Matthew Hughes

Joined June 2013

Matthew Hughes is a software developer, student and writer from Liverpool, England. He is seldom found without a cup of strong black coffee in his hand and absolutely adores his Macbook Pro and his camera. You can read his blog at http://www.matthewhughes.co.uk and follow him on twitter at @matthewhughes.

Answers Manager

Feel free to contact at mhughes@makeuseof.com

199 Posts Published
1111 Comments Posted
9 Answers

Matthew's Latest Posts

gambas-featured

The BASIC Guide to GAMBAS: All You Need To Know

24 hours ago

If you owned a computer in the 80s, you almost certainly knew BASIC. Each microcomputer came with their own spin on the language, and it wasn’t uncommon to while away a Saturday afternoon copying code from a magazine line by line. The end product would almost always be some kind of game, or an interesting visual […]

lucidchart feat

Lucidchart Is the Visio Alternative You’ve Been Waiting For

1 week ago

You might not have heard of Lucidchart before, but I bet you’ve heard of Microsoft Visio.

stealing-games-journalism

It’s About Ethics in Stealing Games Journalism: Why AdBlock Needs to Die

2 weeks ago

A simple, free browser plugin killed Joystiq – and is ruining the Internet.

whats-api

What Are APIs, And How Are Open APIs Changing The Internet

2 weeks ago

Have you ever wondered how programs on your computer and the websites you visit “talk” to each other?

legacy-featured

Facebook Now Lets You Give Someone Your Account When You Die

18th February, 2015

What happens to your Facebook profile when you die?

ie-safari-webrtc

Here’s How to Make Internet Explorer and Safari Work with WebRTC

17th February, 2015

Would you like to hear a secret? It’s a big one. Are you sure you can handle it? Okay, here goes. There are other web browsers besides Google Chrome.

bigbrother-featured

Samsung’s Latest Smart TVs Are Straight Out Of George Orwell’s 1984

12th February, 2015

A new feature in the latest Samsung smart TVs has put the Korean giant in a bit of hot water. It turns out they’ve been listening to everything you’ve been saying…

internet-featured

The Best Internet Love Stories Of All Time

11th February, 2015

Internet love isn’t like in the movies, but it’s all around us. Here are tales of people falling in love on MMOs, malware research sites and more.

mitochondria-featured

The UK Just Legalized “Three Parent” Babies

8th February, 2015

Mitochondrial diseases kill thousands of people a year. A controversial new treatment is raising hackles — but do the fears hold water?

earth-featured

4 Things You Didn’t Know You Could Do With Google Earth Pro

5th February, 2015

Google Earth Pro used to cost an eye-watering $400, and comes with some amazing exclusive features. Here are four you probably should check out.

theory-change

How the Theory of Change Can Help You Achieve Your Goals

30th January, 2015

The inherent problem with goals is they’re all about the ‘what’, and not the ‘how’. The Theory of Change helps you to define a goal and work out the steps needed to accomplish it

SONY DSC

Open Source Software and Forking: The Good, The Great and The Ugly

28th January, 2015

Sometimes, the end-user benefits greatly from forks. Sometimes, the fork is done under a shroud of anger, hatred and animosity. Let’s look at some examples.

blackberry-discriminated

Are Blackberry and Windows Phone Users Discriminated Against? (No.)

27th January, 2015

Blackberry CEO John Chen says “providers must be prohibited from discriminating based on the customer’s mobile operating system.” That’s nonsense.

north-korea-tech

This is What Technology In North Korea Looks Like

26th January, 2015

In North Korea’s isolation, they’ve developed their own Internet. Their own technology industry. Even their own tablet computers. Here’s what digital life in the DPRK looks like.

The Ultimate Guide To Watching Online TV With Private Internet Access feat

The Ultimate Guide to Watching Online TV with Private Internet Access

26th January, 2015

Virtual private networks (VPNs) allow you to push your network traffic through an encrypted tunnel, making it easy to hide your identity, and to browse the Internet securely when using a public access points.