MakeUseOf

Matthew Hughes

  • 300
    articles

Page 9

About Matthew Hughes

Matthew Hughes is a software developer and writer from Liverpool, England. He is seldom found without a cup of strong black coffee in his hand and absolutely adores his Macbook Pro and his camera. You can read his blog at http://www.matthewhughes.co.uk and follow him on twitter at @matthewhughes.

Latest Articles

chrome-webstore-safe
How Safe Is The Chrome Web Store Anyway?

A Google-funded study has found that tens of millions of Chrome users have add-ons harboring malware installed, representing 5% of total Google traffic. Are you one of these people, and what should you do?

Why Hardware Startups Are Hard: Bringing the ErgoDox to Life

Here’s a controversial opinion for you: launching a software startup is easy. Hardware, on the other hand? Hardware startups are hard. Really hard.

canada flag breaking like glass
create-iphone-game
How to Create an iPhone Game From Scratch

At some point you've probably wished you could make your own iPhone games. It's time to stop wishing and start doing.

google-script-learning
Learning Google Script: 5 Best Sites & Tutorials to Bookmark

Do new and cool things with the Google services you use every day. Extend and automate by learning the cloud based scripting language from Google.

Siri Is Listening: Has iOS Privacy Been Blown Open?

Apple's has been accused of recording everything - absolutely everything - you say to Siri, and passing it to a third-party. But is this really a privacy breach, or is there good reason for it?

Twiddler 3 Review and Giveaway

The Twiddler is a one-handed keyboard device which works using chording to theoretically enable typing at up 240 words per minute; and it has a mouse pointer. Mind blown yet?

Lucidchart Is the Visio Alternative You've Been Waiting For

You might not have heard of Lucidchart before, but I bet you've heard of Microsoft Visio.

stealing-games-journalism
It's About Ethics in Stealing Games Journalism: Why AdBlock Needs to Die

A simple, free browser plugin killed Joystiq – and is ruining the Internet.

whats-api
What Are APIs, And How Are Open APIs Changing The Internet

Have you ever wondered how programs on your computer and the websites you visit "talk" to each other?

Facebook Now Lets You Give Someone Your Account When You Die

What happens to your Facebook profile when you die?

Samsung's Latest Smart TVs Are Straight Out Of George Orwell's 1984

A new feature in the latest Samsung smart TVs has put the Korean giant in a bit of hot water. It turns out they've been listening to everything you've been saying...

The UK Just Legalized "Three Parent" Babies

Mitochondrial diseases kill thousands of people a year. A controversial new treatment is raising hackles -- but do the fears hold water?

4 Things You Didn't Know You Could Do With Google Earth Pro

Google Earth Pro used to cost an eye-watering $400, and comes with some amazing exclusive features. Here are four you probably should check out.

theory-change
How the Theory of Change Can Help You Achieve Your Goals

The inherent problem with goals is they're all about the 'what', and not the 'how'. The Theory of Change helps you to define a goal and work out the steps needed to accomplish it

Open Source Software and Forking: The Good, The Great and The Ugly

Sometimes, the end-user benefits greatly from forks. Sometimes, the fork is done under a shroud of anger, hatred and animosity. Let's look at some examples.

blackberry-discriminated
Are Blackberry and Windows Phone Users Discriminated Against? (No.)

Blackberry CEO John Chen says "providers must be prohibited from discriminating based on the customer’s mobile operating system." That's nonsense.

north-korea-tech
This is What Technology In North Korea Looks Like

In North Korea’s isolation, they’ve developed their own Internet. Their own technology industry. Even their own tablet computers. Here’s what digital life in the DPRK looks like.

VPN
The Ultimate Guide to Watching Online TV with Private Internet Access

Virtual private networks (VPNs) allow you to push your network traffic through an encrypted tunnel, making it easy to hide your identity, and to browse the Internet securely when using a public access points.

7 8 9 10 11
Page 9 / 15