It’s has now become easier for people using Gmail and Google+ to connect over email. The Google product manager David Nachum wrote in a blog post, “As an extension of some earlier improvements that keep Gmail contacts automatically up to date using Google+, Gmail will suggest your Google+ connections as recipients when you are composing a new email.”
If you have both Google+ and Gmail address then the users will be able to send messages right into your inbox, even if you have never gave them your email address. It is letting anyone on Google+ send messages to your inbox, even though you don’t have them in your circle. The default will be limited as a user may have thousands of followers. So, only the one in your circles can contact you by default.This new option in the Gmail settings allows users to receive emails from anyone on Google+ meaning from no one on G+, from those already in their Circles (similar to ‘friends’), or from extended circles (similar to ‘friends of friends’).
The settings for How to Control who can Contact you is available. For this,
- Login to Gmail
- On General tab, there is an option for Email via Google+
- Click the option as per your preference from Anyone on Google+, Extended Circles, Circles and No one.
- Click Save Changes
Google is concerned with respecting the privacy of a small subset of its users. High profile users are more likely targets to receive unwanted messages and keeping this in mind, Google has only allowed the strangers to email only once as they will not be able to contact you if you do not reply them. Spamming would not be possible.
Also, this feature as announced on the official Gmail blog, will not give your actual email address to strangers. It only provides with suggestions including people in their Google+ networkwhen a Gmail user begins typing in the address box. Your email will be safe and not exposed unless you make a reply to that email message.
Google says, the idea is to make it easier to contact friends and other contacts when you’ve forgotten, or never got, their e-mail address.Regardless of how easy they want the system emailing to be, this cannot be left without criticisms as some Gmail users has complained and reported that this has opened the door to spam and unwanted solicitations in personal email inboxes, which are considered private.
To cover up this criticism to an extent, Google has come up with this feature as well – if someone who is not in your Google+ circles uses the service to email you, the email will be available in Social tab in Gmail and not in your Primary tab, if the tab setting is enabled in your email settings. This could just be another reason to enable those tabs if you haven’t done it yet.
Even though this service has the potential to be convenient without being invasive, it’s likely to annoy and confuse a lot of Gmail users. And to those who barely even know what Google Plus is, they would not understand what exactly is Google’s asking them. Criticisms are onboard; but will the people appreciate this change?
If there is any difficulty understanding this article then feel free to contact us. You can either email us at email@example.com or simply give us a call at 020 8293 0100.
These days, many of the electronic devices have parental control which is very beneficial if you have kids who use your laptops, Smartphone and other devices time and again. Setting up parental controls helps in restricting adult content, accidental shopping etc. to your children.
If you are wondering how it could be possible then here we are to help you out. Below is a helpful guide on how to set parental control over various Operating System (OS) and gaming systems.
For handling the user access control, Windows relies on Microsoft’s Family Safety Website where you are able to set separate account for your every child, limit their access to risky websites; limit the amount of time they spend on games etc. For this, you’ll have to:
- Download Windows Live Family Safety and install
- Go to control Panel -> Family Safety -> Manage settings on the Family Safety Website
- Login to the family safety account using your Windows credentials and select which account you want to control. Set individual accounts per child as required.
- You can then set the permissions for each child by clicking on Edit Settings under each of their name.
For setting parental control in Android, the device will need to run Jelly Bean version 4.3. You can then:
- Open settings of your device -> click Add User -> Select Restricted Profile
- Tap the settings icon next to New profile to name the account. And select which apps will be available to it and which are to be restricted.
In iOS, you do the following to can set the parental control:
- Open Settings -> general -> Restrictions
- Enable restriction and set an access password that only you know
- You can see list of available apps below the Enable Restriction button. Now you can set which of them will require your password and set accordingly.
- The subsequent sections allow you to set limits on in-app purchase, allowed content etc.
Setting up parental control in Xbox One is somehow similar to windows.
- Sign in to your console
- On your controller, press the Menu button -> select Settings
- Scroll right to family, then select the child profile that you want to control and set permissions for restricted activities. You can also set specific permissions for each section by selecting Use, but customize.
