Thursday, April 17, 2014

Save your Gmail Attachments to Google Drive Automatically

Learn how to save your email attachments in Gmail to any folder in your Google Drive automatically through Google Script without using any extensions.

Your email messages in Gmail have attachments – images, documents, videos, etc. – and you can automatically save them all to a specific folder inside Google Drive using the Send to Google Drive
. The latest version lets you specify a list of file types and only file attachments belonging to those types will be saved to your Google Drive.
If you haven’t used Send to Google Drive before, here’s how it works.

You specify a Gmail label name in the sheet and the script will scan all your existing and incoming email messages inside that label for attachments. You can say “inbox” to monitor the inbox folder, or specify a user label or say “all” to monitor every folder in your Gmail mailbox. If the script finds an attachment, the file is downloaded to your Google Drive.

You neither have to install any browser extensions nor do you have to grant access to your Gmail or Google Drive to a third-party. And since Google Drive synchronizes with your mobile device and desktop, the saved email attachments will instantly become available on all your other devices.


Here’s a step by step guide on how you can setup the Send to Google Drive program for your Gmail account. It takes less than a minute.
Click here to create a copy of the Send to Google Drive sheet in your Google Drive.Open the sheet and you should see a new Gmail Attachments menu at the top (see screenshot). Choose Authorize (Step #1) and grant the necessary permissions. This is an open-source Google Script) that runs in your own Google account and no one else will have access to any of your data.Click the Gmail Attachments menu again and select Run (step #2). Close the Google sheet and the script will begin downloading attachments from Gmail to your Google Drive in the background.
The program will monitor the specified Gmail label every five minutes and as soon as it finds a message that has attachments, it will automatically save the file(s) to a folder in your Google Drive.

Once the attachments have been saved, a new label — Processed
— is applied to the Gmail message indicating that the message has been processed by the script. It saves all types of attachments but you can also specify a list of extensions separated by commas.
If you would like to stop the script later, open the same Google Sheet and choose Uninstall from the Gmail Attachments
menu.
The premium version supports even more features:

Better Ways to Embed Tables and Spreadsheets in Web Pages

Learn how to embed tables and spreadsheet data into web pages. Your site visitors can interact with the tables and perform function like copy-paste, search, sort, etc.


It is easy to embed tabular data in  web pages. You can either use the standard

 HTML tag or you can input the tabular data in a spreadsheet — like Excel Online or Google Spreadsheets — and embed the sheet in your web pages.


HTML tables are easy while spreadsheet based tables allow better formatting and complex layouts – like nested tables within a table – without fiddling with the code. Here are the different ways by which you can embed tables in your website and their pros and cons.


If you have access to a WYSIWYG editor like Dreamweaver, you can easily create an HTML table using the built-in wizards but I prefer using Markdown for creating tables as it requires no tags. Go to gist.github.com (you don’t even need an account here) and enter the table  in the following format:

Column A | Column B-------- | -------Cell A1 | Cell B1Cell A2 | Cell B2

Each column is separated by a pipe (|) while hyphens (-) indicate the table headings. Name the gist table.md (.md indicates markdown language) and click the “Create Secret Gist” button to render the markdown as a table.


Once you click the Save button, the gist will show you the visual table which you can copy-paste into any rich-text editor like the Gmail compose window. Alternatively, you can right-click the table on Github and choose Inspect Element to view the actual HTML tags for that table.


excel to html


Tableizer is another simple tool for converting spreadsheet data into HTML table code. Create a table inside Excel or the Numbers app on your desktop, copy the cells and paste it inside Tableizer. It will generate the HTML code that can be used on your blog or website.


A popular option for embedding tabular data in a web page is through Google Docs (Spreadsheets). The advantage with this approach is that you can modify the data in the spreadsheet and embedded table will update itself to reflect the edits. There’s no need to edit the web page containing the table.


Go to spreadsheets.google.com, enter some data in the sheet and the choose the Publish to the Web option from the File menu. Choose Start Publishing and Google Drive will offer you the IFRAME embed code for that particular sheet.


The embedded sheet – see live version – will preserve the original formatting of the cells but it will still be a static HTML document – there’s no option for sorting or filtering data in the HTML table.


This is my favorite method for embedding spreadsheet data in web page and I’ll soon explain why.


Go to office.live.com and create new blank workbook. Enter the tabular data inside the Excel sheet and then choose File -> Share -> Embed -> Generate HTML.


Excel, unlike Google Docs, allows you to embed a select range of cells and not the entire spreadsheet. You can also include a download link in the embedded cells making it easier for your website visitor to download and open the table in their local spreadsheet app. The embedded spreadsheet also offers better copy-paste than Google Docs.


Here’s a live version of an HTML table embedded using the Excel web app.


Related: Capture Web Tables into Excel


If you wish to go with static HTML tables, instead of interactive spreadsheet based tables, you can consider adding the Excel button that will make your HTML tables interactive.


You have the regular HTML code for your



 and all you have to do is add another HTML tag to your web page that will turn the embedded static table into an interactive sheet – — see this live version.














Column AColumn B
Cell A1Cell B1
Cell A2Cell B2



This code will add a little Excel button next to your HTML table and when someone clicks that button, it creates a beautiful and interactive view of table with support for sorting and filtering. You can even visualize the HTML table as graphs without leaving the page.


The advantage with static HTML tables is that they are SEO friendly (search engines can read your HTML table) while spreadsheet based tables are not. The latter however allow better formatting options and are relatively easy to update.


If you wish to have the best of both worlds, go with an HTML table and use the Excel interactive view that will let viewers interact with the table on demand.


View the original article here

Wednesday, April 16, 2014

Google releases Project Ara development kit, modular phones closer than ever

There is no shortage of genuinely good smartphone options on the market. However, if you want to stay completely up-to-date, you’ll have to toss your old phone once a year in order to buy the new model. Unlike building a PC, you can’t switch out the parts to keep your rig fresh. Google aims to remedy that issue with its modular smartphone experiment, Project Ara, and now that project is closer than ever.


Tidbits of Project Ara and modular smartphones have been floating around for a while now. Google announced the modular smartphone venture back in October of 2013, and Phonebloks — the little modules that would attach to a modular phone — were shown off a month prior. Just last month we saw that that Project Ara might actually release as soon as next year, beginning with the small entry fee of just $50. Now, just a month after the potential price reveal, Google has released Project Ara’s module development kit.



The modules are, of course, what makes or breaks a modular phone — without them, the phone would just be a lightweight shell riddled with empty compartments. Each module is a component integral to a smartphone — the camera hardware, the SoC, one or multiple batteries, and so on — and consumers can pick which component they’d like to install. Basically, instead of the limited configurations of the iPhone 5S and Galaxy S5, you can purchase whatever kind of phone you want. Better yet, you wouldn’t have to upgrade your entire phone the following year when new models hit the market, because you can simply buy a couple new modules and slap them in.


The dev kit is a very early release, only making it to version 0.10. Though extremely early, it not only gives developers an idea of what they should start expecting in the future, but helps Google receive feedback from the very developers that will make or break Project Ara. The final development kit is projected to release at the end of this year.


The frame of the phone, which Google calls Endo, will come in three coffee-style sizes — mini, medium, and large. The larger the phone, the more modules it can fit. Google doesn’t appear to have a problem with modules not uniformly fitting the phone frame; the camera can be a raised bump coming off the flat plane of the back of the Endo, or a pulse reader can stick out of the top like a Square credit card reader. Sure, it’ll be ugly, but you could swap out modules on the go to get that uniform body back when it’s time for the phone to go back into your pocket.


For now, there aren’t too many more details available, but Google is hosting a Project Ara developer’s conference next week, so hopefully the company will drop some more exciting tidbits about build-your-own phones soon.

Monday, April 14, 2014

Google, once disdainful of lobbying, now a master of Washington influence

Google's Eric Schmidt is no stranger to D.C. He has spent lots of time at the White House and on Capitol Hill lobbying on behalf of his titan technology company. But his relationship with Washington and the Obama administration has not always been a comfortable one.

Written by Tom Hamburger Matea Gold


In May 2012, the law school at George Mason University hosted a forum billed as a “vibrant discussion” about Internet search competition. Many of the major players in the field were there — regulators from the Federal Trade Commission, federal and state prosecutors, top congressional staffers.

What the guests had not been told was that the day-long academic conference was in large part the work of Google, which maneuvered behind the scenes with GMU’s Law & Economics Center to put on the event. At the time, the company was under FTC investigation over concerns about the dominance of its famed search engine, a case that threatened Google’s core business.

In the weeks leading up to the GMU event, Google executives suggested potential speakers and guests, sending the center’s staff a detailed spreadsheet listing members of Congress, FTC commissioners, and senior officials with the Justice Department and state attorney general’s offices.

“If you haven’t sent out the invites yet, please use the attached spreadsheet, which contains updated info,” Google legal assistant Yang Zhang wrote to Henry Butler, executive director of the law center, according to internal e-mails obtained by The Washington Post through a public records request. “If you’ve sent out the invites, would it be possible to add a few more?”

Butler replied, “We’re on it!”

