Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

seo Google Gadgets going cross-platform 2013

Seo Master present to you:

For about two years now, people have been writing gadgets for Google Desktop on
Windows and for iGoogle on the web. Today, with the announcement of Google
Gadgets for Mac OS X, Google Desktop users on the Mac can now run the same
Windows and web-based gadgets in Apple's Dashboard with zero (or very few)
changes. Check it out for yourself.

Google Gadgets for the Mac uses WebKit's JavaScript engine inside Dashboard, so
the majority of gadgets just work if they're written properly. The rest can be
fixed by following a few guidelines:
  • Use JavaScript, not JScript
    • WebKit is case-sensitive, JScript is not, which can lead to problems if you assume can you do things like interchange SetTimeOut() and setTimeout().
    • Avoid JScript-only features like collections and ActiveX.
    • Avoid IE-specific DOM extensions, just as if you were writing a multi-browser web application.
  • Avoid Windows-specific APIs
    • You shouldn't assume ActiveX or certain DLLs are available. Neither WebKit nor Mac OS X supports ActiveX, so these gadgets must be rewritten.
    • Avoid Windows-only APIs such as Google Talk. These APIs are not (yet) available on Mac OS X.
  • Understand how Dashboard is different
    • The Dashboard environment is very different from a web page or the Desktop sidebar on Windows in that it comes and goes as the user activates it. Don't rely on your gadget always being visible. Your gadget won't run or update when Dashboard isn't in the foreground.
    • Don't rely on access to the file system. The security model for Dashboard doesn't allow arbitrary file access to the hard disk, although your gadget does have access to files in its own archive. Things like file pickers won't work. Note that while restricted file system access is a departure from how gadgets work on Windows, it's consistent with Dashboard's security model and the behavior of other widgets developed for Mac OS X.

For more details, see Writing a Cross-Platform Gadget, part of the Desktop Gadget API documentation.

If you're interested in developing your own gadget, visit the Gadgets API homepage. If you're already a gadget developer, download the beta today to test your gadget and ensure that it works correctly.2013, By: Seo Master

seo iGoogle launches canvas view 2013

Seo Master present to you: By Dan Holevoet, Developer Programs

We're happy to announce the launch of the canvas view feature to iGoogle users in the U.S., rolling out over the course of the day.  The canvas view feature allows gadget developers to build richer content, games, and UI for iGoogle's tens of millions of users by allowing them to build powerful full-page applications. In addition, canvas view provides developers with the opportunity to monetize their gadgets.



To get started, check out the documentation and examples on the iGoogle developer website. The site includes detailed information about iGoogle as well as information on upcoming OpenSocial functionality.

Try out the updated version of iGoogle and check out some of the great canvas view gadgets developers have already built.2013, By: Seo Master

seo Legacy gadget API deprecation 2013

Seo Master present to you: If you're a gadget developer, you've probably used the gadgets.* API, a re-namespaced and improved version of the original legacy, or _IG_*, gadgets API. The gadgets.* API has gained wide acceptance, both on Google and non-Google gadget containers, and is the standard API for gadget development.

However, there remains a number of gadgets using the legacy API, primarily gadgets developed for iGoogle, and the time to upgrade those gadgets is now. As of today, the legacy gadgets API is officially deprecated. For a period of one year, gadgets using the legacy API will continue to be supported, and function. After that, the legacy API will be turned off for the majority of Google containers (such as iGoogle, orkut, Gmail, and Calendar).

For more specifics on how the deprecation affects iGoogle developers, and details on coming resources to help in the API transition, check out this post on the iGoogle developer blog.

2013, By: Seo Master

seo Introducing Calendar Gadgets 2013

Seo Master present to you:

You've seen them on iGoogle, in IBM WebSphere Portal, and now you can find them in your favorite online calendar -- that's right, now we're supporting Gadgets in Google Calendar! If you're a Scorpio like me, you can add this gadget that lets you check your horoscope from your calendar (don't worry, all the signs of the zodiac are supported). And if astrology isn't your thing, how about games? This Sudoku gadget was created by Alex Komoroske, one of our interns on the Docs & Spreadsheets team. If you add the gadget, you'll see that the daily puzzles get harder throughout the week.

Finally, if you like to keep up on celebrity birthdays, the birthday reminder will show you who you are idolizing that day:



But you don't have to be a Googler to create a Calendar Gadget -- we have put together new documentation to help you get your favorite Gadgets into Calendar. If you are itching to write some code, then you can use GData or ICAL to add some fancy Calendar Gadget events to your calendar. But if you're out of Red Bull and don't have the time for a late-night hacking session, then you may want to try our new "of-the-day" Calendar Gadget wizard, which makes it easy to take an existing Google Gadget and have it show up once a day, every day, just like the Horoscope and Sudoku Gadgets do.

Let us know how your experiences with Calendar Gadgets are going in the Google Calendar GData API developer forum.2013, By: Seo Master

seo iGoogle adds support for OpenSocial 2013

Seo Master present to you: Developers using the OpenSocial API can now reach tens of millions of iGoogle users! As of this week, iGoogle now supports OpenSocial in both the US and Australia, with the plan to roll it out to more users soon. In general, we think "social is better" when it comes to the web - activities such as reading the news, doing a crossword puzzle, sharing a todo list, or watching a video are all better when done with a friend. These are all things that iGoogle users love to do, so making them social on iGoogle was the next logical next step.

If you're interested in getting started writing social gadgets for iGoogle, check out the full announcement on the iGoogle developer blog.

2013, By: Seo Master

seo Google Developer Podcast Episode Five: Adam Sah on Google Gadgets 2013

Seo Master present to you:


The Google Gadget Ventures announcement was very exciting for us and the community. We couldn't wait to get Adam Sah of the Google Gadgets team to discuss Gadgets, and the new announcement.

