Tuesday, August 11, 2015

20 Websites You Can’t Miss If You Want To Make Money As A Freelancer

Being a freelancer has a lot of benefits – you can work from anywhere you like, you make up your own rules, you don’t have to concern yourself with trivial office politics, there is less stress involved and you get to spend a lot more time with your friends and family. However, not having a stable job means that you will be living a nomad’s life, moving from project to project, constantly on the lookout for a new employer. Kind of like an online ronin, a masterless samurai roaming the virtual wastes. Well, there are places you can go to look for great freelance opportunities, so do not despair. Here are 20 great freelance websites you should definitely check out.

1. Elance

Elance is one of the best websites to look for freelance work of all types. Programmers, designers, writers, IT professionals, translators, attorneys, financial advisers – everyone is welcome and there is plenty of work to go around. You can set up a profile fairly quickly and charge an hourly rate or have a set price for each individual project and you get rated depending on how well you do.
Elance

2. Freelancer

It’s been around since 2004 and it has a large following. It’s a place where services are outsourced to freelancers in a number of fields including: web design, writing, marketing and data entry among other things.
Freelancer

3. Guru

Guru.com is a fairly large network that connects companies and freelancers. As stated on the website they are interested in work on “technical, creative or business projects”, so there is plenty of opportunity for all types of freelancers from programmers and game developers to translators, engineers and attorneys.
Guru

4. iFreelance

iFreelance is a very wide freelance network with categories that include photography, videography, marketing, traditional art, writing, translation, architecture, engineering, graphic design, accounting and administrative support. It’s easy to set up an account and start looking for a project you can contribute to.
iFreelance

5. People per Hour

Create an appealing profile, look for jobs, send proposals and make a short video promoting your services. It’s all very straightforward with PeoplePerHour.com – you find a client, provide a quality service and get rated.
peopleperhour

6. Tuts Plus Jobs

This is a great job board for programmers, designers and developers, as well as copywriters and editors. It has a user friendly interface and allows you to quickly find and apply for jobs best suited to your particular skill set.
Tuts Plus Jobs

7. ProBlogger

An excellent job board for talented writers, ProBlogger makes finding the right writing opportunities incredibly simple. Just click on the job listings you want and follow the instructions.
problogger article

8. Freelance Writing Gigs

This is another great website for all the writers out there. Posting an ad will cost you around $10, but it will give you a chance to showcase your writing skills and provide content to those willing to pay for your efforts. You can also contribute to their blog and get some additional exposure by linking to your blog/website and social media accounts.
freelance writing jobs

9. SmashingJobs

This is a designer’s and programmer’s heaven, offering plenty of full-time and freelance job opportunities. The website has a very clean and crisp design which allows for quick browsing and some efficient job hunting.
Smashing jobs

10. Odesk

Set up an account and choose from 75 different job categories and plenty of offers within each category. The thing with oDesk is that there is no invoicing involved – your work is tracked automatically and you receive payments on a weekly basis depending on how much time you spent on various projects. Some of the main categories include writing and translation, software development, web development, marketing and design.
oDesk

11. Fiverr

Sell your services starting at $5, that’s the tagline and it is quite accurate. You can offer basically anything you can think of – write and perform a poem, create DIY projects or promotional videos, etc. Some basic categories are writing and translation, online marketing, video and animation, music, programing and graphic design.
Fiverr

12. Freelanced

This is a freelance social network where a large number of people with different kinds of talents and skills can come together, share their portfolios and look for some online work. There are a huge number of job categories ranging from creative writers, sculptors and music composers to accountants and programmers.
freelanced

13. Freelance-Writing-Jobs-Online

A variety of fields to write about, ranging from mathematics and physics to biology and medicine. To sign up you need to fill out a form and wait for a confirmation email. Upon receiving the email you may take a competency test and be on your way to earning some money.
freelance-writing-jobs-online

14. Pitch me

A freelancer with some experience in journalism will feel right at home on this website. Ideas are pitched on various topics – fashion, science, culture, etc – and you can pitch as many ideas as you like. If someone likes what you have to offer, they can than pay you to write it, it’s as simple as that.
Pitch Me

15. Text Broker

This website provides talented writers with a very effective way of getting paid for doing what they do best. You start by creating a free account and completing a competency test after which you will be rated. Then, if all goes well, you can complete your author profile and start looking for writing assignments that suit you.
Text Broker

16. Art Wanted

Artwanted is the perfect place for artists and photographers to create an online portfolio, get feedback and sell their artwork online. Registration is free, but there is a $5 per month premium membership option that grants you access to some good bonus features.
Art Wanted

17. 99designs

This is a website where over 281,579 designers from 192 different countries can connect to potential clients and showcase their work. A client gives information about his business and a rough idea of the type of logo he wants. Then the designers send in their work and the client can pick out the one he likes best. You look for design contests, enter the ones you like and do your best to win. As you win more contests your status will improve and you will get more opportunities.

18. Simply Hired

This is a big and broad job hunting website with tons of options, but it is a great way to look for some freelance work, particularly if you are a writer, graphic designer or web designer. It’s very easy to navigate and you can quickly search through a large number of recent job offerings in your field.

19. Tutor

As the name suggests you can become an online tutor for families with home-schooled children, children in military families and even schools. There are a number of subjects and different grade levels to choose from, so if you have a deeper understanding of a subject such as math, English or science, than you can go through a few simple steps. You have to fill out an application form, pass a subject exam and deliver a writing sample, perform a mock session to test your teaching skills and go through a background check before you can start working.
Tutor

20. Authentic Jobs

A well-designed and straightforward job board, AuthenticJobs.com allows you to filter out categories you are not interested in and apply for freelance jobs in different fields. The main focus is on web development, web design, application development, project management and UI design.
Authentic Jobs
I hope you find this information useful and that you succeed in your freelance career. Just remember to be patient and to keep looking. It takes time to see some serious results, but freelancing can be a fulfilling career once you get pass the initial stages.

