Online PC Support

OPS Technical Solutions : +1 833-522-1003

Welcome

Google™ Adds Set-up Wizard for Apps

Google in a big step to build up its app store and market it to enterprises, be it small or large, has launched programs aimed at small enterprises with limited IT resources. So now, with a simplified installation process for administrators using a new and simplified set-up wizard, Google App store is again catching eyeballs. So now when you reach the sign up page you will encounter the set-up wizard in the administrative ‘Control Panel’. The easy and simplified interactive guide will lead you through all the frills and add on services like the entire key configuration options ranging from creating your user account to setting up e-mail accounts transferring your existing data to a one stop shop under Google Apps and finally configuring mobile devices. It will also help you chalk out the roll out plan for the apps by allowing you to chose whether you want a pilot run first or immediately deploy it, hence helping you decide whatever suits your requirements. You also have the option to run the set-up in pieces using the inbuilt progress indicators so that you can come back after intervals of time and complete the set-up.

App Store since its inception was devised as a self help service this new addition further simplifies it. According to Google as stated by Heather Folsom, a Google product manager, in a blog post, the interactive guide helps users walk through a variety of key configuration options ranging from setting up user accounts to establishing communication through registering e-mails. According to analysts, Google needs working on its app store to help it compete against the best, not only does it need administrative tools it also needs a clear cut roadmap, product and training documentation and better connectivity between client and developer in the form of developing more enterprise class communication packages for Google Apps.

The various services and solutions offered by the app store include hosted e-mail, calendar, IM, a website builder and office productivity applications and connectivity solutions. Its basic version comes at no cost and also its academic version comes free of cost, however the one being marketed to businesses and enterprises namely Apps for Businesses costs US$50 per end user for every year.

Google Apps faces strict competition from a variety of app stores and communication suites and other solution providers like Microsoft, IBM, Zoho, Novell and Cisco so it is natural for Google to make strides to actually be able to stand up against the competition and sell its products to various businesses and enterprises and carve out a niche for itself in this market.

Google™ URL Shortener API

Developers, some of them at least have a tendency to pass descriptive attributes in the URL to represent hierarchies of data, transaction paths and session information. This makes the URL long and complicated to understand and remember. It makes copying a URL for posts on forums or in e-mail messages difficult and garbled. Therefore a short URL is easier and more convenient to copy or use in these modes. So, what is URL shortening? When a URL is too long, it is squeezed into few characters to be able to send them over instant messaging modes or e-mails or to share in any other way. What is Google URL shortener? It is a short URL service wherein there is an allotment of a short URL for long URLs for which service has been requested.

Then, what is Google URL shortener API? This is a method to use a common program to interact with the URL shortening service. The Google URL shortener is called goo.gl, which was released in September last. The API has been released in 2011 which lets the name goo.gl be carried in the URLs that are shortened. Google’s URL shortening services are fast and reliable with Google security backing. The Google URL shortening service collects statistics and generates QR barcodes too. With the API you can integrate the shortener into your websites, blogs or any web application. You can use simple HTTP means to create, inspect, and manage the short URLs from your desktop or mobile.

Using the Google URL shortening API is possible by accessing it on Google code. In the getting started guide, the API key is required to be extracted. Then you can access the API code based on the key. The Google URL shortening service protects you against phishing and spam also. As there is a word limit on messaging from social networking websites like Facebook and Twitter, it is highly recommended to have your URLs shortened with goo.gl to enable you to share the URLs on the messaging services.

It is also very useful to have a short URL to remember and read. Sometimes short URLs are the result of spam and phishing and are called prank URLs. With Google’s Safe Browsing connected to the URL shortening services, you can have safe sharing of your URLs that have been shortened. Sometimes there are sites that block certain domains and by blocking such URLs it restricts spamming. In case of a shortened URL getting redirected to a blacklisted domain, it bypasses the restriction set by such sites. In such a case, the URL redirection service is itself blacklisted. The Uniform Resource Identifier are mostly backed by URL shorteners. These include https, ftp, pop, imap, nntp, ldap, gopher etc. However, there are certain others not supported for security reasons. These are data: and javascript:.

Thus we can find ample reasons to have your URLs shortened and using Google shortening services is a good way of shortening that you can use.

Web Privacy leaves EU and UK undecided

Internet piracy is a big issue these days. All the information given by consumers on Internet is not secure, moreover IT companies should make better effort to protect the information. After a spate of controversies on social networking sites, users are demanding some steps to avoid any irregularities regarding Internet piracy. Now, EU is taking UK to court for not implementing EU’ rules of confidentiality of e-mails and other information.

