Skip to main content

Home/ ACSE Discussion/ Group items tagged another

Rss Feed Group items tagged

tech vedic

Recycle your old tech gear - 0 views

  •  
    In springtime, people's fancies may turn to love, but their to-do list turns to cleaning. Make this the year that you finally recycle all the ancient MP3 players, toner cartridges, ethernet cables, and bulky monitors out of the closets, garages, and spare rooms where they've been lurking. Your home will feel more modern, and you'll be doing your part to boost the 27 percent electronics recycling rate. Just in time for another spring constant, Earth Day. Before you get rid of any of your electronics The first step on your recycling journey: Make sure that none of your personal data will be leaving the house along with your soon-to-be-discarded electronics. If you're using Apple's iTunes to manage your digital music and video, be sure you deauthorize any device you're recycling. "But that computer is dead" is no excuse: Apple expects you to simply deauthorize all your devices via the iTunes app, then reauthorize the ones that are still alive If you're recycling a smartphone, do a complete reset of your phone to wipe out its data and restore it to its factory settings. Before you do this, however, make sure that you've got your data backed up someplace else If you're recycling a computer or a hard drive, don't just assume that deleting files will wipe the data off your system, because it won't. All it does is reformat the space on the drive, and the data can be snagged using tools designed for disaster recovery. Now, on to recycling Broadly speaking, you have three recycling options: You can drop off your unwanted stuff in person somewhere; you can ship it away; or you can donate it to a willing organization. Drop it off in person. The advantage to dropping off your gear is that you don't need to really plan ahead and print out prepaid labels (as you would if you were shipping things away); you just toss your stuff in the car and go Another option that's cropping up across the U.S. is the electronics recyc
tech vedic

BlackBerry Z10: Easier to use than Android with loads of features - 0 views

  •  
    BlackBerry Z10 is the touchscreen version which is very similar to the other smartphones available in the market. Display with 4.2inch screen gives a resolution of 1268 x 768 pixels i.e. 768 pixels per inch. The BlackBerry Z10 is easier to use than Android and more powerful, giving faster access to e-mails, tweets, facebook updates and messages. The Z10 has 16GB on inbuilt memory. Unlike the iPhone, the BlackBerry Z10 will allow user to extend the storage with microSD card slot. It sports a chip letting the phone act as a credit card at few payment terminals and share data wirelessly when tapped against some other phones. BlackBerry Z10 comes with handsome cameras with 8MP on back and 2MP on the front. The rear camera can record is a 1080p high definition camera while the front has 720p resolution. One more good thing about the BlackBerry Z10 is its battery life. The talk time is upto 10hrs on 3G. Upto 60 hours of audio playback and 11 hours of video playback. The BlackBerry messenger (BBM) in BlackBerry Z10 includes voice calling and video chatting and allows user to share its screen with another. Another distinguishing feature is the BlackBerry Balance which allows two personas on the same device still keeping the individual data secure. One can set Work mode and personal mode and can switch between them easily. The Time shift is a camera feature that lets you capture a group shot where everyone is smiling with their eyes wide open. BlackBerry Z10 introduces new browser which includes HTML5 support which has a reader mode. By-The Xpert Crew @ http://techvedic.com https://www.facebook.com/techvedicinc https://twitter.com/techvedicinc http://pinterest.com/techvedic1 http://techvedicinc.tumblr.com/
Doug Peterson

» Why Is My IP Address From Another State? - IT Professionals - Lockergnome - 0 views

  •  
    Recently I had someone ask me a question I wanted to share with you. They asked me why in the heck their IP address appeared to be coming from the other side of the country? Honestly, I can understand why this would freak someone out! Imagine not understanding what is going on as you do an IPChicken.com check only to see the IP looking odd. Then you run a speed test and learn you're suddenly based in another region of the country. I mean come on, that is just going to feel weird to the uninformed.
tech vedic

Why it's a good idea to own a USB-to-SATA adapter - 0 views

  •  
    Why it's a good idea to own a USB-to-SATA adapter The USB-to-IDE/SATA adapter the most indispensable tool in my PC repair kit. Just this weekend, it once again proved itself worthy of that title. In a nutshell, the adapter allows you to connect an internal hard drive to your PC-externally. What would an internal drive be doing outside your desktop or laptop? Funny you should ask. About a week ago, my media-center PC starting displaying this message during boot-up: "Hard drive failure imminent." And you know what? It was. In short order, the machine wouldn't boot at all. Long story short, I had to replace the drive, reinstall Windows, etc. But I wondered if I could salvage any/all of my recorded TV shows. To find out, I connected the old, non-booting drive (now "naked" outside the system) to a USB port via my adapter. Huzzah! The machine was able to read the drive and copy over the recordings. Except for the hassles (and expense) of actually replacing the drive, no harm done. There's another reason to keep one of these adapters on hand, and that's if you're planning to upgrade to a solid-state drive (SSD). Unless you buy a kit that comes with an adapter, you'll need one so you can image (i.e. clone) your existing drive to the new SSD. Then you'll remove the old drive, install the new one, and presto, you're back in business. (Much faster business: SSDs rock.) Unless you have a pretty old desktop or laptop, you can skip buying a USB-to-IDE/SATA adapter and just go for USB-to-SATA. At the same time, I recommend one that supports USB 3.0. You may not need it now, but it's a good bet your next PC will have USB 3.0 ports -- and that'll make for much faster copying between drives. Trust me: When the time comes that you need to upgrade or replace a hard drive, you'll be glad to have a USB-to-SATA adapter on hand. By-The Xpert Crew @ http://techvedic.com
tech vedic