Interview with Adam Sah on Google Gadget Ventures


What will you learn from this interview?
  • What Google Gadgets actually are and how they compare to widgets and blidgets and blodgets and ....
  • How there is a family of Gadgets. They aren't just for iGoogle!
  • How you can develop Gadgets in HTML, Flash, Java applets, and more. After all, this is just iframes people.
  • The security model with Gadgets
  • The subtlety behind phishing and Gadgets
  • The long tail of Gadgets, and how to share and promote your Gadgets
  • How you can post Gadgets on your blog or website
  • How we are in the second generation of Gadgets (not just a minimal view on your web app)
  • What an appropriate amount of resources to put on Gadgets
  • How to monetize your Gadgets
  • Information about the Google Gadget Ventures program
  • How to get going with the scratchpad in seconds
  • How Mapplets are Gadget too
  • How this is about real business (IBM and Salesforce.com)
  • How to deal with high volume Gadgets, and how we are here to help.
  • The role and timing of standardization of the gadget platforms
Read more about Google Gadgets, and check out the forum.

Start listening now


You can download the episode directly, or subscribe to the show (click here for iTunes one-click subscribe).

News

The following are links that we mentioned in the podcast:

AppleScripting Google Desktop means that you can tell the Google Desktop application to do things for you via script. Boss around the system from your own applications and scripts.

The new Google Earth Outreach program has some tutorials such as showing you how to create KML from a spreadsheet.

The Google Mashup Gallery is a mashup itself, that allows you to add your mashup to the mix. Now, everyone will be able to find your Britney vs. Christina mashup!

Geotagged Picasa JSON/KML Output + Driving Directions = Instant Scenic Tours: If you were following the Google blogs yesterday, you would have heard that Picasa now gives you a sleek drag+drop interface for geotagging your photos, and that the Picasa Google data API now outputs the geotagged data using GeoRSS & GML elements. And if you were excited by all that news and immediately visited Picasa to try out the new feature, you might have noticed the big blue KML icon next to a "View in Google Earth" hyperlink. So Picasa now gives developers geotagged photo data both in KML output and the standard Google data API output formats, and that means we map developers have a lot of ways to start playing around with Picasa photos.

New drag-to-route driving directions in google maps - once you have a route, drag the blue line around to have it automatically re-route using your desired roads or intermediate destinations.2013, By: Seo Master

seo OTON: The Future Gaming Console! 2013

Seo Master present to you:
Everybody has heard of OUYA $8.5 Million story. OUYA is an Android-based videogame console which reached the record of fastest project to ever reach the million-dollar pledge mark (8 hours 22 minutes) and having taken in $2,589,687.77 worth of pledges in the first 24 hours.

A company in Alabama has promised to release a gaming console from future. They call themselves EnGeniux team.

OTON is powered with custom software built on top of a custom version of Ubuntu OS, called "Otonomous". The system will undergo updates regularly to support many game formats.

OTON is said to be capable of running Linux, Android, HTML and even other kind of apps too.

While interviewing the CEO, Derrick Samuels he told me:
OTON development is different. OTON is more like a virtual assistance for developers. So the process will be easy. We are working to have Android support and Linux games. When you call OTON a console..it will stand by that name! Play anything!

The best part of OTON is that it can generate the games instantly without any human effort.

OTON will be the first game console to support artificial intelligence capabilities. The system learns and will add an extra layer of challenge for only the worthy gamers. Enhanced game levels, characters, and game-play are just a few challenges only the elite gamers will dare challenge.

In future, OTON is expected to include updates, game music creation, photo creation, website creation, educational gaming creation, document creation and media content creation!

The games would also be updated with daily updates which will cost nothing!

An internal camera on the front of the system is designed to make motion gesture gaming possible as well as direct interaction with the operating system/ user interfaces.

The game can also create a blog or website to publish his games and thats too for FREE!

The OTON system will unlock unlimited possibilities for gamers, educators, and business, medical and game developers unlike any other console before.


The gamer can also transfer his game or app to his/her smartphone. It would also support online multiplayer games.

I wish these innovative guys the best!
2013, By: Seo Master

seo Introduction to modern Cryptography 2013

Seo Master present to you:
Hi, so I decided that, as i have the entire week to my self i will put in an introduction to Cryptography, for all who are interested in the subject. I will be updating the post, for the next week with new information and sections on cryptography.

Okay, before we move into the real interesting subjects of cryptography like, key exchange protocols, signatures, certificates, Symmetrical cryptography and Asymmetrical cryptography, hash fictions, and prime numbers. We will first look into the history of cryptography and its origins.

History of the Hidden Language.

During ancient times, when leaders and generals needed to send messages to their troops, with instructions on what they should do. It was very easy for the enemy to intercept those messages , by ambushing supply routs (in modern time its equivalent is the man in the middle attack), So this meant the message was easily read and the enemy would know what the other side was planning. to prevent this from happening there was only two ways of preventing this from happening, First, was to hide the message so that it looks just like a normal every day thing (Steganography). Steganography the art of hiding messages so that it is only known to the person receiving the message that a message is hidden in it, a good example is invisible ink. Now, the Second way was to make the message unreadable for any person who was not the intended recipient. And this is what many did, because unlike stenography encryption could be taught to people easily and could be done with much less resources. so In a war situation teaching generals and messengers how to put cryptography was much more efficient.

Early encryption techniques were rather simple and you yourself may have played with it when you were kids.

Two main cipher system used were:
Transposition cipher
Substitution ciphers


A Transposition cipher uses a very simple method of encryption one of the most popular ones were the scytale, basically the scytale is a piece of wood, on which a strip of paper is wounded up to revel what message. so the person sending the message to some one would have an identical scytale as the other and would wind the paper on it and write the message then unwind the paper and fill the empty space with random words. if another person intercepted the message and used a different size scytale the message would not show.
Problem with this was the sender and the receiver required identical scytale.

A Substitution ciphers is another simple cipher that substituted the actual alphabets with some other alphabets or numbers. The Caesar Cipher is by far the most famous of them all, used a simple shift technique to substitute the alphabets, Used by Caesar himself and the roman empire Eg bellow.

Three shift right →
Plain: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
Cipher: X Y Z A B C D E F G H I J K L M N O P Q R S T U V W

Planetext - Bitcoin is a crypto coin
Ciphertext- Efqzlfk fp x fovmql flfk
Notice there is repetition of the same alphabets that have been substituted.

So, looking at the cipher above you can now encrypt any length of message through substitution, and all the receiver has to know when receiving the message is how many shifts are used.

However all these methods are venerable to cryptanalysis techniques, like a frequency analysis. All a person has to do is count the alphabets and make a note of each of the alphabets and the number of times it appears. In the english language some alphabets appear more that some, using this, we can determine which symbol or alphabet was replaced.

