Hold on a sec -- let me preface all of this with a quick reminder that I'm speaking on a personal level, and I'm absolutely certain that slates have a place in this world somewhere. We could go back and forth for hours with use-case scenarios (and the same could be done with cars, time machines or your luxury good of choice), but this isn't about proving that a tablet can do one or two things; it's about the limitations and awkwardness of using one that no one seems to talk about.
After years of watching the masses fawn over the iPad (and every other PC maker scramble to come out with something that serves a similar purpose), I still can't ever imagine myself investing in one, let alone actually using one in place of a smartphone or laptop. I've met quite a few folks in my line of work that all ask me the same thing: "Should I buy an iPad?" It's worth noting that no one actually asks if "they should buy a tablet," but that's speaking more about Apple's absurdly enviable mind (and in turn, market) share than anything else. My response is always the same: "If you can't think of a reason you'd need it, you don't need it."
Tablets, for whatever reason, seem to defy logic when it comes to purchase rationalization in the consumer electronics realm. I've yet to meet a person who purchased an ultraportable without knowing full-well that they would take advantage of enhanced battery life and a highly mobile chassis. Everyone I've know that invested in a high-end gaming rig knew why they were shelling out on that $500 GPU (read: frames-per-second). And all of my movie cuttin' pals knew precisely why they just had to have a Thunderbolt RAID setup. But tablets? People are just buying these things in a fit of hysteria -- does anyone actually know why this "third device" is such a necessity? Let's dive a little deeper, shall we?
The obvious answers (and the not-so-obvious question)Look, I'm not disputing that tablets serve a purpose. I would've leaped for ever-loving joy if my middle school classes were delivered on one, and my photographing wife uses hers to show example poses to nervous brides and grooms who want to look good in their wedding album. But when it comes to using one as a tool for myself -- a device which should make me more productive -- slates have failed to provide me with a compelling reason to drop $500+ on yet another computing instrument.
And here's why. With qHD displays becoming the norm, most modern smartphones can nearly match even the highest-resolution tablet display. Pixel-for-pixel, I can see almost as much information in the palm of my hand as I can with an unwieldy screen that requires two hands to use with any precision whatsoever. And then, there's typing. Let's say I'm at work , or at a conference, or at a side job, and I'm attempting to jot a few notes down for later. If needed, I can peck away with a shocking amount of accuracy using SwiftKey's magical prediction keyboard on insert-your-Android-phone-here... with one hand. Is it really worth the pocketbook hit to bring something else in there to do the same thing?
If you're asking what the big deal is with using both of your arms to operate a handheld computing apparatus, you're asking the wrong question. What you should be asking is this: "Why did I just spend $500 on a device that's just marginally easier to get work done on than the smartphone I already own, while being entirely more limiting than even a netbook from an OS standpoint?" If anything, it's just a testament to how immensely useful, longevous and mobile the modern day laptop truly is.
Look, tablets are weird to useC'mon, admit it. Slates are silly to hold and silly to operate. Ever tried taking a photo with a tablet? You're guaranteed to get perfect facial expressions for tomorrow's highlight image on Awkward Family Photos, but that's about it. Without a case, it's even awkward to type on a tablet. You're usually left with two options: propping it up against your leg, or laying it flat on a table and forcing yourself to hover directly over it, neither of which strike me as "natural." You might say that using one is no less strange than pecking away on a laptop, but if I have to sit down with it I might as well use something with a keyboard.
I'll confess that using one as an in-flight entertainment device looks pretty practical, but my 4.3-inch smartphone screen would accomplish the same task with a lot less fuss
I also can't seem to find anyone to justify the value in spending half a grand on something with a souped-up mobile OS. Marketers have stated from the start that a tablet is a "third device" -- something that's worth owning even if you already posses a smartphone and a laptop. I'm guessing it's because they know tablets aren't capable of replacing either. It's too big to fit into any pair of pants I own (unless you own Mc Hammer pants) and it's downright frustrating to use as a netbook replacement.
Even something as basic as chewing through unread emails proves to be a gigantic pain on a tablet. I typically get through eight or nine messages before I need to a) add an attachment from a file system that doesn't exist or b) open up a new browser to complete an inbox search whilst keeping the existing message open in a nearby window. Foiled again. This also brings up the point of multitasking; even with webOS' absolutely laudatory "Cards" system on the now-defunct TouchPad, there's no actual multi-window, multi-app multitasking. I can grab a 10-inch netbook -- priced at $300 or less, usually -- and multitask in ways that iOS could only dream of. Again, I'm looking at this strictly from a productivity standpoint, and if you're still trying to convince me that I need a "third device," you're barking up the wrong tree. I also won't argue that the "experience" of using iOS on a tablet is exemplary, but at most, it's a novelty in my world.
The "third device" requirement is manufacturedApple, and everyone else trying their best to hawk tablets, would have you believe that there's a huge hole in your technophile lifestyle that can only be filled by hauling around yet another contraption. I beg to differ. For consumers who don't consider themselves power users, you might be able to get away with using a tablet in place of a laptop. If that's you, fantastic. You just figured out a way to stick with only two devices, and you made the second one a good bit more compact. But if use things like Photoshop and Windows Movie Maker (real esoteric stuff, I tell ya), or you like to actually add attachments to your email from a file system, you'll probably find yourself in a place like myself: wondering what the heck the fuss is all about.
I'm not disputing the fact that the iPad is a runaway hit; Apple has sold millions, and it'll continue to dominate this landscape for the foreseeable future. It's shareholders are obviously thrilled with the demand. But here's a genuine question: how many of you actually use your tablet (of any brand) for productivity tasks as much as you thought you would when you lined up around the block to buy it? And after you invest a couple hundred in accessories to make it halfway useful, aren't you better off (financially and otherwise) with a bona fide laptop? For me, that answer is "yes". you can even check craigslist for selling offers on ipad. the number one reason will for selling will always be "I just done use it"Even in a world where posting your every moment and thaught a tablet is still not a third device of choice
Pictures provided by: Psymoon
Search This Blog
Sunday, August 21, 2011
Tuesday, August 9, 2011
cloud computing and the future of data storage
Cloud computing is all the rage. "It's become the phrase du jour," says Gartner senior analyst Ben Pring, echoing many of his peers. The problem is that (as with Web 2.0) everyone seems to have a different definition.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaSThis type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office
2. Utility computingThe idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
4. Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers)One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platformsA hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integrationThe integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.
Cloud based services are becomeing a standard in not only the IT world but also in the consumer market. While there are pros and cons to this tech services the investment that major brands like Apple and Microsoft it is becomeing more main stream. Due to it potential to surpass records in data transfer rate sizes and speeds it will be main stream soon.
