Monday, January 23, 2012

How Often Should I Charge My Gadget’s Battery to Prolong Its Lifespan?


Referred URL


How Often Should I Charge My Gadget's Battery to Prolong Its Lifespan?

Most lithium batteries should last you a few years, but improper care can decrease that lifespan, meaning that your battery will be unable to hold a charge—or unable to hold as big a charge as it used to—quicker. So, to clear things up, here's how to actually extend your battery's health as much as possible.

  • Full size

  • Perform shallow discharges. Instead of discharging to 0% all the time, lithium-ion batteries do best when you discharge them for a little bit, then charge them for a little bit. The table at the right, from Battery University, shows that discharges to 50% are better for your battery's long-term life than, say, small discharges to 90% or large discharges to 0% (since the 50% discharges provide the best number of cycles-to-usage ratio).
  • Don't leave it fully charged. Similarly, lithium-ion batteries don't need to be charged all the way to 100%. In fact, they'd prefer not to be—so the 40%-80% rule you heard is a good guideline. When possible, keep it in that range to prolong its life as long as you can. And, if you do charge it to 100%, don't leave it plugged in. This is something most of us do, but it's another thing that will degrade your battery's health. If you need to charge it overnight, use something like the Belkin Conserve Socket to stop it from charging after it's full.
  • Fully discharge it once a month. This may seem contradictory, but hear us out. While lithium-ion batteries shouldn't be discharged regularly, most modern batteries are what's known as "smart batteries", which means that they can tell you how long you have until your battery dies (e.g. "2 hours, 15 minutes remaining"). This feature can get miscalibrated after a lot of shallow discharges. So, manufacturers recommend fully discharging your battery once a month to make sure this stays accurate.

Wednesday, January 18, 2012

‘Damaged UDisk’ error message in Android Tablet


Folks recently i purchased a Android 7inch Zync tablet and tried for connecting with 3G data card. When I insert  my Huawei 3G data card it was showing the ‘Damaged UDisk’. I was bit confused and then i found the solution.

Problem is

Since the 3G data card is USB type, It search for memory card or storage area, Where 3G data card by default doesn’t have a memory card.

Steps to Connect

1) Leave about that error part and continue these steps for 3g Connection.

2) Goto 3G settings and enter connection details

3) Click submit

Connection Details for all Network

BRAND / Profile Name





Reliance 2G & 3G RCOMNET  OR  SMARTNET *99# Blank Blank
Airtel 2G & 3G *99# Blank Blank
Tata Docomo 2G tata.docomo.internet *99# Blank Blank
Tata Docomo 3G tatadocomo3g *99# Blank Blank
Vodafone 2G & 3G www *99# Blank Blank
Aircel 2G & 3G aircelgprs or *99# Blank Blank
Videocon 2G & 3G vgprs or vinternet *99# Blank Blank
Uninor uninor *99# Blank Blank
BSNL bsnlnet *99# Blank Blank
IDEA internet *99# Blank Blank

Wednesday, January 11, 2012

Need to Combine E-Learning with Mentoring? Here’s a Simple Solution.


Referred URL 

The Rapid E-Learning Blog - elearning combined with peer coached mentoring

Recently someone asked how to combine their mentoring program with elearning courses.  This is something I’ve worked on a few times over the years.  It usually involved a production environment where peer coaches were tasked with training new employees on the floor.  But the ideas in this post could work in any type of training program that includes some sort of mentoring or peer coaching.

A Common Case

A person’s hired to a new position and often assigned a peer coach who walks beside him until he’s up-to-speed.  Not only is this an effective way to teach new employees, it’s also a great way to help build a social connection to the work and organization.

However, there are a few challenges with this type of training and many are overcome by blending elearning content with the peer coaching.

Here are a few of the challenges I’ve encountered:

  • Pulling people from real production. The peer coach also has her own job to do.  So there’s pressure to help the new person but then get back to work.  Because of this, the peer coach may take short cuts, not present complete information, or neglect the needs of the new person.
  • Inconsistent training process.  Much of the new person’s learning is dictated by the peer coach’s own work flow.  This can make it a challenge if the new person doesn’t fully understand what’s going on and jumps from one thing to the next without understanding the proper context or work process.
  • Assign the wrong tasks to new learners.  It’s common to pawn off the easiest or less desired tasks to the new person.  Sometimes there’s too much focus on putting people on the simplest work until “they get it” and then advance them to more challenging work later on.
  • Learning can be intimidating.  People can be intimidated by new tasks, especially in a real work environment where mistakes impact production.