English Letter Frequency


Polyalphabetic cipher

Due to the ease of all these Cipher being broken a new system was requires, one which could not be so easily broken using a frequency analysis. many new ciphers came in and out. One being predominantly used for hundreds of years was the Polyalphabetic cipher on which normal frequency analysis attack method did not work. and it used a key. The Vigenère cipher the best known of them all and its harder cousin Autokey cipher remained one of the most used ciphers during the 15th and the 16th and up to mid 18th century, remained unbroken.

It was a variant of a Substitution ciphers but with multiple shifts and alphabets and also the use of a key made it versatile and impenetrable.

This is how a Vigenère cipher looks like.


Vigenere Cipher

Eg:-

Message - TO BE OR NOT TO BE THAT IS THE QUESTION
KEY - RELATIONS

Keyword: RELAT IONSR ELATI ONSRE LATIO NSREL
Plaintext: TOBEO RNOTT OBETH ATIST HEQUE STION
Ciphertext: KSMEH ZBBLK SMEMP OGAJX SEJCS FLZSY

Notice there is no repetition of the same alphabets that have been substituted .

This kind of ciphers remained active for many hundreds of years and was used widely in Europe and the middle east. However the fate of this cipher system was doomed, when a brilliant man who we all know and admire in the computing world came along, the father of computer Charles Babbage, he broke both the Vigenère cipher and the much harder Autokey cipher.

Tomorrow we will touch upon mechanical ciphers, used in the second world war and then enter the world of modern cryptography, in the digital age.


The Rise of the Machine

The era of the second world war, was the proving grounds for modern encryption methods, ideas and innovation. In my opinion, if it was not for the Mathematicians, code-breakers and revolutionary thinkers, the modern computer age, the internet and space travel would not have been possible at all. The birth of computing devices, to conduct tasks through programmed inputs were all tested and innovated, by codebreakers trying to break the German Enigma code. The use of early computers was at England, in a place called Bletchley park. In fact, the first discovery of modern public key encryption system and early experiments on One Time Pads was done during this time.


World War 2 Machines
Enigma Machine *Germany*(Left)  |  SIGABA *USA* (Middle) |   TypeX *UK*(Right)

World War 2 Machines

During the War the Germans used one of the most successful, mechanical crypto systems called the Enegma machine, it was a rotor cipher machine, similar to a Polyalphabetic cipher but with the difficulty increased by the rotor, if the allies broke the code all the germans did was change the configuration and may be add rotors giving another huge headache for code-breakers.

The US and the UK also used similar machine called the SIGABA and the TypeX. However, a code system that was never broken by the enemy was not mechanical at all, but were the Navajo code talkers who played a vital role in the success in the pacific war theater. There's even a movie called the Windtalkers played by Nicolas Cage although it concentrated more on the nipless cage than the Code talker.


Modern Cryptography

With progress happening in the Cryptography community one of them was by far the most revolutionary, the public key crypto system, the RSA algorithm that allowed people to have two keys one public and one private. this solved many problems of key transfer and security and validity of a encrypted message. This algorithm was already made during the second world war, but was classified. Until 1977 when a group in MIT rediscovered this algorithm on their own, hence the name RSA algorithm, the first alphabet of their surname Ron Rivest, Adi Shamir, and Leonard Adleman.
RSA Small Logo

The advent of modern cryptography gave rise to secure communication, safe banking transaction, and greater communication, and social revolution. We use some form of encryption every day and sometimes we don’t even know that encryption is being used.

Cryptography, before the dawn of the Information age was confined to the intelligence community, with many of the technology kept classified and inaccessible to the general public. It was nearly impossible for a person without a connection to the intelligence community, or a large corporation like IBM to do any work on Cryptography. But, that all changed when the internet was born. People from around the world collaborated to bring cryptography to the masses. With the advent of the internet people were able to disseminate information about cryptography, and develop software for everyone to use.

This shift in knowledge from an intelligence based community to a worldwide public community, gave rise to many social changes. With people openly advocating the use of encryption to promote privacy, Bring down corrupt government, safeguard whistleblowers. During the late 80's many BBS's hosted score of text files relating to cryptography and around the early 90's a cypher punk mailing list was started, the birthplace of the cyberpunks, with the major discussion on technical issues, alternative uses of cryptography privacy, government surveillance, freedom of speech, civil society, and related issues. There have been many influential individual who have shaped this movement Eric Hughes, Jim Bell, Philip Zimmermann, Julian Assange just to name a few.

The roots of bitcoin can be traced back to the early discussion, within the cyberpunks and the cryptoanarchistic groups for an anonymous banking system. May be Satoshi Nakamoto might be one of the early cypherpunks, who was able to solve the problem of anonymous banking. But, we shall never know.

Cryptography has now become an integral part of our lives, in this modern day society it is rare not to come across technology that does not utilize some sort of encryption. I believe that the future for Cryptography is bright, because this is the only thing that can solve many of the world problems of secure communication, Tyrannical governments, greedy Banks, and immoral super corporations.

Tomorrow we shall finally talk about the technical part of modern Cryptography. Thinking about what to talk about tomorrow . I am a bit torn about where to start this from, and after a cigarette break I have decided to start with the basis of modern cryptography, the math’s behind it, so the topic for tomorrow would be Prime number related math’s, and will touch upon a Diffie and Hellman key exchange protocol.


The Numbers Game

The building blocks of every thing in maths my opinion is and always, the prime number. This number can form so many different numbers of any length, and a number of a particulate digit can be factorized to a smallest number being prime.

What is a prime number?

A prime number is a number divisible by it self and one. (basic old school definition)
take it this way, a number which cannot be divided equally without creating fractions of it.

2 3 5 7 11 13 17 19 23 29 31 37 41 43 47 53 59 61 67 71...............

so, lets take for example an integer which Factorizes to
56984 = 2 × 2 × 2 × 17 × 419

What is prime factorization?

Prime factors of a positive integer are the prime numbers that divide that integer exactly like the example above.

So why is this useful to cryptography and online security? 

Well the simple fact is that, it is easy to multiply two large prime numbers, but while trying to find the prime factor of that integer become a tedious task taking alot of time
a simple example like.