As a metaphor for the Internet, "the cloud" is a familiar cliché, but when combined with "computing," the meaning gets bigger and fuzzier. Some analysts and vendors define cloud computing narrowly as an updated version of utility computing: basically virtual servers available over the Internet. Others go very broad, arguing anything you consume outside the firewall is "in the cloud," including conventional outsourcing.
Cloud computing comes into focus only when you think about what IT always needs: a way to increase capacity or add capabilities on the fly without investing in new infrastructure, training new personnel, or licensing new software. Cloud computing encompasses any subscription-based or pay-per-use service that, in real time over the Internet, extends IT's existing capabilities.
Cloud computing is at an early stage, with a motley crew of providers large and small delivering a slew of cloud-based services, from full-blown applications to storage services to spam filtering. Yes, utility-style infrastructure providers are part of the mix, but so are SaaS (software as a service) providers such as Salesforce.com. Today, for the most part, IT must plug into cloud-based services individually, but cloud computing aggregators and integrators are already emerging.
InfoWorld talked to dozens of vendors, analysts, and IT customers to tease out the various components of cloud computing. Based on those discussions, here's a rough breakdown of what cloud computing is all about:
1. SaaSThis type of cloud computing delivers a single application through the browser to thousands of customers using a multitenant architecture. On the customer side, it means no upfront investment in servers or software licensing; on the provider side, with just one app to maintain, costs are low compared to conventional hosting. Salesforce.com is by far the best-known example among enterprise applications, but SaaS is also common for HR apps and has even worked its way up the food chain to ERP, with players such as Workday. And who could have predicted the sudden rise of SaaS "desktop" applications, such as Google Apps and Zoho Office
2. Utility computingThe idea is not new, but this form of cloud computing is getting new life from Amazon.com, Sun, IBM, and others who now offer storage and virtual servers that IT can access on demand. Early enterprise adopters mainly use utility computing for supplemental, non-mission-critical needs, but one day, they may replace parts of the datacenter. Other providers offer solutions that help IT create virtual datacenters from commodity servers, such as 3Tera's AppLogic and Cohesive Flexible Technologies' Elastic Server on Demand. Liquid Computing's LiquidQ offers similar capabilities, enabling IT to stitch together memory, I/O, storage, and computational capacity as a virtualized resource pool available over the network.
4. Platform as a serviceAnother SaaS variation, this form of cloud computing delivers development environments as a service. You build your own applications that run on the provider's infrastructure and are delivered to your users via the Internet from the provider's servers. Like Legos, these services are constrained by the vendor's design and capabilities, so you don't get complete freedom, but you do get predictability and pre-integration. Prime examples include Salesforce.com's Force.com, Coghead and the new Google App Engine. For extremely lightweight development, cloud-based mashup platforms abound, such as Yahoo Pipes or Dapper.net.
5. MSP (managed service providers)One of the oldest forms of cloud computing, a managed service is basically an application exposed to IT rather than to end-users, such as a virus scanning service for e-mail or an application monitoring service (which Mercury, among others, provides). Managed security services delivered by SecureWorks, IBM, and Verizon fall into this category, as do such cloud-based anti-spam services as Postini, recently acquired by Google. Other offerings include desktop management services, such as those offered by CenterBeam or Everdream.
6. Service commerce platformsA hybrid of SaaS and MSP, this cloud computing service offers a service hub that users interact with. They're most common in trading environments, such as expense management systems that allow users to order travel or secretarial services from a common platform that then coordinates the service delivery and pricing within the specifications set by the user. Think of it as an automated service bureau. Well-known examples include Rearden Commerce and Ariba.
7. Internet integrationThe integration of cloud-based services is in its early days. OpSource, which mainly concerns itself with serving SaaS providers, recently introduced the OpSource Services Bus, which employs in-the-cloud integration technology from a little startup called Boomi. SaaS provider Workday recently acquired another player in this space, CapeClear, an ESB (enterprise service bus) provider that was edging toward b-to-b integration. Way ahead of its time, Grand Central -- which wanted to be a universal "bus in the cloud" to connect SaaS providers and provide integrated solutions to customers -- flamed out in 2005.
Today, with such cloud-based interconnection seldom in evidence, cloud computing might be more accurately described as "sky computing," with many isolated clouds of services which IT customers must plug into individually. On the other hand, as virtualization and SOA permeate the enterprise, the idea of loosely coupled services running on an agile, scalable infrastructure should eventually make every enterprise a node in the cloud. It's a long-running trend with a far-out horizon. But among big metatrends, cloud computing is the hardest one to argue with in the long term.
Cloud based services are becomeing a standard in not only the IT world but also in the consumer market. While there are pros and cons to this tech services the investment that major brands like Apple and Microsoft it is becomeing more main stream. Due to it potential to surpass records in data transfer rate sizes and speeds it will be main stream soon.
Friday, July 22, 2011
How to shoot yourself in the foot as a new social site
Today I came across a story on Digg touting a “Facebook competitor” and a “Facebook killer” called SocialPog.com. According to the (absolutely awful) YouTube video, SocialPog is “BIGGGER” than Facebook and apparently revolutionary. If you take a look at SocialPog.com–and I refuse to link to it, so you’ll have to type it in if you really want to see it–you’ll notice that they have well over 6 users and it’s a clone of MySpace circa 2004.
Some revolution that is.
But the worst of it isn’t that the site is an outdated, ugly, useless piece of crap. It’s that SocialPog has irreparably destroyed its reputation before it even had one by gaming Digg and manipulating its way in front of thousands of eyeballs.
Though SocialPog is a social networking site, there’s much a blogger can learn from this mess of a launch.
You better deliver on your promises.
SocialPog claims to be revolutionary, but it’s not. SocialPog claims its launch was highly anticipated, yet only has 6 users. SocialPog says it’s “biggger and better” than Facebook. No way. It just doesn’t deliver on its loudest promises.
As a blogger, its much better for you to be honest and mediocre. As long as you let people know you are trustworthy and genuinely helpful, they’ll look past your flaws. Besides that, you’ll always be evolving and growing as a blogger. Successful bloggers might start mediocre, but they never stay that way.
But if you make incredible promises that you absolutely can’t deliver on, people will remember that and they won’t excuse it. Even if you transform the site into the most mindblowingly useful website ever created, people will still ignore you as that dick that lied to them. You only get one shot at a first impression.
Don’t pay spammers to pretend your blog is bigger or better than it really is.
