wiby  
Settings



S.F.T. Inc. - Software Tools, Engineering, and the Home of MRP III

http://www.mrp3.com/

program and serial port communications functions used by other AVR-based devices. Customer Projects Smartfin™ Bed of Nails   A 'bed of nails' test rig for the Smartfin
Stewart~Frazier Tools, Inc. - Software and ElectronicsEngineering and Consulting, and maker of software tools forembedded systems, productivity enhancement, and data analysis.Our s

Greg A. Woods

http://www.weird.com/~woods/

any form of electronic communications is to use strong and proven cryptographic techniques, such as public keys, signatures, and encryption. One of the best ways to employ such te

G-Kermit 2.01

https://www.kermitproject.org/gkermit.html

protocol to another communications program, G-Kermit is likely to perform illegal operations and exit prematurely. If you include this switch when G-Kermit is NOT an external prot

xx80 | Opinionated Guides

https://opguides.info/posts/xx80/

ignals & Systems 29  Communications 30  DSP 31  Control Systems 32  Computer Vision 33  Fine, here's AI/ML     Going Deeper 34  Compilers & Assemblers 35  Reverse Engineering 36  P
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m

DX LISTENING DIGEST AUGUST 2003 ARCHIVE

http://www.w4uvh.net/dxldtd3h.html

States. The Ministry of Communications released a bill of particulars against a popular morning current affairs radio program, AM, citing 68 examples of what it contended was bias

C-Kermit 9.0 General Hints and Tips

https://www.kermitproject.org/ckcbwr.html

just like serial communications sessions as far as "terminal bytesize" and "command bytesize" are concerned. If you need to view and/or enter 8-bit characters during a TELNET sess

T E X T F I L E S

http://textfiles.com/politics/

117398 The Electronic Communications Privacy Act of 1986 ecpa-lay 10286 The Electronic Communications Privacy Act of 1986: A Layman's View, by michael H. Riddle (1988) educ.txt 10

Miller Microcomputer Services - Index Page

http://www.millermicro.com/

for the World’s Private Communications   (TheGuardian, 2015), Global spy system ECHELON confirmed at last (The Register, 2015), The Most Dangerous People on the Internet Righ
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.

15 reasons not to start using PGP

https://secushare.org/PGP

advanced cryptographic communications tools and stop investing in the old PGP over e-mail architecture, the problem mostly being e-mail rather than PGP. Pretty Good Privacy is bet

Benjamin Esham

https://esham.io/

intermediary of the communications of over a billion people. For such a company to have a lackadaisical attitude toward the truth—toward factual accuracy—plays directly into the h
Essays on software development and other nerdy topics.

Old, but Interesting Programs

http://invisible-island.net/personal/oldprogs.html

course content included communications and control systems—as well as a graduate course on operations research (queuing theory). To gain insight, I wrote programs to make si
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.

Brief History of Character Codes in North America, Europe, and East Asia

http://tronweb.super-nova.co.jp/characcodehist.html

personal computer communications. Being a 5-bit character code, Baudot code only has room for handling 32 elements (2^5 = 32 code points). This is not enough to handle both the le


Find more...