General

DSL -vs- Cable -vs- Satellite -vs- T1 Which is best?

The challenge of DSL -vs- Cable -vs- satellite Internet access is primarily in the residential and telecommuter markets. Within the past few years, Internet access via a cable modem has become available in many residential areas. When configured properly and under optimal conditions, cable has the capacity to transmit data twice the speed of DSL, and in some locations, even faster. Satellite allows you to escape the confines of the cable/wire but at much lower speeds and much higher price. Satellite may not work at all in the rain.
 
Cable Broadband Internet
Cable Internet access has drastically improved over the years and has become a very reliable means of surfing the Internet. One of the main benefits of a cable broadband connection is that fiber optics can handle a very large amount of bandwidth which translates into very fast access potential, perhaps double DSL speed. Also performance of cable Internet. does not depend on distance from the provider's network exchange or offices like it does with DSL. Cable Internet is perfect for streaming audio/video, videoconferencing, on-line gaming, application programs, telephone calling and other high-bandwidth services.
 
There can be some limitations for residential Cable services however. Cable Internet. is not a dedicated service to your home and in most cases, is provided through a shared network by your cable TV provider. When too many users in a neighborhood try to share the same cable, performance speeds can be reduced 50% or more as users compete for available bandwidth. Also there may be a slight security risks which can make users more vulnerable to data interception, unauthorized monitoring or hacking from an extreme hacker in the neighborhood since it is a shared line*.

When buying Cable Internet, check the upload and download speed. Many cable companies will throttle back the upload speed by as much as 75%. Also, If you purchase Cable Internet. at a certain speed, make sure your Cable Modem will operate at that speed. Otherwise, you may be paying for speed that you cannot use.
 
DSL (ADSL) Broadband Internet
DSL (AKA Digital Subscriber Line or ADSL- Asymmetric Digital Subscriber Line), is a digital Internet. connection that uses your existing copper telephone wiring to deliver high-speed data services to homes and businesses (2-wire). DSL provides a dedicated line to each Internet. user and is an \"always on\" high-speed connection. DSL not only provides high-speed access to the Internet, but it can also do streaming audio/video, videoconferencing, on-line gaming, application programs, telephone calling and other high-bandwidth services (same as cable modem). DSL generally connects to your PC via a DSL modem and it does not interfere with your telephone service.
 
There can be some limitations for DSL services as well... The maximum speed of DSL is determined by the distance between the customer's location and the Central Office (CO). Unlike cable Internet. which is not hindered by distance, DSL speeds tend to be slower the further away from the central office you are. It is extremely rare, but DSL can be hacked where the wire leaves the house and at the main connection boxes * Also, like Cable, DSL carriers tend to throttle the upload speed by as much as 75%.

Satellite Internet
Sustained download speeds typically have a maximum of 500k (roughly 1/6 of DSL and 1/10th of cable modem potential). Whilst Satellite carriers boast of upload and download speeds of 10 gigs or better, actual sustained performance has proven to be much much lower. Our &!@#$ service advertised 10 gigs download and 1 gig upload speed. Our actual speed averages 800k download and about 128k upload.

The biggest pit fall of satellite connections is that they often have \"lag-time\" when requesting information to and from the satellite. As a result, normal browsing may seem sluggish,  but large file downloads are generally much improved over traditional Dial-up connections. Often the upload transmissions on satellite connections run over a traditional dial-up modem at 56k baud or less.

Satellite is not fast enough for most streaming audio/video, videoconferencing, on-line gaming, application programs, telephone calling and other high-bandwidth services.

And on a cloudy or rainy day - you may have no Internet. access at all.

Another issue is the fact that bandwidth is limited or purchased in batches. When you exceed your bandwidth allotment, you might be shocked when you receive your bill.

Satellite connections require the installation of a dish and satellite transceiver at the user's location which may be purchased outright or leased. The dish then sends and receives data with an orbiting satellite, the distance of the transmission and weather can negatively affect performance (forget satellite Internet. in the rain).

Satellite Internet. does really shine in two areas:
1.    Rural areas beyond the reach of the cable/wire
2.    In a motorhome, airplane or such vehicle where satellite can provide Internet. access any place, anytime when you have line-of-site to the satellite (even whilst on the move). (except when it rains).

Being a point to point technology, satellite connections are less exposed than cable access.

Dedicated T1 Internet Service
T1s are large pipes used to transport digital voice and data signals from a business location to the Internet. or dedicated destination. This service can handle a great deal of bandwidth, both voice and data, and has 24 fixed channels to send information over. Unlike Cable, DSL, and Satellite, T1 bandwidth is guaranteed to remain constant.

Businesses can now lease a full T1 that will provide 1.54 Gigs of connectivity (guaranteed upload and download speed) with the flexibility to assign the available channels to voice or data. This is guaranteed throughput that can support up to 50 users comfortably, with each user having their own bandwidth so as not to slow down other users.

From a pricing standpoint the T1 used to be a great deal more expensive than DSL. Now, companies like Earthlink, Windstream, and Spirit are offering 4 telephone lines and a T1 for about $300.00 per month. With the guaranteed bandwidth and associated features, the service is well worth the price.

 * Please note: In all cases, whether you choose DSL, Cable, T1, or Satellite Internet., it would be wise to use some type of a firewall protection

 

Early Windows 8 look baffles consumers

The release of Microsoft's Windows 8 operating system is a week away, and consumers are in for a shock. Windows, used in one form or another for a generation, is getting a completely different look that will force users to learn new ways to get things done.

Microsoft is making a radical break with the past to stay relevant in a world where smartphones and tablets have eroded the three-decade dominance of the personal computer. Windows 8 is supposed to tie together Microsoft's PC, tablet and phone software with one look. But judging by the reactions of some people who have tried the PC version, it's a move that risks confusing and alienating customers.

Tony Roos, an American missionary in Paris, installed a free preview version of Windows 8 on his aging laptop to see if Microsoft's new operating system would make the PC faster and more responsive. It didn't, he said, and he quickly learned that working with the new software requires tossing out a lot of what he knows about Windows.

"It was very difficult to get used to," he said. "I have an 8-year-old and a 10-year-old, and they never got used to it. They were like, `We're just going to use Mom's computer."'

'I have an 8-year-old and a 10-year-old, and they never got used to it.'

- Tony Roos, an American missionary in Paris, on an early preview version he tested

Windows 8 is the biggest revision of Microsoft Corp.'s operating system since it introduced Windows 95 amid great fanfare 17 years ago. Ultimately, Windows grew into a $14 billion a year business and helped make former Chief Executive Bill Gates the richest man in the world for a time. Now, due to smartphones and tablets, the personal computer industry is slumping. Computer companies are desperate for something that will get sales growing again. PC sales are expected to shrink this year for the first time since 2001, according to IHS iSuppli, a market research firm.

The question is whether the new version, which can be run on tablets and smartphones, along with the traditional PC, can satisfy the needs of both types of users.

"I am very worried that Microsoft may be about to shoot itself in the foot spectacularly," said. Michael Mace, the CEO of Silicon Valley software startup Cera Technology and a former Apple employee. Windows 8 is so different, he said, that many Windows users who aren't technophiles will feel lost, he said.

Microsoft is releasing Windows 8 on Oct. 26, and it doesn't plan to cushion the impact. Computer companies will make Windows 8 standard on practically all PCs that are sold to consumers.

Speaking to Wall Street analysts on Thursday, Microsoft's chief financial officer Peter Klein said he isn't very concerned that user confusion could slow the adoption of Windows 8. When Microsoft introduces new features, he said, people eventually realize that "those innovations have delivered way more value, way more productivity and way better usability." That's going to be true of Windows 8 too, he said.

Instead of the familiar Start menu and icons, Windows 8 displays applications as a colorful array of tiles, which can feature updated information from the applications. For instance, the "Photos" tile shows an image from the user's collection, and the "People" tile shows images from the user's social-media contacts. (Microsoft is licensed to use AP content in the Windows 8 news applications.)

On a conference call Thursday, an analyst asked Chief Financial Officer Peter Klein about the risk of introducing such a radical new system.

QUESTION: Over the past several months many of those reviewing Windows 8 for PCs, while praising the significant innovation behind the OS, have continued to focus on the dual interfaces and the adjustment that users will have to make. Is that something that causes you concern just when it comes to initial adoption levels of Windows 8?

RESPONSE: You know, not a lot .... At Microsoft when we do innovation, historically across our products, oftentimes there's new things that come. ... What we've seen over time is that those innovations deliver way more value, way more productivity and way better usability. I'm very confident that that is even more true with the great technology and capabilities in experiences that we have with Windows 8.

The tiles are big and easy to hit with a finger -- convenient for a touch screen. Applications fill the whole screen by default -- convenient for a tablet screen, which is usually smaller than a PC's. The little buttons that surround Windows 7 applications, for functions like controlling the speaker volume, are hidden, giving a clean, uncluttered view. When you need those little buttons, you can bring them out, but users have to figure out on their own how to do it.

"In the quest for simplicity, they sacrificed obviousness," said Sebastiaan de With, an interface designer and the chief creative officer at app developer DoubleTwist in San Francisco.

Technology blogger Chris Pirillo posted a YouTube video of his father using a preview version of Windows 8 for the first time. As the elder Pirillo tours the operating system with no help from his son, he blunders into the old "Desktop" environment and can't figure out how to get back to the Start tiles. (Hint: Move the mouse cursor into the top right corner of the screen, then swipe down to the "Start" button that appears, and click it. On a touch screen, swipe a finger in from the right edge of the screen to reveal the Start button.) The four-minute video has been viewed more than 1.1 million times since it was posted in March.

"There are many things that are hidden," said Raluca Budiu, a user experience specialist with Nielsen Norman Group. "Once users discover them, they have to remember where they are. People will have to work hard and use this system on a regular basis."

Mace, the software CEO, has used every version of Windows since version 2.0, which came out in 1987. Each one, he said, built upon the previous one. Users didn't need to toss out their old ways of doing things when new software came along. Windows 8 ditches that tradition of continuity, he said.

"Most Windows users don't view their PCs as being broken to begin with. If you tell them `Oh, here's a new version of Windows, and you have to relearn everything to use it,' how many normal users are going to want to do that?" he asked.

The familiar Windows Desktop is still available through one of the tiles, and most programs will open up in that environment. But since the Start button is gone, users will have to flip back and forth between the desktop and the tile screen.

There's additional potential for confusion because there's one version of Windows 8, called "Windows RT," that looks like the PC version but doesn't run regular Windows programs. It's intended for tablets and lightweight tablet-laptop hybrids.

Budiu believes the transition to Windows 8 will be most difficult for PC users, because Microsoft's design choices favor touch screens rather than mice and keyboards. Alex Wukovich, a Londoner who tried Windows 8 on a friend's laptop, agrees.

"On a desktop, it just felt really weird," he said. "It feels like it's a tablet operating system that Microsoft managed to twist and shoehorn onto a desktop."

Not everyone who has tried Windows 8 agrees with the critics.

Sheldon Skaggs, a Web developer in Charlotte, N.C., thought he was going to hate Windows 8, but he needed to do something to speed up his 5-year-old laptop. So he installed the new software.

"After a bit of a learning curve and playing around with it a bit more, you get used to it, surprisingly," he said.

The computer now boots up faster than it did with Windows Vista, he said.

Vista was Microsoft's most recent operating-system flop. It was seen as so clunky and buggy when released in 2007 that many PC users sat out the upgrade cycle and waited for Windows 7, which arrived two and a half years later. Companies and other institutions wait much longer than consumers to upgrade their software, and many will keep paying for Windows 7. Many companies are still using Windows XP, released in 2001.

Colin Gillis, an analyst at BGC Financial, is optimistic about Windows 8, pointing out that it's snappy and runs well on PCs with limited processing power, making it suited for compact, tablet-style machines. But he also notes that through Microsoft's history, roughly every other operating-system release has been a letdown.

Intel Corp. makes the processors that go into 80 percent of PCs, and has a strong interest in the success of Windows. CEO Paul Otellini said Tuesday that when the company has let consumers try Windows 8 on expensive "ultrabook" laptops with touch screens, "the feedback is universally positive." But he told analysts that he doesn't really know if people will embrace Windows 8 for mainstream PCs.

"We'll know a lot more about this 90 days from now," he said.

$200 Kindle Fire Burning Up the Android Tablet Competition

The Kindle Fire, Amazon's hot rod e-reader, had an astounding 54 percent of the Android tablet market just four months after its release. No one else was even close, according to a report by comScore, a digital market research firm.

A ConsumerAffairs analysis of about 940,000 consumer comments on Facebook, Twitter and other social media finds a similarly meteoric rise in net sentiment, with a positive rating of 72 percent last month.

Read More - Click Here!

What does the Kindle Fire do?

Movies, apps, games, music, reading and more, plus Amazon's revolutionary, cloud-accelerated web browser
  • Over 20 million movies, TV shows, songs, magazines, and books
  • Thousands of popular apps and games, including Netflix, Hulu Plus, Pandora, and more
  • Ultra-fast web browsing - Amazon Silk
  • Free cloud storage for all your Amazon content
  • Vibrant color touchscreen with extra-wide viewing angle - same as an iPad
  • Fast, powerful dual-core processor
  • Favorite children's books, graphic novels, and magazines in rich color
  • Amazon Prime Members enjoy unlimited, instant streaming on thousands of popular movies and TV shows. Learn More
  • Amazon Prime Members choose from over a hundred thousand books to borrow for free. Learn More

(Reuters) - Amazon.com Inc's stellar quarterly results are helping convince skeptics on Wall Street that a bout of intense spending is beginning to pay off for an Internet retailer trying to transform itself into a technology company.

Shares in Amazon leapt 15 percent on Friday after it reported first-quarter earnings and margins well above investors' most bullish expectations, tacking on some $10 billion in market value and marking its biggest single-day gain since October of 2009.

CEO Jeff Bezos has tried to convince investors to stick with the company for the long term as it flirted with losses in recent quarters. He is trying to transform Amazon from an online version of a big-box retailer like Wal-Mart into a provider of technology services.

Read More - Click Here!

 

'Leave Computers On or Off Overnight???

Leave Computers On or Off Overnight???

By request, I've searched and researched the question as to whether to leave the computers on or turn them off when not in use. I searched my personal archives, the internet, and interrogated fellow computer repair people, and engineer, and even stumbled upon a thesis from MIT. A strong case can be made for either side of the issue so please read on and decide for yourself. But don't worry, I won't leave you hanging. I will also let you know what I do with my computers.

Arguments for turning the computers off:
Old school logic would have you turn off your computer when not in use. Computers used to consume $10.00 of electricity each month. That alone would move me to click the off switch. In addition, the bearings on cooling fans and hard drives were not so good and would wear out in about a years worth of continuous running. Let's see 8 hours of work and 16 hours of running idle - Old school says "Turn It Off!"

Home computers were used differently back then too. Dad did the check-book and played pong or pac-man. Mom played a little solitaire and that was it. The computer was used an hour or so during the evening, then turned off until the next time.

Electrical Theory: The electrical theory is that during operation a piece of equipment is subjected to more surges in power than the initial surge whilst turning on and off is worth, which means over time more damage is done with the power on. Also, electrical parts wear out due to constant heat. It's more of a high mileage theory, with the analogy, "Light bulbs are rated for so many hours of use, and once they're used, the bulb will blow".

Conspiracy Theory: Electrical power companies have conspired to convince people to leave their equipment on to increase profitability. (Believe it or not, most of the folks I asked the suggested turning off the computer when not in use, came up with this reason first, and, frankly, it made me question everything else they said).

Arguments for leaving the computers on:
Power and Torque: At the instant that an electrical device is turned on or off to a power source, there is an electrical burst of energy comparable to a mechanical "jerk\" The rate of change is instantaneous and infinite. This electrical "jerk", surge, or spike, for an instantaneous moment, brings voltages much much much higher than the 5 or 12 volts normally used to power the devices inside your computer.

Notable as well, motors such as the electrical motors in the hard drives, floppy drives, CD/DVD, and fans take a big shock called torque when it goes from running at 7200 rpms to a dead stop. This is repeated when the switch is turned on and these devices go from 0 rpm to 7200 rpm.

All of this means that at the moment the machine is turned on, an incredible amount of current is necessary to get things moving, and the mechanical torque and electrical surge is at it's highest, usually instantaneously higher than the tolerances of the equipment. This is the point where equipment usually fails, as it is the greatest amount of instantaneous load that can be put on the equipment.

Case and point, A light bulb never blows when it's already on, it only blows when it is turned on. Same is usually true with a computer.
I personally keep my computers on 24/7 for several reasons:

1.    I don't believe in conspiracy theories.

2.    Computers draw much less electricity than in yesteryear. A typical DuelPro 2 gigs of ram, 320 gig drive, CD/DVD will cost about $30.00 a year to leave on ($2.50 a month – 8 cents a day).

3.    The toque / spike thing came from an engineer that I trust. It's real and is not impacted or improved by a surge protector or battery backup.

4.    Surge protectors or Battery Backups (UPS), particularly those that run the computer off of the battery, nearly eliminates spikes and surges whilst running your computer. (However, they do nothing to improve spike and torque issues whilst turning the computer on and off.)

5.    Microsoft Updates can occur at 3:00am and be complete by the time you wake up and start using your computer at 6:00am (some of these take an hour or more to complete)

6.    Anti-Virus Updates and scans can occur during the night rather than when you are trying to boot your computer to quickly see your checking account balance.

OK!  I spilled the beans! I recommend leaving the computer on 24/7, as well as modems, routers, and firewalls.

However, I do turn off printers, monitors, audio equipment, cameras, and most other peripherals connected to the computer. Why?

1.    Many of these devices such as monitors use more electricity than the computer (savings)

2.    Most peripheral devices turn on and off instantly no wait.

3.    Most peripheral are tougher than computers and can take the abuse

4.    Most peripheral are no subject to Microsoft Updates and Anti-Virus Updates

5.    Most peripheral are very inexpensive to replace VS a computer

http://active-technologies.com/content/leave-computers-or-overnight

 

10 reasons to be wary of Google in business By Justin James

Takeaway: Google caters well to consumers, but it falls short of meeting the business needs of larger organizations. Here are the biggest areas of concern.

Without a doubt, Google is playing a larger and larger role in business IT. But as many have found out, doing business with Google requires certain expectations to be set up front. This is not to say that doing business with it is awful, or that other companies do not have many of these issues as well, of course. Still, there are some good reasons to be wary about doing business with Google.
 
1: Customer support is not its forte
 
The biggest reason to think twice about doing business with Google is that its organization is simply not designed to provide support for customers. Google has recently opened some phone numbers for customers to reach them, but by and large they prefer support to be email only (if they provide it at all). This is a perfectly fine approach for a free or ad-supported product. But if you are hoping to run a business built on Google’s offerings, you’ll want to check out the support options first.
 
2: Leadership has questionable views on privacy
 
Eric Schmidt (executive chair of Google’s board) recently joked about whether your Android contact list and most recent calls should be used to customize advertising. Whether Google is heading in that direction or not, no one wants to think that Google takes these matters lightly. Time and time again, Google’s executives (particularly Mr. Schmidt) have made it clear that they will get as much data generated by your online activities as legally and technically possible. Is that necessarily bad? No. But their attitude seems to be that if you want any kind of online privacy, you need to go through extreme measures.
 
3: It makes its living by leveraging information about you
 
Most users never stop for a moment to ask themselves how Google can do so much for no cost to them. Of course, the answer is advertising, and that is nothing new. But what makes Google’s advertisements so valuable is not just their wide reach but the selective targeting. You see, Google has taken the same engineering that produced its excellent search engine and applied the effort toward linking ads to people, based in no small part upon the data harvested as a result of your daily interactions with them.
 
Of course, seeing ads on Google Search based on previous searches is not a shock. But it’s a bit creepy (and occasionally embarrassing) when you go to a site and look at products there, and then ads from that site follow you around to every site you visit for months. If you want to know what other users do with their computers, just look at what ads Google displays for them.
 
In addition to the inherent privacy concerns (”What if a hacker gets a hold of this?” and “What if other sites figure out how to use this?”), there are legal concerns. As the government continues to subpoena Google’s data, it is quite possible that data concerning you will end up in a government database, and who knows where it will go from there.
 
4: It’s too willing to yank products and APIs
 
Google is famous for rolling out new products on a regular basis. Unfortunately, it is also famous for pulling the plug on them. Sure, other companies do the same thing. But Google’s threshold for failure feels a lot lower. Even more frustrating is when it does this with APIs. It has become clear that Google opens APIs to study usage in the wild, but once it has learned what it wanted to, Google shuts down the APIs. This may work great for Google, but it is a nightmare scenario for companies that depend upon its products and services.
 
5: Quality is sometimes lacking
 
Overall, the quality of Google products is high. But there are some exceptions, and those exceptions (especially Android’s issues) are quite visible and damaging. Google’s “perpetual beta” was cute when it was Gmail or Orkut. When the same mentality is applied to your phone’s OS or your business email, it is an entirely different story. Google seems to currently view its target audience as consumers or small businesses for whom its applications are not mission critical.
 
6: It has minimal contact with real-world users
 
Google takes an extremely data-driven approach to deciding how to do things. For example, its usability changes are driven by massive amounts of data. It will roll out a change to a “small” group of users (which could be millions of people), observe how usage patterns change, and then make decisions from there. Google is lucky to have one of the largest user bases in the world for its applications, so it can take this approach and have tons of data.
 
Google doesn’t like user feedback, in large part because it is hard to quantify. The problem is that it believes the data, not users. While this isn’t terribly surprising (IT professionals have plenty of horror stories about how they did what users wanted, and it was a mess), it can be very frustrating to work with Google or to hope for a particular feature or change to be made. There just isn’t a way for the voice of the customer to be heard.
 
7: There are no SLAs
 
Google doesn’t do SLAs because, for the most part, Google doesn’t have any contracts to use its services. Now, that said, Google’s track record with uptime has been pretty good; better than most, honestly. If you look at its history over the last few years, an SLA is more a security blanket for you than anything else, and it would not change how it runs its business one bit anyway.
 
8: It has a consumer focus for features
 
One of the big reasons why Google has done so well is that its solutions cater well to consumers, and by extension, small businesses. At the same time, large companies have needs as well, and Google just does not meet them. For example, where is the federated Active Directory authentication for Google Apps for Business or the central management of Android phones? Those are the kinds of things that businesses need but consumers and small businesses do not. And until Google expands its focus a bit, these needs will not be met.
 
9: You are not important to Google
 
If you are part of a business, the traditional customer-vendor relationship is familiar, comfortable, and normal to you. But this is not in Google’s DNA. Google’s main currency is actually your clickstream data. Why does it give away Google Analytics? So it can collect clickstream data? Gmail? Search? Same thing. Its APIs? More data to feed the machine. Google’s true business is to run a commodities market where it is both the market itself and the sole producer of the commodity. In Google’s eyes, it is seller’s market. You have no other choices, and there are plenty of other people happy to buy that same commodity. Where other vendors would work hard to keep you happy, Google does not even bother to tell you to take a hike.
 
10: Google does not cater to business expectations
 
Google is really good at getting individuals and small businesses the products they need for free or nearly free. But it struggles when doing business with enterprises because the expectations are different. Google succeeds with the smaller companies because they understand that you get what you pay for. They don’t feel that a service that is free, or nearly so, is worth complaining about.
 
An enterprise, though, is often willing to pay more money to get certain things, like no ads, preferential treatment, a dedicated account executive, and SLAs. These are not bad things. But again, Google just is not set up to do business like this (with the exception of Google Apps for Business). Because it has such minimal interaction with you as client, it isn’t going to understand your needs, let alone try to cater to them. If what it delivers is fine with you, that’s great. But if you want the handholding, customization, support, etc., that a traditional vendor will sell you for an upcharge, Google isn’t going to be providing it.

16 things successful people do on Monday mornings

View gallery

.

Running Runners California Muscular Man Jogging Barefoot Sneakers

(Chris Hunkeler / Flickr) One  thing successful people do Monday morning: They wake up early and exercise. 

(Jacquelyn Smith@ BusinessInsider) Monday mornings are the most critical time of the workweek — they set the stage for the day and week ahead.

"Because you've stepped away for a couple days, these back-to-work mornings are the most memorable for the rest of the week," says Lynn Taylor, a national workplace expert and the author of "Tame Your Terrible Office Tyrant: How to Manage Childish Boss Behavior and Thrive in Your Job." 

"They influence your mindset in a positive or negative way, depending on what actions you decide to take," Taylor says.

Most successful people are keenly aware of the typical Monday-morning workplace dynamic of unanticipated events, overflow of communications, and general chaos. "But after weathering hundreds of them, they realize they must gain control and stay upbeat," Taylor explains. "They take extra steps to compensate for this busy time of the week, and apply their best management skills to ensure that the day unfolds as smoothly as possible."

Here are 16 things successful people do on Monday mornings:

1. They wake up early. Successful people go to sleep at a decent hour on Sunday night, get a good night's sleep, and wake up early Monday morning. 

"When the alarm goes off and the voice tells you that you went to bed far too late to get up this early, or that five more minutes won't hurt, DON'T LISTEN!" writes Ciara Conlon for Lifehack. "When you are in charge of the inner voice, there will be no stopping you."

2. They exercise. Working out gets your circulation going and helps you stay alert, putting you at an advantage for a productive week ahead. "You'll get your endorphin rush, which will help your mood, too," Taylor says.

3. They eat a healthy breakfast. On Monday morning, you want to handle everything you have control over. Eating breakfast is one of those things. "You don't want to be staring at the clock, awaiting lunch time as your stomach growls at morning meetings," she says.

 

View gallery

.

breakfast

(Tella Chen/flickr) 
4. They arrive early. 
Do not succumb to the snooze button. "Commutes are bad on Monday, so beat the odds," Taylor says. Plus, getting in earlier than others will help make Monday morning seem more like the afternoon because you'll have had a chance to breathe before responding to the barrage of people and issues. "Being an early bird will give you some wiggle room for the unexpected at work, not to mention any important personal matters that may arise," she says.

 

5. They clear their desk and desktop. "Hopefully you already did this before you left on Friday. But if you didn't, get this out of the way, or you might add to Monday stresses in a sea of disorganization," Taylor says. Organize and prioritize your files. Put aside unimportant paperwork and keep critical files easily accessible. You want to be prepared when you, your boss, or colleagues need something at the last minute.

6. They carve out time for unexpected projects and tasks. Successful individuals expect the unexpected on Monday, she says. "Your boss, team members, or staff may have remembered some loose ends over the weekend, so you're wise to build in some extra down time on Monday morning."

7. They greet their team and boss. This is important to do first thing every morning to keep morale high, but on Monday it's particularly valuable, as your team needs a special boost. "Ideally, you'll spend an few extra minutes with your colleagues on Monday mornings. It reinforces a sense of purpose and community for everyone, including you," Taylor explains.

 

View gallery

.

boss workplace

(University of Exeter/Flickr) 
8. They update their to-do list and goals. "Get yourself current on priorities and tasks," Taylor suggests. Then set five to eight goals for the week.

 

"Accomplished professionals have several goals in mind for the day and week," she says. "They know that if all goals aren't achieved, they can take pride in accomplishing most of them, and there's next week to achieve additional objectives."

9. They visualize the week's successes. By envisioning the positive outcomes of various projects at hand, you can work backward and determine the necessary steps to get your desired results.

10. They screen emails for urgent requests. You can sink into email oblivion if you don't scan your inbox for urgency, Taylor says. "Star emails that are priorities and think quality, not quantity."

11. They tackle the tough challenges first. The least desirable but critical projects are easy to put off, but your energy is stronger in the morning, so that's the ideal time to confront the most difficult assignments.

12. They make an extra effort to smile. "It might be the last thing on your mind, but overcompensating for the pressure cooker morning will help you get through it," she says. You may well stand out in the crowd, but your smile will likely be contagious, helping both you and team members relax.

 

 

.

Office smile happy

(Flickr/Highways Agency) 
13. They add a "blanket of humanity" to their emails. It's tempting to power through all your emails in the most efficient way on Monday mornings. But before you hit send, read them over to ensure that they're friendly and clear. "Put yourself in the recipient's shoes. It's relatively easy to appear curt when you're in a hurry, along with the impersonal nature of emails and texts. You want to mitigate false starts and misinterpretations," Taylor says. One way to do this: Start the email by saying "Hi" and "I hope you had a great weekend."

 

14. They're able to say no. "On Monday mornings there will be many distractions — from people, to emails, to calls, meetings, offers for meeting in the break room, and so forth," Taylor explains. "Successful people can diplomatically and politely say no to colleagues by offering to engage at a later time."

If your boss needs you, that is clearly an exception. However, if you have crucial calls to make or meetings to attend, give your boss the heads-up. "It's stressful to be a people pleaser, particularly on Monday mornings. Generally, no one ends up being pleased, as you can't do your best work with conflicting priorities."

15. They stay focused. Successful people don't dwell on any challenging events that occurred over the weekend, or other frivolous thoughts. "Compartmentalize by putting them in a separate 'box' as you start your week," she says.

16. They remember that there is Tuesday. "In all the chaos it's easy to believe that the world will cave if you don't solve all Monday's problems on Monday," she says. "But when the dust settles at the end of the day, you may realize that certain tasks could have waited." Sometimes you obtain more information over time that enhances your decision-making. Or you may find that certain problems you're pondering will resolve themselves.

Monday morning can challenge even the most industrious, successful business leaders. "But if you compensate for all the anticipated distraction and intensity by remembering to focus, plan, and stay calm, you won't relive Monday all over again on Tuesday," Taylor says

20 seconds of BLINKING can stop computer users getting eye strain

(Mark Prigg @ mailOnline)Researchers have come up with a simple exercise they claim could stop computer users getting eye strain.

 

They say blinking 20 times in a row every 20 minutes should be combined with looking away from the screen for 20 seconds and focusing on an object 20 feet away.

The '20-20-20-20' strategy has been designed as a solution to computer vision syndrome (CVS) which affects millions of workers and games addicts.

Scientists claim blinking 20 times in a row every 20 minutes should be combined with looking away from the screen for 20 seconds and focusing on an object 20 feet away

Scientists claim blinking 20 times in a row every 20 minutes should be combined with looking away from the screen for 20 seconds and focusing on an object 20 feet away

THE 20-20-20-20 SYSTEM

The strategy is simple.

Blinking 20 times in a row every 20 minutes should be combined with looking away from the screen for 20 seconds and focusing on an object 20 feet away.

Symptoms such as dry and tired eyes, headaches and sore necks and joints are usually temporary but for many can be a daily problem that leads them to seek medical help.

Those most at risk are anyone who spends three or more hours a day in front of a computer, but it can be painful and lead to many being prescribed glasses.

But although it may look a bit odd, a regular bout of blinking could help, said researcher Dr Edward Mendelson from the Southwestern Medical Centre at the University of Texas. 

He said: 'Every 20 minutes the computer user should take a break for 20 seconds and look at objects that are 20 feet away.

'And give yourself 20 good blinks - blinking is nature's way of keeping the eyes moist and those blinks help to lubricate and refresh.'

Anyone who spends long periods in front of a screen is at risk but it is often worse for workers because of the sterile and unnatural conditions in modern office blocks.

 
Experts say the advice could help those who suffer from eye strain after a day staring at a computer screen

Experts say the advice could help those who suffer from eye strain after a day staring at a computer screen

Dr Mendelson added: 'Today's offices are commonly cool and dry, which is nice and comfortable, except for the eyes.'

Eye drops taken before work begins can help with dry eyes but a break from a screen can also help with the other elements of CVS like neck, muscle and headaches from being sat in one position for too long, researchers say.

Read more: http://www.dailymail.co.uk/sciencetech/article-2292882/The-simple-solution-screen-fatigue-Scientists-say-20-seconds-BLINKING-stop-users-getting-eye-strain.html#ixzz2NbN4L4P7
Follow us: @MailOnline on Twitter | DailyMail on Facebook

3-D pen that lets you draw objects in the air

(Brandon Griggs@CNN) We're all doodlers by nature. Give most people a pen, paper and some down time, and they'll fill the margins with the fruits of their imagination.

But imagine if you could wave a pen in the air and create a three-dimensional rendering: A toy, a sculpture, a crude architectural model.

Soon you will. A Boston-based startup, WobbleWorks, has created what they are calling the world's first 3-D printing pen. It's called the 3Doodler, and it's been a sensation on Kickstarter, the crowdfunding site, since it debuted there Tuesday morning. The makers of the 3Doodler set a modest fundraising goal of $30,000; within 48 hours, backers had pledged more than $1.1 million.

"We knew it was a great product. But we didn't expect the response to be this fast," said Daniel Cowen, a spokesman for the gadget, which is still a prototype. "The velocity of the response caught us by surprise. It's phenomenal."

The 3Doodler plugs into an electrical outlet and works sort of like a glue gun. As the pen draws, it oozes heated plastic, which quickly cools and solidifies, allowing  its user to build an infinite variety of patterns and shapes. Its makers say it works on surfaces or in the air.

Users load spaghetti-like strands of non-toxic ABS plastic - the same stuff that's in 3-D printers - into the back of the pen. (A biogradeable form of plastic made from corn is also available.) The 3Doodler's makers say each one-foot strand of plastic, available in a wide range of colors, can produce about 11 feet of moldable material.

WobbleWorks sees the 3Doodler as a simple and affordable form of 3-D printing, an emerging form of manufacturing that uses computer models to help machines build plastic objects. The MakerBot Replicator 2, perhaps the best-known 3-D printer for the home, costs $2,200. Cowen said they expect to sell the 3Doodler for $75, which includes a small bag of plastic strands.

Additional 1kg spools of plastic will be available from a variety of sources for $30 to $55, WobbleWorks says.  The pen's makers say the average 1kg spool of 3mm ABS plastic will supply roughly 4,000 feet of 3Doodling, or about the height of three Empire State Buildings.

The gadget is shaping up to be a hit for WobbleWorks, a small toy and robotics company led by computer engineers Peter Dilworth and Maxwell Bogue.

If manufacturing goes according to schedule, the first buyers will receive their 3Doodlers in September, Cowen said. Buyers who order now won't receive the pen until November, he said.

The makers of 3Doodler have been collaborating with wire artists on Etsy, the crafts website, to show how the pen can be used to create artwork, jewelry and other objects.

"We really want to create a community around 3Doodler," Cowen said. With more than 13,000 financial backers already on Kickstarter, they may already have.

32-BIT VS 64-BIT – WHAT’S THE DIFFERENCE

( @ DigitalTrends) You’ve probably seen 32-bit and 64-bit options available whenever you download an app, or install a game. Your PC might even have a sticker that says it has a 64-bit processor. But does it really matter? Nearly every PC nowadays has a 64-bit processor now, so why should you care about the difference between 32-bit and 64-bit operating systems?

Well, for starters, if you’re a Windows user, you’ve probably noticed that you have two Program Files folders — one labeled simply “Program Files” and the other labeled “Program Files (x86).” Understanding the difference between these two folders and why you have them in the first place is pretty important, especially if you’ve ever installed the wrong program in the wrong folder. It’s the kind of thing you’ll never notice until you accidentally do it and your apps start misbehaving.

The same, but different

First off, the reason you have those two folders is because there are currently two fundamentally different architectures used to manufacture computer processors, and as a result, there are two fundamentally different ways to write programs and apps. Applications all use shared resources on a Windows system; these are called DLL files, or Dynamic Link Libraries. They’re basically just pooled libraries of common resources that many different apps will use. Windows puts them all in a single place to make things easier for software developers.

So those DLL files are written and structured in fundamentally different ways because they’re meant to be used by 64-bit applications or 32-bit applications. If, for instance, a 32-bit application reaches out for a DLL and finds a 64-bit version, it’s just going to stop working. Imagine going into a library to find a specific textbook, and then realizing that everything is in a foreign language. You’d likely leave and assume you went to the wrong place right. Same basic principle applies here.

Wouldn’t it be easier if you simply used 64-bit software on 64-bit systems, and ignore 32-bit software entirely? Well, not really. The problem is the 32-bit (x86) architecture has been around for a very long time, and there are still a host of applications that utilize 32-bit architecture. Modern 64-bit systems can run 32-bit and 64-bit software because of a very simple and easy solution: two separate Program Files directories. When 32-bit applications are sequestered to the appropriate x86 folder, Windows knows to serve up the right DLL, aka the 32-bit version. Everything in the regular Program Files directory, on the other hand, can access the other stuff, the good stuff.

So why does it even matter, why do we have these two different architectures at all?

What are bits?

The number of bits in a processor refers to the size of the data types that it handles and the size of its registry. Simply put, a 64-bit processor is more capable than a 32-bit processor because it can handle more data at once. A 64-bit processor is capable of storing more computational values, including memory addresses, which means it’s able to access over four billion times as much physical memory than a 32-bit processor. That’s just as big as it sounds. 64-bit processors are to 32-bit processors what the automobile is to the horse-drawn buggy.

The key difference: 32-bit processors are perfectly capable of handling a limited amount of RAM (in Windows, 4GB or less), and 64-bit processors are capable of utilizing much more. Of course, in order to achieve this, your operating system also needs to be designed to take advantage of the greater access to memory. This Microsoft page runs down memory limitations for multiple versions of Windows. A horse-drawn cart will get you to work just as easily as a car will, barring any equine issues, but a car is a lot more capable – it can get you to work, or across the country and it can do it a lot faster than a horse can.

How many bits?

As a general rule, if you have under 4GB of RAM in your computer, you don’t need a 64-bit CPU, but if you have 4GB or more, you do. While many users may find that a 32-bit processor provides them with enough performance and memory access, applications that tend to use large amounts of memory may show vast improvements with the upgraded processor. Image and video editing software, 3D rendering utilities, and video games will make better use of a 64-bit architecture and operating system, especially if the machine has 8GB or even 16GB of RAM that can be divided among the applications that need it.

Through hardware emulation, it’s possible to run 32-bit software and operating systems on a machine with a 64-bit processor. The opposite isn’t true however, in that 32-bit processors cannot run software designed with 64-bit architecture in mind. This means if you want to take full advantage of your new processor you also need a new operating system, otherwise you won’t experience any marked benefits over the 32-bit version of your hardware.

Operating System Differences

With an increase in the availability of 64-bit processors and larger capacities of RAM, Microsoft and Apple both have upgraded versions of their operating systems that are designed to take full advantage of the new technology.

In the case of Microsoft Windows, the basic versions of the operating systems put software limitations on the amount of RAM that can be used by applications, but even in the ultimate and professional version of the operating system, 4GB is the maximum usable memory the 32-bit version can handle. While a 64-bit operating system can increase the capabilities of a processor drastically, the real jump in power comes from software designed with this architecture in mind.

Software and Drivers

Applications with high performance demands already take advantage of the increase in available memory, with companies releasing 64-bit versions of their programs. This is especially useful in programs that can store a lot of information for immediate access, like image editing software that opens multiple large files at the same time.

Video games are also uniquely equipped to take advantage of 64-bit processing and the increased memory that comes with it. Being able to handle more computations at once means more spaceships on screen without lagging and smoother performance from your graphics card, which doesn’t have to share memory with other processes anymore.

Most software is backwards compatible, allowing you to run applications that are 32-bit in a 64-bit environment without any extra work or issues. Virus protection software and drivers tend to be the exception to this rule, with hardware mostly requiring the proper version be installed in order to function correctly.

 

5 Top Operating Systems For Your Business

The choice a business owner makes in operating systems is integral, as their costs vary as enormously as their capabilities. An operating system is the behind-the-scenes warrior of your computer -- it's the host of the computer that sets the standards for all application programs and handles the details of the operation of the hardware. Here are the pros and cons of the top five operating systems.

http://www.bmighty.com/hardware_software/showArticle.jhtml?articleID=214...

5 things to know before buying a camera

 

Sony NEX 7.jpg(Kim Komando @ FoxNews) It's the hottest selling camera now. Hybrid cameras, also called mirrorless or compact-system cameras, are compact like a point-and-shoot camera but offer a larger image sensor for better-quality shots. Plus, like more expensive DSLRs, you can change lenses to fit the scene you're shooting.

It's no wonder hybrids are a favorite of hobbyists and professionals alike. Before you head to the store, here are five things you need to know about buying the perfect hybrid camera.

1. Know your image sensors
The image sensor is what captures the light from the object you're shooting. The two main sensor sizes for hybrids are Micro Four Thirds and APS-C.

The smaller Micro Four Thirds sensor is great for portability, but can sacrifice some picture quality. The larger APS-C sensor will add bulk, but can provide better image quality and low-light shooting.

Along with size, you have to consider megapixels, or the number of pixels the sensor can capture. Hybrids typically have 14MP to 24MP. For standard-size photo printing, any amount will work. If you're printing large posters or doing detailed photo editing, more megapixels is better.

If you need a big sensor and lots of megapixels, consider Sony's NEX 7 ($1,099 with 18-55mm lens) with its 24.3MP, APS-C sensor. For a Micro Four Thirds camera, the Panasonic Lumix and Olympus PEN lines are popular options.

Click here to avoid the one mistake every new camera owner makes.

2. Lenses, lenses, lenses
One of the big selling points of hybrids is interchangeable lenses. You can get lenses for close, wide-angle, distance and other types of shots. Make sure you know what lenses are compatible with your camera before you buy.

Micro Four Thirds cameras generally have the widest range of options. You'll find everything from high-end Leica DG lenses to inexpensive "toy camera" Holga lenses.

3. Manual controls
Both professional and hobbyist photographers know the power of manual camera settings. You can tweak your camera for exposure, depth of field, shutter speed and much more to get the perfect shot.

If you need fast setting changes, you want a camera that makes it easy. The Samsung NX20 ($1,099.99 with 18-55mm lens), for example, lets you scroll through settings using the lens' manual focus ring. And the shutter button on the Panasonic Lumix GF6 ($598 with 14-42mm lens) has a quick-access lever that controls aperture and zoom.

However, other cameras might bury important settings away where they're harder to access.

4. The viewfinder
Hybrids use electronic viewfinders to show you what you're shooting. Most hybrids use LCD screens, but OLED screens, which are thinner and brighter outdoors, are also available.

Sony's NEX 7, for example, has two viewfinders. One is a 3-inch, tiltable LCD screen. The other is a small eye-level OLED viewfinder, which gives you the feeling of shooting through a DSLR.

The Panasonic Lumix GF6 has a 3-inch, LCD touch screen that lets you focus and take pictures with a tap on the viewfinder. It also tilts 180 degrees, so you can flip it around for easy self-portraits.

5. Price
With a wide range of price points and features, finding your perfect hybrid camera takes some work.

Click here to learn about buying the right high-quality memory cards for your new camera.

If you're just getting into photography, a lower-priced model like the Sony NEX-3N ($449 with 16-50mm lens) is a solid option. It has a 16.1MP sensor, built-in flash and comes with a collapsible power zoom kit lens.

The Nikon AW1 ($799 with 11-27.5mm lens) is a good mid-range option. It has a 14.2MP sensor, built-in Wi-Fi and GPS. For outdoor shooting, the AW1 is waterproof, freezeproof and shockproof.

Then there are high-end models like Olympus' E-M1 ($1,399.99, body only). It has a splash-proof and dust-resistant body, a fast shutter speed for action shots, Wi-Fi and a tilting touch-screen LCD viewfinder.

In the end, buying a camera is a very personal choice. I strongly recommend visiting a store and playing around with a number of models to find the best fit for you.

Now that you know all about the latest hybrid cameras, get the most out of your new camera with my Essential Guide to Digital Photography.

Copyright 2013, WestStar Multimedia Entertainment. All rights reserved.

Kim Komando hosts the nation's largest talk radio show about consumer electronics, computers and the Internet. To get the podcast, watch the show or find the station nearest you, visit: http://www.komando.com/listen. To subscribe to Kim's free email newsletters, sign-up at: http://www.komando.com/newsletters.

50 Blog Ideas by Carol Tice

Blogging can be a great way to draw new customers to your business website. But if your blog hasn't been updated in months or all your posts are thinly disguised sales pitches, your blog marketing plan could backfire.

A great business blog doesn't sell. Instead, it shows customers why they should do business with you and not your competitors.

The key to a successful business blog is variety -- so mix it up with different types of posts. If every post is "Seven Ways to Use Our Product," it's going to get old fast.

Here are 50 types of blog posts that can draw new visitors and help build customer relationships.

  1. Customer success story. When you receive a great testimonial from a customer, ask for permission to turn it into a post. Use the post to solicit more customer stories.
     
  2. Mention a popular post. If you notice a post by a popular blogger in your niche getting a lot of attention, add your viewpoint and link to the original post. Be sure to let that A-list blogger know about your comment and link.
     
  3. Disagree with a popular opinion. Get traffic by stirring up controversy and taking a contrary position.
     
  4. Riff on the news. How are current events affecting your customers? Run a Google Alert on certain keywords related to your business or industry to find relevant news items to discuss.
     
  5. Compile a link roundup. If you notice several interesting opinions on a topic, you can pull them together into a single post of the best ideas.
     
  6. Play off the familiar. Mention a celebrity or a pop culture touchstone and your readers will instantly relate.
     
  7. Answer the questions everyone is asking. An FAQ post shows you're responsive and saves customers time.
     
  8. Pose your own question. What would you like to know about your customers? Just ask, and let your readers create the content.
     
  9. Talk about trends. You convey authority when you tell how things are evolving in your industry.
     
  10. Discuss future plans. Give readers a sneak peek at what you'll do in the coming year to start generating interest.
     
  11. Review a book. If you've read a book you think customers might like, give it a write-up.
     
  12. Review a product or service. This shouldn't be one of your own products or services or a direct competitor's offering, but rather a related item your customers might want to learn about.
     
  13. Comparison test. Provide even more value by comparing two or more related products or services.
     
  14. Post a video. Create variety with a video post. You can give a sneak preview of a new product or show a promotional event.
     
  15. Make a podcast. Record a quick interview with an expert, or just give a few of your own useful tips.
     
  16. Create an infographic. Fact-filled, graphic posts get shared a lot on social networks. This infographic got more than 10,000 retweets.
     
  17. Report on a conference. Quote inspiring speakers or tell readers about the latest trends and ideas from the conference that you'll be implementing.
     
  18. Go behind the scenes. Give readers a photo or video tour of your plant, customer service desk or the backroom of your store.
     
  19. Explain how you do it. Do you have a special way you make your product, handle returns or welcome new customers? Describe your process.
     
  20. Staff profiles. Give a human face to your company by introducing new or seasoned employees.
     
  21. Show your charity work. If your business gives back to the community, post a video or photo essay of that park your staff cleaned up.
     
  22. Gush about your idols. Talk about the blogs you read regularly or the thought leaders who inspire you. Be sure to alert those bloggers and business gurus so they'll spread the word.
     
  23. Have a debate. Invite someone who disagrees with your views to do a "Point/Counterpoint" post.
     
  24. Talk about your blunders. Everyone loves to read about business failures. End your post by telling how you're fixing the problem.
     
  25. Create a regular feature. Do a "customer of the week" spotlight or create a monthly collection of the best online articles that match your customers' interests.
     
  26. Write a series. If you'd like to teach customers something complicated, break the topic into several parts. Series are an effective way to turn casual readers into subscribers.
     
  27. Make a prediction. Everybody wants to know what may happen in the future, so share your opinion.
     
  28. Conduct market research. Are you wondering which product name would attract more customers? Hold a virtual focus group on a blog post.
     
  29. Create a contest. Offer a prize for the most interesting customer suggestion or use of your product.
     
  30. Take a reader poll. SurveyMonkey makes this easy. Or you can simply set up a poll on your business Facebook page and draw readers to "like" your page.
     
  31. Share poll or contest results. Don't leave readers hanging; do a follow-up post to announce the results.
     
  32. Create an award. Giving a "best of" honor is guaranteed to get attention. Readers will want to check out who won, and all the finalists will likely share the news in social media.
     
  33. Share your customer feedback. If you use customer comment cards or do customer surveys, turn some highlights into a post.
     
  34. Reveal industry secrets or expose lies. When you promise to tell people what others won't, it's sure to be a hit.
     
  35. Tell the story of your origins. Everybody loves to read about other people's dreams and challenges, so write about why and how you started your business.
     
  36. Share a highlight. What were the big milestones in your company's history? Tell about an important moment and how it changed your business.
     
  37. Keyword posts. Check your Google Analytics to see which keyword searches bring customers to your site. Then do posts on those topics.
     
  38. Read your competitors. If you're out of ideas, see what topics are drawing a crowd on your competitors' blogs and give your own take on those subjects. You can even link to your competitor's post. Readers will think that's cool.
     
  39. Display a sense of humor. Everyone loves business owners who can laugh at themselves when something goes wrong at the office. Consider giving a "how-to" post a funny spin.
     
  40. Show your passion. What aspect of your business gets you excited? What customer experience was especially gratifying? Tell those personal stories.
     
  41. Share your vision. If you're different from competitors because of your philosophy, talk about it.
     
  42. Informational, how-to. Is there more than one way to use your product or service? Describe one of the less common uses in a how-to post.
     
  43. Tips and tricks. Don't have time for a step-by-step how-to post? Give readers a few random suggestions for how to get more out of your product.
     
  44. Celebrity Q&A. An interview post can be quick and easy if you simply email questions to an expert of interest to your customers. If you have some dream interview subjects, go ahead and ask if they'll participate. You'll probably be surprised how many say yes.
     
  45. Be inspiring. Sometimes, customers would just like to feel good. Write about something you found inspiring in the course of your day or how you keep a positive work culture.
     
  46. Resource list. You could spotlight your vendors, companies you partner with, or a list of good books related to your business.
     
  47. How you got the idea for your product. This is an opportunity to credit team members and tell an interesting story about product development.
     
  48. A day in the life. Give customers an hour-by-hour account of a typical day at your company.
     
  49. Offer something special. Announce a party that gives your best customers a first look at a new product or create a giveaway just for blog subscribers.
     
  50. Round up the best of your blog. If you think some of your best stuff is buried in the archive, repost your 10 favorite posts from the past year.

8 Ways a Little Guy Can Compete Against a Big Guy - Vertical Response Article

If you run a small business, you know how tough it can be to compete with your larger competitors especially when they're undercutting prices like crazy to get people in the door. Not to mention that a lot of them have huge advertising budgets for newspapers, TV commercials and radio spots. So how can you compete?

You have to be tough like Rocky that's how! You have to be creative and you have to do some grass roots marketing.

Here are a few ideas you might be able to put to work for your business.

1. Give an extra discount just for getting an email address. Communicating via email marketing is far less costly than communicating in almost any other form of marketing and you need every penny you can save.

2. Give free parking. If you have a parking lot near you, find out if you can validate the parking fees for up to an hour. Making it as easy as possible for your customers to get to you and save could be paramount. They may just choose you for that reason alone over chaos at Walmart.

3. Give a $20 gift card for their next purchase. If your customers buy something over a certain amount give them more. A store here in the Bay Area was giving $20 gift cards for every $100 customers spent and they could only use them in the following month.

4. Serve snacks or coffee. You really can drive more business by giving your customers an excellent experience. I know of a car dealership that serves a full-on breakfast while you wait to have your car serviced. There's nothing worse than having to sit in a room waiting for an oil change, so they make it pleasant!

5. Have a kid-friendly shop or office. Keeping the kids busy while Mom or Dad does the shopping or the office visit could be the thing that gets them to your place. They've got a tough job as it is, if you can make it easier for them to come to you while giving the kids some fun, it just might get them to stop going to the big boys.

6. Buy your competitor's name as a Google keyword. If your larger competitor is spending big advertising dollars, you might be able to capitalize on people searching for their company name. Of course you can't make false claims in your ads and if it's a Fortune 500 player there's a chance Google won't let you, but if you type their company name into Google Search, and you see ads down the right-hand side, chances are you won't have a problem. One note on that, you can't use their company name IN your ad content.

7. Pick up the phone. When people are dealing with your larger competition and have to call them about something they usually expect a phone tree about an hour long and then another hour of wait time. You might have the luxury of picking up the phone when it rings or calling them back quickly if they leave a message. They might want to start dealing with that type of service rather than saving a few bucks to sit on hold.

8. Start Tweeting. It might sound silly to you but surely you've got customers and prospects that are following other businesses on Twitter, why not yours? VerticalResponse customer Due Maternity does a great job at this, and in no time they got 268 followers. It may not sound like much, but it's 268 people they can message at any given moment about their sales, content and site. The big guys are starting to do it, you may as well beat them to the punch!

Going the extra mile and being clever are the only ways to compete against a large company, but it's not impossible. A company like Due Maternity has a very successful website with many thousands of customers. They compete with a larger maternity brand with a website and 1000 stores but are still growing and successful. I know they use a lot of these techniques to help them keep growing!

 

Long live the Sneakernet: Computing's most resilient network by Larry Dignan

When Amazon Web Services latest-and arguably most valuable-service is a system that allows you to ship terabytes of data to the cloud via snail mail you just have to chuckle. Yes folks, for all the fancy talk of cloud computing, terabytes-not to mention petabytes-of data and technological advancement the Sneakernet is alive and kicking.

The Sneakernet, where someone puts data on a disk, flash drive etc.  and runs it to another computer, is arguably one of our most enduring networks. I still use it all the time. I'm sure I could network my home devices together, but the Sneakernet works just fine.

Multiply the Sneakernet on a grand scale and you understand why Amazon is launching a service called Import/Export. There's too much data to move to the cloud and not enough bandwidth to get it there quickly. Why take five days to move data-and hog up all your bandwidth-when you can toss it on a storage brick of some sort and just overnight it?

Amazon CTO Werner Vogels explains:

In some ways the computing world has changed dramatically; networks have become ubiquitous and the latency and bandwidth capabilities have improved immensely. Next to this growth in network capabilities we have been able to grow something else to even bigger proportions, namely our datasets. Gigabyte data sets are considered small, terabyte sets are common place, and we see several customers working with petabyte size datasets.

No matter how much we have improved our network throughput in the past 10 years, our datasets have grown faster, and this is likely to be a pattern that will only accelerate in the coming years. While network may improve another other of magnitude in throughput, it is certain that datasets will grow two or more orders of magnitude in the same period of time.

Simply put, if you wanted to move a terabyte data set to EC2 it will take you a while. On an enterprise scale, this data-moving problem is yet another hindrance to cloud computing adoption. Amazon gives the following time frame to shipping a terabyte dataset over the network:

But that doesn't capture the true costs. Microsoft Research notes that you still have to maintain that network. And there's labor and support.

Here's a look at the slightly dated statistics from a 2002 Microsoft Research paper:

Microsoft Research's Jim Gray concluded that Sneakernets are the answer to the above conundrum:

What is the best way to move a terabyte from place to place? The Next Generation Internet (NGI) promised gigabit per second bandwidth desktop-to-desktop by the year 2000. So, if you have the Next Generation Internet,  then this transfer is just 8 trillion bits, or about 8,000 seconds - a few hours wait. Unfortunately, most of us are still waiting for the Next Generation Internet - we measure bandwidth among our colleagues at between 1 megabits per second (mbps) and 100 mbps. So, it is takes us days or months to move a terabyte from place to place using the Last Generation Internet.

That passage was written in 2002. And guess what? We're still waiting. Simply put, the Sneakernet is the most efficient means of moving a terabyte of data around.

Given that fact, Amazon's Sneakernet, the Import/Export service, may become its most appreciated if not technologically advanced feature. Go figure. In a nutshell, Import/Export allows you to ship data on storage devices with a manifest that explains how and where to load the data and map it to Amazon's storage system.

Here's when a move to Import/Export makes sense:

Now there are costs. Amazon will charge you $80 per storage device handled and $2.49 per data loading hour. And then there's the usual storage pricing. But add it up and it's cheaper per terabyte than waiting a week for a dataset to move.

Will the Sneakernet ever go away? Nope. Gray sums it up:

Until we all have inexpensive end-to-end gigabit speed networks, terascale datasets will have to move over some form of sneaker net. We suspect that by the time the promised end-to-end gigabit (next generation Internet) arrives, we will be moving petabyte scale datasets and so will still need a Sneakernet solution.

Action System - Problem Solving

Shine A Light On Problems and they Go Away

What would it mean to your business to solve just one problem a month, and not have that problem resurface again, ever? What would it mean if you could retain intellect and “know-how” of key individuals when they leave the company? The Action System can do this and more, and best of all, the Action System is free!

The Action System is a tool that does just that. It allows a business to shine a light on problem in a large way, assign responsibility, track the solution/s, and records the process for future reference. And it’s amazing how many problems simply “go away” simply by shining a light on them.

Action System is a simple tool used for single-level company-wide problem solving. It enables network attached users to enter problems or Action Items into a database that provides wide visibility to the problem. An Action Manager can assign responsibility and “Solution ETA Date” for the Action Item, and the item can be tracked until it is resolved.

Action System not only serves as a valuable problem solving tool, but it also becomes the company “knowledge base” that captures the business intellect so that old problems do not resurface. An if they do, the solution can be easily found even if the original solution provider is not currently available.

Action System has three user tools in the main menu, Items Entry, Items View, and six filter lists, Active, Unassigned, Pending, InActive, ListAll, and Complete. The program uses a Web Browser and can be accessed from company IntraNet site.

The main screen consists of two windows, a menu window to the left and Activity screen to the right. Selection from the menu will display in the Activity screen. The menu screen will remain active at all times to allow rapid movement through the program.

Addition reporting is possible by using standard Microsoft or Open Office.org desktop tools. For further information, please contact Active-Technologies, LLC.

Addressing the State of the White House Technology by Chris Crum

Maintaining Balance Between Transparency and Security

Since President Obama was sworn in and Whitehouse.gov has switched to a new interface, there has been an endless amount of chatter about the state of the White House's technology. Some discuss the shortcomings, while others defend it as just fine.

Tradition and Transition

A controversial Washington Post article discusses the state of the technology situation in the White House as the Bush Administration moved out and the Obama Administration moved in. The article takes the angle of the Obama crew being forced to step back into the \"dark ages\" and use \"old software\" and Microsoft instead of Mac, disconnected phone lines, etc. Obama's team were using Gmail addresses because their new white house addresses had yet to be set up. An Obama spokesman said it was like \"going from an Xbox to an Atari.\"

\"David Perhaps that's just how it is. \"The White House itself is an institution that transitions regardless of who the president is,\" says David Almacy, Internet Director under the Bush Administration. \"The White House is not starting from scratch. Processes are already in place.\"

\"Bureaucracy is nonpartisan,\" he says. \"Moving 3,000 people out and 3,000 people in is a Herculean task.\" That is worth considering when it comes to the phone lines, email addresses, etc. Although one might think they would have had plenty of time to get this worked out by the time the new President was ready to take office.

As far as the technology itself, a lot of people around the Internet are taking the stance of \"welcome to the real world\". According to a Fox News article, \"the White House has everything a modern corporate office would — Windows XP, BlackBerrys, Outlook e-mail, plenty of laptops and lots of flatscreen monitors and TVs.\" Owen Thomas at Valleywag had an interesting take:

Guess what? Outside the Manhattan media bubble and Silicon Valley's startup cube farms, this is how most Americans work. Want a Macintosh? Sorry, IT hasn't approved it. Oh, you need to use Facebook to interact with customers? Sorry, that site's blocked — and management suspects that \"social media\" is a buzzword which means \"getting paid to waste time chatting with friends.\" Want to use some new blogging service? Fill out this three-page questionnaire about the site's security practices, please.

This is not a story about digital pioneers getting cast back into the Stone Age; it's about a privileged elite learning how the rest of the country has to work. Those \"six-year-old versions of Microsoft software\"? That must mean Windows XP. If you haven't noticed, most people still prefer XP over Microsoft's clunky, buggy, annoying new Vista. Here's a suggestion for the Obamans: Stop whining about the tools taxpayers have paid for, and get to work learning how to cope with what your employer gives you, just like the rest of us.

But still, you have to think the people behind a Presidential campaign that was practically built on using technology and highlighting tech policies might have some kind of grasp on the reality of the situation. The real issue is where technology and security clash with each other, and speaking of Herculean tasks, how about staying transparent and completely secure at the same time?

\"Obama's

Security

The national security agency added special security software to Obama's blackberry so that he could continue to use it. \"This means Obama can continue emailing routine and personal messages that will become part of the public record,\" says Stacey Higginbotham at GigaOm. \"However, some of the more 'fun' functions of a smartphone, such as IM and those requiring GPS functionality, won’t be available for his use. So far no data channels appear to be secure enough for Top Secret emails.\"

You've probably read about how the Obama administration cannot use Facebook, instant messenger clients, and outside email accounts. How will this kind of stuff affect the transparency that the Obama administration is trying to maintain?

Transparency and New Media

If you were expecting to be updated from the new staff via Twitter, you might want to read this story. A fake White House Twitter account has been posting presidential updates, but beware that it is not coming from the real source.

Everybody knows by now that YouTube videos are one way Obama intends to remain transparent. He and his staff frequently communicate with the people through them. Some questions have been raised about why YouTube is getting preferential treatment, however.

\"White

The Privacy Policy at WhiteHouse.gov depicts very strict rules about using persistent cookies on government sites, YouTube is apparently exempt from this because they want to be able to embed YouTube videos on the site. Some are wondering why they don't just use their own video service. \"The U.S. should be able to stream videos through its own service at this point without making YouTube its default online video service,\" says Frederic Lardinois at Read Write Web.

It's only been a few days since the inauguration though. There are certainly kinks to be worked out. Interestingly, the new administration has unblocked Google from crawling info on the White House site. Previously there were a lot of pages being blocked that were available to the public anyway.

Open Source and Changing Tradition

The new administration may not have been thrilled about the state of the White House's technology, and there may be certain aspects of it that just can't be sacrificed, but that doesn't mean that change isn't an option. Already Obama has shown an interest in open source. Sun Chairman Scott Mcnealy says that the President has asked him to author a white paper on potential benefits to the government of open source solutions.

\"Scott

\"The government ought to mandate open-source products based on open-source reference implementations to improve security, get higher-quality software, lower costs, higher reliability--all the benefits that come with open software,\" says McNealy as quoted by BBC News.

He also says that the CIO should have \"veto power, the right to eliminate any hardware, software or networking product that touches the federal network...He or she would have real power, real oversight and employ real consequences for folk that don't realign with the architecture. It's what every business does that the government doesn't.\"

From the sounds of it, change is definitely in the air, which should come as no surprise to anyone who has witnessed a single iota of what the President's campaign has been about. However, that doesn't mean that change doesn't come with restrictions, and compromises are going to have to be made. Transparency and new media efforts will not be able to work without the security needed to protect the country.

','

Affiliate Marketing

Affiliate marketing is method of making money online whereby a website publisher is rewarded for assisting other businesses by promoting their product, service or site.

Money is usually made by commission when someone follows your link on your website to another site where they then buy the product that you recommended or advertized. In addition, some sites offer commissions if your link on your website causes the web surfer to take action, like provide information, take a survey, or sign up for a newsletter.

Commissions can be a fixed amount or a percentage of the sale..

Sales are generally tracked using your unique embedded code or by implanted cookies.

Advertiser like affiliate marketing because they can sell product with minimal advertizing cost, since the affiliate does the advertizing for them. Affiliates like it because they can make money even whilst sleeping.

Don’t get me wrong – this is hard work. You might have to create banner ads. You might have to write articles, product reviews, product comparisons, collect testimonials, figure out a thousand uses for the product, and post these on many websites (with links back to the product you want to sell). You might put in 10 to 12 hour days promoting these products. But with some hard work and persistence, you can find that combination that works for you. Wouldn’t it be great to wake up the next morning and find that your efforts netted $1000 over night?

Affiliate Marketing

Affiliate marketing without a doubt is one of the best ways to make money online. Its fairly easy to get started and in most cases you dont even have to spend any money to get started. And almost anyone with a little dedication and hard work can make money as an affiliate marketer. If you are a beginners, affiliate marketing may seem complicated and though to master. That is why I have created this post. This 10 steps process will guide you through the process of getting started in affiliate marketing and making money as an affiliate marketer.

Pick a product to promote
Go to ClickBank or Commission Junction or any other affiliate marketing network and pick a product to promote. Pick a product that is hot and selling well. Although, that would mean you will have a lot of competition, at the same time it means it will be much easier for you to make sales as a beginner.

Get to know the product you want to promote
I personally think its best to buy the product you want to promote. Doing so, will give you access to the product which helps you learn all about it. And if you decide to promote the product, you will have a much better chance of convincing people to buy the product since you can outline the benefits of the product much better than anyone how hasn’t had access to the product.

Write a sales letter
Now that you have become familiar with the product, use what you have learned to write your sales letter. The easiest way to write a killer sales latter is to simply use bullet points and point out the problems people have in your specific niche and tell them how this product will solve their problem. It really is as simple as that.

Create a free internet radio show
Go to BlogTalkRadio and register for a free account. BlogTalkRadio is basically a tool which allows anyone to create an internet radio show. No, you are not doing it to become a radio host! You are doing this simply because such contents are indexed by Google within hours. Your radio show doesn’t have to be anything sophisticated. You can simply read out your sales latter. Make sure you use your main keywords through out the show. Don’t forget to ad your affiliate link at the end of your show, so your audience will know where to go.

Your recording will also be use as a free offer to attract potential buyers. Simply upload the mp3 of your radio show to your web host.

Create a one page site
Now, put up a quick one page site using WordPress or whatever blogging platforms you prefer. Create a short article (using your sales latter) and offer your MP3 to visitors as a free download. At the end of the article include your affiliate link where people can buy the product you are promoting. If the MP3 you created and are giving away to visitors for free is good and provide useful information, many of those visitors will be enticed to buy the product you are promoting since they knwo you provide quality stuff.

Promote your site
These days there are online forums related to just about any subject. Find a few good and trusted forums related to the product you are promoting. Place a link in your signature section that directs people to your blog. Make sure you let people know you are giving away a free mp3 download about the subject. Start participating in those forums. Be helpful and build a reputation for yourself as an authority in your niche.

Use social networking sites to promote
You can also use social networking sites to promote your site. Register with as many social networking sites as you can and place a link back to your blog in your profile. Ping and bookmark your profile URLs for a faster indexing.

Now, find a few quality and useful articles about becoming debt free and post their links on your social networking accounts. Do this a few times, then post a link pointing to your own blog. Repeat this process over and over again. This process will get people thinking about becoming debt free, so when you do send them to your blog, they are ready to download your free MP3. Which will get them even more ready to visit your affiliate link and buy the product you are promoting.

Promote your site through blog commenting
You want to promote your blog and build backlinks to it as much as you can. Another good way to build backlinks and get some traffic to your blog is through related blogs. Go find financial related blogs, especially blogs that talk about debt and becoming debt free. Visit as many as you can and leave genuine comments. Include your blogs URL in the URL box.

Build your list
At this points, you probably have made a few sales. Use some of that money to sign up for an autoresponder account. This step can be done depending either in the beginning of this process or after you have made a few sales. If you have the money for it, sign up for an autoresponder before you start giving away your free MP3 and in exchange for the free MP3 download, capture people’s names and emails addresses. This will help you build a list of people who you know are interested in the product you are promoting. So the next time you have a better product you want to promote, all you have to do is send them an email with a link to the product sales page.

Keep building backlinks and driving traffic to your site
From this point on, your job is to build backlinks and drive traffic to your sales page (blog). You can use paid methods like buying ad space, or using Google adwords and other advertising methods, or use free methods like blog commenting, submitting articles to article directories (with a link pointing back to your blog at the end of the article), social networking with people interested in your niche and so on.

This is the basics of making money as an affiliate marketer. Of course, reading this post and knowing it wont make you a dime. Doing the actual work is what will help you make money. Commit yourself, take action and you will succeed. This method can help you and any affiliate marketing beginner to make money online as an affiliate marketer.

Amazon Reminder You Do Not Own Your Kindle Books

Amazon.comOn a dark and stormy night, an employee of your local bookstore strolls into your home, starts tossing books you'd purchased over the last few years into a box, and — despite your protest — takes them all away without saying a word.

Thankfully that's not what happened to Linn Jordet Nygaard. Well, not exactly. The Norwegian woman found herself on the wrong side of bureaucracy, but the outcome was much the same (without as much mud on the carpet): Amazon turned off her Kindle account, blocking her from her own books. And they wouldn't tell her why.

"Two weeks ago my Kindle started showing stripes on the screen and I contacted Amazon support," Nygaard told NBC News. "Someone immediately found the Kindle in the system and told me they would replace it free of charge. They could only ship the replacement to UK because it was originally purchased there, and I told them I would find an address the next day. (I live in Norway, but have a friend who lives in London.)" 

Nygaard was pleased with Amazon's prompt service, she told us, even though this was her second Kindle to fall victim to "stripes" on the ePaper screen.

But when Nygaard attempted to log into her Amazon account the next day, her account was suspended — and with it access to her library of 43 books.

Those friendly phone-based customer support folks couldn't access Nygaard's account either, and she was passed on to "account specialists" who only communicated via email. That's when things took a Kafkaesque turn (as documented by her friend, Martin Bekkelund, on his blog). A man named Michael Murphy with Amazon UK's "Executive Customer Relations" told Nygaard her account had been determined to be "directly related to another which has been previously closed for abuse of our policies." Which policies? He wouldn't say. What other account? Murphy wouldn't share that, either.

Instead, Murphy would only pass on this shrilly authoritarian boilerplate:

Per our Conditions of Use which state in part: Amazon.co.uk and its affiliates reserve the right to refuse service, terminate accounts, remove or edit content, or cancel orders at their sole discretion.

Please know that any attempt to open a new account will meet with the same action.

Now just to spoil the story, I'll skip to the happy ending for Nygaard: After taking her story public, Amazon saw the error of their ways and restored her Kindle library. She's still waiting on her replacement Kindle, but in the meantime has access to her library through the Kindle iOS app on her iPad.

But Amazon doesn't get off the hook so easily. When we reached out to the company Monday, their PR representative would only send us a canned response they'd dropped into their customer forum: "We would like to clarify our policy on this topic. Account status should not affect any customer's ability to access their library." (Amazon loves copying-and-pasting, it seems.) Our follow up question — "Why wasn't [Nygaard] told why her account was cancelled?" — hasn't been answered yet.

And it probably won't be. Nygaard's little dust-up with Amazon isn't, in and of itself, a big deal. But it serves as a bitter reminder that we don't ever truly own the digital goods and software we buy online. Instead, we rent them, or hold them in a sort of long-term lease, the terms of which are brokered and policed exclusively by the leaseholder. 

As Boing Boing's Cory Doctorow put it in a blog post yesterday:  

This fine print will always have a clause that says you are a mere tenant farmer of your books, and not their owner, and your right to carry around your "purchases" (which are really conditional licenses, despite misleading buttons labeled with words like "Buy this with one click" — I suppose "Conditionally license this with one click" is deemed too cumbersome for a button) can be revoked without notice or explanation (or, notably, refund) at any time.

The core issue might actually be a simple matter of semantics: when we click a digital button that is labelled "Buy," we expect that we're actually buying something. But we're not buying anything, we're licensing it. Just last year, the Supreme Court ruled that the first-sale doctrine does not apply to software — or e-books. Or apps. Nor pretty much everything you "Buy" online that doesn't get shipped to your home in a cardboard box.

Those long End User License Agreements you have to read before you use a new piece of software? Those are are legally binding, because you've clicked a button labeled "Agree." But for some reason, online retailers can label their buttons "Buy" when they actually mean "Rent," and there's nothing we can do about it save filing a lawsuit.

You could call Nygaard's experience a tempest in a teapot, a matter of a few hundred dollars worth of goods that, after a little public outcry, were fixed without issue. But you'd still be pretty angry if and when it happens to you. (It is worth noting that despite Amazon's stated policy that customers can still access their previously purchased Kindle library even if their account is suspended, Nygaard couldn't download her books to a new device because her account was suspended. 

As she explained to us, "Before I started emailing Mr. Murphy, I could not log in to my account from Web or iPhone. And my Kindle screen was broken so the fact that the books were still there didn't help me much."

I was curious if there was any merit to my idea of attempting to hold retailers to these "Truth in Buttons" terms, so I asked Intellectual Property attorney Seth Greenstein, who wrote about about case law for reselling e-books a couple years back, if the notion held water. As Greenstein explained in an email to NBC News, it's not all completely settled:

All sales through Apple and other online retailers are subject to terms of use that set forth the conditions of sale. You may buy a track from the iTunes Store that can be used on a certain number of devices, or a copy of an e-book that comes with restrictions as to the ability to lend or the devices on which it is viewable — a “sale” with “conditions.” The “conditions” apply only to the person who entered into the agreement; they do not necessarily bind a third party.

In the patent context, the Supreme Court this term has granted review of a case to determine whether first sale privileges are defeated by a purchase “with conditions.” Typically this arises where the seller marks products “single use only.” The question is whether that is enforceable only under contract law, in which case it applies only to the purchaser; or, as a matter of patent law, against anybody. Why does this make a difference? Take a case I litigated in which Lexmark placed a “single use” type of restriction on its cartridge boxes attempting to prevent its aftermarket competitors from refurbishing and refilling cartridges and selling them for far less than the price of a new cartridge. If the restriction is upheld under patent law, Lexmark could claim these aftermarket companies infringe its patents. If not, the aftermarket competitors may be lawful. The courts found that the first sale doctrine (called “patent exhaustion”) trumpted the single use restriction. Now the Supreme Court will have the last word.

If the world's governments determine that customers don't have the same right of ownership over digital goods as we do over our material goods, the least they could do is force companies Amazon to be truthful about what is sold, and what is actually just rented. And it will probably take a lawsuit or legislative action to force Amazon to speak truthfully about the transactions, if only because it changes the perceived value in a customer's mind: $15 to rent a file that contains a book that can be taken away from you at any time, without explanation or recourse, starts to sound a little expensive.

Read More - Click Here!

Are Printers Obsolete?

When I bought my first computer, I bought two printers at the same time: an Okidata 320 dot matrix printer for fast, everyday printing and the other was a Diablo daisy wheel (remember those?) for correspondence that needed to look nice. The daisy wheel printer was the outgrowth of that same technology that was used in electric typewriters. As with the IBM Selectric and its interchangeable “balls,” you had to switch out the wheel to change to a different font style or size. Today, I wonder if I even need a printer - or do I?

The idea of having a computer without a printer was unthinkable. What good would it be, if you couldn’t transfer what you’d produced on the (12 inch monochrome) screen to paper? It’s not as if most of the people for whom the information was intended had their own computers on which to view it, after all.

Since then, I’ve owned a good many printers - although the number of printers I’ve had isn’t nearly as high as the number of computers. A good printer would usually last through several computer upgrades, and multiple computers in the house could share a single printer. Printing technology has certainly advanced over the years, although perhaps not nearly as dramatically as computer technology in general. In fact, my Okidata and Diablo still work and are sitting in the attack.

My first color printer was an inkjet, and it was thrilling to be able to print out documents and pictures in color - almost as cool as getting our first color television set after growing up watching everything in black and white. But as much as I liked that inkjet, I still lusted after the expensive laser printers with output that resembled the print in a book or magazine. Unfortunately, the laser printers were costly, thousands of dollars, expensive to operate, and unreliable.

And of course, the price tag on the printer itself is only part of the story. One of the problems with printers is the cost of supplies. You have to feed it paper, of course, and that can get expensive. And you also have to provide it ink, toner , ribbon - whatever it uses to transfer the text or graphics onto the paper.

One of the more interesting, but least used printers that I had was a thermal printer. The idea of an “inkless” printer sounds great in theory, but the problem was that you had to use special paper for it, and that costs as much as the combination of ink and regular paper. In addition, the print on that early thermal paper didn’t last long; a couple of years later your document had faded away.

Today inkjets and laser printers are still the most popular types, and both can had for a fraction of what they cost back then. There are also solid ink nprinters and dye-sublimation printers for high quality color photo printing. Keeping your printer in supplies can still be a major pain, and few things are more frustrating than hunting through shelves full of hundreds of different printer cartridges at the office supply store, only to find that the model used by your printer isn’t among them.

One way in which printers have advanced is in printing speed. Early printers were excruciatingly slow, often producing little more than a character per second. When I got my first laser, that could turn out 8 pages per minute, I thought I’d really arrived. Now you can buy a printer for less than $50 that will do over 25 pages per minute. In 2005, IBM made a laser printer (the Infoprint 4100) capable of 330 pages per minute. There was a catch, though: the printer’s base price was half a million dollars. Ouch.

Printers have morphed into multi-function machines, and many of those sold today do much more than print. Both of our current printers are also copiers, scanners and fax machines. The footprint for these amazing little multi-taskers has gotten smaller at the same time the prices have fallen, so you can get a device that does a very good job of providing all these functions in a compact package that only takes up a couple of square feet on your desk.

For the past fifteen years, at least, all my printers have been HPs. There are other companies that make good printers, too, but I’ve always had very good luck with HP so I’ve stuck with them. When Vista was released, there were many complaints about printers that didn’t work with the new OS due to lack of drivers from the manufacturers, but my two HPs, a Deskjet and an OfficeJet, made the operating system transition without a hitch.

I’ve noticed, though, that as time goes by, our printers are used less and less. Whereas once upon a time, we went through a printer cartridge every two to four weeks, now we’ll go six months or more without needing a new one. We just don’t print things to paper nearly as much as we used to. Much of the correspondence that we once printed and mail is now sent as email. Articles, white papers, and book chapters are submitted in digital format over the Internet instead of being packed up and shipped off to the published via the postal service. Photos that were once printed for family members to enjoy can now be shared with them on the web. Even contracts are signed electronically and exchanged without ever being printed.

In fact, more and more people I know are telling me that they don’t even have printers anymore. The paperless office is still far from reality for us, but our business is definitely much less paper-centric than it was just a few years ago. I suspect that trend will continue in the future. But I wonder if the eventual demise of printed documents will have its down side, as well as the obvious cost and convenience advantages. There is, after all, something about the look and feel and smell of paper that isn’t quite duplicated on the monitor screen.

And I admit that for documents that are really important, I don’t quite trust them to digital files only. I still make printed copies that I keep in the safe, just in case all six backup files, stored on different computers in different locations, should somehow be destroyed all at the same time.

What about you? Do you still print things out to read them? Or do you only print out documents that are very important? Do you find yourself using your printer a lot less than you did in the past? Have you gotten rid of your printer altogether and gone completely paperless? Will printers someday be obsolete, perhaps only owned by shops where you can take your docs on a memory card or send them over the Internet to be printed? Do you look forward to that day, or will you continue to keep a printer at home as long as you can find the supplies for it? Is it ecologically irresponsible to print what could be kept in purely digital format?

Are Seniors At A Technology Disadvantage

 

Photo

Photo © danr13 - Fotolia

(Mark Huffman @ ConsumerAffairs) If you need to interact with companies, organizations and even government, increasingly you are encouraged – and in some cases required – to do it online.

For the last two decades the efficiency of the Internet has streamlined bureaucracies and increased productivity while reducing costs. The assumption now is that everyone should do everything online.

Phone books and catalogs have been replaced with online directories. Signing up for coverage in the Healthcare Marketplace requires going to a website.

Who needs a computer?

It's more convenient for most people but completely baffling for others – primarily older adults. In 2011 AARP  reported62% of people age 75 and older didn't even own a computer.

AARP chalks that up to changes in perception and motor control as people age, making it hard to see the screen or manipulate a mouse. Perhaps that's part of it, but researchers at Ohio's Bowling Green State University believe there could be something more.

Nearly 900 test subjects enrolled in their study, ranging in age from 19 to 99. The researchers wanted to get a handle on how well the subjects used technology – in particular, a tablet.

As you might expect, the results were wide-ranging.

“In addition to the traditional technologically savvy millennial who is constantly connected to his or her device, we also had the lower range of technology interaction, with almost 6% of the sample reporting that they do not understand what a tablet is, even after three-quarters page long description with photos,” the authors wrote.

Catch-22

There is a Catch-22 here. As people age they may need the extra assistance that technology could provide. But the authors found the relationship between age and attitudes towards technology is predominantly negative, and that as the age of individuals’ increases, their negative attitudes towards technology increase.

Does it have to be this way? The researchers don't think so. They think ageism might play a role here, with the stereotype of older people unable to grasp technology becoming a self-fulfilling reality.

Technology engineers, they say, might also design devices with more senior-friendly features.

“Even though technologies related to tablet use have evolved, the resources that would help individuals who are less technologically literate to use tablets (or any new technology) are greatly lacking,” they write.

Training

Training might also make a difference, if done the right way. Then, the authors conclude, the older population might begin using more of the resources that could benefit them, whether it's booking a hotel reservation or ordering a birthday gift for a grandchild.

But aging expert Neil Charness of Florida State University says that might be a hard sell for some technology-averse seniors.

"If it takes you twice as long to learn something, why would you invest that time when you could be drawing on your crystallized intelligence — your already acquired knowledge — and doing things you enjoy doing?" he told AARP.

Are We ready for the AI revolution

 (@ ZDNet) "Government leadership in the fields of robotics and AI has been lacking," says acting chair of the Science and Technology Committee, Dr Tania Mathias MP.

It's by establishing a Commission on Artificial intelligence that the government should take charge of establishing principles for governance, development, and application of AI, the committee says. It noted that the commission should be closely coordinated with the Council of Data Ethics, which is being setup following a previous report by MPs.

