by Al Williams
In his first installment of a two-part article, Al shares a DOS extender called PROT and takes a look at protected-mode programming.
by Andrew Schulman
The good news is that protected-mode OS/2 prevents task clashes
by taking control of memory. The bad news is this makes it hard to perform memory-mapped I/O and write diagnostic tools. Andrew's generic device driver helps solve these problems.
by John Switzer
Accessing DOS without going through the INT21 function handler can have serious repercussions. John shows how to close the vulnerable backdoors.
by Jeff Reagen
Jeff's RAM disk lets you more efficiently manage /tmp files, reduce overhead associated with file loading, and increase performance
by using RAM as a primary swap device.
by Victor J. Duvanenko, Ronald S. Gyurcsik, and W. E. Robbins
Here's an algorithm for efficiently determining the minimum and maximum reaches of 2-D and 3-D graphical objects.
by Pitts Jarvis
CORDIC (COordinate, Rotation, DIgital Computer) algorithms let you use one core routine to compute sines, cosines, exponentials, logarithms, and other transcendentals.
by Bruce D. Schatzman
Bruce investigates the practical and theoretical aspects of code optimization, using Microsoft C 6.0 as his example platform.
by Brian R. Anderson
While wrapping up his Kermit port, Brian examines the communications capabilities of OS/2, along with low-level screen and video I/O.
by Michael Swaine
Michael reports on the recent MacWorld conference, focusing on System 7 developers and developments.
by Al Stevens
Al catches up on his correspondence and follows up on his token-pasting.
by Jeff Duntemann
Jeff returns to Zeller's Congruence before peering through the open window of Windows 3.0.
by Ray Duncan
Do software aficionados need to know about computer architectures? "Yes." says Ray, and the recently published Computer Architecture is a good place to start.
by Jonathan Erickson
by you
by Michael Swaine
compiled by Janna Custer