This is default featured slide 1 title
This is default featured slide 2 title
This is default featured slide 3 title
This is default featured slide 4 title
This is default featured slide 5 title
 

Category Archives: Technology

IPAQ to Linux

Palm pilots and pdas are constantly growing in the ways that people use them in their everyday lives. Having a pocket pc is becoming the standard rather than the exception. However, many people have a desire to connect their ipaq with Linux, because it is free, and because they have an objection to paying for expensive, proprietary software. As an alternative to Microsoft and Mac, Linux is a great option.

Some pocket pcs come with the Linux software already embedded. For instance, HP and Compaq palm pilots are two that usually come with Linux software already as part of the standard package. Dealers of pocket pcs are anxious to offer plenty of choices that will personalize their pda to the average consumer.

One of the best things about Linux is that it is considered very safe and extremely stable. A Linux connection can be found online very easily. Many reputable sites offer Linux connections for your handheld that can be quickly downloaded. Linux is also simple to learn, so people who are worried about being able to use it should be able to master it in no time at all.

If you connect ipaq Linux, you can assert your individuality and choose not to conform to the normal, expensive software options that others go with. Using Linux is just one way to assert your personality, and to let the expensive software market know that you are not one to go along with the crowd and others are joining with you every day.

Time To Warm Up PC

Common causes of freezing:

  • Low memory
  • Low disk space
  • Fragmented disk
  • Too many programs open simultaneously
  • Low CPU speed
  • Corrupt files
  • Software bugs
  • Overheating – random lockups that start several minutes after you start up the PC are often the result of the processor cooling fan not working properly
  • Some non-standard applications are suspect with freezing problems
  • Memory chip problems
  • Virus infection

Steps you can take to minimize freezing:

There are many things that you can do to help your computer do what you want without testing your patience…

  • Do a disk cleanup (cache, temp files, old or unused files, recycle bin) .. click here for instructions.
  • Do not run any more applications at one time than you need to.
  • If the freezing happens consistently with one application, uninstall and reinstall it – files associated with the application may have become corrupted. Always use Control Panel/ Add Remove programs, or the uninstall program belonging to the program to uninstall a program.
  • If the freezing has been occurring since you installed a new program, uninstall it.
  • Uninstall any programs that you may have downloaded and installed in the past, but no longer use.
  • Get the latest Windows update at http://windowsupdate.microsoft.com
  • Get any available patches for your software – go to the manufacturer’s websites to check for patches or updates to your programs.
  • Free up resources – click on Run and type “msconfig” in the dialog box. Next, click on the “Startup” tab. All the programs listed here with check marks are running in the system memory. To free resources Windows 98 users may uncheck everything except “System Tray” . Windows ME users can uncheck everything except ScanRegistry, PCHealth, *StateMgr and System Tray. Leave your anti-virus software in the startup as well. You must restart the computer for these changes to take effect.
  • Run ScanDisk (or Check Disk in Windows XP)
  • Defragment your disk. Click here for instructions.
  • If you have an older computer and are trying to run multiple applications, you may need to upgrade your computer… check the system specifications recommended for the applications you are running to see if your system is capable of doing what you are asking.
  • Obtain the latest drivers for your hardware – go to the web sites of the hardware manufacturers and get the latest drivers for your video card, sound card etc
  • Redetect your devices – remove the components from the Control Panel, System, Device Management screen. Reboot the system and let Windows redetect and add only those devices which are actually on your system.
  • Make sure that you have anti-virus software installed. Set it to automatically update virus definitions, to scan all incoming files, and to do a full system check at regular intervals.

Disk Cleanup :

For Windows 98 & 2000

You have probably been downloading programs, creating and deleting files, and installing new software without thinking about the effect this has on your disk space. It’s probably time to have a clean-up. Windows 98 and 2000 have a feature that cleans up your disks for you. It removes temporary files, the recycle bin and other files – giving you the option to delete or not to delete. It is simple to run.

Do this clean-up as follows:

Start: Programs: Accessories: System Tools: Disk Clean Up

When it opens up, select the C: Drive and start it. It will pop up and show you about four types of files, each with a check box. Check the boxes for files you would like deleted and proceed. It should run through pretty quickly and then you will have more space on your computer.

For Win 95

Windows Temporary Files

Firstly, get rid of your Windows Temporary files.

