Computer Software: Microsoft Office, Davka, LEC, Lotus, Corel, Serif, IBM/Lenovo Thinkpad - BMSoftwarehttp://www.bmsoftware.com/
Introduction to Computers BVG Train Yourself Java Advanced and Expert BVG Train Yourself Office 2000 / XP / 2003 BVG Train Yourself Office 2000 and 2002/XP BVG Train Yourself Outl
2500+ computer software titles inc: foreign language translation software, Microsoft Office, Serif, Davka, Corel, Power Translator, LEC Translate. IBM Lenovo Thinkpad laptops
Great opportunities to sell orgonite and orgone generatorshttps://www.chibiz.net/
- or in times before computers and internet !!! Now it's YOU who can have control with the help of this extremely powerful new technology. How is it possible that someone ca
Friden EC-130 Electronic Calculatorhttps://www.oldcalculatormuseum.com/friden130.html
through the use of computers. One of his early, as well as historically noteworthy projects, was being part of the development of the ERMA system for under contract to GE for Bank
Career Guide for Engineers and Computer Scientistshttp://philip.greenspun.com/careers/
meant Man to program computers, He wouldn't have given him C. Thou Shalt Remember that If God had meant Man to use computers, He wouldn't have given him UNIX and MS/DOS. Serious S
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
shorten the lifetime of computers — larger websites require more powerful computers to access them. This means that more computers need to be manufactured, which is a very energy-
October 1999 - The Axis of Jewish Powerhttps://www.eaec.org/newsletters/1999/NL1999Oct.htm
their broken down computers. With the Chinese military leaders knowing this, they might do what Adolf Hitler did in 1938, when he annexed Austria, striking first while the world w
Fedora, secure boot, and an insecure future [LWN.net]https://lwn.net/Articles/500231/
race for control of our computers? Fedora, secure boot, and an insecure future Posted Jun 6, 2012 9:21 UTC (Wed) by steveriley (guest, #83540) [ Link ] (2 responses) This is rathe
The UEFI secure boot mechanism has been the source of a great deal of concern in the free softw [...]
How to Start a Startuphttps://paulgraham.com/start.html
Hackers are so used to computers that they have no idea how horrifying software seems to normal people. Stephen Hawking's editor told him that every equation he included in his bo
FreebieDirectory.com: The Web's freebies search engine.http://www.freebiedirectory.com/
3D Chat, ICQ... Computers & Internet Free Services, Utilities... Couponing Mailable & Printable Enter & Win Freebies Contests, Sweepstakes... Digital Postcards Virtual Greetings..
Stuff Michael Meeks is doinghttps://apple-tree.life/~michael/blog/2017/
Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t
https://www.rogerarrick.com/osiris/burgett.txthttps://www.rogerarrick.com/osiris/burgett.txt
DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ
https://www-users.cse.umn.edu/~odlyzko/doc/decline.txthttps://www-users.cse.umn.edu/~odlyzko/doc/decline.txt
instruction set computers) is an example of unfettered research, in that IBM allowed him to work on whatever he chose. However, Cocke had already made valuable contributions to th
Find more...