wiby  
Settings



Internet Software Patents

http://philip.greenspun.com/business/internet-software-patents

computer networking developed 1962: Licklider proposes "Intergalactic Computer Network" based on packet switching 1968: Ivan Sutherland and Bob Sproull, in a lab at Harvard, devel

C++ Applications

https://www.stroustrup.com/applications.html

utility) Some of the networking libraries in HP-UX Java VM core Parts of Openview Non-stop XML parser (originally from compaq) IBM : OS/400. K42 : a high performance, open source,

Linux

https://www.billdietrich.me/Linux.html

Linux" page My "Linux Networking" page My "Linux Storage" page My "Linux Problems" page My "Linux Network and Security Controls" page My "Linux GUI" page My "VMs and Containers" p
Linux operating system basics, parts, myths, and truths

Prof. Dr. Guido Salvaneschi | Programming Group

https://programming-group.com/members/salvaneschi

to the domain of networking. Unfortunately, the main abstraction used to represent packet data in P4, namely header types, lacks basic safety guarantees. Over the last few years,
Profile of Prof. Dr. Guido Salvaneschi, Head of the Programming Group.

Blog: The Death of Scientism

http://indigocurnick.xyz/blog/2024-03-05/the-death-of-scientism

Instrumental Ties: How Networking Can Make Us Feel Dirty ). This paper is about how individuals can feel "pysically dirty" when networking. Ziani found this… hard to bel
What has peer review done to us?

the djb way: the djb why?

http://thedjbway.b0llix.net/djbwhy.html

for programming and networking services. This is because Unix has undergone over 30 years of continuous refinement and development, over three decades of collaborative attention f
the djb why

What to do with an old computer?

http://toastytech.com/about/vintagecomputing.html

IDE/SATA, and Ethernet networking. The typical ideal "tweener" machine would: -Have any Pentium, K6, or Athlon era CPU -Have a generic AT or ATX case -Have BIOS support for *two*

ICIWorld Seminars for the World

http://www.iciworld.com/seminars.shtml

see that it is about networking. M any people are simply missing doing business and do not realize it.  T hese seminars and webinars will show you the difference.  It li

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

of: operating systems, networking, programming, scripting, databases, crypto, hardware, app types, app structures, servers. Technologies: specific operating systems, programming l
How to become a bug-bounty hunter and do penetration testing

UNATLe: United Nations AntiTerrorism Leauge

http://www.unatle.net/

Shows Up On My Social Networking To Me; Is A Terrorist In AlQaeda And Is To Be Immediately Slain Along With Anybody That Is Not A Ler Girl In Any Ghost Town Site That I Have Ever
A load out of the current Nuclear Cold War Scenario. Everything you need to know about nukes and the New World Order!

IBM SAGE

https://ed-thelen.org/comp-hist/vs-ibm-sage.html

part of computer networking you might expect that they were created for that purpose but it wasn't quite like that. In 1949 Jack Harrington and his group at the Air Force Cambridg

Capability Comparison

https://secushare.org/comparison

- How many social networking services can we replace? Introduction - What has led us here? Literature - Research Papers and more. Protocol - Ingredients: efficiency and extensibil


Find more...