Friday 30 May 2014

New Era Scanning Technology - Optical Brain Scanner with Diffuse Optical Tomography (Dot) Technology

Optical Brain Scanner

Innovations in scanning technology often couched in terms of their potential for real impact ; a better PET scanner or MRI machine is certainly nice, but it is limited by the risks of radiation exposure or cost of superconducting magnets platforms . Thus , physicians and researchers have longed for a way to collect some information cheaply and without adding additional risks to the patient . Optical scanners - such as plain old safe infrared light - have made ​​progress towards this goal for some time , but this week Nature published the findings suggest the technology could eventually be ready for the big time. 

Where older versions of the technology were limited to small sections of brain imaging , this new Diffuse Optical Tomography (DOT) technique can be seen two-thirds of the surface of the brain at once . This means that it can resolve images of multiple regional events such as language processing or introspection , it will make it useful for brain and high-level research . Most important for the doctors is that the optical imaging uses only medically safe near-infrared light and some very sensitive detectors . [Doi: 10.1038/nphoton.2014.107 - « Mapping distributed brain function and networks with diffuse optical tomography " ]

On the other hand , DOT scans detect oxygenation monitoring for changes in color and intensity of light of low intensity rays shone directly into your noggin . Senior study author Joseph Culver compared the process to see embarrassment in a rush of blood to the cheeks - though in this case , the " cheeks " are the lobes of the brain inside the skull , and your " embarrassment " could be anything from complete lust in complex logical thinking.
Optical Brain Scanner
Penetrating the head with light may sound risky, but the machine use non-ionizing radiation DOT is theoretically capable of causing damage - which is more than you can say for scanning PET. Scans PET involves injecting a patient with radioactive isotopes that can monitor traffic through the body ; is a calculated risk , and often avoided because the potential harm outweighs the possible help.
The existing scanning technologies have very high fidelity , but practical problems undercut their use in the real world .

The existing scanning technologies have very high fidelity , but practical problems undercut their use in the real world . DOT technology could change this decision tree , however. Although it is bulky and today , the platform is specifically meant for portability , price and ease of use . It is supposed to be installed by the bedside of the patient  scans automatically conveyed to a central server cluster patient monitoring . At least , having a scan available DOT could dramatically change the types of cost- benefit analysis that focused medicine for long period. The DOT technology take off, physicians should become concerned that kill their patients as part of the diagnostic process , and the ability to see inside the brain will not be locked behind the pay-wall of supercooled , super - expensive magnets .

On the other hand , DOT imaging continues to lag behind the older technicians in many ways . Especially , now can see only about one centimeter in the brain - it allows you to cover most of the important higher brain functions , but leaves the most ancient internal structures unnoticed . Moreover , the resolutions in space and time have not yet reached parity , which means that at present DOT scans will be more useful for monitoring brain activity on a larger scale . Also , currently have no idea how much cheaper could actually end up being , but given the relatively simple technology used in a DOT scanner there is certainly potential for huge price reduction.


If researchers can prove that there is a viable market for biomedical their invention , however , expect these performance numbers to spike dramatically. Currently what is proposed for use in children or people with implants - people who can not get conventional scans as easily as most of us . Still, with all the potential advantages of cost and security , long-term goals of the team should be much higher.

Thursday 29 May 2014

How to Install Windows Phone SDK file on Windows XP

If you want to install and run the Windows phone SDK for Windows XP, then the whole process of installing Windows Phone SDK for Windows XP is detailed below :
SDK file on Windows XP

The software development kit preset for each and every software release, and is necessarily not intended to be used in different versions . However there are several developments that lead to different versions that can be used in a cross platform based . If you want to install and run the Windows phone SDK for Windows XP, then the whole process can be a bit difficult . However , it is not as difficult as it seems. Can be achieved in a few steps and the results obtained are truly magnificent .

With the latest versions of Windows come on the market , users are getting inclined towards discovering more defined features of the operating system . It always seems that lower version users do not have access to use the software from a newer version , whereas the reverse is not the same . Windows 7 users can use the software for Windows XP, while users who have Windows XP can not go on software Windows 7.