The EU commission is launching legal actions against UK; they received a number of complaints about piracy. There is one US firm known as Phoom which tracks web surfer with ads on internet. According to EU law, it’s an offence to use a person’s personal information without his consent. The EU commission said that UK has to implement the internet piracy rules in their country. EU commission also warned Microsoft and Google to take more preventive measures to tackle this issue. Cryptography is a perfect way to avoid misuse of data over internet and it is important to take this step by internet firms. The EU has lot of concerns about customers; actually consumers are being pressured into handing over personal data to subscribe to internet services. And may be this information is used to create some profile.

Reports, also suggest social networking sites, like  Facebook have been  forced to change a plan to implement its policy towards privacy after a complain by Facebook user.

EU has taken this as evidence regarding the Internet piracy and has told Internet firms that intervention is necessary to protect customers. Some EU countries also told that customer information is useful for marketing but there should not be nay violation of customer’s rights. We want full transparency and clear cut decision on internet piracy, there is huge demand to protect customer’s rights regarding internet piracy.It is also important to protect their personal information from misusing.

EU also said UK should take initiative now and there are some rights for customers in every independent country, and every organization has to protect them.

How to Get Started with E-mails on Windows 7

Emails can be accessed using any supported Email Client or directly by web based email service. Regardless of the mode with which you use your email there are few things which will always be in common.

You always will have a unique Email address

Email address is just like your home address which is unique across the globe. Email id consists of two parts separated by the ‘@’ sign. Text written after the ‘@’ sign is the name of your email service provider. Example: Gmail, Hotmail etc. Text before the ‘@’ sign is your unique user ID on your service providers server.

Password

Password is the key to access your email account. Without this your login request will not be accepted / validated.

Root Folders

  • Inbox – Folder for incoming mails
  • Outbox – Folder for sending mails
  • Drafts – Folder for saving unsent mails
  • Sent Items – Folder for keeping a copy of sent mails
  • Trash – Folder which contains deleted mails

Getting started

To write an e-mail, click on the Create New Mail option. The title might change depending upon your service provider. In the new mail window you will find some boxes like:

To Box:

This is the box for typing the address of the recipient – the email ID of the person to whom you are sending the mail

CC Box:

This is the box for typing the email ID of the person to whom you want to send a copy of your email

BCC Box:

This box is not visible in most of the “New Mail” windows but its purpose is to send a copy of your Mail to somebody without letting other recipients to know about this. BCC stand for Blind Carbon Copy and all the ‘To’ and ‘CC’ recipients will not come to know if there was any BCC added in any mail.

Mail Box:

This box is to write the content of the mail. It’s a multiline text box and users can write the actual body of their mail here

Attachment:

This option is used for attaching a file to the Email. You can send pictures, music, video etc as an attachment along with your email message. All Email Service providers have their defined set of rules for handling the email attachments as this is one of the mode for spreading infections. Some Email service providers don’t allow you to send executable files as attachments. All the providers have a size limit too so before sending a large email attachment you should know if your email service provider will allow you to do so.

To access your emails on Email clients like Outlook, outlook Express, Windows Mail, Live Mail etc you need some more information other than your username and password. Information like:

  • Incoming mail server address (POP)
  • Outgoing Mail Server Address (SMTP)
  • POP port number
  • SMTP port number along with the security mode

The Email clients these days are capable enough to fetch these details directly from your email service provider’s server, but this works only for the major players like, Gmail, or Yahoo etc. For configuring other providers you need to have this information handy by yourself.

Working on Email through an Email Client gives you more and better options and capability to read your downloaded mails without even connecting to the Internet.

Four Steps to Guide You Against Viruses

Viruses in computers have become omnipresent these days. Whenever you use your computer, you run a risk of getting your computer affected by a virus attack. Those who frequently use internet run a higher risk. Whenever your computer gets affected by a virus, it will slow down, or may stop functioning completely. If this phenomenon occurs, it means your computer has crashed under a virus attack. As the adage goes “Prevention is better than cure”, you can also protect your computer beforehand from a probable virus attack.

Below mentioned are the ways through which you can protect your computer from a virus:

  • Use an antivirus software

 

This is the best option available against virus attacks. You can get this software free of charge on the internet. These free downloads are not strong enough to protect your computer. Getting licensed antivirus software is highly recommended.