Membership of the AI commission shouldn't only be made up of experts in that field, rather the report states that it should include those with expertise in law, social science, and philosophy as well as computer scientists, natural scientists, and engineers. It's also recommended that membership should be drawn from industry, NGOs, and the public in order to establish a programme of wide ranging public dialogue.

The committee -- which took evidence from a range of experts -- also points out that the government must put a much greater focus on adjusting education and training systems in order to allow people to adapt and thrive as new forms of technology arise, and criticises the government for not doing enough in this area.

"It is disappointing that the government still has not published its digital strategy nor set out its plans for equipping the future workforce with the digital skills it needs to flourish," said the report.

Artificial intelligence has the potential to fundamentally alter how we live and work but government lacks any sort of coherent strategy for responding to the social and ethical dilemmas posed by the rise of intelligent machines.

It's for that reason a 'Commission on Artificial Intelligence' should be established at the Alan Turing Institute to examine the social, ethical, and legal implications of the rapid recent developments in AI and potential developments in future, the House of Commons Science and Technology Committee has declared.

The recommendation comes following an investigation into how the workplace and wider society will be affected by the rise of robotics and artificial intelligence. The findings are set out in the a 46-page report, which states that the government needs to come up with an AI strategy because currently it's not taking any responsibility.

While a group of companies including Google, Facebook, Amazon, and Microsoft, have come together in order to research AI and provide guidelines on the technology, the committee warns that the government can't just sit back and wait for them to do all the work, but rather needs to proactively take a role.

"While it is encouraging that the [private] sector is thinking about the risks and benefits of AI, this does not absolve the government of its responsibilities," said Mathias.

The report into artificial intelligence and robots has been welcomed by techUK, which also urges government to provide more leadership in fields relating to AI and digital skills for the future.

"We have a great opportunity here in the UK to help to define the future, especially give our global leadership in the development of AI," says Sue Daley, head of big data and analytics at techUK. "The committee is right to call for greater government leadership in addressing the digital skills gap. This is one of the most urgent policy challenges we face today."

Are You Using Google Places

Google Places has been around for a long time – but have you taken a few minutes to discover what it can do for your business? Many business owners overlook the benefits of using this free business listing tool from Google. So, let’s take a closer look at exactly why you should be using Google Places.

google places 300x160 The Benefits of Using Google Places

What Is Google Places?

Google Places is Google’s answer to listing your business for exposure on the internet. It’s a huge network of businesses that are referenced in their live data base, and it comes complete with a map pointer, so that people can find directions to your business. But there’s more to adding your listing here than meets the eye.

#1: Instant Page 1 Search Results

If you take some time to properly optimize your Google Places listing, you’ll find yourself ranking on page 1 with ease. When a customer searches your local keyword, Google will recommend your business to them. It’s an efficient way to get exposure online with very little effort. Think of it as the super-yellow pages.

#2: Exposure on Mobile Devices

Clients that search for your keywords on mobile devices will be directed to your local business. And all because you took the time to pop in an optimized Google Places listing. Google Maps and Street View will do the rest!

#3: Traffic To Your Website

You can publish your URL in your Google Places listing. This means that people will see you on page 1, and click through to your website. That’s potentially thousands of people visiting your business website because you’re on Places.

#4: Citations and Reviews

Clients can leave feedback on your business, on Google Places – the more you get, the higher your business will rank. Don’t forget to ask your clients to leave their reviews, and you’ll enjoy consistent business from this free advertising spot.

#5: Add Photos For Additional Exposure

Because your Google Places listing is more like a mini business profile online, you can upload photos there, which advertise your company. Listings that contain vibrant photos get more clicks, and more business!

#6: Advertising Boost

When you use Google’s PPC ads, you’ll be able to link it with your Google Places account. That way when your advert shows up in the sponsored section on Google, it will also contain a link to a map, showing where your business is located. This helps your ad to stand out, which means more clicks.

#7: The Most Powerful Directory in The World

It should go without saying that Google Places is the most powerful business directory in the world, but it’s also the most advanced. Anyone who uses Google to search for a local business could find yours. And the service is free.

If you’re not on Google Places yet – where have you been? Spend some time building up the perfect profile, add images, SEO and make sure that there’s an accurate location on the map. It’s for everyone, and it’s a must-have service for small businesses!

Are your digital devices driving up your electric bill

By Mark Huffman

Mark Huffman has been a consumer news reporter for ConsumerAffairs since 2004. He covers real estate, gas prices and the economy and has reported extensively on negative-option sales. He was previously an Associated Press reporter and editor in Washington, D.C., a correspondent for Westwoood One Radio Networks and Marketwatch.  Read Full Bio→

Email Mark Huffman  Phone: 866-773-0221

PhotoIf you've checked your monthly electricity bill and been surprised at how much it is, you may have more to blame than an overly cold winter. Researchers at the Consumer Federation of America (CFA) analyzed electric bills for California and other U.S. households and concluded that digital devices are driving bills higher.

Look around your home. How many things are plugged into a wall outlet, sucking up kilowatts? If you find you must use power strips at many outlets to accommodate all your devices, you can begin to appreciate the demand.

It's not just computers and big screen TVs, but monitors, notebooks, game consoles, routers and other devices that seem to be proliferating. All need electricity to do their jobs. But is it over-the-top demand?

Energy guzzlers

“Digital devices are energy guzzlers sapping consumer pocketbooks,” said Mark Cooper, CFA’s Director of Research and author of the report. “Improving the energy efficiency of household digital devices by a third or more would save consumers a lot of money because the reduction in electricity bills would be much larger than the increase in the upfront cost of putting more new more energy efficient technologies in the devices.”

There's already a program in place to encourage that. Since 1992 the Environmental Protection Agency (EPA) has administered the Energy Star program, setting efficiency standards and sponsoring research. While many manufacturers have embraced Energy Star, its standards are voluntary.

Energy Star has made refrigerators, stoves and other large appliances more efficient than they might otherwise be, but these appliances aren't proliferating in the average home at the rapid rate digital devices are, and the latter's toll is adding up.

500% increase

The CFA researchers found that between 2000 and 2013, digital devices increased their killowatt consumption by 500% in the U.S. They estimate the average U.S. household now consumes 800 killowatt hours (kWh) per year.

Putting that in perspective, CFA says digital devices consume half as much electricity as your air conditioner and two-thirds of what your refrigerator uses. Not surprisingly, the researchers found that electricity use by digital devices is highest in California, where computer and Internet usage is highest.

Photo

Manufacturers disagree

The consumer electronics industry takes issue with the suggestion that their products are running up Americans' electric bills. Earlier this month Consumer Electronics Association CEO Gary Shapiro complained of “conflicting and costly” energy efficiency requirements adopted by the U.S., Canada and Mexico, saying they are what are really costing consumers.

“Specifically, the mishmash of Canadian, Mexican and U.S. energy efficiency policies is confusing and costly for businesses and could force consumers to pay higher prices,” Shapiro said in a statement.

As for higher electricity bills for consumers, electricity rates have jumped in recent months, due in part to a spike in natural gas prices. According to the Energy Information Administration (EIA), average U.S. electric bills have been in decline since 2010. But the EIA says the ratio of annual peak-hour electric demand to average hourly demand has been rising over the last 20 years, with the increase especially noticeable in New England.

For its part, CFA maintains that substantial, cost-effective improvements in the energy efficiency of consumer digital devices can be achieved through strong performance standards. And considering many of these devices didn't exist 20 years ago, it's reasonable to assume that the average home will have even more yet-to-be-invented digital devices in the years to come.

Artificially intelligent concept glossary of the ideas

Sure, some people worry about machines putting an end to humanity as we know it, but that may be no more likely than a Mayan-predicted apocalypse. Artificial intelligence, though, may actually bring us lots of things we'll like: self-driving cars, caregivers for the sick, personal assistants that know exactly what you need, when you need it.

Yes, there is math and science, and a lot of it, behind the current boom in AI research, products and services. But you don't have to have a Ph.D. to get a handle on the basic ideas.

Here's a quick rundown of some notions you should know.

agent Software that reacts to things happening around it without the direct instruction of a user. A step beyond conventional software programs because they're always on and work by themselves, agents generally perform a single, specialized task, such as assembling news feeds or ordering email in terms of importance.

algorithm A formula or step-by-step process for a specific task. Think of it as a mathematical recipe or flow chart ("If x = 1, then...")

artificial intelligence The branch of computer science addressing simulated intelligence in machines. John McCarthy, the man who coined the term six decades ago, defined it as "the science and engineering of making intelligent machines, especially intelligent computer programs."

deep learning The area of machine learning (see below) designed to recognize relationships in data. It tries to do in software what we do with our brains.

machine learning The aspect of AI that allows computers to learn tasks or to recognize new patterns on their own, without being explicitly programmed to do so. That is, it's a form of adaptation and an essential ingredient in cooking up true intelligence.

natural language processing The ability of a computer to understand and use human speech as it is spoken. Natural language processing is a key element of AI that's built off machine learning. If realized, it could even eliminate the need for programming languages.

neural network A form of information processing that uses multiple nodes -- anything connected to a network -- to emulate the biology of the brain. Neural networks use inputs from the nodes to tackle problems from multiple angles and make inferences from observations, rather than following a set of instructions. The technology is used in tasks such as handwriting recognition, in which common symbols aren't all rendered alike.

robot Software that simulates a human activity, such as a comparison-shopping program. Often shortened to "bot." The robots you may be thinking of -- clanky, wheezy hardware that walks like a dog, or the bright, shiny C-3PO -- involve a lot of mechanical capabilities that are separate from artificial intelligence.

strong AI What we'll have when artificial intelligence fully rivals, or even exceeds, our own. We're still a long ways off.

Turing test A challenge proposed by English computer scientist Alan Turing in 1950 for evaluating a computer's ability to demonstrate intelligent behavior. To pass the Turing test, a computer's natural language responses would be indistinguishable from a human being's responses. But the Turing test's very prescribed and narrow circumstances are a far cry from the more multifaceted, commonsense interaction that AI researchers are looking for.

weak AI What we have now. Limited, single-function software like Google's AlphaGo program or Facebook image recognition tech.

At $430 a gallon, Is Your Printer Cheating You Out Of Ink???

Jeff Bertolucci, PC World, ran printers until they said it was time to change the cartridge--and found that some left more than 40 percent of their ink unused.

You’ve probably had this experience: Your printer tells you it’s time to change the cartridge, but you dismiss the message and keep printing. Days or weeks later, you’re still using the same cartridge and thinking to yourself that rumors of its death were greatly exaggerated. Or perhaps your printer simply shuts down when it decides you’ve gone deep enough into its ink well, refusing to operate until you replace the cartridge, though you suspect there’s plenty of ink left

PC World decided to do some real lab testing on this issue; and the results confirm what you may have suspected: Many manufacturer-branded (OEM) and third-party (aftermarket) vendor cartridges leave a startling amount of ink unused when they read empty. In fact, some inkjet printers force users to replace black ink cartridges when the cartridge is nearly half full, PC World has found. Check out our video that accompanies this story.

Overview

We tested using multifunction printers from four major manufacturers: Canon, Epson, Hewlett-Packard, and Kodak. (For the top-rated models, see our chart of top-rated multifunction printers.) PC World Test Center results show that models from Canon, Epson, and Kodak reported ink cartridges as being empty when in some cases the tanks had 40 percent of their black ink remaining

The quantity of unused ink ranged from about 8 percent in an Epson-brand cartridge to a whopping 45 percent in an aftermarket cartridge for a Canon printer. After posting low-ink warnings, those printers wouldn’t let us resume printing until we inserted a new cartridge

Our test printers typically left more unused ink--in some cases significantly more--when using third-party or aftermarket print cartridges than when using the printer manufacturer’s own cartridges

When using ink their own manufacturer’s cartridges, the printers displayed several low-ink warning messages before finally shutting down due to low ink. Our HP printer, the Photosmart C5280, was the only one that continued to print even after displaying several low-ink messages, and those messages appeared only when we used an HP print cartridge. When we paired the C5280 with an aftermarket cartridge from LD Products, the printer provided no low-ink warning at all

It’s important to note that our results show the performance of a clutch of single printers, each paired with just one cartridge. Since OEMs and their aftermarket competitors sell dozens of ink cartridges for a wide variety of printer models, you should consider our results as a kind of snapshot of the way each particular unit deals with Remaining ink

Why So Much Leftover Ink?

There are valid reasons for not draining an ink cartridge completely, printing experts say. "Many inks, if they run dry, can cause significant damage to the printer," says Brian Hilton, a senior staff engineer at the Rochester Institute of Technology who holds 29 inkjet patents. "You always want to leave a buffer in the tank so that the printer never runs dry. There should always be a factor of safety included.\"

Other observers point out that the quantity of leftover ink is often only a few milliliters. "Printers have generally become more efficient over the years," says Andy Lippman, a printing analyst with Lyra Research. "In the past, you might have seen 40 milliliters of ink in the black cartridge. Today you’re going to get the same amount of pages out of 7 or 8 milliliters."

Other people, however--both journalists and independent researchers--have reported very different experiences with ink cartridges. Judging from these findings, printer owners are probably throwing away a lot of usable ink. And that’s a problem, when you consider how expensive the precious fluid is. An average black-ink cartridge contains 8 milliliters of ink and costs about $10 which translates into a cost of $1.25 per milliliter (or more horrifyingly, $1250 per Liter).

Liquid Gold?

If you bought a gallon of the stuff over the life of your printer, you’d have paid about $4731 for a liquid that one aftermarket vendor told us was “cheap" to make. For some perspective, gasoline costs about $3 per gallon (at the moment), while a gallon of Beluga caviar (imagined as a liquid) costs about $18,000--surprisingly, only about four times as expensive as good old printer ink.

"I personally think that consumers are getting ripped off," says Steve Pociask, president of the American Consumer Institute, a nonprofit educational and research institute in Washington, D.C. Pociask recently coauthored a 50-page study on the ink jet printer and cartridge market. "In some cases, we found that [the price of] the printer could be 1/8 of the total cost of printing," says Pociask. "Over the life of the printer--and by that I mean three years--you can easily spend $800 for the printer and ink."

How Tested

We researched both online and brick-and-mortar tech outlets to find printers that are being used now by high numbers of consumers. We didn’t test color inks because that would have introduced too many variables that might skew the results. For instance, some printers use separate cartridges for each ink, while others use single, tricolor cartridges. A standardized test might not drain the colors evenly, which might give one printer an unfair advantage. <i>Jeff Bertolucci, PC World

We ran printers until they said it was time to change the cartridge--and found that some left more than 40 percent of their ink unused.

You’ve probably had this experience: Your printer tells you it’s time to change the cartridge, but you dismiss the message and keep printing. Days or weeks later, you’re still using the same cartridge and thinking to yourself that rumors of its death were greatly exaggerated.

AutoCAD 2014 vs AutoCAD 2013 and previous versions

AutoCAD 2014 connects and streamlines your design workflow like never before. New design-feed social collaboration tools drive project stakeholder involvement. Dozens of time-saving enhancements speed your everyday workflow. And with live maps and powerful new reality-capture capabilities, AutoCAD connects your design ideas to the world around you. See how it compares to previous AutoCAD versions.

 
  AutoCAD 2014 AutoCAD 2013 AutoCAD 2012 AutoCAD 2011
Features        
 
User interaction
Multi-functional grips
Hide and isolate objects
Create and select similar objects
Delete duplicate objects  
Content explorer  
Associative arrays  
Clickable command line options    
Property edit preview    
Viewport change preview    
Intelligent command line      
File tabs      
Design
Solid, surface, and mesh modeling
Autodesk materials library
Editable UCS icon  
In-canvas viewport controls  
Surface curve extraction    
Context-sensitive press-pull    
Import sketchup files (SKP)      
Autodesk ReCap point cloud tool      
Documentation
Geometry measurement tools
Parametric constraints
Object and layer transparency
Base and projected views  
Blend curves  
Copy array  
Section and detail views    
Strike-thru text    
Text align      
Connectivity
DGN 8 import/export/underlay
PDF publish/underlay
FBX import/export
DWG convert  
IGES, CATIA, Rhino, pro/engineer, and step import  
Inventor file import    
Autodesk 360 connectivity    
Design feed      
Share on Facebook      
Geolocation coordinate system and live maps      
Customization
Action recorder
CUIx file format
Online license transfer
Migration reset  
Multiple plot file search paths  
Customization and support file sync    
Exchange app manager      
Featured apps ribbon tab      
Secure load      
  Free trial      
Buy online      
 
 

AutoCad System requirements

AutoCad 14 is the last version that supports Windows XP

This document provides the system requirements for Autodesk® AutoCAD® Products.

 

AutoCAD 2014 System Requirements

Note: AutoCAD 2014 is the final version of AutoCAD software that will be supported on the Microsoft® Windows® XP operating system.

For 32-bit AutoCAD 2014

  • Windows® 8 Standard, Enterprise, or Professional edition, Windows® 7 Enterprise, Ultimate, Professional, or Home Premium edition (compare Windows versions), or Windows XP® Professional or Home edition (SP3 or later) operating system
  • For Windows 8 and Windows 7: Intel® Pentium® 4 or AMD Athlon™ dual-core processor, 3.0 GHz or higher with SSE2 technology
  • For Windows XP: Pentium 4 or Athlon dual-core processor, 1.6 GHz or higher with SSE2 technology
  • 2 GB RAM (4 GB recommended)
  • 6 GB free disk space for installation
  • 1,024 x 768 display resolution with true color (1,600 x 1,050 recommended)
  • Microsoft® Internet Explorer® 7 or later web browser
  • Install from download or DVD

For 64-bit AutoCAD 2014

  • Windows 8 Standard, Enterprise, or Professional edition, Windows 7 Enterprise, Ultimate, Professional, or Home Premium edition (compare Windows versions), or Windows XP Professional (SP2 or later)
  • Athlon 64 with SSE2 technology, AMD Opteron™ processor with SSE2 technology, Intel® Xeon® processor with Intel EM64T support and SSE2 technology, or Pentium 4 with Intel EM64T support and SSE2 technology
  • 2 GB RAM (4 GB recommended)
  • 6 GB free space for installation
  • 1,024 x 768 display resolution with true color (1,600 x 1,050 recommended)
  • Internet Explorer 7 or later
  • Install from download or DVD

Additional requirements for large datasets, point clouds, and 3D modeling (all configurations)

  • Pentium 4 or Athlon processor, 3 GHz or greater, or Intel or AMD dual-core processor, 2 GHz or greater
  • 4 GB RAM or more
  • 6 GB hard disk space available in addition to free space required for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Pixel Shader 3.0 or greater, Microsoft® Direct3D®-capable workstation-class graphics card

Virtualization

Minimum

  • Citrix® XenApp™ 6.5 FP1
  • Citrix® XenDesktop™ 5.6
 

 

AutoCAD 2013 System Requirements

System Requirements for 32-bit

  • Windows® 8 Standard, Enterprise, or Professional edition (requires installation of AutoCAD 2013 Service Pack 2); Microsoft® Windows® 7 Enterprise, Ultimate, Professional, or Home Premium (compare Windows 7 versions); or Microsoft® Windows® XP Professional or Home edition (SP3 or later)
  • For Windows 7: Intel® Pentium® 4 or AMD Athlon™ dual-core processor, 3.0 GHz or higher with SSE2 technology
  • For Windows XP: Pentium 4 or AMD Athlon dual-core processor, 1.6 GHz or higher with SSE2 technology
  • 2 GB RAM (4 GB recommended)
  • 6 GB free disk space for installation
  • 1,024 x 768 display resolution with true color (1,600 x 1,050 with true color recommended)
  • Microsoft® Internet Explorer® 7.0 or later web browser
  • Install from download or DVD

System Requirements for 64-bit

  • Windows® 8 Standard, Enterprise, or Professional edition (requires installation of AutoCAD 2013 Service Pack 2); Microsoft Windows 7 Enterprise, Ultimate, Professional, or Home Premium (compare Windows 7 versions); or Microsoft Windows XP Professional (SP2 or later)
  • AMD Athlon 64 with SSE2 technology, AMD Opteron® processor with SSE2 technology, Intel® Xeon® processor with Intel EM64T support and SSE2 technology, or Intel Pentium 4 with Intel EM64T support and SSE2 technology
  • 2 GB RAM (4 GB recommended)
  • 6 GB free space for installation
  • 1,024 x 768 display resolution with true color (1,600 x 1,050 with true color recommended)
  • Internet Explorer 7.0 or later
  • Install from download or DVD

Additional Requirements for 3D Modeling (All Configurations)

  • Pentium 4 or Athlon processor, 3 GHz or greater or Intel or AMD dual-core processor, 2 GHz or greater
  • 4 GB RAM or more
  • 6 GB hard disk space available in addition to free space required for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Pixel Shader 3.0 or greater, Microsoft® Direct3D®-capable workstation-class graphics card

 

 

 

AutoCAD 2012 System Requirements

System Requirements for 32-bit

  • Microsoft® Windows® 7 Enterprise, Ultimate, Professional, or Home Premium ( compare Windows 7 versions); Microsoft® Windows Vista® Enterprise, Business, Ultimate, or Home Premium (SP2 or later) ( compare Windows Vista versions); or Microsoft® Windows® XP Professional or Home edition (SP3 or later)
  • For Windows Vista or Windows 7: Intel® Pentium® 4 or AMD Athlon® dual-core processor, 3.0 GHz or higher with SSE2 technology; for Windows XP: Intel Pentium 4 or AMD Athlon dual-core processor, 1.6 GHz or higher with SSE2 technology
  • 2 GB RAM
  • 2 GB free disk space for installation
  • 1,024 x 768 display resolution with true color
  • Microsoft® Internet Explorer® 7.0 or later
  • Install from download or DVD

System Requirements for 64-bit

  • Microsoft Windows 7 Enterprise, Ultimate, Professional, or Home Premium ( compare Windows 7 versions); Microsoft Windows Vista Enterprise, Business, Ultimate, or Home Premium (SP2 or later) ( compare Windows Vista versions); or Microsoft Windows XP Professional (SP2 or later)
  • AMD Athlon 64 with SSE2 technology, AMD Opteron® processor with SSE2 technology, Intel® Xeon® processor with Intel EM64T support and SSE2 technology, or Intel Pentium 4 with Intel EM64T support and SSE2 technology
  • 2 GB RAM
  • 2 GB free space for installation
  • 1,024 x 768 display resolution with true color
  • Internet Explorer 7.0 or later
  • Install from download or DVD

Additional Requirements for 3D Modeling (All Configurations)

  • Intel Pentium 4 processor or AMD Athlon, 3 GHz or greater; or Intel or AMD dual-core processor, 2 GHz or greater
  • 2 GB RAM or more
  • 2 GB hard disk space available in addition to free space required for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Pixel Shader 3.0 or greater, Microsoft® Direct3D®-capable workstation-class graphics card
 

 

AutoCAD 2011 System Requirements

 

System Requirements for 32-bit

  • Microsoft® Windows® 7 Enterprise, Ultimate, Professional, or Home Premium (compare Windows 7 versions); Microsoft® Windows Vista® Enterprise, Business, Ultimate, or Home Premium (SP1 or later) (compare Windows Vista versions); or Microsoft® Windows® XP Professional or Home edition (SP2 or later)
  • For Windows Vista or Windows 7: Intel® Pentium® 4 or AMD Athlon® dual-core processor, 3.0 GHz or higher with SSE2 technology; for Windows XP: Intel Pentium 4 or AMD Athlon dual-core processor, 1.6 GHz or higher with SSE2 technology
  • 2 GB RAM
  • 1.8 GB free disk space for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Microsoft® Direct3D®-capable workstation-class graphics card
  • Microsoft® Internet Explorer® 7.0 or later 
  • Install from download or DVD

System Requirements for 64-bit

  • Microsoft Windows 7 Enterprise, Ultimate, Professional, or Home Premium (compare Windows 7 versions); Microsoft Windows Vista Enterprise, Business, or Ultimate (SP1 or later) (compare Windows Vista versions); or Microsoft Windows XP Professional (SP2 or later)
  • AMD Athlon 64 with SSE2 technology, AMD Opteron® processor with SSE2 technology, Intel® Xeon® processor with Intel EM64T support and SSE2 technology, or Intel Pentium 4 with Intel EM64T support and SSE2 technology
  • 2 GB RAM
  • 2 GB free space for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Microsoft® Direct3D®-capable workstation-class graphics card
  • Internet Explorer 7.0 or later 
  • Install from download or DVD

Additional Requirements for 3D Modeling (All Configurations)

  • Intel Pentium 4 processor or AMD Athlon, 3 GHz or greater; or Intel or AMD dual-core processor, 2 GHz or greater
  • 2 GB RAM or more
  • 2 GB hard disk space available in addition to free space required for installation
  • 1,280 x 1,024 true color video display adapter 128 MB or greater, Pixel Shader 3.0 or greater, Microsoft® Direct3D®-capable workstation-class graphics card
 

 

AutoCAD 2010 System Requirements

System Requirements For 32 bit

  • Operating system: Windows 7 Ultimate, Professional, Home Premium;Windows Vista (SP1); Windows XP (SP2 or later)
  • Browser: Windows Internet Explorer 7.0 or later
  • CPU: Windows Vista – Intel Pentium 4 or AMD Athlon Dual Core, 3.0 GHz or higher with SSE2 technology; Windows XP – Intel Pentium 4 or AMD Athlon Dual Core, 1.6 GHz or higher with SSE2 technology
  • Memory: Windows Vista – 2 GB RAM, Windows XP – 2 GB RAM
  • Display resolution: 1024 x 768 display with True Color
  • Hard Disk: 1 GB free disk space for installation
  • Pointing Device: MS-Mouse compliant

3D Modeling additional requirements

  • Intel Pentium 4 or AMD Athlon, 3.0 GHz or greater; Intel or AMD Dual Core, 2.0 GHz or greater
  • 2 GB RAM or greater
  • 2 GB free disk space available not including installation
  • 1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, Direct3D-capable workstation class graphics card

System Requirements For 64 bit

  • Operating system: Windows 7 Ultimate, Professional, Home Premium; Windows Vista(SP1); Windows XP Professional x64 Edition (SP2 or later)
  • Browser: Windows Internet Explorer 7.0 or later
  • CPU type: AMD Athlon 64 or Opteron with SSE2 technology; Intel Pentium 4 or Xeon with Intel EM64T support & SSE2 technology
  • Memory: Windows Vista – 2 GB RAM, Windows XP – 2 GB RAM
  • Display resolution: 1024 x 768 with True Color
  • Hard Disk: 1.5 GB free disk space for installation
  • Pointing Device: MS-Mouse compliant
  • Media (CD ROM vs. DVD)

3D Modeling additional requirements

  • Intel Pentium 4 or AMD Athlon, 3.0 GHz or greater; Intel or AMD Dual Core, 2.0 GHz or greater
  • 2 GB RAM or greater
  • 2 GB free disk space available not including installation
  • 1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, Direct3D -capable workstation class graphics card
 

 

AutoCAD 2009 System Requirements

System Requirements For 32 bit

Operating system: Windows Vista Enterprise, Windows Vista Business, Windows Vista Ultimate, Windows Vista Home Premium, Windows XP Professional, Service Pack 2, Windows XP Home, Service Pack 2
Browser: Internet Explorer 6.0 SP1 or later
You cannot install AutoCAD if Microsoft Internet Explorer 6.0 with Service Pack 1 (or later) is not installed on the installation workstation. You can download Internet Explorer from the Microsoft website: http://www.microsoft.com/downloads/
CPU: Intel® Pentium® 4 processor or AMD® Athlon, 2.2 GHz or greater or Intel or AMD Dual Core processor, 1.6 GHz or greater
Memory: 1 GB (Windows XP SP2), 2 GB or greater (Windows Vista)
Display resolution: Graphics card 1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, OpenGL®, or Direct3D® capable workstation class graphics card.
For Windows Vista, a Direct3D capable workstation class graphics card with 128 MB or greater is required 1024 x 768 VGA with True Color (minimum)
Hard Disk: 750 MB for installation
Download (ESD) and installation from DVD or CD-ROM

System Requirements For 64 bit

Operating system: Windows Vista Enterprise, Windows Vista Business, Windows Vista Ultimate, Windows Vista Home Premium, Windows XP Professional
Browser: Internet Explorer 7.0 or later
CPU: AMD 64 or Intel EM64T
Memory: 2 GB
Display resolution: Graphics card 1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, OpenGL®, or Direct3D® capable workstation class graphics card.
For Windows Vista, a Direct3D capable workstation class graphics card with 128 MB or greater is required 1024 x 768 VGA with True Color (minimum)
Hard disk: 750 MB for installation (Windows XP SP2), 2 GB available not including installation (Windows Vista)
Pointing device: Mouse, trackball, or other device.  Any speed (for installation only) 
DVD/CD-ROM: Download or DVD

Additional recommendations for 3D use

32-Bit
Windows Vista Enterprise
Windows Vista Business
Windows Vista Ultimate
Windows Vista Home Premium
Windows XP Professional, Service Pack 2
Windows XP Home, Service Pack 2

64-Bit
Windows Vista Enterprise
Windows Vista Business
Windows Vista Ultimate
Windows Vista Home Premium
Windows XP Professional

Processor: Intel® Pentium® 4 processor or AMD® Athlon, 2.2 GHz or greater
or Intel or AMD Dual Core processor, 1.6 GHz or greater
RAM: 2 GB (or greater)
Graphics card: 1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, OpenGL®, or Direct3D® capable workstation class graphics card.
- For Windows Vista, a Direct3D capable workstation class graphics card with 128 MB or greater is required1024 x 768 VGA with True Color (minimum)
- For graphic cards that support Hardware Acceleration, DirectX 9.0c, or later, must be installed.
- Installing from the ACAD.msi file does not install DirectX 9.0c, or later. Manual installation of DirectX is required, in this circumstance, for Hardware Acceleration to be configured.

For more information about tested and certified graphics cards, visit http://www.autodesk.com/autocad-graphicscard  

 

 

AutoCAD 2008 System Requirements

32-bit AutoCAD

Intel® Pentium® 4 processor, 2.2 GHz Recommended
Microsoft® Windows Vista™, Windows® XP Home and Professional (SP2), Windows® 2000 (SP4)
512 MB RAM
750 MB free disk space for installation
1024x768 VGA with True Color
Microsoft® Internet Explorer® 6.0 (SP1 or higher)
Available on CD (Worldwide) and DVD (select countries and languages)

Additional System Requirements for 64-bit AutoCAD

Windows XP Professional x64 Edition and Windows Vista 64-bit
AMD64 or Intel EM64T processor
1GB RAM, 2GB for Windows Vista 64-bit
750 MB free disk space for installation
AutoCAD 64-bit cannot be installed on a 32-bit Windows Operating System.

The System requirements for Windows Vista or 3D modeling (32 and 64-bit AutoCAD)

Intel® 3.0 GHz or greater
2 GB RAM or greater
2 GB free hard disk available not including installation
1280 x 1024 32-bit color video display adapter (True Color) 128 MB or greater, OpenGL®, or Direct3D® capable workstation class graphics card. 
For Windows Vista, a Direct3D capable workstation class graphics card with 128 MB or greater is required.

 

 

AutoCAD 2007 System Requirements

 

  • Intel Pentium IV, or compatible
  • Microsoft Windows XP (Professional, Home Edition, or Tablet PC Edition), Windows 2000 Professional SP4
  • 512 MB RAM (minimum)
  • 750 MB free disk space
  • 1024x768 VGA with true colour (minimum)
  • Mouse or other pointing device
  • CD-ROM drive
  • Microsoft Internet Explorer 6 SP1
 

 

AutoCAD 2006 System Requirements

 

  • Intel Pentium III or later with 800Mhz Processor
  • Microsoft Windows XP (Professional, Home Edition, or Tablet PC Edition), Windows 2000
  • 512 MB RAM (minimum)
  • 500 MB free disk space
  • 1024x768 VGA with true colour (minimum)
  • Mouse or other pointing device
  • CD-ROM drive
  • Microsoft Internet Explorer 6 SP1
 

 

AutoCAD 2005 System Requirements

 

  • Intel Pentium III or later with 800Mhz Processor
  • Microsoft Windows XP (Professional, Home Edition, or Tablet PC Edition), Windows 2000
  • 256 MB RAM (minimum)
  • 300 MB free disk space
  • 1024x768 VGA with true colour (minimum)
  • Mouse or other pointing device
  • CD-ROM drive
  • Microsoft Internet Explorer 6 SP1
 

 

AutoCAD 2004 System Requirements

 

  • Intel Pentium III or later, with 800 MHz or faster processor, or compatible
  • Microsoft Windows XP (Professional, Home Edition, or Tablet PC Edition)
  • Windows 2000, or Windows NT 4.0 (SP6a or later)
  • 256 MB RAM
  • 300 MB free disk space for installation
  • 1024x768 VGA with true colour (minimum)
  • Microsoft Internet Explorer 6.0
  • Mouse, trackball, or compatible pointing device
  • CD-ROM drive

Avoid digital eye strain and other tech health problems

(Kim Komando) You know the blurry vision and dry eyes you get when you've been staring at a computer, smartphone, TV or other screen for a few hours? According to researchers at a group called the Vision Council, that's not a good thing. And to really drive the point home, it's dubbed the problem "digital eye strain."

The Vision Council defines digital eye strain as "the temporary discomfort that follows from two or more hours of digital device use." Common symptoms include "red, dry or irritated eyes, blurred vision, eye fatigue, back, neck and shoulder pain, and headaches."

 According to the Vision Council's latest survey, 70 percent of tech users experience digital eye strain regularly. While it's suspiciously convenient that a group representing eye companies is bringing this up, it's no secret that technology causes some unique health problems - and not just for your eyes.

In addition to digital eye strain, some other tech health problems are repetitive-stress injury, shoulder tension, back and neck pain, and increased risk of cancer, heart disease and obesity. Some studies show that extended computer use can shave 10-15 years off of your life!

Before I continue, just let me remind you that I'm not a doctor. If you're experiencing chronic pain or other odd symptoms, consult a professional for a formal diagnosis.

In the end, however, almost every tech health problem comes down to two things: Insufficient breaks and poor posture.

Many doctors recommend that every 20 minutes you look at an object 20 feet away for 20 seconds. This gives your eyes a chance to focus at a different distance, and get away from the bright screen backlight.

Speaking of backlights, grab a program like F.lux to match your monitor tint to the time of day. It can decrease eye strain and improve your sleep.

Every hour or so, stand up and do some quick stretches or walk around your house. Programs like BreakTaker and Workrave can help remind you when it's time to take breaks.

You should strive for about 30 minutes of daily exercise, too. Walking the dog or doing some yard work is enough for most people. This improves your circulation after sitting for hours on end.

Posture is just as important. Have you heard about "iPosture"? This refers to the way most people use phones and tablets: head down and shoulders hunched over. It can lead to back and neck strain, in addition to the digital eye strain from staring at a small screen.

In fact, studies show that teens and young adults are increasingly having medical problems from standing or sitting this way for long periods. Not to mention thumb injuries from continual texting.

For smartphones and tablets, it's better to sit upright and keep the gadget just below eye level. Again, taking regular breaks for your eyes and hands is important.

Bring the screen brightness down as far as possible and then increase it gradually to find a point where it's comfortably visible. Not only will this reduce eye strain from too-bright backlights, it makes your battery last longer. Learn how to adjust the brightness and more in this essential tip on improving gadget battery life.

Good posture at a computer is just as important. Start with a good chair that offers lumbar support, and sit at a 110-135 degree angle.

Adjust your seat so that your feet touch the floor and your legs rest at about a 90 degree angle. Your knees should be even with or a little lower than your hips. Your forearms and wrists should rest comfortably on your desk or work table, with your elbows at a 90-degree angle.

Many people like the gel-filled wrist rest for keyboards and mouse pads. While it seems like it would help to rest your wrists on these while working, it doesn't. When you're typing and moving your mouse, you want to keep your wrists in the air, level with your hand.

This allows your hand and arm to move together naturally. Otherwise, you end up stretching your fingers and moving your hands into odd angles while hitting keys and moving the mouse.

Another common problem is that too many people set their monitors too low. This causes them to slouch, or scrunch, which puts strain on the neck and shoulders.

Then there's what's on the screen. When you're browsing the Web, for example, you might notice the fonts and images on your screen are too small. This can cause you to lean forward or strain your eyes trying to read.

In any Windows browser, and many programs, use the keyboard shortcut CTRL + + (plus) to zoom in and CTRL + - (minus) to zoom out. CTRL + 0 (zero) brings the zoom back to 100 percent.

BIOS beep codes

When you power on your computer, the motherboard's basic input/output system (BIOS) first detects the computer's internal hardware configuration and then performs the power-on self-test (POST). The POST executes several diagnostic tests that check the basic functionality of the power supply, motherboard, CPU, I/O Bus Controller, RAM, keyboard, and video components. If the computer passes the POST, it will usually return a single short beep or two short beeps, depending on the BIOS manufacturer. If the POST detects any problems, it will halt the boot process and return an error message either visually on the screen and/or audibly through a series of beeps.

Unfortunately, there is no official standard for beep codes. Depending on the BIOS manufacturer, a keyboard controller failure could be three, four, five, or six beeps. While this document lists common BIOS manufacturer beep codes, you should always consult your motherboard's documentation, the manufacturer's Web site, and the BIOS manufacturer's Web site for a definitive beep code list for your particular BIOS. The information contained in the following lists was gathered from various BIOS manufacturers' Web sites.

AMI BIOS beep codes
http://www.ami.com/support/bios.html

Number of beeps

Problem description

Troubleshooting recommendation

1

Memory refresh timer error

Reseat memory or replace with known good chips.

2

Parity error

Reseat memory or replace with known good chips.

3

Base 64K memory read/write test failure

Reseat memory or replace with known good chips.

4

Motherboard timer not operational

Repair/replace motherboard.

5

Processor error

Repair/replace motherboard.

6

8042—gate A20 failure/Keyboard controller BAT test error

Reseat keyboard controller chip, replace keyboard controller chip, check for a keyboard fuse, or try a different keyboard.

7

Processor exception interrupt error

Repair/replace motherboard.

8

Display memory read/write failure

Replace video card or video card memory.

9

ROM checksum error/Faulty BIOS chips

Replace chips or motherboard.

10

CMOS shutdown register read/write error

Repair/replace motherboard.

11

Cache memory bad

Repair/replace motherboard.

 

Award BIOS beep codes
http://www.phoenix.com/en/customer+services/bios/awardbios/default1.htm

Number of beeps

Problem description

Troubleshooting recommendation

1 long & 2 short

Video error

Check the video card.

Any other beeps

RAM problem

Reseat the RAM or replace with known good chips.

 

 

PhoenixBIOS beep codes
http://www.phoenix.com/en/customer+services/bios/phoenixbios/default1.htm

Unfortunately, PhoenixBIOS beep codes are significantly more complicated than other BIOS manufacturers. Instead of a single beep code set, PhoenixBIOS codes consist of a series of beep code sets separated by a short pause. Older Phoenix BIOS Plus and PhoenixBIOS 1.x systems used a series of three sets, while the PhoenixBIOS 4.x systems use a series of four sets. The codes listed below are only some of the more than 100 codes for the PhoenixBIOS 4.x. For a complete list of Phoenix BIOS POST task routines and beep codes, please visit their Web site or review your motherboard's documentation.

Number of beeps

POST routine description/problem

Troubleshooting recommendation

1

One short beep before boot

Normal operation

1-1-1-3

Verify real mode

A problem exists with the CPU and/or motherboard. Check and replace if necessary.

1-1-2-1

Get CPU type

A problem exists with the CPU and/or motherboard. Check and replace if necessary.

1-1-2-3

Initialize system hardware

A problem exists with the motherboard. Check and replace if necessary.

1-1-3-1

Initialize chipset with initial POST values

A problem exists with the motherboard. Check and replace if necessary.

1-1-3-2

Set IN POST flag

A problem exists with the motherboard. Check and replace if necessary.

1-1-3-3

Initialize CPU registers

A problem exists with the CPU and/or motherboard. Check and replace if necessary.

1-1-4-3

Initialize I/O component

A problem exists with the I/O port hardware or a device connected to an I/O port. It could also be an expansion device in the PC or the motherboard.

1-2-2-1

Initialize keyboard controller

An error has occurred with the keyboard or keyboard controller. Try a new keyboard or replace the keyboard controller on the motherboard.

1-2-2-3

BIOS ROM checksum

Replace either the BIOS ROM chip or the motherboard.

1-2-3-3

8237 DMA controller initialization

Check the motherboard and any expansion cards that use DMA.

1-3-1-1

Test DRAM refresh

Check the first bank of memory and the motherboard.

1-3-1-3

Test 8742 keyboard controller

An error has occurred with the keyboard or keyboard controller. Try a new keyboard or replace the keyboard controller on the motherboard.

1-3-4-1

RAM failure on line xxxx

Check the first bank of memory and the motherboard.

1-3-4-3

RAM failure on data bits xxxx of low byte memory bus

Check the first bank of memory and the motherboard.

2-1-3-1

Check video configuration against CMOS

Check the video card or video card memory.

2-1-3-2

Initialize PCI bus and devices

A problem exists with the I/O port hardware or a device connected to an I/O port. It could also be an expansion device in the PC or the motherboard.

2-2-1-3

Test keyboard

An error has occurred with the keyboard or keyboard controller. Try a new keyboard or replace the keyboard controller on the motherboard.

2-2-3-1

Test for unexpected interrupts

Check for a faulty motherboard or expansion card.

3-1-2-1

Detect and install external parallel ports

A problem exists with the I/O port hardware or a device connected to an I/O port. It could also be an expansion device in the PC or the motherboard.

3-1-4-1

Initialize floppy controller

Check your hard drive(s), floppy drive(s), and motherboard.

3-2-1-1

Initialize hard-disk controllers

Check your hard drive(s), floppy drive(s), and motherboard.

3-2-1-2

Initialize local-bus hard-disk controllers

Check your hard drive(s), floppy drive(s), and motherboard.

3-3-1-1

Set time of day

Check the motherboard's real-time clock (RTC).

4-2-4-3

Keyboard controller failure

An error has occurred with the keyboard or keyboard controller. Try a new keyboard or replace the keyboard controller on the motherboard.

 

 

Dell BIOS beep codes
http://support.dell.com/us/en/home.asp

Because Dell uses motherboards and BIOSs from several manufacturers, their computers use a variety of beep codes. Instead of listing each model's beep codes, links are provided to the support pages of several popular Dell desktops.

Model

System codes and messages link

Dimension 900

http://docs.us.dell.com/docs/systems/dcaydim2/codemess.htm

Dimension 2100

http://docs.us.dell.com/docs/systems/dim2100/codemess.htm

Dimension 4100

http://docs.us.dell.com/docs/systems/dzuul/codemess.htm

Dimension 4200

http://docs.us.dell.com/docs/systems/dim4200/codes.htm

Dimension 4300

http://docs.us.dell.com/docs/systems/dim4300/codes.htm

Dimension 4300S

http://docs.us.dell.com/docs/systems/dim4300s/codes.htm

Dimension 4400

http://docs.us.dell.com/docs/systems/dim4400/codes.htm

Dimension 8100

http://docs.us.dell.com/docs/systems/dsleest/codemess.htm

Dimension 8200

http://docs.us.dell.com/docs/systems/dim8200/codes.htm

Dimension C

http://docs.us.dell.com/docs/systems/dcaydim/codemess.htm

Dimension L

http://docs.us.dell.com/docs/systems/dmum/codemess.htm

Dimension Lxxxc

http://docs.us.dell.com/docs/systems/dcol/codemess.htm

Dimension P133a, P166a, M166a, M200a, and M233a

http://docs.us.dell.com/docs/systems/dhanplus/post.htm

Dimension XPS Txxx and Txxxr

http://docs.us.dell.com/docs/systems/dkub/codemess.htm

Dimension Vxxx and Vxxxc

http://docs.us.dell.com/docs/systems/dwill/post.htm

Dimension XPS B Series

http://docs.us.dell.com/docs/systems/dmag/codemess.htm

Dimension XPS Dxxx

http://docs.us.dell.com/docs/systems/dalex/post.htm

Dimension XPS H233 and XPS H266

http://docs.us.dell.com/docs/systems/dcor/post.htm

Dimension XPS P60 FS

http://docs.us.dell.com/docs/dta/xpsp60f/00000015.htm

Dimension XPS P60 M

http://docs.us.dell.com/docs/dta/xpsp60m/00000014.htm

Dimension XPS 50/66 FS

http://docs.us.dell.com/docs/dta/xps_f/00000021.htm

Dimension XPS 50/66 MDT (V4xxV)

http://docs.us.dell.com/docs/dta/xps_m/00000025.htm

Dimension XPS Rxxx

http://docs.us.dell.com/docs/systems/dkhan/post.htm

OmniPlex 5xx/ME

http://docs.us.dell.com/docs/dta/omni5xx/00000051.htm

OptiPlex G1

http://docs.us.dell.com/docs/systems/ddur/beep.htm

OptiPlex GC

http://docs.us.dell.com/docs/systems/opgc/en/ug/messages.htm

OptiPlex Gn and Gn+

http://docs.us.dell.com/docs/systems/dthred/beep.htm

OptiPlex GX1

http://docs.us.dell.com/docs/systems/ban_gx1/beep.htm

OptiPlex GX1 Small-Form-Factor

http://docs.us.dell.com/docs/systems/ban_gx1/en/ug_sdt/messages.htm

OptiPlex GX1p

http://docs.us.dell.com/docs/systems/d_gx1p/beep.htm

OptiPlex GXi

http://docs.us.dell.com/docs/systems/dzer/beep.htm

OptiPlex GX110

http://docs.us.dell.com/docs/systems/opgx110/en/ug/messages.htm

OptiPlex GX115

http://docs.us.dell.com/docs/systems/opgx115/en/ug/messages.htm

OptiPlex GX200

http://docs.us.dell.com/docs/systems/opgx200/en/ug/messages.htm

OptiPlex GX300

http://docs.us.dell.com/docs/systems/opgx300/en/ug/messages.htm

OptiPlex GXa

http://docs.us.dell.com/docs/systems/dfuj/beep.htm

OptiPlex GXpro

http://docs.us.dell.com/docs/systems/dstrmlk/postbeep.htm

OptiPlex N

http://docs.us.dell.com/docs/systems/dkill/beep.htm

OptiPlex NX

http://docs.us.dell.com/docs/systems/dfujnx/beep.htm

OptiPlex NX1

http://docs.us.dell.com/docs/systems/ban_nx1/beep.htm

OptiPlex XMT575/590/5100/5120/5133

http://docs.us.dell.com/docs/dta/586xmt/00000038.htm

Precision WorkStation 210

http://docs.us.dell.com/docs/systems/daftshk/beep.htm

Precision WorkStation 340

http://docs.us.dell.com/docs/systems/ws340/en/ug/codes.htm

Precision WorkStation 400

http://docs.us.dell.com/docs/systems/dtor/beep.htm

Precision WorkStation 410

http://docs.us.dell.com/docs/systems/deqkmt/beep.htm

Precision WorkStation 420

http://docs.us.dell.com/docs/systems/ws420/en/ug/messages.htm

Precision WorkStation 530

http://docs.us.dell.com/docs/systems/ws530/en/ug/html/2codes.htm

Precision WorkStation 610 Mini Tower

http://docs.us.dell.com/docs/systems/dvol/beep.htm

Precision WorkStation 620

http://docs.us.dell.com/docs/systems/ws620/en/ug/messages.htm

Precision WorkStation 730

http://docs.us.dell.com/docs/systems/ws730/ug/messages.htm

 


HP BIOS beep codes
http://welcome.hp.com/country/us/eng/support.html

Because Hewlett-Packard uses a variety of motherboards and BIOSs, their computers use a variety of beep codes. Instead of listing each model's beep codes, links are provided to the support pages of several popular Hewlett-Packard desktops.

Model

System codes and messages link

Kayak

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis06334

Kayak XA-S Series 02xx

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18636

Kayak XU Series 04xx

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18582

Kayak XU Series 03xx

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18635

Kayak XW Series U3-W3

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18631

Kayak XW Series 04xx

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18633

Pavilion Desktops with Phoenix BIOS

http://h20015.www2.hp.com/en/document.jhtml?docName=bph07107

Pavilion 5010, 5030, and 5040

http://h20015.www2.hp.com/en/document.jhtml?docName=bph01004

Pavilion 7010, Pavilion 7020, Pavilion 7030, and Pavilion 7050

http://h20015.www2.hp.com/en/document.jhtml?docName=bph01053

Vectra PCs with Phoenix BIOS (VL4, VL5, VE2, VE3, XM4, XA5, and possibly others)

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=bpv03305

e-Vectra

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis06446

Vectra VE 5/xxx Series 4

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=lpv18434

Vectra VL600

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis01866

Vectra XA5

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis06112

Vectra XA 5/XXX

http://h20015.www2.hp.com/en/document.jhtml?docName=bpv03314

Vectra XE310

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis13051

Workstation i2000

http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=tis07621

 


 

IBM BIOS beep codes
http://www.ibm.com/support/us/

Because IBM uses a variety of motherboards and BIOSs, their computers use a variety of beep codes. Instead of listing each model's beep codes, links are provided to the support pages of several popular IBM desktops.

Model

System codes and messages link

   Aptiva 2134 and 2176

http://www-1.ibm.com/support/docview.wss?uid=psg1DETR-44DPDQ

   Aptiva 2137, 2138

http://www-1.ibm.com/support/docview.wss?uid=psg1DETR-43VMUY

Aptiva 2140 and 2142

http://www-1.ibm.com/support/docview.wss?uid=psg1PMYS-3KWRR2

Aptiva 2144 and 2168

http://www-1.ibm.com/support/docview.wss?uid=psg1DETR-3SRSAB

Aptiva 2156

http://www-1.ibm.com/support/docview.wss?&uid=psg1DETR-3ZNMD5

Aptiva 2158, 2163 and 2164

http://www-1.ibm.com/support/docview.wss?uid=psg1DETR-42QQY6

   Aptiva 2159 

http://www-1.ibm.com/support/docview.wss?uid=psg1DETR-42JU2A

Aptiva 2162

http://www-1.ibm.com/support/docview.wss?uid=psg1COBN-3G2DCZ

Aptiva 2165

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-484PZ9

  Aptiva 2170, 2171, and 2172

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-48UPZ9

Aptiva 2187

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4CGQAM

   Aptiva 2190

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4CURG4

Aptiva 2193, 2194, 2196 and 2197

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4HHM4H

IBM PC300 Type 6344 and 6345

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4HHM4H

NetVista 2194, 2196, 2197, and 6345

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4HHM4H

NetVista 6269, 6578, and 6579

http://www-1.ibm.com/support/docview.wss?uid=psg1MIGR-4L4TT5

 

Backup Systems That Work

The only thing worse than losing data is discovering that your backups don't work in the first place. Here are four tips that will help you ensure that your backups are indeed in working order.

1. Test regularly. This is the bottom line. Can you recover the data? Never mind that the backup program "verified" the backup. If you don't actually restore data, you'll never be certain your backup is working. How often you should test depends in part on the nature of your operation. The general recommendation is to run your test protocol once a quarter.

2. Test realistically. You can't wipe the server just to do a complete test restore, but there's a lot you can do to make sure the entire recovery process works. A backup test protocol should be designed to make sure all aspects of your recovery operation works with minimal disruption to your regular operations. Often you can automate large parts of the test, but don't skimp on something just because it has to be done manually.

Remember: You need to test the entire backup chain. It's not enough to know that the tape is readable. Can you read it on the system it will be restored on? This is particularly important when performing a restore over a network, SAN or whatever, because a mis-configured network component can keep a restore from working just as much (although perhaps not as permanently) as a corrupted tape.

Don't forget that your people and the documentation are part of the backup chain as well. Backup tests are an opportunity to train your staff in backup and recovery procedures as well as to find holes in your documentation.

A worthwhile procedure is to select a tape or a volume at random, find it, and then try to back up from the data on it. (Note the part about finding the tape; a misfiled tape is as unavailable as an unreadable one.)

3. Test all your backups regularly. Backup is more than what goes into the vault. It includes all the tiers of your backup system, including the incremental backups, any disk-based backups, recovery disks and anything else you need to get up and running again. All these things need to be tested to make sure they're working properly – and that they're working together.

4. Test compliance-related recovery regularly. Technically, record recovery for compliance isn't a part of backup. But it's an increasingly important function fulfilled by backup systems. Test to make sure you can recover files, logs, chains of emails and anything else your company is likely to need for compliance.

None of this has to be traumatic. In fact, if it is traumatic, then you've already discovered you've got problems. If you work out a procedure at the appropriate level of completeness for your enterprise and then do it regularly, it shouldn't take an excessive amount of time or effort. Besides, if nothing else, you'll sleep better at night.

Beware of Office 2013 License

(In what is being called a move to get users to gravitate towards Office 365, Microsoft has confirmed to the folks over at Computerworld that an Office 2013 license locks the software suite to the first computer upon which it is installed, leaving users who buy a new computer out of luck. This is a change from the end user license agreement of times gone by, which allowed the license to be used on a different computer.

The new EULA for Office 2013 reads: “Our software license is permanently assigned to the licensed computer.” Meaning that it is permanently attached to the first computer upon which it is applied, forcing those who update to a new computer to buy a new license, something that was never necessary in the past.

To confirm the language in the EULA, the folks at Computerworld sent Microsoft a message clarifying that once Office 2013 is activated on a computer, the license cannot be reused on a different computer, to which the response was “Correct.” In an attempt to further clarify, Microsoft was then asked whether the EULA prevented users who replaced their computer from reusing their license again on the new PC, to which the company responded that it had no comment.

What is Microsoft’s end goal in changing its Office retail license? To get more users to gravitate to Office 365, it would seem. According to a Microsoft spokesperson, “We’ve been very clear in all of our communications that customers seeking transferability should get Office 365 and that Office 2013 is licensed to one device.

Read More - Click Here!

Bloated Software Problem

BloatWare is the term often used to criticize software companies whose programs grow with each new version, taking up more disk space and/or requiring more memory and other system resources to run. No one can dispute that the operating systems and applications of today are much larger and more complex than those written twenty years ago. But it's also true that today's programs do a lot more, and in most cases do it better, than your grandfather’s programs.

Question is, are we buying faster computers just to handle half-baked Bloated software? It's easy to wax nostalgic about MS-DOS, an OS that required only a few megabytes of disk space (version 6.x needed about 3.5 MB) and could run on 512K (that's kilobytes, not megabytes) of memory. Programs were written in assembly language and only occupied a few “k” of space. On the other hand, the DOS environment and its apps certainly didn't have the bells and whistles you get with Vista or other graphical operating systems.

Still, there has been considerable "Bloat" since the advent of Windows. Windows 95 required only 8 MB of memory and took up less than 50 MB on your hard drive (we're starting with Windows 95 because Windows 3.x was not really an operating system in itself, but a graphical shell that was installed on top of MS-DOS). By the time we get to Windows XP, you need 128MB of RAM and one and a half gigs of disk space to barely run it (512MB of ram to run good).

Many complained that Vista took a Bloated leap in the wrong direction. Previously, memory requirements had more or less doubled with each new Windows OS: 8 MB for Windows 95, 24MB for Windows 98, 32MB for Windows Me, 64MB for Windows 2000, and 128MB for XP. Thus you might expect Vista to require 256MB of RAM, but to run properly, you really need a minimum of 1GB (4 gigs to run well), and hard disk requirements increased tenfold, to about 15GB.

These numbers sound pretty bad, when you look at them in a vacuum. But you also have to consider the advances in computer hardware over that time, and the falling prices of that hardware. In 1995, when I bought a computer to run Windows 95, a low priced system cost almost $2000. Today you can buy a computer that runs Vista for $500.

If you look at individual components, the difference is even more striking. I remember later upgrading my system by spending over $300 for a "huge" 8MB RAM chip (8MB was the amount of memory needed to run Windows 95). Today you can buy a 2 GB memory module (the amount of memory needed to run Vista) for under $40.

http://www.tigerdirect.com/applications/category/category_slc.asp?CatId=3410&name=2048MB-PC6400-DDR2-RAM

Then there's hard disk space. I can still recall the thrill of buying an enormous 1 GB hard disk for my Windows 95 computer, for around $350. Back then, I couldn't imagine how I would ever fill up all that space (of course, I had thought the same thing back in the 80s when I got my IBM PC with its gargantuan 10MB hard disk, too). Last weekend, Tom and I took a stroll through the local Fry's and came away with an external 1TB hard drive (that's 1024 times the size of my 1GB drive) - for $199. You can get an internal 1TB drive (more comparable to my 1GB drive) for under $150.

http://www.tigerdirect.com/applications/SearchTools/item-details.asp?EdpNo=3346290&CatId=2459

These days, what with 12 megapixel digital photos and high resolution videos and recorded TV programs, I no longer suffer from the delusion that we won't quickly fill up the space.

If you do the math, then, you'll see that the price per MB of memory has fallen from $37.50 in the mid 1990s to less than 3 cents, and the price per GB of hard disk space has fallen from $350 to under 15 cents. Even if you factor in inflation, that's quite a price difference. So, given the amounts of memory and disk space that are available to us at such low prices, does it really matter if operating systems and applications are subject to Bloat?

Some folks say yes. Others say software Bloat is inevitable. Most of us have heard of Moore's Law, which said that the number of transistors per square inch on integrated circuits doubled every year, and was later extrapolated by others to mean that computer processing power doubles every year (or later, every 18 months). Parkinson's Law states that "resource requirements expand to consume the resources available." And that doesn't just apply to software developers; we're all guilty. Ever move into a new, bigger home that seems enormously spacious compared to your old one, only to find that a few years later, you've outgrown your house again?

Just because Bloat is the natural order of things, though, doesn't necessarily mean it's a good thing. Most of us packrats wish, from time to time, that we could get rid of all that junk and start over with a more minimalist approach. And not all packrat behavior is created equal, either. If you're using up your extra space by hoarding non-perishable food and medical supplies or housing collections of valuables that are increasing in value over time, that's different from keeping old, useless magazines or boxes of paid bills dating back to the 1970s (as I found in my mom's house when we started cleaning it out after her death).

Likewise, software Bloat can be caused by different things: less efficient (but easier to use) development tools (for example, writing code in Visual C++ vs. writing it in lean, mean - but more difficult - assembly language), just plain sloppy coding by less skilled programmers, or "featuritis," the addition of more and more features to the software in an effort to please all of the people, all of the time. Older versions of Windows didn't have built in music players and burners, built in firewalls and MalWare protections, built in graphics manipulation programs, and so forth. You had to install applications to do all that. As users demand that more and more functionality come with the operating system, it's bound to increase its size and resource requirements.

Bill Gates, in a recent speech in Asia, said that the "Internet service revolution" that will lead to machines will lots of low-cost storage and server capacity will allow developers to "write software in even more ambitious ways, eliminating the last constraints we have."

http://www.cnn.com/2008/TECH/biztech/08/12/microsoft.anniversary.ap/inde...

Presumably that means programs will be even bigger (and, we hope, correspondingly better) in the future.

Of course, there's another definition of BloatWare, which refers not to the size of the OS or any individual program, but rather to the amount of extra software that computer vendors install on their systems. When you boot up a brand new computer, you usually find yourself with a bunch of "bonus" software that you neither want nor need - often limited time trial versions of popular programs such as Norton, Quickbooks, Office, photo and music programs and software from national ISPs. You've probably had the frustrating experience of spending hours getting rid of all those unwanted programs that use up hard disk space and may slow down the performance of your computer. Sometimes, even when you feel you have deleted them, they come back six months later and ask you to install, update, or pay for it, not to mention the resources it takes whilst hiding in your system. (That’s why we format drives on new system).

Some hardware vendors are catching on that this does not make their customers happy. In 2007, Dell started offering the option, when you buy online, to check a box that would block the installation of what many in the industry not-so-affectionately call "CrapWare." However, this only applied to certain models of Dell computers. Early this year, Sony came out with their "Fresh Start" program that would let customers buy some models without the TrialWare and "free" software. They caused quite a controversy at first by charging $50 for the privilege, but in March 2008 announced that Fresh Start would be a free option.

http://www.washingtonpost.com/wp-dyn/content/article/2008/03/22/AR2008032201042.html

Blog Tips

Use WordPress. OR Drupal. No other platform is as flexible with all the plug-ins, in my opinion.
  1. If possible, use a custom WordPress theme. I use  Thesis. It is getting to the point where people can recognize cookie-cutter themes. It is OK to use one, but at least modify it so that you have a unique header design.
  2. Post often. I usually try to post every 3 days. Sometimes more often if something just hits me. If you can do one per day then power to ya.
  3. Use catchy blog post titles. Put yourself in the shoes of a person who is casually surfing the Internet, seeing your post along with hundreds of others. Will your blog headline stand out? Copyblogger is an awesome source for information on writing.
  4. Ask open ended questions. One of the best ways to invite commentary on your posts is to ask for it. Ask your readers questions and tell them to answer in the form of a comment.
  5. Use Twitter and LinkedIN. You’ve GOT to be out there. Twitter is my number 1 traffic source.
  6. Use Twitterfeed to pipe your latest posts into Twitter. But, don’t ONLY use Twitterfeed. You’ve got to be a real person on Twitter, first and foremost. Twitter should not replace RSS.
  7. Make your RSS feed obvious, above the fold, and preferably use the orange RSS icon.
  8. Use images in your posts. Images communicate on a different level. Flickr is my best FREE source. The pretty colors and eye catching graphics help define your message.
  9. Structure your blog posts for easy scanning. Use header tags, lists, etc. Avoid long sentences and long paragraphs.I purposely break up sentences to make it easier to read.
  10. Don’t discount Facebook. It is a powerful networking tool and you should take the time to build your network, just as you might on Twitter. Yes, I know I have a certain point of view! I don’t have a Facebook page and still get several referral hits.
  11. Don’t Be a Me-Too Blogger. You don’t want to become a copy-cat news blog, where you type news-style posts about what is happening in a saturated market. If you can’t think of anything to write get a guest post. Look at this one and this one.  No way do I have the ability to write this great stuff.
  12. Learn to think about your blog as a business. The blog is a promotional and delivery mechanism for your commercial real estate business.
  13. Keep your posts short and concise. 400-600 words is a good number.People only have so much time.
  14. When writing your About Page, pay attention to what you write. Don’t just rattle off some dumb, cookie cutter facts. Your About Page should tell a story of who you are and why your blog is worth reading. Mine is simple and to the point.
  15. Link to other, related blog posts regularly in your own posts. Not only your OWN posts, but the posts of others.
  16. Remember, blogging is a SOCIAL business. Be accessible to your readers and proactively get out there and talk with other people in your business.
  17. Embed a video. Make sure it is short video. Video has a great visual impact.
  18. Write an e-book, create some videos. The idea is to create something which is of value to your readers.
  19. Don’t Post Low Feedburner Counts. Do not show your RSS subscriber count unless you have a high enough number (at least a few hundred). A low number acts as social proof that your blog has no readers, and that’s not good.
  20. Put relevant keywords into your blog’s title. Use All-In-One SEO to have more control over the titles across your blog.
  21. While I am in the middle of this…THERE ARE NO RULES! …just guidelines.
  22. Create an RSS widget for your blog on WidgetBox and make it available for your readers to embed on their own blogs if they so choose.
  23. Spend some time creating some killer posts for your blog, then link to them somewhere so that new arrivals can quickly see your best work. I use the Most Popular of All Time List. It is your best stuff which is going to sell them into becoming a subscriber.
  24. Make Sharing Easy. Put options on your blog for your readers to share your posts across social media. Sexybookmarks is a great option for this.
  25. Read other blogs often. When starving for ideas to write about, go to your RSS reader and read related blogs. Often, your own post can be a response to a post on another blog. In fact, this is usually a good idea.
  26. When starting a blog, decide on it’s mission. Your posts should, for the most part, center around a specific theme if you want your blog to really take off. If you run a personal diary kind of blog stay on topic. If you have no specific topic, that’s fine, but realize your blog is going to be more a hobby than a positive addition to your commercial real estate business at that point.
  27. Don’t overload your blog with javascript widgets. These things slow down the load speed of your site.
  28. Use Analytics. I personally use Google Analytics as well as the WordPress.com Stats plug-in on my blog.
  29. Don’t be a PIMP. You know what I mean.
  30. Be yourself.
  31. Don’t write like you’re writing for a grade at school ( works for me!) You want your spelling and grammar to be correct, but be colloquial. Talk to people like you would normally talk to people, not as if you’re writing a PH.D. dissertation.
  32. Link To Your Social Profiles On Your Blog. Link your various social media profiles right on your blog so that your readers can connect with you outside the confines of your blog.
  33. Get Worldwide and Mobil. Use WordPress Translator and WordPress Mobil Pack.
  34. Go where your readers are. Every market is different.  I know most of my readers are pretty adept online and probably hang out in the social media space frequently. Where else are your potential readers?
  35. Equal time reading and writing. You should probably spend just as much time reading and learning as you do writing for your blog. This is how you expand your knowledge, become a better blogger, and get new ideas for your own site. Blogging isn’t all about you.
  36. Be consistent. This should be number 1. The reader will know when you are putting up something new and will give them a chance to make you a reading habit. Don’t make them work and don’t wear them out.

Boost Weak Cell Phone Service

(Yardena Arar @ PCWorld) The problem is familiar to many cell phone users: When you're indoors, even within your carrier's coverage area, the network's signal sometimes simply isn't strong enough to support voice calls or data services. With so many consumers ditching their landlines for cell phones, poor reception at home is no longer acceptable. Fortunately, a slew of products now address the problem, though they don't come cheap.

Signal-boosting products generally fall into one of two categories: femtocells or signal repeaters. Both types of equipment can deliver strong signals within buildings, but they work in fundamentally different ways.

Femtocells act as miniature cell phone towers that connect to a home network router and use your wired broadband connection to move voice calls and data services to and from your carrier's network. Femtocells don't rely on the carrier's towers at all, but because they use technology that can direct data and calls back to the carrier networks over the Internet, most of them are sold by the carriers themselves.

Repeaters and boosters, on the other hand, amplify and rebroadcast cell tower signals. Since they don't require carrier support, they tend to be manufactured and sold by third parties such as Wi-Ex (under the brand name ZBoost) and Wilson Electronics.

Understanding Femtocells

While repeaters have been around for several years, femtocells are relative newcomers to the mobile scene. Of the four major U.S. carriers, two--Sprint and Verizon--have been selling femtocells (under the brand names Airave and Network Extender, respectively) for the past few years; AT&T introduced its 3G MicroCell femtocell last year.

 

AT&T 3G MicroCell.
AT&T's 3G MicroCell, made by Cisco. Image: AT&T

The first Sprint and Verizon Wireless femtocells supported only voice calls, but current models support high-speed data as well as voice. Sprint charges $130 for its Airave access point (with a two-year service plan); there's no additional charge for using Airave to enhance coverage with an existing plan, but Sprint does offer a $25-a-month unlimited calling plan for Airave calls--which might appeal to anyone who is considering dropping landline voice service. Current Airave access points support EvDO Rev. A 3G data speeds and up to six simultaneous calls.

 

Verizon Wireless charges $250 for its Network Extender, which also supports 3G data, and the carrier imposes no monthly service fee. AT&T sells the MicroCell for $150, also with no mandatory service fee; it also offer an optional $20-a-month unlimited calling plan, plus price breaks for customers who sign up for the company's DSL service.

The Beauty of the Femtocell

Femtocells appeal to consumers and carriers on several levels. Consumers like them because they provide immediate five-bar coverage across an area of up to 2500 square feet, regardless of how far you are from a cell phone tower. A strong signal typically means better voice quality, fewer dropped calls, and faster data speeds. Good signals also improve a phone's battery life, since its radios don't have to work as hard.

 

How femtocells work.
Femtocells are low-power wireless access points that operate within a licensed spectrum to connect standard mobile devices to a mobile operator’s network via residential DSL or cable broadband connections. Image: Femto Forum

Another benefit: You can configure the femtocell to recognize and prioritize the phones you authorize, so neighbors can't mooch off your service at your expense. Interestingly, Verizon Wireless's FAQ for its Network Extender says that, though you can prioritize up to 50 Verizon Wireless numbers, the device will remain available to all Verizon Wireless subscribers within range when priority numbers aren't using it.

 

This brings us to a big reason why wireless providers like femtocells: They offload some of the expense that the carriers might otherwise incur in order to expand network capacity and/or coverage. Femtocells also help retain customers in locations where carriers can't significantly improve reception on their own (such as basements, suburbs that don't want new cell towers, locales with difficult topography such as steep hills and valleys, and skyscrapers with thick walls). In fact, forum posts indicate that Sprint has occasionally given customers Airave units to keep them from switching to another carrier.

Brainstorming Doesn’t Really Work–Why What Does

studies have proven that brainstorming doesn’t really work, in terms of producing the largest quantity of feasible ideas, when compared to solo idea generation that is later shared with colleagues. So writes Jonah Lehrer in the article “Groupthink,” which appears in the January 30, 2012 issue of The New Yorker (note: requires a subscription or paid access to read online). He cites historical research conducted at Yale University and the University of California, Berkeley, which come to this conclusion...

Read More - Click Here!

Brilliant Web Page Design

All of the homepage designs shown here utilize a combination of the following elements. Not every page is perfect, but the best homepage designs get many of these right:

  • Clearly answers "Who I am," "What I do," and/or "What can you (the visitor) do here." If you're a well-known brand or company (i.e. Coca Cola) you may be able to get away with not having to describe who you are and what you do; but the reality is, most businesses still need to answer these questions so that each visitor knows they are in the "right place." Steven Krugg sums it up best in his best-selling book, Don't Make Me Think. If visitors can't identify what it is you do within seconds, they won't stick around long.
  • Resonates with the target audience. A homepage needs to be narrowly focused -- speaking to the right people in their language. The best homepages avoid "corporate gobbledygook," and eliminate the fluff.
  • Compelling value-proposition. When a visitor arrives on your homepage, it needs to compel them to stick around. The homepage is the best place to nail your value proposition so that prospects choose to stay on your website and not navigate to your competitors.
  • Usability and mobility. All the homepages listed here are highly usable, meaning they are easy to navigate and there aren't "flashy" objects that get in the way of browsing, such as flash banners, animations, pop-ups, or overly-complicated and unnecessary elements. Many of them are also mobile-optimized, which is an incredibly important must-have in today's mobile world.
  • Calls-to-action (CTAs). Every homepage listed here effectively uses primary and secondary calls-to-action in order to direct visitors to the next logical step. Examples include "Free Trial," "Schedule a Demo," "Buy Now," or "Learn More." Remember, the goal of the homepage is to compel visitors to dig deeper into your website and move them further down the funnel. CTAs tell them what to do next so they don't get overwhelmed or lost. More importantly, CTA's turn your homepage into a sales or lead-generation engine, and not just brochure-wear.
  • Always changing. The best homepages aren't always static. Some of them, like Whitehouse.gov, are constantly changing to reflect the needs, problems, and questions of their visitors. Some homepages also change from A/B testing or dynamic content.
  • Great overall design. A well-designed page is important to building trust, communicating value, and navigating visitors to the next step. As such, these homepages effectively use layout, CTA placement, whitespace, colors, fonts, and other supporting elements.
 

Business Basics 7 Tips

The success of a business does not rely on how big and influential it is, how good the product is, or how well connected and established it is. Forget about all those factors – the success relies on the people that work behind the project. The people who innovate, decide the strategy, market the product and create the business are the ones who are truly putting the business in motion.

Furthermore, business people and entrepreneurs get the knowledge and skills they use in their businesses from what they have learned in business schools, yet there are essential things that are not taught in school that can be key.

1) Being Grounded

It is very hard – almost impossible to teach people to be nice since most of the time, nice people are born/raised that way. For instance, try to observe around you and analyze who you think would qualify as a nice person. Try to see what  they do for others that you don’t do.  Think about the people you hire and want in your business especially when carrying out the business social networking. Would you hire someone who does not use signals when changing lanes? A person who does not hold a door open for you? Becoming nice is not actually taught in business school, it is just how the person handles him or herself without being taught. And believe me, this can make a great difference when closing deals, getting hired, running a successful business etc.

2) Getting Your Personal Finances In Order

“You will never get rich by working for someone else,” this is a common line we hear all the time. The  value of money has been taught to us since we were children, and is something that they don’t teach you in school. In other words, business schools focus on professional skills rather that on the personal finance skills such as learning how to organize personal finances and structuring budgets.

3) Knowing When To Leave

There are times when we want to leave our respective jobs, no matter how long we have stayed there.  But when is it time to REALLY leave?  If you have observed any of the following, consider this as an alarm:

  • You don’t know what else to do
  • The job is not fun anymore
  • You have been passed over the promotion several times
  • You really don’t care anymore
  • You are working with the same boring people at the same boring company/environment

If you have experienced at least 3 of this, then it’s the right time for you to leave ASAP.

4) Finding a Mentor

Every successful person has at least one mentor that has influenced their success.  Many have achieved their dreams and plans looking up to their mentors.

5) Generating Revenue for your Company

This is one thing that business schools do not teach you. “The real purpose of the organization is to generate revenue.” How do you do that? As hard as it may seem, all you need is efficiency when trying to increase your productivity, effectiveness, sensitivity and profitability as a responsible employee/person.

6) Moving at least every two to three years within the Organization

Individuals who have been in their same job description for at least 10-15 years are the ones who have been reduced in force in the last 10 years.  Actually, you can grab  competitive edge in any organization even if it means taking a lateral position or a demotion by moving every two to three years.

7) Learning and Applying Business and Social Etiquette

Today, there are tons of people who lack politeness consideration, and thoughtfulness. This doesn’t just affect the workplace but our society in general. A lot of people tend to forget that, in everything you do, there is always an extra set of eyes watching you.  Senior executives are actually observing behaviors at business meetings and social events, looking at how you treat your peers and employees, how you communicate through writing and speaking, and how you absorb feedback about yourself.  It is important for you to have strong knowledge on business and social etiquette.

Unfortunately, courses in business and social etiquette are not offered in a business school. Nevertheless, these are just a few of the things that are not emphasized in schools that each person must know and apply in order to succeed in their future or even present career.

Moreover, investing in yourself is something you must do to succeed, not only for work but also in life. Self investment is not only limited to educating yourself through seminars and courses, however it also refers to going after opportunities in your current job and venture which will challenge you.

CAT 5 Patch Cable Creation Guide

Before you begin creating your CAT 5 patch cable, it's important to point out that the method outlined here is only one method. It is by no means the only or best method. Also, make sure you have all the necessary tools and materials before you begin. You will need a length of CAT cable, several RJ-45 connectors, and a crimp tool.

  1. Most crimp tools have two blades: one designed to cut completely through a cable and the other designed to strip the cable jacket/insulation. Using the latter blade, strip the cable jacket/insulation back about an inch, so all the wires inside are exposed. Be careful not to cut the inside wires when stripping the cable’s insulation.
     
  2. With the jacket/insulation removed, you'll find eight wires and a string inside the CAT 5 cable. Cut the string off, and untwist the wires back to within one-eighth inch of the jacket.
     
  3. Fan the wires out from left to right in the order they are to be crimped. The crimping order depends on the type of cable you are making. For this guide, we will be wiring the cable to CAT 5 EIA 568B specifications. This is the configuration for a standard CAT 5 patch cable (See Table 1 and Figure A).
     

 

Table 1: How to wire a CAT 5 (EIA 568B) Patch Cable

Connector #1

Connector #2

  1. White/Orange
  1. White/Orange
  1. Orange/White
  1. Orange/White
  1. White/Green
  1. White/Green
  1. Blue/White
  1. Blue/White
  1. White/Blue
  1. White/Blue
  1. Green/White
  1. Green/White
  1. White/Brown
  1. White/Brown
  1. Brown/White
  1. Brown/White

Note: The first color listed in the color pair is the dominant color of the wire. In other words, White/Orange is a white wire with orange stripes.

 

Cable TV Cut Tempting With Aereo Technology

(Broadcast networks make many of their shows available on the Internet, but you usually have to wait at least a day after an episode airs on television. A subscription service called Aereo breaks those shackles and makes network programs available right away.

That sounds too good to be true, and in a sense it is. First, it works only in New York City for now, though Aereo said Tuesday that it will expand to 22 more U.S. cities this spring. Its channel selection is limited to 29 over-the-air channels and Bloomberg TV. It doesn't include the other cable networks I frequently watch.

The biggest caveat is the fact that broadcast networks are suing to shut it down. More on that later.

Aereo is no fly-by-night pirate operation. The startup is backed by big money and a big name — media billionaire Barry Diller. Aereo believes what it is doing is legal. It has created tiny antennas, each the size of a dime. The company stuffs thousands of them into small boxes at its data center in Brooklyn.

When you're ready to watch a show, you are assigned one of those antennas, as if you had your own antenna on your roof. You get a second one, too, if you want to record something to watch later. You can also record both shows for later. Shows you watch live or record for later viewing are streamed over the Internet to a Web browser.

A day pass costs $1 and gives you 10 days to watch up to three hours of recorded shows. You can pay $8 a month for unlimited live viewing and 20 hours of storage, or $12 for 40 hours. Or you can pay $80 for a full year and 40 hours. That annual price is less than what I pay my cable company for TV each and every month. It's a great deal for people who mostly watch broadcast television and not a lot of sports. (Regular-season games are typically on cable channels these days.)

I've been trying out Aereo since September to record and watch all sorts of programs on Aereo — both highbrow shows such as "Downton Abbey" and guilty-pleasure ones such as "Revenge."

Service is now available on Mac and Windows computers, iPhones, iPads, Apple TV and Roku's set-top box. The company says access on Android devices should come this year. You can watch on up to five devices, meaning you can start watching on your desktop at home and continue where you left off on an iPhone while waiting for the bus. Two people can watch different shows at once, but not the same show on different devices.

To get started, simply flip through an interactive program guide, similar to the kind you'd see on TiVo or a digital video recorder from your cable or satellite TV company. You can also search for specific shows or keywords. Typing in "Giants" pulled up shows on the football team and giant animals.

Once you come across a show you're interested in, simply choose "Watch" or "Record." Watching "live" is actually delayed by several seconds because of the time it takes to convert signals into Internet data and send to you, so don't make any impromptu sports bets. If you choose to record a show, you can do it for just that one episode, for new episodes only or for everything including reruns. Keep in mind that "everything" means everything. I managed to record some PBS shows multiple times — filling up my 40-hour allotment — because of repeats overnight.

To watch a recorded show, simply choose it from a list. Like most video players, Aereo lets you jump to any portion of a show, so you can watch just the ending or go back a third of the way in. Depending on whether you watch in a small window or the full screen, you can replay the past 10 or 30 seconds or jump 30 seconds ahead — perfect to skip over one commercial.

Aereo isn't an on-demand service. So if you hadn't recorded a show, you can't go back to watch it. That's where Hulu comes in. It typically offers the past five episodes of shows from NBC, ABC, Fox and the CW. Where Aereo is particularly useful is in filling the gaps — CBS and PBS, plus local programs such as the news.

Aereo also lets you start watching even before a show ends, just like a regular DVR. Most shows on Hulu aren't available until the next day, and those on Fox take more than a week unless you pay for a subscription. You get the same commercials that are shown over the air, and you can skip them. Hulu has different ads, which you can't skip. Shows are available on Aereo until you delete them or run out of space, while Hulu drops the oldest episodes as new ones appear.

As I mentioned earlier, Aereo is available only in New York City, not even the suburbs, until this spring's expansion. That restriction extends to watching shows while traveling, even if you're a legitimate New York subscriber. Aereo performs a check of your location when you log on, using your numeric Internet Protocol address and other tools. Mistakes happen — the service thinks my office is outside New York because my employer's network is based elsewhere. But it's easy to bypass that and use the service anyway, after reading a warning that use outside New York City is a terms of service violation.

There are a few other limitations:

— The program guide looks forward two weeks or less, so you can't record shows beyond that, even if you know their names. I missed several shows during the fall television season because they started later than others and hadn't appeared yet when I got around to setting up the recordings. With TiVo, I can simply type in a keyword, and shows will automatically record, even a year later.

— Aereo won't let me remove specific episodes from the list of future shows to record. I'd have to drop the entire series, or quickly delete them after recording to avoid running out of space.

— A handful of shows didn't record because of unspecified recording errors. A few "90210" episodes got mysteriously chopped off. I've encountered fewer glitches since I started using Aereo, but keep in mind it's still infant.

— The interface is intuitive when it works, but early on, I had to refresh the browser often because the website would freeze. I've also managed to hit the wrong part of the screen too many times. On Election Night, I was inadvertently watching news broadcasts on a half-hour delay and learned of President Barack Obama's victory on Facebook because key states were still too close to call on my delayed broadcast.

— Video quality depends partly on the Internet connection. Video can look good on a large, high-definition TV set, but at times, it stutters on my small laptop, particularly over a wireless network. I don't get the same stuttering with Hulu. During Superstorm Sandy, service went down completely for about four hours because of problems with one of Aereo's Internet providers.

I could see Aereo being useful for live broadcasts you can't get on Hulu, but during the storm, I had to go back to cable for around-the-clock news. There were pockets of cable outages in the region, but no service-wide disruption.

Aereo isn't ready yet to replace your cable TV service if you need reliability. I've noticed the service get better over the few months I've used it, but there are still kinks to work out. But it's a good option if you care more about saving money.

