Friday, August 31, 2012

Today MTNL launches Lofty Tab with Android ICS OS.

The great achievement of MahanagarTelephone Nigam Ltd today launched 3G-enabled tablet Lofty Tab in partnership with Teracom Ltd. The public sector telecommunication services provider has launched three variants of the tablet with the entry-level model priced at 3,999 rupees, the mid-level variant at 6,499 rupees and the top end premium model at 10,999 rupees.

MTNL Lofty Tab will be sold with bundled offer with MTNL sim-card and a data plan on discounted rates of third-generation (3G) and WiFi services.

MTNL Lofty Tab will run on Android 4.0.3 Ice Cream Sandwich OS, which has a high performance 1GHz Processor. The resolution of 7″, Multi Touch screen is excellent @ 1024×600. It also offer dual camera –3.2 MP Rear and 0.3 MP front.
Other part on entertainment side, MTNL Lofty Tab has some pre-loaded games, FM Radio, HD Radio, Social Networking Apps and other features.

"This is a high-end product at the lowest cost," said AK Bharagava, executive director, wireless services, MTNL.

The low-end model comes with a high speed 1.2 GHz processor and 4GB memory, compared to the much publicized Akash tablet that has a processor of only 500 MHz.

Teracom tablets work on the latest Android 4.0 Ice-cream Sandwich operating system, while Akash works on the old Android 2.3 system.

Wednesday, August 29, 2012

Top features of Windows 8 OS.

Windows 8,Latest operating system from Microsoft, around two months away from its release, has some of the features not found in any earlier operating system by Microsoft.
  • It is much more designed like a smartphone and tablet operating system giving the user the look and feel of using a smartphone.
  • It has got touch screen features along with the use of keyboard for PC.
  • Windows store” present on this operating system is analogues to “app store” on mobile operating system.
  • It has been designed to work well on low spec PC and tablets.
  • Apps and games will download directly like windows update.
  • It’s altogether different from earlier operating system as now there is no taskbar or start button. Live tiles are the new form of navigation.
  • More built in software as part of the operating system, so no need to download PDF reader or application for ISO files.
  • Ribbon interface like used in office 2007 has been extended all across the windows.
  • Much more functional windows defender which will free the user from installing antivirus.
  • It’s faster than any other Microsoft OS and the boot time is also reduced drastically.
  • New option for refreshing your PC is present through refresh button which will make it as good as new. So, this will free the user from tedious task of installing OS.
  • Reset button is present which will allow user to reset it to factory setting.


Tuesday, August 28, 2012

Microsoft launched new company logo in 25 years.

Timing is very good to well renown that the big brand name of computer field Microsoft changed their previous logo with new one. This marks the first change in Company-Wide Microsoft branding since 1987, when the sans serif font was adopted. The logo is easily recognizable as the same icon posted above each and every Microsoft retail store. Microsoft spokesperson Jeff Hansen told the Seattle Times that the colors represent “the diversity of our products and the diversity of people that we serve.”

                                                                New Logo of Microsoft 


Old Logo of Microsoft
The new font used in the new logo tempts me to say the new logo seems to be old fashioned. Anyhow by changing the old logo, Microsoft is trying to signal that it has changed its thinking and its products to cater to people who are interacting with technology much differently than just a decade ago, let alone a quarter century.
Timing here is critical with the launch of Windows 8, WindowsPhone 8, and Office 2013 imminent. In the next few weeks Microsoft has television and web commercials planned featuring the new branding, and announcing the launch of their products this upcoming holiday season.In lieu with the new logo, the company has published a short introductory video on its official YouTube channel.

Sunday, August 26, 2012

How Doctors can Use Facebook to Connect with Patients.