The Rapid E-Learning Blog - add elearning to the mentoring process

The Value of E-Learning

There should be some consistency in the training process.  However, peer coaching programs are notorious for inconsistency.  Even if the peer coach is really good, things like work requirements or personal areas of emphasis tend to make each training event a bit different. That’s where elearning proves valuable.

E-learning courses are effective in dealing with these challenges.  Elearning courses allow you to remove the person from the time and resource pressures of the real world.  This can ensure consistent delivery of critical information as well as compress the time to learn. 

  • Doesn’t interfere with production: the learner is not constrained by real work processes.
  • Asynchronous access: The information can be accessed anywhere and at any time.
  • Less demand on peer coach: The peer coach can spend less time with the learner for some of the training.
  • Consistent messaging & delivery: Information structure and delivery is consistent regardless of peer coach’s personal style or emphasis.
  • Intentional training design: Allows you to present a more holistic and complete training program rather than sticking people on the easy tasks or boring work until some later date.

Elearning modules are excellent for delivering key information that may missed during on-the-job training that’s focused on very specific tasks.  For example, in a real production environment while showing someone how to use a machine you may focus on the actual steps required for performance but lose out on explaining the upstream and downstream effects of the workflow.  In addition, production environments tend to be loud, which makes it difficult to have good conversation.

This can be solved with a simple orientation module where you provide a brief overview of the production process and workflow.  This allows you to maintain consistent messaging and it frees the peer coach from that part of the training.  You can also structure the module to review and assess the learner’s understanding, something that may be missed on the floor.

I worked on a production course once where we found the new hires were intimidated by the large machines.  So instead of putting them to work right away, we spend time teaching them the parts of the machine and how to do preventive maintenance.  We used a series of small elearning courses to go through the technical information and combined them with hands-on preventive maintenance.

By the time they started working on the machine they were very familiar and comfortable with what was going on.  We cut the training time dramatically.  The elearning courses also allowed us to control the information and practice activities.  Something that may have varied based on the peer coach.

The Learning Journal

Part of the training happens during the elearning module and part during the face-to-face time. To create a bridge, I like to add a learning journal. I see it as a way to instigate some note-taking and create a resource that becomes personal and something the learner always has access to. The note-taking in the learning also helps with knowledge transfer.

The Rapid E-Learning Blog - a learning journal becomes the bridge between the elearning course and mentor

What’s included in the learning journal?

  • Training calendar. Give the person a schedule that lets them know what they will be learning. They can check off what they’ve learned as they advance. This provides a progress report to the learner, the peer coach, and supervisor.
  • Self-assessment. List the things they need to know or do to be proficient. They can review it and determine how well they’re doing. Include information on finding additional resources. I like this approach because it gives the learner some freedom and confidence as they assess their skills.
  • Peer coach guides. Each elearning module should be coupled with a real-world activity. The peer coach guide tells the learner and peer coach what that is. This helps move the training forward. The peer coach is obligated to this process so they take fewer short cuts. And the learner is able to determine if something’s been skipped. I also include some quick review questions that cover the essential points of the module. After each module, the peer coach uses the questions as a way to review what was learned and assess the new person’s understanding.
The Peer Coach

A mentored training program is an effective way to train new employees.  But it’s also a great way train existing employees who are being groomed for greater management responsibilities.  You can use the peer coaching process as a way to teach giving feedback and supervising others.  It’s a great way to model the expectations you would have for supervisors or managers.

The Rapid E-Learning Blog - the peer coach reviews what the person learned in the elearning course

The key to success is consistency and commitment to the process.  At the same time, the peer coaching needs to work in a real environment. 

  • Get peer coaches involved. When building this type of training it’s critical to connect with the peer coaches to craft the right types of activities and how to schedule them.  Otherwise the training program becomes burdensome and creates extra work as people circumvent the official training to get things done quickly.
  • Teach them how to review progress and fill gaps.  We combined the elearning module with a real-world activity.  The peer coaches reviews what’s learned online to get a sense of how the person is progressing and to fill any gaps.  The learning journal’s structure facilitates assessing the learner’s understanding.
  • Empower the peer coach.  The objective is to create a good training program.  People learn in different ways so the peer coach has to have some flexibility in how they work through the training with the new employee.  Break the content into smaller modules so that you have more freedom to work with them.

