wiby  
Settings



02. Why bother?

https://joeclark.org/book/sashay/serialization/Chapter02.html

do disabled people use computers?”) But let’s approach this quantitative objection qualitatively. To use the old terminology from modems, the Web is about feature nego
Explains how to design, develop, and program Websites (Web sites) that are accessible to people with disabilities (blind

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/mon/pdf/Keys

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Podcasts

https://daniel.haxx.se/podcasts.html

how I got started with computers, having a career in Open Source and more 55 Software Engineering Radio 688 En Oct 3 Jun 24 about hyper in curl, why we added it, how we did it, ho
Podcasts Daniel has been on

Ted Felix - Kids Computer Programming Books

http://tedfelix.com/books/

time in the history of computers. The personal computer became a reality. Many kids had easy access to computers. There was no Internet. The computers that you could buy came only

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/lang/Hpascal.txt

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

The Lessons of Lucasfilm's Habitat

http://www.fudco.com/chip/lessons.html

money" at it: faster computers, more managers, more bureaucratic procedures, and so on. However, such capital intensive management techniques are a luxury not available to most pr

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy

Tom Heneghan Explosive Intelligence Briefings

http://www.tomheneghanbriefings.com/

international banking computers on Floors 1 and 2 in the North Tower from initiating the new U.S. Treasury Bank system. Explosives in the World Trade Center were planted by operat
tom heneghan,NSA,Nazi Paperclip,DHS,false flag,constitution,treason,wanta,syria,protocols,bush,nazi,zionist,mossad,benghazi,terrorist,adamus group

wingolog

http://wingolog.org/

america compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme spain

Looking at Windows Vista | Peter Torpey

https://petertorpey.com/articles/windows_vista.html

familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A

Fvwm LG #105

https://linuxgazette.net/105/adam.html

my desktop and laptop computers. While at school ( The Purbeck School , Wareham in Dorset), I was actively involved in setting up two Linux proxy servers (each running Squid and S


Find more...