24.10.14

Using keywords to refine a windows explorer search

If you want to filter on a property that doesn't appear when you click in the search box, you can use special keywords. This typically involves typing a property name followed by a colon, sometimes an operator, and then a value. The keywords aren't case sensitive. 


Example search term Use this to find
System.FileName:~<"notes"
Files whose names begin with "notes." The < means "begins with."
System.FileName:="quarterly report"
Files named "quarterly report." The = means "matches exactly."
System.FileName:~="pro"
Files whose names contain the word "pro" or the characters pro as part of another word (such as "process" or "procedure"). The ~= means "contains."
System.Kind:<> picture
Files that aren't pictures. The <> means "is not."
System.DateModified:05/25/2010
Files that were modified on that date. You can also type "System.DateModified:2010" to find files changed at any time during that year.
System.Author:~!"herb"
Files whose authors don't have "herb" in their name. The ~! means "doesn't contain."
System.Keywords:"sunset"
Files that are tagged with the word sunset.

System.Size: <1mb
Files that are less than 1 MB in size.

System.Size: > 1gb
Files that are more than 1 GB in size.

Link: http://windows.microsoft.com/en-us/windows7/advanced-tips-for-searching-in-windows

23.10.14

Emulierter Raspberry Pi unter Windows

Mit dem Emulator-Paket für Windows kann man ohne Installation, Konfiguration und Anstöpseleien weiterer Hardware sofort erste Schritte in der Welt des Raspberry Pi unternehmen – ohne tiefer gehende Linux-Kenntnisse. Dazu genügt es für den Anfang, das Archiv zu entpacken und die Datei start.bat auszuführen. Der Emulator Qemu öffnet ein Fenster und startet das Raspberry-Image (Raspbian). Im Fenster lässt sich der Bootvorgang des Pi verfolgen – etwaige Fehlermeldungen kann man getrost ignorieren. Das Hochfahren nimmt einige Zeit in Anspruch, der emulierte Pi läuft selbst auf schnellen Rechnern sogar etwas langsamer als ein echter Raspberry.  

Heise.de Link

Quantum Physics and the Microscopic Universe Documentary

Quantum Physics (Theory) & Microscopic Universe - Laws of Quantum Mechanics

5.10.14

CodeBlocks: one of the best IDE for Arduino

CodeBlocks Arduino IDE is a customized distribution of the open-source Code::Blocks IDE enhanced for Arduino development. It provides more demanding software developers with everything a modern IDE should have including code foldering, code completion, code navgiation, compiling as well as uploading for Arduino. With a dedicated project wizard, it’s easy create a ready-to-go Arduino project. The distribution integrates latest Arduino core files, standard Arduino libraries, AVR toolchain, Arduino Builder, a serial terminal and most interesting, an API-level Arduino simulator (under development).


Other alternatives can be found under http://playground.arduino.cc/Main/DevelopmentTools

Oracle's VirtualBox as Portable Application

With Portable-VirtualBox you can run VirtualBox as portable application. It is a free and open source software tool that lets you run any operating system from a usb stick without separate installation.

http://www.vbox.me/
More info from com-magazin.de (in German)
Ready to use Windows OVAs (VirtualBox files)

1.7.14

How to get rid of insufficient storage available error on Samsung Note I

By opening the SysDump with the special code 

  1. Open the "Phone" app and switch to Keypad.
  2. Dial *#9900#
  3. On the screen "SysDump" appears with some buttons, click on the button labelled "Delete dumpstate/logcat".
  4. Do not forget the exit SysDump with "Exit" button at the end.
(Source:  http://stackoverflow.com/questions/16818049/...)

29.6.14

Windows 8.1 WLAN Hotspot Access Point with board instruments

Windows has with netsh command very useful instruments to enable a laptop or desktop WLAN hotspot to share internet access with tablets, smartphones or other laptops.

("Internet Connection Sharing" must also be enabled for the selected adapter.)

Here is the description of the netsh hosted-network description:
 
C:\WINDOWS\system32>netsh wlan set hostednetwork
One or more parameters for the command are not correct or missing.