The line that has defined the relationship between medical doctors and their patients is quickly being blurred by social media.  Many doctors are on Facebook, Twitter and other social media outlets, or at least their practices are. Doctors are engaging patients on these platforms, because it is an efficient way to reach out to patients.  They can even delegate most of the tasks to a certified medical assistant or another office worker.
Before exploring the ways that doctors can responsibly use social media, a precautionary warning must be given.  As already mentioned, the relationship between doctor and patient is being blurred by these technological advancements.  It is the medical provider’s responsibility to maintain appropriate boundaries.  Healthcare providers, their assistants and staff must also not disclose any personal information on the internet.  HIPPAlaws still apply to the internet (at least in the U.S.), and almost everything posted or tweeted can be tracked to a specific individual.  Anyone with concerns should consult with a lawyer familiar with the HIPPA laws (This is neither medical nor legal advice).
Having considered the dangers of social media, here are some ways doctors can use social media to strengthen their practice.  Usually it is a medical assistant who knows the patients best, because the doctor is extremely busy.  With social media, patients can feel more connected to everyone at the office.
Post Stories of Success and Gratitude
Assuming they have a release from a patient or remove all personal information from a note, a medical practice can post stories of success and gratitude.  Patients usually go to doctors when they are ill.  Publishing brief stories of people who recovered is encouraging to those who are currently suffering.  Even simple thank-you notes are uplifting.
Post Pictures and Videos of Newborns
Obstetricians can take the above idea a step further, provided they have a release from the newborn’s parents.  Some have had great success posting videos of newborns they have delivered.  After an infant is calm and aquatinted with his or her mother, a medical assistant can take the video and publish it.  Parents also would appreciate a copy of the video.
Post Explanations of Treatments and Procedures
Patients often go to the internet for medical information, and who better to provide it than their own personal doctor or nurse?  Medical professionals can educate their patients on the treatments and procedures they perform most often through online articles.  This also can reduce the number of questions patients have during their visit, thus easing the ever-stretched appointment time.  The most successful doctors publish purely informative pieces, not sales pitches.
Take Polls
Facebook is a great platform for taking polls.  These can be serious, about a patient’s experience, to improve the practice.  They also can be purely fun, such as “What is your favorite hotdog topping?”  The latter example makes the office seem more personable, and staff members can engage in an online debate: ketchup or mustard?
Doctors’ offices have used all of these ideas to enhance the level of care they provide.  In most cases, doctors do not post the material themselves.  They often ask a certified medical assistant or medical technician, who has some knowledge in medicine but fewer time demands.
Sean Ninon writes for Medical Assistant Center, which helps people become CMAs in Arkansas and other states.

Tuesday, August 21, 2012

How to take backup of Facebook videos,photos and chat text?

Lot of times we want to backup of Facebook data which we have upload in our account. This is one of handy service, which is helpful to protect your Facebook contents. Facebook offers all of Facebook users the ability to back up Facebook contents such as photos, videos, messages and chat conversations.

Steps are as follows:-

1. Log on to your FB account and Go to Account Settings.

2. Under the General Account Settings  click on “Download a copy of your Facebook data”.

3. After that click on “Start My Archive”.
Now you can see the message indicating that it will take some time to collect all your data. After that, data is ready for download it'll be sent an email with a link to a compressed file containing all your Facebook backup data.

Saturday, August 18, 2012

Mobile Software for Remote Tracking of Kid’s iPhones.

Parents are equipping their kids with technologically advanced and the latest in trend mobile phones like iPhones to ensure connectivity with their kids at all times. The developing trends in mobile technology have scaled great heights to such an extent that kids practically use them day in and day out. In such cases, it is highly essential that the usage of the mobile phone is carefully monitored.
Installation and the stealth feature
Mobile software comes to the rescue of the parents who intend to monitor their kids’ iPhone usage. There are many such software available currently in the market which enable the parent to monitor the kid’s activities. Many of them like Mobistealth, Mobile Spy, FlexiSpy, and Phonesherrif have parental control software that has features designed to track your kid’s iPhone activities. You can easily install such mobile software on your kid’s iPhone by following the instructions mentioned in the software user manual. The most advantageous feature of such mobile monitoring software is that they function secretly in a stealth mode, not letting your kid know that he is being monitored. Another standout feature of this type of mobile software is that the details pertaining to the iPhone can be accessed remotely from any location by logging in through the mobile software user account.
Features of Mobile Software
There are certain features available in the mobile software that helps the parents to remotely track the kid’s iPhone activities.
·         Locate your kid
With the help of the GPS tracking device, you can easily trace your child in case he is lost or kidnapped. By tracking the iPhone, you can also find out if your kid is inside the class during school or college hours. Teens have the habit of going around with friends. You can easily track your teen’s hangout with the help of the mobile software.
·         Keep a tab on all phone calls
The mobile software maintains a record of all calls that have been made or received through the iPhone. By reviewing the call records, you can easily track the people with whom your kid had been engaged in a conversation.
·         Restrict internet usage
Kids are spending a lot of time on the internet, during the course of which they might browse through inappropriate information. They might access adult sites or download pirated games or other software. To prevent such happenings, you can restrict them by blocking certain websites or the time of internet usage.
·         Access to the photos and videos
iPhones have high resolution cameras and kids tend to exchange photos and videos among their group. To prevent the misuse of such photos or videos by morphing them, which is very prevalent today, you can keep a watch on the pictures stored on the kid’s iPhone.
·         Monitor text, chat and mail messages
Texting is a favorite pastime with kids. However care should be taken to see that they do not indulge in sexting. Mobile software has the facility to issue alerts to the parent if any such objectionable word or content is received or made by the kid’s iPhone. You can also monitor the entire conversations happening on various chat rooms and the complete details of the e-mails exchanged.
Installing cellphone spy software is a must if you are equipping your kid with an iPhone. The mobile software safeguards your child by allowing you to monitor his or her activities by functioning stealthily and providing the parent access to such information from a remote user account.

