wiby  
Settings



Applying Minilanguages

http://www.catb.org/esr/writings/taoup/html/ch08s02.html

and links to sample applications, is available at the Glade project page . Glade has been ported to Windows . Case Study: m4 The m4(1) macro processor interprets a declarative min

A to Z of C - Beta | Online book on C/DOS programming

http://guideme.itgo.com/atozofc/

40.6 ROMable Code 40.7 Applications 41. Writing BIOS 41.1 BIOS Code 41.2 Flash BIOS 41.3 Uniflash Source code (ASM)    [zip, 35.3 KB] 42. Programming CMOS RAM 42.1
A to Z of C is the non-profit project to bring cheapest and best book for C

The small web is beautiful

https://benhoyt.com/writings/the-small-web-is-beautiful/

suitable for use in web-applications.” Sam Eaton of Crave Cookie runs a $200,000 per month side business (wow!) using a single server and SQLite. Read his Indie Hackers interview
A vision for the "small web", small software, and small architectures.

SIGPLAN Research Highlights Papers

https://www.sigplan.org/Highlights/Papers/

It has numerous applications in compiler optimization, program synthesis, term rewriting, and more. While the ideas and even their combination were known, this paper developed thr

The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)

https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html

objects, world spaces...applications limited only by your imagination! Flexible, scalable client-server architecture." Wyndhaven/Intermoo Quote: " InterMOOTM technology makes Wynd

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

looking at real applications I'd start applying. Consulting shops are more likely to take you on IME, as you're still quasi-green, and they can likely get you ramped up pretty qui
How to become a bug-bounty hunter and do penetration testing

A Dirge

https://www.ietf.org/rfc/rfc2731.txt

of the [DCPROJECTS] applications referenced from the [DCHOME] site. Software support for the LINK tag and qualifier conventions (see the next section) is not currently widespread.
A tutorial and reference manual for Java.

Roy Longbottom's Computer Benchmarks and Stress Tests and Performance History Index

http://www.roylongbottom.org.uk/

then considers some applications that can be run with no other input/output or power cable connections. Hardware required for PoE is a unit that injects power on to an ethernet ca
The PC benchmark collection is a FREE set of programs that measure performance of CPUs, cache, memory, disks and graphics. They run via Windows, Linux and, now, Android phones and

The Published Data of Robert Munafo at MROB

http://www.mrob.com/

fraudulent credit applications made in your name. (This is out of date mainly because of changes due to the Patriot act.) Stages of Civilization : A brief discussion of where we'v
The Published Data of Robert Munafo -- Explore topics from large numbers to sociology at mrob.com

Kevin Boone: Why the fascination with retrocomputing?

https://kevinboone.me/retrocomputing.html

connected by a set of applications. The applications use Apache Camel (a Java message processing framework on Spring Boot (an application server and transaction management framewo
Why do so many IT professionals like to tinker with vintage computers and software?

Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

in configuring their applications. The first web-based machine translation system is developed by this Timeline's author, supporting 9 languages, and made available the following
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

Trends and the Future of Computing and the Internet

http://mrp3.com/trends.net.html

of the libraries and applications from source, which high-reliability open source systems (like those using FreeBSD ) typically do. But quite transparently, the '.Net' initiative


Find more...