VPS ( picard

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp

All posts

http://unsafeperform.io/blog/tags/all/

games for 8-bit home computers, all that text is actually relatively quite a lot! In The Revenge , for example, just the various messages printed throughout the game fill 16 KB, a

OS-9 Frequently Asked Questions

https://pages.cs.wisc.edu/~pruyne/os9faq.html

to large multiuser minicomputers. Originally developed for the 6809 microprocessor, OS-9 was a joint effort between Microware and Motorola. The original version of OS-9 (OS-9 Leve

Let's Decentralize

https://letsdecentralize.org/

of roughly 55,000 computers distributed around the world." [Wikipedia] Unlike Tor, I2P's primary purpose is to facilitate hidden services. While "outproxies" exist to route clearn

A to Z of C - Beta | Online book on C/DOS programming

http://guideme.itgo.com/atozofc/

The Real World With Computers 41. Writing BIOS Flashing the BIOS — How-to 42. Programming CMOS RAM 43. Device Driver Programming Device driver Device driver writing kit (wit
A to Z of C is the non-profit project to bring cheapest and best book for C

CELF Embedded Linux Conference

https://www.embeddedlinuxconference.com/elc_2009/sessions.html

ranging from supercomputers to embedded 8-bit microprocessors. With over 20 years focusing in the RTOS marketplace using VxWorks, pSOS, and RTX-32, among others, Mike brings a uni


Find more...