wiby  
Settings



Andrew Holme's projects

http://www.aholme.co.uk/Projects.htm

Exchange | FORTH Computers | VB Profiler | Wireless Thermostat | Ethernet Receiver | Frequency Synthesizers | Core Memory | Spread Spectrum | Avalanche Pulse Generator | Delta Loo

Accessible Rich Internet Applications (WAI-ARIA) 1.0

https://www.w3.org/TR/2014/REC-wai-aria-20140320/complete

TAB key on most desktop computers). SVG authors may place elements in the navigation order by manipulating the focusable attribute and they may dynamically specify the navigation

teknohog / Keyboard rants

http://teknohog.godsong.org/rants/keyboards.php

into either writing or computers. It was almost an accident, as the art class was already full, but it changed my life for good in many ways. I guess such courses are considered t

Sun Blade 100

https://www.finnie.org/text/computers/sunblade100/

(read: non-x86) computers. It wasn't until I brought it home that I realized how much work it would take to get it working again. The computer had been dropped on the front left c

New York

https://www.hellenicaworld.com/USA/Geo/en/NewYork.html

such as foodstuffs, computers and electronics, cut diamonds and other commodities, and automobile parts. In 2007, the state exported a total of $71.1 billion worth of goods, with
New York, USA Online Encyclopedia

Avoiding "The Botnet" - impossible?

http://digdeeper.love/articles/botnet.xhtml

type of software on our computers (alone). We need our own server spaces, our own ISPs, ones that keep no logs and ideally require no "contracts" to sign up for. Alternatively, to

The Simulation Argument and the future of suffering: objections to The Hedonistic Imperative

https://www.hedweb.com/object35.htm

lucky. Yet what digital computers have to tell us about the ultimate mysteries of consciousness and existence remains elusive. At any rate, no attempt will be made here exhaustive

Linux FAQ

https://www.linfo.org/faq_linux.html

Linux on as many computers as desired. Q: I have a book about Red Hat Linux 8 which contains the installation CDROMs. Would it be better to buy a new book for a more recent versio

Jem Berkes: Academic / university work

https://berkes.ca/jem/academic.html

tamper-resistant computers used in security-sensitive applications ranging from identification and access control to payment systems. Side-channel attacks , which use clues from t


Find more...