On the day of the conference, leading technology and legal experts forcefully rejected the need for the government to take action against Google, making their arguments before some of the very regulators who would help determine its fate.

The company helped put on two similar conferences at GMU around the time of the 18-month investigation, part of a broad strategy to shape the external debate around the probe, which found that Google’s search practices did not merit legal action.

The behind-the-scenes machinations demonstrate how Google — once a lobbying weakling — has come to master a new method of operating in modern-day Washington, where spending on traditional lobbying is rivaled by other, less visible forms of influence.

That system includes financing sympathetic research at universities and think tanks, investing in nonprofit advocacy groups across the political spectrum and funding pro-business coalitions cast as public-interest projects.

The rise of Google as a top-tier Washington player fully captures the arc of change in the influence business.

Nine years ago, the company opened a one-man lobbying shop, disdainful of the capital’s pay-to-play culture.

Since then, Google has soared to near the top of the city’s lobbying ranks, placing second only to General Electric in corporate lobbying expenditures in 2012 and fifth place in 2013.

The company gives money to nearly 140 business trade groups, advocacy organizations and think tanks, according to a Post analysis of voluntary disclosures by the company, which, like many corporations, does not reveal the size of its donations. That’s double the number of groups Google funded four years ago.

This summer, Google will move to a new Capitol Hill office, doubling its Washington space to 55,000 square feet — roughly the size of the White House.

Google’s increasingly muscular Washington presence matches its expanded needs and ambitions as it has fended off a series of executive- and legislative-branch threats to regulate its activities and well-funded challenges by its corporate rivals.

Today, Google is working to preserve its rights to collect consumer data — and shield it from the government — amid a backlash over revelations that the National Security Agency tapped Internet companies as part of its surveillance programs. And it markets cloud storage and other services to federal departments, including intelligence agencies and the Pentagon.

“Technology issues are a big — and growing — part of policy debates in Washington, and it is important for us to be part of that discussion,” said Susan Molinari, a Republican former congresswoman from New York who works as Google’s top lobbyist. “We aim to help policymakers understand Google’s business and the work we do to keep the Internet open and spur economic opportunity.”

Molinari added, “We support associations and third parties across the political spectrum who help us get the word out — even if we don’t agree with them on 100 percent of issues.”

Susan Molinari, a Republican former congresswoman from New York, works as Google’s top lobbyist in Washington. (Bennett Raglin/Getty Images for Elle)

As Google’s lobbying efforts have matured, the company has worked to broaden its appeal on both sides of the aisle. Executive Chairman Eric Schmidt is a well-known backer of President Obama and advises the White House. Google’s lobbying corps — now numbering more than 100 — is split equally, like its campaign donations, among Democrats and Republicans.

Google executives have fostered a new dialogue between Republicans and Silicon Valley, giving money to conservative groups such as Heritage Action for America and the Federalist Society. While also supporting groups on the left, Google has flown conservative activists to California for visits to its Mountain View campus and a stay at the Four Seasons Hotel.

The company has also pioneered new and unexpected ways to influence decision-makers, harnessing its vast reach. It has befriended key lawmakers in both parties by offering free training sessions to Capitol Hill staffers and campaign operatives on how to use Google products that can help target voters.

Through a program for charities, Google donates in-kind advertising, customized YouTube channels and Web site analytics to think tanks that are allied with the company’s policy goals.

Google “fellows” — young lawyers, writers and thinkers paid by the company — populate elite think tanks such as the Cato Institute, the Competitive Enterprise Institute and the New America Foundation.

To critics, Google’s investments have effectively shifted the national discussion away from Internet policy questions that could affect the company’s business practices. Groups that might ordinarily challenge the policies and practices of a major corporation are holding their fire, those critics say.

“Google’s influence in Washington has chilled a necessary and overdue policy discussion about the impact of the Internet’s largest firm on the future of the Internet,” said Marc Rotenberg, a Georgetown University law professor who runs the Electronic Privacy Information Center, a watchdog and research organization.

Some with deep ties to the company say that Google’s embrace of aggressive lobbying was a necessary concession to the realities of Washington.

“I don’t fault Google for playing that game, in which big companies use their money to buy advocates and allies,” said Andrew McLaughlin, who served as Google’s first director of global public policy in Washington. “Given where the company is today, the fiduciary duty it has to shareholders and the way Washington works, it’s a rational judgment.”

Google goes to lunch

An early sign of Google’s new Washington attitude came in September 2011, when executives paid a visit to the Heritage Foundation, the stalwart conservative think tank that has long served as an intellectual hub on the right, to attend a weekly lunch for conservative bloggers.

The session took place at a critical juncture for the company.

Days earlier, Schmidt had endured a rare and unnerving appearance on Capitol Hill, where he was lectured by a Republican senator who accused the company of skewing search results to benefit its own products and hurt competitors. The FTC antitrust inquiry was underway. And, in what Google saw as a direct threat to the open Internet, major lobbies such as the U.S. Chamber of Commerce and the Motion Picture Association of America were mounting a legislative campaign to place restrictions on the sale of pirated music and movies. The effort was getting bipartisan traction in the House and the Senate.

Google Executive Chairman Eric Schmidt testifies before a Senate Judiciary antitrust subcommittee in September 2011. (Chip Somodevilla/Getty Images)

Inside Google’s Washington headquarters, a handful of lobbyists were crafting what they called the “Republican strategy” to defeat the legislation. Their approach: build conservative opposition based on the right’s distaste for regulation. They also seized on an obscure provision that they told Republicans would be a boon for trial lawyers, a Democratic constituency.

As the campaign took shape, there was a building sense within the company that it needed to beef up its firepower on the Hill. That fall, Google’s first Washington lobbyist, a computer scientist and lawyer named Alan Davidson, a Democrat, would announce his resignation, replaced a few months later by the former GOP lawmaker, Molinari.

In their visit to Heritage that day, Google officials were eager to make new friends. Their challenge was instantly clear.

“In 2008, your CEO campaigned for Barack Obama,” said Mike Gonzalez, Heritage’s vice president for communications, according to a video of the event. “.?.?. As a company, you’re really identified with this administration from the beginning. And you come here and you’re like a mix of Milton Friedman and Friedrich Hayek.”

Adam Kovacevich, then a member of Google’s policy team, responded by stressing the company’s interest in building new alliances.

“One of the things we’ve recognized is that no company can get anything done in Washington without partnerships on both sides of the aisle,” he said.

He noted the recent hiring of Lee Carosi Dunn, one of several former top aides to Sen. John McCain (R-Ariz.) brought on by the company.

Dunn, addressing the audience, promised “a lot of reach-out to Republicans.”

“I think it’s another lesson young companies that come to Washington learn — you can’t put all your marbles in one basket,” Dunn said. Referring to the editor of the conservative Weekly Standard, Dunn added: “Look, even Bill Kristol was walking around wearing Google glasses. We’re making strides!”

The Google-Heritage relationship soon blossomed — with benefits for both.

A few weeks after the blogger session, Heritage researcher James L. Gattuso penned a critique of the antitrust investigation into Google, praising the company as “an American success story.”

That winter, Heritage joined the chorus of groups weighing in against the anti-piracy legislation. As the bill, the Stop Online Piracy Act, appeared to gain steam in the GOP-led House, Gattuso wrote a piece warning of “unintended negative consequences for the operation of the Internet and free speech.” The legislation, he said, could disrupt the growth of technology. Gattuso said he came to his position independently and was not lobbied by Google.

After Gattuso’s piece went live, Heritage Action, the think tank’s sister advocacy organization, quickly turned the argument into a political rallying cry. In terms aimed at tea party conservatives, the group cast the bill as “another government power grab.”

In mid-January 2012, Heritage Action designated the legislation a “key vote” it would factor into its congressional race endorsement decisions — heightening the pressure on Republicans.

The next day, leading Internet sites, including Wikipedia, went dark as part of an online blackout protesting the bills.

Google turned its iconic home page into a political platform for the first time, urging users to sign a petition against the legislation. Seven million people added their names, and many of them added their e-mails, creating a valuable activist list for Google to mobilize then and in later fights.

As congressional offices were flooded with phone calls and e-mail protests, support for the legislation crumbled. Within days, both the House and Senate versions of the bill were shelved and Hill veterans were left marveling at the ability of Google and its allies to muster such a massive retail response.

For Google and Heritage, the legislative victory was the beginning of a close relationship. A few months later, Google Ideas and the Heritage Foundation co-hosted an event focused on the role the Internet could play in modernizing Cuba, featuring Sen. Marco Rubio (R-Fla.) and Google Ideas director Jared Cohen.

The following year, a new name popped up on Google’s list of groups it supports financially: Heritage Action.

GMU conferences

Facing a broad and potentially damaging FTC probe, Google found an eager and willing ally in George Mason University’s Law & Economics Center.

The center is among the academic programs at universities such as Harvard and Stanford that have benefited from Google’s largesse. For the past several years, the free-market-oriented law center has received an annual donation from the company, a grant that totaled $350,000 last year, according to the school.

