Category Archives: Computer

How To Add Pictures and Graphics in Publisher

In this chapter, you learn techniques for working with pictures and other graphics. Topics include the following:

  • Inserting Pictures
  • Moving and Resizing Pictures
  • Working with the Picture Tools
  • Creating and Formatting WordArt
  • Inserting Borders & Accents

In Chapter 2, “Working with Page Elements,” you learned how to make adjustments to the page elements such as margins, orientation, paper size, color schemes, and backgrounds. In this chapter, you learn how to add and work with visual elements such as photos, WordArt, borders, and accents. Then, Chapter 4, “Adding Text Boxes,” shows you how to create and work with text boxes, so you can sneak in some information with your visuals.

Without question, adding photographs to your publication is the most popular way to incorporate colorful visuals. Realistic, razor-sharp-focused images immediately elevate a publication’s status and the credibility of the information within it. Publisher 2016 has a powerful collection of picture tools.

Inserting Pictures

Pictures are a powerful way to communicate. They guide readers through a publication by catching their eye, creating interest, illustrating key ideas, and controlling the flow. Key concepts can be reinforced and clarified by using informative picture captions and relevant images.

Think about the last marketing piece you got in the mail. What initially drew enough of your interest to glance at it, rather than just tossing it into the recycle bin? Unless it’s an “everything is free” flyer, it was probably the illustrations. Bright, colorful, briefly informative—they communicate as much as the text. Even more so to a reader in a hurry.

Inserting Pictures Stored Locally

When the image you want to use is stored either on your computer, or a computer on your network, you simply browse for the file to bring it in to the publication. In the next section, you learn how to locate an image online.

  1. Click the Insert tab on the Ribbon. The Pictures command button is in the Illustrations group, along with the Online Pictures, Shapes, and Picture Placeholder command buttons.
  2. Click the Pictures command button. The Insert Picture dialog box opens.
  3. Use the Navigation pane on the left to browse to the folder that contains the picture you want to insert. If you are unsure how to browse through folders on your network, ask someone for help.
  4. When you find the correct image, select it, and then click Insert (or double-click the image). Publisher inserts the image into the publication.

Inserting Pictures Stored Online

  1. Click the Insert tab on the Ribbon. The Online Pictures command button is next to the Pictures button in the Illustrations group.
  2. Click the Online Pictures command button. The Insert Pictures dialog box opens. This dialog box has Bing search built-in and a link to your OneDrive account. There are also links to help you insert photos from your Facebook and Flickr accounts.
  3. Type a search phrase in the Search Bing box, and then click Search (magnifying glass) to get things started.
  4. Initially, the search results contain images that are licensed under Creative Commons. There is an advisory to read the specific license for an image that you want to use to make sure you can comply.
  5. Scroll down to see more search results.
  6. Select one or more images; then click Insert to add them to your publication.
  7. Alternatively, you can select an image from one of your OneDrive folders.
  8. Click a folder to view the pictures within.
  9. Select the photo that you want to use.
  10. Click Insert to place it in the publication.

Inserting Pictures from the Scratch Area

When you insert pictures, either those stored locally or those found online, you always have the option to insert multiple pictures. Just as you select more than one file at a time, you select multiple pictures by clicking the first one and then holding down the Ctrl key to click the others. The selected files are placed in a “scratch area” of the workspace.

Using the scratch area, you can get all your pictures open and then drag and drop them as you need them. You can also drag and drop pictures from the publication back to the scratch area. It is like having a white-board on the side with your photographs tacked up waiting to be used.

  1. Click the Insert tab.
  2. Click the Pictures or the Online Pictures command button, depending on where your pictures are stored. Browse to where the pictures are stored.
  3. Click to select the first picture, and then hold down the Ctrl key to select the rest.
  4. Click Insert to place the selected pictures in the scratch area of the Publisher workspace.
  5. You can now drag and drop pictures from the scratch area to the publication.

Moving and Resizing a Picture

Invariably, you will need to resize an inserted picture and also reposition it. And although that may sound intimidating, it’s actually super easy. You simply click and drag a picture to move it; and you click and drag the sizing handles to resize it.