Usage: set hostednetwork [mode=]allow|disallow [ssid=]

                         [key=]
[keyUsage=]persistent|temporary

Parameters:

    Tag             Value
    mode            Specifies whether to allow or disallow the hosted network.
    ssid            SSID of the hosted network.
    key             The user security key used by the hosted network.
    keyUsage        Specifies whether the user security key is persistent or
                    temporary.

Remarks:

    This command changes the properties of hosted network, including: SSID
    of the hosted network, allow or disallow the hosted network in the system,
    and a user security key that is used by the hosted network.


    The user security key should be a string with 8 to 63 ASCII characters,
    eg. a passphrase, or 64 hexadecimal digits which represent 32 binary
    bytes.


    If keyUsage is specified as persistent, the security key will be saved
    and used when the hosted network is started again in future. Otherwise
    it will be used only when the current or next time the hosted network
    is started. Once the hosted network is stopped, the temporary security
    key will be deleted from the system. If keyUsage is not specified, it
    is persistent by default.

    This command requires administrator privileges to allow or disallow the
    hosted network.

Examples:

    set hostednetwork mode=allow
    set hostednetwork ssid=ssid1
    set hostednetwork key=passphrase keyUsage=persistent


You can combine the parameters in one command.
The following shows a sample usage in order:

1. Settings for WLAN hotspot 

netsh wlan set hostednetwork ssid=myLaptop key=mySecretKye93 keyUsage=persistent

2. Start hosted-network

netsh wlan start hostednetwork

3. Check the status

netsh wlan show hostednetwork

4. Stop hosted-network

netsh wlan stop hostednetwork

7.6.14

Robocopy GUI: Yarcgui

Robocopy (Robust File Copy for Windows) is a very strong tool, which integrated in Windows since Vista. But the tool has lots of parameters which makes it a bit difficult to use. 
Yarcgui, which stands for "Yet Another RoboCopy Graphical User Interface", is a freeware tool to start the Robocopy in a graphical user interface with context helps and so on.

http://yarcgui.wilkes.es/

AntiVirus Rescue Systeme

  1. Avira Antivir Rescue System
    http://www.avira.com/en/download/product/avira-rescue-system
  2. Kaspersky Rescue Disk
    http://support.kaspersky.com/viruses/rescuedisk
  3. AVG Rescue CD
    http://www.avg.com/ch-de/avg-rescue-cd 
Rufus installiert die drei Antiviren CDs auf einem USB-Stick
http://rufus.akeo.ie

Zuverlässigkeit Prüfen in Windows 8

Die Zuverlässigkeitsüberwachung wird mit "perfmon /rel" gestartet. Es öffnet sich ein Fensterm in dem die Zuverlässigkeit und Problemverlauf nach Tagen oder Wochen aufgelistet werden.


Dschungel Kompass

Der Mobile Tarifrechner von dschungelkompass berücksichtigt Abos und Prepaids von 16 Anbietern auf dem Schweizer Markt. Als einziger Telekomvergleichsdienst der Schweiz vergleicht er für dich alle Kosten für das Telefonieren, mobile Internet und SMS innerhalb der Schweiz, ins Ausland und fürs Roaming, inkl. den verfügbaren Zusatzoptionen für Abos und Prepaids auf einmal. Zusätzlich können auch Mobiltelefone zum Vergleich ausgewählt werden, um das günstigste Angebot ausfindig zu machen. Neu bieten wir einen Festnetz-Tarifvergleich an, der die Einzel- und Kombiangebote zu Internet, Telefonie und Digital-TV vergleicht.


http://dschungelkompass.ch/index.xhtml

 

Standorte von Sendeanlagen in der Schweiz

Auf einer Übersichtskarte des BAKOMs (Bundesamt für Kommunikation) lässt sich gezielt nach einzelnen Standorten suchen. Zu jeder Sendeanlage gibt es Infos über die Leistung und die Art der Antennen.

http://www.bakom.admin.ch/themen/frequenzen/00652/00699/index.html?lang=de

(Statische Karte von BAKOM: http://map.geo.admin.ch/)