Tuesday, March 10, 2015

The Top Torrent Sites of 2015

Young Man enjoys computer in kitchen - James Whitaker/Digital Vision/Getty Images

1.Demonoid.ph:  this private membership community has resurrected itself at new domain name Demonoid.ph and Demonoid.pw. Some of you will remember how Demonoid was a very popular and trusted place to get files and stay informed on which torrents to avoid.  Let's see if Demonoid can regain the same eminence at this new server site!
2.Kick Ass Torrents: this is a proven favorite amongst our readers. The interface is a distinctive earth color, and the search results display in a useful format of columns, including torrent health. The best part of Kick Ass Torrents is their comment and feedback system... the user community watches the quality of torrents, and offers their recommendations and warnings. The adult advertising can be annoying, but Kickass.to has an excellent library of torrents  
3.SeedPeer.me: SeedPeer is a very large database of over 3 million torrent files. The search interface is simple, and the keyword cloud map helps as a discovery means to find interesting movies, tv shows, and music artists. Fans speak very highly of SeedPeer, so do consider trying it out. 4.Isohunt.to: Isohunt is reborn!  After being shut down by the MPAA on October 17, 2013, Isohunt has been resurrected with a new domain name in a new country.  Please support this longtime champion of P2P file sharing!  
5.BitSnoop.com: is the largest known database of torrents today.  With over 18 million indexed files, one could argue that this is the only site you'd need to search at.  Try BitSnoop for yourself and see how it presents its results with its comments and ratings... you might like this site as much as other readers do. 
6.Bitport.io Bitpot is a newer 3rd party service in the Czech Republic.  They don't give you torrents, but instead will download torrents for you onto their own private servers. Once your large files are transferred to them, you then log on and download the completed file directly to your computer.  The free version allows 100MB per hour transfer.  You can subscribe to get faster transfer speeds.  Bitport is an excellent service, and considering the risks that they incur, the small $5/month fee is an excellent value for the customer. 
7.VCDQ.com: VCDQ.com isn't technically a torrent search site; rather, VCDQ specializes in verifying torrents. VCDQ employs a committee of serious users to confirm that torrents do indeed exist for thousands of titles, especially brand new movie releases. Use VCDQ to confirm that a title is available, then copy the torrent name to paste into a search engine like Isohunt.com. Definitely give VCDQ.com a try; this is a great resource for avoiding fake torrent files. 
8.Torlock: Torlock is special. These folks actually pay their users commission for uncovering fake torrents and reporting it to their community. In a world of phony files, this is a tremendous service. If you are a regular downloader, and are tired of wasted downloads and fraudulent files, give Torlock a try.
9. btscene.com: btscene is a longtime player in the file sharing game. This website does have annoying popups and adult advertising, but it does offer a solid library of torrents. It does a good job of featuring very recent torrents (good for people who follow television shows), and presenting many browsing choices at a glance.
10.ExtraTorrent.com: ExtraTorrent.com is very visual and very busy.  But the thumbnails and file information at this site are tremendous. This site is definitely worth trying, as it is very browsing-friendly for discovering movies and music artists.   
11.TorrentHound: at over 4.7 million torrents, TorrentHound is one of the largest players in the torrent P2P game. The site does enforce good use of 'white space' in the sidebars, so scanning the pages can be easier for most readers. Unfortunately, the comments counts are not included in the initial search results, so you'll have to click into the individual files to see reader comments.
12.Boxopus: Boxopus is like bitport.io, a 3rd party cloud downloader.  The service does charge $1.50 to use for a week, or $50 for a year.  If you want to integrate with Dropbox, then you'll need to look elsewhere, as Dropbox has blocked Boxopus torrents. But there are some very convenient features here that some readers really rave about.  The price is actually very reasonable if you plan your downloads so that you can use the week-long access to its maximum. 
13.Torrent Funk: Torrent Funk is a very popular torrent search site that now supports commenting. While Torrent Funk also supports 'verified status' tagging, which some people prefer to comments. The interface can be difficult to discern between sponsored ads and the actual torrent links. But the Torrent Funk site layout is pleasing, the cross- movie recommendations are very helpful, and several About.com readers highly recommended Torrent Funk. Give this site a try, and watch if it will grow over time.
 14.The Old (New) Pirate Bay: The Pirate Bay was shut down in 2009, was reborn, and then shut down again in December 2014 (when Swedish police recently raided the Swedish server farm) . But The Pirate Bay refuses to stay down. This new Pirate Bay is renamed 'Old Pirate Bay', and credit goes to Isohunt for resurrecting this iconic website. How long will this fan-favorite website last?  Anything could happen, so use this site while you can!
 15.Torrents.to: this site has a Tonga country domain name, but certainly offers plentiful metasearching of movies and music in English and Spanish. There are some popup advertisements that are annoying, but perhaps you might like the framed interface for searching other torrent sites.

Monday, March 9, 2015

Ten Tips For Protecting Your Computer From Hackers And Viruses


Notebook Computer
1.   Use protection software "anti-virus software" and keep it up to date.

Make sure you have anti-virus software on your computer! Anti-virus software is designed to protect you and your computer against known viruses so you do not have to worry. But with new viruses emerging daily, anti-virus programs need regular updates, like annual flu shots, to recognize these new viruses. Be sure to update your anti-virus software regularly! The more often you keep it updated, say once a week, the better. Check with the web site of your anti-virus software company to see some sample descriptions of viruses and to get regular updates for your software. Stop viruses in their tracks!
2.   Do not open e-mail from unknown sources.

A simple rule of thumb is that if you do not know the person who is sending you an e-mail, be very careful about opening the e-mail and any file attached to it. Should you receive a suspicious e-mail, the best thing to do is to delete the entire message, including any attachment. Even if you do know the person sending you the e-mail, you should exercise caution if the message is strange and unexpected, particularly if it contains unusual hyperlinks. Your friend may have accidentally sent you a virus. When in doubt, delete!
3.   Use hard-to-guess passwords.

