Monday, November 27, 2006
live.com blog
Yesterday, we released a small update to Live.com, intended to fix a number of bugs and improve the overall experience. While there aren't too many drastic changes that you can see, a number of items are worth calling out:"
n.b. This blog gives the latest info for Live.Com and can also be subscribed.
A Few Scanning Tips
The purpose is to offer some scanning tips and to explain the basics for photos and documents. It is about the fundamentals of digital images, about the basics to help you get the most from your scanner. How it works, for those that want to know.
Saturday, November 25, 2006
Folding Socks
2/27/07 Please note that this link is not currently working. The original page might have been removed.
Monday, November 20, 2006
Basics of Digital Camera Pixels
Every digital image consists of a fundamental small-scale descriptor: THE PIXEL, invented by combining the words "PICture ELement." Just as how pointillist artwork uses a series of paint blotches, millions of pixels can also combine to create a detailed and seemingly continuous image.
n.b. This is a great article -- very informative. ~Wendy
Megapixel overview chart
This chart also offers different camera brands and cell phone examples.
Megapixel Calculator
Megapixel Calculator - digital camera resolution web.forret.com
Blog definition
The term 'weblog' was coined by Jorn Barger on 17 December 1997. The short form, 'blog,' was coined by Peter Merholz, who jokingly broke the word weblog into the phrase we blog in the sidebar of his blog Peterme.com in April or May of 1999.[3][4][5] This was quickly adopted as both a noun and verb ('to blog,' meaning 'to edit one's weblog or to post to one's weblog')."
Sunday, November 19, 2006
Saturday, November 18, 2006
Internet Security
The Basics Of Internet Security
Besides not corresponding with convicts imprisoned for violent crimes, what are some other precautions you should take to protect your physical security and safety when you use the Internet?
• Use your primary e-mail account only for your close circle of trusted friends, relatives or colleagues. A simple search for your Internet service provider or business can trace you to a geographical area, and from there it is an easy matter for someone to find you through the telephone listings.
• Use another e-mail account, such as the many free ones available, for online activities such as chats or newsgroups.
• Choose a gender-neutral and non-provocative name for your online socializing. Don’t identify yourself as a woman, because more than 90 per cent of cyberstalking victims are women.
• Don’t fill in the personal information profiles for e-mail, chat and messaging accounts.
• Use filters to block unwanted e-mail and instant messages. Do not open creepy-looking e-mail and do not open unexpected attachments. At the least, your computer data could be damaged by a virus.
• Be careful what websites you visit. Even a quick peek at offensive material can bring nasty e-mails to your desk.
• If you are harassed or threatened online, take the situation seriously. Online arguments have escalated into physical confrontations. Most cyberstalking cases involve strangers who first connected online. Report the problem to the system administrator at your Internet service provider and that of the person who is bothering you. Contact the police if the harassment continues and you have concerns about your physical safety, as in the case of a stalker who seems to know where you live.
• Don’t keep personal information such as PIN numbers, your home address or security codes on your computer where a hacker, burglar or co-worker can find it. If you use a laptop, think what could happen to the information on it if someone picked it up at an airport or from a taxicab.
• Search for yourself on the Internet to see what others can find out about you. Start with a metasearch tool such as Dogpile.com. Also look on people-finding Web pages such as 411.com. Besides finding a bunch of people with the same name as you, you may learn how easy it is to track you down.
Computers, cell phones and other electronic communications devices are not necessarily private. Embarrassing e-mail messages have wrecked careers. So have careless cell phone conversations. To be on the safe side, assume you are not anonymous when communicating electronically. Think about the consequences if someone else — your employer, a member of the news media or a criminal — were to listen in. And take care with security devices such as identification badges, lock cards and old-fashioned keys so they will not be borrowed, stolen or copied.
Many beautiful friendships have started online and blossomed in person. But think twice before arranging to see someone you have met online, even through your work.
Friday, November 17, 2006
Movie maker movie
From a Canadian Cadet to an American Soldier: My son wears combat boots#links
Thursday, November 16, 2006
Google bombing
To understand how a 'google bomb' works try a google search on 'miserable failure'. Today the search returned the official government page for George W Bush as the top search item. Bombs generally have a 'burn out' time.
Add-Ons for Microsoft Internet Explorer
Monday, November 13, 2006
Microsoft Photo Story 3 for Windows
Capture memories
Create slideshows using your digital photos. With a single click, you can touch-up, crop, or rotate pictures. It's that easy!Bring photos to life
Add stunning special effects, soundtracks, and your own voice narration to your photo stories. Then, personalize them with titles and captions.Share your stories
Small file sizes make it easy to send your photo stories in an e-mail. Watch them on your TV, a computer, or a Windows Mobile–based portable device.
Burn DVDs with extra Sonic plug-in.
See it in action Need inspiration? Check out these stories created with Photo Story 3.
Thursday, November 09, 2006
Yahoo! 360
Myth #1: Blogging is time-consuming.
False. Take as much or as little time as you like.
Myth #2: Anyone can peek.
Nuh-uh. Only you decide who sees what's on your Yahoo! 360º page.
Myth #3: Deep thoughts are mandatory.
Again, incorrect.
Wednesday, November 08, 2006
Downloading and installing software
Introduction
Zip files
Exe files
Warning!
Downloading a file from the web
Installing software
Dealing with *.exe files
Self-installing *.exe files
Dealing with *.exe files that do not self-install
Dealing with all *.zip files
Installing the program "
Tuesday, November 07, 2006
Basic E-mail Etiquette
Photography Printing Guide - DPI vs PPI
Even though 'dots per inch' (dpi) and 'pixels per inch' (ppi) are used interchangeably by many, they are not the same thing. Traditional printing methods use patterns of dots to render photographic images on a printed page. While pixels on a monitor are square and in contact with the adjacent pixels, printed dots have space between them to make white, or no space between them to make black. Color photographs are printed using four inks, Cyan, Magenta, Yellow, and Black (CMYK), and four separate dot patterns, one for each ink. Dots per inch (dpi) refers to printed dots and the space between them, while pixels per inch (ppi) refers to the square pixels in a digital image. Keep in mind that many companies will ask for images at 300dpi when they really mean 300ppi."
Photo print size charts
This chart gives a good idea how big you would be able to make photo quality prints in ratio to the megapixels of your camera. It also has information on scanned 35 mm photos and resolution.
Sunday, November 05, 2006
Photoshop Tutorial
Photoshop Tutorial