How did SocialPog get to the front page of Digg with over 200 votes? A ton of accounts created specifically and exclusively for the purpose of digging the video and leaving “positive” comments.
Check out these gems:
“Dreaming to join this lovely site.”
“HUH! I never think in that way.”
“I simply love the way they are providing their services.”
“I am impressed with their effective working.”
“This website is going to be the turning stone in social networking.”
Those aren’t even things I’d want people to say about my site if I hadn’t paid them. This is dishonest and ridiculous.
Your blog should be able to stand on its own merits. If you have to pay people to talk about it, you’ve lost. If you have to pay people to share it, you’ve lost.
Your blog should be grown through genuine relationships and true fans.
If your concept depends on you being compared to a bigger and better site, find a new concept.
In their video, SocialPog describes itself as a Facebook competitor. The spammers describe it as a Facebook killer. This is a no no. Why?
Think about it this way. If I described Blog Design Guy as a ProBlogger competitor and a ProBlogger killer, whenever you visited you’d automatically see it through that lens. You’d ask yourself, “Is this site a better ProBlogger than ProBlogger is?”
The answer will always be “No” because this is not and will never be ProBlogger.
You want to carve out your own space and find your own audience. That’s not to say everything you do has to be 100% original (because that’s impossible), but as long as you are doing it your way its going to come across as fresh, interesting and authentic.
The Bottom Line
The principle underlying all this advice? Don’t cheat. Don’t try to be a success faster than you deserve to be. Whatever shortcuts you take will only push you further from lasting success.
What do you think about this SocialPog debacle? What would your advice be?
Some revolution that is.
But the worst of it isn’t that the site is an outdated, ugly, useless piece of crap. It’s that SocialPog has irreparably destroyed its reputation before it even had one by gaming Digg and manipulating its way in front of thousands of eyeballs.
Though SocialPog is a social networking site, there’s much a blogger can learn from this mess of a launch.
You better deliver on your promises.
SocialPog claims to be revolutionary, but it’s not. SocialPog claims its launch was highly anticipated, yet only has 6 users. SocialPog says it’s “biggger and better” than Facebook. No way. It just doesn’t deliver on its loudest promises.
As a blogger, its much better for you to be honest and mediocre. As long as you let people know you are trustworthy and genuinely helpful, they’ll look past your flaws. Besides that, you’ll always be evolving and growing as a blogger. Successful bloggers might start mediocre, but they never stay that way.
But if you make incredible promises that you absolutely can’t deliver on, people will remember that and they won’t excuse it. Even if you transform the site into the most mindblowingly useful website ever created, people will still ignore you as that dick that lied to them. You only get one shot at a first impression.
Don’t pay spammers to pretend your blog is bigger or better than it really is.
How did SocialPog get to the front page of Digg with over 200 votes? A ton of accounts created specifically and exclusively for the purpose of digging the video and leaving “positive” comments.
Check out these gems:
“Dreaming to join this lovely site.”
“HUH! I never think in that way.”
“I simply love the way they are providing their services.”
“I am impressed with their effective working.”
“This website is going to be the turning stone in social networking.”
Those aren’t even things I’d want people to say about my site if I hadn’t paid them. This is dishonest and ridiculous.
Your blog should be able to stand on its own merits. If you have to pay people to talk about it, you’ve lost. If you have to pay people to share it, you’ve lost.
Your blog should be grown through genuine relationships and true fans.
If your concept depends on you being compared to a bigger and better site, find a new concept.
In their video, SocialPog describes itself as a Facebook competitor. The spammers describe it as a Facebook killer. This is a no no. Why?
Think about it this way. If I described Blog Design Guy as a ProBlogger competitor and a ProBlogger killer, whenever you visited you’d automatically see it through that lens. You’d ask yourself, “Is this site a better ProBlogger than ProBlogger is?”
The answer will always be “No” because this is not and will never be ProBlogger.
You want to carve out your own space and find your own audience. That’s not to say everything you do has to be 100% original (because that’s impossible), but as long as you are doing it your way its going to come across as fresh, interesting and authentic.
The Bottom Line
The principle underlying all this advice? Don’t cheat. Don’t try to be a success faster than you deserve to be. Whatever shortcuts you take will only push you further from lasting success.
What do you think about this SocialPog debacle? What would your advice be?
Sunday, June 19, 2011
The internet bubble
In the age of technology that we are in information is only a click away. From pc to cellphones and even now tablets and ipads. We can get information easier than gettin a drink of water but how much of that in formation is the whole truth. You read stories about how other countries governmets block the information that there people see but what if not ur government but other factors where placeing u into a social bubble that doesnt block but filters what u see and even what you search for.What is he internet hiding from you? Eli Pariser’s New York Times best-selling new book, The Filter Bubble: What the Internet Is Hiding from You. Pariser who is the president of the board of moveon.org is has been applauded by net skeptics like Jaron Lanier and Evgeny Morozov as well as digital optimists like Clay Shirky and Craig Newmark. It’s an important book which argues that leading websites like Google and Facebook are delivering personalized information to us, thereby shielding Internet users from the broad news and ideas that traditional newspapers delivered to us. The method by which this is done is with a very special method called algorithms. Algorithms are a special set of rules that are implanted into a program or site that governs its function. While this doesn't seem bad some net skeptics argue that the se algorithms are being used to almost censor the internet by not blocking what you see but by withholding information that they deam less important. Some can argue that this is creating a less well informed public. What do u think?
Sunday, June 5, 2011
How to Prepare Your Computer for Off Site Repair
1 Backup your laptop/computer if possible. If your computer suddenly dies, the opportunity to back it up is lost. However, if you back up your computer at the first sign of trouble, you might be able to prevent being stuck. Signs such as a pink tinge on the computer screen when it boots up is a sign that the backlight might be ready to go out. Or, if you notice that your system isn't booting up as quickly as it used to, backup your sensitive information.
2 Remove or password protect important files. After you've backed up your computer, you can either delete or password protect sensitive files right before you ship your computer out for repair.
3 Clear your browser history, clear passwords, delete cached information, remove cookies and clear authenticated sessions. Doing so adds an added layer of protection. For example, if you use an online email service on which you have set the cookies to remember you on the computer, anyone using your computer will be able to sign into your email account.
4 Empty your recycle bin. The files that you deleted from your computer go into the Recycle bin. Empty it before you send your computer out for repair
Check ( How To Lock And Password Protect Folder In Windows 7/Vista) for another tip
2 Remove or password protect important files. After you've backed up your computer, you can either delete or password protect sensitive files right before you ship your computer out for repair.