It's a good supplement to Hulu for its access to CBS, PBS and live shows and quicker availability of shows from ABC, Fox, NBC and the CW. But the restriction on watching shows outside your home area limits its usefulness. I had to turn to Hulu on a laptop to catch up on shows during my various travels.

One unknown is how long Aereo will last.

Copyright-infringement lawsuits filed by the major networks and others accuse Aereo of unlawfully copying and retransmitting their programming over the Internet. Aereo insists what it's doing is legal because customers are assigned individual antennas. Therefore, the company says, it's similar to what viewers would get for free by installing the same equipment at home. By contrast, cable TV companies use a single antenna or direct feed from a broadcaster to pick up a station for thousands of subscribers.

In July, a federal judge in New York refused to give broadcasters a preliminary injunction to stop the service, though the ruling has been appealed.

So if you can live with service hiccups, enjoy Aereo while you can. It makes cutting cable service tempting. But don't tell off the cable guy quite yet. You might have to come crawling back if broadcasters win their lawsuit.

___

Anick Jesdanun, deputy technology editor for The Associated Press, can be reached at njesdanun(at)ap.org.

___

About Aereo:

Aereo offers over-the-air channels and Bloomberg TV over the Internet for $1 a day, $8 or $12 a month or $80 a year. There's also a try-for-free option, limited to a single hour per day.

Aereo lets you watch shows live or record them on an Internet-based digital video recorder for steaming later. It works on most computers and devices, with Android phones and tablet computers the main exception (Android support is expected this year).

Service is now limited to New York City, though it will expand to the suburbs and 22 other U.S. markets this spring. They are Atlanta, Austin, Baltimore, Birmingham, Ala., Boston, Chicago, Cleveland, Dallas, Denver, Detroit, Houston, Kansas City, Madison, Wis., Miami, Minneapolis, Philadelphia, Pittsburgh, Providence, R.I., Raleigh-Durham, N.C., Salt Lake City, Tampa, Fla., and Washington. Service will extend to those cities' suburbs, based on market regions used by the Federal Communications Commission and Nielsen Media Research.

Can You Network Windows 8 and Windows 7

 Microsoft wanted to shake up the computer world with Windows 8 (to generate income for itself), and it's done a good job. I've received countless questions about this new operating system. Keep in mind that Windows 8 upgrades won't be as expensive as you might expect. For the first couple of months after Windows 8's release, it will be only $40 to upgrade instead of the normal $200 or so. So, if you're planning on upgrading, it's not a bad idea to upgrade all of your computers. However, I expect that this won't be the case for many people. Why upgrade when what you have works just fine.However, if you're planning on using only one Windows 8 computer, you want to know if it will work with other Windows computers.

Microsoft has said that computers running Windows 8 will network with computers running older versions of Windows.

Software compatibility, though, is a little trickier. Any computer running Windows 8 should work with your current software. However, there is a mobile version of Windows 8 called Windows RT that won't work with current software. You might want to look at Microsoft's Windows 8 compatibility checker. It has Microsoft's official compatibility report on hundreds of programs. There are reviews from users on how well the program works, too. Be sure to you know if your programs and computer is 64-bit or 32-bit.

One final thing to keep in mind is that Windows 8 is beginning the transition from programs to apps on computers. While Windows 8 can run older programs, Windows 7 and Vista won't run new Windows 8 apps.

Just keep in mind that buying a new computer OR upgrading to Windows 8 will be like starting from scratch.

Can You Trust Online Reviews

The Federal Trade Commision (FTC), which has taken a few companies to task for rewarding consumers for hyping their products, says the practice of paying a consumer to write a positive review isn't illegal, but not disclosing it is.

Last March a company selling a popular series of guitar-lesson DVDs agreed to pay $250,000 to settle FTC charges that it deceptively advertised its products through online affiliate marketers who falsely posed as ordinary consumers or independent reviewers.

The FTC said the complaint against Nashville, Tennessee-based Legacy Learning Systems Inc. and its owner, Lester Gabriel Smith, is part of an effort to make sure that advertising to American consumers is truthful and not deceptive, whether the advertisements appear in traditional or newer forms of media

Read More - Click Here!

Can't Find You New USB Drive? What To Do....

This sometimes happens if Windows names the drive letter to something that was already in use by another device. See if you can locate the drive and change its drive letter, and this is how we do it:

  1. Right click My Computer and select Manage.
  2. In the right pane of the Computer Management console, go down to Storage and expand it if necessary, then click Disk Management.
  3. It may take a few minutes to populate the right pane. When the disk information appears, your USB drive should show up in this list.
  4. To change the drive letter, right click the drive in the list and select Change Drive Letters and Paths...
  5. The currently assigned letter will be displayed in the dialog box. Click the Change button.
  6. From the drop down list, pick a drive letter that is not being used by any other device and click OK. You'll get a Confirm dialog box; click Yes.

Can't See The Computer Screen? Help Is On The Way

'Some of us as we grow older suffer from limited vision. Some folks suffer from glaucoma and/or the beginnings of macular degeneration. Where can we find information to \"tuneup\" our computers to improve visibility?

Things like screen contrasts, Cursor color, size, and shape, and software that is very simple and easy to see the commands. But many are repeatedly frustrated by screen changes in Google (cannot find the buttons) and popups that are not easily removed (cannot find the buttons). What To Do???

Microsoft XP and Vista includes a number of \"accessibility options\" that allows you adjust the scrollbar and window border size, icons, size and color of the cursor and contrast. There is an Accessibility Wizard that can guide you through the steps. Just go to Start > All Programs > Accessories > Accessibility and click Accessibility Wizard. You can find out more about how to use the wizard here:
http://www.microsoft.com/windowsxp/using/accessibility/default.mspx

If you need more assistance, there are many third party programs designed to assist those with limited vision. These include screen enlargers, screen readers and more. The Assistive Technology Catalog helps you search for those products:
http://www.microsoft.com/enable/at/default.aspx

Finally, here's a tutorial for how to make Vista and XP computers easier to see:
http://www.microsoft.com/enable/guides/vision.aspx#step1

Google It: There Is More to Google than Meets the Eye

"Just Google It!! How many times have we heard or said that in our lives. The name "Google" has become part of our lexicon, joining the ranks of "I need a Kleenex", "hand me a cresant wrench",  and "xerox this for me." However, unlike Kleenex, Cresant and Xerox, whose products essentially have just one function, Google does a lot more than just search, including dozens of free apps (online software) that can make your life online easier.

Google Reader

Who has time to visit 30 Web sites? Keeping up-to-date is a full-time job in itself, and knowing what the market is talking about in regards to your product, business or company is critical for success. An RSS reader allows you to keep up on things without having to go to dozens of different Web sites to see if they have new content. RSS, or Really Simple Syndication, lets Web sites deliver their content to a RSS Reader, so you can read the content from multiple sites in one place. Google Reader is small, easy to use and most importantly, fast.  Plus, not only does it let you keep track of all of your favorite Web sites from any computer, it offers the ability to save feeds for later reading or sending to others.  Check it out at google.com/reader.

Google Docs

Just about everyone has some sort of office-type application installed on their work computer. For most of us, it's likely Microsoft office.  Office is a great suite, but it has two critical limitations. It's only on your computer and it costs at best a few hundred dollars to purchase.  

Google has an office suite known as Google Docs, which is completely free and available anywhere there's an internet connection. That means you'll be able to view and edit any of your word processing documents, spreadsheets or presentations online at anytime. Now, I hear you asking "why would I want my documents to be online? How many times have you had to pass the same file back and forth with someone while you were working on it?  We've all done that, but using Google Docs, you can just upload your documents, decide who to share them with and work together on the document. When it's done, you can print or email it as you would with any other office suite. Google Docs can be a real time saver, especially when you factor in all the wasted time waiting for the constant back and forth of document collaboration. Have a look at google.com/docs.

Google News and Google Alerts

Knowing what's being said about your product or business is critical. You never know when a happy customer talking about your Web site or product can be a great piece of PR — or when someone with a less than favorable experience with your service might be a nightmare. However, if someone wrote something about your business in their blog, you may never know about it; the Web is just too big anymore. Large companies have entire departments dedicated to surfing the Web all day looking for mentions of their company. Unfortunately, the rest of us don’t have that kind of luxury. Good thing for us that there is Google News and Google Alerts.

Setting up "search terms" for your business name or products in Google Alerts and Google News will result in weekly, daily, or even more frequent (if you choose) emails about every single place on the Web your search terms appear. If someone blogs about your product on the other side of the world or a newspaper article in the next town over mentions your Web site, you’ll know about it. Have a look yourself at google.com/news and google.com/alerts.

With so much available on the Internet, sometimes it's easy to get into the "ne trick pony" mindset when it comes to what Web sites offer. Dig a little deeper; you never know what you'll find beneath the surface.

Cash, Certified Check, or Money Order - What's The Difference?

Last week, because of “Circumstances”, we asked a customer to pay an invoice with either “Cash” or “Certified Check”. What showed up in the mail box was a “Money Order”. Money Order, well that might be Kool, let’s take it to the bank. Bank said, “ya, we’ll take this money order win an 11 day hold. What??? Why??? Isn’t a Money Order just like Cash or Certified Check???

The bank suggested taking it to WalMart saying “They cash anything”! But guess what, not this Money Order! WalMart said “take it to your Bank”. When I explained that I had already been to the bank, they said “Take it to Publix (a grocery store). And Publix said take it to WalMart.

So I took it back to the folks that orgionally issued the money order. Surely, they should take it.  Mind you, I would not ordinarrily take this kind of time to run to all of these places to cash a check, but my curiosity got the best of me and I just had to let it play. The place that issued the Money Order was a Gas Station / Convenience Store across from my customer’s office. I simply marched up to the counter and asked if they had issued the Money Order. They looked it up and said “Yes, It’s one of ours”. I thought, Finally, I’ll get this thing cashed. No so, “We only issue Money Orders, you’ll have to take it to the Post Office to get it cashed.” When I arrived at the Post Office, well, you guessed it, they wouldn’t take it either. They only take US Postal Service Money Orders.

I felt like I had run this trap line to the end; much further than I should have. So I went back to my customer, told them my experience, and gave them back the Money Order. The went back to the Gas Station where they got it and asked for their money back, and paid me in Cash, but not before telling me that the Gas Station said “their Money Orders are taken everywhere, same as Cash”, and that they don’t understand why I am giving “Them” so much hassle.  Sounds like they didn’t believe me or something.

I did this as a learning experience. Sometimes you have to do more than “know technically” what you are doing and why. Sometime you have to “feel the pain” to really understand. Man, I was feeling it!

So this is what I learned:

Cash is always best. It’s yours, no doubts, and everybody in the 50 states (and most of the world) will take it.

Certified Check: A certified check is a form of check for where the bank verifies that sufficient funds exist in the account to cover the check, and so certifies, at the time the check is written. Those funds are then set aside in the bank's internal account until the check is cashed or returned by the payee. Thus, a certified check cannot "bounce", and, in this manner, it the same as cash in liquidity (unless the bank fails).

Money Order: A money order is purchased for the amount desired. In this way it is “similar to a certified check”. Similar, but with “important differences”. Money orders were originally issued by the U.S. Postal Service as an alternative to sending cash through the mail for those who did not have checking accounts. Today, they are offered by many more vendors than just the US Postal Service as a means to pay bills and send money internationally where there were not reliable banking or postal systems.

However, just because a particular business can issue a money order does not necessarily mean that they will cash them. Due to the increased public awareness of fraudulent Money Orders, counterfeiters are using these to dupe their victims. By obtaining their "mark's" postal zip code, they will draft bogus money orders based on whichever franchises will most likely be in their victim's home area as the familiarity of the store's name offers a sense of security.
 
Furthermore, money orders are subject to erasing the name and writing in somebody else's name. Money order fraud is specifically not reimbursed by Western Union, and Convenience Store Vendors,  and the victim is required to go through local police to attempt to recover lost funds. In response, the perpetrator who cashed the money order can simply claim "identity theft" to the investigating officer. Money orders for this purpose can be obtained from places like rent drop boxes and convenience stores.

Acceptance of money orders depends on the issuing vendor. US Postal Service, no question, my bank will take it. Western Union, American Express, perhaps a two day hold. But money orders issued by a small-town bank in Georgia or Sheboygan Wisconsin, for example, my bank “will take it with an 11 day hold”.

So for me it’s Cash, Certified Check, and no money orders please!

Cell Phone VS Satellite Phone Service

The way cellular phones work they use zones or small base stations called “cells”. As you move from one area or “cell” your call is “handed off” from the old to the new cell. The switch to the new cell is accomplished by the sending of a special signal to the mobile unit. The Mobile Telephone Switching Office or MTSO connects the cellular calls with the Public Switched Telephone Network or (PSTN). The MTSO also controls all the cell sites. All the cell phones are registered with the control channel so the system knows where to find the cellular phone.

Imagine in a perfect world the cells or zones looked like a large honey bee cone that covered the planet. But this is not possible. It is not cost effective for the cellular providers to put up cell towers in rural areas or many third world countries where there would be low usage. So this makes vast areas of the U.S. and other countries where a cellular phone does not have coverage because if you are not close to a cell tower your cell phone will not work. There is also the issue where your friend's cell phone may work in an area or “cell” and yours does not. That is because their phone is most likely using another cellular provider the uses a tower with a difference technology other than the technology compatible with your phone. Also it would be impossible to place towers out in the ocean far from land, again making your celullarl phone worthless when not close to a cell tower.

 
Satellite Phones do not use “cells” or cell towers. The most popular hand held satellite telephones use Low Earth Orbiting or LEO satellites. When you turn on your satellite phone the signal goes up to any number of satellites in a compatible constellation where it is then registered with the constellation. Globalstar has 48 satellites and Iridium has 66 that orbit the earth. When making a call the satellite signal goes to the satellites this it is directed down to a ground station or gateway where it is directed by the gateway the to the call destination. The call can be directed to a land-line or PSTN as well as a cellular network. The reverse is also true. Any land-line or cellular network can call satellite phones. The Gateway processes and takes care of the switching of the calls rather than the satellite network. This allows you to use your phone even when you are in the middle or no where far from any cell tower. If you call another compatible satellite phone the call is transmitted up to the satellites and then down to the ground station then transmitted back up to the satellites then down to receiving satellite phone. This is the ultimate secure calling because the encryption is handled at the ground station because the call never goes to a land-line or PSTN. For more information on how this works go to this link http://www.globalcomsatphone.com/about.html     

Change Windows XP Product Key

Time Required: It should take less than 15 minutes to change the Windows XP key

This is how we do it:

  1. Click on Start and then Run.

  2. In the text box in the Run window, type regedit and click OK. This will open the Registry Editor program.

  3. Locate the HKEY_LOCAL_MACHINE folder under My Computer and click on the (+) sign next the folder name to expand the folder.

  4. Continue to expand folders until you reach the HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\Current Version\WPAEvents registry key.

  5. Click on the WPAEvents folder.

  6. In the results that appear in the window on the right, locate OOBETimer.

  7. Right-click on the OOBETimer entry and choose Modify from the resulting menu.

  8. Change at least one digit in the Value data text box and click OK. This will deactivate Windows XP.

    Feel free to close Registry Editor at this point.

  9. Click on Start and then Run.

  10. In the text box in the Run window, type the following command and click OK.

    %systemroot%\system32\oobe\msoobe.exe /a

  11. When the Let's activate Windows window appears, choose Yes, I want to telephone a customer service representative to activate Windows and then click Next.

  12. Click the Change Product Key button at the bottom of the window.

    Don't worry about filling anything out on this screen.

  13. Type your new, valid Windows XP product key in the New key: text boxes and then click the Update button.

  14. You should now reactivate Windows XP by following the instructions on the Activate Windows by phone window which you should now be seeing or via the Internet by clicking the Back button and following the instructions on that screen.

    If you'd rather postpone activating Windows XP until a later date, you can click the Remind me later button.

  15. After activating Windows XP, you can verify that activation was successful by repeating steps 9 and 10 above.

    The Windows Product Activation window that appears should say "Windows is already activated. Click OK to exit."

Charleston Real Estate Benchmark - Show Us Yours and We'll Show Ours

Let's Benchmark - Real Estate - In March 2012 we took on a small Charleston SC Real Estate client that previously averaged about 400 visits per month.

We immediately created a local viral SEO event that netted good results for April. 2,798 visits - 13,9097 hits. (without AdWords)

However, that same month our client contracted with YoXXX. In May the YoXXX landing pages with YoXXX-owned phone numbers and email addresses siphoned off all of the viral campaign gains. When the YoXXX campaign was canceled at the end of the month, their landing pages remained for several month leaving our client with numerous landing pages to nowhere. Phone numbers to nowhere! email addresses to nowhere!

Even so, the clients webpage received steady growth each month.

In February 2013 our client received 10,686 visits and 128,581 hits directly to their webpage..

Are you getting this kind of internet activity directly to your website? The Numbers in Yellow and Blue are important.

 

 

Choose Carefully Chromebook VS iPad

( @ TechRepublic) Andy Wolber looks at how each of these devices offers connectivity, applications, and access to data that may transform how you work.

In 2003, the New York Times reported that laptops outsold desktops for the first time. In Q4 2012, NPD forecasts that tablets will outsell laptops for the first time. People are rapidly adopting devices that are lighter, simpler and less expensive than standard corporate laptops.

The Chromebook and iPad represent very distinct approaches to the post-PC device world. The iPad relies on installed apps and a touchscreen. The Chromebook gives us a web browser contained in a traditional laptop form. The iPad 4 and Samsung Chromebook 550 represent the "best available" models, respectively.

Here's a brief look at how each of these devices offers connectivity, applications, and access to data that may transform how you work.

Spec Summary & Comparison

The Samsung Chromebook 550 and iPad 4 both deliver simpler computing experiences then many conventional corporate laptops:

  • Boot times measured in seconds
  • Battery life of 10 hours (iPad) or 6 hours (Chromebook)
  • Weight of 1.5lbs. (iPad) or 3lbs. (Chromebook)
  • Limited access to the file system
  • Streamlined updates of the operating system, apps or extensions
  • Built-in cameras, microphones and speakers for video conferencing
  • Ubiquitous connectivity, thanks to WiFi or WiFi plus cellular data connections.

Some of the newest iPads connect to fast LTE networks; the newest Chromebooks with cellular devices max out with 3G connections.

 

Samsung Chromebook 550

 

Both systems encourage user focus, although in different ways. iPad applications inherently fill the screen, encouraging mono-tasking. Chromebooks essentially run a single application - a web browser - complemented by user-added extensions and web apps.

The Chromebook and iPad are distinctly different pieces of hardware. The iPad uses touch, the Chromebook, a conventional trackpad and keyboard. The iPad display changes orientation as the user rotates the device; the Chromebook doesn't. iPad versions with cellular connectivity include GPS; the Chromebook doesn't. The iPad has a back-facing camera for shooting photos or video; the Chromebook doesn't.

Enterprise management features differ, as well. The iPad supports Mobile Device Management of iPads with third party software. Google's own Google Apps' control panel provides controls for management of Chrome OS devices.

Both product lines include multiple models. The Chromebook line now includes devices with 11" screens and slower performance (the $249 Samsung Chromebook), as well as a less-expensive device with a conventional hard drive (the $199 Acer C7 Chromebook). The iPad mini (starting at $329) is considerably smaller and lighter than the iPad, but lacks the "retina display" of the larger iPad.

 

Apple iPad

 

Four decisions

1. Internet: Do you need cellular connectivity?

Devices with built-in 3G or 4G connections enable the truly mobile workforce. Give the same workforce WiFi-only devices and you significantly restrict the number of locations from which work can be done.

The hardware cost pales in comparison to the cost of Internet access. Over a two-year period, $10 per month on a shared data plan adds up to $240. A more typical $20 per month accrues to $480. And many plans cost more.

The Chromebook and iPad may change the cost calculation overall for enterprises accustomed to spending $1,500 to $2,000 for traditional WiFi-only laptops. A few hundred dollars for a device, plus several hundred dollars over two years for mobile data becomes an attractive expenditure.

2. Data: How do you access, create and store data?

Input devices matter. Nearly any device handles email and basic document editing. But typing on a physical keyboard may be the fastest way to enter large quantities of data. And drawing a quick sketch with your finger might convey your point clearly. Personal preferences and habits play a significant role when choosing input devices.

Internet-connected iPads or Chromebooks make it possible to redesign data flows. There's no need to write up a paper work order. Instead, take a picture, type text directly into an app or web-form. Hit send. The data is captured and accessible for the next step in the workflow.

3. Applications: What apps do you need?

Legacy application requirements may represent one of the biggest barriers to adoption of "Post-PC" devices. Microsoft Office, notably, is not available for either device. Office Web Apps work in a browser and may be sufficient for some users. QuickOffice Pro HD or Documents to Go enable editing of Microsoft Office documents locally on the iPad.

In other cases, virtualized solutions work. Nivio provides virtualized desktops and software - solutions previously only feasible for large corporate IT teams. Citrix Receiver for iPad enables enterprise desktop access, while GoToMyPC and LogMeIn provide remote desktop services.

In the long term, choose solutions that work both in a browser and as installed apps. Google Drive is moving toward this rapidly: Google Drive works fully in the Chromebook browser, while the Google Drive app on iOS lets you create and edit Docs and Sheets. Evernote is similarly useful, working in both a browser and via locally-installed apps on many platforms.

4. Device: What task do you need to accomplish?

Choose devices best suited for the tasks you need to accomplish. Note the use of the plural: devices. In a browser-and-app world, you should be able to seamlessly switch devices. The device matters only to provide access to data and an application. The data lives in the cloud; the application is either a browser or installed app.

Choose a Chromebook when you want a keyboard and a 12" screen. Choose an iPad to maximize mobility. Above all, choose information ecosystems that move data off inherently insecure and fragile devices and into secured, managed cloud systems. "Post-PC" devices matter. But the whole system - Internet, data, applications and devices - matters much more.

Chromebook mysterious turn into bricks

Photo(Jim Hood @ ConsumerAffairs) Beautiful but faithless (the laptop not the dog) The Google Chromebook has been making friends and influencing people but a recent problem has rendered many of the machines temporarily unusable, sending their owners into orbit.

"I'm going to miss this Pixel after I send it back," fumed Business Insider columnist Julie Bort yesterday. Her $1,500 Chrombook Pixel had displayed the same weird sign-on problem as mine and an unknown number of others have done over the past few weeks.

The issue, which seems to be a so-far unidentified bug, occurs when a Chromebook user tries to sign on in an area where there is no wi-fi. Normally, the machines -- which operate totally in the cloud -- use your Google ID to sign on. No wi-fi, no Google sign-on.

When things are working properly, you are still able to log onto the machine and work with any files you may have saved locally. But users who have encountered this bug have been completely out of luck.

4G backup is no help

Pixel owners -- who paid $1,500 for their machines, about the same as a MacBook Pro -- also have Verizon 4G built into the laptops, for use when there is no wi-fi network.

But guess what. In my case, I tried to boot up while on a Southwest Airlines flight last week. For whatever reason, the wi-fi wasn't working on that flight. No problem, I thought. When we get to Chicago, where I had a two-hour connection layover, I expected to log in there and get caught up.

Instead, once at Midway, I was unable to get onto the machine at all, using either wi-fi or Verizon. Two hours of frustration. I turned on wi-fi sharing on my Verizon droid but the Pixel stubbornly refused to see it. Since I couldn't log on, I couldn't choose a new network. Catch-22.

Finally, we clambered on board the next leg of the flight and I watched, seething, as other passengers logged in and went to work, while I persued the useless products advertised in a dog-eared copy of Sky Mall.

It wasn't until I got to my destination and walked into the office where there was a wi-fi signal that my Chromebook had memorized on an earlier trip that I was once again in touch with the world. (You wondered why your copy of the Daily Consumer was late last week? Now you know.)

Other owners grouse

After catching up on my work, I went online and found others complaining of the same problem on the Chromebook online forum, which is Google's notion of customer service.

"It is quite frustrating. I write and often have deadlines to meet and time-sensitive data to share. I recently found myself stuck at a truck stop and was thus forced to pay to get online in order to access my chromebook," said a user called MBP.

You think you can call or email Chromebook tech support? Hah. Just try it. Instead you have to go into the Chromebook Central forum and wade through endless discussions ranging from profound to moronic. There are moderators of some sort and one claimed that the issue had been fixed:

"The bug that I have been following has been marked Fixed as of Oct 14:  Issue # 295245,  Offline signin sometimes doesn't work (user OAuth token state is reported as invalid)," said Lynn McCarthy on Oct. 29, the same day my problem occurred, which indicated to me that indeed it had not been fixed. 

Unable to get any help from other users who were as frustrated as I was, I called Verizon Wireless, where a very helpful fellow said he had heard similar complaints from other Pixel users. He suggested -- but stressed that he did not know for certain since he was not a Google rep -- that it's best to sign in as "guest" and disable either wi-fi or 4G before proceeding. He suggested always keeping one or the other disabled. 

Whether this is dead-on accurate or not, it has worked so far. I now routinely keep 4G turned off unless I know I will need it. I then turn off wi-fi. So far the problem has not recurred but who knows when it will pop up again?

Two things are more than a little annoying about this solution --

1. One big reason I got the Pixel was that I liked the idea of having a 4G alternative that would kick in automatically when there was no wi-fi. I quickly burned through the "free" amount of bandwidth provided with the Pixel purchase and now shell out $20 a month to Verizon for access.

2. Anyone who charges $1,500 for a laptop should at least answer emails, if not provide telephone support. Google seems to think it is above such mundane concerns as it floats above us in the cloud but if it wants to make a splash in the hardware business with Google Glass, Motorola Smartphones and its various tablets, laptops and so forth, it is going to eventually have to recognize that it owes its consumers a little more than an online forum populated by other irritated customers.

Does Google really think Verizon will routinely bail out Google's hardware customers?

Other issues

This fiasco is not the only Pixel eccentricity that has raised my blood pressure lately. If we assume that most people who spend $1,500 on a laptop are using it for work and not just to watch movies and do dumb things on Facebook, a few other things need to be attended to:

1. Images. My work involves capturing and editing images. This is easily done with Photoshop, GIMP and iPhoto but, of course, the Chromebook won't run any of these. Instead, there are a few anemic apps like SumoPaint and Pixr, which are totally inadequate for anything even remotely resembling professional use.

PhotoDecent little program. Too bad the ads take up so much workspace.

2. Multiple accounts. Anyone who has more than one Google account -- and who doesn't? -- will be endlessly frustrated with the Chromebook. On any other machine, you can be jhood in Chrome, jim.hood in Firefox and johndoe in Explorer or Opera. With the Chromebook, you're stuck with Chrome, which can involve endless rounds of logging in and out of various user accounts. Yeah sure, you can have multiple accounts open but not all Google applications support multiple accounts. 

3. Printing. The Chromebook will not talk directly to a printer. You must use something called Google CloudPrint, which works only with certain printers of very recent vintage. Yes, I know you can save your boarding pass as a PDF file, email or share it with someone whose machine is connected to a printer, etc., etc., but even the dumbest Windows machine will pretty quickly establish a relationship with nearly any printer you plug into it. I understand why the Chromebook doesn't do that (no drivers) but, quite honestly, it's not my problem -- it's Google's.

That's because the Chromebook Pixel and I are done. Kaput. I need a machine that will go with me on my travels and work when I need it to. For now, that means I'll be heading back to my Asus laptop running Linux Mint but will be making a stop at the nearest Apple store as soon as it's convenient.

Cloud Cost Compare Amazon VS Self Host by Charlie Oppenheimer Gigaon

Amazon Web Services (AWS), as the trailblazing provider of Infrastructure as a Service (IaaS), has changed the dialog about computing infrastructure. Today, instead of simply assuming that you’ll be buying and operating your own servers, storage and networking, AWS is always an option to consider, and for many new businesses, it’s simply the default choice.

I’m a huge fan of cloud computing in general and AWS in particular. But I’ve long had an instinct that the economics of the choice between self-hosted and cloud provider had more texture to it than the patently attractive sounding “10 cents an hour,” particularly as a function of demand distribution. As a case in point, Zynga has made it known that for economic reasons, they now use their own infrastructure for baseline loads and use Amazon for peaks and variable loads surrounding new game introductions.

An analysis of the load profiles

To tease out a more nuanced view of the economics, I’ve built a detailed Excel model that analyzes the relative costs and sensitivities of AWS versus self-hosted in the context of different load profiles. By “load profiles,” I mean the distribution of demand over the day/month as well as relative needs for bandwidth versus compute resources. The load profile is the key factor influencing the economic choice because it determines what resources are required and how heavily these resources are utilized.

The model provides a simple way to analyze various load profiles and allows one to skew the load between bandwidth-heavy, compute-heavy or any combination. In addition, the model presents the cost of operating 100 percent on AWS, 100 percent self-hosted as well as all hybrid mixes in between.

In a subsequent post, I will share the model and describe how you can use it for scenarios of interest to you. But for this post, I will outline some of the conclusions that I’ve derived from looking at many different scenarios. In most cases, the analysis illustrates why intuition is right (for example, that a highly variable compute load is a slam dunk for AWS). In other cases, certain high-sensitivity factors become evident and drive the economic answer. There are also cases where a hybrid infrastructure is at least worthy of consideration.

To frame an example analysis, here is the daily distribution of a typical Internet application. In the model, traffic distribution is an input from which bandwidth requirements are computed. The distribution over the day reflects the behavior of the user base (in this case, one with a high U.S. business-hour activity peak). Computing load is assumed to follow traffic according to a linear relationship, i.e. higher traffic implies higher compute load.

Note that while labor costs are included in the model, I am leaving them out of this example for simplicity. Because labor is a mostly fixed cost for each alternative, it will tend not to impact the relative comparison of the two alternatives. Rather, it will impact where the actual break-even point lies. If you use the model to examine your own situation, then of course I would recommend including the labor costs on each side.

For this example, to compute costs for Amazon, I have assumed Standard Extra Large instances and ELB load balancer for the Northern California region. The model computes the number of instances required for each hour of the day. Whenever the economics dictate it, the model applies as many AWS Reserved Instances (capacity contracts with lower variable costs) as justified and fills in with on-demand instances as required. Charges for data are computed according to the progressive pricing schedule that Amazon publishes. To compute costs for self-hosting, I assume co-location with the peak number of Std-XL-equivalent servers required, each loaded to no more than 80 percent of capacity. The costs of hardware are amortized over 36 months. Power is assumed to be included with rackspace fees. Bandwidth is assumed to be obtained on a 95th percentile price basis.

Now let’s look at a sensitivity analysis. Notice in the above example, that a bit more than half of the total cost for each alternative is for bandwidth/data transfer charges ($35,144 for self-hosted at $8/Mbps and $36,900 for AWS). This is important because while Amazon pricing is fixed and published, 95th percentile pricing is highly variable and competitive

The chart above shows total costs as a function of co-location bandwidth pricing. AWS costs are independent of this and thus flat. What this chart shows is that self-hosting costs less for any bandwidth pricing under about $9.50 per Mbps/Month. And if you can negotiate a price as low as $4, you’d be saving more than 40 percent to self-host. I’ll leave discussion of the hybrid to another post.

This should provide a bit of a feel for how I’ve been conducting these analyses. Above is a visual summary of how different scenarios tend to shake out. The intuitive conclusion that the more spiky the load, the better the economics of the AWS on-demand solution is confirmed. And similarly, the flatter or less variable the load distribution, the more self-hosting appears to make sense. And if you’ve got a situation that uses a lot of bandwidth, you need to look more closely at potential self-hosted savings that could be feasible with negotiated bandwidth reductions.

Colorbox Beginner's Guide

A tutorial for first-time jQuery users.


Users familiar with jQuery will be better served viewing source on the demo page and using that as a guide.

Colorbox is a jQuery plugin, meaning that it extends the jQuery JavaScript library to include extra functionality. In your HTML document, you must include the jQuery library's source before you include the source of any jQuery plugin. Colorbox has the additional requirement that you include its stylesheet in the <head> of your document before you include the source of the plugin.

Here is an example HTML5 document with the required files:

<!doctype html>
<html>
    <head>
        <link rel="stylesheet" href="colorbox.css" />
        <script src="jquery.min.js"></script>
        <script src="jquery.colorbox-min.js"></script>
    </head>
    <body>
        <a class='gallery' href='image1.jpg'>Photo_1</a>
        <a class='gallery' href='image2.jpg'>Photo_2</a>
        <a class='gallery' href='image3.jpg'>Photo_3</a>
    </body>
</html>

Let's use Colorbox to display the links that have a class of 'gallery'. We will use jQuery to query the DOM to find the matching links, then apply the colorbox method to them:

<script>
    jQuery('a.gallery').colorbox();
</script>

Here, the jQuery() function takes in the a.gallery CSS selector and queries the DOM for matching elements. It returns a collection of elements, which we then apply colorbox to by calling jQuery's .colorbox() method.

A browser parses your HTML document from top to bottom. When a browser encounters a <script> block, it will stop parsing your HTML document and execute the script. The browser will resume parsing your document once the script has executed. This means if you use a <script> in the <head> of your document to assign Colorbox to links in your document, the script will be executed before the markup of those links have been parsed and added to the DOM. Those links must be in the DOM before colorbox can be assigned to them. Inserting the <script> after the markup for the links insures that the links will be in the DOM when we query for them:

<!doctype html>
<html>
    <head>
        <link rel="stylesheet" href="colorbox.css" />
        <script src="jquery.min.js"></script>
        <script src="jquery.colorbox-min.js"></script>
    </head>
    <body>
        <a class='gallery' href='image1.jpg'>Photo_1</a>
        <a class='gallery' href='image2.jpg'>Photo_2</a>
        <a class='gallery' href='image3.jpg'>Photo_3</a>
        <script>
            jQuery('a.gallery').colorbox();
        </script>
    </body>
</html>

An alternative to placing this <script> at the bottom of the document would be to use jQuery's .ready() method. This method takes in a callback function that will be executed once the DOM has finished loading.

Lastly, the .colorbox() method accepts an optional settings object that overwrites the default settings that control colorbox's behavior. The settings object is made up of a comma-separated list of name:value pairs in between an opening and closing curly bracket. Example:

{ opacity:0.5 , rel:'group1' }

Here is the .ready() method and Colorbox settings object applied to our example document:

<!doctype html>
<html>
    <head>
        <link rel="stylesheet" href="colorbox.css" />
        <script src="jquery.min.js"></script>
        <script src="jquery.colorbox-min.js"></script>
        <script>
            jQuery(document).ready(function () {
                jQuery('a.gallery').colorbox({ opacity:0.5 , rel:'group1' });
            });
        </script>
    </head>
    <body>
        <a class='gallery' href='image1.jpg'>Photo_1</a>
        <a class='gallery' href='image2.jpg'>Photo_2</a>
        <a class='gallery' href='image3.jpg'>Photo_3</a>
    </body>
</html>

Features

  • Supports photos, grouping, slideshow, ajax, inline, and iframed content.
  • Lightweight: 10KB of JavaScript (less than 5KBs gzipped).
  • Appearance is controlled through CSS so it can be restyled.
  • Can be extended with callbacks & event-hooks without altering the source files.
  • Completely unobtrusive, options are set in the JS and require no changes to existing HTML.
  • Preloads upcoming images in a photo group.
  • Well vetted and currently in use in over 600,000 websites.

Instructions & Help

The FAQ has instructions on asking for help, solutions to common problems, and how-to examples. First-time jQuery users can check out the Colorbox Beginner's Guide. Intermediate users can probably glean everything needed by view-source'ing the demo pages.

Usage

Colorbox accepts settings from an object of key/value pairs, and can be assigned to any HTML element.

// Format:
$(selector).colorbox({key:value, key:value, key:value});
// Examples:
// Image links displayed as a group
$('a.gallery').colorbox({rel:'gal'});

// Ajax
$('a#login').colorbox();

// Called directly, without assignment to an element:
$.colorbox({href:"thankyou.html"});

// Called directly with HTML
$.colorbox({html:"<h1>Welcome</h1>"});

// Colorbox can accept a function in place of a static value:
$("a.gallery").colorbox({rel: 'gal', title: function(){
  var url = $(this).attr('href');
  return '<a href="' + url + '" target="_blank">Open In New Window</a>';
}});

Settings

Property Default Description
transition "elastic" The transition type. Can be set to "elastic", "fade", or "none".
speed 350 Sets the speed of the fade and elastic transitions, in milliseconds.
href false This can be used as an alternative anchor URL or to associate a URL for non-anchor elements such as images or form buttons. $("h1").colorbox({href:"welcome.html"});
title false This can be used as an anchor title alternative for Colorbox.
rel false This can be used as an anchor rel alternative for Colorbox. This allows the user to group any combination of elements together for a gallery, or to override an existing rel so elements are not grouped together. $("a.gallery").colorbox({rel:"group1"}); Note: The value can also be set to 'nofollow' to disable grouping.
scalePhotos true If true, and if maxWidth, maxHeight, innerWidth, innerHeight, width, or height have been defined, Colorbox will scale photos to fit within the those values.
scrolling true If false, Colorbox will hide scrollbars for overflowing content. This could be used on conjunction with the resize method (see below) for a smoother transition if you are appending content to an already open instance of Colorbox.
opacity 0.85 The overlay opacity level. Range: 0 to 1.
open false If true, Colorbox will immediately open.
returnFocus true If true, focus will be returned when Colorbox exits to the element it was launched from.
trapFocus true If true, keyboard focus will be limited to Colorbox's navigation and content.
fastIframe true If false, the loading graphic removal and onComplete event will be delayed until iframe's content has completely loaded.
preloading true Allows for preloading of 'Next' and 'Previous' content in a group, after the current content has finished loading. Set to false to disable.
overlayClose true If false, disables closing Colorbox by clicking on the background overlay.
escKey true If false, will disable closing colorbox on 'esc' key press.
arrowKey true If false, will disable the left and right arrow keys from navigating between the items in a group.
loop true If false, will disable the ability to loop back to the beginning of the group when on the last element.
data false For submitting GET or POST values through an ajax request. The data property will act exactly like jQuery's .load() data argument, as Colorbox uses .load() for ajax handling.
className false Adds a given class to colorbox and the overlay.
fadeOut 300 Sets the fadeOut speed, in milliseconds, when closing Colorbox.
closeButton true Set to false to remove the close button.
Internationalization    
current "image {current} of {total}" Text or HTML for the group counter while viewing a group. {current} and {total} are detected and replaced with actual numbers while Colorbox runs.
previous "previous" Text or HTML for the previous button while viewing a group.
next "next" Text or HTML for the next button while viewing a group.
close "close" Text or HTML for the close button. The 'esc' key will also close Colorbox.
xhrError "This content failed to load." Error message given when ajax content for a given URL cannot be loaded.
imgError "This image failed to load." Error message given when a link to an image fails to load.
Content Type    
iframe false If true, specifies that content should be displayed in an iFrame.
inline false

If true, content from the current document can be displayed by passing the href property a jQuery selector, or jQuery object.

// Using a selector:
$("#inline").colorbox({inline:true, href:"#myForm"});

// Using a jQuery object:
var $form = $("#myForm");
$("#inline").colorbox({inline:true, href:$form});
html false For displaying a string of HTML or text: $.colorbox({html:"<p>Hello</p>"});
photo false If true, this setting forces Colorbox to display a link as a photo. Use this when automatic photo detection fails (such as using a url like 'photo.php' instead of 'photo.jpg')
ajax   This property isn't actually used as Colorbox assumes all hrefs should be treated as either ajax or photos, unless one of the other content types were specified.
Dimensions    
width false Set a fixed total width. This includes borders and buttons. Example: "100%", "500px", or 500
height false Set a fixed total height. This includes borders and buttons. Example: "100%", "500px", or 500
innerWidth false This is an alternative to 'width' used to set a fixed inner width. This excludes borders and buttons. Example: "50%", "500px", or 500
innerHeight false This is an alternative to 'height' used to set a fixed inner height. This excludes borders and buttons. Example: "50%", "500px", or 500
initialWidth 300 Set the initial width, prior to any content being loaded.
initialHeight 100 Set the initial height, prior to any content being loaded.
maxWidth false Set a maximum width for loaded content. Example: "100%", 500, "500px"
maxHeight false Set a maximum height for loaded content. Example: "100%", 500, "500px"
Slideshow    
slideshow false If true, adds an automatic slideshow to a content group / gallery.
slideshowSpeed 2500 Sets the speed of the slideshow, in milliseconds.
slideshowAuto true If true, the slideshow will automatically start to play.
slideshowStart "start slideshow" Text for the slideshow start button.
slideshowStop "stop slideshow" Text for the slideshow stop button
Positioning    
fixed false If true, Colorbox will be displayed in a fixed position within the visitor's viewport. This is unlike the default absolute positioning relative to the document.
top false Accepts a pixel or percent value (50, "50px", "10%"). Controls Colorbox's vertical positioning instead of using the default position of being centered in the viewport.
bottom false Accepts a pixel or percent value (50, "50px", "10%"). Controls Colorbox's vertical positioning instead of using the default position of being centered in the viewport.
left false Accepts a pixel or percent value (50, "50px", "10%"). Controls Colorbox's horizontal positioning instead of using the default position of being centered in the viewport.
right false Accepts a pixel or percent value (50, "50px", "10%"). Controls Colorbox's horizontal positioning instead of using the default position of being centered in the viewport.
reposition true Repositions Colorbox if the window's resize event is fired.
Retina Images    
retinaImage false If true, Colorbox will scale down the current photo to match the screen's pixel ratio
retinaUrl false If true and the device has a high resolution display, Colorbox will replace the current photo's file extention with the retinaSuffix+extension
retinaSuffix "@2x.$1" If retinaUrl is true and the device has a high resolution display, the href value will have it's extention extended with this suffix. For example, the default value would change `my-photo.jpg` to `my-photo@2x.jpg`
Callbacks    
onOpen false Callback that fires right before Colorbox begins to open.
onLoad false Callback that fires right before attempting to load the target content.
onComplete false Callback that fires right after loaded content is displayed.
onCleanup false Callback that fires at the start of the close process.
onClosed false Callback that fires once Colorbox is closed.

Public Methods

$.colorbox() This method allows you to call Colorbox without having to assign it to an element. '$.colorbox({href:"login.php"});
$.colorbox.next()
$.colorbox.prev()
These methods moves to the next and previous items in a group and are the same as pressing the 'next' or 'previous' buttons.
$.colorbox.close() This method initiates the close sequence, which does not immediately complete. The lightbox will be completely closed only when the cbox_closed event / onClosed callback is fired.
$.colorbox.element() This method is used to fetch the current HTML element that Colorbox is associated with. Returns a jQuery object containing the element. var $element = $.colorbox.element();
$.colorbox.resize() This allows Colorbox to be resized based on it's own auto-calculations, or to a specific size. This must be called manually after Colorbox's content has loaded. The optional parameters object can accept width or innerWidth and height or innerHeight. Without specifying a width or height, Colorbox will attempt to recalculate the height of it's current content.
$.colorbox.remove() Removes all traces of Colorbox from the document. Not the same as $.colorbox.close(), which tucks colorbox away for future use.

Event Hooks

These event hooks fire at the same time as their corresponding callbacks (ie. cbox_complete & onComplete), but can be used to make a universal change to Colorbox, while callbacks are only applied to selected elements.

// Example of using an event listener and public method to build a primitive slideshow: $(document).bind('cbox_complete', function(){ setTimeout($.colorbox.next, 1500); });

cbox_open triggers when Colorbox is first opened, but after a few key variable assignments take place.
cbox_load triggers at the start of the phase where content type is determined and loaded.
cbox_complete triggers when the transition has completed and the newly loaded content has been revealed.
cbox_cleanup triggers as the close method begins.
cbox_closed triggers as the close method ends.

Comcast Building a Nationwide WiFI Network

Photo(Jim Hood @ ConsumerAffairs) Those cable companies are sneaky, all right. They're always trying to put one over on us. Take Comcast. It's not content just to buy NBC and Time Warner, now it's setting up little neighborhood wi-fi networks in places you'd never imagine.

Like your back yard.

Yep, big bad Comcast has been quietly bringing wireless broadband to neighborhoods all over America. Besides providing a private, password-protected network inside your home, the company's newest Xfinity routers automatically set up a second wi-fi network -- wide open and available for anyone within range.

Comcast Internet Service  March 5, 2014, 8:32 p.m.Consumers rate Comcast Internet Service

The company emphasizes that these are two separate networks. What goes on on the second public network won't affect your download speeds or impinge on your privacy in any way. 

"They'll look like two separate networks and they'll act like two separate networks," said Tom Nagel, who heads the Xfinity Wi-Fi initiative for Comcast, according to The Chicago Tribune. "Any use on the public side doesn't impact the private side."

Tipping point

The program has been conducted quietly so far in test markets around the country but Comcast has gone public in Chicago, which local boosters say could be the tipping point for making Comcast the biggest national operator of neighborhood wi-fi networks.

Demand for wi-fi has been steadily growing as smartphone and tablet users look for a cheaper alternative to costly cellphone broadband networks. Deploying cheap or even free wi-fi is a way for the cable companies to put a dent in Verizon, AT&T and Sprint and building the basis for customer loyalty programs. 

The neighborhood networks are free to Xfinity subscribers. Nonsubscribers will get two free hours a month; beyond that, they can access Xfinity Wi-Fi on a per-use basis. Rates run from $2.95 per hour to $19.95 per week, according to Comcast.

Travel freely

Xfinity subscribers will be able to travel freely without having to log in and out as they move from one hot spot to another, so that in time the network may grow to rival the cellular telephone networks, which are much more expensive to build and maintain.

Comcast has said it is closing in on having 1 million hot spots nationwide. Best of all, from Comcast's standpoint, is that the build-out is virtually free. The consumer provides the electricity for the router and the circuit already exists, so the only capital expense is the router. 

Slick, no?

 

Command Line Copy text to the Windows clipboard

Too bad highlighting the text and a right mouse click doesn’t work. But if you work with command line a lot, there is a way, and this is how we do it:

  1. Right click on the command window's title bar and click Properties.
  2. Click the Options tab.
  3. Check the box that says "QuickEdit Mode" on the right side of the dialog box.
  4. Now you can left click within the command window and drag a box around the text that you want to select.
  5. Right click anywhere in the window or just press Enter to copy the text to the clipboard.
  6. Paste it into a Windows document in the usual way.

What if you want to go the other way around, and paste content into a command window? When the text is on the clipboard, just right click anywhere inside the window (as long as you aren't in select mode as described in step 4 above.

Computer Security That Experts Wish You Knew

(Annalee Newitz @ GizModo) Every day, you hear about security flaws, viruses, and evil hacker gangs that could leave you destitute — or, worse, bring your country to its knees. But what’s the truth about these digital dangers? We asked computer security experts to separate the myths from the facts. Here’s what they said.

1. Having a strong password actually can prevent most attacks

Facebook’s Chief Security Officer Alex Stamos has spent most of his career finding security vulnerabilities and figuring out how attackers might try to exploit software flaws. He’s seen everything from the most devious hacks to the simplest social engineering scams. And in all that time, he’s found that there are two simple solutions for the vast majority of users: strong passwords and two-factor authentication.

Stamos says that the biggest problem is that the media focuses on stories about the deepest and most complicated hacks, leaving users feeling like there’s nothing they can do to defend themselves. But that’s just not true. He told me via email:

I’ve noticed a lot of nihilism in the media, security industry and general public since the Snowden docs came out. This generally expresses itself as people throwing up their hands and saying “there is nothing we can do to be safe”. While it’s true that there is little most people can do when facing a top-tier intelligence apparatus with the ability to rewrite hard drive firmware, this should not dissuade users from doing what they can to protect themselves from more likely threats and security professionals from building usable protections for realistic adversaries.

Users can protect themselves against the most likely and pernicious threat actors by taking two simple steps:

1) Installing a password manager and using it to create unique passwords for every service they use.

2) Activating second-factor authentication options (usually via text messages) on their email and social networking accounts.

The latter is especially important since attackers love to take over the email and social accounts of millions of people and then automatically use them to pivot to other accounts or to gather data on which accounts belong to high-value targets.

So I would really like the media to stop spreading the idea that just because incredible feats are possible on the high-end of the threat spectrum, doesn’t mean it isn’t possible to keep yourself safe in the vast majority of scenarios.

Adam J. O’Donnell, a Principal Engineer with Cisco’s Advanced Malware Protection group, amplified Stamos’ basic advice:

Oh, and my advice for the average person: Make good backups and test them. Use a password vault and a different password on every website.

Yep, having a good password is easy — and it’s still the best thing you can do.

2. Just because a device is new does not mean it’s safe

When you unwrap the box on your new phone, tablet or laptop, it smells like fresh plastic and the batteries work like a dream. But that doesn’t mean your computer isn’t already infected with malware and riddled with security vulnerabilities.

I heard this from many of the security experts I interviewed. Eleanor Saitta is the technical director for the International Modern Media Institute, and has worked for over a decade advising governments and corporations about computer security issues. She believes that one of the most pernicious myths about security is that devices begin their lives completely safe, but become less secure as time goes on. That’s simply not true, especially when so many devices come with vulnerable adware like Superfish pre-installed on them (if you recall, Superfish came pre-installed on many Lenovo laptop models):

That’s why the Superfish thing was such a big deal. They built a backdoor in, and they built a really bad, incompetent one, and now it turns out that anybody can walk through.

When you’re relying on code delivered by somebody else, a service online or box that you don’t control, chances are good that it’s not acting in your interest, because it’s trying to sell you. There’s a good chance that it’s already owned or compromised by other people. We don’t have a good way of dealing with trust and managing it right now. And all sorts of people will be using that code.

The other issue, which erupted in the media earlier this year with the FREAK attack, is that many machines come pre-installed with backdoors. These are baked in by government request, to make it easier for law enforcement and intelligence agencies to track adversaries. But unfortunately, backdoors are also security vulnerabilities that anyone can take advantage of. Says Saitta:

I think one thing that is really important to understand is that if you built a monitoring system into a network like a cell network, or into a crypto system, anybody can get in there. You’ve built a vulnerability into the system, and sure, you can control access a little. But at the end of the day, a backdoor is a backdoor, and anybody can walk through it.

3. Even the very best software has security vulnerabilities

Many of us imagine that sufficiently good software and networks can be completely safe. Because of this attitude, many users get angry when the machines or services they use turn out to be vulnerable to attack. After all, if we can design a safe car, why not a safe phone? Isn’t it just a matter of getting the tech and science right?

But Parisa Tabriz told me via email that you can’t look at information security that way. Tabriz is the engineer who heads Google’s Chrome security team, and she believes that information security is more like medicine — a bit of art and science — rather than pure science. That’s because our technology was built by humans, and is being exploited by humans with very unscientific motivations. She writes:

I think information security is a lot like medicine — it’s both an art and science. Maybe this is because humans have explicitly built technology and the internet. We assume we should be able to build them perfectly, but the complexity of what we’ve built and now hope to secure almost seems impossible. Securing it would require us to have zero bugs, and that means that the economics are not on the side of the defenders. The defenders have to make sure there are zero bugs in all software they use or write (typically many millions of lines of code if you consider the operating system too), whereas the attacker only has to find one bug.

There will always be bugs in software. Some subset of those bugs will have security impact. The challenge is figuring out which ones to spend resources on fixing, and a lot of that is based on presumed threat models that probably would benefit from more insight into people’s motivations, like crime, monitoring, etc.

RAND Corporation computer security researcher Lillian Ablon emailed me to say that there is simply no such thing as a completely secure system. The goal for defenders is to make attacks expensive, rather than impossible:

With enough resources, there is always a way for an attacker to get in. You may be familiar with the phrase “it’s a matter of when, not if,” in relation to a company getting hacked/breached. Instead, the goal of computer security is to make it expensive for the attackers (in money, time, resources, research, etc.).

4. Every website and app should use HTTPS

You’ve heard every rumor there is to hear about HTTPS. It’s slow. It’s only for websites that need to be ultra-secure. It doesn’t really work. All wrong. The Electronic Frontier Foundation’sPeter Eckersley is a technologist who has been researching the use of HTTPS for several years, and working on the EFF’s HTTPS Everywhere project. He says that there’s a dangerous misconception that many websites and apps don’t need HTTPS. He emailed to expand on that:

Another serious misconception is website operators, such as newspapers or advertising networks, thinking “because we don’t process credit card payments, our site doesn’t need to be HTTPS, or our app doesn’t need to use HTTPS”. All sites on the Web need to be HTTPS, because without HTTPS it’s easy for hackers, eavesdroppers, or government surveillance programs to see exactly what people are reading on your site; what data your app is processing; or even to modify or alter that data in malicious ways.

Eckersley has no corporate affiliations (EFF is a nonprofit), and thus no potential conflict of interest when it comes to promoting HTTPS. He’s just interested in user safety.

5. The cloud is not safe — it just creates new security problems

Everything is cloud these days. You keep your email there, along with your photos, your IMs, your medical records, your bank documents, and even your sex life. And it’s actually safer there than you might think. But it creates new security problems you might not have thought about. Security engineer Leigh Honeywell works for a large cloud computing company, and emailed me to explain how the cloud really works. She suggests that you begin thinking about it using a familiar physical metaphor:

Your house is your house, and you know exactly what the security precautions you’ve taken against intruders are - and what the tradeoffs are. Do you have a deadbolt? An alarm system? Are there bars on the windows, or did you decide against those because they would interfere with your decor?

Or do you live in an apartment building where some of those things are managed for you? Maybe there’s a front desk security person, or a key-card access per floor. I once lived in a building where you had to use your card to access individual floors on the elevator! It was pretty annoying, but it was definitely more secure. The security guard will get to know the movement patterns of the residents, will potentially (though not always, of course!) recognize intruders. They have more data than any individual homeowner.

Putting your data in the cloud is sort of like living in that secure apartment building. Except weirder. Honeywell continued:

Cloud services are able to correlate data across their customers, not just look at the ways an individual is being targeted. You may not [control access to the place where] your data is being stored, but there’s someone at the front desk of that building 24/7, and they’re watching the logs and usage patterns as well. It’s a bit like herd immunity. A lot of stuff jumps out at [a defender] immediately: here’s a single IP address logging into a bunch of different accounts, in a completely different country than any of those accounts have been logged into from ever before. Oh, and each of those accounts received a particular file yesterday — maybe that file was malicious, and all of those accounts just got broken into?

But if it’s a more targeted attack, the signs will be more subtle. When you’re trying to defend a cloud system, you’re looking for needles in haystacks, because you just have so much data to handle. There’s lots of hype about “big data” and machine learning right now, but we’re just starting to scratch the surface of finding attackers’ subtle footprints. A skilled attacker will know how to move quietly and not set off the pattern detection systems you put in place.

In other words, some automated attack methods become blatantly obvious in a cloud system. But it also becomes easier to hide. Honeywell says that users need to consider the threats they’re seriously worried about when choosing between a cloud service and a home server:

Cloud services are much more complex systems than, say, a hard drive plugged into your computer, or an email server running in your closet. There are more places that things can go wrong, more moving parts. But there are more people maintaining them too. The question folks should ask themselves is: would I be doing a better job running this myself, or letting someone with more time, money, and expertise do it? Who do you think of when you think about being hacked — is it the NSA, random gamer assholes, an abusive ex-partner? I ran my own email server for many years, and eventually switched to a hosted service. I know folks who work on Gmail and Outlook.com and they do a vastly better job at running email servers than I ever did. There’s also the time tradeoff — running an email server is miserable work! But for some people it’s worth it, though, because NSA surveillance really is something they have worry about.

6. Software updates are crucial for your protection

There are few things more annoying in life than the little pop-up that reminds you that updates are required. Often you have to plug your device in, and the updates can take a really long time. But they are often the only thing that stands between you and being owned up by a bad guy. Cisco’s O’Donnell said:

Those software update messages are [not] there just to annoy you: The frequency of software updates is driven less by new software features and more because of some very obscure software flaw that an attacker can exploit to gain control of your system. These software patches fix issues that were publicly identified and likely used in attacks in the wild. You wouldn’t go for days without cleaning and bandaging a festering wound on your arm, would you? Don’t do that to your computer.

7. Hackers are not criminals

Despite decades of evidence to the contrary, most people think of hackers as the evil adversaries who want nothing more than to steal their digital goods. But hackers can wear white hats as well as black ones — and the white hats break into systems in order to get there before the bad guys do. Once the vulnerabilities have been identified by hackers, they can be patched. Google Chrome’s Tabriz says simply:

Also, hackers are not criminals. Just because someone knows how to break something, doesn’t mean they will use that knowledge to hurt people. A lot of hackers make things more secure.

O’Donnell emphasizes that we need hackers because software alone can’t protect you. Yes, antivirus programs are a good start. But in the end you need security experts like hackers to defend against adversaries who are, after all, human beings:

Security is less about building walls and more about enabling security guards. Defensive tools alone can’t stop a dedicated, well resourced attacker. If someone wants in bad enough, they will buy every security tool the target may have and test their attacks against their simulated version of the target’s network. Combatting this requires not just good tools but good people who know how to use the tools.

RAND’s Ablon adds that malicious hackers are rarely the threat they are cracked up to be. Instead, the threat may come from people you don’t suspect — and their motivations may be far more complicated than mere theft:

A lot of the time an internal employee or insider is just as big of a threat, and could bring a business to its knees – intentionally or inadvertently. Furthermore, there are distinct types of external cyber threat actors (cybercriminals, state-sponsored, hacktivists) with different motivations and capabilities. For example, the cybercriminals who hacked into Target and Anthem had very different motivations, capabilities, etc. than those of the state-sponsored actors who hacked into Sony Pictures Entertainment.

8. Cyberattacks and cyberterrorism are exceedingly rare

As many of the experts I talked to said, your biggest threat is somebody breaking into your accounts because you have a crappy password. But that doesn’t stop people from freaking out with fear over “cyberattacks” that are deadly. Ablon says that these kinds of attacks are incredibly unlikely:

Yes, there are ways to hack into a vehicle from anywhere in the world; yes, life-critical medical devices like pacemakers and insulin pumps often have IP addresses or are enabled with Bluetooth – but often these types of attacks require close access, and exploits that are fairly sophisticated requiring time to develop and implement. That said, we shouldn’t be ignoring the millions of connected devices (Internet of Things) that increase our attack surface.

Basically, many people fear cyberattacks for the same reason they fear serial killers. They are the scariest possible threat. But they are also the least likely.

As for cyberterrorism, Ablon writes simply, “Cyberterrorism (to date) does not exist ... what is attributed to cyberterrorism today, is more akin to hacktivism, e.g., gaining access to CENTCOM’s Twitter feed and posting ISIS propaganda.”

9. Darknet and Deepweb are not the same thing

Ablon writes that one of the main problems she has with media coverage of cybercrime is the misuse of the terms “Darknet” and “Deepweb.”

She explains what the terms really mean:

The Deepweb refers to part of the Internet, specifically the world wide web (so anything that starts www) that isn’t indexed by search engines, so can’t be accessed by Google. The Darknet refers to non-”www” networks, where users may need separate software to access them. For example, Silk Road and many illicit markets are hosted on [Darknet] networks like I2P and Tor.

So get a password vault, use two-factor auth, visit only sites that use HTTPS, and stop worrying about super intricate cyber attacks from the Darknet. And remember, hackers are here to protect you — most of the time, anyway.

Computer Use Can Harm Your Health

A digital malady called “iPad shoulder” joins computer vision syndrome, BlackBerry thumb and E-thrombosis on the list of odd—and often painful—disorders afflicting our increasingly wired society.

In a new study, researchers at Harvard’s School of Public Health report that the millions of Americans who use tablet computers, such as the iPad, risk shoulder and neck injuries because of the way they hold the high-tech devices. In the study, 15 experienced users performed a range of simulated tasks on an iPad 2 and Motorala Xoom while their postures were analyzed with a 3-D motion analysis system.

While using the tablets, the volunteers bent their necks more, compared to using a desktop or laptop device, especially when the tablet was in their lap. That hunched posture strains the neck and shoulders, the researchers say. They advise tablet devotees to change positions every 15 minutes, move their neck around to release tension, and to use a case to prop the iPad at the preferred angle of 30 degrees.

Use these seven simple tips to manage chronic pain.

Read More - Click Here

Computer/Television Convergence Debate

'When we talk of convergence between computers and television, we need to be careful to specify what we mean.  In the case of this debate, we specifically mean the convergence of television and computers, both the media and the devices.  To that end the debate will center around two main issues:

The unique thing about television is that television is both a medium and a transmission system.  That is to say that television is used to refer to the screen that you watch, as well as what you see on that screen.  The Internet on the other hand is a system for transmitting bits, and is different from the device which receives those bits, the computer.  For this debate we will consider the content of the Internet to be primarily World Wide Web style content and an extension thereof.  In other words, you will have multimedia pages with dynamic content including audio and video clips.

So, when we say that the media will converge, we mean that current television shows will merge into a hybrid with World Wide Web style content.  Television shows will have other types of media like text merged into them, and World Wide Web pages will begin to be temporal entities that tell a story.  Another way of looking at this is that both your television and your computer will be running a similar super browser which will allow the same content to be viewed on both devices.  Also, to say that the two converge it is not enough to say that you will be able to watch television on your computer-- that merely means that television content is a sub-set of computer content and is already possible today.  For the two to truly converge the content that can be received by both devices should be the same.

When we say that the media will not converge, we mean that television shows and world wide web content will remain distinct media forms, and that you will use your television for watching television shows, and your computer to view and browse web content.  While both media types may have evolved, they will remain different from one another.
 

The second topic for the debate will be that the computers and televisions as devices will merge.  In this case the argument is that sometime in the future there won't be \"televisions\" and \"computers\", but some new device that encapsulates the behavior of both.  This \"viewer\" will come in different sizes and shapes, but will be thought of as one item, just like little TVs and big TVs in people's minds are considered one type of device.  While you may be more inclined to use the \"viewer\" on your desk to browse the web, and the \"viewer\" in the home theater to watch movies, you would be willing to do either task on either device.  In other words, if you were at your desk working on a \"viewer\" and a friend called up telling you to check out a show, you would just switch the \"viewer\" to that show, rather than going into another room to find a \"TV viewer\".

Non-convergence in this case is the argument that, while TVs may take on some computer-like functionality and vice versa, fundamentally the two will be thought of as different devices.  Doing research and browsing the web will be done on a computer, and watching shows and movies will be done on a television.

  1. Computers and Televisions will be able to display the same media:
  2. People will cease distinguishing between computers and televisions:

Finally, it is important to make one final point on the debate framework.  There are always extreme points in the adoption of technology.  Since there is no technical reason why a television can't have the same functionality as a computer, or vice versa, it is quite likely that both computer powered TVs and computers that can display television will be around in the future.  In fact even today the Gateway 2000 Destination series is a computer powered TV and computers can have TV boards and are able to watch television content.  There will certainly be some small number of people that adopt this technology.  On the other hand there will also be some people that will keep their 1968 television and just add a DTV decoder box.  Neither of these extremes are very interesting.

On account of this, the debate will center around what functionality the majority of televisions and computers will have, and what types of media will be broadcast for a majority of broadcast hours.  The main question we consider is whether televisions and computers will come to be more similar on average as time goes on, or whether they will evolve along mostly independent paths.


The Argument for Convergence

Media Convergence:

In order for the media to converge, two main things need to occur.  First, computers and televisions must be able to be content interchangeable.  That is, computers must be able to view and use television content, and televisions must be able to view and receieve Internet content.  Second, people must be sufficiently interested in being able to view the same content on both device to make implementation of this interoperability commercially viable.  The two are clearly interrelated, since the amount of interest in interoperability people have determines how much they are willing to pay for that functionality.
Before determining whether it is possible to make television and computers interoperable, we need a list of what sorts of content both can, or will be able to receive.  To start, here is a list of some of the content we might see on both the web and digital television in the future:

  • Television Content:
    • Television shows
    • Movies
    • Commercials
  • World Wide Web Content:
    • Media presentations (scripted presentations of various media objects including text, 3-D graphics, audio and video)
    • Games (non-scripted temporal presenation of various media objects with which the user/viewer can interact)
    • Information blocks (collections of media objects through which the user/viewer can browse)

The Computer

It is easiest to first answer the question of whether a computer will be able to receive television content.  The types of content that are broadcast over television currently, and will continue to be broadcast if the two media do not converge, are audio/video streams.  Since the computer media already includes audio and video streams, it should be able to decode the streams with no extra equipment.  The possible exception to this is the addition of a tuner card to decode the analog signal into the digital stream, but this should be of marginal additional cost considering the cost of purchasing a computer.
So, a computer will be able to receive television content for little extra cost.  Since the cost difference between a machine with this capability and a machine without this capability will be low, even if there is little consumer interest in this, machines will still come with this capability.

The Television

The more difficult question is whether a television will be able to display world wide web content.  It is pretty clear that you can put enough hardware into a television to make it able to display the media that a computer can display.  Essentially you would need to add a reasonable sized hard disk, some memory, and a fairly fast general purpose processor.  How much would this add to the cost of the television?  I will guess at the prices of items six years from now if they are shipping in large quanties.

From 1994 to 1997 1 Gig drives fell from $1000 to $100, 1/10 the cost in three years.  A 10 Gig drive is now $300, so in six years it should be $3.  I am allowing for some parts cost which may not change based on drive capacity and saying $10.

From 1992 to 1998 1 MB of memory fell from $30 to $1, a 30-fold decrease in six years.  A megabyte of RAM should cost 1/30 of $1 in 6 years, or a little more than 3 cents

This one I am guessing on, but fast 3D chips run around $20 today, so I am guessing a reasonably fast processor (as fast as the fastest of todays processors) won't cost more than $20.  If you can get a 486/66 for $20 today this seems reasonable.

  • 10 Gig hard drive - $10
  • 64 MB Memory - $ 2
  • Fast Processor (including 3D processor) - $20

The total additional cost to televisions shipping in quantity to make them fast enough to read computer content would then be about $50.

The question to answer now is whether the average consumer would be willing to pay $50 extra for this functionality.  If so, then broadcasters would be likely to merge the content, and manufacturers to include the extra functionality.

This is a difficult question to answer without actually trying out the system with a test group.  In the past interactive TV trials where more robust media and interactivity is included in the television have been a failure (ie. Time Warner's Orlando test-bed).  The difference now is that the new television screens will have sufficient resolution to display text based materials without being blurry and out of focus.  What specifically might people be interested in doing on these new improved systems?

  • Advanced Commercials:  Broadcasters could send six commercial streams during commercial breaks of HDTV shows, and the viewer could determine which one to watch.  A 'X' on the remote could be hit to kill a commercial, or another could be hit to indicate it is somewhat interesting.  Over time the set could build up a preference profile allowing users to see the commercials they most prefer (or least hate).  If hypertext is included with each commercial, people could browse through downloaded information instead of watching more commercials.  The hard disk could also be used to buffer the show so you wouldn't miss anything if you were browsing.  This would be a more interesting model for commercials for viewers, advertisers and broadcasters.
  • A Movie Previews Channel: One channel of a station (or sub-stream) could be a movie channel which downloads HTML like content with information on various movies in theaters including reviews, local show times, and trailers.  By clicking on a trailer you could watch the trailer in all of its glory in your home theater.
  • A News Channel: Instead of having an anchor cycle through stories continuously, a continually updated news web site could be broadcast on one channel.  It could have local, national and international stories as well as traffic and weather updates.  Given stories can have the full video clip story (live or delayed), as well as background text and photos for those interested in more in depth information.  This could also be received in your car to get traffic reports which could be read to you based on your cars current location.

There are many other possibilities including much enhanced travelogue, home improvement and cooking shows.  Is this worth $50 more in initial investment for the average consumer though?  If the TV is kept for 5 years, the cost is less than $1 per month, which seems like something any consumer would be willing to pay for this increased functionality.

So, if computers will be able to view television content, and people will be willing to pay for television that can display computer content, there is no reason that the two media will not converge.

Device Convergence

With the convergence of media, we expect the emergence of appliances that will be able to display some sort of standardized media format. These devices will most likely vary in size, intended placement (living room, kitchen, bedroom), and functionality, but will have the common capability of being able to interpret the given converged media format.

Since media will most likely converge to some sort of digital stream with packets of information embedded in it, these information appliances will be able to provide a richer environment for viewing and interaction.

This means that the television in the living room will no longer be just a television, but it will be an \"information\" appliance. In addition to being able to display video streams, it will also be able to present other types of information-web pages, on-line stock quotes, interactive city maps, virtual lectures, etc.-that are encapsulated in the media stream.

This type of scenario has several implications:

  • For video playback, this means the possibility of introducing different encoding and compression schemes into the stream. This may serve to save resources because the entire uncompressed video signal will no longer have to be broadcast. It can also be used to broadcast content at different resolutions, allowing the viewer to choose depending on the characteristics of the viewing device. So a large, entertainment device in the living room may receive a movie in wide-screen format with Dolby Surround Sound, while a smaller device in the kitchen used to get the morning news may only receive the bare essentials.
  • Consider the idea of private vs. public space. With converged media, one can imagine a scenario in which a user is creating or modifying content on a small \"information\" appliance like a PDA while sitting in a meeting (private space). Since the device is using converged media, the user will then be able to instantly upload this work into a public display, like a large video wall in a conference room, for presentation.
  • When giving multimedia presentations that contain both digital information and video information, it is not uncommon to use a computer to display the slides and a VCR to play a video tape. Convergence would push for media and devices that would be able to easily accommodate both formats, so that switching hardware during the middle of a talk will no longer be necessary.
  • Right now, too many forms of media exist. Consider the genre of audio. There are tapes, CD?s, MiniDiscs, RealAudio, MP3?s, and more. Each format requires it?s own special device and switching from format to format is very difficult. One needs a radio to get content broadcast over the air; a CD player is required to play songs on a CD; a computer is needed to play MP3?s. With media convergence, it is likely that you can take a mix of your favorite songs and be able to play it at home, in the car, and at work, since you are using a common media format that can be read by many devices.
  • Audio equipment manufacturers are creating devices that have the capability to play more and more audio formats (some stereos have built in tape decks, radio receivers, MiniDisc players, and CD players). This seems to be analogous to the idea of device convergence and an argument for it.
  • For content providers, the switch to convergent media may initially be expensive, as they will have to invest in new equipment. But in the long run, it will open up more possibilities. As of now, television advertisements are usually very elaborate, but the experience is passive. Viewers cannot simply click on them if they want more information or want to purchase the item being mentioned as they can on the Internet. With converged media, it would be possible to integrate both types of advertisement into one, allowing for both elaborate presentations and complex interactions.
  • For content providers, media convergence also implies that creative content will only have to be created once, not several times for the varying media formats. This too, will save content providers time and money in the long run.
  • The addition of informational bits to the media stream, in combination with these all-in-one devices, will allow content to be more customized to the viewer?s needs and wants. The device may have some sort of filtering agent that only displays advertisements that are of interest to the viewers.

The Argument Against Convergence

  • TVs are consumer-level devices, which mean that they have to be cheap (for the average Joe)
  • Being able to display the vast number of media types available today on the web (Macromedia, pdf, ps, RealAudio, RealVideo) will be expensive and challenging - you need a general-purpose CPU and stuff like RAM, OS, etc. People will not be willing to pay, especially if they?re not really going to use it. Perhaps Java will save convergence.
  • At this point in time, the TV and the WWW are fundamentally different - TV is a broadcast medium, with virtually zero interactivity, while the WWW is a \"pull\" medium, with a high degree of user interactivity required. Things will stay this way - in the short- and medium-term, people are not going to treat the TV and computer interchangeably.
  • So, is the media going to merge and drive the convergence? TV programs with interactivity? Ads, maybe. Education, maybe. But entertainment? People fundamentally go to the living room to be entertained - movies don?t lend themselves well to interactivity. Nor does the broadcast model. Even with a back-channel, 19.2Mbits/s is a one->many transmission. You can hack one-to-one transmission, of course, but why?
  • Another reason why WWW and TV content will not merge is the proliferation of handheld, portable, wireless devices that let you take the WWW (= information + entertainment) wherever you are. The presence of such \"lite\" devices will drive media development away from integrated content and into \"lite\" content that deliver concentrated doses of information. See Diamond?s new Rio player & Cyrix?s new WebPad - instead of converging into a single super-powerful appliance that is used for everything, people will gravitate towards small, specific solutions
  • Personal vs. public - TV is an audience-based thing - many people can watch one movie together. On the other hand, the WWW, and interactivity in general, is personal. One person may have very different responses compared to another, making it difficult for more than one person to surf the web together for extended periods, or participate in an interactive program, unless specifically designed for multiple players.
  • The two mediums, broadcast (TV) and WWW, are sufficiently different, not in technical terms, but human ones, that a merger of the content is highly unlikely. Naturally there will be some overlap & intersection, but it will be minor. There will be no fundamental revolution and/or integration of content.

 

Consumer Technology - Ban Them All or Let Them Slide

It’s a fact that high-tech consumer products and services of all kinds are making their way into the workplace. They include everything from smart phones, voice-over-IP systems and flash memory sticks to virtual online worlds. And as people grow more accustomed to having their own personal technology at their beck ‘n’ call -- and in fact can't imagine functioning without it -- the line between what they use for work and what they use for recreation is blurring.

However, some of these consumer technologies can prose real security threats to your business. To help you decide on what consumer technologies to ban and what to let slide, let’s take a look at eight popular consumer technologies and services that have crept into the workplace.

1. Instant messaging

People use instant messaging for everything from making sure their kids have a ride home from practice to communicating with co-workers and business partners. In the Yankee study, 40% of respondents said they use consumer IM technology at work. Instant messaging present numerous security challenges. Among other things, malware can enter a corporate network through external IM clients and IM users can send sensitive company data across insecure networks.

One way to combat threats is to phase out consumer IM services and use an internal IM server. In late 2005, Global Crossing did just that when it deployed Microsoft Corp.'s Live Communications Server (LCS). Then in August 2006 it blocked employees from directly using external IM services from providers such as AOL, MSN and Yahoo. Now, all internal IM exchanges are encrypted, and external IM exchanges are protected, as they're funneled through the LCS server and Microsoft's public IM cloud.

Adopting an internal IM server also gave Global Crossing's security team more control. "Through the public IM cloud, we're able to make certain choices as to how restrictive or open we are. We can block file transfers, limit the information leaving our network or restrict URLs coming in," which was a common method for propagating worms, Miller says. "That takes away a huge component of malicious activity."

You can also take a harder line. DeKalb's security policy, for instance, bans IM use altogether. "It's mainly chat-type traffic, not personal health information, but it's still a concern," Finney says. As backup to the restrictive policy, she blocks most sites where IM clients can be downloaded, although she can't block MSN, AOL or Yahoo because many physicians use those sites for e-mail accounts. Her team also uses a network inventory tool that can detect IM clients on employee PCs. If one is found, the employee is reminded of DeKalb's no-IM policy and notified that the IM client will be removed. Finney is also considering various methods of blocking outbound IM traffic, but for now, she also uses a data loss prevention tool from Vericept Corp. to monitor IM traffic and alert the security team about any serious breaches. To do that, Finney's team needs to shut down most of its Internet ports, which forces IM traffic to scroll to Port 80 for monitoring.

DeKalb is looking into the idea of implementing the IM add-on of IBM's Lotus Notes or even an internal freeware IM service like Jabber for business users who want to communicate across campus. "Nothing is 100%," Finney says. "IM is always a huge concern from a security as well as a productivity perspective."

2. Web mail

Of the respondents to the Yankee Group survey, 50% said they use consumer e-mail applications for business purposes. The problem with consumer e-mail services such as those from Google, Microsoft, AOL and Yahoo is that the users themselves don't realize how insecure their e-mail exchanges are because messages are transported over the Web and stored on the ISP's server as well as the e-mail provider's server. Without that awareness, many use no discretion about sending sensitive information such as Social Security numbers, passwords, confidential business data or trade secrets.

One approach to tightening security around Web mail is to use a tool that monitors e-mail content using keyword filters and other detection techniques and the either generates alerts regarding potential breaches or simply blocks the e-mail from being sent. For instance, WebEx Communications is considering expanding its use of a data loss prevention tool from Reconnex Inc. to include e-mail monitoring, according to Michael Machado, director of IT infrastructure.

For its part, DeKalb addresses this problem with Vericept's tool, which captures a screenshot of every Web-based e-mail that employees send, including file attachments, and scans these for company-defined sensitive data, such as Social Security numbers. Alerts are sent to Finney's team so that they can follow up with users to educate them on the dangers of sending sensitive data over the Web.

3. Portable storage devices

One of an IT manager's biggest fears, according to Holbrook, is the steady proliferation in types of portable storage, ranging from Apple iPhones and iPods to flash memory devices. "People can use these to download any number of corporate secrets or sensitive information and move it off-site, which is not where IT wants that information to be," he says.

"In the past three weeks alone, I've heard six different conversations about the risks of flash drives and portable storage devices," says Mark Rhodes-Ousley, an information security architect and author of Network Security: The Complete Reference (McGraw-Hill Osborne Media, 2003).

While it would be easy enough to lock down the USB ports on employee PCs, many security managers say this is not a recommended approach. "If people want to subvert the process, they're going to find a way to get around any barriers you put in place," Miller says. "And where do you draw the line? If you restrict USB ports and [cell] phones coming into the office that may have data storage ports, then you have to look at restricting infrared ports on devices and CD burners, and the list goes on and on."

It's better, he says, to handle the matter by educating people on how to treat the storage of sensitive information. "Most of the incidents that occur are unintentional [rather than] malicious, so that's where education comes in, as to proper handling and why it's important," Miller says.

Machado says he isn't a fan of blocking USB ports at WebEx, mainly because such a strategy would quickly devolve into users asking IT for exceptions to the rule and IT having to manage those exceptions. "Everyone has an exception that they think is important, which takes up more of IT's time than is necessary," he says.

What would be optimal, he adds, is to have a tool that sends an to people who are trying to copy files to USB drives or other unencrypted storage media, advising them that they're going against corporate policy. "Then they know they're empowered to make the decision but that it's going to be tracked and monitored," he says.

On the other hand, DeKalb's Finney says she is interested in blocking technologies and is looking into the Vericept tool's ability to either block certain types of data from being transferred to an external storage device or alert her when someone tries to plug anything into a PC that's not native to that computer. Ideally, she'd like a tool that would also remind employees that corporate policy forbids sensitive data to be stored on external devices.

Meanwhile, Michigan's Grand Valley State University and other colleges and universities where professors and students have lost flash drives with sensitive data are looking into standardizing on password- and encryption-protected USB drives to protect them in the future.

4. PDAs and smart phones

More and more employees are showing up at work with some form of smart phone or personal digital assistant, be it a BlackBerry, a Treo or an iPhone. But when they try to synch up their device's calendar or e-mail application with their own PC, it can cause problems ranging from application glitches to the blue screen of death. "Those types of problems are not uncommon -- it's the mundane things like that that can drive IT nuts," Holbrook says. "It's not how they want to be spending their time."

Moreover, should the employee quit or be fired, he can walk out the door with any information he wants, as long as the PDA or smart phone belongs to him.

Like some other companies, WebEx minimizes those possibilities by standardizing on a single brand and model of PDA and letting employees know the IT organization will only support that one device. WebEx does the same thing with laptops, which Machado notes, represent an even greater threat than PDAs because they can hold even more data. Any unapproved devices are not allowed on the WebEx network.

5. Camera phones

A hospital worker stands at a nursing station, casually chatting with the nurses. No one notices she's got a small device in her hand, on which, from time to time, she's pressing a small button. A scene from the latest spy thriller? No, a security test conducted by DeKalb's Finney.

"One of the tests I did was to go to take my cell phone to the nursing station and start clicking off photos, unbeknownst to them," she says. "I wanted to download the photos, enhance the images and see what I got -- patient information displayed on computer screens or on papers lying on the desk."

As it turns out, she didn't obtain any personally identifiable information, but she did glean the computer name (not the IP address) from the top of the photographed computer screen.

"That kind of information can add up to clues that can be compiled or combined with other information someone could get from other sources in the facility to build a plan of attack," she says.

As a follow-up, Finney added information regarding this potential security breach to DeKalb's employee orientation and security awareness programs, so people are at least aware of how risky it is to expose sensitive data for others to see -- and possibly photograph.

6. Skype and other consumer VoIP services

Another fast-growing consumer technology is Skype, a downloadable software-based service that allows users to make free Internet phone calls. In fact, 20% of the respondents to the Yankee Group study said they use Skype for business purposes.

In a business setting, the threat presented by Skype and similar services is the same as that of any consumer software downloaded to a corporate PC, Holbrook says. "Enterprise applications are highly scalable and highly secure, while consumer applications are less scalable and less secure," he says. "So anytime you download Skype or anything else, you're introducing a security risk that IT is uncomfortable with." For instance, the software can interact with every other application on the PC or network, potentially affecting the performance of every application.

Skype itself has issued at least four bulletins announcing security holes that users can patch when they download the latest version of the software. But because IT often has no idea how many users have installed Skype, let alone who has done it, there's no way for them to police these efforts.

The most secure option, and one that research firm Gartner Inc. recommends, is to block Skype traffic altogether. If a business chooses not to do that, it should actively engage in version control of Skype clients using configuration management tools and ensure that it is distributed only to authorized users, Gartner says.