Passwords will only keep outsiders out if they are difficult to guess! Do not share your password, and do not use the same password in more than one place. If someone should happen to guess one of your passwords, you do not want them to be able to use it in other places. The golden rules of passwords are:
  • A password should have a minimum of 8 characters, be as meaningless as possible, and use uppercase letters, lowercase letters and numbers, e.g., xk28LP97.
  • Change passwords regularly, at least every 90 days.
  • Do not give out your password to anyone!
4.   Protect your computer from Internet intruders -- use "firewalls."

Equip your computer with a firewall! Firewalls create a protective wall between your computer and the outside world. They come in two forms, software firewalls that run on your personal computer and hardware firewalls that protect a number of computers at the same time. They work by filtering out unauthorized or potentially dangerous types of data from the Internet, while still allowing other (good) data to reach your computer. Firewalls also ensure that unauthorized persons can't gain access to your computer while you are connected to the Internet. You can find firewall hardware and software at most computer stores nationwide. Do not let intruders in!
5.   Do not share access to your computers with strangers. Learn about file sharing risks.

Your computer operating system may allow other computers on a network, including the Internet, to access the hard-drive of your computer in order to "share files". This ability to share files can be used to infect your computer with a virus or look at the files on your computer if you do not pay close attention. So, unless you really need this ability, make sure you turn off file-sharing. Check your operating system and your other program help files to learn how to disable file sharing. Do not share access to your computer with strangers!
6.   Disconnect from the Internet when not in use.

Remember that the Digital Highway is a two-way road. You send and receive information on it. Disconnecting your computer from the Internet when you are not online lessens the chance that someone will be able to access your computer. And if you have not kept your anti-virus software up-to-date, or don't have a firewall in place, someone could infect your computer or use it to harm someone else on the Internet. Be safe and disconnect!
7.   Back up your computer data.

Experienced computer users know that there are two types of people: those who have already lost data and those who are going to experience the pain of losing data in the future. Back up small amounts of data on floppy disks and larger amounts on CDs. If you have access to a network, save copies of your data on another computer in the network. Most people make weekly backups of all their important data. And make sure you have your original software start-up disks handy and available in the event your computer system files get damaged. Be prepared!
8.   Regularly download security protection update "patches."

Most major software companies today have to release updates and patches to their software every so often. Sometimes bugs are discovered in a program that may allow a malicious person to attack your computer. When these bugs are discovered, the software companies, or vendors, create patches that they post on their web sites. You need to be sure you download and install the patches! Check your software vendors' web sites on a regular basis for new security patches or use the new automated patching features that some companies offer. If you don't have the time to do the work yourself, download and install a utility program to do it for you. There are available software programs that can perform this task for you. Stay informed!
9.   Check your security on a regular basis. When you change your clocks for daylight-savings time, reevaluate your computer security.

The programs and operating system on your computer have many valuable features that make your life easier, but can also leave you vulnerable to hackers and viruses. You should evaluate your computer security at least twice a year -- do it when you change the clocks for daylight-savings! Look at the settings on applications that you have on your computer. Your browser software, for example, typically has a security setting in its preferences area. Check what settings you have and make sure you have the security level appropriate for you. Set a high bar for yourself!
10. Make sure that anyone who shares your computer knows what to do if your computer becomes infected.

It is important that everyone who uses a computer be aware of proper security practices. People should know how to update virus protection software, how to download security patches from software vendors and how to create a proper password. Make sure they know these tips too!

Tuesday, March 3, 2015

Your phone now doubles as an Android TV game controller


Using a phone as an Android TV game controller
So you want to play games on your Android TV set, but you'd rather not shell out for a gamepad? You might not have to in the near future. Google has revealed that an upcoming update to Google Play Services will let you use your Android mobile devices as controllers for Android TV games. If you want to start a four-way race or shooting match, you'll only have to ask friends to pull their phones out of their pockets. You'll have to wait for developers to use the technology before you can start playing, but that patience could pay off if it spares you from buying controllers that will likely spend most of their life gathering dust.
Don't miss out on all the latest from GDC 2015! Follow along at our events page right here.

Google's new mobile payment platform is called Android Pay


Google SVP Sundar Pichai
It's shaping up to be a big year for mobile payments, what with Apple Pay enjoying rapid adoption and Samsung finally getting in the game too. Google also has a presence, but it's only very recently decided to ramp up its efforts in this space. Last week, we saw the company team up with AT&T, Verizon and T-Mobile to preload its Wallet mobile payment app on new Android phones, and now it's creating a new framework to power payments across its OS.
Speaking at Mobile World Congress in Barcelona, Google SVP Sundar Pichai confirmed the existence of Android Pay, a platform that will allow developers to build payments into their apps. Don't think of it as a separate app like Wallet (especially as Wallet will utilize the Android Pay platform), but as an OS-level service that makes it easy for app makers or retailers to let you buy things using your Android device.
While Apple Pay lets iPhone users purchase goods in physical stores using NFC, it also provides tools allowing retailers to offer online checkout options using its platform. Pichai didn't go into too much detail as to how Android Pay will work, but did confirm that it will offer similar features to its rival. One is the use of tokenized card numbers, which reduce fraud by generating a one-time credit card number for each transaction. It's also a standard that Visa, MasterCard and American Express all support.
Don't miss out on all the latest news, photos and liveblogs from MWC 2015. Follow along at our events page.

