Hobbes' Internet Timeline - the definitive ARPAnet & Internet historyhttps://www.zakon.org/robert/internet/timeline/
in configuring their applications. The first web-based machine translation system is developed by this Timeline's author, supporting 9 languages, and made available the following
'An Internet timeline highlighting the key events and technologies that helped shape the Internet as we know it today.'
HAARPhttps://www.cyberspaceorbit.com/WEATHER.html
which suggest applications such as detecting underground objects, communicating to great depths in the sea or earth, and generating infrared and optical emissions. Expanding our k
Red Rock Energy Heliostatshttp://www.redrok.com/main.htm
for a number of applications. He asked me about my life, times, and interests, it was great fun. He interviewed me on Saturday 2009/03/21 01:00 PM EDT http://www.talkshoe.com/tc/4
High Powered Heliostat Array Concentrating Solar Collectors.
Electronic Calculator History and Technology Museumhttp://calcmuseum.classiccmp.org//calc.htm
& technology that found applications in many aspects of everyday life. The first microprocessor was developed originally as a calculator chip, which served as a springboard for an
John Gilmore's home pagehttp://www.toad.com/gnu/
third party software applications," thus fulfilling my old quote. 6 December 2010: Network World's Mark Gibbs reports that Microsoft routes around its own COICA damage , wandering
Ted Felix - Kids Computer Programming Bookshttp://tedfelix.com/books/
a computer works and applications like airline reservations and space exploration. Favorite quotes: "Man probably could not have reached the moon without the help of a high-speed
Technological slaveryhttp://digdeeper.love/articles/technological_slavery.xhtml
requires allowing phone applications the permission to record audio, who's to say that some phone producer or OS developer (the spywaristic Google controls the main smartphone OS,
Computer Security and Privacyhttps://www.billdietrich.me/ComputerSecurityPrivacy.html
We need more sites, applications, and protocols designed with security and privacy as priorities from the foundation up. Maybe "mesh" networking, peer-to-peer systems, distributed
Best practices and information about computer and smartphone security and privacy
Vintage Computing and Gaming | The Retrogaming and Retrocomputing Blogazinehttp://www.vintagecomputing.com/
would load them into applications such as WordPerfect , Microsoft Word , and Aldus PageMaker . Historically, artists created most clip art in a vector format , which means the ima
Adventures in vintage computers and retrogaming. Includes articles on classic games and obsolete computers.
Ken Silverman's Official Home Pagehttp://advsys.net/ken/
you! 02/29/2004: 2 new applications added to projects page: PINGBALL and EVALDRAW . 12/25/2003: SLAB6 update: added key repeating, a save option for Build-compatible KVX files, an
Light Table Bloghttp://lighttable.com/2014/05/16/pain-we-forgot/
mean…”). Good end user applications will link common errors to FAQs. Suggestions don’t need to be perfect, just accurate. Everyone hated Clippy because his advice was useless and
Light Table is the next generation code editor. Light Table Connects you to your creation with instant feedback and showing data values flow through your code.
https://www.rfc-editor.org/rfc/rfc5894.txthttps://www.rfc-editor.org/rfc/rfc5894.txt
Domain Names for Applications (IDNA): Background, Explanation, and Rationale Abstract Several years have passed since the original protocol for Internationalized Domain Names (IDN
Find more...