https://colorforth.github.io/POL.htmhttps://colorforth.github.io/POL.htm
dozen times on as many computers and languages, you'll be pretty good at it. If you don't plan to be programming that long, you won't be interested in this book. What sort of subr
Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr
Loper OS » Seven Laws of Sane Personal Computinghttp://www.loper-os.org/?p=284
with such things on our computers is a broken one: see the Seventh Law. Obfuscated code destroys my ability to usefully interrogate the machine about its activity at all times, an
Portar MSX Tech Dochttp://problemkaputt.de/portar.htm
the I/O Map of MSX computers, attempting to supply a very compact and mostly complete document about MSX1 and MSX2 hardware. It does not include information about the MSX firmware
Some publicationshttps://members.loria.fr/PZimmermann/papers/
classical (nonquantum) computers, including, in particular, our most recent computational records for integer factoring and prime-field discrete logarithms. 2021: Three Cousins of
Capability Comparisonhttps://secushare.org/comparison
somebody broke into our computers and snooped our passwords. Lightweight: To be of maximum use the technology implementing such essential jobs should be a part of the operating sy
Test report drum scanner Hasselblad Flextight X5: Image quality, scan speed, measured values, image samples, comparison with Nikon Super Coolshttps://www.filmscanner.info/en/HasselbladFlextightX5.html
significantly on the computers performance data at which the scanner is connected. The maximum speed value of the scanner announced by the producer of 300 MB/minute can be only ac
Professional film scanner Hasselblad Flextight X1 for digitalising film material in 35-mm formats, medium formats and large formats in an excellent image quality and a high speed
A Dirgehttps://www.ietf.org/rfc/rfc2731.txt
pose no direct risk to computers and networks. People can use these rules to encode metadata that is inaccurate or even deliberately misleading (creating mischief in the form of "
A tutorial and reference manual for Java.
WOLF - a proposed new signal format for LFweak-signal workhttps://www.qsl.net/dl4yhf/wolf/wolf_info.html
testing with simulated data, you will need a file containing suitable noise. I used a file provided by Lyle; you can find a copy here . If your system just plays the noise, right-
Learning HTML 3.2 by Exampleshttps://www.fi.muni.cz/~hales/html/jk.html
http://www.yahoo.com/Computers/ , which contains, in its World Wide Web section , a list of guides and tutorials on HTML (in several languages). Please notice that most introducto
The little book about OS developmenthttp://littleosbook.github.io/
rg/gustavo/blog/post/how-computers-boot-up Gustavo continues to describe what the kernel does in the very early stages at http://duartes.org/gustavo/blog/post/kernel-boot-process T
FOSDEM 2017 - Sundayhttps://archive.fosdem.org/2017/schedule/day/sunday/
desktops for retro computers Handle Conflict, Like a Boss! Is the GPL a copyright license or a contract under U.S. law? GitLab CI: (almost) effortless Open Source CI
Find more...