Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!https://dwheeler.com/oss_fs_why.html
that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software
Jose Explains Why Not Monohttp://techrights.org/o/2008/11/25/jose-on-mono/
Control Over Their Computers Red Hat under IBM is a total catastrophe Arvind Says... Something Something "Hey Hi" (the State of Today's Media) Look for news about IBM and most lik
Our reader Jose explains the dangers of embracing Novell's Mono
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2007/
disconnected from computers: so, surprised when I said I worked on OpenOffice to a room full of people to fund that 4 out of 6 had it installed, and were using it - and one of the
Jeff Duntemann's ContraPositive Diaryhttp://www.duntemann.com/november2008.htm
introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is
DEC PDP-11 Historyhttp://williambader.com/museum/vax/pdphistory.html
theory of evolution of computers called the Instruction Set Processor (ISP). This language provides a concise and powerful generalized method for defining an abritrary computer sy
40th Anniversary Kermit protocolhttps://kermitproject.org/fortieth.html
possible variety of computers and operating systems including our own DEC-20 mainframes , our IBM mainframes , and the " Superbrain " CP/M microcomputer we were about to place in
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
NLnet; All projectshttps://nlnet.nl/project/index.html
ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent
Beej's Guide to Network Programminghttps://beej.us/guide/bgnet/html/
in the world of computers: Donald Knuth, Bruce Schneier, W. Richard Stevens, and The Woz, my Readership, and the entire Free and Open Source Software Community. 1.11 Publishing In
Resume -- Chip Morningstarhttp://www.fudco.com/chip/resume.html
devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev
GuestArticles index [LWN.net]https://lwn.net/Archives/GuestIndex/
generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems
David A. Wheeler's Bloghttps://dwheeler.com/blog/2011/
I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious
Find more...