7. Downloadable widgets

According to Yankee Group, consumers are using devices such as the Q and the Nokia E62 to download widgets that give them quick access to Web applications. These widgets can be easily moved to PCs, which, according to Holbrook, represent another entry point into the technology ecosystem that IT struggles to control.

The risk here is that these tiny programs use processing power on the PC and the network. And beyond that, any software that gets downloaded without being vetted represents a potential threat. "It's not more likely to be infected with a virus, but you're downloading something you might not have a lot of trust in," Holbrook says.

WebEx mitigates this risk using a threefold approach. It educates users on the risks of software downloads; it uses Reconnex to monitor what's installed on user PCs; and it disables some of the users' default access rights, restricting their download capabilities.

8. Virtual worlds

Business users are beginning to experiment with virtual worlds such as Second Life, and as they do, IT needs to become more aware of the accompanying security concerns. It would be short-sighted, Holbrook says, to simply block the use of these virtual worlds. "It's an application that people are just now figuring out how it can be useful in a business setting," he says.

At the same time, using Second Life involves downloading a large amount of executable code and putting it inside the corporate firewall, Gartner points out in a recent report. In addition, there's really no way to know the actual identities of the avatars who populate the virtual world.

One option that Gartner suggests is enabling employees to access their virtual worlds over the company's public wireless network or encourage them to do it from home. A third option is for companies to evaluate tools to create their own virtual environments that would be hosted internally within the enterprise firewall

Content Marketing 9 Emerging Trends

Content Marketing Technology Update: 9 Emerging Trends image NPL Blog1(Meg Sutton @ Business 2 Community) Content marketing is proving to be the MVP in today’s inbound marketing world, with 87 percent of today’s marketers implementing a content strategy to drive sales, establish thought leadership or increase brand engagement.

 

Journalism techniques and automation platforms that are processing and mining content are now fused together in this type of digital marketing. Because of this, marketers are exposed to content technology and intensive tasks such as content curation.

Tying these all together can get confusing, especially with complex terms such as semantic search, machine learning and natural language processing. However, the importance of learning these terms is growing tremendously for content marketers. Here’s why.

People want fresh, purposeful content and they want it in one convenient place. Let’s say that place is your website. Now, if they aren’t getting the content they want every day on your site, they’re going to look elsewhere – potentially disregarding you as a dependable source and giving a leg up to your competition. So, how can you get them to stick around? Upload original and curated content, fast.

Content marketers don’t always have the time, or resources, to call in an IT team. If you haven’t mastered the technology behind today’s digital marketing world, and can’t get to that IT resource in time, it can be a recipe for disaster. It’s imperative to understand what’s going on in these behind the scenes technologies to be the go-to source in your field.

Here are nine introductions to these intelligent technologies and how they can be implemented to advance your content marketing strategy and make you a better digital marketer.

Artificial Intelligence

Let’s start with the basics. Artificial intelligence (AI) is a broad term that describes intelligent software and computing, allowing a machine to “think” through programming specifications. Although the term is popularly relatable to robots or video games, AI stands as the backbone to many fields, such as natural language processing and sentiment analysis. These technologies allow content marketers and their constituents to search for and discover relevant content, collect consumer data and explore predictive analytics, to name a few.

Machine Learning

Machine learning is a branch of AI where machines can learn from data and predict potential outcomes. For example, machine learning utilizes predictive analytics to score leads, much like Infer or Lattice Engines, or to learn what content is the most relevant, like Curata. This leverages the potential of big data and allows marketers to focus on the information, or leads, that best match their service.

Natural Language Processing

The science of intelligently understanding or generating “natural language”, the language that humans write, is known as natural language processing (NLP). When a user searches “How much is a cup of joe?” their search results will include coffee prices. Even though “Joe” is also a common name, it doesn’t fit within the context of the sentence. NLP aims to understand the structure of human linguistics, not just the words themselves.

This is useful for content marketers looking to dive into the world of mobile marketing as part of their online marketing plan. NLP can be used to help generate content through automatic summarization, like Summly, on mobile so that the information presented is intelligently discovered, purposeful and presented on one page. Users seeking content on mobile devices don’t have the leisure, or space, to click from tab to tab.

NLP can also be used to help marketers understand customer inquiries and better educate their users, leading to improved buyer satisfaction and content congruence. The NLP experts at Q-go have engineered a new FAQ practice, by matching all of the same versions of a searched question with the same answer, i.e. “I need to change the address on my account,” yields the same result as “How do I update my address?” Information can be more easily found and buyer frustrations, and company costs, are kept to a minimum.

Curata’s ability to surface and analyze content within specific user guidelines, as well as our software’s ability to “learn” to improve search performance can be attributed to NLP.

Machine Translation

This is automated content translation. You’ve most likely used the free translation resources offered by Google Translate or Systran. These machine translation tools can cost-effectively transfer content into new markets, international and domestic, reaching a larger audience and increasing potential for improved brand awareness.

Sentiment Analysis

Just as the name implies, sentiment analysis is an automated NLP task used to determine the feeling or “sentiment” of a piece of content. By understanding the sentiment of content posted by potential consumers on social media, marketers have the opportunity to adjust and present targeted information to those users. Crimson Hexagon has the ball rolling on this application by offering social data analytics to discover how people think by analyzing what they’re saying on the Internet.

Information Retrieval

In order to avoid an information overload, search results must be tapered and precise. Information retrieval is the field of retrieving the correct information given a query. This is the science that Google and other search engines use to return the right content to the inquirer.

Without understanding how Google works, marketers can have a more difficult time optimizing content. A solid understanding of Google’s PageRank algorithm and search algorithm, most recent being Hummingbird, gives content marketers an exponentially better shot at reaching a wider audience. Content curation technologies, like Curata, use information retrieval to identify relevant content for consumers.

Document Clustering

The task behind document clustering includes the automatic grouping together of related content.

Document clustering proves itself useful for marketers because it often powers content recommendation engines to suggest other similar content for the searcher to read, improving the reach of content and usefulness for the user. This automation can also be used to suggest call to actions. BrightInfo modifies original content recommendations for individual site visitors, grouping your related information together to keep them around longer.

Collaborative Filtering

In short, collaborative filtering is a technique used to recommend content based on the content consumption habits of similar users. It filters through large amounts of data to obtain the most useful information available to the user. This technique is used by Netflix and Amazon – consumers who watched X also watched Y. Sound familiar?

This is helpful for marketers to understand how to optimize their content for sites that use collaborative filtering. It also proves as a great example of how content marketing and technology can be used to increase product awareness and drive sales.

Semantic Web/Semantic Search

Semantic web is a common data format for adding metadata to concepts and interpreting their relationship. This automation takes the intent of a query and polishes it to provide more customized search results. When a user searches “Veteran’s Day” on Google, not only does the date pop up at the top of the page in bold letters, but it is followed with a stream of history and news stories on the topic.

Semantic search is a beneficial tool for marketers because it can be used to find extended content related to the initial search, giving that associated content an expanded reach. However, the amount of human annotation required for semantic search is causing user interest to decline, as it cannot comprehensively “learn” from existing preferences to make the search process more efficient. Note the graph below via Google Trends, displaying the declining interest in semantic web since 2004.

Content Marketing Technology Update: 9 Emerging Trends image h0w4nhTP7vyxQUeVvPMv DUMtcYiY6sJasmMixhHPjgztd3uanr3m sNv4nEB GJN7pF2XA3WI3sTufH1pRTIotA82i0Ivm7jyhdx7BNZm XfwZGiFno5mmFauYj8CJqS8c

Now more than ever, it’s important to leverage the potential content marketing has for your business. Including content in your marketing strategy is essential to establishing thought leadership and staying ahead of the competition. In order to do this effectively, marketers must understand the technology behind the digital content they’re producing. This knowledge will make your content, and content curation, strategy more effective.

Ready to take the step towards content creation and technology integration? Download Curata’s 2013 Content Curation Look Book and see how these companies are using curation technology to enhance their content and take on the digital marketing world.

Copy And Paste Simplified

Do you spend a lot of time on your Windows XP researching on the Internet? If so, chances are that you probably spend time copying text from interesting WebSites and pasting Word for later reference. That's four separate keyboard strokes—[Ctrl]C to copy and [Ctrl]V to paste—each time you want to save snippets of text. Wouldn't it be nice if you could reduce each operation to a single keystroke?

If you have a Microsoft keyboard that provides a special set of buttons across the top, you can use the IntelliType software to reassign any of the special buttons to perform the copy and paste operations, and this is how we do it:

1. Download and install the most current version of the IntelliType software for your keyboard at the Microsoft Hardware site. (Keep in mind that this step is optional because the IntelliType software you have installed will allow you to reassign the special buttons.)

2. Access the Control Panel and double-click the Keyboard icon to display the Keyboard Properties dialog box.

3. Select the Key Settings tab, choose a key in the list, and click the Edit button to launch the Reassign A Key wizard.

4. Select the Choose From A List Of Commands option button in the Custom section and click Next.

5. In the Select A Command From The List scrolling list box, select the Copy command, and click Finish.

6. Repeat steps 3 through 5 and assign another key to the Paste command.

7. When you return to the Keyboard Properties dialog box, click OK.

Now, anytime that you want to perform a copy or paste operation, all you have to do is press the buttons that you reassigned.

Cover Letter for INMOTION by Greg Allen

There is a lot that my resume does not cover that you might interest you:
1. Every company I worked for, I introduced, promoted, trained, and supported Open Source solutions:
    a. ProNet Manufacturing Shop Floor System ported to LAMP stack environment
    b. LAMP servers for InterNet and IntraNet systems
    c. Debian and Ubuntu application, web, file, and print servers
    d. MySQL, PostGresql, Apache Servers as corporate database
Results: Major cost savings, increased capability, greatly increased reliability, maximum customer satisfaction

2. Active Technologies:
    a. 14 of my 60+ customers, I replaced their Microsoft Servers with Debian Servers
    b. 2 of my customers used OpenOffice in place of Microsoft Office
    c. I switch 10% of my users from Microsoft Outlook to Thunderbird because of expanded capabilities
    d. Active Technologies was a one-man company. I supported all 60+ customers myself, Windows & Linux
    e. My customers enjoyed having near 100% uptime and availability
    f. 20% of my work fighting and protecting against spam, spyware, Zombies, and training users to be safe.
Results: Major cost savings, increased capability, greatly increased reliability, maximum customer satisfaction

3. DesignHostSEO: I supported up to 300+ WebHosting customers.
    a. 60% Wordpress (provided custom websites, custom themes, plug-ins, and hosting)
    b. 10% Drupal (provided custom websites, custom themes, modules, and hosting)
    c. Very familiar with WHM, Cpanel, and WHMC Billing, ip, dns servers
    d. Email Accounts, SpamAssassan, Forwards, AutoSponders, POP, iMap, SMTP Troubleshooting
    e. File Manager, Backups, FTP, Clients such as FileZilla
    f. Webalizer, AWStats, Google Analytics
    g. Password protect files and Directories, chmod, chown
    h. SubDomains, Domain Redirects, Domain Zones, WhoIS, Gateways, DHCP, DNS, SubNets
    i. MySQL setup, phpMyAdmin, Cron Jobs, Network Tools
    j. Linux and WebServer software installs (Wordpress, Drupal, LibreOffice, Scan2PDF, Printers,     ClipGrab, Adom, Audacity, Blender, Darktable, Gimp, Handbrake, Inkscape, MuseScore, Open Shot, Pinta, phpMyAdmin, Putty, Sound Converter, Thunderbird, VLC, Wine)
    k. Video, Photography (Darktable), Music Recording Studio experience (Sonar, Presonus, Reaper). 
    f. Remote Desktop

4. I maintain both Linux and Microsoft servers, and desktops, at my home

5. I surf, sail, hike, play guitar and bass in a band (top-40, rock, jazz, R&B, country (oh no the c-word))

6. Priorities: God, Family/Friends, Work, Fun (balance) I feel good about myself, great family, we have a lot of friends, I always earn good money, and I have a LOT of fun.

7. Mission: To serve and totally delight people by providing tools and services that meets or exceeds their expectations, on-time, under budget. My mission, integrity, drive, energy, vast number of resources, and enthusiasm has made me successful.

Summation: From L.A. (Dude), Huntington Beach (Gnarly) In the South (Waz Up), Always exceed performance indicators, customers love me, zombies hate me, bourne in a bash shell, linux apache mysql php, dnsing, ftping, wordpressing, drupaler, that loves what I do, the people I do it with, and the good folks we do it for. I absorb new ideas and technologies like a sponge and put the good ones into practice. I Kik Azz Whilst training my associates to Kik Azz Too. Hire me please before I’m gone.

I also have some examples of my work:

Drupal website: Click To Enter Please

Wordpress Website: Click To Enter Please

Manufacturing Shop Floor System Using LAMP Stack: Click To Enter Please

Greg Allen – 8645296206 – gregunit@yahoo.com

Create Your Own Custom Icons

Are you tired of searching the Internet for icons to use for your shortcuts? You can use Windows XP's Paint program to create your own icons, and this is how we do it:

  1. Launch Paint from the All Programs | Accessories menu.
  2.  
  3. Pull down the Image menu and select the Attributes command.
  4.  
  5. In the Attributes dialog box, type 32 in both the Width and Height boxes and click OK.
  6.  
  7. To make the image easier to work with, click the Magnifier tool and select the level 8 magnification setting.
  8.  
  9. Press [Ctrl]G to add gridlines.
  10.  
  11. Use the tools and colors to create your icon.
  12.  
  13. Press [Ctrl]S and save the file with an ICO extension.

You can now assign your custom icon to any shortcut you wish.

Note: This tip applies to both Windows XP Home and Windows XP Professional.

Custom Company Email Addresses

In our recent post, we shared tips for finding custom domain names for your business when the domain name you want is not available. Once you select a domain name, you should also consider a custom email address. A custom email address helps you create a professional image and boosts your business’ credibility.

Another important reason for setting up customized email addresses for your business is the flexibility it gives you. For instance, when selecting your custom email address, you can select email aliases for various departments such as support@yourbusinessname.com or info@yourbusinessname.com. This provides more clarity to your customers when they communicate with you as opposed to routing all communications to one free email address. Email aliases will also direct to one inbox so that you can read and reply to all emails through the appropriate alias as well as categories inquiries.

When you have your own custom email addresses you also have full control over them. For instance, you can easily create new ones or remove inactive ones. When a new employee joins your company, you can easily set up one for him or her and create more custom addresses as you hire more staff.

Lastly, getting a custom email address for your business is important because it makes you and your business more memorable in your customers’ inbox. It helps to build a brand. Imagine your customers getting an email from alex40911@yahoo.com instead of alex@yourbusinessname.com. Which email do you think they are most likely to open and respond to? With alex@yourbusinessname.com, they instantly remember you and your business and can decide quickly whether they want to engage with you or not. Today’s customers are always on the go and are usually pressed for time. Therefore, making the best impression whenever you send email communications to their inbox can really give your business a competitive advantage.

Cut Cable TV in 2012?

Whether you already dumped your cable company or are entertaining the notion of doing so later this year, you’re a part of a constituency that is increasingly finding the notion of life without cable to be an attractive reality. Deliotte, an accountancy firm that follows business trends in media, released the results of their sixth State of the Media Democracy earlier this week and it doesn’t forecast sunnier skies for cable companies in 2012. According to the press release:

    A number of Americans have already cut, or are exploring cutting their pay TV connection entirely. Deloitte’s survey found that 9 percent of people have already cut the cord and 11 percent are considering doing so because they can watch almost all of their favorite shows online. An additional 15 percent of respondents said that they will most likely watch movies, television programs, and videos from online digital sources (via download or streamed over the Internet) in the near future.

Read More - Click Here!

DYI HD TV Antenna

Digital TV Coat-Hanger Antenna

Data Cables - Do It Right For Trouble-Free Service

Data Cables are the lifeline of your business. Most take them for granted because they just sit there and work day after day. After all, they are the fastest and most reliable means for moving data, surpassing WiFI by 1000%. But to get to that point; to earn the right to take your cable for granted, the cable has to be run correctly. This requires good planning and execution, and this is how we do it:

#1. Plan for the future:

With a certainty you know where devices are placed right now. But what about three to five years in the future? Cable is cheap, getting someone to run cable is not. So while the cable installation folks are there, have them make double runs to each location and to logical points on each wall. You may have one computer and printer per office now, but later you may have four people and four other devices. Do it right in the beginning. A little extra expense now is much better than tons of money latter.

Today, 100mb Cat 5 rules the cable world, but tomorrow you may want 1gb cable. Run 1gb Cat 6a cable now so that you don’t have to replace it later.

#2. Use same cable types for voice and data:

 Today your phone system might run fine on inexpensive Cat 3 cable. But the trend now is for VoIP phones that run Cat 5 or better cables. That is because a VoIP phone is really a computer and requires the same amount of bandwidth. Besides, the real cost is in the labor. So use the same cable type for both computers and phones.

#3. Use cable management

 I hear you. Punch Panels, ladder rack, and rack-based cable management adds cost. But it pays dividends when it comes to reliability and versatility. Fact is, point-to-point hand-made cable connections are 75% more likely to fail, and finding the failure on a point-to-point cable system if very difficult. Punch panels using commercial patch cables if very reliable and allow you to easily document your cable system. You not only minimize the chance for failure, but you also make it easy to find and fix if it does fail. At the minimum, use a Punch Panel!

Versatility is another plus for cable management. Moving a system to a new device is a simple matter of moving cables. Unplug from one port and move it to another. Cable management really makes “cents”.

#4. Never run Data cables parallel with electric wire

It is tempting sometimes. Computers require electricity and electrical wires usually go right where you want to put a data cable. But electric cables put out 60 cycle electromagnetic interference that can wreak havoc with a data signal. Rule of thumb, stay at least one foot away from 110 volt electric wire, two or more feel from 220v or 440v wire, and don’t follow a parallel path. If you must cross over an electric wire with data cable, do so at a right angle. And if you must run in parallel down a wall, push a little extra cable in the wall. That will cause the data cable to run in an “s curve” fashion, minimizing that chance of a parallel run, thus minimizing interference.

#5. Stay away from Noisy Electrical Devices and Lighting

Fluorescent, sodium vapor, metal halide lights and motors can emit a tremendous amount of electrical  magnetic interference. We measure a 3 foot aurora of electromagnetic interference around a typical fluorescent light, with spikes exceeding 15 volts within the aurora. Since data cable signal is usually measured in milivolts, placing data cable within the aurora will not only disrupt data signals, but it could also harm to computer equipment. Stay at least three feet away for fluorescent lighting and motors. Five would be even better. If you must cross a fluorescent light (do so at your own risk), do so at a right angle, and with as much clearance as possible.

#6. Stay within cable distance limitations:

It’s simple. Cat 5 maximum cable length with 100mb Ethernet and no electromagnetic interference is 320 feet. If you must exceed 320 feet, use a booster or repeater.

Use Cat 6a cable for 1gb bandwidth up to 320 feet. Anything else is a respite for disaster!

#7. Follow ALL laws, codes, and ordinances

 Chances are you won’t get caught, but there are far worse things than “getting caught”. Failure to adhere to local codes can create dangerous safety issues for people. Example: PVC-jacketed cabling is prohibited in air handling spaces. When PVC burns, it creates a toxic gas that can be harmful to your people and firefighters should there be a fire. I wouldn’t want that on my conscience!

 If you are caught, you risk fines and the likely hood of having to rip out and replace your cabling. Bottom line, make certain that your cable contractor is aware of, and follow ALL codes and ordinances.

 #8. Test and certify the cabling infrastructure:

 Once the cabling is installed, you should test every cable using appropriate tools to make sure that it will be suitable for its intended use. This includes verifying length and cable specifications matched to needs. If you need 1 gb transmission speeds, verify that the cable’s properties will support 1gb.

 #9. Follow Cabling Standards

There is a cabling standard named EAI/TIA-568-A and B. It dictates the method by which data cables are terminated. Not following the standard can diminish the results and effect bandwidth throughput and reliability. In addition, if somebody else has to come back later to work on the data cables, it will be much easier and quicker is the cables are to spec and standard. Much less costly too.

 #10. Not running a cable when you need one

 New installations: Run two cables together, for every 10 feel of wall. Adding cable later is very expensive as most of the cost is in simply getting the cable person out there.

You can use a switch and create additional cable drops, but that injects more equipment and additional cables into the system, resulting in increased points of failure. When this is done, it usually does not get documented, making is exponentially difficult to troubleshoot problem. Then there is the “swinger” where the cable works “most of the time” but Murphy’s law has the cable fail at the worst possible time, then working again when the cable tech comes to fix the problem. Run cable, not switches.

The same rules apply whether you are funning calbe in a manufacturing plant, office building, or home office. If you do this right in the beginning, you can count on many many years of trouble-free cable service.

Death By Printing

Here is the paradox: If we truly live in the electronic age and everything has become digitized, why, oh why, are we spending so much time printing? Printing is the bane of our existence, always rearing its ugly head when we least expect it. We spend good money for applications that reliably stores all of our data for online presentation, yet end-users spend hours printing screen dumps and filling file cabinets with paper. Isn’t that nuts?

Most of what’s printed out is thrown right into the trash can. A quick search on the internet reveals that numerous organizations and educational institutions report a sustained increase in paper usage highlighting the point that electronic systems aren’t decreasing the amount of printing by users, its increasing it. And as it increases, the more importance is placed on the printing infrastructure and the more money spent on printers, toner, paper, and chasing down myriads of printing issues.

To compound the problem, the cost of printers continues to go down whilst the quality of lower end printers continues to rise. So it’s becoming increasingly easier for staff to justify purchasing personal printers. Yet whilst printers are cheap, the toner, developer, and other consumables has climbed to the point where it can be cheaper to buy a whole printer than a toner cartridge (it is the hidden cost of consumables along with increased volume that drives the high price of printing).

Everyone can create a reason for why they “need” a printer of their very own. How? Most, managers play the confidentiality card. They can’t be expected to print performance reviews and other confidential documents on the departmental printer. Okay, fine. I can accept that. Plunk a printer down in their office. But then staff wine that they need printers for the mobile laptop carts. Reason – they can’t walk down the hall to the unit’s main printer. That would negate the benefit of having the mobile cart in the first place. Then the billing department reports that they require individual printers to print each customer’s account screen. Reason – it’s easier to read the printouts than the screen.

See where this is going? It’s a runaway train headed down a steep cliff. It appears we’ve spoiled our users into expecting technology coddling. Think of someone at home frantically looking for the TV remote instead of walking over and turning the channel (I’m not saying I’ve never done it.) I’ve got to have it now and I shouldn’t have to move to get it.

So what is wrong with so many printers scattered around the workplace? It complicates the printing infrastructure and can severely reverse the benefits of the paperless solutions you paid for. More Toner, paper, trash, plus the time spent printing, reading, then disposing of the paper. And talk about your security issues. Now your private information is subject to trash diggers and dumpster divers (unless you opt for the expense of a shredder and the time spent using it).

However, if you lead they will follow if they know why and how. Death by printing can be avoided by communicating the objectives, a little training, and a little monitoring of printing activities. The benefits will soon fill the bottom line instead of your trash cans.

Defrag or Buy New Eqipment - Daaaa

When a computer or network slows down, most will list the root cause as old or slow equipment. Some even opt to replace it with new equipment. However, What has been overlooked is that many of these problems occur because of fragmented hard disks on servers, laptops, and desktops.

What is disk fragmentation? In simple terms, fragmentation occurs during normal system use when users create, delete, and resize computer files on their hard disks. The continual creation and deletion of files causes file segments, originally created in contiguous or continuous blocks, to be scattered, or fragment into many pieces all over the hard drive, separated by other data blocks. The more fragmented the pieces become, the longer it takes for the computer or server to find and read the files, and overall system performance degrades.

A common analogy for fragmentation is to imagine a customer file that has been split among 20 filing cabinets. Wouldn't it be easier and faster to find the information if it were place in one contiguous file area?.

Excessive disk fragmentation can create substantial performance degradation on both servers and workstations. Some companies, unaware of the true source of the problem, may resolve such a performance issue with more expensive acquisitions of higher performance hardware. However, it is just a matter of time before fragmentation impacts the new machines as this solution only temporarily masks the real problem. Therefore, a company can address performance slowdowns without hardware purchases by utilizing a defragmentation policy rather than relying exclusively on more costly hardware upgrades.

ROI

An estimate of the savings associated with customers instituting a defragmantation policy was based on a one-year installation. Each customer was asked about individual installations of hardware and software. Research found that defragmented servers could effective serve 12% more users than unfragmented servers, and the defragmented servers experienced 10% higher uptime than non-defragmented servers. The estimated savings came to $195.20 per user per year with an ROI (Return On Investment) of 165%.

Bottom line – Let’s developed a defragmentation policy.

Desirable Employees

(Jeff Haden @ Inc) What criteria do you use when promoting employees? See if your list of qualities matches this one.

One of the most common questions employees ask is, "What can I do to get promoted?"

It makes sense: Often employees assume there is a key initiative, a specific action, a high-visibility project, or a critical role they should take on...and if they do, a promotion is just about guaranteed.

Maybe that is sometimes true. Maybe that's how you make promotion decisions.

Dharmesh Shah, co-founder of HubSpot (No. 666 on the 2013 Inc. 5000), takes a different approach. Dharmesh focuses on the employee's attitude.

His reasoning is simple. Attitude informs action. Attitude informs behavior. Attitude is the driving force behind every achievement, every accomplishment, and every success.
Attitude, where performance and therefore advancement is concerned, is everything. To Dharmesh, highly promotable employees:

1. Are humble, not arrogant.
Arrogant people think they know everything; humble people are always learning. Humble people ask questions. Humble people ask for help.
Humble people automatically share credit because they instinctively realize that every effort, no matter how seemingly individual, is actually a team effort.
Humble people are willing to take on any job, no matter how menial, because they realize no job is beneath them...and in the process they prove that no job is above them.

Ultimately, success is not limited by how high you can stretch but by how low you are willing to bend.

2. Are servants, not self-serving.
People never accomplish anything worthwhile by themselves. That's why great teammates make everyone around them better.
Take an unselfish basketball player: He makes his teammates better by delivering pinpoint passes in space, by boxing out, by setting solid screens, by rotating on defense...all the things that don't show up in the statistics but definitely improve the stats of his teammates.

Great leaders focus on providing the tools and training and culture to help their employees do their jobs better--and to achieve their own goals.

Great companies serve their customers first; they know that by serving their customers they ultimately serve the interests of their business.

The employee only in it for himself will someday be by himself. The employee in it for others may not get all the limelight...but the right people definitely notice.

3. Are optimistic, not pessimistic.
Optimists add energy to a situation or meeting or business; pessimists drain away energy. Optimists try more things and take more (intelligent) risks simply because they're focused on what can go right. Pessimists never get started because they're too busy thinking about what might go wrong.

Optimists don't feel they need to wait--to be promoted or accepted or selected or "discovered"--they feel they can, if they work hard, accomplish almost anything.

Best of all, optimism is infectious.

4. Think execution, not just planning.
Planning is definitely important, but too many shelves are filled with strategies that were never implemented.
The best employees develop an idea, create a strategy, set up a basic operational plan...and then execute, adapt, execute, revise, execute, refine, and make incredible things happen based on what works in practice, not in theory.

Success starts with strategy but ultimately ends with execution.

Employees who advance are certainly good at planning, but they are awesome at execution.

5. Think forever, not one day.
Real leadership isn't short-lived. Real leaders are able to consistently inspire, motivate, and make people feel better about themselves than they may even think they have a right to feel. Real leaders are the kind of people you follow not because you have to...but because you want to.
Other people will follow a real leader anywhere. And they'll follow a real leader forever because she has a knack for making you feel you aren't actually following--wherever you're going, you feel like you're going there together.

Creating that level of respect, that degree of trust, and that type of bond takes time. Great employees consider not just the short-term but also the long-term--and then act accordingly.

And in time, are placed in positions where they can truly influence the long-term success of their team, their unit, and their company.

6. Are volunteers, not draftees.
The best employees are natural volunteers. They volunteer for extra tasks. They volunteer for responsibility before responsibility is delegated. They volunteer to train or mentor new employees. They offer to help people who need help--and even those who don't.
Why is that important? Volunteering demonstrates leadership aptitude. Leaders are proactive, and proactive people don't wait to be told what to do. They're already doing it.

Successful employees earn their promotions by first working harder, just like successful businesses earn higher revenue by first delivering greater value, and like successful entrepreneurs earn bigger payoffs by first working hard well before any potential return is in sight.

Draftees expect to be asked. Draftees expect to be compensated more before they will even consider doing more.

Volunteers just do it--and, in time, their careers flourish.

7. Are self-aware, not selfish.
Self-aware people understand themselves, and that awareness helps them understand the people around them. Self-aware people are more empathetic. They are more accepting of the weaknesses and failures of others because they know how it feels to fail.

And they can lead with empathy, compassion, and kindness because they know how it feels to be treated with disregard, disdain, and scorn. They do everything they can to help others reach their goals, because they know how it feels to fall short.

Self-aware people solve for the team, the organization, and the customer--not just for themselves.

Every organization needs self-aware people in key roles. (What is a key role? Every role.)

8. Are adaptable, not rigid.
Things constantly change in high-growth companies. Inflexible people tend to grow uncomfortable with too much change and consciously--even unconsciously--try to slow things down.

Best practices are important. Methodology is important. Guidelines, procedures, policies...all can help a business run smoothly.

But anyone can follow guidelines and procedures. Great employees are willing, even eager, to change. Great employees respond to new circumstances and new challenges with excitement, not hesitation. Employees willing to adapt and adjust tend to advance more quickly because that is what every company--especially a high-growth company--desperately needs.

Otherwise growth will be a thing of the past and not the future.

9. Are teachers, not truant officers.
The best people like to teach. They don't hoard knowledge; they spread it. They share what they know.

A truant officer's job is to make sure people show up. A teacher's job is to make sure people learn.

Besides, truant officers tend to give "advice." Do this. Don't do that. Go here. Don't go there.

A teacher gives knowledge. A teacher helps other people gain experience, gain wisdom, gain insight. A teacher willingly and happily gives other people tools they can use.

In the process a teacher build teams.

And a teacher advances, because a true team builder is a rare and precious gem.

 

Desktop - Laptop - Netbook OR Smartphone

More and more people I know are using portables as their primary or only computers. Some of them are buying the big "desktop replacements" behemoth laptops with 17 or 18 inch screens, a boatload of RAM, big (for a laptop) hard drives and expensive amenities such as Blu-ray players. Several 18 inchers were released last year just before Christmas:

However, it seems that maybe there's a natural limit when it comes to the size people will buy when it comes to a computer that they're going to carry around with them. None of the major vendors has gone up to 19 inches yet. HP and Sony each offer one laptop model in the 18 inch size, whereas the largest on Dell's web site is 17 inches. Note that Dell did, however, release a massive 20 inch laptop a few years back, which came with its own built-in handle.

Although the Dell M2010 was impressive looking, at over 18 lbs. it was just too hefty for most people to lug around. You won't find it for sale on the Dell site today, and although I did get a chance to see it \"in person\" at a Consumer Electronics Show (CES), I never knew anyone who actually bought one. Maybe it was the weight - or maybe it was the $3500 base price. Or maybe it was a combination of the two. We also heard that the battery life was understandably shabby - around two hours at best. There comes a point, after all, when bigger is no longer better; it's simply bigger.

A desktop replacement makes sense if a laptop is going to be your only computer, but it seems quite a few folks are getting by these days with a lot less. The hottest selling segment of the PC market is still in netbooks - tiny machines with skimpy specs that sell at low prices. And for someone whose only need for a computer is to check email, surf the web and create a word processing document now and then, a netbook may very well suffice.

On the other hand, for about the same price ($350-400) you pay for a netbook that has 1 GB of RAM, a 120-160 GB hard drive and a 1.6 GHz Atom processor, you can get a desktop computer with 4 GB of RAM, a 320 GB hard drive and a 2.3 GHz AMD processor (specifically, I compared an Acer Aspire One 751h and an HP p6100z; both were advertised for $349.99).

I know which one I'd buy if it were going to be my only computer - but then, I want a full-fledged computer. A recent study showed that many people who buy netbooks are dissatisfied with their purchases afterward - and that the biggest reason is that they were expecting the performance and functionality of a normal computer.

http://www.osnews.com/story/21711/Study_Says_People_Dissatisfied_with_Netbooks

Whereas a desktop system will probably always give you more bang for the buck, it's not easy to pack up a tower (or even a mini tower) and monitor and take it on the road when you travel, although it's not impossible, either. My son recently took his Core i7 desktop with him to a chess tournament in St. Louis, but he was driving. It gets more complicated if you have to fly. This week he's in Spain for another tournament, and he has his laptop with him instead.

Just how important is portability, anyway? One could make the argument that it's actually less important to take a portable computer with you everywhere today than it was a few years ago, because so many of us have smart phones with data plans, which can perform many of the functions of a computer and fit in a pocket. If all you need to do is read email and surf the web, you can do that with a Windows Mobile phone like my Samsung Omnia, an iPhone, a Palm Pre, or one of several other high end phones running sophisticated smart phone operating systems.

In fact, my dream device is a handheld computer/cell phone the size of the Omnia/iPhone, with complete USB functionality (i.e. the ability to plug in a USB hub and attach a keyboard and mouse, even a USB hard drive) and a video out port to output to a regular monitor. And if someone would market small (12 inch or so) flat panel monitors with stands that fold down so you could easily slip them into carrying cases and take them with you, you wouldn't need a laptop/netbook for traveling at all.

Of course, most of us wouldn't want to have a phone as our only computer. But since we wouldn't need to buy a laptop or netbook, we could spend that money on a real (desktop) computer with much more powerful specs instead. If this scenario came to pass, I think desktop sales would start going up again, and the market share of portable computers (other than smart phones) would decline.

Desktop Mess to Desktop Clean

Desktop Spring Cleaning

It’s the first day of Spring! As you look to clean up other parts of your life (e.g. your home, your refrigerator, your yard) make the cleanup of your web design business a priority as well.

If you’re anything like me, you set aside time later in the week or month, promising yourself that you’ll finally take care of “business stuff”. And if you’re also like me, you often have to postpone those business maintenance tasks because new paid work opportunities come in. (Or you’re just exhausted and want a break from looking at your screen.)

But there’s no time like the present, so if you can spare it, give yourself at least one day off from work to tackle this spring cleaning checklist. Not only will it give you time to zero in on the areas that often go neglected in your business, but you’ll come out of it feeling refreshed and ready to get back to work.

 

Difference Between Analog and Digital for Transmitting Data

Analog vs Digital

Comparison chart

  Analog Digital
Signal: Analog signal is a continuous signal which represents physical measurements. Digital signals are discrete time signals generated by digital modulation.
Waves: Denoted by sine waves Denoted by square waves
Representation: Uses continuous range of values to represent information Uses discrete or discontinuous values to represent information
Example: Human voice in air, analog electronic devices. Computers, CDs, DVDs, and other digital electronic devices.
Technology: Analog technology records waveforms as they are. Samples analog waveforms into a limited set of numbers and records them.
Data transmissions: Subjected to deterioration by noise during transmission and write/read cycle. Can be noise-immune without deterioration during transmission and write/read cycle.
Response to Noise: More likely to get affected reducing accuracy Less affected since noise response are analog in nature
Flexibility: Analog hardware is not flexible. Digital hardware is flexible in implementation.
Uses: Can be used in analog devices only. Best suited for audio and video transmission. Best suited for Computing and digital electronics
Applications: Thermometer PCs, PDAs
Bandwidth: Analog signal processing can be done in real time and consumes less bandwidth. There is no guarantee that digital signal processing can be done in real time and consumes more bandwidth to carry out the same information.
Memory: Stored in the form of wave signal Stored in the form of binary bit
power: analog instrument draw large power digital instrument draw only negligible power
cost: low cost and portable cost is high and easily not portable
impedance: low high order of 100mega ohm
errors: analog instruments usually have a scale which is cramped at lower end and give considerable observational errors digital instruments are free from observational errors like parallax and approximation errors

Contents

Definitions of Analog vs Digital signals

An Analog signal is any continuous signal for which the time varying feature (variable) of the signal is a representation of some other time varying quantity, i.e., analogous to another time varying signal. It differs from a digital signal in terms of small fluctuations in the signal which are meaningful.

A digital signal uses discrete (discontinuous) values. By contrast, non-digital (or analog) systems use a continuous range of values to represent information. Although digital representations are discrete, the information represented can be either discrete, such as numbers or letters, or continuous, such as sounds, images, and other measurements of continuous systems.

Properties of Digital vs Analog signals

Digital information has certain properties that distinguish it from analog communication methods. These include

  • Synchronization – digital communication uses specific synchronization sequences for determining synchronization.
  • Language – digital communications requires a language which should be possessed by both sender and receiver and can should specify meaning of symbol sequences.
  • Errors – disturbances in analog communication causes errors in actual intended communication but disturbances in digital communication does not cause errors enabling error free communication. Errors should be able to substitute, insert or delete symbols to be expressed.
  • Copying – analog communication copies are quality wise not as good as their originals while due to error free digital communication, copies can be made indefinitely.
  • Granularity – for a continuously variable analog value to be represented in digital form there occur quantization error which is difference in actual analog value and digital representation and this property of digital communication is known as granularity.

Differences in Usage in Equipment

Many devices come with built in translation facilities from analog to digital. Microphones and speaker are perfect examples of analog devices. Analog technology is cheaper but there is a limitation of size of data that can be transmitted at a given time.

Digital technology has revolutionized the way most of the equipments work. Data is converted into binary code and then reassembled back into original form at reception point. Since these can be easily manipulated, it offers a wider range of options. Digital equipment is more expensive than analog equipment.

Comparison of Analog vs Digital Quality

Digital devices translate and reassemble data and in the process are more prone to loss of quality as compared to analog devices. Computer advancement has enabled use of error detection and error correction techniques to remove disturbances artificially from digital signals and improve quality.

Differences in Applications

Digital technology has been most efficient in cellular phone industry. Analog phones have become redundant even though sound clarity and quality was

Analog technology comprises of natural signals like human speech. With digital technology this human speech can be saved and stored in a computer. Thus digital technology opens up the horizon for endless possible uses.

Disaster Preparation On A Tight Budget

 

Photo

Photo © Pixsooz - Fotolia

How can Americans lose water, electricity, or other vital utilities through no fault of their own? Let me count the ways: tornado, derecho, El Niño, nor'easter, hurricane, tropical storm, thunderstorm, windstorm, rainstorm, snowstorm, ice storm, hailstorm, earthquake, volcano, lightning strike, water-main break, sinkhole, chemical spill, random bad drivers crashing into utility poles, and additional options I can't currently recall.

 

The point is that no matter who you are or where you live, you should always be prepared for the chance that your power, water or other vital utilities might disappear for awhile, possibly without prior warning.

When you search online for information about emergency food storage, emergency power sources, disaster preparedness, or similar topics, the results are usually cluttered by pages catering to so-called “preppers” or “survivalists” -- people preparing for the possibility that modern civilization will fall and its life-sustaining amenities permanently go away.

Not that there's anything wrong with preparing to live entirely “off the grid,” if you want and can afford to do so. But full-fledged off-grid living is vastly more expensive than preparing for a temporary disruption, which is why those survivalist-prepper sites aren't necessarily useful for people simply trying to make it though a relatively brief storm-generated power outage or similar problem.

Surviving without utilities

Like more and more Americans these days, over the past few years I've weathered several storms resulting in days or even weeks of weather-generated utility loss. I spent a cold wintry week without heat or electricity after the Halloween blizzard of 2011 killed the power to more than half the state of Connecticut. This happened a mere two months afterHurricane Irene knocked out the power to more than half the state, which happened only a couple weeks before some unnamed mid-September rainstorms brought down power lines and washed out roads all throughout my own city.

Capable of taking a hint, I moved to northern Virginia the following summer and hadn't even lived there a full week before that monster “derecho” storm of 2012 walloped the region and — you guessed it! — knocked down power lines for miles in every direction. I've trudged  through a handful of shorter outages since then.

The one good thing about repeated utility disruptions is that trial and error makes you progressively better at handling each one. It also drives home the lesson that the time to prepare your emergency kit is right now, before you think you'll need it, because once you know for certain that a power-killing disaster is headed your way, the local stores have already sold out of everything useful.

Storm preparation essentially falls into two categories: steps you must take to protect your home itself from being damaged or destroyed, and preparations necessary to live in your home after some or all of its utilities are cut off.

My colleague Stacey Cohen has already explained how to protect your house from a storm. Once you've done that, living in the house after the storm but before utilities are restored requires additional preparation.

Preparing your emergency supplies

The Federal Emergency Management Agency, or FEMA, recommends that every American have a disaster-supplies kit capable of sustaining your household for three days. FEMA still promotes this three-day rule more than 10 years after Hurricane Katrina destroyed much of New Orleans and demonstrated that in the event of a real catastrophe, a mere three days' worth of supplies won't be remotely enough. I personally keep at least a seven-day supply for my own household, and recommend you meet the same minimum.

But what necessities (and even luxuries) should that seven-day kit contain?

Emergency power generation

If you have the money to buy a generator, dedicated outdoor space where you can safely operate it, and additional space to safely store the fuel, then buying a generator might be a good option for you. But it generally isn't a safe option for apartment or condo-dwellers, even those with outdoor balconies or tiny fenced-in backyards. I've muddled through my various electrical power outages without one.

Emergency lighting: lanterns, flashlights, or candles?

Even with a home power generator, you'll still want battery-operated flashlights and lanterns. The cost of their batteries is far cheaper than the cost of fuel to run a generator to power regular home electric lights.

If you need to light your path while navigating through a large, dark space – such as walking outside at night when all the streetlights are dead – then a flashlight is better than a lantern. Flashlights focus their light in one direction whereas lanterns shine everywhere, including in your own eyes, which wrecks your night vision and makes it much harder for you to see whatever's in the darkness beyond the lantern-light.

For lighting a room the reverse is true: a lantern shining in all directions is better than a flashlight illuminating a single spot.

Of course, candles and oil lamps can also be used for lighting, but they are fire hazards and also generate a good deal of heat (which can be useful in a wintertime blackout, but unpleasant in the summer).

Battery storage

Most LED flashlights and lanterns these days are powered by lithium-ion “button” batteries, though you can still find some powered by alkaline batteries (usually AA, AAA, C or D-cell). Alkaline batteries are far more prone to corrosion than button batteries, especially in humid climates. That's why you should never store emergency radios, lights, fans, or other appliances with their alkaline batteries in them. (I accidentally ruined a very nice battery-powered camp lantern because I foolishly forgot this rule, stored the lantern with its D-cells in place, and some months later discovered nasty green corrosion had completely destroyed the lantern's battery compartment.)

Now I keep my battery-operated appliances in a dedicated emergency-storage box, with any pre-used batteries in plastic sandwich bags duct-taped to the appliances: this radio was powered by the two D-cells in the attached baggie, that fan by the four attached D-cells, and so forth.

Do not “mix and match” batteries. Different items drain battery power at different rates, which is why you must, for example, make sure that the two D-cells you used in your radio are henceforth only used in that radio, not in the D-cell lantern or fan, and vice-versa.

Water storage, when money and space are limited

If you're in an area where a hurricane's forecast to strike, the authorities will urge you to fill bottles and jugs with water now, in case storm runoff contaminates or cuts off public water supplies. You should also seal your bathtub with a leak-proof plug and fill it with water, for flushing toilets. Add some bleach to the bathtub water, so it doesn't turn into stagnant bacterial soup.

Of course, buying and storing bottled water is the easiest emergency-water option – if you have the money and space for it. The minimum clean-water storage recommendation is one gallon per person per day, though people in hot climates can need far more than that in order to account for perspiration.

In my household, we often wash and save clear plastic juice bottles with screw-on caps for water-storage purposes. Some of these recycled bottles are in my fridge and freezer right now, primarily as an energy-saving measure: keeping ice frozen, or cold water cold, requires less electricity than cooling an equivalent volume of empty air.

But should you suffer a short-term power outage, when you can hope power is restored before your frozen food thaws and refrigerated food goes bad (so long as you don't open the door and let the cold air out), that ice or cold water helps prolong the time you have before losing the food. And in the event of a long-term outage, after the food in the fridge has been written off, those bottles now hold emergency water supplies.

It's always good to have more water-storage capacity than you think you'll need (and if you don't need it, your neighbors might). Empty plastic juice or soda bottles are very lightweight, but also very bulky. I don't really have the floor or shelf space to store these empty bottles, so I keep them in a clean, never-used garbage bag thumbtacked to the ceiling of my storage closet.

However: while you can wash and re-use juice or soda bottles for water storage, do not try doing this with plastic milk jugs or dairy bottles. No matter how thoroughly you wash those, you can't ever be certain you removed all traces of milkfat and milk protein, so a bottle that looks clean can still be a breeding ground for disease-causing bacteria.

Other drinks

You should have individual-size servings of your favorite juice or soda over and above your drinking-water supply, because a power outage is boring enough without drinking flavorless lukewarm water, too. If you have young children, you should also consider getting boxes of no-refrigeration-needed milk for them. As with all food and drink purchases, keep an eye on the expiration dates and rotate/replace your stock as required.

Bear in mind: as a consumer-news source, this website usually urges food and drink shoppers to check the unit prices and buy the lowest one — for example, buying a gallon jug (128 ounces) of fruit juice for $4 is much cheaper than paying $2 for a six-pack of seven-ounce single-serving juice boxes or cans (42 ounces).

But that assumes you have a working refrigerator to safely store that gallon of juice after you open it. In a power outage with no refrigeration, any canned or bottled food or drink must be consumed soon after opening, or it will go bad. So, unless you have an unusually large household big enough to consume a “giant economy size” in a single sitting, your emergency food and drink supply should primarily consist of small single- or double-serving sizes, even though they cost considerably more than larger bulk purchases.

Food

The obvious choice for emergencies is food that can be stored without refrigeration and eaten without cooking: crackers and peanut butter; bread; canned fruit; granola or energy bars; pudding or fruit cups, and the like.

If you do want to cook, remember the first and most important rule of cooking in a power outage: never, under any circumstance, try cooking indoors with a barbecue grill, liquid or gas-powered camp stove, or similar items. They all generate toxic fumes or exhaust, and can only be used in outdoor settings where the fumes can dissipate.

During my week without power, I didn't do any true “cooking,” in the sense of transforming raw ingredients into something edible. However, I was able to warm up various canned heat-and-serve items over a small can of ethanol gel of the sort used under chafing dishes. The key word is “warm”; ethanol gel is good enough to heat a can of ravioli, but won't work for boiling water or anything like that.

And, of course, you'll want a manual can opener since your electric one won't work.

Dishes, utensils and cookware

If you lose power but still have clean (though cold) running water, you can use your regular dishes, cookware, and utensils and, in a pinch, hand-wash them with dish soap and cold water. But if you suffer a loss of power and clean water, you can't even do that, so make sure you have plenty of disposable utensils and paper plates on hand. I also keep a supply of inexpensive disposable aluminum chafing dishes just the right size to heat a can of soup or baked beans over ethanol gel.

Keeping things clean

If you're generating far more and far dirtier garbage than usual, say because a lack of running water means you can't wash dishes or even rinse out dirty cans before throwing them away, it's useful to have several small plastic bags to wrap these dirty cans and paper plates airtight. If you leave dirty plates and cans exposed to the open air too long, they're likely to attract bugs.

If you live in an area where stores still give customers disposable plastic shopping bags, keep a few dozen of them on hand for this purpose. Otherwise, you'll need to buy some.

Either way, if you lose water you'll also want a supply of pre-moistened towelettes or baby wipes to keep yourself clean – not nearly as good as a real bath or shower, but far better than nothing if you lack water for bathing.

Home climate control

If you get lucky, your extended power outage will coincide with a period of clement temperatures – not too hot and not too cold, so lack of heat and air-conditioning won't be a problem.

You probably won't get lucky.

For outages in too-hot weather, you always want some battery-operated fans on hand: ideally, a minimum of one fan for each person in your household, plus an extra couple of fans for drawing air in or out of open windows. Most such fans require alkaline rather than lithium batteries, so remember not to store the fans with the batteries inside.

If you live in a hot but dry climate, it's quite easy to use fans, water, and thin, damp cloth to jury-rig a makeshift “evaporative cooler” or “swamp cooler,” which works because when liquid water evaporates, it draws heat away with it. If you plan ahead, you can also buy supplies to make a dedicated emergency swamp cooler for less than $100.

Unfortunately, swamp coolers don't work in humid climates; in such conditions, adding humidity to the air only makes you feel warmer.

Generating heat in a cold-weather power outage is much easier, even if you lack such amenities as a fireplace or wood-burning stove. During my post-snowstorm week without power, when nighttime temperatures dropped to the teens or low 20s, I closed off the bedrooms in my apartment and managed to get the common areas up to 66 degrees at night, by burning vegetable-wax tealight candles in space heaters I'd made from coffee cans.

However, mine is an all-adult household. If I lived with small children, rambunctious pets, or anyone else incapable of showing proper respect for fire, it would've been far more difficult to safely use coffee-can space heaters.

Cash in small bills

If the power's out in your area, the ATMs will stop working — and a lot of businesses, even if they manage to stay open, won't be able to accept credit cards. During the week my whole region lost electricity, there were a couple stores and sandwich shops in walking distance that stayed open on generator power, but until the regular power came back they operated on a cash-only basis.

Medicines and medical supplies

If you or anyone in your house requires regular doses of medication, always have at least a few days' worth on hand, if possible.

Whether you require medication or not, you should also have a well-stocked first aid kit available. Plenty of companies will sell you a pre-stocked first aid kit, but in most cases, when you look at what those kits actually contain, it's much cheaper for you to buy the individual components and put a kit together yourself.

That's usually the case for any pre-stocked emergency kit offered for sale: anything from a three-day emergency food supply to an all-purpose lost-in-the-wilderness survival bug-out backpack might well be good to have, but you'll get a better kit for less money if you put it together yourself.

And put this kit together now, before you need it, because if you wait until you do then it'll probably be too late.

Do You Need A Screen Saver

(Steve Yates MITS) A long time ago we answered this question for CRT monitors, however it bears re-visiting with the recent popularity of LCD monitors. The answer may surprise you.

Screen savers were invented many years ago to prevent "burn-in" on monochrome (green or amber) monitors. Burn-in happens when one image has been displayed on the monitor for a long enough time that the phosphors on the monitor are permanently "burned" or marked with that image. This is most obvious when the negative of the image is still visible on the screen even when the monitor is turned off. Modern screen savers have gone beyond the basic blank screen and added animation, sound, and cartoon characters to screen savers. This is, of course, to sell more of them.

While color CRT (picture tube) monitors generally do not require a screen saver unless they are left on for a significant period of time, LCD monitors are in fact subject to burn-in. Samsung, a manufacturer commonly used by ITS, recommends that if a burned-in image is visible on an LCD monitor the user should unplug the monitor for 48 hours and that will ususally clear up the problem. Users of CRT monitors are not as lucky; burned-in images on those devices tend to be more permanent.

ITS still sees some screen savers that actually cause problems. For instance, some fancy screen savers use so much processor time that other functions on the PC grind to a halt - therefore we recommend that our clients never run animated screen savers on a server. We have even seen this slowdown happen using the generic screen savers that come with Windows.

Therefore ITS recommends users with all monitors stick with the plain "blank" screen saver, use the power settings in Windows to turn off the monitor after an hour or two of inactivity, and/or just turn off the monitor. After all, if a monitor is going to be unused long enough to cause burn in, it may as well be off.

Read More - Click Here!

Documentation With Video

Video Examples

Table of Contents

Expert Interview Recorded In Studio
Expert Interview Recorded On-Site
Expert Interview Recorded Online
Demonstration: In-Studio
Demonstration: On-Site
Recorded Lecture/Presentation (With and Without Picture-in-Picture)
Recorded Lecture with Images in Background
Student/Faculty Discussion
On-Site Recording of Lecture/Presentation by an Instructor or Others
On-Site (Local) Recording of Lecture/Presentation by an Instructor or Others
Lightboard
Animation
Whiteboard Animation


Production Note: The creation of all of the examples below can be achieved through the collaboration of the Online Education Initiative. For other productions, Duke Media Services offers many of these services to the general community.


Expert Interview Recorded In Studio

9/11 and Its Aftermath — Part I
David Schanzer, Associate Professor of the Practice, Sanford School of Public Policy

What are the benefits and challenges of this type of video?
This type of video provides a high-quality, professional recording of conversations with important individuals on key topics. The surroundings are controlled, so the audio, lighting, and the editing are good by definition. Depending on how the interview is structured, excerpts or segments may be used in more than one course in a variety of ways. There may be challenges getting the expert you would like to interview to the studio, if they are not local to you. Also, there will be a cost associated with hiring the professionals, unless you have free access to such staff from your department/school.

How was this created?
As the name implies, this video was created in a recording studio (at Duke Media Services), with the help of professional videographers. This was a three-camera shoot, with one camera recording a wide view (showing both participants), and one recording close-up on the faces of each participant. The participants prepared an outline of topics and questions and did not use a teleprompter. (However, if they had chosen to do so, they would have needed to create a finished text file with the script they planned to use, to be loaded onto the prompter before the recording started). The participants talked until they completed the interview satisfactorily; if any question or answer was not well-spoken, the participants paused briefly and then re-started that question or answer.

The shoot used “live camera switching” to capture footage from individual cameras as selected on-the-fly during the live session, by a videographer working in a control room. This technique reduces post-production editing, but increases the cost of shooting because an additional staff member is needed to handle the switching. (An alternative technique would be to record the full interview on each camera, and then edit together segments as needed, post-production.) Once the recording was done, titling was added and additional minor editing was done to create the final file. The participants reviewed this version to confirm it was satisfactory.

How much did this cost?
The 15-minute video from which this 30-second clip is extracted was one of several videos recorded during a one-hour studio session. The studio session cost approximately $610 to shoot and edit; therefore, on average, this video example was $11/minute to shoot and edit.

For this interview, the expert was local at Duke and did not require any travel costs to the studio, nor did he request any honorarium for his time.

Back to top


Expert Interview Recorded On-Site

Innovation and Design for Global Grand Challenges
Dr. Alex Deghan, Senior Visiting Fellow in the Office of the President at Duke
University

What are the benefits and challenges of this type of video?
The benefit of recording these conversations on-site rather than bringing the expert into a live face-to-face class includes cost savings (saving the expert’s travel costs), and the ability to record on the expert’s schedule at their location. The participants also have the opportunity to highlight objects, equipment, or other features at the site that cannot be taken into a studio setting. On-site recordings may not be as controlled as recordings done in a studio, but the use of a professional crew can mitigate any issues with audio and lighting and create a high-quality, professional recording.

How was this created?
This example was recorded at the Duke Lemur Center using two camcorders and a lavalier microphone for each speaker. A simple light kit was used to ensure good lighting on the speakers. The video was recorded straight through, with the speakers re-starting any questions or answer which they didn’t like. Video editing after the shoot cut out any mistakes and created a final video file (which the speakers reviewed one or more times, until it was satisfactory)

How much did this cost?
This 30-second clip was extracted from a 20-minute-long video. An on-site interview similar to this one, shot and edited by a professional crew, would cost approximately $300.

Does The Coachella Tupac Hologram Really Work

The "resurrection" of rapper Tupac Shakur wowed audiences at the Coachella music festival. But the illusion isn't a hologram, as some have reported -- it's actually a 2-dimensional video cleverly projected using technology based on an old theatre trick. 

Tempe, Ariz.-based AV Concepts orchestrated Tupac's performance using Musion Systems Ltd.'s Musion Eyeliner setup that was able to project an animated version of Tupac (created by visual production house Digital Domain) onto a screen that appeared invisible to the audience.

Read More - Click Here!

Does memory card speeds matter

Read and write speeds for SD memory cards are measured in classes. A higher class means a faster card, so you'll see Class 2, 4, 6 and 10. Stick with 4 or 6 for photos and 6 or 10 if you shoot video with your camera. If your camera supports Class UHS-I, that's an even faster card. For CompactFlash cards, you'll see ratings like 50x, 133x, 266x, 300x and 600x. Take the speed and multiply it by 150KB per second - so 133x would be about 20 megabytes per second. 266x is a good speed for most people. Keep in mind that some CompactFlash makers advertise read speed instead of write speed. Make sure you know how a card is measured before you buy

Domain Name Auto Renew Can Save Your WebSite and $35,000.00

Recently, a savvy Web entrepreneur made nearly $35,000 from of a $15 domain. Seems like a great story, unless you'e the one spending a small fortune to buy back a domain that used to be yours. This is just one of many frightening tales of domain expiration. People spend years building an audience or a customer base for their site, only to lose it all because they failed to renew the WebSite domain name.

The saddest part of these stories is that all of the heartache and expense could have been easily avoided. Most domain registrars offer a free auto renew service. This prevents your domain from expiring by automatically renewing it just before the expiration date by using a credit card your registrar keeps on file. It's so simple, safe and effective, it’s a wonder that not everyone uses it.

Of course, there are still those rare occasions when the credit card you have on file with your registrar expires between the time of purchase and your auto renew date. Fortunately, Active Technologies & Designhostseo.com have another solution for those who don't want to take any risks with their domain. We monitor domain registration dates and notify you 30 days in advance so you never have to worry about loosing your domain AND you don't have to worry about credit card and personal information floating around the internet.

Drupal Content Management System (CMS)

Why Content Management System (CMS)? - Why Drupal? For one thing, even folks with simple websites want the ability to modify, add, change web site content without paying through the nose for it, or learning a programming language.

Homeowner Associations - non-profits want all the bells and whistles that the big boys have with little or no budget to pay for it. In addition, they may want several people to be able to modify, add, change content such as newsletters, budgets, minutes, with no programming experience. In addition, they may desire protected areas for homeowners and other areas for board members.

Large Companies may want to bypass their IT department to get something done fast with little or no budget. Content modify, add, change may come from a world-wide network of folks and in different languages. The site may include areas for the general public, secure areas for customers, distributors. The site may include moderated forums, knowledgebase, technical support, rss news feeds, and sales articles, troubleshooting routines, and a repository of secure documents, catalogs, shopping carts, data acquisition, and program distribution.

Fact is, anyone from any category may want their website to do just about anything. And as needs change, why be strapped down to an obsolete system?

Why Not A Proprietary Solution? Why shouldn't you use “Amazing Web Company's proprietary CMS?” Look at how shiny it is! They talk coding geek! They must know what they're doing, right? Good programmers don’t necessarily make good businessman as Proprietary CMS vendors life expectancy is only about two to three years.

There are literally thousands of content management systems out there. It seems like every web development firm has their own beautifully branded version. Each blatantly promises to make it easy for you, the client, to update your own web site, even if you are as hopeless as my Chihuahua on a computer. As you know, the devil is in the details. Problem is, most CMS companies never last long enough to deliver on their promise.

Our Criteria - We knew we wanted an open source CMS that would be actively supported, flexible, and robust. It needed to be able to support our SEO (Search Engine Optimization (Google ranking) work, and also there had to be enough people working on it so that we knew it wouldn't be obsolete next year.

There are plenty of articles comparing CMS's, so I'm not going to go here. Suffice to say that after carefully reviewing the top systems, we chose Drupal for its combination of flexibility, scalability, world-wide support community, speed and maturity. Most importantly, though, we wanted something that would satisfy our customers.

Why Drupal? - But don't take our word for it. Drupal is one of the most popular content management systems on the Internet and is much more robust than it's competitors. According to estimates, there are an excess of 50,000 sites using Drupal. These include Amnesty International, MTV UK, Sony MusicBox, The Onion, Spread Firefox, and several political sites such as Vote Hillary and Draft Obama (you may or may not like their politics, but their websites are “state of the art”) IBM, NASA and Yahoo all use Drupal for their intranets (see "Why Yahoo! chose Drupal for an internal site"). NATO and the World Bank also use Drupal.

Drupal is a completely open source platform built on the LAMP (Linux, Apache, MySQL, and PHP (the engine that powers the internet and Android SpartPhones) and has a clean, focused core code base. It's really an application framework, which makes it easy to add modules for features without touching the core programming code, leaving the site safe for quick updates when needed.

Unlike many other CMS programs, Drupal code is compliant with XHTML and Cascading Style Sheets (CSS) instead of using HTML tables to theme pages. It also supports a broad range of SEO techniques, making it easy for us to optimize sites for search engines. In addition, it works well in a shared hosting environment (the least expensive, most common web hosting packages).

Most importantly, Drupal has a large, friendly, worldwide community of developers who work on it, write modules to make it able to do more, and are there for support. The community is robust, VERY active and lead by some really smart people, which means that there are many sources for Drupal-related services if the need arises in the future.

We Choose Drupal! - So there, I've said it: we love Drupal. We've been working with it for a couple of years, and it's been a dream.

Eclipse 2017 Not Worth The Risk

Eclipse 2017 Not Worth The Risk

Eight Reasons To Fire A Customer

Nothing is more valuable than having good customers with recurring business, especially in these times of economic distress. Therefore, always do our best to correct any problems in the client relationship. However, some business is just bad, and some customers hurt your company rather than enhancing your bottom line. The following are eight scenarios where you might consider firing your customer:

#1: They insist that you do something that's unethical or illegal. Sure, you both might be able to get away with it, but if you compromise your integrity, your customer will never trust you. You customer will soon figure out that If cheat for them, why wouldn't you cheat against them? More importantly, you would degrade yourself in your own eyes. INTEGRETY IS EVERYTHING! Have some self-respect and bid the customer adieu.

#2: They ALWAYS pay late. You can never allow late payments to become the status quo; customers will only get later with their payments. Naturally, you should take steps to improve your customer's payment habits first, but if they refuse to reform, say au revoir.

#3: They repeatedly angle for a reduced fee. Your rate is clearly stated in your contract, which they signed, yet on every project they ask you for a reduction for one of a number of fabricated reasons. They all translate to one real message: The client doesn't think you're worth what you charge. If you can't convince the client of your value, and you have other clients who clearly get the picture, it's hasta la vista (however, if a lot of your customers have the same issue with you, it may be time to take a hard look at the service you provide, and the manner in which you provide it).

#4: They try to get you to work for free. Perhaps they bought this machine from you but did not pay you to set it up or train them on how to use it. Instead, they call 20 times a day with setup questions that they expect you to answer for free. Worse yet, they bought the machine from another company! If the client can't comprehend those points, then arrivederci.

#5: Their organization is structured to prevent success. Policies, procedures, and the channels of communication are either poorly designed or abused to the point where your failure is guaranteed. It's your duty to point out these flaws and help your client try to correct them. If they just don't get that there's a problem here, auf Wiedersehen.

#6: The personalities involved are incompatible. I'm a likable guy — just ask my wife (oh, forget I said that). Really, though, I try to get along with everyone. But it's just hard to work with some people especially when the customer is abusive, constantly uses foul language, or is fixated on sexually explicit jokes and stories. When the only reason why you would ever subject yourself to the tortures of being in their acquaintance is the money, you either need to get a lot of money or say sayonara.

#7: They demean or insult you. In any relationship, insults are the first step in a plan (conscious or not) to lower your status. INSULTS SHOULD NEVER BE REPAID IN KIND! Rather than establishing respect, you have simply reduced yourself to their low level! This is a bad way to start a client relationship, where mutual respect should be earned and given. If the mutual respect thing just doesn't happen, it may be time to retreat from the battle and find a new customer.

#8: They require that you do things the wrong way. In any long-term engagement, there will inevitably be some disagreements over technical approaches. Sometimes you just have to do what the customer wants, even if you vehemently disagree. But that should not become an everyday thing, or you'll just hate your work. Perhaps you and your client are not a good fit. Dosvidanya.

How do you pull the plug on a customer? If your work consists of a series of small projects, you may be able to complete your current task and then politely say “no, thanks” to whatever else they offer. Or you could change your terms on future projects to be so lucrative for yourself that even if they don't get your not-so-subtle message, you won't mind. Just price yourself out of the game.

You could us the straight forward approach and tell you customer the reasons why you no longer want to work with them. It can be tricky because you don't want to burn more bridges than strictly necessary. Keep emotions out of it, and stick to the facts. It's more useful than concealing your complaint because it might help the client to improve, and it might help you, too. By putting your reasons into a dispassionate explanation, you might reveal some shortcomings of your own that contributed to the problem. Or best of all, it might help you both to fix whatever you considered beyond hope. However, in most cases, this approach ends badly!

Last thought: If you are the only source of technical support or materials... NEVER NEVER NEVER leave your customer in the lurch (other than non-payment)!

Einstein's Biggest Fear Came True

Albert Einstein Biggest Fear (9 Pics)

                                                                                             ------------------------------------------------------------------
 
It's here

Elevator Speech VS "the Unhook"

Elevator speech is a good tool to have and use. But I find the “unhook” to be far more powerful. Several weeks ago a fellow networker told me about how he used his professional and highly polished elevator speech, expecting the usual stellar response. The next person in line simply stood and said, “I survived a suicide attempt”. He “unhooked” the entire audiance and plugged them into “himself”. Nobody remembered anything anybody else said that day. He was mobbed at the end of the session and quickly filled his appointment book. Harness the power of the “unhook” (before everybody else does), and you really have something. For more information look up Yeager Smith on LinkedIn. Over 30 years of sales, I have never sold anything in an elevator. Greg Allen – Active Technologies

Employee Action Simply Unconscionable

An employee (not one of our customers) was moved to a less prestigious position but received the same pay. Both jobs were performed in an air-conditioned office in an eight hour day that began at 7:00am. . However, the new job offered little upward potential and prestige. The employee was simply moved to a position with a greater need in the billing department.

The instructions were simple, print the invoices, stuff the invoices in a window envelope, run the envelope through the envelope sealer, then run the envelope through the stamp machine.

Sounds simple enough to me. Easy job; no headaches. In fact, this person did the same job two years ago. What could go wrong?

Well, I’ll tell you. Rather than placing the stamped envelopes in the mail basket, the employee crammed them into a cubby above the desk where they sat for five weeks. AR balances were rising whilst receipts took a dive.

Mean time, the IT guy had to add phone lines in the area, opened the cubby and invoices began spilling out onto the floor. As the IT guy feverishly re-stuffed the invoices back into the cubby, the CFO (Chief Financial Officer) noticed the ruckus down the hallway and perused by to see what the excitement was all about. You should have seen his face when he realized that over 1.7 million in invoices where “here instead of there”! Ready to be mailed instead of ready to be paid! Good thing you didn’t hear what he said!

When asked why, the employee responded “You never told me to mail them”.

Should this employee “get off on a technically”?

In my book, employees should exert themselves mind and body as agreed for the companies benefit during working hours. And if you have a question or see a gap in the process, it is the employee’s duty to ask!

Ethical Ways to Increase WebSite Traffic

If you have a product you're really proud of, it should speak for itself. But when it comes down to it, you still need to get customers on your website in the first place — especially if you're running an e-commerce operation.

We asked a panel of 13 successful entrepreneurs to share their best advice for generating high-quality, organic search traffic to their business websites. Here's what they had to say:

1. Focus on the Long Tail

lawrence watkinsIf you are a new site, it can be difficult to go after popular keywords right away. I find it better to write many quality articles on very specific keywords than to go after the ones with more search traffic. A great benefit of staying focused with long-tail key terms is that they usually convert better, as well. To help with this, I recommend a tool called HitTail, which drives targeted search visitors to your website by focusing on the most promising organic keywords in your existing traffic.

- Lawrence Watkins, Great Black Speakers

 

2. Stick Around

Alexandra LevitThe longer you are in business and producing quality online content, the more likely you are to pop up in search results for all related keywords. Starting a blog or churning out a bunch of articles is all fine and good, but keeping those activities going for years as opposed to months (or weeks) makes a huge difference.

- Alexandra Levit, Inspiration at Work

 

3. Optimize Your Articles

Nathalie LussierThere are three main ingredients to a successfully optimized web page or article: your meta title, description and keywords. This is such a simple thing to fill out when you're publishing a piece of content on your site, so take the time to do it each time, and you'll start to rank for your keywords much faster.

- Nathalie Lussier, The Website Checkup Tool

 

4. Don't Forget About (Ethical) Link Building

Christopher KellyKeyword-embedded links are the foundation of off-page search engine optimization. The best part is that links can be free. Just ask vendors, partners, press, clients, your alma mater and any other credible source that you interact with to embed hyperlinked keywords back to your site for the terms that you are targeting. If the referring source has a high page rank, you should see a pop in your rankings in less than two months of them being published.

- Christopher Kelly, Convene

 

5. Use Google's Keyword Tool

patrick curtisUse Google's Keyword Tool to find long-tail keywords that are not as competitive, then structure some content around those. If you are in a competitive niche, this is a way you can start building up some small recurring traffic and engage your users.

- Patrick Curtis, WallStreetOasis.com

 

 

6. Provide Amazing Value to Your Readers

Liam MartinWhen it comes to increasing organic search, content marketing through blogging or guest posts is the fastest way to build great traffic. However, content marketing is a quality game and not a quantity game. If you have horrible content, people won't bother reading it or sharing it, which is basically the entire point of building a company blog. Therefore, when I write content, I constantly ask myself if I would take ten minutes out of my day to read it and if I'd share it with others. If you wouldn't do either of those things, then you really need to look at your content strategy again.

- Liam Martin, Staff.com

7. Don't Try to Outsmart Google

Sarah SchuppGaming Google's system might work temporarily, but it is not a good strategy for the long haul. To increase organic search traffic, produce top-notch content that's relevant to what your users might be searching. Check the Google Keyword Tool to make sure you're using the correct terminology that the general public is using when they're searching.

- Sarah Schupp, UniversityParent

 

8. Think of SEO as an Opportunity to Create Value

Danny WongSEO isn't a game. At least it's not a game that you'll win in the long run if you think of it as a game. Create content that readers find valuable and Google will deem search-worthy. Visitors are more likely to share content that they enjoyed reading and will stay on your site longer, while bloggers and the media might use your site as a reference, which means more organic links.

- Danny Wong, Blank Label

 

9. Decrease Bounce Rate

adam liebIf there is one thing search engines hate, it is a high bounce rate. Check your keywords for this, and optimize those pages to reduce your bounce rate. Search engines will love you for it.

 

 

- Adam Lieb, Duxter

10. Produce Quality Content

John HallSearch engines are rewarding people and companies who are getting high-quality, consistent content coming from them. Things such as author rank are going to have a big effect on organic search results. Put a plan in place to not only create content to publish online, but also to be able to maximize the value of the content so that it is properly distributed across social channels and has a chance to go viral.

- John Hall, Influence & Co.

 

11. Create a Company Blog to Increase SEO Traffic

Jay WuSEO is king in organic search traffic. The more popular search terms within your niche that you include on your website, the more searches will organically lead to your site. But including too much text on the main pages of your site can do more harm than good, which makes it difficult for consumers to find the information they want. Instead of overwriting the copy on your homepage, about page and product pages, start a separate blog for additional SEO work. Use the blog to write about your niche, whether it's construction, beauty or entertainment. Try to do keyword research to find out which phrases are trending in your industry and include them in the blog posts. As long as your blog has a highly visible link back to the main page of the website, the blog will increase your visibility.

- Jay Wu, A Forever Recovery

 

12. Leverage Industry Experts

Chuck CohnEveryone likes opining as an expert. You'll be surprised how easily you can convince industry leaders to contribute guest posts to your own blog. They will likely have their own readerships, and those people will become familiar with your brand. The experts are also likely to produce great written content that will be of great interest to your existing users.

- Chuck Cohn, Varsity Tutors

 

13. Create a Community

Mitch GordonIncreasing Google traffic is all about answering questions your community finds important. You need to become the authority in your niche. Have your community ask you questions, and you'll be well on your way to providing high-quality, valuable and useful content. That's what Google cares about. When you provide answers to your community's questions, Google will rank your site well for many keyword terms you wouldn't have been able to think of on your own. You create loyalty in your community and rank well in Google at the same time. That's a win-win.

Face-To-Face - Most Productive Business Contact by Sussy Andrew

Three Reasons to Do Business Face-To-Face
Recently, I delivered a keynote presentation about business growth, "Fence Posts to Trees," to the top forty emerging leaders of a U.K.-based pharmaceutical company. I ate with one of their five senior VPs during the meal that preceded.He lives in Scotland, commutes to London weekly, and travels to other countries. We talked about his travel schedule a bit and I asked, "How much do you employ technology to conduct virtual meetings?" To my surprise he answered, "More than I like. When we're doing business in other countries, it's difficult to virtually communicate some things." As we talked more, here's what I heard him saying. Think of them as three reasons to do business face-to-face.
A face-to-face meeting:

Powers business
Let's face it-there are a lot of companies out there that you can do business with. What separates the companies you choose from the companies you don't select is about the business transaction, but it's more than that. There is the human connection.

There are some aspects of the human connection that don't communicate well even if you use video. The myopic view of the camera misses gestures, body language, some vocal intonations, and the je ne sais quoi of human interaction. It takes the total package of the human experience to transform a business transaction into a business experience. Such experiences break the ice in a different direction that captures our interest and imagination. It's the most important "why" of closing a deal.

Builds trust
As my senior VP friend talked about communicating corporate core values internationally and how they take expression in the manufacturing of pharmaceuticals, I realized he was talking about trust. Getting in front of a manufacturing partner meant he could insure that the high standards by which his company produces viable health solutions is more likely to happen. By meeting face-to-face, he could validate the necessary protocols and procedures were followed, therefore building trust in the relationship.

Exchanges idea more effectively
Doing business in the global village means there are certain cultural assumptions we all make based on our background. Those assumptions don't translate without explicit statements.

On site, my friend could not only impart knowledge, but receive ideas from the new partner. These ideas are more effectively exchanged person-to-person; looking someone in the eye, listening carefully for vocal nuances, and experiencing the total communication process. By meeting face-to-face, he was in a better position to give and receive information that improved the business relationship.

While technology certainly empowers us to do business in markets and manners previously unavailable, the desire for human interaction still exists deep within us.
To Conceive a Work Positive lifestyle and greatly improve your productivity and profitability, be sure to meet face-to-face whenever possible.

Facebook Can Get You Fired

Teachers, especially, are being haunted by social media postings.

In today's world of social media, job applicants have been cautioned about what they put on Facebook, since employers often search applicants' names online. Embarrassing photographs and postings might prevent you from getting the job you want.

But can what's on Facebook also get you fired? Janet Decker, a University of Cincinnati assistant professor in UC's Educational Leadership Program, says it can, especially if you are a teacher.

Though she does not cite specific numbers, Decker says that a “large number” of educators have been fired for Internet activity. She says that some teachers have been dismissed for behavior such as posting a picture of themselves holding a glass of wine.

Read More - Click Here!

Facebook Debt Collector Attack

(So when Haralson, 47, logged into her Facebook account one day, she was surprised by an unwelcome inbox message: a request to call “Mr. Rice” about her debt.

“It’s not like they needed to go on Facebook to find me,” Haralson said. “I was in contact with them all the time. That crossed the line.”

Federal regulators could wind up agreeing with Haralson as the U.S. Consumer Financial Protection Bureau and Federal Trade Commission examine how debt collectors use social media websites like those run by Facebook Inc. (FB) and Twitter Inc. to contact potential debtors.

U.S. regulators are mulling a series of actions in 2013 as they impose comprehensive federal oversight for the first time over the debt collection industry, which generated 180,000 consumer complaints to the FTC in 2011. In the 2010 Dodd-Frank Act, the CFPB gained new powers over debt collectors that no other federal agency ever had.

Richard Cordray, the CFPB director, has made debt collection a priority for the agency because about 30 million consumers -- “nearly one out of every 10 Americans” -- have accounts in collection totaling $1,500 on average, he said in an Oct. 24 speech.

“We will be using both our supervision authority and our enforcement authority to oversee the market and go after bad actors who flout the law,” Cordray said.

Amex Settles

Regulations would affect credit-card issuers like Capital One Financial Corp. (COF) and JPMorgan Chase & Co. (JPM), who also face supervision over how they handle debtors. The CFPB sent a signal of its intent in October when it announced a $112.5 million settlement with American Express Co. (AXP) partly over claims of improper debt collection practices.

At the same time, debt buyers like Portfolio Recovery Associates Inc. (PRAA), Encore Capital Group Inc. (ECPG) and Asta Funding Inc. (ASFI) are also facing the first-ever federal oversight of their business. The CFPB approved a rule on supervision that took effect Jan. 2.

“As a company that engages in debt collection, we need to be prepared for the heavy oversight that CFPB will bring,” Asta wrote in a Jan. 18 regulatory filing.

Phillip Duff, president of Lighthouse Consulting Inc., a research firm whose focus includes debt buying, said the presence of CFPB is changing the industry’s structure already. Major credit-card issuers are increasingly selling only to large debt buyers who can handle tougher federal oversight.

‘Big Guys’

“They are positioning themselves to do business with the big guys because they are more compliant and more ethical,” Duff said in an interview.

The accounts-receivable industry had revenues of $17 billion in 2011, according to Kaulkin Ginsberg, a Rockville, Maryland-based consulting firm. In addition to debt collectors, the industry includes debt buyers, who purchase written-off debt from creditors such as credit-card issuers. Debt collectors can be independent agents, employees of buyers or members of law firms.

Rules Unclear

Mark Schiffman, a spokesman for ACA International, a debt collection trade association, said the group has discouraged the use of social media by its members because the law is unclear, and court cases have not clarified how Facebook, Twitter and other sites can be used legally.

“We tell them to avoid” social media, Schiffman said in an interview. “The rules on it are not clear.”

A body of U.S. bank regulators, the Federal Financial Institutions Examination Council, on Jan. 22 asked for public comment about proposed supervisory guidance to banks on social media. Debt collectors use of these media “may violate the restrictions on contacting consumers imposed by” current law.

The request said a broad swath of social media could be affected by the guidance, including Google Inc. (GOOG)’s Google Plus, Twitter’s micro-blogging site, Yelp Inc. (YELP)’s business review site and LinkedIn Corp. (LNKD)’s professional network. It could also cover Second Life, a site owned by closely held Linden Research Inc. where users create virtual identities and communities, and online games created by Zynga Inc. (ZNGA), according to the request.

Complaint System

The CFPB, which shares jurisdiction over debt collection with the FTC, will begin taking complaints about the industry in the second quarter of this year, according to two people briefed on its plans.

The CFPB complaint system, required by Dodd-Frank, links federal regulators with the companies in order to find solutions for consumers. Collecting complaints would also let the bureau amass data on the industry as a prelude to issuing proposals for regulation later in the year, the people briefed on its plans said.

The CFPB’s supervisory authority covers about 175 debt collectors that account for more than 60 percent of the industry’s annual receipts, Cordray said.

The consumer agency may also take enforcement action against the debt-collection industry, something the FTC does regularly. The bureau has already issued civil investigative demands for documents, a step that can lead to enforcement penalties, according to two people briefed on its work.

‘Miranda Warning’

L. Richard Fischer, an attorney with the law firm Morrison & Foerster LLP in Washington who has represented card issuers, called the Amex case a “Miranda warning” to similar companies about the bureau’s intentions on behalf of consumers. In the U.S., the Miranda warning specifies a citizen’s rights during interactions with the police.

In the settlement, Amex agreed to pay $112.5 million in restitution and penalties to settle claims by regulators that it violated consumer safeguards from marketing to collections in products sold to about 250,000 customers.

In the case, Fischer noted, CFPB aimed at the company’s practice of trying to collect old debt by falsely implying that reports of payments would improve customers’ credit scores. Amex also deceived some customers into settlement offers that despite promises didn’t wipe out their debt.

A joint CFPB-FTC working group on debt collection is examining how the government should regulate the industry, according to David Vladeck, until recently the director of the FTC’s bureau of consumer protection.

The underlying law, the Fair Debt Collection Practices Act, dates from 1978. At that time, the debt-buying industry, which purchases charged-off debt at a discount and attempts to collect it, barely existed.

Rules Urged

“Either Congress needs to modernize the statute or CFPB needs to interpret the statute,” Vladeck said. “We are urging the CFPB to engage in rulemaking.”

In particular, Vladeck, who left the FTC in December and is now a consultant to the agency, argued that the CFPB needs to limit the ability of debt collectors to use electronic tools that are not entirely private, since the law prohibits debt collectors from disclosing information on debts to third parties. That could include not only Facebook and other social media, but also work e-mail addresses, he said.

Haralson, a medical office assistant who lives in Dunedin, Florida, is embroiled in a dispute with MarkOne Financial LLC, a Jacksonville, Florida company that finances auto sales and collects debts. Haralson said the company overcharged her, and that she stopped making payments after shelling out $18,000 for a $12,000 Jeep Cherokee. Since then, she complains of harassing phone calls to her work, her cell phone and family members.

Harassment ‘Cherry’

The use of Facebook is a “cherry atop the harassment dessert,” Haralson’s lawyer, Billy Howard, said in an interview.

MarkOne general counsel, Ryan Johnson, declined in a telephone interview to comment on the Haralson case, saying it is the subject of pending litigation. He also declined to outline the company’s policy on use of social media.

Howard said he’s seen more aggressive use of social media by debt collectors, including rude postings on a person’s “wall,” the part of a Facebook account that a person’s friends can see. Some collectors masquerade as friendly personalities to catch an alleged debtor’s attention.

Bikini ‘Friend’

“You get a friend request from some chick in a bikini,” said Howard, a lawyer with Morgan & Morgan P.A. in Tampa, Florida. “You say yes, and then somebody says ‘‘by the way, I’m a debt collector.’”

John Bedard, a lawyer for the collections industry at Bedard Law Group, P.C. in Duluth, Georgia, said the industry is likely to oppose further limits on how it can contact debtors.

“The law should not stand in the way of a consumer’s desire to communicate in these new ways,” Bedard said in an interview.

Bedard said that people have to expect that debt collectors could use tools like Facebook “since it’s not unlawful to search the Internet and view publicly available information.” The law does not require them to obtain consumer consent to use Facebook, but “wise collectors” do so, Bedard said.

Jodi Seth, spokeswoman for Facebook, declined to comment.

Some collectors choose not to exploit social media at all. Portfolio Recovery Associates has a policy against its use, spokesman Rick Goulart said in an e-mail.

Origin Obscure

Consumers contacted through social media may be especially disconcerted because collectors often don’t provide information about the origin of the debt. Peter Holland, an instructor at the University of Maryland law school, said contracts for the sale of debt often limit the rights of collectors to identify the originator.

“You may have no clue what the origin of the debt is when you have first contact with the collector,” Holland said in an interview.

Vladeck said the CFPB should also write regulations requiring the disclosure of that information to potential debtors so they can determine whether they in fact paid the debt. The fair debt collection law of 1978 didn’t foresee that debt could be sold to other collectors.

“Debt does not die the way it did before debt buying,” Vladeck said.

Read More - Click Here!

Fax Server or Fax Service

The answer is not as clear as it used to be. Those Fax Servers are pretty expensive to own and operate. Fax Services can reduce the hassle for a fat fee. And hey, it’s 2007 and we have email. How much longer will we need fax anyway?

In 2006, the fax server market sputtered at 0.4% to $280 million whilst the fax service market ballooned 26.4% to $570 million (two market research reports by Davidson Consulting). So lots of folks are using Fax. Fax upgrade and consolidation of existing fax equipment may be another consideration. Do you spread them out all over the company (decentralize) or have one big fax server (centralize)?.Perhaps it is prudent to have two fax systems (redundancy) in case one fax system goes down. What are the hidden costs? But if you use a fax service you don’t need all that equipment and people to keep it running.

Before deciding it is paramount that you understand what you fax (send and receive) why you use fax, and how you presently fax information! Once you have the answers to those questions, a quick briefing on the different fax systems will help you decide what is best for your company.

Many use production fax application to automate the unattended sending of hundreds of purchase orders overnight, potentially saving a bundle in labor and mailing costs while getting the purchase orders out to buyers quickly. Invoices faxing is a popular automation trick as well. Production fax accounted for 33.7% of all fax server installations in 2006 and accounted for $86 million in fax services. You can handle this type of application from either a fax server or a fax service, although many managers will feel more comfortable with an in-house solution because of a belief that it is insecure to ever have that type of data on an outside server. Nonetheless, many enterprises decide to go with a fax service to handle all their faxing needs, including production faxing.

Inhouse fax server or Outsourced fax service, using an automated fax system can enabling you to better manage your fax activity. Example: users can send files directly from their desktops, without having to walk to a fax machine, saving you money in time and labor costs. Moreover, it means that every file your people fax can be automatically archived, a key requirement of many compliance regulations like HIPPA (Health Information Portability and Accountability Act) and Sarbanes-Oxley. Finally, every fax is automatically received in email, which means that faxes are not sitting as paper in fax machine out-trays and they, too, can be automatically archived for future reference.

Fax Servers Are…

A fax server is comprised of server software that runs on a server and client software that runs on desktops. The fax server market is expected to grow at an 8.2% compound annual growth rate to $400 million in 2010. The client software is what end users see and use. Typically, this client software is installed from a central point on the network. There is no need to install a separate client on every desktop. There is conventional client software and then there is web fax software. Client software allows users to send faxes and to receive them, as well as manage their personal activity. Client software either allows users to send from personal applications in the same manner as printing, or it allows users to use their email interface to fax their documents. Typically, users can integrate their client software with any Microsoft application (e.g., Word, Excel, PowerPoint, Access) and often many other applications as well. Senders can attach multiple, mixed file attachments to a fax and they are converted to image files. Receiving faxes is as simple as opening an email. Web fax client software is simply a web site that users access. Therefore there are no installation hassles involved. Workers simply go the web site every time they want to send or retrieve a fax. Often a web fax client will not have every single feature that a desktop client has, but web clients are catching up. And web clients are compatible with every type of desktop.

Fax server software handles the management and maintenance of a company’s entire fax operation. Server software typically is compatible with leading server operating systems and enterprise email systems. The server software may be integrated with Microsoft Exchange email, IBM notes or any SMTP email programs. As well, fax server programs that support production faxing often support integration with SAP, Oracle and other enterprise resource planning and customer relationship management solutions. This is an area where the purchaser should be interested in the close relationships that some vendors have with key ERP players. Example: Esker has been a SAP partner for years. During installation, many fax servers support adding users directly and automatically from an email system or from other computerized logs of employees. This can save a great deal of time compared with individually adding each user manually.

Fax server software also handles the routing of inbound messages from the fax server, where the message is actually received, to the individual end user desktops that are operated by the intended recipients of the messages. Fax servers support this inbound routing capability through a number of mechanisms that work in various ways. First, there is direct-inward-dialing (DID), which works like a PBX with direct phone lines. The DID capability receives a wide range of numbers to a single phone trunk and it checks the last four digits against a routing table to determine where the phone call should be routed. This is the best form of inbound routing because it means the fax sender merely has to dial a phone number and the fax is automatically inbound routed. DID, however, may not be available for some older PBXs and it may be somewhat expensive relative to purchasing the DID phone numbers. DID (and ISDN, a similar routing technique used abroad) was used in 78% of all fax servers employing inbound routing in 2006. Other methods that may be used range from manual routing, where a human being routes each fax as it arrives (used 5% of the time), to optical character recognition (OCR; used 2.5% of the time), where the name of the intended recipient is machine-read off the fax cover sheet, to dual-tone-multifrequency (DTMF), which is where the fax sender must dial an extension number (used 11% of the time), to line routing, where a fax server has multiple fax lines and calls to each line are routed separately (used 7% of the time).

Each of these other methods has the possibility of flaws: manual routing has human error, OCR has machine mis-readings of recipient names, DTMF has the extra requirement on the sender of punching in the extension number at the right time, and line routing is limited to only as many intended recipients as you have fax lines. So, DID is a clear winner, but again it is not always available with certain older phone systems.

What To Consider When Purchasing A Fax Server

  1. Does the server software integrate well with ERP programs from suppliers like SAP and Oracle?
  2.  
  3. Is the server software compatible with your email?
  4. Is the server software compatible with your operating systems?
  5.  
  6. Does it supports mixed-mode Internet and conventional faxing?
  7.  
  8. Does the fax server provide rock-solid reliability?
  9.  
  10. Does the server software support the inbound routing technique that you want to use?
  11.  
  12. If your inbound routing choice is for DID, does the fax server support a DID fax boards?
  13.  
  14. Do the management capabilities allow you to easily determine whether a fax transmission has been successfully completed and does it provide reports that show the status of each fax transmission?
  15.  
  16. Is it easy to add users from your email system or other computerized log of employees?
  17. Does the fax server support Internet faxing?
  18.  
  19. Is the client software easy to use?
  20.  
  21. Is there adequately featured web fax software?
  22.  
  23. Can sent faxes be automatically archived?
  24.  
  25. Can you send multiple, mixed file attachments?
  26.  
  27. Is receiving faxes simple and are there ways to automatically archive the files?

Internet Faxing

There are also conventional fax servers and IP fax servers. Conventional fax servers hook up to analog phone lines and use PSNT (public switched telephone network) to send and receive all fax calls. IP fax servers use the Internet to send all faxes and can receive all faxes via a gateway. Internet fax servers accounted for $44 million out of the $280 million total market for fax servers in 2006. They are forecast to gain primacy over conventional fax servers in 2009 and to grow at a 50.7% compound annual growth rate to $245 million in 2010.

In general, there are no major capability differences in a conventional and IP fax server. However, there is a difference in how they send a fax. A conventional fax server sends the fax over a conventional phone line, which involves a process called handshaking where the sending fax sends signals to the receiving machine to figure out how fast the transmission will take place, what compression method will be used, what error protection protocol will be used, etc. Then the call proceeds and when it ends, a confirmation (or an error report) is faxed back to the sending machine.

Internet fax transmissions goe over the Internet which creates a different environment from the PSTN. The Internet takes a call and puts pieces of each call into packets and sends them over different routes to the destination (a store-and-forward method of communication). With a fax call, this may mean sending a fax like an email so there is no handshake and the fax call does not receive a confirmation at the end of the session. Or else the fax call is sent in realtime (or almost real time) and a spoofing technique is used to fool the receiving fax machine that the call arrives in real time. This spoofing technique is key as a conventional fax call will fail at certain points during the handshake if a delay of just several milliseconds occurs. The receiving fax system must be fooled if a packet arrives out of order and is delayed. This delay factor has caused some concern among buyers that they won’t receive the same kind of performance from IP fax servers as from conventional fax servers.

The huge advantage of Internet fax servers are that they may be used without fax boards. This is accomplished with software-only Internet fax servers that use the microprocessors in Internet gateways and routers that corporations already have installed. Sales of these board-less systems amounted to more than three times the sales of Internet fax server sales that included fax boards. A second advantage to using FoIP (fax over IP) systems is that a company may eliminate any costs relating to using the public switched telephone network, including line charges and PBX ports. This is especially important to companies that have eliminated all their PSTN infrastructure relative to installing VoIP services. In the end, as time passes and vendors’ products pass the reliability tests, the fears about Internet fax servers will go away. Cantata Technology, the dominant fax board supplier, has brought out the Brooktrout SR140, a real-time fax-over-IP capability and many fax server vendors, including Esker, have supported the SR140 for over a year. As enterprises install the Esker version of the Internet fax server and see its reliable performance, sales will pick up steam. With so many enterprises moving to Internet voice, it is only a matter of time before the majority of fax server sales are for Internet fax servers. In the meantime, there is always the possibility of having a fax server support mixed conventional and Internet faxing.

Fax Boards

Fax boards are required with every conventional fax server. Fax boards handle the compression of images and they send and receive faxes. The great majority of fax board sales are for intelligent fax boards which have microprocessors on the boards that handle the very fastest of calculations that may cause fax transmissions to fail.

The first matter that a buyer must consider is what type of fax board to buy. Intelligent fax boards drive the highest completion percentages, but cost the most. These boards typically cost between $400 and $800 per port. So, for a 4-port fax server, a buyer can expect to pay as much as $3,200. For a 24-port server, a buyer is looking at an investment of about $14,000, for the fax boards alone. Buyers who are ready to take on the risks of using non-intelligent fax modems — including a lower percentage of fax calls that are completed and slower fax calls (due to slower handshaking, lack of bit stuffing, less efficient handshaking protocols) which translates directly to higher telephone bills — can acquire Class 1 and Class 2 fax modems that cost as little as $100 to $300 per port.

Most buyers decide to go with intelligent fax boards (in systems where fax devices are used, fax boards outsell fax modems by a ten to one margin), which gives an indication of how important a robust handshaking and call-completion capability is — and they end spending more than just the cost of the fax boards. Many intelligent fax board users also get an express exchange service, so if any of their fax boards fail, they can get a replacement within 24 hours. This adds about 15% to the cost of the fax boards.

A second option that fax board buyers have available is the capability to expand the number of ports just with a software key. This way, buyers do not need to go to a reseller to buy additional fax boards just to add a few ports. For instance, perhaps you want a 12-port fax board, and then when you begin to fax, you realize that you would like to have 16 ports. Generally speaking, the board that supports 12 ports can actually support up 24 ports. So, by getting a key from the manufacturer, buyers can expand the number of ports on their fax boards without going back to the reseller and buying a new board. This also costs more money, but less money than buying a new board and getting rid of the old one.

Fax Server Hidden Costs

Hidden costs are not just a matter of fax boards. A whole slew of hidden costs are involved with fax servers. These include costs for the following:

 

  1. Servers — on which the fax boards and fax software reside; depending on whether you dedicate a server to the fax function, this can cost well over $1,000 or can cost just hundreds if a server is shared. On top of the server hardware, the software (operating system) and the cost of securing this hardware in case of mission-critical faxing (clustering, stocking of a spare fax board, etc.) must be considered.
  2.  
  3. PBX ports — to integrate fax server ports with PBX ports. These can cost hundreds of dollars apiece.
  4.  
  5. Pre-installation consulting time — planning for large installations. Figure that this can cost about $300 per hour and involve up to a couple of days.
  6.  
  7. Installation and configuration time — this is the time it takes to install the software on the server and the clients, the time to configure the software for each client,
  8. and the time to integrate the software with an enterprise application, and test the results.
  9.  
  10. Per-administrator initial training time — the time to train network administrators to use and manage the fax server and then to train end users.
  11.  
  12. Initial training time — the time it takes to train each end user at the average labor cost for end users and the cost for the trainer.
  13.  
  14. DID one-time phone line installation charges — the setup of DID-enabled phone lines wherein, for example, there would be one phone line with 20 different phone numbers for 20 different users. Charges can be from about $0.50 per phone number to a $1.00 or more.
  15.  
  16. Monthly phone line fee — the flat monthly fee charged by telephone companies for a single line or single T1 channel. These fees can range from about $10 to $30 per month.
  17.  
  18. Monthly fees for DID numbers — also charged monthly by local telephone companies, the fees range from about $0.10 per month to about $0.30 per month per DID number.
  19.  
  20. In-house support time — these are costs for administrator work for end-user help, patches, upgrades and system crashes.
  21.  
  22. Vendor support and maintenance contracts — these contracts typically cost 15% of the initial cost of the fax server software per year.
  23.  
  24. Cost of the up-front investment — these are the loan interest payments or the ‘opportunity cost’ of using cash to acquire fax server functionality instead of using it for some other purpose. Buyers should figure the cost at about 8% of total up-front purchase costs.
  25.  
  26. Space rental — this is the cost to rent the space occupied by fax server equipment.

 

Fax Services

Internet fax services offer all the same capabilities as fax servers — without the hidden costs and without any requirement for fax boards. Enterprise Internet fax services are expected to grow by 26.8% compound annual growth rate to $440 million in 2010. Individual Internet fax services are expected to grow at 24.4% compound annual growth rate to $670 million in 2010. With these services, businesses get the ability to send and receive faxes, the capability to manage their fax activity and, at least with Esker service, the ability to integrate fax with their enterprise applications. Esker also offers the ability to send documents via postal mail.

 

With a service, buyers have low up-front investment and gain the option of flexible costs depending on how much traffic volume they have. No software need be installed, since all operations take place off web interface. The one difference with services is that they offer virtually unlimited capacity, so if an enterprise has one mammoth fax job, it can be easily handled. Conversely, if the enterprise were using a fax server, it would be constrained by the number of fax lines it had installed. It does not make sense to acquire more fax boards to handle just an occasional fax job, but if a company uses an Internet fax service, the capacity is there to handle every job. Another important aspect of fax services is the pay-as-you-go pricing model. The per-fax cost does not vary with the volume, as is the case with a fax server, because of the fixed cost of the fax infrastructure.

Does the service provide your company with all the functionality your business needs and does it provide rock-solid reliability? Does it integrate well with any enterprise or desktop as that you use? Is it possible to automatically archive each sent and received fax? Is the pricing easy to understand and is it acceptable in terms of its total cost? If you find acceptable answers to these questions, then perhaps a fax service will suit your business.

What To Consider When Choosing A Fax Service

  1. Does it integrate well with desktop and enterprise applications that you use?
  2.  
  3. Does it provide management capabilities to allow your company to easily add and change users?
  4.  
  5. Is the pricing easy to understand?
  6.  
  7. Is the fax service easy to use?
  8.  
  9. Does it provide all the functionality you need?
  10.  
  11. Does it provide rock-solid reliability?
  12.  
  13. Does it eliminate the need for in-house support?
  14.  
  15. Is it possible to automatically archive each sent and received fax?
  16.  
  17. Can you generate reports to determine the final status of all fax transmissions?
  18. Are there no hidden costs?

 

So Fax Server or Fax Service? If your customers and vendors expect faxes I guess you have to play the fax game. But with email and pdf…why?.

Ford's sweeping car redesign packs a lot of IT

Forgotten father of the search engine Jonathon Fletcher

(Joe Miller @ bbcnews) In 1993, the web was in its infancy. Mosaic, the first popular browser with an interface that resembles the ones we use today, had just been released, and the total amount of web pages numbered in the thousands.

But the question of how to find things on the web had not been solved.

Mosaic had a page called What's New, which indexed new websites as they were created.

The problem was that in order for developers at Mosaic to be aware of a new website, its creators would have to write to the National Center for Supercomputing Applications (NCSA) at the University of Illinois Urbana-Champaign - where the browser's team were based.

At about this time, Jonathon Fletcher was a promising graduate of the University of Stirling, with an offer to study for a PhD at the University of Glasgow.

Before he could take his place, funding at Glasgow was cut, and Mr Fletcher found himself at a loose end.

"I was suddenly very motivated to find a source of income," he recalls, "so I went back to my university and got a job working for the technology department."

It was in this job that he first encountered the world wide web and Mosaic's What's New page.

University of Stirling While working at at his alma mater, the University of Stirling, Jonathon Fletcher discovered the world of the web

'A better way'

While building a web server for the university, Fletcher realised the What's New page was fundamentally flawed.

Because websites were added to the list manually, there was nothing to track changes to their content. Consequently, many of the links were quickly out-of-date or wrongly labelled.

"If you wanted to see what had changed you had to go back and look," Mr Fletcher says of Mosaic's links.

"With a degree in computing science and an idea that there had to be a better way, I decided to write something that would go and look for me."

That something was the world's first web crawler.

Mr Fletcher called his invention JumpStation. He put together an index of pages which could then be searched by a web crawler, essentially an automated process that visits, and indexes, every link on every web page it comes across. The process continues until the crawler runs out of things to visit.

Ten days later, on 21 December 1993, JumpStation ran out of things to visit. It had indexed 25,000 pages.

To date, Google has indexed over a trillion pages.

Birth of search

Mr Fletcher quickly built an easy-to-navigate search tool for the index, stuck his website on Mosaic's What's New page, and the world's first modern search engine was in operation.

Start Quote

Google didn't come out until 1998 and what Jonathon was doing was in 1993”

Prof Mark Sanderson Royal Melbourne Institute of Technology

"I would say that he is the father of the web search engine," says Prof Mark Sanderson of the Royal Melbourne Institute of Technology, who has studied the history of information retrieval.

"There have obviously been computers doing searches for a very long time, and there were certainly search engines before the web. But Jonathon was the first person to create a search engine that had all the components of a modern search engine."

However, while Google's founders Sergey Brin and Larry Page are household names, Mr Fletcher, who now lives in Hong Kong, has received little recognition for his role in the evolution of the internet.

The fact that his project was ultimately abandoned may not have helped.

As JumpStation grew, it required more and more investment - something which the University of Stirling was not willing to provide.

"It ran on a shared server," explains Mr Fletcher. "There wasn't a lot of disk space and back then disks were small and expensive."

Space control

By June of 1994, JumpStation had indexed 275,000 pages. Space constraints forced Mr Fletcher to only index titles and headers of web pages, and not the entire content of the page, but even with this compromise, JumpStation started to struggle under the load.

And so did Mr Fletcher. "It wasn't my job," he says. "My job was to keep the student labs running and do system administration and technology odd jobs."

What's New Page Mosaic's What's New page, pictured here months before JumpStation was founded, was a basic index of websites

A job offer to go and work in Tokyo proved too strong to resist, and the university did little to try and keep him, or JumpStation, from leaving.

"I was obviously not very successful in convincing them of its potential," says Mr Fletcher.

"At the time I did what I thought was right, but there have been moments in the last 20 years where I've looked back."

Prof Leslie Smith, head of Computing Science and Mathematics at the University of Stirling, who remembers Mr Fletcher, acknowledged that JumpStation "proved to be ahead of its time", and told the BBC that "colleagues at Stirling are delighted he is gaining the recognition he deserves for his achievements".

Looking forward

But despite the disappointment Mr Fletcher suffered, his pioneering technology would be the foundation of all subsequent web search engines.

"The web community in 1993 was very small," says Prof Sanderson. "Anybody who was doing anything on the web would've known about JumpStation.

"By the middle of 1994 it was becoming clear that web search engines were going to be very important. Google didn't come out until 1998 and what Jonathon was doing was in 1993."

Fletcher and others at SIGIR conference Jonathon Fletcher (centre) at a conference in Dublin earlier this year, where he was the guest speaker on a panel alongside Google and Yahoo! representatives

Mr Fletcher received some recognition for his achievements at a conference in Dublin a few weeks ago, where he was on a panel with representatives from Microsoft, Yahoo and Google. But in his speech, he talked about the future.

"In my opinion, the web isn't going to last forever," he told the audience. "But the problem of finding information is."

"The desire to search through content and find information is independent of the medium."

The current medium is making a lot of money for those who followed him, but the Scarborough-born pioneer has no regrets.

"My parents are proud of me, my children are proud of me, and that's worth quite a lot to me, so I'm quite happy."

Four Email Marketing Myths Exposed

Just like old wives’ tales, myths about what does and doesn’t work in email marketing can outlast unbelievers. We’ll let the medical establishment debate whether wet hair and cold weather gets you sick, but we think it’s time to set the record straight on some of the most common email marketing myths.

We sat down with Jerry Jao, the co-founder and chief executive of Retention Science, to clear the myth-filled air. His company helps small businesses keep customers around for the long haul by crunching marketing data. Jao says four myths seem to live on despite evidence that they’re not true and he’s more than happy to dispel them with numbers and facts.

Myth: Sending emails first thing in the morning is best

Many marketers insist that sending an email to a customer in the morning means they’ll open it as soon as they sit down at their computer. That has led to the general rule of thumb that the morning is the best time of day to send a marketing email. There may some logic behind the idea, says Jao, but it’s simply not true.

By combing though 100 million online transactions, 20 million user profiles and 100 email campaigns, Retention Science found that the afternoon is actually a better time to send an email. According to their research, most online shoppers are active later in the day but typically receive shopping-related promotional emails early in the morning. Other research supports this. At best, the rule of thumb about sending early is harmless. At worst, you’re killing your conversions.

Solve this conundrum by testing different times with similar or identical messages.

Myth: Emails sent on Mondays are the most successful

Sending emails on Monday is another rule of thumb that may have a logical underpinning but little in the way of convincing proof. Marketers assume that everyone has a case of the Monday blues. Since no one really wants to jump back into work, people are more likely to sift through their email on Monday, or so they think.

Retention Science’s data showed the opposite: Tuesday and Friday had the highest conversion rates. Test out different days to see if they make an impact on open rates and conversions.

Myth: More frequent email is better

If you send a bunch of emails to your customers they’re bound to open some of them, so why not send a dozen, right? Wrong. Jao says this is a common myth that needs debunking.

“It’s important to understand that less is more when it comes to email campaigns,” he says.

Of course, finding the right email frequency is tough. There isn’t a definitive number that works for every business, but Jao suggests testing your email frequency while watching unsubscribe rates to make sure you find the right balance.

Myth: Subject lines packed with info get opened

A subject line is important, no question about it. However, some people believe that packing a subject line full of information leads to high open rates. Untrue.

While you can squeeze about 70 characters into a subject line, that doesn’t mean you should. Rather than cramming the header full of words, focus on making the subject line conversational, Jao suggests.

“A subject line should sound like something a friend would say,” he says. “Don’t be wordy or pitchy, just be conversational.”

While there isn’t a plug-and-play formula to create a killer subject line, there are practices that you should avoid. Don’t use all capital letters, don’t be deceiving, ditch any symbols or emoticons, take it easy with punctuation and refuse to be boring. If you stay away from these no-nos, your open rates will improve.

When in doubt, A/B test your subject line to see what kind of wording works best for your customers. In fact, it’s a good takeaway message. Testing email content can give you statistics to back up your marketing moves, Jao says. It will not only give you an insight into the habits of your customers, but it will keep you from falling victim to marketing myths.

This post contributed by guest author, Lisa Furgison. Furgison is a media maven with ten years of journalism experience and a passion for creating top-notch content.

Get IT and Biz on the Same Page With These Seven Questions

If you find it difficult to align your IT staff’s efforts with business goals, or see that IT staff don’t understand the philosophy by which you run your business, interject these questions in your next conversation with them. You don’t need to talk technology in this exchange, but communicate clearly the goals, objectives and targets you have in mind for your business and why you need the IT team’s cooperation to get there.

Read More - Click Here!

Get Organized Now

With only a few tweaks, running your business could be easier, more enjoyable, and less stressful. And who could't use a little of that right now?

I think Michael Gerber, author of The E-Myth, put it best: \"If you spend too much time working in your business, you won't have enough time to work on your business. That is, if all you have done is create a job for yourself, tha'ts a mistake. It is far better, and smarter, to figure out how to free yourself up to be 'more entrepreneur', 'less worker'.\" This is how we do it:

1. Plan your day at the end of the previous day: That way you can rest easy that night and hit the ground running the next day.  Begin by looking at what is coming up and then prioritize it. Make a list and try to follow it. That way, instead of events controlling you, you control them. You don’t want to spend your days putting out fires.

If you have a day planner, use it. If you use Outlook or a Blackberry instead, be sure to take advantage of their built-in organizational tools.

2. Get and learn the right software: There are so many time-saving productivity software tools out there that it is a mistake not to use and take advantage of them. Software makers spend an inordinate amount of effort on R&D, learning what it is we small business people need. They then create powerful software applications designed to fill those needs.

Buy them. Learn them. Use them.

The mistake many of us make (myself definitely included) is that we get this great software and never take the time to learn everything it can do for us. A day of training can make you far more organized and effective.

Check out project management software, or customer relationship software, etc. They can really help.

3. Don't be a slave to email: When I read that the author of The 4-Hour Work Week spent a little more than an hour a week on e-mail I was incredibly jealous. Few of us have figured out how to stop the onslaught of email to that degree, but even so, it is possible to be smarter about email:

  • Designate the amount of time a day you want to spend doing email and stick to it.
  • Set aside time for email once or twice a day, and again, stick to it.

The mistake some make is getting so caught up in email that they check it several times a day (or hour!)

4. Get your office organized: Constantly searching through stacks of papers and piles of notes is no way to run an office. Get the office supplies you need and put them where you will use them. Color-code files. Get a shredder. Buy a bigger file cabinet. Get an extra bookcase.

Organizing your office is one of the easiest, most affordable things you can do to be more productive.

5. Delegate: You don’t have to do everything yourself. Giving some of your workload to others will free you up to use your time better.

Especially now, anything you can do to be more productive is a smart move.

Good Cameras More than Megapixels

The more megapixels, the better the camera?
Many consumers focus too much on megapixel count when buying cameras. A 16MP camera has to be better than a 12MP camera, right?

Not necessarily.  Camera sensor quality is as much about physical sensor size as pixel amount.

A large 12MP sensor in a DSLR will produce better photos than a tiny 16MP sensor in a point-and-shoot.

To cram that many pixels onto a small sensor, manufacturers shrink the size of the pixels. Smaller, crowded pixels don't capture light as well as bigger pixels spread across a large sensor. The small sensor struggles to capture the tonal range of bright scenes and generates unwanted noise when used in low light.

Don't get me wrong; megapixels are important. Generally, having more megapixels leads to greater detail in images and allows you to make larger prints.

But the quality of the camera's lens and its on-board image processor is also very important.

 

Google Glass Might Help You Remember Names

Photo(Jim Hood @ ConsumerAffairs) A lot of people are pretty skeptical about Google Glass, saying the goofy-looking goggles have no redeeming social value. Ah, but what if they could recognize faces?

A company calls FacialNetwork is claiming it has the software to make that happen. It would be a real blessing for anyone who has trouble remembering names. And just think of the potential dating applications -- all you'd have to do is stare at someone, say the magic word and get their name, email and -- I dunno -- Facebook profile or whatever.

And, sure enough, that's what FacialNetwork is promising. It calls the product NameTag and says it uses some of the most accurate facial recognition software in the world to grab faces using Google Glass' camera, send that face wirelessly to a server, compare it to millions of records and in seconds return a match complete with a name, additional photos and social media profiles.

FacialNetwork.com is also currently creating technology to allow the scanning of profile photos from dating sites such as PlentyOfFish.com, OkCupid.com and Match.com. The technology would also allow users to scan photos against the more than 450,000 entries in the National Sex Offender Registry and other criminal databases.

A brave new world

"I believe that this will make online dating and offline social interactions much safer and give us a far better understanding of the people around us," said NameTag's creator Kevin Alan Tussy.  "It's much easier to meet interesting new people when we can simply look at someone, see their Facebook, review their LinkedIn page or maybe even see their dating site profile. Often we were interacting with people blindly or not interacting at all. NameTag on Google Glass can change all that."

This all sounds great, at least to those who think such ideas aren't completely loathsome. But so far Google remains unconvinced.

Google has said that facial recognition will not be supported for Glass. Tussy thinks this is due to pressure from privacy groups but he thinks that when it seriously considers the "vast societal benefits," Google will eventually reconsider.

"There will be many providers of augmented reality headsets and even if facial recognition is not supported by some, I'm confident that there will be solutions for such limitations. We are not publishing any information about of our financiers or investors at this time but I will say that we are involved with some very well-respected individuals and venture funds," said Tussy.

Google Map Awesome Features

(Julian Meeks @ StreetWiseTech) Getting lost is not an enjoying moment and these days, it get a lot harder. But now that technology has risen to a level that it even provides you a map for free, getting lost is a little less hard, unless you find it difficult to read a map. But the latter should be a piece of cake. Most mobile phones are designed to support Google Maps, whether you are using an Android, iOS, or Windows powered phone. Some devices already have Google Maps installed by default, but in other devices, you will need to download it through the respective app store.

Google Maps is now updated with new features for the iOS and Android Apps, which are designed to improve not only navigating the streets by foot but also giving the most relative advice in commuting by train, car service or automobile. It meant to reduce day to day challenges in looking for the best route when going from point A to point B.

 

Driving Instructions

With the use of your smart phone, Google Maps will suggest to you which lane should you take, switch to or stay put. GPS was the first option for navigating roads but because of its delays in giving warnings, it can get frustrating. It can get dangerous when a warning is only given the minute after it is suggested to do so, only to see that swerving to another lane proved dangerous because of incoming vehicles. The newly updated feature reduces those frustrations and make it easier and safer for you to navigate. By tapping onto the guide, it will pop up slides of recommended routes to take.

Save Locations Offline

This feature has already been around since Google Maps was first introduced but the latest update showed an integrated design, making it easier to navigate. You will be able to save and label your selected maps in a specific location. This will be easier to look for the maps you saved while being on the move.

Specific Arrival and Departure Times

People who rely their daily commute on trains and buses know very well that the services differ depending on the time of the day. The latest update enables users to search for a specific departure and arrival times that is suited to your schedule. It takes into account the timing keys and also inform you the time the last bus or train will depart at night.

Google Penguin Update by Matt Carter

Recently Google released yet another change which is being referred to as the “Google Penguin” update. Sounds very cute, much like the friendly Google Panda…yeah right!!

In this post I want to discuss this latest update, and once again address some common concerns, as I seem to be getting a lot of worried people contacting me after their sites got hit hard by Google over the past few months.

So What is Google Penguin?

Penguin was an update to the Google algorithm that was released on the 24th of April, with intention of apparently penalizing sites for over-optimization, otherwise known as spamming. The first thing I want to say is that its early days, and no one knows exactly what this update was precisely targeting, but nonetheless I will do my best to share some insight, as I can happily say that I actually experienced a positive increase or no change across the board on all my websites after this update, and also after the latest Panda update which happened the week prior.

First off, we can start to get an understanding of this update by reading what Google officially states about it. If you read the Google Webmaster blog it says this:

“The change will decrease rankings for sites that we believe are violating Google’s existing quality guidelines. We’ve always targeted webspam in our rankings, and this algorithm represents another improvement in our efforts to reduce webspam and promote high quality content. While we can’t divulge specific signals because we don’t want to give people a way to game our search results and worsen the experience for users, our advice for webmasters is to focus on creating high quality sites that create a good user experience and employ white hat SEO methods instead of engaging in aggressive webspam tactics.”

OK so as you would expect Google doesn’t spell it out for everyone, but rather provides a very vague overview and focusses on their overall intention with the update. The key things that we can take from this statement I believe are “high quality sites” and “good user experience“, nothing we didn’t all know already, but who’s actually doing it is more to the point.

One can safely assume that this update, after reading the full Google blog post, was looking at keyword stuffing in content, as Google gives  a really over the top example of what this looks like. The example is a poor one, as that sort of keyword stuffing has been slapped by Google for years, so I guess it’s some level of more critical analysis of over use of keywords in your On Page SEO that this update was targeting. With that said, you might want to pay attention to how your content uses keywords and make it look natural. Golden rule for all SEO, make it look natural if it isn’t totally natural!!

The Good Old User Experience

I’ve been harping on about the user experience on this blog a fair bit over the past few months, and you guessed it, I’m going to continue to do so, as I keep seeing sites that get slapped by Google, where the webmasters are shocked and have no idea why. In most cases when I look at these sites, I can see glaringly obvious reasons, as the sites are clearly not designed for the user at all.

I want to also add this quote from Matt Cutts (head of Google Anti-Spam team):

“We want people doing white hat search engine optimization (or even no search engine optimization at all) to be free to focus on creating amazing, compelling web sites. As always, we’ll keep our ears open for feedback on ways to iterate and improve our ranking algorithms toward that goal.”

…”even no optimization at all…” yeah right, and pigs may just fly one day too!

Also its important to note that Google Panda 3.5 was also rolled at a week prior to the Penguin update, around the 17th of April, so if you lost a significant amount of traffic around that date, then you were most likely ‘Pandalized’ rather than ‘Penguinalized!!!!’

Oh and let’s not forget the 750,000 unnatural backlink warning messages that Google sent out prior to these changes, warning webmasters to remove links that were acquired through unnatural means…what an interesting few months its been!

Google is on the Aggressive

Ok so it doesn’t take a genius to notice that Google is on the aggressive right now, trying their hardest to remove spam from the results and level the playing the field for SEO. I ‘ve never experienced this many changes so closely related than what we are seeing now.

One thing that I must say I find pretty frustrating is that Google tells us not to do much if any SEO, other than make your sites easier to crawl etc…and when it comes to offpage SEO they expect it to happen naturally. The problem for the small guys and gals doing web marketing is that it’s virtually impossible to get enough exposure in the first place so that other webmasters even know about our sites to even consider linking to you. Sure large brands don’t have to worry as they already have a following.

So I don’t think the playing field is that level when Google does the changes they make, but regardless we have to play by their rules as closely as we can, or pay the price of getting no traffic from Google.

So with that said, in light of all the carnage going on out there right now, here’s some suggestions that might help:

Build Sites that Don’t Look Optimized

If Google wants people to just blog away and build affiliate marketing sites or stores etc…without doing any significant SEO, then we really need to mimic this as closely as possible. If you take a look at a few dozen sites ranking in Google now for various keywords, ask yourself if you think they are doing careful On Page SEO or not.

It’s really not that hard to spot, just look at some of the titles of pages on sites and ask yourself if these look like they were written with the keyword in mind or the topic in mind. Of course you will see some junk that is ranking and ask yourself how this got there, but just overlook that as Google will remove the junk eventually, so don’t get caught up on that just focus on good quality yourself.

Also have a look at all the content on the sites and ask yourself if the topics were written with keywords in mind or with topics in mind. Of course if you want to get traffic to your sites, you really have to do keyword research, and then target these keywords, however do it as natural looking as you can, so you still target keywords but fly under the radar!

Create Sites that Will Naturally Get Good Signals

If you focus on building great quality sites, that your traffic will love, then they will naturally want to bookmark your site and share it on Facebook and Google Plus. Not only that though, they will most likely come back again and also search for your site in Google using the site name. Ideally you want your site to get a lot of searches for its name, as it’s a clear signal to Google that people like it. Other good signals are the time on your site, low bounce rate, high average page view etc…

The only way you stand any chance of getting these “good signals” happening on your site is if you actually have a good site, not rocket science really. The problem is that good sites take effort and time and a lot of people can’t be bothered, and instead continue to put up low quality thin sites, and try all sorts of things to dodge the Google bullets, but honestly it’s all a waste of time in the long run, trust me I’m speaking from experience.

Google are only going to roll out more and more updates like Penguin and Panda, who knows maybe the next one will be called “Google Poodle”, ha ha, then you can say your site was “Poodlized!!! In all seriousness though, the sooner you move towards managing less sites, and focussing on higher quality, and thinking about the user experience, that better you will do in Google.

Off Page SEO Can’t Hurt Your Sites…Or Can It?

Ok so here comes the bombshell, Google sent out all these unnatural link warning to webmasters over the past few months, and sites who got them experiences a drop in rankings. The result is that many webmasters frantically started to remove any links they thought Google might frown upon and then submit for a reconsideration. I assume many SEO companies got dropped by webmasters, only to be replaced by news ones who get on their high horse and claim they are pure whitehat SEO and all will go well if the webmaster is to choose them…I doubt it…no one is 100% whitehat.

So why is this a bombshell then? Well the obvious question is, “if low quality backlinks to your sites can harm them, can’t we all go out and build a bunch of low quality links to our competitors?”

My response to this used to be “No way, if Google allowed this it could well create total chaos online”

My response now is “I’m not sure anymore, and I am starting to think low quality links combined with a lack of good signals coming off your site may well cause problems for you!”

I don’t think these recent changes in regards to backlinks will cause widespread chaos by any means, the reason being that chaos, I assume, would mean the likes of Amazon could be taken down, or other well established authority brands. I don’t think will ever happen, as these kinds of sites have way too many good signals for Google to ditch them, and the same goes for much smaller, yet quality sites too.

So what about sites that are ranking well but don’t have many “good signals”, are these open for attack from this negative SEO? I can’t definitely say, but my assumption is that possibly yes, if the negative campaign against them is particularly nasty in nature and well planned out. I sincerely discourage anyone from getting involved in these tactics, as it’s not the way to win a battle, and we would all not like it if someone did it to us.

Avoid Obvious Forced Linking

I encourage people, if you are using forced link building, and I think most of us will have to, make sure you don’t use overly spammy links, such as mass auto-blog comments, profile links, very public blog networks etc…anything that is really obvious and easy for Google to spot as forced linking. Also do your best to create content and tools, anything that will increase the chances of people linking to you naturally.

Also if you create a decent following in your niche this will happen much more easily. I think the key is to use linking as much as you need to, to gain momentum, but don’t rely on forced linking only, otherwise your site will not look natural.

Conclusion

To close this post I want to leave this final thought, spend time analyzing high quality sites in various niches, and take notes on how they make the user experience a good one, and do your best to employ as many of these techniques on your own sites.

If you enjoyed this post, I would be super grateful if you would shar on Twitter, Facebook and Google Plus below.

Thanks!

Google Will NIX AutoPlay Video Ads

On the list of things that annoy consumers when browsing the web, autoplay videos -- which start playing on their own while you are reading an article or searching -- are near the top. After all, there’s nothing more frustrating than having to search through all of your browser tabs to find the source of a loud soft drink or foot cream video advertisement.

Luckily, Google Chrome users may not need to worry about these intrusive ads much longer. Google announced that, starting with Chrome 64, autoplay videos will only be allowed to pop up if they won’t play sound or when a user has indicated that they have an interest in the media by clicking somewhere on the screen.

“This will allow autoplay to occur when users want media to play, and respect users’ wishes when they don’t,” said Google software engineer Mounir Lamouri in a company blog post.

In addition to the Chrome 64 changes, Lamouri announced a new feature for Chrome 63 that will allow users to completely disable audio for individual sites. Sites that have been muted will retain that status between different sessions, so users won’t have to worry about it every time they go to browse.

“These changes will give users greater control over media playing in their browser, while making it easier for publishers to implement autoplay where it benefits the user,” Lamouri concluded.

Developer recommendations

Of course, consumers aren’t the only ones that will need to be apprised of these changes. On its Chromium Projects page, Google explains that developers will likely need to revise their use of autoplay videos to get the most out of them.

In its developer recommendations, the company says that autoplay videos should be used sparingly to engage users, as unwanted video playback can often turn users off to a particular site.

Additionally, the company says that developers who have shied away from autoplay might consider using muted content to warm users up to the idea of exploring additional content.  

The new autoplay functions are slated to roll out in January 2018.

Google and Samsung just unveiled the first Chromebook you might actually want to buy

 

(Christopher Mims @mims) Google has slowly but very deliberately encroached on territory previously claimed by Windows PCs: low-cost notebooks. Now its latest Chromebook may pose a threat to Apple’s dominance of the higher-end market.

Previously, Google’s Chrome operating system has mostly been confined to sub-$300, bare-bones notebooks, aimed at schools, students, or people looking for a simple laptop for basic tasks like email and light web-browsing.

The problem with most of Chrome OS-powered laptops put out by Google’s hardware partners (which include HP, Lenovo, ASUS and just about all the other PC makers) is that they weren’t really suitable for more intensive users as a primary PC (because of limited memory, small or low-quality screens, or slow processing speeds). The one exception was Google’s own Chromebook Pixel, which costs $1,300 and hasn’t been updated in over a year.

It’s clear, however, that Google is determined to make Chrome a full-fledged OS on par with Microsoft Windows. When I visited Google’s Mountain View headquarters last year, I noticed that everyone working at Google who wasn’t a developer was using a Chromebook Pixel.

Samsung’s Chromebook 2 delivers

For the first time, it appears that one of Google’s hardware partners is ready to offer the low-cost but full-fledged notebook that would be required to deliver on that ambition. As Wired put it, this new notebook is “almost a real laptop.”

The new Samsung Chromebook 2 comes in two sizes: a $400 13.3-inch model with a screen of the same resolution as a true high-definition TV; and a $320 11.6-inch version. Both run on a fast mobile processor, Samsung’s Exynos, which will also appear in some models of the company’s flagship Galaxy S5 smartphone.

These notebooks don’t have much storage—just 16GB—but that hardly matters, because the point of a Chromebook is that you’ll probably access the vast majority of your data and apps in the cloud (whether Google’s or elsewhere). Importantly, both models have 4GB of RAM, which is probably the minimum you’d want to have a bunch of browser tabs open without the Chromebook slowing to a crawl.

Will a smartphone processor do the trick?

It’s easy to look at Samsung’s new Chromebooks and say “well, they’re not that powerful compared to their Windows and Apple Macintosh equivalents”—and that’s absolutely true. But Google’s Chrome OS is also a much more lightweight operating system than either Windows’ or Mac’s. This means (according to my own testing and numerous reviews) that Chromebooks don’t require that much horsepower to function at more or less the same apparent speed as competing operating systems on more powerful notebooks.

Overall, the trend in how people get things done is moving away from PCs and towards tablets and phones. But the Chrome OS has the potential to capture a significant portion of the laptop market even as the total size of the pie shrinks—after all, most of us still prefer a keyboard and a trackpad for getting “real” work done.

In other words, if a $400 13-inch Samsung Chromebook is, for most everyday users, just as functional as an $1,100 13-inch Macbook Air—but the Chromebook has a better display—Google and Samsung could have a hit on their hands.

Chrome OS is outgrowing its dependence on the cloud

There’s one other thing that Google is just starting to implement that’s going to be very important to the future of Chrome OS—applications that live on the Chromebook itself, and run locally, instead of running from the cloud. This is a shift in direction from Google’s original cloud-only strategy for the Chrome OS, but it’s a reflection of the reality that we’re not always on a fast connection to the internet, and constantly re-downloading apps in our web browser is a waste of precious (and often metered) mobile bandwidth.

These “packaged apps” are not unlike apps on mobile devices or any Mac or Windows PC. And with their introduction, Google has made it possible for developers to create software that works much more like the kind of (mobile and desktop) apps most people are accustomed to.

Chromebooks represent only 1% of all PCs sold in 2013. But the more missteps Microsoft makes, and the more Google comes to dominate mobile computing in general, the more competitive Chromebooks could become. If nothing else, Google has, through constant improvement of both the hardware and software sides of the Chromebook, demonstrated a commitment to the platform. And Google, with its massive revenue from other businesses, can afford to be patient.

Google+ Facebook Twitter and the future of search engine optimization

by William Harrell

Much has been said about social networking and how it will effect the way we communicate going forward. However some fail to realize how it’s going to effect other things, for instance search optimization and online advertising.

Years ago banner ads were taboo. If you had them on your site then you obviously did not know about the glorious world of Google Adwords. Everyone soon switched to the Google Ad platform and used the paid ads on search platform to boost bottom lines and make life easier. Some companies like Zappos for instance have well documented cases where they relied very heavily on paid ad placement to drive sales. Organic search placement was placed on the back burner and paying to play became the norm.

Now we are in a new era, one where mobile and social will rule the search world. Localization through different channels will be the norm for all good SEO plans going forward and some out of the box thinking will have to be applied to get companies in the position to reap the benefits of mobile search. For instance, if an Apple iPhone user is using the “Siri” search to look for a hamburger place, Siri will use Yelp.com to find restaurants close to that person using the GPS coordinates in their phone. So if your hamburger joint’s SEO plan does not include localization using 3rd party sites like Yelp, meaning only using the major search engines like Google & Bing then your website might not even come up using this method.

Lets talk about social influencing search. Google+ and the +1 feature seems to be a simple way to give a page a little extra klout. What we are really looking at is the evolution of search. Having a social account with a number of influential friends will not only give you tons to read in the form of cute sayings and status updates about other peoples days, you will also get their recommendations (or +1′s) when you are searching. So two people, in the same location, of the same exact demographic will one day produce a completely different search and there is nothing you can do as far as traditional search optimization to stop it. Do not be too worried about your ad placement however because new avenues will open up in the form of paid status updates, mobile ad networks and social network ad placement which will take the place of the mobile Siri search that didn’t include your business.

Marketing your business online has never been easier and there has never been more ways to do it. The trick is finding a company that can use all these new and innovative techniques to engage customers and make them want to be involved with your brand enough to share your message and advocate your brand. This is what the new social web search will be about.

Greg Allen Performance Review Fenner Dunlop Americas

2016 Annual Performance Review of Greg Allen IT Systems Analyst - Lavonia
Conducted by MIS Director Tim Redmond (Supervisor) and Plant Maintenance Manager Dowell Morgan (Maintenance Manager)

Safety Awareness : Solid Performer

Supervisor: Follows all Fenner Safety Guidelines. Greg is always Safety Aware, and ensures visitors and vendors comply with FDA safety rules. He has learned and participated in the Hazard ID program and takes Safety as the serious topic that it is.

Maintenance Manager: Greg is positive towards safety and supports the Hazard ID program. He reports potential hazards or breaches of security plans while in the workplace. He responds positively to safety-oriented feedback.

Team Work : Exceptional Performer

Supervisor: As a relative newcomer to Fenner, Greg has quickly become an integral member of the Lavonia plant team and a good contributing member of the It department. He has jumped in attending the weekly plant operations meetings and established a good working relationship with Maintenance and Engineering groups. Feedback from the Plant Manager is very positive about Greg and his contribution to date

Maintenance Manager: Greg is an outstanding team player. He has been very receptive to me and my team. He tends to set goals, time lines, and follows up routinely.

Customer Focus : Solid Performer

Supervisor: Greg knows his customers and advocates well for them in IT related situations. He established a good report with key department mangers, plant manager, and superusers, and integrated himself with all things IT at the Lavonia plant.

Maintenance Manager: Greg seeks and listens to customer’ needs, suggestions, and feedback. He will usually have an answer for the needs of our team.

Communication : Exceptional Performer

Supervisor: Greg is a seasoned IT veteran and knows how to communicate well with both users and management. He listens well and is open to new ideas to solving business and precess problems. He is sensitive to user’s needs, but mindful of It standards and how to steer users to good solutions by researching and communicating possible technology solutions where appropriate. Feed back from Plant Management has been very positive regarding Greg’s communication and contributions to date.

Maintenance Manager: Greg transfers thoughts and expresses ideas in oral and written form. He tends to do his homework then gives appropriate suggestions or solutions in clear and precise solution to sustain a compelling and inspiring vision.

Behavioral Indications : Solid Performer

Supervisor: Greg is taking on this new position in Lavonia with good initiative and hard work. He is integrating well with his peers and transforming the IT position to be more of an innovator than just reactive. He is bringing new ideas for more effective production monitoring and cost savings with open source alternatives. We look forward to doing some new and different solutions with technology in the coming years.

Additional Thought: Greg has implemented a Maintenance System, in place of the Reactive System, so that systems and users can operate at peak levels without equipment downtime.

Maintenance Manager: Greg uses practical methods which improve doing things to solve problems and/or improve processes. He is action oriented and full of energy, focused on solving issues for things he/she sees as challenging.

Functional Technical Skills : Exceptional Performer

Supervisor: Greg brings good technical knowledge and experience to his position. FDA an IT perspective, he has all the qualifications we need (computers, networks, etc.) He has good Information Systems background and is eager to learn the ins and outs of E9. This will become and increasing part of his roll as we move forward and we are planning on bolstering his Epicor knowledge with training and programming/reporting assignments.

Additional Thoughts: Greg has drastically reduced downtime through system monitoring, maintenance, and user education.

Maintenance Manager: Greg thinks of ways to apply new developments to improve organizational performance of our employee's as well as the machines. He has the functional competence, knowledge and skills to advance our plant to where we need to be over the next five years.

Drives for Success : Exceptional Performer

Supervisor: Greg shows good energy and drive and is very enthusiastic about technology and its application to help solve precess and business problems. On of his first big challenges was to help move the Beaming Calculations protect along when it had a tendency to become stalled when users competing priories got in the way. He was able to walk the users through required testing and understanding of a technical enhancement to E9 and bring the project to completion. He also did a good ob sticking with the troubleshooting of the Communications Displays where a problem was persisting in having them work properly. He kept driving until the vendor finally recognized that there was a problem in their devices and worked up a permanent fix at no charge to Fenner.

Maintenance Manager: Greg demonstrates sustained effort and enthusiasm to get the job done. He delivers results and holds others accountable through-out the precess and completes on a timely manner.

Integrity and Trust : Exceptional Performer

Supervisor: Greg has shown the he an be a mediator at times and hold an open and honest position about problems and their potential solutions. He is good at holding to department standards and keeping appropriate confidential material. He is establishing a good reputation for honesty and fairness. I hold all It department members to a high standard in this category and Greg meets those high standards fully.

Additional Thoughts: So much of what we do in IT is never seen or understood by the folks we work for. Always Faithful In Little Or Much is the mantra to live by.

Maintenance Manager: Greg stays true to his values, communicates honestly and openly. Doesn’t have any hidden agenda.

Concluding Comments

Supervisor: Greg is new to Fenner, but a veteran of the IT industry for over 20 years.

He brings new and different ideas for solving business and process problems with various forms of Technology. I look forward to incorporate Greg and his experience more heavily into FDA IT tasks and decisions.

Maintenance Manager: I enjoy working with Greg. He has been of great help to me these last few months.

 

Greg Allen Resume 9/1/2017

Resume 9/1/2017
Gregory M. Allen
PO Box
373

Fair Play, SC 29643
active-technologies.com
gregunit@yahoo.com
(864) 539-6206

See active-technologies.com ProNet Video

Linkedin

 

Group and Organize Your Start Screen Tiles in Windows 8

(Jill Duffy PC Mag) Keeping your computer organized and your desktop clutter-free can be pretty difficult. And with last week's official release of Windows 8, users have another screen they need to get used to organizing—the new Metro-style Start Screen. It uses large rectangular or square tiles in place of the standard icons you've seen on older Windows operating systems. For better organization and grouping, you can group similar items onto a page (similar to many smartphones), you increase or decrease the size of any particular tiles, and you can remove tiles that you rarely use

For better organization and grouping, you can group similar items onto a page (similar to many smartphones), you increase or decrease the size of any particular tiles, and you can remove tiles that you rarely use.

All of these options and more are showcased in the video below.

 

 

Even though I am not new to Windows by any stretch—it's an operating systems with which I've developed a deep and complicated love-hate relationship since the mid 1990s—I have been struggling with not only how to arrange the tiles on Windows 8 thematically, but also physically how to do it.

Get OrganizedThat's all to say that this article takes a pretty elementary approach. If you consider yourself a Windows power user, stop reading here and instead check out Michael Muchmore's Super Guide to Windows 8.

Windows 8 Tile Organization

Background. Windows 8's user interface looks remarkably different from prior versions of Windows. Instead of clicking on desktop icons to get to your favorite programs, you'll find "tiles" on a new Start screen. You can rearrange these tiles, just as you can organize app icons on most smartphones.

Download and install apps before organizing existing ones. Before you start rearranging the placement of tiles to your liking, I recommend downloading a few apps first. The reason? Some apps are one-by-one squares, while others are rectangular and twice as wide as they are tall. See the image above. Notice how the tiles for Wikipedia, StumbleUpon, and Goals are twice as wide as any of the others. You can shrink a rectangular tile to the square dimensions to make it fit more neatly if you like (which I'll explain how to do on the next page).

Plopping a double-wide tile into an organized set can throw the whole thing off. So try to get a bunch of tiles on your plate before you start moving them around.

Tip: Any time you can't find something, try hovering on the right side of the screen, or swiping from right to left on a touch-screen tablet or PC, or use Windows key+C on the keyboard to uncover "Charms," which notably include the Search button.)

Organize by themes or workflow? Some people like to organize their apps by theme, grouping together programs that accomplish similar feats, but I think a better rationale is to group by workflow.

On all my devices, I tend to cluster apps according to how often I use them and which ones I use in conjunction with others.

Methods for arranging tiles on the screen. There are many ways to organize your apps, and I'll explain three of them here.

First I'll share the way I do it. I put high-use apps onto "hotspot" sections of the screen, or areas where I am likely to put my fingers or reach with my mouse first. For me, these areas tend to be in the lower left and upper right corners. For many touch screen users, the hotspots are vertical areas along the left and right sides, near your thumbs when you're holding the device.

Another way to order your apps is to slot them by use in grid formation, left to right and top to bottom.

A third solution: Cluster by workflow. For example, set all your office tiles together, maybe adding the "print management" tile to that group, too. Another example would be to group leisure apps, like games and Web discovery tools, together but also out of sight so that you're not distracted by them when you're trying to be productive.

You can arrange your tiles however you like, of course.

Which brings us to this question: How do you physically move tiles around the Windows 8 Start screen? It's not completely intuitive on a touch screen device.

How to Move Windows 8 Tiles

On the previous page, I recommended downloading some apps before you start arranging them. As you download them, some appear as tiles on your start screen and others do not. So where are the rest?

Windows 8 Find missing tiles. To see all your tiles, go to the start screen and swipe up. A blue-green bar will pop up at the bottom. Press the "All apps" button.

Add tiles to the start screen. Find the program you want to add to your start screen. Gently press it, pull down, and release it (have patience, as it takes practice to get this rhythm right). A check mark will appear, and the app will be highlighted in a blue-green rectangle. Another bar appears at the bottom of the screen. The leftmost button says Pin to Start (or Unpin from Start if it's already on the start screen). Press that, and viola.

Make rectangular tiles into squares. To change a double-wide rectangular tile into a square, gently press, pull down, and release the tile, then look for the button on the bottom that says Smaller. You can revert back to the rectangular shape using the same action. Not all tiles can change dimension, although rectangular tiles can always become squares and can always be restored to the rectangular shape.

Rearranging tiles. Back on the start screen, you'll use the same motion as before—press gently, pull down, release—to rearrange your tiles. Tiles again have a blue-green highlight and check mark on them when they're active and ready to be dragged around to a new place. To move a tile to an area that's not visible on your start screen, just drag it all the way to the edge of the screen, until the viewer slides over.

Rearrange grouped tile sets. As you arrange your tiles, you'll notice they cluster into sets. You can tell a set because it's defined by a larger margin area. To move these tiles en masse, first zoom out by pressing Ctrl- or holding Ctrl while using the mouse wheel (or "unpinch" on a touch screen). Again, use that three-step motion—gently press, drag down, release—to select the group. You can now drag it wherever you like. You can also name each group using the bar at the bottom.

Finally, to create new group, swipe up on a tile and drag it right past all existing groups.

More Windows 8 Info

Whether you dig the new Windows 8 or not, tiles are central to the experience (although there are third-party apps that can suppress the new Start screen if you really dislike it). So set them up into organized groups that make sense for you, whether by theme or some other logic.

HDMI Splitters

HDMI Splitters

An HDMI Splitter is used to take a single source (such as a BlueRay Player, Cable Box, or Satellite box) and distribute that HDMI signal to multiple TVs.  Most splitters if needed can also be cascaded to further expand such splitting capability.  The use of a higher-grade cable when using a splitter is highly recommended due to the added resistence of connecting your devices through multiple ports.  A splitter should not be confused with an HDMI SWITCH (which is used to connect multiple HDMI source devices to a single TV).

The most common splitter is a "1:2" - or "one to two".  The most common use for such splitter is to attach to a cable or satellite box, and split (or distribute) such signal to 2 TVs located in different locations.  All of today's modern splitters support most of the HDMI version 1.4A specifications.  Splitters can NOT support ARC (audio return channel) and HEC (HDMI over Ethernet) as the properties of these features require that the source device be dedicated to a single TV.

 Splitters can generally be used up to 50ft from the splitter location to the TV providing that high-quality HDMI cables are used.  A maximum distance of 25ft from the source device to the splitter is recommended.  Longer distance from the splitter to a TV can be obtained using our REDMERE HDMI Cables orFiber Optic HDMI Cables.  An HDMI cable is attached to the source device's (such as a cable box) OUTPUT port and the other end to the splitter's INPUT port.  HDMI cables are then attached to each of the splitter's OUTPUT ports to each of the TV's.  Normally, a general duty 28AWG cable could be used for shorter distances.  However, our FLEX EXTREME cables are recommended when using HDMI splitters to minimize resistence.

Splitter Limitations

The use of splitters does have some caveats.  If the resolution capability on one (or more) of the TVs being split to is different (for example, if one TV supports 1080P, and the other only 720P), the splitter must drop the split resolution to that lower resolution.  Both TVs (while powered on) will thus drop to 720P.  However, if the lower resolution TV is powered off, the splitter will re-scan the destination displays and support the original higher resolution ignoring the powered off TV.

Signal converters (such as HDMI to VGA or HDMI to Component Video) may not properly work when with a splitter.  The splitter attempts to perform a "handshake" looking back at the source device (such as a BlueRay player), and ahead to all destination devices (such as your TVs).  When a converter is introduced after the splitter en-route to the TV, the splitter on MOST OCCASSIONS can not successfully determine the proposed resolution and signal type that the converter is programmed to output.  Certain splitters will however successfully work with certain converters, but we have not been able to find a definitive combination of such products that will always work properly together.

A splitter can NOT be used in reverse.  If you have multiple HDMI devices that you are trying to connect and your TV is short an HDMI INPUT port, use a SWITCHinstead.

Splitters and 3D

If you are using a splitter to send a signal to a 3D TV, and then are trying to send the OTHER signal to a receiver (to capture AUDIO), the 3D signal MAY not be supported.  The splitter (using HDCP digital content protection rules) first completes a "handshake" to each of the destination devices to determine what resolution and features are being used.  This handshake information is then sent back to the splitter to determine what resolution - and if a 3D image can be split successfully.

If you are splitting a 3D signal to TWO TVs, and one of the powered on TVs does NOT support 3D (or the 3D capability is of a different technology), the splitter again must automatically drop the 3D capability and provide a signal that is supported by both powered on TVs.  This is not a splitter design deficiency - but an electronic property of the HDCP (copy protection) rules that all splitters must adhere to.

Capabilities

Splitting an HDMI signal provides for the following support for all our current splitter versions:

  • Support for concurrent TV usage - meaning both TVs can be on at the same time without violating HDCP rules, or content licenses providing that signal is being split into the same house-hold, or same business location.  All TVs are not required to be powered on at the same time, however.

  • 3D Support - provided BOTH display devices being split to BOTH support 3D and the 3D technology is of similar type (ie passive vs active).  If ONE (or more) of the displays does NOT support 3D signally, such display (or receiver) can be powered off and 3D capability will be restored to the remaining TV.  You may have to power cycle the splitter to achieve this.

  • All major audio formats are supported - DTS (HD) Master Audio 6 channel, LPCM (2 and 8 channel), Dolby Digital AC3, Dolby True HD, Dolby Digital Plus

  • Long distance support - The length of cable from the source device to the splitter should be no longer than 25ft.  The BEST possible HDMI cable should be used for this length.  From the splitter to a destination TV, the maximum recommend length is 50ft using conventional or REDMERE HIGH SPEED HDMI cables.  Lengths beyond 50ft have been successful using our FIBER OPTIC HDMI cables

 

HDMI Splitters

HDMI Splitters

An HDMI Splitter is used to take a single source (such as a BlueRay Player, Cable Box, or Satellite box) and distribute that HDMI signal to multiple TVs.  Most splitters if needed can also be cascaded to further expand such splitting capability.  The use of a higher-grade cable when using a splitter is highly recommended due to the added resistence of connecting your devices through multiple ports.  A splitter should not be confused with an HDMI SWITCH (which is used to connect multiple HDMI source devices to a single TV).

The most common splitter is a "1:2" - or "one to two".  The most common use for such splitter is to attach to a cable or satellite box, and split (or distribute) such signal to 2 TVs located in different locations.  All of today's modern splitters support most of the HDMI version 1.4A specifications.  Splitters can NOT support ARC (audio return channel) and HEC (HDMI over Ethernet) as the properties of these features require that the source device be dedicated to a single TV.

 Splitters can generally be used up to 50ft from the splitter location to the TV providing that high-quality HDMI cables are used.  A maximum distance of 25ft from the source device to the splitter is recommended.  Longer distance from the splitter to a TV can be obtained using our REDMERE HDMI Cables orFiber Optic HDMI Cables.  An HDMI cable is attached to the source device's (such as a cable box) OUTPUT port and the other end to the splitter's INPUT port.  HDMI cables are then attached to each of the splitter's OUTPUT ports to each of the TV's.  Normally, a general duty 28AWG cable could be used for shorter distances.  However, our FLEX EXTREME cables are recommended when using HDMI splitters to minimize resistence.

Splitter Limitations

The use of splitters does have some caveats.  If the resolution capability on one (or more) of the TVs being split to is different (for example, if one TV supports 1080P, and the other only 720P), the splitter must drop the split resolution to that lower resolution.  Both TVs (while powered on) will thus drop to 720P.  However, if the lower resolution TV is powered off, the splitter will re-scan the destination displays and support the original higher resolution ignoring the powered off TV.

Signal converters (such as HDMI to VGA or HDMI to Component Video) may not properly work when with a splitter.  The splitter attempts to perform a "handshake" looking back at the source device (such as a BlueRay player), and ahead to all destination devices (such as your TVs).  When a converter is introduced after the splitter en-route to the TV, the splitter on MOST OCCASSIONS can not successfully determine the proposed resolution and signal type that the converter is programmed to output.  Certain splitters will however successfully work with certain converters, but we have not been able to find a definitive combination of such products that will always work properly together.

A splitter can NOT be used in reverse.  If you have multiple HDMI devices that you are trying to connect and your TV is short an HDMI INPUT port, use a SWITCHinstead.

Splitters and 3D

If you are using a splitter to send a signal to a 3D TV, and then are trying to send the OTHER signal to a receiver (to capture AUDIO), the 3D signal MAY not be supported.  The splitter (using HDCP digital content protection rules) first completes a "handshake" to each of the destination devices to determine what resolution and features are being used.  This handshake information is then sent back to the splitter to determine what resolution - and if a 3D image can be split successfully.

If you are splitting a 3D signal to TWO TVs, and one of the powered on TVs does NOT support 3D (or the 3D capability is of a different technology), the splitter again must automatically drop the 3D capability and provide a signal that is supported by both powered on TVs.  This is not a splitter design deficiency - but an electronic property of the HDCP (copy protection) rules that all splitters must adhere to.

Capabilities

Splitting an HDMI signal provides for the following support for all our current splitter versions:

  • Support for concurrent TV usage - meaning both TVs can be on at the same time without violating HDCP rules, or content licenses providing that signal is being split into the same house-hold, or same business location.  All TVs are not required to be powered on at the same time, however.

  • 3D Support - provided BOTH display devices being split to BOTH support 3D and the 3D technology is of similar type (ie passive vs active).  If ONE (or more) of the displays does NOT support 3D signally, such display (or receiver) can be powered off and 3D capability will be restored to the remaining TV.  You may have to power cycle the splitter to achieve this.

  • All major audio formats are supported - DTS (HD) Master Audio 6 channel, LPCM (2 and 8 channel), Dolby Digital AC3, Dolby True HD, Dolby Digital Plus

  • Long distance support - The length of cable from the source device to the splitter should be no longer than 25ft.  The BEST possible HDMI cable should be used for this length.  From the splitter to a destination TV, the maximum recommend length is 50ft using conventional or REDMERE HIGH SPEED HDMI cables.  Lengths beyond 50ft have been successful using our FIBER OPTIC HDMI cables

 

Hack Happiness with Sentio emotion-tracking wristband

 

Photo

Photo via Twitter

(Sarah Young @ ConsumerAffairs) The future holds a seemingly endless number of products that seek to improve the quality of our health. From Fitbits to Smart Sneakers, wearable tech has already figured out how to track our physical needs  but what if it could also track your emotional needs?

That’s the idea behind Sentio’s emotional tracker, appropriately named “Feel.” Revealed at CES 2016 last week, the emotion-tracking wristband can sense when your mood isn’t the greatest and prescribe solutions or a program to help get you back to happy.

Sentio’s slogan for the Feel? “Hack Happiness.”

Tracks biosignals

According to the “myfeel” website, the Feel works by using “4 integrated sensors on the wristband [that] measure and track biosignals from users throughout the day, including galvanic skin response, blood volume pulse and skin temperature.”

Using a companion app, the Feel system visually graphs a user’s emotional state throughout a given day and provides “personalized recommendations to help users reduce stress and improve well-being.”

For example, the Feel will know that you were feeling awesome after you ran several miles yesterday. Today, it has sensed that you’re not feeling as great, so it will recommend that you do some more running.

Other features

The Feel wristband offers a number of other cool features, all while boasting a look slightly more stylish than the Fitbit. (It’s leather.)

Feel “alerts” will cause the wristband to vibrate in the case of an extremely stressful situation, which may or may not add to the stress of the situation a la the game Operation. 

The app can also give "personalized recommendations." You'll get coaching on how can you improve your emotional health, with advice such as "laugh more" peppered throughout your day. 

An emotional wellness plan will help ensure users are sticking to their long-term emotional goals; daily analysis of which will allow wearers to track whether their overall state is improving or declining.

Will it work?

Since it’s only a prototype, it remains to be seen whether or not the Feel can actually make people happier —much less, how people will respond to the idea of forced happiness.

While it’s similar to Fitbit, the Feel wristband has much less concrete evidence from which to harvest its data, since emotional well-being is so much more complex than physical well-being.

Because while even an inanimate object may indeed be able to judge when we’re in a mood, can it really know what types of things trigger certain emotions? That’s like asking a robot to be human.

Handling Disagreements Effectively

Be reasonable. Do it my way. (Bumper Sticker Quote)

If everyone did things my way, there would never be disagreements. But that world doesn't exist and we all face disagreements every day. Most view disagreements as undesirable but actually, if  handled effectively, disagreements often can lead to creative solutions that really work for everyone concerned. The following are tips on making sure disagreements become productive rather than divisive

1: Make certain there is really a disagreement
Ever witnessed a "volatile agreement"? It can actually be funny, as long as other people, rather than you, are involved. For example:

A says, on Monday, "The report won't be available for at least two days."

B says, "That's ridiculous! We won't have it until Wednesday!"

There's no disagreement here, right? Most likely, B was expecting to hear a specific day, rather than an interval of days. In other words, B might not have been listening carefully. In this case, A could say, "Wait a minute, we're saying the same thing. Wednesday is more than two days from Monday."

A variation of the volatile agreement is the "volatile non-disagreement." For example:

A says, "Babe Ruth played for the Yankees."

B says, "Baloney; he played for the Red Sox.

Here, B's mistake is thinking that playing for the Yankees and playing for the Red Sox are mutually exclusive. However, as most people know, Babe Ruth actually played for both teams.

Other false conflicts could involve time (different time zones), distances (miles vs. kilometers), or release levels (different/additional functions, depending on the release).

I could cite other examples, but I think you get the point. Matters that appear to conflict might not really conflict at all. Listen carefully to the other person and make sure there really is a difference.

#2: Separate yourself from your position
In his classic work The Psychology of Computer Programming, Gerald Weinberg describes the concept of "egoless programming." Under this concept, a team of technical programmers, including the author of a program, reviews that program, checking for errors. The less defensive the programmer feels about the code, the more productive the review process will be. In other words, the process goes more smoothly if the programmer separates himself or herself from the program and doesn't view discovered errors as a personal attack.

In the same way, actors, when interviewed about a role they play, generally refer to their own character in the third person. When talking about his character, Benjamin Martin in The Patriot, for example [SPOILERS AHEAD], Mel Gibson would more likely say, "Gabriel's death had a big impact on Benjamin" rather than "Gabriel's death had a big impact on me." Similarly, he would more likely say, "Benjamin Martin is a man who's trying to escape his past," rather than "I am a man trying to escape my past."

Try to adopt this view of disagreements. If we involve ourselves personally with our positions, we will have a harder time being objective about them. That lack of objectivity can prolong a disagreement needlessly. Try to view your position not as "your" position, but merely "a" position. In the same way, if you have an issue with someone else's position, make clear that your concern is with the issue, not with the person, if that's the case.

#3: Maintain professionalism
We've all heard the old saying about "disagreeing without being disagreeable" and that "honey attracts flies better than vinegar." The lesson learned, treating people with respect "” even those with whom you disagree "” can earn you respect in return and gives your position added credibility.

#4: L I S T E N!
The volatile agreement involving the two-day delay could have been avoided had person B listened carefully. Listen to what they have to say completely before responding. If you have to interrupt, for example, because the other person is being long-winded or redundant, try to summarize your understanding first. People sometimes express themselves differently than you expect. If you fail to listen, you might find yourself responding not to the other person's actual position, but only to what you thought the other person's position was.

#5: Recognize and avoid "straw man" arguments
This point carries over from the previous one. It's easy to argue against a position that no one has. Attacking a position that isn't really the one a person holds is called a "straw man" argument because, like a straw man, it's easily knocked down.

If you fail to listen carefully, you may find yourself wasting time reacting to such a position rather than to someone's actual position. It's bad enough to attack a straw man by accident; it's ethically questionable if you do it deliberately. Similarly, make sure others really do understand your own position.

#6: Agree to disagree
Sometimes, no matter how much discussion occurs, you're unable to agree on one particular point. In some cases, that single disagreement prevents further discussion. However, other times, you might be able to switch to other topics. If so, it's best to "agree to disagree" on the point of contention and move on to the other areas. Maybe later you can return to the disagreement and work through it. But try to make progress in spite of the issues about this one thing. If nothing else, say “That’s your opinion, and I respect that!”

#7: Watch what you say
Once spoken, words can never be taken back. There's no "untalk" feature corresponding to an email "unsend." Similarly, when a stone enters a pond, it sends out ripples that go only outward. As the saying goes, "A harsh word stirs up anger."

Momma advised my to count to 10 before answering. In particular, and in view of the earlier advice to separate person from issue, be careful about overusing the words "you" or "your" or similar terms. Doing so blurs the line between person and issue and can make the other person feel defensive or accused.

A good technique is to "play Columbo," a reference to the old television series about a detective with that name. Peter Falk, who played the role, came across as an idiot who always needed someone to explain things to him. In the same way, if you have a disagreement or concern, consider expressing it via a question rather than via a statement. Does the other person's position lead to a problem? Ask questions so that in answering them, the other person realizes the issue as well. Just don't overdo this technique or it will sound contrived and insincere.

#8: Use a lower voice
Just as "A harsh word stirs up anger," "A mild (soft) answer turns away wrath". I have seen this used in heated boardroom debates and it works. "If you lower your voice, frequency, volume, and pace when speaking, you accomplish three things. First, you reduce any tension that might exist. Second, you force the other person to listen to you. Third, because of its unexpected nature, lowering your voice can gain you a psychological advantage in the discussion.

Case and point: Board members were arguing which direction the company should take. Passions were running high.. booming voices were shaking the walls, red eyes, veins bulging, fists shaking, I thought for sure it would turn into a fist fight! Then one manager crossed his hands behind his head, sunk down in his chair and took a long stretch like only a cat who is very comfortable could. As he softly spoke in low pear-shaped tones, the room became quite and calm. Folks listed intently and completely to his point and, in this case, it was unanimously adopted and met with great success.

#9: Try to see the other person's point of view
In a previous blog entry, I talked about the importance of seeing the other person's point of view when explaining a technical concept. That same principle applies with respect to disagreements. The more you understand someone's position, the more you may understand their concerns "” and the more likely you can resolve the disagreement. In fact, before responding with your own position, consider paraphrasing the other person's position and concerns first. Doing so sends a powerful message. Even more important, emphasize first those matters upon which you and the other person agree.

#10: When the disagreement is resolved, put it behind you
We all know the saying about "water under the bridge." Once a matter is settled, don't keep a record of wrongs. Let it go. Dwelling on past differences seldom leads to productive results and can lead to bitterness and bad feelings. Look back only to learn from what happened, so that you can avoid similar mistakes (if any) in the future.

#11: Usually there is more than one way to get something done.
Rather than wasting time massaging your ego and debating endlessly, if their way works, just do it their way, give them credit for a good ideal, and get the job done!!!

If you require additional information or assistance with this item, please give us a call.

Hard Drive Safari 2011

Well it happened again. Last Wednesday I needed a hard drive for a computer. Since I needed it NOW and didn't have one in stock, I safaried to North Charleston to see what kind of local deals I could find from a computer store. This became quite an adventure as you will soon see, but first a little history lesson on computer stores.

I say it happened again because then situation reoccurs about once a year, and that’s not too bad because if you run out of hard drives once a year, it means that the management of that inventory item is about right. You can read about last years safari by clicking here.

Well, so much for history, how about that; A quick look on the internet found a Seagate Barracuda 500 gig SATA drive with 32 megs of cache for $35.99 plus shipping. Best Buy offered the same drive for about $129.99. OUCH that hurt! Who said you couldn't make money on computer stuff.

So I made the trek back to Summerville along Rivers Avenue to Hi way 78 stopping at each computer store I found. The first couple of stores matched the Best Buy price on the same drive. The next offered a 320 gig for $70.00. OK - kind of old and small, that will work ring it up!. Your total is $106.48. WHATTT! How do you get $106.48 from $70.00??? "Sorry sir, I got the wrong price." The darn thing wasn't even in a box and the plastic wrap was torn. Thinking back, this same store tried the same thing on me last year. In fact, it looked liked the same drive.

The next store offered a 500 gig for $255.00. I couldn’t believe what I was hearing; $255.00 for a 500 gig drive? I asked to talk with the manager. He was friendly, and we talked about the high price of overhead, and how shipping prices have doubled in the last year. As such he said “you seem to be a nice guy. I’ll tell you what, I’ll let you have the drive for $205.” The manager became visibly upset when I turned him down.

Next stop Wal-Mart:  Main Street, Summerville.. They had 6 Seagate 1 Ter SATA drives 16 megs cache in the box with cables and documentation for 98.98 plus tax, and a guarantee that if it didn't work, I could bring it back. Eureka! I HAVE MY DRIVE AT LAST!!!

Not so fast!  Last year when I purchased a hard drive from Wal-Mart, I had to take it back twice. They exchanged it quickly, but there was still the hassle of going back and forth to Wal-mart. But not this time. This time the first drive was good and my hard drive safari was over.

 For many computer stores, the game has changed very little. If they sell a Dell with a 1 Ter drive, it may have originally come from the factory with a 350 gig drive. They take that one out and place it in a plastic wrapper and sell it for $150.00 plus $30.00 for cables. Then they buy a 1Ter gig drive for $59.95 with cables and mark the Dell unit up $150.00. The new cables that came with the drive are placed in new packaging and sold separately. That’s $305.05 in additional profit.

Perhaps if we run out of drives next year, we’ll write a “hard drive safari 2012.

Hard Drive Safari 2012

Well it happened again, but this time it was my Linux server hard drive. Interesting because my Linux server is an 11 year old Dell with an Intel Pentium 4 processor that still performs about as fast as a Windows Server with duo core processors.  It was the hard drive partitioned as “home”, where I keep all of the user data for the company that went down. That means that I could simple replace the drive, restore the data from one of my many backups, and be back in business in no time. Timing could not have been better as I use Friday as a “clean-up day”, and only had one appointment scheduled for noon. So I took off early just to see what I could find from local vendors, but instead of starting my safari in North Charleston, I began looking for vendor’s right here in Summerville.

Perusing the internet, I found Seagate 1 Terabyte 7200 rpm drives 32 Megs of cache for about $50, plus $10 shipping, so $60. This was up $15 from last year.

Last year’s hard drive safari was just like the year before, and the year before that, and so on. The only thing that changed was the names of the companies and the size of the drive.

This year was very different. The first three local computer stores that I visited did not stock hard drives. Why, I asked? The common answer was that drives are getting so much bigger, so fast, that if they bought a drive today for stock, it might be obsolete tomorrow. What was more interesting is that two of the three offered to buy a drive for me at Best Buy at cost, then charge only for installation and for restoring my data, around $200 for labor. Best Buy price was $79.95. That plus installation is almost $300. No way would I put $300 into an 11 year old computer. Just doesn’t make sense! Besides, when I told them it was Linux, they admitted that they couldn’t work on it anyway.

So I made the trek through Summerville, down Hi way 78 to Rivers, stopping at each computer store I found. I couldn’t find anyone in Summerville that stocked hard drives. The two stores I visited on Hi way 78 last year were gone. But then I found the same stores on Rivers Avenue that I visited the last couple of years.

No new tricks here. The first store offered a 320 gig for $70.00. OK - kind of old and small, that will work ring it up! Your total is $106.48. WHATTT! How do you get $106.48 from $70.00??? "Sorry sir, I got the wrong price." The darn thing wasn't even in a box and the plastic wrap was torn. Thinking back, this same store tried the same trick on me last year, and the year before. In fact, it looked liked the same old “piece of drive”!

The next store offered a 320 gig for $149.00. I couldn’t believe what I was hearing; $149.00 for a 320 gig drive? I asked to talk with the manager. He was friendly, and we talked about the high price of overhead, and how shipping prices have doubled in the last year. As such he said “you seem to be a nice guy. I’ll tell you what; I’ll let you have the drive for $99.” The manager became visibly upset when I told him about the Best Buy price turned him down.

The next store had a 500 gig drive for $79.95, but when they rang it up on the register, it came up $99.95 plus tax. What’s the extra $20 for? The Sada cables were extra. Now, I know that the drive came with Sada cables, power and data. These guys snatch the cables out of the box, reseal the box, mark the cables at $19.95, and put them on a rack for sale. What a “rip off”! Time to move on!

I began to tire from the adventure, so I went to the same store that I bought a drive from last year, Wal Mart. Guess what? They don’t sell internal hard drives anymore. What a shock because last year they nearly matched the online price AND, if a drive fails, they replace it immediately. Other stores would make you send it back to the manufacturer, and that could take weeks.

So Wal Mart was OUT! Now, what to do? I slid into Best Buy. First I went to the “Geek Squad” counter. Interesting deal. They said, buy your hard drive at the store (you pick it out and pay for it), then we will install it for $150. I asked for a written estimate and they said ok. Much to my surprise, the total wasn’t $150, but $219.95, that’s and extra $69.95. What is that for? The answer, diagnostics. They don’t do anything without running diagnostics first. When I told them the computer ran Linux, they retracted their offer.

So I went into the retail part of the store and found my drive, Seagate 1T, for $79.95 plus tax. Time to end this adventure, make my noon appointment, and get the server running.

At the register the checkout person was very insistent that I apply for a Best Buy credit card. I kept saying NO NO NO and she kept say But But But. The deal is that if I apply, I get $20 off of my purchase. That means my drive goes from $79.95 to $59.95, and that I’m under no obligation to accept the credit card. What a deal. I bought the drive, got the discount, turned down the card, and was off to my appointment, $20 to the good.

 For many computer stores, the game has changed very little. If they sell a Dell with a 1 Ter drive, it may have originally come from the factory with a 350 gig drive. They take that one out and place it in a plastic wrapper and sell it for $150.00 plus $20.00 for cables. Then they buy a 1Ter gig drive for $50 with cables and mark the Dell unit up $150.00. The new cables that came with the drive are placed in new packaging and sold separately. That’s $295.05 in additional profit.

Perhaps if we run out of drives next year, we’ll write a “hard drive safari 2013.

