Sunday, March 31, 2013

Flow Reader Is A Gorgeous Gesture Rich Google Reader Client For Android

Google Play Store offers enough quality RSS readers and news apps to make the choice between them quite tough. Ranging from heavyweights like Flipboard and Google Currents to the likes of the official Google Reader Android app, there are plenty of options available that can help you keep up with the latest content from your RSS subscriptions. However, if you’re looking for a Google Reader alternative designed in compliance with the latest Android GUI guidelines and offering better control over syncing and caching of items, take a look at Flow Reader. Currently in beta, Flow Reader is an elegant, Holo-themed Google Reader client for Android offering certain features that are hard to find in most rival apps.
For starters, Flow Reader is one of the few feed readers that lets you browse items by author. In addition, the app’s Holo layout lets you switch between the latest, unread and starred items with a mere swipe. In fact, most of the app’s features are controllable with simple swipes and various other gestures.

Flow Reader comes with all the basic features you’ll require for a decent reading and bookmarking experience on Android. There is the option to browse all your Google Reader RSS feed subscriptions in various ways, star favorite items, explore complete stories via the built-in reader UI, share interesting news with others, mark items as read/unread, and keep all the content in sync between your Android device and Google Reader account.
When it comes to synchronization, Flow Reader offers you the option to sync content over Wi-Fi only, to help you save on your mobile data use. It lets you specify the maximum number of latest and starred items to sync for offline reading. You can also select the maximum number of parallel downloads to sync more content to your device in the least possible time. Another useful feature of Flow Reader comes in the form of content filtering. You can add certain custom keywords to the app’s filtering section, and any story containing those keywords will be automatically mark as read.
While browsing your subscriptions, you can long-press a story to mark it as read/unread. Holding down on a story cover lets you mark other stories as read, or star/unstar the selected one. Sliding upwards from the bottom edge of the screen reveals a seek bar to help you easily navigate to other pages of the current subscription. You can also swipe sideways to scroll through consecutive pages. Each story is loaded with all its images and hyperlinks. The bottom segment of the page offers shortcuts to mark the story as read/unread, star, share, and open it in your web browser. Also, you can quickly navigate to the top/bottom of the page by tapping the menu button.
Since Flow Reader is currently in beta, you can expect a few odd performance glitches. Also, the app is currently lacking some crucial elements required to provide a complete Google Reader experience. The option to subscribe and unsubscribe required content is the biggest miss at the moment, as is a widget. Hopefully by the time Flow Reader exits bets, it’ll emerge as one of the most complete Google Reader clients for Android in terms of both layout and feature set.
Flow Reader is currently compatible with Android 4.0.3 Ice Cream Sandwich and higher devices only. You can install the app by heading over to the Play Store link provided below.
Download Flow Reader For Android

Continue reading...

Saturday, March 30, 2013

Online Reservation Software Up Up Away

Online Reservation Software can make the difference in travel agency growth or decline. Travel companies work on small margins and efficient online reservation software is the lifeblood of travel companies. While tourists have visions of up, up and away, travel agencies have their eyes on the bottom line and how online reservation software can increase profits.

Improved Productivity - Online Reservation Software
Improved productivity is the key benefit online reservation software offers travel agencies. The airlines, hotels and tour operators set prices and the agency commission is fixed. How can a travel agency earn more money? By streamlining the booking process to increase sales per agent per day with industry leading online reservation software

Enhanced Client Management - Online Reservation Software Online
Reservation software cuts operating costs by automating the travel booking process. A key feature of online reservation software is the creation of a unique passenger record that ties the passenger the travel agency. When an agent knows the clients travel history, preferences, spending habits and more, its a powerful incentive for the client to book future travel with his or her agent.

Online Availability - Online Reservation Software
A sharp agent using online reservation software which offers online availability can close a clients travel bookings in minutes. Referrals are the life blood of the travel industry. Travel agents using online reservation software offering immediate confirmation have become the standard by which all travel agents are judged. Combined with the growing travel destinations and packages, an agencys online reservation software provides agents every possible travel service that might interest the customer at a glance.

Back Office Issues - Online Reservation Software
Do you know anyone that enjoys paper work? The client, on the other hand, is keenly interested in a convenient record of travel outlays for tax purposes. An agencys online reservation software automates the tedious process of creating receipts, invoices, confirmations, vouchers and more. The same goes for tracking the many wholesalers, airlines, and tour operators a travel agency deals with each year.

Travel Agency Expansion - Online Reservation Software
While generating more revenue is the goal of expansion - online reservation software is the vehicle. Today, every travel agency owner asks "How can I survive today and grow in the future?" While the answer varies from agency to agency, those without fast, efficient and cost cutting online reservation software wont have to worry for long, they will be "Up, up and Away" and out of the travel business for good.
Continue reading...

Friday, March 29, 2013

Vine By Twitter Is A Network For Sharing Short Looped Video Clips

Vine By Twitter Is A Network For Sharing Short, Looped Video Clips:
Twitter started out as a text-only affair, with people sharing their thoughts on different topics, discussing events live as they happened, and sharing interesting links to online articles, photos and videos. For a good amount of time, Twitter didn’t do anything about the latter content-type, but in recent months, Twitter has introduced features like Cards, which displays linked article summaries inline with tweets, they updated their iOS and Android apps with the ability to edit photos in a manner similar to Instagram before sharing them, and today, the company has gone even further by announcing an all-new app/service called Vine, which lets you share videos online. It’s an interesting mix of services like Instagram, Cinemagram, YouTube and Twitter itself.
Vine for iOS Vine Explore