Go to Start> Find> Files & Folders. Then search for “*.tmp” (minus the quotes). The * allows you to look for any file that has a temporary file type. If you have done it right, only files that have a .tmp after them should appear in the search results. Now just click on the first one, hold shift, use the scroll bar to go all the way to the bottom, then click on the last one, and press delete.

Secondly, get rid of your Temporary Internet files

Go to the Temporary Internet Files folder in the Windows directory. It should be next to the Temp folder. There shouldn’t be anything in here that can’t be deleted, so you can go ahead and delete the files in this folder.

Thirdly, empty your recycle bin. Right click on the Recycle Bin icon, select Empty Recycle Bin. Many people have hundreds of files they “deleted” but they are still taking up space in the Recycle Bin.

Run the Disk Defragmenter

Editing and deleting files as you work leaves gaps on data storage media. Instead of each file being stored in one continuous block, it ends up in several locations, resulting in inefficient retrieval of your data. As you add more data to your hard drive, the gaps left by previous deletions are filled. Your file becomes split, or fragmented. This will slow down your system – when you try to retrieve a file, the process is slower than if it was stored in one block. To make your disk storage more efficient, a process called “defragmenting” is used.

Windows has a built in defragmenter, which is located at:

Start > Programs > Accessories > System Tools > Disk Defragmenter

It is a good idea to run this program once a month. When you run the defragmenter, close all programs including your screensaver. If programs are running it can cause data on your hard drive to be changed which makes the defragmenter start from the beginning… and never finish!

The more frequently you use defrag, the faster it will become.

Evolution of Computer Memory

Molecular Memory

Molecular memory is the name of a technology that uses organic molecules to store binary data. The Holy Grail of this technology would be to use one molecule to store one bit. For the near future, it would be more realistic to expect to have systems that use large groups of molecules to represent a single bit. Different types of molecules have been researched, including protein molecules. A more precise name of a molecular memory system that uses protein molecules is Protein Memory. Other types of molecular memory would have more precise names derived from the types of molecules on which the technologies are based.

Protein Memory

In the mid-1990s, the development of a protein-based memory system was the project of Robert Birge – chemistry professor and director of the W.M. Keck Center for Molecular Electronics. He was assisted by Jeff Stuart, a biochemist and one of Birge’s graduate students. The protein molecule in question is called bacteriorhodospin. Purple in color, it exists in the microorganism halobacterium halobium which thrives in salt marshes where temperatures can reach 140F.

The protein undergoes a molecular change when subjected to light making it ideal for representing data. Each molecular change is part of a series of many different states known as the photocycle. There are three main states: the bR state, the O state and the Q state. The O state represents binary 0 and the Q state represents binary 1 while the bR or rest state is neutral. To survive the harsh conditions of a salt marsh, the protein must be incredibly stable, a critical factor if it is to be used for representing data.

While in the bR state, the protein is placed in a transparent vessel called a cuvette, measuring 1 x 1 x 2 inches. The cuvette is then filled with a gel. The protein is fixed in place by the solidification of the gel. 2 arrays of lasers – one red and one green – are used to read and write data while a blue laser is used for erasing.

Reading, Writing and Storage Capacity

We will start in the bR state of the photocycle. A group of molecules is targeted and hit by the green laser array, also known as the Paging lasers. These molecules are now in the O state which represents binary 0. The O state allows for 2 possible actions:

• Reading – done with the red laser array set at low intensity

• Writing a binary 1 – done with the red laser array set at high intensity which moves the molecules to the Q state

The Q state allows for 2 possible actions:

• Reading – done with the red laser array set at low intensity

• Erasing – done with the blue laser which moves the molecules back to the bR state

A bacteriorhodospin storage system is slow. Although molecules change states in microseconds (millionths of a second), it’s slow when compared to semiconductor memory which has an access time measured in nanoseconds. Unfortunately, the time required to actually perform a read or write is even greater, on the order of ten milliseconds (thousandths of a second). The data transfer rate on this type of storage device is also very slow – 10 MBps (MB per second). In theory, the 1 x 1 x 2 inch cuvette could hold 1 TB of data or roughly one trillion bytes. In reality, Birge managed to store 800 MB and was hoping to achieve a capacity of 1.3 GB (billion bytes). The technology proved itself to the point that NASA was exploring methods of improving the technology during space shuttle missions, which in fact resulted in higher storage densities.

Types Of Earphones

In-ear earphones

Some people argue that these units are similar to the earbuds, but this isn’t the case. These pieces get inside your ear canal thus blocking noises from the outside. In addition to this, they are comfortable as they are often made from soft materials. The pieces are also light thus you can easily travel with them.

