A Dirgehttps://www.ietf.org/rfc/rfc2731.txt
R. Schwartz, Programming Perl, Second Edition, O'Reilly, 1996. [RDF] Resource Description Framework Model and Syntax Specification, February 1999. http://www.w3.org/TR/REC-rdf-syn
A tutorial and reference manual for Java.
Code of Conducthttps://www.improbableisland.com/coc.php
that people use Place programming, so the Places programming backend gets frequent updates to better cope with what builders ask of it. Bringing slow programs to CMJ's attention m
XML Linking Language (XLink) Version 1.0https://www.w3.org/TR/2000/PR-xlink-20001220/
and reference values in programming languages, is outside the scope of this specification. 1.1 Origin and Goals The design of XLink has been informed by knowledge of established h
http://galileo.phys.virginia.edu/classes/551.jvn.fall01/primer.htmhttp://galileo.phys.virginia.edu/classes/551.jvn.fall01/primer.htm
Looping and structured programming Indefinite loops Definite loops Structured programming “Top-down” design CREATE ... DOES (the pearl of Forth) Defining “defining&
Introduction: Why Lisp?https://gigamonkeys.com/book/introduction-why-lisp.html
greatest pleasure in programming comes from getting a lot done with code that simply and clearly expresses your intention, then programming in Common Lisp is likely to be about th
G-Kermit 2.01https://www.kermitproject.org/gkermit.html
system services and programming languages, the reality is that Unix-based software constantly needs to be "updated" to "comply" with one new "standard" after another, and so it is
Bit permutationshttp://programming.sirrida.de/bit_perm.html
stuff on http://programming.sirrida.de (setup on 2011-06-01), Intel introduced (published 2011-06-11, proposed for 2013, released about 2013-06) two new instructions for x86 proce
An essay about bit permutations in software
https://www.ietf.org/rfc/rfc3490.txthttps://www.ietf.org/rfc/rfc3490.txt
libraries through a programming interface (API). Because these resolver libraries today expect only domain names in ASCII, applications MUST prepare labels that are passed to the
CASsette IO Utilities - Readmehttp://www.mvcsys.de/doc/casioutil.html
generations of Casio's programming language. Notably the instructions Scl , Cl and Dt cannot be converted into the CAT format. To overcome this, some commands are replaced when a
Old, but Interesting Programshttp://invisible-island.net/personal/oldprogs.html
array. In my initial programming class, we used a 1620 model I, with 12,000 characters of memory. Midway through that year, the college purchased a model II from a neighboring col
Thomas Dickey has been writing software programs since 1970, and discusses here some of the more interesting ones.
Loper OS » No Formats, no Format Wars.http://www.loper-os.org/?p=309
Have you discovered a programming language in which it is impossible to write obfuscated code? Reply Stanislav says: January 21, 2011 at 3:55 pm Dear Bassett Disaster, Of course a
Emergent Technologies Inc. -- Security Kernel</TITLEhttp://mumble.net/~jar/pubs/secureos/secureos.html
operating systems and programming environments. This report describes Scheme 48, a programming environment whose design is guided by established principles of operating system sec
CADR
Find more...