So what’s different between Vine and the hundreds of other video-sharing services in the world today? Well, the app limits your videos’ length to a very short 6 seconds, and constantly loops them like an animated GIF when viewed inside the app. This brevity is in place in order to “inspire creativity”, according to VP of Product, Michael Sippey.
Vine iOS menu Profile view
Despite being owned by Twitter, it does not require a Twitter account for signing in (although it does recommend doing so); you can use the service on its own. Once you’re signed in, you can view clips from your friends, explore popular clips on the network, and also search clips by #hashtags.
Recording clips is very simple. You tap on the camera icon on the top-right of the navigation bar, and once the viewfinder comes up, record scenes by tapping and holding. The app records for as long as you hold down on the screen. This way you can have the video quickly cut to several scenes, or use the same technique to create pseudo-stop motion videos. When you’re done, the app allows you to share the result on Vine’s own network, Twitter and/or Facebook.
Creating a Vine Vine created Sharing Vine
I’ve tried making sense of the app’s basic idea of sharing short, personal video clips, but so far the whole thing really hasn’t “clicked” with me. Perhaps it will take time to realize its role in my daily life, just the way it took several months before the idea of regularly sharing short, 140 character-long updates with strangers on a network called Twitter “clicked” with yours truly.
But that’s just my opinion. I highly recommend you go ahead and play around with the app. It’s a novel idea, and could change the way you share content online.
“Vine – make a scene” is available for free for iPhone and iPod touch. Twitter says they are working on bringing it to other platforms.
Download Vine for iOS
Continue reading...

How to Enable Remote Desktop in Windows 8

Remote Desktop has been one of the essential features of Windows from the days of Windows XP which got refined with newer versions. Although the feature is not that popular among average users and is considered to be more of a pro feature, it’s a nice tool for anyone who has to control multiple computers on a network simultaneously or even for someone who has to provide tech support to a distant friend or family and needs to take control of their computer.

Now with the support for tablets in Windows 8, Remote Desktop’s usage is likely to increase. Anyone who owns a Windows tablet can connect to his home or office computer from any location provided he has internet connectivity.

So before we plunge into how we can create Remote Desktop connection on Windows 8, lets us first have a look on how we can enable the feature to allow an incoming connection.
Enabling Remote Desktop on Windows 8

Step 1: Open Windows 8 desktop Control Panel and click on System and Security while viewing the Control Panel in Category mode. In System and Security, click on Allow remote access under System to open System Properties.comfortable using the Run box, you can run SystemPropertiesRemote.exe command to open the System Properties directly.

Step 2: Navigate to Remote tab in System Properties,check the radio button Allow remote connections to this computer and click on Apply button.

Step 3: If you are using your computer in power saver mode and your computer goes into sleep or hibernate mode when not in use, Windows will ask you to change the configuration in Windows Power Options. This will make sure you have a seamless connectivity while in the middle of remote connection.

That’s all, you can now use Remote Desktop from any computer to connect to your Windows 8 device.
Conclusion. That was how you can activate the Remote Desktop on your Windows 8 devices to allow an incoming remote connection request. In our next post we will show you how to use Windows 8 to start a Remote Desktop connection using the Windows 8 Metro App. Don’t forget to tune in.
Continue reading...

Thursday, March 28, 2013

How to Play Omaha High Low Poker

When you are learning how to play Omaha high-low you need to learn some special approaches with starting hands. It is also important that you concentrate in comparing your hand with the community card for a poker when you are learning how to play Omaha high-low as a beginner or amateur. Never forget the 2 from the pocket card and 3 from the board card concept in Omaha.

How to play Omaha high-low explained in a nutshell:-
• Forced blinds are made.
• Four down cards are dealt – bet follows from player left to blind (4 pocket)
• Burn
• Three face up community cards - bet follows – from remaining players (3 flop cards)
• Another face up community card - bet follows - from remaining players (1 turn card)
• Last community card face up - bet follows - from remaining players (1 river card)
• Showdown, high and low shares the pot

How to play Omaha high-low and finalize on pot splitting?
• If the same player has both the high and low the pot is taken by the single player.
• If one player has high and other has low (8 or better) the pot is split in to half
• If one player has high and 2 have equally ranked lows, half pot goes to the high rank and the remaining half pot is split between the two lows
• If one player has high and lows and another has equal lows, the high low player takes three-fourth of the pot and the one-fourth is taken by the player with equal low.

A strong starting can be a monstrous luck. If you happen to have the following, you have most probabilities of winning:-
• AAKK, AAQQ, AAJJ, AATT, AAJT, AA99 or AAXX are the best of the hands regardless of double suits.

When you learn how to play Omaha high-low the most of the trick lies in:-
• Pocket card versus community card considering the 2 from pocket and 3 from board requirement.
• Above all learn to read the 8 or better low card versus the low nuts!

When you learn how to play Omaha high-low you need concentrate on how to read the low nuts, if possible try to mug up the series of nut lows.
Continue reading...

Wednesday, March 27, 2013

How To Find Your IP Address DNS Address IPv4 IPv6

IP address
(Internet Protocol address) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)-in simpler terms, a computer address. Any participating network device-including routers, computers, time-servers, printers, Internet fax machines, and some telephones-can have their own unique address.
An IP address can also be thought of as the equivalent of a street address or a phone number ( compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network. An IP address differs from other contact information, however, because the linkage of a users IP address to his/her name is not publicly available information.
IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a network address translator (NAT) or proxy server acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP addresses, in the private address space defined by RFC 1918, an address block that cannot be routed on the public Internet. Only the "outside" interface(s) of the NAT need to have Internet-routable addresses.
Most commonly, the NAT device maps TCP or UDP port numbers on the outside to individual private addresses on the inside. Just as there may be site-specific extensions on a telephone number, the port numbers are site-specific extensions to an IP address.
IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.

DNS Address:

On the Internet, the Domain Name System (DNS) associates various sorts of information with so-called domain names; most importantly, it serves as the "phone book" for the Internet: it translates human-readable computer hostnames, e.g., into the IP addresses that networking equipment needs for delivering information. It also stores other information such as the list of mail exchange servers that accept email for a given domain. In providing a worldwide keyword-based redirection service, the Domain Name System is an essential component of contemporary Internet use.