Google’s relationship with the law center proved helpful in the summer of 2011 as speculation mounted that the FTC was going to launch an antitrust investigation of the tech giant. The company’s rivals, including Microsoft and Yelp, were aggressively pressing arguments that Google was exploiting its dominance in the search business.

On June 16, 2011, Google and the law center put on the first of three academic conferences at the GMU law school’s Arlington County campus, all focusing on Internet search competition. It was eight days before the company announced it had received formal notification it was under FTC investigation.

Google was listed as a co-sponsor of the day-long forum, but some participants were still struck by the number of speakers who took a skeptical view of the need for antitrust enforcement against the company, according to people in attendance.

The keynote address was by Google engineer Mark Paskin, who delivered a lunchtime speech titled “Engineering Search.”

A few days later, Christopher Adams, an economist in the FTC’s antitrust division who later worked on the Google investigation, e-mailed Butler, the law center’s director, to thank him for putting on the conference. “I think it was one of the best policy conferences that I’ve been too [sic],” Adams wrote, praising Paskin’s talk as “excellent.”

Adams declined to comment for this article, referring questions to the FTC press office.

FTC spokesman Justin Cole said the agency’s staffers “are required to adhere to established federal government ethics rules and guidelines. Attendance and participation in the 2011 and 2012 GMU conferences by our staff adhered to these guidelines.”

As the agency’s investigation stretched into its second year, the staff and professors at GMU’s law center were in regular contact with Google executives, who supplied them with the company’s arguments against antitrust action and helped them get favorable op-ed pieces published, according to the documents obtained by The Post.

The school and Google staffers worked to organize a second academic conference focused on search. This time, however, Google’s involvement was not publicly disclosed.

Months before the event, Zhang, the Google legal assistant, e-mailed Chrysanthos Dellarocas, a professor in the Information Systems Department at Boston University’s School of Management, to suggest he participate. Dellarocas had received $60,000 in 2011 from Google to study the impact of social networks on search.

“We’d love for you .?.?. to submit and present this paper, if you are interested and willing,” she wrote.

When GMU officials later told Dellarocas they were planning to have him participate from the audience, he responded that he was under the impression from “the folks at Google who have funded our research” that they wanted him to showcase his work at the event. He said he wanted “to be in compliance with our sponsor’s expectations.”

Dellarocas, who had a schedule conflict and ultimately did not attend, told The Post that while Google occasionally checked on his progress, the company did not have any sway over his research.

“At no point did they have any interference with the substance of my work,” he said.

Even as Google executives peppered the GMU staff with suggestions of speakers and guests to invite to the event, the company asked the school not to broadcast its involvement.

“It may seem like Google is overwhelming the conference,” Zhang fretted in an e-mail to the center’s administrative coordinator, Jeffrey Smith, after reviewing the confirmed list of attendees a few weeks before the event. She asked Smith to mention “only a few Googlers.”

Smith was reassuring. “We will certainly limit who we announce publicly from Google,” he replied.

A strong contingent of FTC economists and lawyers were on hand for the May 16, 2012, session, whose largely pro-Google tone took some participants aback. “By my count, out of about 20 panelists and speakers, there were 31 / 2 of us who thought the FTC might have a case,” said Allen Grunes, a former government antitrust lawyer who served on a panel and described the conference as “Google boot camp.” Grunes said he was not aware of Google’s role organizing the event until informed of it by a Post reporter.

Daniel D. Polsby, dean of GMU’s School of Law, which houses the center, said that while Google provided suggestions, the agenda and speakers were determined by university staffers. “I think it would misrepresent this conference to suggest that it was a Google event,” he said, adding that the law center discloses on its Web site the support it gets from Google and other corporations.

Google declined to comment about the conferences.

In January 2013, after an investigation that spanned more than a year and a half, the FTC settled the case with Google, which agreed to give its rivals more access to patents and make it easier for advertisers to use other ad platforms.

But when it came to the charges that Google biased its search results to promote its own products, the five FTC commissioners all voted to close the investigation, saying there was no evidence the company’s practices were harming consumers.

Jon Leibowitz, then the chairman of the agency, said in an interview that the FTC was not affected by Google’s campaign, noting that the company’s rivals were waging a parallel effort on the other side.

“It didn’t bother me that a lot of people were building events around the possibility of the FTC investigation,” said Leibowitz, who has since left the FTC. “That’s sort of life in the big city, and both sides were doing it.”

Sen. Marco Rubio (R-Fla.) discusses the U.S. economy in a March speech at a Jack Kemp Foundation forum at Google’s Washington offices. (T.J. Kirkpatrick/For The Washington Post)

Attendees listen to Rubio’s speech. While also supporting groups on the left, Google has courted conservative groups and lawmakers in recent years. (T.J. Kirkpatrick/For The Washington Post)

NSA fallout

On a February night this year, Schmidt sat down with a Washington audience far friendlier than the panel of senators who had grilled him nearly three years earlier. Addressing a dinner of journalists and scholars at the libertarian Cato Institute, Schmidt received applause and lots of head-nodding as he declared, “We will not collaborate with the NSA.”

Cato was not always in sync with Google’s policy agenda. In previous years, the think tank’s bloggers and scholars had been sharply critical of the company’s support for government rules limiting the ways providers such as Comcast and Verizon could charge for Internet services.

But, like many institutions in Washington, Cato has since found common ground with Google.

And the think tank has benefited from the company’s investments, receiving $480,000 worth of in-kind “ad words” from Google last year, according to people familiar with the donation.

Schmidt’s message to Cato that night in February reflected the current focus of Google’s energy — containing the fallout from revelations by NSA leaker Edward Snowden.

As the public’s outrage has grown, the tech giant has tried to keep the focus on limiting government surveillance, not on the data collection done by private companies. A White House review of those issues is expected to be released this coming week.

A campaign against government spying, meanwhile, is in high gear, drawing together some unexpected bedfellows. The American Civil Liberties Union, Heritage Action, Americans for Tax Reform and the Center for Democracy & Technology have formed a coalition calling for the government to obtain a probable-cause warrant before getting access to e-mails and other electronic data.

The coalition, Digital 4th, is funded by Google.

Alice Crites contributed to this report.


View the original article here

Evolution of the outsourcing of tasks



Productivity has been a big problem with companies that prefer to outsource. Outsourced business tasks using, you do not need to lose time, explain procedures, guidelines or instructions for special jobs to do. Most are repetitive, simple which do not require much explanation or information that can free your time for other work-related activities.

Correspondence, travel, organization and other small tasks can drain time and needs a person filling out multiple functions in a company. Virtual Assistants can be one of the answers but the practical speaking, dedicating and delegate multiple tasks in an outsourced assistant can you help only to a point. Business outsourced tasks are classified into 3 categories: repetitive, specialization and high skill sets.

Repetitive tasks can be covered with your virtual assistants; Emailing, contacting people, selling a product, technical support and General customer service requirements. These are daily tasks, some subordinates in nature, can be done by one person, most of the time. E-mail, for example, can be tedious for a busy person. Screening, reading, replying, and shipping may be too much for the commitment of the employee. To outsource these tasks of small businesses will prove to be a big advantage for your business.

Specializations are for a more focused skill set which can be found in their labour pool. Web design and coding is one of these. Professional web site designers are not only expensive, unless you use freelancers anywhere, there is a certain risk of the quality of their work. Alternatively, you can require creative designers for your marketing needs as writers to write content and blogging for your SEO work. Finally, business outsourced tasks cannot be complete without the accounting and payroll.

High-level skills can go along the lines of management or of 2nd assistants to managers. They can provide your company with financial, marketing advisors, consultants and experts in strategy undertaken to stimulate your organizational structure and well to extend your time your management for other more important activities.

Business outsourced tasks can be accommodated in addition to determining the cost right and proper and the timeline, you have for your business.

There are a number of ways on how to know which will be the best outsource the task provider: it can be word of mouth, social sites and finally, forum and message boards.

The real trick in knowing where you'd get from right and trusted provider for your business tasks outsourced. The internet may or may not be your go-to move but if you know how to get the information correctly, it may be very effective and practical, not only for an employee, but your business as well.


View the original article here

Cyber-attacks and reality checks



Not long ago, I was chatting with an acquaintance online some of its observations on the comments on cyber-warfare, intelligence, surveillance of cyber white hat. This forced me to consider some other issues when dealing with cyber-attacks and false flags. You see, before going after some supposed nation or guilty of a cyber attack, we better make sure that they did in reality. Let's talk.

Now and then, in rule number one of the work of the CIA, namely do you caught, it is logical that the people making cyber attacks would cover their tracks with false leads and carefully planted breadcrumbs to mislead their pursuers, false flags is probably more evidence that not. In other words, everything should be regarded as diametrically opposed to Occam's razor, as if Occam's Razor in cyberwar.

Of course, with high level thinking, cognitive theory, more intelligent people are making cyber-attacks and trying to out think in the spirit of the opposing team, so games of the spirit with the cyber attack in fact happy to sport. Too bad so many people inadvertently get caught in the cross-swap of virtual war games played in the real world.

