The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...
Windows 10 Shortcut to Turn Laptop Camera On or Off
To prevent hackers from sneaking a look at you, turn your laptop camera off. This article shows you how to place a shortcut on your desktop that you can use to quickly turn your laptop camera on or off. More ...
Regular Expression: Alternation
In this article you learn how to create an alternation regular expression that will match alternate patterns in a string. More ...
EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...
Inkscape Layers and Z-Order
Inkscape's use of the Z axis is represented by layers and is called z-order. When you first draw an object on an empty canvas, it has a z-order of 1. If you draw a second object, it has a z-order of 2. If you draw a third object, it has a z-order of 3 and so on. More ...
Area of a Triangle Calculator
There are three different methods to calculate the area of a triangle depending upon what information you have about the triangle. This application combines all three. More ...
Basic Inkscape Text
This article just touches on the basics of using text in Inkscape. Through the use of gradients, filters, and textured fills, what you can do with text in Inkscape is just about unlimited. More ...
Gift Giving in the Workplace
One thing that can add to the stress of the holiday season is workplace gift giving. giving a gift to a supervisor or manager sets up a conflict of interest and an ethics problem. In my opinion, holiday gifts should be given only to children. More ...
Use PowerShell and WMI to Get CPU Information
Suppose you want to get some information about the CPU in your computer. Can you remember which Control Panel utility will provide that information? If you use a PowerShell script to access WMI you can always get the information you want no mater how they rearrange Control Panel. More ...
Regular Expressions Intervals
Regular expression intervals tell us about the number of occurrences of a character in a string. Curly braces are used to define a precise count of how many occurrences you are checking for. More ...
Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...
Easy CSS 3D Mouse-over Pressed Text Effect
I provide easy CSS code for 3d text when you move your mouse pointer over the 3D text shown above, the text will appear to be pressed. In this example, I configured the 3d text in a link. More ...
Fundamental Digital Logic Gates
All the advanced features of the most powerful computers, such as mulicore and parallel processing are done with digital logic. In this article I explain the fundamental concept of digital logic in simple and clear language so that anyone can understand it. More ...
How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...
Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

