wiby  
Settings



workbench computers (WilsonMinesCo.com)

http://wilsonminesco.com/BenchCPU/

worked in applications engineering at a VHF/UHF power transistor manufacturer in 1984-85, having an ultra-portable hand-held unit to control repetitive test processes became quite

VC&G | » The PC is Dead: It’s Time to Bring Back Personal Computing

http://www.vintagecomputing.com/index.php/archives/3292/the-pc-is-dead-its-time-to-make-computing-personal-again

was taught as part of engineering back in the 1990’s. It is the model that companies work to since advances in, let’s say “vehicles”, produced an item whic
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.

2blowhards.com: Climate Models Written in ... Fortran?!?

http://www.2blowhards.com/archives/2009/07/climate_models.html

been used for science/engineering, so I don't think it's any knock on climate scientists that they use it as well. Posted by: TGGP on August 1, 2009 1:58 AM I have no idea what y'
2blowhards.com - a weblog

What is this Gemini thing anyway, and why am I excited about it? | Lobsters

https://lobste.rs/s/ivryqt/what_is_this_gemini_thing_anyway_why_am_i

other thing on software engineering. EDIT: Or the requirement of closing the connection and re-opening it with every request, and all the handshakes that means. For clarity about
120 comments

Wesley Moore

https://www.wezm.net/v2/

this adventure in over-engineering to see how I dropped the average response time across nine global locations from 807ms to 189ms without spending a fortune. Network diagram of L

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

malware on two engineering workstations critical to the operation of the control environment. Investigators did not find malware on 11 other workstations examined. ICS-CERT recomm
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

https://www.ietf.org/rfc/rfc6763.txt

https://www.ietf.org/rfc/rfc6763.txt

Internet Engineering Task Force (IETF) S. Cheshire Request for Comments: 6763 M. Krochmal Category: Standards Track Apple Inc. ISSN: 2070-1721 February 2013 DNS-Based Service Disc

Digital Culture - 98.01

https://www.theatlantic.com/past/docs/unbound/digicult/dc9801.htm

easily from art to engineering, science to politics -- as it did in this discussion, which took place during the turmoil of Theodore Kaczynski's trial. In Machine Beauty you write
Harvey Blume interviews David Gelernter, author of Machine Beauty

Imposed Technology

https://sor.neocities.org/blog/globohomo-tech

on menus. Social engineering The more technology becomes mandatory, and the more the users just eat it up, the more the developers of it have the freedom of just doing whatever, p

Jeff Duntemann's Wardriving FAQ

http://www.drivebywifiguide.com/wardrivingfaq.htm

packets, reverse-engineering passwords, or even connecting to an unprotected network. Furthermore, NetStumbler respects the wishes of network owners in terms of the public visibil
"Wardriving" is the process of gathering statistics on Wi-Fi hotspots by sensing Wi-Fi access points without connecting to them. This FAQ explains what it's about, why i


Find more...