Visionox – New Screen Supplier of Huawei Cell Phone

According to the latest news, Visionox will start to provide product samples to Huawei in February 2020 and supply them in batches in March of the same year. It supplies Huawei with Honor and Nova series mobile phone screens.

In addition, the flexible OLED industry that Visionox invested heavily in has also been strongly supported by the Chinese local government. According to the announcement on December 28, Visionox Holding Co., Ltd.’s Yungu (Gu’an) Technology Co., Ltd. received a special support award of RMB 300 million for the sixth-generation active matrix organic light-emitting display (AMOLED) panel production line project.

AMD and Intel stage stiffer confrontation in 2020

As the leading companies in the PC industry, the two major upstream manufacturers have been going head-to-head since the beginning of the new year. It is reported that AMD, the standard mobile Ryzen 7 4800H and Ryzen 9 4900H processors were exposed. The two AMD processor products are 8-core 16-thread design, which is comparable to the Intel Core i9 9800H processor. The other two are based on Zen 2 architecture of 7nm process technology.

In terms of graphics, the Ryzen 4000 series should still be Vega architecture, but not the latest NaviRDNA architecture. According to the previously exposed news, the Ryzen 4000 series APU product plan is quite rich, covering 15 ~ 35W low voltage, 45W standard voltage, 65W standard desktop and desktop energy-saving version. It is reported that it will be unveiled in March 2020, and wait and see.

Of course, Intel will not slacken in this way. The 10th generation of Core Standard Edition is likely to be released in April. At the same time, a large number of OEM manufacturers will update new products in May, and a new wave of machine replacement will be ushered in. The core number of Intel’s 10th generation Core Edition processor has further increased the number of multi-threaded tasks, and the performance of the game has been improved by the increase in clock speed. In addition, the 10th generation of Core Standard mobile processors may have both 10nm and 14nm processes. The former comes with Iris Plus sharp torch display and better graphics performance; the latter has mature process technology and can be used for higher clock speeds and cores. At the same time, it can control TDP and bring excellent performance experience.

In the first half of 2020, if OEM manufacturers launch more Ryzen notebooks, Intel’s market share may be more strongly affected, because if the 4000 series APU performance is as expected, coupled with OEM support, the competition between the two is more intense.

“SelfieType Keyboard” in front of Samsung phones

Recently, Samsung announced that it will show its SelfieType keyboard developed by c_lab at CES. As the name suggests, Samsung uses the smart phone’s front camera and AI algorithm to do motion capture, and then recognize the input text to achieve the keyboard function.

Unlike some previous technical solutions that rely on projection (such as Lenovo 2015 Smart Cast) to implement keyboard input, Samsung SelfieType does not have projection support, which is also worrying that the input accuracy may be sacrificed if the algorithm is weak.

Obviously, SelfieType’s exaggerated publicity component is larger than the practical component. After all, the reason why it is not appealing from film keyboards to machinery to electrostatic capacitors is the “touch”.

However, SelfieType may find a place in devices with low input requirements such as mobile phones and tablets. Moreover, new things are always evolving.

In addition, Samsung will also display breakthrough and disruptive products developed by clab, such as Hyler highlighters and hair care equipment.

Does the laptop keep plugging in and charging for power?

In fact, whether this keeps the power adapter connected all the time using the laptop depends on the usage scenario.

At 100% full charge, the power supply is always plugged in, which makes it easier to “store passivation.” Storage passivation means that the charging display is already full, and the voltage drops rapidly when used, and the capacity decreases as compared with the normal state. Storage passivation is most severe when fully charged, and high temperatures accelerate the process of passivation and battery aging.

If you use your computer most of the time with the power plugged in and only use the battery for a small amount of time, then often charging the battery to 100% and plugging it in will speed up battery aging.

If you use the battery frequently, for example, if you only have a computer with no power to meet, hold the computer and discuss problems with your colleagues, you can keep the battery charging and discharging normally, then the passivation will not be too obvious, so you don’t have to affect your normal use.

Buy high-performance PC laptop batteries and ac adapters at www.uk-online.co.uk.

How do you judge that the computer power supply is broken? The motherboard does not power on the solution

1. Determine whether the computer is good or bad.

1) First, connect the host power supply (ATX), press the main switch button, if it can not be powered, then unplug the power supply to the motherboard.

2) Short-circuit the green and black wires of the power supply with tweezers, and check that the fan of the power supply does not turn. If the power supply fan turns, the power supply is good and the fault is on the host side.

