bookmark_borderVisual Inspection Systems Capable

There is no doubt that these inspection systems are at high par, and possess intelligence that is unmatched to the other alternatives present in the market. They also come along with a camera or in some cases, multiple cameras along with even lighting and video. These visual systems have the ability to measure parts as well as verifying parts to check if they are in the right position or not, another purpose of the system is to be able to identify the shapes of the parts. They are also capable of sorting as well as measuring parts at incredibly high speeds. With the help of computer software, one can process the images that have been captured whilst the process is carried out and one is trying to get the measure of for the capturing of the data. These systems are smart enough to be able to take decisions that will, later on, affect the function that one is trying to guess, this is done often times in a fail / pass capacity for triggering an operator to take action. These kinds of inspection systems can also be embedded into one’s lines for providing an unvarying supply of information.

These systems can be implemented in a wide range of industries that have quality control as a requirement. Take for example, that these visual inspection systems can aid in the robotic systems for the purpose of finding out the positions of the parts so that they can be further streamlined and automated whilst the process of manufacturing. The data that has been acquired with the help of a visual system can be further applied in various field desired so that one can enhance the efficiency in the process of packing, sorting, as well as manufacturing. In addition to this, information can be stored by the visual system so that one can identify the problems in the manufacturing line or any other function that they are testing for the purpose of enhancing efficiency, and stop a process that hamper it in any way, and recognize the products that are unacceptable. Thus, visual inspection systems have a variety of applications that can be applied to several places without regard to their field of study and domain, it is also a necessity and a need for some of the industries which require quality control as well as the order in the run of their business.

bookmark_borderTechnology Has Improved Education Levels

Online Resources

You can always research on the internet for any educational information you need. You are always bound to find some help on the web from the broad range of resources available. The use of online resources such as studying tips, free courses, and secure custom support will help improve your grades.

Multimedia learning

People learn in different ways. While some individuals learn better visually, others do so using audio. This has made most education institutions and teachers to change their tact. Instead of focusing on lectures and giving notes, most educators and schools have resorted to using of multimedia to help teach their students better. It comprises use of auditory, visual and kinesthetic. With technology, there is always a way you can effectively learn.

Use of E-books

Nothing bores a learner like having to lug around a pile of books for a curriculum. You can carry your entire course materials wherever you go in a tablet. You can always open the eBooks and do light studying wherever or whenever you wish like reading. The e-books are also known to cost less compared to the usual paperbacks making them affordable to most students.

Worldwide tutoring

The Internet is not just known for having the unlimited amount of information online; it also contains an infinite number of minds! With technology, you are now able to receive help from anywhere irrespective of your location. This is beneficial especially to people who are interested in learning other languages.

Online Editing

There are times when you might need a second opinion but might not have a friend around to have a look at it. Reading through your work and making corrections before submission is one thing you can never afford to ignore. You are most likely set to miss on something when you decide to edit all by yourself. Sharing your work with an online editor is one efficient method you can always use to help improve the quality of your paper.