Just like any other pieces, they come with their negatives. Their major flaw is that they are delicate; therefore, they easily get damaged. This requires you to be very cautious when handling them.

On-ear

On-ear headphones sit right over your outer ear. When you wear them, they cover your ear canals rather than the entire ear. Their most identifying feature is a closed back thus you are able to listen to the music better. The units are also lightweight thus you can easily travel with them. In fact, some of the brands pack them with packing bags making it even easier to go with them.

While they are great units to have, they often feature a foam padding on the ear-cups that tends to get moist when your ears sweat. While you can use them both indoors and outdoors, they provide poor noise isolation when you use them outdoors. If you use them for a long time, they cause ear irritation.

Over ear

From their name, these units cover the entire ear. Due to this, they reduce noise pollution. They keep the sound you are listening to in thus you are able to get maximum results. In addition to maintaining the music in the ear, they are also very comfortable. In fact, some models feature cups made from velvet that don’t crunch your ears.

The main flaw with the units is that they are usually heavier than most of the other models in the market. Due to this, they cause fatigue when you wear them for extended periods of time.

About Cool Smartphone Gadgets

1. SELFIE RING LIGHT

The selfie ring is a piece of equipment that you put around your phone. It then shines a light directed on your face to give you soft, natural looking light. People sometimes wonder how all those Instagram celebrities take their photos. This gadget might be a step on the way to take the perfect picture.

2. SMART WATCH

The smart watch is a great compliment for your phone. You don’t only get rid of the effort to bring up your phone from your pocket or bag each time you want to check the time, you now also have to chance to check messages, play music and even take photos from your wrist. Simply awesome!

3. STANDING CHARGING CABLE

It is really irritating when you are charging your phone and there seems to be no good place to put it while it is charging. Perhaps even more irritating is those low quality cables that come with the phone, which breaks within a few months.

This standing charging cable for your smart phone will solve both of those issues. This cable has the benefit of working as a stand for your phone, so that you can enjoy a movie, YouTube or even gaming comfortably, while charging.

It is also really thing, and provides maximum charging speed, which makes it an overall amazing gadget.

Cool Web Tricks

Virtually everyone knows that Google.com ranks at the top of most people’s search engine lists, but it does a lot more than just tell you where to find vitamins or information on George Washington’s wooden teeth!

Need a map to a specific location?

Type in the address, city and state of virtually any location in the US, hit the search button, and Google serves up several different map providers across the Web.

Want to know what software application a certain file goes with on your computer?

Input the file name into Google’s search box and a number of reference sites will help you know exactly what purpose a file serves.

I actually used this to feature to identify a piece of “spyware” lurking on my computer.

Want to know who’s calling you on the phone in the US?

You can just input the phone number on your caller ID or cell phone display into the Google search box and get information on listed numbers before your answering machine can even pick up!

Log on to http://www.google.com/help/features.html for more cool search features that harness the search power of Google.

Text Zoom

Next time you can’t see small text clearly on a website, try holding down the “CTRL” key and then moving the scroll wheel on your mouse up and down.

The text in your web browser (and some programs) will increase and decrease in size as you roll the wheel back and forth.

This little trick provides an excellent means of quickly getting what you need from websites with tiny text.

Slow Surfing?

If your Internet Explorer web browser starts giving you problems, you might want to clean up your “Temporary Internet Files.”

Most people don’t realize it, but when you leave a web page, it doesn’t leave you!

Most of the time you keep a copy of websites you visit on your hard drive and, over time, they build up.

This collection of old web pages can eventually cause your surfing to slow to a crawl and even cause errors!

Here’s one way to clear out those old files. Click your “Start” button, then “All Programs,” “Accessories,” “System Tools” and “Disk Cleanup.”

After an initial check of your hard drive (which can take some time if it’s the first time you’ve ever launched the utility), you can check the boxes of the files you wish to delete.

To speed up your surfing, at a minimum, make sure you delete the “Temporary Internet Files.”

Surfing Shortcuts

To quickly cycle back and forth through a series of web pages you’ve visited, hold down the “ALT” key and tap your left and right arrow keys.

Left arrow takes you back while the Right arrow takes you forward.

Technology Changed Art

Technology has taken art into a new level of creativity. Let us talk about how technology has changed traditional art into digital art. We know that internet is ruling the world with its power. So, artists decided to present their art online with the help of internet. This is possible with use of technology.

