Search This Blog

Saturday, December 11, 2010

How to Sharpen a Knife or Chopper

10 December 2010

Introduction
There are tons of articles and videos on the web telling people how to sharpen a knife or a chopper. Some are shown by professional chef. However, none could help a layman sharpening a knife or a chopper properly

Why?
The secret of sharpening a knife is to have the knife always maintaining at a constant angle of about 20 degree to the surface of the sharpening stone or sand paper when sharpening a knife. If the knife edge is irregular, the knife will never be sharp.

How?
To maintain a constant angle, one can use something like a thicker steel ruler to provide a shim or a spacer to “wedge” the knife at about 20 degree angle to the surface of the stone. The trick is on how to stick the ruler to the knife while sharpening the knife.

A Simple Method
a) Find a piece of PVC electrical trunking about the length of the knife. One may be able to get one free from the electricians as they often have some waste piece lying around in the work places; the PVC trunking will usually have a "tongue and groove" arrangement to snap the cover in place;





b) Remove the cover of the PVC trunking which should have a “groove” in it. Cut the “groove” piece out of the cover and snap the piece to the knife as shown.




c) Start sharpening and one will always have a knife or a chopper sharpened in a professional way.

Wednesday, December 8, 2010

How to Sharpen a Planer Blade

8 November 2010

Introduction
There are many ways to sharpen a planer blade instead of replacing and throwing them away. This article will introduce one easy way.

The Planer and Planer Blades
The planer used is as shown. It has 2 blades, each has a length of 3-1/4" and are made of HSS steel.




When the blades are blunt, it will not give a good cutting surface on the wood and the surface will have a fluffy feeling.
The Sharpening Tools
The usual way to sharpen the blade is to use a standard blade sharpening tool which has adjusting screws for angle and other adjustments. Grinding stones are often used. The sharpening work will require some professional skill to prepare grinding stones etc. This article will introduce a simple and yet effective way for DIYs using tools that can be made in just less than ½ hour. No professional skill really required.

The Materials
a) A base made from a piece of plywood measuring around 100 mm x 75 mm ( 4” x 3”) or with the width to suit the length of the blade;
b) A 15 mm PVC tube of about 75 mm (3”) in length;
c) 4 wood screws and washers; 2 shorter ones to tighten the blade to the base and 2 longer ones to tighten to the base to a PVC tube for adjustment of the blade angle;
d) 2 pieces of water base sand papers; one of 240 grade and the other of 300 grade or finer
e) Optional: a set of rollers to be mounted underneath the 15 mm PVC tube so that the base can slide freely on the sand papers. One can use the small rollers that is stripped from the spoilt computer mouse for this purpose.

Other tools required are electric drills and suitable drill bits

The Set Up
a) Drill 2 rows of holes and 2 small holes as shown on the base
b) Drill 2 small holes on the PVC tube to hold the longer screws


The Completed Assembly



Note:
1. One can omit having rollers mounting beneath the PVC if one can always place the PVC tube outside the sand paper area. Anyway, PVC tube are replaceable if they are worn.
2. Constantly check the grinding surface of the blade and adjust the angle of the blade to be grinded. When the angle is correct, make a marking on the PVC tube and the base.
3. When the blade is ready, one should feel the blurs on the opposite edge of the blade. Dismantle the blade and grind away the blur on a fine sand paper. To ensure the blade is always placed at a small angle to the sand paper, one can use a steel ruler or the back of another sand paper to "jack" up the opposite end of the blade when grinding away the blurs.

Thursday, October 7, 2010

Access Denied in Windows 7 Registry

Introduction

Windows 7 is fast and easy to use but many users said they had tried and went back to XP. They said Windows 7 was not stable. Some complained about program not able to run or run slower than XP after some usages. Reinstallation of these programs often failed. This article will describe a way to solve some of these problems.

Why?

One of the problems is the denial of access to change certain keys required by the programs in the Registry. After some period, the ownership or the permission of the Registry key will be changed for some reasons, probably caused by User Account Control (UAC). The programs will lose the privilege to access and change these keys under normal operation. The solution is to restore the ownership and permission of these keys.

How ?

a) Prepare to check which key was denied the access.

To monitor the Registry, download Process Monitor . Install and run.



3. To limit the number of events to be display, in the “Filter” menu, select “Filter”
4. In the Architecture dropdown box, select “Result” and type in “ACCESS DENIED” in the box as shown





5. Click ok. The monitor is now ready to capture any access denial events for study.

b) Run the faulty application or installation or any program again. this time, check if there are Registry keys being denied access. Note down this key and use “Regedit” to reclaim ownership or permission to change these keys.