bookmark_borderBefore Buying a Hoverboard

  1. Find a Specialist. First and most importantly, hedge your bet by buying from a reputable vendor. When you buy from Amazon, eBay, or Craigslist, you might get a quality product, or you might not. These companies just provide a way for individuals to sell their products to large audiences, so it can be a risky purchase, depending on the nature of the seller. Even if the listing specifies all of the best components, you are relying on the seller’s honesty to get a quality product. In these cases, we strongly recommend you remove the cover upon receipt and at a minimum, inspect the battery. It should have a sticker on it that states the cell-brand and the country of manufacture. If you discover a discrepancy, you may be limited in your ability to get a compensation or replacement from the vendor, as you will be working through a third party and have to deal with the red-tape associated with that. If you buy directly from a store that specializes in hoverboards, however, there is much more accountability, and you can contact the seller directly if there is a problem. As an added bonus, without all those listing fees, the prices are often lower at independent stores as well.
  2. Find out about the Return Policy. A company with solid products will be proud of it, and offer a beefy return policy. 30 days is standard. Any less than that, and buyer beware – you may be at risk of buying a lemon.
  3. Get a Good Battery. Require that your hoverboard contains a Samsung or LG battery. The battery is the heart of a hoverboard, and more-so than any other option, you need to make sure you are getting a good one. Lithium Ion batteries are very powerful, and more volatile than other kinds of rechargeable batteries. They do not charge well in extreme heat or cold, and when discharged too much, or overcharged, they can get hot and catch on fire. Samsung has been in the battery and consumer electronics business for decades, and they make a good hoverboard battery with proper circuitry to cut off charging at the proper time and ensure an even charge across all cells. LG batteries are similar in this regard. They are safer batteries, and will stand up to more charge cycles than a generic battery made by a factory that doesn’t have the same quality control guidelines.
  4. Wheel size matters. If you use your hoverboard mostly indoors, any of them will suffice, but if you are outdoors, think about how many cracks or bumps you will encounter. The 6.5 inch hub will handle up to quarter inch bumps pretty well, but if they are frequent or larger than that, the larger 8 inch wheels help. If you are using your hoverboard to go larger distances, a 10 inch hub will be even more comfortable yet. So this decision becomes a balance between comfort and portability. For most users, we think the 8 inch wheels are just about perfect.
  5. Consider your replacement parts. If something breaks, it helps to have a company with factory connections, that can talk to the engineers to help you troubleshoot the problem. Once the problem is diagnosed, you will probably need replacement parts. If you work with a company that can provide them, you will not have not wasted all of your money on a lemon that can’t be repaired.
  6. Know the motor wattage. Typically, the smaller the hoverboard wheel, the smaller the motor inside. This does not affect performance, speed, weight limit, or longevity; it is simply that you want it to be paired properly, or you may have too much or too little torque for your wheels, making it harder to ride. We find that for a responsive, yet easy to control ride, 500 total watts is a good target for the 6.5 inch wheel, 600 is good for the 8 inch, and 700 is ideal for the 10 inch. Divide these numbers by two to get the ideal wattage per wheel. If the seller doesn’t know the answers to these questions, you might want to shop around a bit.

That’s about it! Consider the store’s reputation, their return policy, the battery type, the wheel size, whether or not they have replacement parts, and the hoverboard’s wattage. These 6 considerations will help you buy a high quality hoverboard that provides many years of enjoyment and convenience. Happy hoverboarding!

bookmark_borderFix Speed-Related Errors

Uninstall Useless Software

The very first thing you should look at if your PC is not performing at peak speed is the software you have installed. It is often the case that there is an overabundance of programs that you no longer use, and you will regain a lot of speed by getting rid of them. Don’t hang on to that art program you used to complete a project 3 years ago. Uninstall everything that you haven’t used in more than 6 months.

Install a Good Antivirus

While you should trim dead weight when it comes to software, one thing which you must absolutely not be without is a good antivirus. A decrease in your system’s speed can often be attributed to malware of any sort, and it is thus prudent to have protection against such threats before they even strike.

Install Those Updates

A lot of Windows users put off installing updates as the process can take quite some time to complete. However, these can be essential to your operating system’s function. So, the next time you receive a notification that updates are ready for installation, don’t leave it for another day. The time you spend waiting for them to install and configure (and for your PC to restart or shut down) will be negligible compared to the time you’ll spend waiting for a slow computer to perform vital tasks.

Immediately Get Rid of Unnecessary Files

As you use your computer, a lot of unnecessary files will be created. These include temporary files that may fail to disappear when you are done with them, webpages that remain after you’ve finished browsing, or settings for programs that are no longer in use. All of these things take up precious space on your PC’s RAM, so you should take care to get rid of them automatically. You can do this by going to “My Computer” in your local drive, finding the folder marked “Temp” in the “Windows” folder, and deleting everything that is older than the current date.

It is also worth saying that you should regularly empty your Recycle Bin and delete all those crazy fonts that you never use.

Avoid Multitasking

A PC will also slow down if you are making it do too many things at once. Unless it is absolutely necessary to run several programs at the same time, avoid multitasking. Do this thoroughly by properly shutting down the programs you have finished using so that they don’t keep running in the background.

