wiby  
Settings



Computer Hacking and Ethics

http://people.eecs.berkeley.edu/~bh/hackers.html

(When my high school programming students discovered that I actually knew how to program a computer, many of them decided I was crazy. Why should anyone want to teach when he coul

Article from PHILOSOPHY PATHWAYS Issue 99

http://philosophos.sdf.org/feature_articles/philosophy_article_106.html

would suggest 'bad programming'. Responsibility and Action Being conscious of one's self does not necessarily imply an understanding of the reasons for all of one's actions, as Fr

Welcome to the Retrocomputing Archive!

http://www.retroarchive.org/

contains all the DOS programming tools from Crescent Software. The page includes links to both zip files of the original disk contents as well as links to github repositories wher

Index of Creative Computing articles

https://www.atarimagazines.com/creative/index/

a circle. computer programming contest Chess champ. microcomputer chess The personal computer industry: potato chips to panty hose. Courting the digital muse - with a little help

Man-Computer Symbiosis

https://groups.csail.mit.edu/medg/people/psz/Licklider.html

memory organization, in programming languages, and in input and output equipment. 1 Introduction 1.1Symbiosis The fig tree is pollinated only by the insect Blastophaga grossorun .

Wilson Mines Co. links

http://WilsonMinesCo.com/links.html

simulators, OSs, programming languages, programmers' info assemblers for individual computer brands   (Acorn/BBC, AIM-65, Apple II & III, Atari, Commodore, others) 65-family

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/mon/oldnews.html

his book 'Machine Code Programming for the Nascom 1 & 2'. 2011-12-28 Rebecca Yates contributed the manual for Dungeon Quest and the game Dungeon Quest . 2011-12-25 Rebecca Yates c

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

integrity as well. Programming Satan's Computer is a phrase Roger Needham and I coined to express the difficulty of designing cryptographic protocols; it has recently been popular


Find more...