wiby  
Settings



TermNet - International Network for Terminology

http://www.termnet.org/english/legal_notice/privacy-policy.php

Personal data means any information relating to an identified or identifiable natural person (“data subject”). An identifiable natural person is one who can be identified, directl
TermNet

What's New! January 1994

http://home.mcom.com/home/whatsnew/whats_new_0194.html

University contains information about the department. The Web server at Calvin College has been redone, including the addition of a graphical campus calendar and a Bible gateway .

Personal-scale Web scraping for fun and profit | BHMT

https://bhmt.dev/blog/scraping/

personally identifiable information), which mitigates some of the concerns about this I'd otherwise want to address up front. And , the process of running through a set of publicl

How to Evaluate Open Source Software / Free Software (OSS/FS) Programs

https://dwheeler.com/oss_fs_eval.html

programs, with specific information on how to evaluate Open Source Software / Free Software (OSS/FS) programs. This process is designed so that you can compare OSS/FS programs sid
This paper describes how to evaluate open source software

The Coming Anarchy - 94.02

https://www.theatlantic.com/past/politics/foreign/anarchy.htm

summitry and computer-information highways. Outside is the rest of mankind, going in a completely different direction." We are entering a bifurcated world. Part of the globe is in
Atlantic Unbound: The Atlantic Monthly Magazine Online

NYC HOLD National on Mathematics Education Reform

http://nychold.com/

scientists, and others information resources and networking opportunities to support systemic improvements in the quality of mathematics education in our nation's schools. America

Philip Wadler's home page

https://homepages.inf.ed.ac.uk/wadler/

contains useful general information on building dependable systems. The TIOBE Programming Community Index tracks popularity of programming languages. "The ratings are based on the

Ross Anderson's Home Page

https://www.cl.cam.ac.uk/archive/rja14/

and criminology of information security – from dependability to deception detection Peer-to-Peer and social network systems – including the Eternity Service, cocaine a


Find more...