Monday, 30 December 2013
Release of the first transparent touch pad Grippity
The Grippity; the first transparent touch pad has been unveiled. It is a new innovation in the market for touch pads. It also has a touch panel on both sides. Basically Grippity is basically a Keyboard that served as Media Center.
It is in prototype stage and it is getting a beautiful shape out of the imagination of the designer. They are planning to start the production in the forthcoming months once the project gets the proper fund from the Crowdfunding.
According to the designers it have multi touch screen on both sides and this will solve many hurdles faced in usual touch screen tablets. The tablet is transparent, due to its transparency it can be kept in neutral position on hand to fight against the problems related to carpal tunnel.
According to the designers the transparency allows the user to see the TV programmes with the tablet facing your eyes. Its internal storage is of 4GB and chip ARM Cortex A8 based on a battery life of 3 hours with continuous use. Its screen may well be semi- transparent, the 7 inch 800x480 LCD display and the Grippity could run on Android KitKat. It costs around 235 dollars.
What is Rooting a Android Phone!
What is Rooting? Advantages of Rooting and its Disadvantages:
Android technology has been increasing grown in the last few years; many of you have been seen the advantages in the android technology. Likewise, there are so many of us wants to improve their mobile usability and they want to customize their mobile interface. But due to few security concerns, the android has limited the features of the android mobiles. This has been increasing discussed in the internet, how to improve the performance of the mobile. The answer for this has been termed as a term, ”Rooting”.
Basically “What is Rooting”?
Rooting is a sort of unlocking your mobile phone from the system lock, rooting will provide access to various level of accessing your core files. The unrooted phone is like accessing the mobile in Guest User Mode. If you root your mobiles, it will allow you to access and modify the core files which are present in your mobile.
How to Root your Mobile?
Rooting allows you to access the internal files of the mobile and provides you a full access or a privilege to access the mobile. This is like using a mobile with admin mode, so that you can do as you need with your mobile. In order to root, you need install the custom ROM in your mobile. Each of the models has separate CUSTOM ROM, which is to be installed over the mobile. Suppose if you want to root your Sony XperiaTipo, then it has one ROM. Suppose if you want to root Micromax Doodle, it has another separate ROM. Each of them varies from one another. If you install wrong custom ROM in the mobile, it will definitely turns you’re mobile into a solid brick. Please make sure that you were correct with the CUSTOM ROM. If you don’t know how to root your mobile, then don’t ever try that.
Advantage of Rooting A Mobile
Run Special Application: If you root your mobile, then you can run several special applications in the mobile. In some special cases, you can install applications which can show several informations about your mobile.
Install Applications over the SD Card: If you root your mobile, then you can easily install the applications in the External storage. Few applications cannot be installed on the external storage, but the rooting will allows you to install the applications in the External storage of the mobile.
Overclock your processor: By rooting, you can easily overclock the clock frequency of the mobile. This will allows you to increase the performance of the mobile.
Disadvantage of Rooting A Mobile:
Incase of wrong rooting, you will experience following things:
Rooting turns your good mobile into a Solid Brick: By rooting your mobile, you will turn your mobile into a solid brick stone. In case of installing a wrong custom ROM, your mobile will become a solid brick. Warranty Turns Void: If you were doing rooting the mobile, it will make the warranty to be no more longer exist.
How to Know if Your Gmail Account has been Hacked
Security and privacy are one of the main thing which has been rolling in everyone’s mind if they want to do any sort of things; especially various online queries has made them to think about the privacy of their personal data. In this post, I have shared an interesting bit of information about the way to know whether your Gmail account has been hacked or not. In order to know that, no need to install any additional features in the Gmail account. Thankfully, Gmail account has many in-built features that assist you to find whether your account has been accessed by other persons or by any suspicious login attempts. By verifying the following information, you can find whether the account has been hacked or not.
1. Last Account Activity: Last Account Activity gives you the last activity of your Gmail account. By accessing the Last Account Activity, you can easily found out whether your account has been accessed by the others or not. Last Account Activity gives you the list of IP addresses along with the time in which your account has been accessed. So that you can easily found out the login details of your account.
