• Gadget

    Use Gestures to Navigate in iPad

    App Switching

    Often, you are using one app but then want to switch to another, this does become a task if you are not aware of the gesture that you should be using.
    Here is how you can do it:

    •On the screen of your iPad you need to place your four fingers and swipe to right or left. This will help you slide your current app and reveal recently used apps. This gesture helps you move through apps quickly without having to manually move through slowly.


    If you want to quit app and return to Home Screen from your iOS device then use five fingers on the screen and pinch. This gesture works the same way as pressing your Home button.

    Another way of doing it is going to Settings->General-> Multitasking Gestures, to enable this option.

    Using App Switcher

    The best way to view all your apps is using the app switcher that gives thumbnail images of your recent apps. If you are wondering how to reveal the app switcher then you need not think more upon it, all you need to do is double-press on Home button to reveal it.

    You can scroll between apps by a swipe to left or right. This way you can switch between recent and switch apps easily. For removing an app that shows up in the list you need to tap the thumbnail and flick upwards.

    Another way of revealing app switcher is by using four fingers on the screen and swipe upwards. If you want to quit app switcher then use four fingers to swipe down and you will come out of it.

    Revealing Siri

    Press down your Home button for revealing Siri to instantly furnish voice commands and to ask questions. Remember to long press Home button for this purpose and when Siri appears in the centre screen just start speaking.

    Revealing Control Centre

    At times, when you are looking for controls you need to instantly fetch them. This is possible by revealing the Control Centre that can be done by swiping up from the bottom of the screen. You will be able to access options and settings including music settings, toggles, volume & brightness controls, sliders, playback and shortcuts for Camera apps and Timer.

  • Computer

    Remove Pop-Up Ads

    1. Your computer does not have anti-virus software, so upon installing new software, the ads got to be installed, too, and;
    2. When the ads pretend to be other type of software or programs so that you will be lured to download them, without knowing that they’ll just display ads.

    If your PC is bombarded by ads, don’t worry. Here are the things that you can do to fix the problem.

    • Uninstall pop-up programs. Click Control Panel from the Start Menu, click “Programs”, then choose “Uninstall a Program” and check out the list of programs that are listed there
    • Remove Ads from Internet Explorer. Click the Gear icon after opening Internet Explorer, click the “Advanced” tab, and then click “Delete Personal Settings” and click “Reset”. Then, close the tab, and open Internet Explorer once more, and you’ll see that the ads will be gone.
    • Remove Ads from Google Chrome. Choose the main menu of Google Chrome then select “Settings” on the drop down menu. Move towards the bottom of the page and click “Show Advanced Settings”, then move down and check “Reset Browser Settings” and click “Reset Browser”. Click “Reset” once more after the dialog box containing information about this process pops up. Take note that you may see a folder entitled “Old Firefox Data” on your desktop. It contains files that have not been copied upon resetting the browser. Check if you still need the said files, but if you do not, make sure to delete the folder, too, so that it won’t corrupt your PC.
    • Remove Ads from Firefox. For Mozilla Firefox, just click the “Menu” button, and then click “Help” and choose “Troubleshooting Information”. Click “Reset Firefox” then click “Finish” when a window pops up.
    • Download an Adware Cleaner. This way, you can get to rid your PC of any pop-up ads that haven’t been removed by uninstalling programs, or by working on the settings of different browsers, as mentioned above.
    • Install an Anti-Virus Software. If you feel like your anti-virus software is not working the way you want it to, make sure that you switch it up with another one. And don’t forget to let it run on start-up. Sure, it may take some time, but the point is, if you won’t let it check what you put in your computer, then it would be useless. You have to make sure that your PC does not get infected by virus, and won’t get access to software that will just install pop-up ads.
    • Run Malware Scans. And, it would also be nice if you make sure that you run malware scans so that you can get rid of pop-ups, malicious software, viruses, rootkits, and keyloggers that may just slow your PC down. Malware scans will also get rid of spyware which are caused by pop-up ads.
  • Technology

    Make Optic Cable

    To make the cables you need to have the necessary raw materials. For example, you need to have plastic or glass. You also need to have the cable making machine. To make the cable you should start by heating your raw materials (glass or plastic) at ultra high temperatures and then draw fibers at very high speeds (66 feet per second).

    When drawing out the fibers you should monitor them using mirometer. This is to ensure that the diameter is uniform from the start to finish.

    For the fibers to transmit data over long distances you need to ensure that they are highly reflective. You can easily do this by creating a mirror effect within the fiber. You do this by passing the fibers through ultraviolet ovens and coating cups.

