Skip to main content

Home/ ACSE Discussion/ Group items tagged practices

Rss Feed Group items tagged

tech vedic

Keep your laptop battery healthy - 0 views

  •  
    Here's one of those sad facts of life that you just can't avoid: Like cars, clothing, and people, batteries wear out. You can't stop this process, but with proper care you can slow it down. What wears down a battery? Charging and discharging. Obviously, you can't avoid either of those acts entirely (although if you could, you wouldn't have to worry about wearing out your battery). The trick, of course, is to do as little charging and discharging as possible. And one way to avoid charging and discharging is to remove the battery when you don't need it. Ideally, you would remove the battery (with the laptop shut down, of course) before plugging in the AC adapter and working at your desk. Then, before you take your PC on the road, you would shut it down, insert the battery, and let it charge for a few hours. In reality, that's not always practical. Shutting down and rebooting your PC every time you go from portable to deskbound quickly becomes a nuisance. Worse, you have to remember to recharge before leaving home. A more practical solution would be to shut down the laptop and remove the battery when you expect it will stay plugged in for a week or more. And don't intentionally discharge the battery before removing it. After all, the whole point is to charge and recharge as little as possible. Some of the charge will be lost while the battery sits unused, so it's still a good idea to recharge it before taking it on the road--even though that requires some planning ahead of time. By-The Xpert Crew @ http://techvedic.com https://www.facebook.com/photo.php?fbid=140300136155835&set=o.172245722918618&type=1&theater
Peter Beens

10 practices of highly ineffective software developers | Application Development - Info... - 1 views

  •  
    "Writing great software is not that hard. But software developers can be their own worst enemy in trying to code the good stuff because they lapse into sloppy or wrongheaded practices."
Mike McIlveen

Online code practice - 0 views

  •  
    Java and Python introductory level coding practice. Strings, Arrays, and Logic
tech vedic

How to secure files from other users on external disks? - 0 views

  •  
    External hard-disk or USB drive attached to a system running on OSX is vulnerable, as it could be accessed through other user-profiles easily. Apart from that, if the network file sharing feature is enabled, the external storage device could be accessed by anyone having the authority to get logged into the network. Thus, no matter you encrypted the drive or particular files or not, any unauthorized user can access your data, steal records and make changes into that. What to do? Techvedic, being a leader in tech support, offers you practical and effective solution.
tech vedic

How to sync files and folders across two PCs? - 0 views

  •  
    File & folder synchronization is a common practice, often required to cascade data to individual or team over a local area network (LAN), and work collectively to enhance productivity. It may be implemented through a variety of ways, but it should serve the purpose well surpassing all hardware or software barriers, that's too without compromising data safety norms.
Doug Peterson

40 People Who Changed the Internet - 0 views

  •  
    The world has become tightly connected since the internet. The web itself has replaced the practice of reading newspaper. Most of us now communicate through e-mails instead of paper and pen. We now watch networks or movies online, it has even become a wide business venture, so much so we can now make purchase and pay our bills through the internet. The web has also transformed friendships through various social media.
Peter Beens

apache friends - xampp for macos x - 0 views

  •  
    XAMPP for Mac OS X is the simplest, most practical and most complete webserver solution for Mac OS X. The distribution includes an Apache 2 web server, integrated with the latest builds of MySQL, PHP and Perl. It comes as a Mac OS X Installer package which contains all the necessary files and requires no dependencies.
Doug Peterson

Supercookies: What You Need to Know About the Web's Latest Tracking Device - 0 views

  •  
    Recently, online properties like Hulu, MSN and Flixster have been caught using a tougher version of the common cookie. These "supercookies" (aka "Flash cookies" and "zombie cookies") serve the same purpose as regular cookies by tracking user preferences and browsing histories. Unlike their popular cousins, however, this breed is difficult to detect and subsequently remove. These cookies secretly collect user data beyond the limitations of common industry practice, and thus raise serious privacy concerns.
grant hutchison

Coding Guidelines - 1 views

  •  
    There was some discussion at the CEMC conference about coding guidelines. I found this excellent article about the topic of Reading Code and best practices. I plan to use this in my senior (ICS4U) course early to set the standards and probably a simplified version after a few months in ICS3U.
tech vedic

Top 5 enterprise security threats - 0 views

  •  
    Nowadays, the list of security concerns is getting bigger and bigger. All enterprises have five types of security threats. Here in this tutorial, let's uncover these top five security threats of enterprises.
1 - 13 of 13
Showing 20 items per page