What if there are plenty of Registry to Change?

When there is a lot of keys to reclaim ownership or permission, it may be necessary to reset the entire Registry to the defaulted ownership or permission.

How ?

Important Notes: It is advisable to backup by exporting the entire Registry or otherwise save in another disk or partition. The reset of ownership or permission by SubInACL can upset some programs.

1. Download SubInACL which is a program that will enable administrators to manage files, registry keys, and services.

2. Unzip and run SubInACL. It will create a new folder called “Windows Resource Kits/Tools” inside the Program Files (x86) folder.

3. Start up “NotePad”. Copy and paste the following

subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=administrators=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=administrators=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=administrators=f
subinacl /subdirectories %SystemDrive% /grant=administrators=f
subinacl /subkeyreg HKEY_LOCAL_MACHINE /grant=system=f
subinacl /subkeyreg HKEY_CURRENT_USER /grant=system=f
subinacl /subkeyreg HKEY_CLASSES_ROOT /grant=system=f
subinacl /subdirectories %SystemDrive% /grant=system=f

4. Save NotePad file as “Reset.cmd” in the “Windows Resource Kits/tools” folder.

5. In the box of the Windows Startup Button, enter “cmd” (without quotes) and rightclick “cmd.exe” when the file appears at the top of the window and select to run as Administor.

6. Type “cd C:\Program Files (x86)\Windows Resource Kits\Tools” at the prompt, follow by “reset.cmd”



7. The program will run for the next 3 minutes to change all the ownership and permission of the entire keys in the Registry to the default value

Tuesday, August 24, 2010

The Tokyo Tunnel - G-Cans

24 August 2010

Introduction
The Tokyo flood tunnels – G-Cans project started construction in 1992 and completed in 2004, about 12 years later. It was just in time to be tested in tyhoon 22 in 2004 when 14 families were reported to be affected instead of 236 families before the completion of the project. The tunnel collects water from Tokyo downtown district and discharge it into the Edogawa river.


The Tunnel
The tunnel is 10m in diameter and about 6.3 kilometers (four miles) long. It is buried 50 metre under the ground in the Tokyo suburbs.

It has 5 concrete silos, each having a diameter of about 32 metres and is about 70 metres tall.

The tunnel is connected to a gigantic water tank measuring about 78m width, 177m long and 25m tall (or 350,000 m3). The tank is propped by 59 numbers of gigantic pillar, each weighing about 500 tons. As the pillars look like those in ancient temples, some named this water tank “the underground temple of Tokyo”.

Connected to this water tank are series of water pump that have a total output of 14,000 hp or 10 MW. They can discharge flood water up to 200 m3 per second or one Olympic pool water in 10 seconds.

The Cost
Estimated to be about US 2.0 billion

The Volume
The tunnel can hold approximately 640,000 m3 of flood water.


Monday, August 23, 2010

Web Query Hangs

23 August 2010

Introduction
Users of Microsoft Excel and other web query software, like IMACROS, often query websites to get the web information for stocks or other purposes. These users will write scripts to automate the process. Sometimes, the process will hang causing lost of data. This article will describe methods to overcome this problem.

Why it Hangs?The process will hang either because the website is down or because the web traffic is high. A webpage usually takes 5 to 6 seconds to download may take up to 10 minutes or even hours.

How to Over come?
The following methods have been tried without much success.

a) Introduce timeout events in scripts or VBAThe script is waiting for a webpage to download and will not activate the timeout under such events.

b) Ping the website before proceeding to download
This will only help if the website is down but it will not help when there is a delay due to heavy traffic.

The better method is to modify the window registry’s internet setting with a timeout of appropriate delay. This is because most browsers use this delay in the internet setting.

http://support.microsoft.com/kb/181050

How to Modify the Registry?
The timeout is not native in the registry’s internet setting. It will have to be created under
[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings]. The keyword is "ReceiveTimeout”. Its value will depend on normal delay in webpage download.

The Window default is

Internet Explorer 4.0 and Internet Explorer 4.01 --- 5 minutes
Internet Explorer 5.x and Internet Explorer 6.x---- 60 minutes
Internet Explorer 7 and Internet Explorer 8 ------- 60 minutes
In VBA, add the following code before downloading the data
Set myWS = CreateObject("WScript.Shell")'write registry keymyWS.RegWrite
"HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet " &
_"Settings\ReceiveTimeout", "15000", "REG_DWORD"
The value of “15000” means a delay of 15 seconds. Insert the same code just after the download script and change the value to suit normal surfing.

