Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...
EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...
Regular Expression Basics : How many Matches?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to count the number of matches. More ...
Introduction to Draw SVG Free Online SVG Drawing Application
A drawing created on a computer can be posted directly on the Web. Drawing on a computer with a vector drawing program is the best way to go. Draw SVG seems to meet the need. In this article I touched on only a tiny part of what Draw SVG can do. More ...
Easy CSS Animated Flaming Text
I provide easy code to create CSS flaming text animations. You are free to experiment with your own CSS property values. I bet you can create even better flaming text. CSS3 flaming text animations are fun and easy to create. More ...
Independent Contractor Agreement Template
This is a template for an Independent Contractor Agreement. It contains a series of boxes. Each box does not contain the final text of the agreement. Instead, each box contains a description or suggestion of the type of information that you should type into the box. More ...
Minispreadsheet
Minispreadsheet is a tiny extremely easy to use spreadsheet, You can type text into a cell, you type a number into a cell. A formula is a simple list of cells with basic mathematical operators between them. If you change the number in a cell used in a formula in a different cell, the value in the cell with the formula will be updated. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
Basic Inkscape Text
This article just touches on the basics of using text in Inkscape. Through the use of gradients, filters, and textured fills, what you can do with text in Inkscape is just about unlimited. More ...
Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...
Area of an Ellipse Calculator
It's easy to calculate the area of an ellipse because it's similar to calculating the area of a circle ecept instead of Pi times the radius squared, its Pi times the long axis times the short axis. More ...
Create a Cool Picture Frame Effect with CSS
By setting the CSS border-color property to a transparent color, and setting the background-origin property to border-box you can create a cool picture frame effect. More ...
Regular Expressions Intervals
Regular expression intervals tell us about the number of occurrences of a character in a string. Curly braces are used to define a precise count of how many occurrences you are checking for. More ...
Inkscape Shadows and Highlights
Adding shadows and highlights to your drawings can create a touch of realism. In this article you learn how to add shadows and highlights to your Inkscape drawings. More ...
Regular Expression: Alternation
In this article you learn how to create an alternation regular expression that will match alternate patterns in a string. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

