Hosted productivity suites: Google Apps or Microsoft Office 365?

Microsoft and Google agree that hosted productivity suites offer unique benefits for evolving business needs. Of course the two behemoths traveled very different paths to reach this conclusion, and bring different strengths to their respective offerings. Which one is right you?

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

John Dix, Network World Editor in Chief, sets up the debates and recruits the experts. Contact him with thoughts and ideas, jdix@nww.com.

The experts
Tom Rizzo, senior director of Microsoft Online Services says having online tools that complement existing on-premise productivity suites is a combination that is hard to beat.
Shan Sinha, group product manager, Google Apps for Business argues that Google Apps was built from the ground up as a hosted suite, and having that baked into the service’s DNA makes a real difference.

Google vs. Microsoft: Who’s Winning?

Google and Microsoft are at each other’s throats over everything from patents to Android and Windows Phone market

 

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at actualkey.com

Google and Microsoft are at each other’s throats over Android.
The simmering rivalry between the two tech giants exploded this week, with executives trading barbs on Twitter and blog posts over patents related to mobile technology.

This newest burst of aggression has its roots in a high-stakes auction that took place earlier this year. Microsoft and a handful of other companies submitted a $4.5 billion winning bid for some 6,000 patents and patent applications formerly owned by Nortel. Google wanted the same property, but its own bid of $900 million couldn’t quite seal the deal.

Now Google seems concerned that Microsoft and its consortium partners (which include Apple, not exactly the search-engine giant’s bosom buddy) will use those patents to sue Android manufacturers into the ground. Indeed, Microsoft is rapidly making an industry out of what it claims are Android’s violations of its intellectual property: in addition to squeezing royalties from any number of Android-device manufacturers, the company has filed patent-infringement suits against Motorola (maker of Android-based smartphones and tablets) and Barnes & Noble (which produces the Nook, an Android-based e-reader).

“Microsoft and Apple have always been at each other’s throats, so when they get into bed together, you have to start wondering what’s going on,” David Drummond, Google’s senior vice president and chief legal officer, wrote in an Aug. 3 posting on The Official Google Blog. “Fortunately, the law frowns on the accumulation of dubious patents for anticompetitive means—which means these deals are likely to draw regulatory scrutiny, and this patent bubble will pop.”

He went on to claim that the Justice Department is “looking into whether Microsoft and Apple acquired the Nortel patents for anticompetitive means.”

Microsoft executives felt compelled to fire back.

“Google says we bought Novell patents to keep them from Google,” Brad Smith, Microsoft’s general counsel, wrote in an Aug. 3 Tweet. “Really? We asked them to bid jointly with us. They said no.”

The same day, Frank Shaw, Microsoft’s corporate vice president of corporate communications, also Tweeted: “Free advice for David Drummond—next time check with Kent Walker before you blog.”

He included a link to an Oct. 28 email sent to Brad Smith by Kent Walker, Google’s general counsel, suggesting that “a joint bid wouldn’t be advisable for us on this one.”

Rather than let Microsoft blow a hole beneath the waterline of his tight little narrative, Drummond updated his original post Aug. 4: “If you think about it, it’s obvious why we turned down Microsoft’s offer,” he wrote. A joint acquisition of the patents “that gave all parties a license would have eliminated any protection these patents could offer to Android against attacks from Microsoft and its bidding partners.”

A number of analyst estimates have Android leading the mobile market. According to recent data from Nielsen, for example, Android held 39 percent of the U.S. smartphone market, followed by Apple’s iPhone with 28 percent, RIM with 20 percent, and Microsoft with 9 percent. Similarly, research firm comScore placed Android’s share of the U.S. market at 40.1 percent, followed by Apple with 26.6 percent, RIM with 23.4 percent and Microsoft with 5.8 percent.

Combined with Microsoft CEO Steve Ballmer’s recent admission that Windows Phone’s market share is “very small,” it seems Android is handily winning the mobility wars despite Microsoft’s patent maneuvers. That being said, Microsoft seems to have found a viable source of revenue in its latest string of Android lawsuits and “royalty agreements,” something the company is likely to vigorously push in quarters ahead; Jack Gold, founder and principal analyst of J. Gold Associates, recently theorized that Microsoft’s cash stream from Android royalties could even top that of Windows Phone.

Meanwhile, Google’s core business—search—continues to outpace Microsoft’s Bing, although the latter has enjoyed incremental market share gains over the past several quarters. Microsoft has demonstrated a willingness to burn hundreds of millions of dollars to keep itself in the search game, something that makes its investors nervous—but doesn’t seem to have any appreciable effect on Google’s ability to earn lots of cash from advertising.

