Resume for Donald Edward Hopkinshttps://www.donhopkins.com/home/resume.html
][, C64, and BBC microcomputers. Designed some video games and animated sprite packages, and wrote utilities in 6502 assembly. Supported a co-worker writing educational software u
The FoxPro History - Interview with Wayne Ratliffhttp://www.foxprohistory.org/interview_wayne_ratliff.htm
design? Wayne Ratliff: Computers themselves got me away from car design. Before I completed my degree, I got a job with Martin Marietta in Denver. I was a computer. My job title w
Where Have all the Gophers Gone? Why the Web beat Gopher in the Battle for Protocol Mind Sharehttps://ils.unc.edu/callee/gopherpaper.htm
human communication, computers need a common set of conventions in order to share information. The history of networked computing is rich with stories about developing protocols.
The Nascom Home Pagehttp://nascomhomepage.com/
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
OS-9 Frequently Asked Questionshttps://pages.cs.wisc.edu/~pruyne/os9faq.html
to large multiuser minicomputers. Originally developed for the 6809 microprocessor, OS-9 was a joint effort between Microware and Motorola. The original version of OS-9 (OS-9 Leve
Links 29/4/2020: TDE 10th Anniversary, Sailfish OS 3.3http://techrights.org/o/2020/04/29/tde-10th-anniversary/
– Learning about Computers for Kids – Week 27 This is a weekly blog about the Raspberry Pi 4 (“RPI4”), the latest product in the popular Raspberry Pi range of computers. With so m
Links for the day
Internet Term Guidehttp://webarchive.me/geocities/SiliconValley/5598/talk.html
gain illegal access to computers. They are usually malicious in their intentions. Cyberspace The "world of computers and the society that gathers around them," as referr
Penetration Testing and Bug-Bounty Huntinghttps://www.billdietrich.me/PenetrationTestingAndBugBountyHunting.html
for anything related to computers. I also > have never worked professionally in any infosec/programming field > (I've worked as a fry-cook for my only real job). I do know h
How to become a bug-bounty hunter and do penetration testing
Stroustrup: FAQhttps://www.stroustrup.com/bs_faq.html
and the best uses of computers are outside traditional computer science. See also my C++ style and techniques FAQ . Real novices facing their first "read some data, do something t
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/mon/mbasic/The
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
The Nascom Home Pagehttp://www.nascomhomepage.com/#TheNascomRepository/pdf/Keys
on and I bought more computers but didn't stop using my CP/M Nascom 2/Gemini hybrid system until I bought my first PC (around 1994). However thanks to CP/M emulators and vnascom I
Find more...