Saturday, August 21, 2010

Error Message for Dynamic Link Library mscvp90.dll

21 August 2010

Introduction

When installing Ad-aware program, one will get the following error message for some PCs:

"procedure entry point?_xfunc@tr1@std@@YAXXZ cannot be located in the dynamic link library MSVCP90.dll "

Why?
This error is due to a wrong version of msvcp90.dll being installed by some programs for some reasons.
The dll is one of the C Run-Time Libraries for Visual C++ and programs such as Ad-aware use them.
According to some descriptions, there are 2 versions of such dll having the same name, msvcp90.dll, one for 64 bits and the other for 32 bits machine. XP operating system is a 32 bit machine.

What Next?If one is using a XP operating system and has encountered the problem.

Step 1: Download the correct version of Microsoft Visual C++ 2008 Redistributable Package (x86) from the following website for XP machines

http://www.microsoft.com/downloads/en/confirmation.aspx?familyId=9b2da534-3e03-4391-8a4d-074b9f2bc1bf&displayLang=en

Step 2 : Locate the directory C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRTxxxxx. In the directory, one should find 3 Nos of 90.dll files. Rename these files with an extension of .tmp. If one has 2 directories of similar name, do the same.

Step 3: Run the downloaded installation program called “credist_x86.exe”. The installation program will automatically uninstall and reinstall the correct version of 90.dll programs.

Step 4: Locate the directory C:\WINDOWS\WinSxS\x86_Microsoft.VC90.CRTxxxxx again. One will find the new 90.dll programs. Copy all the 3 programs to “c:\windows\system32”

Friday, August 20, 2010

Marina Barrage - Fighting With Nature

Introduction
There was recent spate of flooding in Singapore. The famous Orchard Road was under 300 mm of water. Some blamed the Marina Barrage that was completed 3 years ago. This article will examine how the barrage works and if it can alleviate flooding in low-lying areas.

The Marina Barrage
The Marina Barrage (Chinese:滨海堤坝) is a 350 metres low level dam in Singapore built across the mouth of the bay, between Marina East and Marina South. It was officially opened on 1 November 2008.

The barrage serves 3 purposes:-
a) Provide Water Supply
b) Perform Flood Control
c) Lifestyle Attraction

The video about the barrage can be found here

How the Barrage Works?


During heavy rain, the series of 9 crest gates at the dam will be opened to release flood water into the open sea when the tide is low. The 7 Nos of 40 m3/s (about 2.5 MW @ 3.5 m head) pumps, capable of pumping an Olympics-size swimming pool per minute will work when the tide is high. This mechanism is supposed to alleviate flooding in the low-lying areas in the city such as Chinatown, Boat Quay, Jalan Besar and Geylang.

The video of the crest gate and the pumps can be found here and here.


The Marina Basin



The Marina Basin has a surface area of about 240 ha (240,000 m2). It is linked to a 100-km2 rain catchment area shown green in the attached model. During raining days, the drains and canals will channel the flood water into the Marina Basin.


The flood
A series of flood occurring after the Barrage was completed



Can the Marina Barrage Cope?
The Barrage and the basin will not eliminate flooding totally if there is a very heavy downpour and the tide is high. This is because the rain fall from the water catchment, if more than those on 17 July, may raise the water level Marina Basin by more than 4.0 metres (discounting the retained water on the surface of the catchment and the buffer in drains/canals/river) during a heavy downpour as shown in table 1.


2o August 2010
What Can We Do?
a) Reduce the Water Catchment Area
If we were to reduce the catchment area by 40%, this will reduce the water level rise in the basin by about the same proportion to 4.5 metres per hour without pumps and 4.0 metres per hour with pumps in full operation. The alternative is to regulate the flood water flow from higher areas.

b) Allow More Buffer Capacity In Basin
With the present barrage, there is a limit on how much a buffer can be created in the basin because the gates are not totally water tight. There will be seawater leeching into the basin if there is large difference in the level of water in the basin and the open sea; also, the pumping electricity cost would be high if we keep the water level in the basin low.

Reducing the water catchment area appears to be a better of the 2 solutions for the present setup at the Marina Barrage.