Following will help you to install Windows SDK for Windows XP:

  • For the whole process , all you need is to download the Windows Phone Developer Tool Update and install the system using a decompression tool such as WinZip, WinRAR, etc.
  • Extract the contents of the package and run the vm_web.exe / x and then select the desired path in which you want to extract the file .
  • After installation, go to the folder where you exported the file and open the file baseline.dat. Here you must make some necessary editing in the document .
  • There will be a line stating [gencomp7788], in which you can find "InstallOnWinXP = 1" and replace with "InstallOnWinXP = 0" [gencomp7788].
  • The value InstallONLHS must also change 1-0 .
  • With this treatment , you should save the file baseline.dat and then run the setup.exe / web from the same file that has been exported.

Once the installation process is complete, you need to update your Windows system to 7.1.1 . There are loads of features that SDK Windows Phone has so badly want the operating system Windows XP. The tool for developing Windows Phone has the following key features : -
  • Windows Phone Emulator
  • Visual Studio 2010 Express
  • XNA Game Studio
  • Silverlight Tools
  • Blend MS Expression


All these applications to Windows Phone is very user friendly and when you have all these with Windows XP, the possibilities are simply endless . However , sometimes you can also face the problem by opening the emulator . When you create a Silverlight application and press F% to see the emulator , you receive an error message that says " execution can not continue ." This error occurs because of bcrypt functionality which can also be treated with the help of certain codes and commands . bcrypt.c file and its contents can be rewritten which will solve this error as well.

Why Microsoft Should Stop Making Hardware - Ballmer Spoke for First Time

Microsoft Hardware

In a speech at the University of Oxford students Said Business School in February , former CEO Steve Ballmer spoke for the first time since leaving the Microsoft. In connection with the acquisition of Nokia's devices and services unit , said, "It's important because the name of the company Micro-soft .... As a fundamental part of the fundamental principles , we were a software company ... and yet we a profile that will wind up being much more complicated in the future . "

Started in 2006 . Sitting in the shadow of rivals of Apple, the company began to go head to head with the most cool kid on the block . First came the Zune. The start playback music was meant to compete with the iPod, but it did so badly do past single digit market share. In the years that followed , the company released a few improved versions of the Zune, but even with good reviews that do not sell . By 2011 , Microsoft announced that it will stop production.

Until June 2012 , the second phase of the program began with the launch of Surface RT and Surface Pro? tablets for the first time in a combination of hardware and software company in an effort to go after the iPad. At the annual general meeting of shareholders in November 2012 , in response to the fighting efficiency of the tablets Surface, the he constant insist the company's ability to prosper in the future will be "getting innovation across the seam of hardware and software [ and it would be ] difficult unless [ they did ] both. " Under his leadership , the company relentlessly pursues a 'mixed » tech - ethnicity .

The transaction Nokia - a plan to acquire more material and gain some traction in the mobile business - in line with the long term vision of Ballmer. It was a hard job to convince Ballmer, Microsoft 's board of directors to vote in favor of it, and eventually led to them putting pressure on him to move faster production proposed changes in the company. Steve Ballmer announced unexpectedly that he would resign as CEO during the next 12 months. A month later , Microsoft announced plans to redeem them from Nokia.

With plans in place, the Surface 2 and Surface Pro 2 rolled out in markets in October 2013 . The product as it is admirable . It's smarter , sexier , faster , more affordable, and some features , even trump iPad.

It's almost there .

But the surface continues to occupy the second position with the iPad, which is currently significantly more and better applications than to first get the best applications . Unfortunately , admiration and only in the world of technology has no value .

Therein lies the problem with the Microsoft hardware. Except the Xbox, which has been superior in all fronts of hardware products in recent years have fallen into one of two traps : Fast market , poor development of the material and slow market , excellent development of the material.

Balmer is not retained in the exchange of these same outputs and regret during his tenure with the kids biz Oxford : "If we look back with 20-20 hindsight, the thing I regret is that we did not put the hardware and software along soon enough ... if you really want to bring a vision to market , it is useful to be able to capture and deliver hardware and software. "

After uncovering a version of Office for the iPad in March 2014 , the company now has shot latest and greatest hardware in the leg too. With the ability to use Windows software for rival devices , there is no reason to invest in a tablet Surface at all. However , this change in direction - leaving the longtime «Windows First policy" - suggesting that perhaps Microsoft's identity crisis has finally subsided under the leadership of Satya Nadella . .