3 Clear your browser history, clear passwords, delete cached information, remove cookies and clear authenticated sessions. Doing so adds an added layer of protection. For example, if you use an online email service on which you have set the cookies to remember you on the computer, anyone using your computer will be able to sign into your email account.
4 Empty your recycle bin. The files that you deleted from your computer go into the Recycle bin. Empty it before you send your computer out for repair
Check ( How To Lock And Password Protect Folder In Windows 7/Vista) for another tip
How To Lock And Password Protect Folder In Windows 7/Vista
Do you want to lock and password protect your important folders in Windows 7 or Vista? If you are an administrator and have multiple accounts set up in Windows 7 / Vista, then you can block few important folders so that they can not be accessed by other users. Every time the blocked folder will be accessed, it will ask for administrator password. Therefore the folder will be locked permanently unless you don’t remove the lock yourself.
To lock a folder, right-click on that folder and select Properties. Now navigate to Security tab, and click Edit as shown in the screenshot below.
Click OK and then click Yes when a Windows Security window will pops-up as shown in the screenshot below.
Now click OK again and you are done. Now the specific user that you selected from the list will be denied access to this folder. It’s that simple!
To lock a folder, right-click on that folder and select Properties. Now navigate to Security tab, and click Edit as shown in the screenshot below.
A new window will pop-up, now under “Group and User Names”, select the user from the list whom you want to deny access to a specific folder, now under “Permissions for Users” check the Deny checkbox next to Modify(all other checkbox will get ticked automatically) as shown in the screenshot below.
Click OK and then click Yes when a Windows Security window will pops-up as shown in the screenshot below.
Now click OK again and you are done. Now the specific user that you selected from the list will be denied access to this folder. It’s that simple!
Monday, May 30, 2011
Free alternatives to popular programs
Here are a few free alternatives to popular programs like Microsoft word
Microsoft Word/Power point/excel spreadsheet
Free alternative(s)
1:open office-the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. It is available in many languages and works on all common computers
link: http://www.openoffice.org/
2:Abiword-AbiWord is similar to MS Word and MS Word users will not find much problem in switching over to this free application and will certainly love it as there is nothing better than a powerful and free word processor.
Link:http://www.abisource.com/download/
Photoshop
Free alternative(s)
1:GIMP-GIMP stands for “GNU image manipulation program”, and it is one of the oldest and most well known alternatives to Photoshop in existence.
Link:http://www.gimp.org/
2:Krita-Krita is slightly less powerful than both Photoshop and GIMP, but does contain some unique features.
Link:http://www.koffice.org/download/
Nero
Free alternative(s)
1:CDBurnerXP-This is by far the most popular free alternative to the expensive Nero Software. Works on Vista as well.
Link:http://www.cdburnerxp.se/es/home (site is in Spanish but software is multi-language)
2:InfraRecorder-This is the software that I currently use on my computer as a Nero alternative, and I must tell, it’s damn simple and straightforward. Has all that you might expect in a CD DVD Burning software like Nero.
Link:http://infrarecorder.org/?page_id=5
Microsoft Word/Power point/excel spreadsheet
Free alternative(s)
1:open office-the leading open-source office software suite for word processing, spreadsheets, presentations, graphics, databases and more. It is available in many languages and works on all common computers
link: http://www.openoffice.org/
2:Abiword-AbiWord is similar to MS Word and MS Word users will not find much problem in switching over to this free application and will certainly love it as there is nothing better than a powerful and free word processor.
Link:http://www.abisource.com/download/
Photoshop
Free alternative(s)
1:GIMP-GIMP stands for “GNU image manipulation program”, and it is one of the oldest and most well known alternatives to Photoshop in existence.
Link:http://www.gimp.org/
2:Krita-Krita is slightly less powerful than both Photoshop and GIMP, but does contain some unique features.
Link:http://www.koffice.org/download/
Nero
Free alternative(s)
1:CDBurnerXP-This is by far the most popular free alternative to the expensive Nero Software. Works on Vista as well.
Link:http://www.cdburnerxp.se/es/home (site is in Spanish but software is multi-language)
2:InfraRecorder-This is the software that I currently use on my computer as a Nero alternative, and I must tell, it’s damn simple and straightforward. Has all that you might expect in a CD DVD Burning software like Nero.
Link:http://infrarecorder.org/?page_id=5
how to play any video and music format
ever try to download a video file or music file only to be told by windows that i cant play or recognize the format. here are a couple of tips to make your PC/laptop play any video format with no problems
download a codec.
A codec is a set of small programs that are able to read and translate a form of media. they are easy to install and they turn on and off by themselves.they usually come in packs of more than one type. each and every media type has a single codec hence the packs of them
here are a few codec.
xvid
this is a low level codec pack that is able to read some main stream media types. use this if you just want to play a basic range of Media types and don't want to take up a lot of space or processing power to run
plays: mp4, wmv (windows media video), and AVI
Link:xvid codec
Divx
this is a mid-high level codec pack that is a field leader. this pack gives you the option for personal tweaking that helps to make it better (although you must know what you are doing as you can mess up your computer). this codec pack also gives you the option to download there HD video player if you are tired of windows media player it works with there codec pack if you want to try something different
plays:DivX, AVI, MKV, MP4 and MOV.
Link:Divx codec
K-lite
this is a mid-high level jack of all trades codec pack. this is one of my personal favorites.it plays almost every type of video and even has a special pack to play duel audio and subtitled video. it also comes with its own media player called windows media player classic.this pack also allows for extra tweaking with a little know how you can have a very full video experience.
plays:AVI, MKV, MP4, FLV, OGM, MPEG, MOV, HDMOV, TS, M2TS, and OGG files
Link:k-lite mega pack (you don't need to run the scan just go to direct download 1)
VLC
this last option is not a media pack but a full media player. instead of downloading codec's this media player has them all built in. the vlc media player has the ability to play all media types it even has the ability to repair damaged or corrupted media files.
plays:AVI, MKV, MP4, FLV, OGM, MPEG, MOV, HDMOV, TS, M2TS, and OGG files
Link:VLC media player
Note: all codec and media players work on mac as well as PC
download a codec.
A codec is a set of small programs that are able to read and translate a form of media. they are easy to install and they turn on and off by themselves.they usually come in packs of more than one type. each and every media type has a single codec hence the packs of them
here are a few codec.
xvid
this is a low level codec pack that is able to read some main stream media types. use this if you just want to play a basic range of Media types and don't want to take up a lot of space or processing power to run
plays: mp4, wmv (windows media video), and AVI
Link:xvid codec
Divx
this is a mid-high level codec pack that is a field leader. this pack gives you the option for personal tweaking that helps to make it better (although you must know what you are doing as you can mess up your computer). this codec pack also gives you the option to download there HD video player if you are tired of windows media player it works with there codec pack if you want to try something different
plays:DivX, AVI, MKV, MP4 and MOV.
