Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...

Inkscape Preferences
Inkscape is a highly configurable application. Many of these configuration options can be set through the Preferences dialog box. There is probably a hundred things you can configure through the Preferences dialog box. Here I'll describe a couple of the most important ones. More ...

Create Your Own Database Using Only Notepad : CDV
In this article you learn how to create a database using only a basic text editor along with any web browser. You won't believe how simple and powerful this method is. The database we design will have powerful features. More ...

A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...

The Difference Between EoP and PoE
Ethernet over Power (EoP) is a technology for sending network data over power lines. Power over Ethernet (PoE) is a technology for sending power over Ethernet network cables. More ...

Regular Expression: Alternation
In this article you learn how to create an alternation regular expression that will match alternate patterns in a string. More ...

Processor Interrupts
An interrupt is a signal to the processor indicating an event has occurred that needs immediate attention. When an interrupt occurs, the processors normal path of execution is interrupted in order to run a routine to service the interrupt requester. More ...

Regular Expression Position Matching
In this article you how to use regular expressions to match characters at the beginning, end, both beginning and end, or at any specified location in a string. More ...

Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...

Introduction to Draw SVG Free Online SVG Drawing Application
A drawing created on a computer can be posted directly on the Web. Drawing on a computer with a vector drawing program is the best way to go. Draw SVG seems to meet the need. In this article I touched on only a tiny part of what Draw SVG can do. More ...

Regular Expressions Subexpressions
In this article you learned how to use subexpressions to rearrange matches in a regular expression and how to replace the value of a subexpression match in the results. More ...

Windows 10 Disable Aero Snap and Shake
With Aero Snap and Shake Windows does what it wants to do, not what you want it to do. More ...

Inkscape Grouping
One function in Inkscape that is very handy is grouping. Without grouping in order to reposition an object we would need to select all its pieces. With grouping, all an object's pieces behave as a single object. More ...

How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...

Inkscape Text on Path
One of the most amazing things Inkscape can do, and one of the easiest, is to place text on a curved path. You can even make the text go in a circle. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search