Defragment Your Drive

A fragmented hard drive where data for a single file is scattered over several separate locations is another source of slowness. To avoid this, you should defragment your drive regularly, especially if the memory is almost full. Not only will this boost speed; it will also contribute to your hard drive’s longevity.

Get a Solid State Drive

The biggest obstacle to speed may very well be your hard drive’s inherent limitations. If you have the cash to spare, it will be well worth your money to invest in a solid state drive. These can be incredibly fast because of their read-times, which can be described as operating at super-speed.

Clean Your Hardware

This last step is one of the most frequently neglected by some of the most conscientious computer owners. The simple truth is that a buildup of dirt on any part of your hardware can make your system slow down by creating heat insulation or getting in the way of moving parts. A gentle vacuuming every week or so should take care of this problem.

bookmark_borderOptimize Windows Registry

It also contains information necessary for booting. In addition, it stores data related to system settings, file associations, and installed applications. It is a binary data tree that is organized into different structures, such as “HKEY_CLASSES_ROOT, HKEY_USERS, HKEY_CURRENT_USER, HKEY_DYN_DATA, HKEY_LOCAL_MACHINE, and HKEY_CURRENT_CONFIG.”

However, your Windows registry can become congested with unnecessary or obsolete entries over time. The more you upgrade, delete, or install applications and components, the more clogged your Windows registry can become. When this happens, your computer can be slower and have an erratic system performance. If you want your computer to have an improved performance, you should learn how to optimize Windows registry.

How can you know when you need to optimize or clean your Windows registry? Well, here are some of the signs you need to watch out for:

  • Your computer is still new yet it is slow and its performance is not satisfactory, considering its specs.
  • Your computer has a very slow start up.
  • Your computer frequently freezes.
  • Your computer crashes all of a sudden.
  • You often see error messages on your screen.
  • Your applications usually freeze or do not open immediately.

So when you experience any of these symptoms, it is time for you to clean your Windows registry. Then again, before you optimize it, see to it that you consider several important factors. For instance, you should avoid installing every application you see. Sure, there are plenty of great applications online. However, before you install it, you should think thoroughly if you really need it.

If you need certain applications at the moment, you may consider using their portable versions instead of installing them. Portable programs install in their own folders and do not add entries to the Windows registry. It is also easy to uninstall them if you do not need them anymore. Simply delete their folders and everything they contain.

See to it that you uninstall applications the right way. If you delete one of your programs, its folder can go straight to the Recycle Bin but it can also leave behind broken shortcuts, folders, files, and registry entries. Hence, you should not just delete a program. You should use the Uninstall feature of your computer or use a software program especially designed to uninstall programs.

  • To use the Uninstall feature, just open your Control Panel and go to Programs and Features. Here, you will see the default uninstaller of your application. Choose Uninstall to remove your installed folder with its included files, folders, and shortcuts.
  • If you are using Windows XP, you can optimize your registry by cleaning hidden startup, removing useless programs, disabling useless services, disabling Windows Messenger, optimizing network settings, defragmenting hard drive, disabling System Restore, and disabling Virtual Memory.
  • If you want to make sure that your default uninstaller does not leave behind data in your Windows registry, you should purchase a licensed uninstall program to remove your application and perform a system scan on your computer. It is crucial to scan your computer to find data that you may want to remove.
  • You can get a registry cleaner to scan your Windows registry and find errors. It is ideal for you to get a software program that lets you customize your scan. A good registry cleaner allows users to select areas that they want to scan as well as let them defrag and optimize their registry.
  • Using a registry cleaner is actually one of the best ways on how to optimize Windows registry. This software program does not only protect and clean your registry automatically, but it also prevents system errors such as DLL, SYS, and EXE errors. In addition, it helps minimize problems when installing new applications as well as prevents crashes. With just one click, it can scan and remove unnecessary entries in your registry. Furthermore, it can prevent your data from being corrupted by conflicting entries.

bookmark_borderLithium Ion Battery

Different types of li-ion batteries make use of different types of cathodes. The cathodes are made of lithium molecules. Generally, the anodes are made of carbon. As with other types of batteries, the chemical reaction that happen between the cathode, anode and the electrolyte generate electric current. Aside from this, the stuff used for these will affect the cost, capacity, performance and the safety of a certain type of battery.

