wiby  
Settings



Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

Web 3.0 / Heartware

https://www.heartcom.org/CulturalDNA.htm

time geek “BC” (Before Computers) ~~~~~~~~~ Conscious evolution on Earth has accelerated dramatically with the computer/Internet revolution.  A senior generation has now witn
The Four Waves of the Computer-Internet Revolution as tech emphasis evolves from hardware and software to netware and "heartware"

Verilog Won & VHDL Lost? — You Be The Judge!

http://danluu.com/verilog-vs-vhdl/

Howard Landman of Hal Computers never realized he had put both a complete behavioral and a complete hand instanced parity tree in his source Verilog. (Synopsys Design Compiler jus

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

https://www.rogerarrick.com/osiris/burgett.txt

https://www.rogerarrick.com/osiris/burgett.txt

DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ

The NSA - The Super Secret National Security Agency

https://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm

to Infect 'Millions' of Computers with Malware    -  How the NSA Spies on Your Google and Yahoo Accounts    -  Inside TAO - Documents Reveal Top NSA

September 11th Conspiracy Theory

http://www.911conspiracytheory.net/

like desks, cubical's, computers, copy machines file cabinets etc. before the inner support column the wings(or even the fuselage practically which is basically a fireball at this
How the government caused 911.

Ye Olde Blogroll - Because blogs are the soul of the web

https://blogroll.org/

that gets my attention. Computers, public transit, politics, art, science, recipes, personal experiences… whatever comes into my mind. Most articles are written in German, a few a

/uses

https://uses.tech/

Software Engineer & Computers Lover Senior Developer Full Stack Python JavaScript Java C# .NET .NET Core ASP.NET Core MSSQL Server T-SQL Oracle PL/SQL PostgreSQL Angular Flask
A list of

Directory | An IndieWeb Webring

https://xn--sr8hvo.ws/directory

idols, music, comics, computers, and much more. octospacc.altervista.org/author/minioctt Octt hliimatta.me hliimatta practicing.design practicing.design: my thoughts on design, pr
An IndieWeb Webring

Hawaii Five-0 (2010) -- Season 1 Episode Reviews - including Oddities, Goofs and Trivia

https://www.fiveohomepage.com/2010-log1.htm

who has a bank of computers in his house in a hidden room, was on his way to warn army bigshot General Tom Nathanson (Ned Van Zandt) about serious security threats to Hawaii. When
Hawaii Five-0 (2010) -- Season 1 Episode Reviews


Find more...