For setting parental control in Playstation 4, you should:
- Login to your Master Account and the password should be protected
- Go to Settings -> Parental controls
- You can then set an individual account for each kid under Settings -> Parental Controls -> Manage Sub Accounts and manage the restriction
- The restriction could be games, apps, movies, web browser, video chats etc. You can also set time limits in Playstation Store and restrict user generated content.
So, now you know how to set parental control on your electronic devices, you do not need to worry about your children playing with your phones. Your phone is smart, the world is smart and so must be your technology. Use it to fullest!
It has been found that among 19 people, one has diabetes. Diabetes has been a serious issue for many people around the globe, especially to those who are poor and cannot access enough resources to check their glucose level regularly and don’t have diabetes medicine. Their life is at risk.
Diabetes patients have to be very careful while eating and regularly have to prick their fingers in order to check sugar levels, which is very disruptive and painful. Though automated glucose meters are going to be used by many diabetes patients, it can still create discomfort and other problems. There are other ways of reliably testing blood sugar levels and one of them is your tears but collecting tears is more difficult than pricking your fingers so that was not an option until you have a smart contact lenses.
Yes, you heard it right! Google is on a project that makes use of a wearable device, smart contact lens that detects the glucose levels via the wearer’s tears and alerts them when the level dips or rises that can be transmitted instantly to a nearby display — your smartphone, smartwatch, or head-mounted display (Google Glass). Future versions of the smart lens might even have a built-in LED that lights up if your glucose level crosses above or below a given threshold. This is obviously much easier and convenient than regularly pricking your finger.
The project co-founder Brian Otis and Babak Parviz wrote “It’s still early days for this technology, but we’ve completed multiple clinical research studies which are helping to refine our prototype. We hope this could someday lead to a new way for people with diabetes to manage their disease,” in a blog post.
The prototype contact lens houses a sensor between two layers of lenses that measures the glucose levels in tears. While it might sound incredibly advanced, the technology in Google’s smart contact lens isn’t that wild. There’s a tiny whole in the lens that lets tear fluid seep over the glucose monitor to get regular readings. The lens consist of a tiny antenna, capacitor and controller which helps to move the information gathered from the lens to a device such as handheld monitor where the data can be read and analysed. It will draw its power from that device and communicate with it using a wireless technology known as RFID. At the moment, the company said, it can get a level reading once every second.
Is your office running out of space? Does it need to upgrade? If so then it might be the time to relocate your office. For this, proper planning and careful management is required. The success of any office relocation is usually reflected in the amount of planning and management you do beforehand leading to hassle free and well organised new office.
So to make things easier and simple for your office relocation, below we have a collection of tips that will greatly help in reducing the negative impacts of relocation on your IT system and daily operations.
- 1. Get help from professionals
One of the major mistakes that many office relocations make is not engaging the services of professional help. An office relocation is going to cost money, it doesn’t have to be a lot but office relocation mistakes will cost even higher. That is why, you need to take help from specialists, choosing the right professionals to smooth the process, including commercial property agents, IT, Telecoms, office fit-outs etc to save your time and get better value for money.
- 2. Advance planning
Moving your office requires advance planning and best practice shows you should start planning at least 3 months before your move date. It’s advisable to use this time to prepare a Office Relocation Project Plan which sets out the key dates by which you can work to. There is also a whole range of free, downloadable office relocation checklists, moving office templates and office space calculators for you to use to help plan your office relocation.
- 3. Review all your network hardware
Before making a move, you should review all network hardware, consider what you are going to take and what should be left behind, purchasing any new equipment well in advance. All the necessary network equipment such as firewall switches and server cabling should be installed if possible at least 14 days before moving in order to give time for troubleshooting. During setup and move, the network equipment should be left in place and should be run on your old building in order to save the downtime.
- 4. Maybe time to upgrade?
When you are in the process of relocating your office, it’s also an opportunity for you to upgrade your system and network to the latest technology. You can consult with your IT and Telecoms Consultants for available and suitable latest options. Its also an opportunity to review and switch service providers that could increase your business efficiency with a lower price for a more modern higher specification service.