Link:Divx codec
K-lite
this is a mid-high level jack of all trades codec pack. this is one of my personal favorites.it plays almost every type of video and even has a special pack to play duel audio and subtitled video. it also comes with its own media player called windows media player classic.this pack also allows for extra tweaking with a little know how you can have a very full video experience.
plays:AVI, MKV, MP4, FLV, OGM, MPEG, MOV, HDMOV, TS, M2TS, and OGG files
Link:k-lite mega pack (you don't need to run the scan just go to direct download 1)
VLC
this last option is not a media pack but a full media player. instead of downloading codec's this media player has them all built in. the vlc media player has the ability to play all media types it even has the ability to repair damaged or corrupted media files.
plays:AVI, MKV, MP4, FLV, OGM, MPEG, MOV, HDMOV, TS, M2TS, and OGG files
Link:VLC media player
Note: all codec and media players work on mac as well as PC
Sunday, May 29, 2011
how to recover a windows password (high level)
Warning High level of PC knowledge required:
If you are trying to recover a password from windows, you are in luck since it isn't terribly difficult. The best case scenario is that the windows workstation is set up with a guest account or an account that you actually know the password to. In this case, you can log in using that account and employ some password cracking software.
Modern versions of the Windows software uses the secure hash standard, which is an algorithm used to encrypt passwords that are stored on the system. Without such encryption, it would be even easier to find the passwords. The easiest method to find out such passwords is to employ an application that brute force attacks it with character and number combinations. A brute force approach essentially tries every possible combination of characters and numbers until it finds a password that works. With today's computers, this process can typically be done within a day for short passwords, but can take significantly longer for long passwords. In any case, no Windows password cannot be cracked eventually with this approach.
Some cracking applications can be found in our downloads section. The easiest to use is LCP, although the Cain and Abel program has more features. To crack a password, load LCP and select Import/Import from local computer. A list of user accounts and hashes should appear. Now select the brute force attack button and select Session/Begin audit. Now all you have to do is wait for the program to find the right password!
If you aren't able to log in at all to the Windows workstation, don't worry. All you have to do is recover the SAM file by booting up an alternate operating system on the computer. The easiest way to do this is to burn a copy of Knoppix (a port of Linux) and perform a boot from the CD-ROM with this disk in the drive. Once you are in Knoppix, locate the SAM file in the Windows directory (usually C:\windows\system32\drivers\etc\lmhosts.sam) and either copy it to a USB thumb drive, floppy disk, CD, or the Internet. Alternatively, you could use a DOS boot disk.
Now that you have the SAM file, take it to another PC that has LCP running on it. Copy the SAM file into the LCP directory, boot up LCP and select Import/Import from SAM file. This will load the hashes and you will be able to execute a brute force attack on them.
If you are trying to recover a password from windows, you are in luck since it isn't terribly difficult. The best case scenario is that the windows workstation is set up with a guest account or an account that you actually know the password to. In this case, you can log in using that account and employ some password cracking software.
Modern versions of the Windows software uses the secure hash standard, which is an algorithm used to encrypt passwords that are stored on the system. Without such encryption, it would be even easier to find the passwords. The easiest method to find out such passwords is to employ an application that brute force attacks it with character and number combinations. A brute force approach essentially tries every possible combination of characters and numbers until it finds a password that works. With today's computers, this process can typically be done within a day for short passwords, but can take significantly longer for long passwords. In any case, no Windows password cannot be cracked eventually with this approach.
Some cracking applications can be found in our downloads section. The easiest to use is LCP, although the Cain and Abel program has more features. To crack a password, load LCP and select Import/Import from local computer. A list of user accounts and hashes should appear. Now select the brute force attack button and select Session/Begin audit. Now all you have to do is wait for the program to find the right password!
If you aren't able to log in at all to the Windows workstation, don't worry. All you have to do is recover the SAM file by booting up an alternate operating system on the computer. The easiest way to do this is to burn a copy of Knoppix (a port of Linux) and perform a boot from the CD-ROM with this disk in the drive. Once you are in Knoppix, locate the SAM file in the Windows directory (usually C:\windows\system32\drivers\etc\lmhosts.sam) and either copy it to a USB thumb drive, floppy disk, CD, or the Internet. Alternatively, you could use a DOS boot disk.
Now that you have the SAM file, take it to another PC that has LCP running on it. Copy the SAM file into the LCP directory, boot up LCP and select Import/Import from SAM file. This will load the hashes and you will be able to execute a brute force attack on them.
Mini EMP Schematic
I was in the movies the other day and a usual sceen happend. all i could see was a scatterd view of brightly lit cellphone screens as people sent texts and checked the time. that was the most anoying shit ever so i decided to contact a friend that works with the NSA. he said that they have plans on how to build a handheld emp. so if you feel like i do and are sick of peoples private life being on display all the fucking time here they are
L1 is 3 to 12 turns of 24 gauge wire.
T1 is a coil manufactured by Toko electronics, not Toyo. It is available here. Thanks for pointing this out, Clinton!
The battery pack consists of four nine volt batteries wired in series. One could substitute power supplies instead.
T1 is a coil manufactured by Toko electronics, not Toyo. It is available here. Thanks for pointing this out, Clinton!
The battery pack consists of four nine volt batteries wired in series. One could substitute power supplies instead.
May your life not have a ringtone ever again (sinister laugh)
What do you want to read?
I also review tech by trade so let me know what u want me to review. my emails is
specterpcrepair@yahoo.com or specter99.mg@gmail.com
also email any computer questions you have and i will try my best to blog about them
specterpcrepair@yahoo.com or specter99.mg@gmail.com
also email any computer questions you have and i will try my best to blog about them
improve pc/laptop performance
1:Put all of your Icons into folders, so say you have lots of music files on your desktop make a new folder called music
2:Now hit "start" again and press the "all programs" button and press "Accessories", look for "Disk Cleanup" in the "System Tools" folder. Run that and check all the boxes of things to delete. Afterwards go to the same place and run the "Disk defragment". This could take a while so do it before bed or before work. There you go your PC should be running faster, if its not your may have a virus or just a slow processor, and a small amount of RAM(Random Access Memory).
3:There is not that many tips, just make sure to do this on a regular basis, only run the "Diskdefragment" once a month, or after you uninstall a large program(5GB or more).
