wiby  
Settings



Q4OS - desktop operating system

https://q4os.org/blog.html

tablets, single board computers, embedded devices and more. Q4OS on ARM devices runs fast and is pretty snappy. Q4OS is one of the few distributions that offers a full featured de

S.F.T. Inc. - Software Tools, Engineering, and the Home of MRP III

http://www.mrp3.com/

the way we use our computers, whether we like it or not. Gnome version 3 and Microsoft Windows™ 8 both exhibit this, in my view, as well as Windows 10 [which is even WORSE].
Stewart~Frazier Tools, Inc. - Software and ElectronicsEngineering and Consulting, and maker of software tools forembedded systems, productivity enhancement, and data analysis.Our s

What made the PC, Mac, and Linux so great (or not)

http://toastytech.com/guis/macvspc.html

What made Personal Computers great The story of the "Personal Computer" started before the IBM PC. The earliest personal computers included machines such as the Altair, TRS-80, Co

Linux commands and files

http://webarchive.me/geocities/SiliconValley/2072/linux.htm

It stores the names of computers on the LAN. This works sort of like DNS, except that instead of running a dedicated name server, it's just a table of addresses and corresponding

SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Libreboot – Frequently Asked Questions about Libreboot firmware

https://libreboot.org/faq.html

devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs

The Xinu Page

https://xinu.cs.purdue.edu/

donates LSI-11 computers and project starts to explore how to integrate network protocol software into an operating system 1979-80 1980-81 1981-82 1982-83 1983-85 1985-86 1985- 19

Loper OS » No Formats, no Format Wars.

http://www.loper-os.org/?p=309

If this isn't how our computers work, why do we act as if it were?  The core idiocy of all web format wars lies in the assumption that there must necessarily be a pre-determined,

intro

https://srobb.net/

us who have dealt with computers and the internet for awhile have all had this experience--our friend calls, and says, 'Guess what? I'm finally hooked up to the internet and got 5

Open Voices Podcast with Linus Torvalds - WackoWiki

https://wackowiki.org/doc/Org/Articles/LinusTorvalds

completely new uses of computers and that might just happen because computers get pushed down and become cheaper and that might change the whole picture of operating systems. But

https://www.humprog.org/~stephen/

https://www.humprog.org/~stephen/

believe (as I do) that computers are for augmenting the human intellect , not just for high-performance data crunching. I believe that technology cannot be pursued in isolation. &


Find more...