Wednesday, 23 April 2014

How to choose an e-book (reader).

 http://tomcomp.com.ua/uploads/kompjuternoe-oborudovanie/book.jpg
What is happening today in the world of electronics - not even dreamed developers 80s and 90s. It's just boom , jumps , steps by leaps and bounds . Look , if in the nineties were just talking about computers , and many had no idea what it is today - it is the stay and spirit of the times , as a matter of course . Children six to seven years and guided an excellent job in the simplest of computer technology , not to mention the graduates. To list all the " joy" of the use of technology in one article - it's an impossible task , but to talk about how to choose a gadget like the "reader" or an e-book - is quite capable.

How to increase the swap file on your computer.

We begin with the resizing of virtual memory in Windows XP.
1. Open the Windows « Start » .
2 . Right-click on "My Computer" and select "Properties ."
3 . Click the "Advanced" tab .
4 . Under " Performance" click " Settings ."
5 . In the " Performance Options " , select "Advanced" tab .
6. In section " Virtual Memory " click "Change".

Last Known Good Configuration in Windows.

Today I decided to tell you one more good advice in which you learn how to restore the last successful loading of Windows system.

This way belongs to one of ways of system recovery. But the "Last Successful Configuration of System" parameter works not always, about 50\50 and under certain circumstances.

Let's define, in what cases the "Last Successful Configuration of System" parameter can be useful to us.

What processor is better than AMD or intel.

Что лучше amd или intel
Having released in due time 64-digit processors, AMD were won by a huge number of admirers. Thanks to excellent multitasking and good graphic opportunities, AMD processors won glory cheap, but enough productive processors.

The motherboard doesn't work. How to define malfunction of the motherboard.

Материнская плата
Problems with the motherboard can arise because of malfunction in the power unit, the faulty card and other malfunctions in the computer equipment. It isn't surprising, after all the motherboard is the integrating center of any system. In our article you learn how it is possible to check and test the motherboard how to solve the problems connected with malfunctions in operation of the motherboard.

What is BIOS?

BIOS is a special chip which is on the motherboard, it is the program, containing in this chip which provides initial start and check of devices of the computer. However it not all duties of BIOS. This system distributes computer resources, defines an order of loading and carries out a set of other functions about which it will be interesting to any advanced user to learn.

How to dump the BIOS settings.

 http://tomcomp.com.ua/uploads/kompjuter/bios0.jpg

And so in this post we will consider some ways of dumping of the BIOS settings for the factory. If it is interesting to you and you don't know mission Bios, you can read an article that such BIOS.

There are cases, when the wrong BIOS control becomes the direct reason of that the computer simply starts working unstably or when it in general refuses to work. Even more often, people face that they forget the password which they in turn and put directly on an entrance to BIOS or on an entrance to the operating system installed on the computer.

We enter Windows 7 under the Administrator.

Админ
I think there is nobody not a secret that already since Windows Vista, under a name of the Administrator to enter into system slightly more difficult, than in Windows XP and earlier versions of this operating system. All the matter is that by default, this registration Administrator record is blocked. Why it blocked? Simply very often, when users work from the account of the Administrator, they subject all system to risk from what to them, it is natural and will be thin.

What is the driver?

drv.jpg
The driver, in computer concept, call the special device by means of which, programs available on the computer, can get direct access to any device of your computer, to be exact, to its hardware.

The most necessary drivers, go straight with an operating system in a set and when loading an operating system of the computer, the driver without which, your operating system simply couldn't work independently is loaded at once. However it is necessary to pay attention also that usually, for printers, scanners, videocards, webcams, special drivers which the producer of all these devices has to provide are necessary.

What class of a memory card is better.

microsd0.jpg
As you already understood, it will be a question of kinds of classes of memory, to be exact a flash stores. I think that almost at each modern person in phone memory of Micro SD and many is established, even never reflected, what class of your Micro SD. And here when that in case of my companion in the presence of me he bought memory for the Micro SD phone, and it wasn't clear why with an identical memory size the price was different. First of all we decided to take an interest at the seller, why at two cards, with an identical memory size, the price different. And it appeared that the class at a memory card, the more its cost is higher.