Li-ion batteries, for instance, that feature a lithium cobalt oxide cathode can give you a bit higher capacity. However, they are more reactive because of the lower thermal capacities. Another great option is the lithium iron phosphate. Their life cycle is 4-5 times longer. Moreover, their power density is around 10 times better.

These batteries are of various classes, but they are commonly used in portable or consumer devices like smartphones and laptops. Aside from this, this type of battery is also popular for use in aerospace, military and other electric automobiles.

Given below are some pros and cons of lithium ion batteries.

  • Lighter and smaller: These batteries are lightweight but offer higher capacity than other types of products out there. Therefore, it is commonly used in portable devices where the physical specs like form factor and weight are on the list of important considerations.
  • Energy Density: Lion batteries feature higher density of energy than other types, which means you can enjoy higher capacity irrespective of the size. That is why these batteries are an ideal choice for power-hungry devices like smartphones and laptops. With the advancements in technology, we will have higher capacities down the road.
  • Self-discharge: Another great characteristic of a Li-ion battery is that it has only 1.5% self-discharge rate per month, which means that it offers longer-shelf life. The reason is that its discharge rate is lower than most of other rechargeable batteries. Here it’s important to note that the self-discharge rate of a nickel-metal hydride is 20% per month.
  • Fast charging: This type of battery recharges quickly. Usually, it takes a lot less time to recharge than other types on the market.
  • Open-circuit voltage: Li-ion batteries offer high open-circuit voltage compared to other batteries like nickel-metal hydride, lead acid and so on.
  • Lifespan: These batteries last longer than other batteries. Even after hundreds of recharging cycles, it will retain its capacity. For instance, some batteries of this type loss only 30% of their capacity even after 1000 cycles.

bookmark_borderVirtual Desktop or Remote Desktop

Remote Desktop

Initially known as terminal services, the remote desktop is a Microsoft service that allows users to have a virtual session by accessing files and applications through a server. The experience of using remote services is more or less like using a local desktop; the only difference is that the session is processed on a server not the desktop.

Remote desktops are relatively simpler as little infrastructure requirements are needed to be met; thereby reducing implementation costs. Moreover, it helps in enhancing remote worker’s efficiency because it is most suitable for remote workers, contractors and corporate workers working from a remote location.

However, the biggest drawback of a remote desktop is that it has compatibility issues. Since it has a terminal environment, many applications fail to work. Nonetheless, improvements have been made over the years and many applications have started working, but still some applications do not work till date.

Virtual Desktop

Also known as VDI, the virtual desktops are basically interfaces that run on a virtual environment and not on a local desktop. However, the virtual desktop environment and infrastructure tends to be more convoluted than the remote desktop. The administrators are responsible for managing numerous virtual desktops

Some of the important benefits of a virtual desktop are: the administrators find it easy to adapt or allocate the RAM capacity, disk space and various other peripherals; the data on the virtual desktop can be backed up and easily restored using snapshots; virtual desktops are easily deploy able as it has the capability to replicate and develop templates in a span of a few minutes.

Although VDIs are a costly option, they have the capability to provide numerous benefits that outweigh this drawback.

It is important to understand that both desktops are meant to be operated in a different environment; therefore, your needs and requirements must be matched to the features of these desktop services before deciding which one to go for.

bookmark_borderEfficient Personalised Variable Data Printing

Digital printers already have the equipment needed to produce VDP campaigns, so there’s no great expenditure required to begin offering VDP to their clients; all that they need to understand is the software requirements and the workflow digital signature.

From the hardware perspective, a variable data print set-up looks like a lot like any other digital printing installation, with a digital press, a RIP or digital front-end (DFE) to drive it and whatever inline or offline finishing equipment is needed to turn printed sheets into a sellable product. The differences from normal static print are mostly at the file creation and pre-press stages: the two main software components are the database and the authoring software, though VDP also puts some extra demands on the RIP or DFE.

As discussed elsewhere in this series, the printer doesn’t necessarily have to own a database application, as long as the data needed for the personalization can be extracted and supplied in CSV or Excel formats to use with the master template in the authoring application.