  1. Move the mouse pointer over the inserted image until you see the four-headed arrow. This is the universal move pointer.
  2. Click and drag the picture to the preferred location; then release the mouse button to drop it there. You’ll see a “ghost” image of the picture to show you where the image will be positioned when you drop it.
  3. To resize a picture, you must first select it. When you do, the sizing handles appear. There are circles at each corner, and squares on the sides.
  4. Position the mouse pointer over a sizing handle and wait for the two-sided arrow to appear. This is the universal resizing pointer.
  5. When you see the resizing pointer, click and drag the sizing handle to increase or decrease the size of the picture.
  6. If you want to make absolutely sure that the picture maintains its original proportions, click and drag one of the corner handles.

INTEL OR AMD CPUS DUAL CORE, TRIPLE CORE AND QUAD CORE PROCESSORS

imagesIntel and AMD are the two companies who dominate the PC Processor market. Both of them are around for decades become the main Chip suppliers for the home and business markets.

Both companies have fierce rivalry and they file and counter file court cases against each other all we care about is that they have near identical chip products on the market at the same time as they compete for the fastest chip and share of the market.
The competing products are very close to each other and really only the techies compare the benchmarks before choosing.


Intel Pentium Dual Core Processors

The Intel Pentium processors with Intel dual-core technology deliver great desktop performance, low power enhancements, and multitasking for everyday computing.


Intel i3 Processors
(Ivy Bridge)
Intel Core i3 dual core processors provide 4-way multitasking capability, runs at fixed speed ideal for typical tasks and media playback but not games.


Intel i5 Processors

Intel i5 usually quad core but some dual processors deliver the next level of productivity. Mostly the same as i3 but with Intel Turbo Boost Technology, delivers extra speed when you need it. Like the i3 integrated graphics is included but is only ideal for normal use not for gaming.


Intel i7 Processors

Intel i7 processors dual or quad core for the most demanding applications with cache and faster clock speeds. Quad-core processors feature 8-way threading, four cores will run faster, and more L3 cache, but will consume more power. High-end use, video and gaming with dedicated video card.

AMD A4
– These A4 processors have 2 processor cores and include a Radeon graphics chip. Aimed for use with lower end systems.

AMD A6 – A6 processors dual core, includes turbo function similar to Intels allows for the processor to adapt to the task needed. Integrated graphics, on par with Core i3 range.

AMD A8 – 4 processor cores is comparable to the i3 and low i5, its graphic part is faster than Intels version, can handle light gaming with ease.

AMD A10 – 4 processors these quad cores are comparable with the Intel i5, and some i7s should benefit from better battery life.

2013 AMD Piledrivers are the latest versionPiledriver then FX-4, FX-6, FX-8 for either 4-8 cores, they use the AM3+ socket so can only be used in Motherboards with AM3+

 

 

Each series of processor usually has a couple of generations per series where enhancements and tweaks are made, the main thing to check and consider is that the type of processor is compatible with your motherboard and fits your need and budget.

My personal view is there is little difference between using both makes and have run many stable and fast systems using both makes. The AMD processors do tend to run hotter than the Intel versions, but with a suitable fan this is easily kept under control.

I would decide depending on your budget, don’t be afraid of using AMD, the AMD range will mirror closely to Intels in speed and performance and for general use you can use either to run general programs and movie playback with ease. Gaming or video needs you will have a dedicated video card to spread the load and likely a larger budget.

Intel products have in my experience always been consistently more expensive, typically £20 than the AMD equivalent. Throughout my use and builds I find the AMD nearly always more affordable, partly as Intel’s products higher price is sometimes because they are available more in retail packaging rather than cheaper OEM offerings, this depends on the supplier.

Don’t get to hung-up on reviews, you can view a number of benchmarks comparing the Intel and AMD equivalents head to head, sometimes AMD will be ahead sometimes Intel will be out in front. But unless you are crunching specific tasks you will not notice the odd fraction of a second or couple of seconds here and there.

