Regular Expression Position Matching
In this article you how to use regular expressions to match characters at the beginning, end, both beginning and end, or at any specified location in a string. More ...
A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...
Inkscape Preferences
Inkscape is a highly configurable application. Many of these configuration options can be set through the Preferences dialog box. There is probably a hundred things you can configure through the Preferences dialog box. Here I'll describe a couple of the most important ones. More ...
Minispreadsheet Instructions
This is the instructions for Minispreadsheet. Minispreadsheet is a tiny extremely easy to use spreadsheet. You can type text or a number into a cell, that's it. You can also apply simple formulas to a cell. More ...
Self-Esteem and Success
A person with high self-esteem believes that they are a worthwhile and important person. A person with low self-esteem believes that others are better than them, and that they deserve to treated badly by others. More ...
Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...
Easy JavaScript FileReader Code
The JavaScript FileReader object allows web pages to read files stored on the user's computer. Files may be selected using the input element, or selected with a drag and drop operation. More ...
Online Color Coded Resistor Calculator
To determine the resistance value of a color-coded resistor, select the colors matching each band from the drop-down lists. More ...
Learn Assembly Language Programming on Raspberry Pi 400
One of the easiest ways to learn assembly language programming is on the Raspberry Pi 400. The Raspberry Pi 400 is a complete personal computer built into a compact keyboard. More ...
Independent Contractor Agreement Template
This is a template for an Independent Contractor Agreement. It contains a series of boxes. Each box does not contain the final text of the agreement. Instead, each box contains a description or suggestion of the type of information that you should type into the box. More ...
Inkscape Layers and Z-Order
Inkscape's use of the Z axis is represented by layers and is called z-order. When you first draw an object on an empty canvas, it has a z-order of 1. If you draw a second object, it has a z-order of 2. If you draw a third object, it has a z-order of 3 and so on. More ...
Regular Expression Basics : How many Matches?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to count the number of matches. More ...
Network on a Chip (NoC)
NoC (Network on a Chip) is a method of placing a much larger number of processors on a multi-core chip. Much like a regular network, NoC has multiple point-to-point data links that are interconnected by routing switches. More ...
Fiber Optic Bend Radius Standards
Fiber optic cable can be damaged by placing too much tension on the cable or bending the cable excessively during installation. Excessive bending or too much pulling force can permanently damage the fiber by causing micro cracks. More ...
The Power of a Positive Attitude
One of the most important personality traits required for the achievement of a successful life is a positive attitude. What I mean when I say positive attitude might be more accurately described as a realistic attitude. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...

