wisemonkeys logo
FeedNotificationProfileManage Forms
FeedNotificationSearchSign in
wisemonkeys logo

Blogs

Tomato Butter Sauce with Bucatini

profile
Danish Khan
May 21, 2022
12 Likes
8 Discussions
965 Reads

Cooking in advance makes me feel secure, relaxed. As we know, life does not arrange itself according to our schedules. Yes, sometimes takeout is the answer, but I rest easy as my trusty sauce of solace is there for me, like the most loyal of friends. There’s comfort in knowing all that’s left to dinner is to boil pasta, reheat this sauce from either the fridge or the freezer and a deep dish of pleasurable pasta awaits. 

This recipe is by the Grande Dame of Italian cooking herself, Marcella Hazan. If you love Italian cooking, you must have her cookbook, Essentials of Classic Italian Cooking. Her Tomato Sauce with Onion & Butter is one of the simplest pasta sauces, but what holds true in the kitchen holds true in life: the simplest things are the greatest. This recipe only has four ingredients, and the rule of thumb in cooking; the shorter the ingredient list, the higher quality of all the characters involved. Buy the best canned tomatoes and most wonderful butter you can get your hands on. I do have a habit of puréeing the tomatoes, but you can roughly chop or hand crush if you like. Add the tomatoes along with the butter, onion halves and salt to a pot. Simply place the saucepan on the stove and let it simmer away for 45 minutes or so. This sauce looks after itself, but you can give it a stir every so often to feel like you’re being a good guardian. You will know when the sauce is ready when the fat from the butter begins to pool at the top of the surface. The natural sweetness of the onion mellows the sharp acidity of the tomatoes. Butter adds a richness to the sauce and a wonderful stick-to-me-goodness when tossed with the pasta. It’s what I like to call a healthy relationship.

Swathed in the simplest velvety smooth tomato sauce and generously showered with Parmesan cheese, this pasta is best enjoyed with a loved one curled up in the deepest corner of the couch.


Comments ()


Sign in

Read Next

Install Ubuntu in Vmware

Blog banner

undefined

Blog banner

Wedding photographer

Blog banner

Privacy-Enhancing Computation Techniques

Blog banner

MAHAKAL LOK UJJAIN

Blog banner

PPT methodology

Blog banner

Hash password! Is it really secured?

Blog banner

Environmental Management using GIS

Blog banner

OS Assignment 3 Deadlock

Blog banner

City of Mumbai (Bombay):

Blog banner

Types of email

Blog banner

Fitness

Blog banner

The Power of Forensic Watermarking in the Fight Against Content Piracy

Blog banner

Multiple processor scheduling

Blog banner

The Role of cryptography in cyber security

Blog banner

Article on IT development trends

Blog banner

AI and cyber Security

Blog banner

Network Footprinting in Cybersecurity

Blog banner

POSITIVE ATTITUDE IN LIFE

Blog banner

Biometric Authentication and Privacy: Balancing Ethical Concerns

Blog banner

Asana

Blog banner

Memory Management in Operating System

Blog banner

Cyber Bullying - Neeta Vonkamuti

Blog banner

SAVE TREES

Blog banner

Pooja Silver

Blog banner

The Essential Guide to Dynamic Arrays vs. Linked Lists: Which to Use and When ?

Blog banner

Digital marketing spotlight “Dove’s Real Beauty Campaign”

Blog banner

Why Users Leave Your Website in 5 Seconds (And How UI/UX Fixes It)

Blog banner

Top 10 Logos and their meanings

Blog banner

Why Inconel 625 and Monel 400 Remain Unbeatable in Refinery Applications?

Blog banner

What are Tenders its various types

Blog banner

Raising Emotionally Intelligent Students: The Classroom Beyond Academics

Blog banner

I/O buffer and its techniques

Blog banner

The Future of Cybersecurity: Trends, Challenges, and Strategies

Blog banner

Types Of Interrupt

Blog banner

The Peephole

Blog banner

Outlook.com

Blog banner

I/O Buffering

Blog banner

Deadlock

Blog banner

Sleep Matters: The Science Behind Toddler Naps

Blog banner

Dental Problems That Start Small But Should Never Be Ignored

Blog banner

Social engineering in cyber security

Blog banner