That provide us with additional CPU core.


http://tomcomp.com.ua/uploads/novoe-oborudovanie/cpu.jpg 
It's no secret that the performance of the personal computer in the first place depends on the processor installed in it . Not so long ago between computer manufacturers waged an uncompromising battle for the speed of the CPU , ie their clock speed. But it soon became clear that this path is futile and leads to an increase in temperature ( power dissipation ) of the processor because of rising currents consumed . Developers began to seek a way out of this impasse , and came to the idea of ​​multiprocessing . Especially manufacturing technology processor allows an easy transition to the production of two or more cores on a single chip .

Do I need to turn off your computer for a break at work?





http://tomcomp.com.ua/uploads/poleznye-sovety/power.png 
 In order to answer this question first of all try to deal with some of the properties of electrical components of the computer and their causes of premature failure .Some users believe that the frequent turning on the computer harmful primarily due to electrical overloads. However, as practice shows, PC parts fail not because of electrical and heat stroke due . When my computer its electrical components are heated , which causes them to expand , and if you disable cool and shrink . This eventually leads to mechanical damage parts.

In "Chrome" now has a voice search


Good day! Today I decided to share with you a new feature that lets you search the internet voice. Here's what the magazine said PC World.In your web browser "Chrome" from the company "Google", which is designed for laptops and desktop computers , it is possible to search by voice , said "PC World". This feature provides an extension "Google Voice Search Hotword", which can be sent from the online store "Chrome", the report said.

What is the registry Windows?






http://tomcomp.com.ua/uploads/windows/reestr.jpg

Many councils tuning, optimization and solution of various problems with the Windows operating system is often referred to the registry Windows. Many new users do not know what it is and why you need it . Registry Windows - this is some database that stores settings Windows, installed programs , user and more. Windows is constantly working with the registry , reads keys when running applications and the various services. When installing programs , very often they record information about themselves to the registry. Any changes that you make on your computer , shoot somewhere in the settings checkbox , change the theme or desktop image , disable the program from startup - all your actions are recorded in the registry.

What is Clipboard?

We often hear about the clipboard , but few people know that he represents. Clipboard - the area of ​​memory into which the copied information from one application (for example , pressing Ctrl + C, in Word- e) and is designed to transmit it ( inset ) at the same or another application for further work with it. Usually when you copy text or files used RAM memory and hard drive system partition.Please be aware that when copying large files can fill memory and as a result significantly reduce system responsiveness . In this case, you should take care of cleaning the clipboard . Simply copy the text or a small word to clipboard clean and fill a small volume of information.For Windows clipboard responsible small utility - clipbrd.exe in Windows XP and clip.exe in Windows7. Earlier in XP you can open and view clipbrd.exe clipboard , the "seven" users the opportunity banned .To view previously copied files , text fragments , etc. You can use third-party utilities to work with the clipboard, for example , PuntoSwitcher. But there should also not forget about the amount of RAM , there is a large probability of overflow . So clean the unnecessary data from the clipboard.

How to install a hard drive on your computer.


 http://tomcomp.com.ua/uploads/kompjuternoe-oborudovanie/hard.jpg


Today 's hard to find a computer user , who is not on the hard drive stores a collection of media : music, video, etc. Undoubtedly, for storing movies in good quality requires enough memory on the hard disk . With constant hard disk recording new video files, install programs, games , etc. space ends very quickly . One of the simplest solutions to increase disk space is to install a new hard drive .Hard drives are now available in different volumes and mainly connected via connector SATA, rarely - IDE. Also there are two types of hard drives - this SSD and a regular hard drive . Benefits are in the first high-speed read / write files, and the second - in its low cost .So you've bought a new hard disk, start the installation . Turn off the computer and remove the two side covers of the system unit . Before installing the hard disk, it is necessary to prepare . To do this, pay attention to the back side of the disc , close to the SATA connectors and power supply has a jumper .