2:Now hit "start" again and press the "all programs" button and press "Accessories", look for "Disk Cleanup" in the "System Tools" folder. Run that and check all the boxes of things to delete. Afterwards go to the same place and run the "Disk defragment". This could take a while so do it before bed or before work. There you go your PC should be running faster, if its not your may have a virus or just a slow processor, and a small amount of RAM(Random Access Memory).
3:There is not that many tips, just make sure to do this on a regular basis, only run the "Diskdefragment" once a month, or after you uninstall a large program(5GB or more).
Saturday, May 28, 2011
computer stupidities (all true)
here are a few of the conversations me and my friends have with people. from my life and side jobs
Me: "DSL is a lot faster."
Friend's Father: "Yeah, but if you have DSL, there are a lot of threats."
Me: "Yes, that's true to a degree, but there are firewalls that"
Friend's Father: "No, but they can hack into your computer even when it's off and steal your electricity."
Me: "Umm...I'm pretty sure that won't happen
Friend's Father: "It's all over the news. You mean to tell me they're wrong?"
Me: "...I guess so."
I have both a laptop and cell phone that are bluetooth-compatible. I tried to show my friends mother how I could connect the two pieces of equipment.
email i got from client
Client: "I think I've broken my computer! There's a message across the screen that says: 'It is now safe to turn off your PC.' WHAT SHOULD I DO?!?!"
I once used the generic telnet program on the library computers to check my mail on UTM (my personal server email) with Pine. The computer-inept librarian walked up behind me.
my friend works for tech support for apple here is one from him
Tech Support: "Yes, ma'am, we require a credit card or checking account in order to sign up on our service."
Customer: "Well, I saw on the news that I should never give out my credit card information!"
Tech Support: "Well, ma'am, we have to have a way to bill you."
Customer: "No other service does this!"
Tech Support: "No, ma'am, the others don't allow you to use a checking account."
Customer: "No honest company would ask me for my credit card information!"
Me: "When would you like me to go main office to install the antivirus software on the new system?"
Chairman: "Oh, they don't need it because they are not in a big city."
Me: "Do they connect to the internet?"
Chairman: "Yes, all day, but they are safe because it's not a big city."
here is one with a client over the phone with me
Client: "YOU GAVE ME A VIRUS!"
Me: "I don't think I've got a virus."
Client: "Go download [a brand of virus checker], and you'll see."
Sometime later I dutifully ran the checker.
Later on I heard him telling a colleague that his desk fan had a virus, and he had to keep it away from the screen to stop it from infecting his computer.
Me: "I need you to right-click on the Open Desktop."
Customer:Ok."
Me: "Did you get a pop-up menu?"
Customer: "No."
Me: "Ok. Right click again. Do you see a pop-up menu?"
Customer: "No."
Me: "Ok, sir. Can you tell me what you have done up until this point?"
Customer: "Sure, you told me to write 'click' and I wrote 'click'."
(At this point I had to put the caller on hold to tell you the truth I couldn't stop from giggling when I got back to the call.)
Me: "Ok, did you type 'click' with the keyboard?"
Customer: "I have done something dumb, right?"
On the phone with a client who's office i just left
Client: "My computer won't work. You guys must have broken it when you installed the modem."
Me: "What happens when you turn it on?"
Client: "It won't turn on anymore!!!!!"
Me: "So you don't see any lights or hear any noise?"
Client: "I'm telling you it WON'T TURN ON."
Me: "Is it plugged in?
Client: "OF COURSE it's plugged in, you MORON!"
Me: "When you push the power button it--"
Client: "Power button? This computer doesn't have a power button."
Me: "Sir, all computers have power buttons. Look at the front of the case, find the word 'power,' and push the button."
Client: "YOU FIXED IT!! Thanks!!!!"
Me: "DSL is a lot faster."
Friend's Father: "Yeah, but if you have DSL, there are a lot of threats."
Me: "Yes, that's true to a degree, but there are firewalls that"
Friend's Father: "No, but they can hack into your computer even when it's off and steal your electricity."
Me: "Umm...I'm pretty sure that won't happen
Friend's Father: "It's all over the news. You mean to tell me they're wrong?"
Me: "...I guess so."
I have both a laptop and cell phone that are bluetooth-compatible. I tried to show my friends mother how I could connect the two pieces of equipment.
- Me: "See? I confirm the request, and they're connected."
- friends Mom: "Don't do that! I don't want my voice on the Internet!"
email i got from client
Client: "I think I've broken my computer! There's a message across the screen that says: 'It is now safe to turn off your PC.' WHAT SHOULD I DO?!?!"
I once used the generic telnet program on the library computers to check my mail on UTM (my personal server email) with Pine. The computer-inept librarian walked up behind me.
- Her: (shrieking) "WHAT ARE YOU DOING???"
- Me: "I'm checking my email--"
- Her: "It looks like you're breaking into the computer!!"
- Me: "No really -- I'm checking my mail."
- Her: "But that's not HOTMAIL!!"
- Me: "I don't use hotmail. I use--"
- Her: "But EVERYONE uses HOTMAIL!!"
- Me: "No, my account goes through UTM. My email account ends with--"
- Her: "But that's not what MYYY UTM looks like!!" (apparently referring to the UTM web page)
- Me: "Yes, I'm telnetting. It's another way of accessing--"
- Her: "I think you better shut that off. You're breaking into the computer."
- Me: "But I--"
- Her: "Turn it off. I don't believe that 'checking mail' story."
my friend works for tech support for apple here is one from him
Tech Support: "Yes, ma'am, we require a credit card or checking account in order to sign up on our service."
Customer: "Well, I saw on the news that I should never give out my credit card information!"
Tech Support: "Well, ma'am, we have to have a way to bill you."
Customer: "No other service does this!"
Tech Support: "No, ma'am, the others don't allow you to use a checking account."
Customer: "No honest company would ask me for my credit card information!"
Me: "When would you like me to go main office to install the antivirus software on the new system?"
Chairman: "Oh, they don't need it because they are not in a big city."
Me: "Do they connect to the internet?"
Chairman: "Yes, all day, but they are safe because it's not a big city."
here is one with a client over the phone with me
Client: "YOU GAVE ME A VIRUS!"
Me: "I don't think I've got a virus."
Client: "Go download [a brand of virus checker], and you'll see."
Sometime later I dutifully ran the checker.
- Me: "Ok, I ran it. No virus."
- Client : "You MUST have a virus. You gave it to me. It was all over my system. You must not have run the checker properly." (yell, rant, rave, repeat checks, etc)
- Me: "How did I give it to you?"