Quick progress Nadella back to what the company does best showing early signs of promise for the future prospects of the company . He has his work cut out for him if and Nokia - the transaction is $ 7.2 billion ( including patents ) , which was officially completed on 25 April - is just icing on top.

Have more to add this story, please share with us in comments :)

Wednesday 28 May 2014

Intel Unveils a Robot and a Smart Shirt - One More Step to Future

The Conference Code gives IT heavy hitters the opportunity to share their ideas , show off new products and really nerd out.
Intel 3D Printing

The inaugural conference in Rancho Palos Verdes, California allows all these things to happen , but also features an avenue for some products a little strange to be thrust into the spotlight. Two such data come from the creative teams at Intel Corp.

Stuck in a cool $ 1.600 participants were the first to see the new Bots , Jimmy. While other companies have , for years , have demonstrated their robot small automatic from Intel, is quite unique in that they are completely printable .

Reuters reported the white , two -foot tall robot brought on stage at the event and was introduced as a research robot if a 3D - printable plan will be available " free of charge for a slightly less advanced version , and the partners will sell components that can not be 3D - printed, such as motors and a processor Intel Edison, dependencies .

The little robot can sing , translate other languages ​​, have access to some social networks and , reportedly , even serve a cold drink. Robots , of course , can not be too innovative when it comes to IT, and other new products Intel is a little more unique .

The new Smart T - shirt created especially those who practice in mind. Created in collaboration with AIQ, the shirt has conductive fibers so wearers can monitor their heart rate to the information carried in a Smartphone.

New York Times blogger Nick Bilton wrote about the product Wednesday pointing to the head of Intel new devices , Mike Bell, and a video posted Re / code. In this video , Bell explained how the shirt can ultimately include a 3G chip that could automatically transfer the data to the cloud, as the wearer passes through their exercise routine .

Have more to add this story, please share with us in comments :)


How to Fake Your Facebook Location

In this article I will tell you how to fake your location on facebook. Here are some of the tips .
Fake your FB Location
One thing that makes rounds and virus worldwide is a social networking site that began operating in 2004. Vaguely called FB officially known as Facebook. In September 2012 a survey showed , there were about one hundred million users operating in the area . As Facebook is now accessible through mobile as well, just added to the active users list .

Each and everyone wants to stay updated with what is happening around the world and particularly in the community and their circle. To use Facebook features fully one needs to get himself registered and then add their friends , snaps , videos and any data or applications that need to use. It was a creation of some of the college fellows of Harvard University . The man behind the social networking site was Mark Zuckerberg. At the initial stage would be limited to fellow Harvard .

Geo-location ( also known as Geo - tagging) is a way of exercise to access the exact location of the object , person or mobile etc. It is related to the installation of systems that are closely connected . It can help you to find the location of a system or people. The position on the connection to the internet could be monitored with the help of IP addresses of systems , tariffs RFID, embedded software version number etc.

Fake location using your Facebook FirefoxThere is an IP service , which is termed as Whois trying to pinpoint the location of your system, letting you know the address IP. Information for tracking IP can have events associated with Country , Region , City , Zip Etc. while more detailed analysis could lead to ISP languages ​​, proxies , company name , connection speed , home and business etc.

Some of the popular - most web engines such as Google, Bing, Facebook, Twitter et al - use the geo-location function . But there are some users who prefer not to reveal their location on the internet or socially. So to mask the exact location try tweaking some fake position . Some achieve this by using a VPN or proxy / browser.

Even if you are not tech -savvy , you can still easily stop the geolocation service provided by the browser . In the case of the browser Mozilla Fire fox all you need to do is simply type "about: config" - in the address bar . Then simply locate the settings of "Geo. Enabled " . And Bingo! Click to set to false.

However , an outfit that will need to impersonate your posts are geolocator, and that must be installed on your system . You need to get the menu bar to make geolocator visible . Upon restart the browser for the changes to take effect . Then , navigate to Tools -> Geolocator> Manage.

From the above tweak you will be able to add the new position to "add location" radio button . Through the search of the map can pinpoint the location you want to fake yourself . This is again your call. Once saved options and have successfully faked your location on Facebook!