Optimization of the computer by the method of the Trickster


Year: 2013Country: RussiaGenre: Video TrainingDuration: 2:04:11Translation: Not requiredAuthor: Denis SemenovykhDescription:Most modern computers show a much lower performance than they are capable of it . More than 90 % of the computers that are in your friends, colleagues working in the 2-3 times slower than they could . The course contains over 30 video tutorials that will help you make your computer run as much as possible . You will learn a set of measures that need to be prodelyvat at least once a month. And thanks to these actions your computer will run as fast as possible and maintained in this state permanently.

How to choose a power supply for the computer?

Computer's power supply provides power to all the major computer components - motherboard, processor , video cards , optical drives , card readers , hard drives, cooling system , etc. Therefore, the correct choice of power supply depends on a stable and long-term operation of the computer . Let's learn how to choose the right computer power supply for standard ATX 12V of stationary PC.Power supply on the one hand that comes out of the system unit has a main supply power cable that plugs into a wall outlet and turn on the power toggle switch . On the other facing inward, it leaves a plurality of wires with various connectors for connection to one or other devices.The main characteristic on which to look for when selecting a power supply - its power ( measured in watts - W). Currently there are power supplies with different rates of 300 and 1000 watts. For each computer PSU power is calculated separately , and the sum of the power consumption of each device. Here is a table of the indicative average consumption component of the universal computer.When buying a power supply note the number of slots of different standard for connecting devices , as well as semnost cables ( modular cables ) . On expensive models extra wires can be disconnected , they do not interfere in the case and do not impede air circulation for cooling. Matter and cable lengths - When installing the bottom of the case it may not be enough , so it is best that the cables are 50 cm
Изображение


Tuesday, 22 April 2014

How to speed up booting in Windows 7?

To date, Windows 7 is the most popular after Windows XP. However, unlike the " Piggy " , jokingly called XP, many users do not like it . This happens neskolkoim reasons: the system is still fairly new , brakes on the old equipment , "people are always afraid of the new and unknown ."If the first and last point nothing can be done , in respect of the second can be done very much ! Let's go!Let's start with what happens after the system boots ? Loaded drivers , run the program from startup . It is this list and become a cause long booting the OS ( operating system) , or rather not the list itself , and the number of programs in it.

Monday, 21 April 2014

How to make paint.net drawing with a transparent background? How to replace the white background color to transparent?

If you want to make a picture with a transparent background, such as that would put it on the site, the first thing, we can immediately draw a picture on a transparent layer in Paint.NET. If you already got the picture, for example, with a white background, like a butterfly in the picture, you must first remove the white background will be.
Уроки paint.net для новичков

How to make a clock in MineCraft?

Sometimes , studying bowels mainkraftu world , we all forget about the time. Ask you now - day or night ; and you can not answer . Although , at times - it is very important information. After all, we extricate ourselves from the mine at night - and do nothing. Would have to go down and dig . And in the afternoon - you can continue to build a house or explore the surrounding area . To such neponyatok arose and invented the clock. The clock has a spinning disk. Spinning clockwise it shows us that the street now - the sun is shining , the moon or inflames dawn. For what to do ( crafted ) hours we need to have four gold ingot and one red dust. Put all , as shown in the figure below and get treasured watch.

How to set up internet on Android?


Continue to publish instructions for beginners on our site, and today we will describe how to configure the Internet on Android. Who does not want to sit on the internet or chat on ICQ android?If you have a WiFi access point , you can configure the Internet on Android via WiFi.

What is a Root

android-rootWhat is a Root- right to know many android . But for those who do not know and read this article .Root- term rights - one of the concepts of Linux, which underlies the core Android, and those who worked with this OSes know what it is. Root - is an account of the main administrator or superuser- a. Having access to this profile appears a number of features not available in normal mode .

