Kermit Software Source Code Archivehttps://www.kermitproject.org/archive.html
] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ ENDĀ MATTER ] Welcome to what might be the biggest collection on earth of software source code for
SIGSOFT - ACM Special Interest Group on Software Engineeringhttp://www.sigsoft.org/dissertations.html
Hierarchical Abstract Computers . University of Maryland (1985, advisor: Marvin Zelkowitz ). Abstract . 1984 DavidĀ Notkin . Interactive Structure-Oriented Computing . Carnegi
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts
Lewis Loflin Electronics Background Biographyhttps://www.bristolwatch.com/biolewis.htm
and single board computers such as the KIM-1, along with a bevy of strange classified military computers. A friend of mine at the time had one of the first Apple IIe computers tha
How a general interest in science led to an interest in electronics technology. This led to a career in electronics and technology.
A Constructive Look At TempleOShttp://www.codersnotes.com/notes/a-constructive-look-at-templeos/
I complain loudly about computers. Very Sleepy A C++ CPU profiler I helped make. Follow me: Subscribe (Fiction) Subscribe (Technical) Follow me at @grumpygiant Recent posts: Why B
Seductions of Simhttp://www.princeton.edu/~starr/17star.html
low-cost multimedia computers, a new generation of "edutainment" software has finally begun to fulfill the long-touted promise of computers in education. Most of the new programs
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/lang/mbasic/The
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
Lotus 1-2-3 For Linuxhttp://lock.cmpxchg8b.com/linux123.html
on alt.folklore.computers if they had seen this before and why this might have happened. The answer was that this is probably deliberate - dlopen() was not widely available on UNI
Acclaim for Unicodehttp://www.unicode.org/press/quotations.html
used on smartphones, computers, and social media all over the world now. It once was in danger of dying out, but now it strongly continues in all the modern media communications.
Find more...