How to Copy ROM zip file to the freshly wiped device

| 0 comments |

Have you ever been in a situation where you mistakenly (or not) wiped the content of the internal storage (including system partition and virtual SD card) on your phone or tablet and unfortunately it doesnt support external storage? Now you cant flash desired custom ROM because you removed it and the device cant be booted due to wiped system partition. Dont worry - its very easy to fix!

Here are the steps you need to follow to copy the correct rom.zip package to your internal storage:
  1. Download this mini-sdk package and extract it to c:mini-sdk
  2. Rename the custom ROM package you want to flash to "rom.zip" and copy it to c:mini-sdk
  3. Connect your device to the PC
  4. Boot your device in recovery mode
  5. Open a command prompt on the PC (cmd.exe), type and confirm each command with ENTER:
  6. cd /d c:mini-sdk
  7. adb shell
  8. mount /data (error might mean that /data partition is already mounted)
  9. on Android 4.2 and above: mkdir -p /data/media/0
  10. on Android 4.1.2 and below: mkdir -p /data/media
  11. exit
  12. on Android 4.2 and above: adb push rom.zip /data/media/0
  13. on Android 4.1.2 and below: adb push rom.zip /data/media
  14. Wait for a few minutes until the file is copied. It will looks like command shell is not responding, but that means its still copying. Wait patiently until youll see blinking cursor again.
  15. Depends on your custom recovery, use the navigation keys to flash the custom rom.zip package in a typical way you used to flash custom ROMs. It should be on your internal storage now. Done!
Have any questions or comments? Feel free to share! Also, if you like this article, please use media sharing buttons (Twitter, G+, Facebook) below this post!
Read More..

Server rooms totally eclipsed by the cloud

| 0 comments |

Every day, thousands of companies switch off their on-premise servers and move to the cloud. And more than five million businesses around the world have taken that shift to the cloud by moving to Google Apps, including Woolworths, BBVA, Roche and PwC.

But one big question remains unanswered: what’s going to happen to all those dark, windowless little server rooms?

We teamed up with PDM International, an interior design consultancy, to propose a few ideas for how those rooms could be used today. This is what they envisioned.
Karaoke at lunch anyone?


The salad bar just got real.


Play ALL the games!




The servers are gone. It’s time to reclaim the office.

Read More..

Optimizing for Bandwidth on Apache and Nginx

| 0 comments |
This post originally appeared on Webmaster Central
by Jeff Kaufman, Make the Web Fast


Webmaster level: advanced
Everyone wants to use less bandwidth: hosts want lower bills, mobile users want to stay under their limits, and no one wants to wait for unnecessary bytes. The web is full of opportunities to save bandwidth: pages served without gzip, stylesheets and JavaScript served unminified, and unoptimized images, just to name a few.
So why isnt the web already optimized for bandwidth? If these savings are good for everyone then why havent they been fixed yet? Mostly its just been too much hassle. Web designers are encouraged to "save for web" when exporting their artwork, but they dont always remember.  JavaScript programmers dont like working with minified code because it makes debugging harder. You can set up a custom pipeline that makes sure each of these optimizations is applied to your site every time as part of your development or deployment process, but thats a lot of work.

An easy solution for web users is to use an optimizing proxy, like Chromes. When users opt into this service their HTTP traffic goes via Googles proxy, which optimizes their page loads and cuts bandwidth usage by 50%.  While this is great for these users, its limited to people using Chrome who turn the feature on and it cant optimize HTTPS traffic.

With Optimize for Bandwidth, the PageSpeed team is bringing this same technology to webmasters so that everyone can benefit: users of other browsers, secure sites, desktop users, and site owners who want to bring down their outbound traffic bills. Just install the PageSpeed module on your Apache or Nginx server [1], turn on Optimize for Bandwidth in your configuration, and PageSpeed will do the rest.

If you later decide youre interested in PageSpeeds more advanced optimizations, from cache extension and inlining to the more aggressive image lazyloading and defer JavaScript, its just a matter of enabling them in your PageSpeed configuration.

Learn more about installing PageSpeed or enabling Optimize for Bandwidth.

[1] If youre using a different web server, consider running PageSpeed on an Apache or Nginx proxy.  And its all open source, with porting efforts underway for IIS, ATS, and others.

Posted by Mano Marks, Google Developer Platform Team
Read More..

Install Ubuntu GNOME 15 10 on Windows 10 VirtualBox

| 0 comments |
Ubuntu GNOME is an official flavor of Ubuntu, featuring the GNOME desktop environment. This video show how to install Ubuntu GNOME 15.10 on Windows 10 with VirtualBox. (Basically, its same as Install Ubuntu 15.10 on Windows 10/VirtualBox).


Download Ubuntu GNOME 15.10 and install on VirtualBox.


Insert Guest Additions CD Image to improve display resolution.


Create shared folder between guest Ubuntu GNOME 15.10 and host Windows 10.

To share folder, setup Shared Folder in VirtualBox Setting of the guest, assign a machine folder in host. Then run the command in guest Ubuntu Linux
$ sudo mount -t vboxsf vbShare mntShare

where:
vbShare is the shared folder in host, and assigned as Shared Folder in VirtualBox Setting of the guest.
mntShare is the folder in guest Ubuntu Linux.


remark@2015-11-14:
Starting with version 4.0, VirtualBox can mount shared folders automatically. This post show how to create share folder between host Windows (D:vbShare) and guest Ubuntu Linux (/media/sf_vbShare), and add current user to the vboxsf group.

Read More..

