02. Why bother?https://joeclark.org/book/sashay/serialization/Chapter02.html
do disabled people use computers?”) But let’s approach this quantitative objection qualitatively. To use the old terminology from modems, the Web is about feature nego
Explains how to design, develop, and program Websites (Web sites) that are accessible to people with disabilities (blind
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/mon/pdf/Keys
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Podcastshttps://daniel.haxx.se/podcasts.html
how I got started with computers, having a career in Open Source and more 55 Software Engineering Radio 688 En Oct 3 Jun 24 about hyper in curl, why we added it, how we did it, ho
Podcasts Daniel has been on
Ted Felix - Kids Computer Programming Bookshttp://tedfelix.com/books/
time in the history of computers. The personal computer became a reality. Many kids had easy access to computers. There was no Internet. The computers that you could buy came only
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/lang/Hpascal.txt
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
The Lessons of Lucasfilm's Habitathttp://www.fudco.com/chip/lessons.html
money" at it: faster computers, more managers, more bureaucratic procedures, and so on. However, such capital intensive management techniques are a luxury not available to most pr
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
Tor browser link , two computers (one secure and non-networked, other for routine use and network access), gift-cards. Burner phones, clean OS every time (e.g. Tails), security-ce
Best practices and information about computer and smartphone security and privacy
Tom Heneghan Explosive Intelligence Briefingshttp://www.tomheneghanbriefings.com/
international banking computers on Floors 1 and 2 in the North Tower from initiating the new U.S. Treasury Bank system. Explosives in the World Trade Center were planted by operat
tom heneghan,NSA,Nazi Paperclip,DHS,false flag,constitution,treason,wanta,syria,protocols,bush,nazi,zionist,mossad,benghazi,terrorist,adamus group
wingologhttp://wingolog.org/
america compilers computers concurrency cps ecmascript garbage collection gc gnome gnu gstreamer guadec guile hacks igalia javascript meta music namibia python random scheme spain
Looking at Windows Vista | Peter Torpeyhttps://petertorpey.com/articles/windows_vista.html
familiar with using computers, a time will come when all users will be at least somewhat familiar with the idiosyncrasies of computing, data storage, and the stagnant metaphors. A
Fvwm LG #105https://linuxgazette.net/105/adam.html
my desktop and laptop computers. While at school ( The Purbeck School , Wareham in Dorset), I was actively involved in setting up two Linux proxy servers (each running Squid and S
Find more...