Monday 26 May 2014

Your Personal Data Could be at Risk : Learn How to Secure Your Personal Information / Data

Intralinks has revealed an alarming problem of privacy affects the way many people use sync files and share applications that could put most sensitive personal information and, where applicable, their employers, in grave danger. Similar to how many people expose publicly the details of themselves , their families and their activities on social media are also more sensitive expose private information to synchronize and share consumer applications .
How to Secure Your Personal Information / Data

During a routine analysis of Google AdWords and Google Analytics data to name names competitors (Dropbox and Box), discovered accidentally fully clickable URLs needed to access these documents led us to live the folder contents , some with sensitive data . Through these links , we gained access to confidential records including tax returns , banks , mortgage applications , blueprints and plans - all highly sensitive information , some might be sufficient for identity theft and other crimes .

Background
The most recent survey U.S. Federal Trade Commission about the scam consumers found that more than 10 % of adult Americans are still victims of fraud each year . Another survey from security company home Friedland found that 78 % of burglars use publicly available status updates social media to gain information about their targets . A third survey by research firm Coleman Parks found that 67 % of consumers between the ages of 18-35 and 59 % between 35 and 44 do not care about online privacy .

And it gets worse . A recent article from the London Evening Standard reports that 70 % of fraud is most cyber crimes . And according to research Fiberlink, more than 50 % of the subjects reported sending sensitive data to cloud services such as Dropbox and iCloud.

The evidence is clear : Despite all the cases of identity theft , theft and fraud , consumers continue to deal directly safety for convenience or perceived personal gain . For businesses, this is extremely bad news - because the same consumers are also workers , and many carry the exchange of consumer grade and safety practices in business.

Why does it matter
We came to this topic completely random while running a competitive campaign in Google AdWords. Solutions file sharing users created share links to their files and started them in the " Search " instead of the URL box in web browsers , so that our campaign collected the data . This was not as unusual as it might sound , and we met a lot of files over a fairly short campaign Google AdWords. We believe that it is relatively easy for others to replicate our results . In the process of confirming how this happened , then we found other issues with some free file sharing applications makes them prone to data loss. Therefore , avoid some free versions of popular applications file sharing for personal use, and , of course , for professional use , when it comes to sensitive information.

To be clear , we have gained access to the files , because users of file sharing applications often do not take simple precautions to protect their data. When used in this way, all the file sharing applications are potentially vulnerable. When using file sharing applications , many people fail to use basic security features and take some action even with extremely sensitive financial data . Moreover , many privacy mingle with confidential company data without security in place.

How to Protect Your Data from Sync and share issue
Sync files of consumers and share applications used by millions of people to quickly exchange information with friends , family and colleagues. Most users are under the false impression that the bonds they share is impossible for others to reveal , even when they fail to properly configure access controls . Moreover , most are not aware that some free products do not provide the ability to secure adequate records . Some free systems , including Dropbox, do not support privacy settings . Dropbox briefed on the matter , when first revealed records in November 2013 to give them time to respond and deal with the problem . They sent a brief reply saying , "I believe that this is a vulnerability . "

Some steps to protect better your data :

  • Check sync and share your services to see if it supports your privacy settings . When it comes to file synchronization and share applications , make sure that the product supports using the settings " privacy " , which ensures that only people you invite will be able to access a file . The system must also be able to support authentication , provided that users identify themselves and to have a password .

  • Set your account to "private" , using basic security settings . Most applications sync and share files default to a " public" setting , that means everyone in your connection can easily access your files. This can be handy if you want to share a non- sensitive issue with many people , but we recommend that you set your account to "private" by default , and then invite specific individuals with whom you want to share.

  • If you have already shared sensitive files in a public folder , delete them. If you have already shared information is private , do not change the situation - to delete the files and reload a new private folder . Changing the status of the file from public to private , is not a foolproof way to protect files that you've already shared.

  • Delete old files you no longer need . Get in the habit of deleting files from the sync and share your application since you no longer need them. We found many sensitive files that had been posted here a long time, which probably had forgotten.

  • Never mix work and pleasure - to keep records of business and personal files in separate accounts . We found several business data in files personal account . This is a bad idea . If you are using a consumer grade system , move your sensitive business data in an application created for professional use . 


Your employer may have rules about storing sensitive information on quality systems for consumers , so they may be in violation of law or contract , if put confidential information on these systems . If something goes wrong and the data leaks , the consequences can be severe : the lost reputation , regulatory and legal issues and financial losses . If the data belonging to a client or partner , the protection of data generated too.