It is interesting that I agree with most of what had said my knowledge, that rarely happens on topics like that, perhaps because of all the divisions of these areas that overlap, because people near the scene see only what is closed for them, not the larger image. Personally, I see it all as one, not in parts, he married, therefore it could be if pretty darn dangerous if a person who gets it and has the right team behind them starts to play full-tilt for good.

Consider a cyber-attack on our economic system. This is a scary thought, unfortunately, all the tools are in place for someone to really reap havoc on the economic system. I noted that CME (trading of commodity computers) in Chicago came down the other day, not as if there is not enough current daily chaos in these markets, starting with. If big fingers can cause crashes of flash and high-speed trading algorithms can overwhelm the system, which means a double whammy and followed cyberattack orchestrated on the system, could not take any down - if yes, then what?

Potentially with a foreign Black Swan event, some manufactured news online and a few bursts of bubble around the planet, and it is quite possible that a cyber-attack on our financial markets could cost us billions of dollars and us before we knew what hit us. Don't worry, these challenges are known and there are contingency plans, but it is nevertheless frightening things. Please consider all this and thinking about it.

Lance Winslow is the founder of reflection in a line, a diverse group of students, experts, innovators, entrepreneurs, scholars, futurists, academics, dreamers, leaders and general all around brilliant minds. http://www.worldthinktank.NET/ - have a significant reserve to discuss, contact Lance Winslow. Launches also written e-books on all sorts of subjects, which this one, check out the selection.


View the original article here

Amazon premium Air: Drone delivery coming to a city near you

When Amazon was launched, it began as a online bookstore. Outside the span of economic opportunity was the chance of enhancing the buyer experience by widening the customers' choice. Creating the world's first online bookstore was recognizing that, in 1995, you couldn't walk into any bookstore in the world and be able to review or purchase the millions of books in circulation. Even from the beginning, Amazon was focused on creating the best customer experience with a deliberate focus on convenience and the vision of pioneering other technological advancements as the end of the 21st century approached.


I believe it's fair to say that Jeff Bezos and many others, including myself, believed the 21st century would include the convenience of flying cars, the convenience of getting your annual checkup without having to visit the doctor's office, or being able to order a ride to anywhere in your city all at the press of a button. In 1995, all of these technological advances were just storylines of The Jetsons and other science fiction. Innovation has now made all but one of those storylines a reality - but I'm sure Elon Musk is working on getting us those flying cars.


Amazon has pioneered a number of technological innovations through their now-extensive product lines. From its conception, the company was focused on making every book available for purchase online, but their focus has now evolved into "selling everything to everyone." Over the last 16 years they have come closer and closer to that goal. Their product lines include:

Amazon Fresh (currently in beta), where they sell fresh produce.Amazon Prime, which provides video and music content instantly to customers via their smart devices.Amazon Fashion, which launched last fall.Amazon Fulfillment.Amazon Marketplace, which provides customers with the opportunity to become entrepreneurs while utilizing the company's logistics and distribution infrastructure.Amazon Kindle, which I believe was the predecessor of all other tablet devices.Amazon Web Services, which was a business born out of Amazon's necessity to create a sustainable infrastructure for their online operations. They did it so efficiently that they had extra capacity to support the infrastructure of other companies, some of which could be considered their competitors.

Their latest and possibly most ambitious endeavor, Amazon Prime Air, will revolutionize ecommerce as well as logistics and distribution. Amazon Prime Air extends the products that the company can sell. With a vision of leading innovation in Unmanned Aerial Vehicle (UAV) delivery, Amazon Prime Air will enhance all of their other product lines by allowing their customers to get the goods they order much faster, effectively enhancing the Amazon customer experience. Skeptics (including myself) have wondered how big is the customer base that would use such a service and why would anyone ask for a drone to come anywhere near their house. Drones definitely get a bad rap, and rightfully so, but most of those concerns are out of place within the APA discussion as these UAVs will not have missiles or cameras attached to them. So the real question is, does this product line and technology have a customer base or serve any real need outside of its "coolness" factor? Well, let's take a look at what the data says:


Amazon has been working on UAV technology for some time but it wasn't until November of last year that the Federal Aviation Association (FAA) announced a plan to create a standard for the commercial use of Unmanned Aircraft Systems (UAS). It is obvious that Amazon has to go on a public relations blitz to inject the acronym "U.A.V." into the public discourse in the place of "drone" in regards to APA as it will enhance the public's perception once they launch the platform. And according to the FAA's UAS commercial integration plan, they have plenty of time.


Here is the FAA UAS integration timeline. It is broken into 3 phases:


The first phase, Accommodation, extends into 2015. During this time, I believe Amazon will work to attain the Certificate of Airworthiness (COA). The second phase, Integration, extends into 2020, and in this phase I believe Amazon will mostly focus on beta testing in select markets. The third and final phase, Evolution, extends past 2021; Amazon would have not only developed a UAV ready to interact with the public but also a UAS that incorporates the various aspects of storage, fulfillment and distribution. At this point, they can expect that there will be many competitors who would also utilize UAVs as a form of logistics such as Fedex, UPS, other online retailers, and big box stores such as Walmart and Target. So Amazon's main focus at this point should be creating a UAV/UAS that will be the safest and most reliable, and not only meet FAA standards but exceed them with the goal of Amazon Prime Air becoming synonymous with UAV delivery. The FAA has made it clear that it is not a matter of if but when, and if Amazon follows through with its plan, it could pioneer a completely new form of delivery.


Google Trends


The day after Amazon Prime Air was announced on the show 60 Minutes happened to be the largest consumer holiday of the year, "Cyber Monday." It was also the first time that Cyber Monday surpassed Black Friday in sales. Utilizing the Google Trends tool I was able to gauge consumer interest. Google Trends is a research tool that allows users to gain insight on Google search data by comparing search phrases. In this graph "Cyber Monday" was at 100pts with "Amazon Prime Air" and "Amazon drone" representing 75 and 74 points respectively. So for every 4 people that searched for Cyber Monday deals, 3 searched for Amazon Prime Air. I believe it is fair to say that for every 4 people who made a purchase on Cyber Monday, 3 would have been a customer of Amazon Prime Air!


The data shows that there is some consumer interest, but whether this is a true reflection of real opportunity is to be confirmed. Regardless, a showing of 3 out of 4 consumers definitely leans towards further investigation. The opportunity and economics of this new business line must be examined. Amazon Prime Air's current prototype has a max payload of 5 lbs or less, which qualifies 86% of their shipments as eligible for Amazon Prime Air. According to resources, their free shipping policy on select orders cost the company about $6 billion just last year and with FedEx and UPS (their shipping partners) increasing the rate by 4.5% they can anticipate that this cost will go up and continue to increase over time. The data available on the Amazon Prime Air R&D budget is not publicly available so I had to get creative and also make a few assumptions. I deduced the opportunity cost by multiplying 86% of their daily shipping count which at its peak represents 13.5MM by the lowest 'one-day shipping' rate which is the closest service to Amazon Prime Air and then the highest 'one day shipping rate' and captured an amount totaling $52-103 billion. I then took this a step further, considering Amazon's customer-centric philosophy and their current business model of low margins. Even at a 2% margin they would still net $1-2 billion dollars. The opportunity is large enough that Amazon will either be a huge customer of UAV delivery or a huge provider of UAV delivery.


So far I've covered the vision, strategy, and the why (albeit briefly), and now for the execution of the most innovative product of the 21st century - so innovative that the government is still trying to determine the regulations.


Amazon Prime Air is the name of Amazon's unmanned aircraft system. The system will be developed by framing every possible user story with the consideration of their customers, the public, their employees at the fulfillment centers, the deployment, the UAV hub and most importantly, the unmanned aircraft vehicle.


At their current capacity of 96 fulfillment centers around the world, they do not meet the 10-mile distance requirement for the UAV prototypes, so as part of their strategy they would need to continue the development of fulfillment centers as part of the unmanned aircraft system.


UAV MVP


Amazon's primary focus should be creating a safe UAV, so discussing and developing user stories with the engineering team will be prioritized by safety, security, and reliability. They should also focus on defining and exploring specs utilizing current FAA requirements such as sense and avoid, control and communications and the others as detailed.


The current roadmap details the definition and exploration to meet FAA requirements within the next two months, exploring SAA technologies such as electro-optic, infrared, and radar, with the second phase focusing on building and testing of the UAV through the rest of the year. The last phase, focusing on developing the rest of the Amazon Prime Air system, will extend into 2015 calendar year.


Launching Amazon Prime Air will not be an easy task, as can be expected for such an ambitious endeavor, but I believe even with this brief analysis of the project, Amazon could lead in the innovation of UAV delivery.


View the original article here

Sunday, April 13, 2014

Tips on how to maximize your iPad



Having a gadget as an iPad or a Mini iPad at your disposal, it's not fair for the maintenance of a status in society or to play cool games. The real purpose of a gadget like an iPad is to simplify your life. Most people downloading several applications, but most of the time is that they barely make good use to organize their work. This article will be a guide to get the maximum utilization of your iPad, so much so that you will never feel the need for a human executive assistant once again!