So Android continues to handily dominate Microsoft in the actual mobility and search markets, but Microsoft has a variety of good legal cards to play in order to make life more difficult, both for Google and its manufacturing partners. In other words, look forward to some messy battles (and more irate blog and Twitter posts) to come.

Microsoft, Google War of Words Marked Week

Microsoft and Google intensified their animosity in a war of words related to mobile patents, even as new data suggests Microsoft’s smartphone share continues to fall.

Microsoft’s competition with Google proved the highlight of the week, as a series of Tweets and blog postings by the respective companies’ executives threatened to make an already-tense relationship even more acrimonious.

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

The stage was set earlier this year, when Microsoft and a handful of other companies submitted a winning $4.5 billion bid for the 6,000 wireless technology patents and patent applications formerly owned by Nortel Networks. Google had previously offered some $900 million for the patents. In July, U.S. Bankruptcy Judge Kevin Gross, in Wilmington, Del., and Ontario Superior Court Judge Geoffrey Morawetz signaled their approval of the deal in a joint session.

According to unnamed sources speaking to The Wall Street Journal, federal regulators are examining whether members of the winning consortium are planning to file additional patent-infringement suits against Android device-makers: “The Justice Department wants to know whether it intends to use [the patents] defensively to deter patent lawsuits against its members, or offensively against rivals.”

But now Google’s crying foul over the deal.

“Microsoft and Apple have always been at each other’s throats, so when they get into bed together you have to start wondering what’s going on,” David Drummond, Google’s senior vice president and chief legal officer, wrote in an Aug. 3 posting on The Official Google Blog. “Fortunately, the law frowns on the accumulation of dubious patents for anti-competitive means—which means these deals are likely to draw regulatory scrutiny, and this patent bubble will pop.”

He went on to claim that the Justice Department is “looking into whether Microsoft and Apple acquired the Nortel patents for anticompetitive means.”

Google’s competitors have taken to the courts to stop Android’s rise. Over the past several months, Microsoft has convinced several manufacturers to pay it royalties on their Android-based devices, and is currently locked in patent-infringement lawsuits with Motorola and Barnes & Noble. Meanwhile, Apple is embroiled in court cases with HTC, Samsung and Motorola over the use of Android technology.

Following Drummond’s blog post, Microsoft decided to take the battle to the Internets.

“Google says we bought Novell patents to keep them from Google,” Brad Smith, Microsoft’s general counsel, wrote in an Aug. 3 Tweet. “Really? We asked them to bid jointly with us. They said no.”

The same day, Frank Shaw, Microsoft’s corporate vice president of corporate communications (say that three times fast), also Tweeted: “Free advice for David Drummond – next time check with Kent Walker before you blog.”

He included a link to an Oct. 28 email sent to Brad Smith by Kent Walker, Google’s general counsel, suggesting that “a joint bid wouldn’t be advisable for us on this one.”

Drummond felt compelled to update his post Aug. 4: “If you think about it, it’s obvious why we turned down Microsoft’s offer,” he wrote. A joint acquisition of the patents “that gave all parties a license would have eliminated any protection these patents could offer to Android against attacks from Microsoft and its bidding partners.”

However the legal side of that patent battle turns out, the two companies will continue to batter each other for smartphone market share—although Google Android continues to handily outpace Microsoft’s own efforts in the space. According to research firm comScore, Microsoft saw its smartphone market-share decline in the three-month period ending in June, from 7.5 percent to 5.8 percent, over a period when both arch-rivals Google and Apple experienced gains.

Microsoft’s market share included both its antiquated Windows Mobile platform and the newer Windows Phone, which was supposed to reinvigorate the company’s fortunes in the smartphone space.

Instead, Windows Phone is showing signs of anemic adoption by consumers and businesses. According to data from Nielsen, Microsoft occupied some 9 percent of the U.S. smartphone market in June—trailing Google Android with 39 percent, Apple’s iPhone with 28 percent, and RIM with 20 percent.

During a July 11 keynote speech at the company’s Worldwide Partner Conference, CEO Steve Ballmer described Windows Phone’s market share as “very small,” but insisted that other metrics (such as consumer satisfaction) boded well for the platform overall.

Meanwhile, former Microsoft executive Steven VanRoekel has been tapped to become the nation’s second federal CIO. He will replace Vivek Kundra, who accepted a fellowship at Harvard University.

VanRoekel worked at Microsoft for 15 years, eventually rising to senior director for the Windows Server and Tools Division. After leaving the company in 2009, he served as the Federal Communications Commission’s managing director before leaping to USAID in 2011.

Black Hat: Lots of hacks and a patriotic plea

Research reveals vulnerability to a key router protocol, as well as threats to critical infrastructure

LAS VEGAS — Black Hat hasn’t disappointed this year, with research revealing a flaw that undercuts OSPF routing, two separate assertions that security for Apple products in the enterprise isn’t that bad and a friendly hand being offered to hackers and crackers to join the U.S. fight against terrorists in cyberspace.

