Modernization of old PCs
Immediately, I note that the article is not one year old and it was left on the site for a change. It is clear that now on the market there…

Continue reading →

Advanced CSS Hacks Collection
A hack is a method that allows CSS to be perceived only by a specific browser. Hacks can be used not only to fix bugs in the layout, but also…

Continue reading →

Disabling Unnecessary Windows Services
This article provides specific recommendations about which services in Windows can be safely turned off with one caveat: if you are dealing with your personal computer that is not included…

Continue reading →

replacing capacitors

CSS layouts: fixed, rubber, elastic. Pros and cons

What layout layout (using Cascading Style Sheets, CSS) can be considered the best? Each of them has its own hacks (quirks) and its own unique pros and cons. Will one of them be more user friendly than everyone else? How easy will it be? What problems do each of them have and how to get around them? Is one of them easier to compose than the rest? Is there any defective, completely unsuitable among them? Most likely, many will unequivocally answer these questions, but I will not be in such a hurry. I like each of these layouts, and each is applicable in one way or another, if you do it wisely and carefully check the ease of use and equal accessibility for all categories of users. All of them are part of the presentational layer for the website, so most accessibility issues arise from the correct use of semantics and general layout rules. Next, I Continue reading

Why everyone hated Apple and why they were wrong

Apple’s latest technical solutions have made a lot of noise. In the iPhone 7, the jack slot disappeared, in the new MacBook the usual connectors are replaced with USB Type-C and there is no memory card slot. Poster Daily recalls all the joys that engineers from Cupertino deprived us of, and why it is difficult to argue with them.
Apple for 30 years with an enviable persistence has been producing computers of closed architecture under the control of its own operating system. Neither the popularity of the PC as a gaming platform, nor the recognition in 2006 that Intel chips were better than their own could convince them of this. It turns out that the company, which we used to consider the most important developer of innovations, is in fact very conservative and rational in the market. By tradition, Apple itself decides what is needed and what Continue reading

5 fashionable ways to hide from face identification

Today, the face recognition algorithm is used everywhere. And not only in professional tracking systems or smart web services, but in various entertainment applications and basic functions like autofocus. Poster Daily decided to try to trick the algorithm with makeup.

Different systems for recognizing a human face have different goals, which is why their algorithms differ. One of the first systems that were able to establish a person’s identity from a photo looked for nodal points on the image that made up the main features of the face, and measured the distance between them. The main measurement parameters are the distance between the eyes, the width of the nose, the depth of the orbit, the shape of the cheekbones, and the length of the jaw line. Key figures in digital terms Continue reading

Nettop Choice
Nettop, like the netbook, was introduced by Intel at the release of the Atom processor. That is, in essence, it is the same as a netbook only in the form…

...

Netbook Choice
Netbook, actually you could hear, or if you saw, decide that this is a laptop, just a small one. Actually, many stores throw them in one pile, but the netbook…

...

How to protect a site from hacking by a hacker
With an insecure site, many troubles can happen: hacking by hackers, attacks, virus infection. Some of the most common attacks: XSS attack. The virus code is embedded in the data…

...