Wednesday, March 30, 2011

PaintShop Pro 9 problem sending the command to the program

Problem opening images with PSP in Windows 7, try this:

You click on an image file and ask it to open with PSP it asks for permission to run the command, say go ahead, and then you get:


  • a) a popup saying "There was a problem sending the command to the program" and when I click on OK

  • b) PSP opens but *without* the image I clicked on.

In Windows 7, double clicking on an image file that should open in PSP 9 will open the program with an error message but without the image on most machines. PSP 9 uses an old Windows system called DDE to pass the image to the program. DDE is still part of Windows 7, but is prevented from working by 7's tighter security.

One solution, is to disable UAC.

SECOND SOLUTION


  • (1) Open Regedit

  • (2) Go to the following string: HKEY_CLASSES_ROOT\Applications\Paint Shop Pro 9.exe\shell\open\command

  • (3) Change the "Default" entry to "C:\Program Files (x86)\Jasc Software Inc\Paint Shop Pro 9\Paint Shop Pro 9.exe" "%1"

  • (4) Delete the following string (which is immediately below the string you just edited): HKEY_CLASSES_ROOT\Applications\Paint Shop Pro 9.exe\shell\open\ddexec

  • (5) Exit Regedit

  • (6) Open a picture file as you typically would from windows explorer and it should open without error."


Computer Repair Lakeland, FL
863-521-1079
      


Monday, March 28, 2011

Jean Bartik

This week at Scientopia, I write about computing pioneer Jean Bartik, who sadly passed away last week.

Wednesday, March 23, 2011

Agent's Smith Registry

I have just discovered the joy that is comixed.com. This one is probably my favorite so far:

Image Description*: Panel 1: Neo says, "So you just keep duplicating
your program over and over? Aren't you afraid of registry errors?"
Panel 2: Agent Smith says, "Mr. Anderson...Do you honestly think that I would allow
there to be any errors in my system's regist.."
Panel 3: Hugo Weaving in drag with an outlandish orange and yellow costume.
Panel 4: Agent Smith (I think?) with white light coming out of his eyes.

While we're talking about The Matrix, I just stumbled across this video of a recreation of a scene from the film in Lego. I somehow missed it the first time around when it came out in 2009, so in case you did too here it is:



You can also watch the side-by-side with the original film. It's amazing. 




* From now on I'm going to try to make my captions more accessible to readers who are blind and/or visually impaired. Please call me on it if I forget!

Tuesday, March 22, 2011

Selecting a Trustworthy Pc Specialist




Home windows os's right now showcased the remote control support making remote control restore possible. This will save upon price and it is much faster compared to using a expert arrive to your house actually. The actual drawback from the procedure is actually it demands web connection and also the situation how the pc ought to trunk upward.





To begin the remote control program, get in touch with the actual computer restore organization, they will perhaps you have go to an internet site which allows the actual remote control system. This enables these phones access your pc, and also to focus on this on the internet just like although these were sitting before this; a great expert may clarify exactly what they are performing from every single stage, and when carried out correctly, may generally use a practical restore carried out very rapidly..







This can just function in case your pc hasn't any kind of equipment associated problems. Your alternatives are very restricted in the event that the issue is equipment dependent as well as you need to provide your pc to some support middle or even house support.





For your computer to some laptop computer repair center, you'll frequently just obtain the desktop computer by itself, not really the actual computer keyboard, computer mouse or even keep track of. The advantage of accomplishing this is actually how the computer restore company often offers far better functions or even more extras obtainable, also it risk turning to become less expensive when compared with computer expert going to on-site. It's also certainly simpler in the event that a few analysis software applications must be remaining working starightaway, because you won't end up being getting charged for that period it requires to accomplish this.





When the pc providers tend to be finished by way of a good on-site go to, there are many apparent safeguards you'll want to think about. If it's feasible, search for a number of critiques about the company and choose 1 which has a shop entrance too. Make sure to observe a few genuine IDENTITY prior to permitting the unfamiliar individual obtain access to your home as well as accessing all of your private info.





