wiby  
Settings



Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

that is, that as computers are becoming increasingly embedded in our world, what the code does, allows, and prohibits, controls what we may or may not do in a powerful way. In par
This paper provides quantitative data that, in many cases, open source software

Jose Explains Why Not Mono

http://techrights.org/o/2008/11/25/jose-on-mono/

Control Over Their Computers Red Hat under IBM is a total catastrophe Arvind Says... Something Something "Hey Hi" (the State of Today's Media) Look for news about IBM and most lik
Our reader Jose explains the dangers of embracing Novell's Mono

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2007/

disconnected from computers: so, surprised when I said I worked on OpenOffice to a room full of people to fund that 4 out of 6 had it installed, and were using it - and one of the

Jeff Duntemann's ContraPositive Diary

http://www.duntemann.com/november2008.htm

introduction to what computers actually are , and how Intel-based machines function under the hood. It's about that waydeepdown place where the software meets the hardware. It is

DEC PDP-11 History

http://williambader.com/museum/vax/pdphistory.html

theory of evolution of computers called the Instruction Set Processor (ISP). This language provides a concise and powerful generalized method for defining an abritrary computer sy

40th Anniversary Kermit protocol

https://kermitproject.org/fortieth.html

possible variety of computers and operating systems including our own DEC-20 mainframes , our IBM mainframes , and the " Superbrain " CP/M microcomputer we were about to place in

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

NLnet; All projects

https://nlnet.nl/project/index.html

ARM-based single board computers ARMify NGI0 Entrust 2023 2025 Auto-Identification of MCU Models to Simplify ARM Bare-Metal Reverse Engineering ARPA2 2017 Working towards a decent

Beej's Guide to Network Programming

https://beej.us/guide/bgnet/html/

in the world of computers: Donald Knuth, Bruce Schneier, W. Richard Stevens, and The Woz, my Readership, and the entire Free and Open Source Software Community. 1.11 Publishing In

Resume -- Chip Morningstar

http://www.fudco.com/chip/resume.html

devices, and personal computers, used by both consumers and enterprises. During my tenure there the system had around 200 million registered users worldwide. Most of my work at Ev

GuestArticles index [LWN.net]

https://lwn.net/Archives/GuestIndex/

generates 350 Linux computers for schools (March 19, 2008) Fioretti, Marco A look at free software in Ecuador (December 3, 2008) Fleming, Matt The bootstrap process on EFI systems

David A. Wheeler's Blog

https://dwheeler.com/blog/2011/

I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious


Find more...