Tuesday, February 17, 2015

Personal Data Microsoft Office Collects and Shares About You

Metadata is the name often used for the hidden personal information captured in your documents—even though you may have never told programs like Microsoft Word, Excel, PowerPoint, and others to collect or share it.
This collected information can be elusive because it does not print or show up on your screen when you view the main document interface. Some metadata may appear to not be included unless you actually type it in, such as: Author, Subject, or Document Title, but these are more of a formality, because that information may be found or alluded to in other types of metadata. 
Here are 12 examples of document statistics and user information that may be readily available to be reviewed by more than yourself, as well as links to what you can do about it!



166419812.jpg - (c) Danil Melekhin / E+ / Getty Images

1.  Your Author Details

Microsoft Office programs may reflect information about you, and the computer that is an extension of you, including your name or initials, your computer or device's name, company name, and network information as mentioned in steps 10 and 11 of this list.

2.  Other or Previous Author Details

The names of previous authors of that document may also be available by default. Collaborators are likely referenced as well, as mentioned in step 8 of this list.

3.  File Properties

The file itself is also described in metadata, including file type. Document properties and statistics such as how long you have worked on the document, when it was last saved, when it was originated, and other usage information may also be available.

4.  Document Versions

When you save Office documents, you typically want past versions to stay in the past! But some version information may be viewable by others.

5.  Templates Used

I actually like this one because it gives credit to those who authored the template, but depending on your project you may not want this displayed.

6.  Personalized Views and Invisible Objects

Office documents allow you to make some content hidden, such as Hidden text, Hidden Rows or Columns in Excel, Off-slide Content in PowerPoint, Presentation Notes, and more.
You may not realize that items in the workspace can be inadvertently referenced in the metadata.

7.  Watermarks

Company watermarks can indicate document status such as "Denied" or "Draft". You may not want others to see even hidden watermarks in metadata

8.  Comments

Not just comments, but also names of revisers, tracked changes, version information, and inked comments or annotations.
Also, Send-for-review information may show as well.

9.  Headers and Footers

Typically, you include headers and footers because you want them to be visible, but sometimes this information is intended for internal eyes only. Email headers may also be accessible.

10.  Document Servers or Libraries

Documents saved to a remote server or library such as SharePoint may also reference that location information in the metadata.

11.  Printer and File Paths

Paths tell Microsoft Office where to send or save your files on your computer or network. This could include hard disks or portable storage devices.
This can also involve your file path for publishing web pages from Microsoft Office.

12.  Other Custom XML Data and Information

Documents can contain other custom Extensible Markup Language such as tags.

Saturday, February 14, 2015

Completely open source, high-end laptop gets closer to reality


Purism Librem 15
If you've wanted a laptop where all the software is free and open source (FOSS), you've usually had to settle for mediocre hardware. Even FOSS champion Richard Stallman is making do with a ThinkPad that's several years old. At last, though, it looks like you won't have to compromise your ideology for the sake of keeping up with the Joneses. Purism has successfully crowdfunded the Librem 15, a portable PC that combines modern parts (such as a 3.4GHz Core i7 and an optional 4K display) with software that's accessible from head to toe. The operating system (a variant of Trisquel GNU/Linux), hardware drivers and included apps are all free and open -- Purism is even trying to loosen up the BIOS and firmware.
There's still some time (as I write this) to make a pledge and set aside a Librem 15 for yourself ahead of the planned April 2015 launch, although it's here that you'll find out that software freedom can be very expensive. Get in on the "earlier bird" special tier and you'll pay $1,649 for a system with just 4GB of RAM, a 500GB hard drive, a read-only DVD drive and a 1080p screen -- it's easy to get a closed source Mac or Windows PC with better memory and storage at a similar price. And while a release is theoretically close at hand, it's often an uphill battle to get completely open computers to market. Even the Novena project, which got its hardware funding last spring, is trickling out just a few of its finished PCs. If you absolutely refuse to run proprietary software, though, you'll at least want to give the Librem a look.

Tuesday, February 10, 2015

How To Solve A Rubik's Cube Step By Step

Step 1: White CrossYou should be able to complete this step just by playing around with the cube. Make sure that the edges of the cross match the center squares on the adjacent sides.
Step 2: Finish First Layer

Step 3: Middle LayerYou may need to move some middle-layer edge pieces from the top layer. Follow the patterns below to get these pieces in the right places.
Rubik's - Middle LayerBusiness Insider
Step 4: Top CornersTo get the corners in the right place, you can use this pattern to swap corners until all four corners are in the right location. At this stage, they do not need to be facing the right way.
Rubik's Swap CornersBusiness Insider
To orient corners use a combination of the patterns below. The first will turn the faces of three corners clockwise. The next will turn the faces of three faces counter-clockwise.
Rubik's ClockwiseBusiness Insider
Step 5: Top Layer Edges In The Right PlaceMake sure all the edges are in the right location. Do not worry if they are facing the wrong way. Use a combination of the patterns below to move these edge pieces.
Rubik's Permute EdgesBusiness Insider

Step 6: Top Layer Edges Facing The Right WayUse either of the patterns below or a combination to orient these edge pieces correctly.
Rubik's Final Layer Edges

Android Lollipop is slowly (very slowly) hitting more devices


Android Lollipop is slowly (very slowly) hitting more devices
Lollipop didn't exactly take the Android world by storm when it first launched. Early adoption was slow enough that it made no real impat in usage share stats for the first couple of months. People are starting to take to Google's latest dessert-flavored OS, however -- it's finally on the official radar. Google's data now shows that about 1.6 percent of active Android users were using Lollipop as of the start of February. That's certainly not a lot, but it's clear that all those Nexuses and early Lollipop upgrades (most notably from HTC, LG and Motorola) count for something.
Not that Lollipop is doing much to hurt its predecessor, KitKat. If anything, the older software is gathering steam. KitKat climbed to 39.7 percent, no doubt helped by a market where a good chunk of phones still ship with with the 2013-era OS. As you might guess, the declines are largely limited to Jelly Bean and earlier versions that you'd expect to be on their way out. The real question is whether or not Lollipop will gather momentum quickly. That should happen when new flagship phones are just around the corner, but it could be a while before you really know how well it's doing.

