Tips & Tricks: Take Photo with Volume Keys on Android

The best advice I have ever given to my wife; as quoted by my wife herself (not sure if it was a taunt or appreciation, though). On most Android phones, you can easily take a photo just by holding any of the volume keys. Taking a photo with the on-screen virtual button can be a bit cumbersome, especially while taking selfies.

Using volume keys for taking pictures offer a firm grip leading to less distortion. Additionally, if you like shooting selfies with the rear camera, then it will save you from that awkward moment where you pose and try to blindly tap the virtual button without success (been there, done that).

Advertisements

Tech Terms: SDN

SDN is short for software defined networking. Software defined networking (SDN) is an approach to using open protocols, such as OpenFlow, to apply globally aware software control at the edges of the network to access network switches and routers that typically would use closed and proprietary firmware.

Benefits of Software Defined Networking
Software defined networking offers numerous benefits including on-demand provisioning, automated load balancing, streamlined physical infrastructure and the ability to scale network resources in lockstep with application and data needs.

As noted on Enterprise Networking Planet, coupled with the ongoing virtualization of servers and storage, SDN ushers in no less than the completely virtualized data center, where end-to-end compute environments will be deployed and decommissioned on a whim.

SDN Challenges: Legacy Network Infrastructure
Legacy network infrastructure is typically a mix of vendor solutions, platforms and protocol solutions making the ultimate goal of an integrated network ecosystem a difficult process for many organizations. According to Enterprise Networking Planet, it is feasible, though perhaps not optimal, to implement software defined networking on existing physical infrastructure. Today, the enterprise and large customers look to build new SDN infrastructure from the ground up.

Source

Tips & Tricks: Amazon Underground

If you’re a big fan of apps, then you’re going to love this.

Amazon Underground allows you to use apps that you would normally have to pay for, completely free of charge. Just sign up and you’ll get access to a whole load of paid-for apps completely free. Many of the apps also have in app content already there and paid for, too!

Tech Terms: Network Security

Network security is a specialized field in computer networking that involves securing a computer network infrastructure. Network security is typically handled by a network administrator or system administrator who implements the security policy, network software and hardware needed to protect a network and the resources accessed through the network from unauthorized access and also ensure that employees have adequate access to the network and resources to work.

A network security system typically relies on layers of protection and consists of multiple components including networking monitoring and security software in addition to hardware and appliances. All components work together to increase the overall security of the computer network.

Source

Tips & Tricks: OK Google

You know the future has arrived when you can ask your phone questions, and it will find the answers for you.

Android phones are right at home with Google, and the “OK Google” functionality is very useful. You can even set it up to function from any screen. Move into your settings, and go into voice > OK Google. It will ask you to repeat the phrase a few times to recognise your voice, and you can then set when the command will be active. You can make it active on all screens, and ask Google anything you like, at any time.

Tech Terms: TCS

Theoretical computer science (TCS) is a subset of computer science that focuses on the mathematical topics as they relate to practical and modern day computing. A widely accepted view of TCS is the study of algorithms and protocols in modern computing. Many theoretical computer courses aim to provide students with a better understanding of fundamental computational techniques.

General Topics of Study
Studies touch on both theory and algorithms and protocols. Typical TCS courses taught at universities may include some or all of the following topics:

  • algorithm design
  • big data
  • coding theory
  • algorithmic game theory
  • analytics algorithms
  • quantum computing
  • cryptography
  • computational biology
  • randomness in computation
  • machine learning

Theoretical computer science may also be called computer science theory.

Source

Tips & Tricks: Android Data Control

To make sure you don’t get a giant data bill thrown at you at the end of the month, you can now see how much data you’ve been using.

Go into Settings, and then into Data Usage. You’ll have a graph of what you’ve used so far this month, and will even be able to set your own limits. Take control of your data, and (hopefully) never get hit with an increased charge again.

Tech Terms: EMM

Enterprise Mobility Management (EMM) takes a comprehensive approach to securing and managing the use of smartphones, tablets and other mobile devices in enterprise environments.
Companies are faced with a wide variety of security and productivity concerns that stem from the increasing number of mobile devices brought into the workplace environment by employees for use and connectivity on corporate networks (also known as “Bring Your Own Device,” or BYOD), and enterprise mobility management is one holistic strategy for managing these concerns.

A Bevy of Mobile Device Security Acronyms: EMM, MDM, MAM, MIM and MSM
Often deployed in conjunction with mobile device management (MDM), which primarily involves protecting companies against unauthorized access to mobile devices, enterprise mobility management is designed to protect users’ data as well as provide users with tools for working more efficiently and productively while ensuring the security of their devices and the data contained on them.

The Holistic Approach
Enterprise mobility management’s holistic approach to securing and protecting the use of mobile devices may also involve mobile application management (MAM), mobile information management (MIM), mobile content management (MCM) and mobile security management (MSM). To this end, enterprise mobile management may include a combination of security and productivity solutions and services to create a comprehensive mobile device and security management strategy.

Source

Tips & Tricks: Android Power Saving Mode

We’ve all been there. That train has been cancelled, and you’re desperately trying to search for another way to get home while your phone ticks down it’s last few percent.

The Android power saving modes are here to help. If you know it’s going to be a long day, but you need your phone on, you have a selection of modes to help your phone make it all the way through. The most efficient being the option that essentially turns your phone back into a Nokia 3310. It will ring, and receive texts – but that’s about it. Perfect for those unexpectedly lengthy trips home.

Tech Terms: Data Breach

A data breach, also called a security breach, is the phrase used to describe a security issue where the intentional or unintentional release of information takes place. Usually the information is private, confidential or personal information that was given in trust to the organization.

Why Data Breaches Happen
A data breach may occur for a number of reasons. For example, a data breach could be the result of unauthorized acquisition of personal information through employee negligence (i.e., photocopying) to computer hard drives not properly disposed of, to hackers gaining access to data through an exploit or other malicious attack.

Data Breach Notification Laws
Many countries or individual states/provinces have enacted some type of security and data breach notification law. These laws require government agencies and other organizations that collect personal information (including a name combined with SSN, drivers license or ID, account numbers, etc.,) to notify individuals of security breaches.

The exact requirement for notification laws change between places as well as the legal definition of what constitutes a breach, requirements and timing for notice and exemptions. In general if there is a perceived risk as a result of a data breach, the affected individuals and regulating government bodies should be notified.
Data Breach Security Checklist

While there are no specific set of rules to follow, most organizations will create a checklist to ensure a swift response to manage and mitigate a breach.

Webopedia Study Guide SectionThe first step is to create a policy that defines the organization’s definition of a breach, and identify what constitutes a breach, making sure it complies with any legal definitions set forth in your geographical location.
Webopedia Study Guide SectionNext, a plan will identify staff responsibilities and outline how to properly keep records of breach reporting and tracking. The plan should identify management support and approval processes and outline employees responsibilities to standardize behavior.
Webopedia Study Guide SectionLastly, organizations will need to have a breach procedure in place, derived from the plan and policy. This standardizes the responsibilities and actions that are part of the response effort and should identify senior management responsible for enacting the procedures.

The data breach procedure is typically reviewed, tested and enacted as part of an organization’s overall business continuity and disaster recovery procedure. The related links section below offers additional resources to help businesses create checklists and data breach policies.

Source