Friday, August 17, 2012

How to Know If Their Site Has a Google Penalty Penguin?

Since the 25th of April this year, many SEO professionals and webmasters have been scrambling to make changes in the way that they have been optimizing their websites. While there are those that have then challenged themselves to improve their SEO campaigns, those who have been utilizing black hat techniques might have to major overhauls with their strategies.
If you still are not very sure of what we are trying to make sense here, we are talking about Google Penguin, the recent update in the algorithms that Google use to rank search results. Its release has caused concerns to website owners as to whether the rank of their website will dip down or they have already received a Google Penguin penalty.
How will I know if my site has been penalized?
Even when you still see your website in the search engine results of Google, it does not exactly mean that you are cleared off from any penalties. Yes, a blacklisted website can mean that it has already been a consequence of the owner’s use of black hat techniques but noticing some unusual or unexpected changes in the traffic of your website can mean that you are being penalized by Google.
Some of the most common signs that you should look for is an abrupt drop in your rank in the search pages of Google, a decrease in the amount of traffic that you get for your website, and a decrease in web inquiries.
Why was my site penalized?
There are so many reasons as to why your website was penalized. For one, the backlinks that you developed prior to the Penguin update must not have conformed to the new algorithms so your site was de-indexed or discounted.
Another reason was that your site has gone through Google’s manual review and the team saw that your backlinks contain no value. Because of this, they might have given you a penalty of -40, -50, or even a -100. For instance, if you used to rank at #4 in the search results of Google, a -40 penalty means that your site will not rank at #44.
What should I do after a Google Penguin penalty?
If you suspect or are very sure that you site has received a penalty from Google Penguin, it is good news that there are some things that you can actually do to somehow redeem your rank. One of which is to shift your focus on creating quality links. Dump the old backlinks that you have been using. Now that you have been penalized, those old backlinks will be of no use as they already have been discounted or de-indexed by Google.
To verify if you did receive a penalty, log in to your Google Webmaster Account. Google will notify those webmasters who have been participating in spammy behavior that goes against the rules of their Penguin update. To verify if you did get a penalty, it is best that you check your account and see if you received any notification.

About the Author:
Kristine is an avid writer of the latest in high speed internet and internet technology. She also performs administrative work for Center Networks, she also writes her own opinion about the justhost.com sucks for the company. To find more of her helpful tips and recommendations, make sure that you tune in for her next post.

Wednesday, August 15, 2012

London Olympics will also test Firms BYOD culture.