 

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

 

Perhaps the biggest blockbuster, because of the sheer scope of the potential problem, is the vulnerability an Israeli researcher found in the Open Shortest Path First (OSPF) routing protocol that puts networks using it at risk of attacks that compromise data streams, falsify network topography and create crippling router loops.

OSPF is the most popular routing protocol used within the roughly 35,000 autonomous systems into which the Internet is divided. Typically large corporations, universities and ISPs run autonomous systems.

MORE FROM BLACK HAT: Hackers and crackers needed to counter terrorists

The only remedies are using another protocol such as RIP or IS-IS or changing OSPF to close the vulnerability, says Gabi Nakibly, a researcher at Israel’s Electronic Warfare Research and Simulation Center, who discovered the problem.

Nakibly says he has successfully carried out an exploit against the vulnerability on a Cisco 7200 router running software version IOS 15.0(1)M, but it would be equally effective against any router that is compliant with the OSPF specification. He says he chose a Cisco router to underscore the severity of the problem, since Cisco dominates the router market.

Meanwhile, researchers took a look at Apple’s OS X operating system for desktops and laptops and its iOS operating system for mobile devices to see whether they are more or less vulnerable than competing Microsoft products.

The conclusion of Alex Stamos, who led a team of researchers from iSec Partners that researched the OS X and Windows 7 operating systems, is that Apple does pretty well, but Microsoft wins. While earlier versions of Apple’s software were more vulnerable to initial exploitation than Windows 7, the latest version, known as Lion, makes up ground.

Escalating privileges remains a problem on both operating systems, Stamos says, with OS X having more potential soft spots than Windows 7. But when it comes to network vulnerabilities, Apple is the loser. “OS X networks are significantly more vulnerable to network privilege escalation,” he says. “Almost every OS X server service offers weak or broken authentication mechanisms.”

Stamos says the bottom line is that enterprises should run Apple OS X products in isolated islands within networks.

On the mobile side, independent researcher Dino Dai Zovi says iOS does a pretty good job running applications in a sandbox that rogue applications would have to escape in order to do damage. The operating system has a dynamic signing feature for applications in which the device itself has to approve applications before running them, not just accepting the Apple certificate that says they are approved.

He says BlackBerries have better data protection than iOS, but that they lack a sandbox for running applications. He says that Google’s Android mobile operating system is more vulnerable than iOS. Android is about as secure as a jailbroken iPhone that has lost many of its security features by virtue of being jailbroken, he says.

Gmail Unveils Preview Pane: Browse Emails While You Reply to Them

Gmail is taking a few cues from its tablet apps with Preview Pane, Google’s newest Gmail Labs feature.

Preview Pane, which is now available in Gmail Labs, allows users to simultaneously preview parts of an email while reading or replying to others. Users of Gmail for iPad or Android will instantly recognize the interface — its design is directly inspired by the email service’s mobile web apps.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Activating Preview Pane opens up a three-window panel for Gmail, with the Preview Pane in between the navigation and email panes. Activating the horizontal split places the preview pane at the top and emails below the preview pane. Users can change pane settings with a button that appears on the top right corner of Gmail. Google‘s Official Gmail Blog suggests that users with higher-resolution screens will get the most out of the feature.

The concept of a Preview Pane sounds intriguing, but my initial tests lead me to conclude it’s a clunky and incomplete product. It breaks up my Gmail Labels in a way that keeps them from lining up with Gmail’s navigation pane, leading to a ugly and cluttered look. The standard two-pane system is cleaner, although you probably can get through more emails with Preview Pane activated.

Will you be switching to Preview Pane? Test it out and let us know what you think of it in the comments.

Black Hat Organizer Touts Value of Publicizing Cyber-Security Research

As the threat landscape evolves, researchers discussing their latest research and exposing vulnerabilities help organizations become more aware, a Black Hat organizer said.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

 

LAS VEGAS—The threat landscape is increasingly sophisticated, complex and volatile, but there are some promising trends on how organizations are meeting the threat, a Black Hat organizer said as he kicked off the annual security conference.

Organizations and international governments are now more aware of the necessity of cyber-security and are exerting a more concerted effort to protect core Internet infrastructure, Black Hat founder and director Jeff Moss said as he welcomed attendees to the conference in Las Vegas Aug. 3. This change could be attributed partially to researchers that publicize their security findings, Moss said.

“The researchers are always talking publicly about this, they are some of the few people who are actually talking out loud about what’s going on,” he said.

Historically, Black Hat was a good “proxy for a crystal ball” that revealed the “interesting things that will happen in the future,” according to Moss. Organizations would say, “If that’s what they’re doing now, I probably should be doing something about that,” Moss said.