Sunday, July 25, 2010

Where Long Term Funds Park Their Money

25 July 2010

The Long Term Funds in US

The Investment Company Institution (ICI) keeps in touch with the Fund Managers (The Funds), their shareholders, directors and investment advisers regularly. They aim to facilitate the effective functioning of Funds under the U.S. legislative and regulatory framework. They keep and release the Funds' investment in local as well as in foreign countries. This article will aim to introduce ICI as well as to analyse the data they have collected for the information of the readers.

The Data Collections

The data collected by ICI can be found here in this PDF file.
The data tabulated out how much the Funds have invested in Foreign and Domestic equities as well as in bonds and other investment vehicles.

Graphical Plot
The following is a graphical plot of the data kept by ICI for Foreign and domestic equities.


(Doubleclick to enlarge)
The chart shows that the US Long Term Fund (LTF) has withdrawn about US$300 bln from the domestic equity market since January 2007. Lately, they withdrew a total of US$ 50 bln in May 2010 and June 2010. They increased their withdrawal and withdrew about US$ 7.0 bln in the first 2 weeks of July 2010. As for the Foreign Equity investment, LTF maintained their funds at around US$ 150 bln to US$ 200 bln during the periods shown.
Divergence Between Equities and Funds

There is a divergence between DOW and the US domestic funds as shown in the following graph. This graph illustrates that the US domestic equity Funds decreases as DOW increases in value during the period between March 2009 and April 2010. The LTF withdrew even more funds from the domestic equity market during period between April 2010 to present date.
(Doubleclick to enlarge)

Where LTF Parks their Money ?
To find out, please click here

Conclusion
LTF are buying bonds instead of equities ever since the last recession that started in 2007/2008. The pattern appears to have the tendency of repeating again.

Thursday, July 1, 2010

Keeping Virus Away The Easy Way

Introduction
Computer viruses often attack the Registry of the XP operating system, making computer going hire-wired; sometimes, it immobilizes the computer and make them hanged. Often, users just have to re-install a new copy of the XP operation system but one will have to re-install all the programs and all other stuffs in the computer. This article tells how one can restore the computer to its original condition when such viruses attacked.

What is Registry and How Viruses Can attack it?
Registry is a place where XP keeps all the information about the computer's hardware and software. It is being used by all the users including 3rd party hardware and software to find where data are stored in the harddisk. If a new program has just been installed or files added, it will update its record. Registy is the one place where it is most vulnerable to virus attacks. Once the viruses reside in the registry, they can be loaded into the computer memory. It will then take over the computer's operation. Sometimes, using normal methods just cannot get rid of these viruses.

What can we do to prevent virus attacks?
We can install virus protection software, firewalls, virus scanning software etc; however, this will never be able to keep all the viruses away. Some viruses have learning capabilities and may lock themselves such that it will prevent users or any virus software from detecting and deleting them.

However, we can do the following to prevent these viruses from attacking the computer:-

a) Regular maintenance. Scanning, detecting, preventing and deleting the existence of viruses using one or more of the following programs
1) Virus Shield, such as norton, trendmircro, Macfee shields etc
2) Spyware and Malware Scanner, such as Adaware
3) Hijackthis

Run these program once everyday or every other day. On detection of the viruses, scan the computer in full using Virus full scanning programs

b) Regularly saving a copy of the registry, booting files and other information so that one can restore them. There are a few alternatives

1. Registry Saving and Restoration
XP can save a copy of the registry automatically whenever there is a change in the registry such as after each installation of a new program. These registry files are installed in the "System Volume Information" folder.
When there is need to restore the registry or when virus attack the computer, one can restore the registry to the saved position. For instruction. follow this link.
Alternatively, one can save a copy of the registry manually by using the "export" function of the Registry Editor. To access the Registry Editor, click Start button and then in the dropdown box, enter "Regedit" (without quotes) and click ok.

2) Backup a copy of System State
This will save not only a copy of the Registry but also the booting files and the COM+ files. The complete system state for the restoration of the XP system. One would need a free disk space of about 600 MB.


Step 1: Backing Up

1. Make sure the computer is not infested with viruses by performing all the necessary virus or spyware scans available.
2. Click Start, then in the All program/Accessories/System Tool folder, select the Backup program and finally, reaching the following screen.


Select "Let me choose what to backup" and click Next. Now, expand My Computer folder and then select to put a tick in the "System state" folder as shown and click Next



Choose a place to store the backup files using Browse button and then enter a name for this backup file. It is good to store the backup file in a thumbdrive or RW CD or another harddisk so that it can be read and the backup file restored in case of harddisk failures. Note that the backup file can be more than 500 MB
Click Next


Select Advance button and Normal in dropdown box of the subsequent screens, one would reach the following screen to select the verification of file after backup. Tick the box and then Next. The computer will do the rest of job.

