The tourbillion which is the holidays is rapidly approaching, and Scientific Computing is here to reduce the stress of the chaos of gift giving. No need to beat your way through the swarming crowds when we can locate gifts for you ranging from the practical to the exotic.
Continuing our exploration of Wi-Fi networks, there may well be times where addressing the...
web exclusive John R. Joyce, Ph.D. For many of us, it frequently seems that a...
Incredibly, the crescendo of vituperative presidential campaign ads appears to have overwhelmed most of the pre-holiday season advertisements. However, despite that, it is once again time for Scientific Computing's annual holiday gift guide. As always, we have exhaustively searched to bring you an eclectic selection of gifts to entrance those you care about.
Part 3 of 3 web exclusive John R. Joyce, Ph.D. Previous columns in this series have discussed the advantages of configuring your system to use multiple displays, as well as some of the steps to manually configure them. In this column, we’ll examine some of the almost magical utilities they’ve developed to allow you to take control...
Part 2 of 3 web exclusive John R. Joyce, Ph.D. With a little bit of luck, it is no big deal to setup a dual monitor display system. Unfortunately, every so often, it becomes a much bigger project than originally envisioned to get everything tweaked and running the way you want it
QR codes are growing popularity as a result of their flexibility, data capacity and the explosion in the number of smart phones available . If you were in attendance at Pittcon 2012, despite a tweet from someone saying that they hadn’t seen a QR code anywhere, you will no doubt have noticed that they were everywhere!
Of the bar codes generated in the lab, any given facility is likely to only encounter two basic types. The first of these are bar codes that are generated as part of a printed report, normally using a laser or ink jet printer. Other types of bar code symbologies require a more complex active mechanism, either built into the application or provided by an enhanced plug-in
To those of us who work with MS Windows on a day to day basis, staring at the same Windows wallpaper, whether the solid blue screen or the pastoral scenes, can be anything but soothing. Unless you happen to work in an environment that has everything locked down.
An aspect of disaster recovery plans that affects everyone is information. Specifically, it is being able to learn the extent of the disaster, the availability of help and possibly the best routes for evacuation. One of the best ways to obtain that information can be from monitoring police, fire and emergency medical service radio traffic.
In central Virginia on the afternoon of August 23, 2011, a magnitude 5.8 earthquake struck just 35 miles northwest of Richmond, Virginia. If you are inclined to write that off as a fluke, consider that the strongest earthquakes to ever hit the eastern U.S. in recorded history, estimated to have a maximum magnitude of around 7.7, occurred near New Madrid, MO.
While we have examined a number of devices to allow you to attach external hard drives to your computer, this is the first one we’ve examined that uses the new higher speed USB 3.01 interface. Supporting both 2.5” and 3.5” SATA2 hard drives, the Cirago CDD2000 USB 3.0 SATA Docking Station from Cirago International Ltd ( http://www.cirago.com/ ) provides a maximum data transfer rate of 5 Gbits/second.
In the past, it seemed that having the hard drive on your computer die was a totally random event. In truth this was sometimes the case: an impact at just the right angle to drive a head into a platter or a broken wire. Random instances like that can still occur; however, the majority of drive failures are anything but “random."
You no doubt have encountered ZIP files, normally recognized by their ‘zip’ file extension. These files are used for a variety of purposes and have an ancestry extending back into the ‘prehistory’ of the DOS world. While these files can simply serve as an envelope to consolidate a number of related files, in most instances they are also used to deflate, or compress, the contained files so that they can be stored more efficiently.
Bar codes come in all sorts of shapes and sizes, over 400 at last count. In fact, a good chunk of them are not the familiar straight bars, but may consist of a series of concentric circles or a 2-dimensional matrix of pixels. The amount of information that a given bar code can contain is dependent on its symbology and, to some extent, the physical area available.
web exclusive John R. Joyce, Ph.D. You obviously have a well-developed sense of curiosity, otherwise you wouldn't be reading this piece. There are among us those whose sense of curiosity has been hyper-developed. We'll call these people the insanely curious. If you frequently find yourself asking the question 'Why?’, you may be one of them!