The topics covered at Black Hat often are an accurate indicator of the kinds of exploits and threats that may be coming down the road, he said.

“Stories and talks that happen at Black Hat affected the world later,” Moss said, adding, “We have this great mirror” into the types of security trends that people are paying attention to.

The increased awareness also meant security was being discussed by senior executives much earlier in the decision making process, Moss said. It was easier for security professionals to make the case for security to the executive level since CIOs and CEOs were aware and nervous about what could happen.

“You’ve got more than enough stories now to explain to your management how (security) can be a business enabler,” Moss said, referring to the recent string of data breaches.

Organizations talking about security sooner in the process have more control over how it’s implemented. “If you involve us in the decision making process we can help you. If you only call us when the house is on fire, you have much fewer options,” Moss said.

The U.S. government was also increasing international collaboration on cyber-security issues, which would help make the Internet safer for everyone, Moss said. If other international governments followed suit and published a policy document similar to the Department of Defense’s Cyber-Security Strategy, than they can all start working together on “commonalities,” according to Moss.

For example, if governments agree on definitions and tactics, they can work together to stop organized crime, phishing and money laundering, Moss said.

Vendors were also reacting deliberately and “intelligently” when a security vulnerability was discovered in one of their products, Moss said, noting that was a sign the software industry was maturing. “They don’t have that knee-jerk reaction so much when someone points out a flaw in one of their products,” Moss said.

Organizations are also taking steps to protect core infrastructure by adding security features such as DNSSec to secure online traffic. The eventual IPv6 upgrade will also bolster overall security, Moss said.

Launched as a vendor-neutral alternative to industry security conferences 15 years ago, Black Hat attracted more than 8,000 researchers and security professionals, according to organizers. The more technical and edgy DEFCon follows a week of Black Hat training sessions and briefings. DEFCon begins Aug. 5.

5 ways to make your keyboard easier to use

How to use a keyboard might seem academic, but there’s more to typing than just tapping the keys. For most people, the keyboard is the primary computer input and control device—that’s why it’s important to leverage the features and shortcuts that keyboards offer. Read on for tips to maximize ease of use, comfort, and efficiency.

Microsoft MCTS Certification, MCITP Certification and over 2000+
Exams with Life Time Access Membership at https:://www.actualkey.com

1. Get to know your keyboard

Whether your keyboard is just out of the box or it has seen years of use, it may have features you don’t know about. Take a moment to review the literature that came with your keyboard, visit the manufacturer’s product website, and familiarize yourself with the layout of the keys. Knowing your keyboard’s capabilities and limitations—and where to find time-saving keys—can make it easier to use and can even increase your productivity.
2. Customize keyboard settings

After you’re familiar with your keyboard, customizing just a few basic settings can further improve your efficiency and accuracy. For instance, you can adjust:

The pause before a character starts repeating.

The speed at which characters repeat, which can help you avoid typing errors.

The rate at which the cursor blinks, which can enhance its visibility.

You can make these changes right now:

Windows 7

Windows Vista

Windows XP

3. Take shortcuts

Even if you’re a genius with the mouse, keyboard shortcuts can still save you time. They’re called shortcuts for a reason—they reduce multiple clicks to a single combination of keys, like hitting a chord on a piano. They also economize hand and arm motion.

Using keyboard shortcuts for the things you do all the time, like saving or closing files, can make computing much easier and faster. So whether you want to work more easily and efficiently in Internet Explorer, streamline your Microsoft Office Home and Student 2010 experience, or key international characters into your emails, you’ll find scores of shortcuts to speed you on your way. The table below offers only a few common standard-keyboard shortcuts, many of which work across Office applications—from Outlook to Access, from Visio to PowerPoint, from Word to Excel. You can find a more complete list of built-in keyboard shortcuts for a particular application by searching in Help for keyboard shortcuts. You can even peruse keyboard-shortcut lists:

Windows 7

Windows Vista

Windows XP

Press this

To do this

F1

Open Help

F7

Check the spelling of titles or words in any Office application with the Spelling & Grammar checker

Windows logo keyWindows logo key

Open the Start menu

Alt+F4

Quit a program

Alt+Tab

Switch between open programs or windows

Ctrl+N

Open a new (blank) document

Ctrl+A

Select all content in a document, window, or text box

Ctrl+S

Save the current file or document (works in most programs)

Ctrl+C

Copy the selection

Ctrl+X

Cut the selection

Ctrl+V

Paste the selection

Ctrl+P

Print a document or webpage

Ctrl+Z

Undo an action

Ctrl+Y

Redo an action

Ctrl+F

Find text in a document

Ctrl+H

Find and replace text in a document

Ctrl+B

Boldface text

Ctrl+I

Italicize text

Ctrl+U

Underline text

Ctrl+G

Go to a page, line, or bookmark in a document

Windows logo key Windows logo key +F1

Display Windows Help and Support

Esc

Cancel the current task

Application key Application key

Open a menu of commands related to a selection in a program (equivalent to right-clicking the selection)
4. Make it easier to press multiple keys

