Feeds

Hot pixelated Mac action to stuff fanbois' Xmas stockings

Icon artist Susan Kare publishes coffee table book

Top 5 reasons to deploy VMware with Tegile

The woman behind the Mac icons that once decorated the desktop of every Apple computer around the world has published a book of her pixel art designs.

Susan Kare has put out 80 of her favourite creations in a book – Icons – featuring everything from the paint bucket button and the smiling Mac to 32x32 pixel portraits of Steve Jobs.

"This book provides a curated look at 80 of Susan Kare's favorite icons created between 1983 and 2011," reads the blurb on Kare's website. "A zoomed-in view allows the reader to see how many icons are crafted pixel by pixel and notes by the artist accompany selected images."

Kare was working as a curator of a Fine Art museum in San Francisco when Apple called her in to design their new graphic user interface.

The drawings defined how most people interact with computers since Mac's graphical user interface influenced the designs that competitors adopted. Other icon designs are just fun pieces of pixel art ... like the dog, cigarette and heart. See images on her site here. ®

Internet Security Threat Report 2014

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.