Friday 30 January 2015

Google Apps for Work

What is Google Apps?
Google Apps is a cloud-based productivity suite that helps teams communicate, collaborate and get things done from anywhere and on any device. It's simple to set up, use and manage, so your business can focus on what really matters.
Millions of organisations around the world count on Google Apps for professional email, file storage, video meetings, online calendars, document editing and more.
Watch a video or find out more here.
These are some highlights:
Business email for your domain
Looking professional matters, and that means communicating as you@yourcompany.com. Gmail’s simple, powerful features help you build your brand while getting more done.
Access from any location or device
Check emails, share files, edit documents, hold video meetings and more, whether you’re at work, at home or in transit. You can pick up where you left off from a computer, tablet or phone.
Enterprise-level management tools
Robust admin settings give you total command over users, devices, security and more. Your data always belongs to you, and it goes with you, if you switch solutions.
Start free trial

Thursday 15 January 2015

How to Resolve "Guru Meditation" issue in Oracle Virtual Box

How to Resolve "Guru Meditation" error in Oracle Virtual Box
Virtual Machines are of great advantage to the Computer Professionals. Because it saves money, time and one can try all sorts of experiment in VMs.
VMware is one of the most popular Application that is used to work with the Virtual Images.
These days, ORACLE Virtual Box is also becoming as most commonly used application for working with Virtual Images.
This might be working well in the initial stage, but as your host operating systems memory gets low, there comes a problem.
One might receive an error all of a sudden that says something like this "Guru Meditation" and it wont let you log into the virtual machine.

Here are the steps to resolve this.
You can try these two available methods.
Method 1:
Click on System Tab in the Oracle Virtual Manager

Reduce the Base Memory to 2048MB.
Now, Close all the applications, restart your system. It should work. If not follow the second method.

Method 2:
Make sure to try the method 1 before doing this.
Open Run,type %temp%, delete all the files. You will not be able to delete few files, press skip for those files.
Open Task Manager, click on the Details tab.
Click on the Memory Column to sort in descending order so that the program that is consuming more memory is listed on the first.
Close any programs that is consuming more memory. Be cautious about closing the program that you are not sure of why it is running.
This should fix the problem.

Thursday 8 January 2015

Tricks to book IRCTC Tatkal Tickets Fast

This doesn't involves any special magical code or steps to book your tickets in a fast manner.
We just have to take advantage of one of the feature called "AutoFill" available in the browsers.
I prefer Google Chrome to be used for booking IRCTC Tickets.
Fortunately, IRCTC have upgraded their system and hence slowness of the IRCTC website is a myth these days.

So let's get straight to the point.
Step 1: Open Google Chrome.  Make sure you are not in the incognito mode.
Step 2: Login to IRCTC using your credentials before 9.50AM
Step 3:Enter FROM,TO and DOJ details. Click on General tab.
Step 4:Click on the Preferred class and enter all the passenger details.
Step 5:After entering all the passenger details, click on REPLAN.
Step 6. Now wait till the 10.00AM i.e when TATKAL opens.
Step 7: As soon as you get BOOK link on the desired train, click and now you will see the passenger details present there already. Just select the proof type and waste time only in entering the Proof Details.
If you don't see the names present there automatically, just type the first few letters of the name and it will auto fill the remaining letters.
Step 8. And yes!It saves a lot of typing time and hence your chance of getting the ticket confirmed is more.

By the above method, you will not find the PROOF DETAILS automatically.
In case if you want this proof details also to be filled automatically,
You can follow the steps. But this should be done two days before the desired Date of Journey.
For ex, if you are planning to travel on 10th of the month.
Login to your account on 8th and select tatkal quota for the same train. Click BOOK under date 9.
Enter all the passenger details including the proof details like PAN CARD NO, DL No, etc. and once it is done click on Replan. Now your proof details should have been stored in browser's cache.
Hence on 9th, just type the first few letters of the proof and this will give you the remaining characters.

Have a successful Tatkal Booking.Enjoy!!

PS:This will not work if the AUTOFILL feature is disabled or if the CACHE is cleared.

Tuesday 6 January 2015

How to resolve Write Protected Error in Pen Drives and HDD

This might be caused due to the internal HW problems. If this is not the case,then you are lucky and it can be resolved.
Here is what you need to do.

Step 1:
Click here to download the required tool.
This will automatically download the required Tool for the low level format.

Step 2:
Insert your Pendrive to USB3 for faster results.

Step 3:
Right click on the downloaded exe file and select Run as Administrator.
It wont work if you dont have a admin Privilege

Step 4:
Now select the device (i.e your pen drive). Be caution to select the right device. Otherwise you might suffer unintentional data loss as this is a complete format tool.

Step 5:
Never select Quick Format as this might look like solving your problem sooner, but in short span you will have the same problem again.
Hence dont check any options.
Click START. Sit back and Relax.
Depending on the size of the pen drive it will take time.

Warning!:Recovering the data from the formatted USB is almost Impossible.Hence be selective.

Monday 5 January 2015

How to Get Rid of Shortcut Virus?

