wiby  
Settings



Graphics Muse

https://www.linuxdoc.org/LDP/LG/issue25/gm.html

to set my computers back up.  First, and before I got the other systems unpacked, I blew the monitor on my laptop (aka "kepler").  I have no idea what happened.&nbs
The Monthly Column of Computer Graphics for Linux Systems.

Brad Templeton's Home Page

https://www.templetons.com/brad/

Kinnernet, DLD, Computers Freedom and Privacy, Foresight Nanotechnology conference and various others. (I have lots of frequent flyer memberships.) Other interests include music,

Steven Pemberton

https://homepages.cwi.nl/~steven/

Questions", namely why computers only work with 0s and 1s. Personally I think I explained it much better than what they used, but they did use my summary at the end. (8 minutes, i

Stroustrup: C++ Glossary

https://www.stroustrup.com/glossary.html

major uses of computers, such as mathematical computations, data processing, text processing, graphics, and communications. (2) a language that can do what at least as much as oth

Stereoscopic 3D Applications Market Overview

http://stereo3d.com/applications.htm

ThruView Dave's Computers Inc. JPS to Interlace Image Viewer Y interlaced VR Pic Another World Image Viewer for gif, jpg, bmp under Win 9x/NT; supports zooming Y VR Show!/ VRWorks

100R — computing and sustainability

https://100r.co/site/computing_and_sustainability.html

]. I'm interested in computers as a way to do more than consume, as a tool of creation. For that reason I won't consider services, or apps. This talk is about open specs and on bu

http://ifarchive.org/if-archive/level9/info/Level9_Facts.txt

http://ifarchive.org/if-archive/level9/info/Level9_Facts.txt

for the British micro computers, so he simply wrote his own -- and that's how it began, concerning text adventures. Before that, they had already published software for 8bit compu

Ciphers By Ritter: Cryptography and Technology

http://ciphersbyritter.com/

PC Security Why computers are vulnerable, the simplified version. How to use a computer online in reasonable safety. Basic PC Security Why computers are vulnerable and what can be
Revolutionary new cipher designs. An introductionto cryptography, crypto glossary, cryptography dictionary,technical papers, Usenet discussions and crypto links.

Geometry to Algebra and Back Again

https://jackrusher.com/pwl-2023/

century, right up until computers took over. I call this tablet a paper I love, but it's actually a 4000 year old homework assignment using Pythagoras's theorem (which you'll note

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/lang/mbasic/The

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

Biography of Michelle A. Hoyle

http://www.eingang.org/Misc/aboutme.html

how they can live with computers and make productive use of both computers and the Internet in their own lives. Her work entails marking assignments, as well as moderating discuss
Welcome to the EinWorld. All about Michelle A. Hoyle. It's an EinWorld for the Quirky Blonde One

SOLAR ECLIPSE 1999 - FINAL QUEST FOR THE HOLY GRAIL

http://greatdreams.com/eclipse.htm

pursue an education in computers only to find in 1998 that scientists have found a chilling comet in the exact place where my drawings showed it to appear (possibly the same comet


Find more...