3), judge the computer host switch is good or bad. Connect the ATX power cable to the motherboard, pull up the switch pin and reset pin on the motherboard, and use the tweezers to short-circuit the switch pin to trigger the power switch to see if it can be turned on. If it can, it means that the switch of the main box is broken. The switch is removed for cleaning.

4) If the short-circuit switch pin triggers the power or does not turn on, it means that the motherboard can’t trigger the boot, remove the motherboard from the chassis for maintenance.

5), remove the motherboard, first clean the dust on the board, so as not to hinder maintenance. First look at the motherboard above whether there is component burnout, drum kit, there is no burnt or broken line on the circuit board.

6), put the motherboard, plug in the CPU dummy load, plug in the power. Plug in the motherboard test card and prepare for maintenance.

2. Check the trigger circuit

When the motherboard is not powered, firstly, the specific fault circuit of the motherboard is energized by the method of forcing power. That is to say, the green line and the black line are directly short-circuited. If it can be powered up at this time, the fault is in the soft start circuit itself. If power is not available at this time, there is a serious short circuit. ATX power supply internal protection, it does not allow the voltage output by itself to the ground, so the power supply is automatically protected inside.

There may be a short circuit of the red line, a short circuit of the yellow line, a short circuit of the purple line or a short circuit of the main power supply terminal of the CPU. In the above short-circuit phenomenon, any one of the actual motherboard failures will be forced to be powered up and not powered.

Possible reasons for the short circuit of the red line are: a short circuit of the FET on the main board or a short circuit of the power manager, a short circuit of the gate circuit or an I/O short circuit, and a short circuit of the south bridge, or a short circuit of the 5V filter capacitor. Measure the 5VATX ground data or measure the value of the power supply pipe to the ground to see if it is shorted to ground. The normal ground value is about 380U. If the power supply tube is obviously measured to 0 megaohms or close to 0 megaohms, it indicates that the motherboard has ATX protection due to short circuit to ground.

For the 12V short circuit of the yellow line, it is usually the power management itself and the 12V filter capacitor short circuit. For the 12V short circuit, there may be a problem with the serial port chip.

The short circuit for the purple line may be caused by the south bridge, I/O, FET and gate circuit, as well as the purple line filter capacitor and the violet line Zener diode.

The short circuit to the CPU mains supply may be the FET, the power manager and the main supply filter capacitor. For the motherboard after P4, the CPU main power supply short circuit may also be a short circuit of the north bridge. Measure the ATX power line shorted to the pool, and then find the relevant damaged components to change along the line running circuit.

3. Check the soft boot circuit

If the power is applied forcibly, the fault is in the soft start fault itself. At this time, the soft boot circuit itself and other circuits connected with the soft boot circuit should be focused.

(1) COMS battery. Some motherboards, battery power can not be turned on, and most of the motherboard does not have a battery and does not affect the boot. The COMS battery provides a voltage of 2.6V (2.6 to 3.3V) or more under normal conditions.

(2) COMS? Practice. The COMS jumper is not correct and cannot be turned on. Generally, it is correct to jump on one or two pins, and the third pin is grounded. If you jump on the second and third pins, you will not be able to turn it on. After the mainline of argon injection is faulty, it can be turned on because the real-time crystal power supply is provided by the purple line.

(3) Measure whether the POWER switch pin has 3.3V or 5V voltage. One pin of the POWER switch pin is grounded, and one pin is powered by purple 5V. The middle part will pass some electronic components such as circuits and resistors. If there is no 5V or 3.3 voltage to the switch pin, run the circuit, look at the damage from the ATX power supply purple 5V to the components between the POWER, find the damage and then replace it.

(4) Measure the crystal oscillator next to the South Bridge chip to see if it starts to vibrate. The starting voltage is about 0.5V and about 1.6V. If not, replace the filter capacitor and the crystal element next to the crystal. There is also a way to touch the two pins of the real-time crystal by hand. After touching the motherboard, you can power up and work. After the real-time crystal is damaged, you can power up after you touch the real-time crystal oscillator, so the CPU does not work. At this time, continue to touch the two pins of the real-time crystal by hand, so that the power is turned on but the memory is not used, and then the two pins of the real-time crystal oscillator are touched, and the voltage 乂 will pass through the memory. This is a typical phenomenon of damage to the peripheral circuitry of a real-time crystal. Such a motherboard is more difficult to repair. The real-time crystal oscillator’s electric circuit is very strict. After the damage, the real-time crystal oscillator with the same colour and size will be used, and the vibrating capacitor will be replaced. Otherwise, the replacement will be unsuccessful.

