Thermal paste, also commonly called thermal grease, is a conductive substance used to form a seal between two objects to ensure a consistent and thorough transfer of heat. When installing a new heat sink on a computer, for example, you need to clean off the thermal paste residue from the previous heat sink and then add a thin layer of thermal paste onto the new heat sink before tightening it down. This process creates a seal between the hot body of the CPU and the metal of the heatsink where the heat can migrate more effectively than it could through an air gap.
Wednesday, 5 June 2013
RESOLUTION
Resolution is a designation of the number of discrete elements an electronic or printed image is comprised of. In the case of displays (both large displays like HDTVs and small displays like those found on smartphones), the resolution is generally described in terms of the horizontal and vertical resolution. An HD monitor or TV, for example, has 1920 pixels running from side to side and 1080 pixels running from top to bottom. Although when discussing computer monitors and displays it is common to refer to the horizontal x vertical pixel count (as in the previously described 1920×1080 monitor), it is more common to talk about smartphone and other small displays in terms of Pixels Per Inch (PPI), which is another way to describe the resolution with an emphasis on how many pixels are in a given area (and thus how sharp and realistic the image is).
When talking about print media, the designation used is Dots Per Inch (DPI), which describes the density of discrete marks made by the printing in a square inch. The higher the DPI the more realistic the image. DPI can range from as low as 50 Dots Per Inch when working with dot-matrix printers to as high as 1800 Dots Per Inch when working with modern laser and photo printers.
The Internet Control Message Protocol (ICMP)
The Internet Control Message Protocol (ICMP) is one of the core networking protocols used to run the Internet. ICMP differs from other transport protocols such as UDP and TCP in that it is not usually used to exchange data between systems but instead used as a diagnostic mechanism.
Typical ICMP messages indicate network and server states like that a host could not be reached, a router is down, or a service is unavailable. The vast majority of ICMP activity is completely hidden from the end user, although when performing network diagnostics users frequently interact with ICMP via tools like PING and TRACEROUTE.
RIPPING
Ripping is the process of converting audio or video from its native format to another format for the purposes of reducing the file size and/or re-encoding it to play on a wider variety of devices.
The origins of the usage of ripping in a technological context are unclear. Some sources indicate ripping was intended to indicate that the process ripped off the recording industry by copying albums, while other sources claim it references rip saws, wood working tools used to resize and reshape large pieces of wood much like a CD-to-MP3 ripping tool compresses large albums into MP3 player friendly sizes.
E-MAIL STORM
An email storm is when a very large volume of email messages are sent within a very short span of time. This has the potential to temporarily cripple both the sending and receiving mail servers. Although email storms may be generated by viruses that have gained access to user’s email clients (or even the email server itself), some of the largest mail storms have been generated by human error–typically when a mailing list is improperly configured and a single user is able to reply-all to tens of thousands of other list recipients.
Monday, 25 February 2013
The Ultimate Guide to Installing Incompatible Android Apps from Google Play
Android developers can restrict their apps to certain devices,
countries, and minimum versions of Android. However, there are ways around
these restrictions, allowing you to install apps marked as “not compatible with
your device.”
Note that these tricks are all unsupported by Google. These
tricks require fooling Google Play, and many require root. Some of these tricks
may not work properly, as Google doesn’t want us doing these things.
Why Are Apps Incompatible?
Android developers can restrict their apps in a variety of ways:
·
Some apps are marked as only being
compatible with certain phones or tablets. However, they may run just fine on
unsupported devices.
·
Other apps are only allowed to be
installed in certain countries. For example, you can’t install the Hulu Plus
app outside the USA, and some online-banking apps are only available in the
bank’s country.
·
All apps have a minimum version of
Android they require. For example, Google’s Chrome browser requires Android 4.0
or higher.
Bear in mind that simply installing an incompatible app won’t
necessarily make it work. Some apps may actually be incompatible with your
device, while other apps (like Hulu) will only work when used within the US (or
with a US VPN or DNS service like Tunlr.)
Note that you won’t see incompatible apps when searching via
Google Play on your Android smartphone or tablet. They just won’t appear in the
search results. You will see incompatible apps when searching on the Google
Play website.
Bypass Device Restrictions
Android devices include a build.prop file that identifies the
model of the device. if you have a rooted Android device, you can edit the
build.prop file and make your device appear to be another device entirely. This
will allow you to install apps that are marked as compatible with the other
device.
Note that you’ll need to be rooted to use this trick. We have
previously shown you how to easily root Nexus devices with WugFresh’s Nexus
Root Toolkit. The process will be different for other devices.
We have already described how to edit your build.prop file manually, but
there’s now an easier way. The new Market
Helper app allows you to spoof another device without editing your
build.prop file. It’s much easier, faster, and safer. (However, bear in mind
that it also requires root.)
This app isn’t available in Google Play, so you’ll have to grab
it from the developer’s website and sideload it. Once it’s installed, open the app
and you’ll be able to spoof a popular device like a Samsung Galaxy S3 or a
Nexus 7. You can then install apps compatible with that device. After you’re
done, you can restart your device and it will appear to be itself again.
Bear in mind that apps marked as incompatible may actually be
incompatible with your device, so some apps may not work properly after you
install them.
Tricks for Installing Country-Restricted Apps
Some apps are only available in certain countries. If you have
forgotten to install your bank’s app before travelling or you want to install a
video or music-playing app that’s not available in your country, you may be
able to fool Google into thinking your device is actually in another country.