The great advantage of obtaining an individual on-site is actually that you just don't have to dismantle something, as well as you can observe exactly what the actual pc expert will. Becoming interested is definitely an benefit as well, because you may choose to create a comparable problem later on and you will restore your personal pc. The majority of problems tend to be more specialized although, therefore developing a great operating reference to some type of computer restore organization you are able to depend on, indicates you'll be able to phone all of them once again confidently.





It is absolutely no secret which we have been the key specialists within supplying laptop computer restore, trojan elimination, THIS assistance & set cost pc providers within Melbourne as well as Quarterly report in order to an average joe with regard to more than 8 many years. With regard to ideal pc restore support you might go to the laptop computer restore Melbourne for more information.


Friday, March 18, 2011

RSA hack - Trouble with a capital T

It seems RSA was hacked today. This means, if you use one of those nice little SecureID fobs to connect to your corporate server or bank, it may have been compromised.

This is a big deal. Using two-factor authentication is an industry gold standard, and RSA is one of the most prolific manufacturers of such fobs.

Securious has a nice write up of the fact vs. fiction surrounding the attack, including a note that this was an APT attack, not some random script kiddie in Germany.

I'm not trying to stir up panic here, but if you work with sensitive data, this might be a good time to add another layer of encryption on it*. There are lots of free solutions, like True Crypt, or if you're on a Mac the easiest thing to do is create a password protected disk image. Remember not to use the same password for your encrypted disk partition that you use for anything else (logging in, email, etc.). But also don't lose this password - if you do then your data is "irrevocably lost". Whee!

* Obviously all the "check with your (IT) doctor" disclaimers apply here.

Thursday, March 17, 2011

Finally, some useful internet activism

Great article in this Monday's Technology Review on different websites/apps set up to help people in Japan, such as Ushahidi, SparkRelief, and Hurricane Party.

I was happy to read about these efforts, and encourage you to participate with them and/or donate on your own.

For monetary donations, InterAction has a list of verified charitable organisations who are accepting donations, which also describes how they will use the funds. Definitely check InterAction or with the Better Business Bureau before donating - there are a lot of scams out there.

For non-monetary donations, you can donate frequent flyer milessocks, or send hopeful letters. (The sock guy mentioned letter writing as a thoughtful gift the Japanese will appreciate, which I think sounds like a great idea).

Strategies for Stopping Pc Infections




Pc infections may assault your pc anytime as well as if you don't possess any kind of computer virus safety set up you may be within difficulty. Computer virus can impact the information on your pc as well as damaged your own documents. In case your Macintosh or even laptop computer is actually suffering from infections you need to immediately look for assist from Macintosh restore Austin texas. Specialists possess the encounter as well as understanding to resolve a variety of pc difficulties and that's why it is best to believe in all of them. However prior to going get a laptop computer set from laptop computer restore Austin texas you need to discover a few methods to avoid infections later on. Knowing these types of easy computer virus safety methods it is possible to safeguard your pc very easily. Let us talk about a few of the techniques you should use to avoid infections on your pc. Make use of a Dependable Anti Computer virus





The very first thing you'll want to perform is actually obtain a dependable anti computer virus plan. Do the installation on your pc as well as revise this frequently. A great anti computer virus plan may instantly safeguard your pc through infections. Set up this particular software program before you decide to connect with the web simply because the majority of infections tend to be acquired through on the internet resources. Should you adhere to these pointers you will not end up being requiring laptop computer restore Austin texas at any time quickly. Prevent Dubious Web sites







There are plenty associated with web sites on the web and never remarkably many of them tend to be full of junk e-mail as well as infections. You have to prevent this kind of web sites simply because they can harm your pc as well as damaged your own documents. Usually a great anti computer virus plan instantly picks up this kind of web sites as well as notifications a person before you decide to login. Internet browser Configurations





Macintosh restore Austin texas specialists inform us which if you wish to prevent obtaining strike through infections you should look at environment your own internet browser protection configurations towards the greatest. The actual within constructed internet browser resources may notify a person whenever your pc reaches danger. E-mail Accessories





Based on Macintosh restore Austin texas specialists it is best to be cautious whenever starting e-mail accessories simply because more often than not e-mail include infections. You need to prevent e-mail which appear dubious as well as deliver these phones the actual junk e-mail folder. Back-up





Usually produce a back-up since you may shed your computer data when the pc will get suffering from the computer virus. Having a back-up in position you'll have some thing in order to drop back again upon as well as can create a recuperation. It is simple to safeguard your pc through infections with no assist through laptop computer restore Austin texas should you adhere to these pointers.





