https://ed-thelen.org/Sage-Talk.htmlhttps://ed-thelen.org/Sage-Talk.html
interactive displays, networking? they were all there in SAGE. That concludes my talk. Thank you. [Applause.] Can I just say one more thing? Dave Burley, my friend, found this [do
Jack Winters' Home Page.http://www.jackwinters.com/bio.html
Communications and Networking Symposium, Ottawa , Canada , Sept. 1989. 5. "Adaptive Nonlinear Cancellation for High-Speed Fiber-Optic Systems,
KRNIC찾아주셔서 감사합니다.https://www.zakon.org/robert/internet/timeline/HIT-korean.html
Research and Education Networking(CREN) 을 결성 (8월) - AVCC와 CSIRO가 AARNET(Australian Academic Research Network)을 설립하고 이듬해에 서비스 시작. - 6월 23일 하와이를 경유하여 호주와 NSFNET이 최초로 연결됨. 호주는 1980년대
Linkshttps://triptico.com/links/
attack types, etc). In networking, this might be our collection of error codes (each with an integer value, a message string, etc). We could encode that information into a data st
Download latest stable Chromium binaries (64-bit and 32-bit)https://chromium.woolyss.com/
(Get all networking related info) chrome://omnibox (Test and follow responses of the searches via the omnibox/address bar) chrome://policy (Manage Chromium, for administrators • P
Download latest stable Chromium binaries for Windows, Mac, Linux, BSD and Android (64-bit and 32-bit)
2019 - Strange Loophttps://thestrangeloop.com/2019/sessions.html
Maude Lemaire Slack Networking and Go: An Engineer's Journey Sneha Inguva DigitalOcean Alda's dynamic relationship with Clojure Dave Yarwood Adzerk Digital and Social Resilience t
Strange Loop is a conference for software developers covering programming langs, databases, distributed systems, security, machine learning, creativity, and more!
Internet Kermit Servicehttps://www.kermitproject.org/uiksd.html
protocol code, even if networking code is not included. Defined by default if TCPSOCKET defined, otherwise must be defined explicitly. IKS_OPTION - Required for IKS. Include code
EFF "Net Culture & Cyber-Anthropology" Archivehttps://w2.eff.org/Net_culture/
the development of networking around the world. Hackers/ "Mentor was a hacker zealot who regarded computer intrusion as something close to a moral duty" - Bruce Sterling
#youbroketheinternet (YBTI)https://youbroketheinternet.org/
Distributed Networking for an Ethical Internet, including 50 Subsystems of GNUnet net2o: GUI, realtime mixnet and ethical micropayment with efficient BlockChain Scalable and Priva
The Kernel Hacker's Bookshelf: Ultimate Physical Limits of Computation [LWN.net]https://lwn.net/Articles/286233/
obscure bugs in obscure networking protocols for a while. Power usage? Posted Jun 19, 2008 8:37 UTC (Thu) by epa (subscriber, #39769) [ Link ] (3 responses) As you mentioned, thes
Moore's Law - we all know it (or at least think we do). To be annoyingly exact, Moore's Law i [...]
joshua steinhttp://jcs.org/
tags debugging , mac , networking , and retrocomputing Over the past year or so, I've been working with other BlueSCSI developers to add Wi-Fi functionality to their open-hardware
Let's Decentralizehttps://letsdecentralize.org/
"the cryptography-based networking stack for building local and wide-area networks with readily available hardware. Reticulum can continue to operate even in adverse conditions wi
Find more...