Uses :

The most basic use of DNS is to translate hostnames to IP addresses. It is in very simple terms like a phone book. For example, if you want to know the internet address of, the Domain Name System can be used to tell you it is DNS also has other important uses.
Pre-eminently, DNS makes it possible to assign Internet destinations to the human organization or concern they represent, independently of the physical routing hierarchy represented by the numerical IP address. Because of this, hyperlinks and Internet contact information can remain the same, whatever the current IP routing arrangements may be, and can take a human-readable form (such as "") which is rather easier to remember than an IP address (such as People take advantage of this when they recite meaningful URLs and e-mail addresses without caring how the machine will actually locate them.
The Domain Name System distributes the responsibility for assigning domain names and mapping them to IP networks by allowing an authoritative server for each domain to keep track of its own changes, avoiding the need for a central registrar to be continually consulted and

History :

The practice of using a name as a more human-legible abstraction of a machines numerical address on the network predates even TCP/IP, and goes all the way to the ARPAnet era. Back then however, a different system was used, as DNS was only invented in 1983, shortly after TCP/IP was deployed. With the older system, each computer on the network retrieved a file called HOSTS.TXT from a computer at SRI (now SRI International). The HOSTS.TXT file mapped numerical addresses to names. A hosts file still exists on most modern operating systems, either by default or through configuration, and allows users to specify an IP address (eg. to use for a hostname (eg. without checking DNS. As of 2006, the hosts file serves primarily for troubleshooting DNS errors or for mapping local addresses to more organic names. Systems based on a hosts file have inherent limitations, because of the obvious requirement that every time a given computers address changed, every computer that seeks to communicate with it would need an update to its hosts file.
The growth of networking called for a more scalable system: one that recorded a change in a hosts address in one place only. Other hosts would learn about the change dynamically through a notification system, thus completing a globally accessible network of all hosts names and their associated IP Addresses.
At the request of Jon Postel, Paul Mockapetris invented the Domain Name System in 1983 and wrote the first implementation. The original specifications appear in RFC 882 and 883. In 1987, the publication of RFC 1034 and RFC 1035 updated the DNS specification and made RFC 882 and RFC 883 obsolete. Several more-recent RFCs have proposed various extensions to the core DNS protocols.
In 1984, four Berkeley students - Douglas Terry, Mark Painter, David Riggle and Songnian Zhou - wrote the first UNIX implementation, which was maintained by Ralph Campbell thereafter. In 1985, Kevin Dunlap of DEC significantly re-wrote the DNS implementation and renamed it BIND (Berkeley Internet Name Domain, previously: Berkeley Internet Name Daemon). Mike Karels, Phil Almquist and Paul Vixie have maintained BIND since then. BIND was ported to the Windows NT platform in the early 1990s.
Due to BINDs long history of security issues and exploits, several alternative nameserver/resolver programs have been written and distributed in recent years.
How DNS Work In The Theory :
The domain name space consists of a tree of domain names. Each node or branch in the tree has one or more resource records, which hold information associated with the domain name. The tree sub-divides into zones. A zone consists of a collection of connected nodes authoritatively served by an authoritative DNS nameserver. (Note that a single nameserver can host several zones.)
When a system administrator wants to let another administrator control a part of the domain name space within his or her zone of authority, he or she can delegate control to the other administrator. This splits a part of the old zone off into a new zone, which comes under the authority of the second administrators nameservers. The old zone becomes no longer authoritative for what goes under the authority of the new zone.
A resolver looks up the information associated with nodes. A resolver knows how to communicate with name servers by sending DNS requests, and heeding DNS responses. Resolving usually entails iterating through several name servers to find the needed information.
Some resolvers function simplistically and can only communicate with a single name server. These simple resolvers rely on a recursing name server to perform the work of finding information for them.


Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely deployed. IPv4 is the dominant network layer protocol on the Internet and apart from IPv6 it is the only protocol used on the Internet.
It is described in IETF RFC 791 (September 1981) which made obsolete RFC 760 (January 1980). The United States Department of Defense also standardized it as MIL-STD-1777.
IPv4 is a data-oriented protocol to be used on a packet switched internetwork (e.g., Ethernet). It is a best effort protocol in that it does not guarantee delivery. It does not make any guarantees on the correctness of the data; It may result in duplicated packets and/or packets out-of-order. These aspects are addressed by an upper layer protocol (e.g., TCP, and partly by UDP).

The entire purpose of IP is to provide unique global computer addressing to ensure that two computers communicating over the Internet can uniquely identify one another.

Addressing :

IPv4 uses 32-bit (4-byte) addresses, which limits the address space to 4,294,967,296 possible unique addresses. However, some are reserved for special purposes such as private networks (~18 million addresses) or multicast addresses (~1 million addresses). This reduces the number of addresses that can be allocated as public Internet addresses. As the number of addresses available are consumed, an IPv4 address shortage appears to be inevitable, however Network Address Translation (NAT) has significantly delayed this inevitability.
This limitation has helped stimulate the push towards IPv6, which is currently in the early stages of deployment and is currently the only contender to replace IPv4.

Allocation :

Originally, the IP address was divided into two parts:

* Network id : first octet
* Host id : last three octets

This created an upper limit of 256 networks. As the networks began to be allocated, this was soon seen to be inadequate.
To overcome this limit, different classes of network were defined, in a system which later became known as classful networking. Five classes were created (A, B, C, D, & E), three of which (A, B, & C) had different lengths for the network field. The rest of the address field in these three classes was used to identify a host on that network, which meant that each network class had a different maximum number of hosts. Thus there were a few networks with lots of host addresses and numerous networks with only a few addresses. Class D was for multicast addresses and class E was reserved.
Around 1993, these classes were replaced with a Classless Inter-Domain Routing (CIDR) scheme, and the previous scheme was dubbed "classful", by contrast. CIDRs primary advantage is to allow re-division of Class A, B & C networks so that smaller (or larger) blocks of addresses may be allocated to entities (such as Internet service providers, or their customers) or Local Area Networks.
The actual assignment of an address is not arbitrary. The fundamental principle of routing is that address encodes information about a devices location within a network. This implies that an address assigned to one part of a network will not function in another part of the network. A hierarchical structure, created by CIDR and overseen by the Internet Assigned Numbers Authority (IANA) and its Regional Internet Registries (RIRs), manages the assignment of Internet address worldwide. Each RIR maintains a publicly searchable WHOIS database that provides information about IP address assignments; information from these databases plays a central role in numerous tools that attempt to locate IP addresses geographically.


