wiby  
Settings



WAI-ARIA 1.0 User Agent Implementation Guide

https://www.w3.org/TR/wai-aria-implementation/

defined in a way that computers can process a representation of an object , such as elements and attributes , and reliably represent the object in a way that various humans will a

SGI Technical Advice and Information...

http://www.sgidepot.co.uk/sgi.html

Onyx Graphics Supercomputers Onyx RealityEngine2: Host Integrated Computer Image Generator Onyx Real-Time Image Generation Onyx RealityEngine2 Triple Keyboard Option Reality Stati

Matej Horvat

http://matejhorvat.si/en/index.htm

the Dialog and Partner computers. Software Some software that I wrote. Virtual Boy Information and projects related to the Virtual Boy video game system by Nintendo. DOS Informati
Web site of Matej Horvat.

Sky Net

http://www.sonex.org/SkyNet.html

to this, ideal Silicon computers will be available in summer of 2011. This chip speed acceleration is necessary for getting tons of good computers all over the globe to counter th
Sky Net: What makes nukes fly, what commands navies and armies, what makes all organisms think and intercommunicate, and what tweaks all the Ons in the universe, Sky Command: Defen

http://www.columbia.edu/kermit/ftp/dec20/assembler-guide.txt

http://www.columbia.edu/kermit/ftp/dec20/assembler-guide.txt

different processors (computers) in the PDP-10 family: the PDP-6, the KA10, the KI10 and the KL10. The newest of these is the KL10 which is the central processor in various DECsys

Frequently asked questions (FAQ) about HyperPublish

http://www.hyperpublish.com/create_a_catalog_00003b.htm

are universal on all computers?   Yes, Times New Roman, Arial and Courier New. If the user has MSWindows+Office usually also Verdana and some others. If you want to use a fan
This page is about games> <

Stuff Michael Meeks is doing

https://apple-tree.life/~michael/blog/2017/

Thursday. Packed up computers, dropped off babes, into Cambridge with J. Un-loaded the PCs, customer call, meeting with our accountant. Mail chew, patch review etc. Into town to t

CRN / Unix

http://crn.hopto.org/unix.html

into government computers and stealing information. But real hackers are folks who like to learn about technology and modify it for their own use. Any technology, not just compute
Linux and Unix scripts, history, and fun. Come in and enjoy the prompt, again.

https://www.rogerarrick.com/osiris/burgett.txt

https://www.rogerarrick.com/osiris/burgett.txt

DEBUG instruction. Many computers have a single byte instruction, called DEBUG, which when executed, would do an indirect call through a fixed address. This allows people who writ

POSIX Shell Tutorial

https://www.grymoire.com/Unix/Sh.html

you prefer) break into computers and often use strange filenames, like ". " or ".. " to hide their traces. You may not have noticed, but there was a space in these filenames. Refe
The Grymoire's tutorial on the POSIX Shell

Home - skipster1337's Site

https://skipster1337.github.io/

things related to old computers, operating systems and software, and trying to keep them usable in modern times. Hope you enjoy your stay. Also, I tried my best to make this work

Kermit 95 2.1 - Terminal Emulation, File Transfer, and Scripting acrossSerial Ports, Modems, and Internet for Microsoft Windows and IBM OS/2</

https://www.kermitproject.org/k95.html

and on many kinds of computers and operating systems : past, present, and future. Kermit 95 is used all over the world in the academic, government, corporate, and nonprofit sector


Find more...