wiby  
Settings



IBM Compatibles - The Secret Guide to Computers

http://www.computercraft.com/docs/ibm.html

Windows 95 Windows 95 applications chbk,ency,integ chbk,ency,integ chbk,ency,MS Office ($150 extra) chbk,ency,MS OffPr ($175 extra) none ($100 less) warranty 1-year 1-year 3/1-yea

How To Become A Hacker

http://www.catb.org/%7Eesr/faqs/hacker-howto.html

for new and customized applications. I've written more about this at the Open Source pages. Q: Where can I get a free Unix? A: If you don't have a Unix installed on your machine y

2019 - Strange Loop

https://thestrangeloop.com/2019/sessions.html

Securing cloud applications and their credentials Srdjan Grubor CyberArk Enhancing Angklung Music Rehearsals with Modern Tech Trapsilo Bumi HENNGE Everything You Wanted to Know Ab
Strange Loop is a conference for software developers covering programming langs, databases, distributed systems, security, machine learning, creativity, and more!

The small web is beautiful

https://benhoyt.com/writings/the-small-web-is-beautiful/

suitable for use in web-applications.” Sam Eaton of Crave Cookie runs a $200,000 per month side business (wow!) using a single server and SQLite. Read his Indie Hackers interview
A vision for the "small web", small software, and small architectures.

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

for Supercomputing Applications [NCSA] in 1993. The popular media were soon describing Gopher as an obsolete predecessor to the Web, rather than one of the protocols available alo

Isaac Asimov FAQ

http://asimovonline.com/asimov_FAQ.html

in 1939. After his applications to all five New York City medical schools were rejected, he applied for the master's program in chemistry at Columbia. After he was rejected for th
Answers to frequently asked questions about Isaac Asimov and his works

The Kernel Hacker's Bookshelf: Ultimate Physical Limits of Computation [LWN.net]

https://lwn.net/Articles/286233/

necessary for office applications and the like. Some people just like a full sized keyboard and a nice sized display, and that human interface is *NOT* shrinking with Moore's law,
Moore's Law - we all know it (or at least think we do). To be annoyingly exact, Moore's Law i [...]

Linux

https://www.billdietrich.me/Linux.html

to run some Windows applications. Boot Linux, and then sometimes run a virtual machine (such as VirtualBox) to run a copy of some other OS (Windows, or a different Linux) inside t
Linux operating system basics, parts, myths, and truths

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

proving. In many applications, however, it is necessary to reason about disequality of terms as well as equality. While disequality reasoning can be encoded, direct support for di
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

TELNET: The Mother of All (Application) Protocols

https://XeNT.com/4K-Associates/IEEE-L7-v2.html

more layer up, within applications like Emacs and operating system libraries like Curses. Still, obscurity can be accommodated: interested readers are directed to RFC 1097, "Telne

Amicus Brief

https://archive.epic.org/crypto/export_controls/bernstein_brief.html

standards, and applications. ISOC has over 7,500 members,currently representing over 150 countries of the world and comprisedof commercial companies, governmental agencies, founda

The unix programming environment

http://www.talisman.org/unix/burgess-guide.html

and for database applications, where timesharing is critical. In contrast to some operating systems, UNIX performs equally well on large scale computers (with many processors) and


Find more...