Full Width [alt+shift+f] Shortcuts [alt+shift+k]
Sign Up [alt+shift+s] Log In [alt+shift+l]

New here?

Welcome! BoredReading is a fresh way to read high quality articles (updated every hour). Our goal is to curate (with your help) Michelin star quality articles (stuff that's really worth reading). We currently have articles in 0 categories from architecture, history, design, technology, and more. Grab a cup of freshly brewed coffee and start reading. This is the best way to increase your attention span, grow as a person, and get a better understanding of the world (or atleast that's why we built it).

Improve your reading experience

Logged in users get linked directly to articles resulting in a better reading experience. Please login for free, it takes less than 1 minute.

More from Computer Ads from the Past

Comics from January/February 1983 Issue of Today Mag

Time for some oldie levity.

6 hours ago 1 votes
Australian Air Force

If You're Switched On, This is Paradise.

4 days ago 9 votes
Adam Osborne Interview by Practical Computing (1983)

Osborne reveals his philosophy

2 weeks ago 13 votes
Plus Post: VTech Laser MSX2

The exciting new MSX computer with more features for less money

2 weeks ago 12 votes
MicroTimes Interviews Jim Clark from Mosaic Communications (1994)

They discuss how to commercialize the internet.

3 weeks ago 11 votes

More in technology

Modding a Nintendo 3DS is precise, but doable in 2025

I went through the act if installing custom firmware on my New Nintendo 2DS tonight, and I wanted to shout out this guide for being absolutely spectacular. Not only does it have the best step-by-step instructions I think I've ever seen, it even has branches off the main

16 hours ago 2 votes
Funding Expires for Key Cyber Vulnerability Database

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract to maintain the Common Vulnerabilities and Exposures (CVE) program -- which is traditionally funded each year by the Department of Homeland Security -- expires on April 16.

14 hours ago 2 votes
tinyML in Malawi: Empowering local communities through technology

Dr. David Cuartielles, co-founder of Arduino, recently participated in a workshop titled “TinyML for Sustainable Development” in Zomba, organized by the International Centre for Theoretical Physics (ICTP), a category 1 UNESCO institute, and the University of Malawi. Bringing together students, educators, and professionals from Malawi and neighboring countries, as well as international experts from Brazil, […] The post tinyML in Malawi: Empowering local communities through technology appeared first on Arduino Blog.

3 hours ago 1 votes
Comics from January/February 1983 Issue of Today Mag

Time for some oldie levity.

6 hours ago 1 votes
Odds and Ends #66: The winner of the 2040 US Presidential election is in space

Plus ultra-grim Nazi revisionism, why Kemi is right about Adolescence, and my Gladiators conspiracy theory

3 hours ago 1 votes