VDP authoring applications come in a variety of types of digital signature online. Some, like PTI FusionPro (recently acquired by Ricoh), are plug-ins to popular professional design and layout tools such as Adobe InDesign or Illustrator. Others are dedicated VDP tools or the printed output part of cross-media production suites; PrintShop Mail is an example of the former, while DirectSmile, XMPie and GMC Inspire are the latter. Vendors of DFEs and/or digital presses also offer VDP creation tools, such as the FreeForm tools that are included with every Fiery controller, or Xerox’s Freeflow software.

Whichever type of authoring software is used, the same thing happens at print time: the customer-specific data – which may be both images and text – is fed into the variable fields in the layout template, according to the business rules assigned to the template. This generates a print stream which is sent to the DFE.

There are a number of different print hand-off formats for VDP, reflecting the history and origins of the technology in high-end transactional print. Some are vendor-specific, such AFP (Advanced Function Presentation) from IBM, VPS (Variable Print Specification) from Creo or Fiery FreeForm and FreeForm 2; some are open formats based on existing commercial graphic arts standards like PostScript or PDF. These include VIPP, an open VDP language from Xerox for output of PostScript files, and PDF/VT, a variant of the PDF ISO standard that is optimized for VDP applications. PPML (Personalised Print Mark-up Language) is another open standard which allows the use of PostScript, PDF, EPS, JPEG and TIFF formats for pages or page components.

Which of these formats is supported will depend on the authoring software. Printer or DFE vendors’ software will, of course, support their own equipment but may also support others, especially the open standards PPML and PDF or PDF/VT. VDP and cross-media software from independent developers usually support the widest range of options.

It’s worth noting that not all the VDP formats are equivalent. The older, vendor-specific ones don’t all support the same level of graphical flexibility, in particular, the use of transparency and layer effects to combine images and variable type. For printers just starting with VDP, this is unlikely to present an immediate problem, but if your plans include producing customized images using variable data text, the more recent PDF and PDF/VT standards are probably better options, though PPML has support for transparency too. PDF and PPML allow previewing of the print file for checking, though the latter requires a dedicated viewer.

The hand-off format also has to be understood by the DFE. Again, single-vendor solutions tend to support their own formats best, though may accept others in addition, typically the open standards. DFEs such as Fiery support all the major formats and standards, giving their users the most flexibility. A feature common to all DFEs that can process VDP work is the ability to ‘cache’ or store and re-use objects that appear in each document so that they do not have to be processed each time. Most of the VDP formats explicitly support this by identifying such elements within the print stream or appending or referencing them as separate items. Some DFEs can also analyze the incoming print stream and identify and cache repeated items automatically to improve performance.

bookmark_borderPointer Technology At A Glance

Programming and Writing in General

My first training in computer programming languages came from Jet Propulsion Laboratory. Everywhere I looked, I could identify things that reminded me of my training there. Because I’ve been doing a lot of fiction writing, I’ve noticed that even symbols like ellipses remind me of computer programming.

There was a time when I saw data as products on a conveyor belt. Because the products looked round and white, they reminded me of ellipses in the English language. Catching up to date, currently in fiction I’ve been writing about robotic technology.

This part of my fiction-writing is still under wraps but I’m sharing it here to make a point about pointers. Melting rock formations is the basis for what will fuel robots in my science fiction stories. After these rock and stone formations have melted down, they are re-formed into swirly mini balls that look like marbles. They melt as they course through what one might call a ‘pin ball machine’ system of a typical robot.

In programming, these marbles will represent data and when product after product or data after data are flowing through, in one direction, in order to change directions, you might use a pointer.

It’s easy enough to increment or decrement and go from one data product to another, but when you have to change directions amidst the hard drive mapping, you might use a pointer to point to a different address.

Object-Oriented Graphics

I once had a wise computer programming college teacher who tried everything up his sleeve to get his students to warm up to the idea of object-oriented programming. Looking at groups of data as enclosed in a graphical rectangle (such as the title of an article in a Publisher newsletter as it was being written), was a completely different paradigm than from a few years back.

Back then, everything was iterative, you and therefore the computer (because you programmed it) interpreted commands line by line (executing each one in a sequential pattern). These days our point of focus, of as to what gets to be ran (or executed in the code), jumps around.