The London Olympics are underway and with it has come a flood of athletes, spectators and jobs for the local population. It is estimated that nearly 100,000 people will be arriving in London for the games, which means that many people who are already working in London may have to resort to working from home. The bring your own device culture has already gained much popularity and is part of many firms’ modus operandi, as their employees will now not be coming to work regularly it means they may have to take more company information hoe with them. In such a situation it is crucial for firms and employees to watch out for spy software for cell phones and ensures that no cell phone spy software manages to steal their information.
Today there is cell phone spy software for every platform of smart devices, regardless of how secure it is rated to be there is always a chance of a security breach. Other than employees businesses must also be on a watch out as hackers may attempt to plant spy software for cell phones on the company servers in order to get it to devices on the network. As employees are now keeping more and more information on their own personal devices there is a higher chance of this data being accessed by a hacker. Other than being hacked in to or having information stolen by someone remotely accessing it there is also the risk of physical theft. The device being lost or stolen and the information on it may be compromised if proper precaution are not in place such as a security service which can remotely lock the device or wipe the data clean. Not so long ago a similar incident occurred in Canada in which personal information of over 2 million Canadian citizens could have been compromised.
Their information had been saved to a pair of flash drives and both of these flash drives were lost in Ontario. Even though the information on them could only be reached by accessing it through certain software the data was not encrypted which only makes things worse. So far this incident of data loss has been recorded as one of the most major, if not the biggest, data loss incidents in Canadian history.
In the case of the Canadian data loss, and in the case of any firm in general loosing critical and important data, the people affected are not only the clients whose data has been lost but also the firm it. Clients are unlikely to work with that firm again after it has been irresponsible with their personal information in the past. So companies need to safeguard not only their clients and customers but in doing so will also be protecting their own reputation. If a large firm does loose information in such a manner it will be difficult to regain customer confidence and may also find it hard to recover from the loss.
Furthermore there is also a concern over who actually owns this information. If the data is in a company server or device it is the property of that firm, however once the data is on to a personal employee device things become ambiguous. When the information has made its way to an employees’ device, it is in many cases out of bounds for the firm and the firm may not have complete knowledge of what the person is doing with the information. Through this season of this Olympics and during everyday life it would be in the benefit of the firm to make sure that a close watch is kept on sensitive information, be it the firms or the clients.
Author Bio :- Stella Rebecca's major effort has revolved around latest gadgets. Recently she's been playing with the many Android Spy Software that are diverting the interest of the new generation. Readers can find out more about what's most recent and happening in the iphone spyware world.

Thursday, August 9, 2012

Protect Your Cloud Data From Being Hacked.

Trend of Cloud computing is very common now a days. It allows you to synchronize your files from your computer and other connected devices and not worry about losing your data. So you thought. Even your cloud date can be prone to hacking.

This was the case of Mat Honan, whose Amazon and Apple account was hacked. In the hopes of better protecting their consumers, the two IT companies temporarily changed their policies and cloud-related precautions. More than just setting your password to beyond “12345,” here are some security measures that you can implement to protect your cloud data:

Backup everything

According to Robert Siciliano, an online security expert from McAfee, said that we should make it a point to back up data not only on the cloud but also on the hard drive. It is also best to back them up on several locations.

Use different passwords

Siciliano also recommends using different passwords for each cloud-based account. There are password management services such as RoboForm or LastPass that can help you generate passwords and will store them on your most frequently used devices.

Do not link your accounts to each other

Also called daisy-chaining, linking your accounts to each other may do you in. Using your Facebook, Twitter, or Google accounts to log in to your other social networks or websites may compromise all your accounts.

Use two-factor authentication on Google and Facebook

Matt Cutts describes two-factor authentication as “something you know” and “something you have.” Two-factor authentication works this way: Google will send a code via text or voice message upon signing in. You will then need to enter the password and code to sign in to your account from an unrecognized computer. You will then authorize Google to make the computer a trusted computer for 30 days or longer.

Facebook uses a similar feature called: Login Approvals to sign you in on an unrecognized computer. Both these features should be switched on. Services like Amazon, Rackspace, and Wordpress utilizes two-factor authentication.

Use Anti-Spyware Software

Spyware is one of the most common threats to computer users everywhere. However, with the dawn of anti-spyware software such as Ad-Aware, the threat has been reduced throughout the years.

Take these tips into consideration and you can look forward to a more secured cloud data.

Melvin Magadia is a content writer for a cheap promotional items company selling promotional mouse pad. He is a gadgets freak and spends his spare time with his family and in surfing the Internet and watching television.

Droid Gallery App Using a Lot of Data? 3 Potential Culprits.


With unlimited data plans becoming a thing of the past, monitoring mobile data usage is now a necessity. Every MB counts. One potential bandwidth drain on Android phones is the Gallery app, whose data usage has perplexed users on several forums.

If your Gallery app seems to be using an excessive amount of data relative to how often you use it, check the following:

Note: You can view data usage by going to settings &get; data usage.

Another note: I’m using a Galaxy Nexus, so the steps I describe may be slightly different depending on your device or Android version.