Beware of Bureaucracy

The training program is a solution that helps meet your objective of training people.  The goal is that people are able to meet a specific level of proficiency.  It’s not that they go through training.  Often we focus too intently on the process that we lose sight of the real objectives. 

While you want to design a good training program that is consistent and effective, it has to include a way to work with the learner as an individual and how she learns.  The last thing you want is a burdensome process that is also so rigid that doesn’t account for how the trainee is actually doing and able to demonstrate understanding.

The peer coach plays a critical role in assessing the person’s progress and understanding of the key points of the training.  You can alleviate the bureaucratic elements by having clear metrics for proficiency.

To sum it all up:
  • Determine what content can be taught electronically and what needs to be done in the real world.
  • Break the content into smaller modules with each module combining elearning and real world learning.
  • Use a learning journal as a means to bridge the two parts of the module and facilitate the conversation between learner and peer coach.
  • Get the peer coach involved in the training design.
  • Use the peer coaching experience as a way to develop that person’s management skills.
  • Avoid bureaucracy.

Saturday, January 7, 2012

Ten Things To Do to Secure an Important Person's Computer


1. Find Your Phone - Make your cell phone "findable"

Find my phone!It flat sucks to lose your phone.

  • If you have a Windows Phone, you can go to to locate, ring, lock or even torch your phone. It just works and it's on when you setup your phone for the first time.
  • If you have an iPhone (or any iDevice, in fact) you can go to, sign in and locate, run, lock or wipe your phone as well. For offline phones, you can have it email you when the phone is found (turned on). You'll want to update your iPhone to iOS 5 and run through the initial wizard in order to confirm this is working for you.
  • There's a dozen or more choices for Android phones, but I suggest you check out either Plan B or Where's My Droid. A third good option that you could use on all your devices is Prey. Each of these will do what they need to. Find your phone.

Test your chosen Find My Phone technique before you go off losing it! Make sure all your stuff is backed up occasionally so you won't feel bad at all about a Remote Wipe (erasing your phone so the bad guys don't get it).

Add a Pin Number and Lock Your Phone

Next, DO Add at a Pin Number or password to your Phone. Having a phone that's unlocked already is just asking for trouble. You can always pick a simple 4 digit pin but pick SOMETHING.

Make an "If Found" Wallpaper

However, if you do use a password or pin and lock your phone by default, be sure to update your wallpaper to include contact info. I highly recommend the application If Found+ for the iPhone. It'll take your existing WallPaper and stamp a "If found, call..." or "Reward if found, email..." on your phone. Sometimes $50 and a phone number will get you your phone back quickly.

2. Don't be Trackable - Turn of Location Settings for specific apps on your Phone, Twitter and Facebook

You want to be able to find your phone, but you shouldn't give away your location when you talk online. Ever heard of They'll look at your Twitter account and see if you're giving away your location via FourSquare checkins and the like. The bad guys would love to break into your house when they can be sure you're not there. Broadcasting your location is a great way to make it easy for them.

There are many ways you can accidentally give away your location. First, in your Twitter profile. Early iPhone Twitter clients would update this field automatically with your exact latitude and longitude.

For example, here's a parody account that indicates it's not a real person. However, I can still tell where they are in the world...down to 6 decimal points.


Another way is to tweet and include your location, either on purpose or accidentally. Most Twitter clients have a "geotag" button now, but you may just want to turn that feature off completely by denying the twitter application access to your Location Services.

Also, don't be the mayor of your house. Foursquare recently started "blurring" the locations of what it believes are residences, but you can still give your location in general terms when you check into a home or residence.

3. Lock your Laptop - Secure your computer (desktop OR laptop)

I amazed at how few people even bother to put a password on their laptops. Yes, there's always a way to break a password or get information off a hard drive, but why make it easy for them? The main concern is that if you allow anyone to boot up your computer and run a web browser, chances are that you've clicked "Save Password" on your Facebook or Twitter or, even worse, your email. At that point you're dead.

Consider installing PreyProject on your machine. It can make it possible to track your laptop or desktop if it's stolen. There's been a number of times where folks have been able to track a thief in real-time and secure their belongings - while live-tweeting the whole event!