Jack Up the memory of your iPad

Your iPad comes with its internal memory for sure, but you should also make an attempt to increase the memory of your device by making the best use of the cloud-sharing. Make maximum use of apps like Evernote, Dropbox and iCloud. For only a few dollars per month, you can use the applications to synchronize all your data and important files to the cloud. You can also synchronize all your data with your other devices on a real-time basis. This will eliminate your worries of losing data in the event your mobile breaks down.

Management of your projects on the go

Are you a business owner or a higher level official in an organization that must travel often? In this case, the management of project on the go can become difficult. But worry no more if you have an iPad. You can use your device to keep an eye of Falcon of all your ongoing projects. You can use an application like Basecamp which can serve as a great project management tool. It has file sharing facilities, offer lists of tasks, facilities of correction of document based on the web and a monitoring and messaging system.

To attend meetings on the go

Do you need to attend client meetings constantly during video conferences? Your iPad can be an excellent tool to help you organize these meetings then. You can use the integrated face time or use applications like Skype or GoToMeeting to make video calls anytime. With an excellent hours 10 autonomy and easy wireless facilities, you can literally bring your office with you anywhere and hold meetings without a worry.

Registration of Articles to read later

It is not for everyone who told us that your iPad can serve as your faithful executive assistant. You can use an application called Instapaper that, as a loyal executive assistant, makes a note and saves it all blogs and webpages, you want to read at your leisure. You can be saved and read them when you transport or Queuing to do something. It is also a function of editor's choice in this $ $ app that gives you access to most popular readings in the week.

Your iPad or iPad Mini is not just a top gadget's range; It is a great handheld device that can make your life much easier. Follow these tips to maximize the productivity of your iPad.

Click here to know all about your iPad.


View the original article here

Use of some advanced features of SharePoint



Commercial organisations that operate and manage several sites can testify to the benefits that they enjoy for the use of Microsoft SharePoint. There are various ways in which this web platform can help to streamline the system of organization data. There's also the benefit of this collaborative platform to work seamlessly with other Microsoft such as MS Office and Windows products. Getting support is also not a problem, as support personnel in standby 24/7 to provide assistance whenever necessary.

If your organization uses this platform for some time, you may not not be maximize it to its full potential. There may be some advanced features that you may be to miss that can help you get the most out of your SharePoint site. Here are some:

Setting up alerts - you may not be aware, but this platform can actually be configured to send an email to your organization or an SMS there should be things have changed on either a specific term in a library or if anything in the exchange library. If you get these alerts, this means that you no longer in the back and manually check whether the changes have on one of your sites. You can configure this alert by using the button "Notify me" in the Ribbon on a given content area.

Customizing views - if you want to follow a little more information about the items in a library of more than what SharePoint is delivered preconfigured with, this can actually be made possible. For example, if you want to add a drop-down menu that contains choices about the State of an item that your users can select, you can certainly add that. And which is only scratching the surface of its capabilities. There are many other things that you can customize if find you just the time to explore.

Beyond file via Internet Explorer (IE) maintenance - if you want to make maintenance more simple files, you can actually do other such tasks that download a large set of files to SharePoint without having to mount them all in the window of drag-and-drop. You can simply open a document library in your browser and use IE for it.

Create a master calendar - you can overlay multiple calendars in this platform to create a master calendar that includes information of update rollup of calendars that are nestled deep in the SharePoint site. You can overlay up to 10 calendars together to create this base calendar. If you do not know to do, you can consult your support for assistance.

Here are some very useful features that you can use so you can maximize your use of SharePoint. Do serve and be more efficient with your collaboration system.

Looking to work in Singapore as a Microsoft SharePoint professional? You can browse for Sharepoint jobs at Greythorn Singapore.


View the original article here

Understanding the Basics of Computing Virtualization

Understanding Virtualization


There are many different types of virtualization occurring in today's computing environment. A simple search for "virtualization" on a popular search engine returns thousands of hits. The list can become exhaustive but it is important to understand what each type does before beginning a large scale IT virtualization project.


Today many virtualization customers and consultants consider 1999 the first year of virtualization with VMware's first release. Though VMware is deeply rooted in many implementations, virtualization is not a new concept. It has its roots with IBM and pseudo machines over 40 years ago. During that time software managed different allocation of resources inside a mainframe architecture which gave birth to the modern day hypervisor. A hypervisor intercepts, schedules, and translates requests from an operating system that is destined for some type of physical hardware like a CPU. The hypervisor also manages these requests going from hardware to the operation system or systems. It is the hypervisor that provides the layer of abstraction that is synonymous with server virtualization but there is more than one type of hypervisor, as we will review later.


Types of Virtualization


There are currently several types of virtualization deployed by IT organizations. They include but are not limited to Hardware (Server), Desktop (Client), Software (Application), Storage, and Network virtualization. One can easily see how difficult it can be to separate the distinct functions of virtualization throughout an organization. When should you target desktop virtualization over server virtualization or maybe your organization needs a mixture of both? Let us begin to dive into each type of virtualization so that you are able to make your own determination.


Hardware (or Server) virtualization


As datacenters begin to bloat causing problems with HVAC, power consumption, and rack space, server virtualization has become more prevalent. Most organization were purchasing commodity server hardware and utilizing only a fragment of the physical capabilities of the servers. Understanding that software had the ability to aggregate this underutilized hardware into a larger pool of resources for multiple operating systems on a single hardware platform, companies like VMware have been able to transform the server virtualization market. Using specially designed software, an administrator can convert one physical server into multiple virtual machines. Each virtual server acts like a unique physical device, capable of running its own operating system (OS). As we discussed earlier the component that makes the separation between the hardware and operating system possible is known as the hypervisor. There are two types of hypervisors that deserve distinction.


Type 1 VS. Type 2 Hypervisors


Type 1 hypervisors are those hypervisors that logically sit between the bare metal server and the operating system. The XEN hypervisor is a good example of this type of system. XEN is the broker between calls to the physical hardware and the operating system.


Type 2 hypervisors are hypervisors that rely on an operating system to host the hypervisor itself. These types of hypervisors actually virtualize the memory management and I/O between multiple virtual machines and the hypervisor host. VirtualBox is a good example of a type 2 hypervisor because the operating system in installed prior to adding the application/hypervisor to the system.


Desktop (or Client) Virtualization


Desktop or client virtualization refers to the concept of separating a person computer from a physical machine in a client-server model. The most common implementation of is known as Virtual Desktop Infrastructure or VDI. In a VDI model, virtual machines are hosted on a centralized server. This centralized server streams an image to a host system allowing the user to access the needed applications or system. Normally, systems are hosted in the datacenter and accessed through Independent Computing Architecture (ICA) Protocol, Remote Desktop Protocol (RDP), or PC-over-IP (PCOIP) protocol but there are a few products that allow images to be streamed directly to user end devices rather than just streaming the visual representation of the PC.


Software (or Application) Virtualization


Software virtualization is a concept used to describe software that improves portability, manageability, and compatibility of applications by abstracting them from their native environment. This abstraction normally occurs through encapsulation or repackaging of the application. Many times this method of virtualization is used for applications that do not support an upgrade to a different operating system.


Storage Virtualization


Storage virtualization is one of the most well known type's virtualization. A storage system normally uses virtualization to present separation of logical and physical storage. This is why systems do not have to directly access disks but rather access logical volumes to provide the most flexibility to users and subsystems throughout the datacenter or at home. The computing would become truly tedious if each user had to address the specific disk address he/she was targeting with data. Instead, physical locations are abstracted away and data can be saved to a logical drive that provides higher levels of protection.


Network Virtualization


Network virtualization provides an innovative approach to running multiple networks on a single physical backbone. These networks are used for entirely different functions and it is for that reason that IT departments want to keep them separate. Imagine experimentation and/or development taking place on the same network that all you are banking transactions are occurring. Would it make you nervous that your customers are depending on a network that is unproven or even worse, not secure? This type of environment is perfect for network virtualization, which can provide a layer 2/3 separation between systems.


Virtualization


As you can see, there are different spans of virtualization that reach across often-blurred lines of computing. In order to understand the keys to success for any project it is important to understand its components. I hope that this brief overview has provided some much-needed insight into the world of virtualization.


View the original article here

Intrepid bio hacker surrenders infrared night vision, but at what price?

According to the World War II-era nautical lore, the Navy wanted sailors that could see IR signals. To this end volunteers were fed a diet that was missing the form of vitamin A normally used to make photopigments for our visual system. They were instead given supplements of an alternate form of the vitamin that gave sensitivity into the IR spectrum. While invention of the sniperscope brought these dubious experiments to a premature close, a group of biohackers has been inspired to pick up right where the early transhumanist pioneers left off.


Eyes are remarkably adaptable machines. Animals have morphed them into exotic polarization sensors, magnetic field orienteering aids, and even single photon detectors. An interesting anecdote from the astronautical lore is that flashes of light — generally attributed to cosmic rays — have been perceived by astronauts even with their eyes were closed. While it is possible that these figments are triggered in the brain, it seems more likely that the retina, perhaps even the photopigments themselves, are directly sensing energy deposited by the rays and realizing it as light. With the right photopigment, seamless detection of IR should be a piece of cake.