- Client: "On those floppies with the latest revision of the software you wrote."
- Me: "The ones you just returned?"
- Client: "Yeah."
- Me: "Just a sec...let me check those." (pause) "Well, I found a virus on the disks. Ahem...seems you were about to pass a virus on to ME."
- Client: "Ah...lemme get back to you." (click)
- Customer: "Hi, I'd like to buy a virus."
- Friend: "You really don't want a virus on your computer. What you need is anti-virus software."
- Customer: "No, my son told me I need a virus, and that's what I'd like."
- Friend: "No worries. You don't need to buy a virus -- you can just connect to the internet and download one."
Later on I heard him telling a colleague that his desk fan had a virus, and he had to keep it away from the screen to stop it from infecting his computer.
Me: "I need you to right-click on the Open Desktop."
Customer:Ok."
Me: "Did you get a pop-up menu?"
Customer: "No."
Me: "Ok. Right click again. Do you see a pop-up menu?"
Customer: "No."
Me: "Ok, sir. Can you tell me what you have done up until this point?"
Customer: "Sure, you told me to write 'click' and I wrote 'click'."
(At this point I had to put the caller on hold to tell you the truth I couldn't stop from giggling when I got back to the call.)
Me: "Ok, did you type 'click' with the keyboard?"
Customer: "I have done something dumb, right?"
On the phone with a client who's office i just left
Client: "My computer won't work. You guys must have broken it when you installed the modem."
Me: "What happens when you turn it on?"
Client: "It won't turn on anymore!!!!!"
Me: "So you don't see any lights or hear any noise?"
Client: "I'm telling you it WON'T TURN ON."
Me: "Is it plugged in?
Client: "OF COURSE it's plugged in, you MORON!"
Me: "When you push the power button it--"
Client: "Power button? This computer doesn't have a power button."
Me: "Sir, all computers have power buttons. Look at the front of the case, find the word 'power,' and push the button."
Client: "YOU FIXED IT!! Thanks!!!!"
Read the fine print: Why a lawsuits over phone place tracking is bogus
Two Michigan group are suing Google for tracking their locations nonetheless a warrant. Here’s since a lawsuits over phone plcae tracking don’t make sense, and since a authorised leeches merit to lose.
America. The land of the nfl (National Felon League) and triple bacon burgers (mmm bacon). Yesterday, dual Oakland County, Michigan residents filed a lawsuit opposite Google for allegedly tracking their locale “just as if by a tracking device for that a court-ordered aver would usually be required.” The dual plaintiffs possess HTC Inspire 4G phones, that run on Google’s Android handling system. They wish $50 million in indemnification and a justice sequence requiring Google to stop tracking users of a products.“We yield users with notice and control over a collection, pity and use of location” pronounced Chris Gaither, a orator for Google, to Bloomberg. “Any plcae information that is sent behind to Google plcae servers is anonymized and is not tied or traceable to a specific user.”
This lawsuit is absurd and here’s why.
How Android works
On an Android phone, when we spin on “wireless networks” location-based services by Google, it privately asks we to determine or remonstrate to “Allow Google’s plcae use to collect unknown plcae data. Collection will start even when no applications are running.”You can spin GPS plcae services on or off nonetheless an “agree” warning, nonetheless nothing of your location-based apps will work good (or during all) with GPS alone and Google doesn’t anonymously lane true GPS data.
On their own, GPS systems indeed take a few mins to pinpoint your location. This is since complicated phones use Assisted GPS, that “assists” GPS record by triangulating your position regulating circuitously dungeon phone towers and famous Wi-Fi hotspots. By caching (storing) a tiny volume of this wireless information each so often, a smartphone can roughly figure out where we are. Without this, a GPS knowledge wouldn’t work good during all, partially due to GPS record and partially since a GPS chips in phones are unequivocally diseased and inexpensive.
I do have an tangible HTC Inspire 4G and can endorse that a options are a same as a customary Android phone. HTC did not cgange a settings as it does many tools of Android with HTC Sense, a tradition user knowledge covering it tacks onto Google’s OS. The Inspire does have one underline that some other phones do not, however: a “Phone finder” use that “Allows we to find your phone when it is mislaid or stolen.” The box was checked when my phone arrived. If they were suing over that use though, it seems that HTC would be a partial of a lawsuit.
Wrong target, guys
What these savvy group should have finished is buy iPhones and sue Apple instead, like a similar twin in New York. Unlike Google, Apple doesn’t now advise users before they spin on GPS services; they’re usually warned when they determine to a iTunes Terms and Conditions whenever there’s a new update. South Park ran a humorous episode about this dual days ago.Apple claims that it does not lane iPhone users, nonetheless a recently unprotected bug in a iPhone shows that it does keep an unencrypted record of a user’s ubiquitous locale for as prolonged as a year. The record is stored locally on a user’s computer. Some military departments have famous about a bug for some time and have used a locally stored information to assist investigations. Apple says it will repair this bug, nonetheless has continually reiterated that, nonetheless it stores a record of new locations on a users machine, it does not lane user data itself. The information is stored, nonetheless Apple claims that it doesn’t have a duplicate for itself. The iPhone also doesn’t store accurate coordinates; it usually shows circuitously dungeon phone towers “as distant as 100 miles away.” Using this tender dungeon building data, location-based iPhone apps figure out your ubiquitous locale and broach applicable ads and services.
Microsoft has not nonetheless been sued, nonetheless like Google, it too collects unknown plcae data.
Sue a wireless carriers
If Google, Apple, and Microsoft can’t store plcae information indispensable to run their services nonetheless a lawsuit, afterwards somebody needs to start suing wireless carriers, since Sprint, Verizon, and ATT know a helluva lot some-more than anybody else about where you’re going and what you’re adult to. For example, ATT recently began promulgation users location-aware selling messages when they get tighten to stores. Carriers also customarily sell information about users to law coercion and can do whatever they wish with your location. Like Apple, all they unequivocally have to do is bury some calm low inside a Terms and Conditions agreement. At slightest Google warns we upfront.Location services don’t run on magic
You can’t have location-based services if a phone can’t promulgate and send a plcae (anonymously) to GPS satellites or ping internal dungeon phone towers and hotspots. These dual Michigan plaintiffs bought smartphones that are marketed with core facilities like “Navigation” and “Places,” that are built in. When we buy a Google phone, we know you’re removing Google Maps and other Google services. Furthermore, HTC phones indeed make we spin on plcae services to see a continue on your homescreen. These dual gentlemen substantially concluded to a plcae warning summary when they activated their devices.Did they not consternation how their phone knew they lived in Oakland County, Michigan? Did they trust it was magic? Google sufficient warns users about a plcae use in Android and creates it comparatively elementary to spin it on or off. we spin my GPS off and on all a time. If you’re going to buy a smartphone, we need to learn what services you’re opting into. If usually common clarity factored into the justice system.
