Skip to main content

Home/ ACSE Discussion/ Group items tagged from

Rss Feed Group items tagged

tech vedic

Most important smartphones of 2012-13 - 0 views

  •  
    "iPhone 5 Called ""Gadget off the Year"" by Time Magazine, Apple's iPhone 5 (from $199 on 2-year AT&T, Sprint or Verizon plan) is a serious piece of hardware. Along with its powerful new A6 chip, iPhone 5 works on 4G/Long Term Evolution (LTE) networks for wireless speeds that rivals your home's broadband connection. iPhone 5 also has improved cameras: an eight-megapixel iSight rear-facing camera (3264 x 2448 pixels) and front-facing FaceTime camera with 720p HD quality for video calling. Samsung Galaxy S III The Samsung Galaxy S III (from $149 on 2-year plan with AT&T, Sprint, T-Mobile, U.S. Cellular, Verizon) is a true smartphone in every sense of the word -- and we're not even referring to its stunning 4.8-inch display, fast LTE speeds or versatile Android operating system. the Galaxy S III's front-facing camera knows when you're looking at the screen, so it'll give you the bright display you seek, but if your eyes look away it'll dim itself to preserve its battery. It also knows when you want to talk: if you're messaging with someone and want to call them, simply lift the smartphone to your ear and it'll dial for you. Nokia Lumia 920 As the flagship Windows Phone 8 device, Nokia's Lumia 920 (from $99.99 on 2-year AT&T plan), has a lot to offer, including a colorful Start screen with ""live tiles""; familiar Microsoft apps like Outlook, Word, Excel, PowerPoint and OneNote; and a People hub that aggregates all your contacts into one page per person (so you don't need to close, say Outlook, to see what that friend is up to on Facebook or Twitter). HTC Droid DNA and HTC One X+ A pair of Android-powered HTC devices are also worthy of ""best of 2012"" nods: the HTC Droid DNA ($149.99 on 2-year Verizon Wireless plan) and HTC One X+ ($199.99 on 2-year AT&T plan). Protected by Corning's uber-durable Gorilla Glass 2 technology, the Droid DNA's 5-inch 1080p HD screen was built for video, games, ebooks and web browsing. Integrated Beats Audio - an
Peter Beens

Use command line parameters with Remote Desktop Connection - 1 views

  •  
    Instead of starting Remote Desktop Connection from the Start menu, you can start it from the search box in this version of Windows, from the Run dialog box, or from a command line. With these methods, you can use additional command line parameters to control how Remote Desktop Connection looks or behaves.
Peter Beens

A Portable Antivirus Software for your USB Drive - 0 views

  •  
    Is your computer infected with a virus that is preventing you from downloading security updates from the Internet or from running any antivirus program on that machine? Or are your looking for an antivirus software that can be carried on a USB drive to quickly scan any disconnected computer(s) for viruses or malware?
tech vedic

Wear a wristband that glows when you get texts, notifications on your smartphone - 0 views

  •  
    How about a wristband that glows when you get a text message or a phone call on your smartphone? EMBRACE+ is the new gadget in the market that will glow in various colors on your wrist. The wristband will be a wearable gadget made for your smart phone and will display specific colors to indicate depending on what kind of notification you have received on your phone. You do not have to even take the phone out of the pocket. As soon as you get the notification, the wristband will give a visual notification in a specific color and will let you differentiate between a tweet and text message. The wristband connects to your smartphone using Wi-Fi connection.The EMBRACE+ wristband features will includes indications for incoming calls, text messages, new emails, notifications from social networks like Facebook, Twitter, LinkedIn and will even give you low battery levels indications. It will have a special feature that will help secure your phone. It will give notification if the smartphone goes far away from the wristband. The release date of the EMBASE+ wristband is July 2013. By-The Xpert Crew @ http://techvedic.com https://www.facebook.com/techvedicinc https://twitter.com/techvedicinc http://pinterest.com/techvedic1 http://techvedicinc.tumblr.com/
tech vedic

Tips & Tricks to Improve iPhone 4S Battery life - 0 views

  •  
    While it becomes impossible to live without your iPhone 4S, you must be a bit worried about the habit of the gadget eating up all the battery at inopportune times.there are still some vital tips and tricks you can follow to improve your Smartphones battery life. Low Down The Screen Brightness Just as it goes for your laptop devices, you need to lower down the brightness of your iPhone screen, which will enhance the battery life. Adjust the screen brightness under the Settings tab. Make Use of Wi-Fi When You Can Instead of making Voice calls, downloading apps or browsing the Web over your iPhone 3G or cellular connection, it is recommended to always find a Wifi hotspot or make use of your home network. This will help you keep away not only from data charges but also will aid you have a better battery life as your device will not be searching for the data signals. Remember, if you are in an area where there is no Wi-Fi hotspot, it is better to turn off the search and it will help save the battery life of your iPhone 4S. Do Not Use The GPS Tracking Feature If you are using apps that support the feature of Automatic GPS tagging and location such as Twitter, Instagram and Facebook, your iPhone is working overtime to determine your location. If you do not want to be Geo-tag your updates and posts, must keep the GPS function off. Do Not Use The 'Fetch' & 'Push' feature If you have your iPhone 4S set to 'fetch' the data after every 30 minutes time along with numerous apps to push new alerts and messages as they happen, then you need to turn off this feature on your device. This feature is going to drain your battery. Only use the facility when you really need it otherwise keep it off. Keep Your Notifications In Check To enhance your iPhone 4S battery time, you need to limit your app notifications to just the apps you make use of more often. This actually means that you have to say 'no' to the requests for all kinds of notifications you ge
Doug Peterson