The only problem is that lack of vitamin A claims the lives of around a million children worldwide each year, and it is responsible for blindness in half that again. An intrepid group of four biohackers hope that the replacement form of vitamin A, known as vitamin A2, will compensate completely. A2 is found in freshwater fish, and can be extracted (with some effort) from their livers. The group has created a project based on a “Microryza” crowdfunding model, and is now funded to the tune of $4,000. (Read: Seeing ultraviolet, exploring color.)



Much of the capital raised will be used to procure the vitamin itself. Additionally there will be funds for sensitive equipment to measure the electrical responses of the eye as its spectral sensitivity changes. Their results will be published in an open, peer-reviewed research journal. The diet the biohackers will use has been developed by computer engineer Rob Rhinehart, creator of a successful life-optimizing drink known as Soylent. Crowdfunded itself, Soylent also enjoys high-profile backing from venture capitalists like Andreessen Horowitz.


Vitamin A, and its precursors like beta-carotene, are metabolized into different forms that are used in various ways all throughout the body. Its ability to melt wrinkles or pimples when applied to the skin hints at its powers once inside a cell’s nucleus, where it has its main effects. The kicker in prescription drug Accutane is a vitamin A derivative called retinoic acid. This acid is actually the go molecule used in a developing embryo when it begins to push out the upper limb buds. Retinoic acid is a master regulator molecule that “turns on” other genes to get the bits and pieces of the arm just right.



If you aren’t scared yet, consider one more thing: vitamin A deprived rats developed hypogonadism (reduced gonad functionality). This happened even when they were fed the retinoic acid that is needed by the testes because they are actually a bit pickier than that — they need locally-synthesized retinoic acid to actually do the trick. The good news is that inhibiting retinoic acid makes a wonderful birth control in humans, and that has even been promoted as a male contraceptive. One further word of caution is in order. While the body can in fact metabolize the fishy A2 vitamin form, the proteins that transport it through cell membranes are only one-quarter as efficient at binding and taking up the A2 form.


Researchers sometimes seem to be motivated by fame and glory as much as by science. There may be a hint of that here, but transhumanists see themselves more as individual medical explorers than as medical trials guinea pigs with no control over their fate. (Read: What is transhumanism, or, what does it mean to be human?) That being said, one indication that times are tough in the academic research arena is the recent report of the guy who published a study of the absolute worst places to be stung, in descending order — with himself as the subject. While there may be some value in research like that, it reminds one of the guy who ate a bicycle just to get into the Guinness book of World records. Fortunately for him, Guinness published it, but only with a note saying this will be the last time for things like that.

How do I remove a computer sound card?

Most sound cards are built directly onto the motherboard of your computer, making them irremovable. If you do have one of the removable variety, that is, a card which connects to a PCI slot, taking it out is a relatively straight forward process. Below, are the steps required extracting most removable computer sound cards.


Tip: You can deactivate your integrated sound card in the BIOS menu, which allows the installation of a PCI card.

Before you begin, it is necessary to ensure that you reduce, or eliminate, the risk of electrical charge damaging any of the hardware in the computer. The best way to do this is by wearing an anti-static wrist strap. While inside the computer, make sure it is disconnected from power and that youre familiar with ElectroStatic Discharge (ESD) and its potential dangers. It is also necessary to detach any audio cables that are connected to the sound card on the back of the computer case.

After you have disconnected the audio cables and power cord, you need to remove the side panel from the computer case. The side panel is usually held in place by several screws, or it may be held in place with a bracket or clamp of some kind. Remove the fasteners securing the side panel, and carefully pull if off. Once the panel has been removed, you should be able to see the inside of the computer, which look something like the image below. The sound card should be located near the bottom of the computer case on the left side, the area circled in red.


The next step is to disconnect the sound card from the computer case. The sound card and other hardware cards, are likely secured to the computer case with a screw (as shown in the area circled in red) or a clamp of some kind.


Once the fastener is loosened, you can remove the sound card. To reduce the chance of damaging the motherboard, which the sound card is connected to, use two hands to remove the sound card, one of each side. Gently remove the sound card, applying even pull on each side. If necessary, you can pull a little from one side, then the other in a seesaw motion.

Tip: It is best to fill the gap in the back of the computer case, where the sound card was previously, with a bracket designed for such a purpose as it will help to keep dust out of your machine..

Saturday, April 12, 2014

How do I change the style of a HTML form button?

When adding a button to a web page, it is recommended that you use CSS to create its styling. Utilizing CSS is the preferred method as it is a more efficient and organized way to store style code for reuse in more than one area on your page or site. As you can see with the example below, there are many attributes to manipulate on each button type.


You can see from the above pictures that when the mouse is not hovering over the button, the button has a light gray background and white text, when is the button's background changes to blue. Also, the corners of the button are rounded instead of squared off, like a standard form button

How do I scan or check for computer viruses?

The best method to check if a computer is infected with one or more computer viruses is to use an anti-virus program. There are many different programs to choose from, but the better rated brands are Kaspersky, McAfee, Norton, Trend Micro, MSE, and Webroot. You can get just the basic anti-virus program or a full anti-virus suite, which often include other types of protection beyond anti-virus. See the additional information section at the bottom of the page for a list of anti-virus programs.


Each anti-virus program has a different user interface, but they typically make a Scan option/button readily visible. Clicking the button should begin the process. You may be prompted with a few choices before the scan begins, including the option for both a quick and full scan. A quick scan searchs the most common areas where viruses are located on your computer and takes less time than the full option. In spite the longer time it takes, a full scan is a better choice as it ensures the program checks all possible places on your computer for viruses.

Upon completion, the anti-virus program displays the results of the scan and let you know if any viruses were found. If the program has not already done so, it should ask if you want to proceed with removing the viruses. After the virus removal has completed, it is recommended that you restart your computer.

Most anti-virus programs provide an option for you to schedule virus scans, so that the program runs at a selected time each day, week or month. They also provide active virus protection, which means it checks any downloaded files or e-mails for signs of infection and warns you if it detects a possible virus.

Why are there so many different types of USB cables?

USB


Since its inception, USB has gone through many four total versions, USB 1.0, USB 1.1, USB 2.0 and USB 3.0, each with its own respective cable and connector type. Additionally, there are USB cables designed for a range of devices like cell phones, smartphones, tablet computers, MP3 playback devices, some USB hard drives, which utilize a smaller connection called Mini/Micro USB. Both Mini and Micro USB cables have two connector types each, bringing the total to over ten.

How do I remove a computer motherboard?

Removing the motherboard from the computer is a relatively straight forward process. However, there are many hardware components inside a computer that are connected to the motherboard either directly, or by way of some type of cable. If you need to remove the motherboard, you need to disconnect all of the hardware connected to it. Below, are the steps required for removing most computer motherboards.


Before you begin, it is necessary to ensure that you reduce, or eliminate, the risk of electrical charge damaging any of the hardware in the computer. The best way to do this is by wearing an anti-static wrist strap. While inside the computer, make sure it is disconnected from power and that youre familiar with ElectroStatic Discharge (ESD) and its potential dangers.

First, you need to remove the side panel from the computer case. The side panel is usually held in place by several screws, or it may be held in place with a bracket or clamp of some kind. Remove the fasteners securing the side panel, and carefully pull it off. Once the panel has been removed, you should be able to see the inside of the computer, which look something like the image below.

With the side panel removed, lay your machine on its side. The motherboard is the large circuit board located on the bottom of the computer case, underneath the other hardware inside the case.


The most time consuming part of the motherboard removal process is disconnecting and extracting the other pieces of hardware connected to it. You will need to remove all of the following pieces of hardware (if present) before attempting to take out he motherboard itself:

Video cardSound cardNetwork cardHard Drive (if sitting over top the motherboard to any extent) Memory (RAM) Heat sink (fan) Processor (CPU) CD-ROM or DVD-ROM drive (if they inhibit motherboard removal) Main power connector (20 or 24-in connector) coming from the power supplyIDE or SATA cables (connected to motherboard on one end and a piece of hardware on the other end) After you've disconnected the various cables and hardware connected to the motherboard, as well as any obstructing hardware, the next step is to remove the mounting screws that are securing the motherboard to the computer case. Be careful not to let your screwdriver touch the motherboard itself when removing these screws, as it may cause damage. Once you have removed all the mounting screws, you may carefully remove the motherboard from the computer case.

Tip: If you are storing the motherboard and other hardware for future use, it is strongly recommended that each piece of hardware be stored in its own anti-static package.

Windows EXPERIENCE support is ending April 8, 2014

Windows XP


 


Microsoft first released Windows EXPERIENCE on October 25, 2001 and after over twelve years of supporting the operating system announced it is ending Windows EXPERIENCE support April 8, 2014 which means that they will no longer be providing any updates, patches, or further software security related support.



If you are still running Windows EXPERIENCE it will continue to work after this date, but if a security vulnerability is discovered after this date it will not be fixed by Microsoft. However, Microsoft has indicated it will continue to offer anti-malware support (MSE) for Windows EXPERIENCE until July 14, 2015 and other anti-virus manufacturers have also announced that ethyl be extending their support of Windows EXPERIENCE for up to a year. While this will offer some protection for your computer it still will not protect against any new vulnerabilities not yet released or discovered.


