wiby  
Settings



YOU are the Dead Internet.

https://lukesmith.neocities.org/vids/dead_net

unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co

Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Fuck Big Tech: A Privacy Guide

https://fuckbigtech.neocities.org/

If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional. You best start believing in cyberpunk dystopias, you are in one.

Goodbye DMOZ

https://websitering.neocities.org/DMOZMemory

they should teach their computers to tell the good links from the bad. I made an exception here.
An eulogy for the Open Directory Project, with thoughts on using & editing the directory. Also a defence of the directory.

The Craft of Text Editing

https://www.finseth.com/craft/

predated most personal computers and workstations. There had even been a chapter in an early draft that attempted to prove that it was not possible to implement an Emacs-type text

Genetic Programming: Will Bill Gates become Billy Appleseed?

http://www.genetic-programming.com/published/computerbits0696.html

On the Programming of Computers by Means of Natural Selection by John R. Koza. (You'll find his home page at http://www-leland.stanford.edu/~phred/john.html .) The book interested

Robert Heinlein, The Libertarian in the Lifeboat

https://friesian.com/heinlein.htm

of other sentient computers in several books. Thus, for some reason Heinlein avoids giving Mike his say in propria persona . Looking back over Heinlein's body of work, one is temp

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres

DVD FAQ

https://demystified.info/dvdfaq.html

the disc? [4] DVD and Computers [4.1] Can I play DVD movies on my computer? [4.1.1] Can I play DVD-Audio discs on my computer? [4.2] What are the features and speeds of DVD drives
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.

Publishing and Linking on the Web

https://www.w3.org/2001/tag/doc/publishingAndLinkingOnTheWeb-2011-10-27.html

for both humans and computers. Reusers that do not change the information from the origin server may be used to simplify access to the origin server (by mapping simple URLs to a m

NABS - Natural Arch Identification

http://www.naturalarches.org/archinfo/identification.htm

will be mainly used by computers. People will still use names and shorter references. But the standard gives computers what they need for precise and rigorous identification. Of c


Find more...