Bitches #6

May seem incredible but T. R. Robinson did live through the major events recorded in this book.   Further details and information, including buy links, available here.

Twitter Algorithm

Social Media users will have heard a lot about Facebook’s algorithm in recent times but how many know Twitter also utilises similar processes? Twitter’s adoption of an algorithm has been a fairly recent enhancement and one some did not take kindly to however, with the speed at which the site operates and the number of … More Twitter Algorithm

Preferred E-Book Publishing Site – Survey Results

Aspiring authors frequently, and occasionally even those who have already published, seek advice about which self-publishing site(s) they should consider using. Consequently, a survey Which E-Book Publishing Site? was recently conducted by this website, in which more established authors were asked to share their experience and preferences. The results follow: Question 1: Authors! If you have … More Preferred E-Book Publishing Site – Survey Results

Antitrust Investigations and Authors

  The term ‘antitrust’ is primarily used within the United States of America but has worldwide implications.     ‘In the United States, antitrust laws are intended to stop large firms taking over their competitors, fixing prices with their competitors, or interfering with free competition in any way.’ (Collins Dictionary) ‘Preventing or controlling trusts or … More Antitrust Investigations and Authors

Survey – Preferred Reading Method(s)

How Do You Prefer to Read? In these innovative days when there are multiple technological devises available it has been inevitable many reader’s habits will change. Though the everlasting popularity of physical books does not appear to have diminished excessively, there is no denying the advent of smartphones, tablets and e-readers have had an impact. … More Survey – Preferred Reading Method(s)

5 Do’s & 5 Don’t’s for Computer Security

Unfortunately, it is no longer uncommon to hear of cyber criminals and hackers whose aims are malicious and cruel and the illegal profiting from unsuspecting individuals. There are variety of ways they are able to accomplish these goals. One of the most common is to gain access to, and to control, a user’s computing device … More 5 Do’s & 5 Don’t’s for Computer Security