Saturday, February 7, 2015

Mental health monitoring through 'selfie' videos, social media tracking

Researchers at the University of Rochester have developed an innovative approach to turn any computer or smartphone with a camera into a personal mental health monitoring device.

In a paper to be presented this week at the American Association for Artificial Intelligence conference in Austin, Texas, Professor of Computer Science Jiebo Luo and his colleagues describe a computer program that can analyze "selfie" videos recorded by a webcam as the person engages with social media.
Apps to monitor people's health are widely used, from monitoring the spread of the flu to providing guidance on nutrition and managing mental health issues. Luo explains that his team's approach is to "quietly observe your behavior" while you use the computer or phone as usual. He adds that their program is "unobtrusive; it does not require the user to explicitly state what he or she is feeling, input any extra information, or wear any special gear." For example, the team was able to measure a user's heart rate simply by monitoring very small, subtle changes in the user's forehead color. The system does not grab other data that might be available through the phone -- such as the user's location.
The researchers were able to analyze the videodata to extract a number of "clues," such as heart rate, blinking rate, eye pupil radius, and head mov ement rate. At the same time, the program also analyzed both what the users posted on Twitter, what they read, how fast they scrolled, their keystroke rate and their mouse click rate. Not every input is treated equally though: what a user tweets, for example, is given more weight than what the user reads because it is a direct expression of what that user is thinking and feeling.
To calibrate the system and generate a reaction they can measure, Luo explained, he and his colleagues enrolled 27 participants in a test group and "sent them messages, real tweets, with sentiment to induce their emotion." This allowed them to gauge how subjects reacted after seeing or reading material considered to be positive or negative.
They compared the outcome from all their combined monitoring with the users' self reports about their feelings to find out how well the program actually performs, and whether it can indeed tell how the user feels. The combination of the data gathered by the program with the users' self-reported state of mind (called the ground truth) allows the researchers to train the system. The program then begins to understand from just the data gathered whether the user is feeling positive, neutral or negative.
Their program currently only considers emotions as positive, neutral or negative. Luo says that he hopes to add extra sensitivity to the program by teaching it to further define a negative emotion as, for example, sadness or anger. Right now, this is a demo program they have created and no "app" exists, but they have plans to create an app that would let users be more aware of their emotional fluctuations and make adjustments themselves.
Luo understands that this program and others that aim to monitor an individual's mental health or well-being raise ethical concerns that need to be considered. He adds that using this system means "effectively giving this app permission to observe you constantly," but adds that the program is designed for the use of the user only and does not share data with anyone else unless otherwise designated by the user.

500 Internal Server Error

What Is a 500 Internal Server Error?

The 500 Internal Server Error is a very general HTTP status code that means something has gone wrong on the web site's server but the server could not be more specific on what the exact problem is.
Is the 500 Internal Server Error on your site? See Fixing 500 Internal Server Error Problems on Your Own Site towards the bottom of the page for some better advice.
The 500 Internal Server Error message might be seen in any number of ways because each website is allowed to customize the message.
Several common ways that you might see the HTTP 500 error include 500 Internal Server Error, HTTP 500 - Internal Server Error, Temporary Error (500), Internal Server Error, HTTP 500 Internal Error, 500 Error, HTTP Error 500, and 500. That's an error... among others.
Since a 500 Internal Server Error is generated by the website you're visiting, you could see one in any browser in any operating system, even on your smartphone.
Most of the time, a 500 Internal Server Error displays inside the Internet browser window, just as web pages do.

Cause of HTTP 500 Errors

As I mentioned above, Internal Server Error messages indicate that something in general is wrong.
Most of the time, "wrong" means an issue with the page or site's programming but there's certainly a chance the problem is on your end, something we'll investigate below.
Note: More specific information about the cause of a particular HTTP 500 error is often provided when it occurs on a server using Microsoft IIS software. Look for numbers after 500 as in HTTP Error 500.19 - Internal Server Error which means Configuration data is invalid. See More Ways You Might See an Internal Server Error below for the complete list.



How To Fix the 500 Internal Server Error

Like I alluded to above, the 500 Internal Server Error is a server-side error, meaning the problem probably isn't with your computer or Internet connection but instead is a problem with the web site's server.
While not probable, it is possible that there's something wrong on your end and we'll look at some things you can try.


  1. Reload the web page. You can do that by clicking the refresh/reload button, pressing F5, or trying the URL again from the address bar.

    Even if the 500 Internal Server Error is a problem on the web server, the issue may only be temporary. Trying the page again will often be successful.

    Note: If the 500 Internal Server Error message appears during the checkout process at an online merchant, be aware that duplicate attempts to checkout may end up creating multiple orders - and multiple charges! Most merchants have automatic protections from these kinds of actions but it's still something to keep in mind.
     
  2. Clear your browser's cache. If there's a problem with the cached version of the page you're viewing, it could be causing HTTP 500 issues.

    Note: Internal Server Errors are not often caused by caching issues but I have, on occasion, seen the error go away after clearing the cache. It's such an easy and harmless thing to try so don't skip it.
     
  3. Delete your browser's cookies. Some 500 Internal Server Error issues can be corrected by deleting the cookies associated with the site you're getting the error on.

    After removing the cookie(s), restart the browser and try again.
     
  4. Troubleshoot as a 504 Gateway Timeout error instead.

    It's not very common, but some servers produce a 500 Internal Server Error when in reality the more appropriate message based on the cause of the problem is 504 Gateway Timeout.
     
  5. Contacting the website directly is another option. Chances are good that the site's administrators already know about the 500 error but if you suspect they don't, letting them know helps both you and them (and everyone else).

    See my Website Contact Information list for contact information for popular websites. Most sites have support-based social network accounts and a few even have email and telephone numbers.

