wiby  
Settings



NLnet; All projects

https://nlnet.nl/project/index.html

Accessible KDE File Management NGI0 Commons Fund 2025 Accessible file dialogs throughout KDE applications Accessible security NGI0 PET 2019 2022 Integration effort of independent

SIGSOFT - ACM Special Interest Group on Software Engineering

http://www.sigsoft.org/dissertations.html

and Emergency Response Management System . Virginia Polytechnic Institute & State University (May 14 2011, advisor: Osman Balci ). Abstract . Anne Koziolek . Automated Im
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts

https://www.rfc-editor.org/rfc/rfc2839.txt

https://www.rfc-editor.org/rfc/rfc2839.txt

for file transfer and management. The Internet Kermit Service provides access to both authenticated and anonymous users. The use of Kermit protocol over a Telnet connection provid

Piet Beertema's website

https://godfatherof.nl/

got permission from the management - and great enthusiasm from the director Aad van Wijngaarden , founder of the Mathematical Center, because "it was the first time since 195

Greg A. Woods

http://www.weird.com/~woods/

subnetting and network management too! For more information on IP numbers and networking in general I'd recommend the following on-line documents: The Optimized Engineering Techni

Linux Gazette Index

https://www.linuxdoc.org/LDP/LG/lg_index.html

Orr Simple Package Management With Stow , by Allan Peda Why I wrote Install Kernel (ik) and How It Works , by Justin Piszcz Writing Documentation, Part III: DocBook/XML , by Chris

Security Now! Transcript of Episode #387

https://www.grc.com/sn/sn-387.htm

in the Java Management Extensions (JMX) MBean components, unprivileged Java code can access restricted classes. By using that vulnerability in conjunction with a second vulnerabil
Security Now! Weekly Internet Security Podcast: Steve and Leo discuss the week's major security events and discuss questions and comments from listeners of previous episodes. The

Esoteric Operating Systems

https://sgfault.com/post/2018/05/2018-05-31-esoteric-os/

scheduling, memory management, device drivers and little else. Everything else such as the network stack, input handling, the filesystem and every other component you may think of

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/archive/activity.html

and Competancy(?) Management tool bits - built OO.o in the background: which will complete first ? Finally some hacking, deskice, OO.o unit-test bits, etc. 2008-02-25 Up early, in

The Kermit Script Library and Tutorial

https://www.kermitproject.org/ckscripts.html

Scripts File-Management Scripts Number-Crunching Scripts Date-Time Arithmetic Object-Oriented Programming Script-Language Torture Tests For MS-DOS Kermit... RECENT

PulkoMandy's home on the web

http://pulkomandy.tk/

for dynamic memory management. Besides the simple malloc and free, let's mention reference counting and garbage collection. They all suffer from the same problem: a lot of work ha

Tools and utilities for Windows

http://www.ltr-data.se/opencode.html

line tool or in Disk Management in Windows. As another example, you cannot create or access shadow copies on ImDisk drives. So, applications that use similar Windows features as D
Tools for Windows


Find more...