Update : Dropbox posted a blog announcing a "web vulnerability affecting shared links to files that contain hyperlinks ," stating that they have taken measures to overnight in the vulnerability disclosure hyper

We are Not Alone in the Universe : Extraterrestrial life exists and could be found within 20 years, with adequate funding, astronomers say Congress

Two eminent alien astronomers in the world ( such as researching aliens , not that they are aliens themselves) have told the U.S. Congress that there is alien life out there in the universe - and with adequate funding , we could find that the alien life within 20 years. The statement was presented to the House Committee on Science , Space and Technology, which is currently examining our efforts to search for extraterrestrial intelligence (SETI), and whether you need to take more public funding.
We are Not Alone

Now , we could say that the two astronomers - who have both "SETI" in their job titles - have a slightly vested interest in persuading Congress that there is life out there . But to be fair , all you really did was to tell Congress about the large size of the universe , and that "it would be strange if we are alone ," said Seth Shostak, Senior Astronomer at the SETI Institute in California . Astronomers report nearly two thousand planets have already been identified by the Kepler telescope of NASA, and how we can estimate that 70 % of all stars are accompanied by planets - which means that there is about a trillion planets in our galaxy alone. 

With so many planets , there is a " good " chance that alien life exists somewhere in the universe - but, as Shostak and Dan Wethimer, director of SETI research at the University of California at Berkeley told the Congress , we will not find it if we do not have the funding. So far , the efforts of humanity to look deep space for signs of life have been lackluster to say the least. In recent years , there SETI @ Home, and that 's about it . Because the universe is huge, and because our radio telescopes to listen to only a small fraction of the sky for signs of extraterrestrial life , we just have not seen in many places. With a few million dollars in funding - for larger telescopes and more computer processing power - could be converted to many other interstellar rocks . With sufficient funding , Shostak and Wethimer that we could find extraterrestrial life just 20 years from now . ( As a fun place , so Shostak and Wethimer also said that Congress did not think the Earth has ever visited by aliens . " Do not think this will be something that all governments have managed to keep a secret ," Shostak said . )

The Square Kilometre Array radio telescope (rendering artist )To find extraterrestrial life , we would need a wide variety of radio telescopes - as Square Kilometer Array
Personally, I'm a little more dubious . Shostak and Wethimer obviously look towards optimism, when billions of dollars for research is delicious on the line. Yes , you could cover the Earth in huge parabolic antennas and listen really closely for signs of life . [ Read : IBM is to build exascale supercomputer largest in the world , millions telescope antennas . ] More realistically , however , the increase in funding will allow us to hear faint signals coming from a small percentage of the night sky . In any case , listening for alien radio signals is a hell of a long shot . The chances of an alien civilization advanced enough to produce strong signals, and sending them in our direction - remember , the universe is almost infinitely large - is very small. Furthermore , and perhaps most importantly, our two cultures , should overlap . Human civilization is tens of thousands of years , but have only been able to transmit radio signals and count for less than 100 of them. The universe has been around for almost 14 billion years - what if there was intelligent life elsewhere in the galaxy one million years , or one hundred million years ago, or 10 billion years ago, but radio signals to wash over us long before we could hear them ? [ Read : Alien spots : By 2020 , we will finally have the ability to detect life- harboring alien planets . ]

Concept of an artist for a Dyson Sphere

A truly advanced alien civilization might have built a Dyson sphere star - covering

And how long do you think it is about ? Another 100 years? Probably . Another 1,000 years ? If we're lucky . The large , completely amazing scale of the universe , humans are the tiniest of blips - and it stands to reason that any other intelligent civilization would be exactly the same. The big exception , of course , is whether there is an alien civlization out there that has survived for millions of years and has already completed multiple systems or galaxies stars . In this case , there is a very good chance that our cultures (and therefore efforts of SETI), will overlap .


Now , if we really want to find a highly advanced empire has colonized many galaxies are another matter entirely. I do not think that humanity will face very well with suddenly being number two in the food chain ...