The -isms of the Tech lost
Top tech religions:
Applism - Anything with the logo is simply the best ... regardless of cost.
Googlum - Google always acts in your best interests, not theirs.
Open Sourcery - Source code is the cure for all technological issues.
NASAians - NASA is the source of all real technological innovation.
Artificial Intellizans - We're on the verge of the singularity --- I know cause I saw it in a movie
Facebookism - 1: when a person lives in a world revolving around themselves. Applying all Facebook posts good or bad to themselves. 2: Judging people based on the number of friends/connections that they have on Facebook.
Twitterism - Deep insights about life in 140 chars or less. Stems from the microblogging service Twitter that allows posts of up to 140 characters.
I quote ferris bueller "-Ism's in my opinion are not good. A person should not believe in an -ism, he should believe in himself."
Applism - Anything with the logo is simply the best ... regardless of cost.
Googlum - Google always acts in your best interests, not theirs.
Open Sourcery - Source code is the cure for all technological issues.
NASAians - NASA is the source of all real technological innovation.
Artificial Intellizans - We're on the verge of the singularity --- I know cause I saw it in a movie
Facebookism - 1: when a person lives in a world revolving around themselves. Applying all Facebook posts good or bad to themselves. 2: Judging people based on the number of friends/connections that they have on Facebook.
Twitterism - Deep insights about life in 140 chars or less. Stems from the microblogging service Twitter that allows posts of up to 140 characters.
I quote ferris bueller "-Ism's in my opinion are not good. A person should not believe in an -ism, he should believe in himself."
Backing up your computer
These days, more and more people are using computers to store memories, important documents, and various other bits of information that may need to be kept for long periods of time. Backing up a computer is essential for keeping long term (or even short term) documents around.
Step 1
Decide on the proper backup media for your needs. CD-R, DVD+-R, tape, hard drives (internal and external), online, and flash drives are all great choices, but the right tool for the job is always best. I would suggest an external hard drive as of right now you can get a 500gb hard drive for next to nothing
Step 2
Choose a back-up application. For personal computers, there are many options. If you are using Microsoft Windows, there is a back-up application built in (Start>Programs>Accessories>System Tools>Backup). You can also use third party back-up managers, ranging from small programs to full online backup services. Mac OS X has the Time Machine back-up application built in. If you use a flavor of Linux, there are many open source options available in repositories for all of the major distributions.
Step 3
Prepare your back-up device of choice. If you are using a hard drive, it's best to use it just for back-up purposes. Make sure whatever you are using is ready to accept the back-up. As most most external hard drives are plug and play (the register to your computer when you plug them up) any hard drive 500gb or higher is great
Special note:
With Apple's Time Machine, just plug in your volume. A window will pop-up asking you if you would like to use it to back-up. Click yes, and Time Machine will do everything else for you.
Step 1
Decide on the proper backup media for your needs. CD-R, DVD+-R, tape, hard drives (internal and external), online, and flash drives are all great choices, but the right tool for the job is always best. I would suggest an external hard drive as of right now you can get a 500gb hard drive for next to nothing
Step 2
Choose a back-up application. For personal computers, there are many options. If you are using Microsoft Windows, there is a back-up application built in (Start>Programs>Accessories>System Tools>Backup). You can also use third party back-up managers, ranging from small programs to full online backup services. Mac OS X has the Time Machine back-up application built in. If you use a flavor of Linux, there are many open source options available in repositories for all of the major distributions.
Step 3
Prepare your back-up device of choice. If you are using a hard drive, it's best to use it just for back-up purposes. Make sure whatever you are using is ready to accept the back-up. As most most external hard drives are plug and play (the register to your computer when you plug them up) any hard drive 500gb or higher is great
Step 4
Ok the moment of truth. if you decide to use windows backup
(Start>Programs>Accessories>System Tools>Backup)
it might look something like this
make sure you plug in your media type and select it.Special note:
With Apple's Time Machine, just plug in your volume. A window will pop-up asking you if you would like to use it to back-up. Click yes, and Time Machine will do everything else for you.
how to upgrade ram on your pc and laptop
Upgrading the ram on your pc is the easiest and least time consumeing task you can do to your computer. there are only a few things you need to know before hand and you will be all set.
FIRSTTurn off your computer and unplug all peripherals. Take notice of how you unplug or disconnect any devices.
SECOND
Remove the side panel of the tower system or the cover if you have a desktop. Place the panel in a safe place well out of the way.
THIRDBefore touching anything inside the system unit, remove electrical static charge from your body by touching a door knob or any unpainted metal surface.
FOURTHRemove the new memory from its protective wrapping and locate the sockets to install the new memory chips.
FIFTHNotice the type of retaining clips that hold the chips in place. Remove any old chips you intend to move. Now to be sure you won't damage the chips, ground yourself again to remove any remaining static electricity.
SIXTH
Pull the retaining clip open and carefully slide the RAM Chips in their memory banks. Push the clips back over the new memory chips.
SEVENTH
Check and double check the firmness of the chips by gently trying to move them from side to side. Take a good long look at the chips for anything that looks unusual.
EIGHT
Replace the system unit cover and reconnect all peripherals. Reboot the computer and the operating system should recognize your new or added memory without any problem.
FIRSTTurn off your computer and unplug all peripherals. Take notice of how you unplug or disconnect any devices.
SECOND
Remove the side panel of the tower system or the cover if you have a desktop. Place the panel in a safe place well out of the way.
THIRDBefore touching anything inside the system unit, remove electrical static charge from your body by touching a door knob or any unpainted metal surface.
FOURTHRemove the new memory from its protective wrapping and locate the sockets to install the new memory chips.
FIFTHNotice the type of retaining clips that hold the chips in place. Remove any old chips you intend to move. Now to be sure you won't damage the chips, ground yourself again to remove any remaining static electricity.
SIXTH
Pull the retaining clip open and carefully slide the RAM Chips in their memory banks. Push the clips back over the new memory chips.
SEVENTH
Check and double check the firmness of the chips by gently trying to move them from side to side. Take a good long look at the chips for anything that looks unusual.
EIGHT
Replace the system unit cover and reconnect all peripherals. Reboot the computer and the operating system should recognize your new or added memory without any problem.
Subscribe to:
Posts (Atom)