how to
How tos for tech whizes and luddites alike; tips, tricks and shortcuts to optimize your computer, smartphone or internet mastery.
Domain Driven Design — Domain Model and its Components
In my last story , I had gone through what are domains . Domains as a recap are core functionalities of the current business model . Most of the time, domain experts spend a lot of effort discovering in-depth about domains in the business ecosystem to help identify the problem in detail.
By Harish Subramaniam4 years ago in 01
Decrease Graphics Card GPU Temperature Easily
When it comes to gaming, Graphics Card is the busiest part inside your computer case. It processes millions of instructions during gaming to perform different operations, and can often get too hot because of this. Unlike CPU, GPU (Graphics Processing Unit) overheating in graphics cards can occur and can cause several problems including loss of graphics cards. GPU is the principal component in the graphics card where overheating can occur. The graphics card's memory can also get hot but it doesn't go beyond the point of risk.
By Manish Kushwah4 years ago in 01
Learn Data Science And Machine Learning In 5 Easy Steps: A Short Python Tutorial
Machine learning and data science concepts are easier to implement, and they tend to generate extraordinary results. If you know when and how to implement your assigned machine learning tasks, you can efficiently make the best results. The global revenue of artificial intelligence and machine learning concepts tend to deliver excellent services to businesses around the world.
By App Emporio4 years ago in 01
How to deploy spring boot to AWS
In this post, we will talk about spring boot AWS and show how to deploy a spring boot application with the help of Elastic Beanstalk. We will also show how spring boot configuration can be customised with the help of environment variables. Read on to get the answers to these common and basic questions. This article created with help from Devglan.com.
By Keran Mourning4 years ago in 01
Diverting Bottles
Diverting Bottles is a technical process of transferring the bottles using a conveyor. In this case, a conveyor device was used to divert the bottles from one conveyor belt to another. This method is usually used in factories where the bottles need to be sorted depending on their physical features. Usually, a bottling conveyor is used to do the following tasks:
By Domingo Añasco-Gaces Samontina, Jr.4 years ago in 01
How to replace the iPhone SE Display
Today we offer you the replacement of the display of an iPhone SE that one of our customers lost their hands in a moment of distraction and which caused the device to crush a corner of the body and the consequent breakage of the glass .
By Zenith Sez4 years ago in 01
When Religion and Technology Collide
Many people say that religion and technology cannot coexist. Not only is this a complete lie, but the church can benefit greatly from the use of technology. It is specially created to make our lives easier and allow us to do the best job possible. When looking at this from a church perspective, a church can run flawlessly and seamlessly with the employment of good technology. You can begin to automate many of the features people were doing before and instead move them to areas which need more support. Here is what happens when religion and technology collide and here are some tools that can help make this a positive within your church and religion.
By George Swagger4 years ago in 01
Ways to Speed Up Your Windows Performance
You can find various built-in utilities on Windows 10 PC that helps you clean and optimize your system for better performance. Using these smart features and utilities, you can speed up and secure your system effortlessly. Let’s discuss more about it in this article.
By Janny Thomas4 years ago in 01
How to Block USB Port on Windows 10
USB ports are one of the biggest communicators of viruses and threats on the computer. You must have seen that the USB ports are always blocked in MNCs, Corporate environment, Schools and Colleges as they never want their data to be stolen or the network getting infected from an outer source.
By lucy taylor4 years ago in 01