 

Hard Drive Safari

Saturday I needed a hard drive for a computer. Since I needed it NOW and didn't have one in stock, I safaried to North Charleston to see what kind of local deals I could find from a computer store. This became quite an adventure as you will soon see, but first a little history lesson on computer stores.

The first IBM PC store in Charleston was Franklin computer. Sure you could buy Tandy at Radio Shack and Apples from the local computer boutique, but Franklin was the only game in town for IBM PCs; you paid list price, and the waiting list was long but distinguished.

 Soon, other computer stores opened (bearing the IBM name but not IBM Authorized) with unbelievable low prices on IBM PCs, even selling them for half the price of Franklin. Franklin, unable to compete, soon went by the wayside. But why the price differential? Franklin, an authorized IBM dealer, sold only "True Blue" PCs with only IBM parts inside. The other computer stores purchased "Bare Bones" IBM PCs on the "Grey Market" and built them up with "brand x" drives, memory, and peripherals.  "True Blue" stores could not compete with "Grey Market" "Build-ups".

Some of the "build-ups" were of good quality,  others were not so good. But it seems to me that if you advertise an IBM PC that it should be IBM through ‘n' through. Otherwise it's like buying a Ford Mustang only to find a YUGO motor and transmission under the hood. Needless to say, I never played that game.

Well, so much for history, how about that; A quick look on the internet found a Seagate Barracuda 500 gig SATA drive with 32 megs of cache for $35.99 plus shipping. Best Buy offered the same drive for about $129.99. OUCH that hurt! Who said you couldn't make money on computer stuff.

So I made the trek back to Summerville along Rivers Avenue to Hi way 78 stopping at each computer store I found. The first store matched the Best Buy price on the same drive. The next offered a 320 gig for $70.00. OK - kind of old and small, that will work ring it up!. Your total is $106.48. WHATTT! How do you get $106.48 from $70.00??? "Sorry sir, I got the wrong price." The darn thing wasn't even in a box and the plastic wrap was torn. I let him keep his drive, kicked the dust from my feet and went on to the next computer store.

This store had an 200 gig for $70.00. As I waited in line the lady in front of me was paying for a $275.00 computer repair on an old computer worth about 2 cents. As she checked out she asked for a detailed list of the parts used to repair her PC and labor. "Sorry MAM, I can't do that. But your cash register receipt list codes for parts used and a total for labor". She asked the cashier, "Can you tell me what those parts are so I can write them down?' Cashier replied. "Sorry Mam, only the technician knows what those codes mean;  NEXT!".

The cashier brought me a 200 gig drive covered in finger prints with no box. Then she handed me a power cable and a SATA data cable off the wall and said " 200 gig drive $70.00, Data Cable $15.00, Power Cable $15.00, Tax, that will be $106.50, and if it doesn't work when you install it, don't bring it back here, send it to Seagate".  I let her keep that one too!

Next stop Wal-Mart:  Dorchester Road. They had 6 Seagate 1 Ter SATA drives 16 megs cache in the box with cables and documentation for 98.98 plus tax, and a guarantee that if it didn't work, I could bring it back. Eureka! I HAVE MY DRIVE AT LAST!!!

Not so fast!  When I got back to the shop and installed the drive it didn't work!  So I trekked back to Wal-Mart for a quick exchange,  popped it into the computer, and it didn't work again. Back to Wal-mart. Third times 's' a charm! It works!!! Finally!!! The experience was costly but I learned a lot.

For many computer stores, the game has changed very little. If they sell a Dell with a 500 gig drive, it may have originally come from the factory with a 150 gig drive. They take that one out and place it in a plastic wrapper and sell it for $70.00 plus $30.00 for cables. Then they buy a 500 gig drive for $35.00 dollars with cables and mark the Dell unit up $150.00. The new cables that came with the drive are placed in new packaging and sold separately. Net gain, $205.00. And so on - and so on - and Scooby dooby dooby!

Hi Def Video Bandwidth Crisis

Stream Hi Def video to 3 TVs, 3 iPads, 3 SmartPhones whilst downloading "who knows what". Will the internet have enough bandwidth?

Solving the puzzle of high-definition video, Internet packet protocols and other esoterica comes down to a single question for most consumers: how many remotes will I need? If the rumors sweeping the tech and financial worlds are true, it may that Steve Jobs' legacy won't be the iPhone, the iPad, iPod or even the iMac but rather the iTV, or whatever it will be called. Read More – Click Here!

Hold the Jack - Don't Drink At Company Functions

At that peak of my career, I was a consultant for an auto industry manufacturer. Our new General Manager made significant innovative changes in the business which led the company back to profitability. As a reward, the board of directors and upper-management threw a company-wide Gala to celebrate our new found success.

The awards ceremony and lavish banquet was followed by a reggae band and several open bars; everyone was encouraged to “drink - be mary - don't hold back - This is our time to celebrate”!

The GM (General Manager), who I know very well, noticed that I was not imbibing, so he brought me a 50/50 Jack and Coke, my favorite at the time, to prime the pump. I downed it quickly, then offered to get him his favorite drink, only when I came back, mine was “Jack and Coke” “Hold the Jack!”, a strategy that really paid dividends.

Before long, the Chairman of the Board was Slaloming through the crowds like a water skier with rubbery legs, unable to walk a straight line, the GM talked like his tongue swelled to four times it size and was stuck to the back of his throat, gagging him on every word, and a VP sat motionless at the table, not speaking or even blinking. I thought she was comatose until she hoisted her glass, then asked me to get her another. The whole room was “stupid drunk”. I don't know for the life of me how anyone got home safe.

After the Gala, the President got this idea that all of management should meet at the corner bar to finish off the evening. I was invited to ride in the limo with the Board and Upper-management. Good thing too because the GM and Chairman needed my help to stay upright, whilst I carried the VP. When we got into the limo, I quickly noticed that the limo driver was “drunk off his behind” too. So I pushed him over to the passenger seat, grabbed his keys, and took the wheel.

If the Gala experience wasn't bizarre enough, what happened next in the limo really blew me away. When the limo doors closed, everyone instantly sobered up. The slaloming Chairman, the Gagging GM, the comatose VP... They weren't drunk at all; they were faking it.

What is worse is that it became apparent that this was a premeditated plan to gather Intel on lower-management and select consultants. Careers were made and destroyed based on the Intel gathered from this Gala, and other events that followed over the next couple of years.

My decision to stay straight and in control endeared me to Upper-management and the Board. I became involved in many decision made at all levels of the business. Later, I moved to three other major manufacturers, and found that the same scenario played over and over again.

Bottom line: Keep your senses. Be watchful, Stay in control, “Hold the Jack”.

 

 

Home Automation Future

In 1988 I had an Apple Elise that would turn on light and appliances using voice command. Butler! "Yes Master" Turn On Lights! "As you wish" - click - light was on. Butler would also play blackjack. Butler! "Yes Master" Hit Me!... Were is home automation now?

(CNN) -- The world of automated home gadgets is young and exciting, filled with an abundance of promising new products. It's also a bit of a mess.

At the 2013 Consumer Electronics Show in Las Vegas, there were devices and smartphone apps to control everything in your home. But there are so many conflicting approaches, setups, standards and systems that the real dream of a fully connected home is still a ways off.

In previous years, the connected, or "smart," home world was mostly aspirational, with prototypes of fridges with Internet-connected displays and elaborate home security systems. But this year the Jetson's home is a finally a reality, with major vendors peddling real, usable products, almost all controllable from a smartphone.

There are home security cameras you can monitor from anywhere, motion sensors that trigger lights or send you a text message. A product called Plant Link monitors your plants' moisture levels and texts you when they need water. There is a sensor you can put on your grandmother's teapot that will alert you if she forgets to have her morning cuppa. You can control blinds, check air quality, see if windows are open, unlock your house from halfway around the world for a visitor, or use GPS to have your heater turn on when you're a certain distance from home. The possibilities are endless.

How does something as low-tech as a light connect to your smartphone? Typically, the "dumb" end devices (light switch, electrical outlet, thermostat) are outfitted with wireless modules. They communicate using Wi-Fi or other wireless technology with an Internet-connected hub device, which collects the data and bounces it to the cloud. That information is then accessible from a computer or smartphone app, the light controllable with the tap of a finger from anywhere in the world.

Explaining the 'Internet of Things'

Unfortunately, with the excited rush to get out new products and try new things, most devices or systems don't yet play well with others. Consider the Philips Hue, a cool, color-changing smart light bulb that's sold in Apple Stores. The bulbs connect to a Philips Hue hub, and you change their colors with the Philips Hue stand-alone app.

You can't add a third-party pet door opener or radio controller to the Philips hub, or control them from the Philips Hue app. That means you can't program the kitchen lighting to turn blood red and set the stereo to play "Eye of the Tiger" every time your tabby saunters in for dinner.

"Theoretically, they should all work together," said Daniel Moneta, chief executive of MMB Networks, a company that helps equipment manufacturers transform their analog products into smart devices. "But innovation tends to happen at a faster pace than standards."

The trend of individual devices and sensors having their own smartphone apps and cloud infrastructure is unsustainable. Imagine having to sort through 50 apps to find the right lock, or opening each app one at a time to set up vacation settings before a trip to Death Valley.

Big companies such as Comcast, Time Warner and Lowe's have taken a stab at consolidating smart home technology with their own connected home solutions. They have convenient pre-packaged systems that include the central hub, the smartphone app, and starter devices like security cameras or energy monitors.

China to lead in automation

These systems have their drawbacks. Many charge a monthly fee. They will sell approved additional devices to add on to the network, so it's expandable, but you are still locked into their ecosystem.

Then there are the standalone devices that pack the computing power into the object itself, such as the popular Nest programmable thermostat. There's no hub, it just uses Wi-Fi and the Nest app, and it can't connect to other home management systems.

"At the end of the day, putting the intelligence into a single device misses the bigger picture," said Jeff Higgins, chief technology officer of SmartThings, a startup working on its own platform for smart homes. For Higgins, who has 95 smart devices connected in his own house, the real power of connected devices is in the apps and writing programs that link objects together. The air conditioner that doesn't turn on because it knows a window is open.

To complicate things further, current smart devices don't all speak the same language. There are competing short-range wireless technologies for connecting smart object. In addition to Wi-Fi there's ZigBee and Z-wave, which use less power and are easier to connect. Unlike Wi-Fi, they can be used to create a network of devices that communicate with each other, passing on signals from objects in far off areas of the home.

SmartThings will release its own starter kits this Spring, $299 boxes that include a hub and five or six devices that connect to SmartThings app. But the company is planning an open platform that supports all three wireless standards, doesn't charge monthly fees and allows any third-party device to jump on the system and app. Developers can write smaller apps that work inside the main mobile application, coming up with creative ways to link objects together. The startup raised $1.2 million on Kickstarter last year and is backed by some big-name venture capitalists.

Whatever the future of smart homes looks like, it will need to be dead simple, affordable and easy to use. There are still potential security and privacy issues that have to be worked out. But the options will narrow down, the technology will become more consistent and a smaller number of remote control apps will crowd your smartphone. Next up, flying cars.

Read More - Click Here!

Hot Rod Web Browsing

Faster is better. Who wants to wait for a WebPage to load? And if you run 10 or 20 tabs at a time like me, load time can be excruciating unless you know how to rev up your Web Browser, and this is how we do it:

1. Use a High Output Web Browser:

The new offerings by Microsoft, Google, and Mozilla run circles around their older siblings. There is a lot of debate has to which one is faster. I’ve studied and performed speed tests, and found that each one out-performs the other depending on the test. Chrome10 appears to have a slight advantage today, but the way these guys leap-frog each other, who knows who will be king of the hill next week. Windows Explorer is fast but has some difficulty with compatibility, especially if you run Windows XP (it doesn’t work at all). FireFox just feels faster, and will run on All Windows flavors, PLUS MAC, and Linux. So take your pick, just make sure it is the latest version. 

2. Dump the toolbars:

To win a drag race you might have to dump the spare tire, seats, and even fenders to get light enough to win. The Toolbars in a Web Browser is extra weight that, when removed, greatly increase load time and operating speed. Toolbars can hog memory, chew up bandwidth when they send unnecessary data to the vendor, and take up screen space. I know, some of them can be pretty useful, but doing without can really pick up the pace.

3.Use Tabs instead of Windows:

Tabs are like racing slicks and Windows are like street tires. Slick give you better tractions on the strip, and tabs can make a big difference in Web Browser performance. Most Web Browsers treats each tab as an individual process, and Windows uses a child process of a parent. If you use Windows, if one area of the Web Page crashes, you have to close the browser and you have to find each window all over again. However, If your particular tab happens to crash, for some reason, all you have to do is close that one tab. The other tabs remain in tact. Organizationally, multiple tabs in a single window makes it faster to locate the page you need to work on. No more maximize and minimizing windows, to see what’s there over and over again until you find the right one Opening a single window with multiple tabs is far more efficient AND uses less memory.

4.  Disable Flash:

Flash to a Web Browser is like Smog Devices to race cars. Flash can really eat up memory and processor power causing a page to load really slow. And if you are trying to run 5 or 10 pages, it might appear to lock you up completely. Simply turn Flash off by default,  and enable it to view the things that you need to view with flash. Problem is, Browsers like Crome10 and FireFox requires an  add-on to disable Flash. Internet Explorer uses a built-in tool accessed by clicking Tools > Manage Add-ons > double-click Shockwave Flash Object > Remove All Sites. 

The only other thing I can think of that will increase Web Browser speed, besides buying more bandwidth from your ISP, is to use a ram-disk for your Web Browser cache. Whist Ram is 100 time faster than hard drive cache, it is difficult to configure and maintain. But the first four will not only get your going Browsing Faster, It’s speed that you can really feel. What a rush!

How Does Satellite Internet Works

 
 

For people who live a good distance from a phone company or cable provider, there is still hope if you wanted to get a broadband internet access just like everyone else. Thanks to satellite internet, it is now possible to get high speed internet access even if you live in a more remote area. Mobile satellite internet is also very useful for people on-the-go who want to access the net. How is it possible? And what is the difference between satellite and other types of high speed internet access?

Satellite internet is more expensive and it's not that easy to install. Usually, your provider's technician will take care of installing the device. There are three kinds of satellite internet access.

  • One-way multicast – is more similar to a one-way terrestrial return. This kind of satellite internet access includes interfaces to a public switched telephone network. An internet connection is not required, but many applications include a File Transfer Protocol (FTP) server for data broadcast.
  • One-way with terrestrial return – These are satellite internet systems that employ traditional dial-up access to the internet, with outgoing data traveling through a regular telephone modem, but with downloads happening via satellite at a speed comparable to other broadband internet access.

satellite internet diagram 1

  • Two-way satellite access – This type of connection sends user-requested data (like a web address) from an orbiting satellite to a hub, and then to the Internet. The satellite dish must be perfectly positioned to prevent interference with other satellites. Also, power management needs to be used to adjust the amount of transmission power to compensate for conditions like the changes in climate.

satellite internet diagram 2

Satellite Internet is generally popular in areas that other choices like cable or DSL internet are not available, such as rural areas.

How Does Your Website Look On A Cell Phone

( 40% of your customers visits your website via a mobile phone.

Every business should look for unique production, top-quality solutions and implementation of the mobile web.

How does it work when mobile suits your website?
The mobile website exists parallel to your current website. A mobile website detects if the user enters via a cell phone and automatically loads a mobile page instead of the regular website.

Mobile experts (like GO MO Group in Sweden) have the ability to deliver cost effective, high quality and advanced solutions to the customer. All quality control is directly associated with the production.

Europe is facing major changes.
The consumer already has heavy demands on corporate mobile accessibility and customization. We have identified a great need, where the business market is looking for expertise to help companies take advantage of the rapid developments taking place in mobile media.

How Does Your Website Look Via Mobile? image GO MO Group make me mobile 229x300How Does Your Website Look Via Mobile?

Why a custom mobile website?
Mobile website or mobile site, is the name of a website that is optimized in both layout and content for use via a mobile device.

Yet another reason to get a mobile website is that many so-called “Smart phones” with a web browser do not support flash files, i.e., that the website does not appear at all in the mobile search.

Mobile Commerce
This past Christmas, 48 percent of Smartphone owners used their phone to locate a suitable Christmas present, an increase of 9 percent compared to last year. A third also used their cell phone to then complete their Christmas shopping.

17 percent of Smartphone owners say that they are likely to spend more money from their mobile devices next Christmas. Another 31 percent said they would consider it if the dealers are working more to make the shopping experience quick, easy and as seamless as possible.

Of those who shopped via mobile phone, only 24 percent are completely satisfied with the shopping experience. E-merchants simply have little to work with it when it comes to customizing shops to mobile visitors. It is, however, an increase of 6 percent compared to last year, suggesting that the mobile is moving in the right direction.

How I Got Into Linux

In the 1992 I was asked to create a unique manufacturing shop floor software system whereby assemblers would use computers with pictures and text to complete each task on an assembly line. The system ran on Unisys 386 servers, Novell network (token-ring), and with Microsoft dos on Unisys 286 workstations. The database engine was SPI (Software Products international) Open Access ; the program was written in turbo Pasquale with lots of c hooks. We supported nearly 250 users.

The shop floor system was highly successful. It halved production time, tremendously increasing  production quality, and resulted in new business from Ford, Allison, and Nissan. Several articles were written about my work appearing in ComputerWorld, AME Target, and WSJ.

In time, a disagreement ensued as to who owned the source code. Since I was not in a position to defend a mufti-million dollar law suite, I let them have the code, then developed original code using Microsoft SQL and ASP.

The company threatened to bring a lawsuit stating that I had used “their” code extensively to create my new product. John Brown, owner of SPI, found himself in a similar situation with Microsoft and was totally obliterated. So I let them have that source code too.

For my next product, I needed something radically different, something that could not be remotely confused with anything I had written in the past. Linux using Slack Ware, PHP, Java, and PostGreSQL was the answer to my prayers.

When "The Company" thought it was a joke! 'What, Linux???' However, the resulting product was far better then my previous efforts. Linux proved to be faster and much more reliable. And linux was so efficient I could sell totally redundant servers (fail-over) at the same cost that my competition sold stripped-down single servers. Scalability was unlimited.

In time, however, we moved from Slack Ware to Debian. Slack Ware was a great linux distro, but the internal references in Slack Ware to satan, atan.S, apple and eve, was troubling to me, and might be to some of my customers as well. With a few changes in code and database structure, we also expand our database offerings to DB2 and MySQL.

Interesting thing about this technology. Even though we developed it in 1992, Caterpillar, who acquired the software through acquisition, is just now rolling out this production model to all of it's manufacturing facilities, worldwide.

Link to first ComputerWorld article:
http://active-technologies.com/content/computerword-article-picture
Link to 1995 video of the software on a production line (5 minutes):
http://www.active-technologies.com/projects/pronet/pronetshort.wmv
Link to a 1996 software demo:
 http://active-technologies.com/content/cim-manufacturing-demo

How To Avoid 10 Tech Mistakes Small Businesses Make by Erik Eckel

In today's microwave society in which just-in-time manufacturing models, heightened customer expectations, and 24/7/365 accessibility demands burden both manufacturers and service providers, little time remains for much else. Small businesses often don't have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips. And not all small business owners are adept at maintaining best technology practices.

As a result, small businesses frequently make certain technology mistakes. Here's a look at these mistakes, along with specific steps IT consultants can take to assist small businesses in correcting these common failures.

#1: Insufficient technical support

Many organizations go without technical support, relying instead upon an employee whose love of Warcraft may make him or her the local office "computer guru." Other organizations may depend upon a staffer's friend or relative (who's "interested in computers") to provide technology advice or assistance when critical systems fail or slow unacceptably.

Some turn to their hardware manufacturer's telephone support line for help, only to be disappointed when the solution to many problems proves to be performing a reinstallation (thereby resulting in the loss of all the business owner's data). Some rely upon a big box electronic store's service arm, never receiving the same (novice, often undereducated, and inexperienced) technician twice. And still others locate a student or individual who provides computer support "on the side."

These support methods are not cost-efficient. Nor are they effective information technology investment, troubleshooting, or administration options.

Small businesses need knowledgeable, trusted technology partners who are proficient with current technologies and willing to help learn their industry's operations requirements. Once a qualified technology expert is familiar with a client's needs, appropriate services and solutions can be recommended and deployed. The result is almost always more cost-effective, more efficient, more profitable operations for the client.

#2: Hardware/software issues

Smart organizations set PC service lives at three or four years. There's a reason.

"When you look at costs, particularly around a four- to six-year lifecycle, it may seem like you are saving money", says Info-Tech Research Group analyst Darin Stahl. “But really it's costing you.” That's because support expenses increase. Retaining PCs longer than three or four years often results in repair and support costs that meet or exceed the price of new systems.

This is the second common tech mistake businesses make: They fail to standardize hardware components and software applications, where possible. The result is a mishmash of components that complicate troubleshooting, repair, and deployment and require companies to support a variety of programs with different license terms and renewal dates. Incompatibilities often result.

Worse, older and obsolete hardware is less efficient, increases downtime likelihood, feeds staff and customer frustration, endangers sales, and threatens other lost opportunities.

Small businesses can overcome common hardware and software issues by:

  • Retiring equipment at proper lifecycles, typically three to four years.
  • Standardizing hardware components.
  • Standardizing software applications.
  • Working with an IT consultant to leverage vendor relationships and reduce costs/negotiate more attractive pricing.

#3: Insufficient power protection

A single power outage, surge, or spike can damage expensive electronic components and result in critical data loss. Consistent surges and brownouts, meanwhile, shorten the lifespan of computers, printers, network components, and other equipment.

Many businesses deploy simple power strips. Others continue depending upon surge suppressors deployed five and even 10 years earlier. When thunderstorms, electrical outages, and other disasters strike, the damaged systems and corrupted or lost data — not to mention downtime — resulting from insufficient power protection prove costly.

Organizations should deploy quality battery backup devices (with built-in surge suppression) for all critical desktop PCs. Further, technology professionals should connect all servers to uninterruptible power supplies and test them regularly to confirm adequate failover protection is in place.

When deploying battery backups, businesses should properly install and configure corresponding cables and communications software. Network protections should be leveraged whenever possible, as well, in attempts to remediate cable modem, DSL, and other surge sources that can destroy telecommunications and computing equipment.

Since surge suppressor quality varies, organizations should purchase such equipment from trusted vendors. And since surge suppressors (and batteries) wear over time, businesses should replace them regularly.

Simple power strips should be avoided whenever any computer, server, network device, or other important component is present.

#4: Illegal software

Possessing illegal software may be the easiest trap into which many organizations fall. The issue is widespread (the Business Software Alliance estimates 22 percent of all North American software is unlicensed), making it our fourth common tech mistake plaguing small businesses.

Certainly, licensing issues quickly prove perplexing. The differences between OEM, retail, and open license software escapes the understanding of many business owners. Yet manufacturers are becoming more aggressive in locking down licenses (via product activation technologies) and prosecuting offenders (often via the BSA, which has collected more than $81 million in settlements).

Many organizations don't recognize they do not “own” software, since programs and applications are commonly licensed. Worse, some firms use “borrowed” applications or pirated programs. Problems arise either in the form of audits and penalties or challenging delays (due to product activation conflicts and other licensing issues) when returning failed systems to operation.

Businesses must understand there are no shortcuts to running legitimate operations. All software, applications, and programs must be properly licensed.

With more manufacturers implementing product activation features, in which software programs report their installation and usage back to the manufacturer, overuse or outright piracy is becoming more difficult or impossible, anyway. But violations still occur.

Businesses can protect against licensing errors and penalties, and help ensure the fastest recovery times when failures occur, by carefully documenting and tracking all software license purchases and deployments.

Further, software licenses (including for operating systems, business line, and office productivity applications, accounting programs, security tools, and other utilities) should be purchased only from reputable technology partners. License sales on eBay that look too good to be true are.

Finally, when installing new programs, organizations should pay close attention to the license agreements they accept.

#5: Insufficient training

Mention software training in most any conference room, and you're likely to hear groans. Boredom, bad classroom experiences, lack of interest, or complexity all contribute to employees' resistance to learning new applications. But that doesn't change the fact that insufficient training ranks as the fifth common tech mistake impacting small businesses.

How bad is it?

It's estimated that office staff understand less than 20% of the available features in the software applications they use. That means 80% of the features, time-saving capabilities, and cost-reducing functions remain unused.

Gross inefficiencies result. As a consequence, many processes — including repetitive data entry, complicated calculations, and automated data selection and reporting — are completed manually, which introduces a greater likelihood of errors entering the process.

Tasks that could be completed in moments often consume exponentially more time. Considering that many of those tasks are repeated each business day by multiple workers, it's easy to see how the costs quickly become significant.

Most small businesses don't employ full-time trainers. Therefore it's imperative that small businesses identify technology partners, training centers, or other programs that assist staff in maximizing software applications.

Even when training resources are present, there's no guarantee staff skills will improve. For that to happen, businesses must make computer and software training a priority. Tap technology partners or other consultants to conduct regular lunch-and-learn sessions. The business can spring for lunch and, for a few hours of consultant's fees, expose entire departments to important new features and capabilities.

An organization's technology training commitment can be reinforced using performance reviews. Businesses can add specific course, off-site training, and even certification requirements to staff education programs and performance review objectives. When partnering with a local training center, businesses can create customized instructional programs or select prepackaged modules.

Organizations with limited budgets, meanwhile, can leverage self-paced instruction manuals and computer-based training aids to assist employees in improving their skills after hours or in their own homes.

#6: Security failures

Small businesses frequently fail to accommodate security issues. Organizations either don't recognize the risks or don't take them seriously.

The costs are staggering. Large U.S. organizations lose some 2.2% of their annual income due to security attacks, according to an Infonetics Research “Costs of Network Security Attacks” report. That's expensive. The FBI estimates such computer crime costs U.S. industry in excess of $400 billion.

Organizations don't need to have a high profile to become a target, either. Hackers have created innumerable automated programs that scour the Internet 24 hours a day, 365 days a year, seeking poorly secured systems, servers, PCs, and networks to infect and exploit.

Unfortunately, businesses everywhere are falling victim to compromised systems, robotic attacks, identity and data theft, and more. Organizations that fail to properly secure client and customer data often find themselves in the middle of security crises that result in bad press, lost sales, and forfeited customer trust.

Fortunately, completing simple steps assists small businesses in preventing security failures. Here are several best practices all organizations should adopt:

  • Implement and enforce strong password security policies for all PCs, servers, network equipmen, and software applications.
  • Regularly update operating systems, network equipment firmware, and applications with the latest security patches.
  • Deploy business-class firewalls in all locations; connect no systems directly to the Internet.
  • Secure all wireless networks.
  • Disable guest accounts.
  • Implement Internet and e-mail usage policies that preclude personal use of those technologies.
  • Prohibit file-sharing programs.
  • Deploy proven antivirus, anti-spyware, and anti-rootkit applications and update them regularly.
  • Regularly perform security audits and correct all deficiencies.

#7: Poor backup strategies

Despite numerous choices, methods, and options, many organizations fail to adequately back up data — a mistake that can be unrecoverable.

Statistics reveal there is a 50% chance an organization will cease operations immediately when critical data is lost. Worse, an organization's odds of failure rocket to 90% within two years when critical data is lost. Data losses cost an average of 19 days' productivity. Recovering data from damaged disks, meanwhile, is incredibly expensive.

Even organizations that believe their data is properly protected may find themselves at risk. Occasionally, incorrect data (as in the wrong data) is backed up. In other cases, tape backups prove unreliable. (Gartner Group estimates only half of all tape backups restore successfully.) Fortunately, small businesses can follow simple steps to securely protect their data.

Since data backups are so critical to an organization's livelihood, small businesses should work with proficient IT consultants or technology partners to ensure the right data is being backed up and that it's being backed up as frequently as required. In addition, technology professionals should regularly test backup sets to confirm the data can be recovered in its entirety.

Consultants can work with small businesses to determine what data, files, and information should be backed up, how often to create the data sets, where to locate the backups, and how often to test the sets' integrity. Consultants also prove invaluable in updating backup routines when software upgrades, migrations, and other updates change critical file locations. Further, technology professionals can ensure business data remains secure, which is a critical concern for physicians, financial institutions, and even retail outlets.

#8: Virus exposure

Viruses not only remain a major threat, but their dangers are increasing. The BBC reports that unprotected PCs become infected within eight seconds of being connected to the Internet.

Infections are proving expensive, too. In the book The Dark Side of the Internet, author Paul Bocij estimates the average virus incident costs organizations $2,500 in remediation and data recovery expenses. A report by ICSA Labs places businesses' costs even higher (at $99,000 per incident).

And the numbers, varieties, and types of threats only increase. Malware programs are evolving at such a clip that many security software vendors have eliminated daily updates in favor of distributing patches every four hours.

Often, businesses and users simply fail to implement protection. A survey conducted by the National Cyber Security Alliance revealed that 67% of the respondents did not have up-to-date antivirus software. Worse, some 15 percent had no antivirus application installed.

#9: Spyware exposure

Before we address virus solutions, let's visit spyware, which is an equal threat — and potentially even more daunting.

Spyware differs from viruses in its nature (spyware typically aims to track user behavior, collect user information or sensitive data, and display unwanted advertisements, whereas viruses often destroy data, corrupt systems, or enable hackers to remotely control a system). But spyware's business impact has reached epidemic levels.

The respected trade group CompTIA estimates spyware infections require two-and-a-half days to resolve and cost small and medium-size businesses $8,000 a year, which doesn't factor lost revenue. As evidence businesses aren't doing enough to protect themselves from the threat, CompTIA pointed to the information its research recently uncovered. More than a quarter of business users reported their productivity suffered as the result of a recent spyware infection, and more than a third reported being infected multiple times within the last six months, with some reporting being infected as many as 10 times!

No virus or spyware strategy is foolproof, but most technology consultants recommend the following steps:

  • Install reputable antivirus and anti-spyware applications.
  • In high-risk environments, a second standalone anti-spyware application is warranted.
  • Regularly update antivirus and anti-spyware programs.
  • Do not let antivirus and anti-spyware program licenses expire.
  • Perform regular automated antivirus and anti-spyware scans.
  • Regularly review security program log files to confirm proper operation.

Further, businesses should avoid deploying “free” security products in businesses. These products are often deployed in violation of the license agreements (which require licensing the software in businesses, academic facilities, and nonprofit organizations) and don't support frequent updates, real-time protection, or automated scans.

#10: Unsolicited E-mail

Most every business and user is familiar with the problem of unsolicited e-mail, also known as spam. Spam messages have become a serious issue, particularly for small businesses that often misunderstand the problem and fail to take effective countermeasures.

The Radicatti Research Group estimates spam costs businesses more than $20 billion a year. Further, almost half of all e-mail is estimated to be spam.

Thus, small businesses are investing valuable time, money, and system resources processing, delivering, and even storing these unsolicited e-mail messages. In addition to lowering productivity (staff must regularly sift through hundreds or more junk mail messages, deleting the spam, in search of legitimate e-mail), spam takes a toll on an organization's servers and workstations, which often must dedicate processor cycles, disk space, and backup media to untold gigabytes of unwanted mail.

Technology consultants wield several weapons in the war on spam. In addition to network filtering software, consultants can deploy server-based spam protection. Some organizations choose to outsource e-mail processing to a vendor that can monitor e-mail streams and filter out unwanted messages.

But such filters can generate false positives. And they're not cheap. Therefore, it's often a good idea to begin by adopting effective methods for managing unsolicited e-mail messages. Here are several first steps all e-mail users and small business owners may take to minimize spam:

  • Do not publish e-mail addresses in plain text on Web sites; instead use form-based tools that prevent robotic harvesting.
  • Avoid forwarding chain e-mail messages.
  • Ignore credit repair, get-rich-quick, and other common e-mail solicitations.
  • Use reputable e-mail filters (such as those included in Microsoft Outlook, Google Gmail, and other programs).
  • Read all terms before ever submitting your e-mail address to another party.
  • Review privacy policies before ever providing an e-mail address.
  • Consider creating a free e-mail account (Yahoo, Hotmail, Gmail, etc.) for submitting to third parties.

','

 

How To Beat The Claw

Squatting menacingly in the corner of your favorite restaurant, movie theater, supermarket or bowling alley, the claw machine is a harsh mistress. There's something unmistakably hostile about its steely, three- or four-fingered grip, and something immeasurably frustrating about the feeling of horror and loss you get as your prize slips from your tenuous grasp at the very last second.

Don't despair. Instead, even the odds a little. Follow these simple tips, and you can't lose. (OK, you can lose, but you'll lose a little less often.)

Read More - Click Here!

How To Break Through The Red Tape and Get What You Want

Everyone has run into it: bureaucracy that gets in your way and prevents you from achieving your goals. Whether

you're trying to find the right support solution, fix something that's broke, or return an Internet purchase,

you will often encounter problems. Here are some tips for dealing with those bureaucratic hurdles...

#1. Pick your battles

Remember the story of the boy who cried “Wolf”? Eventually, when the wolf did attack, no one came to help the

boy. In the same way, make sure that when you take on the bureaucracy, it's really worth it. Must you have a

change in the way things are done now? Does it truly make your life or work unbearable? The tips below can help

you, but keep in mind that in using them, you are spending political capital. If you can live with the current

situation, it might be best to save your battles for truly important things.

#2. Determine what you really want

When faced with obstacles or frustration, it's common to focus so much on them that we forget what we really

want. Then, when the person in charge asks us, we hesitate and stutter because we haven't thought things

through. Think about what you'd want if the bureaucratic obstacles were to be removed. Be as specific as you

can, in terms of dates and quantities.

#3. Think through your acceptable alternatives

You might not get what you want. That's how life works. So you need to think about what alternatives you could

live with. In particular, think about the different “levers” you can pull. Can you change the location where

something happens? What about sequence? If the person you want to see is unavailable, could someone else in

that department help? If you can't get all of what you want, can you live with some now and some later? If the

other side doesn't suggest alternatives, you can suggest them yourself.

#4. Don't take things out on the front line person

Getting angry at the service desk or help desk person rarely will accomplish anything. Chances are, they lack any

authority to make decisions. That's why they're telling you that the policy is the way it is. Getting angry solves

nothing and might only delay a real solution. If you have to be annoyed, be clear that you're not upset at that

person but rather at the policy.

#5. Find the decision maker

If you want something, you need to find someone who has the authority to make the decision. As noted above,

only rarely will that person be on the front line. More commonly, that front line person merely carries out the

already established policy and will be reluctant to make exceptions. You will need to find that person's boss, or

the boss's boss, who will have the authority to make the decision that's favorable to you.

#6. Remember that there's strength in numbers

You have a greater chance of getting what you want if you have allies -- other people who have the same

concerns. If all those other people voice the same issues, the other side knows that you're not just some isolated

troublemaker.

#7. Be clear on your escalation process

If you have trouble with another organization, say within your own company, be clear on how you will escalate an

issue. Will you go to your own boss first? Will you approach the other department's boss yourself? In any case, be

clear with your boss on this process. If and when you do escalate, think through as much as you can about the

issues, why you're escalating, and what you want done.

#8. Document the situation

Documenting the situation will help the other side know what's going on. It also shows that you're staying in touch

with the situation. Be as specific as you can on names of people, dates, times, and actions that were promised.

#9. Respond positively to the \"roadblock comments\"

Those “We can't do that” or “don't have the authority” comments drive you crazy, don't they? Here's a way to

handle them: Turn them around to a positive question and then ask the other person that question. For instance,

a response to “We can't do that” would be “What can you do?” A response to “don't have the authority” would be

“Who does have the authority?” A former co-worker of mine varied the latter question by asking, “Who has the

ability to fire you?” While that question follows the principle I outlined, I don't recommend it for general use.

#10 Build up your political capital

You often must call in favors when you need to get things done. Therefore, take time to build up good will and

hence political capital with others. Be helpful when you can (while of course keeping your own job as your top

priority). Build relationships with others (what the Chinese call guanxi). Those relationships can help you if these

other tips don't.

#11 Be gracious when you get your way

No matter how frustrating the situation, be gracious if and when you get your way. A “thank you” takes little time

and effort, but is a nice touch and can make things easier for you the next time.

#12 Remember the serenity prayer

When all else fails, remember the serenity prayer: Ask for courage to change what you can, serenity to accept

what you can't, and the wisdom to know the difference.

How To Buy The Right Printer At A Great Price

Picking the right printer is tough. Just look at the choices, brands, types, speeds, feeds, functions. It’s enough to make your head spin. But if you follow a few simple guidelines, you will end up with a good printer, that does what you want, for a good price. So let’s get started.

What kind of printing do you want to do? This is important because some printers do an OK job at everything whilst other do a great job at one thing and a poor job at another. Example: If all you do is pictures and portraits, you would be better off with a dedicated portrait printer. But a dedicated portrait printer does a terrible job of printing letters and spreadsheets. So if you do a lot of portraits AND a lot of letters and spreadsheets, you may be better off with two printers, a dedicated portrait printer and a general purpose printer.

Multi Function Printers: Standard printers can do a good job (not great) at portraits too. But you might also want to scan pages and pictures, make copies, or even fax. In fact, the price of multi function printer have come down so much that it might make more sense to by one of these instead of a general purpose printer. And we don’t even print pictures anymore. We proudly display them on our TV and Cell Phones.

Speed and Volume: The two go hand-in-hand, and has a great impact on the type of printer that you should buy. Buy a cheap printer, run a lot of paper through it, and it will burn out quickly. So look and the amount of printing that you plan to do each month, and pick a printer that will meet or reasonably exceed that volume.

Ink Jet VS Laser: Ink Jet is great for low to medium volume printers, but the two technologies are beginning to overlap. Laser printers will handle a lot more volume, but the laser cartridges are much more expense than ink jet. However, cartridge for cartridge, the laser cartridge may yield a lower price per printout or page. However, shelf life of both laser and ink jet is about a year. After that, the cartridge may fail, or ever worse, it may foul and ruin your printer. So part of the choice between Laser and Ink Jet goes back to the volume printed. For really big volume print jobs, don’t burn out your printer, use a printing service.

Do You Really Need Color? Guaranteed, as soon as you buy that black ‘n’ white printer, you’ll need color. Buy a color printer

Paper output is a considerations too. Most low-end printers do standard 8 ½” by 11” only. More expensive printer can do letter, legal, 11” by 17”, may have multiple paper drawers, sorters, collators, and ever staplers. Fancy huh – expensive too.

How will you connect to the printer? The options are USB, WiFI (Wireless), Wired Ethernet, FireWire (Apple) and Blue Tooth. Just make sure your printer will connect the way you want it too. USB, Wired Ethernet, and FireWire are the most reliable.

Best Buys on Printers: I always wait until the end of a product cycle and buy the printer I want at a close-out price. The multi function printer I have now was $795.00 when it first hit the stores, but I got it on close-out for $59.95. You can find great deals on printer on the internet, but you have to pay $10-$20 for shipping. Many of the larger stores will match online price. Don’t be afraid to ask for a discount.

Ink is Ink and Toner is Toner: My printer has 4 ink cartridges and the “Big Computer Store” wanted $24.99 each. Darn! That’s more than I paid for the printer. I would have been better off buying a new printer! So I went down the street to a “generic brand” ink cartridge store and got all 4 cartridges for $10.99. What a sweet deal!

It sound like a lot but you can do it. Decide what you want to do with the printer, how much printing, then scourer the internet to compare specs, reviews, and deals, and you’ll make a good choice.

Important Note: Most printer companies play interesting game where they sell printers at a reasonable price, then hook you on buying their ink at premium prices. They do this by placing electronics in the ink cartridge and forcing you to use them electronically. One notable exception is Brother - no electronics in their toner or ink cartridges. Whilst HP 8500 cartridges are $24 each (you need 4), I can get a Brother CL71 for $2 OR re-ink it myself (I don't but I could).

How To Change The Read-Only Folder Attribute

If you have one or more folders that are set to Read-only in Windows Vista and you aren't able to view or change the attributes in the Properties dialog box, you can work around the problem by using the attrib command line tool.

To view or to remove the Read-only or the System attributes of folders in Windows Server 2003 or in Windows XP

Click Start, click Run, type cmd, and then press ENTER.

To view the syntax for the Attrib command, type attrib \\? at the command prompt.

Warning If you remove the Read-only or System attribute from a folder, it may appear as a ordinary folder and some customizations may be lost. For example, Windows customizes the Fonts folder and provides a special folder view that permits you to hide variations, such as bold and italic. It also permits you to change the folder's view settings in ways that are specific to fonts. If you remove the Read-only and System attributes of the Fonts folder, these customized view settings are not available. For folders that you have customized by using the Customize tab of the folder's Properties dialog box, the folder icon and other other customizations may be lost when you remove the Read-only attribute.

If a program cannot save files to a folder with the Read-only attribute, such as My Documents, change the Read-only attribute to System by using the Attrib command at a command prompt.

To remove the Read-only attribute and to set the System attribute, use the following command:

attrib -r +s drive:\\<path>\\<foldername>

For example, to remove the Read-only attribute and to set the System attribute for the C:\\Test folder, use the following command:

attrib -r +s c:\\test

Be aware that some programs may not operate correctly with folders for which the System attribute and the Read-only attribute are set. Therefore, use the following command to remove these attributes:

attrib -r -s c:\\test

To view or to remove the Read-only or the System attributes of folders in Windows Vista

Click Start, click Run, type cmd, and then press ENTER..

To view the syntax for the Attrib command, type attrib \\? at the command prompt.

To remove the Read-only attribute and to set the System attribute, use the following command:

attrib -r +s drive:\\<path>\\<foldername>

For example, to remove the Read-only attribute and to set the System attribute for the C:\\Test folder, use the following command:

attrib -r +s c:\\test

Be aware that some programs may not operate correctly with folders for which the System attribute and the Read-only attribute are set. Therefore, use the following command to remove these attributes:

attrib -r -s drive:\\<path>\\<foldername>

For example, to remove both the Read-only and the System attributes from the C:\\Test folder, use the following command:

attrib -r -s c:\\test

If the Run command is not listed on the Start menu, do the following:

Click Start, click All Programs, click Accessories, and then click Run.

How To Collect Marketing Email Addresses

Is there a way to legally collect email addresses?

There are lots of way to get folks to sign up for your newsletter, blog, and marketing offers, and this is how we do it:

1.Put an offer on the back of your business cards to get people to sign up for your newsletter.

2.Tradeshows - Bring a clipboard or sign-up book with you to tradeshows and ask for permission to send email to those who sign up.

3.Include a newsletter sign-up link in your signature of all of your emails.

4.Send an opt-in email to your address book asking them to join your list.

5.Join your local chamber of commerce, email the member list (if it's opt-in) about your services with a link to sign up to your newsletter.

6.Host your own event - Art galleries, software companies (one here has a party every quarter and invites the neighboring businesses), retail shops, consultants (lunch & learn) can all host an event and request attendees to sign up.

7.Offer a club where you give something special to people who sign up.

8.Incentivize your employees - Give them $ for collecting VALID email addresses.

9.Giving something for free like a PDF? Make visitors sign up to your opt-in form before you let them download it.

10.Referrals - Ask you customers to refer you, and in exchange you'll give them a discount.

11.Bouncebacks - Get them back! - Send a postcard or call them asking for their updated email address.

12.Trade newsletter space with a neighboring business, include a link for their opt-in form and ask them to include yours in their newsletter.

13.SEO - Make sure you optimize your site for your keywords. You need to be at the top of the natural search when people are looking for your products or services.

14.Giveaways - Send people something physical and ask for their email address as well as their postal address.

15.Do you have a postal list without emails? Send them a direct mail offer they can only get if they sign up to your email list.

16.Include opt-in forms on every page on your site.

17.Popup windows - When someone attempts to leave your site, pop up a window and ask for the email address.

18.Include a forward-to-a-friend link in your emails just in case your recipient wants to forward your content to someone they think will find it interesting.

19.Include a forward-to-a-friend on every page of your site.

20.Offer a community - Use Ning as your easy-to-set-up community and have your visitors interact and sign up for your newsletter.

21.Offer "Email only" discounts and don't use those offers anywhere but email.

22.Telemarketing - If you've got people on the phone, don't hang up until you ask if you can add them to your newsletter.

23.Put a fishbowl on your counter and do a weekly prize giveaway of your product - then announce it to your newsletter. Add everyone who put their card in on to your newsletter list.

24.Include an opt-in form inside your emails for those people who get your email forwarded to them.

25.Tradeshows - Collect business cards and scan them into a spreadsheet. Make sure you ask permission to send email to them, then mark the card.

26.Use Facebook - Host your own group and invite people to it, then post new links often. From time to time, post a link to sign up for your newsletter.

27.Use Facebook - Post the hosted link from your newsletter into Linked Items to spread the word.

28.Use Facebook - Include an opt-in form on your Facebook Fan page.

29.Use Twitter - Twitter the hosted link of your email campaign every time you launch.

If you would like to share something that has worked for you, please let us know!

How To Get The Most Out Of Linkedin Groups

() Groups are one of the most valuable resources that LinkedIn has to offer business owners and freelancers. Joining and participating in relevant groups helps you grow your network, increase your visibility and take advantage of a shared pool of knowledge and experience. Here are three tips to help you get the most from LinkedIn groups even on a very tight time budget.

1. Join a few well-chosen groups rather than a multitude. LinkedIn allows you to join up to 50 groups but it’s best to be judicious about how many groups that you join. Look for groups where you’ll be able to make a real impact. Bigger isn’t always better, but you’ll want to choose groups that have a lively user base and that are big enough that you can benefit from a wide variety of perspectives and experience.

You can search for groups on LinkedIn by clicking the “groups” tab. LinkedIn will automatically suggest groups that you may like and you can also browse the open groups directory. You can search groups by keyword, category and language.

If you don’t find a group that meets your particular needs, you can always start your own. While it will take some time and effort to get off the ground, the benefits can be large.

2. Visit your groups regularly. You can get email updates but for maximum impact, visit your groups regularly so that you can contribute to the conversation in a timely manner. Make visiting LinkedIn a regular part of your daily routine.

Once you visit, make the most out of your limited time by targeting the most popular conversations. These conversations are where most of the engagement is taking place and where your contributions will be the most visible.

Also take the time to start your own discussions. Not only will you benefit from hearing other’s perspectives and experience, you’ll also increase your visibility. Those who contribute the most to LinkedIn groups are recognized as “top influencers” on the sidebar of each group page. This kind of recognition adds to your authority and visibility on LinkedIn and expands your reach.

3. Be generous to others. Acknowledge their contributions by liking or sharing their posts. This isn’t only the nice thing to do, it also helps you stand out and others will see you as a plugged-in, go-to person.

It’s also good to be generous with your knowledge and other resources. Many are tempted to play it close to the vest but in most cases there is very little to be gained by being stingy with help. On the other hand, being seen as a maven or guru in your field is almost always a good thing.

Think about LinkedIn as being exactly like your local community network because that’s what it is, only on a much larger scale. Those who have a reputation for being generous and quick to acknowledge good work and valuable insights have a leg-up on those who keep to themselves. The old saying is true, you have to give to get.

Read More - Click Here!

How To Go Paperless

@ techlicious) Today, nearly everything involved with running a household can be done electronically – paying bills, doing taxes, sharing photos. Even the kids’ artwork can be photographed into a digital collection. Is it time to consider getting rid of the home filing cabinet to go completely digital?

The reasons to go paperless are compelling: free up square footage, save time finding documents, have redundant secure backup, save trees, and make your home office fully portable. And with banks and other service providers beginning to charge fees for paper statements, you’ll also save money.

But most of us have concerns.

  • Is it safe and reliable? Yes, with appropriate backup. And digital files are less vulnerable to loss from theft, fire and flood.
  • What about taxes? No problem. The IRS accepts digital filing. It’s not necessary to keep paper copies of anything related to your taxes, per the IRS, as long as you have an “electronic storage system” such as a PC with reliable backup. And if you are ever audited, you can just send the relevant files on a USB drive, rather than photocopying and boxing up paper files or having an agent come to your home.
  • Is digital extra work? No more work than paper.

In short, the biggest legitimate objection to going digital is the loss of paper itself – something physical that we can touch, mark on, and stack in piles. And piles. Time to begin.

What you’ll need

A strong backup system is required – either an external backup drive (we recommend the WD My Cloud 2TB Personal Cloud Storage, $141 on Amazon) or cloud storage (like Google Drive or Dropbox) or better yet, both. Other necessary tools are a fast document scanner, a flatbed Multi-Function Printer (MFP) for scanning bulky items, a paper shredder and a program that will turn all those scanned documents into PDF files, the standard file format for archiving documents.

fujitsu-scansnap-iX500-250pxFor the document scanner, invest in one like the Fujitsu ScanSnap ix500 ($450 on Amazon), or its little cousin the Fujitsu ScanSnap S1300i ($250 on Amazon). This may sound like a lot to spend, but it will pay for itself in the time it saves you. Without one, you might just find scanning so onerous that you abandon the whole idea of going digital.

The Fujitsu scanners handle two sides in one pass, 25 pages per minute, in color. Drop a stack of pages in the document feeder, and they will be scanned and ready to file. The scanning software automatically straightens and enhances the image on the fly, combines pages into a single PDF, and eliminates blank pages. You have the choice to output in common formats like PDF, JPEG, Excel or Word.

For the Multi-Function Printer we recommend the Epson Workforce WF-2540, $90 at Amazon. Its flatbed scanner is great for files that are attached together or even your kids’ artwork.

fellowes-powershred-ms450cs-300px

 

Fellowes

For the paper shredder, we like the Fellowes Powershred MS-450Cs micro-cut shredder, $199.98 on Amazon. Its level 4 security rating means it’s safe for your sensitive documents. Plus, it’s compact, powerful and has safety features in case your hand gets too close to the shredder mechanism. For a more compact model, we like its smaller sibling the Fellowes DS-3 Cross-Cut Shredder, about $72 on Amazon.

For the PDF writing program first check your scanner and MFP to see if it’s built in to their software. If not, check to see if you have Adobe Photoshop Elements. That will turn JPEG files into PDFs. If you still need a PDF writer, check out NovaPDF ($20-50 on novapdf.com) which does it all cheaply or CutePDF (free at cutepdf.com) for the super slimmed down, but free option.

Establish your digital filing system

paperless-file-system-screenshot-300px

The key to making this process easy is setting up a simple workflow that becomes habit. A good filing system ensures you can find everything later, which is another IRS requirement. You must be able to produce your records upon request, just as with paper.

Where to store

It’s best to store files in your main PC folder where you keep everything, such as “My Documents”, so you’ll never lose track of them. Check to make sure your backup system supports that location, otherwise go with whatever it requires.

Organization

Create a folder system on your PC that mirrors your physical file cabinet. You might try chronological folders for each year, and sub-folders within them for categories like banking, taxes, healthcare, insurance, housing, legal, pets and family members. “It’s a good idea to have a current year digital tax folder,” says Debra Boyce of Strand Boyce Associates, CPAs. “Then, you can put documents into the folder throughout the year. For example, if you pay your taxes online, save a copy of the receipt in PDF, and store it in your current year folder as a reminder when preparing your tax returns next spring.”

Naming documents

The default names of scanned and downloaded files may work for you, but for better searchability, change them to something logical like “VisaBill 2014-05”. If you want even more robust searchability, investigate the sophisticated tools that come with your high speed scanner, such as full text indexing and batch tools for renaming or tagging.

Establish your backup system

If there’s any chance you’ve fallen behind on backing up, now is the time to make it top priority. Don’t just take our say-so; the IRS requires that digital records be well maintained with “reasonable controls to prevent … alteration of, deletion of, or deterioration,” … in other words, a backup. [Source: IRS bulletin PDF, Page 10, section 4.].

There are two ways to back up: in your own home on an external drive, and to an online service “in the cloud”. It’s your choice, but consider both, as they serve different purposes.

Pros and Cons of Backup Options

  Backup Drive at Home Online/Cloud Backup Outside Home
Cost
  • ~$100 one-time fee
  • ~$100/year ongoing
Pros
  • Fastest backup and restore to PC
  • Ultimate security from hackers
  • No maintenance required
  • Redundant storage safe from catastrophic loss in home
Cons
  • Vulnerable to fire, flood, etc.
  • Needs to be replaced every 5-10 years
  • Slower backup and restore speed
  • Not under your complete control
Best Use
  • Store and share content among devices over home network
  • Backup and recover lost files
  • Insurance against home catastrophe
  • Repository to share and access documents remotely

External hard drive

An external drive plugs into to your PC or home network and provides fast storage/retrieval of your content. Network-attached storage (NAS) has the advantage of being accessible by devices on your home network, for example for other family members’ backups or streaming photos to your smart TV. As an added benefit, it can be a personal “cloud”, letting you access your documents through the Internet even while away.

We recommend the WD My Cloud 2TB Personal Cloud Storage, $141 on Amazon, which will provide shared storage for all the devices in your home. For backing up a single computer, go with a standalone drive, such as WD My Passport 1TB Ultra drive, about $79 on Amazon.

Online backup

Online backup services encrypt and back up your data to the Internet. In case of something catastrophic in the house like fire or theft, the content will be safe. Our picks for the best online cloud syncing servicescharge a subscription fee in the ballpark of $60-$100 per year (under 5GB is often free). If you have a huge amount to backup (over 250GB), CrashPlan offers an unlimited storage option.

The initial upload to the cloud may take days, or for some rare users, weeks, depending on the amount being backed up, your Internet bandwidth (take the speed test to find out how you rate), the speed of your hardware, and your online storage provider. For example, 150GB would commonly take around 7-8 days, though that could vary widely as some providers, like Carbonite, throttle your upload speeds.

Start filing

Now it’s time to begin your digital filing.

Download statements

Start by going online and downloading all your monthly statements from banks, etc., as far back as you can access, and file them in the folders you created. Save everything in PDF format. For items not already in PDF form, such as a Web-based receipt of payment, use the “print” or “save as” command to create a PDF.

Going forward, make it a monthly habit to download and file statements from your online accounts and anything related to your household. There is not yet any way to automate that process, though most banks will send you an email notification when your statements are ready.

Scan papers

Start by scanning everything on your desk. Short-term things can go into a digital “Delete by” folder labeled by year. Tear apart multi-page documents so that they’ll go through the scanner – you’ll be throwing them away anyway. For bulky items that won’t fit through the feeder, use either your flatbed multi-function printer, or take a photo with your digital camera.

Work your way through your desk until it’s clean. Doesn’t that feel great? Over the next few months, start chipping away at your paper filing cabinet. You will discover that much of your file cabinet can be tossed outright. Don’t scan anything you can get online, like warranties, user manuals, policies, terms and conditions, brochures, etc. Be bold and ruthless, but don’t agonize – storage costs keep falling, so if you are in serious doubt, go ahead and scan it. Then drag your file cabinet curbside and put a sign on it marked “free”.

Shred

After scanning, shred sensitive documents. If you don’t want to purchase a shredder, check your town’s Website to see if they offer a free document shredding/recycling day, where you can take in your documents and watch them shredded before your eyes in an instant; most towns seem to have one.

What to keep in paper

Scan everything, but also store in paper form official certified documents and anything with a raised seal, such as notarized documents, deeds, wills, title documents, trust documents, birth/death certificates. Other candidates for paper are short-term items you want at your fingertips, like flyers, clippings, and catalogs. Or, keep your desk pristine by scanning those short-term notes into your “delete by” folder.

Ongoing maintenance

Now that everything is in your digital filing cabinet, just keep up the ongoing maintenance:

  • Periodically check your backup solution to make sure it is working.
  • Monthly – download all online statements related to your household.
  • Weekly – scan in documents that you want to keep and keep your inbox pile small.
  • Keep your PC healthy and updated, since it is now the hub of your filing.

Enjoy your newly paperless house!

This article was written by Kristy Holch and originally appeared on Techlicious.

Read more: How to Go Paperless | TIME.com http://www.techlicious.com/tip/how-to-go-paperless-at-home/#ixzz2pcRPtHAH

How To Pin your favorite folders to the Start menu

( @ ZDNet) You want easy access to your favorite folders? Well, let's see... You can pin any folder to Start by right-clicking the folder name in File Explorer and then clicking Pin To Start. Or you can drag folders from a File Explorer window and drop them on the File Explorer icon on the taskbar, which adds them to the Jump List.

But there's a more subtle, equally accessible set of shortcuts, running along the left side of the Start menu, just above the Start button. By default, this small strip of icons contains shortcuts for File Explorer, Settings, and Power, but you can add a slew of useful shortcuts here.

The setting you need is well hidden. Go to Settings > Personalization > Start. Scroll to the bottom of that page and click Choose which folders appear on Start to reveal a list of 10 folders, each with an on/off switch to its left.

Besides File Explorer and Settings, you have the five default folders from your user profile: Documents, Downloads, Music, Pictures, and Video.

You can show the HomeGroup folder, if you're one of the few people who use that feature. Most power users, though, will want to add the shortcut to the Network folder.

Last on the list is Personal Folder, which opens your user profile folder with all of its folders.

How To Replace Important Papers

(Stacy Johnson) Imagine that your house burns down or gets completely destroyed by fire, flood or other disaster. Would you know how to go about replacing your essential paperwork?

Before the Internet came along, simple tasks like changing your address meant driving to the nearest the Post Office and filling out postcards in duplicate. Now there are much easier ways to accomplish nearly everything when it comes to organizing, protecting and replacing your essential stuff. Here’s a helpful list of links that can help you change your address, as well as replace your essential personal paperwork.

Protecting your paper

One way to protect some types of paperwork, as well as to get more organized, is to buy a cheap ($50 – $60) flatbed scanner like the Canon CanoScan LiDE 100 or Xerox 7600 OneTouch, scan your essential documents and keep digital copies. Obviously this solution can’t replace paperwork that has to be original, like a car title. But keeping digital copies of all documents is a good idea, and a super solution for paper that doesn’t have to be original, like receipts, insurance policies, etc. Creating digital copies allows you to save a lot of drawer space and keeps essential information much safer by storing digital images online.

Here are some free software programs and websites that will help you get your stuff organized and keep it that way.

  • Evernote is free document organization program available for both Mac and PC that keeps your data “in the cloud”. This means that everything you store in it is automatically backed up to their server online. Evernote also has versions of its software for the iPhone, Blackberry, Palm Pre, Windows Mobile and Android phones, letting you access your documents anywhere, any time.
  • Scribd is a free website where you can upload your important docs for safe keeping. This site is made for sharing documents with friends, so make sure anything you don’t want the whole world to see is marked as “Private” when you upload it.
  • Know Your Stuff is a free software program from the Insurance Information Institute that helps you create a home inventory: worth its weight in gold in case of disaster.
  • Adobe Reader is important for viewing all those PDF files you’ll soon be downloading, storing and creating

Read More - Click Here!

How To Take Great Pictures

“Do the pictures you take lack pop and pazazz?” The following article will help you quickly learn how to take great pictures by paying attention to composition...

As a family with four beautiful daughters, we spent a fortune on photographers, I mean a fortune! So one day I walked into a pawn shop and bought a professional film camera (that's all they had back

then) and a book on photography which I followed step by step.

My first pictures: So I got the camera stuff home, read a little in the book, then lined up my sweet little girls in the back yard to take some master­ pieces. Sweet smiles, cute antics, dressed just so,

these pictures have got to be winners. And they would have been, except whilst focusing on my girls, I never saw the basement cover laying on the ground and a toilet stored under the house beaming in the sun. Awwwful!

After more reading and shooting more pictures, I learned about composition, and how to really look through the camera and see what was going to be in the frame of the picture. As I practiced, the pictures got better and better.

Digital cameras are much easier because you don't have to worry so much about lighting and focus, and the results are instant However, no matter what you shoot with, the same principles apply. Composition Is King.

Composition Suggestions: The subject (what ever you want to take a picture of) should “EAT THE FRAME.” Fill the frame with what you are taking a picture of (the subject). If my tightly lined-up girls were framed head at the top, feet at the bottom: left arm of girl 1 to right arm of girl 4, there would be no room for covers and toilets. But whilst looking at your subject, look at the back­ ground too and remove item you don't want in the picture (if you can) OR move your subject to a different location.

Shoot what's important: Head to toe shots are great, but what may be important is their beautiful smile. In that case, framing the top' of the head and the left ear of girl number 1 to right ear of girl number 4 might yield better results also. Keep asking yourself, can I get closer? Can I get closer yet? You will be pleased with the results.

Add a little background: When vacationing, it's easy to get caught up in shooting pictures of where you are, like mountains, trees, and buildings. However, years later, those pics usually get passed over in favor of photos with friends and family. So when taking pictures of that magnificent tree, place your traveling companions in the shot, using the 75/25 rule. That is, make sure that people occupy at least 75 percent of the picture frame. That way when you view those' pictures of your vacation years from now, it will be like sharing the experience with those folks in the picture all over again.

Subject a little off center: Amazing results can be obtained by shooting your subject a little off-center of the frame. I like to mentally divide the frame vertically into three sections. Then I

place my subject in the center of the first two OR last two vertical sections, leaving the remainder of the frame for the background. Talk about making your pictures pop!

Orientation: Picture formats are usually rectangular. Therefore, some pictures, like one or two people, or trees, lend themselves to turning the camera into the portrait position, sideways, whilst a line of people, or a river, usually look better in the landscape position. If you experiment with orientation, you will soon see what works best for the type of pictures that you wish to take.

Shoot lots of pictures: While folks are lining up for that eventful portrait, take a few pictures before and after you say CHEEZE. You may find several winners or good pictures that way. Also, you can take a large picture, then crop specific parts of a picture to get smaller group shots and single portraits.

Picture taking is fun, and the memories they make are priceless. But paying attention to “composition” can easily turn your good pictures into WOW Pictures!

How To Work Faster On Your Computer

Work, family, friends and a few hours for yourself? Sometimes it seems impossible to fit everything in one day. If you are looking to spend less time at your computer and more time somewhere else, check out these clever keyboard shortcuts.


Windows of opportunity

If you often work with several windows open simultaneously, you’ll save valuable minutes using these quick key options.

1. To minimize a window to your toolbar, press ALT, SPACEBAR and N.

2. To maximize a window to your full screen, hit ALT, SPACEBAR and X.

3. To reduce the size of a window without hiding it, press ALT, SPACEBAR and R.

4. To close a window, hit ALT and F4.

5. To go to the last window you had open, simultaneously click ALT and TAB.

6. To select one window when you have several open, hold down ALT, and maneuver by clicking TAB to the window you want.

To speed up Excel

You can easily accelerate your spreadsheet skills with these handy tricks.

7. To move right to left, cell by cell, hit TAB.

8. To move up and down, cell by cell, press ENTER.

9. To delete data in a cell, use the BACKSPACE.

10. To enter a formula, press = (equals sign).

11. To enter a date, hit CTRL and ; (semicolon).

12. To enter a time, press CTRL and SHIFT and : (colon).

13. To do a quick spell check, press F7.

14. To change numbers to dollars, click CTRL, SHIFT and $.

15. To make figures a percentage, press CTRL, SHIFT and %.

Working with words

If you are using Microsoft® Word, check out these handy shortcuts:

16. To create a new document, click Ctrl and N.

17. To close a document, click Ctrl and W.

18. To preview what you are about to print, hit Alt, Ctrl and I.

19. To print a document, press Ctrl and P.

Faster folder and files

You can speed up your desktop driving with these tips.

20. Having trouble finding something on your desktop? Select any file, folder or desktop icon, then type the first letter of the item that you are looking for. The item will be highlighted. If there are several items starting with the same letter, keep clicking the letter until the one you are looking for is highlighted.

21. To rename a file or folder, simply click on it and press F2. You can now type in a new name.

22. To bring up the START menu, press CTRL and ESC.

Extra time for you!

The more you use the above shortcuts, the quicker you will become. You’ll increase your productivity and decrease the time you spend at your keyboard when you’d rather be doing something else!

Recommendations in this article should only be applied to devices that you own or manage yourself. If you are part of an enterprise organization, please verify that these recommendations are compatible with your internal IT standards prior to applying them.

Microsoft is a trademark of the Microsoft group of companies.

How and Where to Save Money In Today's Economy

In today's unhealthy economy, one can't help but wonder how small businesses can effectively achieve cash management. In fact, even medium scale and large scale business are struggling to cut back on their expenditures during the current economic situation.

Everyone is tightening their belts, both customers and consumers. But how much and where...

Imagine the consequences if no one wanted to purchase goods other than the essentials. What will happen to the restaurant industry? What will happen to the retail industry, particularly those marketing electronics and those gadgets that people can manage without?

It's not just a matter of reducing expenses. Small businesses need to survive and compete with the lower prices that are offered by their competitors--and good cash management is a must.

Here are some tips to help you to save money and manage your business and cash flow. These will also help individuals to better manage their home expenses.

1. Energy Consumption

Electricity is an expense we can't avoid, but if you are able to keep your energy consumption lower than normal, you can save a fair amount of money. One way to save energy is through the use of laptop computers. Sure, they can be more expensive than desktop computers, but imagine the great savings you'll get when it comes to energy consumption. A laptop or notebook computer consumes around 90 percent less energy than desktop computers. Most small businesses use computers, and if these are replaced with laptops when the time comes, energy expenditure will be less. The more computers your business uses, the more money you will save.

2. Telephone Costs

The telephone is essential to all small businesses, and many use mobile as well as land lines. Check up on your monthly plan and negotiate a better deal. As competition is increasing, many businesses are stuck on a deal they started off with, and if they renegotiate they can save a lot of money. Use mobiles only where necessary since they are significantly more expensive to use than land lines. Good cash management involves keeping a close eye on communications costs, especially those that are non-essential.

If you use multiple telephone lines in your business, consider VOIP as an alternative. This can allow you to make huge savings, particularly if you have more than one location for your business. Also, Skype offers a completely free service between Skype users, and it is less expensive than normal to phone non-Skype users.

3. Save on Your Ink

Ink for printers can be another expensive item, particularly when calculated over a year. Try to go paperless and print only what is essential. Use recycled cartridges or buy in bulk to save money. Printer sharing on a network can save on the cost of the hardware and also on ink!

4. Save on Lighting

Most people turn off the lights in their homes when they leave the room, but strangely they rarely do so at work. Make a point of doing so. Switching to energy-efficient light bulbs can save a lot of money over a year.

5. Use the Internet

Small businesses should use the internet as much as possible. It is amazing how many tasks can be carried out online, including business calls, sales calls, online business conferencing, video conferencing, live meetings, instant messaging, seminars and so on.

Owning a small business involves almost constant communication with customers, suppliers and other employees. This can be expensive, particularly if it involves travel. It is just as easy to communicate online as by telephone, and video conference is cheaper than a transatlantic flight! Online seminars can be arranged for training purposes, and advertising costs can be slashed through online advertising. Websites are becoming easier and cheaper to put up with every day that passes. The internet offers many opportunities for you to improve your cash management and improve your overall cash flow.

6. Assess your Office Space

Perhaps you have too much office space and you can afford to let some of it out until you have expanded enough to need it. If you are renting, share the rent with another small business that only needs a desk or two.

7. Buy in Bulk

A lot depends on your cash flow situation, but it is sometimes cheaper to purchase office items on a quarterly rather than a weekly or monthly basis. This is particularly true if bulk discounts overcome the problem of tying up your capital in stock. You will save on delivery charges, but make sure that you budget the use of such supplies, since there is sometimes a temptation to use more materials or supplies when stocks are higher than normal.

Although times might seem bad, those with the ability and desire to make savings will come through in a much stronger position than small business owners who do nothing. Don't let that be you, and by following these seven cash management tips for small businesses, you should be able to make significant savings.

How do you find Great Content

How do you find Great Content to share?

Once you understand that being a good social citizen means sharing other people's posts and content, the challenge becomes, where do you find great content? I've had very interesting conversations with Ryan Best and others who want to better understand this concept of content curation, and how it applies to social media activity.

There are two main techniques that I use, but perhaps some smarter people can offer some additional ideas.

First, I make sure that I am identifying and connecting with influencers and thought leaders on all my social networks. Now, before you get caught up in the anti-vocabulary craze, understand that these terms really do apply. I am actively looking for people who are sharing their own unique ideas and perspectives, and providing real value to those that are interested in what they have to say. I follow brilliant people like Denis Labelle and Mark Traphagen and martin shervington and I continue to learn from the example of guys like Kenneth Manesse Sr.. Every day, when I open my stream, I get a free education on the topics I'm interested in. And I am offered a steady diet of fabulous posts that I can share with my own followers. That creates value for your followers, and an implied affiliation between you and that influencer.

Second, I have taken the time to identify key websites providing articles and commentary on my industry. Sometimes they're blogs from the same people I follow, and sometimes they're different. Some of my favorites include Copyblogger and Social Media Examiner and Heidi Cohen - sites with RSS feeds that are providing tremendously valuable articles and ideas every day. I use these sources to find at least 2 - 3 interesting articles that I can share to my social networks.

In continuing my How to Make the Most of Your HootSuite Account Series, today's post explains in detail how you can use these two methods of finding great content, couple them with HootSuite, and bring everything together into a single dashboard. If you're interested in really unleashing the power of your HootSuite account, check it out.

Are there other ideas or techniques you've found for finding great content? Is there anyone else who you think is doing a bang-up job of sharing other people's posts and being a resource?

And if you have questions about HootSuite, either regarding the RSS Syndicator or otherwise, post 'em here as well.

How to Be Honest from WikiHow

Edited by Jared C., Martyn P, Krystle, Nicole Willson and 55 others

Honesty is said to be the best policy. Being honest with others and yourself can be challenging. Political correctness, being sensitive of other people's feelings, and facing uncomfortable truths about yourself usually requires much patience, vigilance, and hard work.

 

Steps

  1. 1

    Understand the workings of dishonesty. Most learn dishonesty as children upon realizing that different behaviors result in different outcomes. For example, saying certain things (or not saying certain things) garnered desirable approval and praise, or the undesirable disapproval and censure, if not punishment: dishonestly achieving desired results was always temptingly easy. With time the thought processes behind such actions became so unconscious and automatic that ethics and negative consequences are tossed aside. (see Warnings below). Dishonesty often becomes a tool to:

     
     
     
  2. 2

    Fess up. Acknowledge past dishonesty whether you took a cookie and then denied it or blatantly lied about whose fault an automobile accident was. Although reviewing your past transgressions can create discomfort and guilt, recognizing past dishonesty can reveal and help you stop patterns of lies.

    • If you feel guilty for having been dishonest in the past, then apologize those to whom you lied or creatively set things right. For example, if you kept money that you knew wasn't yours and didn't make a good faith effort to return it to its owner, then return an equivalent or greater amount to its rightful owner or, if you cannot locate the owner, donate an equivalent or greater amount to charity. If you've lied to a person who plays an important role in your life (a significant other, relative, or friend) then come clean.
    • List your potential weaknesses, which may be as simple as a tendency to make up excuses for failures or as complicated as kleptomania. Dishonesty stems from fear: find and face it. List problems and then deal with them to consciously battle these habits. If you find yourself lying because you fear disapproval from someone, for example, then you may need to learn how to stop being a people pleaser and be yourself. Most importantly, so admit your errors that you can forgive yourself and use those experiences to reinforce your determination to improve. You can't fix what you ignore.
     
  3. 3

    Think honestly. So doing may sound silly, but prejudices and preconceived ideas can blur the truth: neither take things at face value nor assume when you read, see, or hear something. Offer the benefit of the doubt and be skeptical where necessary. When you make a commitment to communicating and understanding the truth, you may humblingly realize that most of what we believe to be knowledge is actually comprised of assumptions. Consider the Jewish proverb: "What you don't see with your eyes, don't witness with your mouth."

     
  4. 4

    Practice being honest on the simple things, especially where "coloring" the facts is meaningless. The situations range from speaking the truth to avoiding such simple, thoughtless acts as picking up someone's pencil or grabbing an apple off the neighbor's tree to snack on without thinking about it). Abraham Lincoln became famous for going to great lengths to return a few cents that that were not his--hence his nickname, "Honest Abe". Applying honesty to little things builds a general habit of honesty.

     
  5. 5

    Exercise tact. We all know that being literally honest can hurt feelings and sour friendships. It can also be misinterpreted as criticism or a lack of support. A "white lie" can be very tempting when dealing with sensitive loved ones (especially children), but you can still be honest by being creative in how you express the truth.

    • Emphasize the positive. Shift the focus away from what, in all honesty, you think is negative. Instead of saying "No, I don't think you look good in those pants" say "They're not as flattering as the black dress—that dress really looks amazing on you. Have you tried it on with those stockings you wore to my cousin's wedding last year?"
    • You have the right to remain silent. If you're pushed into a corner and don't know how to respond, say "Can we talk about this another time?" or "I really don't feel comfortable talking about this. You should really address this with..." Don't say "I don't know" if you really do know—it can come back to bite you. The person might realize that you know something, and they might get pushy. Repeat yourself and leave the conversation as quickly as possible.
    • When all else fails, be honest—but gently. Wrap the potentially hurtful truth in appreciation, praise, and, if applicable, affection.
     
  6. 6

    Find a balance between full disclosure and privacy. Being honest doesn't necessitate revealing all your (or anybody else's) business. We leave some information unmentioned because it is not information to which others are entitled; withholding information that you know should be disclosed nevertheless constitutes lying by omission. For instance, not telling a romantic partner of a child or past marriage is objectionable to most. Deciding what a person should or should not know is a personal decision. Although a person may be better off not knowing something, hiding that information is not necessarily in their best interest. Follow your gut and introject: "If I were in their shoes, would I rightfully feel betrayed if this information wasn't shared with me at an appropriate time?"

     
  7. 7

    Honesty makes us vulnerable by revealing to others our selves and mistakes. They may therefore more hurtfully criticize and reject us than if we'd hidden the truth or lied to begin with. The truth sometimes simply hurts, but honesty develops character, credibility, and trust--all of which build self-esteem and improve your relationships. Being honest isn't a goal that you check off a list—it's an ongoing process that will both challenge and benefit you throughout your life.

How to Maintain Momentum in a Down Market by Mike Phelan

SevOne’s vision is to remove all limits to data collection, reporting, and affordability. The perception of limits is always changing. The way enterprises and service providers define affordability limits have changed dramatically because of market uncertainty.

Some believe that software companies have trained enterprise customers to buy software at the end of a quarter, when the best deal can be negotiated. But now, some companies can’t buy anything at the end of a quarter, regardless of price and value. The market severely punishes high profile public companies that don’t have predictable financial performance, especially during times of uncertainty. There are a limited number of short-term controls or levers to control financial performance. The only real lever is to cut expenses, which means postponing purchases. The levers are not very discerning. There isn’t a lever to postpone only “nice to have” purchases so, “must buy” purchases can get held up too. So, a great Lever Large value and a great price isn’t enough. Whatever your product could save could be lost in market value if a company misses its expected financial performance.

The US market is bouncing along at few points of growth – if we drop a few points into negative growth – then it’s called a recession. No real difference from where we are now, but the press will make a big deal out of the word "recession," which will hurt confidence. The US economy doesn’t have any more real bubbles, so it’s relatively stable. Europe is a different story. The debt load of Spain, Portugal, and Greece is unsustainable and the ECB (European Central Bank) doesn’t have the tools to fix it. Their objective is to control inflation (unlike the Federal Reserve in the United States) it does not have a second objective to sustain growth and employment. Furthermore, Europe doesn’t have an FDIC (Federal Deposit Insurance Corporation) – which allows a US bank to fail and be reorganized over the weekend and re-opened as a new bank on Monday. So, this is a big problem that doesn’t have any easy solutions. We don’t know how the European politicians will handle this, but it will be painful and it will impact the US – Contagion!

So, why aren’t we panicking? We have the success formula, that even works in down and uncertain markets. Last week I had lunch with a very senior financial executive who serves on high profile public boards. He is not seeing panic in the boardrooms. He is seeing confidence. Smart CEOs are hunkering down, making difficult choices, but investing because they are confident that the market will get better. These companies will dominate as the market improves, as will SevOne.

So, how are we maintaining aggressive growth in a down market? How is SevOne becoming one of the smart investments that transcend market difficulties? Our competitors would like to know how we booked more business in Q3 than any preceding quarter. Here is the secret:

To maintain momentum in a difficult market, your offering has to be an MB+E2B (Must Buy & Easy to Buy)

Providing the best price/value (best of breed) alternative is a given – being a “Must Buy.”   A Must Buy has to be...

    Tied to key services and high priority initiatives, such as a VoIP or video conferencing, mobility

Clearly prove how it will save money by telling them what infrastructure is needed to assure quality services

Easier to implement and easier to scale than alternative

Easy to buy is a different story for every customer. One way we make our offering easy to buy for everyone is by making a simple all in one offering (physical appliance, virtual appliance, or cloud delivery). So our price catalog is one page. Simple strategy; Include everything we develop in one scalable solution. Let the customer decide what they need to use or can afford to use. If they find value, they will use more and buy more as they need it.

Easy to buy also means removing artificial business limits. Today we structure our offering to closely align with the customer’s appetite. One new financial customer asked us to offer what he called a convertible ELA. This way he could solve immediate problems in three areas, limiting the immediate expense, but the purchases count toward an Enterprise License Agreement, capping the total cost.

Another customer made a large, seven-figure subscription commitment in September, but in October intends to use capital budget dollars to make a seven-figure purchase. It’s important to point out that this customers’ initial subscription was very small. The SevOne implementation scaled organically completely controlled by the customer.

How to Make a million dollars by Blogging on LinkedIn

How to Make Money by Blogging on LinkedIn BY

(Dave Kerpen) An entrepreneur reveals how he generated leads and revenue with his LinkedIn blog and show how you can do the same.

That's how many people viewed my blog content on LinkedIn last year. Those 16 million page views led to 300,000 followers, thousands of sales leads and books sold and more than $1 million of revenue.

I'm super lucky. I've been part of the LinkedIn Influencer program and that's been a huge part of my success. But now, LinkedIn has opened up its publishing platform to its 275 million users. Now, everyone can blog on LinkedIn. Now, with this roadmap, everyone can make money through LinkedIn. Here's exactly how:

1. Think of a great headline.

A clear, powerful headline that promises to deliver value to the reader counts for as much as 60% of the overall success of your blog post on LinkedIn, as headlines grab readers' attention in an increasingly crowded landscape. Use the headline to guide your content, and deliver what you would tell your best customer.

For example, if you're an accountant, you could try "5 Essential Tax Saving Tips This Year." If you're a small-business growth consultant, you could try "The Secret to Growing Your Business." If you're a recruiter, try "How to Find the Best Talent." Don't worry about giving away your secrets!

2. Find or take a compelling photo.

The "hero image" directly beneath the headline counts for about 30% of the overall success of your post on LinkedIn, as people notice images much more than they notice text. A photo of you, or you with one other person that the post will reference, is perfect. Choosing and licensing a photo from a site such as Shutterstock is another option. Don't ever skip the photo.

3.Write a concise post.

It depends on what you want to deliver, but typically, 400-600 words is good. Use bold, italics, number and block quotes to add variety to your post. Consider embedding Slideshare presentations and or videos through LinkedIn's easy-to-use toolbar. If you want to become a better writer, here is a post on writing that I wrote.

4. Include two strong "calls to action" at the bottom of your post.

Conclude your post with two calls to action for readers: The first should ask readers to comment and give them specific questions to answer related to your post. As comments are a huge driver of virality on LinkedIn, you'll want to solicit comments from your connections and readers. The second call to action is an offer--this is where you'll drive leads, sell books, or solicit app downloads. Drive people to a landing page on your website with a call to action such as "To learn more, click here." Consider a clickable picture here too.

5. Share the post on LinkedIn, Facebook and Twitter.

LinkedIn is most obvious network to share your post on, for obvious reasons. Consider sharing it both publicly (with all of your connections) and privately (through messages to key connections). Consider sharing it with LinkedIn groups you're in, and your company page if you have one. Don't be afraid to share it up to four times, as your friends and colleagues are logged in at different times through the day and week. Ask your network to share your post with their network.

6. Repeat steps 1 through 5.

To obtain the best results, blog consistently, at least once per week, on LinkedIn. Remember, you don't need to reach a million people on LinkedIn in order to make money, you just need to reach a few of the right people. And chances are, no matter what you do, the right people are in your LinkedIn network and your network's network.  To reverse-paraphrase the movie The Social Network:

You know what's cooler than reaching 275 million people on LinkedIn? Reaching the right 275 people, with the right message.

How to Sell Your Photos

Now more than ever, there is high demand for photographers with varying skill levels and their stock photos.  Large corporations, small and medium size business, bloggers, graphic designers, marketers, and publishers have insatiable appetites for new and unique photo content. 

Do you love taking pictures? Does your family ask to see your latest photo art? Are you known in your circle of friends for your amazing photography? Would you like to earn extra money for equipment and travel whilst on photo safaris? If yes yes yes, you may do well selling your pictures as stock photos online, either as a "side hustle" or a full-time career!

What Sells

People - babies, kids, adults, elderly, doing everything and nothing at all, from every walk of life, country and culture... attitude and intent!

People working - using laptops, in the act of writing, public speaking, classes, students, Grandpa teaching Granddaughter to fish, Daughter teaching Dad to use a cell phone....

Food - Capture the flavors, colors, aroma, enjoyment. Settings, plates, feelings, rot and disgust.. joy and awe!

Tools - Gears, hammers, nuts, bolts and screws, in motion, making a difference... creation, destruction!

