DOS Programming, Undocumented DOS, and DOS Secretshttp://fysnet.net/
Operating System Design Series The Israelites looked at Goliath and moaned, "He is so big! How can we ever defeat him?" David looked at Goliath and exclaimed, "He is so big! How c
Batten -Aesthetic Manifestohttps://tebatt.net/Aesthetics.html
the different design factors and the "market" for the product is represented once again as a community with a shared aesthetic, on the other hand, the existence of a single (objec
A Manifesto concerning Aesthetics by Artist Trevor Batten
Awesome-Warez | All your base are belong to us!https://lkrjangid1.github.io/Awesome-Warez/
GNU/Linux distribution designed for digital forensics and penetration testing. Parrot - Distribution similar to Kali, with multiple architecture. PentestBox - Opensource pre-confi
All your base are belong to us!
the Nothing itself nothingshttp://nothings.org/
the complexity of API design when it comes to memory usage 2014-04-09: The Compositing Tree: How to Make a 2D Renderer with a Totally Different Performance Profile than a 3D Rende
Everyday Uses for PVC Water Pipe - Thomas Tilleyhttps://tomtilley.net/projects/pvc/
more details about the design and construction of the cars on this project page . Pinball Table Leg Extensions The white office table I used for the virtual pinball machine wasn't
Bo Waggoner's Homepagehttps://bowaggoner.com/
Foundation grant on "Design of Automated Market Makers from Prediction Market Principles" National Science Foundation "Small" grant on "Next Steps for Weitzman’s Pandora’s Box Pro
John Gilmore's home pagehttp://www.toad.com/gnu/
heart. These boxes are designed to make mass surveillance impractical and thus to safeguard political liberty (even in countries that don't favor individual liberty). See the vide
https://icescape.org/Happening.htmlhttps://icescape.org/Happening.html
describe it as, "a design that warns the public about how close we are to destroying our world with dangerous technologies of our own making. It is a metaphor, a reminder of the p
Brendan Gregg's Homepagehttps://www.brendangregg.com/
sysdig conference on Designing Tracing Tools ( slides , youtube , PDF ) (2016). I wrote the original bcc/BPF end user tutorial , Python developer tutorial , and reference guide (2
Brendan Gregg's homepage: I use this site to share various things, mostly my work with computers, specifically, computer performance analysis and methodology.
Linux in a Pixel Shader - A RISC-V Emulator for VRChathttps://blog.pimaker.at/texts/rvc1/
keep the two-pass design instead of multiple passes in the CRT, simply loop directly in the shader and run multiple ticks at once This option has the least non-compute overhead of
Linux in a Pixel Shader - A RISC-V Emulator for VRChat
607webhttps://www.607web.nl/
wachtwoordsysteem / Designing a password system for video games Sterren uit de ruimtegametijdlijn Versies van Pong Waarom de zwart-witte Game Boy het van de kleurrijke concurrenti
ChapterCheats - Your Cheats, Cheat Codes, Tips, Hints and FAQs Providerhttps://www.chaptercheats.com/
The Cats, (AND) Home Design Tower: Build House, (AND) Jig Find, (AND) Train Crew Sim 3 Bus Edition, (AND) N0rad: Animal Defense, (AND) Skull Treasures Match 3 Puzzle, (AND) Flight
Cheats, Cheat Codes, Hints, Q&A, Secrets and Walkthroughs for thousands of video games on platforms such as Xbox 360, Playstation 3, Nintendo DS, PSP, Iphone, PC and older game
Find more...