To learn more concerning Austin texas Pc as well as Pc Support Austin texas make sure you check us out from tristarcc. com


Tuesday, March 15, 2011

Channeling Ledisi

I've always been a big fan of Motown, so I was really excited to learn that for Black History Month the White House hosted a special Motown concert, broadcast by PBS last week. They had the greats - Smoky Robinson, Stevie Wonder,  and some newer musicians who are incredibly talented, like Amber Riley and John Legend.
The Supremes 

If you like Motown, check it out, absolutely worth an hour of your time. But the thing I want to highlight for this post is the difference in stage presence between two of the performers.

Now, keep in mind, this is a small venue, with chandeliers and pictures of George Washington in the background, an unusual repertoire for some of these artists (poor Seal), and a very lackluster sound engineer. Oh, and - performing in front of the Obamas. It's enough to make anyone nervous, even the big stars.

In the video, go to Chapter 9 (around 29:05), and watch and listen to a minute or two of Natasha Bedingfield's performance.

Now, skip back to Chapter 5 (around 15:14) and watch and listen to some of Ledisi's performance.

Spot a difference?

Ledisi is so relaxed in the music and the song and herself. She's not in any rush, she's not trying to be something she's not. She's just there, singing. As a result, I think the audience feels relaxed, and in sync with her.

I think this is something to aim for when interacting with people - when giving talks, interviewing for jobs, networking at conferences, teaching, whatever. When you're comfortable and at ease with yourself it shines through to others. The people who try too hard, you can spot them a mile away.

So my personal aim for the spring is to channel Ledisi. Because she's just made of awesome.

Monday, March 14, 2011

That Constructed the very first Pc




Nevertheless, within 1971, throughout a courtroom test it had been exposed which Doctor. Atanasoff, the physics teacher had been the actual creator that constructed the very first pc on the planet. Doctor. Atanasoff constructed their electronic pc, within 1937, whilst he or she had been operating from Iowa Condition University within Ames, Iowa to be able to resolve difficulties within quantum technicians. Doctor. Atanasoff's pc might carry out improvements as well as subtractions. This integrated equipment which backed 2 phrases (12-bit long) as well as utilized the reasoning device depending on 7 triode pipes in order to contact the actual regenerative storage. The actual assess presiding the actual test offered concern associated with creation in order to Doctor. Atanasoff. It's possible to rely on this particular consensus in order to solution queries for example that created the very first pc so when had been the very first pc created.





That Constructed the very first Pc "Who constructed the very first pc? inch, is really a query that's frequently requested. Feel the post to discover whenever as well as that produced the very first pc. These days, the life have grown to be determined by the actual computer systems. These types of processing devices possess infiltrated nearly every field associated with human being exercise exactly where regimen as well as repetitious duties could be paid towards the devices. These days, computer systems tend to be therefore sophisticated that they're overtaking sensitive duties in the people for example surgical treatment. For a lot of, you should understand that constructed the very first pc, the sweetness device from the twentieth hundred years. Nevertheless, this isn't simple, simply because it's a issue below challenge more than day associated with development associated with very first pc, title associated with it's custom as well as creator. Let us observe that created the very first pc, that recognized this with regard to the very first time as well as who had been acknowledged using the creation from the very first pc.







That Produced the very first Pc





Many people provide credit score in order to Charles Babbage, a good British mathematician as well as creator, with regard to arriving using the style from the very first mechanised pc. Within 1837, he or she launched the thought of analytical device that was effectively created as well as examined within 1991.





Moving with the info concerning the development associated with computer systems, you will discover fascinating in addition to contradicting details about the subject available. Within 1930, a number of organizations had been operating to make a device that may carry out automated information and it is pré-réglable. The beginning of the 2nd Globe Battle offered increase in order to these types of initiatives. During this period, creators for example, Joe Turing, from Bletchley Recreation area, constructed numerous vacuum-tube dependent processing devices associated with Colossus sequence that have been i did so information in order to split Hitler's conversation rules. IBM's Tag WE sequence that signifies electromechanical computer systems additionally do wartime information from Harvard.





