wiby  
Settings



Ted Felix - Kids Computer Programming Books

http://tedfelix.com/books/

a computer works and applications like airline reservations and space exploration. Favorite quotes: "Man probably could not have reached the moon without the help of a high-speed

Online BYTE Archive

https://halfhill.com/bytelink.html

of real business applications written in Java — and all of them are running today or are in the early stages of deployment. [October 1997] Excelling at Java: One developer us

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

We need more sites, applications, and protocols designed with security and privacy as priorities from the foundation up. Maybe "mesh" networking, peer-to-peer systems, distributed
Best practices and information about computer and smartphone security and privacy

Mataroa Collection

https://collection.mataroa.blog/

HTTP-related applications and improving development processes. Colby Fayock https://www.colbyfayock.com/ Javascript, UX, programming Tyler Cipriani https://tylercipriani.com/ Tech

AAU

https://aau.org/feed/

Instructions and Applications Deadline The application letter and supporting documents of candidates should be submitted online https://www.research.net/r/IARCO25 latest by 17.00

Network Protocols and Standards

https://lisans.cozum.info.tr/networking/7KATMANNetworkProtocolsandStandards.htm

Application Gives user applications access to network. This layer represents the services, that directly support the user applications such as software for file transfers, databas

NLnet; All projects

https://nlnet.nl/project/

dialogs throughout KDE applications Accessible security NGI0 PET 2019 2022 Integration effort of independent security efforts like Qubes, Heads, coreboot, etc ActivityPods NGI0 En

Why Open Source Software / Free Software (OSS/FS, FOSS, or FLOSS)? Look at the Numbers!

https://dwheeler.com/oss_fs_why.html

for mission-critical applications”. I believe that this paper has met its goal; others seem to think so too. The 2004 report of the California Performance Review, a report f
This paper provides quantitative data that, in many cases, open source software

S.U.P.E.R. - The Largest 200LX Software Archive

http://mizj.com/

or intangible factors. Applications: location planning, strategic planning, cost/benefit analysis, recruiting, employee evaluation, resource allocation, product evaluation, sales
The Palmtop Network's SUPER Site is the largest collection of Hewlett-Packard 200LX palmtop computer software on the Internet.

Biography of Michelle A. Hoyle

http://www.eingang.org/Misc/aboutme.html

a moderator for "Web Applications: Design, Development, and Management" (TT280), "Client Side Development" (TT281), and "Open Source Development Tools" (TT381). She has been the c
Welcome to the EinWorld. All about Michelle A. Hoyle. It's an EinWorld for the Quirky Blonde One

C-Kermit 9.0 Update Notes

https://www.kermitproject.org/ckermit90.html

or even different applications on the same computer, might use different standards or conventions ("character sets") for representing the same characters. Usually ASCII is safe, b

The Mailbag LG #115

https://linuxgazette.net/115/lg_mail.html

involved higher-level applications such as credit card payment and inventory management. The 2038 bug, on the other hand, affects the basic time-keeping function. "I would guess t


Find more...