The Trailing Edgehttp://www.trailingedge.com/
Five Most Wanted Home Computers Video Games Wanted Resources Library Related News Archive Old Friends Sell/Trade Welcome to The Trailing Edge This site is devoted to computing tec
Thomas Tempelmann | Who Is Thomas Tempelmann?http://www.tempel.org/AboutThomasTempelmann
At the time, Windows computers used the Joliet extension to record long file names on Data-CDs, whereas Apple's Mac OS did not support this extension, so that a Mac would show onl
SegaBase - Sega Dreamcasthttp://www.atani-software.net/segabase/index-segadchistory1.html
Macintosh personal computers, whereas the SH-4 was a natural (and unproven) extention of technology with which Sega's tech teams was already familiar. 3Dfx's Voodoo2 was at
Sam's ongoing project to document Sega's entire classic videogame libarary
Ye Olde Blogroll - Because blogs are the soul of the webhttps://blogroll.org/
and I like radio, computers, music, books and photography. Longest Voyage I occasionally write here about my hobbies, side projects, or just life in a foreign country Interview Su
What made the PC, Mac, and Linux so great (or not)http://toastytech.com/guis/macvspc.html
What made Personal Computers great The story of the "Personal Computer" started before the IBM PC. The earliest personal computers included machines such as the Altair, TRS-80, Co
Glenn Fleishman, Unsolicited Pundithttps://glennf.com/vanity/computers.html
Here's all the computers I've known and owned. I first wrote this in mid-1997, and have since added updates as I've bought newer machines. It's in reverse chronological order, so
PDD's Adventure Pagehttp://pdd.if-legends.org/
down to old 8-bit computers and handhelds like the Psion Palmtop. The TADS page (Mike Roberts) Another TADS page (Neil K. Guy) The Inform page (Graham Nelson et al.) The Hugo page
The page for classic text adventure aficionados. Covers Scott Adams, Brian Howarth, Infocom, Level 9, Magnetic Scrolls and more.
Actually Portable Executablehttp://justine.lol/ape.html
of nearly all the computers, servers, and phones you've used. If we focus on the subset of numbers all systems share in common, and compare it to their common ancestor, Bell Syste
Stuart Cheshirehttps://stuartcheshire.org/
sharing among multiple computers at home, at work, or on the road. The implementation of BTMM addresses the issues of single sign-on authentication, secure data communication, ser
Find more...