Konrad Zuse's, associated with Indonesia, created the actual sequence UNCES electromechanical computer systems. Within 1941, Zuse constructed Z3 that utilized binary math as well as had been managed through applications. Within 1998, Z3 had been examined as well as discovered to become Turing total we. at the. a completely functional pc that utilized electromagnets.





From these types of initiatives in order to funnel devices in order to determine the actual trajectories from the canon covers, within 1946, arrived ENIAC (Electronic Statistical Integrator as well as Computer) that was hailed since the very first accurate all-purpose digital pc. It's theory creators Steve Mushily as well as T. Presper Eckert, had been regarded as, for a long period, since the creators that created the very first pc. ENIAC had been an extremely large device also it considered nearly 30-tons. It had been complicated device as well as used nineteen, 000 vacuum cleaner pipes as well as 6, 000 changes to complete the actual information. Through 1946 requirements, it's pace from add-on associated with 5, 000 amounts inside a 2nd, had been uncommon as well as unequaled with regard to. Nevertheless, the first type of ENIAC must be rewired to alter it's encoding due to the rigid structures.





Much more upon Earlier Computer systems





Within 1945, Steve von Neumann yet others think of a idea of stored-program pc. The idea targeted at developing a pc by having an structures which allows altering this program becoming performed within the pc without having changing the actual cabling. Additionally, it investigated the chance associated with arriving along with applications that may change its directions. In a nutshell, the actual Steve von Neumann as well as organization targeted at providing the flexibleness towards the computer systems as well as framing it's technology in order to it's existing type as well as condition.





Within 1948, Uk created very first operating prototype, that verified using the Neumann style, as Stansted Small-Scale Fresh Device (SSEM) that was also called "Baby". Nevertheless, the very first pc in order to put into action idea of saved plan, we. at the. Digital Hold off Storage space Automated Loan calculator (EDSAC), had been constructed from Cambridge College, within 1949. EDSAC had been then EDVAC that genuinely duplicated the actual processing device referred to through Steve von Neumann's document. The actual factor produced by the actual Neumann is actually huge because the current computer systems, nevertheless highly sophisticated, make use of some type of stored-program structures suggested through him or her.





Despite the fact that we all know how the computer systems created their own admittance nowadays within 1930s, seems like in the investigation how the guy offers chased the idea as well as attempted to understand this going back couple of 1000 many years. The outcomes associated with their labors is visible with the abacus, the actual slip guideline as well as Astrolabe. Greeks, close to eighty B . C ., utilized Antikythera system that was sort of a good astronomical pc. Al-Jazari, within 1206, created a good astronomical time clock that was referred to as the actual Fortress time clock. It had been utilized with regards to routing. Within the pc background, the actual Fortress time clock is actually regarded as the first pré-réglable analog pc.





Based on that from the systems you're helping, the solution in order to that constructed the very first pc differs. Additionally, it is dependent on which sort associated with pc a person concentrate on: mechanised, electromechanical or even digital. I am certain, following dealing with the info offered this short article, it is simple to solution that constructed the very first pc so when.





Organization: Toronto computers Tackle: 222 Spadina Method, Device # 116 THE Toronto, UPON -- M5T3B3 Squat signal: M5T3B3 Get in touch with individual: Fedrick Meat Telephone: 647-693-5036 E-mail: given. More info are available on the internet from:


Happy Pi Day!

Happy Pi Day!

Today is March 14th, or 3/14, and in geek culture we celebrate today as Pi day. Usually by wearing Pi T-shirts, baking pies, ordering pizza, and other such things.

I'm sadly too busy with deadlines and travel to cook, and don't own any Pi t-shirts, so instead I thought it would be fun to post some incredibly corny filk, complete with wonderfully punny pictures. Enjoy!


(cross-posted to Scientopia)

Friday, March 11, 2011

The Social Network

Due to circumstances beyond my control (a long plane ride), I watched "The Social Network". I didn't really want to watch it, but also sort of did, kind of like a train wreck. I also wanted to see sudo*-Matt Welsh's cameo teaching Operating Systems.