Correction page numbering in MS Word document

In the process of working with a word processor MS Word farther we delve into the study of its capabilities , the more face different kind of error that , at first glance, did not occur with our (meaning the human factor) fault.Did you have a situation where you want to print one page of the document MS Word, and "smart" program prints a completely different page?

Wooden keyboard, the idea, the two arms

Have in your life,% username%, so when you're a long time like strange? Any why - because everyone has different tastes and preferences. My passion in me sat a long time, but one still broke out. I like to do unusual things, and I've always liked modding as a means of expression. Several years ago I was inspired modders products from different countries and began to think about some of his projects. In particular, I really wanted to make the nineteenth century styled keyboard.





Why Microsoft Internet Explorer 11 - the worst that could happen to us



How many browsers do you support , dear developers ? Not so long ago , five years ago , the list was pretty simple : IE6, IE7, Opera, Firefox, Chrome. Five browsers , plus some minor variations between Firefox 2 and 3 and 9 and Opera 10 .How many browsers do we support now?

ATM. some features


None of us did not surprise ATM ( ATM) . Even older people gradually become accustomed to the device and its pension somehow able to pull off. However, inter alia - ATM - it is extremely amusing piece from a technical and organizational point of view . Even employees of banking institutions (including associated with payment cards ) are not always imagine the subtlety of his work. In a past life I was a lot of years was associated with payment cards and ATM services . I had a chance to warm it and hairdryer and pick out the pieces from there mouse blood cancer, stuck in an embrace with the bills. Even burned one of the controlled ATM . Twice. So share some , in my opinion , interesting technical nuances in the ATM .

Making private monitor from an old LCD Monitor


You can finally do something with my old LCD monitor that you have lying around in the garage. Turn it into a spy monitor! For all around it will look like just a white screen , but not for you because you will have special "magic" glasses.All you need - a pair of old glasses , paper knife and paint thinner.


That's what I used:

    
Of course this LCD monitor
    
disposable 3d glasses from the movie theater ( old sunglasses are fine )
    
solvent ( or equivalents)
    
paper knife
    
screwdriver
    
paper towels
    
superglueStep 1 . Take monitor.Find old monitor that you are willing to sacrifice .


Nowadays, the choice of content management systems (CMS) is so great that involuntarily lost. Moreover, the quality of the system does not depend on whether it is paid or not, and the decision for a long time then you bind the selected CMS.
Bring to your attention the English translation of the paper web developer Mark Jenkins, discover MODX after many years of development in different systems.
Goes first translation of the article, and then - some comments on the text.




Capture video in Unity3d using Intel INDE Media Pack for Android




In one of the comments on the article about capturing video in OpenGL applications was mentioned the ability to capture video in applications created with Unity3d. We are interested in this topic , in fact - why only "clean » OpenGL application if many developers to create games using various frameworks and libraries ? Today we are pleased to present a turnkey solution - capture video in applications written using Unity3d under Android.On the grounds of this article you will not only learn how to embed video capture in Unity3d, but also to create plugins for Unity Android.Next, we consider two options to implement video capture Unity3d:1. Fullscreen post effect . The method will work only in the Pro version , and the video will not be captured by Unity GUI2 . With framebuffer (FrameBuffer). Will work for all versions Unity3d, including free and paid , Unity GUI objects will also be recorded in the video.What we need

    
Unity3d version 4.3 Pro version for the first and second methods, or free version, for which the only available method of frame buffer
    
Installed Android SDK
    
Fixed Intel INDE Media Pack
    
Apache Ant ( for assembly under the Unity plugin Android)
Create a ProjectOpen the Unity editor and create a new project . In the folder , create a folder assets list Plugins, and in it the folder Android.In the folder where you installed Intel INDE Media Pack for Android, from the libs directory , copy the two jar- file (android-< version >. Jar and domain-< version >. Jar) to a folder of your Android project.



