wiby  
Settings



Release Notes for Kerberos for Windows 2.2 Beta 1

https://kerberos.org/dist/kfw/2.2/relnotes.html

please read the krbcc32 Architecture documentation. (krbcc32 Architecture link works only if this is the source package.) Release History In general, the latest release of KfW is

OpenBSD Ports: Working with Ports

http://www.openbsd.org/faq/ports/ports.html

dependencies, and architectures on which the port is known to work. This mechanism, however, is a very basic one, which just runs awk(1) on the ports index file. A port called "sq

The rEFInd Boot Manager: Installing and Uninstalling rEFInd

http://www.rodsbooks.com/refind/installing.html

of the drivers for the architecture you are using. If you don't need them, they'll slow down the start process, and worse, loading unnecessary drivers can cause some systems to ha

The System of the World Wide Web

https://www.crummy.com/writing/RESTful-Web-Services/system.html

are also aspects of the architecture that ensured the web would catch on. I think the web won because of the URI. http://www.w3.org/ Go ahead, laugh. That's what people did when t

Debian -- Packages

https://www.debian.org/distrib/packages

stable oldstable Architecture: any 64-bit PC (amd64) 64-bit ARM (AArch64) EABI ARM (armel) Hard Float ABI ARM (armhf) Hurd 3

The 2006 Linux Filesystems Workshop (Part II) [LWN.net]

https://lwn.net/Articles/190223/

Major file system architectures We briefly reviewed the major file system architectures to summarize what worked and did not work in each case. Simple FFS-style file systems such
[Editor's note: this is the second page of Valerie Henson's report from 2006 Linux Filesystems [...]

git(1)

http://mirrors.edge.kernel.org/pub/software/scm/git/docs/

to the underlying Git architecture. See gitworkflows(7) for an overview of recommended workflows. See also the howto documents for some useful examples. The internals are document

E in a Walnut

https://www.skyhunter.com/marcs/ewalnut.html

E's promise-pipelining architecture ensures that deadlock cannot occur. E uses a specific flavor of capability-based security known as object-capabilities . With object-capabiliti

Castiglion Fiorentino

http://www.romeartlover.it/Castfior.html

example of Renaissance architecture; some sources believe its design was based on a project made by Antonio da Sangallo the Elder, who built Madonna di S. Biagio , a shrine outsid
A description of the picturesque town of Castiglion Fiorentino, north of Rome

systemd for Administrators, Part VI

http://0pointer.de/blog/projects/changing-roots.html

or even a different architecture (Example: host x86_64, guest i386). The full hierarchy of the host OS it cannot see. On a classic System-V-based operating system it is relatively
Posts and writings by Lennart Poettering

Plan 9 Mkfiles

http://doc.cat-v.org/plan_9/4th_edition/papers/mkfiles

include the appropriate architecture-specific and generic mkfiles. There are four generic mkfiles containing commonly used rules for building a product: mkone , mkmany , mklib , a

http://www.leptonica.org/source/README.html

http://www.leptonica.org/source/README.html

automatically: * architecture endianness * enabling Leptonica I/O image read/write functions that depend on external libraries (if the libraries exist) * enabling functions for re


Find more...