 

Hot sale batteries and power supplies at www.uk-online.co.uk.

The host does not respond when booting. How to detect the power?

Many friends will encounter no reaction when the host is turned on, the power supply does not work, then of course, other hardware will not work normally without power supply. In fact, there are many reasons for this problem, but the primary object of doubt It is the “host power supply”, but we don’t know how to test the power supply. If the power supply is plugged in, there is no way to make the power supply work, and there is no way to test it.

First, plug the power supply line into the power supply, and then short-circuit the power supply. What is short-circuited is to short-circuit the power supply to see if it does not turn. Note that the shorting time can’t be too long. Generally, it’s okay for ten or twenty seconds. The shortest time control should be as short as possible. It is unlikely that the power supply will be broken. If it does not turn, it is completely determined that the power supply is broken.

Specific steps:
First plug the power supply into the power supply line, ready to power the power supply.

See the fourth last blue-green line, pay attention to the green connecting line

Use a pair of tweezers or other substitutes to connect the green line to the black line next to it.

We have connected, pay attention to a little deeper, put it out to prevent contact, pay attention to the fan does not turn, then press the power switch to power on

Then see if the fan starts to turn

 

Hot sale batteries and power supplies at www.uk-online.co.uk.

Connect the power switch with a Coke bottle to make the computer run more smoothly

Sometimes the computer at home is dusty and wants to clean but there are no tools. At this time, using a hair dryer is very good. One netizen gave us a way to make a simple hair dryer. Interested netizens will come and see it.

In the first step, cut the cola bottle halfway and take the upper part of the Coke bottle. Next, take out a straw, cut out the pleated section of the head, and then take out a small fan and stuff its motor into the straw.

In the second step, take out two wooden sticks on the cola bottle, sandwich the straw between the sticks, and glue them to the bottle.

In the third step, the remaining straws are folded twice and attached to the bottle as a handle.

In the fourth step, take out a charging treasure and apply glue to the bottom of the bottle.

In the fifth step, take out a switch and attach it to the handle, then solder the motor, switch and USB cable together. The hair dryer is complete.

Finally, when you need to use it, gently press the switch on the handle, the bottle mouth can blow strong wind. With it, dust will definitely be removed easily. If some netizens are interested in this hair dryer, try to do one.

Hot sale batteries and power supplies at www.uk-online.co.uk.

Reprinted article (pcworld.com) -How to remove malware from your Windows PC

We have all experienced the trouble of computers being attacked by malware. Often when we encounter a malware attack, it is difficult to completely remove them. This article, reprinted from pcworld.com by Eric Geier and Josh Norem, will detail the means to remove malware.

Beware the signs of a PC plagued by malware: slower-than-usual performance, a sudden spate of pop-ups, and other anomalous issues. Yes, out-of-the-ordinary behavior is sometimes the result of hardware conflicts, but your first action should be to rule out the possibility of infection by a virus, spyware, or other nefarious entity—even if you have an antivirus program installed.

Follow this step-by-step guide for instructions on how to get rid of malware.

Step 1: Enter Safe Mode
Before you do anything, you need to disconnect your PC from the internet, and don’t use it until you’re ready to clean your PC. This can help prevent the malware from spreading and/or leaking your private data.

03 shipping malware

If you think your PC may have a malware infection, boot your PC into Microsoft’s Safe Mode. In this mode, only the minimum required programs and services are loaded. If any malware is set to load automatically when Windows starts, entering in this mode may prevent it from doing so. This is important because it can make removing the nefarious files easier since they’re not actually running or active.

Sadly, Microsoft has turned the process of booting into safe mode from a relatively easy process in Windows 7 and Windows 8 to one that is decidedly more complicated in Windows 10. To boot into Windows Safe Mode, first click the Start button in Windows 10 and select the Power button as if you were going to reboot, but don’t click anything. Next hold down the Shift key and click Reboot. When the full-screen menu appears, select Troubleshooting, then Advanced Options, then Startup Settings. On the next window click the Restart button and wait for the next screen to appear (just stick with us here, we know this is long). Next you will see a menu with numbered startup options; select number 4, which is Safe Mode. Note that if you want to connect to any online scanners you’ll need to select option 5, which is Safe Mode with Networking.

