teknohog / Keyboard rantshttp://teknohog.godsong.org/rants/keyboards.php
into either writing or computers. It was almost an accident, as the art class was already full, but it changed my life for good in many ways. I guess such courses are considered t
A Guide to Isaac Asimov's Essayshttp://www.asimovonline.com/oldsite/essay_guide.html
science mathematics and computers astronomy physics chemistry geology biology zoology physiology microbiology robotics technology about himself religion and creationism women rati
Slower Newshttps://www.slowernews.com/
more solvable. Tools: Computers: Your phone vs Supercomputers. | ARM got so successful without the public noticing. | Apple M1 means Intel’s disruption is now complete. | Using a
Keep up with relevant trends, micro-trends and edge cases without spending a shit-ton of time distilling trivia.
Grumpy Gamerhttp://grumpygamer.com/
everyone was afraid computers would take their jobs. And they were right. Computers did. There are fewer longshoremen because of automated ports, short-haul commercial flights don
Ron Gilbert's often incoherent and bitter ramblings about the Game Industry
Sun Blade 100https://www.finnie.org/text/computers/sunblade100/
(read: non-x86) computers. It wasn't until I brought it home that I realized how much work it would take to get it working again. The computer had been dropped on the front left c
Avoiding "The Botnet" - impossible?http://digdeeper.love/articles/botnet.xhtml
type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to
The Simulation Argument and the future of suffering: objections to The Hedonistic Imperativehttps://www.hedweb.com/object35.htm
lucky. Yet what digital computers have to tell us about the ultimate mysteries of consciousness and existence remains elusive. At any rate, no attempt will be made here exhaustive
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Let HD 5,25" FDDs operate at 300 rpm instead of 360 rpmhttp://www.oldskool.org/disk2fdi/525HDMOD.htm
without dedicated hardware, Disk2FDI requires a FDD rotating at 300 rpm. Therefore a DD/QD drive must be used, or a HD drive which is modified to constantly spin at 300 rpm. A sec
Find more...