    Once you have your reflective fiber with you, you should subject it to a number of tests to ensure that it’s in perfect condition. Some of the tests that you should subject it to include: refractive index profile, tensile strength, bandwidth, fiber geometry, attenuation, temperature dependence, operating temperature, and ability to conduct light underwater.

    It’s only after the fibers have passed these tests should you package ensemble them in a cable. You can make a cable with one fiber strand or with a number of strands. It all depends on the application.

    To assemble the cable you need to surround the fibers with a loose tube of PVC. This is to ensure that there is enough room for the cable to bend when being routed around corners.

    You should then cover the loose PVC with a layer of aramid yarn. The main function of the layer is to absorb shock. Finally, you should seal out moisture by installing an outer PVC jacket.

    For the optic cable to transmit data you need to connect it to optical transmitter and receiver. The transmitter converts analog and electrical signals into linear modulating light signals.

    The optical receiver on the other hand accepts the light signal and reformats the data into the original form.

  • Computer,  Gadget

    Fix an Inkjet Printer Error

    A printer needs to have a driver before it can communicate with the computer. If your printer lacks one, it can print erratically or not respond at all. Unfortunately, there are many things that can cause it to fail such as installation errors, corrupted files, viruses and malware, and others.

    How to Determine What Went Wrong

    Find out first if the file is where it should be. Use the windows explorer to find “C:/windows/systems32/drivers”. The Canon driver should be there.

    If the file is there but it’s not working, check for compatibility. You can go to Microsoft’s website and search for the article on program compatibility. Check whether your current printer is compatible with CNB_0301. If not, the website offers plenty of alternatives.

    If the driver is compatible but does not function, it could be corrupted. Read the next section for more instructions.

    Fixing the Error

    Putting the File in the Right Directory. The driver may not work if it’s not in the correct address. If the dll file is not in the Drivers folder of Systems32, use the search program to find where it currently is. Then, move it to the right folder.

    Reinstalling. You may have gotten a poor quality copy of the driver, or a mistake occurred somewhere in the installation process. Uninstall “CNB_0301” and reinstall it. If this doesn’t work, get another copy of the driver from a trustworthy source and install it.

    Virus Removal. A virus may be messing around with computer processes, including your dll driver. Use a reliable virus removal program to deal with the culprit.

    System Restore. Bring back your computer settings to previous conditions wherein the dll driver is still functioning. Go to All Programs, System Tools, and press System Restore.

    Fix Computer System Issues. Cleaning the computer registry may help with making the driver function better, since the registry is responsible for the correct functioning of computer processes. You can download a free registry cleaner or do the cleaning yourself. To do it manually, go to the Run command, and then enter “regedit”. Before proceeding though, make a backup for your registry files by clicking Export on the Registry Editor’s menu. Choose a filename and then save. Then, browse the registry folders one by one to see its contents and evaluate their usefulness. Remove old programs and applications that you no longer use or are found to be corrupted by the virus scanner. Doing these may lessen the impact of malfunctioning computer processes upon the driver.

    Using dll repair programs. Find downloadable programs that repair the CNB_0301.dll file specifically. However, make sure that the program you run is safe – see whether it is regularly scanned by computer protection programs or reviewed by users who have tried the driver repair program before.

    Use Windows Update. Your driver may be outdated. Search for services in your computer using the Windows search tool. Look for Windows Updates; if you don’t find such a folder, try searching for Automatic Updates. If the update function is disabled, Start it.

    Find other drivers. The Internet offers a lot of other drivers for printers so you won’t have to rely on the dll to make your printer work. Know the name and model of your printer and other specifications, type them in your search engine along with the word ‘driver’. You will find sites offering printer drivers for your specific type of printer.

    Look for a printer technician. The best and perhaps most expensive way to solve dll problems is to hire somebody who knows how to fix it. If you have the budget and using your printer is very important to you, go for this option.

  • Computer

    Computer Data Storage

    A bar code label is not only useful to computer storage users, but also the computer tape drives. This is because such bar code labels have both machine – and human-readable identifiers. If you have a tape library system, the machine readable identifier would serve a useful function in aiding proper management of tape cartridges within the system.

    It’s important to take note that most failures to restore and backup data originate from misuse or misunderstanding of this bar code technology. The data stored within your tape can become inaccessible if there is any failure in the label and format of your card code label system, application or library reader.

    Understanding The Tape Bar Code

    Bar code technology is certainly not a new thing, since it originated as far back as 1934. This type of technology is characterised by an encoding format that utilises a series of spaces and bars. Having such technology applied in tape automation has greatly enhanced management of tape cartridges. It helps in tracking of media within an automated system and even when handling the tapes physically.

    Additional labelling on tape storage cases may be necessary in offsite tape storage. Furthermore, newer technology is being developed to enable tracking exact locations of data cartridges through bar code labels, as well as verifying the correct media types.

