In recent weeks, the news has broken that most modern CPUs (the brains of our computing devices) have hardware vulnerabilities that allow a malicious program to steal data in the device’s memory. These vulnerabilities, named Meltdown and Spectre, are unique in that they break down the built-in barriers that secure data on the most fundamental component of any computing device, the CPU.
Recent Blog Activity
Layout design in CSS has always left something to be desired. Not long ago, responsive web design relied on hacky solutions like padding, float and tables. Later developments like Flexbox solved many of these problems but were far from perfect. Now, that’s all about to change, with CSS Grid.
There are plenty of Gmail signature setup guides available online. But when you are creating finished, HTML-coded email signatures with all of the styles, hacks, and tweaks which make it look the same in most email-clients, a simple Gmail setup tutorial is not going to cut it.