If pressing Ctrl+Alt+Del seems an acrobatic feat, you can set up Sticky Keys. The Sticky Keys feature lets you hit shortcut keys one at a time rather than all at once. You can even set Sticky Keys to make a noise so you know it’s working.
All together now

You can set up Sticky Keys:

Windows 7

Windows Vista

Windows XP

(Tip: In Windows 7 and Windows Vista, Sticky Keys has a keyboard shortcut—press Shift five times in a row.)
5. Find a comfortable keyboard

Keyboards come in many shapes and sizes, and the Natural Ergonomic Keyboard your coworker swears by might feel downright awkward compared to the Comfort Curve 2000 you covet. Keyboards come in a variety of colors and key styles, too, not to mention with and without wires. And some keyboards are definitely louder than others. All Microsoft keyboards are carefully designed to balance form and function with comfort. Test drive a keyboard or two to find the right one for you.

Although using the right keyboard can really make a difference, ergonomics also play a key role when it comes to typing comfortably.
Tips for using your keyboard ergonomically

It is essential to use good ergonomic practices to help prevent or reduce soreness or injury to your wrists, hands, and arms. It is particularly important if you’re in front of your computer for long periods.

Here are some ergonomic tips for a safer, more comfortable computer session:

Position your keyboard at elbow level, with your upper arms relaxed at your sides.

Center your keyboard in front of you. If it has a numeric keypad, use the Spacebar as the centering point.

While typing, use a light touch and keep your wrists straight.

When you’re not typing, relax your arms and hands.

Take a short break every 15 to 20 minutes.

Type with your hands and wrists floating above the keyboard, so that you can use your whole arm to reach for distant keys instead of stretching your fingers.

Avoid resting your palms or wrists on any surface while typing. If your keyboard has a palm rest, use it only during breaks from typing.

How you use the keyboard is up to you. But by taking the time to adjust a few settings and to follow the guidelines above, typing on it can become easier, faster, and even safer.

Getting Data from Google Docs into Excel

With the growing use of Google Docs and other cloud based systems, we face the problem of how to get ‘live’ data from, for example, a Google Docs spreadsheet into Excel. This article pulls together a whole bunch of other work from previous articles on Google Visualization, Excel to jSon Serialization and various other related topics, and will end up with a downloable tool to get data right out of google docs.

 

Best Microsoft MCTS Training – Microsoft MCITP Training at Certkingdom.com

Getting data out of Google Docs into Excel

In previous related articles such as Excel-jSon conversion, Google Visualization from Excel, and abstracting data in Excel, I began to look at how to get better integration between web based and pc based data. In this article, we’ll bring together all that work and provide a capability to get data live right out of Google Docs, or Google Gadgets, and into Excel. We’ll end up with a downloadble set of reusable classes and an example application all of which you can download for your own use.
Google Wire Protocol

Google has implemented something they call the ‘wire protocol’ to provide data feeds between Google Docs, Gadgets and so on. It’s jSon-like in fomat, and is used to describe data tables, and would be provided as an https: response to an request to an appropriately structured https: request. For this article we will use some data in this GoogleDocs Spreadsheet, which I have been using to demonstrate Roadmap Generation both in VBA and javascript versions.

Data Source URL
In Google Docs, if you create a table gadget for example, examining the gadget’s properties will give you the data source URL that will provoke a wire protocol response. In the case of the example sheet, you will see that the URL given on the table gadget is

https://spreadsheets.google.com/a/ mcpher.com/spreadsheet/tq?range=A1:H14&key=0At2ExLh4POiZdHBJYnlwaERpYTRZSWl1VEw1TEpQVkE&gid=0

If you enter that into a browser (Chrome or firefox – as usual IE does something strange) , you will see the Google Wire response below

Our task then, is to decode this, and populate an excel sheet on demand with this kind of data. The good thing is that most of the code is available from the work related to the previous articles already mentioned

Data Conversion and Spreadsheet Population
Conversion of jSon to Excel is covered here, however with Google Wire protocol we are not exactly looking at jSon, and neither is the structure a simple two dimensional table that the capability we have already developed is expecting to find. In order to fully utilize all the components that have already been developed, the data needs some preparation.

* Leverage a cBrowser object to deal with the https: request/response.
* Extract out the {table:[]} part of the google wire response
* Convert it to a more jSon friendly ( change the new Date() javascript construct to a proper date, ‘quote’ the key names etc). We’ll use Regular Expressions for that, then deserialize it using Excel JSON conversion
* Crush it down into a 2 dimensional table. We’ll need to write new something for that.
* Use the Data Abstraction cDataSet to populate our Excel sheet.

