wiby  
Settings



x86 Assembly Language Books and Links

http://www.duntemann.com/assembly.html

and explain what computers are and what they do. Assembly language must take the hardware into account (at least as far as memory addressing is concerned) so I talk at length abou

RFC 8700: Fifty Years of RFCs

https://www.rfc-editor.org/rfc/rfc8700.html

community. All of the computers have changed, as have all of the transmission lines, but the RFCs march on. Maybe I'll write a few words for RFC 10,000. ¶ Quite obviously, the cir

Armageddon-IBM-InstallsUsageMeters.html

https://www.ed-thelen.org/comp-hist/JVG-Armageddon-IBM-InstallsUsageMeters.html

the vacuum tubes in the computers. It was ok to rent the free hours to someone else as long as the total usage was reported. Some were even blatant by demanding three shift CE cov

I'm alone, but not lonely

http://www.cjas.org/~leng/otaku-e.htm

writing games on home-computers first appeared. By the age of thirteen she had made friends with the manager of the game-parlor to which she now went daily. He introduced her to s

Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?

http://lolwut.info/misc/permissive-vs-copyleft-responses.html

my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay

Cloudeight Privacy Policy

http://thundercloud.net/privacy.htm

programs and scan their computers regularly. We will never hide spyware or adware inside our programs (this is called bundling). We believe in you. We want you to believe in us. W

https://dcdave.dot5hosting.com/article5/131108.htm

https://dcdave.dot5hosting.com/article5/131108.htm

she was in had working computers in it, and he believes, "at the very minimum, those computers contained the drawings of the building, and that was top secret." Yet, he

Privacy Policy

https://www.aacalc.com/privacy_policy

We make use of computers located at Amazon Web Services, a hosting provider. Amazon Web Services publishes information on the security of its systems . If we change our privacy po

B&TW Intro: Mal-ware

http://www.spywarewarrior.com/uiuc/btw/ps-intro/btw-intro1.htm

what they do with their computers. As I've said before: " Dumb users trump smart software every day of the week. " Viruses & Worms The first thing we need to do is i

Java Tester - News

https://javatester.org/news.html

on over 50% of computers with Java. Oracle does patch Java 6 but the fixes are only availalbe to companies that pay for them. July 18, 2013: It just never ends. Yet another Java b
Java Tester. News Page.

CNE Tutorial Modules

http://denninginstitute.com/modules/

problems of making computers and the Internet work. Core of Information Technology Computing Technology Modules These modules focus on computer science subjects useful to both the
Library of Internet-accessible tutorial modules in Computer Science, general engineering, high school math and college statistics. Learning by non-linear paths. Modules include int

Holland Consulting

http://holland-consulting.net/

"My goal is to make computers like telephones. No one cares what brand the phone on their desk is. They pick it up, use it, hang up. They should just work and let people get on wi


Find more...