Installing a licensed antivirus program is not sufficient in itself; you also have to keep it up-to-date to guard your computer against viruses. An antivirus program will affect your e‑mail, operating system, and all the other files. Your computer getting affected by a fresh virus is an ongoing process. That is the reason you should always check the antivirus manufacturer’s website for constant updates. All the major antivirus programs are sold with annual subscriptions, so keep renewing them according to your requirement. You can contact your computer engineer to get licensed antivirus software.

  • Be watchful

 

You can never judge which file contains a virus. Those who frequently use Internet run a higher risk of a virus attack.Protect your computer from viruses by not installing unreliable software, clicking on pop-up ads, or opening unfamiliar emails. You usually receive few e-mails which may a contain virus. These will spread as soon as you open the e‑mail or its attachment. The best way to deal with these e-mail messages is to avoid them. Do not open mails unless you are expecting them or are familiar with its content.

  • Always keep your operating system updated

 

All the major operating systems regularly release special security updates that help computers against virus attacks. These updates close all possible security holes leaving no room for a foreign attack. You should always make sure that your operating system receives these updates by turning on its automatic updating section. Some of the operating systems also create awareness about new viruses, Trojans and other malware, in order to keep the users updated against these malwares.

  • Have a secured internet connection

 

Protect your computer from viruses by using a secured internet connection and combining it with a firewall. A firewall is a part of a computer system or network that is created to block unauthorized access. They are used to prevent unauthorized Internet users from accessing private networks connected to the Internet. All messages entering or leaving the computer pass through the firewall, which scrutinizes each message and blocks those that do not meet the precise security criteria. A firewall program will alert the user against any suspicious activity if a virus or worm tries to connect to your computer. It can also block viruses, worms, and hackers from making an effort to download potentially harmful programs to your computer.

One thing which is noteworthy is that nothing can guarantee the security of your computer completely. However, you should always strive to improve your computer’s security and reduce the likelihood of an infection by keeping your system up-to-date, maintaining a current antivirus software subscription, and following best practices mentioned above.

As we said, no security method is definite, so it’s important and advisable to back up your critical files on a regular basis. This will help you in case you encounter a virus or other problems.

Easy 3G and Wi-Fi Connectivity on your iPad

The iPad was released on January 2010 and within a few months has managed to catch the interest of gadget freaks all over the world. Owning that the prestigious tablet just shows how tech savvy you are, of course, why not, with the latest in your hands who wouldn’t want to show off the latest buzz that Apple Inc’s created.

Have you undergone an experience whereby you have the tablet with you which is also considered to be one of the best mobile devices for business purposes, yet couldn’t check emails just because there was no connectivity in that area. The iPad however is said to take care of those little technical snags that other gadgets have. The iPad supports both the Wi-Fi as well as 3G systems which undoubtedly are an excellent way to make sure that you do not loose connectivity with the virtual world even when you are travelling to places where there is no Wi-Fi connection.  The maximum speed that you can achieve through the iPad 3G system is 7.2 Mbps which is applicable throughout the world. Just imagine a situation where you need to send a few important business files, but cannot access your e-mail as there is no Wi-Fi connectivity in that area. Unimaginable right, but the truth is there are several countries who do not have the money to set up hi-speed Wi-Fi zones. This was a major drawback in most gadgets especially laptops where you had mobility but when it came to internet connectivity on the go, you had to rely on Wi-Fi zones or hot spots.

You will love using the iPad, especially the feature where you can seamlessly switch between Wi-Fi networks to 3G and yes you don’t have to worry about the kind of connection. You are stuck with the best connection that there ever was, and if you know 3G networks, you would already know that it is super fast. What fun it would be to access emails, upload files photos and even access information on the internet as super lightning speed.

If you are in the United States and are familiar with the deal between Apple iPhone and AT&T then you would know that you are bound by a contract. If you think that this has been extended to the iPad as well, then you are in for a surprise. What you would love about this new deal between the network providers and Apple iPad is that you can get your 3G services by subscribing for a monthly subscription fee.

It’s like a pre-paid service for the amount of data you would use in a particular month. At present there are two schemes available the 250 MB plan and the unlimited. If you think you are a high internet user then the unlimited plan works perfectly well. However if your usage is limited and you don’t think you would exceed 250MB then choosing the 250MB plan is an excellent deal. You get messages that inform you of every detail like data limit reached, upgrade opportunities, manage account etc.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003