You must have seen art galleries and attended painting exhibitions in your life. These doesn’t work well these days so artists find a way where they can get more attention and more praise for their work. Most of the artistic stuff is now seen online and is circulated to the art lovers.
There are some places where exhibitions are held and we do respect them. But presenting paintings, sculptures and art work online is in trend. Some of the artists are also showing their art on the basis of card swipe panel or coins.

How this work – when you enter coins or swipe card in the panel, the panel shows you some of the art work for a few minutes and then gets closed and if you want to see it again or explore more, further you need to swipe your card or add coins into it. This is how artists are using technology.

How digital artists are using technology for their art work
Digital artists already in touch with technology are aware of the systems that are in trend and use them to create their art work and sell them online.

Some of the professional digital artists are earning a lot of bucks by selling their art work. They can also design the ones that you want and are also ready to make any modifications you need.

They use different software to explore their skills and made it more impressive. They are using technologies that offer new ways to express their art work in a realistic way for much more time.

They are using different types of media and mix them to provide a more creative art work. Their 3D art work looks as real as it is present live in front of you.

Technology not only brings changes in education, medical field, industry and business but also brings a huge change in the art work and the artists as well.

Technology opens different paths for the artists to enter into for a good earning. They made their profession more powerful along with their art work.

Opening Up to the Internet

It is worth noting that establishing connection for an internet access primarily has to do with protocols at various levels of the end to end connection, so suffice to say that there is a high probability that a website you are visiting could not display due to a breach in one or many Internet Protocols.

With the emergence of the Internet in the 90’s till the early 2000’s there was the limitations of Internet access to the end-user only by means of the personal computers and laptops but this monopoly was broken with the development of the Wireless Access Protocol (WAP) which was adapted by Mobile Service Providers in the beginning of the year 2000.

This is the development that gave rise to a more sophisticated regime of handsets within a short time with the birth of the much hyped WAP technology, the protocol phased-out within the first 5 years, WAP was no longer the protocol of choice for emerging devices when bandwidth became the De facto for interactive streaming with the development of more reliable faster mobile internet protocols on stream.

Just a little over a decade and a half, and we see an overwhelming digital culture where household appliances, lifestyle gadgets and consumable electronics are in tight competition with traditional mobile devices over the internet space. From Pens sunglasses, apparels, television sets almost every other appliance and device is internet ready birthing a new identity as Smart Devices.

The emergence of smart devices and the redesigning of our traditional elements is what is being labeled in recent times as Internet of Things (IoT). Sounds like internet of everything to kitchen ware and where incandescent light bulbs are now re-engineered with a more intelligent Light-emitted diode or a more advanced organic LED is able to interact intelligently with other networked devices wirelessly.

Gartner says that, a typical home could contain more than 500 smart devices by 2022 which may include wardrobes, and water sink. And these could be most basic home and in a related report, Fortune Tech, is forecasting that global mobile traffic will grow eightfold over the next four years, reaching 30.6 exabytes monthly by 2020 due to the explosion of IoT and what’s interesting is the fact that the average smartphone user today consumes about 1.4 GB of data every month and this is expected to increase to an average of 8.9 GB.

IoT affects the average household and the behavior of the general consumer at large and where ever you find yourself either indirectly in the technology paradigm, there is lots of prospect and opportunities that can be maximized for the benefits of the general society.

The consumer industry drives a fundamental paradigm in the way users interact and personalize devices by transmitting small amounts of data from these devices in the monitoring, controlling and sensing functionalities imbedded in them.

51% of the world’s population in 2017 are occupants of the Zettabyte era where it is estimated that we are reaching a data consumption of 1.2 Zettabyte or 1.2 billion Terabyte.

A bold statement by former CEO of CISCO, John Chambers states that there will 50 billion devices online within 5 years.

This may not be a bloated estimation, considering the fact that Facebook application alone consumes a daily rate of 600 Terabyte of data from user interactions.

Executive Chairman of Google, Eric Schmidt has disclosed a sterling statistic which states that we create as much information in two days now as we did from the dawn of man through 2003.

Globally 8.4 billion things will be interconnected to the Internet of Things in 2017 according to Gartner Report and it goes on to state that 5 billion of which will be consumer appliances alone.

The more connected things we have, the more the rise of the data economy and how well information can be structured for the improvement of life and modernization of culture.

IoT is getting rid of our dependence on manual procedures and with a connectivity framework, knowledge sharing and access to information is so crucial and just a matter of time, data quality standards of information will need to be enforced for more things being connected to have a data quality compliance.