If you are looking to upgrade just the CPU of your system, then you need to check what type of socket your Motherboard uses and then check what the current speed cpu is against the fastest speed version which can be use in your existing Motherboard.

My advice would be to always look at the whole range of CPUs available as sometimes a small bit extra can get you a significant jump in the speed and performance. Last time I checked a processor with slightly lower clock speed but with two extra cores for just £10 more!

Of course if you are buying a new or barebones systems then you should check both Intel and AMD unless you have a major preference, don’t forget the compatible motherboard and maybe a memory upgrade.

If you can research the type of processor you are buying you may be able to gauge if it is soon to be replaced for a newer series, which could mean the price of your upgrade would be lower as suppliers look to make room for newer stock.

If you are buying an older Processor series you may struggle to find compatible cpus, most suppliers will have a couple of the older type, otherwise you may need to resort to a used, b-grade or auction supplier.

Adopters Says

The telematics sensors on its rolling stock of vehicles capture data between every three and 30 seconds.

“Every two weeks, we get the equivalent of all the data we’ve accumulated in the last twenty years,” says Bill Powell, director of enterprise architecture for the Mt. Laurel, N.J.-based firm.

It’s a carousel of information: ARI can tell from its gyroscopic sensors if drivers are jackrabbiting from stops or slamming on their brakes; it can tell from engine sensors that they’re letting the engines idle too long.

One of the most intriguing and granular pieces in all these terabytes of data is the one that compares where a gas credit card was used, based on the geocode of the vendor, and where the vehicle was at the time. If the differential is more than 20 feet, an ARI audit can show that someone was fueling an unauthorized vehicle.

As that example shows, the internet of things (IoT) isn’t just about sensors and data, it’s about using data in context. That makes it an interdisciplinary challenge for IT executives, one that encompasses information technology, operations and business processes.

How can organizations develop and launch IoT initiatives that truly transform the business from the ground up? Computerworld spoke to a number of early IoT adopters, entities that have gotten their hands dirty in everything from manufacturing and logistics to smart cities and agriculture. Almost all report bumps along the way, but also say they have either achieved or anticipate significant payoffs from their investment. With IoT at last becoming a force in the enterprise, here are four lessons to heed.

The secret key to scaling up a data analytics

Many innovation leaders feel the same way. IDC predicts that the big data and business analytics market will grow well. that is up to 23.1%.

It’s compound annual growth rate from nearly $122 billion in revenue worldwide last year to $187 billion by 2019.

Most early adopters of big data and analytics tools are likely hoping to help their organizations become insight-driven enterprises. But they will face a number of challenges as they try to realize that goal, such as the difficulty of accessing the necessary data, the need for more powerful computer systems and the task of building enthusiasm among users for a technology whose value proposition has yet to be proved.

Here are some tales from the trenches, plus tips for scaling an analytics infrastructure.

The U.S. Environmental Protection Agency’s new chief data scientist likens the adoption of big data analytics at the agency to the early adoption of the iPhone in 2007. Those early adopters “didn’t know exactly what it was, but they wanted to use it because they perceived the value,” says Robin Thottungal.

What the pleasure and great of the internet experience

Do you know the hotest news of the gamer ? now we are introducing Pokemon go is the popular and famous game that you must try it if you like play the game. What the new one and hotest all about the internet, you can find here. just at the following pharagraph bellow.

Pokémon Go and virtual reality

Pokémon Go is a huge hit. But why?

The game is made by Niantic, a Google spinoff that previous published Field Trip and Ingress.

If Pokémon Go is a hit, Field Trip was a flop and Ingresswas a semi-hit. What accounts for the relative popularity of Niantic’s three apps?

If you’re unfamiliar with Field Trip, the app alerted you to facts about your current location. For example, it could notify you if you’re at the location of a famous movie scene or historical event.

Ingress, on the other hand, is a game like Pokémon Go in the sense that it’s location based and pits teams against each other. But Ingress is a vastly more complex game than Pokémon Go, with a long list of rules and strategy best practices to learn.

