wiby  
Settings



PhD Thesis: Cascading Style Sheets

https://www.wiumlie.no/2006/phd/

of personal computers for use in the preparation of manuscripts. Electronic publishing offered tools to ease all stages of publishing from authoring, through editing, to printing.

The Retrocomputing Museum

http://www.catb.org/retro/

Reduced Instruction Set Computers? Well, here is the concept taken to its logical extreme — an emulator for a computer with just one (1) instruction (Subtract and Branch if
A museum of archaic computer languages

Regulating Robocar Safety

https://www.templetons.com/brad/robocars/regulation.html

bigger, more complex computers and operating systems with more chance of failure. As such, many suspect the best path is not to design the systems with maximum reliability, but to

Light Table Blog

http://lighttable.com/2014/05/16/pain-we-forgot/

people interact with computers as if they were people. Many of the results of this research are suprising and counter-intuitive eg personifying the compiler can improve learning r
Light Table is the next generation code editor. Light Table Connects you to your creation with instant feedback and showing data values flow through your code.

100R — weathering software winter

http://100r.co/site/weathering_software_winter.html

software, you need slow computers, and we've tried to espouse this as much as we could. We spend our time sailing around, and doing experiments with resilience, that covers comput

TheRagens Home Page

http://www.theragens.com/

& Video Games Computers DVD Electronics Gourmet Food Health & Personal Care Home & Garden Jewelry & Watches Kitchen & Housewares Magazine Subscriptions Miscell
The Ragens web site is focused on Ragen family history (including the Geer and Munk families) in addition to our personal interests such as wildlife photography, wine tastings, boo

Big Brother Loves You... - El Gran Hermano Te Ama...

https://www.bibliotecapleyades.net/sociopolitica/sociopol_bigbrother.htm

and Mind Reading Computers    -  Edward Snowden Quotes About U.S. Government Spying that Should Send a Chill Up Your Spine Español  -  El Chip Inteligente

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

between two computers. It performs name recognition and the functions such as security, needed to allow two applications to communicate over the network, also provides error handl

Procrastinators Club: Productivity is Overrated

https://www.procrastinators.org/oldsite/news.shtml

careful to protect our computers against Evil (worms, trojans, etc).  We employ common sense, firewalls, detection software, and antivirus programs to help us stay clean.&nbs

ICPUG Electronic Journal - Article Number 6 - Volume 2 Number 6

http://www.icpug.org.uk/national/journals/jnls2000/ej600/art6.htm

24MB? Simple: Most computers today have so much RAM they encourage programmers to waste resources out of laziness. Here's a little background on computer programming in the 1980s

Winlink 2000 Radio-Email System Overview

http://www.arrl-mdc.net/Winlink/MDCWL2KOVwAM.htm

mail from their own computers at their own desks or in the field, with amateur radio operator supervision, through our stations. This is what our served agencies need. The WL2K ne

Emergent Technologies Inc. -- Security Kernel</TITLE

http://mumble.net/~jar/pubs/secureos/secureos.html

available on many computers called "user mode". When the processor is in user mode, all dangerous operations are preempted, causing the supervisor program to be invoked.
CADR


Find more...