Monday, December 29, 2014

Top Tips For Making Your Phone Battery Last Longer

If you’re anything like us your phone is usually more loyal than your shadow. We check it first thing when we wake, read the news, glance through our emails. Then we head to work, drowning out the familiar public transport sounds with music or podcasts, maybe sending a text or two between tunnels. For the next eight hours its texts, emails and calls, until it’s time to finish when we go to plug our headphones in and… oh… dead battery.

The current generation of mobile phones are improving, but in 2013 your little appy friend is going to need a top up in the middle of the day, else it’s awkwardly avoiding commuter eye contact and the repetitive drone of “Mind the gap” in 30 degree heat all the way home. There’s not much to solve that until all phones pack a battery like the Motorla Razr HD (which can almost survive a 12-hour day), but that doesn’t mean there aren’t things you can do to help get the most out of your smartphone.

1) Dim the screen – Your brand new 6-inch, billion pixel screen may let you read the BBC in eye-blistering colour and beauty, but it’s almost certainly the reason that you have to keep a charger nearby at all times. Sift through your display settings for a way to turn it down. If there’s an auto-brightness option it’s worth trialling for a while, but some people find that it actually drains even more battery. Though not much can help you if the sun is relentlessly beating down on your screen.
wifi 
2) Turn off Bluetooth and WiFi – these two wireless technologies are fantastic for making the most out of Starbucks’ free internet whilst chatting away and slurping a drink. But when you’re not using them they’re just melting your battery away faster than your Mocha Frappuccino in July. Most phones have a quick toggle option, so switch those two off when you don’t need them.

3) Ditch the sensors – let’s take as an example the Samsung Galaxy S4, but this goes to some degree to all phones. Yes you can raise it to magically dial someone, yes it can automatically scroll down a page by watching your eyeballs, and yes it can sense your body temperature and lower it to that of a cool mist (It can’t? Oh, sorry). But all these sensors constantly monitoring a million environmental factors aren’t being powered by their own impressiveness. Stick to manually scrolling, dialling or whatever, and your phone might last a little longer.

4) Reduce the updates – it’s really tempting with our current level of connectivity to want to be notified the instant someone retweets your company’s latest offer. But do you really need a pop up to tell you it’s currently 2 degrees warmer in London than it was 30 minutes ago? It may not seem like much but every time your phone does that it draws power from all over. If it can wait until you get to your computer, maybe trying letting it?
temp 

5) Keep it cool – I know, in the middle of summer that sounds a tad ridiculous. But when your phone gets warm it actually drains the battery a lot faster than it otherwise would. So when your phone is stuck in your pocket, jammed against your radiating thigh on a crowded greenhouse of a bus it’s going to die a lot sooner than if it was in your bag. Avoid letting it overheat and it might even make it to tea time.

Monday, December 22, 2014

Phasing Out Windows XP & Server 2003

Phasing Out Windows XP & Server 2003

 

On April 8th 2014 Microsoft will stop supporting Windows XP and Server 2003. For those of you still working with those faithful old operating systems, this may come as a surprise, but from that date, there will be no further updates and no more assistance from Microsoft.

Why?

Software companies can’t continue to support their products forever. At some point keeping decades-old software protected against increasingly smarter hackers, for the tiny proportion of people still using it becomes untenable.
Microsoft guarantee continued support and service for a minimum of 10 years. It may not seem like it (and you might want to sit down for a moment) but Windows XP was launched in 2001.

What Does This Mean?

From the 8th April 2014 Microsoft will issue no more updates to the following operating systems:
1)  Windows XP (for PCs)
2)  Windows Server 2003  (for servers)
3)  Microsoft Office 2003 (Word, PowerPoint, Excel etc.)
That includes security fixes and updates – any new vulnerabilities and security holes that are discovered will not be fixed.
As a result, any machines still running these operating systems will be under serious threat. If you’re not sure what version of Windows your PC is running click here to find out.
If your business is still running computers with Windows XP, servers with Server 2003, or you’re using Office 2003 (Word, PowerPoint, Excel etc.), we highly recommend upgrading, to ensure that you’re up to date and protected from future threats.

