History of Computing Science: The Turing Machinehttp://lecture.eingang.org/turing2.html
of modern computers that would follow. For example, the endless tape could be seen as a form of general purpose internal memory for the machine in that the machine was able to rea
Part of a multipage presentation on the history of computers. This page talks about Turing Machines.
2023: November - February Political Noteshttp://stallman.org/archives/2023-nov-feb.html
These cars are full of computers with nonfree software and little security. But the insecurity (like the surveillance) depends on their attempt to communicate by radio . If you de
The Karl Popper Webhttp://www.tkpw.net/
technology. It is not computers, Saturn V rockets, fission or fusion reactors, nor any of the exciting and fascinating products of an advanced industrial society that enable us to
For those interested in the philosophy of Karl Popper. Referenced by major institutions such as the B.B.C., The Encyclopaedia Britannica, and The British Science Museum. The site h
BOOK ON RECURRENT NEURAL NETWORKS - SEQUENCE LEARNING -PROGRAM LEARNING - FEEDBACK NETWORKS - FEEDBACK NEURAL NETWORK - RECURRENT NETS - CAMBRhttps://people.idsia.ch/~juergen/rnnbook.html
applications: general computers which can learn algorithms to map input sequences to output sequences, with or without a teacher. They are computationally more powerful and biolog
Harvard College Observatory History in Imageshttps://hea-www.harvard.edu/~fine/Observatory/computers.html
at this point. computers This page shows a list of all images tagged with "computers". [link] 1891 Earliest source: "[Observatory women computers], 1891." Harvard University Archi
Home Page For Umesh Vaziranihttp://people.eecs.berkeley.edu/~vazirani/
Quantum Mechanics and Computers, Spring 2005 CS70: Discrete Mathematics for Computer Science, Fall 2006 Algorithms, Fall 2006 Quantum Computing, Spring 2007 Quantum Computing, Spr
https://www.cs.mcgill.ca/~rdemori/https://www.cs.mcgill.ca/~rdemori/
Spoken dialogues with computers, Academic Press, 1998 Opinion analysis N. Camelin , F. Bechet , G Damnati , and R. De Mori Detection and Interpretation of Opinion Ex
Manipulating Matter - The Scientific Dictatorship as A Project in The Reconfiguration of Realityhttps://www.bibliotecapleyades.net/ciencia/ciencia_manipulatingmatter.htm
consciousnesses into computers or other bodies even on the other side of the solar system, or participate in a giant "hive mind", a network of intelligences connected th
Becoming physically immune to brute-force attacks - Seirdyhttps://seirdy.one/posts/2021/01/12/password-strength/
get outdated. As supercomputers grow more powerful, password strength recommendations need to be updated to resist stronger brute-force attacks. Passwords that are strong today mi
Using thermal physics, cosmology, and computer science to calculate password vulnerability to the biggest possible brute-force attack.
Libreboot – New Hampshire (USA) may soon enshrine Software Freedom into law. YOUR HELP IS NEEDED!https://libreboot.org/news/usa-libre.html
make the internet and computers in general more secure “Software authors deserve to be paid!” - In fact, many libre software devs are paid to work on Open Source! Many companies,
Free and open source software in your government.
Soviet Calculators Historyhttps://xnumber.com/xnumber/russian_calcs.htm
was a huge gap between computers and the most powerful keyboard adding devices. By 1961, Leningrad University had completed the design of the EKVM - Electronic Keyboard Comp
Ken Perrine: Papershttps://www.academiken.com/papers.html
Signals, Systems, and Computers , Nov. 7-10, 2010, Pacific Grove, California USA. (website) Nieman, Karl F., Kenneth A. Perrine, Keith H. Lent, Terry L. Henderson, T. J. Brudner a
Ken Perrine's conference papers.
Find more...