Translate

Search This Blog

Friday 12 September 2014

~~~~ More Than 100 Keyboard Shortcuts Must Read & Share ~~~~

~~~~ More Than 100 Keyboard Shortcuts Must Read & Share ~~~~
Keyboard Shortcuts (Microsoft Windows)
1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z (Undo)
5. DELETE (Delete)
6. SHIFT+DELETE (Delete the selected item permanently without placing the item in the Recycle Bin)
7. CTRL while dragging an item (Copy the selected item)
8. CTRL+SHIFT while dragging an item (Create a shortcut to the selected item)
9. F2 key (Rename the selected item)
10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box - Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)
Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
MMC Console keyboard shortcuts
1. SHIFT+F10 (Display the Action shortcut menu for the selected item)
2. F1 key (Open the Help topic, if any, for the selected item)
3. F5 key (Update the content of all console windows)
4. CTRL+F10 (Maximize the active console window)
5. CTRL+F5 (Restore the active console window)
6. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
7. F2 key (Rename the selected item)
8. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

Friday 5 September 2014

World-first experiment achieves direct brain-to-brain communication in human subjects


telepathy

For the first time, an international team of neuroscientists has transmitted a message from the brain of one person in India to the brains of three people in France. 
The team, which includes researchers from Harvard Medical School’s Beth Israel Deaconess Medical Center, the Starlab Barcelona in Spain, and Axilum Robotics in France, has announced today the successful transmission of a brain-to-brain message over a distance of 8,000 kilometres. 
"We wanted to find out if one could communicate directly between two people by reading out the brain activity from one person and injecting brain activity into the second person, and do so across great physical distances by leveraging existing communication pathways,” said one of the team, Harvard’s Alvaro Pascual-Leone in a press release. "One such pathway is, of course, the Internet, so our question became, 'Could we develop an experiment that would bypass the talking or typing part of internet and establish direct brain-to-brain communication between subjects located far away from each other in India and France?'"
The team achieved this world-first feat by fitting out one of their participants - known as the emitter - with a device called an electrode-based brain-computer (BCI). This device, which sits over the participant’s head, can interpret the electrical currents in the participant’s brain and translate them into a binary code called Bacon's cipher. This type of code is similar to what computers use, but more compact. 
"The emitter now has to enter that binary string into the laptop using her thoughts,” says Francie Diep at Popular Science. "She does this by using her thoughts to move the white circle on-screen to different corners of the screen. (Upper right corner for "1," bottom right corner for "0.") This part of the process takes advantage of technology that several labs have developed, to allow people with paralysis to control computer cursors or robot arms."
Once uploaded, this code is then transmitted via the Internet to another participant - called the receiver - who was also fitted with a device, this time a computer-brain interface (CBI). This device emits electrical pulses, directed by a robotic arm, through the receiver’s head, which make them ‘see’ flashes of light called phosphenes that don’t actually exist. 
"As soon as the receivers' machine gets the emitter's binary message over the Internet, the machine gets to work,” says Diep. "It moves its robotic arm around, sending phosphenes to the receivers at different positions on their skulls. Flashes appearing in one position correspond to 1s in the emitter's message, while flashes appearing in another position correspond to 0s.
Exactly how the receivers are recording the flashes so they can translate all those 0s and 1s isn’t clear, but it could be as simple and writing them down with an actual pen and paper.
While it’s not clear at this stage what the applications for this technology could be, it’s a pretty incredible achievement. Oh, and the messages they transmitted? The conveniently brief and friendly, “Hola” and “Ciao”. 

LaCie Safe

cool inventionsThis computer invention provides peace of mind for securing your information.
Storing your files on this mobile hard drive gives you multiple levels of protection because it uses advanced encryption and biometric authentication technology.
The Safe uses 128-bit AES encryption (Advanced Encryption Standard) which is the same standard usd by governments to protect top secret information.
Encryption converts information that is readable into a mixture of unreadable characters. Decryption processes the encrypted unreadable characters back into a readable format.
The algorithm that encrypts and decrypts the information is known as a cipher. The cipher allows access to the readable information when you enter a password.
computer inventionMost ciphers will use passwords that are four to eight characters in length, but a 128-bit AES cipher uses a 16 character password which is extremely difficult to hack.
The AES cipher or "Rijndael" (pronounced Rein Dahl) is named after the Belgian inventors Joan Daemen and Vincent Rijmen.
computer inventionBiometric authentication is a technology that recognizes physical or behavioral characteristics such as fingerprints, palm geometry, retina patterns, voice and signature. Fingerprint recognition is the most popular because it's easier to use.
Your finger is scanned for minutia, which are the points on a fingerprint where a ridge ends or splits into two. An algorithm extracts the minutia points and creates a template image that is used for authentication.

digital pen is a computer invention that transmits writing into digital media.


computer penThis digital pen is a computer invention that transmits writing into digital media.
Although touch screen devices represent a movement away from paper, approximately eighty-percent of businesses still use paper based forms.
Many professions hand-write their notes, tables, diagrams and drawings instead of using tablets or other devices.

The computer pen is comparable to a regular ink pen (even uses refillable ink) that writes on regular paper, except it has an optical reader that records motion, images and coordinates. The recorded data is then transmitted to a computer via a wireless transmitter.
You can browse and edit your written notes, diagrams, tables, or drawings.
Another useful feature of this computer invention is that hand-written digital files can be easily converted into text fonts for use in word documents or emails.
Digital pen technology was first developed by the Swedish inventor and entrepreneur Christer Fåhraues.
Fåhraues is a physician and has an honorary doctorate degree in technology from Lund University in Sweden, and a M.Sc. degree in Bioengineering from the University of California San Diego.
Fåhraues served as the Chief Executive Officer and Chairman of Anoto Group AB, a company he originally founded in 1996 as C Technologies to license his digital pen technology.
This computer invention has been licensed to companies around the world for various commercial products. Applications include data/signature capture, completing forms, mapping, surveying, document management, paper replay, whiteboards, toys and education.
There are great expectations for digital pen technology over the next few years.