xx80 | Opinionated Guideshttps://opguides.info/posts/xx80/
ignals & Systems 29 Communications 30 DSP 31 Control Systems 32 Computer Vision 33 Fine, here's AI/ML Going Deeper 34 Compilers & Assemblers 35 Reverse Engineering 36 P
The year is 198x. #I stare at my amber terminal. Hexadecimal fills my screen and my mind has become lost in the flow of 6502 assembly, as I hand optimize the code flow.I’m
Regular Expression Matching Can Be Simple And Fasthttps://swtch.com/~rsc/regexp/regexp1.html
online editor,” Communications of the ACM 10(12) (December 1967), pp. 793–799. http://doi.acm.org/10.1145/363848.363863 [ 2 ] Ville Laurikari, “NFAs with Ta
Photogallery Script - Create HTML gallery from image fileshttps://www.kermitproject.org/photogallery.html
devised for use in data communications and on the Web. Today, any given Web page might have any of these encodings but all "legacy" text is supposed to be converted to UTF-8. For
The Molecular Repair of the Brainhttp://www.ralphmerkle.com/cryo/techFeas.html
mass will be used for communications (sending and receiving signals from other computers) and power. In addition, there will probably be a "toolkit" of interchangeable tips that c
Tony Field (VE6YP)https://www.qsl.net/ve6yp/
VE6NTF Nick @ NTF Communications Calgary Send email to Tony, VE6YP: [email protected]
Radio logging and control, design and mapping utilities.
Xlib - C Language X Interfacehttps://www.x.org/releases/current/doc/libX11/libX11/libX11.html
the display and communications domain to be used. On a POSIX -conformant system, if the display_name is NULL, it defaults to the value of the DISPLAY environment variable. The enc
Miller Microcomputer Services - Index Pagehttp://www.millermicro.com/
for the World’s Private Communications (TheGuardian, 2015), Global spy system ECHELON confirmed at last (The Register, 2015), The Most Dangerous People on the Internet Righ
Business and pleasure by Dick and Jill Miller of Miller Microcomputer Services.
Old, but Interesting Programshttp://invisible-island.net/personal/oldprogs.html
course content included communications and control systems—as well as a graduate course on operations research (queuing theory). To gain insight, I wrote programs to make si
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.
Lightning and Fault Suppressionhttps://edisontechcenter.org/LightningSuppression.html
Tech Center Whelan Communications Schenectady Museum Hall of History US Patent Office Hawkins Electrical Guide. 1914 For use of Edison Tech Center images and videos see our licens
Engineering Resources
Amigahttp://privat.bahnhof.se/wb198103/Amiga.html
Amiga internet and communications software Epost-program: Yam - Yet another mailer Amigaos - Yam &n
BiMAVs; Bipedal Mechanized Assault Vehicleshttp://www.bimavs.com/CellularDiamondArmor.html
CDA cell. The interunit communications encryption and security checks all throughout the system which detect intrusion based espionage(and decide what to do with internal defenses
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen
Commodore PET extensionshttp://www.6502.org/users/andre/petindex/extensions.html
adapter RS232 serial communications Microtech Portmaker WCS-232 Memory extensions Unknown brand PET RAM expansion PET EPROM adapter Other CPUs SuperPET Unknown brand Z80 CP/M card
Commodore hardware extension descriptions
Find more...