SmallTalk Hosts julkinen
[search 0]
Lisää
Download the App!
show episodes
 
Loading …
show series
 
A computer designed to be used with a mouse, keyboard, monitor, and printer could sound like any computer you've used, all made possible by a graphical user interface used on the Xerox Alto. Tom explores its history. Featuring Tom Merritt. Full episode transcript here. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
In 1969, the chief scientist at Xerox, Jack Goldman, decided to found a west-coast research center in Palo Alto, right down the road from Engelbart's SRI. Xerox's Palo Alto Research Center or PARC was far enough from headquarters in Rochester, New York, that scientists could feel a little freer to experiment. Featuring Tom Merritt. Full show transc…
  continue reading
 
The predictive capabilities of ChatGPT and other programs based on Large Language Models really seem to infer an artificial intelligence. How do the applications work...and are they sentient? Tom explains why you shouldn't fear ChatGPT. Featuring Tom Merritt. Full transcript here. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
The word processor never got "invented" as such, it just slowly developed out of things like typewriters and even slowly merged from electronic appliances into software. To understand the origin of the word processor you and I would recognize, the one with bold, italic, underline, we need to follow the journey of future space tourist Charles Simony…
  continue reading
 
You all know what a mouse is. It’s so common, that you probably don't even think that much about why it's called a mouse. But back in 1968, the man generally credited with the invention of the mouse, Douglas Engelbart, had to apologize for what was certainly a silly name. Featuring Tom Merritt. Full episode transcript here. Hosted on Acast. See aca…
  continue reading
 
Passkeys use something called public key cryptography. They have your public key. And because it’s public, it doesn’t matter if anyone gets it. That public key and your private key combine to validate who you are. But how does that work? Wouldn’t they have to know something besides the public key that’s unique to you? No. That’s the brilliance of i…
  continue reading
 
We update the history of Section 230 in light of the recent Supreme Court decisions. What it is, what it isn't and how those decisions affected or didn't affect the future of the "safe harbor" law in the US. Featuring Tom Merritt. Full episode transcript here. Hosted on Acast. See acast.com/privacy for more information.…
  continue reading
 
By 1998 the US had passed its Digital Millennium Copyright Act. And partly because the US generates so much copyrightable material, and partly just because it’s the US and is a little pushy on the world stage, the DMCA became the de facto way of handling copyright protections on the internet around the world. But what is it? Why did we need the DMC…
  continue reading
 
Taiwan is at once one of the most vexing political situations on the globe and one of the most important to the world of technology. But few people understand how it got to be either. And understanding that is essential to understanding what might happen next and how that matters a LOT for the technology industry. Let's help you Know a Little More …
  continue reading
 
Loading …

Pikakäyttöopas