Graphics Musehttps://www.linuxdoc.org/LDP/LG/issue25/gm.html
to set my computers back up. First, and before I got the other systems unpacked, I blew the monitor on my laptop (aka "kepler"). I have no idea what happened.&nbs
The Monthly Column of Computer Graphics for Linux Systems.
Brad Templeton's Home Pagehttps://www.templetons.com/brad/
Kinnernet, DLD, Computers Freedom and Privacy, Foresight Nanotechnology conference and various others. (I have lots of frequent flyer memberships.) Other interests include music,
Steven Pembertonhttps://homepages.cwi.nl/~steven/
Questions", namely why computers only work with 0s and 1s. Personally I think I explained it much better than what they used, but they did use my summary at the end. (8 minutes, i
Stroustrup: C++ Glossaryhttps://www.stroustrup.com/glossary.html
major uses of computers, such as mathematical computations, data processing, text processing, graphics, and communications. (2) a language that can do what at least as much as oth
Stereoscopic 3D Applications Market Overviewhttp://stereo3d.com/applications.htm
ThruView Dave's Computers Inc. JPS to Interlace Image Viewer Y interlaced VR Pic Another World Image Viewer for gif, jpg, bmp under Win 9x/NT; supports zooming Y VR Show!/ VRWorks
100R — computing and sustainabilityhttps://100r.co/site/computing_and_sustainability.html
]. I'm interested in computers as a way to do more than consume, as a tool of creation. For that reason I won't consider services, or apps. This talk is about open specs and on bu
http://ifarchive.org/if-archive/level9/info/Level9_Facts.txthttp://ifarchive.org/if-archive/level9/info/Level9_Facts.txt
for the British micro computers, so he simply wrote his own -- and that's how it began, concerning text adventures. Before that, they had already published software for 8bit compu
Ciphers By Ritter: Cryptography and Technologyhttp://ciphersbyritter.com/
PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.
Geometry to Algebra and Back Againhttps://jackrusher.com/pwl-2023/
century, right up until computers took over. I call this tablet a paper I love, but it's actually a 4000 year old homework assignment using Pythagoras's theorem (which you'll note
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/lang/mbasic/The
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Biography of Michelle A. Hoylehttp://www.eingang.org/Misc/aboutme.html
how they can live with computers and make productive use of both computers and the Internet in their own lives. Her work entails marking assignments, as well as moderating discuss
Welcome to the EinWorld. All about Michelle A. Hoyle. It's an EinWorld for the Quirky Blonde One
SOLAR ECLIPSE 1999 - FINAL QUEST FOR THE HOLY GRAILhttp://greatdreams.com/eclipse.htm
pursue an education in computers only to find in 1998 that scientists have found a chilling comet in the exact place where my drawings showed it to appear (possibly the same comet
Find more...