From IT-preacher to designer medical robots: future profession in IT and robotics

"Atlas of new professions," published by the Agency for Strategic Initiatives and Skolkovo, talks about what the profession will be required in the future in the field of information technology and robotics and engineering.





IT- sectorWriting about IT is difficult - because today almost all areas of information technology permeated from a large number of professionals in medicine, and in transport and other sectors , which I wrote earlier , will require deep knowledge of IT- technologies. Changes in the information technology sector set new technologies and practices to virtually all sectors of the economy .In the field of IT is more important processes. First, the world becomes more connected through telecommunication solutions, increases the amount of data , develop solutions for managing them . Secondly, the trend develops for increasing mobility and more "friendly " to the user . Third, developing new environments such as virtual worlds for a variety of purposes , including those created based on augmented reality technology . Nevertheless, the development and production of "iron" , software and security systems remain a high priority within the IT- sector.Professions that will appear until 2020Designer interfaces. Engaged in the development and creation of user-friendly , adaptable and safe for human interfaces for him equipment and software at various levels. Has good expertise in usability.In general - is not news at all, today on Headhunter for this request offer for more than 50 vacancies. Obviously, more will only get bigger.Network lawyer. Specialists involved in the formation of regulatory interactions in the network ( including virtual worlds ) , is developing the system of legal protection of person and property on the Internet (including virtual property ) .Given the fact that an increasing amount of various operations transferred to the network will greatly develop legislation that will require considerable development and services in this area, and hence specialists " network rules ", as today there are lawyers on housing legislation , for example.Organizer of online communities . Specialist in organizing and moderating electronic forums , gaming and educational sites on the web.An important element of the future will be numerous electronic medium for education, entertainment and other communications. Of course, similar sites, to communicate to them was productive staff need serious moderators - not those with plyusometom , but holders of meaning dialogues and able to manage and direct the course of the discussions , as now do the moderators of "live" events.IT preacher . Specialist in communication with the end users of IT products , promote new solutions group , conservative with respect to advanced technologies , carrying out training people for new programs and services to reduce the digital divide among the population.Profession that Like most , I'm sure . However, if you leave the jokes - such expert solves a very important task. Technology changes at a high speed and the "digital divide" between generations and different groups of people increases. Schoolchildren today is often not much better known computer technology than their teachers . This undermines the credibility of the teacher that affects the perception of education. Similarly, on almost any job - probably need people who can help in the development of conservative employees changing products.Digital linguist . Professional styling linguistic system of semantic translation ( translation to the context and meaning) , text processing (including semantic search on the Internet) and new communication interfaces between humans and computers in natural languages ​​.In early April, ABBYY has announced the appearance of the first decisions on the basis of Compreno - in fact, the semantic interpretation system . More about this can be found in a decent article. In any case, it is clear that this trend will develop further, and linguists will be needed . In addition, there is a serious request for simplification and oestestvlenie communication between humans and computers - it is also means the demand for such competence.Modeler big data. Specialist who designs the system for collecting and processing large amounts of data obtained through the Internet, developing interfaces and build analytical models themselvesAbout big data today also it is clear - one of the main trends of recent times. And gradually, big data becomes extremely big data. This means that architects and developers need such complex systems as well as specialists in creating analysts based on them .Professions that appeared after 2020Information architect . Qualified works with a wide range of data processing systems . In particular, database designs , develops algorithms action ensures efficient handling user data stores , monitors the quality of data storage , logic, storage and retrieval of information , etc.Of course, these experts have today. Nevertheless , due to the already mentioned the rapid growth of penetration of information technology in all areas of life , it becomes clear that, firstly, these experts will become more and more popular , and secondly , to become more sharpened under the decision of this particular problem.Architect virtuality. Expert in designing solutions that work, study and relax in virtual reality. Develops software and hardware based on bio-and psihoparametrov member (including individual order ) .Designer of virtual worlds . Creates a conceptual solution for the virtual world : philosophy, laws of nature and society , the rules of social interaction and the economy, landscape , architecture, sensations (including smells and sounds ) , the living world and the social world .A striking example here seems to Second Life, a virtual world , which is actively used at Harvard and Oxford, where thousands of shops and there are representative offices of large companies (eg , IBM). In the future, these worlds will multiply and grow , and therefore need as architects such worlds , and their designers .Designer neurointerfaces . Specialists developing compatible with the human nervous system interfaces to manage computers , household and industrial robots , taking into account the psychology and physiology of users.Today neurointerfaces are in the entertainment district - one of the most famous examples - neyroushki Nekomimi, who are moving on in the mind of a person , depending on the condition of the people - relaxed, agitated , etc. Or game Mindflex, where players must either hold the "power of thought" ball through the maze , or defeat an opponent .However, in the future through neurointerfaces can be controlled by various sophisticated device, so that the need and the designers and developers of such interfaces .Robotics and EngineeringAlready seen a growing interest in robotics research Cisco, the number of domestic robots in cities doubles every nine months, and in the future robots will be absolutely familiar part of the interior . In addition to domestic use , robots will be used extensively in the industry - in 2012 , Philips launched in the Netherlands is almost completely automated plant for the production of razor blades , with barely a dozen people ( at a similar plant in China at Philips employs several hundred employees).One should not forget such incidents as RoboCop , managing traffic in the Congo. It seems to be funny, but clearly reflects trends.

