John Sturdy's home pagehttp://www.cb1.com/~john/
working on Genetic Programming.. I have a degree and a PhD in Computer Science (see my thesis, A Lisp through the Looking Glass or as PDF ), and worked for over a decade as a prof
Filk Music | Nora Codeshttps://nora.codes/filk/
Skip to main content Nora Codes home blog tutorials projects rss Filk Music My copy of the Minus Ten and Counting songbook. “Filk” is not a typo, though it started out
Leonora Tindall's personal website, regarding programming, hacking, and politics.
GPS Receiver Information, Software, and Hardware Reviews of Garmin, Lowrance, Magellan and other GPS Receivershttp://gpsinformation.net/
logger and other programming subroutines for GPS (Link) RS232C Voltage-Levels Standard (AUG 98) Rubber Banding Routes: What does this mean? Why would I want it? What GPS has
GPS Information on Garmin, Lowrance, Magellan and other CONSUMER receivers
The Boston Radio Dial: WMBR(FM)https://www.bostonradio.org/stations/64683
three evenings a week, programming classical and popular music, but programming eventually expanded across the week as more students joined the station's staff. Commercials were a
WWW.NIC.FUNET.FIhttp://ftp.funet.fi/
, OpenBSD , NetBSD Programming CPAN: The Comprehensive Perl Archive Network , EPEL , GNU software , MariaDB , Qt , Sourceware Desktop Ghostscript , Gimp , KDE , Libre Office , Ope
Akkana's Software Pagehttps://shallowsky.com/software/
Planet article, GUI Programming in Python For Beginners: Create a Timer in 30 Minutes . vol (python/gtk) is a fast and simple volume control app, written in PyGTK. The normal gtk
Negative utilitarianism as conceived by ChatGPT-4https://www.utilitarianism.com/chatgpt/negative-utilitarianism.html
consequences: Programming an AGI with the utility function of "minimize suffering" might lead to undesirable outcomes, such as the elimination of sentient beings (including humans
Improving storage of password-encrypted secrets in end-to-end encrypted apps - dchest.comhttps://dchest.com/2020/05/25/improving-storage-of-password-encrypted-secrets-in-end-to-end-encrypted-apps/
Cryptography · Programming Three latest articles ML-KEM in WebCrypto API How to store web app data in the system keychain Blurring is not enough List of all articles Feed &co
Finite State Machines in Forth - Noblehttp://galileo.phys.virginia.edu/classes/551.jvn.fall01/fsm.html
Introduction Certain programming problems are difficult to solve procedurally even using structured code, but simple to solve using abstract finite state machines (FSMs) [1]. For
Index - ari.lthttps://ari.lt/
Me In short, I've been programming for most of my life. I started young when my journey began on a phone with Python, before graduating to Linux and a personal computer. Since the
Free and Open Source tech world of Arija A., also known as Ari Archer, where she posts random ramblings, tools, and provides services.
Blogopodhttps://blogopod.com/
A Visual History of Programming Languages #programming #software #web Sat 18. IV. 2026 An interactive visual history of programming languages from 1957 (and before) to today. Incl
From all sides of the web
AKBattenhttps://akbatten.com/
26-Jan-22 [EMB] Programming a Nintendo DS 14-Sep-20 [HAM] Tape-measure Yagi Antenna 25-Aug-20 [µC] Teensy Based Effect Pedal 22-Jul-20 [HAM] Portable Antenna Mast 10-Jul-20
Project write-ups
Find more...