10.3.14

GodMode in Windows 8

Just by creating a new folder on desktop and renaming it to

GodMode.{ED7BA470-8E54-465E-825C-99712043E01C}


When you double-click that folder you will be taken to a very long list of control panel settings and configuration wizards, separated into sections.


http://www.techrepublic.com/blog/windows-and-office/quick-tip-invoke-god-mode-to-take-control-of-settings-in-windows-8/7456/

3.2.14

Online Barcode Generator

This is one of my favorite websites to create nearly all kinds of contemporary barcodes in order to test on your environment:

http://www.barcode-generator.org/


http://www.barcode-generator.org/

28.1.14

Move Microsoft SkyDrive folder location without re-downloading all files

Microsoft SkyDrive is an awesome service and the recently released desktop synchronisation application makes keeping all of your files with you and up-to-date a breeze.

When you first install SkyDrive it prompts you to select the folder location in which to store your files. But what happens if you want to change that location down the track? The application itself doesn’t currently have that functionality (i.e. until Windows 8.1 was released!).

More on http://maxshifman.com/2012/08/move-microsoft-skydrive-folder-location-without-re-downloading-all-files/?q=2012/08/30/move-microsoft-skydrive-folder-location-without-re-downloading-all-files/

21.1.14

Sitzungen effizient gestalten - darauf kommt es an


Paper Computer in Namibia

So how do we teach students how to program, if we have schools in Namibia that do not even have electricity, never mind a computer lab or Internet connectivity?

Easy – we create a computer that doesn’t need all that. One you can use anywhere – and which is portable and easy to use as a sheet of paper.


Based on a 30 year old concept of a “paper computer” developed by Wolfgang Back and Ulrich Rohde it consists of really nothing more than a sheet of paper that contains both the program as well as a number of data registers, and requires as additional tools only a pen or pencil (even a twig will do) and some matches that will be used to represent the contents of the data registers.



More on Edunet-Namibia

Sources:
ComputerClub 2 on WDR http://www.cczwei.de/https://www.youtube.com/computerclubzwei
Paper Computer in PDF http://edunet-namibia.org/wp-content/uploads/delightful-downloads/2013/05/KnowHow-Computer.pdf

20.1.14

Sosyal Medyayı Anlatan Güzel bir Dizi: Black Mirror

Black Mirror sosyal medya ile ilgili bu zamana kadar yapılmış en iyi yapım. 8.7 IMDB puanına sahip olan dizinin ilk sezonu 2011 yılında çekildi. Her sezon 3 bölüm ve toplamda 6 bölüme sahip olan yapım sosyal medya, internet, mobil uygulamalar, sosyal medya ve siyaset ve sosyal medyanın geleceğini işliyor.



Kaynak: http://www.sosyalsosyal.com/sosyal-medyayi-anlatan-en-iyi-3-yapim

19.1.14

10.1.14

T-SQL with Stuff

The STUFF string function inserts a string into another string.  It deletes a specified length of characters in the first string at the start position and then inserts the second string into the first string at the start position.
It is very useful while generating a Comma-Separated List in a TSQL with the "XML Path" functionality.

For example, following query selects all Invoice-Numbers and the Invoice-Numbers + the status of those invoices of an order:

SELECT  
ODA_SUP_ID,  
ODA_SUPPLIER_NAME,  
ODA_CURRENCY_CODE,  
(SELECT  
    STUFF  
    (  
        (  
        SELECT ', ' + invoice_num AS [text()]
        FROM DOCS
        where order_num = PM_ORDER_DATA.ODA_ORDER_NO
        ORDER BY invoice_num
        FOR XML PATH ('')  
        ),1,1,''  
    )
) as Invoice_Numbers,
(SELECT  
    STUFF  
    (  
        (  
        SELECT ', ' + invoice_num + ': ' + status_index AS [text()]
        FROM P2P.dbo.DOCS
        where order_num = PM_ORDER_DATA.ODA_ORDER_NO
        ORDER BY  invoice_num
        FOR XML PATH ('')  
        ),1,1,''  
    )
) as Invoice_Numbers_Status