Encrypting data in the public cloud - control and restful sleep customer

In today's world more and more companies are considering the transition to the cloud , and many stops on the choice of such a path is the only issue - the issue of data protection . And the source of this kind of concern are the representatives of business and security departments , traditionally suspicious of anything new , especially if it is associated with a decrease or increase in the control list of persons admitted to the data .In this case the specific tasks that are put before the service provider - is to ensure protection of data from access by any customer is not authorized persons , whether employees of the service provider or by any third parties whose access to the data of the customer considers undesirable .As a solution to this problem seems obvious way encryption of all data residing in the cloud, however, is how to implement encryption, where traditional solutions are or are not supported in a virtual environment ( such as bitlocker for boot disks ) or not supported ( such as free truecrypt ) , and most importantly - create a huge management overhead to ensure their efficiency.However , few people know that there are corporate solve this problem , which combines high security with ease of operation and use.As a solution for encrypting data in the cloud , we offer the use of the product SecureCloud company Trend Micro, a company with a worldwide reputation, the main profile of activity is corporate security .This solution provides controlled data encryption customers located in public clouds , and is compatible with most available types of public clouds , including clouds VMware vCloud, that we use. Also , this solution is compatible with most operating systems which may be used in the virtual machines.Solution is provided directly by TrendMicro model SaaS, which allows on the one hand , to keep the customer's convenience for the cloud approach to IT- services , billing model with " subscription " , no need to create and support their own servers , and for such a business - critical solutions and ensure their high availability , and on the other hand , leaves the encryption key management and access to data outside the control of the service provider .The model assumes the use of solutions that drives the virtual machines are encrypted using encryption keys that are stored in the system SecureCloud. Through a system of processes initiated SecureCloud encryption or decryption of the initial protected discs. When you try to access the data by querying the system SecureCloud, in which , depending on the policies defined by the system , is either an automatic one-time issuance of the encryption key to decrypt the data (for example, for booting OS ) or issuance of a key only after administrator approval .For use in the cloud , it is important that the possibility of using automatic key policies allow , on the one hand, to increase the availability of services excluding reaction time administrator of the client processes the machine is rebooted , for example, in the case of hardware failures and triggering automatic reboot machines to other servers in the cases concerted plan of works related to reboot the machine in the maintenance window , while maintaining the inability to obtain any software key , except the protected operating system or outside the specified operating conditions , inability to access the offline copies of data and the ability to discontinue automatic key .In this article we will not delve into the study of encryption mechanisms used , their reliability and etc. and raise hollywar- s such subjects. Virtually all modern solutions to meet the needs of data encryption typical customer cloud providers , and the primary goal of the system of protection is not the target of limiting the use of the data, not the opposition attempts to decrypt the state secrets to foreign intelligence agencies. More information on the details of the technology used can be explored on the Internet. Highlights that we pay attention - this control mechanisms and integration with existing systems and processes.Architectural solution consists of a control system , provided as a service to access the management console and agents installed on the protected virtual machines. Management Console SecureCloud available on web at console.securecloud.com / and looks typical of most web console and the agent is available for download from the company website trendmicro.Primarily for use by the service user accounts are created , who will manage the encryption and tolerance to encrypted data (including access policies and requests for access).