These classes also use a number of Excel additional references which are already selected in the example cDataSet worksheet you can download. These are the references that are needed.

Implementation example
This is the module that will do the work. Likely a real implementation would provide some kind of dialogue to collect the request URL and the output range , and then execute the data transfer and conversion. In this example, the data in the Google Docs Sheet will be copied to the Excel worksheet name ‘Clone’. If you just want to use this as is, then you are good to go. Just create a module of a similar structure as below. Read on further to find out how it all works, or if you want to harden up the code against data structure errors.

Option Explicit
Const Url = “https://spreadsheets.google.com/a/mcpher.com/spreadsheet/tq?range=A1:H14&key=0At2ExLh4POiZdHBJYnlwaERpYTRZSWl1VEw1TEpQVkE&gid=0”
Public Sub googleWireExample()
Dim dSet As cDataSet, dsClone As cDataSet, jo As cJobject, cb As cBrowser
Dim sWire As String
‘ get the google wire string
Set cb = New cBrowser
sWire = cb.httpGET(Url)
‘ load to a dataset
Set dSet = New cDataSet
With dSet
.populateGoogleWire sWire, Range(“Clone!$a$1”)

If .Where Is Nothing Then
MsgBox (“No data to process”)
Else
‘ it worked

End If
End With
Set dSet = Nothing
Set cb = Nothing
End Sub

The https: request/response
This is rather straightforward at least, using the already available cBrowser object.

Set cb = New cBrowser
sWire = cb.httpGET(Url)

Public Function httpGET(fn As String) As String
pHtml = fn
Dim oHttp As Object
Set oHttp = CreateObject(“Microsoft.XMLHTTP”)
Call oHttp.Open(“GET”, pHtml, False)
Call oHttp.Send(“”)
httpGET = oHttp.ResponseText
Set oHttp = Nothing
End Function

This gets us the google wire string containing the spreadsheet data

The populateGoogleWire method
This is a method of the cDataSet class, and can be used to abstract data from Google Wire Protocol, and dump it to a sheet.

Public Function populateGoogleWire(sWire As String, rstart As Range, Optional wClearContents As Boolean = True) As cDataSet
Dim jo As cJobject, s As String, p As Long, e As Long, joc As cJobject, jc As cJobject, jr As cJobject, cr As cJobject
Dim jt As cJobject, v As Variant, astring As Variant

Const jSTart = “table:”
Const jEnd = “);”

‘ take a google wire string and apply it to a range
p = InStr(1, sWire, jSTart)
e = InStr(1, sWire, jEnd)

If p = 0 Or e = 0 Or p > e Then
MsgBox ” did not find table definition data”
Exit Function
End If
‘ encode the ‘table:’ part to a cjobject
p = p + Len(jSTart)
s = “{” & jSTart & “[” & Mid(sWire, p, e – p – 1) & “]}”
‘ google protocol doesnt have quotes round the key of key value pairs,
‘ and i also need to convert date from javascript syntax new Date()
s = rxReplace(“(new\sDate)(\()(\d+)(,)(\d+)(,)(\d+)(\))”, s, “‘$3/$5/$7′”)
s = rxReplace(“(\w+)(:)”, s, “‘$1’:”)
‘ this should return an object as follow
‘ {table:[ cols:[c:[{id:x,label:x,pattern:x,type:x}] , rows:[ c:[(v:x,f:x}] ]}
Set jo = New cJobject
Set jo = jo.deSerialize(s, eDeserializeGoogleWire)
‘need to convert that to cdataset:[{label:”x”,,,},{},,,]
‘column labels can be extracted then from jo.child(“1.cols.n.label”)  .. where ‘n’= column number

Set joc = New cJobject
Set cr = joc.init(Nothing, cJobName).AddArray
For Each jr In jo.Child(“1.rows”).Children
With cr.add
For Each jc In jo.Child(“1.cols”).Children
Set jt = jr.Child(“c”).Children(jc.ChildIndex)
‘ sometimes there is no “v” if a null value
If Not jt.ChildExists(“v”) Is Nothing Then
Set jt = jt.Child(“v”)
End If
If jc.Child(“type”).toString = “date” Then
‘ month starts at zero in javascript
astring = Split(jt.toString, “/”)
If LBound(astring) <= UBound(astring) Then
v = DateSerial(CInt(astring(0)), CInt(astring(1)) + 1, CInt(astring(2)) + 1)
Else
v = Empty
End If
Else
v = jt.Value
End If
.add jc.Child(“label”).toString, v
Next jc
End With
Next jr
Set populateGoogleWire = populateJSON(joc, rstart, wClearContents)

End Function

Extracting the table[]
As with most of the code in this example, we need to still add a bunch of error handling, so please beef that up if you implement any of these modules. For now we are assuming that the wire string is valid and contains a data table.