        
FROM PM_ORDER_DATA


Sources:
http://technet.microsoft.com/en-us/library/ms188043.aspx
http://www.sql-server-helper.com/tips/tip-of-the-day.aspx?tkey=3934817c-1a03-4ac9-a0ba-55b2bfbaea0f&tid=72&tkey=uses-of-the-stuff-string-function

8.1.14

Scale of the Universe

What does the universe look like on small scales? On large scales? The Flash animation shows this interactively.




http://cosmos.webbii.net/

7.1.14

Online App Studio from Microsoft

Windows Phone App Studio lets you swiftly build apps in just four steps for immediate publishing, testing, and sharing with clients, co-workers, and focus groups.



http://apps.windowsstore.com/

6.1.14

Top 10 Best Flash Websites of 2014

.. and some other cool stuff from eBiz-MBA.

http://www.ebizmba.com/articles/best-flash-sites

.Net Fiddle just to try code online

The website lets you just to test simple code or try out samples from other developers online.
Auto-completion, sharing and collaborating the code is also available. C# and VB.Net are available.

This tool was inspired by http://jsfiddle.net, which is just awesome.



http://dotnetfiddle.net

Isaac Asimov's Predictions from 1964 for 2014

Isaac Asimov's predictions from 1964 for 2014 were published on New York Times on occasion of World's Fair in that year. 

http://www.nytimes.com/books/97/03/23/lifetimes/asi-v-fair.html

Source: http://www.20min.ch/wissen/news/story/So-prognostizierte-Asimov-das-Jahr-2014-21762033


5.1.14

Witnessing the Real Life Apollo 13 Disaster

Witness the Real Life Apollo 13 Disaster As It Actually Happened



Source: http://gizmodo.com/witness-the-real-life-apollo-13-disaster-as-it-actually-1494377415

Elif Şafak - TED Konuşması (Türkçe Altyazılı)

Elif Şafak: Kurgunun politikası 

"Hikaye dinlemek hayal gücümüzü genişletir; onları anlatmak ise kültürel duvarları aşmamızı, farklı deneyimleri kucaklamamızı, başkalarının duygularını hissetmemizi sağlar. Elif Şafak bu yalın fikirden yola çıkarak hikayelerin kimlik politiklarının üstesinden gelebileceğini anlatıyor."



1.1.14

A very generic Regular Expression Date pattern

This generic Regular Expression Date pattern covers also leap years for European formats (dd.mm.yyyy):

GENERIC_DATE_PATTERN  = "^((((0?[1-9]|[12]\d|3[01])\.(0?[13578]|1[02])\.((1[6-9]|[2-9]\d)?\d{2}))|((0?[1-9]|[12]\d|30)\.(0?[13456789]|1[012])\.((1[6-9]|[2-9]\d)?\d{2}))|((0?[1-9]|1\d|2[0-8])\.0?2\.((1[6-9]|[2-9]\d)?\d{2}))|(29\.0?2\.((1[6-9]|[2-9]\d)?(0[48]|[2468][048]|[13579][26])|((16|[2468][048]|[3579][26])00)|00)))|(((0[1-9]|[12]\d|3[01])(0[13578]|1[02])((1[6-9]|[2-9]\d)?\d{2}))|((0[1-9]|[12]\d|30)(0[13456789]|1[012])((1[6-9]|[2-9]\d)?\d{2}))|((0[1-9]|1\d|2[0-8])02((1[6-9]|[2-9]\d)?\d{2}))|(2902((1[6-9]|[2-9]\d)?(0[48]|[2468][048]|[13579][26])|((16|[2468][048]|[3579][26])00)|00))))$"

More info on Regular Expressions:



Ephesoft Guide to Forms Processing Terms

Ephesoft Advanced Capture solutions provide significant benefits to improving the paper process within organizations. The purpose of this document is to provide a high level overview of the capabilities of Ephesoft and the terminology used with this technology.


Terminology


Forms Processing - Refers to the capture of information from documents through an automated process. Documents enter organizations and have little or no value until they are identified as to what they are and what metadata is on them. Forms processing refers to the automation of scanning, reading and interpreting the information on the documents to help automate workflows and add value to an organization.

