wiby  
Settings



Hobbes' Internet Timeline - the definitive ARPAnet & Internet history

https://www.zakon.org/robert/internet/timeline/

in configuring their applications. The first web-based machine translation system is developed by this Timeline's author, supporting 9 languages, and made available the following
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'

HAARP

https://www.cyberspaceorbit.com/WEATHER.html

which suggest applications such as detecting underground objects, communicating to great depths in the sea or earth, and generating infrared and optical emissions. Expanding our k

Red Rock Energy Heliostats

http://www.redrok.com/main.htm

for a number of applications. He asked me about my life, times, and interests, it was great fun. He interviewed me on Saturday 2009/03/21 01:00 PM EDT http://www.talkshoe.com/tc/4
High Powered Heliostat Array Concentrating Solar Collectors.

Electronic Calculator History and Technology Museum

http://calcmuseum.classiccmp.org//calc.htm

& technology that found applications in many aspects of everyday life. The first microprocessor was developed originally as a calculator chip, which served as a springboard for an

John Gilmore's home page

http://www.toad.com/gnu/

third party software applications," thus fulfilling my old quote. 6 December 2010: Network World's Mark Gibbs reports that Microsoft routes around its own COICA damage , wandering

Ted Felix - Kids Computer Programming Books

http://tedfelix.com/books/

a computer works and applications like airline reservations and space exploration. Favorite quotes: "Man probably could not have reached the moon without the help of a high-speed

Technological slavery

http://digdeeper.love/articles/technological_slavery.xhtml

requires allowing phone applications the permission to record audio, who's to say that some phone producer or OS developer (the spywaristic Google controls the main smartphone OS,

Computer Security and Privacy

https://www.billdietrich.me/ComputerSecurityPrivacy.html

We need more sites, applications, and protocols designed with security and privacy as priorities from the foundation up. Maybe "mesh" networking, peer-to-peer systems, distributed
Best practices and information about computer and smartphone security and privacy

Vintage Computing and Gaming | The Retrogaming and Retrocomputing Blogazine

http://www.vintagecomputing.com/

would load them into applications such as WordPerfect , Microsoft Word , and Aldus PageMaker . Historically, artists created most clip art in a vector format , which means the ima
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.

Ken Silverman's Official Home Page

http://advsys.net/ken/

you! 02/29/2004: 2 new applications added to projects page: PINGBALL and EVALDRAW . 12/25/2003: SLAB6 update: added key repeating, a save option for Build-compatible KVX files, an

Light Table Blog

http://lighttable.com/2014/05/16/pain-we-forgot/

mean…”). Good end user applications will link common errors to FAQs. Suggestions don’t need to be perfect, just accurate. Everyone hated Clippy because his advice was useless and
Light Table is the next generation code editor. Light Table Connects you to your creation with instant feedback and showing data values flow through your code.

https://www.rfc-editor.org/rfc/rfc5894.txt

https://www.rfc-editor.org/rfc/rfc5894.txt

Domain Names for Applications (IDNA): Background, Explanation, and Rationale Abstract Several years have passed since the original protocol for Internationalized Domain Names (IDN


Find more...