.Have more to add this story, please share with us in comments :)

Sunday 25 May 2014

8 Things You Should Know to Attract your Followers Effectively

Blogs are a very interesting way to share ideas and thoughts with all kinds of viewers . Everyone who enjoys writing, I also have a high number of viewership as a reward for thinking that goes into writing a blog. While some blogs get very high number of views , there are some who hardly get any hits. What could be the reason behind this difference ? Is the content is not enough ? Let's look at some ways to increase the number of public on your blogs :

  • Include fan Widget: The best way to monitor the success of a blog is to have a clue. The best defines your audience will be the follower widget . The higher the number of people that follow, the greater are the chances that more people will want to read what you so blatantly together with people .
  • Place the fan Widget Beautiful : What will happen if your blog receives a significant portion of viewers , but it is still able to attract more followers ? The reason may be the poor placed widget. Make sure the widget then placed in plain view for people to see and then click on an impulse. The best part is obviously the top of the page so that viewers know they can follow this blog .
  • Lets Share your work : Let your readers to share your work with their friends on social networking sites . To allow them to share your blog will give you the opportunity to reach a wider audience , without having to ask.
  • Focusing on Top Networking platforms : Do not try to publish over yourself and feel frustrated about not getting the results you were expecting. It is much better to focus on the top platforms and allow your readers to be the best judge and take it to other social networking sites via the share widget .
  • Ask for it : The way it works in social media is that to increase viewership , should generally ask friends or acquaintances to be the first to dislike or share our views . In this way , it is a good way to gain recognition . The larger the network of your friends, the greater your chances are to get attention and then followed, even if the request !
  • Include link in your signature : This is probably the best and most basic way to publish your blog . Add the link of your blog in your signature and automatically reaches all the people who write an email to .
  • Spend some money too : If your blog means a lot to you and you are really a publicity important consideration , then not flinch at the idea of spending a few bucks for promotional purposes. You will be amazed to see the results you can get with spending some money .
  • Hold Update : A good blog is one that is always updated and shares interesting ideas and thoughts on a regular basis. Readers will want to hear the good things you write and keep the momentum !

Friday 23 May 2014

Points to be Considered for a Blog SEO Optimization


SEO

Have you ever searched for something on Google; With millions of results that appear on the desktop of your computer, you never go beyond 3-4 pages ? Most of us would answer that as a no. So if you own a website or a blog, it is important to be SEO friendly. 

SEO or search engine optimization is important for any blog to appear on the first pages of any search engine. If SEO is done correctly , it will help bring a lot of traffic to your blog or website . This is why people hire professional SEO, because they want their blogs to appear on the top pages and get more readers to their blogs .

One of the important things that people miss are the titles blog. Thus , much research has been on the content of the title, that people rarely get their attention in the blog title . If you want to get more readers to your blog , no matter how good your content is, it is important to optimize your blog titles for SEO, so that people can easily find your blog for the targeted keyword.

Tips to follow for batter optimization of the blog-
  • It is important to give good and enticing titles on the blog. Many people give in blog titles are confusing and have no sense of purpose . To get more traffic to your blog , it is important to choose titles that are to - the - point and explain the intent of the blog clearly to readers.
  • While one can intelligently choose titles for their blog to attract readers , it is even more important to make sure that readers understand the purpose of the blog. A good title can not be SEO friendly and these blogs will not appear in search engines . So choose a practical title , which is still closely tied to the content on your blog, rather than try and be witty .
  • Look around for the keywords that will help you generate traffic for your blog . Create titles with important keywords or phrases in a particular location will help bring more traffic . People looking for words and phrases that will be directed to your blog easily. There are a number of keyword and phrase generator tools you can use to learn the keywords in this box . It is always better to choose keywords that have less competition . You will have better chances of ranking higher in search engines .
  • When writing headlines blog, make sure there are no spelling or grammatical errors. The blog title should reflect as a professional blog. Since people will be tempted to read the blog only if they find the titles to be good.
  • These are just some tips that will help you spread your blog among the targeted audience . Just keep it simple and avoid complicated instruments to better optimize your blog titles for the purpose of SEO.
.Have more to add this story, please share with us in comments :)

How to Make Emoji Emoticons in Text Messages on iPhone

The best way to express emotions in the last way is emoji icons , here in this article you can learn how to do emoticons in text messages on iPhone.
How to Make Emoji Emoticons

Gone are the days when a simple colon and a set of brackets would be enough to express our thoughts symbolically . Now , if you use these symbols will have the opportunity to think as old and archaic . To confound the problem , now there are different smartphones with different operating systems . They do this by sending an icon looks like a mammoth task . So , in this article , let me focus only on iPhone.