Internet Protocol version 6 (IPv6) is a network layer protocol for packet-switched internetworks. It is designated as the successor of IPv4, the current version of the Internet Protocol, for general use on the Internet.
The main improvement brought by IPv6 is a much larger address space that allows greater flexibility in assigning addresses. While IPv6 could support 2128 (about 3.4׳1038) addresses, or approximately 5׳1028 addresses for each of the roughly 6.5 billion people[1] alive today. It was not the intention of IPv6 designers, however, to give permanent unique addresses to every individual and every computer. Rather, the extended address length eliminates the need to use network address translation to avoid address exhaustion, and also simplifies aspects of address assignment and renumbering when changing providers.

Introduction :

By the early 1990s, it was clear that the change to a classless network introduced a decade earlier was not enough to prevent IPv4 address exhaustion and that further changes to IPv4 were needed.[2] By the winter of 1992, several proposed systems were being circulated and by the fall of 1993, the IETF announced a call for white papers (RFC 1550) and the creation of the "IP, the Next Generation" (IPng Area) of working groups.[2][3]
IPng was adopted by the Internet Engineering Task Force on July 25, 1994 with the formation of several "IP Next Generation" (IPng) working groups.[2] By 1996, a series of RFCs were released defining IPv6, starting with RFC 2460. (Incidentally, IPv5 was not a successor to IPv4, but an experimental flow-oriented streaming protocol intended to support video and audio.)
It is expected that IPv4 will be supported alongside IPv6 for the foreseeable future. IPv4-only nodes (clients or servers) will not be able to communicate directly with IPv6 nodes, and will need to go through an intermediary

Features of IPv6 :

[edit] To a great extent, IPv6 is a conservative extension of IPv4. Most transport- and application-layer protocols need little or no change to work over IPv6; exceptions are applications protocols that embed network-layer addresses (such as FTP or NTPv3).
Applications, however, usually need small changes and a recompile in order to run over IPv6.

Larger address space :

The main feature of IPv6 that is driving adoption today is the larger address space: addresses in IPv6 are 128 bits long versus 32 bits in IPv4.
The larger address space avoids the potential exhaustion of the IPv4 address space without the need for network address translation (NAT) and other devices that break the end-to-end nature of Internet traffic. NAT may still be necessary in rare cases, but Internet engineers recognize that it will be difficult in IPv6 and are trying to avoid it whenever possible. It also makes administration of medium and large networks simpler, by avoiding the need for complex subnetting schemes. Subnetting will, ideally, revert to its purpose of logical segmentation of an IP network for optimal routing and access.
The drawback of the large address size is that IPv6 carries some bandwidth overhead over IPv4, which may hurt regions where bandwidth is limited (header compression can sometimes be used to alleviate this problem). IPv6 addresses are harder to memorize than IPv4 addresses, although even IPv4 addresses are much harder to memorize than Domain Name System (DNS) names. DNS protocols have been modified to support IPv6 as well as IPv4.

Stateless auto configuration of hosts :

IPv6 hosts can be configured automatically when connected to a routed IPv6 network. When first connected to a network, a host sends a link-local multicast request for its configuration parameters; if configured suitably, routers respond to such a request with a router advertisement packet that contains network-layer configuration parameters.
If IPv6 autoconfiguration is not suitable, a host can use stateful autoconfiguration (DHCPv6) or be configured manually. Stateless autoconfiguration is only suitable for hosts: routers must be configured manually or by other means

IPv6 scope :

IPv6 defines 3 unicast address scopes: global, site, and link.
Site-local addresses are non-link-local addresses that are valid within the scope of an administratively-defined site and cannot be exported beyond it.
Companion IPv6 specifications further define that only link-local addresses can be used when generating ICMP Redirect Messages [ND] and as next-hop addresses in most routing protocols.
These restrictions do imply that an IPv6 router must have a link-local next-hop address for all directly connected routes (routes for which the given router and the next-hop router share a common subnet prefix).

Find IP Info: link
Find DNS, IPv4, IPv6 : link:
Find IP Address: link

Continue reading...

Tuesday, March 26, 2013

How to Use Wallet in Windows Phone 8

How to Use Wallet in Windows Phone 8:
With the release of Windows Phone 8, Microsoft has added another new feature to Windows Phone- Wallet. Wallet is a secure place for you to store digital versions of credit cards, coupons, other payment options and more, the same stuff you’d keep in your actual wallet. You can add you payment methods like Credit cards, debit cards, PayPal account etc to Wallet and use this for payment instead of using cash. Along with the Wallet app for Windows Phone, developer can also integrate Wallet feature into their apps so that payments can be done easily.
Further, if your service provider and phone support it, you can even set up credit or debit cards to make NFC purchases in stores. (This requires a special, secure SIM card).
In Windows Phone 8, wallet can do the following;
  • Collect coupons, credit cards, memberships, loyalty cards, and more in one place.
  • Manage the payment instruments that they use in the app and music store.
  • Link items in the Wallet to apps on their phone.
  • Make contactless transactions, using Near-Field Communication (NFC), in some markets.
How to Get started with Wallet?
Wallet is available as an app in Windows phone, you can open it from the app list. When you are using it for the first time, the Wallet might be empty. If you have used Credit card on Microsoft account, it might be available here.
You can add more items to Wallet by pressing the + symbol. You can add Credit or debit card, Microsoft gift cards, Paypal account or other accounts.
wp_ss_20130105_0008 wp_ss_20130105_0009
If your bank (or card issuer) has an app that’s compatible with Wallet for Windows Phone, you can install that app. Then, when you open the app and sign in, your card will be added to Wallet. This will give you access to your account info (such as balances and transaction history) directly from your Wallet.
wp_ss_20130105_0010 wp_ss_20130105_0012
You can also add local deals to your Wallet. To protect Wallet from music and other in-app purchases, you can use a Wallet PIN. While every Windows Phone 8 has a Wallet Hub, not all support NFC transactions. The easiest way to check and see if your phone supports NFC transactions is to go to your Wallet settings. At the moment, only a small number of mobile operators offer phones that support this feature, we are sure this will change in a year.