You may find that your PC runs noticeably faster in Safe Mode. This could be a sign that your system has a malware infection, or it could mean that you have a lot of legitimate programs that normally start up alongside Windows. If your PC is outfitted with a solid-state drive it’s probably fast either way.

Step 2: Delete temporary files

tempfiles

Now that you’re in Safe Mode, you’ll want to run a virus scan. But before you do that, delete your temporary files. Doing this may speed up the virus scanning, free up disk space, and even get rid of some malware. To use the Disk Cleanup utility included with Windows 10 just type Disk Cleanup in the search bar or after pressing the Start button and select the tool that appears named Disk Cleanup.

Step 3: Download malware scanners

Now you’re ready to have a malware scanner do its work—and fortunately, running a scanner is enough to remove most standard infections. If you already had an antivirus program active on your computer, you should use a different scanner for this malware check, since your current antivirus software may not have detected the malware. Remember, no antivirus program can detect 100 percent of the millions of malware types and variants.

There are two types of antivirus programs. You’re probably more familiar with real-time antivirus programs, which run in the background and constantly watch for malware. (Another option is an on-demand scanner, which searches for malware infections when you open the program manually and run a scan. You should have only one real-time antivirus program installed at a time, but you can have many on-demand scanners installed to run scans with multiple programs, thereby ensuring that if one program misses something a different one might find it.

If you think your PC is infected, we recommend using an on-demand scanner first and then following up with a full scan by your real-time antivirus program. Among the free (and high-quality) on-demand scanners available are BitDefender Free Edition, Kaspersky Virus Removal Tool, Malwarebytes, Microsoft’s Malicious Software Removal Tool, Avast, and SuperAntiSpyware.

Step 4: Run a scan with Malwarebytes

For illustrative purposes, we’ll describe how to use the Malwarebytes on-demand scanner. To get started, download it. If you disconnected from the internet for safety reasons when you first suspected that you might be infected, reconnect to it so you can download, install, and update Malwarebytes; then disconnect from the internet again before you start the actual scanning. If you can’t access the internet or you can’t download Malwarebytes on the infected computer, download it on another computer, save it to a USB flash drive, and take the flash drive to the infected computer.

After downloading Malwarebytes, run the setup file and follow the wizard to install the program. Once the program opens, it will automatically activate a trial of the paid version that enables real-time scanning. You won’t get charged after the trial ends, however—by default, the program reverts to the standard free version in 14 days. In the meanwhile, you can disable the real-time scanning for those two weeks if you prefer.

To run a scan, switch from the Dashboard tab to the Scan tab. Keep the default scan option (“Threat Scan”) selected and click the Start Scan button. It should check for updates before it runs the scan, but make sure that happens before you proceed.

malwarebytes3screencap2

Though it offers a custom-scan option, Malwarebytes recommends that you perform the threat scan first, as that scan usually finds all of the infections anyway. Depending on your computer, the quick scan can take anywhere from 5 to 20 minutes, whereas a custom scan might take 30 to 60 minutes or more. While Malwarebytes is scanning, you can see how many files or objects the software has already scanned, and how many of those files it has identified either as being malware or as being infected by malware.

If Malwarebytes automatically disappears after it begins scanning and won’t reopen, you probably have a rootkit or other deep infection that automatically kills scanners to prevent them from removing it. Though you can try some tricks to get around this malicious technique, you might be better off reinstalling Windows after backing up your files (as discussed later), in view of the time and effort you may have to expend to beat the malware.

Once the scan is complete, Malwarebytes will show you the results. If the software gives your system a clean bill of health but you still think that your system has acquired some malware, consider running a custom scan with Malwarebytes and trying the other scanners mentioned earlier. If Malwarebytes does find infections, it’ll show you what they are when the scan is complete. Click the Remove Selected button in the lower left to get rid of the specified infections. Malwarebytes may also prompt you to restart your PC in order to complete the removal process, which you should do.

 

malwarebytes3 pup

 

If your problems persist after you’ve run the threat scan and it has found and removed unwanted files, consider running a full scan with Malwarebytes and the other scanners mentioned earlier. If the malware appears to be gone, run a full scan with your real-time antivirus program to confirm that result.

 

Step 5: Fix your web browser

Malware infections can damage Windows system files and other settings. One common malware trait is to modify your web browser’s homepage to reinfect the PC, display advertisements, prevent browsing, and generally annoy you.

Before launching your web browser, check your homepage and connection settings. Simply go to the setttings window of your browser to check your homepage setting.