As iPhone users know iMessage is a text messaging application developed by Apple for iPhone, iPad and iPod touch. It was for the first time on iOS ( mobile operating system of Apple) version 5 . So if you have a wireless connection , then you can send countless text messages to other users iOS. And adding icons or emoticons as they are called will add more spice to your messages .

To use these images you must have a keyboard Emoji. You may ask, what the heck is a keyboard Emoji; According to Wikipedia Emoji is a combination of "e" and "Moji», which is Japanese for picture and letter , respectively . It was developed by the Japanese and was available only in Japan , but also spread their popularity , the makers of smartphones also included .
How to make icons in text messages to iPhone
  
This is how you can add keyboard Emoji.
  • Go to settings
  • Select keyboard
  • Select International keyboard
  • Then select add new keyboard
  • From the list select Emoji
  • Close Settings
  • Restart the phone

 When you're actually typing a message , you can switch between standard keyboard and keyboard Emoji. In the normal keyboard , you can see a globe icon , click on it to see the keyboard Emoji. Similarly , click the globe icon on the keyboard Emoji to see the normal keyboard .

This is the simplest way to include icons in your text messages , but there are other ways . For example , you can buy Emoji emoticons from iTunes and then follow the steps above.. You can also download free applications that provide emoticons.

Now , if you want to add emoticons to your message here is the step by step approach to do it .

  • Open messages
  • Click or rather tap the new message icon . It will appear in the upper right corner - one showing a restroom pencil on paper .
  • Select or enter the recipient's number or name.
  • Come into the text field .
  • If you want to add emoticons, then click the globe icon that appears in the lower left screen .
  • There are different options that you can see at the bottom of the screen .
  • Just select the emoticon simply click on it to mount it .
  • Send the message .

 If you feel that this is too much work , then you can always ask Siri ( for newer phones) to do it for you. So , when you write a text message , you can just ask Siri to enter " face Smiley" or "person Winkey". Siri will understand even if you just use "Smiley" or "WinKey". Apart from this the iMessage app automatically insert emoticons, depending on the type. So , if you type " :-) " , then automatically insert the " ."


If you want to send messages to a phone other than the iPhone, then the phone will also need to install the Emoji keyboard to get the message right .

Thursday 22 May 2014

How to Install WhatsApp on iPad

Install WhatsApp on iPad using the iPhone Configuration Utility is a great and a very novel idea , if you want to do here to learn the easiest way to install WhatsApp on iPad using the configuration utility iPhone.

The "WhatsApp" application has gained immense popularity all over the world , as it is a great tool that helps you to connect with people around the world at no cost . This application is not compatible with the iPod touch and iPad, but can be adjusted without jail breaking the device . The most important prerequisite for iPhone configuration utility and are downloading from iTunes on Mac and Windows.

The steps involved in the process are:
  • The iTunes should open and you should look for applications that are not compatible with the iPad
  • The iPhone configuration utility must be installed and opened before it is very necessary to make sure your iPad is connected to your Mac or Windows PC.
  • The box to the left of the configuration utility must be checked and the application must be pressed . The file must ipa. To be added must be located and fall to the configuration utility iPhone. It is necessary to check that the iPad is present in the list .
  • After this the user must click on the device and go to the application. A list of applications will be seen and one can even see the install button next to the application WhatsApp you can click to access this application which is amazing and very useful for people . It is very useful , as one can send important documents and information for people who have installed this application in minutes .


Configuration profiles and application installation can deal with the iPhone configuration and after that only allow installation . This process is a bit technical , but tutorials are affordable for people to install applications and is accompanied by graphics and video .

The result of the installation of «WhatsApp" application depends on the version of the operating system of the device . And if the user encounters problems in this process is to make best use of the beta versions .