Via Nirmaltv
Continue reading...

Monday, March 25, 2013

Better Software Foundations

I visited the ruins of a Roman settlement, the other day that was set in a lovely valley in the middle of an island.

The setting was idyllic, sheltered from the winds and not too far from the main market town, it seemed an ideal spot to farm and bring up a family.

Its history was thoughtfully provided on signs around the ruins of a substantial dwelling, which had been expanded in Roman times to include a hot and cold bathroom and mosaic floors. All of this was very attractive and a considerable investment for the landowner. But the settlement was abandoned, and it occurred to me that there had to be a good reason since it was clear that someone had put a lot of effort and finance into their dream.

I wondered if Vikings, who were known to be active in this area after the Romans left, had attacked it but there were no signs of charred brick work or the aftermath of battle.

Looking around another sign revealed the problem. There had been more than one attempt to settle the area, but the land formed a natural point of drainage for the hills around, and successive buildings had each eventually succumbed to subsidence.

I was left in no doubt that the buildings were of a good quality and that the builders were competent at construction, but clearly it had taken a few generations to work out that this was not a suitable site for construction. If we really wanted to settle this place now we would drive piles deep into the ground to overcome the subsidence.

The point that this drove into my mind was that of developing software. It is all too often the case that Software development organizations and their customers make the same mistakes over again. If the foundations are shaky then there is no point in building, but with a little forethought someone will could solve the problem and provide a safe way of delivering a good foundation.

The biggest mistake that organizations make is to rush to cut code before they understand the problem they are solving. That doesnt mean you have to be complacent and that sitting around in a few meetings will solve all your problems.

What should be done is: -

Ring fence what you know.
Ring fence what you dont know.
Make sure you are developing the right product.
Build the software that you know will not change.
Check that what you are building is what is wanted.

Often the customer just doesnt know exactly what they want, so you need to involve them in the development process. The earlier they get to know the product then the more likely they are to buy into the solution.
Having said all of that..

Code should be built where it enhances the understanding of the problem both to the customer and the developer.
Continue reading...

Sunday, March 24, 2013

Renew And Update Your Antivirus Software Today

PC users are facing new computer viruses every day. Computer viruses not only affect home PCs, they clog up internet traffic and disrupt the business of big corporations, causing billion dollars worth of damage each year. To protect your computer and stop the spread of these malicious programs on the internet, you should renew your antivirus software and update it regularly.

The number of computer viruses is increasing at a shocking rate. In 2003, 7 new viruses were unleashed each day. In 2004, more than 10,000 new viruses and their variants were identified. These new viruses include viruses, worms and Trojan horses and they attack the computer in many different ways. Some cause damage to the boot sector, hardware, software or data files. Some create security leaks in the system. Others may use the computer to spread spam e-mails.

Viruses, worms and Trojan horses also spread by different means. Viruses are usually transferred from one computer to another by sharing infected files or e-mail attachments. Worms replicate and spread by e-mail programs. Trojan horses are often downloaded and run by computer users who do not know the true nature of these programs.

The best antivirus software detect and remove viruses, worms and Trojan horses before they infect your system and use advanced script stopping technology. Although there are many new antivirus programs available these days, consumers should remain vigilant. Beware of all the free scans and free downloads from unknown software publishers. Some claim to be antivirus software but in fact, they add adware to your computer.

If you are looking for an antivirus software, you should only buy from reputable software publishers such as Symantec, McAfee, Trend Micro, etc. Remember to renew the license annually and enable the automatic update. This ensures that you are using the most updated detection database.

For more information about computer viruses and award-winning antivirus software, please visit the following site:
Continue reading...

Saturday, March 23, 2013

How To One Click Transfer All Your Instagram Photos To Flickr

How To One-Click Transfer All Your Instagram Photos To Flickr:
Instagram is amongst the most popular mobile photo-sharing services in the world today. Its popularity comes from the strong social network behind it – used by big-name celebrities and industry thought-leaders – and the lovely set of filters that can make even the most terribly composed photos look “artistic” in a way – whether it’s a Lo-fi’d photo of the boiled vegetables you’re about to eat, or a Willow’d capture of your feet at the local beach.

The company behind Instagram – Burbn, Inc. – has had one hell of a year so far. They continued their domination on iOS, launched Instagram for Android, and signed up millions of new users that now regularly use the service to share their photos on the go. All of this was enough to catch Facebook’s attention, which acquired Instagram for a whopping $1 billion, making its founding members millionaires overnight.
However, a few days ago, Instagram announced an update to their Terms of Service, which has certain legal points that were worded in a way that left many people shocked and looking for an alternate platform for sharing their photos.
Flickr is arguably the best alternative to Instagram. Yahoo! – the company behind Flickr – recently released an overhauled version of Flickr for iOS that allows users to enhance their photos with Instagram-like filters.
If you’re up for it, you can very easily transfer all your photos on Instagram to Flickr with a new tool called Free The Photos. It’s stupidly-easy to use, works the way you’d expect and is completely free.
All you need to do is navigate to Free The Photos’ website, log in to your Instagram and Flickr accounts, and click “Free Your Photos”. The service will start working on pulling your photos from Instagram, and pushing them to Flickr. You can also enter your email address so that Free The Photos can notify you as soon as it is done with migrating all your photos. The web app uploads all your photos in a separate, new set called “Instagram”. You can go log in to Flickr to rearrange and organize them as you please after uploading is complete.
Since the service is under heavy load right now, it may take a while for the migration process to be completed.
Another recently covered, somewhat-related tip you should check out is how to see who unfollowed you on Instagram.
[via Lifehacker]
Continue reading...

