JavaScript to Copy and Paste Text to the Clipboard
In some applications, rather than the user's selection, you may want to copy the contents of a specific html element to the clip board. Or when the user initiates a Paste, you may want to direct the contents of the user's clipboard to a specific html element on the webpage. Here is the code for this. More ...
A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...
What is a Regular Expression?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. Regular expressions are very powerful, but also difficult to understand and complicated to use. More ...
Learn Assembly Language Programming on Raspberry Pi 400
One of the easiest ways to learn assembly language programming is on the Raspberry Pi 400. The Raspberry Pi 400 is a complete personal computer built into a compact keyboard. More ...
Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...
The Power of a Positive Attitude
One of the most important personality traits required for the achievement of a successful life is a positive attitude. What I mean when I say positive attitude might be more accurately described as a realistic attitude. More ...
Area of a Triangle Calculator
There are three different methods to calculate the area of a triangle depending upon what information you have about the triangle. This application combines all three. More ...
Regular Expressions Subexpressions
In this article you learned how to use subexpressions to rearrange matches in a regular expression and how to replace the value of a subexpression match in the results. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
The Difference Between EoP and PoE
Ethernet over Power (EoP) is a technology for sending network data over power lines. Power over Ethernet (PoE) is a technology for sending power over Ethernet network cables. More ...
Inkscape Preferences
Inkscape is a highly configurable application. Many of these configuration options can be set through the Preferences dialog box. There is probably a hundred things you can configure through the Preferences dialog box. Here I'll describe a couple of the most important ones. More ...
Area of an Ellipse Calculator
It's easy to calculate the area of an ellipse because it's similar to calculating the area of a circle ecept instead of Pi times the radius squared, its Pi times the long axis times the short axis. More ...
Inkscape Layers and Z-Order
Inkscape's use of the Z axis is represented by layers and is called z-order. When you first draw an object on an empty canvas, it has a z-order of 1. If you draw a second object, it has a z-order of 2. If you draw a third object, it has a z-order of 3 and so on. More ...
Inkscape Basic Fill
In Inkscape you can fill a shape with just about any color, texture, or pattern that you desire. In this article we discuss how to fill a shape with a basic color. More ...
A JavaScript Function That Returns a Function
Its a fad now in JavaScript to code functions that return functions in order to avoid declaring global variables but the procedure is inefficient and unnecessary. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