Student's Facebook Photos Stolen and Posted to Pornographic Site | facecrooks.com - 0 views

  •  
    The FBI is investigating an incident where pictures of teen girls were taken from Facebook and placed on a pornographic website. The victim's ages range from 14-17 years old.
Doug Peterson

How to Get Free (or Nearly Free) Development Software from Microsoft | the pluralsight ... - 0 views

  •  
    So you've got a great idea for a fantastic new application or product but you don't have a budget for software. Sure, you can go the open source route and there are many fine tools available for developers without license fees. But if you happen to be targeting Windows or you are new to development and need that entry bar lowered right to the floor, then here's how to get free or nearly free developer software directly from Microsoft.
Doug Peterson

Turn Your Windows PC Into An AirPlay Receiver To Stream Songs From iPhone, iPad And iPo... - 2 views

  •  
    Turn Your Windows PC Into An AirPlay Receiver To Stream Songs From iPhone, iPad And iPod touch
Peter Beens

Build Your Own Blocks (BYOB) - 0 views

  •  
    Welcome to the distribution center for BYOB (Build Your Own Blocks), an advanced offshoot of Scratch, a visual programming language primarily for kids from the Lifelong Kindergarten Group at the MIT Media Lab. This version, developed by Jens Mönig with design input and documentation from Brian Harvey, is an attempt to extend the brilliant accessibility of Scratch to somewhat older users-in particular, non-CS-major computer science students-without becoming inaccessible to its original audience. BYOB 3 adds first class lists, sprites, and procedures to BYOB's original contribution of custom blocks and recursion.
tech vedic

Repair disk permissions to speed up your Mac - 0 views

  •  
    Whenever you install something in Mac OS X then it gets installed from package files. Along with installing something from package files, a "Bill of Materials" file is stored in the package receipt file. These ".bom" files contain a list of the files installed by that package as well as the proper permissions for each file. But, in future, these permissions can get changed resulting in freezing or crashing of your Mac.
tech vedic

How to create audiobooks in iTunes? - 0 views

  •  
    Digital audiobooks can be purchased online including Audible, eMusic, and iTunes. iTunes keeps audiobooks separate from your music library so as to make them easier to find. Also, it allows you to adjust the playback speed of the file as well as resume from the previously played chapter where it left. Just by tuning few settings, you can ready your iTunes and iPod to recognize any audio file or group of audio files as an audiobook.
BluEnt Global

5 Strategic Lessons from Football to Run Successful Social Media Campaign - 0 views

  •  
    Learn 5 strategic lessons from 2014 World Cup Football to run successful social media marketing campaigns. Consider these lessons for your next million dollar social media marketing campaign.
Doug Peterson

» Why Is My IP Address From Another State? - IT Professionals - Lockergnome - 0 views

  •  
    Recently I had someone ask me a question I wanted to share with you. They asked me why in the heck their IP address appeared to be coming from the other side of the country? Honestly, I can understand why this would freak someone out! Imagine not understanding what is going on as you do an IPChicken.com check only to see the IP looking odd. Then you run a speed test and learn you're suddenly based in another region of the country. I mean come on, that is just going to feel weird to the uninformed.
Doug Peterson

How to Stay Safe on Public Wi-Fi Networks - 0 views

  •  
    Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network.
Doug Peterson

Dangers of IE 'Cookiejacking': What You Need to Know | PCWorld - 0 views

  •  
    A security researcher has discovered a means of hijacking sensitive information from cookies in Internet Explorer. The 'cookiejacking' technique could expose credentials from Facebook, Twitter, Gmaiil, or other online services, but Microsoft doesn't consider it a serious threat. So, is the sky falling, is the security researcher crying wolf, or is the real risk somewhere in between.
Doug Peterson

How to build an iPhone app | News | TechRadar UK - 2 views

  •  
    In this article I want to help kick start your own development on the App Store, and I hope it's encouraging for you that I myself went from having zero apps to having 20 approved and on sale in the space of just over a year and a half. I haven't made enough money from them to retire, but they do provide a regular income - and it's an income that's only going to grow as Apple sells more hardware.
Doug Peterson

London Olympic Games to simulate cyber-attacks | Naked Security - 0 views

  •  
    The London 2012 Olympic Games will open in nine months time, and - away from the glories anticipated on the track and field - consideration is being made about how to defend the world's leading sporting event from cyber-attack.
tech vedic

How to print from your mobile phone or tablet? - 0 views

  •  
    Just clicked a picture and want to take its print-out? Well, for this you must need a PC attached with the printer or you need to mail that photograph to yourself. Don't you think there should be an easy solution for this? No need to worry anymore as Techvedic is here with the solution. Now, printing directly from your mobiles and tablets is possible.
tech vedic

How to secure files from other users on external disks? - 0 views

  •  
    External hard-disk or USB drive attached to a system running on OSX is vulnerable, as it could be accessed through other user-profiles easily. Apart from that, if the network file sharing feature is enabled, the external storage device could be accessed by anyone having the authority to get logged into the network. Thus, no matter you encrypted the drive or particular files or not, any unauthorized user can access your data, steal records and make changes into that. What to do? Techvedic, being a leader in tech support, offers you practical and effective solution.
Doug Peterson

From Sand to Processor or How a CPU is made - Intel - 4 views

  •  
    From Sand to Processor or How a CPU is made It is hard to believe, but a modern processor is the most complex finished product in the world. Here comes a question: What is so complex in this piece of metal?
1 - 20 of 165 Next › Last »
Showing 20 items per page