wiby  
Settings



Kermit Software Source Code Archive

https://www.kermitproject.org/archive.html

] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ ENDĀ MATTER ] Welcome to what might be the biggest collection on earth of software source code for

SIGSOFT - ACM Special Interest Group on Software Engineering

http://www.sigsoft.org/dissertations.html

Hierarchical Abstract Computers . University of Maryland (1985, advisor: Marvin Zelkowitz ). Abstract . 1984 DavidĀ Notkin . Interactive Structure-Oriented Computing . Carnegi
Association for Computing Machinery's Special Interest Group on Software Engineering, with awards, events, resources and contacts

Lewis Loflin Electronics Background Biography

https://www.bristolwatch.com/biolewis.htm

and single board computers such as the KIM-1, along with a bevy of strange classified military computers. A friend of mine at the time had one of the first Apple IIe computers tha
How a general interest in science led to an interest in electronics technology. This led to a career in electronics and technology.

A Constructive Look At TempleOS

http://www.codersnotes.com/notes/a-constructive-look-at-templeos/

I complain loudly about computers. Very Sleepy A C++ CPU profiler I helped make. Follow me: Subscribe (Fiction) Subscribe (Technical) Follow me at @grumpygiant Recent posts: Why B

Seductions of Sim

http://www.princeton.edu/~starr/17star.html

low-cost multimedia computers, a new generation of "edutainment" software has finally begun to fulfill the long-touted promise of computers in education. Most of the new programs

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/lang/mbasic/The

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t

Lotus 1-2-3 For Linux

http://lock.cmpxchg8b.com/linux123.html

on alt.folklore.computers if they had seen this before and why this might have happened. The answer was that this is probably deliberate - dlopen() was not widely available on UNI

Acclaim for Unicode

http://www.unicode.org/press/quotations.html

used on smartphones, computers, and social media all over the world now. It once was in danger of dying out, but now it strongly continues in all the modern media communications.


Find more...