Learn web design, computer maintenance, programming, computer architecture, computer networking, electronics, mathematics, art and graphic design.

The Mechanical Universe

Draw with your finger


Learn more at amazon.com

Capacitors
A capacitor is an electronic component that can store electric charge. A capacitor is constructed with two conductive plates separated by an insulator called a dielectric. More ...

SVG Basic Shapes Tutorials
This is an introduction to SVG (Scalable Vector Graphics) and tutorials with examples on how to use simple code to draw basic shapes. More ...

Windows Event Logs for Maintaining or Troubleshooting Your PC
Your PC keeps logs of everything that happens. You can use the information in these logs to help maintain and troubleshoot and your PC. More ...

The Difference Between EoP and PoE
Ethernet over Power (EoP) is a technology for sending network data over power lines. Power over Ethernet (PoE) is a technology for sending power over Ethernet network cables. More ...

HTML5 Header Element
The header element is one of HTML5's semantic elements. It provides a container for header information. A header element may contain ,logo author, navigation, search, version, copyright, and other such information. More ...

Introduction to Windows PowerShell
PowerShell is a more powerful replacement for the command shell. this article explains how to run PowerShell and how to create and run PowerShell scripts. More ...

Independent Contractor Agreement Template
This is a template for an Independent Contractor Agreement. It contains a series of boxes. Each box does not contain the final text of the agreement. Instead, each box contains a description or suggestion of the type of information that you should type into the box. More ...

Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...

IPv6 Address Compressor Expander
Enter the IPv6 address in the top text box. Click on the appropriate button: Omit Leading Zeros, Consolidate Zeros Segments, Expand Zeros Segments, Replace Leading Zeros. The formatted address will appear in the bottom text box. More ...

Inkscape Exercise: Draw Photorealistic Sphere
Although Inkscape is a 2D drawing application, it is quite capable of drawing photorealistic 3D images. To demonstrate this capability, in this article I show you, step-by-step how to draw a photorealistic sphere. More ...

Html5 section vs article Element Best Practices
Many new semantic elements where added to HTML5. The purpose of most of these new elements was easily discernible. But a web search reveals that there is much confusion about the relationship between the article and the section element. More ...

Inkscape Preferences
Inkscape is a highly configurable application. Many of these configuration options can be set through the Preferences dialog box. There is probably a hundred things you can configure through the Preferences dialog box. Here I'll describe a couple of the most important ones. More ...

Access Useful Laptop Settings in the Windows Mobility Center
Some useful laptop settings are collected together in a group called the Windows Mobility Center. Near the top of the secret menu, select Mobility Center. Here you'll find controls for setting the screen brightness, sound volume, screen orientation, and such. More ...

Inkscape Grouping
One function in Inkscape that is very handy is grouping. Without grouping in order to reposition an object we would need to select all its pieces. With grouping, all an object's pieces behave as a single object. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search