Ted Felix - Kids Computer Programming Bookshttp://tedfelix.com/books/
a computer works and applications like airline reservations and space exploration. Favorite quotes: "Man probably could not have reached the moon without the help of a high-speed
Online BYTE Archivehttps://halfhill.com/bytelink.html
of real business applications written in Java — and all of them are running today or are in the early stages of deployment. [October 1997] Excelling at Java: One developer us
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
We need more sites, applications, and protocols designed with security and privacy as priorities from the foundation up. Maybe "mesh" networking, peer-to-peer systems, distributed
Best practices and information about computer and smartphone security and privacy
Mataroa Collectionhttps://collection.mataroa.blog/
HTTP-related applications and improving development processes. Colby Fayock https://www.colbyfayock.com/ Javascript, UX, programming Tyler Cipriani https://tylercipriani.com/ Tech
AAUhttps://aau.org/feed/
Instructions and Applications Deadline The application letter and supporting documents of candidates should be submitted online https://www.research.net/r/IARCO25 latest by 17.00
Network Protocols and Standardshttps://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm
Application Gives user applications access to network. This layer represents the services, that directly support the user applications such as software for file transfers, databas
NLnet; All projectshttps://nlnet.nl/project/
dialogs throughout KDE applications Accessible security NGI0 PET 2019 2022 Integration effort of independent security efforts like Qubes, Heads, coreboot, etc ActivityPods NGI0 En
Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!https://dwheeler.com/oss_fs_why.html
for mission-critical applications”. I believe that this paper has met its goal; others seem to think so too. The 2004 report of the California Performance Review, a report f
This paper provides quantitative data that, in many cases, open source software
S.U.P.E.R. - The Largest 200LX Software Archivehttp://mizj.com/
or intangible factors. Applications: location planning, strategic planning, cost/benefit analysis, recruiting, employee evaluation, resource allocation, product evaluation, sales
The Palmtop Network's SUPER Site is the largest collection of Hewlett-Packard 200LX palmtop computer software on the Internet.
Biography of Michelle A. Hoylehttp://www.eingang.org/Misc/aboutme.html
a moderator for "Web Applications: Design, Development, and Management" (TT280), "Client Side Development" (TT281), and "Open Source Development Tools" (TT381). She has been the c
Welcome to the EinWorld. All about Michelle A. Hoyle. It's an EinWorld for the Quirky Blonde One
C-Kermit 9.0 Update Noteshttps://www.kermitproject.org/ckermit90.html
or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same characters. Usually ASCII is safe, b
The Mailbag LG #115https://linuxgazette.net/115/lg_mail.html
involved higher-level applications such as credit card payment and inventory management. The 2038 bug, on the other hand, affects the basic time-keeping function. "I would guess t
Find more...