7703 × 6421 = 49460963

the output a compost number is going to take a long time to be factored, the example above may not be the best example of a large prime number being used but just Imagine a prime number P1 and P2 both the length of about 100 digits long or much longer and multiply those tow together the composite number would be hard to factorize the limit being the time taken to compute the result.

g mod p

42 mod 12 = 10

Working with prime modulus.

3^29 mod 17 = 12

so here calculating this makes it easy when we have the generator as 3 raised to the power 29 . However when we have the result as 12 and need to find 3 raised to the power x . this becomes a time consuming task.

3^x mod 17 = 12

This problem is also know as a discrete logarithm problem. Therefor this creates a One way function. easy to compute harder to decipher.


Therefore, if the size of the prime increases the time taken for a computer to compute the result of that, would take a very long time.

Clock arithmetic :

If we consider prime numbers as the ingredients in our encryption recipe, the modular arithmetic is utensil for cooking it up. we shall see a simple use of [ mod ] in a few examples while talking about the Key exchange protocol especially the Diffie and Hellman key exchange protocol.

Diffie and Hellman key exchange protocol

Problem of Exchanging Keys :-

Lets take an example of two people who are honest employees in a corrupt government service, Alice and Bob, and lets take for example their Evil boss is Eve.

Alice and Bob want to communicate with each other but, does not want any one to read their messages, as they know Eve would most likely be reading their emails.
so how would the two communicate without Eve being able to read their messages.

Firstly, Alice and Bob has to agree on a secret key so that they can use that key to encrypt messages and send to each other but, the problem is that if they send the key without encrypting it , Eve would know what the key is and can read all the messages Alice and bob send each other. This is where the Diffie and Hellman key exchange protocol would be most useful.

So how does it work?
Alice and Bob agree on a generator and a prime modulus.

g = 3
p = 17

What Alice does :-
She chose a random number
and then raises that on the generator, result q = 15

g^x mod p = q
3^54 mod 17 = 15

Alice, then sends this result 15 over the insecure line to Bob

What Bob does
He chose a random number Bob.
and then raises that on the generator, result r = 16

g^y mod p = r
3^24 mod 17 = 16
Bob, then sends this result 16 over the insecure line to Alice

What Alice does is,
uses Bob's result as a generator raised to the power of the random number Alice chose to calculate a secret key s
r^x mod p = s

16^54 mod 17 = 1

Bob also does the same thing using the number Alice sent Bob. to generate a secret key
q^y mod = p = s

15^24 mod 17 = 1

Here Both Bob and Alice was able to compute the secret key s without transmitting the key over the insure line.

Meanwhile, Eve who is reading the messages coming in, can only intercept the following details from Bob and Alice
the generator 'g', prime modulus 'p' and the two results of the calculation by Alice and Bob 'q' and 'r'.

What Eve is missing is the private numbers that Alice and Bob used to generate the Secret 's' . without the 'x' and 'y', it is impossible for Eve to determine what secret key Alice and Bob is using to encrypt their messages.


Alice '(m)' → Bob
s(m)              s(m)


So, here Alice sends Bob an encrypted message using a secret key 's', which Bob then uses the Secret key 's' to decrypt the message Alice Sent him.


As you can see with this protocol many of the problems of secret key transfer is solved. This also leads us to the path of asymmetrical encryption and the use of the later RSA algorithm's public key cryptosystem to encrypt messages.

I hope this was simple to understand, i tried to put in as much details without making it confusing, i hope you all like it and understand. Next, i will cover the public key cryptosystem namely the RSA algorithm, and then touch upon Hashing, one time pads and a few single key encryption on block ciphers.


By subvolatil of Bitcoin Talk Forum!
Original Thead at https://bitcointalk.org/index.php?topic=246307
2013, By: Seo Master

seo The Cool KOLOS Gaming Wheel for Apple iPad 2013

Seo Master present to you:
The Apple iPad has always been a special gadget with its HD graphics. It is indeed a perfect tablet for gaming geeks who love playing from any place like a bus, train on the move or even while at home. The gaming experience for Apple lovers has just got better with the new Kolos Gaming Wheel designed for racing fanatics.

A befitting design for iPad series


Custom-made for the 9.7-inch Apple iPad, the Kolos steering wheel is designed to fit Apple iPad 2 (2nd Generation) and Apple The new iPad (3rd Generation). It also fits the Apple iPad with Retina Display (4th Generation). Available in black and grey colours, the 12.3-inch diameter wheel is made out of a light weight, high quality, metallised plastic.

The clamp of the wheel is constructed out of Acrylonitrile butadiene styrene (ABS) which is lightweight and has great strength. The base of the wheel system is curved and symmetric to the wheel itself. To enhance the stability of the wheel, there are three rubberised large circles for support. It has an anti-perspiration coating to ensure that your hands do not slip off in all the adrenaline-pumped action.

A gripping hold at the start line

It is quite easy to fit the wheel with the iPad. You have to place your iPad in the space provided and pull the clip down on it to lock it in place. The gadget will be locked in tight grips and will remain stable and steady throughout the game. It is designed to accommodate a double or single-handed action, so you can try to swerve on a free virtual driveway packed with action.


Transform your desk into a driving seat

The wheel has a clamping system that can be used to attach to desks. The clamp can be attached to surfaces that are as thick as two inches. You can take it, slip in through your study desk and turn the screw at the bottom to tighten the grip.



Gaming taken to a new dimension

Since the wheel holds the iPad, you can play all one-finger touch games without having to hold it. Moreover, the wheel is detachable. So, you can have fun with air gaming anywhere with the easy and compact design. The best part is the Kolos wheel is not just for racing, it can be used for playing any touch game or motion sensor air game on the iPad.


iOS games for KOLOS play

A few examples of racing games enhanced by KOLOS are Asphalt 7: Heat, Highway Rider, Sonic & SEGA All-Stars Racing, Riptide GP, Carmageddon, etc. Apart from racing, action and air games like Sky Gamblers: Air Supremacy, MetalStorm: Wingman, Boost 2, etc., can also be played on the iPad attached to the KOLOS wheel. One-finger touch games like Fruit Ninja HD, Angry Birds Space HD, Facebook games, etc., can be played hands-free using KOLOS wheel base system to hold the iPad.
2013, By: Seo Master

seo Speed Up Your Computer 2013

Seo Master present to you:
We have a list of things which will increase speed of your computer.

Fragmented Hard Drive

One of the most common causes of a slow computer is a fragmented hard disk drive. Checking the disk for fragmented data won’t take too long and can help with dealing with slow performance issues. In Windows 7, open Start > All Programs > Accessories > System Tools > Disk Defragmenter.

Too Many Permanent Temporary Files

Temporary folders are supposed to make using Windows and your browser faster by providing easily accessed files that can be loaded up quickly.

When your hard disk drive becomes over 90% full you will find that performance drops. In order to fight this, one of the best things you can do is delete your Windows temporary files. While deleting your Internet history and temporary Internet files is something you can do from your browser, CCleaner is a good option for tidying up the Windows temp folders.

System Startup

Booting Windows typically takes around the same length of time on any computer. As you install software to your PC, any that is required to launch as part of the Windows startup will result in poor performance of your computer, and perhaps even freeze your computer.

To fix this you will need to reduce the number of applications that are loading at the startup.

Viruses & Spyware

Malicious software is one of the main reasons for slow or poor system performance, and can add themselves to your computer while you install software downloaded from the web. Malware doesn’t just come in the form of viruses, worms and Trojans.

You can deal with malicious software by ensuring that your computer is fully equipped with anti-virus.

Old Hardware

Old hardware can prove deadly to your computer. It’s a familiar tale – the computer bought years ago slowly upgraded component-by-component until it eventually has all brand new shining parts that simply cannot hope to perform as intended.

Windows Registry

When you uninstall software on Windows, the uninstaller doesn’t necessarily remove everything from your computer.

The Windows Registry is like a database of filepaths and instructions for the operating system and installed software, and it can become corrupted and overloaded. These issues will cause slow boots, poor performance and a very slow shut down.

You can CCleaner to fight this problem.
2013, By: Seo Master

seo 6 Best Enterprise apps for Android 2013

Seo Master present to you:
In past, the people used mobile phone for only communication purpose but at present this situation has completely changed after the emergence of android smartphone. This android guy has brought many changes in our personal and professional lives. This handset comes with speedily growing application market named as Android market or Google play. From this store, every person can grab one application of his choice. However, it’s me who will today focus on enterprise applications. The main purpose of introducing these applications for android platform is to enhance the overall productivity level of employees and workers. So, let’s peep into the detail of famous and useful applications for corporate environment.

1. Think Free Mobile


When you imagine an office, first thing which come into your mind is an office with table having many files. In old days, employees needed to compose and to store a lot of files physically but after android tablet and smartphone, they are capable to create, edit and store as much files as they want. For their assistance, android market comes with Think free mobile application. It’s a word processor that makes it simple for you to compose file and then to store them in your personal or public cloud storage. In addition, you can share between personal cloud and mobile devices.

2. Quick Office Pro

The employees need to work with presentations and different databases along with word files therefore; it’s Quick Office Pro that adds ease into their life. This enterprise application will make it simple for them to create, edit and share their Microsoft word, spreadsheets and presentations on the move. A businessman will definitely find it a handy application as he can check his office work while travelling.

3. Egnyte App

No matter where you actually are, this application allows you to access, edit, store and share files from any where any time. Just you need to have a smartphone for getting the most from this application. I really like the permission control feature of this application which permits the user to limit the access of files to only authorized people. One more special feature of it is file synchronization from smartphone with computer.

4. Critix Receiver

There are many enterprises which have started using critix receiver as it enhances efficiency of worker in a robust manner. This application permits the authorized users to access enterprise files, desktop and application from anywhere. Sharing of file through this receiver is indeed a delightful task.

5. Mango Apps

The real-time collaboration between employees is made possible with the help of Mango applications. When a company gets this application for employees, it becomes simple for every worker to get news and updates from the same platform. In addition, there is an instant messenger available on every interface just to make sure that employees can communicate with one another in an instant manner. They can make groups and then share files with their group members in a comfortable way. You can create the modules of your choice like collaborations, tasks, groups, files, applications, ideas, etc. The company can create private groups and projects for maintaining collaboration with customers and partners.

6. Yammer

It is one of the best enterprise applications available in Google play. This application lets you to create a private social network for your company. Co-workers can easily communicate with each other through a private social platform. They can update their status and get latest news of business right from here.
2013, By: Seo Master

seo Project Loon: When, Where and How? 2013

Seo Master present to you:
Google has launched a small network of balloons over New Zealand in an experiment it hopes could bring reliable Internet access to the world's most remote regions, the company said late Friday.

Project Loon balloons float in the stratosphere, twice as high as airplanes and the weather. They are carried around the Earth by winds and they can be steered by rising or descending to an altitude with winds moving in the desired direction. People connect to the balloon network using a special Internet antenna attached to their building. The signal bounces from balloon to balloon, then to the global Internet back on Earth.

Project Loon starts in June 2013 with an experimental pilot in New Zealand. A small group of Project Loon pioneers will test the technology in Christchurch and Canterbury.

The 30 balloons deployed in New Zealand this month will beam internet to a small group of pilot testers and be used to refine the technology and shape the next phase of Project Loon, Google said.

Google announced the project on its official blog post.

Project Loon balloons travel around 20 km above the Earth’s surface in the stratosphere. Winds in the stratosphere are generally steady and slow-moving at between 5 and 20 mph, and each layer of wind varies in direction and magnitude. Project Loon uses software algorithms to determine where its balloons need to go, then moves each one into a layer of wind blowing in the right direction. By moving with the wind, the balloons can be arranged to form one large communications network.

The balloon envelope is the name for the inflatable part of the balloon. Project Loon’s balloon envelopes are made from sheets of polyethylene plastic and stand fifteen meters wide by twelve meters tall when fully inflated. They are specially constructed for use in superpressure balloons, which are longer-lasting than weather balloons because they can withstand higher pressure from the air inside when the balloons reach float altitude. A parachute attached to the top of the envelope allows for a controlled descent and landing whenever a balloon is ready to be taken out of service.

Each balloon can provide connectivity to a ground area about 40 km in diameter at speeds comparable to 3G. For balloon-to-balloon and balloon-to-ground communications, the balloons use antennas equipped with specialized radio frequency technology. Project Loon currently uses ISM bands (specifically 2.4 and 5.8 GHz bands) that are available for anyone to use.



