Products
Awaken your ingenuity with MaKey MaKey! Turn apples into computer game controllers or invent a 'banana keys' piano. The MaKey MaKey Kit offers ever...
View full detailsWho understands women... Even Unix doesn't know what to do.
Do you see real beauty where others just see numbers? Are perfect formulas and graphs your type of art? No matter where and when, do you think that...
View full detailsOK, you're allowed to admit it: Maths was your favourite subject at school and you just couldn't get enough of it, right? And even today ...
View full detailsOn the one hand, this might be understood as a parody on Star Wars, but it is also so much more: an ideal of the open source movement. If you cann...
View full detailsComputer owners and manufacturers shamelessly flaunt what's hidden inside the casing, and anyone who invests a lot of money in a new microprocessor...
View full detailsNeed some help with an everyday problem? Then summon Mr. Meeseeks! Simply teleport into a famous TV series about a scientist and his grandson, grab...
View full detailsWhen it comes to charms, we nerds usually think of powerful spells in pen-and-paper games, the counterpart to the Strange Quark or simply a certain...
View full detailsYes, we all know the stereotype: nerds don't like to party and would even spend their birthday in front of the computer instead of going out with f...
View full detailsProgrammers who use pointers should be careful because they aren't far away from hell ;) At least that's what the 2nd of the 10 commandme...
View full detailsLinux - The choice of the GNU generation
Your computer doesn't do the things you want him do to? You don't have a backup of your important files and your harddisk makes silly noises? The F...
View full detailsTrue story."Look, Mum, with the new router you don't need cables anymore! Now you can use WLAN in the whole house"."So can I wr...
View full detailsAt least in theory, we nerds should not have problems with curfews, right? After all, we usually spend the majority of our time at home in front of...
View full detailsAs a nerd, one needs to be careful. One small mishap, one mistake and the whole disguise of a friendly and harmless computer guy can come crumbling...
View full detailsDid you know that you can make a lot of money with compression? And we’re not talking about the inventors of WinRAR (who are most likely still wait...
View full detailsWhat's the trick behind all the software and where does it come from? That's what we asked ourselves and then we went on a investigation....
View full detailsSometimes a simple card game is the best pastime. You know, those times when you're forced to de-digitise, or because of those slow university or w...
View full detailsDifferent accessories for your Raspberry Pi enable new possibilities:- <b>Cases</b>Available in two versions: white, and transparent. D...
View full detailsTo understand recursion, you first have to understand recursion.
At some point, there has to be an end to the stupid "Connection reset by peer"
It's not enough for talented coders to write their own code, they try to analyze other programs and hardware too! For example, they'll wr...
View full detailsAn answer to every single newbee question... Now you do not even have to make the effort to open your mouth!For those who do not know (and are afra...
View full detailsIf one were to believe the genre legends Run DMC, hip-hop really does have one thing in common with informatics: It's tricky! While the trio of Run...
View full detailsWho remembers the good old times when you had to choose between Internet and talking on the phone? The Dial-up connection needed the modem and ever...
View full detailsWe all know it: e-mails with incorrect encoding, in which the German special characters are once again displayed incorrectly. We can only be glad t...
View full detailsIn the mid-nineties, a dream came true and, thanks to graphic boards, virtual food looks a lot better and more tasty now! But it doesn't matte...
View full detailsThe main assumption of the computer and network security principle "security by obscurity" is that a system cannot be compromised if nobody on the ...
View full detailsWithout words.
Uh Oh...Moments where you do not want to be the database admin...
To be or not to be, that is the question.2b, or not 2b, that is the question./(bb|[^b]{2})/ We knew it: coders are poets. If only Shakespeare had b...
View full detailsFor the code monkeys among you ;-)
It is surprisingly easy to hack into other computer systems, often a simple phone call does the trick: "Hello, I am your system administrator. I ne...
View full detailsThis quote from Linus hits the nail on the head :)
Nature sometimes takes strange paths: recent research has shown that homo sapiens no longer marks the end of evolution. From now on, homo geekensis...
View full detailsImagine that you’ve just created a model that allows different technical systems to communicate with each other and that features different layers ...
View full details