We are not only talking about what we have done but also who we are...
Thursday, 26 April 2012
Wednesday, 25 April 2012
Monday, 23 April 2012
Android Player remembers last postition
Try these audio book players:
- Smart AudioBook
- AudioBook Player (won't able to quit)
Wednesday, 18 April 2012
Adding a table in GMail
Create the table in Word, apply all the styles, copy and paste into the GMail message.
Even though you can do it in Excel, the borders, the alignment and font styles, etc are gone when paste into the message.
Even though you can do it in Excel, the borders, the alignment and font styles, etc are gone when paste into the message.
Tuesday, 17 April 2012
Color Meanings by Culture
Color Symbolism
cultural, age, class, gender...
By culture
Red
- China: Good luck, celebration, summoning
- Cherokees: Success, triumph
- India: Purity
- South Africa: Color of mourning
- Russia: Bolsheviks and Communism
- Eastern: Worn by brides
- Western: Excitement, danger, love, passion, stop, Christmas (with green)
Orange
- Ireland: Religious (Protestants)
- Western: Halloween (with black), creativity, autumn
Yellow
- China: Nourishing
- Egypt: Color of mourning
- Japan: Courage
- India: Merchants
- Western: Hope, hazards, coward
Green
- China: Green hats indicate a man's wife is cheating on him, exorcism
- India: Islam
- Ireland: Symbol of the entire country
- Western: Spring, new birth, go, Saint Patrick's Day, Christmas (with red)
Blue
- Cherokees: Defeat, trouble
- Iran: Color of heaven and spirituality
- Western: Depression, sadness, conservative, corporate, "something blue" bridal tradition
Purple
- Thailand: Color of mourning (widows)
- Western: Royalty
White
- Japan: White carnation symbolizes death
- Eastern: Funerals
- Western: Brides, angels, good guys, hospitals, doctors, peace (white dove)
Black
- China: Color for young boys
- Western: Funerals, death, Halloween (with orange), bad guys, rebellion
Sharing iPhone / iPad Apps
Manually:
- Drap and Drop the App from iTune on to the Desktop (an *.ipa file will be created)
- Send / Copy this file to the other computer
- Drap and drop this file into iTune (or just double click it)
- Go the the toolbar, Store, Authorize Computer and type in your Apple ID and password
Use Home Sharing:
About authorization and deauthorizationMonday, 16 April 2012
Rooting - Android phones
Rooting means giving yourself root permissions on your android phone (jailbreaking on Apple devices).
The Always Up-To-Date Guide to Rooting the Most Popular Android Phones
The 10 Best Android Apps that Make Rooting Your Phone Worth the Hassle
The Always Up-To-Date Guide to Rooting the Most Popular Android Phones
The 10 Best Android Apps that Make Rooting Your Phone Worth the Hassle
Sunday, 15 April 2012
Unhide Apps in iPad
- Launch the App Store
- Tap either the Featured or Top Charts button
- Scroll down to the bottom of the screen and tap the Apple ID button
- In the window that appears tap View Apple ID
- Enter your password and tap OK button
- tap Hidden Purchases (under "iTunes in the Cloud")
- Tap the Unhide button next to those apps you want to unhide
Friday, 13 April 2012
Intel Motherboard Audio
Determine your board's audio solution
more info...
SPDIF (S/PDIF) Song/Phillips digital Interface
- Realtek
- IDT (formerly Sigmatel)
- ADI (SoundMAX)
- AC'97
- HD Audio
more info...
SPDIF (S/PDIF) Song/Phillips digital Interface
An interface to transmit digital audio - the audio signal is transmitted encoded in a series of 0s and 1s instead
of being transmitted in analog format. This makes audio have higher
fidelity, because no noise will be added to the audio signal
Thursday, 12 April 2012
ASIO vs WDM/KS drivers
ASIO (Audio Stream Input/Output) is a computer sound card driver protocol for digital audio specified by Steinberg, providing a low-latency and high fidelity interface between a software application and a computer's sound card. Whereas Microsoft’s DirectSound is commonly used as an intermediary signal path for non-professional users, ASIO allows musicians and sound engineers to access external hardware directly.
WDM/KS (Windows Driver Model/Kernel Streaming) drivers bypass Microsoft's kernel mixer (which is normally used to mix the outputs from multiple audio applications into one stereo stream), this option can provide very low latency. WDM is Windows native and even an on-board soundchip should support KS well enough.
In principle, WDM/KS is just as good as ASIO, but it has to be a WDM driver to work properly. Many interfaces have WDM drivers with ASIO, the WDM driver spec allows other program interface standards to be added on without limitations. "ASIO4ALL", a free program that adds ASIO to a WDM only driver, uses KS to get in. Using ASIO4ALL is therefore just the same as using WDM/KS.
Here's some Pros for WDM/KS...
And the Cons...
WDM/KS (Windows Driver Model/Kernel Streaming) drivers bypass Microsoft's kernel mixer (which is normally used to mix the outputs from multiple audio applications into one stereo stream), this option can provide very low latency. WDM is Windows native and even an on-board soundchip should support KS well enough.
In principle, WDM/KS is just as good as ASIO, but it has to be a WDM driver to work properly. Many interfaces have WDM drivers with ASIO, the WDM driver spec allows other program interface standards to be added on without limitations. "ASIO4ALL", a free program that adds ASIO to a WDM only driver, uses KS to get in. Using ASIO4ALL is therefore just the same as using WDM/KS.
