Recent posts

I tried disconnecting and reconnecting the iPad from my USB port and it still is not recognized by iTunes. I used a USB Flash drive to make sure that my USB port was properly working, and it does; the problem is not my USB port. 

What else can I do?



Read more

Hi All,

How is cloud computing different from grid and thin client?

Can anyone explain this in detail



Read more

Not long time ago I installed linux's Fedora os on my netbook Samsung n150, everything was okay but the wireless card, i found drivers for my "atheros" wireless card and installed them successfully on my np150 but it says that it's disabled by the administrator, I am the administrator...



Read more

I have an pdf file and I want it to insert in an excel sheet. Can you help me what to do?



Read more

I have an Acer netbook, and have had it for a few months now. I use it for schoolwork as well as some downloading of music. It has worked great until recently. I only connect to the internet via wireless router, never through an ethernet cable. Lately, anytime that...



Read more

Every time I try to open my computer, the process goes smoothly and correct. But when I spend it with a couple of minutes my monitor suddenly turn to black and switches off.  I had been through with the technical troubleshooting like: check the power supply, video...



Read more

I have an HP Compaq Presario with a built in microphone and my PC is using Windows Vista ultimate as an OS. Every now and then I need to make urgent calls to my business partners and most of them complain that my microphone volume drops really low after...



Read more

In a Neural Network there are two methods that we can train the network. One of method is Supervised Training. To do that Training we can use the Delta Rule. This is one of Example that I had found.

Can anybody explain me how to find the...



Read more

Can someone answer what is "Dead Pixels" in display unit? Is it harmful?



Read more

When I was searching about the Public Key Encryption I found this diagram that explains about the Public Key Encryption process.

But I cannot understand what it will describe. So someone please describe me what is explaining from this diagram.



Read more