Make your passwords harder to crack - 0 views

  •  
    There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name. Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them. By-The Xpert Crew @ http://techvedic.com
tech vedic

How to Reinstall or Repair Windows 8 Computer Using "Reset PC" and "Refresh PC" Options? - 0 views

  •  
    As a Windows user, you love to install new software or games? Well, everyone does. But, have you suffered from the problems like PC slow down or random error messages while installing such stuff. These error messages are sometimes due to a missing or corrupt system. Also, incorrect Registry value can be another reason. Here we are to resolve the issue. With the help of this tutorial, you can become aware about the built-in feature of Windows 8 which can help you to reinstall or repair Windows quickly.
Peter Beens

NASA: Your smartphone is as smart as the Curiosity rover | Computer Hardware - InfoWorld - 0 views

  •  
    "While the Mars Curiosity rover is the most complex machine NASA has ever sent to another planet, the computer that runs it is no more powerful than the one in your smartphone."
Doug Peterson

Google Online Security Blog: Protecting data for the long term with forward secrecy - 0 views

  •  
    Last year we introduced HTTPS by default for Gmail and encrypted search. We're pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling forward secrecy by default. Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today's email traffic.
Doug Peterson

Another reason you should learn to code: Python for Excel - Tech News and Analysis - 3 views

  •  
    Anyone who has used Microsoft Excel since 1993 has likely dabbled at least once with VBA, or Visual Basic for Applications, scripting: That's the year Excel 5.0 arrived with VBA support. The feature allows users to create automated tasks and functions in the spreadsheet application, extending the software's potential.
tech vedic

Transfer files to another Mac using Screen Sharing - 0 views

  •  
    You can easily transfer files between Macs through USB drive or a conventional file-sharing services via network connections. Also, these days' synchronization services like BitTorrent Sync, Dropbox, and Google Drive are highly used. Nowadays, you can use Mac Screen Sharing services to transfer files.
Doug Peterson

Facebook awarded over $360 million damages against spammer | Naked Security - 0 views

  •  
    Facebook's security team have reason to celebrate as they have claimed another scalp in the ongoing fight against spammers on the social network.
Peter Beens

7 programming languages on the rise | Developer World - InfoWorld - 0 views

  •  
    In the world of enterprise programming, the mainstream is broad and deep. Code is written predominantly in one of a few major languages. For some shops, this means Java; for others, it's C# or PHP. Sometimes, enterprise coders will dabble in C++ or another common language used for high-performance tasks such as game programming, all of which turn around and speak SQL to the database.
Doug Peterson

600,000+ compromised account logins every day on Facebook, official figures reveal | Na... - 0 views

  •  
    New official statistics revealed by the social networking giant reveal that 0.06% of the more than billion logins that they have each day are compromised. Put another way, that's more than 600,000 per day - or, if you really like to make your mind melt, one every 14 milliseconds.
tech vedic

How to Clone a Hard Drive? - 0 views

  •  
    In case your hard drive is damaged or corrupted then it is better to have functional copy of the drive where you can store your stuff immediately. Cloning a drive is a good option for handling such situations. Have a look on this tutorial.
tech vedic

Use Onefeed to replace your New Tab page in Chrome - 0 views

  •  
    Want to add information on your new Tab page in Chrome? Here is a solution with OneFeed. With OneFeed, you can add custom newsfeed as well as get alerts from your social media accounts.
Peter McAsh

Java Basics: GUI: Lesson 1 - Introduction - 0 views

  • Giving up control - Event-driven programming. The GUI programming style is referred to as event-driven programming. In this style of programming you set up the graphical user interface and initialize things. It appears that the program just stops and sits there doing nothing! There is no input loop; your program isn't trying to read from the user. You, the programmer, have to learn to give up control in two ways. Your program gives control to the GUI system, and you only get control back to when your listeners are called. At an even higher level, your program has given control to the user. It's the user who selects which of your methods to call by their choice of buttons to click on, menu items to select, etc. Listeners. When the user clicks a button (or uses another GUI component), an event is sent to listener method. Your job as a programmer is to write a listener method for each component. It's the user, not the programmer, who has control, indirectly choosing methods in your program to execute by interacting with graphical user interface components.
1 - 16 of 16
Showing 20 items per page