I was pleased that Hollywood got some of the technobabble correct (apache with a SQL backend), and I loved that the closeup of Mark's laptop showed it running *nix. I also thought it was cute they re-branded the iBook laptop as "Book".  

However, I was greatly displeased with how the film portrayed women. By my count, there was only one female character who was not: a flake, a flirt, a drunk, a girlfriend, or crazy - and she was a lawyer with hardly any personality depth. Why were there no female engineers, or CS majors? Or, heck, I'd even take an Art History major. Just somebody with some brains to accompany the legs.

I was also displeased with how Mark Zuckerberg was portrayed. I don't know the real Mark, but the director seemed really dedicated to employing the geek-with-zero-social-interaction-skills trope. Couldn't the actor have smiled occasionally? Been somewhat friendly now and then?

So, Hollywood, your scorecard is: B+ for suspending my geek disbelief, but an F for perpetuating stereotypes.


(*) Pun intended! 

Thursday, March 10, 2011

The actual Importance associated with Telephone Monitoring Software applications inside your Business




The greater content material your own ındividuals are, the greater most likely they're in order to continue being because your own client. Generating sure your own talk to center is actually fitted along with efficient phone checking software package created mainly with regard to growing customer enjoyment may genuinely create a substantial variance in between the positive as well as enjoyable understanding along with a damaging a particular.





Due to the actual growing requirement for a good prosperous method that may keep an eye on telephone calls, there are lots of types of software package created obtainable on the market. These kinds of software program that may notice telephone calls tend to be recognized to provide multi-channel overall performance, using the performance associated with strengthening a person as well as your company in order to maintain constant purchaser enjoyment as well as pleasure via customer particulars throughout the most effective funnel associated with discussion -- telephone. By giving your own make contact with middle agents along with option of just one specific talk to data source, your own client providers reps (CSR) can connect to your own customers throughout every contact degree consequently, leading to raised as well as improved make contact with center effectiveness as well as client enjoyment. lso are.







By means of this kind of software, you are able to utilize the customer-concentrated method which monitors phone calls, that within change can give your business all of the resources this needs to enhance really first-get touching quality for many unique types of customer difficulties. Ensure that the actual contact-tracking software applications for the get in contact with-monitoring plan is actually completely incorporated together with your client connection management plan to ensure that customer telephone calls result inside a substantially much deeper belief.





Just how can your own phone middle obtain in the features associated with phone checking software program to become built-in inside your phone monitoring method?





oIncident Administration Plan -- this lets you grab your own customer queries through keeping all of them inside a main data source. Additionally, the actual software applications assigns the unique research quantity in order to each and every client query, ensuring how the clients' problems don't drop among splits.





oAgent Help -- this helps your own agents every time they experience not familiar problems within adding using the software's knowledge bottom. After that it signifies quality info suitable towards the materials from the client's queries as well as inquiries.





oCase Management -- this materials your own make contact with center as well as entry collection assistance employees the power associated with looking after as well as prioritizing your own customer supplier inquiries as well as queries, in the preliminary degree of client get in touch with towards the main degree of quality.





oCustomer Fulfillment Research Software applications -- it'll have a suggestions management software program that may be built-in using the make contact with monitoring program. This particular allows you to acquire advantageous views out of your customers. Through obtaining this kind of views, a person will be ready to provide much more enjoyable customer encounter.





oIncreased Efficiency -- one of the the majority of important amounts in order to maintain inside your business happens to be becoming capable of enhance efficiency without any decreasing the client providers a person supply. By utilizing make contact with checking software applications inside your company, your own customer support brokers is going to be provided electrical power in order to effectively as well as quickly cope with purchaser queries, with out diminishing the great high quality associated with support. Along with brokers promoting help as well as procedure with regard to support-level contracts as well as offers, telephone monitoring software program can provide your own broker using the viewpoint they might require to supply your visitors the perfect phase associated with customer care.


