VisiBonehttp://www.visibone.com/
182 tested examples String parsing Case sensitiv ity Operator precedence Regular expressions Date and time MySQL 6 and ISO/ANSI SQL:2003 version 6 features c
Web Design Reference Guides: Color, HTML, CSS, special characters, etc. Posters, charts, laminated cards, mouse pads. Free online: color scheme lab, color-wheel swatch libraries, c
How to start with CP/Mhttp://www.retrotechnology.com/dri/howto_cpm.html
files. A Google search string ".IMD" for that site, yields 104 "hits", almost all to directories which contain multiple *.IMG files. Other disk images there include .TD0 (Teledisk
C++ and Lisphttps://www.lurklurk.org/cpp_clos.html
and a value which is a string later in the execution of the program (many scripting languages have the same behaviour). The "implicit interface" model described above falls out fo
C++ and Lisp
The Cursed Computer Iceberg Memehttps://suricrasia.online/iceberg/
trigraphs ADSL over wet string Aphyr's technical interviews gps week rollover "das ist ein Game-Boy Advance..." Bottom of the iceberg no elegant solution to FizzBuzz exists Actual
this is not a hall of shame. the intent is to awaken you to many of the peculiarities and weirdness of computers. hopefully, after reading these articles, you will have learned a l
Bootstrapping a Forth in 40 lines of Lua codehttp://angg.twu.net/miniforth-article.html
local capture, newpos = string.match(subj, pat, pos) if newpos then pos = newpos; return capture end end parsespaces = function () return parsebypattern("^([ \t]*)()") end parsewo
pkgsrc.se | The NetBSD package collectionhttps://pkgsrc.se/converters
tool hs-base16-bytestring Fast base16 (hex) encoding and decoding for ByteStrings hs-base64 Modern RFC 4648-compliant Base64 library hs-base64-bytestring Fast base64 encoding and
https://www.ietf.org/rfc/rfc4251.txthttps://www.ietf.org/rfc/rfc4251.txt
recipient channel string data Throughout these documents, when the fields are referenced, they will appear within single quotes. When values to fill those fields are referenced, t
NetHack 3.3.0: A Guide to the Mazes of Menacehttp://www.nethack.org/v330/Guidebook.html
Others take a character string as a value. You can set string options by typing the option name, a colon or equals sign, and then the value of the string. The value is terminated
RayeR's homepage/Programminghttp://rayer.g6.cz/programm/programe.htm
DC, AD, 52, 15, 5D, 40 string. So before you use my decrypter try it on some well known, e.g. text file, where you can confirm that it was decrypted OK. Then you can continue on o
Yori: Guide to Yorihttp://www.malsmith.net/yori/guide/
program receiving the string. Programs included with Yori resolve all relative paths to absolute paths with a \\?\ prefix. This allows paths to exceed MAX_PATH, allows files whose
Glossaryhttp://www.unicode.org/glossary/
of normalization of strings. See definition D109 in Section 3.11, Normalization Forms . Cantillation Mark . A mark that is used to indicate how a text is to be chanted or sung. Ca
Unicode glossary
An example HTML documenthttps://www.rfc-editor.org/rfc/rfc2396.txt
(URI) is a compact string of characters for identifying an abstract or physical resource. This document defines the generic syntax of URI, including both absolute and relative for
Find more...