Turn off Google Photos Sync
Google Photos sync is enabled by default. This process syncs the photos on Picasa with your mobile galleries.
To turn this setting off:

1.    Open the Gallery app on your droid
2.    Click the menu icon in the upper right hand corner (on the Galaxy Nexus, anyways; may be different for other devices) and select “settings”
3.    Under “account settings” you will need to click where it says “Google photos sync is ON”
4.    Click on your email account
5.    Scroll down to “Sync Google Photos” and remove the check
6.    Repeat these steps for any other Google account you have setup on your phone. When you go back to your Gallery settings you should see “Google photos sync is OFF”
 Disable Google Plus Instant Upload
Google Plus instant upload allows your mobile images and videos to be instantly shared on the social networking site. While it isn’t 100% clear whether this process uses bandwidth under the Gallery app, disabling it ensures no data is used at all.

To turn it off:
1.    Open the Google Plus app
2.    Click the menu icon in the upper right hand corner and select “settings”
3.    Under “Photos and Videos” click on “Instant Upload” (if it’s marked “on”)
4.    Scroll to and select your Google account
5.    Remove the check next to “Sync Instant Upload”

Be Mindful of Streaming Videos

If you stream a movie using the default Gallery Player, this bandwidth is attributed to the Gallery app. Many users expect that data to show under Browser or elsewhere, but that isn’t the case.

These are the three Gallery bandwidth uses that I have come across. If there are more that I am missing, or if you have other tips on reducing data usage, please share in the comments.

About the Author:Gere Jordan is a web designer and web marketer at Continental Message Solution, a leading provider of US based customer service and call center outsourcing services.

Best Features of iPhone.

iPhone, the most trending mobile device nowadays,  is a magical smartphone that enjoys the luck  of being so much required worldwide. It is a unique generation of smartphones which has its specific features and specifications that ensure its highest rank in the market of mobile technology. There are 5 generations of iPhone: iPhone, iPhone 3G, iPhone 3GS, iPhone4, iPhone 4S. The line of iPhones is rumored to be soon accomplished with iPhone 5, which is expected to come some months later, it is possible in in the end of this year. The new coming iPhone will certainly bring some new features that will differentiate itself from the previous 5 versions. So, before the iPhone 5 release date comes and hits the web with rumors and discussions, let's learn about the features of the previous versions. 
iPhone is like a computer that you can place in your pocket like any mobile device. All the versions of iPhone somehow differ one from another. All the versions of iPhone have one similar specification: that is the 3.5 inch retina display with multi- touch technology which allows using one and more fingers at the same time to work on the screen. iPhone 4, in advance to the previous models, includes 2 cameras, retina display with higher resolution. As it was mentioned above, iPhone is like a small computer. It has features that a computer has though it doesn't mean that its phone features suffer from it. So, what are the main specific features that iPhone has. First of all its phone features that contain visual voicemail, texting, voice dial. As any other good smartphone iPhone as well has high- quality email features. Let's agree that iPhone is a perfect choice for video playback with its 3.5 inch retina display. The other feature is the feature of cameras; Apple has recently made an innovation dealing with this feature. In comparison with previous versions of iPhone, iPhone 4 includes 2 cameras. iPhone differs with its thinner frame, TFT touchscreen, 3.5 inch retina display, 320 x 480 pixels, multitouch, it is protected with corning gorilla glass. Apple iPhone has GPRS, EDGE, WLAN – WiFi 802.11 b/g, Bluetooth, USB, 2 MP, 1600 x 1200 pixels camera. The iPhone is featured with its liquid contact indicators which turn red as they have a contact with liquid. By the way, to cut short, iPhone has all the features that will satisfy even the strictest customer.
Bio: Hi everyone, my name is Roman and I am a guest blogger having years of experience in this sphere. I mainly write articles about iphone unlock uk and I do hope you will like them.   

New Way of Handwrite on touchscreen for Google Search.

All the people want to do their task in easy with fast method but with convenient but not difficult either its using at the time on touchscreen mobile or Tablet. At this time we feels very difficult to type on a touchscreen device, especially when we are on to go. But no worry from now to use that because Google has introduced us : Hand write on web search for mobile phones and tablets.

We will say that this is Cool and Useful feature. Although Google search by Voice is more useful and convenient than writing, there are lot of certain situations where writing is more practical such as in a noisy pub or on way. Google Handwrite allows you to perform your searches by just writing letters, numbers, symbols or characters on touchscreen of your device with your fingers.

Google has enabled Handwrite for iOS5+ devices, Android 2.3+ phones and Android 4.0+ tablets. It’s available in more than 27 languages.

For more you can see on by Video :--




Wednesday, August 8, 2012

Download YouTube Videos by using PWN in url.

