wiby  
Settings



Resume for Donald Edward Hopkins

https://www.donhopkins.com/home/resume.html

][, C64, and BBC microcomputers. Designed some video games and animated sprite packages, and wrote utilities in 6502 assembly. Supported a co-worker writing educational software u

The FoxPro History - Interview with Wayne Ratliff

http://www.foxprohistory.org/interview_wayne_ratliff.htm

design? Wayne Ratliff: Computers themselves got me away from car design. Before I completed my degree, I got a job with Martin Marietta in Denver. I was a computer. My job title w

Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Share

https://ils.unc.edu/callee/gopherpaper.htm

human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.

The Nascom Home Page

http://nascomhomepage.com/

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

OS-9 Frequently Asked Questions

https://pages.cs.wisc.edu/~pruyne/os9faq.html

to large multiuser minicomputers. Originally developed for the 6809 microprocessor, OS-9 was a joint effort between Microware and Motorola. The original version of OS-9 (OS-9 Leve

Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3

http://techrights.org/o/2020/04/29/tde-10th-anniversary/

– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day

Internet Term Guide

http://webarchive.me/geocities/SiliconValley/5598/talk.html

gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr

Penetration Testing and Bug-Bounty Hunting

https://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html

for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing

Stroustrup: FAQ

https://www.stroustrup.com/bs_faq.html

and the best uses of computers are outside traditional computer science. See also my C++ style and techniques FAQ . Real novices facing their first "read some data, do something t

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/mon/mbasic/The

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I

The Nascom Home Page

http://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys

on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I


Find more...