I hate to disappoint Stephen Hawking, but the whole universe was created just to annoy me.


Learn more at amazon.com

Processor Interrupts
An interrupt is a signal to the processor indicating an event has occurred that needs immediate attention. When an interrupt occurs, the processors normal path of execution is interrupted in order to run a routine to service the interrupt requester. More ...

PowerShell Script to Show Last 5 Errors in Event Log
The Windows System eventlog is one of the most powerful components of the operating system because it keeps a log of everything that happens. Here I provide a powershell script to display the last 5 error entries in the log. More ...

SVG Basic Shapes Tutorials
This is an introduction to SVG (Scalable Vector Graphics) and tutorials with examples on how to use simple code to draw basic shapes. More ...

Regular Expression Basics : How many Matches?
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to count the number of matches. More ...

The figure and figcaption Tags
The html figure element is a container for an image and optionally for a figcaption element that defines a caption for that image. More ...

IPv4 to IPv6 Transition With the Dual-Stack Technique
Transition from IPv4 to IPv6 has been slow. If you can't immediately convert all your network hardware to IPv6, the dual-stack technique allows the easiest operation of IPv4 and IPv6 devices on the same network. More ...

Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...

Inkscpe Snap Controls Bar
some Inkscape users find snap annoying and so they disable it. Other Inkscape user's could not possibly work without snap. You can convert SVG to STL to print 3D models. But to do that you need accuracy that you cannot achieve without snap. More ...

Area of a Triangle Calculator
There are three different methods to calculate the area of a triangle depending upon what information you have about the triangle. This application combines all three. More ...

Regular Expressions Subexpressions
In this article you learned how to use subexpressions to rearrange matches in a regular expression and how to replace the value of a subexpression match in the results. More ...

Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...

Network on a Chip (NoC)
NoC (Network on a Chip) is a method of placing a much larger number of processors on a multi-core chip. Much like a regular network, NoC has multiple point-to-point data links that are interconnected by routing switches. More ...

HTML5 Header Element
The header element is one of HTML5's semantic elements. It provides a container for header information. A header element may contain ,logo author, navigation, search, version, copyright, and other such information. More ...

Regular Expressions Lookarounds
In this article you learn how to match a pattern only when it comes after another pattern (or after not that pattern) or only when it comes before another pattern (or before not that pattern). More ...

Regular Expression Basics : Match a Set of Characters
A Regular Expression (regex) is a sequence of characters that define a pattern that allows you to search, match, locate, replace, manipulate, and manage text. In this article you'll learn how to use regular expressions to match a set of of characters. More ...

Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...


See it at amazon.com

Custom Search