Computer users may want to use an Xbox 360 controller as a PC mouse for several reasons. Online games and PC versions of Xbox games have allowed users to play a wide variety of action filled, high quality games on their computer. However, these games’ functionality is restricted to the computer’s available hardware. This means that users are often required to use a computer mouse and keyboard to operate games that they would usually play with a joystick. In order to obtain the maximum level of control and ergonomic comfort Read More
Error 1606
Error 1606 commonly occurs when users attempt to install or upgrade Microsoft Office 2000 and 2003 products. The error may be a result of the computer failing to access the registry setting for “Administrative Tools, “ errors with an upgrade to Windows XP, or corrupted Microsoft Office files. In order to fix the error, it is necessary to conduct registry modifications and/or edits. In some cases, the error can occur if a third party registry cleaning application that is incompatible with the version and build of Microsoft Windows on the Read More
Blue Box
Blue boxes use a 2600hz tone to size control of telephone switches that use in-band signaling. The caller may then access special switch functions, with the usual purpose of making free long distance phone calls, using the tones provided by the Blue Box. To quote Karl Marx, blue boxing has always been the most noble form of phreaking. As opposed to such things as using an MCI code to make a free phone call, which is merely mindless pseudo-phreaking, blue boxing is actual interaction with the Bell System toll network. Read More
U.S. Drones
The U.S. drone program has seen significant press since the first Gulf War when the defenders of Faylaka Island surrendered to the Pioneer drone, or Unmanned Aerial Vehicle (UAV), flying spotting services for the USS Wisconsin (BB 64). Since that time, the technology powering U.S. drones has steadily improved now allowing the MQ-1B Predator and MQ-9 Reaper to conduct surgical strikes in addition to Intelligence, Surveillance, and Reconnaissance (ISR) missions. Other common U.S. drones being flown by the U.S. military and government include the RQ-4 Global Hawk, MQ-8 Fire Scout, Read More
DMX 512
The DMX 512 is a protocol based on RS-485 that is used to control both theatrical stage lighting and effects. The DMX 512 was developed in 1986 and revised in 1990. It is a standard developed by the Engineering Commission of USITT. Today the standard is also known as E1.11 or DMX 512-A. The DMX 512 is a common method for linking controllers and dimmers. It can also control more advanced items such as fixtures, fog machines and moving lights. It should be noted that DMX 512 should not be Read More
How to Copy Slides to Disk
If you have been enjoying photography for more than a few years, you probably have plenty of slides taken with analog cameras. Before digital photography, slides were a great way to view photos en masse. They were very small, making them light and portable and perfect for slide shows in homes, classrooms, and auditoriums. However, with the advent of digital photography and digital projectors, slides have lost their popularity and are slowing becoming obsolete. There are three main methods of digitizing a library of slides: Hire a professional to transfer Read More
break and continue Statements
break Statement The break statement is used to alter the flow of control. When a break statement is executed in a while loop, for loop, do-while loop or switch statement, it causes immediate exit from that statement. Program execution continues with the next statement. Common uses of the break statement are to escape early from a loop or to skip the remainder of a switch statement. The program written below demonstrates the break statement in a for-loop. When the if-statement detects that x has become 5, break statement is executed. Read More
How to Connect to Another Computer Online
Remote desktop is essentially an operating system utility, or individual software that permits users to access other computers within a network or through the internet, from another computer, laptop, smartphone, or any other internet-enabled device. In an office environment, various applications can be installed on a remote server, and users can login to the server via remote desktop and use the installed applications. This sort of set up enables users to work with applications without the burden of installing them on their own computer or laptop. This saves space and Read More
SIMM (Single In-line Memory Module)
A SIMM, or Single In-Line Memory Module, is a printed circuit board that is designed to hold multiple RAM chips at a time. SIMMs provide computers with additional RAM that could not be provided by a single RAM chip and allow for a tier-based memory system. While SIMMs have been widely replaced with DIMMS, or Dual In-Line Memory Modules, they are still commonly found in 32-bit personal computers and can even be used in 64-bit computers when two SIMMs are installed together. How SIMM Works SIMMs are available in a Read More
802.1p
802.1p is an IEEE standard that describes mechanisms to prioritize traffic and perform dynamic multicast filtering. Because of its support for priority specification, 802.1p is important for providing Quality of Service (QoS) for better reliability and quality. Quality of Service QoS is a mechanism that allows for better handling of data that passes over a network. There are two major types of Quality of Service (QoS) techniques, hard QoS and soft QoS. Hard QoS has a hard-set capacity reserved for certain types of service, while soft QoS just deals with Read More
Share on: