I am a great believer in the Internet remaining relatively unregulated, free to all, and free for all. But we need direction to provide better for disruption and disaster.
A superb plein air painting of this scene on the River Tiber is part of the foundation that Corot laid for Impressionism.
Can you tell a router from a switch, do you know the MAC of your Mac, and what is the difference between IEEE 802.11b and g?
Just as drug cheats always seem several steps ahead of those trying to stop doping in sport, so computer security is always playing catch-up to hackers. And now they can hack into vending machines.
Why hoard or recycle your old Macs when you could do something useful – but not dangerous – with them?
From a brave king, to the pungent taste of mustard, with a wail on the side – all in the one word.
The importance of relative size, and height in the picture plane, in imparting depth and space in painting.
Few computer products thrive for over 30 years: the Mac (31 years young), Unix in its many guises (46), and TeX (37) each spring to mind.
Most of our financial and personal transactions should be protected by secure Internet connections. A year on, how has the Heartbleed bug changed this?
Like the moth which flies miles to contact an irresistible lantern, only to die in its flame, the C languages continue to draw programmers to their nemesis.