Microsoft Paint Tutorial

Microsoft Paint Tutorial- Understanding how to read the title bar is a basic skill in Windows. The Title Bar is indicated by the red circle in the illustration at left on Microsoft Paint Tutorial. The Icon (at far left) gives you a clue as to what program the window belongs to. In this case, the Icon shows that the window belongs toMicrosoft Paint.Microsoft Paint has an assortment of painting Tools that you can use for drawing shapes and applying color to areas of your image in various ways. You switch between tools by downloading on the appropriate Icon on the Toolbar, which is located on the left side of the Paint window. The Magnifying Glass, or Zoom tool, can be used to get a closer, more detailed view of an image. This is very useful if you’re working in close with the fine details of a part of an image. When you activate the Magnifying Glass tool, you’ll have an option to select between 1x, 2x, 6x, and 8x magnification. You can download on the part of the image that you want the magnification to center on. This will not affect the actual image in any way, just how it appears on your screen. Once you zoom in, the magnifying glass will automatically switch back to whatever tool you were using before.
Click here to Download Microsoft Paint Tutorial
Continue reading...

Friday, March 22, 2013

Microsoft Publisher 2007 2010 Tutorial Working with Columns

You can create columns manually by creating multiple text boxes or by dividing a single text box into columns. As you create columns with Publisher, a set of guides (like the page margins) are added to the text box. Creating Columns Balancing Columns Creating Columns Placing text into columns is one text layout option. Columns help to shorten the text line for your readers while also giving your publication a more professional look. Creating Columns: Using Layout Guides Using Layout Guides to create columns will assure you of uniformly sized (width) and evenly spaced columns of text. Layout guides will help you determine the width and placement of your text boxes; this particular method allows you to violate the column layout if desired (e.g., for headlines).First, establish the layout guides; then, create the text boxes. 1. From the Arrange menu, select Layout Guides… The Layout Guides dialog box appears.

Get from here to download Microsoft Publisher 2007/2010 Tutorial Working with Columns
Continue reading...

Thursday, March 21, 2013

Mute Hulu Ads In Chrome Get Desktop Notifications After Ad Intervals

Mute Hulu Ads In Chrome & Get Desktop Notifications After Ad Intervals:
If you enjoy Hulu as a free service, you probably know that using ad blocking extensions means you can’t stream content from the video hosting site. It asks you to disable them before streaming a show or clip. That fact aside, ads are a major source of revenue for websites and web services, and to block them is like using a service without paying for it. No Hulu Ads is a Chrome extension that mutes the ads, blacking the player out for the interval that an ad is played. This doesn’t necessarily mean you’re skipping them entirely; if you click on the player during the time an ad is supposed to be displayed, you will be redirected to the associated product or brand’s page. The extension also offers the option to pause a video and notify you as soon as an advertisement is over, so that you can resume watching the video from the exact spot you’d want to.

Once the extension is installed, the time during which you’re supposed to see an ad in a Hulu video stream will be filled with black silence. No disclaimers or ad experience choices are shown. During this time, the extension displays an option over the player that allows you to pause the video when the show returns. This can prove to be quite useful, as it gives you some time to browse around without having to check back for when the video resumes.
No Hulu Ads
When the show returns, No Hulu Ads displays a desktop notification. By default, the notification sticks around until you dismiss it, so be sure to change the settings on that if it annoys you. Clicking the notification brings the Hulu tab to front. Again, quite a handy feature if you tend to switch over to other tasks while you wait the ads out.
No Hulu Ads notification
No Hulu Ads works fine for the most part, but it does have one or two bugs. Sometimes an ad won’t be muted or the video will not resume after an ad. Refreshing the page should solve the problem and it shouldn’t persist for more than the first two or three uses. Sadly, the extension won’t work if you’re watching a video in fullscreen. The simple workaround here would be to return to the regular view when you know an ad break is coming. It’s might not be a perfect solution, but it is one the best options out there.
Install No Hulu Ads From Chrome Web Store

Via Addictivetips
Continue reading...

Wednesday, March 20, 2013

Oxford English for Careers Technology 1 Students Book

Technology 1 is a course for pre-work students studying on technology-related courses, who will need to communicate accurately in English at work

Technology is ideal for pre-work students, studying at pre-intermediate to intermediate level, who will need to use English in work situations.
Technology develops the vocabulary, language, and skills that students will need to communicate effectively when presenting an idea to non-specialists, problem-solving, and discussing the latest technological innovations.

Key Features
*Authentic and up-to date information in every course, written and checked by industry insiders
*Clear and straightforward structure, with each unit containing a menu of learning outcomes, and an end-of-unit checklist with ‘Can do’ tick boxes
*Teaches English in context, so students practise the language and skills they need for the job in real work situations
*Real-world profiles from genuine professionals in the ‘It’s my job’ section offer authentic and engaging insights into the industry
*Extra facts, figures, quotations, and specialist terminology included in the top margin of unit pages
*Additional activities and tests in the Teacher’s Resource Book make the course suitable for mixed-ability classes
*The Teacher’s Resource Book provides specialist background to the industry for every unit, as well as industry tips to support non-expert teachers
*Project work in the Student’s Book, additional activities on the Student’s Site, and a Key words list of essential vocabulary at the end of every unit provide extra opportunities for revision

Continue reading...