Scanning - Usually the first process of forms processing where paper documents are converted to images that can be read by the computer and routed electronically. Scanning can be done by slow speed and high speed scanners depending on the user's needs. For the best Optical Character Recognition,it is recommended that scanning is done at 300 dots per inch to provide the optimal image for good recognition.

PDF/PDF Plus Text - Refers to a standard format of an image file once scanned. PDF stands for Portable Document Format which is a document image standard created by Adobe Systems. A PDF Plus Text document contains an image of a document plus the associated text data which can be used for search and retrieval functions in order to locate the document or information on the document at a later date.

Tiff-Tagged Image File Format - Refers to a file type which is an electronic image (or Picture) of a document. A tiff image can be used to route and store pictures of documents within a computer system. Many manual file cabinets are converted to electronic format through the conversion of documents to electronic tiff files.

OCR - Optical Character Recognition - This term is used to represent the capability of computers to read and interpret machine printed characters on documents. For clean documents,expectations can be about 95 out of 100 characters that can be read correctly without human intervention. This number can be higher or lower depending on the quality of the original documents.

ICR-Intelligent Character Recognition-Similar term to OCR, but relates to hand printed information. In general, this technology works well only with forms designed for recognizing handprint which include structured boxes and drop out form colors.

BCR-Bar Code Recognition-The ability to read and interpret the data from bar codes printed on paper documents.Several bar code types exist including Code39, CODABAR,Interleaved 2 of 5,Code93 and more.

OMR - Optical Mark Recognition - The ability to read boxes or circles with tics on them as in a 
survey or questionnaire. The system looks for fill or no fill within the box to determine whether it is checked or not.

Batch - A group of one or more documents processed at a time within the system.

Advanced Forms Processing - Generally refers to technologies of reading documents beyondsimply reading a bar code or producing a PDF output file. These generally include free form(unstructured) data extraction and full page document classification.

Fixed Forms Processing -Refers to initial forms processing technology that would use a fixed forms template to OCR and extract meta data from a document. The forms have to be the same and identified and the data has to be in the EXACT same location on each document for this technology to work. This technology has been replaced with unstructured extraction since it is much more efficient. Some rare cases still exist to utilize fixed forms extraction.

Document Classification - The process whereby different document types are defined in order to be used for later processing.

Document Separation -The process of determining the total number of pages within each document type and separating all the pages of one document type from another document type. This is also the same as determining where one document ends and the next one begins in a stream of images.

Image Classification - This technology is used to identify and separate document types in a stream of scanned pages. The technology uses finger print matching or matching of similar patterns of a particular form. It works well for standard pre defined forms, but does not work for textual types of documents of information since there are no form attributes on those to match to.

Full Page Text Classification - This technology is used to identify and separate document types in a stream of scanned pages. It can distinguish between each document type to classify the documents and can also separate each document type even if they have variable pages. It does this by reading the full page of each document's text and understands similarities between pages and documents much like a human would. Documents can usually be trained by providing samples. The advantage of this technology is that bar code separator pages and barcode page identifiers are not needed to separate and classify documents.

Document Review-This is a process where the user is asked to review the classification results from the system. It is an exception process designed to review only those documents that the system did not have enough confidence to determine the proper document type. The operator is show only the exceptions and has the option to agree with the choice or select another outcome. This process is significantly faster than performing the classification in an entirely manual process.

Metadata - Refers to the information that is associated with the document images.Examples of metadata that can be associated with an image are document type, field names and data elements. For example an image could be identified as an invoice and some metadata fields could in Invoice Date, Invoice Number, Total Amount, etc. The metadata would then be used to populate another system so that it can be used to automate a process.

Extraction - General term referring to the reading of data on a document image and pulling the data off to be used in another process. For example, an invoice image may have the fields of date, invoice number and total amount "extracted" and transferred to an other system where it can be used to post the invoice information or used to retrieve the invoice image later on if needed.

Free Form (unstructured) Data Extraction - Refers to the ability of a computer device to read a full page document of text and selectively extract data elements based on characteristics and formats of data surrounding it. For example, look anywhere on the page for the word "invoice"and when you find that specific word, look to the right of it and pull of an 8 digit number and populate my database with it. These can be as simple or complex as needed to extract information off of documents. The advantage of this technology is that the exact document type does not need to be known ahead of time as the system is just looking for variable data on any page.