Learn about Vulkan and 3D Graphics Coffee with Shannon Woods

| 0 comments |

Posted by, Laurence Moroney, Developer Advocate

Vulkan is the new generation, open standard API for efficient access to graphics and compute on modern GPUs. In this episode of Coffee with a Googler, Laurence meets with Shannon Woods, a Technical Program Manager in Google’s rendering teams to talk about plumbing code from your app down to the GPU!

Historically mobile apps have used Open GL ES to communicate with the GPU, but the hardware and API have evolved separately, impacting efficiency. Vulkan has been designed to organize the graphics space in much the same way as the underlying GPU, so it can be more efficient.

Android will support both Open GL ES and Vulkan, so developers can choose which API is right for them — and with Vulkan, precise control over the commands executed by the GPU allows for great optimization, as well as parallelization of code.

We also learn about the famous Utah Teapot, a standard reference object for 3D modellers, and how it is found in popular culture -- such as showing up in most animated movies. Have you spotted it?

Watch this episode for some great guidance from Shannon on what you need to do as a developer to prepare for Vulkan, and how using could be of benefit to your apps!


Read More..

NoHacked How to avoid being the target of hackers

| 0 comments |

Originally posted by the Webmaster Central Blog.

If you publish anything online, one of your top priorities should be security. Getting hacked can negatively affect your online reputation and result in loss of critical and private data. Over the past year Google has noticed a 180% increase in the number of sites getting hacked. While we are working hard to combat this hacked trend, there are steps you can take to protect your content on the web.

This week, Google Webmasters has launched a second #NoHacked campaign. We’ll be focusing on how to protect your site from hacking and give you better insight into how some of these hacking campaigns work. You can follow along with #NoHacked on Twitter and Google+. We’ll also be wrapping up with a Google Hangout focused on security where you can ask our security experts questions.

We’re kicking off the campaign with some basic tips on how to keep your site safe on the web.

1. Strengthen your account security

Creating a password that’s difficult to guess or crack is essential to protecting your site. For example, your password might contain a mixture of letters, numbers, symbols, or be a passphrase. Password length is important. The longer your password, the harder it will be to guess. There are many resources on the web that can test how strong your password is. Testing a similar password to yours (never enter your actual password on other sites) can give you an idea of how strong your password is.

Also, it’s important to avoid reusing passwords across services. Attackers often try known username and password combinations obtained from leaked password lists or hacked services to compromise as many accounts as possible.

You should also turn on 2-Factor Authentication for accounts that offer this service. This can greatly increase your account’s security and protect you from a variety of account attacks. We’ll be talking more about the benefits of 2-Factor Authentication in two weeks.

2. Keep your site’s software updated

One of the most common ways for a hacker to compromise your site is through insecure software on your site. Be sure to periodically check your site for any outdated software, especially updates that patch security holes. If you use a web server like Apache, nginx or commercial web server software, make sure you keep your web server software patched. If you use a Content Management System (CMS) or any plug-ins or add-ons on your site, make sure to keep these tools updated with new releases. Also, sign up to the security announcement lists for your web server software and your CMS if you use one. Consider completely removing any add-ons or software that you dont need on your website -- aside from creating possible risks, they also might slow down the performance of your site.

3. Research how your hosting provider handles security issues

Your hosting provider’s policy for security and cleaning up hacked sites is in an important factor to consider when choosing a hosting provider. If you use a hosting provider, contact them to see if they offer on-demand support to clean up site-specific problems. You can also check online reviews to see if they have a track record of helping users with compromised sites clean up their hacked content.

If you control your own server or use Virtual Private Server (VPS) services, make sure that you’re prepared to handle any security issues that might arise. Server administration is very complex, and one of the core tasks of a server administrator is making sure your web server and content management software is patched and up to date. If you dont have a compelling reason to do your own server administration, you might find it well worth your while to see if your hosting provider offers a managed services option.

4. Use Google tools to stay informed of potential hacked content on your site

It’s important to have tools that can help you proactively monitor your site.The sooner you can find out about a compromise, the sooner you can work on fixing your site.

We recommend you sign up for Search Console if you haven’t already. Search Console is Google’s way of communicating with you about issues on your site including if we have detected hacked content. You can also set up Google Alerts on your site to notify you if there are any suspicious results for your site. For example, if you run a site selling pet accessories called www.example.com, you can set up an alert for [site:example.com cheap software] to alert you if any hacked content about cheap software suddenly starts appearing on your site. You can set up multiple alerts for your site for different spammy terms. If you’re unsure what spammy terms to use, you can use Google to search for common spammy terms.

We hope these tips will keep your site safe on the web. Be sure to follow our social campaigns and share any tips or tricks you might have about staying safe on the web with the #NoHacked hashtag.

If you have any additional questions, you can post in the Webmaster Help Forums where a community of webmasters can help answer your questions. You can also join our Hangout on Air about Security on August 26th.

Posted by Eric Kuan, Webmaster Relations Specialist and Yuan Niu, Webspam Analyst

Read More..

Episode 38 Fingerprint

| 0 comments |
In this, er, impressive episode, Tor and Chet talk with Jim Miller from the Android System UI team. We mostly chat about the new fingerprint feature in Android 6 Marshmallow (aka, "Nexus Imprint"). But we also talk about other things like Keyguard, Setup Wizard, widgets, notifications, and greasy chicken parts.

"UIs, like fingerprints, are all unique."

Subscribe to the podcast feed or download the audio file directly.

Relevant Links

Fingerprint Authentication
FingerprintManager
Fingerprint Dialog Example
Fingerprint and Payments APIs (Video)

Tor: google.com/+TorNorbye, @tornorbye
Chet: google.com/+ChetHaase, @chethaase

Thanks to continued tolerance and support by our audio engineer, Bryan Gordon.
Read More..