YOU are the Dead Internet.https://lukesmith.neocities.org/vids/dead_net
unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co
Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr
Fuck Big Tech: A Privacy Guidehttps://fuckbigtech.neocities.org/
If you have been on computers and the internet for a while, have you ever wondered how you could browse sites on a 56kbps dial-up connection, and now, with hundreds of MBs of band
Big Tech strives to end privacy and make massive surveillance non-optional. You best start believing in cyberpunk dystopias, you are in one.
Goodbye DMOZhttps://websitering.neocities.org/DMOZMemory
they should teach their computers to tell the good links from the bad. I made an exception here.
An eulogy for the Open Directory Project, with thoughts on using & editing the directory. Also a defence of the directory.
The Craft of Text Editinghttps://www.finseth.com/craft/
predated most personal computers and workstations. There had even been a chapter in an early draft that attempted to prove that it was not possible to implement an Emacs-type text
Genetic Programming: Will Bill Gates become Billy Appleseed?http://www.genetic-programming.com/published/computerbits0696.html
On the Programming of Computers by Means of Natural Selection by John R. Koza. (You'll find his home page at http://www-leland.stanford.edu/~phred/john.html .) The book interested
Robert Heinlein, The Libertarian in the Lifeboathttps://friesian.com/heinlein.htm
of other sentient computers in several books. Thus, for some reason Heinlein avoids giving Mike his say in propria persona . Looking back over Heinlein's body of work, one is temp
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
sending it to the cloud computers, in order to ensure secrets are not leaked. But how can a cloud computer compute on encrypted data? The SMC (secure multi-party computation) comm
The unix programming environmenthttp://www.talisman.org/unix/burgess-guide.html
well on large scale computers (with many processors) and small computers which fit in your suitcase! All of the basic mechanisms required of a multi-user operating system are pres
DVD FAQhttps://demystified.info/dvdfaq.html
the disc? [4] DVD and Computers [4.1] Can I play DVD movies on my computer? [4.1.1] Can I play DVD-Audio discs on my computer? [4.2] What are the features and speeds of DVD drives
The official DVD FAQ (Frequently Asked Questions about DVD). The most comprehensive source of DVD technical information in the galaxy. By Jim Taylor.
Publishing and Linking on the Webhttps://www.w3.org/2001/tag/doc/publishingAndLinkingOnTheWeb-2011-10-27.html
for both humans and computers. Reusers that do not change the information from the origin server may be used to simplify access to the origin server (by mapping simple URLs to a m
NABS - Natural Arch Identificationhttp://www.naturalarches.org/archinfo/identification.htm
will be mainly used by computers. People will still use names and shorter references. But the standard gives computers what they need for precise and rigorous identification. Of c
Find more...