2013, By: Seo Master

seo New Surveillance Cam Technology Saves Investigation Time 2013

Seo Master present to you:
Reviewing of boring surveillance footage just got more fun! Almost everyone’s got one or many surveillance cameras shooting away 24-7, leading to hours and hours of viewing time required to spot a sought-after event. Now a video analysis system has been developed which not only speeds up the process, but makes it more effective.



BriefCam’s Video Synopsis system has been credited with helping to catch the Boston Bombers. With the power to isolate an object or event, time-stamp multiple events shown simultaneously and slow down or speed up the footage, the investigators were able to focus on the backpack, which suddenly appeared. They were able to ignore all the slack time before its appearance, as an hour of footage was condensed into one minute. This was possible because of the simultaneous view feature. With ten hours of footage from one camera, BriefCam software can condense it to ten minutes as events are presented simultaneously. The zoom feature also lets the viewer zoom in on targets when their movements have changed during the filming. For these reasons, it has been called a “search engine for video”.

Boston proved the worth of BriefCam’s ingenuity, but many investigative types already appreciated that, as it’s been used in several countries besides the US, China, and Taiwan, since its inception three years ago.



The company’s intent is to enable the efficient viewing of cam footage for safety and security reasons. Winner of several awards -- the 2013 SIA New Product Showcase for Video Analytics; the 2012 Israel HLS Technology Innovation Award; the 2011 ASIS Accolades Award – Surveillance; the 2010 IFSEC Security Industry Award – Best CCTV System Product; the 2010 Wall St. Journal Technology Innovation Award – Physical Security and others – the BriefCam is compatible with several operating systems. The software is easy to install on existing systems. An additional feature is that it allows the export of the synopsis/original as evidence video file.



For those who want to get a bit technical, during recording, motion detection algorithms are used which separate the non-moving background images from the moving target images. The motions are tracked and analyzed within the frame. With this information, a database of backgrounds, events, objects and activities is created. The moving items are collected to make the synopsis.



It’s easy to see how BriefCam technology helps companies with security-related issues. By the looks of the website, the company markets the systems to businesses and government entities. So far, it’s not intended as a homeowner’s toy, though it is described as easy to use without special training.



Surveillance cameras can even be accessed remotely by mobile phone, no matter the distance. Nanny cams and even puppy surveillance systems make being away from home that much less worrisome. Many apps are available for download. They can be custom-built as well, with all the features a person wants, with an app builder such as the one offered by mobile.conduit.com



If a person can find their way around an iPhone, they can design their own surveillance cam app, since the Conduit app creator provides the templates and instructions to succeed. This could become a necessity for all web-cam users, so that surveillance and peace of mind goes everywhere the mobile goes.
2013, By: Seo Master

seo 5 Best Apps for Personal Productivity: iOS 2013

Seo Master present to you: Smartphones, tablets and other mobile devices are constantly changing the landscape of work efficiency and productivity. Gone are the days of pen and paper along with a dozen old ways of handling tedious business and office tasks. With busy people getting busier in a workday, mainstream technology has paved a way to bypass much of the bulk of the work environment.

With the App Store came greater possibilities and functionality for the smartphone and other devices. Here are some of the best apps that should help you increase your work productivity and efficiency.

1. Evernote 

Evernote is among the most popular apps and allows you to ‘remember everything’. This app practically transforms your smartphone into the ultimate digital archive. Evernote is an indispensable app that collects and organizes written notes, photos, and even web pages. Not only does this app allow you to snap image notes, it also records voice notes as well. Every bit of information stored in Evernote is processed, indexed, and made available through a simple search. It also allows you to add tags and organize your notes into different colour coded notebooks.

2. GoToMeeting

GotoMeeting is a $49/month app that allows you to host digital meetings, webinars, and online trainings on your smartphone. This app shares your documents, presentations, reports and even your screen with your colleagues. With a webcam, you can even have face time to further the experience. GoToMeeting can hold up to 25 attendees. Regardless of where you are, GoToMeeting can provide conference calls as long as there is an internet connection.

3. PayAnywhere

Pay Anywhere turns your Smartphone into a credit card machine. This app allows you to swipe and charge your clients credit card through your smartphone, which allows you to be paid as soon as a business transaction is completed. This app keeps track of invoice numbers and keeps an inventory of your every transaction. The best thing about this app is your credit card transactions are always free of charge.

4. Expensify

Expensify is an app that takes charge of your tedious expense reports. This app imports financial documents such as bank statements, credit card statements, billable items such as gas mileage and time. Expensify allows you to sync up credit cards and bank accounts and keep track of any financial activity in real time. It also features eReceipts which are digital copies of actual paper receipts. It also turns your smartphone to a receipt scanner as it snaps a picture of a paper receipt and tracks the amount of the transaction, merchant and date.

5. LogMeIn

LogMeIn makes sure that you never leave anything behind. LogMeIn provides free remote desktop access to your main computer from your smartphone or tablet. This app allows you to control your PC from your mobile device wherever you are as long as you have wi-fi or 3G connection. LogMeIn allows you to fully use any application that you have installed in your PC. With LogMeIn, you can stay productive even when you’re on the go. You can watch high definition videos and stream sounds remotely. You can save files to your device and transfer between computers.

Article by Sharon Freeman who writes about business and office management for companies such as www.tradiepad.com.au2013, By: Seo Master

seo Bringing more context to Gmail contextual gadgets 2013

Seo Master present to you:
As part of the launch of Gmail contextual gadgets, Google released a set of predefined extractors that developers could use. These extractors allow developers to match content within a single part of an email message, such as the subject, and use that content to display relevant information to the current user.

Many Gmail contextual gadget developers have expressed a desire to match on more complex patterns than is possible with the predefined extractors. Today, with the launch of the Google Apps extensions console, these complex patterns, known as custom extractors, are now available to drive contextual gadgets.

Custom extractors allow developers to trigger their gadget when a series of conditions are met. For example, a developer could write an extractor that triggered a gadget only when “Hello world” appeared in the subject and “john@example.com” was the sender of the email. This allows developers to more finely tune their gadgets, and provide even more relevant contextual information.

If you’re interested in writing a custom extractor you can get started by reading our documentation. If you have questions, please post them in the forum.

