computer   117876

« earlier    

not living in a computer simulation
The sci-fi trope might now be put to rest after scientists find the suggestion that reality is computer generated is in principle impossible, writes Andrew Masterson.
rugbyii  computer  simulation 
22 hours ago by Superfine
(6) bigkif - YouTube - YouTube
nice collection of vintage computer demos
engelbert  mother  of  all  demos  computer  lisa  pong  xerox 
yesterday by fang
Use the System File Checker tool to repair missing or corrupted system files
In case something's acting up, instructions for running sfc /scannow
yesterday by kuiskata
MNT Reform: DIY Portable Computer
For a long time, I wanted a portable personal computer which you can…
Repair by yourself with parts from the hardware store or 3D printing
Thoroughly understand on any level
Take apart, modify and upgrade without regret
Adapt to your tastes and use cases, staying with you for many years
In Summer/Autumn 2017 I teamed up with industrial designer Ana Dantas to make this machine happen. Three months later, I can type this article on the first prototype of Reform, our DIY portable computer.
diy  computer  linux  electronics  hacking 
2 days ago by ssorc
IoT Cybersecurity: What's Plan B? - Schneier on Security
"The Internet is dangerous -- and the IoT gives it not just eyes and ears, but also hands and feet. Security vulnerabilities, exploits, and attacks that once affected only bits and bytes now affect flesh and blood.

Markets, as we've repeatedly learned over the past century, are terrible mechanisms for improving the safety of products and services. It was true for automobile, food, restaurant, airplane, fire, and financial-instrument safety. The reasons are complicated, but basically, sellers don't compete on safety features because buyers can't efficiently differentiate products based on safety considerations. The race-to-the-bottom mechanism that markets use to minimize prices also minimizes quality. Without government intervention, the IoT remains dangerously insecure."
computer  security  usa  law  internet  future 
2 days ago by ssam

« earlier    

related tags

17  2017  3d  addictive  ai  algorithm  algorithms  all  android  apple  archive  arduino  art  automation  awesome  bias  blackboard  board  book  boots  build  business_models  c  car  career  cell  cg  chemnitz  chip  clothing  code  comingofage  computer-hardware-drives  computer-science  computerscience  configuration  course  courses  courses_-_online  cs  custom  data  datentec  dell  demos  design  desktop  deutschland  development  diy  do-it-yourself  documents  download  dresden  ebay  education  electronics  emulator  engelbert  example  excellent  face  faceter  freebsd  friends  future  game  gamer  games  gaming  gfx  giftideas  github  gnu-linux  graphics  guide  guides  hack  hackernews  hacking  hardware  harvard  hci  history  howto  human-computer  human  ideo  ifttt  incredible  inequality  innovation  intel  interaction  interesting  internet  interview  interviews  iphone  it  itk  keyboard  lang:fr  languages  laptop  latency  law  learn  learning  leipzig  libvirt  linux  lisa  list  lists  ltt  man-computer  man-machine  manufacturing  math  maths  microsoft  millikelvin  mmh  mother  mouse  network  networking  nuc  numa  nvidia  of  operating  os  ovetta  papers  parts  pc  performance  philosophy  plussize  pong  practice  printer  programmers  programming  python  quantum  qubit  raspberry  raspberry_pi  recognition  recommendation  remotezugang  research  resources  robots  rugbyii  sachsen  scan  science  security  server  servers  sfx  shopping  simulation  software  sort  space  speak  special  startrek  starwars  structure  structures  superconducting  superconductor  surveilance  systems  tablet  teach  teaching  tech-howto  tech  to-do  to-teach  toner  tools  topology  trello  tutorial  type-article  ubc  usa  video  videocard  vim  vintage  virtualization  vision  win10  xerox  yourself 

Copy this bookmark: