A common use of the XSLT translate() function is to change the case of text strings within a document; however, you may run into situations where you need to change the actual element and attribute name cases, not simply text strings within them.
Have you ever tried to erase a portion of an image in a straight line? This can be rather difficult using just the mouse and the Eraser tool. Luckily, there's a way to do this without a lot of fuss. Instead of erasing in a continuous motion with the Eraser tool, just click your mouse where you want to begin erasing. Then, press and hold [shift] and click on the end point. Photoshop automatically erases the area between each click in a perfectly straight line for you.
When you are creating a document in Microsoft Word, you may want to add some kind of visual element like a chart. Instead of creating a chart in another design based program, you can use the chart tool in Word. When you insert a chart, you will automatically see a second window appear on your screen. Microsoft Excel will automatically open so that you can edit the data that will be displayed in your chart. For those of you who are Microsoft Word users, you may not need to use Excel very often. And for those of you that are Excel users, you may not need to use Word very often. The great thing about adding charts is that it works with both programs and makes it very easy to understand.
They say a picture is worth a thousand words, unless you're talking SEO. If your site uses Java script-powered drop-down menus, or uses image links, you might not be getting optimal search results. Search engine robots and spiders prefer to follow text links, so if you use images in your navigation bar, be sure to also include text links. The same is true of links within script.
Tiny flash memory drives that fit on a keychain (sometimes called thumb drives) are inexpensive and convenient for transferring files between computers that aren't on the same network-- but they can also present a security risk for your organization. They can be used to bring viruses and unauthorized software in, or to smuggle sensitive information out. Luckily, there are software products, such as GFI's Portable Storage Control (PSC), that let you control the use of these devices on your network.