How to Check Your PCs TPM
One of the requirements for Windows 11 is TPM version 2.0. If you have Windows 10 and you have TPM version 2.0 module, and it's enabled, then you can install and run Windows 11. More ...
Gift Giving in the Workplace
One thing that can add to the stress of the holiday season is workplace gift giving. giving a gift to a supervisor or manager sets up a conflict of interest and an ethics problem. In my opinion, holiday gifts should be given only to children. More ...
Inkscape Layers and Z-Order
Inkscape's use of the Z axis is represented by layers and is called z-order. When you first draw an object on an empty canvas, it has a z-order of 1. If you draw a second object, it has a z-order of 2. If you draw a third object, it has a z-order of 3 and so on. More ...
Inkscpe Snap Controls Bar
some Inkscape users find snap annoying and so they disable it. Other Inkscape user's could not possibly work without snap. You can convert SVG to STL to print 3D models. But to do that you need accuracy that you cannot achieve without snap. More ...
Area of a Quadrilateral Calculator
If you have a regular quadrilateral there are simple formulas to calculate the area. But if you have an irregular quadrilateral you can calculate its area by viewing it as two triangles bucked up against one another. Find the area of each triangle, and then add them together. More ...
Regular Expressions Subexpressions
In this article you learned how to use subexpressions to rearrange matches in a regular expression and how to replace the value of a subexpression match in the results. More ...
EMI, RFI, EMC, EMS, What's the Difference?
EMI, RFI, EMC, and EMS all refer to different aspects of radio frequency interference which may cause elecronic devices to malfunction. Correcting these problems can be an art and a science. More ...
Inkscape Text on Path
One of the most amazing things Inkscape can do, and one of the easiest, is to place text on a curved path. You can even make the text go in a circle. More ...
Introduction to Draw SVG Free Online SVG Drawing Application
A drawing created on a computer can be posted directly on the Web. Drawing on a computer with a vector drawing program is the best way to go. Draw SVG seems to meet the need. In this article I touched on only a tiny part of what Draw SVG can do. More ...
How SSL (Secure Sockets Layer) Works
SSL is a security protocol standard that encrypts communication between a web browser and a web server. Any organization that uses their website to transmit, receive, store, or display confidential or sensitive information such as passwords, credit card or bank account numbers, social security numbers, and so on, needs to use an SSL Connection. More ...
Regular Expressions Boundaries
In this article you learn how to controls where a regular expression matches a string, on a word or non-word boundary, at the beginning or end of a string. You also learned about multiline mode. More ...
Inkscape Text Kerning
Although Inkscape might be considered a vector drawing application, it is also a powerful typographical design program. Actually Text Kerning is not a good title for this article because in it I will cover all the different typographical adjustments you can make in Inkscape. More ...
A Brief Introduction to 3D Printing
Previously, the only ways to create 3D objects was casting and molding. 3D printing involves creating an object by laying down layer over layer of material, building the object from the bottom up. 3d printing is great for rapid prototyping. 3d printing is also a great way for a home artist to express their creativity. More ...
PowerShell Script to Show Last 5 Errors in Event Log
The Windows System eventlog is one of the most powerful components of the operating system because it keeps a log of everything that happens. Here I provide a powershell script to display the last 5 error entries in the log. More ...
The Evolution of Hard Disk Bit Recording
Hard drive technology has continuously improved over the decades, that includes higher storage capacity performance. Part of this improvement has been higher access speeds, but most of the higher storage capacity has been the result of changes in the bit recording methods. More ...
Fundamentals of Windows Security
Today, criminals are more sophisticated, and groups have formed with significant financial backing to support the wrong doings of these groups. This book is for system administrators, cybersecurity and technology professionals, solutions architects, or anyone interested in learning how to secure their Windows-based systems. More ...