    Tip: If it looks like the site is down completely and you can't find a way to report the 500 Internal Server Error message to the website, it might help your sanity to keep up with the outage on Twitter. You can usually do this by searching for #websitedown on Twitter, as in #gmaildown or #facebookdown.
     
  6. Come back later. Unfortunately, at this point, the 500 Internal Server Error is no doubt a problem outside your control that will eventually get fixed by someone else.

    If the 500 Internal Server Error message is appearing at check out during an online purchase, it might help to realize that sales are probably being disrupted - usually a great incentive to the online store to fix the issue very quickly!

    Even if you're getting the 500 error on a site that doesn't sell anything, like YouTube or Twitter, as long as you've let them know about the problem, or at least tried, there's little more you can do than wait it out.

Fixing 500 Internal Server Error Problems on Your Own Site

A 500 Internal Server Error on your own website requires a completely different course of action. As I mentioned above, most 500 errors are server-side errors, meaning it's likely your problem to fix if it's your website.
There are lots of reasons why your site might be serving a 500 Error to your users but two are most common:
  • A Permissions Error. In most cases, a 500 Internal Server Error is due to an incorrect permission on one or more files or folders. In most of those cases, an incorrect permission on a PHP and CGI script is to blame. These should usually be set at 0775 (-rwxr-xr-x).
  • A Coding Error in .htaccess. While not as common, be sure to check that your site's .htaccess file is properly structured.
If you're running WordPress, Joomla, or another content management or CMS system, be sure to search their support centers for more specific help troubleshooting a 500 Internal Server Error.
If you're not using an off-the-shelf content management tool, your web hosting provider, like InMotion, Dreamhost, Bluehost, 1&1, etc., probably has some 500 Error help that might be more specific to your situation.

More Ways You Might See an Internal Server Error

In Internet Explorer, the message The website cannot display the page often indicates an HTTP 500 Internal Server Error. A 405 Method Not Allowed error is another possibility but you can be sure by looking for either 500 or 405 in the IE title bar.
When Google services, like Gmail or Google+, are experiencing a 500 Internal Server Error, they often report a Temporary Error (500) or simply 500.
When Windows Update reports an Internal Server Error, it appears as a WU_E_PT_HTTP_STATUS_SERVER_ERROR message or as the 0x8024401F error code.
If the website that reports the 500 error is running Microsoft IIS, you may get a more specific error message:
500.0 Module or ISAPI error occurred.
500.11 Application is shutting down on the web server.
500.12 Application is busy restarting on the web server.
500.13 Web server is too busy.
500.15 Direct requests for Global.asax are not allowed.
500.19 Configuration data is invalid.
500.21 Module not recognized.
500.22 An ASP.NET httpModules configuration does not apply in Managed Pipeline mode.
500.23 An ASP.NET httpHandlers configuration does not apply in Managed Pipeline mode.
500.24 An ASP.NET impersonation configuration does not apply in Managed Pipeline mode.
500.50 A rewrite error occurred during RQ_BEGIN_REQUEST notification handling. A configuration or inbound rule execution error occurred.
500.51 A rewrite error occurred during GL_PRE_BEGIN_REQUEST notification handling. A global configuration or global rule execution error occurred.
500.52 A rewrite error occurred during RQ_SEND_RESPONSE notification handling. An outbound rule execution occurred.
500.53 A rewrite error occurred during RQ_RELEASE_REQUEST_STATE notification handling. An outbound rule execution error occurred. The rule is configured to be executed before the output user cache gets updated.
500.100 Internal ASP error.
More information on these IIS-specific codes can be found on Microsoft's The HTTP status code in IIS 7.0, IIS 7.5, and IIS 8.0 page.

Errors Like the HTTP 500 Error

The following error messages are similar to the 500 Internal Server Error message because they're all server-side errors:


তাজউদ্দীন আহমদ, নেতা ও পিতা PDF Free Download

সময়ের সবচাইতে আলোচিত, বাংলাদেশের প্রথম প্রধানমন্ত্রী তাজউদীন আহমদকে নিয়ে তাঁর মেয়ে শারমীন আহমদের রচিত বই “তাজউদ্দীন আহমদ, নেতা ও পিতা” ডাইউনলোড করুন এই লিঙ্ক থেকে-   


Tajuddin Ahmad, Neta o Pita PDF

Friday, February 6, 2015

How to Give a Killer Presentation

Continuing our “Ten Simple Rules” series [15], we consider here what it takes to make a good oral presentation. While the rules apply broadly across disciplines, they are certainly important from the perspective of this readership. Clear and logical delivery of your ideas and scientific results is an important component of a successful scientific career. Presentations encourage broader dissemination of your work and highlight work that may not receive attention in written form.

Rule 1: Talk to the Audience

We do not mean face the audience, although gaining eye contact with as many people as possible when you present is important since it adds a level of intimacy and comfort to the presentation. We mean prepare presentations that address the target audience. Be sure you know who your audience is—what are their backgrounds and knowledge level of the material you are presenting and what they are hoping to get out of the presentation? Off-topic presentations are usually boring and will not endear you to the audience. Deliver what the audience wants to hear.

Rule 2: Less is More

A common mistake of inexperienced presenters is to try to say too much. They feel the need to prove themselves by proving to the audience that they know a lot. As a result, the main message is often lost, and valuable question time is usually curtailed. Your knowledge of the subject is best expressed through a clear and concise presentation that is provocative and leads to a dialog during the question-and-answer session when the audience becomes active participants. At that point, your knowledge of the material will likely become clear. If you do not get any questions, then you have not been following the other rules. Most likely, your presentation was either incomprehensible or trite. A side effect of too much material is that you talk too quickly, another ingredient of a lost message.

Rule 3: Only Talk When You Have Something to Say

Do not be overzealous about what you think you will have available to present when the time comes. Research never goes as fast as you would like. Remember the audience's time is precious and should not be abused by presentation of uninteresting preliminary material.