Tuesday, March 19, 2013

2004 Honda Element Owners Manual

2005 Element Online Reference Owners Manual Use these links (and links throughout this manual) to navigate through this reference. For a printed owner’s manual, click on authorized manuals. You’ll find many safety recommendations throughout this section, and throughout this manual. The recommendations on this page are the ones we consider to be the most important. Excessive speed is a major factor in crash injuries and deaths. Generally, the higher the speed the greater the risk, but serious accidents can also occur at lower speeds. Never drive faster than is safe for current conditions, regardless of the maximum speed posted. While airbags can save lives, they can cause serious or fatal injuries to occupants who sit too close to them, or are not properly restrained. Infants, young children, and short adults are at the greatest risk. Be sure to follow all instructions and warnings in this manual. (See page .) Having a tire blowout or a mechanical failure can be extremely hazardous. To reduce the possibility of such problems, check your tire pressures and condition frequently, and perform all regularly scheduled maintenance. (See page .) A seat belt is your best protection in all types of collisions. Airbags supplement seat belts, but airbags are designed to inflate only in a moderate to severe frontal collision. So even though your vehicle is equipped with airbags, make sure you and your passengers always wear your seat belts, and wear them properly.

download 2004 Honda Element Owners Manual
Continue reading...

Monday, March 18, 2013

LG Secret Unlock code

Here is a method to unlock the LG Secret easily and safely.
1. insert original sim card and turn your LG Secret on. LG-Secret info
2. Enter 2945#*750#
3. A menu will pop up, select sim unlock
4. Enter your unlock code and press ok
5. The LG Secret will then reboot and the unlock is complete.
Continue reading...

Upload Android Gallery Photos To Cloud While Compressing Them On Your Device

Upload Android Gallery Photos To Cloud While Compressing Them On Your Device:
The Gallery app on Android, as we all know, is a centralized location to access the photo and video albums stored in various directories of your device’s internal and external memory. In this age of high-resolution mobile cameras, images captured from our devices can consume a significant chunk of our local storage space. Confronted by this issue, most users are left with no option but to back up these albums to their computers or their preferred storage of choice in order to create more room for new files on their devices. This makes accessing those good old memories of yours relatively hard to access on the go, especially if the backed up data is sitting on your computer’s hard drive. New to the Play Store, Gallery Drive Sync is a rather unique online photo backup app that aims to solve the ever-threatening ‘out of sight, out of mind’ issue in this regard. The app lets you move select or complete full-resolution Gallery photos and albums to your Google Drive, while still retaining the content on your device in compressed format under their respective albums.

Gallery-Drive-Sync-Android-Main Gallery-Drive-Sync-Android-Album
This way, you can keep adding new photos to your albums without having to worry about your device’s storage being consumed completely or too quickly. Just to give you an idea about the app’s compression mechanism, it is capable of compressing a 1.24 MB photo to a mere 52.25 KB. For a better understanding of how the app works, consider the following case from a brief test session. Once the app was done with uploading the photo, the result was the full 1.24 MB version in a dedicated Google Drive folder, and the compressed 52.25KB version on the device replacing the original 1.24 MB one there.
When it comes to the UI, it’s rather overly simple, and has plenty of room for improvement and new features. Still, it does quite effectively what it’s meant to do. On the main screen, you’re presented with your photo albums. As mentioned earlier, you may opt to upload entire albums or select photos to your Google Drive. Do note that the app’s compression feature is optional; you still have the choice of retaining full-sized images on your local storage even after having them all uploaded to the cloud. In that case, the app serves only as a handy photo backup tool for Google Drive.
Gallery-Drive-Sync-Android-Success Gallery-Drive-Sync-Android-Settings
Since the app does not support instant, automatic uploading, you don’t have to worry about any background data usage adding up in your bill. It still offers a WiFi-only upload feature that you can use to make sure you don’t inadvertently end up uploading photos while on your data connection.
All the data backed up by the app is uploaded to the ‘Drive Sync Images’ folder on your Google Drive. Whenever there is a change in the contents of a synced album on your device, the app displays an ‘Update’ option next to the respective folder, so that you may manually sync the new changes to the relevant cloud directory. Even if you rename the synced photos or albums on your mobile, you won’t have to re-upload all the content, since the app is capable of automatically detecting if the selected files have already been uploaded to the cloud.
All in all, Gallery Drive Sync boasts a pretty useful and innovative photo backup feature that can help you with your local storage space significantly without having to entirely delete a lot of your photos. Should you wish to view the same images in their full high-res glory, you can always do so by navigating to the Drive Sync Images folder on your Google Drive via its official app or web interface, right from your device.
Download Gallery Drive Sync For Android

Via Addictivetips
Continue reading...

Sunday, March 17, 2013

Get Multiple Virtual Desktops On Windows RT Tablets With VirtualWin

Virtual desktops allow you to have multiple workspaces without having to spend money on extra monitors. If you are one of those people who are easily distracted by multiple applications open on the desktop, virtual desktops allow you to compartmentalize your work by grouping related windows together on different virtual screens. This in turn lets you avoid the clutter and distraction created by opening multiple utilities, decreasing the time wasted in maximizing and minimizing different apps and ultimately increasing your productivity. As we know, Windows RT – the tablet-only version of Windows 8 with ARM processor – does not support x86 applications, and every useful tool that you normally use cannot be installed on an RT device. However, the guys at XDA have developed workarounds for some of the applications. VirtualWin is one such application that has been modified to run on jailbroken Windows RT devices. It is a desktop manager that allows you to take advantage of multiple workspaces and increase your screen real estate.