4. Encrypt it ALL - Secure your personal files and external hard drives

Here's an experiment that will scare the crap out of you. Use your computer's search function (upper-right corner on a Mac and lower-left on a PC) and type in your Social Security number. Go ahead, it's not going to the internet. See if you find some PDFs from your accountant or an old Excel file. Freaked out now? Now either delete it or put it somewhere secure.

If you have files with information you don't want falling into the wrong hands, consider using a tool like TrueCrypt to make an "encrypted volume."This is a single file that you can access as if it were a disk itself. You can make a "personal.dat" file of any size and keep your personal information inside that "disk inside a file." You can then keep that file in DropBox or another cloud storage system. With a strong password, these TrueCrypt files are VERY VERY secure.

If you have a technical friend with you, you can even encrypt your entire disk with TrueCrypt. Or, if you have Windows 7 Ultimate, you can "bitlocker" it, as I do all my drives. This way, even if a bad guy gets your laptop, they can't do anything with your drives. They are bricks without passwords and pins.

5. Don't Carry Your Life in Your Pocket - Encrypt USB Keys and "Jump Drives"

Some folks will take precautions with laptops and computers but then copy their whole life to a portable USB stick and put in their pocket.

Encrypt your portable drives

If you can, encrypt your files on your portable drive - again, with TrueCrypt or BitLocker.

6. Use Better Passwords - Make it harder, or use Pass Phrases

Using the name of your last movie or the street that you grew up on may seem like a clever password but it's not. A lot has been said online about password strength, so I won't belittle the point.

If you can, use a passphrase that's longer than a password, but easier for you to remember.


7. Super Secure your Email - Turn on 2-factor auth in Gmail

After you have a great password, if you've got a Gmail account for example that you REALLY can't have compromised, consider turning on "two factor authentication."

Hang in there, Kim. Sounds scary, but isn't. Two factor means, two things that you have or remember. A password is just one thing you have to remember. It's one factor. But two factors means a password plus something else. The second thing will be something you have.

You always have your phone, right? So why not make it so your Gmail account requires a password (that you know) and your phone (that you have).

  • To set this up in Gmail you go to using 2-step verification.
    • You can turn it on and give it your cell phone number. You can then install a small application that will give you a code that you'll use as yoursecond factor when you log in.  "But, wait, that sucks! I don't want to do that every time I log in!" Don't worry, darling. You don't have to. You can tell Gmail to only require this code every 30 days.
    • If you have other services, apps, or maybe your phone's email that use your Gmail password these will suddenly think the password has changed because they don't understand two-factor auth. For these applications, you'll just give them their own custom password.
      • You go to manage application-specific passwords and get a password or two for your phone's mail or other apps that need Gmail access. The nice thing is that each app gets its own password so you can revoke them at anytime!

You can also tighten up your Facebook security by turning on Login Approvals. This is effectively two factor authentication as well. Facebook can SMS (text) you when you log in and then you type in the number they send you to confirm that not only do you know your password, you also have your phone.

8. Hide Where You Live - Make sure None of your Domains have your Home Address visible

Make sure if you own a domain that you've turned on Privacy or use DomainsByProxy or some other "WhoIs Privacy Protection." You don't want a fan showing up for dinner.

The WhoIs Record for

9. Secure Your Login - Turn on SSL/HTTPS for Twitter, Gmail and Facebook

If you find yourself in a Starbucks or on location a lot using strange Wi-Fi, you should probably make sure that your Twitter and Facebook accounts are using https (the S is for more Secure) by default. That's the same kind of encryption your bank uses. Just check your Twitter and Facebook accounts. You only need to do it once.

Here's Twitter:


And Facebook:


You can also Google more securely at or

10. If it starts with HTTP, it's probably public - BTW, TwitPics are Public

If you use a tool like TwitPic or any online photo sharing, or  - let's just be straight here - anything's likely public. If it has a URL, someone can get to it. Assume everything you do online is public.

I've personally watched a number of celebrities have conversations between each other on Twitter as if Twitter were a private chat. Just last month Charlie Sheen tweeted his phone number to Justin Bieber. So, he got a new phone.

Also, just an FYI. Don't take a picture of your pee-pee. There's just no reason for that.

Wednesday, January 4, 2012

Life’s Secret Tips



Microsoft outlook - Exchange server unavailable

If you get error as ‘Exchange server unavailable. Contact System Administrator’ When opening Microsoft Office Outlook for first time for configuration.

Control Panel -> Mail -> Profile -> New -> Enter login user name –> Next.