2013, By: Seo Master

seo Some more SmartWaches other than Sony’s 2013

Seo Master present to you:
With hoards of Smartphones being launched every other day, the mobile industry might call it time when people have something else to look forward to other than a glossy, new handset. The up rise in the number of spyware which have ingeniously earned their share of the market has made people to look more carefully at their choice of Smartphones. With iPhone spy apps breaking into iOS very easily, Apple is looking for new ways to introduce itself to it’s fans and so is Samsung.

The SmartWatch

Samsung and Apple are reportedly working on the development of a digital watch. A digital watch might seem to be child’s play for two of the Smartphone industry’s titans. The newest member of the tech family will be a digital watch that allows the users to make calls, check your location and view the map.

Both these giants of the tech world might have been inspired from Sony which introduced the same kind of watches with a number of other features almost a year ago. Even though the Tokyo-based company has given the best in terms of technology, the Smart Watches have failed to stir the interest of the masses.

Measuring around 1.3 inches, the watch by Sony has a touch sensitive screen. It wirelessly connects to Android Smartphone via Bluetooth. It alerts the users of incoming calls and allows them to reply to texts by choosing from a list of pre-typed messages. It also has the ability to stay connected to Facebook and Twitter. One can even control their smartphone’s music library just by some taps on the screen.

Sony’s LiveView Watch

In 2010, Sony launched a dinosaur version of it’s SmartWatch. While SmartWatch is the size of an iPod nano, the LiveView was bigger in size. It offered less features and a few flaws. The newer models of LiveView watch are more stylish but users still complain of glitches like inability to send messages, a weak battery and the requirement of a stable connection to tell the exact time.

While users are skeptical about the watch, tech market gurus say that Sony acted fast to make a product like that but it takes a lot to make believe. As the world is moving towards advancement in technology, people want a gadget that has a solution to their functionality-related problems. Moreover, the product has to be marketed well in order for it to make a solid ground in the tech bazaar.

Where Sony went wrong

According to Sony’s spokesperson, the watch is an accessory for the smartphone and very high hopes were not held for it. Sales were not that bad though. Sony’s promotion of it’s creation is doubtful. The company does however, expects that there will be a rise in the sales as more than 200 new apps are being introduced in the watch. The fact that the watch is only compatible with Android devices might give the product a backward push. Walkman and Discman technology ruled the world for many years before iPod fed on their market. Sony had the advantage as the first-advantage but the market has not been able to accept the new entry.

Though Sony’s watch has not been able to impress consumers, it’s competitor’s are hoping for a much better reception than what Sony got when it’s launch of the watch.

Natalia David has been writing about gadgets and other developments in the field of technology especially spying apps, enlightening her readers with information about the best and worst in the area. She can be reached @NataliaDavid4
2013, By: Seo Master

seo Is it possible that tablets get extinct in five years? 2013

Seo Master present to you:
Before 2010, it is hard for us as well the computer manufacturers to give a definition for tablet, for there are too many types of companies all over the world engineered and produced their own tablets. It was until the release and success of iPad in 2010 that we begin to pay attention to the tablet we all wanted to own and to use on a daily basis. Just in the same year, we saw the advent of Samsung's Galaxy Tab. Both Apple and Samsung have since then released the successors 每 the iPad 2 and Galaxy Tab 10.1. Since then, the entire IT industry seems to be shifting its main focus from developing PCs to tablets. However, there are also some doubts on the future of tablets. Thorstein Heins, the BlackBerry CEO, publicly stated that tablets would cease to exist in 5 years' time. Is it possible or just nonsense?

There is no doubt that development of IT products should always undergo the demands of their users. Microsoft is always doing this. For example, when users find recovery Windows 7 password a troublesome thing, we can see there are picture password and PIN code developed in Windows 8 as supplement of text password in Windows. So, what features are right for the market demands and attribute to the success of tablets?

The success of tablets greatly owes to Bill Gates, who deserves a lot of the credit for pushing the slate form factor onto the general populace. "But a lot of those users are frustrated, they can't type, they can't create documents, they don't have Office there, so we're providing them benefits of something they've seen and made that a big category, but without giving up what they expect in a PC", he said. A key and common component among tablet computers is touch input, which allows the user to navigate easily and intuitively and type with a virtual keyboard on the screen. Tablet is also characterized by its wireless mobile browser, GPS satellite navigation, portable media player, docking station, etc. It seems that tablets are just what we want in the past several years.

However, the statement that the tablets is to extinct is also not groundless. We now have even high demand for it. We can see there are a variety of other portable and practical devices equipped with similar functions with tablets in the current market. The biggest threat of tablets comes from smartphones. Many of these advanced smartphones can wirelessly connect to your display, keyboard, and mouse, providing full-featured desktop functions. What's more, when compared to tablets, smartphones are more portable and with flexible and foldable displays. Ultra books are also increasingly popular for its reduced bulk without compromising performance and battery life. They are supposed to replace more and more laptops over time and help to eliminate netbook and tablets from the market.

The future of IT products is somehow hard to predict, even if it may be booming at this moment. I want to say, with so fierce competition in this industry, any products will definitely be eliminated sooner or later once it can't meet the demand of the market. For users, no matter you choose a tablet, a smartphone, or a notebook, the best choice is made according to your specific requirements.

I am Mike Leonnon. I am a freelance writer from New York. I am interested in IT produts and have been writing on PC for years. You can also find many tips for PC operation and security, say, how to recover password in Windows 8, tips to choose the right PC, etc.  
2013, By: Seo Master

seo Speed Up Your Computer 2013

Seo Master present to you: We have got a list of things which will increase the speed of your computer.

Fragmented Hard Drive

One of the most common causes of a slow computer is a fragmented hard disk drive. Checking the disk for fragmented data won't take too long and can help with dealing with slow performance issues. In Windows 7, open Start > All Programs > Accessories > System Tools > Disk Defragmenter.

Too Many Permanent Temporary Files

Temporary folders are supposed to make using Windows and your browser faster by providing easily accessed files that can be loaded up quickly.
When your hard disk drive becomes over 90% full you will find that performance drops. In order to fight this, one of the best things you can do is delete your Windows temporary files. While deleting your Internet history and temporary Internet files is something you can do from your browser, CCleaner is a good option for tidying up the Windows temp folders.