First of all, you need a jail broken Windows RT tablet to use this app, since Microsoft doesn’t allow you to sideload third-party Desktop apps on Windows RT devices by default. If you haven’t already jailbroken your tablet, you can follow this guide to learn how to do so.
Next, you need to head over to XDA and download the ZIP file of the modified version of VirtualWin using the link provided at the end of this post. Unzip the contents of the file using an unzip utility such as Unpacker, and then just run the VirtualWin executable file from the extracted files to start the desktop manager.
The app runs in the system tray and can be accessed by right-clicking or long pressing its icon. The context menu that pops up allows you to access the available virtual desktops.
VirtualWin System Tray
Select Setup from the right-click menu to access the configuration options. It allows you to change a few general settings, hotkeys, mouse options. modules and some advanced options to tweak your virtual desktop experience on the device.
VirtualWin Options
Hotkeys can come particularly handy in quickly switching between multiple desktops if you are using your tablet with the keyboard attached. VirtualWin is a free and open-source application, and the modified version seems to work just fine on jailbroken Windows RT (tested on jailbroken Surface RT). You can download it from the original XDA-Developers forum thread linked below.
[via XDA-Developers]

Continue reading...

Saturday, March 16, 2013

Encrypt Facebook Posts Tweets Or Any Online Message For Select Contacts With Scrambls

Sending coded messages can come handy either for fun or out of necessity. The common way to share a message publicly while ensuring that only a few people in that public forum/group can view it is to use services that encrypt them and require decryption on the other side. Services like this have a drawback; they leave it to you to share the password/decryption key with your intended audience. Scrambls is a browser extension that works with a service at the back end and lets you easily scramble your message across any public or private online medium including social media services, forums, blogs, comments and the like. You can create groups using email addresses of your intended recipients, allowing them alone to unscramble the message. In order to unscramble the text, the recipients will have to install the Scrambls extension and sign up for a free account with the service. Once installed and logged in, the extension automatically detects if you have permission to view a message that’s been scrambled by another user. The extension has two modes: automatic and manual. The automatic mode will scramble all messages you send, while the manual mode will require you to enclose your message between @@ signs to scramble it.

Once installed, sign up to use Scrambls (you can use your Facebook or Twitter account if you like) and start scrambling your message. If you don’t create any groups, you will have only two visibility options: ‘everyone’ or ‘only me’. After adding groups, you will be able to restrict your message to those groups.
To create a group, head over to Scrambls’ web interface, log in and click ‘Create Group’ to add a new group. Name it, add a description and enter email addresses for whoever you want to include in the group. Save the group and then head over to a public forum or your Facebook wall to post a message.
scrambls groups
Select an audience for your message from the extension button and choose the mode you want it to always work in. The ‘Scrambl marked text’ mode will scrambl text that you write between @@ signs, for example @@this is a test@@ will be scrambled. If you select ‘Scramble all text’, anything you write in an input field will be scrambled.
scrambls extension
The text will always appear unscrambled to you (provided you are logged in to the extension) and will unscramble automatically on a recipient’s side if they’re allowed to view it and have the extension installed.
The great thing about Scrambls is that you can change the recipient and viewing option for a message at any time. Provided your recipients are willing to install the extension and sign up with the service, Scrambls gives you one of the easiest ways to mange sending coded messages through a public forum.
Scrambls change
Scrmbls isn’t the same as encryption; it uses a custom algorithm to code your message and while it is secure as far as the average user is concerned, it isn’t AES-standard encryption. This means that sharing your social security or credit card number online via Scrambls isn’t a good idea (in truth, sharing that kind of information publicly is never a good idea no matter how you protect it). For average coding and secrecy needs, Scrambls is a pretty easy-to-use option. The Chrome extension can be found at the Web Store link below, and you can install the Scrambls add-on for Firefox and extensions for Safari and Internet Explorer from the service’s website.
Scrambls Extension At Chrome Web Store
Visit Scrambls Website

Continue reading...

Friday, March 15, 2013

Easily Edit Watermark Share Screenshots With Image Tools

Easily Edit, Watermark & Share Screenshots With Image Tools:
Image editing applications come in all shapes and sizes. Some of them provide you with color correction controls like changing the hue, brightness, contrast and saturation, while others let you apply different filters to images. The problem with comprehensive image editors such as Adobe Photoshop is that the more options they have, the more difficult it becomes to learn them. There’s also another category of image-related applications: screenshot tools. If you have been a regular reader of AddictiveTips, you must have seen us review many, specially the ones that provide something extra to the users rather than just capturing plain screenshots. Today, we have one such utility called Image Tools that allows you to capture screenshots and edit local images such as adjusting brightness, gamma, contrast, format conversion, cropping, deborder, flip/ rotate, resizing, apply watermarks etc. When you are done, you can upload the images to IMDrops image hosting service directly from the tool to share them with others with a URL. More on Image Tools after the jump.

The main interface of the application provides you with all the options you need for working with local images. You can add images to the interface, save a current project and load a project you were previously working on, from the Main menu.
IMDrops Image Tools 3.4 [2 virtual cores] 128MB cache
The various image editing options can be accessed under the Process menu, or by right-clicking on an image. All of these should be pretty self-explanatory.
IMDrops Image Tools 3
After you have edited the image to your liking, you are ready to upload the file. Moreover, the application allows you to save the screenshot of the entire screen or a select area, directly publish your screenshot, share your most recent clipboard entry, activate a color picker, and view recent items.
When you upload an image, you are shown a confirmation message along with a link, allowing you to easily share the image with others.
Your link
The URL takes you to the image that can be viewed or directly downloaded. Other than the image, the webpage contains the URL of the file, IMDrops URL, BBCode Link, HTML Link, and several other formats of URLs to make it easy for you to share or embed the image in forums, blogs and other web pages.
IMDrops - Uploaded
Even though the applications works without a flaw, there is room for improvement in the user interface department make the app look more appealing. Image Tools is an open-source application and works on both 32-bit and 64-bit versions of Windows XP, Windows Vista, Windows 7 and Windows 8.
Download Image Tools
Continue reading...