Technological Impact

Technology behind it: The technology is foolproof. The Iris and Fingerprints of a person are captured, scanned and held into a card. The entire process is done by very sophisticated devices and elite technology was used. This process is called the process of capturing the Biometric Identity of an individual. The Iris and the fingerprint of one individual will never match with the details of another individual in this world. That is why such a system was used. This card is commonly named as the AADHAR CARD..

How secure is it? According to experts the UIDAI details are kept in a highly secured server and it cannot be leaked. But it is only a matter of time to get its efficacy tested.

Demonetization: This is the art of moving currency away from the system and to provide detectable electronic modes of financial transaction. This also involves making the currency notes in circulation as invalid and issuance of new currency notes.

Technology behind demonetization: The technology lies in the art of printing notes. The mint stops printing the notes of old format and the government declares them ineffective. The mint then releases notes of new format.

Reason: The people keeping unaccounted wealth suddenly found the currencies kept in the secrecy of their homes invalid. Hence they are deprived of their unaccounted wealth. Another reason is to make electronic modes of financial transactions almost compulsory.

Backlogs: Very few people keep their wealth in form of notes as it is hard to hide. People who kept it in the form of Gold or other precious things or precious objects those are easy to hide escaped the process. A large part of population cannot even sign their names. How they will conduct electronic modes of transaction?

Reason: The reason behind it is to prevent the increase of black money in the system.

Effectiveness: The literacy rate of India is low. Hence any person having a card can avail any financial facility provided he declares his income properly.

Backlogs: The backlogs of this system are also there. They are:

Misuse: Any wealthy person can put undisclosed wealth into the accounts of one UIDAI number seeded account of another person for a price in order to make their wealth clean.

Even after making this system mandatory a person can disclose his wealth in a partial manner and keep the rest by converting it into other forms like gold.

Info of Hacked Computer Recovery

How did they get there – I let them in, believe it or not. I allowed criminals access to the machine, and, as they say, I was fair game from then, on

Well, I tried everything available – ran Bitdefender Total Security, found a bit, but the problems were still there.

Ran Malwarebytes Anti-malware, got some results, but problems continued, so ran again in “safe mode”. Ahh, more trash and smelly stuff, but still not satisfied, so ran Malwarebytes antirootkit in “safe mode” Really got a result, but I was clearly running into system slowdown and hesitation, now.

Checked the Microsoft.com site for assistance. Was directed to the Microsoft endorsed engineers who, after a negotiated fee, helped me understand how bad the damage was to the machine system. Yes, I sat on my hands and did a silent scream!

The answer was to completely replace the windows 10 O/S, so after some frantic backing up of stuff I really wanted to keep, it was time to pull the plug.

On a side note, it always amazes me that even though I do regular backups, there is always stuff I really need but had not included in the backups – little stuff like the desktop file with all those program references…

OK, so to the main purpose of Computer Recovery;- to recover the PC (These instructions were carried out on a Toshiba Laptop running the latest version of Windows 10)

First, make sure your machine is connected to the internet.

Regardless of all the bumph that Microsoft offers as how to start, I had to hold down the shift key (keep it down, while the computer restarts), and use the mouse to click on power/restart.

OK, now I have the start screen: “Choose an option”.

Choose the option “Troubleshoot”

Clicking on “Troubleshoot” gives you an option.

Click “Reset this PC” and you have another option:

Clicking; “Just remove my files” will remove all of your files and re-install a fresh Windows O/S

– but there is another choice, here: Click “Remove everything”, and you get the final set-up screen:

Reset this PC

Yes, the moment has arrived;- click “Clean the drive fully”!

Now the system will clean the disk data, re-install Win10 (in this case) and prepare the computer for you to begin the task of re-installing all your programs and data files.

Just take a careful look at anything you are going to re-install – do I need it, or better still, what is it – maybe a foreigner?

There will be a number of images to indicate progress

You will have plenty of time to think about your programs you may or may not want – the system re-install will take a while, and your machine will re-start more than once or twice…

OK, good luck with your future efforts. If you find these instructions do not work for your system or brand of computer then I suggest you search the web to discover what works for you.

Just remember, don’t trust anyone who approaches you unbidden, don’t let anyone have access to your machine except those who you have good reason to trust, and make sure you have protection in place as well as a regular backup system. All good practices to help ensure you don’t need to do computer recovery again.