Rule 4: Make the Take-Home Message Persistent

A good rule of thumb would seem to be that if you ask a member of the audience a week later about your presentation, they should be able to remember three points. If these are the key points you were trying to get across, you have done a good job. If they can remember any three points, but not the key points, then your emphasis was wrong. It is obvious what it means if they cannot recall three points!

Rule 5: Be Logical

Think of the presentation as a story. There is a logical flow—a clear beginning, middle, and an end. You set the stage (beginning), you tell the story (middle), and you have a big finish (the end) where the take-home message is clearly understood.

Rule 6: Treat the Floor as a Stage

Presentations should be entertaining, but do not overdo it and do know your limits. If you are not humorous by nature, do not try and be humorous. If you are not good at telling anecdotes, do not try and tell anecdotes, and so on. A good entertainer will captivate the audience and increase the likelihood of obeying Rule 4.

Rule 7: Practice and Time Your Presentation

This is particularly important for inexperienced presenters. Even more important, when you give the presentation, stick to what you practice. It is common to deviate, and even worse to start presenting material that you know less about than the audience does. The more you practice, the less likely you will be to go off on tangents. Visual cues help here. The more presentations you give, the better you are going to get. In a scientific environment, take every opportunity to do journal club and become a teaching assistant if it allows you to present. An important talk should not be given for the first time to an audience of peers. You should have delivered it to your research collaborators who will be kinder and gentler but still point out obvious discrepancies. Laboratory group meetings are a fine forum for this.

Rule 8: Use Visuals Sparingly but Effectively

Presenters have different styles of presenting. Some can captivate the audience with no visuals (rare); others require visual cues and in addition, depending on the material, may not be able to present a particular topic well without the appropriate visuals such as graphs and charts. Preparing good visual materials will be the subject of a further Ten Simple Rules. Rule 7 will help you to define the right number of visuals for a particular presentation. A useful rule of thumb for us is if you have more than one visual for each minute you are talking, you have too many and you will run over time. Obviously some visuals are quick, others take time to get the message across; again Rule 7 will help. Avoid reading the visual unless you wish to emphasize the point explicitly, the audience can read, too! The visual should support what you are saying either for emphasis or with data to prove the verbal point. Finally, do not overload the visual. Make the points few and clear.

Rule 9: Review Audio and/or Video of Your Presentations

There is nothing more effective than listening to, or listening to and viewing, a presentation you have made. Violations of the other rules will become obvious. Seeing what is wrong is easy, correcting it the next time around is not. You will likely need to break bad habits that lead to the violation of the other rules. Work hard on breaking bad habits; it is important.

Rule 10: Provide Appropriate Acknowledgments

People love to be acknowledged for their contributions. Having many gratuitous acknowledgements degrades the people who actually contributed. If you defy Rule 7, then you will not be able to acknowledge people and organizations appropriately, as you will run out of time. It is often appropriate to acknowledge people at the beginning or at the point of their contribution so that their contributions are very clear.
As a final word of caution, we have found that even in following the Ten Simple Rules (or perhaps thinking we are following them), the outcome of a presentation is not always guaranteed. Audience–presenter dynamics are hard to predict even though the metric of depth and intensity of questions and off-line followup provide excellent indicators. Sometimes you are sure a presentation will go well, and afterward you feel it did not go well. Other times you dread what the audience will think, and you come away pleased as punch. Such is life. As always, we welcome your comments on these Ten Simple Rules by Reader Response.

Wednesday, February 4, 2015

Windows 10's new features: Cortana, a 'Spartan' browser, Xbox streaming, and more


It’s official, folks: Windows 10 is coming to the people. After kicking off Windows 10 with a bevy of business-friendly featur, Microsoft drew back the curtain on the operating system’s new consumer-focused features at an event on Wednesday, while simultaneously driving home a vision of an operating system designed to deliver a singular, cohesive experience across a myriad of device types.
And it'll be a free upgrade for Windows 7 and 8 users, who can snag the operating system for nada in the first year after Windows 10 hits the streets.
After Microsoft operating system chief Terry Myerson announced that crucial tidbit, Microsoft’s Joe Belfiore took the stage to run through some features coming to Windows 10 Preview that are designed to make using the operating system a smoother experience.
First, Belfiore showed off some helpful tweaks to Windows 10 features that have already been announced: The Start menu will be able to expand to fill the full screen if you desire, for one thing. The Action Center (read: Windows 10’s notification center) is receiving improved functionality, such as Windows Phone 8.1-esque quick action buttons that let you activate features (such as Bluetooth and Wi-Fi) with a single click. Notifications in the Action Center will be able to be expanded.
More helpfully for everyday workflow, Windows 10 will condense the Control Panel and the modern UI PC Settings into a single interface, eliminating Windows 8’s maddening insistence on dumping crucial system tools into two separate locations.
Microsoft also announced that its Continuum feature, which dynamically shifts the Windows 10 interface from the Modern UI to the desktop depending on whether you’re using a traditional PC or a touchscreen device, will soon appear in Windows 10 Preview builds.

Cortana comes to PCs

windows 10 cortana weather
Cortana on a Windows 10 PC.
As anticipated, Microsoft’s Cortana digital assistant will make the jump from Windows Phone to Windows 10, assuming control of many of the operating system’s search features. Cortana, which will get her own place next to the Start button in the desktop taskbar, can perform many of the same basic tricks she does in Windows Phone. Cortana can be interacted with via text or natural voice queries, just like on mobile devices.
Still based off Microsoft’s cloud-based Bing brains, Cortana can answer basic queries like “Will I need a coat tomorrow?” or how much it costs to attend the University of Washington, as Belfiore showed in live demonstrations. But Cortana’s also been tweaked for more useful PC-like interactions. She can scour your local machine, OneDrive account, and even your business network to find files based on natural language queries. Belfiore showed off the capabilities by asking Cortana to “Find PowerPoint slides about the charity auction” and “Show me photos from December.” The digital assistant surfaced the desired information nearly instantly.
That sounds pretty darn handy, and there are more playful commands, too: Telling Cortana to “Play my music” launches the music app, while asking her to “Please be quiet” silences the music. Nice!

