Applying Minilanguageshttp://www.catb.org/esr/writings/taoup/html/ch08s02.html
and links to sample applications, is available at the Glade project page . Glade has been ported to Windows . Case Study: m4 The m4(1) macro processor interprets a declarative min
A to Z of C - Beta | Online book on C/DOS programminghttp://guideme.itgo.com/atozofc/
40.6 ROMable Code 40.7 Applications 41. Writing BIOS 41.1 BIOS Code 41.2 Flash BIOS 41.3 Uniflash Source code (ASM) [zip, 35.3 KB] 42. Programming CMOS RAM 42.1
A to Z of C is the non-profit project to bring cheapest and best book for C
The small web is beautifulhttps://benhoyt.com/writings/the-small-web-is-beautiful/
suitable for use in web-applications.” Sam Eaton of Crave Cookie runs a $200,000 per month side business (wow!) using a single server and SQLite. Read his Indie Hackers interview
A vision for the "small web", small software, and small architectures.
SIGPLAN Research Highlights Papershttps://www.sigplan.org/Highlights/Papers/
It has numerous applications in compiler optimization, program synthesis, term rewriting, and more. While the ideas and even their combination were known, this paper developed thr
The WWW VL: Educational Technology - Educational VR (MUD) sub-page (05-Jan-2000)https://tecfa.unige.ch/edu-comp/WWW-VL/eduVR-page.html
objects, world spaces...applications limited only by your imagination! Flexible, scalable client-server architecture." Wyndhaven/Intermoo Quote: " InterMOOTM technology makes Wynd
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
looking at real applications I'd start applying. Consulting shops are more likely to take you on IME, as you're still quasi-green, and they can likely get you ramped up pretty qui
How to become a bug-bounty hunter and do penetration testing
A Dirgehttps://www.ietf.org/rfc/rfc2731.txt
of the [DCPROJECTS] applications referenced from the [DCHOME] site. Software support for the LINK tag and qualifier conventions (see the next section) is not currently widespread.
A tutorial and reference manual for Java.
Roy Longbottom's Computer Benchmarks and Stress Tests and Performance History Indexhttp://www.roylongbottom.org.uk/
then considers some applications that can be run with no other input/output or power cable connections. Hardware required for PoE is a unit that injects power on to an ethernet ca
The PC benchmark collection is a FREE set of programs that measure performance of CPUs, cache, memory, disks and graphics. They run via Windows, Linux and, now, Android phones and
The Published Data of Robert Munafo at MROBhttp://www.mrob.com/
fraudulent credit applications made in your name. (This is out of date mainly because of changes due to the Patriot act.) Stages of Civilization : A brief discussion of where we'v
The Published Data of Robert Munafo -- Explore topics from large numbers to sociology at mrob.com
Kevin Boone: Why the fascination with retrocomputing?https://kevinboone.me/retrocomputing.html
connected by a set of applications. The applications use Apache Camel (a Java message processing framework on Spring Boot (an application server and transaction management framewo
Why do so many IT professionals like to tinker with vintage computers and software?
Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
in configuring their applications. The first web-based machine translation system is developed by this Timeline's author, supporting 9 languages, and made available the following
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
Trends and the Future of Computing and the Internethttp://mrp3.com/trends.net.html
of the libraries and applications from source, which high-reliability open source systems (like those using FreeBSD ) typically do. But quite transparently, the '.Net' initiative
Find more...