- 5. Expect the unexpected
With careful planning as above you should be OK, but you cannot predict only good outcomes in the process of relocating your office. Of course there may be the odd surprise and you should be well prepared for any bad outcomes as well. Creating a Business Continuity Plan is required in order to minimize risk and doing so will also help to minimise the downtime.
If you are planning an office relocation then please get in touch – Wavehill are proven experts in office relocation and installations. We offer you consulting, project management and take care of all the tech and comms while keeping your downtime to a minimum. Find out more on 020 8293 0100 or email us at firstname.lastname@example.org
Cloud computing is a common term often heard in the IT industry. But, what exactly is cloud computing? Many are unaware and possess insufficient knowledge of what cloud computing is. Cloud computing is simply a type of computing that relies on sharing computing resources rather than having local servers or personal devices to handle applications.
The word ‘cloud’ is also used as a metaphor for the word ‘internet’. It is therefore understood as the internet based computing where a number of services like servers, storage, applications are delivered to organization’s computers and devices through the Internet. Referring to the cloud itself, it is considered that computing power such as data, storage, software access, applications and others are accumulated in an imaginary bubble known as cloud. Thus, it was named cloud as the cloud symbol was used to represent internet in many diagrams in the history and present.
Understanding cloud computing is very simple; it is the delivery of computing services over the Internet. With this service, individuals and businesses are allowed to use software and hardware that are managed by third parties at remote locations. Some good examples of cloud services are social networking sites, webmail, and online business applications.
But, why is moving to the cloud today’s business demand and priority?
Benefits you could acquire by adapting cloud.
- Flexibility-A cloud-based service can promptly meet the demand of the business as it can hold the vast capacity of the service’s remote servers. The ability to quickly meet business demands is the main reason why you should move to cloud computing.
- Disaster Recovery and Security –Companies relying on cloud services are no longer in need of complex disaster recovery plans as the cloud computing providers take care of most issues. Aberdeen Group survey found that businesses that use cloud were able to resolve issues in an average of 2.1 hours which is nearly four times faster than businesses that do not use cloud based service. Also, the data is secured in the cloud no matter what happens to the physical machine.
- Automatic software updates–Cloud computing suppliers are reliable as they perform server maintenance themselves which includes security updates. As a result, customers’ time and resources for other tasks saved.
- Work from anywhere –Employees can work from anywhere as long as they are connected to the internet. This flexibility can positively affect workers’ work-life balance and productivity.
- Document Control –The workers of the company that does not depend on cloud for service should have to send files back and forth over email, meaning only one person can work on a file at a time. However, this can be managed by cloud computing as it keeps all the files in one central location, and everyone works off of with one central copy. Also, they can chat with each other for making changes together which could eventually make stronger collaboration and thus, increase efficiency of an organization.
There are more benefits that can be gained from cloud. To know its use better, try using cloud for your day to day operation; you will feel thedifference yourself. So, aren’t you now ready to move a virtual world – the cloud?
If you still have questions or would like to find out more about how the cloud can benefit you or your business then please get in touch by dialing 020 8293 0100 or email us at email@example.com
What is Bitcoin?
Bitcoin is a virtual digital currency that you can use for business or personal transaction at high speed but low cost through peer to peer network without the need for a bank.
History behind Bitcoin
It has been always an aspiration to create virtual money as internet evolved. However, early attempts could not solve the “Double Spending” problem. Double spending problem is such kind of state where if digital money is just information, the same “token” can be duplicated and spent again. Then there started the verification whether a token has been spent or not by a trusted source. Bitcoin bypasses this by using the “block chain”, a public ledger of transactions where each transaction is verified by an extensive and decentralized network of computers.
Programmer Santoshi Nakamoto (likely an alias), first published the Bitcoin Protocol that outlined the theory of decentralized currency on October 21, 2008. Later in January 2009, open source Bitcoin software was released with the mining of first Bitcoins.
The use of Bitcoins gradually started rising high with the financial crisis in Cyprus when it was announced individual savers faced a one-off levy in order for a eurozone bailout to go ahead.
