Charge your device with wireless Qi

(Internet Photo)

Wireless charging is about to become just as capable as wired charging. Qi wireless charging is a global standard to which many smartphones and devices adhere. It allows you to charge a compatible device’s battery using induction transfer, simply by placing it on top of a wireless pad – with no need for cables or adaptors. It works in a way that uses a resonant inductive coupling between the sender (the charging station) and the receiver (the mobile device). Qi platters will be transmit electricity tables so your phone starts…

Read More

Upgrade or replace desktop pc?

(Internet Photo)

BY JIMMY MAWERERE Before investigating the option of upgrades or replacement, it is advised that users clean up their computer software to try and speed up their systems. Quite often software programmes that accumulate over time slow down the system from optimal performance. Because of this, users should try some maintenance to help speed up their PCs. The average desktop PC has a functional lifespan of roughly three to eight years.The length of the lifespan greatly depends upon the type of system purchased, advances in hardware components and changes in…

Read More

Grow your event Hashtag using the Twitter beam

(Internet Photo)

BY JIMMY MAWERERE I was one day amazed to find out that I could grow my Twitter community and also stream events with Twitter beam. As an IT practitioner, I always wondered how I would share the events I have been involved in, and monitor the thoughts of delegates, and yes, my search led me to Twitter beam. Using Twitter beam at your event is a great way to communicate with the attendees and get more exposure and publicity. The way it works is that a tweet wall is created…

Read More

What internet users need to know about those spam emails

BY JIMMY MAWERERE Spam email is any email that was not requested by a user but was sent to that user and many others. This is done typically, but not always, with malicious intent. Spammers usually acquire recipient addresses from publicly accessible sources, or they use certain programmes to collect addresses on the web. Usually when you post your email addresses on websites or in news groups, you are most likely to attract spam. You might receive spam if you fill out online forms, although most reputable sites have good…

Read More