wiby  
Settings



History of Computing Science: The Turing Machine

http://lecture.eingang.org/turing2.html

of modern computers that would follow. For example, the endless tape could be seen as a form of general purpose internal memory for the machine in that the machine was able to rea
Part of a multipage presentation on the history of computers. This page talks about Turing Machines.

2023: November - February Political Notes

http://stallman.org/archives/2023-nov-feb.html

These cars are full of computers with nonfree software and little security. But the insecurity (like the surveillance) depends on their attempt to communicate by radio . If you de

The Karl Popper Web

http://www.tkpw.net/

technology. It is not computers, Saturn V rockets, fission or fusion reactors, nor any of the exciting and fascinating products of an advanced industrial society that enable us to
For those interested in the philosophy of Karl Popper. Referenced by major institutions such as the B.B.C., The Encyclopaedia Britannica, and The British Science Museum. The site h

BOOK ON RECURRENT NEURAL NETWORKS - SEQUENCE LEARNING -PROGRAM LEARNING - FEEDBACK NETWORKS - FEEDBACK NEURAL NETWORK - RECURRENT NETS - CAMBR

https://people.idsia.ch/~juergen/rnnbook.html

applications: general computers which can learn algorithms to map input sequences to output sequences, with or without a teacher. They are computationally more powerful and biolog

Harvard College Observatory History in Images

https://hea-www.harvard.edu/~fine/Observatory/computers.html

at this point. computers This page shows a list of all images tagged with "computers". [link] 1891 Earliest source: "[Observatory women computers], 1891." Harvard University Archi

Home Page For Umesh Vazirani

http://people.eecs.berkeley.edu/~vazirani/

Quantum Mechanics and Computers, Spring 2005 CS70: Discrete Mathematics for Computer Science, Fall 2006 Algorithms, Fall 2006 Quantum Computing, Spring 2007 Quantum Computing, Spr

https://www.cs.mcgill.ca/~rdemori/

https://www.cs.mcgill.ca/~rdemori/

Spoken dialogues with computers, Academic Press, 1998   Opinion analysis   N. Camelin , F. Bechet , G Damnati , and R. De Mori Detection and Interpretation of Opinion Ex

Manipulating Matter - The Scientific Dictatorship as A Project in The Reconfiguration of Reality

https://www.bibliotecapleyades.net/ciencia/ciencia_manipulatingmatter.htm

consciousnesses into computers or other bodies even on the other side of the solar system, or participate in a giant "hive mind", a network of intelligences connected th

Becoming physically immune to brute-force attacks - Seirdy

https://seirdy.one/posts/2021/01/12/password-strength/

get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today mi
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.

Libreboot – New Hampshire (USA) may soon enshrine Software Freedom into law. YOUR HELP IS NEEDED!

https://libreboot.org/news/usa-libre.html

make the internet and computers in general more secure “Software authors deserve to be paid!” - In fact, many libre software devs are paid to work on Open Source! Many companies,
Free and open source software in your government.

Soviet Calculators History

https://xnumber.com/xnumber/russian_calcs.htm

was a huge gap between computers and the most powerful keyboard adding devices. By 1961,  Leningrad University had completed the design of the EKVM - Electronic Keyboard Comp

Ken Perrine: Papers

https://www.academiken.com/papers.html

Signals, Systems, and Computers , Nov. 7-10, 2010, Pacific Grove, California USA. (website) Nieman, Karl F., Kenneth A. Perrine, Keith H. Lent, Terry L. Henderson, T. J. Brudner a
Ken Perrine's conference papers.


Find more...