Windows 10 for phones and universal apps

Belfiore then veered off to show Windows 10 on phones and tablets, including a brief demo of mobile, touch-friendly Office apps. Windows 10 for phones will basically act like an extension of your PC, featuring universal Windows apps that share the same central heart and design as their PC counterparts, as well as newly universal notifications that synchronize across Windows 10 devices.
Windows 10 phones and small-screen tablets will include a free copy of Office. For a quick look at the universal Office apps, be sure to check out our article on Windows 10 for phones and tablets.
After the mobile talk, Belfiore showcased a rebuilt version of Outlook designed for PCs, tablets, and phones alike as a universal Windows app. Strongly resembling the Mail app in Windows 8—at least aesthetically—the universal Outlook map will sport a unified look across device types, packing touch-friendly commands such as swiping left on a message to remove it, or swiping right to flag it for later follow up.
Since many of Microsoft’s apps—including Outlook—have their heads in the cloud, changes you make to a universal app on one device will be immediately reflected on other devices, as Belfiore demoed by actively editing Calendar app entries simultaneously on a PC and a phone.
Microsoft’s bringing the same cloud-centric, universal app experiences to its core Windows apps as well, all powered by OneDrive on the backend. The Photos app will create albums from all your devices, intelligently removing duplicates and burst photos. A revamped universal People app will collate your contacts, while the Music app is also receiving a universal overhaul. As rumored, Microsoft will add support for you to put your music collection in OneDrive within the next month or two, so you can listen to your tunes anywhere. Maps will also be receiving Cortana integration, and she'll be able to remember where you parked your car.

This is Spartan

Also new to Windows 10 is Spartan: A new, clean-looking, lightweight browser built around a new rendering engine. It won’t be available in the first Windows Insider builds, and it will only come to phones eventually, Belfiore said.
windows 10 project sparta markup web
The Spartan browser's annotation capabilities.
The Spartan browser includes a note-taking mode that lets you annotate a webpage, then share your marked-up, commented-on version with others using Windows 10’s native Share feature. There’s also a clipping tool so you can save portions of websites directly to OneNote.
Spartan also doubles down on the mere act of reading on the Internet. The browser integrates an updated version of the stellar Reading Mode found in Windows 8’s Metro Internet Explorer app. Reading Mode strips all the ads and sidebar crud out of webpages, formatting articles so that they appear similar to a book. It’s a wonderful thing. Spartan also taps into the Windows Reading List app, so you can save articles to read later, synchronizing the list across multiple devices. Unlike the Reading List app in Windows 8, the one in Windows 10 will let you save content to read offline.
windows 10 project sparta cortana
Cortana surfacing restaurant info in the Spartan browser.
Cortana is also being integrated directly into Spartan. "Because she knows you, she can help in more nuanced ways,” Belfiore said, showing an example where searching for “Delta” in his address bar popped up information for the Delta flight Belfiore was scheduled to take later. Cortana will also pop up when you visit a restaurant’s website, surfacing directions as well as information about the restaurant’s menu, hours of operating, and Yelp reviews.

Improving PC games with Xbox

windows 10 xbox video
The Windows 10 Xbox app.
Microsoft’s also bolstering Windows 10’s gaming chops by deeply integrating Xbox capabilities into the operating system. A new Xbox app essentially looks like a more fully fleshed-out version of SmartGlass, letting you chat with your Xbox Live pals, view your achievement information, or access game DVR clips. The app also lets you like, share, and comment on game clips.
But Windows 10’s new gaming chops is about more than merely expanding Xbox’s footprint. While you’re playing traditional PC games, be it in Steam or otherwise, a new Windows key + G keyboard shortcut brings up an interface for saving snapshots and 30 second video clips of your adventures, which then brings you into the Xbox app to share it. Games don’t directly have to support the functionality as it’s being overlaid directly by Microsoft in Windows 10.
windows 10 steam
Windows 10's new screenshot- and video-capturing tools will work with any PC game, including Steam games.
As previously announced, the performance-enhancing DirectX 12 gaming API is also coming to Windows 10. Xbox head Phil Spencer claims that the API can deliver up to a 50 percent performance improvement in games.
Microsoft also wants to enable more gaming experiences regardless of the device you’re using. Fable Legends players on Windows 10 and Xbox One will be able to play with each other, and you’ll be able to stream your Xbox One games directly to any Windows 10 device, though it sounds like it will be limited to local networks only, similarly to Steam in-home streaming.

Surface hub and Windows Holographic

surfacehub
The Surface Hub.
This has nothing to do with Windows, but it's a major—and unexpected—hardware announcement from Microsoft: The company's rolling out the Surface Hub, an 84-inch, 4K, touch-enabled display for office collaboration. You can read the full details here.
microsoft windows 10 holographic Image: Microsoft
Windows Holographic will build 3D imaging into Windows 10, which can be experienced using the HoloLens headset.
And the Surface Hub isn't even the craziest hardware announced by Microsoft today. That honor goes to Windows Holographic, a set of technologies—a headset, new Windows 10 technology, and a HoloStudio dev app—that brings some insanely intense augmented reality capabilities to Windows. You'll definitely want to check this out.

When can you get it?

Myerson also revealed some stats from the Windows 10 Technical Preview. Thus far, more than 1.7 million people have registered for the Windows Insider program, and they’ve installed Windows 10 on more than 3 million different PCs.
A fresh Windows 10 Preview build containing the newly announced features will hit PCs next week, with a Windows 10 build for phones becoming available after the Super Bowl. Here's how to get started with the Windows 10 Preview.