wiby  
Settings



The Anatomy of a Search Engine

http://infolab.stanford.edu/~backrub/google.html

As the capabilities of computers increase, it becomes possible to index a very large amount of text for a reasonable cost. Of course, other more bandwidth intensive media such as

What Is The Cloud?

http://toastytech.com/about/thecloud.html

mainframes, and minicomputers. What clustering meant is that a single machine node in a cluster could go down, and other machine nodes would take over. End users would still be ab

Hard Drivin'/Race Drivin' Schematics

http://www.jmargolin.com/schem/schems.htm

  My desktop computers are insulated in the front and on the sides. The only exposed metal that is grounded is the exposed grounded chassis in the back.   You can attach

#youbroketheinternet (YBTI)

https://youbroketheinternet.org/

obtain control over computers on the entire planet, and how the new TCP Stealth technology developed by the presenter provides obstacles to the massive port scanning. GNU Internet

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

alt.2600 FAQ, Beta .013 - Part 1/1

http://webarchive.me/geocities/SiliconValley/2072/2600faq.txt

Nietzsche Section A: Computers 01. How do I access the password file under Unix? 02. How do I crack Unix passwords? 03. What is password shadowing? 04. Where can I find the passwo

Market Ticker Frequently Asked Questions

http://tickerforum.org/faq.html

(e.g. how many unique computers access the forum) and, if you are signed in, can be correlated with your login ID. Note that if you browse through the various areas on the system
Tickerforum Frequently Asked Questions

Responses to the Copyright Crisis

https://www.templetons.com/brad/copysolve.html

television and even all computers. These laws would make it illegal to make or sell computers, televisions, video and audio recorders and players which did not enforce DRM rules.

Ian! D. Allen - Personal Home Page

http://www.idallen.com/

language in relation to computers. This is the implementation of the "cave man" interface: you point, and you grunt. And if we reduce the interaction between human beings and comp

OS-9 Frequently Asked Questions

https://pages.cs.wisc.edu/~pruyne/os9faq.html

to large multiuser minicomputers. Originally developed for the 6809 microprocessor, OS-9 was a joint effort between Microware and Motorola. The original version of OS-9 (OS-9 Leve

Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

were only 50 or 100 computers on the Internet. Annotated Timeline of Internet and e-commerce early 1960s: packet-switched computer networking developed 1962: Licklider proposes "I

1401 Stories

https://ibm-1401.info/Stories.html

out errors before the computers arrived. I built a lot of muscles there, horsing hundred-tray files from end to end of the building and back again, then merging corrected cards ba


Find more...