2. Go for your Login Sessions: Login Sessions provides you various levels of activities of your Gmail account. You can find the Link to the Login session which is present next to the Last Account activity and named as Details. The Details tab shows you various activities of your Gmail sessions and it displays a page which shows you information about the recent activities of your mail account. It gives you various detailed information about the Browser type from which the account has been accessed and also where the IP addresses are from.
3. IP addresses from various countries: Don’t get afraid if you’re noticing any IP addresses from various countries. Suppose if you’re seeing any sort of third party tools which are accessing your Gmail account, then they will mostly show in the activity log. This helps you to trace those IP address and you can easily start your own investigations. There are lots of tools which are available in the Cyberspace from which you can trace the IP address information very easily.
4. Unwanted Login activities and Suspicious-activity monitoring by Google: Suppose if your account has been accessed by any suspicious login; Google will automatically provide you information regarding those sessions. You will be getting alerted if any one accessed your account from unknown locations.
5. Log out from all Sessions: Make sure you have been signed out your session when you’re using any public computers. If you’re not sure that you haven’t signed out your account, you can easily sign out the various sessions by using SIGN OUT ALL OTHER SESSIONS option found in your Account activity area. This will help you to resolve any careless mistakes that have been made by you.
If your account has been hacked, then immediately change your password for better security and privacy.
1. Last Account Activity: Last Account Activity gives you the last activity of your Gmail account. By accessing the Last Account Activity, you can easily found out whether your account has been accessed by the others or not. Last Account Activity gives you the list of IP addresses along with the time in which your account has been accessed. So that you can easily found out the login details of your account.
2. Go for your Login Sessions: Login Sessions provides you various levels of activities of your Gmail account. You can find the Link to the Login session which is present next to the Last Account activity and named as Details. The Details tab shows you various activities of your Gmail sessions and it displays a page which shows you information about the recent activities of your mail account. It gives you various detailed information about the Browser type from which the account has been accessed and also where the IP addresses are from.
3. IP addresses from various countries: Don’t get afraid if you’re noticing any IP addresses from various countries. Suppose if you’re seeing any sort of third party tools which are accessing your Gmail account, then they will mostly show in the activity log. This helps you to trace those IP address and you can easily start your own investigations. There are lots of tools which are available in the Cyberspace from which you can trace the IP address information very easily.
4. Unwanted Login activities and Suspicious-activity monitoring by Google: Suppose if your account has been accessed by any suspicious login; Google will automatically provide you information regarding those sessions. You will be getting alerted if any one accessed your account from unknown locations.
5. Log out from all Sessions: Make sure you have been signed out your session when you’re using any public computers. If you’re not sure that you haven’t signed out your account, you can easily sign out the various sessions by using SIGN OUT ALL OTHER SESSIONS option found in your Account activity area. This will help you to resolve any careless mistakes that have been made by you.
If your account has been hacked, then immediately change your password for better security and privacy.
Labels:
Gmail,
Google,
technology
How to Send personalized Mail using Mail Merge in Gmail
Are you going to celebrate birthday party at hotel and need to invite all your colleague and friends through email?
Wish to send mail in a personalized way to recipients, at this scenario Mail merge can be handy. To know start up with Mail merge, no installation of new software required, it is just in build feature of Microsoft outlook and Word. If you aren’t using Office, that is not going to be a great deal. You can perform mail merge using Gmail and Gmail Docs in your browser.
Mail Merge with Gmail – Procedures
• Login in to your Gmail and compose a new mail. Don’t wonder that it is like the same, some exceptions occur while marking the text that varies from other messages. If Dear First –Name is going to e your text, then you have to convey Gmail that First name is variable field.
• This is not going to be a great deal, you just need to replace First-name in the message by $%First-Name%. As you performed now replace the remaining variable field in body or else replace in subject line of your Gmail.
• Now finishing all these steps save the mail in draft message in Gmail. Now make a copy of this draft message to spreadsheet in your Google Docs account. Your expected magic happens here.
• Open up with Mail Merge HD, spreadsheet you copied just appears. You’ll find some dummy data t get started with it. You have to do some editing works like replacing column names so that the replacement variable field matches with Gmail draft message.
