wiby  
Settings



Alternative Operating System: Haiku OS | draft0 - a shared blog by just some people</t

https://draft0.de/entries/Haiku_OS.html

OS to be and much older computers run it just fine. There seems to be a not so small community of users and developers. Every new Beta that is released comes closer to a desktop O

Kernel Planet

https://planet.kernel.org/

with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu

DOSBox v0.74-3 Manual

http://www.dosbox.com/DOSBoxManual.html

all other connected computers will respond to the ping and report the time it took to receive and send the ping message.   The syntax for IPXNET PING is: IPXNET PING   I

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

yet, three independent computers: Firstly, we’ve got DRC-WUP which is a System-on-Chip (SoC) hiding yet-another ARM926EJ-S (the same one from the Wii , how many of these do they h
An in-depth analysis that explains how this console works internally

Mandrake Expatriate Syndrome

http://greenfly.org/mes.html

I'm pretty good with computers, and managed to install Mandrake with no problems - but I didn't really know how it did anything. I did look into Linux from Scratch, but decided th

The little book about OS development

http://littleosbook.github.io/

rg/gustavo/blog/post/how-computers-boot-up Gustavo continues to describe what the kernel does in the very early stages at http://duartes.org/gustavo/blog/post/kernel-boot-process T

Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

of the art. But today's computers often have multiple cores and operate at speeds far in excess of 2Ghz, have gigabytes of RAM, terabytes of disk storage, and video resolution bet

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

Bit permutations

http://programming.sirrida.de/bit_perm.html

as was done on ancient computers. Today only base 2 (i.e. bits) is used, and this is what is crucially needed for all bit operations. If signed numbers are present, it is assumed
An essay about bit permutations in software

Greg's Domain

http://wooledge.org/~greg/index2.html

taken some photos . Computers I use Debian GNU/Linux and OpenBSD on cheap x86 hardware. Windows has its place (preferably the trash bin), but I'll take a free Unix system any day.

Daring Fireball

https://daringfireball.net/

made its phones and computers. [...] But that all changed with AI. Amazon is spending $200 billion this year on AI data centers. Google, $185 billion. Microsoft, $114 billion. Met
Commentary on Apple, technology, design, politics, and more.


Find more...