Cities - Cityscapes, buildings, people commuting, over crowding, traffic, trash wafting in the breeze....

Nature - Landscapes, seascapes, mountains, deserts, sunsets, blizzards, hoarfrost, lightning storms (use caution), new fresh snow....

Travel - Where people live, play, culture, capture what it is like to be there... joy of living, disgust with intruders!

For ideas of what to shoot, check out photo marketplace image categories. But don't limit yourself to "those categories" . Be creative! Capture images that interest you!

How to get started

Learn Your Craft! There are tons of classes and tutorials on the net, as well as traditional photography schools. Learn all you can; learn everything you can. Just don't let what you learn stifle your creativity. Use your new-found knowledge to enhance your capability and the quality of your work.

Experiment with everything!. They say "don't shoot with the sun behind your object". Do it! Often! Figure out how to use the sun to convey time, distance, feeling and emotion. To soften a smile or crater age facial lines with shadows!

"Your shots must be sharp and crystal clear!" No No No Mon Ami! Some photo artists have built careers on slightly blurry satin images. How about a blue tint layer, or red, violet, or gray? 

Just Shoot Shoot Shoot! All the time! Everything you can! At every possible angle. Eventually, you will discover what makes you smile. Then perfect your style!

Learning

Harvard Photography Course Skillshare Photography MIT Opencourse Photography NYIPEDU Nikon School of Photography Canon See Imposible

Equipment?

I started out simple and stayed that way. I bought a Nikon Digital SLR camera that included 2 lenses, a 18-55mm and a 55-200mm, for under $500. Because I shoot bugs (insects) a lot, I also opted for a 35mm macro lens. Extra battery, SIM Memory (biggest I could get), and a flash unit (which I never use). My good friend bought a Canon around the same price. He's happy with it and sometime i'm envious. Both are good choices.

This might surprise you, but I also use my Cell phone Camera a lot! Years ago I purchased a Motorola equipped with a 24 megapixel camera and a glass lens. To my surprise, nearly a third of my winning photos were taken with my cell phone. Case in point, A women shooting the Columbia Zoo Otter Exhibit, with thousands of dollars of equipment strapped about her necks, dropped her jaw after watching me take the same shots with my cell phone and viewing the results. Then she got mad!!! Point is, you don't need to spend a lot of money to get started. Just get out there and shoot everything, analyze each shot, experiment, and keep shooting! Put your best shots on the net and ask for comments, and see if anyone buys it. You might be surprised at what you sell and what you learn!

In addition to cameras, you might need some software and a laptop to combine photos and touch them up. Most folks opt for mainstream photo software like Adobe Photoshop and Lightroom for mucho dinero.  Those are excellent choices. However, I opted for free and open source Gimp and Darktable, and have achieved amazing results.

Where can I sell my stock photos?

1. Your Own Website. Why? You are in control! You have 100% control of how your stock photos are displayed. You set your own terms and conditions. You set your own price. There is "No Cut". All the money comes to you! And there is no competition on "Your Website!" Contact us for hosting, web design, and marketing information.

2. Adobestock.com

3. Gettyimages.com

4. Shutterstock

5. Fotomoto

6. Crestock

7. 500px

Conclusion

Selling your online stock photos can be lucrative and rewarding. Take your time, make it real, have fun. The more time and effort you put into it, the more you will get out of it, If you love it, it can be truly amazing!

How to Turn Off System Windows 7 System Protection – System Restore

If, for some reason, you find that you must turn off System Protection, this is how we do it:

  1. Click Start | Control Panel | System and Maintenance | System (in Classic view, just System)
  2. In the left pane, click System Protection.
  3. Enter the administrator credentials or confirmation if prompted.
  4. Click to uncheck the box next to the drive on which you want to turn off System Protection.
  5. Click OK.

Word of Caution: Turning off System Protection will delete all restore points created for that drive. Turning it back on will not get them back!

How to automatically shutdown your Windows 7 computer at the same time each day

   
How to automatically shutdown your Windows 7 computer at the same time every day

Many of us leave the computer on all night to receive updates, defrag, and do virus scans. Using this tip will enable you to shut down your computer at a designated time to conserve power, and this is how we do it:

  1. Click the Start button and in the search box, type Scheduled tasks
  2. Click the item when it appears in the search results list under "Control Panel."
  3. In the Task Scheduler console, in the Actions pane on the right, click "Create Basic Task ...".
  4. In the Wizard page that opens, give the task a name such as "Shutdown" and write a description (if you want) such as "Shuts down the computer at 1:00 a.m. every day."

    Click Next.
  5. On the Task Trigger page, select "Daily" and click Next
  6. On the Start Date and Time page, fill in the date and time you want to begin (such as 9/7/11 and 12:00 a.m.) and click Next.
  7. On the Action page, click "Start a Program" and click Next.
  8. On the Start a Program page, in the Program/script field, type:

    C:\Windows\System32\shutdown.exe
  9. Windows is installed on a drive other than C, substitute that drive letter.

    Click Next.  
  10. Review the Summary page and click Finish.       

Now Windows will automatically shut down at 12:00 a.m. each day. Just before, a pop-up notification will then display telling you that "Windows will shut down in less than a minute."

How to hide from face-detection technology

If you take Adam Harvey's advice, here's what you might wanna wear to a party this weekend: A funny hat, asymmetrical glasses, a tuft of hair that dangles off your nose bridge and, most likely, a black-and-white triangle taped to your cheekbone. Optional: Cubic makeup patterns all around your eyes.

All of these otherworldly fashion accessories – which could leave a person looking kind of like an opulent villain from "The Hunger Games" - have a singular goal: to stop your face from being detected by cameras and computers. Called CV Dazzle (short for "computer vision dazzle;" more on the name later), Harvey's project is a provocative and largely theoretical response to the rise of surveillance cameras on street corners and face-detecting technology that's been incorporated into social networking sites like Facebook and Flickr.

Read More - Click Here!

Huge Misconception Plaguing Google+

The Huge Misconception Plaguing Google+ image eaihz5dgtgt9hjhgfpfubtogp6t9bovygvvsknqhswk resized 600() The Huge Misconception Plaguing Google+Any time I’m asked where businesses should focus their social media marketing efforts, my default answer is, “Go where your target market or audience gathers, first and foremost. Everything beyond that is secondary.” If your target audience isn’t on Pinterest or Instagram, having a presence there shouldn’t be a primary concern for your business. Elementary stuff, right? Then, there’s Google+, which has fallen prey to a huge misconception among business owners and even a lot of digital marketers.

 

“My Customers Aren’t on Google+”

While Google+ is definitely growing and becoming more mainstream, it’s still behind Facebook and Twitter in terms of use by “typical” consumers. In the past, I would have agreed most businesses shouldn’t much spend time on Google+, because you’re more likely to reach consumers elsewhere. But hold on! This is Google we’re talking about and the picture is becoming more and more clear every day. To say your customers aren’t on Google+ is a huge misconception based only on a superficial analysis of Google+. Yes, your customers might not have active profiles or intentionally seek out your brand on Google+ in the same way they do on Facebook or Twitter. In that respect, your customers aren’t on Google+.

What Makes Google+ Stand Out?

As Damian Farnworth pointed to on Copyblogger, Google+ is unique, because what’s published on the social network doesn’t stay contained within those walls. Google+ was intentionally constructed in quite the opposite way. Google+ was created to encapsulate all things Google — to act as a “thread” connecting all Google products in one central hub.

So, unlike Facebook, Twitter, and others, Google+ was built to extend far beyond the social network and into areas like search and blogs via Google Authorship and Author Rank, YouTube, Google Places for Business, Google Jobs Board, Google Play, Blogger, and (theoretically) into every Google product in the future. With that said, let’s glance at some fun facts:

  • “Over 4 billion hours of video are watched each month on YouTube.” – YouTube Statistics

The Obvious Conclusion

Google+ already has its hand in many mainstream uses of the Internet and there is every indication that trend will continue. You can’t ignore Google+ with the reasoning that your target customer isn’t there, because that’s essentially saying your customer doesn’t use the Internet for any mainstream purposes. In some respect, your presence on Google+ will impact how you reach your customers, whether that’s through the SEO benefits of Google+, a video being recommended on YouTube, customers leaving or reading business reviews via Google Places, or any yet-to-be-seen relationships between Google and the rest of the web.

Getting Started on Google+

Are you on board with Google+ now? Getting your Google+ presence up and running is a piece of cake, but here are a handful of great resources and additional reads I recommend:

  • Start following Mark Traphagen. I call him the “Google+ King,” but I’m not sure how he feels about that! Regardless, he’s the guy to talk to if you have any questions about Google+.

IE vs Chrome vs Firefox vs Safari vs Opera - Which is Best For You

(@ Digital Trends) The era when Google Chrome was head and shoulders above the competition has ended. Today’s popular browsers compete on a level playing field. Internet Explorer 11 — the oft overlooked Microsoft standby — has blossomed into a lean and fast browser for Widows 8. Mozilla Firefox, Opera, and Google Chrome continue to ramp up their version numbers, and Safari tenaciously scuttles along as the under-appreciated byproduct of Apple’s quest for global domination. Gone are the days when choosing a browser for all your Internet perusing needs was a no brainer. Today, with all the competition, choosing the right browser has become a something of a tough decision. Fortunately, you can’t really go wrong with any of the popular browsers anymore, but there are a few things here and there that give each its own competitive edge over the others.

Installation, updates, and compatibility

Installation across the five browsers is inherently the same. Users can download them from their respective websites if they aren’t built into your operating system already (i.e. Safari comes pre-installed on Mac OS X and IE 11 on Windows 8), and each will typically download in under 30 seconds depending on your Internet connection. Unfortunately, Internet Explorer will force you to fully reboot your machine, likely due to the increased hardware acceleration and several updated features. The rest of our lineup doesn’t require a reboot, only a quick browser closure.

Below is a list of browser compatibility.

Google Chrome: Windows, Mac OS X and Linux

Mozilla Firefox : Windows, Mac OS X and Linux (Not compatible on iOS)

Internet Explorer (32 and 64-bit): Windows (7 & 8)

Safari: Mac OS X (Safari 5.17 is available to download for Windows)

Opera Next: Windows, Mac OS X, and Linux

When it comes to updates, Opera, Firefox, and Chrome have the advantage. They install silently, quickly, and transparently download updates in the background and automatically apply the new software when you re-launch the programs. What’s more, the third-party browsers update most frequently, every few-weeks, so any major problems are likely to be fixed quicker than IE and Safari. Users can also manually install updates on Firefox if they would like to have greater control over the browser or prefer to use an older version for whatever reason. Keep in mind that turning off automatic updates is more likely to put your computer at risk though, since each browser is continuously adding security fixes and other key stability updates.

Design & ease of use

If I didn’t know better, I’d say that the current trend in browser design is for the browser to disappear entirely. IE, Firefox, Safari and Chrome all attempt to be as minimal as possible, offering next to no actual text and small, monochromatic buttons that blend right into the look of operating systems like Windows 8 and Mac OS X. Overall, all five browsers appear to achieve their goals fairly well, with different strengths and weaknesses.

Google Chrome 35

Google Chrome 35

Google Chrome offers a lean address bar configuration, stripping everything down into a simple tab layout and address bar configuration that also doubles as a search bar Google calls the “Omnibox.” Like most browsers, the window can get incredibly cramped with 15+ tabs open, but it still does a fantastic job of delivering content whether you have the browser fully expanded or slightly minimized for the sake of space. Adjacent to the omnibox is Chrome’s simple standard navigational features (i.e. back, forward, refresh, home) by default, but you can easily slim down the window by customizing the toolbar and deleting any buttons you deem invaluable. Chrome’s single-click bookmarking method, done by simply clicking the star located on the right side of the address bar, also makes bookmarking your favorite webpages a breeze and hassle-free experience.

Mozilla Firefox 30

Mozilla Firefox 30

Mozilla Firefox features a similar, yet useful layout when compared to its competitors, placing the tab bar above the address bar. Despite reaching version 30 of the software (it skipped versions 18 and 11 through 16, apparently), it still slightly feels like the bulky predecessors of the software, refusing to unite the address and search bars in a single unified field like all of its peers. The browser offers the same kind of single-click bookmarking that Chrome does — all you have to do is click the star located in the address field — but there isn’t much else that separates it from the rest of the pack. Instead of sporting a gear or similar icon button for its settings, Firefox opts for an orange “Firefox” button in the upper-left corner in Windows version of the browser, taking up a tiny bit of space that could otherwise be used by the tab bar.

Internet Explorer 11

Internet Explorer 11

Internet Explorer Technically, IE 11 is the most minimal internet device of the four, with less “chrome” than Chrome. IE 11 features a single bar that simultaneously functions as the browser’s address and search bar. The space at the top places your open tabs to the right of the address-search bar, making it somewhat more cluttered than some of our other picks given the amount of space the search field takes up, but it typically isn’t worrisome unless you’re really stacking up a high volume of tabs. Other notable design features include the single-click bookmarking star now widely adopted by almost all other prominent browsers.

Safari

Safari 7

Safari The browser that has traditionally attracted critics, is now a serious competitor to the likes of Google and Firefox. The newest version of Apple’s innate software is fairly minimalistic in design, but retains enough familiarity for old users of the browser to feel at home. Like its peers, Safari offers the address-search bar hybrid , along with a bookmark-tab bar that tightly sits below the former for an approach that proves both user-friendly and attractive. Unfortunately, the browser lacks a single-click bookmarking tool, forcing users to click through several hurdles for something that should be as easy as 1-2-3. Regardless, it’s still a clean design that should dissuade you from giving it a go. Mac users running the most recent operating system can even launch the browser in full-screen mode, essentially expanding the window and for the ultimate viewing experience.

Opera browser 1

Opera 22

Opera embraces Google’s chromium search engine but retains signature features that distinguish this browser from the rest. Like Chrome (and everyone else), Opera has a single hybrid address-search bar. But the reputable alternative browser also sports Opera’s signature features, stash and speed dial. Speed dial allows for easy bookmarking and functions like “the most visited page” on Safari. Stash is similar to Pocket, it allows you to store pages for future browsing. The bottom line, it’s a clean design with innovative features that holds its own against the rest of the competition.

Benchmark Tests Compared

Most of the browsers are compatible with Web standards and handle speed with relative ease. A casual user probably won’t notice a difference in the Web page rendering speed between browsers. All four browsers are much faster and leaner than browsers even a few years ago and becoming even more so with every new software build. Below are our benchmark results for the four browsers, bold text indicates the winner for each category.

Browser

Acid3

Sunspider Kraken JavaScript Octane 2.0 HTML5 Compliance
Chrome 35 100 555.7 ms 1590.4 ms 23881 506/555
Internet Explorer 11 100 91.8 ms 2234.2 ms 14958 374/555
Mozilla Firefox 30 100 164.5 ms 1316.0 ms 20757 467/555
Safari 7 100 280.4 ms 55.89 fps 5377 378/500
Opera 22 100 188.2 ms 1496.5 ms 23961 497/555

Google Chrome bested the HTML5 compliance benchmark, the test that indicates how “future-forward” a browser is. Even so, Chrome underpreformed when it came to overall processing speed, as indicated in the Sunspider benchmark test. Internet Explore, though ranking rather low in the HTML 5 Compliance benchmark tests, managed to outpace the competition in speed-gauging Sunspider benchmark. Naturally, Firefox bested the competition in it’s native Mozilla Kraken Javascript test, the test that benchmarks rendering time. Surprisingly, Opera performed the best in the Octane 2.0 test, which measures how your browser will preform under the stress of games or highly interactive web-pages. Take note, test results can fluctuate at any given time, but all five browsers are worthy contenders when it comes to sheer speed and Web standard compatibility.

Extras

Features are what truly separate one browser from the next given that speed and compatibility are no longer really an issue. That being said, each browser does have its own slate of differentiating features, from expansive app stores and add-ons to various extensions and tools, that makes it shine in its own light.

Chrome Web StoreChrome differentiates itself through its constant updates, but also through its extensive Web Apps Store, which offers apps that blur the line between Web and local apps in some unique ways. Much of this philosophy comes from Chrome OS, Google’s desktop operating system based on the Chrome browser. Still, we like the idea and Chrome remains the most integrated software for accessing anything Google related (i.e. Gmail, Google Drive, etc.). If Web apps and seamless dashboard features are important to you, check out what Google has to offer.

Check out the mobile versions for Android and iOS devices while you’re at it.

green puzzle piece

Like Chrome, Firefox is on a six-week update schedule, and sports a strong catalog of extensions. Developers will have to retool many of these to support Firefox 33, but some user refuse to leave Firefox solely because it offers unique extensions that have become essential to their browsing experience. Most other browsers support add-ons, but Firefox may have a lead in mindshare here (for now). The built-in PDF viewer is incredibly handy, as is the browser’s support for Macbook Retina displays and grouped tabs, and Firefox remains the most customizable in terms of interface and display out of the four on our list.

Currently, Firefox only offers a mobile version of its browser for Android devices.

Safari ExtensionsSafari may not have the admirable extension catalog to rival its peers, but it does have offer a good deal of extensions and utilities for productivity and organization. Unlike Firefox and Chrome though, the third-party extensions are rather bland and aren’t as integrated into the software as they probably could be. The bulk of them also lack the “fun” factor found on other browsers, but hopefully Apple will take a cue from the current market and work more accessible and entertaining extensions into the Safari Extensions Gallery. Other awesome built-in extras include the ad-free Safari Reader, which lets you view solely text without all the unnecessary clutter, and comprehensive iCloud integration syncing pages across all devices.

Safari’s mobile version comes preinstalled on iOS devices.

Internet Explorer Add-onsIE11 sports heavy integration and optimization for Windows 7 and 8. Many functions, like turning tabs into new windows, are much easier with Microsoft’s new browser. It retains some of the unique features introduced in IE10, like individual tab previewing from the task bar and a new feature called site pinning, which lets you ‘pin’ a Web site to the Windows 8 task bar like you would a normal application. However, unlike an ordinary taskbar shortcut, pinned Web sites can offer customized “right click” menus. For example, pinning the Facebook toolbar will let you right click and auto browse to different sections of the Facebook site like News, Messages, Events and Friends. In addition, when you open a pinned site, the IE11 browser customizes itself to resemble the site you’re viewing. Currently, this means an icon in the upper left and new colors for the back and forward buttons, but we like the idea.

IE’s mobile version comes preinstalled on Windows devices.

oprea add on 2Creating a browser that can compete with the browser giants is an an uphill battle for Opera. Though, the decision to embed Chromium has proven to pay dividends for the Scandinavian company. Opera’s add-ons library utilizes Chrome’s major apps, mail, pocket, etc. Thankfully, Opera doesn’t attempt to beat Google at its own game. Sure, the extensive web-app store offers a variety of mostly-free apps, but Opera’s extensions is centered around their signature tool, Speed Dial- a touch-screen optimized homepage. Each extension can be tacked to Opera’s speed dial homepage. The simplicity of having your gmail account stored next to a news aggregatior all on your homepage is hard to pass up.

Opera can be installed on every major mobile device.

Security and Privacy

The most valuable tool for secure browsing is user discretion. Sure, every browser has encountered security broaches in the past. And Internet Explorer and Chrome’s reputation for protecting users’ security and privacy credentials is spotty at best. Chrome, Safari, and Firefox rely on Google’s Safe Browsing API to detect potentially dangerous sites. Thanks to constant updates, Mozilla, Chrome and Opera all make constant security updates. But Chrome takes security a bit further by also scanning for potentially harmful downloads. There’s also encryption ad-ons currently in the works at Google. All browsers offer a privacy session option. Private sessions prevent the storage of history, temporary Internet files, and cookies. For example, Internet Explorer 11 features a security measure called Tracking Protection. Only Internet Explorer goes so far to block trackers completely from communicating with your browser. What’s more, according to a 2013 NSS study, only Internet Explorer blocks trackers more than 90% of potentially hazardous sites.

Popularity

StatCounter-browser-ww-monthly-201306-201405 According to the latest numbers from StatCounter, Chrome was the top browser for May 2014, garnering over 45 percent of the global browser market share and steadily solidifying its spot as top dog. IE and Firefox continue to be popular, holding roughly 20 and 18 percent respectively, but seem to be leveling out as the IE hype tapers off. Safari and Opera round off the top 5, fixed at around 10 percent and 1 percent respectively. On the mobile side, Chrome wins out but Opera’s touch-screen optimized browser holds an impressive mobile browser market share (12%). Another recent studyshows different results, with Internet Explorer holding a firm grasp on the top spot.

Which browser is best?

Good question. It may come down to preference. Each browser has strengths and weaknesses. Chrome has the largest and most useful selection of apps, extensions, and a rapid release update schedule. Other browsers, however, are upping their game. Now, Opera and Firefox offer similar frequent updates and IE 11 out-preforms Chrome on Sunspider’s benchmark standards. The bottom line is this, we’re in an era where the most minimal and modular browser reins supreme. Chrome still the leanest and most app ready browsing experience. IE, Firefox, and Opera have narrowed its lead significantly, each offering new features that can better accommodate some users needs. According to our benchmark tests alone, Mozilla Firefox is the best option for speed and managing highly-interactive webpages. For the first time in a long time we can’t claim a strong victor here. All major browsers offer a solid browsing experience with few downsides.

IPv6 Address Breakdown

data_1.jpg( @ Data Center) Let’s take a long hard look at an IPv6 address. Amazon supply IPv6 addresses with their EC2 cloud computers. When you fire up an EC2 virtual machine, you get an IPv6 address like this.

 

fe80::2000:aff:fea7:f7c

There’s a lot of meaning packed into that strange-looking identifier. A few companies have tackled IPv6 but to most it’s just plain confusing. Why is it so confusing? And how can you decipher what it means?

Connect to your AWS EC2 instance, find your network interface and its IPv6 address, and let’s do some serious IPv6 breakdown.

The name of your EC2 network interface is eth0

Every physical computer has sockets with cables plugged into them and so does your virtual EC2 machine. Each network socket has a stack of names and addresses (MAC, IPv4, and IPv6) and a stack of networking software to do the talking. These are collectively referred to as “the interface”.

Use the ip addr command to display lots of information about your EC2 network interfaces.

 [ec2-user@ip-10-167-15-124 ~]$ ip addr

1: lo: <LOOPBACK,UP,LOWER_UP> mtu 16436 qdisc noqueue state UNKNOWN

 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00

 inet 127.0.0.1/8 scope host lo

 inet6 ::1/128 scope host

 valid_lft forever preferred_lft forever

2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000

 link/ether 22:00:0a:a7:0f:7c brd ff:ff:ff:ff:ff:ff

 inet 10.167.15.124/26 brd 10.167.15.127 scope global eth0

 inet6 fe80::2000:aff:fea7:f7c/64 scope link

 valid_lft forever preferred_lft forever

[ec2-user@ip-10-167-15-124 ~]$ 

That’s a dozen lines packed with details, written in a shorthand that makes it hard to read. At this low level, you have to take more care describing your work to others. As with all common collective terms like “server” and “cloud”, “interface” is an easy way to describe the big picture but not so great for details. IPv6 is one of those details.

Information overload is confusing

In the land of film and TV, the sound engineer has to listen to a constant barrage of noise and learn to pick out the details that are important. It’s the same for the system administrator – the CLI (Command Line Interface) fills up with data and you learn to see the good stuff and filter out the rest.

All that information displayed by the ip addr command is organized into two numbered sections, for the two network interfaces, lo and eth0:

 

  • The lo name is short for loopback, a name left over from the days of soldered wires. The lo interface is only meant for use within this EC2 machine, not to talk to the outside world.
  • The eth0 name is short for Ethernet interface number 0 - Ethernet is the dominant networking technology (after winning the 1980s protocol wars) and 0 is from IT’s traditional way of counting (no, there is no good reason to start from 0 instead of 1). The eth0 interface is what customers use – including you and your SSH client - so that’s what we care about.

 

We can ignore the lo section and stare at the eth0 section until details start to emerge.

My IPv6 address is fe80::2000:aff:fea7:f7c

The IPv6 address is on this line.

inet6 fe80::2000:aff:fea7:f7c/64 scope link

You can filter out the words on either side of the big address. The word at the start of the line - inet6 - is a label. Like all text in the world of Linux, it is abbreviated to save on typing and display space. The words scope link tell network administrators that this is a normal address for sending and receiving information (there are a few variations on this theme to meet obscure needs).  

The /64 bit stuck on the end of that string fe80::2000:aff:fea7:f7c/64 is a leftover from IPv4 days. It’s called CIDR (Classless Inter-Domain Routing) - it’s a network administrator thing. CIDR is used to split an address in half – the first part is used as an address for the network and the second part as an address for the computer.

This /64 isn’t required. IPv6 isn’t like IPv4. That fe80 field at the start means the same thing to a network administrator.

Hexadecimal is confusing

The IPv6 address show by that ip addr command is fe80::2000:aff:fea7:f7c. That’s a translation, not the original address. An IPv6 address that a computer sees is not fe80::2000:aff:fea7:f7c – it is 128 zeros and ones in a great big long row.

Binary data is no good for people so an IPv6 address is translated into hexadecimal, split into 8 fields, and colons are placed between these eight fields. It’s a system that only a scientist can love.

Each field is a collection of four hexadecimal digits, like that fe80 at the start. Now I’ve mentioned three different number systems, which is enough to put off most people.

 

  • binary digits are 0 and 1. The computer uses these.
  • The decimal digits that everyone knows are 1, 2, 3, 4, 5, 6, 7, 8 and 9.
  • There are sixteen hexadecimal digits - 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, a, b, c, d, e and f.

 

The IPv6 rules are confusing

If an IPv6 address is 8 sets of hexadecimal digits, what’s going on with fe80::2000:aff:fea7:f7c?  That’s six sets, not eight. And no way are there four digits in each part.

This address does not follow the pattern of 8 sets of 4 hexadecimal digits. If you count the fields around the colons, you get six. A couple of fields seem to be missing entirely, and those six fields vary in size.

 

  • The first field is fe80 - that’s OK, it’s four hexadecimal digits.
  • The second field doesn’t have any digits at all.
  • The fourth one – aff – only has three digits.

 

What’s happened is your operating system started out with an IPv6 address that is 8 fields of four digits, like this.

fe80:0000:0000:0000:2000:0aff:fea7:0f7c

Then it applied a couple of IPv6 address shortening rules.

Rule #1: You can replace a big string of zeros with the symbol “::”.

The OS uses this rule to turn fe80:0000:0000:0000:2000:0aff:fea7:0f7c into:

fe80::2000:0aff:fea7:0f7c

Your SSH server listens to all interfaces. In IPv6 speak, the address for all interfaces is all zeros, like this: 0000:0000:0000:0000:0000:0000:0000:0000. The OS uses this rule to change this really long address into the really short:

::

Using your sysadmin skills, enter the command netstat –an, which displays lots of network interface information (this command is safe – it makes no changes). See if you can spot that symbol in the list it displays.

Rule #2: You can remove the leading zeros in a field.

The OS uses this rule to turn fe80::2000:0aff:fea7:0f7c into:

fe80::2000:aff:fea7:f7c

Practice, practice, practice

An IPv6 address is built in this way to make the Internet work. The Internet is full of machines that need to figure out how to communicate automatically, without human intervention. It’s hard for us poor humans to make the shift from IPv4 to IPv6, but it will make the Internet a better place.

Like everything in life, IPv6 takes practice. The more you work on IPv6, the more you will see through the cloud of confusion to the clever engineering.

IT pros recommend Macs to friends and family to avoid providing free tech support

angrytechsupport.jpg Image: iStockphoto/Smithore

IT pros are diehard when it comes to their recommendations on personal computers, but some are bending their convictions to avoid becoming a go-to support system

( @ TechRepublic) As an IT pro, it can be hard to explain just what you do to your friends and family. Failed attempts to explain what a system administrator is results in you answering the question of, "What do you do?" with simply "I work in computers."

Being known as the "techie" of your family is nice little boost to your ego in the beginning, but it can quickly become the most frustrating aspect of your existence. Recommending a computer to a friend or family isn't the hard part, it's the hand-holding and support that comes with it. To get around this, many IT pros, who are resilient in their pledge to support Windows or Linux products, have begun recommending Apple computers.

When it comes to personal computers, Microsoft and Apple are still the warring factions of the IT world, but stepping over the proverbial line in the sand doesn't hold the connotations that it used to. By recommending Apple products, IT pros are able to avoid some of the most common troubleshooting issues and pawn off some of the work.

Part of this has to do with the products themselves, and the other part of it is the existing support structure Apple has created. Let's take a look at why some IT pros are doing what would have once been considered unthinkable and pointing recommendees toward Macs.

The products

One of the main groans we hear from our readers is the lack of customization with Apple products, and it's true. Apple owners are subject to the pre-set packages that the company deems appropriate while Windows and Linux users have a myriad of options when buying or building a machine. But, most average users aren't looking for that level of customizability.

Andrew Soderberg, vice president of customer support at OmniUpdate, Inc. and a long-standing Mac proponent, said that ceding that control is a blessing, not a curse.

"I used to 'love' getting in and customizing and tweaking computer settings for myself and others. Now, as much as I like the idea of 'total control', I don't have the time or the inclination to do that; and with a Mac, you don't have to. I believe that Apple has found a pretty good balance between flexibility for the user (via safe well designed user interfaces) and 'lock down' where users shouldn't or can't mess with settings they don't know how they affect the use of the computer," Soderberg said.

For most family tech support providers, malware cleanup and software/OS installs are the majority of what they end up dealing with. While Apple products are not impervious to malware attacks, they are easier to keep clean. If you have to end up troubleshooting a Mac, running a McAfee scan probably won't turn up much. Abdul Jaludi, CEO at TAG-MC, recalls the calls he used to received from friends and family with Windows products.

"Many of these calls were technical issues where the vendor technical support dropped the ball and gave them bad information or just didn't want to be bothered, telling them they needed a new PC. I can't remember how many times I had to rebuild a PC that I recommended someone buy because of the blue screen of death or a virus infection," Jaludi said.

A lot of what finally pushes IT pros over the line to recommend Apple products is the "set it and forget it" mentality of their products. It's not that any one tech pro hates their family members, but constantly seeing your family under the guise of fixing a computer can put a strain on that relationship. While you will probably end up troubleshooting a Mac or two that you have recommended, the good news is that you don't have to if that person lives close to an Apple store -- pawn them off on the "Geniuses."

SEE: Decoding the Genius Bar: A former employee shares insider secrets for getting help at the Apple Store

Outsourcing

For those of you that can't stand to field another call about why an iPhone won't sync or why there is a spinning beachball of death, the Apple Store can help bail them out.

"If I do decide to help a friend or family [with a Mac], I can figure it out. If I am to busy or the client doesn't have a budget, Apple does offer great support in-store and with the purchase of Applecare," said Adam Silver, creative director at Silver Lining Productions.

Busy tech professionals have to consider how much their time is worth, and do they want to be spending their evenings and weekends doing what they do in their day job. Many of them have decided that they don't, and that it is easier to recommend people to get Macs and use the Apple Store for support.

"When the hard drive on my wife's Mac started making noise we took it to the Apple Store. They backed up her data, replaced the failing hard drive, reinstalled the operating system then restored her data," Jaludi said. "It only took them a day and even though the warranty had been expired for several years, they only charged her for the hard drive and not for the labor to replace it, reinstall the Mac OS or to move her data. If this had been a Windows PC, even if it was under warranty, I would had to spend an entire day or more doing the same thing.

In An Internet Minute

Guess what happens in an Internet minute? 204 million emails are sent, six million Facebook pages are viewed and 1.3 million YouTube clips are downloaded

    Figures also reveal 47,000 apps are downloaded, and 20 people have their identities stolen

    Study predicts that by 2015 the number of networked devices on the Earth will be double the number of people

    Astonishing figures that show the true scale of our online activity have been revealed.

The new study, by chipmaker Intel, found that more than 204 million emails are sent every minute, while 47,000 apps are downloaded and retail giant Amazon rings up around £55,000 ($83,000) in sales.

Around 20 million photos and 6 million Facebook pages are viewed, while we also watch 1.3 million video clips on YouTube.

 
Intel's internet minute infographic reveals exactly what we do online - with 639,800GB of data transferred

Intel's internet minute infographic reveals exactly what we do online - with 639,800GB of data transferred

 

ONLINE IN 60 SECONDS

More than 204 million emails are sent

Amazon rings up about £55,00 ($83,000) in sales

Around 20 million photos are viewed and 3,000 uploaded on Flickr

At least 6 million Facebook pages are viewed around the world 

More than 61,000 hours of music are played on Pandora

More than 1.3 million video clips are watched on YouTube

Nearly 640,00 Gb of global IP data is transferred in just one Internet minute, the researchers found.

'Computing is transforming and touching more people in a wider range of devices,' said Intel's Krystal Temple.

'But while it’s hard to miss the proliferation of portable devices, it’s what we don’t see that’s the bigger issue.

'What many don’t see is that the increase in mobile devices has had a tremendous impact on the amount of data traffic crossing the network.

'It’s a little easier to comprehend once we think about all that’s done on a connected device like a smartphone.

'Listening to music, watching videos, downloading photos, playing online games, refreshing Twitter feeds and status updates – all of those activities generate network traffic.'

The study also looked at how the data could expand dramatically in the future.

It predicted that by 2015, the number of networked devices is expected to be double the world’s population.

It would take five years to view all the video content crossing IP networks each second by then.

 
One of Google's brightly coloured data centers in Douglas Country: New figures reveal exactly what happens on the internet every minute

One of Google's brightly coloured data centers in Douglas Country: New figures reveal exactly what happens on the internet every minute

The chip giant also revealed it is developing new networking equipment to deal with the increase in traffic.

Codenamed 'Crystal Forest,' that will boost performance and beef up network security to handle the increasing network traffic.

'By enabling equipment manufacturers and services providers to deliver platforms that grow along with the network, Intel is also enabling consumers to stay connected on intelligent devices every Internet minute of the day,' Intel said.

Install Watchtower Library 2013 with Linux

We are currently using two Linux laptops, both are running Ubuntu 12.04 LTS (Precise Pangolin). These process also works on the current Debian 7.4 (Weezy). For both of them the installation is about the same.

#1. Install Wine 1.2 or better. Which ever version of wine that you decide to use, make sure it is a “stable” version and not a development or beta version. In Ubuntu use Applications > Ubuntu Software Center. In Debian, click System > Administration > Synaptic Package Manager.

#2. If you are using Wine 1.2 you will need to download iphlpapi.dll from http://www.dll-files.com/dllindex/dll-files.shtml?iphlpapi. Place the file in folder directory.wine/drive_c/windows/system32. If you re using Wine 1.3 or better, you can skip this step.

#3. Now let’s configure Wine to run Watchtower Library. Start Wine by clicking Applications  > Wine > Configure Wine, then click on "Libraries". In the field New Override, enter "iphlpapi" and click "Add". You may see the warning message. If so, simply click Yes. Close and exit Wine.

#4. Open your Documents folder and create a new folder named WT2013. Copy the contents of the Watchtower Library 2013 to the WT2013 folder.

#5. Next we will need to change the permissions on the executable files in the WT2013 folder. Simply open the folder, and for each file that ends in .exe, do a right mouse click, click Properties > Permissions, and fill the check box that say “Allow execution file as a program”.

#6. You are now ready to install Watchtower Library 2013. Simply double-click startup.exe and follow the prompts.

#7. You will be presented with two Watchtower Library 2013 shortcuts on your desktop. Keep the one that looks pretty and delete the other one. Now Double Click the remaining Watchtower Library 2013 shortcut.

On some systems, you might see lines instead of text. No worries here, all you need to do is install a True Type font, and you are in business.

#1. Go to Applications > Internet > terminal

#2. Ubuntu: Type the following: sudo apt-get install ttf-mscorefonts-installer, then enter admin password

       Debian: Type the following: su, enter admin password,  apt-get install ttf-mscorefonts-installer

#3. Restart Watchtower Library and everything should work just fine.

Note: If you cannot see the text or if the text looks like 00000000 00000, simply choose a new font in Library > Properties

Internet Cable DSL Satellite Hitting Fed Targets

Photo(James Hood @ ConsumerAffairs) Think you're not getting the download speed your broadband provider promised? You might be right but a study by the Federal Communications Commission finds many providers are not only meeting but exceeding their advertised speeds.

That's a big improvement over 2011, when the first FCC survey found many providers not delivering the speeds they promised.

In the latest report, Verizon FiOS service averaged download speeds that were 118% of advertised download rates. Cablevision was at 115% and Comcast 103%.

“Faster broadband has brought untold benefits to millions of Americans - from distance learning to distance healthcare," FCC Chairman Julius Genachowski said. "This is good news for consumers and the economy, but we can’t be satisfied. To unleash innovation and realize broadband’s full potential, we must continue to see increases in broadband speed and capacity.”

In this year’s report, Internet Service Providers (ISPs) maintained 
their performance levels, delivering 97 percent of advertised speeds during peak periods. One provider significantly improved actual performance speeds by 13 percent from the previous report.

Did they do it by downgrading the speeds they promised, as some skeptics might suspect? No, said the FCC, the providers have actually improved their networks to improve performance.

Consumers have also doing some upgrading of their own, the report found, ordering faster speeds to satisfy their thirst for movies, music and other bandwidth-hungry applications.

The FCC found that the average speed tier subscribed to by consumers increased from 14.3 Megabits per second (Mbps) to 15.6 Mbps. Nearly half of consumers who subscribed to speeds of less than 1 Mbps six months ago have adopted higher speeds, and nearly a quarter of the users who subscribed to speeds between 1 Mbps and 3 Mbps have upgraded to faster speed tiers. 

Satellite performance

In what may come as a surprise to many consumers, the FCC also found that "significant improvements" have been made to satellite broadband technology service quality.

For the first time, the report includes results on satellite technology based on test results from ViaSat, a major satellite services provider.

"Although satellite technology has the highest overall latency, test results indicate that during peak periods, 90 percent of satellite consumers received 140 percent or better of the advertised speed of 12 Mbps," the report said, adding that there was "very little difference" between peak and non-peak performance.

ViaSat and HughesNet have both launched new satellites, which they say should provide vastly better service than their earlier models, a claim that's supported by the FCC's findings.

The "latency" that the FCC report referred to is the time it takes a signal to travel from earth to the satellite and back again. This creates a noticeable lag that often causes consumers to see the service as "slow" when in fact the data transfer rate is usually on par with advertised speeds, as the FCC report confirmed. 

Until someone figures out how to increase the speed of light, the satellite lag is here to stay and is not the fault of the service provider. 

To read the complete February 2013 "Measuring Broadband America" report, see www.fcc.gov/measuring-broadband-america.

Read More - Click Here!

Read More - Click Here!

Internet hoaxes are a new fact of life

(Mark Huffman Consumer Affairs) Lies produced and spread on the Internet have been a staple of online life for years now, but have mostly remained in the background. However, one spectacular hoax burst into full view this week, rocking the collegiate sports world.

Notre Dame star linebacker Manti Te'o, the runner-up for last year's Heisman Trophy, had been cited for his emotional courage by remaining on the gridiron despite the reported early autumn deaths of both his beloved grandmother and girlfriend within 24 hours. The grandmother was real but it turns out, the girlfriend never existed.

In numerous interviews with the sporting press during Notre Dame's undefeated season, Te'o spoke in great detail about the young woman and Stanford grad, who he said had tragically died of leukemia September 12. Now, he says he only engaged with her online, and it was revealed this week she never existed.

Internet's dark side

While this sensational and bizarre story has yet to fully play out, it's a reminder of the Internet's dark side -- its ability to transmit completely erroneous information with a perplexing degree of credibility. One sees it in forwarded emails and Facebook posts. Someone receives a message that is either misinformed or an outright hoax and passes it on as gospel. Soon, people accept it as truth.

"Folks have a real tendency to believe much of the information online as they feel anything published must have some competency as many have thought in the non-digital world," Marcus P. Zillman, an author and expert on Internet hoaxes, told ConsumerAffairs. "Many have never experienced an educational endeavor of learning what misinformation is and how it truly affects society in today's New Economy."

Debunking hoaxes

Internet hoaxes have spawned a number of websites that do nothing but shoot them down. Snopes.com describes itself as a "reference source for urban legends, folklore, myths, rumors, and misinformation." In one example, it takes on the Darwin Awards, which were a subject of a popular circular email a decade ago.

The Darwin Awards were a series of news items detailing the death of some person who died as the result of incredibly stupid behavior. Most readers accepted these as fact.

"As is the norm for such Internet circulated lists, Darwin Awards-2006 email is a mixed bag," Snopes editors write. "There are some actual incidents, accurately chronicled, one that we know is an out and out fake, and a handful of others that we can't yet authoritatively prove or disprove. Interestingly, while this compilation purports to be from 2006, all of its entries date from 1995 through 1998."

The emails, the editors concluded, were authored not by a Darwin Awards Committee but by persons unknown.

Brett Christensen, of the Australian website HoaxSlayer.com, says people tend to accpt information they receive online because it comes from someone they trust. But in many cases, he says, it plays on their prejudices.

"Hoaxes often cater to preconceived ideas held by the recipient," Christensen said. "If a hoax message seems to confirm a person's views on religion, politics or general perception of the world, he or she is perhaps more apt to send it on without investigating its claims. In other words, if you really want to believe it, you might tend to overlook or excuse any logical inconsistencies or suspect claims that a hoax message contains."

Romance scams

Perhaps nowhere are Internet hoaxes more devastating than in affairs of the heart. It happens all the time on online dating sites, where a relationship begins without a face to face meeting -- many times with painful consequences.

Over the years ConsumerAffairs has received a large number of reports from dating site users who became emotionally involved with someone online, only to find out they were being scammed. David, of Loveland, Colorado, said he fell for a romance scam when he thought he was helping a young Russian woman stranded in a foreign country.

"Since then I have been approached on every dating site I have joined by supposed women who are stranded in Nigeria or Ghana," David wrote in a ConsumerAffairs post. "When the dating sites are notified they are scammers they do nothing about it."

Lately, dating sites have done more to warn users about possible scams, and a reading of the most recent ConsumerAffairs posts suggests users are now more savvy. Patsy, of San Antonio, Tex., writes that she spotted an attempted scam on Match.com right off the bat.

"He said he was from Germany, working on a project in Nigeria," Patsy wrote. "I come from a German family and the accent was definitely not German, another red flag. So, I continued to play along and last night he asked for a loan of $600.00, I declined. He wasn't too happy about that, so I just signed off."

Catfishing

These scams, of course, have a profit motive. The people attempting to fool unsuspecting love-seekers are hoping for a payday. But in recent years there is a new breed of Internet imposter, who may or may not be at the center of the current Manti Te'o firestorm.

These are people who create identities and try to fool people just for fun. There's even a name for it -- "Catfishing," named after an MTV series that outs Catfishers. High profile individuals, such as athletes, appear to be common targets.

A "Catfisher" will fabricate a profile and take someone's picture from their Facebook account to trick their victim into thinking they are someone who desires a relationship with them. Why they do it is anyone's guess. But profit does not seem to be a motive.

Here are three questions to ask yourself if you think you are being Catfished:

  • Why won't this person engage in a video chat with me?
  • Why won't this person agree to a face-to-face meeting?
  • Is this person too good to be true?

If there are not good answers to these questions, chances are you're being played as the victim of an Internet hoax.

As for the media's role in the Manti Te'o hoax, Christensen says it might be excused in this instance for swallowing the fabricated story hook, line and sinker, but in others, he sees it as very culpable.

"For example, a number of media outlets reported on the claims that the Google Street View car killed a donkey in Botswana," he said. "However, even some fairly basic research by journalists writing these stories should have been enough to reveal that the claims were untrue."

For consumers of the Internet, it means maintaining a healthy dose of skepticism, and not believing everything you read.

Read Also!

Read More - Click Here!

 

Invoicing Slippery Slope

Invoicing is a slippery slope that can quickly become a devastating liquidly nightmare. The easiest way to put a company in peril is to delay invoicing. If billing doesn't go out in a timely manner, cash won't come in. The solution is simple!

Invoice Daily!.

Numerous studies indicate quick receipt of accurate bills improves customer satisfaction any payment. Possibly more important is that timely invoicing helps reduce bad debt and increases the likelihood of receiving full payment within traditional remittance cycles.

Billing Practices To Avoid

#1. Don't wait to prepare and distribute invoices on the 15th and 30th of each month. This common billing routine is inefficient and dangerous. It artificially limits your cash flow by automatically delaying invoice cycles. Worse, firms following this model tie up their cash, credit lines, and artificially inflate Accounts Receivables. This is especially true for businesses  that incur labor and/or material costs up-front. Following this model results in your business providing customers with interest-free loans. That's not a smart business model.

#2. Avoid billing hardware/Materials and software/Labor costs on the same invoice. When a client signs off on a project, the next step is typically for the company to order or build the required hardware/materials. Companies sometimes wait to bill for that hardware/material when the deployment completes; this can negatively impact cash-flow, especially when multiple systems are deployed. Bill for the hardware upfront (i.e., the day it's ordered)! Better yet, accept a cash deposit before placing the order.

#3. Bill Daily! Waiting to complete billing tasks, even a couple days (even if you take great notes), opens up an opportunity for errors (that can damage your invoicing credibility). Also, you are still limiting cash flow. Worse, you're creating delays between the time service is provided and a bill is received. The longer that gap, the higher the likelihood that payment problems could arise.

#4. If possible, allow the project manager to complete the invoice. Whichever engineer completes a project, that's the staff member who should enter the billing information. While there's nothing wrong with having a director or a supervisor review client invoices before they're mailed, unless the actual technician performing the service prepares the bill, it's quite likely that an additional service the client requested and received may go unbilled.

All things considered, it makes sense (dollars and cents) to distribute invoices daily as it benefits cash flow, improves client satisfaction, increases the likelihood of quick payment in full, and reduces the possibility of bad debt and liquidity issues.

Is It Okay to Unfriend on Facebook?

Can’t remember if the fork goes on the left and the spoon goes on the right? For perfect P's and Q's, you know exactly whom to ask: Emily Post.
 
But what are the rules when you're talking with a friend and she whips out her cellphone to check her email, or when someone you never liked in high school suddenly wants to be friends on Facebook? Who’s there to tell you the right thing to do?  Once again, it’s Emily Post

Read More - Click Here!

Is Social Desktop the Future of Computing?

Social networking is one of the biggest buzzwords in the tech industry today - but what if you could bring all the sharing abilities of a social network site right to your desktop? Microsoft's Social Desktop does allows you to share documents, pictures, ... without having to copy or upload them to another location. To me, the security implications are a little scary, and that would have to be addressed, but what with the push toward the \"cloud,\" I wouldn't be surprised if this eventually became the computing model of the next generation. Read more here:
http://research.microsoft.com/en-us/projects/SocialDesktop/

'Future of SSD (Solid State Disk Drives) According To Samsung

Solid state drives offer a number of advantages over traditional platter-based hard disks: they are smaller, faster and less prone to failure because they lack moving parts. But the big reason we aren't all using them is that they cost far more than a traditional hard disk drive. A quick check of Newegg shows several models of 80 GB SATA hard drives for under $40. The least expensive 80 GB SSD is $363. That's quite a difference. But a representative of Samsung, which makes both types of drives, recently suggested that the two will reach price parity within the next few years. Read more here:
http://news.cnet.com/8301-13924_3-10196422-64.html?tag=mncol

Web Pages: How To Print Selected Text

Want to print just a part of a web page? One way to do it is to copy the text you want and paste it into Word, then print the document - but there's an easier way.

  1. Highlight the specific text (or image) you want to print.
  2. Press CTRL + P or click File | Print.
  3. In the Print Range dialog, click the option button for \"Selection\" (\"All\" is the default).
  4. Click OK.

This will print only the selected portion of the page.

 

Is The Pen Outdated?

Reports of the untimely demise of the ink pen have been greatly exaggerated. Case and point: Just try to buy a house or execute a legal document of any kind without "pulling out the pen!” Courts of law and financial institutions want to see nothing but ink at the bottom of the document. Only then is the deal truly "done."

In ancient times, to consummate an agreement, known as a covenant,  a stone monument was erected and the parties to the agreement left their mark on the monument in blood, showing that the covenant was seriously binding upon all parties. Thus the expressions "written in stone" and "signed in blood" were literal, just look at the scars. Later, sticks were used to make impressions on dried mud or clay tablets, pottery, and even building materials like wood.

Historians and anthropologist don't really know when the first pen was invented or by whom, but it is widely believed that ancient indigenous people in various areas fashioned writing instruments out of bamboo sticks and/or bird feathers, based on materials that were readily available to them. They left their mark on wood, animal skin, and even stone. Ancient prose of Mahabharata, Ramayana and Puranas used this type of writing instrument circa 5000 BCE. In ancient Egypt, pens made out of thin reeds were used to write on papyrus scrolls. In certain regions of Pakistan, reed pens crafted from bamboo are still used by students, who write their lessons on wood planks.

Today, Computers and Smart Phones make communication faster and easier. But when sending a letter of thanks or apology, or a card to Mom, nothing expresses emotion and depth of feeling like "the pen.” I doubt that Mom will keep your text with the smiley face :-), but she will keep that precious “hand-written” card. The Pen is still the most personalized and sincere ways to express yourself and your convictions.

Since pens and writing can convey emotion, it is important to choose the correct color for the writing task. From a search of the internet, we came to the following ink color conclusions :

"Black Ink pens are used in business letters that convey facts, or explanation of facts,  rather than emotion. Black is used for official signatures as well as payment or collection letters."

"Blue Ink pens expressions are less ridged and a little friendlier. Blue ink exudes confidence in oneself and the ability to meet an objective. Blue in appropriate for formal writing and business letters of all kinds." Blue ink is usually acceptable for signatures. However, black ink is preferred."

"Red Ink letters are 'power documents.' Red ink can be used when stating demands or for collection notices. However, Red ink may be viewed as insulting to the reader, and tantamount to a declaration of war. Though red ink guarantees maximum impact, such impact is almost always negative."

"Green Ink conveys the impression that one is goal oriented, and serious about making money. Green conveys a health concern for the environment. I’m just not a “green ink guy”,  but if you want to be different,  green ink may be right for you."

Could it be that people see a correlation between the type of pen a business person uses and the quality of the business product and service? Could it be that bringing a  BIC pen to a sales or board meeting is like taking a rubber band to a gun fight?

Yes, I text and send email. But when I send a sales letter, it is hand-written in blue ink, and very sincere. When I mess up and can't meet a delivery date, after the in-person apology, I always follow up with a hand written blue ink and very sincere letter. And when it comes time to close the deal, I always use my most impressive pen, one that reflects the superior quality of our products and services, one that says this agreement is "written in stone" and "signed in blood, that you can count on this covenant and that my company and I will never fail you. Now that’s impressive. A computer email or Smart Phone test just can't touch that. Only a pen can convey "that important message beyond words."

What does your pen say about you and your business?

Is your Internet fast enough

(Terry Loose Yahoo)If your Internet experience was an animal, would it be a cheetah or a slug? A silly question maybe, but the answer is anything but silly.

 

That's because in today's globally connected world of computers, video streaming, and social media, the speed of your Internet connection could mean the difference between a mega bright smile and a mega bummer frown.

"If your connection is too slow, you'll have a really frustrating experience," says Phil Dunn, a technology specialist at Synapse Services Co., a web technologies and content development company.

"[Connection speed] is a quality of experience issue," adds Dunn. "The bottleneck with Internet use is that a lot of today's computer programs are relying on the Internet connection to work, such as video streaming with Netflix or YouTube or streaming music, to name just a few."

[Want a faster Internet connection? Click to compare rates from providers now.]

On the flip side, some people might not need the more expensive lightning-fast speeds certain Internet providers offer, according to Dunn.

Keep reading for tips on how to match your Internet speed to your lifestyle speed.

Tip #1: Determine Your Speed Need

When it comes to your Internet connection, your need for speed is a function of what tasks you go online to perform. According to Dunn, the more data rich stuff you do - such as streaming videos and music or playing online games - the faster your connection to the Internet needs to be.

"Let's say you're a family with a TV that's streaming Netflix through an Internet connection, and a few kids who are streaming songs, and you have a slow Internet connection," Dunn says. "You're going to run into problems. Things will stall because the bandwidth just isn't big enough."

So how can you calculate your Internet speed? This can be done over the Internet at certain sites. For example, a June 2012 Consumer Reports Magazine article "Cut your telecom bill" suggests using this website: www.broadband.gov/qualitytest. All you need is your address, and it will tell you your connection speed within a minute or two.

And to help you decide if it's time to upgrade your speed, here are some suggestions based on your amount of online usage, according to the "Cut your telecom bill" article:

Light Usage: You only have two people using the Internet simultaneously, Web surfing, downloading short, standard-definition videos, emailing, and perhaps playing simple Internet games.

Speed Suggested: Up to 3 megabytes per second [Mbps]

Moderate Usage: Occasionally up to three simultaneous users. They are commonly video streaming, with some high definition (HD) content from places such as iTunes. Also, some HD interactive game playing and uploading of high-resolution photos to a cloud storage service, which keeps your data at a remote location to free up your hard drive. You can tolerate the occasional quality compromise.

Speed Suggested: Up to 6 to 12 Mbps

Heavy Usage: You have up to four people online simultaneously, some perhaps using a tablet or smartphone. They are doing content-rich stuff like streaming movies or videos or uploading big files or photos to cloud storage services. Users also might demand high speeds. Professional photographers and videographers could fall into this group.

Speed Suggested: At least 15 Mbps

[Click to compare rates from multiple Internet providers.]

Tip #2: Get the Right Type of Connection

When it comes to connecting to the Internet, you have a lot of options, says Dunn. They range from snail-paced slow (dial up) to fabulously fast (the best cable) and everything in between. Below is a breakdown of some of the many options available, according to Dunn:

Option 1: Dial-up Connection: This option uses a traditional phone line to access the Internet.

Speed: Very slow by today's standards.

Typical Cost: Free to very inexpensive.

Expert's Take: "This is the minimum. Someone on a dial-up modem trying to use Skype or watch videos is going to have a horrible time," says Dunn. In addition, you need a home phone line, which more and more people are replacing with their cell phone.

Option 2: DSL (Digital Subscriber Line): This option also uses a traditional phone line to access the Internet, but it's a bit faster.

Speed: Slow by today's standards.

Typical Cost: Low to moderate.

Expert's Take: "When you go beyond basic email and get into more graphic heavy stuff or videos, you're going to want DSL at least," says Dunn. "But it's still going to be frustrating at times."

Option 3: Cable: This option uses the same cable line as your cable TV. The bigger line offers the opportunity to transfer more data at a time, thus it's much faster.

Speed: Fast to Very Fast. Anywhere from 2 Mbps to 100 Mbps. (See chart in Tip #1)

Typical Cost: Ranges widely, depending on speed and whether you bundle your service with cable TV and home phone, which makes it less expensive.

Expert's Take: "This is typically very fast," says Dunn. "For most families, this is the option that will allow them to do all the things they want to do, from watching movies and streaming music to photo sharing and playing online games."

[Looking to change your Internet speed? Click to compare rates now.]

Tip #3: Use Cafes and Libraries for Web Access

Next time you're at a cafe and order a chai latte with soy, you might think about ordering up a side of Internet access. That's because in today's Internet-fueled world, many businesses give customers Internet access for free - or as a premium when they buy a drink or meal. Public spaces often have this feature as well.

Typically referred to as hotspots, they range from cafes and bookstores to libraries and airports. Conceivably, a consumer who doesn't have good Internet access at home - or doesn't want to pay for it - could supplement their usage by frequenting these places, according to Dunn.

But it's not all whip cream and chocolate cookies; there is a downside.

"They typically don't offer great connections because it's an expense that they have to make up by selling an extra cup of coffee or muffin," says Dunn. "They also have to support all the freeloaders who come in and buy a Coke and hang out for five hours."

This brings up another potential problem: the more people sharing the connection, the slower each of their connections will be, says Dunn. So especially in public places such as libraries and airports, that could really wipe out your Web surfing plan.

Tip #4: Make Sure You're Getting the Speed You're Paying For

Are you paying for cable Internet, but your favorite website is taking more time than usual to load? It may be time for an Internet service upgrade. In other words, time to go shopping.

But first you might want to check to make sure the cable company is delivering the speed they promise, and that your equipment is not to blame.

To start, check that your connection is as fast as you believe it to be. "Performing a speed test to determine your [Internet connection] speed is a good start," says Dunn.

Next, make sure you are connecting your computer to the cable modem (the box that connects your computer to the cable coming into the house) in the best way possible.

"If your computer is connected to the cable modem with a line, your experience is going to be much better than if you're using a router and Wi-Fi [a wireless connection that uses radio waves]," says Dunn.

"Wi-Fi slows things down, depending on what kind you have," adds Dunn. Why? Because it relies on radio waves instead of an uninterrupted copper wire connection.

But if you love to go mobile, routers with Wi-Fi might be essential to your lifestyle. If so, two things to remember about routers and Wi-Fi: update the software often and newer routers will provide faster speeds (look for the term 802.11.n). To update your router, you can check your router instructions or call the manufacturer's tech support.

[Want to change Internet providers? Click to compare rates now.]

Tip #5: Check for Speed Killers

If you've done all you can to ensure a great Internet connection speed, but you still can't seem to stream the latest blockbuster, make sure you haven't fallen victim to a computer virus.

"The big one that's going to kill you with Internet speed is malware or viruses, or Trojan horses," says Dunn. "Those are all under the security category and are really going to cause damage."

These programs are designed to break into your computer and perform things you don't want happening in your circuitry.

But how do you get these viruses? By visiting sites or opening emails from hackers who want to use your computer and connection to perform illegal activity, such as pirating movies or music, says Dunn. Their computer programs [the malware, viruses, and Trojan horses] are loaded onto your computer and perform the illegal tasks.

"So you think your Internet connection is slow, but it's really this third party who is using part of your bandwidth to do their nefarious deeds," says Dunn.

So how do you avoid it? "Virus and malware software, like Microsoft Security Essentials, or Norton, or McAfee, are pretty good at protecting your computer," says Dunn.

But he adds that these anti-virus software programs are not perfect, so keeping your computer healthy is a balance between having those protection tools installed and being careful what sites you visit.

Read More - Click Here!

Jobs that will be replaced by robots is lower than you think

( @ TechRepublic) Few trends in technology have caused the level of panic and uncertainty in the job market as artificial intelligence (AI). The impending "robot revolution" has brought questions about what jobs, if any, will be replaced by bots, and when it will happen.

While some have posited that robots will replace nearly all jobs, and free up humans to work on more creative endeavors, others have been more reserved in their predictions. A new report for Forrester Research claims that, by 2021, "intelligent agents and related robots" will only have eliminated 6% of jobs.

"By 2021, AI within intelligent agents will evolve significantly beyond today's relatively simple machine learning and natural language processing (NLP)," the report said. "Emerging applications will feature improved self-learning and more complex scenarios. As basic agents gain consumer adoption, next-generation AI will not power intelligent agents until 2020 or beyond."

However, that doesn't mean that AI won't affect jobs in the short term. According to the report, the maturation of these intelligent agents will replace many daily tasks associated with certain positions.

Technologies such as chatbots, digital assistants, robotic process automation, and cognitive computing will lead the charge. The main disruptive potential of these technologies is in customer service, logistics, taxi and truck driving, and the automotive industry, the report said.

The year 2021 will see AI and similar technologies affect marketing as well. Being able to add context and offer suggestions will continue to transform how customers interact with brands.

"Broad business impact will happen as AI matures and customer analytics and marketing vendors improve their insight platform offerings," the report said.

Despite the low number of eliminated jobs by 

2021, that is only the beginning of how these technologies will affect work. The Forrester report noted that 2021 is that year that a "disruptive tidal wave will begin," and industries will be more deeply affected.

"Solutions powered by AI/cognitive technology will displace jobs, with the biggest impact felt in transportation, logistics, customer service, and consumer services," the report said. "Early movers who have amassed large data sets will have created a baseline set of AI/cognitive services. Other disruptors will begin to use these services to scale their businesses and steal customers from competitors."

AI and robots will provide a significant competitive edge to businesses, especially after 2021. However, it is important to prepare for the increased competition by investing in these technologies now.

The 3 big takeaways

  1. A new Forrester report claims that only 6% of jobs will be lost to AI and robots by the year 2021.
  2. The automotive industry, customer service, taxi and truck driving, and marketing will be the first to be affected by these trends.
  3. After 2021, a "disruptive tidal wave" will occur that will see even greater displacement of certain jobs by these new technologies

KH CONF

 

KHCONF is a service provided by Generic Conferencing LLC, a Missouri Limited Liability Company. The KHCONF service is designed to assist congregations of Jehovah's Witnesses around the world to tie in elderly and infirm members to meetings via telephone. Service is currently available in the United States, United Kingdom, Ireland and Puerto Rico, and plans are being made to provide service in additional countries.
Generic Conferencing uses Voice over IP technology and open source software to create a simple, reliable and functional service with high quality sound and a very low cost.

How it works:       The KHCONF service is a simple conference bridge application. You call into the system from the meeting location, and the homebound friends call into the system from home, using a preassigned PIN.

In the majority of the US, Generic Conferencing can provide a local phone number, so there is no charge to the friends who call in. In European countries, the number provided is a geographic number so that the cost to the friends is as low as possible.

The system provides the congregation with the ability to retrieve a count of the number of listeners, the ability to select a listen-only mode or commenting mode (if the sound system supports that) on a per caller basis, and on line reporting tools so you can keep track of who is calling in.

Support Options:   Subscribing congregations are provided with an emergency hotline number to call if the conference service is not working. Questions or problem that are not related to an emergency or system down problem are handled via email.

Callers to the emergency hotline are prompted to leave a message, and this pages a technician who will attempt to respond immediately.

FAQ:

How many callers can be tied in at once?   This is dependent on your location and the subscription options. In the US, Tier 1 Local Number customers can have up to 20 per congregation tied in. In Tier 2 areas, up to 10 listeners are included in the monthly cost. Additional listeners can be added for an additional charge. In the UK and Ireland, up to 8 listeners are included in the basic service, and for an additional charge that can be increased to 18 listeners.

How do we pay for the service?   Invoices are e-mailed once service is setup. E-mail invoices are used to keep the cost of the service as low as possible. In the US, these invoices are sent monthly to new subscribers, and in the rest of the world the subscription is an annual subscription. Congregations may pay electronically or via check. More information is provided once the subscription is setup.

How can I find out if you have local numbers in my area?   Choose your country in the "Order Service" box on the left. All US numbers are loaded into our system. In the UK and Ireland, please E-mail us at support@khconf.com. Include the address and phone number of your primary meeting place in your e-mails.
Some members of our congregation have to make a long distance call to reach the meeting location, does that make a difference?   Yes, it does. There are several ways to handle this. In many instances we are able to provision two local numbers and tie both together, so that everyone can call a number that is local to them. Please email us at support@khconf.com with as much information as you can and we'll look at the situation and make a recommendation.

The website says you have no local numbers in my area of the US. When will that change?   Generic Conferencing has no direct control over the coverage areas, we just work with suppliers who provide those services. We are constantly working to find additional suppliers to expand the local number coverage area. However, in the US, there are areas that are very expensive to serve. In these areas, the lowest cost option is a toll free number, charged at a 2 cents per minute per caller rate.

Can we just get an unlimited long distance package and use the local number service even though there is no local number in our area?   Generally speaking, this is a bad idea. For more information about why, please click here.

How long does it take to setup new services?   This depends on your location. It can be as few as two weeks, and as many as eight weeks.

What equipment do we need to buy?   Most congregations already have the equipment that is needed. You simply need a device (like a Hanstech box) that connects your sound system to a phone line. We recommend you talk to your RBC Sound Department, or email us for a contact at a company that sells these devices.

Contacting KHConf:

By E-Mail:   support@khconf.com

By Telephone: (214) 329-1847
Note: Due to the overwhelming response to this service, we are not able to return telephone inquiries. Please email support@khconf.com with any questions or inquiries.

By Mail: P.O. Box 687, Crowley, TX 76036 USA

Keep Your Cell Phone From Blowing Up

Don’t Want Your Phone to Blow Up? Follow These 6 Pieces of Expert Advice

(Andrée-Noëlle Pot/Le Matin @ Huffington Post) We recently covered the story of a young Texas girl’s Samsung Galaxy smartphone incinerating near her head as she slept. Her phone was ruined, but the fire didn’t spread beyond the underside of her pillow, so she and her family were not harmed.

Of course, not all chargeable electronics fires end without injury (see:this smartphone battery that exploded in a Florida gym, causing facial burns to one woman).

Obviously, these are extraordinary circumstances. Your smartphone isn’t just going to up and explode on you in 99 percent of scenarios.

Still, we were curious as to what you, dear reader, could do to prevent similar smartphone combustion. And so we talked to the device experts at iFix, a New York-based gadget repair service.

Here’s the advice iFix gave to avoid battery meltdown and smartphone explosion:

1. Stay away from low-quality batteries.
One of the potential issues pointed out with the Samsung Galaxy S4 that caught fire in Texas was that the phone’s battery was swapped for an aftermarket model. The iFix crew says low-grade smartphone batteries can be a bad idea because, in terms of quality and care in construction, “they do not follow the same standards as original manufacturers.”

When replacing your phone’s battery, you’ll probably want to skip the cheapest option on eBay or Amazon and instead seek out the same one with which your Samsung, HTC, or LG phone came (from what is often referred to as the “OEM,” or original equipment manufacturer).

If you must go with a third-party replacement battery, iFix considersAnker a trusted brand.

2. Keep your phone in a well-ventilated place while charging.
The second no-no with the Texas case: The charging phone was under a pillow.

Phone tucked under a pillow

(nairobifeed.com)

Our experts’ advice: “Do not cover a charging phone with a pillow.”

For obvious reasons, this isn’t good for the goal of keeping your phone from overheating. A rule of thumb would be to place a charging phone in an area away from insulating fabrics or other heat-emitting electronics (maybe not on top of a cable box, for example).

3. If you get your phone wet, have it checked by a professional.
We all know it’s possible to bring a soggy smartphone back to a working condition, but the iFix team says that, despite your rescue attempts, corrosion or short circuiting can still occur inside the phone, undetectable to the naked eye. These conditions could lead to dangerous overheating of the device.

iPhone in a bag of rice

(shoprto.com)

The solution: Most repair services like iFix offer diagnostics services (sometimes for free) that can detect these types of problems for you. Of course, don’t expect the actual repair of corroded parts or shorted circuits to be free. Still better than waiting for an accident to happen, we say.

4. Don’t overuse your phone while it’s charging.
Juicing up draws a great amount of heat to your phone, making it plenty hotter than it is during normal use. Because of this, our iFix experts say that hardware-heavy activities like graphic-intensive games, WiFi tethering, or even searching for service in a low-signal area — processes that will also warm your phone up — shouldn’t be done while your device is plugged in.

Overusing the phone while charging “can create additional stress on the device and the charger,” iFix says.

A good rule of thumb: If you are Crushing some Candy while your phone is charging, and you feel the back get toasty, put the thing down. And not under your pillow, either. 

5. If your phone takes a nasty drop, don’t just dust it off and move on.
Similar to the “wet phone” scenario, you shouldn’t just assume that your phone is A-OK because it still powers on after an unfriendly meeting with the concrete.

Cracked Samsung phone

(phone-techs.com)

Some possible problems caused by a nasty drop: a small crack in an internal component, a damaged or split battery, or exposed internals via a cracked display.

Having your phone taken apart by a specialist after it’s suffered some trauma is going to be the best way to go. And as smartphone screen repair by third-party services gets cheaper and cheaper, the option is now both safe and budget-friendly.

Oh, and also, you won’t be constantly made fun of by your friends.

6. If you notice any overheating or sudden battery drain, you may have a problem.
iFix also filled us in on a problem that’s becoming more common among its customers. Phone owners are contacting its service and complaining that phones “suddenly start overheating. No water damage. No dropping.”

In the recent case of a year-old iPhone 4s, the phone suddenly began heating up and losing “a couple percent [charge] every minute.”

Since the phone was not covered under AppleCare, the team assessed the possible problems and eventually decided to resolder parts of the phone’s main chip board and install a new battery.

“So far it works just fine. We don’t quite know what the problem was, maybe a micro-crack on the board or chip, a loose connection, or a defective battery,” iFix said.

Much the way you want a good mechanic for your car, it’s not a bad idea to have a good phone repair shop in your Rolodex for when problems like the above surface. No one is fond of the thought of forking over hard-earned money for “smartphone maintenance.” But the alternative may be too hot to handle.

Keep Your Cell Phone From Blowing Up

Don’t Want Your Phone to Blow Up? Follow These 6 Pieces of Expert Advice

(Andrée-Noëlle Pot/Le Matin @ Huffington Post) We recently covered the story of a young Texas girl’s Samsung Galaxy smartphone incinerating near her head as she slept. Her phone was ruined, but the fire didn’t spread beyond the underside of her pillow, so she and her family were not harmed.

Of course, not all chargeable electronics fires end without injury (see:this smartphone battery that exploded in a Florida gym, causing facial burns to one woman).

Obviously, these are extraordinary circumstances. Your smartphone isn’t just going to up and explode on you in 99 percent of scenarios.

Still, we were curious as to what you, dear reader, could do to prevent similar smartphone combustion. And so we talked to the device experts at iFix, a New York-based gadget repair service.

Here’s the advice iFix gave to avoid battery meltdown and smartphone explosion:

1. Stay away from low-quality batteries.
One of the potential issues pointed out with the Samsung Galaxy S4 that caught fire in Texas was that the phone’s battery was swapped for an aftermarket model. The iFix crew says low-grade smartphone batteries can be a bad idea because, in terms of quality and care in construction, “they do not follow the same standards as original manufacturers.”

When replacing your phone’s battery, you’ll probably want to skip the cheapest option on eBay or Amazon and instead seek out the same one with which your Samsung, HTC, or LG phone came (from what is often referred to as the “OEM,” or original equipment manufacturer).

If you must go with a third-party replacement battery, iFix considersAnker a trusted brand.

2. Keep your phone in a well-ventilated place while charging.
The second no-no with the Texas case: The charging phone was under a pillow.

Phone tucked under a pillow

(nairobifeed.com)

Our experts’ advice: “Do not cover a charging phone with a pillow.”

For obvious reasons, this isn’t good for the goal of keeping your phone from overheating. A rule of thumb would be to place a charging phone in an area away from insulating fabrics or other heat-emitting electronics (maybe not on top of a cable box, for example).

3. If you get your phone wet, have it checked by a professional.
We all know it’s possible to bring a soggy smartphone back to a working condition, but the iFix team says that, despite your rescue attempts, corrosion or short circuiting can still occur inside the phone, undetectable to the naked eye. These conditions could lead to dangerous overheating of the device.

iPhone in a bag of rice

(shoprto.com)

The solution: Most repair services like iFix offer diagnostics services (sometimes for free) that can detect these types of problems for you. Of course, don’t expect the actual repair of corroded parts or shorted circuits to be free. Still better than waiting for an accident to happen, we say.

4. Don’t overuse your phone while it’s charging.
Juicing up draws a great amount of heat to your phone, making it plenty hotter than it is during normal use. Because of this, our iFix experts say that hardware-heavy activities like graphic-intensive games, WiFi tethering, or even searching for service in a low-signal area — processes that will also warm your phone up — shouldn’t be done while your device is plugged in.

Overusing the phone while charging “can create additional stress on the device and the charger,” iFix says.

A good rule of thumb: If you are Crushing some Candy while your phone is charging, and you feel the back get toasty, put the thing down. And not under your pillow, either. 

5. If your phone takes a nasty drop, don’t just dust it off and move on.
Similar to the “wet phone” scenario, you shouldn’t just assume that your phone is A-OK because it still powers on after an unfriendly meeting with the concrete.

Cracked Samsung phone

(phone-techs.com)

Some possible problems caused by a nasty drop: a small crack in an internal component, a damaged or split battery, or exposed internals via a cracked display.

Having your phone taken apart by a specialist after it’s suffered some trauma is going to be the best way to go. And as smartphone screen repair by third-party services gets cheaper and cheaper, the option is now both safe and budget-friendly.

Oh, and also, you won’t be constantly made fun of by your friends.

6. If you notice any overheating or sudden battery drain, you may have a problem.
iFix also filled us in on a problem that’s becoming more common among its customers. Phone owners are contacting its service and complaining that phones “suddenly start overheating. No water damage. No dropping.”

In the recent case of a year-old iPhone 4s, the phone suddenly began heating up and losing “a couple percent [charge] every minute.”

Since the phone was not covered under AppleCare, the team assessed the possible problems and eventually decided to resolder parts of the phone’s main chip board and install a new battery.

“So far it works just fine. We don’t quite know what the problem was, maybe a micro-crack on the board or chip, a loose connection, or a defective battery,” iFix said.

Much the way you want a good mechanic for your car, it’s not a bad idea to have a good phone repair shop in your Rolodex for when problems like the above surface. No one is fond of the thought of forking over hard-earned money for “smartphone maintenance.” But the alternative may be too hot to handle.

Layoffs Send People and Knowledge Packing by Jason Rothbart

The scale of layoffs over the past few weeks is unprecedented. The impact on these people who have been shown the door and on the companies that have let them go will linger for years to come. Besides the emotional damage that occurs when people are forced out, there is a tangible cost to companies when knowledge and experience walk out the door. Once that knowledge and experience are gone, no amount of TARP money will bring them back. It may be too late for some companies to prevent this now, but putting measures in place will lessen the blow in future.

One of the few ways to address the problem is to adopt collaborative tools and processes that capture the information companies need to be able to thrive.

Every company in the world relies on the bits of information that live in its employees' heads. The accounts payable clerk may know a small nugget on how to negotiate the best price with an important vendor. A salesperson may repeat the same pitch when selling to a certain kind of customer that works every time. An engineer may be the only person who knows why software was originally built with ColdFusion. The branch manager may know the precise spot to kick the box compactor when it acts up.

All of these bits of knowledge add up to a vast amount of information that a healthy business requires. But the vast majority of companies do a poor job of gathering this information in a systematic way. When people leave, either by choice or not, what inevitably happens is that the company and its future employees are forced to relearn it all through trial and error. The cycle repeats over and over again. The scale of this problem is huge in the current environment.

So, what does a company do to address the problem?

1. Use tools and process. Companies must have infrastructure in place to encourage, or force, employees to share information. It doesn't matter what it is, as long as it is at least marginally effective. Anything is better than nothing. How many managers around the world are at this moment digging through abandoned email folders trying to figure what their employees were working on and what they knew.

2. Measure collaboration. Again, it doesn't matter how, just do something that you think has a good chance of success. You could measure the number of contributions to a knowledge base, the frequency of mentoring sessions, the number of white papers written, whatever. What you measure is less important than doing it consistently over time and measuring improvement. Of course, the metrics are not irrelevant, but don't wait to choose the perfect ones to track. Start small and simply, and go from there.

3. Reward employees for sharing. If you don't measure and reward productive behavior, it isn't going to happen. Collaboration is a bit fuzzy and can't be measured like the number of phone calls answered per hour, but there are ways.

4. Focus on informal information. This is often where the best information resides. For example, many employees send emails back and forth answering questions and trading best practices. You need a way to harvest these nuggets of information.

None of this stuff is rocket science, but few companies nail this process. We recently spoke with David Coleman of Collaborative Strategies, who said only 10% of his clients focus on \"back-end\" collaboration. The majority have invested in front-end collaboration technology, like web conferencing, to save money and reduce travel. This is also important but doesn't help companies retain information when people leave. The current economic conditions put even more pressure on companies to wring as much information as possible from remaining and future employees. The important thing now, if you are a business owner or manager, is to do something before it is too late again.

Learn Something For Free

Instructables: Learn how to DIY just about anything (seriously!) with instructions from hundreds of contributors offered up free of charge. DIY solar food dehydrator, anyone?

Lifehacker.com/Night School: Hidden among the hacks on this uber-useful site are posted tagged “night school” where you’ll find freebie lessons on everything from how to build a computer to photography basics.

Skillshare: Find out how to brew a perfect cup of coffee, pickle like a pro, knit, sew, and 100s of more skills. Cram your head full with the site’s complimentary 14-day trial, stat!

JustinGuitar: Always dreamed of becoming a rock star? You won’t even have to busk to take advantage of this site’s 850+ gratis guitar lessons.

Drawspace: Sharpen your drawing skills with lessons from pros. About 15% of Drawspace’s content is on the house.

Chesscademy: Become a chess master by watching videos, solving puzzles,  and playing games, all free of cost.

GoHighBrow.com: Sign up for unpaid bite-size courses delivered to your inbox daily, aimed at expanding your knowledge on topics ranging from philosophy to Greek mythology.

Spreeder: Quick: How fast can you read these words? Use this Spreeder’s completely free reading program to double, triple, even quadruple your reading speed.

DuoLingo: Learn a new language from this site’s extensive costless online courses. Bonus: The ‘lessons’ are set up like games!

Codecademy: Get yourself up to speed on the in-demand skill of coding—all without spending a dime

Linkedin Contact Advice from by Ron Harvey

Networking is the major purpose for having a LinkedIn profile...Agreed? In the past week I have been making many connections, but I was surprised at how many did not have contact information readily available.

Aside from making your email address and phone number clearly visible on your profile page, there is another way I just found to make sure someone can contact you or invite your connection.
This is done through the "Introduction" process.

When someone comes to your profile, if they are not already directly connected to you, they have three ways to request a connection.
** They can click the yellow "Connect" button appears at the top right,
** They can send you an InMail,
** Or they can click the "Get Introduced Through a Connection" link.

If they click the "Connect" button they will be brought to the "Invitation Page". Then they must select one of the buttons which require some form of existing connection (group, job, colleague, friend) or for them to have your email address. Without these connections, they can not send the invitation (unless they stretch the truth a little).

You can use the InMails, but I do not recommend it – Too Expensive. If they use the "Get Introduced Through a Connection" link, it opens a page for them to request an invitation through someone else they already know. About half way down the page there is a box for the message they wish to send you. Right next to that box there are two small statements: "Mr. Blank is interested in" and "Mr. Blank's contact advice". THIS IS THE PLACE for you to put more contact information. NOTE: This method of contact is also limited. Regular accounts are limited to 5 standing “Introductions” at a time, so you can’t rely on people to use this method to contact you.

Almost all of the profiles I see have the section completed for their interests. Not many of them have the contact advice filled in. If you put your contact information (email and phone#) in that section, then your potential connection can go back to the "Invitation Page", click on the "Other" button, enter your email address and send their invitation. You can provide contact information in this section by the following steps:
1. Go to the "Home Page" for your profile,

2. Put your cursor over your "Name Link" on the topmost right corner and click on "Settings" in drop down list,

3. If prompted, enter your password.

4. When your profile opens, click on the "Email Preferences" tab on the bottom left of the screen.

5. Click on the link that says "Select the types of messages you're willing to receive",

6. At the top of the opened box is a list of items for you to select indicating your interests. On the bottom is the "ADVICE TO PEOPLE WHO ARE CONTACTING YOU" box.

7. Here you can enter anything you want (Email/Phone/Other Info) and it will appear in the "Get Introduced Through a Connection" box I mentioned above.

Now your hopeful connection can go back to the "Request Invitation" link, Click on the "Other" button, enter their email address and send their invitation request.

How did I come across this information? The hard way. I am trying to build up my local links here in South Carolina as I seek to garner more connections for my Environmental Services business, and as I am keeping my eyes open for "regular" employment. I would invite anyone who, in the name of the spirit of entrepreneurship, would send an invitation to connect with me.
Keep on Connecting.

Linkedin Endorsements Whats The Big Deal

(Susan Adams Forbes) I’ve been hearing from a lot of people lately who say they are mystified and somewhat annoyed by a new feature on LinkedIn: the endorsement. One friend told me he had recently received one from a woman he hadn’t spoken with in 15 years. “Should I take this seriously?” he asked me. “Is it rude not to reciprocate?” He also wanted to know, do people looking at his profile care how many endorsements he has and is there some way to turn off this feature.

I too have been receiving endorsements from people I’m out of touch with, who are endorsing me for skills I didn’t even know I had, like “food writing” and “celebrity” (whatever that means). Should I leave these endorsements untouched on my profile, or is there some way I can edit them? Should I be in touch with, and endorse, the people who endorse me?

In an effort to understand this new LinkedIn feature, I talked to a half dozen career coaches and executive recruiters, and to a spokeswoman for LinkedIn, Julie Inouye. This is what I’ve gathered:

Skills & ExpertiseEditRe-order section

Most endorsed for...
  • 33MySQL
  • 19SEO
  • 15Linux
  • 14Windows
  • 8Access
  • 5Microsoft Office
  • 3Teaching
  • 3Servers
  • 3Windows Server
  • 2Databases
     

    1. LinkedIn endorsements are here to stay. Introduced on Sept. 24, 2012, endorsements are fast becoming a popular feature, says Inouye. Since the launch, more than 200 million endorsements have been issued. Users are making roughly 10 million endorsements a day. The goal of the endorsement, she explains, is to make it easy for people to recognize you for your skills and expertise, without taking the time to compose a recommendation.  