Other resources for installation:
  • "WhatsApp" may be obtained from an iPad - PDF
  • "WhatsApp" Messenger for iPad of Apple.
  • The main purpose of the iPhone configuration utility is that it helps to create, maintain and install configuration profiles . It is also useful for monitoring authorized applications and information to the receiving device. These files contain the XML files containing the device security policy settings, Wi - Fi, account settings and even exchange email settings provided by the iPad and iPhone permission to work with business systems .
  • The "WhatsApp" Messenger can be purchased at USD 0,99 and proves to be much cheaper than the cost of SMS. All these measures are necessary to download this fantastic app which is compatible with many Smartphone and it provides a great way to connect.
  • Install this app and have fun by just opening the iTunes media folder and the most important thing to keep in mind is that the user must connect your iPad with the USB cable, and then only the PC will detect your iPad automatically
Have more to add this story, please share with us in comments :)

How to Create Own Windows 8 Mobile Theme

If you want the appearance of new themes for your windows as you want unique fast, you learn here the possibilities of new themes for your Windows Phone 8 .
Window8 Mobile Theme

Windows 8 is the latest for phones that run on this platform developed operating system . It can be called a smartphone , because all the inclusions are well thought out and improve the user's experience . The latest version also has more options.

There are many ways to add the personal touch and phone , there are many apps that are available online that can be downloaded and can help change are the built-in settings of a phone. For all people who are more colors to add to their design settings , here's what you can do.

Use the Online Theme Creator :
This is the app available online that can be used to create your own themes and colors as you think is best for your Windows 8 phone. You are allowed to design your own personalized theme and this so as to change it in the Settings tab. All you need to just follow the steps as mentioned on the app start a topic that can be an extra personal touch to your phone .

Filesharing :
After successfully creating the theme, you can save it, edit it  and share or download . There is no fee for making all with your theme Creator. With the help of this online tool , you can create as much themes as you want. There are many people who create downloaded already using these tools to thousands of topics that will be shared, and on the platform. If you do not want to create a theme , you can also search through thousands of them created by someone else and load it on your phone for later use .

Be a Part of an Online Community :
For all mobile freaks out there to share it freely , can ideas and new designs through the online community , supported by this app . You can also interact with other members and share your own designs and ask them to share them with you on this platform. You can also go to the forum if you need technical assistance , which can be solved by other members of the community .

The mobile phone has customized to be as important as the phone itself . If Windows launched its version 8 OS , they also new collection of issues that are still not enough for the user . They always prefer a personal touch , something as private as a cell phone. Windows - based phones are catching up to iOS and Android - based mobile phones and capabilities of this small adjustment can certainly push forward their market. There is nothing more exciting than the user interface of a phone , change something to your taste.

Wednesday 21 May 2014

How to Use WhatsApp on Windows 8

If you want to use WhatsApp on your Windows 8 computer, here you can get advice about methods to install WhatsApp on your windows 8 computer 
WhatsApp on Windows 8

This free courier ' WhatsApp ' that is accessible on the Smartphone is widely used by one and everyone . Has been made possible these days to get the downloaded application , even on the PC. This free service provides access to send and receive documents , videos , audios and messages to people who have installed this service . this mobile messaging application provides access to free messaging and when installed on Windows provides the benefits of imaging profile also .

The need for this desktop version has become very imminent, as millions of people around the world are making use of it and can be done in just a few minutes.
There are several steps involved in downloading this application on Windows 8 and using Blue Stacks .
  • First, it is essential to download blue stack and the PC is a free application window. This would allow you to download the messaging application easily.
  • The software must be installed by clicking the install button Blue Stack is on the right side .
  • After this application " WhatsApp " must be searched and downloaded.
  • Now double-click the downloaded application and install it on the system
  • To open the application in the blue battery icon on the desktop you have to click
  • Then you have to click on WhatsApp and enjoy access to this application
  • The most important point for the installation of this application is to agree to the terms and conditions for using the application on the PC.
  • You need to enter your phone number during the installation of this application as it would provide the verification code on the phone .
  • The verification code provides a direct input received and the rights to use the application as well as contacts with this app installed.
  • Not much effort required to gain acceptance of this wonderful application that provides access to free messaging and receiving videos and submit.
  • There are no specific rules to get permissions for this application except for all the contact details and creating a profile. One can enjoy unlimited messaging by installing this application on the desktop that involves some easy steps to follow .
This wonderful application provides access to communication with people around the world with friends and family. This operating system works very fast and smooth and is loved by each and every application. This is because you can easily download and mobile phones , tablets and even desktops easily .

This free software incorporates no ads or annoying pop-ups are a great distraction for users. The contacts on the desktop must be added by the user , unlike phones which are introduced into the contact list . This application is fun and the best source to connect with family and friends anytime of the day. So enjoy it and download it now on your Windows 8 blue stack .

Have more to add this story, please share with us in comments :)