That wise teacher said, take a graphical interface program and work backwards. Draw some objects on the screen, like filling in a rectangular space with text, or a round object with a graphic, and then look at the code to see how it was generated by the computer. I took it one step further and pretended that each raw rectangle, square or circle were each numbered.

That way if the objects were layered and the #6 object were on top of a #3 object and it had transparent areas to it, parts of the #3 object (graphic) would peek through. However, if you put a #12 object under the #6 object, nothing would happen except traditional layering, because the value of the underlying (graphic) object underneath #6 has to be labeled (tagged) something less than the value of the number 6.

In all these shaped objects, they can be resized to make them bigger or smaller. Therefore, you still have to have the appropriate font size for text within them and the appropriate proportion sizes also for the graphics within them.

If you’re lucky enough to buy software that lets you work ‘backwards’ that would be great! You can re-size objects, layer them, even number them mentally in your mind to keep track of them. Then, look at the code that the software generated to see how your formatted template (such as a newsletter) was created!

Button In A Button (Inheritance in C++)

The subject of object-oriented programming has always sparked something within my imagination. You see the first novel I ever wrote, was in the science fiction genre and I used what I learned computer-wise in the private industry to fuel the computer advancements within the novel.

In C++, you can inherit a class object or your class object can take on the characteristics of another class object. Therefore, there is an “is-a” or a “has-a” relationship that is possible with each class object created.

Picture this then: A button within a button, within a button, within a button, and so on…

If the middle button makes the outer button related to it (and it can do so, in three different modes – private, public and protected), then, it only stands to reason, to go ahead and document that relationship. Depending on how their inheritance relationship was tagged, you will have to list down what is private data (variables and functions) to the outer button.

Now, if the innermost button inherits from the middle button, then it too will have rules of engagement not only from the middle button, but yes, from the outer most button too.

A private relationship, means that everything (variables and functions) are private to the class only. A protected tag means that that class is accessible to classes that have a protected relationship with it. Finally a public tag, means that that class is accessible from within the entire program code.

So if an Orange Button class (the color orange is made up of the primary colors red and yellow) inherits from a protected Red Button Class and a private Yellow Button class, then the Red Button class can share with it all of its’ public and protected parts. The Yellow Button class can share with it only its’ public parts.

Imagining the nested relationships as a button within a button was what got me started in writing this article, but you can also think of it as the three primary colors (red, blue and yellow) and all of the colors that descend (or inherit) from them.

The wise thing to do always, when you get stuck, is to document, document, document. That way, you will know the appropriate question to ask regarding your programming/coding predicament.

Pass the Buck

When I think of pointers in the object-oriented field of programming, I think of a virtual arrow, progressively pointing and traveling from its left to right path in computer memory. There have been other symbolic representations of pointers in my mind as well. I have also imagined a spotlight from high on top of the rafters de-referencing the character, numerical, or graphical values of those memory slots.

Well, it turns out, there are even more effective ways of understanding the directional volition of pointers as they rifle through a virtual array. Think of a pointer as a long envelope capable of carrying a letter representation of whatever is in the memory location, that it is hovering over. I think of it as beige in color and parchment in card stock and that, what are contained in the memory slots are business letterheads all ready to be printed out by the printer.

Let’s say our long envelope hovers over memory slot #5. The letter document gets added to the beige envelope, and if we want to daisy chain that to the document in slot #7, we would easily travel over and skip slot #6 (because we move in sequential line order), to access and de-reference the document in slot #7. With the slot #7 document appended, we go ahead and print out what were contained in Pointer Beige Envelope #1. Therefore, so it goes on, in the deconstruction stage when we empty what Envelope #1 is carrying, by setting it to NULL.

To wrap everything up, I thought if you think of a pointer as a dollar bill, that you pass succinctly from memory slot to memory slot, that is by far the most clearest explanation of a pointer of all. To literally ‘pass the buck’ is to have the dollar bill act like the virtual arrow or the stage spotlight up on top of the rafters. It’s even better than the beige parchment envelope that I just spent time explaining about.

However, if everything is to be understood in sequential order, then the envelope pointer theory did make its appearance before the ‘passing the buck theory.’

