I don’t like to resize the Finder window every time I open the new one. Unfortunately, most of the time the size is too small and I have to change it again and again. Yes, I can go to fullscreen mode, but it’s not always the desired option.
The solution for this problem is simple, but not evident:
- Open a Finder window and set it the size you want
- Close all windows (Command + Options + W and click the close button)
- Hold down the Option key, right-click the Finder icon, and select relaunch
Now, when I open the new Finder window it has always the same size.
Have you tried to write an email, or worse, an essay on an iPad touchscreen? Well, soon that may be exactly how you type on a Macbook laptop.
As we all know a picture is worth a thousand words. Many organizations or individuals created maps to visualize the PRINCE2 process and/or management products. These pictures are helpful during your study for the PRINCE2 Foundation or Practitioner exam, and for reference during day-to-day work as a project manager. In this blog I will show you some and I will give you my comments.
Starting point will be PRINCE2 2009, although there are some nice pictures, e.g. the PRINCE2 2005 Tube Map from Mike Spain and the Crazy colour cards but they were never transformed into the 2009 version. Although the Crazy colour card for Project Boards is still valuable.
We are looking for the following information:
• PRINCE2 contains 7 principles
• PRINCE2 contains 7 themes
• PRINCE2 contains 7 processes with in total 40 activities
• PRINCE2 contains 23 events or triggers between each process
• PRINCE2 uses…
View original post 790 more words
Microsoft acquired the cross-platform iOS, Android and OS X development service Xamarin last month. As the company announced during today’s keynote, the core Xamarin tools are now available for free as part of the free Visual Studio Community edition
Every organization must prepare for the possibility of cybercrime within its networks or on its computer systems. Are you able to investigate crimes, like fraud, insider threats, industrial espionage, employee misuse, and computer intrusion? These days, every IT Pro should learn to recover key intelligence from Windows systems.
Source: Microsoft Virtual Academy