Document Validation - In this process, metadata that was automatically extracted from the document is manually reviewed by the operator. Data that was not read with confidence or that did not satisfy a table or field validation is presented to the operator to correct. This is an exception process only and is much quicker than entering the data in an entirely manual process.

Confidence Threshold - The setting to determine at what point an operator should review the results created by the automated computer system. For example, if a confidence level of 70% was set, the computer would pass all results that it was less than 70% confident on to the user to validate. This is an adjustable parameter which is used to fine tune the system and maximize throughput while reducing errors.


Release - Generally refers to the end result process of a forms processing system. Forms processing systems take in images and release images and data. The data that is released from the system can connect to data base, workflow engines and other back end systems. A release procedure is the formal process which takes the data and images from the forms processing system and places it into the repository or system that needs to store or act on the data.

Source: 
http://www.ephesoft.com/aboutus/ephesoft-blog/380-ephesoft-guide-to-forms-processing-terms
http://www.ephesoft.com/aboutus/ephesoft-blog

Google Code with Tortoise SVN

Here's how to import your project using TortoiseSVN, the most popular Windows SVN client.
I assume you have created your Google Code (GC) project and it is called PROJECT and that the local source you want import is in a directory tree rooted at SOURCE.

a) Go to your GC home page and select the "Profile" menu - this will give you your UID and then click the "Settings" tab to find your PASSWORD - this is not the same as your gmail password.

b) In Windows explorer, right click on your SOURCE directory to get the Tortoise context menu and choose "Import..." 
This will pop up a dialog asking for the repository url. Enter the following:

https://PROJECT.googlecode.com/svn/trunk

c) You will be prompted for a userid & password - enter UID and PASSWORD as described above.
Your project should now be uploaded to the GC repository. From now on you can use the Tortoise repo-browser and other tools to access it via the url above.

For more information: http://code.google.com/p/support/wiki/GettingStarted

What happened to the Immediate window in my Visual Studio 2010 IDE?

So you lost your Immediate window in Visual Studio and you want it back, well here are the ways you can get it back:


  • In the command window type immed and then enter.
  • Select Tools-Customize (that’s Tools, not View)

image


  • Select the command tab and then scroll down to the View-Other Windows selection, this is where you will place the Immediate window selection:

image


  • Click the Add Command button and then select Debug in the categories and Immediate in the selection list box Commands, then select OK:


image


  • You may need to move the Immediate command up or down, I like mine under the “View-Other Windows” menu item.


image


  • Once you get  everything set, you should see the following!


image
Done.

Source: http://blogs.msdn.com/b/devschool/archive/2011/07/22/what-happened-to-the-immediate-window-in-my-visual-studio-2010-ide.aspx

Beyin Kanaması Nasıl Anlaşılır

Beyin kanaması olduğunu anlamak için aşağıdaki dört adımı uygulamak gerekebilir. Beyin kanaması semptomlarını anlamak cok zor olabilir. Fakat bu konuda bilgisiz olup beyin kanaması geçiren kişiye müdahale edilmezse, beyni çok ciddi zararlar görebilir. Doktorlar, artık herkesin aşağıdaki 4 adımı uygulamakla bunu kolayca anlayabileceğini söylemektedir. 

1. Kişinin gülümsemesini istemek (eğer yapamazsa = Felç demektir) 
2. Kişinin çok basit bir cümle söylemesini istemek (“Bu gün çok güzel bir gün”) gibi. 
3. Kişiden her iki kolunu birden kaldırmasını istemek. 
4. Kişiden dilini dışarı çıkartmasını istemek. Eğer yamulmuşsa bu da felç geçirdiğine işarettir. 

Eğer kişi bu dört adımdan birini yerine getiremiyorsa – “lütfen” derhal acil 
servise haber veriniz ve doktora telefonda durumu izah ediniz.

Nvidia's GauGan App

NVIDIA's GauGAN AI Machine Learning Tool creates photorealistic images from Simple Hand Doodling http://nvidia-research-mingyuliu.com/...