Speedrunning Computer Games History with a 6yr Old - Part 1 · duncanlock.nethttps://duncanlock.net/blog/2020/12/27/speedrunning-computer-games-history-with-a-6yr-old-part-1/
home computer. Home computers were very new back then and I’d never used one before. We played games on it. A lot. Asteriods , Frogger , Missile Strike , Twin Kingdom Valley
The kid doesn't really know any better, so we can play Space Invaders unsullied by time and expectations and enjoy a speedrun through gaming history, playing just the highlights.
Extra Ordinary | D. Griffin Joneshttps://www.dgriffinjones.com/
humans work, not how computers work. It makes me sad seeing perfectly good knowledge already accessible 30 years ago being completely ignored or thrown away today. A saying that r
A blog about technology, software and more.
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Juergen Schmidhuber's AI Bloghttps://people.idsia.ch/~juergen/blog.html
of transistors in our computers and smartphones are FETs of the Lilienfeld type. See also: who invented the transistor? ★ Nov 2025. Who invented artificial neural networks?
'AI Blog of Juergen Schmidhuber'
libraryhttps://kyl.neocities.org/libraryarchives
[HIS ROJ] the first computers - history and architectures [HIS SCO] against the grain [HIS SEI] zero - the biography of a dangerous idea [HIS SER] deep ancestors - practicing the
CipherSaber Home Pagehttps://ciphersaber.gurus.org/
come with all DOS based computers, is suitable. It can still be found on the Microsoft Windows '95 CD-ROM in the OTHER\OLDMSDOS directory, and on the Microsoft Windows '98 CD-ROM
Fight the crypto ban by learning how to write your own strong encryption program.
SmartFilter - I've Got A Little Listhttp://sethf.com/anticensorware/smartfilter/gotalist.php
mystique attached to computers. They're too often thought as mysterious entities, with inner workings which are beyond comprehension. But in fact, the operation of computer progra
Why censorware blacklists are inherently inaccurate, both technically and politically, with SmartFilter as a case study
Measuring the Webhttp://www.tbray.org/ongoing/When/199x/1996/05/07/OVERVIEW.HTM
run on different computers, and exist to serve quite different purposes. Formalizing the notion of a "site" causes some information loss, but allows us to develop some u
HP Computer Museumhttps://hpmuseum.net/display_item.php?hw=242
Desktops Early Calc and Computers (1968) 98X5 Computers (1975) 80 Series (1980) 200 Series (1981) 500 Series (1982) Handheld (1983) Integral (1984) 300 Series (1985) 400 Series (1
The museum of HP computers is a collection of HP computing products introduced between 1966 and 1991. The museum contains: calculators, desktop computers, computer systems, tape dr
Nightwind's Home Pagehttps://www.fur.com/nighty/
I like working with computers and my previous job was involving system administration duties, software installs/upgrades, account maintaining, and other assorted tasks . I live a
Stop Writing Dead Programs, Strange Loop 2022https://jackrusher.com/strange-loop-2022/
also a 11:59.87 full Software Transactional Memory 12:01.06 implementation that frankly nobody uses, 12:02.63 but it's still great. It just has a more 12:05.50 complicated API, an
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
Find more...