• You can also either add or remove number of column as per the requirement, but at default one mandatory column must be present. Important note that must be kept in mind is that column name in spread sheet and variable field name in Gmail draft message are same, so Gmail variable is mapped to column in Google Docs.
• As you created column likewise create a row to specify personalized recipient to whom you need to send.
On filling up with necessary data, you are prepared to send. Go to Mail Merge menu in Google Docs and click on to hit Mail Merge. Since this is the first time you are sending, it may conform for access you may grant to your Gmail to your won Google account. Hence on doing this you will have more secured nature to your data and no one will access to your data.
Start Mail Merge in Google Docs
On gaining access Google Docs clack on Star Mail Merge, which shows Gmail template that you created before. Now enter Sender’s name, if Bcc option required tick and hit Start Mail Merge. It all over and your mail are sent in a secured way.
Make a note that Gmail offers this to a certain limit. Only a maximum of 100 messages in a day are allowed, exceeding this may lead to locking of your account by Google temporarily. If this methods seems to be little confusing use a simpler version of Gmail Mail Merge.
Direct Marketing Strategies for SaaS Vendors
The cloud industry is continuously growing and thriving that software companies find the market appealing and lucrative. With SaaS (Software-as-a-Service) still being one of the dominant cloud platforms there is, cloud adoption has increased in various industries. The IT industry creates and innovate products and services by leveraging on the cloud’s ability to scale and host an array of SaaS applications that are offered to consumers, start-ups and small businesses.
“The Future of Cloud Computing Survey Third Annual Survey 2013,” was recently published by North Bridge Venture Partners and GigaOM Research, which indicated that 63% of 855 respondents (comprising business in various industries, IT decision makers and cloud platform vendors) are using SaaS in their companies.
The growing deployment of SaaS applications provides endless opportunities for software companies to improve the services to meet the growing demands of the clients’ business operations. Moreover, this is an opportune time to strategically promote the products directly to get a share on market. Whether you’re a start-up SaaS vendor, a budding entrepreneur or an established SaaS provider, below are direct marketing strategies you can implement to increase your consumer’s base and clients worldwide:
“The Future of Cloud Computing Survey Third Annual Survey 2013,” was recently published by North Bridge Venture Partners and GigaOM Research, which indicated that 63% of 855 respondents (comprising business in various industries, IT decision makers and cloud platform vendors) are using SaaS in their companies.
The growing deployment of SaaS applications provides endless opportunities for software companies to improve the services to meet the growing demands of the clients’ business operations. Moreover, this is an opportune time to strategically promote the products directly to get a share on market. Whether you’re a start-up SaaS vendor, a budding entrepreneur or an established SaaS provider, below are direct marketing strategies you can implement to increase your consumer’s base and clients worldwide:
- Publish white papers – A rule of thumb in publishing white papers are to provide new perspectives on the industry. Companies publish white papers to explain newly developed technologies as well as to educate people about their products. Generally, white papers should be short, concise and readable. Three to five pages maximum should cover the topic, with a clear synopsis of the paper.
- Educate through webinars – Webinars allows you to connect and engage current and possible clients. These seminars are conducted over the Internet, using social media, blogs and corporate websites to promote them. Educate your viewers regarding the industry and provide thought-provoking ideas to help them on making decisions in their IT needs. Invite them to register via newsletters, and use a reliable webinar solution such as GoToMeeting for videoconferencing and live chats. Allot a time for Q/A for your viewers and listeners.
- Be visible on your blog and other blogs with guest posts – Work with someone, who is an expert in content marketing to help you create optimised and concise contents that can be posted on the corporate blog and to other blogs. Provide interesting topics and ‘how-to tips’ that add value to your product. Pitch in to high traffic blogs for guest posts, but make sure you don’t directly sell the product there. Provide rich, in-depth analysis of the industry and solutions for their IT infrastructure. Your goal must be to educate, share and inform readers, more than selling just a product.
- Write an e-book – Self-publishing an e-book will create a strong branding on your side. Popular SaaS vendor such as HubSpot is maximising this approach. You will see “Marketing Whitepapers & E-books” constantly on Twitter, which is always promoted as free, and it grabs people’s attention, which leads them to take an action even just by clicking the link.
Patrick Li is a tech addict who’s looking at ways to streamline business performance using cloud technology and other new services.