Have you ever noticed your folders suddenly disappearing in the Pen Drive or HDD which you have copied recently.
This happens because your folder might have been changed to "System Hidden" folders.
Well!! People call it a short cut virus which hides your folder automatically and creates a short-cut which is obviously inaccessible.
This happens mostly in the pen-drives.
Before starting, just to make sure that it is really short-cut virus,do the following.
Open MyComputer-->Tools-->View
Click on View tab. Check Show hidden folders option and Uncheck "Hide Protected Operating..."


Now press ok and navigate to the parent folder of the hidden one.
If you are able to see your folder like a hidden one, then you are lucky that you can recover it by the following method.

So here is how you can get rid of it.

Step 1: Detect the driver letter for the pen drive. For example lets assume it is E:

Step 2: Open Run and type cmd and press enter.

Step 3: Copy the path of the folder(say "E:\Parent Folder").
            Change the drive accordingly by typing E: and press enter.
            Type "cd pathofthefolder" and  press enter.
            In this case it should be "cd E:\Parent Folder".

Step 4:  Now type the following command to revoke the attribute of system hidden folders.
             "attrib -h -s -r test"

Note: test is the folder name which turned into a shortcut.
After pressing enter you should be able to see the folder. If not refresh the page.
Below SS should help you understand it more clearly.
Shortcut Virus Screen Shot


Monday 22 December 2014

WITHDRAWING MONEY WITH GOOGLE GLASS

Google Glass not only just alarm privacy activists. Rather, they also enable applications increasing data protection. Computer scientists demonstrate this by combining Google Glass with cryptography methods and novel techniques of image processing to withdraw money at cash machines or to read encrypted documents.
          IT experts celebrate as a new milestone is that it makes privacy groups skeptical. So far, few people have access to the prototype to test how it can be used in daily life.
WHAT MAKES IT POSSIBLE?
The futuristic-looking device consists of a glasses frame on which a camera and a mini computer are installed. It depicts information in the user's field of vision via a glass prism that is installed at the front end of the right temple.
Step 1: The customer identifies himself to the cash machine.
Step 2: It uses the key to encrypt the one-way personal identification number (PIN) and seals it additionally with a "digital signature," the digital counterpart of the conventional signature.
Step 3: The result shows up on the screen as a black-and-white pattern, a so-called QR code.
Step 4: The PIN that is hidden below is only visible for the identified wearer of the glasses.
Step 5: Google Glass decrypts it and shows it in the wearer's field of vision.
Although the process occurs in public, nobody is able to spy on the PIN.
CANNOT INTRUDE:
To spy on the PIN while it is being entered would also be useless, since the PIN is re-generated each time the customer uses the cash machine. An attacker also wearing a Google Glass is not able to spy on the process, either. The digital signature guarantees that no assailant is able to intrude between the customer and the cash machine as during the so-called "skimming."
SEVERAL PERSONS WITH GOOGL GLASS:
Only the customer is able to decrypt the encryption by the public key with his secret key. As long as this is safely stored on the Google Glass, his money is also safe.
 Several persons all wearing Google Glass can read the same document with encrypted text at the same time, but in their fields of vision they can only see the text passages that are intended for them.
OTHER USAGE:
This could be interesting to use in large companies or agencies that are collecting information in one document, but do not want to show all parts to everybody. Google Glass is expected to enter the American market this year.

SUPER FAST 5G

Collaboration between NEC Electronics Samsung and several academic centers in China and Iran, is investigating how software-defined cellular networking might be used to give smart phone users the next generation of super-superfast broadband, 5G. International Journal of Communication Networks and Distributed Systems provide these details.
CURRENT TECHNOLOGY:
 The fourth generation of mobile phone connection technology, 4G is as far as it has been adopted provides broadband-type connectivity for enabled devices such as smart phones, tablet computers, laptops and other gadgets.
STANDARDS ADOPTED:
  •  The Mobile WiMAX standard
  •   Long Term Evolution (LTE) standard

Peak speeds were set in the standards at 100 megabits per second (Mbit/s) for mobile users and ten times that for static, domestic 5G users, 1 gigabit per second. 100 Mbits/s is three times faster than the earlier 3G system but users commonly do not see data transfer at such high rates, downloads are usually at best 10 Mbits/s.
DOWNLOADABLE SPEED:
As yet there is no single standard for 5G although various systems are being touted based on rebuilding the cellular networks to be super-efficient and exploiting different frequencies with their capacity for greater data rates. The hope is to be able to achieve download speeds of perhaps 10 Gbits/s.
FEATURES:
Ming Lei of Samsung Research and Development Institute China, Lei Jiang of  NEC Laboratories, both in Beijing are working with colleagues at the University of Electronic Science and Technology of China. They have assessed the latest developments aimed at 5G systems and have proposed their own novel end-to-end (E2E) software-defined cellular network (SDCN) architecture. They  offers
             Flexibility
 Scalability
 Agility
 Efficiency
 Profitable
OTHER PROMISING TECHNOLOGIES:
They are currently building a demonstration system that will allow them to utilise  their architecture for 5G including
·        Cloud computing
·        Network virtualisation
·        Network functions virtualisation
·        Dynamic service chaining
MERITS:
)     Overcome bandwidth shortage problems
)    Improve quality of service so avoiding delays and data loss
)     Reducing the vast number of error-prone network nodes needed