✨️computer_glamour✨️https://computer.glamour.ovh/
Blog PGP About me My Git my PC Do you know why system drive is called C:\ in windows ? It was called that because A and B were already used for floppy disks. ---- Isn't colo
Resume for Jamie Marconihttp://www.hungry.com/~jamie/resume.html
Jamie Marconi 505 W. Roy St. #101 - Seattle, WA 98119 - (206) 282-5010 jamie-resume@hungry.com Objective: To develop and maintain high impact software applicati
Resume
A better zip bombhttps://www.bamsoftware.com/hacks/zipbomb/
A better zip bomb David Fifield david@bamsoftware.com 2019-07-02 updated 2019-07-03 , 2019-07-05 , 2019-07-06 , 2019-07-08 , 2019-07-18 , 2019-07-20 , 2019-07-22 , 2019-07-24 , 20
M. Douglas McIlroyhttps://cs.dartmouth.edu/~doug/
M. Douglas McIlroy, Adjunct Professor Department of Computer Science 6211 Sudikoff Hall Dartmouth College Hanover, NH 03755 douglas.mcilroy@dartmouth.edu +1 603 646 1077 2003 mark
Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 2.0https://www.w3.org/TR/2007/WD-CCPP-struct-vocab2-20070430/
Composite Capability/Preference Profiles (CC/PP): Structure and Vocabularies 2.0 W3C Working Draft 30 April 2007 This version: http://www.w3.org/TR/2007/WD-CCPP-struct-vocab2-2007
UTS #39: Unicode Security Mechanismshttp://www.unicode.org/reports/tr39/
Technical Reports Unicode® Technical Standard #39 Unicode Security Mechanisms Version 17.0.0 Editors Mark Davis ( markdavis@google.com ), Michel Suignard ( michel@suignard.
Workstreams — WHATWGhttps://whatwg.org/workstreams
WHATWG Workstreams Standards FAQ Policies Participate This document contains an official Steering Group -maintained accounting of the WHATWG workstreams, their responsible editors
EDPPhttps://aetherlang.github.io/EDPP/
EDPP Aetherlang Wiki About Author Ether-Dimensional Programming Paradigm The Paradigm Ether-dimensional programming paradigm (EDPP) was originally designed as an experiment. This
'Huge model' Turbo Pascalhttp://www.midnightbeach.com/jon/pubs/huge-model.htm
'Huge model' Turbo Pascal Among Windows' many endearing features, the fact that protected mode programs can dynamically allocate megabytes of RAM -- not a mere handful of kilobyte
Storieshttps://www.ed-thelen.org/comp-hist/stories.html
Go to Antique Computer home page Stories about People and Machines Well OK, and a little software too ;-)) Proposed Purpose - Capture the life and times of the e
Yamaha Black Boxes online archivehttps://yamahablackboxes.com/
Yamaha Black Boxes online archive These are the second most powerful tools for making music. The first is your ear. That’s the catchphrase of a Yamaha advertisement for their comp
A collection of Yamaha DX7, DX100, RX5 and more. This website attempts to give credit to the extraordinary work of consistency the Design Laboratory kept back then: black boxes, DX
Edsger Dijkstra - How do we tell truths that might hurt?https://www.cs.virginia.edu/~evans/cs655/readings/ewd498.html
University of Virginia, Department of Computer Science CS655: Programming Languages, Spring 2001 How do we tell truths that might hurt? Edsger W.Dijkstra, 18 June 1975 from https:
Find more...