Const jSTart = “table:”
Const jEnd = “);”

‘ take a google wire string and apply it to a range
p = InStr(1, sWire, jSTart)
e = InStr(1, sWire, jEnd)

If p = 0 Or e = 0 Or p > e Then
MsgBox ” did not find table definition data”
Exit Function
End If
‘ encode the ‘table:’ part to a cjobject
p = p + Len(jSTart)
s = “{” & jSTart & “[” & Mid(sWire, p, e – p – 1) & “]}”

Cleaning up the jSon
The Wire Protocol needs a bit of work to fix quoting of key names and regularization of date format, but it’s going to be a piece of cake with the regEx capability.

‘ google protocol doesnt have quotes round the key of key value pairs,
‘ and i also need to convert date from javascript syntax new Date()
s = rxReplace(“(new\sDate)(\()(\d+)(,)(\d+)(,)(\d+)(\))”, s, “‘$3/$5/$7′”)
s = rxReplace(“(\w+)(:)”, s, “‘$1’:”)

Deserializing the cleaned up jSon
Now we can get to a cJobject we can work with.

‘ this should return an object as follow
‘ {table:[ cols:[c:[{id:x,label:x,pattern:x,type:x}] , rows:[ c:[(v:x,f:x}] ]}
Set jo = New cJobject
Set jo = jo.deSerialize(s, eDeserializeGoogleWire)

Crush down to 2 dimensional table
As you can see the wire protocol is a bit verbose, and will have been deserialized into a cJobject with too many layers, so our challenge here is now to move to something 2 dimensional that we can represent in Excel.

‘need to convert that to cdataset:[{label:”x”,,,},{},,,]
‘column labels can be extracted then from jo.child(“1.cols.n.label”)  .. where ‘n’= column number

Set joc = New cJobject
Set cr = joc.init(Nothing, cJobName).AddArray
For Each jr In jo.Child(“1.rows”).Children
With cr.add
For Each jc In jo.Child(“1.cols”).Children
Set jt = jr.Child(“c”).Children(jc.ChildIndex)
‘ sometimes there is no “v” if a null value
If Not jt.ChildExists(“v”) Is Nothing Then
Set jt = jt.Child(“v”)
End If
If jc.Child(“type”).toString = “date” Then
‘ month starts at zero in javascript
astring = Split(jt.toString, “/”)
If LBound(astring) <= UBound(astring) Then
v = DateSerial(CInt(astring(0)), CInt(astring(1)) + 1, CInt(astring(2)) + 1)
Else
v = Empty
End If
Else
v = jt.Value
End If
.add jc.Child(“label”).toString, v
Next jc
End With
Next jr

Push abstracted data to the target worksheet
Now that we have a cJobject in the correct structure, we can use the cDataSet.populateJSON (already covered here) method to push the data to the target worksheet

Set populateGoogleWire = populateJSON(joc, rstart, wClearContents)

When serialized this simplified jSon structure now would be

{“cDataSet”:[{“Activate”:””,”Deactivate”:”6/21/2007″, “Description”:”Cellphone”,”ID”:”cell”,”Target”:”smart”,”Custom”:””,”Cost”:”200″,”Callout”:””} ,{“Activate”:”1/7/2006″,”Deactivate”:”3/22/2011″, “Description”:”Mac”,”ID”:”mac”, “Target”:”iPad”,”Custom”:””,”Cost”:”300″,”Callout”:””},{“Activate”:””,”Deactivate”:”3/21/2012″, “Description”:”PC”,”ID”:”pc”,”Target”:”android”,”Custom”:””,”Cost”:”250″,”Callout”:””},{“Activate”:”1/2/2009″, “Deactivate”:”11/7/2011″, “Description”:”Netbook”,”ID”:”net”, “Target”:”pc”,”Custom”:”dislike”, “Cost”:”150″,”Callout”:”this was a waste of money”}, {“Activate”:”1/2/2006″,”Deactivate”:”2/2/2010″, “Description”:”Windows Phone”,”ID”:”smart”,”Target”:”iphone”,”Custom”:””, “Cost”:”240″,”Callout”:”Windows Mobile was so bad”},{“Activate”:”9/3/2010″,”Deactivate”:””, “Description”:”Tablet”,”ID”:”tablet”,”Target”:””,”Custom”:”family”,”Cost”:””,”Callout”:””},{“Activate”:”10/29/2003″,”Deactivate”:”6/13/2008″, “Description”:”MP3 player”,”ID”:”mp3″,”Target”:”ipod”, “Custom”:””,”Cost”:”20″,”Callout”:””},{“Activate”:”10/30/2004″,”Deactivate”:”1/2/2009″, “Description”:”Personal Video”,”ID”:”pv”,”Target”:”ipod”,”Custom”:””,”Cost”:”25″,”Callout”:””}, {“Activate”:”4/12/2008″,”Deactivate”:”6/2/2011″, “Description”:”iPod”,”ID”:”ipod”,”Target”:”ipad”,”Custom”:”like” ,”Cost”:”25″,”Callout”:””},{“Activate”:”1/5/2009″,”Deactivate”:””, “Description”:”iPhone”,”ID”:”iphone”,”Target”:”android”, “Custom”:”like”,”Cost”:”360″,”Callout”:””},{“Activate”:”11/2/2010″,”Deactivate”:””, “Description”:”iPad”,”ID”:”ipad”,”Target”:”tablet”, “Custom”:”like”,”Cost”:”480″,”Callout”:””},{“Activate”:”12/13/2009″,”Deactivate”:””, “Description”:”Android/Chrome”,”ID”:”android”,”Target”:””, “Custom”:””,”Cost”:”400″,”Callout”:””},{“Activate”:”12/3/2005″,”Deactivate”:”12/12/2007″, “Description”:”windows tablet”,”ID”:”wtab”,”Target”:”pc”, “Custom”:”dislike”,”Cost”:””,”Callout”:”this really sucked”} ]}

