Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
Democratic Rationalization: Technology, Power and Freedom [Andrew Feenberg]https://www.dogma.lu/txt/AF_democratic-rationalization.htm
especially in computers. Here we have a contemporary version of the dilemma of the bicycle discussed above. Progress of a generalized sort in speed, power, and memory goes on apac
http://www.catb.org/jargon/oldversions/jarg262.txthttp://www.catb.org/jargon/oldversions/jarg262.txt
else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,
Extra Ordinary | D. Griffin Joneshttps://www.dgriffinjones.com/
humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.
Jeff Duntemann's ContraPositive Diaryhttp://www.duntemann.com/november2008.htm
introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is
Ken Silverman's Official Home Pagehttp://advsys.net/ken/
:) Ken's primary computers: 12/??/1983: TI-99/4A ????? 1984: Kaypro II (CP/M 2.2) Late? 1985: HP 9836C Series 200 (98611A Opt.655 BASIC System + 98612A Opt.650 Extended BASIC 2.1)
2blowhards.com: The Mencius Visionhttp://www.2blowhards.com/archives/2007/04/_trial_version.html#004052
taxes, writing, computers, these kids these days, and lousy educations. E-Mail Donald Demographer, recovering sociologist, and arts buff E-Mail Fenster College administrator and a
2blowhards.com - a weblog
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
2019: July - October Political Notes - Richard Stallmanhttp://stallman.org/archives/2019-jul-oct.html
Chrome add-on on the computers of Google workers. Workers fear this will be used to surveil them and then attack their rights in one way or another. Every nonfree program warrants
The Xinu Pagehttps://xinu.cs.purdue.edu/
donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19
The MATHMANhttp://mathman.biz/home.html
use of calculators and computers) - - for children, as well as adults Don assumes only that a student can count. Don's keys: visualization , look for patterns, learn to learn &nbs
M. Hobart "The Paradox of Historical Constructionism"https://abuss.narod.ru/Biblio/eng/hobart.htm
Picture two computers "talking" to one another. Together they have passed the "Turing" test for consciousness and, by extension, reference; they give appropria
Find more...