There are all kinds of theories about the radical popularity of Pokémon Go. But one way to look at all three apps is that Field Trip focuses on information, Pokémon Go focuses on experience and Ingress is a kind of hybrid of information and experience, and their relative popularity reflects the degree to which each favors experience over information.

Virtual reality

While mixed reality games and applications like Pokémon Go provide a “virtual experience” lite, full-blown virtual reality (VR) is explicitly and completely about creating “virtual experience.”

VR is assumed to be all about games. But games, and especially “first-person shooter,” “open world” and other game types are already highly experience-oriented. VR games will be great. But the real VR revolution will be in applications that replace information-intensive activities like reading, social networking and business communication with a “virtual experience” of “being there” and “doing that.”

Of course, we’ll always have more information coming at us than we could process in a thousand lifetimes. But the new world of “virtual experience” will give us more appealing and human ways to learn, communicate and play.

Live video

Live mobile video is taking the internet world by storm. It started with Meerkatand Periscope and now Facebook and Google are getting into the act. (Google’s live mobile video feature should hit YouTube any day now.)

Here’s a truism that vloggers, video podcasters, TV professionals and others know well: Whether you watch live or watch a recording, anything that’s broadcast live has a distinct quality that is very different from video with multiple takes and polished editing before broadcast. Live video has less of a packaged feeling and more of a “you are really there” vibe to it.

‘What it’s like’ headlines

Have you noticed the sudden rise in headlines that use the phrases “what it’s like” or “how it feels”? Here are thousands of examples from Google News.

This headline trend, which used to be rare, is clearly an attempt to hook a public craving experience, rather than information.

Traditionally, a standard news story might start with the headline: “California Woman Loses Home to Wildfire.” But the new headline style is: “What It’s Like To Lose Your Home To A Wildfire.”

It’s the same story, but to attract experience-craving readers on social media you have to promise a vicarious experience of events, rather than just information about events.

And the technique works. People now gravitate to “what it’s like” and “how it feels” headlines because people are increasingly repelled by information and attracted to experience.

Best and simple tips to ensuring security

1. Conduct security due diligence

Before you sign a contract with an MSP, ask a lot of questions about its security policies and procedures. In a recent blog post, Comcast’s Glenn Katz offered up no fewer than 37 questions to ask before signing a managed services contract, many of which focus on security. Questions include:

  • Where are your network and security operations located? If they are located offshore, what security and business continuity guarantees will the provider make?
  • What are your change control and documentation processes?
  • What network and physical security systems and protocols do you have in place?
  • How frequently are the security systems updated?

2. Verify compliance with security policies

In addition to simply asking what security policies a provider has in place, conduct an on-site audit to ensure proper oversight. The provider should allow you to inspect its data center and talk to the administrators who run it about how they provide security. This is especially true if you have government or industry regulations to comply with; you’ll need assurances that the MSP can meet those requirements. The right to conduct such audits should be written into your contract.

3. Ensure privacy requirements are met

Similarly, different industries and countries have stringent rules about data privacy, so you must be careful about where your data is physically stored. There is good news on that front, according to this blog post by Mike Wilkinson, VP Product Marketing at BroadSoft:

“Fortunately, cloud providers are increasingly taking note of these requirements. By securing data off-site while meeting country-specific data management requirements, cloud providers are stronger from a security standpoint than if a business relies on internal IT operations and on-premises data facilities.”

Secret Connect to Another Computer Using Remote Access Software

The technology to gain remote access to basically anyone’s computer is available on most computer users start menu. I regularly give my friends computer support from the comfort of my own home.

If you have Windows XP it has built in remote access software that helps you connect to a friends computer, by invitation, to help them by taking remote access control of their computer system. This means you could be in the USA and be helping your friend in Australia to find a solution to his or her computer problems.

What you need to use the Help and Support tool to gain remote access

1. An broadband or cable internet connection.
2. Windows Xp on both computers
3. An email address or be signed into Windows 4. Live messenger.

