wiby  
Settings



"I Contribute to the Windows Kernel. We Are Slower Than Other Operating Systems. Here Is Why."

http://blog.zorinaq.com/i-contribute-to-the-windows-kernel-we-are-slower-than-other-oper/

about by technology and computers will benefit the business exclusively, with none of their benefits being shared with the employee. If productivity doubles, profit doubles, workl
I was explaining on Hacker News why Windows fell behind Linux in terms of operating system kernel performance and innovation. And out of nowhere an anonymous...

Alternative Operating System: Haiku OS | draft0 - a shared blog by just some people</t

https://draft0.de/entries/Haiku_OS.html

OS to be and much older computers run it just fine. There seems to be a not so small community of users and developers. Every new Beta that is released comes closer to a desktop O

S.F.T. Inc. - Software Tools, Engineering, and the Home of MRP III

http://www.mrp3.com/

the way we use our computers, whether we like it or not. Gnome version 3 and Microsoft Windows™ 8 both exhibit this, in my view, as well as Windows 10 [which is even WORSE].
Stewart~Frazier Tools, Inc. - Software and ElectronicsEngineering and Consulting, and maker of software tools forembedded systems, productivity enhancement, and data analysis.Our s

Alterslash, the unofficial Slashdot digest

https://alterslash.org/

attacks from quantum computers. While Google has said it is on track to migrate its own systems ahead of the 2035 timeline provided in NIST guidelines , last month leaders at the
Alterslash picks the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.

Kevin Boone: More like Windows every day

https://kevinboone.me/morelikewindows.html

on desktop and laptop computers in the '90s, long before it became a relatively mainstream thing to do. My first Linux distribution took the form of a shoe-box-sized stack of flop
The ease of installation and use of modern desktop Linux distributions comes at a price. I review a couple of low-complexity alternatives to mainstream Linux distributions: Alpine

Julia Evans

https://jvns.ca/

More drawings about computers Nov 2016 A few drawings about Linux Sep 2016 New zine: Linux debugging tools you'll love Jul 2016 A few sketches Apr 2015 A zine about strace Exe
Julia Evans

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

network of time-sharing computers" TX-2 at MIT Lincoln Lab and AN/FSQ-32 at System Development Corporation (Santa Monica, CA) are directly linked (without packet switches) via a d
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

The KA9Q NOS TCP/IP Package

http://www.ka9q.net/code/ka9qnos/

protocols for low-end computers; the first was MIT's PC/IP, which became the basis of the now-defunct company FTP Software, Inc. Unlike PC/IP, KA9Q NOS could simultaneously act as

How to Build a Low-tech Website? | LOW←TECH MAGAZINE

https://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/

shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
This is a solar-powered website, which means it sometimes goes offline

The Retrocomputing Museum

http://www.catb.org/retro/

Reduced Instruction Set Computers? Well, here is the concept taken to its logical extreme — an emulator for a computer with just one (1) instruction (Subtract and Branch if
A museum of archaic computer languages

Vulonkaaz's links

https://vulonkaaz.zip/links.html

be useful for school computers or whatever) Eaglercraft : Minecraft Java ported to web browser, lower performance than native java of course but it's crazy it even works, even hav

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs


Find more...