Linux Enterprise Computinghttp://linas.org/linux/index.shtml
of all varieties of applications can be found on the Linux Applications and Utilities Page and the Scientific Applications on Linux site. The latest bleeding-edge cuts can be foun
A survey of Linux software useful in a corporate, commercial, enterprise setting. Reviews SQL databases and related tools, project management tools, data availability a
Xanalogical Structure: Now More Than Everhttps://xanadu.net/NOWMORETHANEVER/XuSum99.html
not added at the application level. Such a facility, at the system level, is vital for many study and organization purposes. This is transclusion.* Actually transclusi
Character Model for the World Wide Web 1.0: Fundamentalshttps://www.w3.org/TR/charmod/
W3C specifications and applications now use Unicode as the common reference character set. When data transfer on the Web remained mostly unidirectional (from server to browser), a
ImperialViolet - Posts index - ImperialViolet.orghttps://www.imperialviolet.org/posts-index.html
10 Feb 2005 » Why Application Level Filtering in Tor is Bad 31 Jan 2005 » Right To Protest 30 Jan 2005 » Directions in Future Languages - Software Transactional
Your Personal Web Sitehttps://www.billdietrich.me/YourPersonalWebSite.html
Record your "Master Application Key" value from My Settings / App Keys. Create an application key there too; you will get an "id" value and a "key" value. Max of 100 buckets, each
How to develop and maintain your own personal web site
Storieshttps://www.ed-thelen.org/comp-hist/stories.html
projects, creating an application infrastructure under DOS/VSE-- VSE/ESA that would now be recognizable as a rudimentary O-O "com-layer" [~20k lines of COBOL and several thousand
Technological slaveryhttp://digdeeper.love/articles/technological_slavery.xhtml
Now literally anyone - application developer, ad pusher, webdev, etc. can attempt to send tracking data (that you won't be able to detect without network monitoring or reverse eng
Online BYTE Archivehttps://halfhill.com/bytelink.html
of real business applications written in Java — and all of them are running today or are in the early stages of deployment. [October 1997] Excelling at Java: One developer us
CipherSaber Home Pagehttps://ciphersaber.gurus.org/
operating systems and application software have sharply limited the security features they include out of fear that their products will be subject to export controls. If security
Fight the crypto ban by learning how to write your own strong encryption program.
All links @ cidoku.nethttp://cidoku.net/en/links/all
for volca sample2 A web application for using a KORG volca sample2 as a stereo 8-voice polyphonic sample-based synth. Sheet music IMSLP - Petrucci Music Library Virtual library of
public voit - Homepage of Karl Voithttps://karl-voit.at/
it. Working with many application windows on different Virtual Desktops comes with a burden. In most setups, you have to manually switch desktop before you can see the correspondi
How to Build a Low-tech Website? | LOW←TECH MAGAZINEhttps://solar.lowtechmagazine.com/2018/09/how-to-build-a-low-tech-website/
be used for household applications. We expect to keep the website on-line during one or two days of bad weather, after which it will go off-line. However, during cloudy days, espe
Find more...