The easiest way to connect

It is very easy to connect two computers over the internet. One computer can take control and fix problems on the other computer. Following these steps to use the Help and support software that is built in to Windows.

1. Sign in to Windows Live Messenger and have your friend do the same thing.
2. Go to the start menu and choose Help and Support (shown below) Just the computer user that wants to invite does this.
3. The Help and Support Center will appear.
4. Click on Invite a Friend to connect to your computer with Remote Assistance. Located under the Ask For Assistance menu.
5. Then press Invite someone to help you. The window below will appear.
6. Choose your friends name from the Windows Messenger contact list.

7. Click on Invite this person.
8. This will allow your friend to see your desktop. If they want to control your they must press the Take control button and the other person must agree by pressing ok..

Check out the Screenshots for this article at How to connect to another computer. This is what I see when I am in control of my friends computer…I can go on the internet or read their emails etc..

Reasons to use Windows remote help and support

–Your problem is so minor, you do not want to bother an IT support person.

–You cannot afford an It technician, and your know a computer whiz..

–You have already rang software support or your internet service provider and they could not help

–You constantly need desktop computer help and using remote access software is easy!!

Now We Are Talk About Computer and Software Inventory

It is an application designed to help a network or system administrator keep track of the computers configuration and software that are installed on the network. Open Computer and Software Inventory Next Generation is a free software that enables users to inventory their IT assets.

It is also able to detect all active devices on your network, such as switch, router, network printer and unattended devices. For each one, it stores MAC and IP addresses and allows you to classify them. OCS-NG collects information about the hard- and software of networked machines running the OCS client program (“OCS Inventory Agent”). OCS can be used to visualize the inventory through a web interface. Furthermore, OCS comprises the possibility of deploying applications on the computers according to search criteria. Agent-side IpDiscover makes it possible to know the entirety of networked computers and devices.

If you find it anywhere else, note that ocsinventory.exe could be a virus, Trojan, worm, or spyware. (Scan your computer with an antivirus software to make sure it is not infected.)

Ocsinventory.exe has not been reported as a thread. However it is not guaranteed that your copy of ocsinventory.exe is totally safe. It is recommended to run a registry scan to repair corrupted registry entries.

CONTENTS OF OCS INVENTORY- NG

1. INTERNAL OPERATION

Server-The management server uses Apache, MySQL and Perl. OCS is multi-platform: it runs under Unixes as well as under Microsoft Windows (95 or later).Thanks to its very simple design and the use of mod_perl, server-side performance is very good. A modest machine can thus inventory several thousands of machines.

Agents-In order to collect the maximum of information possible, the agents are installed on the machines to inventory .Windows, Linux, Mac OS X, Sun Solaris, IBM AIXFreeBSD, NetBSD, OpenBSD

Web interface-An optional web interface written in PHP offers complementary services: consultation of the inventory user rights management an interface of breakdown service (or Helpdesk) for the technicians

2. EXTENSION

OCS Inventory can be used to feed the manager of GLPI and thus offers part of an IT asset management solution.

3. MODULARITY

Since version 1.0rc3, most of OCS Inventory functionality can be adapted or extended via a module system.

4. LICENCE

OCS Inventory is a free software published under GNU GPL v2. The developers are direct holders of the royalties.

5. FORK

In February 2010, a part of the team left the project to create Fusion Inventory. This fork aims keep the compatibly with OCS and to offer a better integration with other softwares like GLPI. To reduce complexity, the OCS UNIX agent has been ported to Windows and is the sole agent.

Best Antivirus Protection for Your Computer Systems

There is no denying virus, spyware, Trojan, adware, worms, and other different malicious threats have turned up as an epidemic for the computer systems around the globe. Unfortunately, being attacked by these malicious files is simply the part of the online world and millions people have to suffer from this problem every day.