Some people argue that since Windows EXPERIENCE is such an established operating system that it is not likely that any new security vulnerabilities will be discovered. However, most experts recommend upgrading to a later version of Windows, either Windows 7 or the latest version of Windows, Windows 8.


If your computer is over four years old or does not meet the system requirements of a new versions of Windows we suggest getting a new computer with a more up-to-date version of Windows. Alternatively if you want to keep the older computer and don't need Windows you may also consider switching to Linux distro.

Tip: Microsoft is offering a free data transfer program for users upgrading from Windows EXPERIENCE to Windows 7, 8, or 8.1.

Tip: If your hesitation of going to a new version of Windows is because you have an older program that is designed for Windows XP, Windows EXPERIENCE Mode can help older programs run in new versions of Windows.

If you plan on continuing to use Microsoft Windows EXPERIENCE after April 8, 2014 following the below suggestions.

Don't use an administrator account -Use a limited account and not a admin account. If you use an account with not enough rights spyware, malware, and other exploits wont work or be much less likely to work.Use an alternative browser -Don't use Internet Explorer and instead use an alternative browser such as Chrome or Firefox, which will continue to be updated and remain secure.Keep your browser plugins and extensions updated -Plug-ins like Java and Flash are one of the most common methods of attacking a computer. Keep your browser and all of its plug-ins up-to-date. You can find the latest version of all your plug-ins through our system information tool. If you don't use a plug-in that is installed (e.g. Java, uninstall it from the computer.)Keep the computer offline -If this is a work computer that doesn't need to be online keep it offline. Without having access to the Internet the computer cannot be attacked.Follow all the steps on how to protect yourself while online.Can Windows EXPERIENCE still be installed and activated after April 8, 2014?

Yes. Youll still be able to run, install, and activate Windows EXPERIENCE after April 8, 2014.

What about Windows EXPERIENCE Embedded?

Windows EXPERIENCE Embedded support will remain until January 12, 2016.

How do I remove a computer modem?

Most internal modems are built directly onto the motherboard of your computer, making them irremovable. If you do have one of the removable variety-PCI, ISA, or PCMCIA-taking it out is a relatively straight forward process. Below, are the steps required extracting most removable computer modems.


Tip: You can deactivate your integrated modem in the BIOS menu, which allows for the installation of a PCI modem.

Before you begin, it is necessary to ensure that you reduce, or eliminate, the risk of electrical charge damaging any of the hardware in the computer. The best way to do this is by wearing an anti-static wrist strap. While inside the computer, make sure it is disconnected from power and that youre familiar with ElectroStatic Discharge (ESD) and its potential dangers.

After you've removed the power cord you need to remove the side panel from the computer case. The side panel is usually held in place by several screws, or it may be held in place with a bracket or clamp of some kind. Remove the fasteners securing the side panel, and carefully pull it off. Once the panel has been removed, you should be able to see the inside of the computer, which look something like the image below.


The modem is generally be located in the bottom of the case, on the left side (circled in red above). You may see other hardware cards located there, in addition to the modem (like a video card, sound card or network card possibly).

Each of the hardware cards, including the modem, is attached to the computer case by either a screw or clamp of some kind. If held in place by a screw, remove this screw for the modem card only. If held in place by a clamp, release the clamp. The image below shows a modem card held in place with a screw.

With the appropriate screw removed, carefully pull the modem card out of the PCI card slot on the motherboard.


Tip: When removing hardware from a PCI slot, it's better to use two hands so there is equal force being applied to both ends. It is also helpful to use a soft "wiggling" motion to free the card.

How do I remove a computer hard drive?

Removing the hard drive from the computer is a relatively straight forward process. However, before you start working with the inside of the computer, you first need to ensure that there is no passage an electrical charge to the computer as it could damage the computer hardware. To reduce, or eliminate, this electrical charge risk, you should wear an anti-static wrist strap. In the following sections, youll see the steps required for removing most computer hard drives.


First, you need to remove the side panel from the computer case. The side panel is usually held in place by several screws, or it may be held in place with a bracket or clamp of some kind. Remove the fasteners securing the side panel, and carefully pull it off. Once the panel has been removed, you should be able to see the inside of the computer. The next step is to locate the hard drive inside the case. In most computer cases, it's located towards the front at the bottom of the case, as indicated in the image below.

location of hard drive in a computer case

Once you've found the hard drive, you should disconnect the power supply cable from the back of it. Also, disconnect the IDE or SATA cable, which is located next to the power connector. The hard drive is secured in place by two to four screws, as is shown in the picture below. Otherwise, it well be held by a mounting bracket with a clamp. With the securing mechanism loosened, gently remove the hard drive.

mounting screws securing the hard drive in place

Note: If there are more than two screws, the other side panel will need to be removed, as well.

Friday, April 11, 2014

How do I remove a computer video card?

Some video adapters are built directly into the motherboard of your computer, making them irremovable. This is often referred to as onboard video. If you do have one of the removable variety, that is, a card which connects to a PCI slot, taking it out is a relatively straight forward process. Below, are the steps required extracting most removable computer video cards.


Tip: You can deactivate your integrated video card in the BIOS menu, which allows the installation of a PCI card.


Before you begin, it is necessary to ensure that you reduce, or eliminate, the risk of electrical charge damaging any of the hardware in the computer. The best way to do this is by wearing an anti-static wrist strap. While inside the computer, make sure it is disconnected from power and that youre familiar with ElectroStatic Discharge (ESD) and its potential dangers. It is also necessary to detach any video cables-DVI, VGA, HDMI or DisplayPort-from the back of your machine.

After you have disconnected the audio cables and power cord, you need to remove the side panel from the computer case. The side panel is usually held in place by several screws, or it may be held in place with a bracket or clamp of some kind. Remove the fasteners securing the side panel, and carefully pull if off. Once the panel has been removed, you should be able to see the inside of the computer, which look something like the image below. The video card should be located near the bottom of the computer case on the left side, the area circled in red.

The next step is to disconnect the video card from the computer case. The video card and other hardware cards, are likely secured to the computer case with a screw (as shown in the area circled in red) or a clamp of some kind.


Once the fastener is loosened, you can remove the video card. To reduce the chance of damaging the motherboard, which the video card is connected to, use two hands to remove it, one of each side. Gently remove the video card, applying even pull on each side. If necessary, you can pull a little from one side, then the other in a seesaw motion.


Tip: It is best to fill the gap in the back of the computer case, where the video card was previously, with a bracket designed for such a purpose as it will help to keep dust out of your machine..

What should I do if I've been hacked?

Hacker


 


If you believe you've been hacked or a company that is hosting your account has been hacked the first and most important thing you should do is change your passwords.


Your account and account details are what most hackers want. If you are unable to log into your account, try resetting your password, if that does not work or the e-mail associated with the account no longer works look for an account recovery option, which requires you to answer some questions regarding the account such as your mothers maiden name. If all options fail to reset the account you must contact the company to have them intervene.

When changing your password keep the considerations below in mind:

A password should never be an easy to guess word. Passwords like 1234, password, etc. are easy to guess.Don't use passwords that you've used in the past.Passwords should have letters, numbers, spaces, and other characters.Note: If you are using the same password for other accounts (which is not advised) make sure to also change your other account passwords to a different password. Once a hacker determines your username and password that information is stored and often shared and can be used to compromise other accounts.

Tip: If you have a difficult time remembering all your passwords use a password manager as a place to store them safely.

If the company your accounts are hosted by did not notice or mention a security breach, it's possible you or your machine have been the source of the attack. Make sure to scan your computer for any spyware and malware that may be stealing your account details or logging your keystrokes.

Tip: If scans your find malware on your computer you may want to reset your account passwords again, as infections may have logged your new password.

After all of your passwords have been changed, if your accounts have any shipping information make sure the shipping information is still your address.

If the account authorizes any third-party programs or apps (e.g. Facebook and Twitter) make sure no third-party apps have rights to your accounts that you haven't given permission. Best advice is to delete any app your unfamiliar with.

If your e-mail account or any account with contacts has been hacked make sure to let all of your contacts know about the hack. To help gain access to more accounts, hackers usually send malware or try attacking any other accounts affiliated with yours since your contacts will usually not be as suspicious of e-mails coming from people they know.

If your social network (e.g. Google +, Twitter, or Facebook) has been hacked make sure there are no posts or messages that have been made on your behalf. Usually social network accounts are hacked to help spread spam, malware, and advertisements on your behalf.

If a hacker gains access to your e-mail, they often use your e-mail address as a way to setup new accounts. Check your inbox, sent items, and trash for any new account notifications using your e-mail address. If new accounts have been created you can try logging into those accounts by using the reset password feature and then delete the account.

The 10 HTML Codes You Need to Know for Writing on the Web

Here are 10 HTML codes for common punctuation marks that you must know for your web writing to look elegant, professional and typographically correct.


