Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!https://dwheeler.com/oss_fs_why.html
that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software
Web 3.0 / Heartwarehttps://www.heartcom.org/CulturalDNA.htm
time geek “BC” (Before Computers) ~~~~~~~~~ Conscious evolution on Earth has accelerated dramatically with the computer/Internet revolution. A senior generation has now witn
The Four Waves of the Computer-Internet Revolution as tech emphasis evolves from hardware and software to netware and "heartware"
Verilog Won & VHDL Lost? — You Be The Judge!http://danluu.com/verilog-vs-vhdl/
Howard Landman of Hal Computers never realized he had put both a complete behavioral and a complete hand instanced parity tree in his source Verilog. (Synopsys Design Compiler jus
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2017/
Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t
CRN / Unixhttp://crn.hopto.org/unix.html
into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.
https://www.rogerarrick.com/osiris/burgett.txthttps://www.rogerarrick.com/osiris/burgett.txt
DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ
The NSA - The Super Secret National Security Agencyhttps://www.bibliotecapleyades.net/sociopolitica/sociopol_nsa.htm
to Infect 'Millions' of Computers with Malware - How the NSA Spies on Your Google and Yahoo Accounts - Inside TAO - Documents Reveal Top NSA
September 11th Conspiracy Theoryhttp://www.911conspiracytheory.net/
like desks, cubical's, computers, copy machines file cabinets etc. before the inner support column the wings(or even the fuselage practically which is basically a fireball at this
How the government caused 911.
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
that gets my attention. Computers, public transit, politics, art, science, recipes, personal experiences… whatever comes into my mind. Most articles are written in German, a few a
/useshttps://uses.tech/
Software Engineer & Computers Lover Senior Developer Full Stack Python JavaScript Java C# .NET .NET Core ASP.NET Core MSSQL Server T-SQL Oracle PL/SQL PostgreSQL Angular Flask
A list of
Directory | An IndieWeb Webringhttps://xn--sr8hvo.ws/directory
idols, music, comics, computers, and much more. octospacc.altervista.org/author/minioctt Octt hliimatta.me hliimatta practicing.design practicing.design: my thoughts on design, pr
An IndieWeb Webring
Hawaii Five-0 (2010) -- Season 1 Episode Reviews - including Oddities, Goofs and Triviahttps://www.fiveohomepage.com/2010-log1.htm
who has a bank of computers in his house in a hidden room, was on his way to warn army bigshot General Tom Nathanson (Ned Van Zandt) about serious security threats to Hawaii. When
Hawaii Five-0 (2010) -- Season 1 Episode Reviews
Find more...