Many individuals are the home users who are beaten up by the problem while many other are the business owing persons attacked by harmful programs. If you have not secured your computer system with the help of functional and upright antivirus program, you are likely to increase risks of being attacked by cyber threats. Ignoring the risks could be drastic to the computer’s life, performance, data and other activities. Therefore, security or protection of the system should be considered as prime concern. Here, the article puts light on some largely used antivirus programs to offer total PC protection-

Avast antivirus- In the world of antivirus, Avast has made a unique image to allure customers who get in touch with internet every day. With wide variety of packages and versions, it makes many choices for people who hold different perspective. Avast is a leading antivirus software provider in the world and it is indulged in the services for several years. The antivirus software, with latest version, assures to grab high-tech security to freely connect with the desktop, laptop, Smartphone and other peripheral devices. Ranging from the email scanner to huge range of configuration, the software gives the best experience.

Norton security- Norton is among a few very useful antivirus protection programs, which helps users taking all advantages of their desktops and laptops. Many companies offer Norton setup service for those who have problem installing the program in their system. Norton setup support is a great idea for those who don’t have time to get bothered by the problems. They can simply go for Norton.com/setup install to use the antivirus program to the fullest. Norton com setup gives product key to those who have forgotten it or missed it.

AVG protection- With strong customer base and award-winning image, the antivirus has been using by a large number of individuals. It assures for highly advanced protection during the time it runs on the computer system. Therefore, it basically guarantees for improved protection and experience with the systems. The scanning process of AVG antivirus program gas decreased time so that user can simply connect to the internet in just a few minutes. The security is available in various types of packages. User can easily contact to AVG antivirus support, in case of any problem.

McAfee security- McAfee is slowly developing the strong image in the market enlarging the customer base and trusted customers from all over the world. Reviewed as an ideal security alternative for the computers, the software is being liked by many customers every day. The best part what attract and force the users to be the part of this security software is that it offers excellent technical support to help the customers in any condition and time as well. If you are looking to buy the antivirus that cost reasonably, you must end up your search with this option of McAfee care for the computer systems. With additionally and advanced security features, the protection will surely please you.

Bit Defender- The antivirus software program has completed a decade in helping individuals around the world. It is considered to be ideal options for those who like spending some quality time on game and don’t like to get bothered by the popup. Apart from that, the software also offers excellent protection to keep the system safe and make the highly useful for the users. With increased effectiveness and popularity over the world, bit defender is constantly improving the image in online world. It successfully detects the threats and removes them effectively.

Do you looking for software patents

Today, nearly all of the people depend on computer technology for their business and commercial use. A computer works with the help of an amount of software programs. Today’s information system works together with software and hardware. Hence it is needless to say that that these can be called as your intellectual property. It is not only critical to the software world but at the same time to other businesses too. But the subject of software patents is always being surrounded by different controversies in United States along with other parts of the world, wherein you get to see people favoring or objecting over this issue. Despite being a controversial subject, special companies still wish patenting their dissimilar software programs seeking the help of patent attorneys. In this fashion they are able to have an entire ownership of their self created software programs without worrying much about their products being misused by any means or methods.

When you talk approximately the definition of software patent, it does not share any universally permitted definition. But the definition put forth by FFII (Foundation for a Free Details infrastructure), software right is considered to be a type of patent which is based on any performance of computer realized by means of a computer program. The basic factor why special lawyers keep themselves away from defining this term is because the software copyright applications do not have any kind of legal impact under the existing laws. Also in Europe the subject of software charter has similar story.

Now let’s talk approximately the purpose of software patents. As far as the United States is concerned, the purpose of patents is included in the constitutional clause which renders Congress the power which is to motivate the science progress and useful arts by giving the exclusive rights to inventors and authors to their respective discovering and writings. For additional facts you can refer to the Article one of constitution in the section 8 and clause 8. In European nations, no such definition is found; however, you find four dissimilar justification theories offered which includes the instance of Matchup in the year 1958. This also comprises the justice given to the inventor and gain for society by rewarding the inventors.

Here you need disclosure in the return in order to get the exclusive proper, whereas this disclosure can promote further development. However, the disclosure values shouldn’t be overrated where some of the inventions are supposed to be kept hidden as with patents as with independent inventions get exploited. Yet, in the current state it is regularly debated whether people gain or lose with software paten