Practically Speaking About Cloud Computing: Google Apps Part III

Google Apps Part III – Google Apps Applications:

The default applications available in Google Apps, in addition to mail, are Calendar, Documents and Sites. About 6 months back, Google launched Google Apps Marketplace. The Google Apps Marketplace offers web-based applications that work seamlessly with Google Apps.

Email = Gmail

No doubt that many of us had a chance to have our private (free) emails with a couple of service providers! Personally speaking about myself, I have experienced usa.net, lycos, hotmail, yahoomail etc., and now with Gmail. There is no second thought that the Gmail experience is the best among all. The way Gmail entered into the scene is with a big bang! At the time when only several hundred MBs were the storage space, Gmail started with GB storage; with POP and IMAP access; with an attractive user interface that has evolved a lot over a period of time! From the date Gmail was announced in the year 2004 with 1 GB storage space, on invitation basis, till now Gmail is great and evolving.

For many reasons, Gmail remains as a favorite choice of many. In a recent survey by Lifehacker, Gmail web interface won the choice as best with a whopping margin. While Gmail remains free with ad support, Google Apps Mail in Premier Edition is the same without ads. The real attraction is that it is ever evolving! The recently introduced Priority Inbox! A Call Phone link introduced a few months back!

Gmail for business in Google Apps:

Gmail for business included in the Google Apps offers 25 GB of storage per user, powerful spam filtering, Mobile and Outlook connectivity and a 99.9% uptime SLA. The spam filtering with Postini services is giving the one of the best results in controlling spam. Businesses prefer this email service because:

  • Get control of spam – Advanced filters keep spam from your inbox so you can focus on messages that matter.
  • Keep all your important email – 25 GB of storage per user lets you keep just about anything you think may be important down the road.
  • Unified communications – Email, instant message, and make high-quality voice and video communication without launching a separate application.
  • Find old messages instantly – Google search technology is built in, so you can find emails and instant message conversations quickly.
  • Prevent data leaks – Create custom inbound and outbound policies to keep sensitive information safe with Email Security.
  • Interoperability – Sync your Microsoft Outlook inbox with Gmail.

Google Calendar

A web-based calendar application that enables employees to work together efficiently and helps minimize costs and IT hassles.

  • Easily schedule appointments. Overlay multiple calendars to see when people are available. Google Calendar sends invitations and manages RSVPs.
  • Integrate with your email system. Google Calendar is integrated into Gmail and interoperable with popular calendar applications.
  • Share project calendars. Calendars can be shared company-wide or with select co-workers. A range of sharing permission controls help maintain security and privacy.
  • Access with your mobile device. View and edit event details, add new events, and invite guests on mobile devices like the BlackBerry and iPhone. Even receive calendar notifications via SMS.
  • Publish calendars. Publicize external company events by publishing a calendar to make it searchable in the Google Calendar gallery. Easily embed calendars into web pages.

Google Sites:

Google Sites is an easy way to create secure web pages for intranets and team projects. No coding or HTML required.

  • Organize information in a central place. Use Google Sites to centralize documents, spreadsheets, presentations, videos, slideshows and more to help keep teams organized.
  • New! Build collaborative sites faster with templates for project workspaces, team sites, intranets and more.
  • Anytime, anywhere access. Google Sites is securely powered by the web, so you can access company pages from your desk, on the road, at home and on your mobile phone.
  • Works across operating systems. Google Sites works in the browser on PC, Mac and Linux computers.
  • System and site-level security controls. Administrators can manage site sharing permissions across the business, and authors can share and revoke file access at any time.

By Glenn Blake

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comic
SWIFT Says Bank Hacks Set To Increase

SWIFT Says Bank Hacks Set To Increase

Bank Hacks Set To Increase SWIFT, whose messaging network is used by banks to send payment instructions worth trillions of dollars each day, said three clients were hacked over the summer and cyber attacks on banks are set to increase. The theft of $81 million in February from Bangladesh’s central bank using SWIFT messages rocked…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Lighter Side Of The Cloud – Data Merge

The Lighter Side Of The Cloud – Data Merge

By Christian Mirra Please feel free to share our comics via social media networks such as Twitter, Facebook, LinkedIn, Instagram, Pinterest. Clear attribution (Twitter example: via @cloudtweaks) to our original comic sources is greatly appreciated.

The Rise Of Threat Intelligence Sharing

The Rise Of Threat Intelligence Sharing

Threat Intelligence Sharing  Security has been discussed often on CloudTweaks and for good reason. It is one of the most sought after topics of information in the technology industry.  It is virtually impossible to wake up and not read a headline that involves the words “Breached, Hacked, Compromised or Extorted (Ransomware)“. Included (below) is an…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

Cloud Infographic – Cloud Computing And SMEs

Cloud Infographic – Cloud Computing And SMEs

Cloud Computing And SMEs SMEs (Small/Medium Sized Enterprises) make up the bulk of businesses today. Most cloud based applications created today are geared toward the SME market. Accounting, Storage, Backup services are just a few of them. According to the European Commission, cloud based technology could help 80% of organisations reduce costs by 10-20%. This infographic provided…

The Storytelling Machine: Big Content and Big Data

The Storytelling Machine: Big Content and Big Data

Bridging The Gap Between Big Content and Big Data Advances in cloud computing, along with the big data movement, have transformed the business IT landscape. Leveraging the cloud, companies are now afforded on demand capacity and mobile accessibility to their business-critical systems and information. At the same time, the amount of structured and unstructured data…

Cloud Computing Price War Rages On

Cloud Computing Price War Rages On

Cloud Computing Price War There’s little question that the business world is a competitive place, but probably no area in business truly defines cutthroat quite like cloud computing. At the moment, we are witnessing a heated price war pitting some of the top cloud providers against each other, all in a big way to attract…

Cloud Infographic – What Is The Internet of Things?

Cloud Infographic – What Is The Internet of Things?

What Is The Internet of Things? “We’re still in the first minutes of the first day of the Internet revolution.”  – Scott Cook The Internet of Things (IOT) and Smart Systems are based on the notions of Sensors, Connectivity, People and Processes. We are creating a new world to view and measure anything around us through…

The Business of Security: Avoiding Risks

The Business of Security: Avoiding Risks

The Business of Security Security is one of those IT concerns that aren’t problematic until disaster strikes. It might be tomorrow, it could be next week or next year. The fact is that poor security leaves businesses wide open for data loss and theft. News outlets just skim the surface, but hackers cost business up…

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies – The Future Of The Healthcare Industry

Mobile Connected Technologies Clinics, hospitals, and other healthcare facilities are embracing new mobile technologies in order to be more efficient in their daily tasks. With faster communication and better collaboration, clinicians can spend much less time handling medical devices and more time administering care to their patients. Industry experts are stating that mobile connected technologies…