Accessible Rich Internet Applications (WAI-ARIA) 1.0https://www.w3.org/TR/2014/REC-wai-aria-20140320/complete
TAB key on most desktop computers). SVG authors may place elements in the navigation order by manipulating the focusable attribute and they may dynamically specify the navigation
BITNEThttps://bit.net/
on their mainframe computers. BITNET eventually reached across the US to California and was joined by its European counterpart EARN (European Academic and Research Network) in 198
Kermit Software Source Code Archivehttps://www.kermitproject.org/archive.html
] [ ucsd ] [ umicrocomputers ] [ uniflex ] [ unisys ] [ unix ] [ victor ] [ END MATTER ] Welcome to what might be the biggest collection on earth of software source code for
FoRK Archive by threadhttps://XeNT.com/FoRK-archive/sept99/
Kragen Sitaker The day computers died - Y2k humor Ernest Prabhakar The Berners-Lee Award: what *do* they make? Rohit Khare I-D: Unique Identifiers for Network Objects and Subjects
Interesting DOS programs - Full Indexhttp://dosprograms.info.tt/indexall.htm
to connect multiple computers via serial cable EZ-NOS 2 a http web server with Server Side Includes support, secure FTP Server with md5 authenication, DNS server and a TCP/IP acce
https://www.ietf.org/rfc/rfc6763.txthttps://www.ietf.org/rfc/rfc6763.txt
offload, so that computers can sleep and still be discoverable on the network. Early versions of such chipsets were sometimes quite limited: for example, some were Cheshire & Kroc
Health Assurance Policieshttps://www.heartcom.org/HealthAssurance.htm
laptops and desktop computers. The USC alliance, aka AHA! ( A merica's H olistic A lliance) provides numerous AHA! apps for personalized health assessment and choice fulfillm
United Self Care introduces Health Assurance Policies
Installing Windows 95 & 98http://www.nickh.org/computer/instlwin9x.html
v2.5 around for older computers. IF you aren't using TCP/IP networking, you may want to customize your setup, and tell the client software to use IPX only. Yet More Update:
SOLAR ECLIPSE 1999 - FINAL QUEST FOR THE HOLY GRAILhttp://greatdreams.com/eclipse.htm
pursue an education in computers only to find in 1998 that scientists have found a chilling comet in the exact place where my drawings showed it to appear (possibly the same comet
Jem Berkes: Academic / university workhttps://berkes.ca/jem/academic.html
tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t
David A. Wheeler's Bloghttps://dwheeler.com/blog/2011/
I don’t use computers to have the newest fad interface, I use them to get things done (and for the pleasure of using them). I will accept changes, but they should be obvious
Libreboot – New Hampshire (USA) may soon enshrine Software Freedom into law. YOUR HELP IS NEEDED!https://libreboot.org/news/usa-libre.html
make the internet and computers in general more secure “Software authors deserve to be paid!” - In fact, many libre software devs are paid to work on Open Source! Many companies,
Free and open source software in your government.
Find more...