wiby  
Settings



The Anatomy of a Search Engine

http://infolab.stanford.edu/~backrub/google.html

As the capabilities of computers increase, it becomes possible to index a very large amount of text for a reasonable cost. Of course, other more bandwidth intensive media such as

YOU are the Dead Internet.

https://lukesmith.neocities.org/vids/dead_net

unlike personal computers, are used only for content consumption and give the user almost no power at all. I think in 10 years personal computers will be gone, people will just co

How bad are search results? Let's compare Google, Bing, Marginalia, Kagi, Mwmbl, and ChatGPT

http://danluu.com/seo-spam/

few users interact with computers, that doesn't appear to be normal, even among people who are quite competent in various technical fields, e.g., mechanical engineering 2 . Howeve

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

The Kernel Hacker's Bookshelf: Ultimate Physical Limits of Computation [LWN.net]

https://lwn.net/Articles/286233/

existing quantum computers have already attained the ultimate limit on computational speed - on a very small number of bits and in a research setting, but attained it nonetheless.
Moore's Law - we all know it (or at least think we do). To be annoyingly exact, Moore's Law i [...]

Svedic.org

https://svedic.org/

. Posted in Programming Computers Have Had Emotions for Quite Some Time Posted on September 29, 2017 by svedic A common assumption is that computers can’t have emotions. But there

Web Surfing

http://web.cs.wpi.edu/~jshutt/surfing.html

Interacting with Computers , 2016) (26-Apr-19; 07-Jan-21) The Craft of Text Editing --or-- Emacs for the Modern World (Craig A. Finseth, 1999) (24-Jul-19; 11-Jan-21) Evil Mode: Or

Luke Smith Fanclub & Archive

https://lukesmith.neocities.org/

Technology Only Use Old Computers! tl;dr: modern computers are overpriced spyware; old ThinkPads are cheap, durable, repairable; Linux runs fast on them; most people need nothing
LukeSmith.xyz fanclub and archive – removed articles, lost videos, and community opinions. Explore content no longer on lukesmith.xyz.

Digital Freedom across the World

https://eylenburg.github.io/countries.htm

all smartphones and computers sold in Russia must come with pre-installed Russian software, which most likely facilitates government access to these devices anyway. In practice, R
{REPLACE THIS}

Digital History | Promises and Perils of Digital History

https://chnm.gmu.edu/digitalhistory/introduction/

will be scanned into computers and made available to anyone, anywhere, almost instantly, over high-speed networks.” Not to be outdone by his authors, Wired publisher Louis R

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.


Find more...