Can the Mac produce a transcribed account of important meetings using Dictation, or would an audio typist be better?
Can you squeeze more from your existing Mac, or must you replace it to improve performance?
If you use FileMaker’s SSL feature for connections between FileMaker clients and FileMaker Server, then you need to […]
I am a great believer in the Internet remaining relatively unregulated, free to all, and free for all. But we need direction to provide better for disruption and disaster.
Can you tell a router from a switch, do you know the MAC of your Mac, and what is the difference between IEEE 802.11b and g?
Just as drug cheats always seem several steps ahead of those trying to stop doping in sport, so computer security is always playing catch-up to hackers. And now they can hack into vending machines.
Why hoard or recycle your old Macs when you could do something useful – but not dangerous – with them?
Few computer products thrive for over 30 years: the Mac (31 years young), Unix in its many guises (46), and TeX (37) each spring to mind.
Most of our financial and personal transactions should be protected by secure Internet connections. A year on, how has the Heartbleed bug changed this?
Like the moth which flies miles to contact an irresistible lantern, only to die in its flame, the C languages continue to draw programmers to their nemesis.