What To Do Next?
Don’t panic, we’re here to help!
Migrating to newer operating systems is relatively simple, but can take a while. Whether you want to upgrade to Windows 7 or 8, or you want to move to something completely different, give us a call on 9891011610 and one of our engineers will be happy to have a chat with you. Alternatively send us an email at computerannexe@hotmail.com and we’ll get back to you.

 

Thursday, December 11, 2014

What is a Wireless Network?

What is a Wireless Network?

 A wireless network is very similar to the wired network in that all the same pieces are still required, a wireless NIC, Access Point (similar to a wired network Ethernet Switch) and a wireless router. The only thing that's missing is the cables. 

First you will need to determine if your desktop or Laptop PC already has a wireless NIC built in. Again, check your users guide to confirm this. Once your wireless NIC is installed you will need to configure the SSID (service set identifier) on each of the PC's to use the same name. Also, you need to make sure all the wireless NICs are configured to be on the same channel and set levels of encryption if desired. Your wireless access point or router should come with detailed explanation of how to configure the SSID and security features such asaccess lists. Many of today's wireless routers come with the access point functionality built right in
 

Computer Annexe | Computer repair and IT Consultant

Computer Annexe | Computer repair and IT Consultant

Sunday, November 30, 2014

How to Protect your Privacy on Social Media

How to Protect your Privacy on Social Media

Notions of privacy in the digital age are permanently up for debate. Some say it’s impossible to maintain privacy when everything is posted on Facebook; others say it’s up to the networks to afford us control over our content. Social networks like Ello have accepted the challenge of finding a new way, one that allows us to share every moment of our lives, but only with select people, and definitely not with advertisers.
Until this is perfected it’s important to understand how to control your privacy online. Let’s take a look at 4 of the big social networks.

Facebook

The social media superpower has come under the most scrutiny regarding its privacy and data policies.
Plus apparently it's controlled by a dinosaur so you know it's secure.
As a result, Facebook has overhauled its privacy settings, making them as simple to control as possible.
The Privacy Check-up lets you control who can see your posts in future, which apps can publish to your timeline, which personal details are publicly viewable, and which are locked down.
This won’t lock down older posts; to do that we’ll need to go a bit futher – click ‘See More Settings’ in the Privacy panel.
facebook-timelineTimeline & Tagging Settings allows you to control what other people can and can’t post to your timeline. It’ll also let you manage whether or not people can tag you in things without your permission. There’s a handy feature that lets you see how others view your profile, so you can make sure your selected settings are having the desired effect.
Blocking lets you simply block invitations from specific people, apps, pages and events, affording you a blanket layer of protection against particularly stubborn spammers.
Apps allows you to control what data your apps can access, and importantly, whether or not they can post on your behalf.
For a more in-depth walkthrough of Facebook’s controls, check out Gizmodo’s complete guide.

Twitter

There’s a few privacy features available on Twitter, but the most obvious is whether your Tweets are protected or public. If they’re protected people will need to follow you to see anything, and you’ll need to approve each follower request individually.
twitter-privacy
The rest of the settings can be found by clicking on your profile photo in the top left and selecting ‘Settings’.
From here you can manage who can tag you in Tweets, whether location data is included, how people can find you (by email or phone number) as well as your options with regards to tailored adverts and promotional content.

LinkedIn

You’ll find LinkedIn’s privacy menu lurking in the top right hand corner of the website, hiding in the dropdown reached by clicking your profile picture.
Here, under Privacy & Settings you’ll find 4 tabs to control your profile: ‘Profile’, ‘Communications’, ‘Groups, Companies & Applications’ and ‘Account’.
linkedin-privacyProfile includes various privacy settings to control who can see what you post, your activity feed, your connections, and overall control about the visibility of your profile to strangers. As a side note, you can also control other social network interactions, and manage your profile details from here.
Communications allows you to set who can contact you or invite you to groups. You can decide how often to receive LinkedIn’s emails, and manage push notifications for your mobile devices.
Groups, Companies & Applications gives control over which groups you’re members of, and to reach settings for emails from these three.
Finally, Account is used for more mainstream features, such as profile visbility (again), email & password and homepage controls. Interestingly the Account tab also lets you request a download of your LinkedIn data. Under a link called ‘manage security settings, there’s also the option for two-step verification (which we’d recommend).

Instagram

Instagram is as simple as they come – either everything is public or everything is private. If it’s the latter people will need to be following you (and also approved by you to do so) in order to see anything associated with your account.
You’ll need to head to the mobile app to manage these settings, but once there just hit ‘Posts are private‘.