All the users of YouTube want to download the video that they feel like downloading it for future reference. Now you’ll either open your slow YouTube videos downloader software or search for an alternate solution for downloading the videos. Last time I also posted an article regarding how to download YouTube videos but that method is very easy than that. Always we used download managers software like IDM (Internet Download Manager), Orbit, and other effectively with Flashgot plugin for Firefox. But if we have Google Chrome or Opera or Safari users, then these download manager will not work for you. You can find a lot of extension for chrome to download YouTube videos like YouTube Center. But for others you have to use web services like KeepVid and SaveVid. I think I covered all the common tricks people use for downloading YouTube videos. This doesn’t stop from us finding new ways to do a task. One suck trick which is quite simple for everyone to perform and it can be used on any browser. The trick is called as PWN trick. Don’t worry about what it means; you just need to paste it in your browser address to download videos without a need of software. 

Below this trick, follow these simple steps
:-

Open the video which you want to view in your browser.
Click on your browser address bar; enter the letter ‘PWN’ (without quotes of course) before ‘YouTube’ and right after ‘www’, and simple press Enter.
Now you’ll be presented with a list of services like SaveVid, KeepVid, ClipNabber, and more for downloading both video and audio. Choose any of the services to download the video.

After clicking on any of the services, choose the format and quality of the video which you want to download and your work is done.

Note :- You may need JavaScript to be installed on your system. Also allow the JavaScript to run for downloading.

Monday, August 6, 2012

Facebook popularity in India comparison with other countries.

In present Era, Facebook has become the most popular social media site in India. With more than 31 million active users (as of August 2011), India trails only the United States and Indonesia in global usage. This has surpassed the orkut (social networking site by Google) users, which was the most popular before 2010. Nevertheless, Facebook has conquered the social media networking in India, just as it has in almost all countries now.
As per the latest report by Experian down the curtain, how much time people living in different countries spend on Facebook. Singapore users topped the chart, with US at the 5th position India at the 7th position. Brazil users spent only less than half the average time spent by Singapore. The high average minutes spent on Facebook provides an opportunity for firms to gain greater sales and engagement through content and advertising. The key finding of this study also inferred that India experienced the fastest growth in Facebook use over the past year, with the social network accounting for an increase in market share of 88% year on year (YOY) in August 2011 whereas US  experienced a market share increase from Facebook of 5% YOY.
         Countries           Average time spent on Facebook in August 2011 per session
  • Singapore           38 mins 46 sec
  • New Zealand      30 mins 31 sec
  • Australia             26 mins 27 sec
  • UK                    25 mins 33 sec
  • US                     20 mins 46 sec
  • France               21 mins 53 sec
  • India                  20 mins 21 sec
  • Brazil                 18 mins 19 sec
At present India is the 3rd most country with 100 million internet users after China (485 million) and US (245 million). As per one of the recent surveys made by Google, the usage of internet in India would be increased triple by 2014. I think by that time India may surpass US in terms of number of internet users. Another interesting factor is that Indian users are not using Facebook during work hours (Penn Olson, 2010). I feel this is one of the reasons, that in spite India being the 2nd most densely populated country in the world, still has less usage of Facebook than US.
Around 350 million of the active users currently are accessing Facebook through their mobile devices around the world. Approximately 3 of 5 smartphone users in US access social networking websites/Facebook whereas in India the mobile phones are used the most to access Facebook. The average cost of smartphones is also high in India than US. Same is the case with iPad’s. Therefore, I believe that increase in use of smartphones and iPad’s in India would also increase the Facebook users and its usage. Also, there is a huge potential for content and advertising markets in India to capture user’s attention and to enhance the marketing through better engagement in social networks. 

Wednesday, August 1, 2012

How to add Gmail in Outlook 2013 via POP ?

Lot of people using Gmail account always but on net If anyone wants to use his/her gmail account on outlook for checking mails without open gmail so for that are the steps which are as follows :- 

POP is enabled by default. In Outlook 2013, setting up a POP Gmail account couldn’t be easier.
By default, Gmail uses POP protocol, if you’ve changed it to IMAP, go into Gmail Settings and verify Pop is enabled and IMAP is disabled.
Launch Outlook and click the File tab. Then click the Add Account button on the right.
The Add Account wizard comes up. Enter in your name, email address and password twice, then click Next.
Outlook will verify your settings and complete the process of setting up your account. Click Finish.
Now you can send and receive email from you Gmail account through Outlook.

Twitter Delicious Facebook Digg Stumbleupon Favorites More