 

IE Home Page Settings

Step 6: Recover your files if Windows is corrupt
If you can’t seem to remove the malware or if Windows isn’t working properly, you may have to reinstall Windows. But before wiping your hard drive, copy all of your files to an external USB or flash drive. If you check your email with a client program (such as Outlook or Windows Mail), make sure you export your settings and messages to save them. You should also back up your device drivers with a utility such as Double Driver, in case you don’t have the driver discs anymore or don’t want to download them all again. Remember, you can’t save installed programs. Instead, you’ll have to reinstall the programs from discs or redownload them.

If Windows won’t start or work well enough to permit you to back up your files, you may create and use a Live CD, such as Hiren’s BootCD (HBCD), to access your files.

Once you have backed up everything, reinstall Windows either from the disc that came with your PC, by downloading the installation image from Microsoft, or by using your PC’s factory restore option, if it has one. For a factory restore you typically must press a certain key on the keyboard during the boot process in order for restore procedure to initialize, and your PC should tell you what key to press in the first few seconds after you turn it on. It there’s no on-screen instructions consult your manual, the manufacturer, or Google.

7: Keep your PC clean
Always make sure that you have a real-time antivirus program running on your PC, and make sure this program is always up-to-date. If you don’t want to spend money on yearly subscriptions, you can choose one of the many free programs that provide adequate protection, such as Avira Antivirus Free Edition and Bitdefender Antivirus Free Edition. If you’d prefer a more robust AV program, we recommend Norton Security Premium—see our roundup of the best antivirus software for more information.

In addition to installing traditional antivirus software, you might consider using the free OpenDNS service to help block dangerous sites. And if you frequent shady sites that might infect your PC with malware, consider running your web browser in sandbox mode to prevent any downloaded malware from harming your system. Some antivirus programs, such as Comodo, offer sandboxing features, or you can obtain them through a free third-party program such as Sandboxie.

When you think that you’ve rid your PC of malware infections, double-check your online accounts, including those for your bank, email, and social networking sites. Look for suspicious activity and change your passwords—because some malware can capture your passwords.

If you have a backup system in place that automatically backs up your files or system, consider running virus scans on the backups to confirm that they didn’t inadvertently save infections. If virus scans aren’t feasible, as is the case with online systems since they usually will only scan a drive attached to your PC or just the C:\ drive, consider deleting your old backups and resetting the software to begin saving new backups that are hopefully free from infections.

 

If you don’t currently have a backup system in place, see our roundups of best backup software for Windows and best online backup services.

Keep Windows, other Microsoft software, and Adobe products up-to-date. Make sure that you have Windows Update turned on and enabled to download and install updates automatically. If you’re not comfortable with this, set Windows to download the updates but let you choose when to install them.

Buy laptop batteries and PC power adapters at www.uk-online.co.uk.

 

 

 

 

 

Professional version win10 play game graphics card temperature is too high how to do?

Generally, there are many faults with excessive temperature. For example, the outlet of the heat dissipation module is blocked. If there is no way to dissipate heat, the temperature of the graphics card may be too high. At this time, you can clean the computer to handle the fault.

Another type of fault is that the cooling module is aging or the silicone has been worn out. This situation usually occurs in computers that have been used for a long time. You can choose to replace the heatsink or add thermal silicone to handle the fault.

News reprint-Google has been developing a folding screen prototype since its release.

According to the US technology media The Verge reported on May 7, Google is developing the folding screen prototype, but the release time is not clear.
According to CNET, before this year’s I/O Developers Conference, Google announced that it is developing foldable technology and has developed a foldable screen prototype for quite some time. Mario Queiroz, who is responsible for Pixel’s mobile phone development, said: “We are actually developing a foldable screen prototype and have been doing it for a while, but there is no clear use case.”

But that doesn’t mean the flagship Pixel phone will soon be available in a folding version, Querioz said in a subsequent statement, “We are prototyping foldable screens and other new hardware technologies, and there are no related product announcements yet.”

Google’s move is not surprising. The company announced its native Android system that supports foldable screens last November. Since the Asian mobile phone manufacturers began to release official foldable products, the outside world began to publicize its unique shape and interesting new equipment. At the Mobile World Congress in February this year, companies like LG and Samsung showed people how their ever-improving prototyping and folding screens work.

Samsung is not so lucky, although the company was initially known for its high-end folding screen technology, but a series of technical problems that followed it left nowhere to be saved, and the release date could only be postponed indefinitely. Google said that it will not be eager to launch the official foldable Pixel phone before it is really ready.