Nakamoto described Bitcoins as “a purely peer-to-peer version of electronic cash that would allow online payments to be sent directly from one party to another without going through a financial institution… a system for electronic transactions without relying on trust.”
Who issues Bitcoins?
If you think these Bitcoins are issued from a central bank like other currency then you are mistaken. This decentralized digital currency is created by users of Bitcoin software who are known as miners.
Bitcoins are mined by computers solving complex mathematical equations that take time to solve. The solved equation is a 64 digit number which once calculated will reward the miner who solved it with 25 Bitcoins. Bitcoin is now being used in transactions between millions of people and thousands of businesses around the world.
What can be bought with Bitcoins?
With Bitcoins, technically you can buy anything. Blogging platform such as WordPress and WikiLeaks both accept Bitcoin, while some sites offer gift vouchers for retailers such as Amazon. There are also websites selling electronic goods that exclusively accept Bitcoin. The dark side to Bitcoin is how it is accepted on sites such as anonymous marketplace Silk Road, where users can buy illegal drugs such as LSD.
Does Bitcoins have a limit?
Yes, Bitcoins have a limit. The limit has been set to maximum of 21 million. The Bitcoin mining 3 process presently creates 25 Bitcoins every 10 minutes and the number will be halved every four years. This limit is fixed to be reached in year 2140.
Are transactions in Bitcoin safe?
The transactions of bitcoins are virtual and instant which has to be verified in peer-to-peer network of Bitcoin users. The transaction is more likely to be valid and final if more positive confirmations are received from the network.
If you are a buyer using Bitcoin, it is to be noted that there is likely nobody to appeal for help if a seller do not ship you a product. That is why, while shopping, you should deal only with reputable sellers.
Before computers and internet evolved, people managed their confidential data manually and locked it in lockers for safety. But this is a digital era where your every piece of data is stored on servers or computers. A comprehensive data backup strategy is vital to your data security. Many people wait until disaster strikes before they think about backup. Data protection is a critical component of nearly every company’s IT strategy. A good backup is an excellent way to protect against viruses, disasters and human errors.
Most Small-to-medium businesses (SMBs) are aware about the importance of data protection. However, the accelerating growth rates of data, budget constraints, reliance on outmoded technology and other factors, SMBs do not have adequate data protection. According to Symantec 2011 SMB Disaster Preparedness Survey, about half of SMBs back up less than 60% of their data, leaving the rest vulnerable to loss at anytime.
That is why this article is here to give you some tips to develop a backup regimen that suits your needs and protect your data.
- Use disk-to-disk technology for backups
It’s far better to use disk-to-disk technology rather than tapes for your backup purpose because disk-to-disk technology is proven to be more reliable. When a backup is complete, you know the data is secure and accessible on disk drive but with tapes you never know if the data is usable until you try to restore it. And 71% of data restoration from tapes has lead to failure.
Your data is vulnerable at both rest and transit stage. Cybercriminals are always waiting for a moment to attack your files. That is why encrypting data when you upload any file and also at the time when it has been stored is very essential. You can look for 256-bit AES. Find a solution that encrypts your data during transmission and storage.
- Regular error testing
Your any backup and recovery solution should include a regular daily testing routine to ensure that your backups are feasible and can be successfully restored if certain problems come up in future.
- Disaster recovery
Your data is not 100% protected until you have a disaster recovery plan that itself is complete and tested. Your backup service provider should be able to help you for a worst-case scenario and help you configure your backups so you can rebound quickly.
- Performance and versatility
Incremental backups are essential in order to optimize costs and performance because it will require only files and parts of files that are new or changed since the last backup. It’s also important for the service to back up open files, and for it to support all the platforms (Windows, Linux, UNIX, Mac) and applications (Microsoft Exchange, SQL Server/Dynamics, SharePoint, Hyper-VMware, Oracle) your business uses.
Considering these points will help make sure your business is prepared for the worst. So what are you waiting for? With Wavehill’s Cloud Backup you can protect yourself right away. Call us on 020 8293 0100 for more information