We have used these tricks in the past to install US-only apps
from outside the US. However, none of these tricks worked for us when we tried
them while composing the article. It’s possible that Google is sure our account
is outside the US because we have paid with a non-US payment method on Google
Play. However, we have included these tips in the hopes that they may still
work for some of you.
If you do manage to install a country-restricted app, it will
become linked to your account, allowing you to install it on your other devices
without requiring any tricks in the future.
Use a VPN to Install Country-Restricted Apps
You can use a VPN to fool Google into thinking your device is in
another country. This may only work on devices without cellular connectivity,
such as tablets, as Google may use the cellular network your device is on as
its location.
Using a VPN doesn’t require root access. We have
previously shown you how to connect to VPNs on Android. If you need a free US
or UK-based VPN, try installing the TunnelBear app. TunnelBear only gives you a
certain amount of free data per month, but it should be more than enough to
install a few apps.
Goodbye BIOS, Welcome UEFI
Your computer's basic input/output system (BIOS) is about to
become history and be replaced by Unified Extensible Firmware Interface (UEFI).
Without compatibility problem, it has no pitfalls.
When you turn on your system, a primitive system that dates back more than 30 years, the basic input/output system (BIOS), turns your cold hardware into a functioning system that your operating system can then boot from.
So, what's really going on here? Is UEFI just a way for Microsoft and its most loyal original equipment manufacturers (OEMs) to keep Linux and other alternative operating systems out or is it more than that? To answer that question, let's have a look at what is UEFI.
What is UEFI
Hardware manufacturers knew that BIOS was obsolete even before the 21st century dawned. But, until recently they couldn't agree on how to replace it.
In 1998, Intel started work on the “Intel Boot Initiative” (IBI), later known as Extensible Firmware Interface (EFI). While Apple, in its Intel-based Macs, and HP, with its Itanium 2 servers, used it, the other OEMs and, needless to say, Intel's rival chip vendors, weren't initially keen on adopting EFI. In 2007, Intel, along with AMD, AMI, Apple, Dell, HP, IBM, Lenovo, Microsoft, and Phoenix Technologies, finally agreed to use UEFI (the re-branded EFI) as the universal replacement for BIOS. Even in a UEFI system there will still be a little bit of the BIOS in the firmware to enable UEFI itself to "boot" up.
The UEFI advantage
Don't mistake UEFI as being purely a BIOS replacement. It's not.
UEFI is a mini-operating system that sits on top of a computer's hardware and firmware. Instead of being stored in firmware, as is the BIOS, the UEFI code is stored in the /EFI/ directory in non-volatile memory. Thus, UEFI can be in NAND flash memory on the motherboard or it can reside on a hard drive, or even on a network share!
Even in a UEFI system there will still be a little bit of the BIOS in the firmware to enable UEFI itself to "boot" up.
The UEFI advantage
UEFI is a mini-operating system that sits on top of a computer's hardware and firmware. Instead of being stored in firmware, as is the BIOS, the UEFI code is stored in the /EFI/ directory in non-volatile memory. Thus, UEFI can be in NAND flash memory on the motherboard or it can reside on a hard drive, or even on a network share!
The UEFI advantage
Even in a UEFI system there will still be a little bit of the BIOS in the
firmware to enable UEFI itself to "boot" up..UEFI uses the GUID (Globally Unique ID) Partition Table, both to replace the
MBR and address partitions. With GUID, you'll be able to boot from hard disks
as large as 9.4ZB (zetabytes). How big is that? Well, everything -- and I mean
everything -- on the Internet is believed to be just over 3ZBs. I don't think
we have to worry about UEFI not being able to manage any drive it's likely to
run into anytime soon.
Can you imagine?! 30 years in the field of technology! Where
things are changed within 30 seconds BIOS are surviving for 30 years! How can
it be possible? Due to the compatibility problem this obsolete technology is
surviving for a long time. Now it is time to change and upgrade.
Hardware manufacturers are slowly replacing BIOS with the
Unified Extensible Firmware Interface (UEFI). That's all well and good, but one
UEFI feature, Secure Boot, could be used to lock PCs into being only able to
boot one operating system: Windows 8.
If you've computer hardware business, you know that BIOS has
been terribly back dated for decades. For example, a BIOS only has 1 MB of
executable space. That means a BIOS has trouble to start up the multiple
peripheral interfaces (USB, eSATA, ThunderBolt, etc.) devices, ports, and
controllers on a modern Computer. Just as annoying, the BIOS was never meant to
initialize more than a handful of devices so even if you can get all devices
ready to go it will take up to 30 seconds after you turn the switch on before
your PC is ready to start booting.
The
first thing you'll notice about UEFI systems is that they boot faster and you
can have even larger primary drives. The BIOS is unable to boot from hard disks
with more than 2.2 TB. That's a hard limit set in the Master Boot Record (MBR)
that you can't fix. In the BIOS MBR, the maximum space for a drive is determined
by the formula: 2 to the 32nd times 512 bits. This is an old hard drive
addressing scheme. What it means in practice is that all but the most
up-to-date computers can't boot with hard drives that are larger than 2.2TB.
With 3TB drives now becoming common, OEMs have no choice but to move to UEFI on
high-end PCs.
Subscribe to:
Posts (Atom)