Computer Software: Microsoft Office, Davka, LEC, Lotus, Corel, Serif, IBM/Lenovo Thinkpad - BMSoftwarehttp://www.bmsoftware.com/
Introduction to Computers BVG Train Yourself Java Advanced and Expert BVG Train Yourself Office 2000 / XP / 2003 BVG Train Yourself Office 2000 and 2002/XP BVG Train Yourself Outl
2500+ computer software titles inc: foreign language translation software, Microsoft Office, Serif, Davka, Corel, Power Translator, LEC Translate. IBM Lenovo Thinkpad laptops
Kernel Planethttps://planet.kernel.org/
with all other computers in the universe, delegate work to them, and control them (this was very futuristic in 1978, pre-Internet as we know it). Orac was considered the most valu
fpgacpu.org - FPGA CPU Newshttp://www.fpgacpu.org/
of an afficianado of computers ... If you're looking for tips on how to break into someone else's computer, you won't find them here." -- Preface Sunday, November 10, 2002 The old
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
Memory part 2: CPU caches [LWN.net]https://lwn.net/Articles/252125/
it does not matter. But computers do not have large main memories for no reason. The working set is bound to be larger than the cache. This is especially true for systems running
The second part of Ulrich Drepper's 'What every programmer should know about memory' document [...]
Alterslash, the unofficial Slashdot digesthttps://alterslash.org/
32 electrons. Quantum computers can represent these systems directly rather than approximate them, because they operate according to the same quantum mechanical laws that govern e
Alterslash picks the best 5 comments from each of the day’s Slashdot stories, and presents them on a single page for easy reading.
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
He Who Controls the Bootloaderhttp://birdhouse.org/beos/byte/30-bootloader/
on consumer computers. There is no technical reason why CompUSA customers shouldn't be able to walk out of the shop with a machine that asks "Which OS do you want to use today?" u
C-Kermit Unix Hints and Tipshttps://www.kermitproject.org/ckubwr.html
them among all types of computers. You can easily turn them off and on when power-cycling seems warranted. They are more likely to have manuals. Internal PC modems (even when they
Pete's QBASIC / QuickBasic Sitehttp://www.petesqbsite.com/index.php
compatible with today’s computers. Back in the Windows 3.x / 95 / 98 / ME days, computers still booted into MS-DOS before they booted into Windows, so QB ran fairly seamlessly. It
Libreboot – Frequently Asked Questions about Libreboot firmwarehttps://libreboot.org/faq.html
devices as well as computers. Example attack that malicious firmware could do: substitute your SSH keys, allowing unauthorized remote access by an unknown adversary. Or maybe subs
Todos los enlaces @ cidoku.nethttp://cidoku.net/links/all
browse the web on old computers. The Restart Page Experience the rebooting experience from vintage operating systems. Utilu IE Collection A program for Windows that will install m
Find more...