Database Design

For a fun sprint into the combination of a fashion scene and a database design, I wrote a short story about indexing database files using the color spectrum available in nail polishes. In my short story “Daily Diary,” a young girl by the name of Zoe emails a fashion magazine editor asking her how to “shop” for a high school fashion show that she was going to be graded on by the end of the school term.

The fashion editor’s name was Cassie and Cassie’s suggestion to Zoe was to pick a nail color and shop for fashion pieces that matched that particular color. For example if Zoe had initially picked out a darker tan color, then she might budget out her fashion show account, by purchasing a wide leather belt, that would hang loosely around her waistline.

Also, for a bubble gum pink nail polish color, Zoe might pick up a few different shades of a camp shirts in that tone of pink. Cassie also pointed out that eye glasses, with outlandish frames that were also that shade of pink should also be welcomed into her collection, that and a few colors of boas.

The database part will then be for Zoe to learn a little about the PHP programming language to build an online database, using the nail polish colors as the index colors to mix and match the fashion pieces.

The days from the movie “Clueless” weren’t that far off, when the lead character computerized her whole wardrobe selection methods.

With a database that has already filed pieces of clothing away by using nail polish colors as index values, you could literally ask for a “match” between the tan and blue nail polish colors and find some mix and matchable wardrobe combinations.

bookmark_borderDangers of Digital Currency

The modern world is a kaleidoscope of electronic gadgets and systems that make possible things we only dreamed about as kids. Thanks to our electronic world, you can buy a house from your cellphone, see what the night sky looks like in real time on the other side of the world, or profit from nanosecond differences in trading times in the stock market. All before you get out of bed.

Just like my “modern” guitar friends, many people seem to take it for granted that the digital systems that underlie these miracles – the Internet, for example – are eternal. So when I hear someone make plans that assume uninterrupted connectivity, I think to myself: “What if the power goes off?”

Which brings me to one of the most frightening ideas I’ve come across in a while.

A U.S. tech giant is reportedly working on a software platform based on the infamous digital currency “Bitcoin.” The idea is to make it possible for major currencies like the dollar or euro to operate like Bitcoins. Anyone could transact with anyone else in the world directly, bypassing banks completely. Just log on, send your money and you’re done.

This promises a world with no banks, no fees and no hassles… but lots of danger.

Everyone knows that counterfeiting is a risk with paper money. That’s why individual bills have serial numbers on them. But the same applies to digital currencies. Unlike physical money, the electronic files that represent digital currency can be duplicated exactly, with no trace. Since spending a digital dollar doesn’t delete the electronic data that represents it, and in the absence of banks and their accounting systems, some other way is needed to prevent that dollar from being used again by the same person – so-called “double-spending.”

Bitcoin accomplishes this by means of a “block chain.” Every few minutes, a group of all recent Bitcoin transactions is created, called a block. This block is then quickly distributed across the Bitcoin system, where it is added to the ongoing chain of all Bitcoin transactions (hence the name). That way, if someone who has already spent a given Bitcoin (and has not received it back legitimately from a third party) tries to spend it again, the system will reject it as “counterfeit.”

Bitcoin accomplishes this by using a distributed system of anonymous “nodes” that keep track of the block chain. But the same thing could be accomplished by a central server. The tech company working on its own digital currency has therefore floated the idea of turning dollars and other currencies into digital form – with the central server controlled by central banks.

I don’t need to tell you what would happen under this system if the power goes out: No moolah. Of course, the same thing can and does happen now, with so much of our transacting done by credit or debit cards. But at least we have the option of keeping and using cash.

Am I paranoid in thinking that, no matter what the advantages of digital currencies – and bypassing banks is really tempting – the real danger isn’t power outages, but rather giving a central power the ability to turn our money on and off? The dangers of digital currency aren’t small. After all, imagine the opportunities for monetary mayhem: digital wealth confiscation… automatic taxation… courts issuing warrants to seize your digital money…

Nope. I’m a realist. I know that if companies have the power to do that, they will use it.

Yet another reason to stock up on gold, my friends… the ultimate store of value. So far, at least, nobody’s come up with a way to turn off its power.