Summary
You can get all the code of these downloadable tools, which I hope you can find a use for as the basis for your own application. As always I welcome suggestions, improvements, questions and bug fixes at my forum.

HowTo Migrate Facebook Friends, Photos, Videos to Google Plus

The permanent migration from Facebook to Google Plus may not happen for you immediately as most of your friends never made it to Plus, and to your surprise most of them didn’t even hear about it. Its a good time to actually make that happen by inviting them all in single shot, as you migrate your Facebook data including Photos, Friends to Google Plus.

 


Microsoft MCTS Certification, MCITP Certification and over 2000+ Exams at Actualkey.com

How to Migrate Facebook friends to Google Plus

Facebook won’t let you export your Facebook friends to Gmail or Google Plus for their own anti-competitive reasons. But what you can do is export Facebook contacts to a new Yahoo account and then import to Google Plus. It might silly but this is the only reliable way to do it.

1. Exporting Facebook contacts: Create a new Yahoo account, if you don’t have it already. Once you’ve created an account, sign in and head to the Contacts tab. Click on “Import Contacts” and choose the Facebook option. You should now see all your Facebok friends in your Yahoo address book.

2. Importing Facebook contacts, Inviting all: Now goto Google+ Circles tab. Click “Find and Invite” and then click the Yahoo button. It’ll add all your Facebook Contacts that were previously added to your yahoo account. In Find and Invite page, add your Facebook friends to your circles and they should get the invites. You may also find all the people that already are on Plus.

Migrate Facebook Photos to Google Plus

You can even migrate all your Facebook photo albums to Picasa (hence Google Plus) using Chrome a& Firefox extensions. Install & run them, it should take couple of minutes depending your number of photos.

Migrate Facebook Videos to Google Plus

Unfortunately,  this one takes some effort as you would have to download them all and re-upload. You can do this Account > Account Settings, and scroll down to “Download Your Information”. Click on “learn more” link and then Download button. It will take a while to gather your info, but you’ll receive an email when it’s done, and you can download a ZIP file full of your photos, videos and profile information.

Goto Google+, click on your profile, and go to “Videos”. Hit the “Upload New Videos” link and re-upload your videos to your Google+ profile.

Windows 8 Tiles, Metro-Style UI on Windows 7

Windows 8 would ditch the Windows 7 Aero interface in favor of Metro UI,  which exists on Windows Phone today. If you love the MEtro style tiles and interface, you can get the Metro UI on windows 7 using Zetro UI.

 

Best Microsoft MCTS Training, Microsoft MCITP Training at certkingdom.com

Zetro UI is very simple to install and configure. Extract the zip after downloading the theme from the link below. When done, follow the below two simple steps:

* Opening the Extras folder, running the Theme Patcher, and clicking on all three “patch” buttons contained within.
* Opening the Theme folder and copying both of the files inside it to C:\Windows\Resources\Themes.

When finished, Open the Control Panel and “Change the Theme” under Appearance and Personalization. The Zetro theme should be available in “Installed themes”.

metro-ui-windows7

The look and feel of the theme makes you windows 7 look simple with white all over the place, which might look a bit odd for the first few minutes. You can tweak it using the extra tweaks available in the readme file that comes along with the zip.

Extending the tweak further, feel free to blend it with something like the Metro-inspired Omnimo 4 theme for Rainmeter.