wiby  
Settings



Memory part 2: CPU caches [LWN.net]

https://lwn.net/Articles/252125/

with other components of the system. We introduced the system bus as “FSB” which is the name in use today; see Section 2.2. In this section we ignore the Northbridge; it
The second part of Ulrich Drepper's 'What every programmer should know about memory' document [...]

Wii U Architecture | A Practical Analysis

https://www.copetti.org/writings/consoles/wiiu/

CPU cores with external components has an interesting history, dating back to 1993, with the launch of the Motorola 88110 . After the formation of the AIM alliance , IBM and Motor
An in-depth analysis that explains how this console works internally

A Minimal TTL Processor for Architecture Exploration

http://bradrodriguez.com/papers/piscedu2.htm

and removal of components, the PISC-2 can be configured as a PISC-1 (two-clock instructions), a separate microprogram machine, or a load/store machine. Program development in the

The Biggest Myths

http://0pointer.de/blog/projects/the-biggest-myths.html

is that we ship more components in a single tarball, and maintain them upstream in a single repository with a unified release cycle. Myth: systemd is about speed. Yes, systemd is
Posts and writings by Lennart Poettering

Windows XP

https://www.lehigh.edu/~skr5/winxpseminar.html

computer functions and components. The operating system also provides a platform from which application programs (i.e. MS Word, Corel WordPerfect, Netscape, etc.) can run. Source:

NeXT Monochrome "Slab"

http://www.obsolyte.com/next/

is that some of the components are inside the monitor and "shared" by the computer. For example, the Slab contains no power switch, keyboard connector, or any multimedia functiona
A website about the old workstations, focusing on unix systems. The only known archive of material.<

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

More" For open-source components : Bruce Mayhew's "Sonatype and HackerOne eliminate the pain of reporting open source software vulnerabilities" huntr Look for file "/.well-known/s
How to become a bug-bounty hunter and do penetration testing

Documents, Links & Videos

https://www.ed-thelen.org/comp-hist/merged.html

Labs, & ENIAC Hardware Components and Computer Design by Harry D. Huskey, Designer of the popular (1956) Bendix G15 ( from Google's cashe ) " Computer Structures: Principles and E

John Regehr's Home Page

https://users.cs.utah.edu/~regehr/

Workshop on Aspects, Components, and Patterns for Infrastructure Software (ACP4IS) , Boston, MA, March 17 2003. How to Rapidly Prototype a Real-Time Scheduler . Luca Abeni and Joh

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys

datasheets of special components and the complete source code of the monitor were available from the beginning. The purpose of this page is to gather as many Nascom resources as p

Online BYTE Archive

https://halfhill.com/bytelink.html

Beans: Cross-Platform Components Yes, JavaBeans are another grating coffee pun. They're also prewritten software components that make it easier to build Java programs. Plugs for J

Biology’s Shameful Refusal to Disown the Machine-Organism

https://bwo.life/org/comm/ar/2014/machines_18.htm

a machine in which all components are molecules “talking” to one another in a logical manner . The hardware and software are complex biological molecules that activate one another
meta name=


Find more...