System Startup

Booting Windows typically takes around the same length of time on any computer. As you install software to your PC, any that is required to launch as part of the Windows startup will result in poor performance of your computer, and perhaps even freeze your computer.
To fix this you will need to reduce the number of applications that are loading at the startup.

Viruses & Spyware

Malicious software is one of the main reasons for slow or poor system performance, and can add themselves to your computer while you install software downloaded from the web. Malware doesn't just come in the form of viruses, worms and Trojans.
You can deal with malicious software by ensuring that your computer is fully equipped with anti-virus.

Old Hardware

Old hardware can prove deadly to your computer. It's a familiar tale - the computer bought years ago slowly upgraded component-by-component until it eventually has all brand new shining parts that simply cannot hope to perform as intended.

Windows Registry

When you uninstall software on Windows, the uninstaller doesn't necessarily remove everything from your computer.
The Windows Registry is like a database of filepaths and instructions for the operating system and installed software, and it can become corrupted and overloaded. These issues will cause slow boots, poor performance and a very slow shut down. You can CCleaner to fight this problem.

Follow us on Twitter or simply like our page...2013, By: Seo Master

seo iPhone 6: what new features will there be? 2013

Seo Master present to you:
American business history may recall Apple as one of the most successful marketers ever. With iPhone, the company has performed a remarkable magic trick: Making the late-starting mobile seem ready to take over the world. The first generation of iPhone was released on June 29, 2007 and the most recent iPhone, the sixth-generation iPhone 5, on September 21, 2012.

It is rumored that the next iPhone is to come out in 2014. There's even word that Steve Jobs left instructions for the iPhone 6 before he passed away, making it possibly the last iPhone he played a role in. It seems that while the iPhone 5S is a short-term prize, the latest iPhone 6 rumors point to a phone that will be well worth the wait for iPhone users. Here, we take a look at what new features will there be that deserve our expectations.

Many Apple fans and smartphone consumers have been waiting for Apple to follow the likes of HTC and Samsung and release an iPhone model that features a larger display. In a world dominated by beautiful apps, video, and the web, large screen phones, say, Galaxy Note, are undoubtedly welcome to users. It is said that a larger display, possibly 4.8 inches, will be equipped on iPhone 6.

A new DigiTimes report claims that the Apple is working on integrating wireless charging, alongside Nokia. Wireless charging is a new trend of how you juice up your device. It is said that Apple will follow the trend and develop a true wireless charging in which there is no involvement of wires during the charging process. And the charging mat should have electric current storing capability allowing it to be used wire-free during charging.

Another surprising improvement that will take iPhone to a whole new level of mobile security is the thumb scanning technology. You may set a password to prevent unknown access to your phone and also, just like in Windows 7, you have to recover Windows 7 password when you forget the login password, in previous iPhones, forgetting password is a rather troublesome thing. While, with the thumb scanning technology, you can then unlock your iPhone by placing your thumb on screen to allow iPhone to recognize your thumb patterns.

With more smartphones gaining momentum for better camera specs, it seems that analysts and reports are also hopeful about the future iPhone 6. It will surely be good news for photo lovers. iPhone 6 is said to possibly have imaging sensors for 1080 videos, involving 2-megapixels and 60 frames per second for its FaceTime camera.

We can see that more and more phones tend to have waterproof and bendable technology integrated in them. According to the reports from FashionStyle.com, the iPhone 6 will be waterproof and bendable. And the iPhone 6 may be able to survive 12m drops as well as 10m depth underwater.

Though whether these new features will really be added to the new iPhone still needs more confirmations, let's look forward to the iPhone 6 and its extraordinary improvements to be unveiled in 2014.

Charles Anderson is now a system manager for an international IT comapny. He is also a senior writer on IT products, say, Windows operation system, iPhones and iPad, Android smartphones, etc. You can also see some software or applications recommendations in his articles like tools to recover password Windows 8.
2013, By: Seo Master

seo Impact of Mobile Devices on Cloud Technology 2013

Seo Master present to you:
Cloud computing technology is widely popular owing to the fact that it allows the easy access of data from any location in the world. The access can be made by any electronic device which has an internet connection. It can either be you PC, your smart phone, your tablet or even your iPad. A recent survey conducted by Goldman Sachs reported that 66 percent of the users make use of mobile technology to access the cloud data. Mobile devices have very much influenced the development of cloud technology in many ways. Following are some on the impacts that mobile devices have had on the use and development of cloud technology.

Mobile cloud computing

The development of mobile cloud computing is a major impact that mobile devices have had on cloud technology. This is considered as a development of mobile computing and an extension into cloud computing. The mobile devices made use of here can be anything ranging from laptops, mobile phones, and I pads. In order to use cloud technology, the mobile devices need not have much requirements. And so nowadays, even non smart phones which have access to the internet can be used for cloud computing purposes.

The popular apps

There are many apps which cater particularly to mobile computing users. Theses apps are similar to the ones which can be purchased or downloaded from a mobile application store. Here the processing power of the apps is not driven from the mobile device, but from the cloud. Two such popular apps include the gmail and Google Voice for the iphone.

The latest trends

It is seen that many companies are opting for mobile computing technology due to the high demand of the services, both from the customer side and the employee side. Mobile cloud computing technology is also gradually changing the work pattern in companies. Most people are opting to work remotely by using mobile cloud computing applications.

The use of mobile devices has also made the cloud technology a medium of money mobilization. Many companies have hosted cloud applications that will enable the user to view and pay their bills and dues with the help of their smart phones.

The security

Even though mobile devices have greatly helped in the development of cloud technology, it also poses some security risks. Increased access to private computing assets through cloud technology is posing as a huge security risk.

The steps taken

In order to improve the security of mobile cloud computing, many service providers are making use of data location policies. In this way, the data which is accessible at one particular geo location will not be made available at another location. Service providers have also enabled security settings which enable the user to customize the security settings as per their requirements.

The future development

It can be said that the future development of mobile apps depends on the processing power of the cloud itself. The ability to use these cloud apps from even non smart phones will increase the popularity of the apps to a great extent.


Grace is a content strategy expert associated with Godot Media. She has worked closely with online businesses, helping them in their marketing strategies through article writing, among other content writing services. Her other interests – besides online content strategy, internet marketing and search engine optimization – are technology, sports and fashion.



2013, By: Seo Master
Powered by Blogger.