Saturday, November 22, 2014

Delhi Computer Service

We are your IT Department
Since our hunt, we have been occupied with offering IT Service , Networking arrangement, Laptop Repairing, Laptop Spare Parts, Branded Desktop, Assembled Desktops, Branded Printers, Desktop Repairing, APC UPS repair, remote arrangement, Hardware Accessories and APC UPS according to the necessities of our customers. Notwithstanding these, we likewise offer Computer Repair Services, Computer Spare Parts, Computer UPS, to our customers based over the worldwide. Acknowledged for their more extended administration life and phenomenal execution, our extent indulges the necessities of different Offices, Education Institutes, Broadcasting Center, Banks, Reservation Counters, Commercial Establishments and Government Sector.
Our relationship with brands like Molex & D-Link for organized system cabling arrangements, Sonicwall for Network Security Solutions and Dell, HP, Lenovo, for IT supplies’ similar to Servers, Desktops & Laptops and so forth are a couple of steps towards guaranteeing the achievement of our vision.these can likewise be offered with different gathering choices according to the necessities of our regarded customers.
We have utilized focused experts, who with their incredible deliberations have empowered us to stay at standard with our rivals. They work frequently  to comprehend the needs and requests of customers and likewise find suitable suppliers and sellers. Our colleagues additionally work in close co-appointment with one another so that customer’s particular prerequisite is met viably and inside the stipulated time span.

Tuesday, September 30, 2014

Stay safe with iCloud



You’ve most likely detected by currently that some celebrity photos were allegedly taken from Apple’s iCloud by a hacker. It had been according that the hacker(s) found a vulnerability with iCloud and was ready to hack into it and steal photos that some celebrities had wittingly or inadvertently backed-up.
Apple confirmed it found no security breach however that some accounts had been compromised. Though it’s most unlikely that your knowledge can be taken from your iPad/iPhone/Mac, its price taking the time to create certain you’re safe.
So here square measure some tips for keeping your stuff safe:

Use sturdy passwords
 
Access to Apple’s iCloud needs a watchword therefore build its sturdy. Minimum of fourteen characters and a mixture of upper/lower case and numbers can build it a watchword that’s arduous to crack. Don’t use it for all of your on-line accounts although as a result of if somebody was to induce hold of it, they might access everything of yours on-line. To assist you retain track of all of your passwords, use a watchword manager.

 Review what you backup
 
Go to settings on your device and choose iCloud. Here you'll activate and off what you wish insured. It’d be that you just select to not have your photos insured (but if you decide on to change this off confirm you back them informed associate external disk drive or with iTunes). Or even you’d rather keep a copy your photos however not your contacts or mail – it’s your selection.

 Delete any compromising pictures
 
If you’ve got some photos on your iPhone or iPad that you just don’t need others to envision, you’ll got to delete them in 3 places. The primary is that the ‘Cameral Roll’ that is wherever photos square measure keep on the device itself. The second is ‘My icon Stream’ that is actually what’s insured in iCloud. Third, if you don’t need to stay the photos in the slightest degree, visit your Mack and delete the photos from iPhoto. Deleting from these 3 places can take away your photos from your iPhone/iPad, iCloud and your laptop.
There is no reason to be frightened of iCloud or different cloud storage. They’re terribly helpful for keeping your documents and knowledge insured and accessible where you've got web. There’s a way bigger probability that your device be physically taken than your cloud storage being hacked, however it’s perpetually necessary to remain safe on-line. Follow these 3 tips and you’ll be simply fine.

Monday, September 22, 2014

Total IT Service Support



We are your IT department. We’re a team of friendly engineers based in Delhi, and we love
technology. We realize you might not, and that’s why we’re here to help.
The main areas of technology we cover include:
  • IT Support 
    On call 24-hours a day: whatever your IT problem is, we’ll sort it
  • Consulting
    What technology to buy, where to buy it, and how to get it working
  • Websites Design & CRM’s
    From SEO to CRM’s we aim to help you make the right decisions
Technology should make small businesses more money, not waste their time. Whether it’s a crashed computer that’s holding you up, you’re in need of a whole new network or some staff training, we offer you peace of mind.
Contact: 9891011610 and 9810909321