EditorConfig - Some settings for all editors / IDE

EditorConfig this configuration file and a set of extensions to a lot of code editors and IDE (Then just IDE).
[Editor Config]
Its mission - to create a single format settings, and once and for all, solve questions like "tabs or spaces" for all IDE and programming languages​​.

Files. Editorconfig can be found in projects such as jQuery, Ruby, WordPress, and many others.

Plugins are available for a large number of IDE


Zabbix and Iostat: monitoring disk subsystem

The disk subsystem is one of the most important subsystems of the server and on the load on the disk subsystem often depends very much, such as the recoil velocity of the content or how fast will respond to the database . This mainly relates to mail or file servers , database servers . In general , the indicators need to monitor disk performance . On the basis of the disk subsystem performance graphs we can decide on the need to build capacity long before the cock bite .  

Why Windows Azure became simply Azure? Introduction to the platform for users to Linux, Open Source, Oracle DB, Android, iOS and other tools

Not long ago, a cloud platform Microsoft Windows Azure was renamed to Microsoft Azure. This is essentially a small, but very important in fact an event that reflects Microsoft's commitment to offer Azure as an open public cloud platform for all users.







Developers Popcorn Time disappear one after the other

image

Popcorn Time was one of the most discussed topics in the past month , the authors were glad to communicate with users and openly expressed its position. However, something has changed dramatically recently. Earlier sociable developers involved in this project , wiped his job, silenced , or all at once disappeared . Difficult to pretend that nothing is happening.Popcorn Time phenomenon in explaining not need (see Habré ) , I note only that this app is great to rock the boat immediately after its launch in March .

Printing and reproduction of sound on paper

Is it possible to encode audio in the form of images , which is read by the camera and is played in real time?Comes to mind QR- code or some of its counterparts. In such a code can be written reference to mp3, or even a very small audio file. But in the first case requires access to the network , while the second - a high density of code, and increased demands on the quality of the image . Furthermore, neither the one nor the other way will not provide instant replay .If no sound is encoded in a digital and analog format ? That is, to prevent the possibility of large loss of information while preserving the basic " shape " of the sound message. For example, such losses occur in poor lighting , poor camera , a small picture , wrinkled, or torn paper with the code. Let with terrible artifacts , but the picture is supposed to sound .

After fasting for the restoration of flash drives , it appears that there are now many workers abandoned the stick , which is required use . Why not make them bootable flash drive with the OS required distributions ? This can be great useful during installation / reinstallation of operating systems for netbooks , where there are no optical media drives . And sometimes it may even speed up the installation process and make it much quieter on the computer where the drive is.Although Habré already described options for creating bootable flash drives , but an option that I suggest - too simple and its versatile to ignore it .
image


Take a screenshot in Bada

To take a screen shot, press and hold the Menu button a couple of seconds and lock. It will be saved in the internal memory in the folder My files → Images.

Take a screenshot on Android 4.x

Take a screenshot on your mobile device running Android are different ways - depending on the manufacturer and the version of the platform. The resulting images will be stored in a standard Gallery.

Press and hold the button a couple of seconds to decrease the volume and Food.

How to make a screenshot

Click button on the keyboard Print Screen ( sometimes it is called PrtScn, PrtScr or PrtSc) - the clipboard is copied snapshot of the entire screen.