Tuesday, March 8, 2011

The advantages of Video games Manual




Numerous video game fanatics ensure that they're not really left out along with recently launched video games. Nevertheless, you will find a lot of video games which are created every day and also the quick improvement associated with video games might depart a few gamers out-of-date. There's also numerous brand new video games within every class which and you'll waste materials additional time selecting exactly what you prefer greatest. How could you deal upward using the recently launched video games?





Some type of computer video games manual is really a comprehensive at the -- journal that may expose you to brand new as well as forthcoming games. Through using this manual, you are able to find out about brand new video games at length to ensure that it's not necessary to undergo every online game as well as perform their own free trial offer..







You will find free of charge instructions obtainable all around the internet nevertheless, you nevertheless have to be cautious regarding going to a few websites because there might be concealed infections. Some type of computer online game manual might supply expensive demonstration variations from the brand new video games. The majority of instructions tend to be usually equipped along with brand new as well as total details about the actual video games.





Video games manual includes the next:





-- An in depth tale manual





-- THE digital walkthrough from the areas of the overall game





-- Methods to a few difficulties to become experienced





-- Roadmaps





-- Rules in order to phases





-- Evaluations through popular avid gamers





-- Wikis as well as secrets and cheats





-- Forthcoming video games





-- Information





-- Movies





-- Podcasts





-- Genuine online game websites





Numerous video games have to be performed masterfully as well as online game instructions are supplied to assist the actual gamers to advance by giving suggestions as well as secrets and cheats in order to conquer the following hurdle. Among the significance associated with video games manual is perfect for a game title that drops inside a class known as the actual concealed item bigger picture experience. Should you perform a game title along with concealed items as well as you've got a difficult period searching for a few points, the overall game manual may show priceless, since it offers concealed rules therefore that you will be prosperous inside your objective.





Some type of computer video games manual additionally offers methods or even roadmaps that may be associated with excellent assist when you're screening a game title by yourself prior to purchasing this. A person simply need to obtain your chosen online game from the genuine online shop after which place the actual signal distributed by the actual manual. The actual manual may stipulate that phase or even degree it is possible to make use of the actual signal.





The primary objective of the video games manual is perfect for a person every single child create a smarter option with regards to purchasing computer video games.





Study much more evaluations as well as details about obtain video games for the pc go to: My personal Download free Video games


Friday, March 4, 2011

Signal Boost: TechWomen is Seeking Mentors

TechWomen, a new initiative sponsored by the US State Department, is looking for Mentors. Here's an excerpt from the Anita Borg Institute press release:
Palo Alto, CA, March 1, 2011 — The U.S. Department of State’s TechWomen initiative is now accepting cultural and technical mentors for its cutting-edge international exchange program that will bring the power of global business, technology, and education together to empower women and girls. TechWomen will pair female mentors from Silicon Valley with 38 women from communities with predominantly Muslim populations. These “TechWomen” will participate in a professional mentorship and exchange program at leading technology companies beginning in June 2011. Mentor applications are open until March 25, 2011; access the application for both technical and cultural mentors here. TechWomen is a public-private partnership in conjunction with the Anita Borg Institute for Women and Technology and the Institute of International Education.
If you're interested in participating, you can learn more about the program here. It sounds like it could be a lot of fun!

Tuesday, March 1, 2011

Dangerous by Design

I recently read this article, which describes hundreds of infants (and adults) mistakenly being over-radiated in hospitals.

Like others who were interviewed in the article and those who commented on it, I too am shocked and outraged. But not for the reasons you might think.

The problem is the manufacturers of this machine violated one of the most central tenants of systems design, and that is:
The system should be designed to help the user prevent errors
These CT scanners are clearly not well-designed to help radiology technicians avoid making mistakes. It should be difficult, not easy, to overdose an infant. There should be a scale on the exam table - if the patient is below a certain weight the radiation level will be limited, and only by entering an override code can that the dose be increased.

The system should run through a step-by-step procedure with the technician, requiring them to verbally say, "Yes, I have properly positioned the infant." "Yes, I have shielded them." etc.

Really, very simple stuff - but could help prevent an avalanche of errors.

I agree that increased licensing / re-certification of techs is also a good idea, but they still need to be using  systems designed to help them make fewer errors in the first place.