Yotam Ottolenghi’s recipes for summer fruits | The Guardian

Catch the sun with these fruity wonders: sweet-and-sour sticky plums with sausages, a cheesy, fruity stuffed pizza roll, and a raspberry FroYo for kids that’s as packed with proper fruit as it is flavourThere’s a whole load of summer fruit on my kitchen counter. I avoid the fridge, because it sucks away the juiciness and leaves a taste of disappointment, so anything that isn’t snatched away for snacking in the first day or two goes into the freezer for future cooking, or used in cakes, puddings or even glorious mains, such as today’s sweet-and-sour plum and sausage traybake. Whatever I do with it, I am always on a mission to capture the effects of the summer sun, which gives a very particular kind of sweetness to what’s in the fruit bowl right now. Continue reading…

Catch the sun with these fruity wonders: sweet-and-sour sticky plums with sausages, a cheesy, fruity stuffed pizza roll, and a raspberry FroYo for kids that’s as packed with proper fruit as it is flavour

There’s a whole load of summer fruit on my kitchen counter. I avoid the fridge, because it sucks away the juiciness and leaves a taste of disappointment, so anything that isn’t snatched away for snacking in the first day or two goes into the freezer for future cooking, or used in cakes, puddings or even glorious mains, such as today’s sweet-and-sour plum and sausage traybake. Whatever I do with it, I am always on a mission to capture the effects of the summer sun, which gives a very particular kind of sweetness to what’s in the fruit bowl right now.

Continue reading…


Are you Citizen-Journalist Material?

Have a tip or scoop? Do you have info about corruption that needs to be investigated and responsibly exposed ? Get in touch securely via WhatsApp at +44 7771 927378 | Signal at +447766 098270


Receive Exclusives, Features & News Updates

Subscribe



What Are
Geo-Poli-
Cyber™ Risks?

What Is Geo-Poli-Cyber™?

MLi Group created the terms Poli-Cyber™ and Geo-Poli-Cyber™ (GPC™) in 2012 and 2013 based on the philosophy that if you cannot identify and name the threat, you cannot mitigate that threat.

Geo-Poli-Cyber™ attacks are political, ideological, terrorist, extremist, ‘religious’, and/or geo-politically motivated.

Click to read more