wiby  
Settings



Democratic Rationalization: Technology, Power and Freedom [Andrew Feenberg]

https://www.dogma.lu/txt/AF_democratic-rationalization.htm

especially in computers. Here we have a contemporary version of the dilemma of the bicycle discussed above. Progress of a generalized sort in speed, power, and memory goes on apac

SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

Don't Trust the Census.

http://www.toad.com/gnu/census.html

industries utilize computers to sharply lower their costs of operation, the Census Bureau has repeatedly botched its operations and squandered millions. The bureau will need to re

https://www.ietf.org/rfc/rfc2376.txt

https://www.ietf.org/rfc/rfc2376.txt

computing resources of computers, if they are performed many times. 5 The Byte Order Mark (BOM) and Conversions to/from UTF-16 The XML Recommendation, in section 4.3.3, specifies

Currency System - Privacy Policy

http://currencysystem.com/privacy/

data on the same computers which also function as web servers. Email Communications Should you contact us by email, you may receive a personal (manually-sent) and/or an automatic

The web site of Vas

https://vas.neocities.org/

but this time with more computers. Its weaknesses rear their head from the very first season and only grow worse. Waste of hype and acting skills. Stick to the first season and pr
The web site of Vas

Tom Swift: An Appreciation by Jeff Duntemann

http://www.duntemann.com/tomswift.htm

The personal computer. Computers were glaringly absent from the Swift canon. Here and there was an electromechanical calculator, and also an occasional slide rule. The rest of it

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

the resolvers on users' computers. IDNA allows the graceful introduction of IDNs not only by avoiding upgrades to existing infrastructure (such as DNS servers and mail transport a

Develop an Application

https://www.billdietrich.me/DevelopApplication.html

across browsers, security, server code may track or replicate state of DOM, duplicate code on client and server, user actions can interfere. Web App launcher : Icon on the desktop
Strategies, tools, and languages for developing applications for personal computers and smartphones

Procrastinators Club: Productivity is Overrated

https://www.procrastinators.org/oldsite/news.shtml

careful to protect our computers against Evil (worms, trojans, etc).  We employ common sense, firewalls, detection software, and antivirus programs to help us stay clean.&nbs

DX LISTENING DIGEST AUGUST 2003 ARCHIVE

http://www.w4uvh.net/dxldtd3h.html

such as the number of computers in the two Koreas. Many South Koreans are unaware of the program. But for decades, North Korea has considered it a propaganda tool aimed at destabi

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Modems can be used by C-Kermit onl


Find more...