x86 Assembly Language Books and Linkshttp://www.duntemann.com/assembly.html
and explain what computers are and what they do. Assembly language must take the hardware into account (at least as far as memory addressing is concerned) so I talk at length abou
RFC 8700: Fifty Years of RFCshttps://www.rfc-editor.org/rfc/rfc8700.html
community. All of the computers have changed, as have all of the transmission lines, but the RFCs march on. Maybe I'll write a few words for RFC 10,000. ¶ Quite obviously, the cir
Armageddon-IBM-InstallsUsageMeters.htmlhttps://www.ed-thelen.org/comp-hist/JVG-Armageddon-IBM-InstallsUsageMeters.html
the vacuum tubes in the computers. It was ok to rent the free hours to someone else as long as the total usage was reported. Some were even blatant by demanding three shift CE cov
I'm alone, but not lonelyhttp://www.cjas.org/~leng/otaku-e.htm
writing games on home-computers first appeared. By the age of thirteen she had made friends with the manager of the game-parlor to which she now went daily. He introduced her to s
Responses to Criticisms of “Why I Prefer Permissive Licenses to Copyleft” - Miscellaneous - lolwut?http://lolwut.info/misc/permissive-vs-copyleft-responses.html
my primary interests (computers and the Internet), and of the communities to which I gravitate as a result of those interests: the computer, software, imageboard, and other Intern
My various responses to criticisms of my “Why I Prefer Permissive Licenses to Copyleft” essay
Cloudeight Privacy Policyhttp://thundercloud.net/privacy.htm
programs and scan their computers regularly. We will never hide spyware or adware inside our programs (this is called bundling). We believe in you. We want you to believe in us. W
https://dcdave.dot5hosting.com/article5/131108.htmhttps://dcdave.dot5hosting.com/article5/131108.htm
she was in had working computers in it, and he believes, "at the very minimum, those computers contained the drawings of the building, and that was top secret." Yet, he
Privacy Policyhttps://www.aacalc.com/privacy_policy
We make use of computers located at Amazon Web Services, a hosting provider. Amazon Web Services publishes information on the security of its systems . If we change our privacy po
B&TW Intro: Mal-warehttp://www.spywarewarrior.com/uiuc/btw/ps-intro/btw-intro1.htm
what they do with their computers. As I've said before: " Dumb users trump smart software every day of the week. " Viruses & Worms The first thing we need to do is i
Java Tester - Newshttps://javatester.org/news.html
on over 50% of computers with Java. Oracle does patch Java 6 but the fixes are only availalbe to companies that pay for them. July 18, 2013: It just never ends. Yet another Java b
Java Tester. News Page.
CNE Tutorial Moduleshttp://denninginstitute.com/modules/
problems of making computers and the Internet work. Core of Information Technology Computing Technology Modules These modules focus on computer science subjects useful to both the
Library of Internet-accessible tutorial modules in Computer Science, general engineering, high school math and college statistics. Learning by non-linear paths. Modules include int
Holland Consultinghttp://holland-consulting.net/
"My goal is to make computers like telephones. No one cares what brand the phone on their desk is. They pick it up, use it, hang up. They should just work and let people get on wi
Find more...