    In reality, there exist well over 200 different forms of the bar code technology, which have differing applications. Such forms are referred to as symbologies. Here are two examples of such symbologies:

    • The Universal Product Code (UPC) is the most familiar symbology used on consumer merchandise. Such UPC labels are quite simple, though strictly formatted.
    • Code 39 (also called Code 3-of-9) is the symobology used in bar code labels for computer tape media. The symbology is self-explanatory, since for every nine elements it has three wide elements. An element is a black, non-reflective bar, but it can also be a white, reflective space.

    The Code 39 Symbology

    Apart from having the standard bars and spaces, an additional feature that the code 39 symbology has is an asterisk used as a stop and start character. You would not see this asterisk just by looking at the bar code label, since it is part of the machine-readable portion of the label. Such an asterisk feature helps bar code readers determine the correct direction of label characters, since stop and start characters have certain unique features. Due to this, there would be no risk of the label being read backwards.

  • Gadget

    Electronic Recycling

    Getting started with e-waste recycling

    After a certain period of time, every electronic device becomes obsolete and ready for recycling. The process of e-waste recycling is more complex than plastics or other common waste recycling. The job of an e-waste recycling process may involve collecting the e-wastes, sorting and dismantling them, and identifying those parts that can be reused in other machines.

    For example, if you have a non-functional CPU, its many valuable parts can be used as a replacement in other machines. The job of isolating the parts of e-wastes on your own is not recommended, because some electronic parts need special handling, in order to prevent possible accidents like poisoning.

    Choosing Recycling Company

    With the quick introduction of various kinds of digital products every nanoseconds, you can see a lot of recycling companies coming up all over the world. Before choosing a company, you must ensure that the company is strictly abiding environmental compliances. In addition to this, the company having ISO certification from regulating body is the best option to choose.

    Proper disposal of the stuff that cannot be used

    Recycling companies can recycle an electronic device more than 90 percent. Now the question is “what to do with the rest of 10 percent?”

    The parts remaining after recycling should not be disposed in landfills, as it is hazardous to nature and human life. For example, a lot of electronic devices contain mercury which is very toxic in nature and may create threat to the living.

    Although mercury is used in many things, an improper disposal may damage our environment. You should avoid dumping the waste in landfills to reduce carbon dioxide in the air. Therefore, you need to proper measures while disposing the rest of the parts.

    These days, more than 70% of the total waste produced everyday is an e-waste, which goes to dump sites. Therefore, the job of minimizing e-waste and preventing environment is greatly accomplished by hiring good electronics recycling companies. With a huge range of advanced recycling services, these companies can provide secure life as well as save our natural resources.

  • Computer

    URL Shorteners

    Advantages of URL shorteners

    They make links more manageable

    Many links are long and wordy for SEO reasons. Since they are long, they are usually very hard to share on emails, WebPages, and on social media platforms such as Twitter and Facebook. When the URLs are shortened, they become easy to share.

    That make it easy to track and compile click data

    Recent studies have shown that URL shorteners play a major role in providing data that shows the number of people who have clicked on a link, the most clicked link, and other information.

    The data collected is of great importance to webmasters and companies. This is because the information shows where the traffic is coming from and the things that people are most interested in.

    By collecting the data, webmasters and companies are able to develop products that are focused on the needs of the people.

    Make links have an aesthetic appeal

    Many readers on social media have short attention spans; therefore, you should get straight to the point when using the platforms. If you are using Twitter, using a long link will make your tweets appear cluttered and people will not be interested in reading your tweets.

    When you use a shortened URL, your tweets appear less cluttered which attracts people to read what you are saying.


    While shortened links are great especially in social media, you should be careful when using them. For example, you should be very careful when clicking on them. This is because they can lead you to a malicious website that can harm your computer or compromise your privacy.

    Another caution you need to take is to ensure that you use a shortening tool that is owned by a reputable company. This is because there are some tools that tend to change your link and replace it with another. Some tools also don’t convert the URLs properly.

  • Technology

    Technology Handle With Care

    Processed and Frozen food: Use fresh water, vegetables, fruits and other foods. That too, locally available food is the best for good health. Avoid and shun the processed and canned foods or drinks to the possible extent. The stored and frozen food always undergoes the chemical changes and becomes unfit for consumption.

    Genetically Modified crops: These might yield more food production and profit, but result in health hazards and environmental problems. Even the native plants and animals would become extinct. That’s why organic farming and its products are advocated of late.

