Google Play’s ‘Designed for Families’ selection is likely to go live at I/O conference

May 23rd, 2015 | Edited by | software

May
23

google_play

Google is giving Android developers a firm deadline for submitting apps and games they want to the new Designes for Families section of the Play Store.
The cutoff is May 28, just one day before the beginning of Google I/O. The developer conference is where Google makes announcements about new initiatives, so we’re expecting the new family-friendly app selection will get prominent play.
The email (pictured) reminds developers their apps must meet specific content ratings and other requirements in order to be included.

play store developer email
An email to Android developers details how to get apps ready for the Designed for Families selection. 

The story behind the story: Google’s Designed for Families program is an effort to showcase the kid-friendly apps and games in its Play Store. Making them easier to find could mean more downloads and in-app purchases, which is good for Google and the developers alike. The new effort may also help Google catch up to Apple’s App Store, which is regarded as having the best collection of educational and kid-friendly apps.

Source:  www.pcworld.com

10 Reasons to Embrace Windows 10

May 19th, 2015 | Edited by | software

May
19

windows10

The Windows 10 Technical Preview has been out for a few months along with various blogs, articles and presentations. There is a lot out there for both businesses and PC users to digest. Let me give you my Top 10 – not meant to be comprehensive of everything new in Windows 10, just what I find most meaningful.  In no particular order:

  1. The Windows 8.0/8.1 “live tile” UI” is now integrated into the Start Menu which can also be viewed in full screen mode.   Two worlds previously toggled via the Windows button become one, resulting in a more familiar user interface.
  2. When using a 2 in 1 system, Windows 10 optimizes the user interface for either touch or keyboard/mouse input, based on whether your device is in tablet or laptop mode.
  3. When using a laptop with a precision touchpad, Windows 10 offers new touchpad gestures for navigating through your open apps.
  4. Systems can be upgraded to Windows 10 directly from Windows 7. The option to skip Win 8.0/8.1 should be very interesting to IT managers everywhere.   Of course an upgrade to Windows 10 from Windows 8.1 is possible but not from Windows 8.0.
  5. MS Word capabilities are built into Outlook. Now it’s easier to add tables, insert pictures and more. Email is foundational to business productivity and I’m glad folks are looking to continuously improve it.
  6. Windows Updates – both update type and cadence – can be customized by IT departments based on platform/user type. The needs of the business will dictate which updates get pushed when to which systems.
  7. Windows 10 offers a more secure browser with enhanced support for modern sites as well as compatibility for legacy enterprise web pages and apps.
  8. Windows 10 offers expanded and improved device management choices including Microsoft Active Directory, Azure Active Directory, Group Policy, SCCM and improved MDM support. MDM support began with Windows 8.1, enabling IT to manage Windows PCs the same way they manage mobile devices. However with Windows 10 this MDM capability offers improvements in enterprise data protection, remote wiping for lost devices and even full control over the Windows Store among other features.
  9. Speaking of the Windows Store, Microsoft is offering a web-based portal so organizations can acquire apps and then distribute them within their Windows 10 user base. It is even possible for a company to create their own private section within the Windows Store, making public and private apps easier to find so users can customize devices as directed by IT.
  10. And finally, for added security Windows 10 is adding a feature called Windows Hello, which incorporates multifactor authentication (ex: biometric data) into the login process.

Look for more information this summer as the production version of the OS is released and businesses spend more cycles testing their applications and IT images. Windows 10 coupled with Intel-based platforms is going to be a very compelling computing solution.

Source: www.pcworld.com

It’s official: Windows 10 will not be free for pirates

May 16th, 2015 | Edited by | software

May
16

Microsoft executives said Friday that the company will not offer Windows 10 for free to those without legitimate licenses to Microsoft’s software, as the company had previously seemed to say.
Terry Myerson, executive vice president of operating systems for Microsoft, wrote Friday that the company will provide “very attractive” offers to those who wish to upgrade from what he called a Windows operating system in a “non-Genuine state” to Windows 10. But, he said, it will not be free.
“While our free offer to upgrade to Windows 10 will not apply to Non-Genuine Windows devices, and as we’ve always done, we will continue to offer Windows 10 to customers running devices in a Non-Genuine state,” Myerson wrote. “In addition, in partnership with some of our valued OEM partners, we are planning very attractive Windows 10 upgrade offers for their customers running one of their older devices in a Non-Genuine state.”

windows_pirates
If Windows thinks that the software isn’t genuine, it will create a “watermark” on the machine, notifying customers that they’re running an illegitimate copy of the software. If that happens, a customer will either need to upgrade or return the machine—assuming they just bought it—to the manufacturer itself.
“Non-Genuine Windows has a high risk of malware, fraud, public exposure of your personal information, and a higher risk for poor performance or feature malfunctions,” Myserson added. “Non-Genuine Windows is not supported by Microsoft or a trusted partner.”
What this means: This seemingly is the final act on a small drama that began in March, when Microsoft appeared to tell Reuters that it would offer free Windows 10 upgrades even to even those who had pirated the software. Two days later, however, it began walking back on that statement, claiming that pirated copies would be “still illegitimate.” Now we seem to have the final answer: If you pirate Windows, you’ll have to pay—eventually.

Source: www.pcworld.com

Google Now 4.1 teardown reveals upcoming features like voice commands, read-aloud notifications

January 17th, 2015 | Edited by | software

Jan
17

The Google Search 4.1 update added some cool new features to Google Now, but there’s a lot more lurking underneath the hood.
Android Police tore into the APK, finding evidence that Google has even bigger ambitions for its digital assistant. While there is no guarantee that any of the discoveries will make it into a future update, it provides a hint at how Google wants to bring even more of its machine learning prowess into Android.
Why this matters: Google Now is one of Android’s best features because it more deeply ties you to Google services, turning your phone into a more useful tool. It’s Android’s main trump card over iOS, putting key information right on your home screen, instead of keeping it locked away inside separate applications.

googlenowphone

A smarter Google Now

One interesting find is something called Project Hera. The best we know about it so far is that it’s part of Google’s continuing effort to more deeply tie together the web, Android, and Search. Think of it as the next step in Material Design, which has been used to bring a unified look across all of Google’s products (think how Inbox looks the same on mobile or the web). If Google can more deeply tie your search data, messages, and other info to interact between the web  and Android it makes the latter just that more powerful.
The code hints at more direct social network sharing capabilities. The icons are similar to those used on Google Glass, so all those news alerts, TV suggestions, and other cards that pop up could one day be quickly shared to your favorite network.
The lock screen also gets attention, with some kind of interaction for headsets, devices like Glass, or just more voice commands. You can already use the “Okay Google” command without unlocking the phone, but Google clearly has plans for building in more capabilities here. The code indicates that similar to how the Moto X reads aloud information, your phone may be able to read to you key notifications.
One feature that’s already in place is the way the Google Now Launcher will now hang around in the foreground when you’re interacting with certain apps. This could vary, of course, depending on your specific device’s user interface. But it’s a better visual cue for what task you were working on.
Another item I’m rooting for is the capability to copy text over from your browser to your phone. Pushbullet recently added a feature like this, but it would be great to have it as a native Android feature. The code Android Police found offers some good evidence, so let’s hope it shows up eventually.

No matter which of these pan out, you’re likely to see a lot more Google Now interaction in the future of Android. We’ll keep an eye out for such features should they ever materialize.

Source: www.pcworld.com

Protecting yourself on social networks

January 15th, 2015 | Edited by | software

Jan
15

We all love to spend time (some would say waste time) fooling around on Facebook, Twitter, and other services. We also use these sites for serious, professional reasons. But like almost everything else on the Internet, they’re inherently dangerous. Hackers can use social media to discover your private information and to deliver spam or malware. You can be stalked and bullied through social media. It can ruin your reputation, your career, and your life.
So you need to protect yourself. Follow these rules and your online social life won’t become anti-social.

istock

Protect your account

Of course, you should never give anyone else your password to a social network. And you shouldn’t let them steal it, either. Use a long, strong password containing upper- and lowercase letters, numbers, and punctuation. And use a unique password for every site.
If you can’t remember all of those long and complex passwords, install a password manager onto your computer, tablet, and phone. Many of them are cross-platform.
But don’t depend on just the password. Most sites offer some form of two-step authentication, which requires you to prove your identity using both a password and an external factor, such as a text sent to your smartphone.

Be careful about what you post

Sharing too much personal information can cause considerable harm. If you let your social media network know that you’re on vacation, someone may take that as an invitation to burgle your house. Your physical address, your phone number, and even your birthday can be used against you by an identity thief.
The wrong post can also hurt an important relationship or a prospective job. Photos of you drinking or with your arms around the wrong person can create conflicts and make you appear immature or irresponsible.
Control who can see what on a social network; some posts may be for everybody, others for friends, and still others for only very good friends.
If you use a social network, learn its privacy settings. The links below will take you to the various services’ privacy pages.

Don’t fall victim to cyberbullies

You don’t have to be a teenager, or the parent of one, to worry about cyberbullying. According to a recent Pew Research Center report, “Fully 73% of adult internet users have seen someone be harassed in some way online and 40% have personally experienced it.”
Cyberbullying can range from childish insults to rape and death threats. A great many attacks have been aimed at feminist activists, as the recent GamerGate campaignillustrated.
If you’re caught in some troll’s crosshairs, do not retaliate. Keep a record of every attack. Depending on the nature of the attacks, you may need to notify your employer, the social network involved, and possibly the police.
Visit the Cyberbullying Research Center for more detailed advice.

Keep your eyes out for scams

You’ve probably already heard about social engineering in email, where a cybercriminal or organization manipulates you into providing personal information. Not surprisingly, you can find it in social networks, too.
Here’s a relatively harmless example: If you’ve spent any time on Facebook, you’ve probably seen items on your newsfeed like “I got Mick Jagger! Which rock star are you?” Fill in the questionnaire, and some company now knows something about your tastes. In the wrong hands, that information can be used against you.
More serious scams can trick you into giving away your credit card number or password. Some will download malware (see below). Keep an eye out for offers of free stuff, celebrity secrets, promises to add thousands of Twitter followers, or services that can tell you if old flames have viewed your profile.
If something smells fishy, assume someone is phishing.

Make sure your computer or device is protected

Social networks constitute one more path for malware to make its way to your computer or device. If you’re using social media, keep a good, up-to-date antivirus program running at all times.
The best programs offer tools specific to social networks. For instance, Bitdefender Total Security uses special filters to look for and stop social network-specific attacks and warn of potential fraud.

Social networks help you keep up with your friends and promote your career. But without the right precautions, they can lead to disaster.

Source: www.pcworld.com

Page 7 of 16« First...56789...Last »