wiby  
Settings



Miller Microcomputer Services - Index Page

http://www.millermicro.com/

World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

Democratic Rationalization: Technology, Power and Freedom [Andrew Feenberg]

https://www.dogma.lu/txt/AF_democratic-rationalization.htm

especially in computers. Here we have a contemporary version of the dilemma of the bicycle discussed above. Progress of a generalized sort in speed, power, and memory goes on apac

http://www.catb.org/jargon/oldversions/jarg262.txt

http://www.catb.org/jargon/oldversions/jarg262.txt

else is an idiot. Also, computers should be tredecimal instead of binary. \end{Flame} The Scribe users at CMU and elsewhere used to use @Begin/@End in an identical way. On USENET,

Extra Ordinary | D. Griffin Jones

https://www.dgriffinjones.com/

humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

Ken Silverman's Official Home Page

http://advsys.net/ken/

:) Ken's primary computers: 12/??/1983: TI-99/4A ????? 1984: Kaypro II (CP/M 2.2) Late? 1985: HP 9836C Series 200 (98611A Opt.655 BASIC System + 98612A Opt.650 Extended BASIC 2.1)

2blowhards.com: The Mencius Vision

http://www.2blowhards.com/archives/2007/04/_trial_version.html#004052

taxes, writing, computers, these kids these days, and lousy educations. E-Mail Donald Demographer, recovering sociologist, and arts buff E-Mail Fenster College administrator and a
2blowhards.com - a weblog

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

2019: July - October Political Notes - Richard Stallman

http://stallman.org/archives/2019-jul-oct.html

Chrome add-on on the computers of Google workers. Workers fear this will be used to surveil them and then attack their rights in one way or another. Every nonfree program warrants

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

The MATHMAN

http://mathman.biz/home.html

use of calculators and computers) - - for children, as well as adults Don assumes only that a student can count. Don's keys: visualization , look for patterns, learn to learn &nbs

M. Hobart "The Paradox of Historical Constructionism"

https://abuss.narod.ru/Biblio/eng/hobart.htm

Picture two computers "talking" to one another. Together they have passed the "Turing" test for consciousness and, by extension, reference; they give appropria


Find more...