Here's some Pros for WDM/KS...
- The host can adjust the latency - you don't have to go into the driver control panel.
- Different WDM drivers from different makes of interfaces can be used to get more channels. With ASIO, only one driver can be used at a time.
- Low latency is available even with cheap sound hardware that has no ASIO driver.
And the Cons...
- WDM/KS cannot work if something else is already using the WDM driver - Some Mediaplayers and Codecs keep the driver in use even when they are not open!
- Once Kernal Streaming is in use, nothing else can use the WDM driver. Sonar has an option to release the driver when it's not running so you can temporarily use some other audio program that needs the audio hardware without first closing Sonar.
Sample Poses
21 Sample Poses to Get You Started with Photographing Men
21 Sample Poses to Get You Started with Photographing Female Subjects
Posing Guide: 21 Sample Poses to get you Started with Photographing Children
Posing Guide: 21 Sample Poses to Get You Started with Photographing Couples
21 Sample Poses to Get You Started with Photographing Groups of People
21 Sample Poses to Get You Started with Photographing Female Subjects
Posing Guide: 21 Sample Poses to get you Started with Photographing Children
Posing Guide: 21 Sample Poses to Get You Started with Photographing Couples
21 Sample Poses to Get You Started with Photographing Groups of People
Light Seeker
constantly aware of the types of light around...
aware of the quality and behavior of light
- a room lit by a single lamp, a plaza in full sun or a candle in a restaurant window
aware of the quality and behavior of light
- its color or temperature
- how it reflects off different surfaces
- the shadows it creates
- the way it shines through glass
- the ways light affects the mood of a scene
Thursday, 5 April 2012
Sidejacking
Sidejacking (session hijacking) is a technique that lets one
user literally steal the current Web session of another.
Your password has not been stolen but another user, by "borrowing" your identity, can "be you" for that session (before you logout).
That means, for example, that you could be surfing your Facebook page when, suddenly, someone else is changing your status, posting messages on your friends' pages, and simply impersonating you right under your nose! The same goes for Twitter, other social media sites, and even web-based email.
Your password has not been stolen but another user, by "borrowing" your identity, can "be you" for that session (before you logout).
That means, for example, that you could be surfing your Facebook page when, suddenly, someone else is changing your status, posting messages on your friends' pages, and simply impersonating you right under your nose! The same goes for Twitter, other social media sites, and even web-based email.
With SSL (Secure Sockets Layer), all info will be encrypted and you are safe from sidejacking. GMail was the first major email provider to enable SSL on all users' sessions.
Advanced Dust Correction in Lightroom 4
This process is for an image that you will want to
be absolutely perfect for enlargement or just that image you want to
look flawless. After the image is color corrected and has been edited
with your basic adjustments, we will open up our Tone Curves Panel in
the Develop Module...
Advanced Dust Correction in Lightroom
Advanced Dust Correction in Lightroom
Wednesday, 4 April 2012
Hotmail Arrangment
You can change how you view your Hotmail messages by clicking the drop down menu "Arrange" at the right side
Selecting "Conversation" will put all the related messages into one message. The other options will sort the messages by either Date, From, Subject or the Size of the messages.
The change will be global, i.e. it will affect the way you see the messages in ALL folders.
Selecting "Conversation" will put all the related messages into one message. The other options will sort the messages by either Date, From, Subject or the Size of the messages.
The change will be global, i.e. it will affect the way you see the messages in ALL folders.
Tuesday, 3 April 2012
Rag, Widows, and Orphans
Rag is the uneven edge of text that is aligned on only one side.
Widows are short lines of text that are left alone at the top of a column or page of text
Orphans are single words that are left alone at the end of a paragraph
Widows are short lines of text that are left alone at the top of a column or page of text
Orphans are single words that are left alone at the end of a paragraph
Monday, 2 April 2012
An anonymous type (vb.net)
Objects can be initialized as an anonymous type without even creating or naming a class.
Dim myObject = New With { .id = 1, .type="dog", .name="hello" }
The compile will create and initialize a type for you.
With the "Key" keyword, it will allow you to select exactly which variables in an anonymous type should be used in either the calculation of a hashcode (using GetHashCode) or an equality comparison.
Dim myObject = New With {Key .id = 1, Key .type="dog", Key .name="hello" }
Dim myObject2 = New With {Key .id = 1, Key .type="dog", Key .name="hello" }
Dim myObject = New With { .id = 1, .type="dog", .name="hello" }
The compile will create and initialize a type for you.
With the "Key" keyword, it will allow you to select exactly which variables in an anonymous type should be used in either the calculation of a hashcode (using GetHashCode) or an equality comparison.
Dim myObject = New With {Key .id = 1, Key .type="dog", Key .name="hello" }
Dim myObject2 = New With {Key .id = 1, Key .type="dog", Key .name="hello" }
Console.WriteLine(myObject.GetHashCode)
Console.WriteLine(myObject .Equals(myObject2 ))
Sunday, 1 April 2012
Create a folder on iPad
- touch and hold an icon until the Home screen icons begin to jiggle
- drag the icon onto another icon
- iPad creates a new folder that includes the two icons, and shows the folder’s name
- tap the name field to enter a different name
Subscribe to:
Posts (Atom)