The computer keyboard creates "dumb" punctuation marks that may not be acceptable in printed work but are common on web pages. It outputs straight quotation marks (") while your writing may require curly quotes. You can only type hyphens using the keyboard while an em or en dash may have made your text look more elegant and professional.


HTML Entities for Punctuation


HTML Entities for Punctuation



Your keyboard lacks the keys for inserting the correct punctuation marks but there are simple HTML character codes, on entities, that you can use to mimic the typography of printed books on the web. Heres a quick guide to using HTML codes for inserting typographically-correct punctuation marks in web writing.


Hyphens, or half-dashes, are most commonly used to join together two or more words. You can type a hyphen directly without using any HTML codes.

The next-generation iPhone is expected to become available in mid-September.The word email contains no hyphen but theres one inside e-books and e-commerce.

Dashes come in two sizes: the En dash (–) and the Em dash (—). The En dash is longer than a hyphen but shorten than an Em dash.


The En dash (–) is used for suggesting a range of numbers such as time periods, sports scores or page ranges.

Our bank is open 8a.m.–8p.m., Monday–Friday.The players are disappointed after losing the match 3–1 to Spain.Abraham Lincoln (1809–1865) was the 16th President of the United States.

The Em dash (—) is used to indicate breaks or pauses in a sentence, to quote sources or to separate a series of words within a phrase.

We plan to visit London this summer — if the visa is approved.My three friends — John, Peter and Richards — are moving to New York. "Well done is better than well said."— Benjamin Franklin.

An ellipsis (...) is a series of three dots (periods) and two spaces in a row and they are used to indicate omission of one or more words in the quoted material. If the ellipses follow a complete sentence, end that sentence with a period, insert a space, then the ellipsis (...) followed by a space.

"All the worlds a stage, and all the men and women merely players...." — Shakespeare "I have a dream... they will not be judged by the color of their skin but by the content of their character." — Martin Luther King, Jr

Your computer keyboard creates straight quotes (or dumb quotes) though what you really need to use are smart quotes (or curly quotes) that can be easily written in HTML. The dumb quotes are best used for writing programming code.


Use double quotation marks ("and") to identify the exact words of a person, to indicate irony or for writing titles of creative works.

(adsbygoogle = window.adsbygoogle || []). push ({});The last episode of "Friends" was the most-watched program of the year.Thoreau said that "that government is the best which governs the least".They recalled the "toy safety" buttons as they were contained lead paint.

Use single quotes (' and ') to indicate quotes within quotes. The right curly quotation mark (') can also be used for smart apostrophe instead of the straight apostrophe.

John said, "I told her, ' the traffic will only get worse. '"Her answer was, "I'll call you in the next hour or so."

While we often use apostrophe (') or quotation marks to indicate units of measurement (like feet or seconds or degrees), the correct symbol is Prime that are likely slightly slanted quotes written as ' (single) and ? (double).

How to Force the Browser to Remember the Username and Password

PayPal and some other websites do now allow you to save passwords in the browser. The Remember Passwords extension overrides the behavior and lets you save passwords.

When you enter your username and password to log into a website, Google Chrome will prompt you to remember the password. If you accept, Chrome saves the password internally and the next time you open that site, it will auto-fill the username and password fields for you.


The password-saving feature is available in all modern browsers but some websites, maybe for security reasons, disable this option for their login forms. For instance, the PayPal website doesn't allow the browser to remember your password and thus you are forced to enter the password every time you open PayPal. Some banks websites do that as well.


TL; DR — Use the Remember Password extension for Chrome and it will force the browser to remember passwords even if the site has disabled the option.

You can force the browser to remember your passwordYou can force the browser to remember your password


Websites can easily disable the auto-fill option for login forms by setting autocomplete = off for the password field. For instance, if the login form is written as below, the browser will never prompt the user to save the password field because form autocompletion is turned off.



Now that you know how websites turn off the option to remember passwords, getting around this problem is simple.


You can set the autocomplete attribute of the password fields on a web page to on (if they are off) and youll be able to save passwords. Heres a piece of JavaScript that will automatically turn on autocomplete for all password fields on a web page.

var fields = document.querySelectorAll('input[type="password"]'); for (var i = 0; i< fields.length;="" i++)="" {="" fields[i].autocomplete="on" ;="">

No, you don't have to worry about the code as theres a simple extension for Chrome – Remember Password – that does it automatically for you.


Install the Remember Password extension and then open a site like PayPal that does not allow you to save passwords. Login with your username & password and the browser will now prompt you to remember the password.

How to Delete your Google Chrome History Selectively

This trick will help you permanently remove web pages from your Google Chrome history. You can remove pages from a particular website or those containing specific keywords.

Would you not like Google Chrome (and Google) to keep a record of websites that you have visited recently? Well you can remove your browsing history from Chrome in two easy steps. Type chrome://history in the browser's address bar, click the "Clear Browsing Data" button and your history will be deleted permanently.


Quickly select items in your Google Chrome history


Quickly select items in your Google Chrome history (video)



Now consider a slightly different scenario. You want to preserve most of the browsing history in Chrome but would like to selectively remove certain items from the history. Maybe you want to remove all traces of visits to a particular website. Or you are trying to remove all web pages from Chrome's history that contain a particular keyword.


Thats not difficult either. Use the search box in the Chrome history page to find web pages from a particular website, then hover your mouse over the items you wish to remove and select the checkbox. Do this for every page you need to remove and then click the "Remove Selected Items" button.


If you are to remove 50 pages from the history, you will have to select 50 different checkboxes manually. Theres no "Select All" button in Chrome's history pages.


That can be tedious task so heres a simple workaround that requires no Chrome extensions.


Select the checkbox against the first item in the history results and then scroll to the bottom of the history page. Now select the checkbox against the last item but keep the SHIFT key down. This will select the entire list and you can now remove them from history with a click.

Thursday, April 10, 2014

The Best Online Tools To Know Everything About a Website

The best online tools to know anything and everything about websites including their hosting providers, DNS information, owner details and more.

How do I contact the owner of a website? Where is a particular website hosted? What other websites are hosted on that same server? Is the site using WordPress or the Drupal platform? What ad networks are they using to monetize a site? Is the site accessible from China?


The best tools to know everything about any website. Picture credit: Flickr


The best tools to know everything about any website. Picture credit: Flickr



Here are some of the most useful online tools that will help you know each and every detail of any website. Let's get started.

just-ping.com — Use Just Ping to determine if a particular website or blog is accessible from other countries. Unlike other online ping services that have service in a couple of locations, Just Ping has 30 monitoring stations across the world including Turkey, Egypt and China. If the ping results say 100% Packet Loss, most likely the site is inaccessible from that region.who.is — If you like to know the contact address, email and phone number of the website owner, this free whois lookup service will help. This is a universal lookup service meaning it can simultaneously query the whois database of all popular domain registrars.whoishostingthis.com — Enter the URL of any website and this online service will show you the name of the company where that website is hosted. This may come handl if you need the contact information of the web hosting provider for writing a DMCA Notice or if you are looking to switch web hosts.popuri.us — You can use popuri to estimate the relative popularity of a website on social sites like Twitter, Google + and Facebook. It also display the Google Pagerank of a website and the Web of Trust matrix.chillingeffects.org — When theres a copyright related complaint against a website, a copy of that letter is archived in the Chilling Effects database. Anyone can query this public database to know about all the copyright infringement complaints against a particular website.myip.ms — MyIP.ms offers a comprehensive report of any website or I.P. Address. You get to know about the hosting provider, the physical location of a website, the IP Address change history of a website and the DNS information. Netcraft also offers similar reports.ewhois.com — Ewhois, short for enhanced whois lookup, will help you determine other websites of someone. It looks the whois details, the AdSense publisher ID and the Google Analytics code of websites to figure out other web domain that may belong to the same owner. See example.builtwith.com — Use BuiltWith to know the technology stack of any website. It helps you figure out the mail service provider of a domain, the advertising partners, the tracking widgets that are installed on a website and whether the site is using any CDN like Amazon S3 or Google Cloud. See example.semrush.com — If you wish to analyze your competitor's website, this is tool to go with. SEMrush will help you figure what organic keywords are people using to find a website, what is the sites traffic and which are the competing websites. See example.whatsmydns.net — When you buy a new domain or switch from one host to another, the DNS records for the domain change and it may take a while to propagate these changes worldwide. WhatsMyDNS check your DNS records from various locations and it can check your domain's A, CNAME and MX records.modern.ie — This online app will help test your website compatibility with various web browsers and detects coding errors that might cause problems. The site is integrated with BrowserStack so you can quickly know how your site looks on different devices and browsers.developers.google.com — Find the Page Speed score of any website on both desktop and mobile devices. The higher this number, the better. The Google tool also offers suggestion on how the score can be improved.ctrlq.org/sandbox — – The AdSense sandbox solves two problems – it shows the various advertisers that are targeting a website and it will also help you figure out if a particular web domain is banned in the AdSense network or not.httparchive.org — The HTTP Archive is a repository of all performance related metrics for a website. It keeps a record of the size of pages, their average load time and the number of failed requests (missing resources) over time. See example.

Share this

Related Posts Plugin for WordPress, Blogger...