    Chemicals and Pesticides: Constant inhalation of harmful materials and gases causes cancer. Such condition is induced when we get exposed repeatedly to the chemicals in the fruits and vegetables grown on plants and trees sprayed with pesticides. Intensive farming with fertilizers and pesticides has rendered the soil unfit for further cultivation while affecting the life of the native insects and predators. Refineries and chemical factories spew both air and water pollutants. The classic example is the Bhopal (India) gas tragedy due to the leak of poisonous gas from the Union Carbide factory that occurred in December, 1984. Chemical and biological warfare are employed killing several innocent lives.

    Electronic Goods: Radiation from computer monitors affects the regular user. Prolonged use of laptops is reported to have bruised the user’s thighs. The cell phones not only affect the health, but even kill if used while driving or walking on the road. An air conditioner causes sinusitis and respiratory disorders. Thanks to the television and the Internet, many people have become lazy in physical and mental activities. Steve Jobs, cofounder of Apple Inc., admitted in an interview that his children had restricted access to the iPad and the Internet as the overexposure would affect their natural growth.

    Nuclear Energy: After-effects of the reactor destruction and nuclear explosion are common knowledge. The Chernobyl nuclear disaster in Ukraine during April,1986 led to the spread of radioactive particles in the atmosphere of western USSR and Europe.

    Microwave tower: Mushrooming of the microwave towers used in telecommunication is reported to affect the health of people residing in their vicinity while birds like sparrows have disappeared.

  • Gadget,  Technology

    Google Glass

    The new app is built on SHORE (Sophisticated High-speed Object Recognition Engine) system. The SHORE started with just object-detection system on computers, however with time the system has developed into fine facial analysis system. The system has 91% and 94% success rate at picking out a user’s face and gender, respectively.

    While talking about the drawback of the marvelous innovation, privacy is a big concern here. Albeit Fraunhofer has stressed upon its privacy factors, which explicate that the data never leaves the Glass device and the app is unable to find out the identity of the people you look at; still there is a big loophole, as the app is able to do both of these things. It is just a matter of time that someone unwinds these features and enables facial recognition.

    Then again, there will be negative implications but on the whole the positive ones will outnumber them. One can argue even on its positive aspects. For instance, while waking in public, you can know if a person (potential mugger) is looking at you with aggression. Or it could tell you about the person who you are trying to find out in a confluence of people. So you know what would be its advantages.

    Agreed, that we cannot just forego the privacy concerns, but what we are missing is that the private agencies and different government agencies have already released wide-scale facial detection systems, so it won’t be wrong to say that the cat’s already out of the bag. The continuous corrosion of privacy via smartphones, internet and wearable computers is bit daunting, but imagine if the police forces can use the same technology for controlling the hideous acts and catching criminals; should we still be talking about the trivial issues that Google Glass will bring?

  • Technology

    Premium Cable Package

    Silicon Valley: Winner of this year’s Emmy for Outstanding Comedy Series, Silicon Valley features some of the smartest young comedians working today. With sharp writing, excellent pacing, and an experienced showrunner, this budding series is one to jump on quickly. Competing with other high tier cable favorites like Game of Thrones, True Detective, and House of Lies, Silicon Valley may have fallen through the cracks for some. By catching up and watching weekly, you’ll get to be the person in your group of friends who introduces everyone to what will quickly become one of their favorite shows.

    @Midnight: Hosted by Chris Hardwick, @Midnight is a comedic panel game centered around the most bizarre content the Internet has to offer. While there are no plot points to spoil, much of the content on the show is based on current events, and things that have recently gone viral. Remaining current with the show allows you to get the most out of the memes and videos that are used before they’ve left the public consciousness or been parodied into the ground. Beyond the topical nature of the show, what makes @Midnight must-see nightly TV is the interactivity of the show’s format. Fans are encouraged to play along on Twitter and other forms of social media, with the best and funniest contributions being displayed each episode. This show is more than just passive entertainment; it is a comedic experience in which you are encouraged to participate. Watch live every night, play along on social media, and get the most out of your viewing experience.

    Game of Thrones: The television event that has completely overwhelmed the zeitgeist is a force that cannot be ignored. To say the show is good is an understatement of epic proportions. No show in television history has attempted to cover this many converging and conflicting storylines, with so many important characters, and no clear indication of who will make it to the end alive. Season one taught fans that absolutely no character is safe, and the show has continued that tradition every chance it gets. With a show so full of shocking surprises and intense cliffhangers, the immediate, visceral reaction on social media is incredibly difficult to ignore. Even if you stay away from Facebook and Twitter, Game of Thrones has invaded the public consciousness to the point that other forms of media will spoil key plot points before your next DVD arrives in the mail. The surprise factor is one of the most important components of the Game of Thrones experience, and the only way to fully appreciate the journey is to buy a premium cable package and watch it live.