You are here

Open Content (CC BY-NC-ND)

Open content from this website can be copied and shared subject to certain restrictions. Please make sure you read and understand the Terms of Use (link at the bottom of this page) before using open content.

Avatar: The Last Airbender 2005 (Animated Series)

While the 2010 movie The Last Airbender had very little success with the critics and audiences, tracing its roots leads to the original animated series titled Avatar: The Last Airbender which is nothing less than a masterpiece in animation and creative storytelling. Set in an alternate universe the world is divided into four nations each having the ability to control one of the four elements Fire, Air, Water and Earth. The Fire nation believes its element is superior and sets out to conquer the rest. The only person that could stand in its way is the Avatar, an individual who can command all four elements. But the Avatar has disappeared and has not been seen for a 100 years.

Electronic Ink and The Future of Paper

Some of you, like me, may have walked into a bookshop recently or an electronics superstore perhaps and noticed a new section featuring the plethora of e-book readers that have come into the market. If you pick up one of these and play around with it, the first thing that will probably strike you as different is how 'paper like' the text display appears. Well you are looking at Electronic Ink or e-ink.

Securing Your Laptop and Personal Data Against Theft

Laptop prices are on the rise and they will continue to do so, making laptops an expensive investment. In this article I am going to discuss some of the techniques you can use to prevent loss of your beloved machine and its data. I am going to focus on physical theft of data because many people don't do enough to avoid this. I'm also going to explain how to build security in layers, making it tighter as you go deeper.

What a Laptop!

Steampunk is a form of art where modern day objects are transformed to look like 19th century steam powered devices. An example is this laptop complete with its power-on key. Rich Nagy the creator of this beast sums up his passion for tinkering with technology "[Computer technology] was robbed of the fleeting, wonderful period right after invention, where it is celebrated and honoured by the finest craftsman, artists and creative minds and given a structure befitting its potential and greatness."

The Return of Single Core Processors: A Power vs Portability Compromise

In the last few months I've had a hard time finding a reasonably priced dual core processor laptop in the consumer PC market. Most of the models I loved have been discontinued and moved off the shelves. You would think that they have been replaced by more powerful models, but no. Computer manufacturers are taking a step back in time and actually building slightly less powerful laptops but instead offering more portability and style. I take a trip down memory lane and look at the philosophy behind the next generation of laptops.

Wireless Devices Maybe Cool But Are They Secure?

It seems that wireless devices are taking over our lives. Starting with wireless internet most other computing devices are now also wireless. We have wireless keyboards, wireless mice, wireless telephones, wireless headphones and wireless CCTV. Companies that sell these devices are fairly quick to point out how convenient it is to use the wireless device and how long the wireless range is, but very few of them actually publish information about if the wireless communication on the device is secure.

The Pitfalls of Using Default Function Parameters in C++

C++ (not C) has a convenience feature that allows programmers to specify default parameters on functions when declaring them. The compiler uses the default value if no value is supplied by the caller for that parameter, instead of complaining about a missing parameter value. I am not going to discuss the mechanics of declaring these default parameters; any C++ book will explain this. I’m going to delve into what problems happen over time when using default parameters during software maintenance phase as code ages and changes hands between programmers.

Securing Your Home with Burglar Alarms and CCTV

Security is a increasing source of concern for home owners today. Bad economic times have led to an increased risk of home breakins and theft. Most security installations are done by professional organizations which will charge you a hefty sum and provide you will iron clad security. However what many home owners need is a simple deterrent system, that will stop the street thief from getting in and wiping the house clean. There are an increasing number of security products in the market which you can install yourself, but it is important to understand the advantages of using each because incorrect use could create a false sense of security while actually leaving your home more exposed than protected.