http://www.nesworld.com/http://www.nesworld.com/
something on the lab computers called Netscape Navigator, and another program called HTMLed Pro. Today this is of course old news, but back then it was amazing to see that you cou
Selfhosting · Gianmarco Gargiulohttps://gianmarco.gg/tags/selfhosting/
fun! At home I have two computers acting as servers (I hope you like fish themed nicknames): “Tadpole” which is an old Raspberry Pi 2 running Ubuntu 20.04 that runs my
Cryptography, crime, terror, and surveillancehttps://mohit.uk/git-bin/epq/paper.html
suggesting that quantum computers will soon become powerful enough to start making current encryption methods obsolete. Although this will not be an overnight transformation, chan
About the IPSJ Computer Museum-Computer Museumhttp://museum.ipsj.or.jp/en/about/
historical Japanese computers and the people engaged in the development of those computers. Half a century has passed since the development of Japan's first electronic computers,
What The Hell Was The Microsoft Network?http://www.codersnotes.com/notes/the-microsoft-network/
I complain loudly about computers. Very Sleepy A C++ CPU profiler I helped make. Follow me: Subscribe (Fiction) Subscribe (Technical) Follow me at @grumpygiant Recent posts: Why B
net.techhttp://www.kushaldave.com/nettech.htm
offers viewpoints on computers and society. Newslinx offers daily web news. Hotwired has some excellent resources regarding web tools at its Webmonkey and Packet sections. Tech Ta
How to Start a Startuphttps://paulgraham.com/start.html
Hackers are so used to computers that they have no idea how horrifying software seems to normal people. Stephen Hawking's editor told him that every equation he included in his bo
Stop Writing Dead Programs, Strange Loop 2022https://jackrusher.com/strange-loop-2022/
are why so much of the internet still runs on it today (Facebook, Wikipedia, Tumblr, Slack, Etsy, WordPress, &c). 24:24.59 Now what about types? This is where half 24:24.60 of you
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
World's Top 500 Supercomputers Run Linux , The Cathedral and the Bazaar (Eric Raymond, 1997), The Hacker Spirit at MIT (Richard Stallman, 1999), Open Source And Economics , Math p
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
Anime Reviewshttp://www.geocities.ws/crazyjw18/animereviews.html
having all been done on computers. Music was good overall. I am not someone who usually even notices the overall background music(unless it is blatent like in Cowboy Bebop), but t
The Poverty of Primitivismhttps://bopsecrets.org/CF/primitivism.htm
in a liberated world computers and other modern technologies could be used to eliminate dangerous or boring tasks, freeing everyone to concentrate on more interesting activities.
Find more...