Step 2: Restoring the backup files
1. After having installed a new XP operating system in the existing harddisk and provided one has not erase or change any program or file, one can restore the XP system to its orginal condition
2. Following Step 1-2, then choose restore files and settings instead, one should reach the following screen. Browse to the directory of the backup file and doubleclick it, a new screen should show the folder "System State". Tick the box to select and click Next. Click advance in the next screen. Change the default setting if necessary.







NOTE: The backup program, NTBACKUP, is not installed by default in Windows XP Home Edition. Install it using the instructions available at: Q302894.






Select the System State check box

NOTE: If you want to back up your system settings as well as your data files, you should back up all the data on your computer plus the System State data, which includes such things as the registry, the COM+ class registration database, files under Windows File Protection, and boot files.

In the Backup destination list, click the backup destination that you want to use.

If you clicked File in the previous step, type the full path and file name that you want in the Backup media or file name box. Note that you can also specify a network share as a destination for the backup file. Click Start Backup . The Backup Job Information dialog box appears. Under If the media already contains backups, use one of the following steps:

If you want to append this backup to previous backups, click Append this backup to the media.
If you want to overwrite previous backups with this backup, click Replace the data on the media with this backup .
Click Advanced. Select the Verify data after backup check box.

In the Backup Type box, click the type of backup that you want. When you click a backup type, a description of that backup type is displayed under "Description." Click OK , and then click Start Backup . A Backup Progress dialog box appears, and the backup starts. When the backup is complete, click Close.

Important Note:
Viruses sometimes reside in the Registry and also the booting files. It is important to make sure that when one save a copy of the Registry or booting files, one does not save also the viruses. To make sure

a) Clean the computer before saving;
b) Always save new copies in different names;

c) Make a copy just after a reinstallation of the XP system

Enabling DVI Interface in LCD Monitor

Introduction


LCD Monitors are cheap and commonly available nowadays. The latest ones come with DVI-D as well as the normal VGA connections for each monitor. When connected to the DVI-D, some do not get any signal. This article will describe why.





What is DVI and VGA?


These are video interfacing system between the device and the video equipment. DVI stands for Digital Video Interface whereas VGA stands for Video Graphic Adaptor; the former is a newer system. VGA are mainly used in the CRT and earlier models of LCD monitor. One can find more information about DVI system in here.


Which System is Better?


Many said that there is no appreciable differences between the two when comparing them in a monitor that has DVI as well as VGA inputs; however, when one compares them between monitor to monitor, one might find the differences. If your monitor has DVI inputs, it would better to use these inputs.






Why No Signal in DVI Inputs?


The computer's graphic card must have the DVI output for one to display the pictures in digital mode. Rightly speaking, when one connect up the DVI cable, one should have signal. There may be time that we test the LCD first with VGA cable and the computer installed the VGA drivers and when the LCD is re-connected to the DVI output and started up with the VGA cable disconnected, the LCD monitor cannot get the correct signal.


What to do Next?


Either reconnect the VGA cable or have both VGA and DVI cables connected to the LCD monitor before starting up the computer; thereafter,


  • Enter Device Manager by clicking Start button, then select run, in the dropdown box, enter "devmgmt.msc" (without quotes) and click ok.

  • In the Monitors folder, one should find some monitor drivers and a driver called "Plug and Play Monitor". Remove all the monitor drivers, left except the "Plug and Play Monitor". One can easily remove the drivers by right clicking and then either disable or uninstall the drivers.

  • Switch off the monitor and computer. Remove the VGA cable and install or left the DVI cable attached to the monitor.

  • Re-start the computer, one should boot up with signal

  • Install the DVI software as provided by the manufacturer. Check the Display property to ensure that the DVI software is properly installed.


Cannot find "Plug and Play Monitor"

Install the "Plug and Play" driver first before shutting down and re-starting the computer. This can be done by




  • doubleclicking the VGA driver and in the "Driver" tab,




  • select "Update Driver" and then




  • select "No, no this time", click next




  • select "install from a list or specific location", click next




  • select "Don't search, I will choose the driver to install" click next




  • finally, select "Plug and Play monitor" and click next to install .



























iPhone and iPad: How to Create a Short Cut in Home Screen to Clear Cache & History

23 November 2024 What are Cache and History? Cache and browser history store information about websites you've visited.  The C ache s to...