    2. Only first-degree connections can endorse you. If it seems that your endorsements are coming from people with whom you’re barely in touch, that’s because you have expanded your connections to include people you don’t know well. This raises one of the tensions of establishing a strong LinkedIn presence: The more people you’re connected to, the greater your reach and the more possibilities you have to get help reaching out to a potential employer, client or consultant. On the other hand, there is a school of thought, echoed by Inouye, that says you should only connect with people whom you know well and who could, in fact, endorse your skills and whom you could endorse. The fact is that most of us have first-degree connections with some people who don’t directly know our work—family, friends, colleagues or former colleagues outside our department. So prepare yourself for endorsements that seem like they are out of left field.

    3. You can, and should, hide some endorsements. It’s not possible to delete an endorsement but you can hide it so that no one but you can see it. Go to the pull-down menu at the top of the screen and under “profile,” click “edit profile.” When you scroll to the “skills and expertise” section, you will see a pencil icon. Click that and you will see an option to “manage endorsements.” If you have an endorsement from, say, a family friend who has never worked with you, hide it. Likewise if someone has endorsed you for a skill you don’t have, you can click “add and remove,” and delete the skill. (I did this for “celebrity.”)

    4. List your skills. Less than a year ago, in Feb. of 2011, LinkedIn introduced the “skills and experience” feature. Many of us have not gotten around to filling this out. Now is a good time because you want people endorsing you to check off the skills you deem most important. Pick at least 10 skills. Inouye explains that endorsements will only appear on your profile for your top 10 skills. Under “More” at the top of your profile page, pull down the menu to “skills and experience” and type a skill into the box. For instance, I put in “writing” and I had a choice of nine different types of writing, from “news writing” to “technical writing.” When I clicked on “news writing,” I got another 20 related skills, to choose from, including “investigative reporting” and “business journalism.” You could obviously spend a lot of time on this. It pays to take at least 15 minutes to list the skills you think are central to your work.

    5. You don’t have to reciprocate, but it can be a good idea. My friend does not need to respond to the distant connection he hasn’t spoken to in 15 years, but if he gets an endorsement from a close colleague, it makes sense to reciprocate. The best way to do this is to go to your connection’s profile page. A blue box will appear at the top with a list of skills, which you can check off.  I recently endorsed the skills of a former colleague whose work I admire, and he wrote me a short, personal note of thanks, which I appreciated. The endorsement feature offers an opportunity to do some networking either online or in person. If you receive an endorsement, consider asking the endorser to meet for coffee or go out for a drink. Online networking is great but in-person meetings are even better.

    5. Seek endorsements from people who know your work well. If you’re working on a project with someone or you have an ongoing relationship with a colleague or boss, ask them to endorse your work. It’s best to do this in person or through a short personal note.

    6. Don’t worry about whether endorsements affect the capacity of potential employers to search for your profile. Officially, LinkedIn does not reveal the details of how its software makes it possible for potential employers or clients to search on LinkedIn profiles. But I have good reason to believe that endorsements do not affect LinkedIn search results.

    7. Recruiters don’t care about endorsements. Yet. I talked to four recruiters who all said that recommendations did not much affect how they perceived a candidate one way or the other. “It’s cheap and dirty,” says Neil E. Peek, a senior recruiter at Brocade, a network equipment company in San Jose, Calif. “It’s no skin in the game for the person making the endorsement.” He adds that it’s “nice to see” on a profile, “but it doesn’t have any substance to it.” For Peek, recommendations carry much more weight. Steven Raz, of Cornerstone Search Group in Parsippany ,N.J., an executive search firm that specializes in the pharmaceutical and biotech fields, says that while the concept is good, endorsements have already become “a little meaningless because everyone is endorsing everyone for everything.” Raz agrees with Peek that recommendations are much more important.

    8. Don’t ignore endorsements.  Though many of us may feel burdened by having to manage our social media presence, there is no question that LinkedIn is the leader in professional social networking. If the initial numbers are any guide, the endorsement feature will only become more popular. Recruiters and hiring managers may not care about endorsements at this early stage, but it’s easy to imagine a time when they will. If you’re applying for a sales job, for instance, and your competitors all have 50-100 endorsements from clients and colleagues, while you have zero, that could hurt your chances. Though it’s tempting to ignore this new feature, it’s better to get ahead of the curve than to wait a year and find yourself left behind.

    Read More - Click Here!

Linkedin Leads Generation

It is no secret that social media has rapidly evolved into a mainstream tool for business and networking.  While Facebook, Twitter and Google+ are strong social sites, LinkedIn seems to tilt its scale more towards a business-network orientation.

In fact, 59 percent among executives from the Fortune 500 companies say LinkedIn is their platform of choice over Facebook or Twitter.  This is up from 41 percent who called LinkedIn their most important social account a year earlier, according to a June report by Performics and ROI Research.  LinkedIn has more than 100 million members in more than 200 countries, on all seven continents. As of this past June, LinkedIn counted 33.9 million unique visitors, up 63 percent from a year earlier, according to internet analytics firm ComScore.

Market-research firm Lab42 finds that top-level executives and entry-level workers use LinkedIn differently: Younger members use the site mostly to post résumés and network for jobs, while more experienced professionals use it to demonstrate thought leadership and expertise, promote their businesses, conduct market research and–perhaps most important–win new business.

So, how might companies win new business on LinkedIn?

Target searches for keywords you’ve identified as central to your business. For example, target titles such as “VP of marketing,” specific ZIP codes and company names to identify key contacts to call or e-mail.

Track who is looking at your profile and your staff’s profiles. You can then research those individuals or companies in greater depth and perhaps market yourself or your business to them.

Research individuals and/or companies you are targeting for potential interaction. Set up a Company Page.
Setting up your business as a “company” on LinkedIn isn’t going to generate a bunch of leads, but it does give you an opportunity to have a presence on LinkedIn beyond a personal profile to ratchet up your company’s charisma with lots of activity rather than simply lots of members.

Discern patterns. Notice who’s connected in your industry.  Participate in LinkedIn groups catering to your target market in order to engage in conversations with the right people. Seek out groups

Using LinkedIn efficiently does take some focused effort, but it can be well worth it. Of course, be aware that your competitors are also able to apply these same tips and tricks; they are privy to the same social insights that could be giving them inside information about you. Your competition can also notice who you are connecting with, which could tip them off about potential new business you may be seeking to establish or have already established.

Local - Organic Search Engine Optimization

Organic Search engine optimization (SEO) is the process of crafting or improving a website to increase search engine ranking, resulting in higher volumes of traffic to a web site. The assumption is that the higher a site is presented in the search results, or the higher it "ranks," the more searchers will visit that site. So effective SEO improves ranking for specific target audiences.

Please keep in mind that pictures and flash presentations do nothing for search engine ranking because search engines can only read text whilst evaluating a website. Therefore, a text-rich site, totally focused on your product and/or company is imperative for website success.

As a marketing strategy for increasing a site's relevancy, SEO considers how search engine algorithms work and what people search for when they want something. SEO efforts may involve website coding, presentation, and structure, as well as fixing problems that could prevent search engine programs from fully indexing your website. Other more noticeable efforts may include adding unique content to a site.

To be affective, however, one must remember that if people don't see what they want and can easily take appropriate action, they will quickly move on to another site, leaving yours \"in the dust\" So websites must appeal both to search engine indexes and your web surfing audience. This requires a good Plan, Design, Implementation, Promotion, and Maintenance.

Pay per click (PPC) is paid advertising used on websites, advertising networks, and search engines where advertisers pay when a web surfer actually clicks on an ad to visit the advertiser's website. PPC works like an auction. Web advertisers bid on keywords that they believe their target market would type into the search bar when they are looking for products or services. When a user types a keyword query matching the advertiser's keyword list, the advertiser's ad may appear on the search results page. These ads are called "sponsored links\" or \"sponsored ads\" and appear next to, and sometimes, above the natural or organic results on the page. The advertiser pays each time a user clicks on the ad.

Pay per click ads may also appear on content network websites. In this case, ad networks such as Google, Adsense, and Yahoo! Publisher Network, attempts to provide ads that are relevant to the content of the page where they appear, and no search function is involved.

Minimum PPC start at US $0.01 - US $0.50). However, bidding for popular keywords can cost much much more!

It is strongly recommended that websites utilize Organic SEO whether or not they play PPC for these reasons:
1. SEO appeals to a broad range of search engines whilst PPC is search engine specific.
2. If PPC crosses your bid threshold, SEO will insure a higher ranking in the search engines.
3. If you stop playing PPC, your website may still enjoy a high rank.

Website Success - See The Big Picture

For a website to be successful it must be findable on the most popular search engines, Google, Yahoo, and MSN. Will over 300 million websites competing for top search engine listing, this is no easy task...

The search engine exists for the sole purpose of connecting a searcher with what they're searching for. That's all. Since customers hate to be pointed to a site that doesn't give them what they want, it is imperative that your website is focused on your real products services, and company. It is easy to get sidetracked with information about where you are from, what you think and what you feel, but if your prospect cannot easily find the information they want about the products they want, they are gone and lost forever!

Most search engines are programs which scour websites to see what they offer, then send people there that are searching for that information. Some of the things checked are the URL (page address), content, and (fading quickly into extinction) metadata. Since customers use certain words and phrases in their searches, the search engines look for these \"keywords\" in these scans. If you keep keywords in mind when putting your site together you can make yourself rank high in their searches. However, search engine programs cannot read pictures, PDF files, and flash video. Therefore, make sure you have lots of text that focuses on your keywords so you can delight both your readers and the search engine programs.

The URL is checked for relevance. If the title doesn't match the content, your rank will go down. Also, words strung together in a title like thisisthebesttitleavailable.com are seen as one word by most search engines. BAD JUJU. Stay away from this if you can. Better: this-is-the-best-title-available.com. Putting searched keywords in your title separated by dashes will score very high in the engines ranking formulas (i.e.: widget-source.com or widget-discount-store.com). (hiring a professional can help a lot here)

Content is what you say to your visitors. If you sell widgets, the information put on your website should be all about widgets. Since you can't predict what exact phrase will be used by your buyers, you will want a lot of different variations of appropriate keywords used in your site. However, overdoing it can dilute your search capability and may even get you blacklisted (lost and gone forever) (Hiring a pro here will help too)

Metadata is basically textual information about your site which the visitors never see. It's strictly there for the earlier models of search engines and, since it has been abused, is fading into non-existence. Because of this, I wouldn't stress too much on it. But if you use metadata keywords, make sure they can be found in the website text (or you will be blacklisted).

You website has to load quickly! Have you ever heard of the 3 second rule? Fact is, if your site doesn’t load in 3 seconds, your prospects are on to the next, probably your competitor, buying their products instead of yours.

I hope this helps you get "The Big Picture." Keep you website clear, concise, and focused on your product, service or company. And use text liberally and pictures or splash sparingly.

Long Term Data Storage Answers

You can stick a newspaper clipping in a folder and read it in 50 years. Not so with digital content: both the media AND the format can become unreadable. With so much of the world’s data - and yours - in digital form, more people wonder: how do I keep my pictures, music, videos, documents and more around for decades? Floppies? Tape? Flash Drives? Here's how.

http://blogs.zdnet.com/storage/?p=376&tag=nl.e040

Make A Mistake - Take Responsibility

No one is perfect. A project manager typically does the best job they can,  given the information available at the time. However, project managers sometimes make mistakes. This could be a mistake in communication, in estimation, or in understanding the project "Deliverable", etc. It would have to be a fairly large mistake to be classified as a formal issue, but large mistakes do happen.

Issues management is normally a cold and logical process, involving problem identification and resolution techniques. However, these specific types of issues can be especially difficult to resolve since the project manager may feel some defensiveness (and perhaps embarrassment) for having caused the problem to begin with. If this happens to you while managing a project, use the following steps to deal with it effectively.

1. Own the problem
You must first recognize the problem and own up to the fact that you caused it. If you caused the problem but try to blame it on others, you will probably find that resolving the problem is much more painful to you. If you caused the problem, or if you were partially at fault, be mature and honest enough to own it.

2. Communicate openly
You may be surprised how liberating it can be to just come right out and say that you blew it! I went to a meeting many years ago where the participants were ready to pound on a project manager because of a major problem that he caused. However, the first thing the project manager did when the meeting opened was to admit the mistake and take total responsibility. The rest of the attendees no longer felt like they needed to blame the project manager for all the problems--he had already admitted it! With that quickly out of the way, you can now focus on resolving the problem.

3. Resolve the problem coolly and calmly
You have the personally painful part out of the way. Now look for alternatives and resolve the problem using your normal issues management techniques. Don't get caught back up in the personal pain by acting defensive or by looking for ways that you can save face. Given the mistake made, look for the best resolution for your project.

4. Learn from the mistake
Turn your stumbling block into a stepping stone. Generally, each mistake you make can be turned into a learning experience. You can put better processes in place if that is appropriate. Or you can apply the learning personally and change your management processes (maybe even slightly) so that this type of problem does not occur again.

If you handle problems like this you will generally find that people give you the benefit of the doubt, and, in fact, many will even admire you for the way you address these personal challenges

Pareto Analysis Solves Complex Problems

Instead of addressing project problems as they crop up, you can use Pareto Analysis to spend your time more wisely. 

A few years ago, I observed an implementation of a major Enterprise Resource Planning (ERP) implementation. The implementation team knew that there would be problems--hundreds of them--and they were not disappointed. After the application went live, the ERP helpdesk was inundated with problem calls. One way to resolve the problems was simply to use a problem-by-problem approach. The team could have taken the first problem and solved it, then the second, then the third, and so on. Since many of the problem calls were related, this approach would have ultimately led to the resolution of all the problems.

But the team decided that the approach was not the best use of their scarce time and resources. It wouldn't have made sense to spend resources solving the first call if that was the only occurrence of that problem. It made more sense to solve the problems that were causing the most frequent errors. The team decided to use Pareto Analysis to help make more intelligent decisions.

As I mentioned, the support tickets were coming in fast and furious. The team attempted to solve the problems they could, but they also set up a process to start counting and categorizing each problem. Within a very short time, they started to notice the patterns. The purpose of Pareto Analysis is to observe the problems and determine their frequency of occurrence. This, in turn, gives you the information you need to prioritize your effort to ensure you are spending your time where it will have the most positive impact. Pareto Analysis is based on the classic 80/20 rule. That is, 20 percent of the instances usually cause 80 percent of the problems.

Let's assume for our ERP implementation, that the team noticed that there were five major categories of errors. (This example is simplified. On the actual ERP project, there were dozens of distinct categories of errors.) Let's further say that the distribution of the errors looked something like this:

Error #1 -- 5 occurrences
Error #2 -- 25 occurrences
Error #3 -- 70 occurrences
Error #4 -- 15 occurrences
Error #5 -- 50 occurrences

Notice that this gives you important information. Even though there are five total problems identified, it probably makes most sense to try to resolve Error #3 first, and then Error #5 second. If you solve these two problems, you have actually solved over 70 percent of the total occurrences (120/165 total errors). Under the first approach, the time you would have spent solving problem #1 first would have had a negligible impact on the total occurrences.

Of course, you might ask, "What if error #4 would only take an hour to solve?" In that case, solve it by all means. It's low-hanging fruit. However, the Pareto Analysis now gives you some facts to know what the impact is of solving that particular error. 

You can see that Pareto Analysis doesn't help you resolve all problems. It works especially well when you have multiple problems that can be counted and categorized. The benefit of the technique is that it provides you with important information to determine which problems to resolve first.

Problem Solving Lessons From Kids

When we were kids, problem solving was easy. Problems were simple to define; the root cause was readily apparent, and correct action was obvious, swift and direct. Johnny took Billy's toy so Billy took it back, and if Johnny didn't give it, Johnny got it upside the head until he did. Then Momma came in and said Billy should share. When the sharing is done, if Johnny doesn't give it back, one more bop upside the head, problem solved and it was Over! - Done! - Finished!

I mention this because, looking back, I appreciate the straightforward ways of handling conflict that boys (when we were young and unruly) practiced. The cause of the conflicts was always clear and clean-cut and once it was Over, it was Over!.

Now fast-forward a few years and picture the corporate environment of today. It goes without saying that when one has an "issue\ with someone at work, one cannot walk over and bop that person upside the head. And I'm not in any way recommending that. But the corporate environment can be more like a girls' junior high school locker room. There's invariably an \"in\" crowd, \"out\" crowd, people get pigeon-holed quickly and irrevocably.

Battles are waged through gossip and innuendo. Subsequent actions become monumentis to the point the original act is forgotten.  And problems are never Over!,

It sometimes takes great stealth and Machiavellian planning to get a simple problem solved in a corporate environment. People are often reluctant to go to the source of a problem for fear of career repercussions. Sometimes the fear of conflict can cause problems to fester forever. I can appreciate the fact that we lose some of our barbaric or rudimentary behaviors as we age and mature, but why do we have to lose the good part too? There's something to be said for directness--this includes having the guts to express your own thoughts and opinions, and to be clear on expectations between managers and coworkers. Corporate employees should never exercise directness with a fist, but they should not have to live in a psychological fetal position either.

Make Money Online By Selling Offline Products

Have you ever come across a product that really caught your eye that you have never seen online before?

If you have and you still know where to find it, why not consider trying to market it online? There are really countless ways of doing this, depending on the nature of the product and where you get hold of it from, but in general if you come across something that hasn’t really taken off online yet you have a great chance of beating everyone else to the punch.

Becoming a sales agent usually means you get a percentage from every sale you make, so the way to approach this opportunity depends on how many products you can get access to. Some businesses allow you to join as a sales agent and sell a range of products, in which case you could set up a website (with their agreement of course) promoting all of them in turn. You would then receive orders via your site and process them via your supplier directly.

It does depend a lot on how you get hold of the product or products in the first place though. Some businesses may agree to let you promote their product on a sale or return basis, or alternatively you may have to buy a quantity of the product first and take a chance on whether it would sell well online or not.

Whichever way you approach this opportunity, it’s clear that you should get stuck into some research before you agree to anything. Find out as much about the product as you can – who it would appeal to, what price it retails for, and how much your profit margin would be on each unit.

It’s easy to get caught up in the excitement of finding a product that you love and you think you could make money with, but you need to be certain that a lot of other people will like it just as much as well! By finding out as much as you can in the first place you stand a better chance of making a good profit.

If you haven’t seen any particular product which grabs your interest the best place to start looking – ironically – is online. Search for companies that have offline sales agents already and think about approaching the best ones (the ones that appeal to you the most) with your proposition. As hard as it may be to believe there are still some businesses that don’t have any kind of online presence at all – and you could be just what they are looking for.

One final point – you should try looking in your local area to see what businesses are there, before you look any further afield. Quite often they will be the ones who haven’t got online yet.

It might take some work to find a product you like that has great potential for taking online, but the end result can be well worth it. Let us know your thoughts by leaving a message below before you start hunting.

Make Online Money Flipping Domain Names and WebSites

Domain name flipping is the simple process of buying a domain name and then selling it for more money – so what exactly is website flipping all about?

If you’d prefer something a little more challenging (and potentially a lot more profitable) then website flipping might just be for you. It’s a longer process but the time you invest in this particular activity can net you a lot of cash. And there is more than one way of doing it as well, as you’re about to find out.

There is an ever growing band of people who have figured out that flipping websites is a great way to build up skills, knowledge and an impressive income at the same time.

The basic idea starts with you looking for a topic which does well online. Once you have a successful website on that topic (which you’ll do in one of the following two ways) you can offer it for sale to someone else.

The first way to do this is to start from scratch by selecting a domain name, building a website around it and building it up until it gets a good amount of traffic and interest from people who are into that subject. This can take some time as you will need to get the site indexed in Google before you can take advantage of the amount of search engine traffic that can come your way.

The idea is to build a site that has real money making potential, as well as being able to generate a good volume of traffic. You can do this by integrating elements such as Google Adsense, affiliate links and paid advertising into the site – and in some cases, paid memberships as well.

The second route to follow is easier – but it requires a little bit more research on your part. If the idea of building a site from scratch doesn’t appeal to you but you still want to sell websites for profit then this method should be the one to try. The trick is to look for a website that someone has built which is getting a reasonable amount of traffic. Keyword research will reveal those subject areas and keywords which are perennially popular online, and it is these kinds of websites you should be looking for – something that will always be pulling in traffic.

The fact is that you cannot simply pick a great domain name and stick a few articles and affiliate links on a website and expect it to make money. It takes time and effort, and that’s why websites which have the potential to do really well end up failing. It’s not so much the site as the owner in many cases.

So if you make a reasonable offer to that owner for their website, the chances are good that they will be only too pleased to get shot of the site. And that gives you the chance to get in there and really develop it in order to build on the traffic and potential it already has.

After a few months – when you are earning a dollar or more every day from your website – you can think about selling it. There are a number of websites and forums that have sections for flipping websites to other people, and depending on the profits you are making and the traffic you are getting you could make anything between a few hundred dollars to a few thousand dollars by flipping just one site.

And once you’ve done that and no doubt learned a lot from the experience, it’s a case of ‘rinse and repeat!’ There is no limit to the number of websites you can flip at any one time, although don’t forget you need a few months to go by before you make your first sale since you need your websites to develop before you can flip them. Once you get the ball rolling though you can expect to be selling one or more every week.

But before you become a ‘pro flipper’ for a living, why not leave us a comment in the box below? Then all you need to do is start scouting round for your very first flippable website!

Make Online Money Web Directories

Of all the different ways there are to make money online, this is probably one of the more unusual. It’s certainly not the first one to come to mind… and yet when you think of where you could end up by giving it a go (does the name Yahoo sound familiar?) you can see why it’s worth at least considering the idea.

What’s more, you can choose your focus so that it appeals to everyone online or just a specific topic area. If you choose the second option you could end up building a whole empire of websites over time.

So what is a website directory anyway? Simply put it’s a website which lists other websites. But of course it’s a little more than that. By putting them into specific categories everyone visiting your site will be able to find what they need quickly and easily.

The first step is to decide what you want the focus of your directory to be. Do you want to list anything and everything, or do you want to concentrate on a particular topic? For example you could create a directory listing shops and stores in a particular country. You obviously need to pick a subject area where there is plenty of meat to include; a website which lists fake mustache sellers in a specific town probably isn’t going to be that big.

Once you have your topic you need to create your site, and it needs to be a good one. It’s worth getting it designed professionally because people simply won’t use it if it doesn’t look respectable. The cost will be worth it though because you will then be able to charge for your listings.

Adding a fee structure to your website is the way in which you will make money. Free listings will also generate valuable free advertising and promotion for you, since in return for a free listing you will ask for a backlink to your website. The free listings should also be basic so as to allow for paid listings to stand out more and be worth the money you will charge for them.

So what kind of paid listings should you offer? You can charge for two basic types; for example a normal paid listing would appear at the top of its relevant category, whereas a premium paid listing could involve the use of bold type as well, so it would stand out more from its rivals.

You can develop paid services as much or as little as you like; for example free listings may not include a clickable link to the website being advertised, whereas paid listings will. You could also add an optional extra fee to premium paid listings to allow the purchaser to add their business logo or a photo to their listing as well.

The fees you charge are up to you, but it’s important to remember that people won’t pay money if their websites aren’t going to be seen by lots of potential customers. That’s why you need to make sure your site has real value by generating streams of traffic towards it (a good reason for having free listings which require a link to your site).

The more traffic your website directory is capable of getting, the more traffic your customers are likely to get in return, and the more they will be prepared to pay for a premium listing. In this way building a successful directory has two main areas of interest – firstly you need to get plenty of listings on your site, and secondly you need to get plenty of traffic to those listings.

By doing this you will be adding real value to your website and word will start to get out that your website directory does indeed help to drive traffic to people’s websites. Once you can legitimately lay claim to this then the paid requests for inclusion will start pouring in.

Once you get to this stage you might also consider spreading the word about the efficiency and benefits your site offers by spending some of your profits on more advertising. Google AdWords could get you even more paid listings for very little outlay.

Leave us a comment below to let us know what you think, and then start making plans for your very own website directory. Good luck!

Make Online Money With Affiliate Marketing

How would you like to earn a little extra cash each month? Or even replace your income, working less to make more money…

For anyone wanting to make money online, affiliate marketing is one of the best ways to get started. Affiliate marketing is the act of referring online shoppers to various products and gaining a percentage of the sale in return. As an affiliate marketer, you are given your own links to a product so the seller knows when a customer you referred buys their product.

So what exactly are the benefits of affiliate marketing? There are dozens. Many sellers offer great incentives to affiliate marketers, with some offering as much as 50% commissions on products you refer customers to. This means you can make money on the side (or even replace your entire income if you become successful at it). This is one of the legitimate ways to bring in a passive income, as people from all around the world are buying products online at every minute of the day. You don’t have to develop any products yourself, either. It’s very easy to find outlets in which to plug in your links (oftentimes for free!). And make great money.

Writing articles related to the products you’re trying to market can be very beneficial in many ways. One, this builds your online presence, and thus, your credibility. Writing articles on one subject but with many angles will help you understand exactly what the product you’re affiliate marketing is all about, and help you to identify your target audience. Also the more articles you write, the more people will know about you, which will be great later down the road when you’re ready for your own website.

Writing blog articles for free in exchange for being allowed to include links to your products can be helpful in that you will have full access to each blogger’s followers. This way, you won’t have to go out and find your own customers, you just market to people who are already interested in the subject and are web-savvy (a must for anyone who would consider buying products online).

There are also article sites that will allow you to include links to your products at the bottom of the article, and better still: some sites might even pay you small fees for your articles. The key to attracting as many customers as possible is writing a fantastic article that isn’t too sales-pitchy and showing them how their lives can be even more enriched if they check out the products you have listed.

One day, you’re ultimately going to want to take the leap and get your own website. It doesn’t have to be anything fancy, just something simple enough for customers to navigate easily. Here, you can have your own store with links to the various products you’re marketing, as well as build a customer base through blogging. This opens multiple channels of communication with millions of potential consumers. Combined with social media marketing in order to get even more people connected, you can eventually have great success with affiliate marketing, as long as you choose quality products to market and sell them effectively.

Make Online Money With Amazon

You may not realize it but there are a number of ways you can cash in with Amazon.com. The way you choose as being the best one for you will largely depend on what you are already doing, and that’s where this particular blog comes in.

By doing this you will find that you can take advantage of the sheer amount of traffic and respectability that this website commands all over the world. It’s a lot like eBay in this respect – a lot of the hard work is done for you.

One of the best things about Amazon is that everyone can make some money with it if they want to, because it has a number of options to choose from. You will no doubt have heard about the Advantage program, which is ideal if you already have published books (no matter whether they are self published or through a conventional publisher) as you can get them listed on Amazon by following the instructions they give you in the Advantage program. This method also enables you to use On Demand publishing to minimize the risk of self publishing stacks of books that may not be sold.

But there is a lot more to Amazon than that. If affiliate marketing is more up your street, then take a look at their Associates program, which allows you to recommend customers to various products in order to make sales on them. The program is very well put together and as you would probably expect from such a major site there is a lot of information to read through as well.

Once you have signed up for free, you should make the effort to explore everything the site offers you. You will see that you can create banners, ads and much more to enhance your site – and this even extends to the colors you pick for your ads.

But one area you should definitely look at is the potential to create what they call an aStore. There are examples of these given on Amazon itself, and while they are quite basic in nature they do allow you to create web pages that are centered around a particular theme. So for example if your website is about golf, you can create an aStore which is stocked with the best books on golf and golfing.

This can be linked to from your main website or blog, giving an extra dimension to your site and giving you the opportunity to make more money from it as a result.

You can also select which colors you wish to use for these pages (you can build many more than just one!) so it will look exactly the same as your main website. You will need a website to join the program and they will vet it to make sure it is suitable for inclusion (but don’t worry, most are – it’s only the obvious types of exclusions that will apply) but this doesn’t even have to be one you pay for; people have got in by having a well constructed page or site from a free provider.

There is the potential to make a lot of money from the Associates program in particular, and it’s great to use if you have a whole range of websites since you can take advantage of the wide range of products they stock – it’s not just books and DVDs!

So if you are looking for a way to monetize the site or sites you have now, hotfoot it to Amazon and sign up for free. It is one of the best ways to start making some money by offering quality products at great prices.

Be sure to leave us a comment below before you start investigating everything that Amazon has to offer though!

Make Online Money With Craigslist

Just in case you haven’t stumbled across this website yet, Craigslist is the basic looking but extremely popular website that has classified adverts for virtually everything you could think of.

As such it offers a number of ways that you can make money – all you need to do is get your thinking cap on and decide what way would work best for you. The vast majority of adverts are free to post, making this a great way to get in touch with people and offer services and products for sale.

With a little creative thinking you could soon join the band of people who are making a nice income from advertising on Craigslist.

One of the best ways to make money with this website is to think about what services you can offer to other people. The beauty of Craigslist is that there are separate parts of the website for each country and area, so you are sure to find one near you that would be ideal for posting your advert to.

You can often make money quite easily by offering a service related to one of your hobbies. For example, if you love gardening why not hire yourself out to do light gardening jobs for other people? This could be as simple as a lawn mowing service, or as complex as a complete garden makeover. The sky is the limit here, but be sure you have a list of prices and you know exactly what you are offering before you place your advert.

You can also use Craigslist to search for items that other people are looking to get rid of. Once you have something worthwhile you can sell it to someone else using everyone’s favorite website eBay. For some reason there are a lot of people who don’t think of using Craigslist in this way, which means there are a lot of bargains to be had – and a lot of money to be made once you sell them via this or any other auction site.

If you are currently selling items from your own website or via any other means you can also make money by selling them directly through classifieds on Craigslist. So long as you list them in the right section and describe them accurately (including relevant keywords wherever you can) you should get a good response and more sales just from doing this.

If you are thinking of making money via Craigslist in any way, it’s well worth spending some time browsing round the site to get an idea of the sheer scale of what it is all about. This activity alone should give you several ideas for making money that you might not previously have thought of.

Before you post an advert, make sure you read the help pages to ensure you don’t unwittingly break any rules. The help pages can be accessed via the top left hand corner of the home page. They are reasonably straight forward but you will want to use this site for many months to come, so it pays to look through them first to make sure you understand everything.

In short, Craigslist offers plenty of ways to make money from home; all you need to do is figure out the best way for you. But make sure you start with that research first. A search online will also reveal some blogs where other people share their own ways of bringing in an income from this site.

Make sure you leave us a comment below before you start making some healthy profits for yourself though!

Make Online Money With Youtube

YouTube is one of those websites that really has taken the internet by storm. So long as you have the right equipment to shoot a home movie (and it isn’t too hard to come by without shelling out loads of cash nowadays) you stand a chance of developing an existing business or starting a new one, purely by signing up to YouTube and putting those movies online.

But that doesn’t explain what kind of videos you should be making. Well relax, because that is what you are about to find out. There is one very good way to make money using this website, you are about to find out what it is.

Let’s start by looking at YouTube as a way to bring in more business for your existing venture. If you can shoot short videos related to your business (making sure you include the URL to your website on the video itself) you can expect to receive more traffic to your website and hopefully more customers as a result.

Let’s say for example you run a website which sells all kinds of craft items. So you might make a video showing people how to make their own home made cards. They would then check out your website to see what you sell. This process can be duplicated no matter what kind of business you have.

The key is to think visually. It’s no good simply sitting in front of a camera telling people about something – you need to show them as well. Always remember this when you are thinking of ideas for videos – you will get a better response to them if you do.

In this sense you aren’t making money directly from YouTube; rather, you are using it as a way to make money elsewhere. It is a great tool for attracting attention and funneling people off the site. You cannot actually tout for business directly on the site anyway, so you are better off focusing on how you can get the attention of people whom you could sell to. Once you figure out how to do that, they will be more than happy to check out your website to see what you offer.

But what if you don’t already have a business to promote? Well, there are a number of people who have been successful in promoting affiliate opportunities on the site – again by inserting the relevant web address on the video itself (if you go on YouTube you will see this appearing time and time again as a kind of watermark effect) and either posting a video that is free for anyone to use and post, or by making their own. Again, so long as you post something that is relevant to what you are selling you should get a decent amount of traffic flowing to your website.

It might take a short while to get used to how uploading videos to YouTube works (particularly if you haven’t done it before) but once you have done a couple you will get the hang of it. More importantly you will have found another stream of income to add to your internet marketing arsenal of ideas!

One final point – be original. You can choose copyright free videos, but if you can make a fairly decent one yourself, why not try and attract more attention with that?

Leave us a comment below to let us know how you intend to use YouTube to make money!

Make Online Money Writing Articles

What is the one thing that everyone is looking for when they go online? You’ve got it – information. And if you can supply it in all kinds of shapes and forms then you will be paid for doing so, which could lead to a whole new career as a web writer.

Of course it isn’t just online markets that need content; there are hundreds of other markets you could break into as well, including magazines, but overall it is the internet which offers the best opportunities, especially for the beginning writer.

So why should you start online when you want to earn money writing? The reason is simple – it isn’t just editors that need your work. Website owners, people with newsletters that need writing and countless others all have writing jobs that they can’t or won’t do or don’t have the time to do themselves.

That generally sends them scurrying to websites like Elance and Get A Freelancer to find people who will write the articles and content they need for them. There are plus points and negative points to writing for the internet; you won’t often see your work published under your own name as you will usually be ghostwriting it for someone else, but you will get a lot of work since jobs quite often come in batches. You won’t often get just a single article to write for instance – you might get a half dozen, ten, twenty or even more, so the money can soon mount up.

The best places for finding work are the aforementioned sites, but you should also look on classified ad sites such as Craigslist for jobs in your own country and in other places around the world. There are also plenty of writing related websites that can easily be found via the search engines if you look for ‘online writing jobs’ or something similar. Don’t forget blogging jobs as well; if you have your own blog then you already have experience in blogging, so apply for as many as you can. Ongoing blogging jobs are great for bringing in a regular stream of income.

Getting started and building contacts is the hardest part. Go for jobs you feel confident in doing to begin with; after a while you will pick up speed and complete them faster and much more easily. You will soon learn to juggle your work as well in order to meet all your deadlines before they fall due – this is an essential skill you will need to develop in order to position yourself as one of the best in the business.

You could also work for a ghostwriting team if you prefer; these can also be found via the search engines and a simple email should reveal whether they are accepting new writers at any time. This can make life easier since you don’t have to go looking for work all the time – it is generally supplied by the team leader, depending on how that particular team works.

But can you really make a full time income by doing this? The answer is yes you can, but speed and quality are of the essence. If you produce good work then people will naturally come back to you for more of the same. They will also pay more for work of a better standard, so make sure you don’t put yourself down with the $2 an article crowd.

It will take time to build up enough work to be able to leave your current job and start a brand new career as a web writer, but there is no reason why you shouldn’t be able to do this if you persevere and keep checking the classified ad sites and job boards every single day. Don’t wait to apply for jobs either – do it as soon as you see them appear. Getting in early can make all the difference in some cases.

So do you think you have it in you to be a writer? If you do there is a huge market out there just waiting for you to dive in. Just remember where you came from, and leave us a comment by using the form below before you go and begin your new career!

Manage by Due Date Not Percent Complete

Managing by due date is the only way to proactively manage the project workplan

If you are an inexperienced project manager you've probably gone down the "percent complete abyss" at some point. Here's how it goes: The project manager assigns a piece of work to a team member and asks that it be done by Friday. The team member agrees but sure enough, on Friday the work is not done. The project manager asks how close it is and the person responds "90% complete." The project manager walks away, confident the work is almost done. The next Tuesday the project manager asks if the work is done and the person says no, but he is 95% done. The project manager is satisfied that progress is being made and walks away. On Friday the work is still not done, but the team member is now 99% done. The next Tuesday he is 99.9% done.

You get the picture. If you're the project manager, what have you learned when a person says he is 90%, 95% or 99% done? In fact you haven't really learned a thing. When a person tells you that an activity is 90% complete, what they heck does that mean? Why not 85% complete or 93% complete? It's all just a subjective guess.

(I understand that percent complete may have value on a project basis if you're using earned value calculations. But it's meaningless on individual activities. Even in earned value, you usually care only about precision with three values -- 0% -- not started, 50% -- started, 100% -- completed.)

The better way to manage the work is to ask "when will the work be done?" If the schedule shows an activity should be completed on Friday and the work is not done, don't ask the team member for the percentage complete. Instead ask the team member "when will the work be done?" Asking when the work will be completed gives you concrete information you can place on your workplan, while also getting the team member to make another commitment to the new end date.

Here's how that scenario plays out in the prior example with our team member named Joe.

Project manager: "Joe, your assignment was due today and I see you're not done. Let’s discuss why." (They discuss the reasons.)

Project manager: "When will the work be done? Next Tuesday. Okay."

(Next Tuesday arrives. Work is still not done.)

Project manager: "Joe, this work was due last Friday. Then you told me it would be done Tuesday. The work is still not done. Why?" (They discuss the reasons.)

Project manager: "When will the work be done?"

Again, you see how the scenario plays out. Asking for when the work will be done requires Joe to re-commit. After missing two deadlines, hopefully Joe now feels a genuine obligation to get the work done -- a level of commitment that doesn’t exist in the 90%, 95%, 99% scenario. This also gives the project manager information in terms of Joe’s ability to manage his time, estimate his work correctly and meet his commitments.

Managing by due date is the only way to proactively manage the project workplan.

Managing: Boss On Your Case? Try 3 Things

Here are 3 things to keep in mind during the times when all forms of common sense seem to have gone up in smoke and craziness rules the hallways:

#1 Results = Rewards: There will be times it seems that form and process are the most important things in your company and consequently to your boss. They aren't.

Over thirty years, I don't recall a single person getting a monster bonus at year's end or awesome promotion for following the company's process better than the rest of the team. Over the long run, great rewards go to those that shows great results. If you want that promotion or raise, this is how you get it!

#2 Face time works better than technology: So your boss is incompetent; & doesn't have a clue about the company, your job or even his own. Do you really have to waste more your time meeting with him or her? Yes, absolutely. And it's not a waste.

It's actually smart to spend one-on-one time with your superior. Don't rely on email or voicemail. Your boss probably receives too many electronic messages already. And while it seems like efficient time management to communicate through email or voicemail, it does little good for your career if (s)he doesn't know much about you beyond the role you perform. Go out of your way to talk to the boss about your responsibilities and accomplishments in person. Leave it to everyone else to fill up the boss' in-boxes. In addition, you my learn why your boss is the boss and gain a greater appreciation for the guidance an tutelage provided!

#3: A good listener is hard to find: Recognize that all bosses expect to be heard and then have their directions followed. So - Listen, listen, listen. And remember that you have two ears and one mouth for a good reason.

Don't be one of those misguided types who debates everything they're instructed to do. After the first 1 or 2 times, it doesn't show anyone how smart you are. It just becomes tiresome.

If these tips are tough to accept, keep in mind that someone else in your company is ready and willing to give the boss what they want. Better it's you.

Saying No In A Bad Economy

Due to the bad economy, fewer people are using the word "NO" in the workplace.

With the real or imagined specter layoffs, employees feel that turning down any project or responsibility will mark them as dispencible, so they keep taking on new duties until they're turning in 60- or 70-hour workweeks and missing deadlines.

Even the self-employed are not immune. Even though you may sense that the assignment is simply the wrong thing to do — fear of poverty may propels them to take on the task anyway.

If you polled managers and asked them to list the things they have the most difficulty doing, somewhere near the top of the list would be no. I can already hear many of you saying, "Well, my boss tells me no all the time." But it is, in fact, a difficult act for more managers than you think.

I'll qualify the above by saying that I am talking about the hard no and not the easy no. If an employee comes up to you and says, "Boss, can I buy that new piece of equipment we talked about?" and you look at your budget and quickly see that you are running near deficit, then saying "no, we can't afford it" is an easy no. It's easy because;

(a)    you have indisputable facts to back up your decision,
(b)    it's a person with less power and authority asking, and
(c)    your relative risk for saying no is low; thus, we have the easy no.

On the other hand, when there are situations in which managers have to say yes or no to a question that is based solely on one's best judgment, when you have to do it publicly, and when it means denying a peer or other authority, it can have serious repercussions - that is what I mean by a hard no.

Project managers are often faced with the situation described above regarding scope creep. They may find themselves in a meeting where they are being ganged up on by a group of customers and feel boxed in. The clients clearly want something that is out of scope, and the project manager knows that by giving in, not only will it add time and expense to the project, but it stands a good chance of jeopardizing the success of the project altogether. The project manager has only his or her best professional judgment to rely on, and the client challenges it or discounts it in a public setting. It is at this point that many project managers buckle under the pressure being applied to them and yield to the client, thus, failing to issue a hard no.

Obviously the situation described above can be described as difficult, at best. The project manager is being challenged publicly and, perhaps more importantly, his or her judgment is being called into question - never an easy thing.

I have found though that there are ways of helping yourself when it comes to the hard no  to make it less of a painful process.

Get comfortable speaking in front of a group and managing a meeting. Some folks just lack confidence when addressing more than a handful of people. While they may be brilliant one on one, for whatever reasons, working in front of a group makes them nervous. The remedy is knowledge and experience: knowledge, regarding how to manage a meeting, read people, and communicate effectively; and experience, because the process has become more familiar the more times you've been through it. This is definitely a case where practice can help to make perfect.

Know the facts. The more knowledge you have regarding the issue, the better prepared you are to defend yourself and cut through the BS.

Believe in yourself. If you doubt yourself, you are less likely to show a "spine" when you are pressed in public, particularly if your judgment is being called into question.

Don't take it personally. Try to remain as emotionally detached as you can; you can be resolute and even passionate about your position, but the minute you find yourself feeling angry, sad, or scared, you diminish your effectiveness and lower your confidence, as well as impair your ability to think rationally.

Understand your position relative to others. Realize that saying no is a statement of position and the weight of your no is dependent on your relative position of authority/power and your persuasiveness. You can be in a position of power and your no will have the weight of authority, or you can have little authority but be very persuasive and have an equally weighty no. Conversely, you can have the authority but never exercise it; thus, your nos become insignificant. You can also have little authority — and act like it — and never be heard.

I personally do not like to say no, because often times that shuts down dialogue to a workable solution. However, I am always prepared to say no if it is needed, and I do not fear using it when I feel it is necessary. As I sit here and think about it, the hard no is a lot like a firearm. It should be used with authority when absolutely required, yet never used recklessly. It should be used with a great deal of consideration, but when the decision is made, it should be decisive.

Skillful use of the hard no is an important part of leadership. No one respects a spineless manager, or one who is reckless in his or her decision-making. Becoming proficient with issuing the hard no takes practice and good judgment. Master it and you will make your managerial life much easier.

Managing: Branding Strategy Can Greatly Increase Sales

Branding is getting the public to think of your company when they want to buy.

Examples: Document Copies - XEROX, Computers - Dell, Toilet Paper - Charmin.... Tap into that and you own the market. But is it realistic for a small business in a local market to make that happen?

By knowing how your company is perceived by the rest of  the world, you can use your image to instill trust, loyalty, and stability within your customers. When you think of Lowe's Home Improvement you should think of a hardware store that focuses on low prices. When you think of Home Depot you should think of a hardware store that focuses on customer service. Lowes customer base is more interested in finding low prices for their hardware and supplies while the Home Depot customer base is more interested in having help finding what they need for their projects.

Most companies have a logo and/or slogan which is also part of their branding strategy.

Typically a company will use their main theme in their slogan. Domino's Pizza promotes themselves as the delivery experts while Papa John's Pizza promotes themselves as the pricier Better Ingredients, Better Pizza. Again the conclusion is simple; the Domino's customer base orders from Domino's for a speedy delivery while Papa John's customer base orders for the quality and taste. Business branding is a marketing strategy used to promote your companies goals which attract customers.

Your Branding Strategy

Choosing the right business branding strategy for your business will help in

attracting customers that share a common need for what you sell. Some people feel that providing great customer service is what they want to focus on. This is by far the most

popular and attractive branding method used to this day. Then you have businesses that focus on providing the lowest prices possible. This also works very well, especially in a market with expensive name brand items. Taking care of your customers is very important because they are the source of your success. There will always be customers who want to find the best deal while there will be customers who will want service and assistance.

The Internet Marketplace

Selling products on the internet is different than selling products in a brick and mortar store. There are still a lot of people who refuse to buy anything over the internet

because of the inconvenience of waiting for the product to be shipped, payment

methods, and the possibilities of fraud. The number of people becoming comfortable with buying products online is growing everyday, exponentially every year, and especially during the economic slowdown.

The Informative Pre-selling

The soul of the internet is information and this is what most people use the internet for and lot of folks are using the web to research products and prices before they go shopping. When consumers walk into department stores they already have something in mind they want to buy and they don't need much if any information about the product. I have found that on the internet it is much better to provide good informative content about your products to make sales. The main reason people are online is that they are looking for information about the products they want to buy so it is important to provide everything you can about each and everyone of your products no matter how known or trivial it may be.

Business Branding With Product Information

No matter what you choose, a good customer service policy or a low prices theme, you can use information to make sales. A good strategy I have seen is to use information as your companies branding strategy and combine the low prices and customer service themes. Set your store up to compare products with the information you provide for each product side by side. This is really useful to the customer who can then decide which one they want, the product that is cheaper or the product that is of better quality. This is the road that a lot of successful e-commerce businesses have taken because it provides a solution for each type of customer you may receive.

Conclusion

Having a targeted business branding strategy can eliminate any mystery your shoppers may feel when browsing your on-line or brick 'n' motor store. When you give your business a theme and show your customers your goals, they will be more willing to buy from you. Your business will have a direction and once you have established trust among your customers repeat sales will come. Who knows, you might become the next "Pillsbury that Makes It Best!"

Managing: Does Knowledge Sharing Deliver on Its Promises? by Knowledge@Wharton

For nearly two decades, consulting firms, technology companies, R&D-driven corporations and other knowledge-intensive organizations have made significant investments in \"knowledge management\" initiatives. These initiatives are intended to facilitate the capture and transfer of company expertise as a way to spur learning and innovation.

But research by Wharton management professor Martine Haas and Morten Hansen, professor of entrepreneurship at INSEAD, indicates that knowledge sharing efforts often fail to result in improved task outcomes inside organizations -- and may even hurt project performance. However, organizations that plan carefully before launching a knowledge-sharing initiative, and support these efforts along the way, have a much better chance of adding value, the researchers say.

Haas acknowledges that, initially at least, the premise of their research appears to contradict accepted wisdom. \"The expectation has been that knowledge gathering should be beneficial for project teams,\" Haas says. \"This thinking is consistent with strategic management theories [suggesting] that knowledge resources provide a critical source of competitive advantage for firms.\"

Yet in practice, according to Haas, the types of knowledge shared and the design of the organization's project teams are likely to influence the success or failure of a knowledge-sharing effort. \"Companies and other organizations are spending large sums of money to capture and disseminate their stores of knowledge,\" she notes. \"But a significant number are not getting the full value of their investment. In fact, project teams that are badly designed or use the wrong type of knowledge for their task can see their performance suffer rather than improve as a result of efforts to use knowledge from other parts of the organization.\"

In a paper titled, \"Different Knowledge, Different Benefits: Toward a Productivity Perspective on Knowledge Sharing in Organizations,\" Haas and Hansen identify two distinct ways in which knowledge sharing usually occurs in organizations. \"The first way is through direct contact between individuals, typically when one person advises another about completing a specific task,\" says Haas. \"The defining characteristic of this mode is that the handover of knowledge requires direct contact between the provider and receiver -- through meetings, by phone or via e-mail.\" Direct contact allows for the transmission of tacit or non-codified knowledge that may be difficult to put in writing.

In contrast, another way to obtain knowledge is through the use of written documents available from databases or libraries,\" Haas notes. \"This mode is appropriate for knowledge that can be readily codified, including certain procedures and other data.\"

Using Codified Knowledge

In a study of 182 sales teams that were bidding for new client contracts in a management consulting company, Haas and Hansen found that using personal advice from experienced colleagues can improve work quality. As an example, their paper notes that colleagues with experience in areas related to a sales proposal can provide complementary expertise that a team can draw on to generate ideas and identify possible solutions for a prospective client.

The relative richness of direct personal contact also enables colleagues to help a team develop customized and creative products for its client, since they can tailor their advice to the specific situation and engage in two-way discussions to gain insight.

Enlisting the assistance of experienced colleagues who can directly communicate to external constituencies, such as clients, also sends a signal that the organization has deep competence in their area, Haas notes. "Consultants frequently travel to sales meetings with potential clients accompanied by experts from the firm who help them convey the message that the consulting work will be done by competent individuals. Also, the names and credentials of advisors often are listed in proposal documents, identifying them as contributors to the proposal and to the future project work.\"

The strategy of obtaining personal advice, however, also involves processing costs. Having colleagues attend meetings or appear on client documents can backfire if these colleagues are unwilling to exert the effort needed to fully understand the client's situation, adapt their knowledge to the task at hand or respond to client demands. \"Teams need to be aware\", says Haas, \"that the signaling benefits of expert colleagues can be offset by the possible problems involved.\"

Further, contacting colleagues who might be able to assist the team and securing their help takes valuable time, both directly and indirectly, when the need to reciprocate arises. Considering the costs of personal advice, the net effect of using this type of knowledge on time savings is unclear and likely to be weak.

One way around this is to utilize codified knowledge, typically electronic documents. According to the researchers, electronic documents affect project performance through the mechanism of reuse, or the proportion of a document's content that a team can incorporate directly into its project outputs. \"In the management consulting context, electronic documents often include detailed information and well-developed analyses, such as market data, algorithms, software code and competitor profiles,\" says Haas. \"Reuse of existing information and analyses can help teams to avoid duplicating the efforts already expended by others.\"

But here, too, processing costs are involved, she notes, since the documents may have to be reworked or augmented to adapt the knowledge they contain to a specific task.

\"We find that using codified knowledge in the form of electronic documents saved time during the task, but did not improve work quality or signal competence to clients, whereas in contrast, sharing personal advice improved work quality and signaled competence, but did not save time,\" Haas says. \"This is interesting because managers often believe that capturing and sharing knowledge via document databases can substitute for getting personal advice, and that sharing advice through personal networks can save time. But our findings dispute the claim that different types of knowledge are substitutes for each other. Instead, we show that appropriately matching the type of knowledge used to the requirements of the task at hand -- quality, signaling or speed -- is critical if a firm's knowledge capabilities are to translate into improved performance of its projects.\"

While part of the challenge is to use knowledge appropriate for the task, Haas notes that organizations also face the problem of setting up teams in ways that help them take full advantage of the knowledge they use. As the researchers note in their paper, many project teams in knowledge-intensive organizations operate in environments than can interfere with their ability to perform well because they are characterized by overload, ambiguity and politics.

These characteristics create problems when teams attempt to obtain and use knowledge from other parts of their organization. \"In overloaded environments, project teams face a multitude of possible issues to address and solutions with which to address them, and as a result of ambiguity, there is little way to know which problems and solutions to select,\" Haas says. \"Beyond these problems, multiple stakeholders may have personal agendas and interests in the team's selections that may actually work at cross-purposes with the team's own efforts.\"

'Time Famine'

In a study of 96 teams in a financial institution, other researchers investigated design features that can help teams avoid such problems by enhancing their processing, sense-making and buffering capabilities. They identified three conditions that can increase the benefits that teams gain from using external knowledge: slack time, work experience and decision-making autonomy.

\"The concept of 'slack' refers to the availability of resources that go beyond the requirement for regular activities,\" notes Haas. \"Slack time is the amount of time and attention the team members can commit to the project beyond the minimum required.\" Studies have found that \"time famine\" -- or a feeling of having too much to do and not enough time in which to do it -- can reduce team productivity.

Teams with insufficient slack time may download large quantities of documents from a database without checking their quality, skim the papers on their desk superficially -- missing important information -- or fail to solicit sufficiently diverse views by only consulting close colleagues who will return their phone calls promptly. These shortcuts can reduce the benefits of the knowledge inputs they obtain. In contrast, Haas points out, \"slack time increases processing capability because team members have more time and attention available to allocate to knowledge-related as well as other task activities.\"

In ambiguous situations, meanwhile, team members face multiple interpretations of the information, know-how and feedback they obtain, and they must engage in a continuous process of sense making to construct meaning from these inputs. The level of prior work experience possessed by team members may also create absorptive capacity that facilitates the assimilation, interpretation and application of new knowledge, Haas and Hansen note in their paper.

Research points to the conclusion that prior experience generates tacit knowledge that enhances a team member's ability to interpret external knowledge appropriately and apply it effectively, notes Haas in a 2006 paper titled, "Knowledge Gathering, Team Capabilities, and Project Performance in Challenging Work Environments.\" Additionally, prior experience tends to help team members move up their own learning curves, helping them to build on past successes and avoid past mistakes when they interpret and apply external knowledge.

Consequently, teams with members who have more years of work experience -- with the focal organization or with other companies -- possess greater capability to make sense out of chaos. Further, Haas suggests, team members with longer organizational tenure can make better judgments about how to interpret and apply external knowledge in ways that are appropriate in the particular organizational setting, compared with team members who are relatively new to the organization.

In addition to staffing teams with experienced members, if possible, and giving them sufficient slack time, Haas argues that an organization's project teams should be given sufficient autonomy to make their own decisions. \"While many outsiders who provide information, know-how and feedback to team members do not attempt to influence the team unduly, others may promote their own agendas and interests through distortion or manipulation,\" she says. \"If a team cannot buffer itself against efforts to excessively influence its decisions, its project may be derailed by these external agendas and interests.\"

As Haas notes in her earlier paper, \"the buffering capability of a team is greater if it has more autonomy, or collective control, over critical decisions about its objectives, resources, design and processes. When team members have the ability to make independent decisions, they can reject influence attempts that might harm the project and resist giving in to potentially harmful external demands about critical task-related decisions.\"

In turn, she adds, outsiders tend to interpret greater autonomy as a signal that a team is more capable, making external interference less justifiable. Finally, the buffering advantages of autonomy also can enhance the processing and sense-making capabilities of project teams by freeing the team members to focus more energy on their activities.

Leveraging Knowledge Successfully

Early organizational design research in the 1970s focused on arrangements that increase exchanges of information across internal boundaries, such as official boundary-spanning roles or cross-functional taskforces, Haas points out in her earlier research. Subsequent research on project teams emphasized the importance of going beyond the team's boundaries to find valuable information for the task.

Recent studies of social networks have further illuminated the types of interactions that facilitate information exchanges in organizations, she adds. These examinations of the social side of knowledge sharing have been complemented by research on knowledge management technologies, including electronic database systems and communication innovations ranging from e-mail to teleconferencing.

But for the most part, according to Haas' earlier paper, studies of knowledge gathering have overlooked the costs involved, as well as the difficult problems faced by teams in environments characterized by overload, ambiguity and politics. Yet even if teams manage to gather knowledge successfully, the benefits of gathering that knowledge may be limited by such costs and problems, especially if the teams fail to match their knowledge gathering efforts to the task requirements or lack the capabilities to utilize the knowledge effectively.

Haas' most recent research efforts draw upon studies in the consulting and financial industries, but she says the underlying issues may be found in many organizations that depend on knowledge sharing efforts, including research and development teams in consumer goods, pharmaceuticals and other manufacturing settings, as well as legal, accounting and other professional service firms.

A central concern that these environments usually share is that their projects are non-routine, according to Haas. The difficulties inherent in performing successfully on innovative projects are increased further by the rapid pace of change in many knowledge-intensive industries, she adds.

Overall, research by Haas and Hansen suggests that organizations that care about knowledge sharing must look beyond intermediate goals -- such as promoting knowledge capture, search and transfer -- when setting up and supporting initiatives in this area. To effectively leverage knowledge sharing activities, they must consider the costs as well as the benefits of knowledge sharing processes, and make sure they understand the implications for task-level performance outcomes.

Moving beyond a focus on knowledge sharing itself as the outcome that firms are trying to maximize, Haas and Hansen's research has identified three dimensions of task performance -- work quality, time savings and signals of competence -- that are often critical to the productivity of knowledge work.

The first key implication is that it is unsafe to assume that more knowledge sharing is always better. In fact, the researchers note, using too much of the wrong type of knowledge can harm project performance because there are costs as well as benefits involved. The second key implication is that it unsafe to assume that the net effects of using even the right type of knowledge are always positive. Instead, the design of a project team affects its ability to achieve the desired advantages of knowledge sharing. It is not uncommon for organizations to install costly knowledge management systems, such as document databases, or to spend time promoting knowledge-sharing forums among employees and others.

"These are big investments,\" says Haas, \"and organizations need to understand how to take advantage of them most effectively if they are to fully deliver on the tantalizing promises they offer\"

'

Managing: Effective Negotiation Seven Dos &amp; Don'ts

In this economy, being able to close important deals and negotiate better prices and terms is more essential than ever. But if you're worried that being a good negotiator means having to fight dirty, you're wrong – a negotiation should be an opportunity for give and take that results in a win-win situation for the participants involved. Learning how to negotiate effectively can help you achieve these winning results while strengthening business relationships.

Start improving your negotiation skills with these dos and don'ts:

Don't appear needy.

People can smell desperation. This will weaken your position and allow opponents to get you to make too large a concession or give too deep a discount.

Don't take it personally.

Getting your emotions involved will cloud your ability to make sound arguments and judgments. To keep yourself from losing your cool, think of yourself as a professional deal maker who will not be personally affected by the outcome of the negotiation. Take your emotions out of the equation.

Be prepared to walk away.

Being able to say “no” and mean it ensures you don't end up making a bad deal. Before going into negotiations – and before your emotions and the heat of the moment become part of the mix – set your walk-away point. Then if the terms offered do not match up to your expectations, walk away. This not only strengthens your position, it will also win you some respect.

Don't force it.

By dragging out negotiations that are going nowhere, you're wasting time and causing a lot of frustration. By pressuring your opponents to make an agreement they don't want or can't afford to make, you're creating bad feelings that could lead to mistrust and a wary working relationship. Remember, it's about give and take, and when neither party is willing to budge, the negotiation is over.

Further, like many things in life, it's beneficial to:

Do your research.

Good negotiators come prepared. They find out what their opponent's needs and wants are and what competitors can offer. They anticipate objections so they can counter them with arguments or other concessions.

Practice, practice, practice.

Like anything else, getting good at negotiating requires practice. Develop your confidence by practicing whenever you have the chance, whether it's at a flea market or at home with your family members. Get used to negotiating in your daily life.

Ask for it.

Many people dislike negotiating because they feel embarrassed or scared asking for things they want. But if you don't ask for something, you'll rarely, if ever, get it. In fact, you may be pleasantly surprised by what you can get if you ask for it. If the answer is “no,” then you have a starting point for your negotiations.

Those who are good at negotiating usually enjoy it. So don't dread or fear negotiations. See it as a fun exchange, a battle of skills, practice grounds for future negotiations, and more importantly, as a way to build up the client-vendor relationship and win terms, prices and deals that are advantageous for you and your business.

Managing: Employee Action Simply Unconscionable

An employee (not one of our customers) was moved to a less prestigious position but received the same pay. Both jobs were performed in an air-conditioned office in an eight hour day that began at 7:00am. . However, the new job offered little upward potential and prestige. The employee was simply moved to a position with a greater need in the billing department.

The instructions were simple, print the invoices, stuff the invoices in a window envelope, run the envelope through the envelope sealer, then run the envelope through the stamp machine.

Sounds simple enough to me. Easy job; no headaches. In fact, this person did the same job two years ago. What could go wrong?

Well, I'll tell you. Rather than placing the stamped envelopes in the mail basket, the employee crammed them into a cuby above the desk where they sat for five weeks. AR balances were rising whilst receipts took a dive.

Mean time, the IT guy had to add phone lines in the area, opened the cuby and invoices began spilling out onto the floor. As the IT guy feverishly re-stuffed the invoices back into the cuby, the CFO (Chief Financial Officer) noticed the ruckus down the hallway and perused by to see what the excitement was all about. You should have seen his face when he realized that over 1.7 million in invoices where "here instead of there"! Ready to be mailed instead of ready to be paid! Good thing you didn't hear what he said!

When asked why, the employee responded "You never told me to mail them!"

Should this employee "get off on a technically"?

In my book, employees should exert themselves mind and body as agreed for the companies benefit during working hours. And if you have a question or see a gap in the process, it is the employee's duty to ask!

If you require additional information or assistance with this item, please give us a call.

Managing: Home Office - This Is How We Do It

It probably comes as no surprise that many organizations are prepared to foot part of the bill if you work from home. Or you might be contemplating a home-based business. Setting up a home office sounds easier than it is, but at the same time, is pretty simple. You just need to have some foresight into devising the office space you want to work in.

Of course if you're going to be in that home office all day, you should push for maximum comfort and efficiency. But even that doesn't have to break your bank account.

1. The Desk: It's easy to go cheap with pre-fab furniture. But if you're going to be working at home all day (even if not) you can still find a nice desk. Can't afford a new one? Check out craigslist.com to find furniture in your own area. You can also find a cheap quality furniture at office furniture stores. The small mom-and-pop shops often have floor sample discounts and other deals that push Wal-Mart or Target fiberboard desks to the dust. Not to knock the big box stores, though. Some of their materials are very sturdy and you can even find a good desk there if you wait for close-outs.

2. Embrace technology:

Again, it depends what your needs are out of a home office. But if you're going to run a business from it, I highly advice putting money into an all-in-one machine that will print in color, copy, fax, and scan (if you don't already have separate machines). They work well and take up less space. I have a Brother MFC 5860 All-In-One. It has USB, Network, and WiFI capability. I paid $99.00 dollars (Office Max). I usually buy quality machines that reach the end of their sales cycle. Six months ago this machine listed for $499 - big savings.

A good computer is key. Depending on what you do, though, you may not need the speediest, top-of-the-line machine. Laptop VS Desktop - Option call. But since you will probably want your computer to last a few years, buy name brand and do it right. Again, closeouts can save much coin. My Toshiba, (Pentium Dual Core 360 gig drive 4 gigs ram) listed for $1995.00 six months ago but I found it at Circuit City for $449.00.

Internet access: DSL is OK - Cablemodem is better.

Network: WiFI works but wired network is much more reliable

WiFI: Stick with 802.11g - 802.11n is not ready for prime time

FAX: Unless you do a lot of volume, fax services are the way to go.

Phone Service: Voicepulse gives me unlimited long distance and every calling feature imaginable for 49.99 a month and their system is never down.

Managing: Use Fishbone Charts To Attack Complex Problems

Problems arise on many projects. A proactive project manager should have a set of problem resolution techniques that can be applied in different instances. One technique for analyzing complex problems that appear to have many interrelated causes is called a “cause and effect” diagram. Because of its shape, this technique is also called a Fishbone Diagram. (Another name you might hear for this technique is an Ishikawa Diagram. This is named for Professor Kaoru Ishikawa, a Japanese professor who pioneered the diagram in 1943.) Some benefits of a Fishbone:

Diagram include:

  • It allows various categories of causes to be explored.
  • It encourages creativity through a brainstorming process.
  • It provides a visual image of the problem and potential categories of causes.

The following description and examples show how the problem-solving technique works.

First, describe the problem on the far right side of the diagram. This may be the actual problem or it may be a symptom — at this point you’re not exactly sure.

Draw a long horizontal arrow pointing to the box. This arrow will serve as the backbone from which further major and minor causes will be categorized and related. (See Figure A.)

Figure A

\"Figure

Identify potential causes and group them into major categories along the “bones” of the Fishbone Diagram. You should brainstorm to identify the major categories; at this point, you shouldn’t be concerned if there’s disagreement about whether a category holds the potential cause — just put them all up. Make sure to leave enough space between the major categories on the diagram so that you can add minor detailed causes in later. (See Figure B.)

Figure B

\"Figure

Continue to brainstorm the causes by looking at more detailed explanations for each of the major cause categories identified above. The team should ask whether each category is a cause, or if it is a symptom. If it’s a symptom, try to identify the more detailed causes on slanted lines that hook up to the appropriate major category lines. (See Figure C.)

Figure C

\"Figure

Sometimes, the detailed causes will have other, more granular causes coming off of them. If so, connect additional lines to the detailed lines. Three levels of detail is usually the practical limit for this diagram.

When you finish brainstorming major causes/symptoms and more detailed causes and symptoms, the team can begin analyzing the information. Evaluate each major cause and the potential detailed causes associated with it. Remember that the original list was compiled by brainstorming where all ideas are included. Now, you must determine which items seem more likely to be the cause (or one of the causes). Circle the items that are most likely and need to be investigated further.

If there’s not an obvious consensus on the top areas to investigate, use some sort of voting system to formally narrow down the top choices with the biggest chance of success. For each item circled, discuss how the item impacts the problem.

Once you circle the causes that appear to be the most likely, you should create an action plan for attaching these causes. This will most likely involve some high-level actions and assigning the cause to a team member to be analyzed outside of the meeting.

Remember that this technique is used for complex problems with multiple causes and allows you to identify potential causes for the problem and determine which ones are most likely to be resolved.

Master Microsoft Office Spell Check

You use Microsoft Word's spelling checker every day, and probably just as often encounter some of the tool's puzzling behavior. Do you know how to get rid of a word that you mistakenly added to its dictionary, for instance, or how to hide the red wiggly lines that appear all over your document?

The following ten tips will help you to work more efficiently in Word 2010, and they will even make you and your documents look smarter.

1. Control the 'Check Spelling as You Type' feature
This default feature reviews spelling within your document as you work, indicating with a red wiggly line any words that are missing from the spelling checker's dictionary. The feature can be distracting, but it's easy to disable. To do so, choose File, Options, Proofing, click the Check spelling as you type checkbox to clear it and reverse the current setting, and then click OK.

2. Check foreign-language spelling
Word isn't naturally bilingual, but you can train it to process more than one language at a time. Ordinarily, when you're working on a document that includes text in, say, French, Word likely won't recognize the other language if you've set your primary language to U.S. English; in this case, Word will add wiggly lines under the assorted foreign words, suggesting that they are all misspellings.

You can avoid that situation by setting Word to check the French text using a French word list. To arrange this, select the text in French (or whatever foreign language you're using), and click the Review tab on the Ribbon toolbar. Then click Language and choose Set Language in the Proofing group of buttons. The Language dialog box will appear. Here you should click the language to use for the selected text; the listed languages displaying checkmark icons are available for use in checking spelling. Click OK to finish.

3. Add unusual words to the dictionary
If you know ahead of time that you will be using some unusual words, and if you do not want Word to report them as possible misspellings, you can add them to the dictionary.

Choose File, Options, Proofing, and click Custom Dictionaries. Click the custom.dic file--or the name of the dictionary to add the words to, if you are using a special dictionary--and click Edit Word List. Type a word, and click Add. When you're done, click OK to exit the dictionary.

Adding words one at a time is sensible if you have only a few. But if you have a long list of words to add, it's best to do so by editing the dictionary file itself.

First, from the Custom Dictionaries dialog box, make a note of the file-path entry that shows where the custom.dic file is located. Then launch a plain-text editor such as Notepad or WordPad, and use it to open the custom.dic file. Type or paste your words, one word per line, into the document and then save it. Word will automatically sort the items into alphabetical order when it next uses the file.

4. Remove misspellings in the Spelling Checker
If you add a misspelled word to the dictionary by accident, Word won't identify it as misspelled until you remove it.

Choose File, Options, Proofing, and click Custom Dictionaries. Select the default dictionary in the list; typically this is the custom.dic file. Click Edit Word List to open the custom.dic dialog box, which contains a list of words you have added to Word's custom dictionary. Scroll down the list, click the errant word, and then click Delete and Close. In the future, if you use this misspelling in a document, Word will properly flag it as a mistake.

5. Determine what the Spelling Checker checks
Depending on the type of work you do, you may discover that Word either finds errors where none exist, or fails to catch the embarrassing errors you do make. For some terms, such as email addresses, URLs, or items containing numbers, you can decide whether Word checks their spelling or leaves them alone.

Maximize Cell Phone Battery Life

The idea that mainstream technology is built to eventually malfunction may be less of a conspiracy theory and more grounded in fact than we realize. This is for a couple reasons. First, making long-lasting equipment is expensive. Second, companies want you to come back and upgrade your equipment periodically.

For cell phones, the life span seems to be about two years. The main threat against cell phone durability isn’t the memory card that holds the address book, nor the fancy screen that shows the numbers. The problem is: battery life. After a year or two of reliability, older phones may last a day on one charge, if not just a few hours.

Fortunately, there are precautions you can take to extend battery life:

Read More - Click Here!

Meeting Tick Offs

We've all found ourselves in meetings where things rapidly drift off track. Conversations drift off track. Ideas are conflated, strange concepts breed in the conversational undergrowth, and an enraged leader eventually tears off his shoe and pounds on the table. Eventually a dead horse comes wandering in so everyone can engage in some ritual flagellation.

If you take away from the above that I don't much like meetings, you'd be right. That said, I do know a thing or two about how to pull them back on track. I'm also occasionally known to be abrasive, frustrating, and pushy, so take what I have to say on this matter with a grain of salt.

Step One – Ruthlessly discard the irrelevant It's amazing how easy it is for people to drift off course when presented with irrelevant details. We create the most confounding connections between two completely unrelated pieces of data, then defend that connection to the death. The arguments about these things can last for days, weeks, even years. Even bringing them up in meetings wastes time, and wasted time is wasted life.

My personal mistake here is not so much in the ruthless winnowing out of the irrelevant as it is in my forgetfulness about the emotions involved. People attach great personal importance to the things they pursue. Otherwise, why would they bother? Just because I don't agree with them, or want to stay focused on dealing with the meeting's “mission” doesn't mean that my goal is the goal of all the other meeting participants.

Step Two – Cut people off after the third iteration Iterations are good in projects, better in writing, and absolutely horrible in meetings. Unfortunately we seem to have learned, somewhere, repetition is the key to success in all communications. If we repeat the same words often enough others will come to believe them simply because they hear them often enough.

My personal inclination is to cut people off after they have repeated themselves for the third time. Especially when the repetitions involve something wholly irrelevant, or even worse just discovered to be irrelevant, to the meeting's purpose. As a rule, though, people tend to like their iterations. It makes them feel like they have accomplished something when they say the same things over and over again. Taking away that feeling of accomplishment will not make you popular.

Step Three – Point at the elephant in the room The truth, any truth, is rarely welcomed in a meeting. If someone in a meeting asks you if you can “speak truth to power”, what they really want to know is if you are dumb enough to point at the white elephant in the room and tell everyone about it. They already know about it; they just won't do anything about it for their own emotional, political, or practical reasons.

Me, I point at the elephant. There's a part of my personality which simply cannot, and will not, allow people to prattle on and on about something minor when we need to address the big issues. I'm working on keeping my big mouth shut, but it's kind of a struggle most days.

So there you have it - three lightning fast ways to tick people off in meetings. Use them with care

Microsoft Really Wants You To Upgrade To Windows 10 - Why

 

Photo

--

Are you still running Windows 7 or 8 because you like it? Too bad. Microsoft says it's time for you to upgrade to Windows 10 and is taking steps to make it almost automatic.

Beginning in 2016, Microsoft is adding the upgrade to Windows Update. Currently, users can either accept all the updates automatically or be notified that updates are available, then pick and choose what they want to load.

“Early next year, we expect to be re-categorizing Windows 10 as a Recommended Update,” Microsoft's Terry Myersonwrites on the company blog. “Depending upon your Windows Update settings, this may cause the upgrade process to automatically initiate on your device.”

Users still have some control

However, Myerson says before the upgrade changes the operating system of your device, you will have the chance to choose whether or not to continue. If you do go ahead with the upgrade, which Microsoft strongly recommends, you'll have 31 days to go back to your old operating system.

“We understand you care deeply about what happens with your device,” Myerson said. “This is why – regardless of your upgrade path – you can choose to upgrade or decline the offer. That being said, we would encourage everyone to upgrade because Windows 10 is the best Windows ever – familiar, safer, faster, and full of innovations.”

Microsoft says it is encouraging the rapid move to Windows 10 because it says the new operating system has better security and more features than older versions of Windows.

Computer users might be a little sensitive because of what Microsoft admits was a mistake in mid-September and has moved to correct.

According to Computer World, Microsoft began pre-selecting the optional upgrade to Windows 10 in its update, resulting in the download and installation of the new operating system on a number of computers running the older operating systems.

“A bug perhaps,” writes Computer World's Gregg Keizer, “but one that Microsoft will turn into a feature in 2016.” 

Microsoft Really Wants You To Upgrade To Windows 10 - Why

 

Photo

--

Are you still running Windows 7 or 8 because you like it? Too bad. Microsoft says it's time for you to upgrade to Windows 10 and is taking steps to make it almost automatic.

Beginning in 2016, Microsoft is adding the upgrade to Windows Update. Currently, users can either accept all the updates automatically or be notified that updates are available, then pick and choose what they want to load.

“Early next year, we expect to be re-categorizing Windows 10 as a Recommended Update,” Microsoft's Terry Myersonwrites on the company blog. “Depending upon your Windows Update settings, this may cause the upgrade process to automatically initiate on your device.”

Users still have some control

However, Myerson says before the upgrade changes the operating system of your device, you will have the chance to choose whether or not to continue. If you do go ahead with the upgrade, which Microsoft strongly recommends, you'll have 31 days to go back to your old operating system.

“We understand you care deeply about what happens with your device,” Myerson said. “This is why – regardless of your upgrade path – you can choose to upgrade or decline the offer. That being said, we would encourage everyone to upgrade because Windows 10 is the best Windows ever – familiar, safer, faster, and full of innovations.”

Microsoft says it is encouraging the rapid move to Windows 10 because it says the new operating system has better security and more features than older versions of Windows.

Computer users might be a little sensitive because of what Microsoft admits was a mistake in mid-September and has moved to correct.

According to Computer World, Microsoft began pre-selecting the optional upgrade to Windows 10 in its update, resulting in the download and installation of the new operating system on a number of computers running the older operating systems.

“A bug perhaps,” writes Computer World's Gregg Keizer, “but one that Microsoft will turn into a feature in 2016.” 

Microsoft Really Wants You To Upgrade To Windows 10 - Why

 

Photo

--

Are you still running Windows 7 or 8 because you like it? Too bad. Microsoft says it's time for you to upgrade to Windows 10 and is taking steps to make it almost automatic.

Beginning in 2016, Microsoft is adding the upgrade to Windows Update. Currently, users can either accept all the updates automatically or be notified that updates are available, then pick and choose what they want to load.

“Early next year, we expect to be re-categorizing Windows 10 as a Recommended Update,” Microsoft's Terry Myersonwrites on the company blog. “Depending upon your Windows Update settings, this may cause the upgrade process to automatically initiate on your device.”

Users still have some control

However, Myerson says before the upgrade changes the operating system of your device, you will have the chance to choose whether or not to continue. If you do go ahead with the upgrade, which Microsoft strongly recommends, you'll have 31 days to go back to your old operating system.

“We understand you care deeply about what happens with your device,” Myerson said. “This is why – regardless of your upgrade path – you can choose to upgrade or decline the offer. That being said, we would encourage everyone to upgrade because Windows 10 is the best Windows ever – familiar, safer, faster, and full of innovations.”

Microsoft says it is encouraging the rapid move to Windows 10 because it says the new operating system has better security and more features than older versions of Windows.

Computer users might be a little sensitive because of what Microsoft admits was a mistake in mid-September and has moved to correct.

According to Computer World, Microsoft began pre-selecting the optional upgrade to Windows 10 in its update, resulting in the download and installation of the new operating system on a number of computers running the older operating systems.

“A bug perhaps,” writes Computer World's Gregg Keizer, “but one that Microsoft will turn into a feature in 2016.” 

Mistakes Small Businesses Make

(Huffington Post) There can be no definitive manual on setting up and running a small business. It's one of those things that you inevitably only learn through your own experience. The successes and failures of others, however, can provide extremely valuable information to guide you on your path. So from my own experience and from the common stories I hear from being involved with over 4000 small business clients, I have compiled what I see as the five biggest mistakes people make when running a small businesses.

1. Underestimating the Amount of Effort Involved

One of the biggest frustrations I have in business is how simple and quick it is to have an idea, but how long and how much effort it takes for that idea to actually manifest itself as a living reality. In business, things seldom go exactly to plan, they take longer than expected and almost always require more resources to complete than originally planned. Being aware of this and cooperating with it allows you to plan more effectively and alleviate a lot of surprises and stress.

Also when you're running a small business you are responsible for everything so anything that hasn't been delegated will always end up on your plate -- this can accumulate to be a huge amount of "stuff." So be realistic, be prepared, keep things as simple as possible and try to delegate or out-source aspects of your business as soon as you can.

2. Not Having a Plan

Unless it's part of an investment pitch I personally don't think you don't need a lengthy and highly detailed business plan, but you still must have a plan. Without one you'll be making reactive decisions without perspective. So you need a focus, strategy and game plan to use as a guide and reference point. Use your plan to pull you out of the endless barrage of daily tasks, remember where you are going, course correct and prioritize if need be, and then get back into it. Have business goals at three months, six months, one year, two years and five years. Keep your plan simple and realistic so it can be easily revised as the needs goals of your business change.

3. Failing to be Agile

Just because you have a plan doesn't mean everything will go to plan. It is important to have a clear focus but it is equally important to be flexible. You need to be very mindful of what is and isn't working. Quite often the business you start will not be the business that you end up with. It will morph and change. Keep your eyes open for the opportunities and the possible threats. Be willing to shift your focus into what is working. Holding on too tight to your original ideas or plans of how things "should" go and fighting for that plan may not be your best path for success. Be flexible and go where the money is, not where you want it to be. Among the advantages of being small is that you can adapt quickly. Be open to the feedback that you get from staff, customers, and competitors, and be willing to course correct.

4. Not Hiring Help

Know what you are good at and not good at, and be realistic about how much time you have. It can be easier to identify what we are good at but it can take real honesty and vulnerability to look at yourself and assess your own weaknesses.

From my experience the greatest momentum I have had in my business was when I let go of what I wasn't great at and hired people who are great. When running a small business there is a tendency to want to do everything yourself. It seems logical to save money and keep control, but both of these motivations can be very limiting. When you are in touch and attuned to the reality of what you are good at and bad at you will be placing yourself and the business in the best possible context for success. Do what you do well and look to hire, or out source, in those areas that you are weak.

5. Not Keeping Your Bookkeeping in Order

If you think this point sounds boring or unimportant you need to pay attention. Without accurate bookkeeping you are flying blind. Imagine driving a car and suddenly closing your eyes -- it can be that dangerous. Whether or not you're a numbers person, you need to make sure your bookkeeping and finances are kept in order, and then pay attention to the figures.

Ultimately the success or failure of your business is measured by your financial records. The more accurate your records are the more informed you will be to make intelligent decisions about the business and to course correct when needed -- whether that's avoiding trouble or capitalizing on what's working.

You may have heard that "what you do after you fail determines your ultimate success," so try and make your failures as small as you can. Expect to make mistakes, but plan to succeed. Be focused but stay flexible. Be creative but be open to the experience of others.

Moving The Server Room Case Study By Trevor Maingot and Todd Brigham

Our information systems department was charged with the objective of combining two offices—totaling 110 people—and relocating both offices, their server rooms, and their entire IT infrastructure to a completely renovated building. And we were supposed to do it all in three and a half months.

As soon as we got word of the move, we scoured the Internet looking for advice on how to perform such a task. We came up with precious few tips. Mostly, we discovered a lot of generalities, such as “plan, plan, plan” and “make contingency plans because things will not go as planned” and “communications will be the most critical and difficult aspect of the move.” Obviously, most of these “tips” are self-evident and not very helpful.

Thus, now that our move is successfully completed, we decided to put together some documentation on how we did it so that our experience may help others in a similar situation. These are the highlights of the move and the things we in the IS department felt we did right, as well as what could have been improved upon.

Preparations

Appoint a project manager and assemble a relocation committee

Key people from each department must be in on the move, and appointing a project manager to oversee the operation can ensure that this happens. Naturally, IS/IT will be a key department during the move and can make or break the project depending on how things go. Communication between the groups is critical for planning and executing the move efficiently.

Do not procrastinate

Like us, most IS departments are probably barely keeping up with their general day-to-day tasks and when it comes to the relocation project, it would be easy to keep saying, “We’ll start next week.” Don’t put it off. Start planning as soon as you know about the move. The time goes by very fast, and you will be depending on a number of departments, vendors, and other partners to help you. They may require some significant lead time.

Give yourself a cushion

When negotiating with your general contractor (if you are building or expanding), make sure you give yourself a cushion from the time the contractors finish working to the time you move in. Our project manager agreed to a contract with the firm renovating the building that called for the contractors and subcontractors to be out by 5:00 P.M. on the last Friday of the month. That was the same time the movers would start moving things in. This turned out to be one of the most critical mistakes that occurred, and it came close to derailing the whole move. Movers were shoveling furniture in while contractors completed their painting, wiring, and odds and ends. Part of the problem was that we did not build in a tough enough penalty for the contractors not finishing on time, and the general contractor took full advantage of it.

Inventory and document your current systems

Conduct a thorough hardware inventory and get a complete understanding of how your current system works and how it will be transformed when it moves to the new building. Until a few months before our move, our documentation was rather slim on what machines we had and how the LAN and WAN were laid out. We had a pretty good concept in our heads of how everything worked, but when we laid it all out on paper, we found we were mistaken on a number of key points.

To create an inventory of all our machines, we used Blue Ocean’s TrackIT (www.trackit.com) software, which allowed us to remotely retrieve all the hardware and software making up each computer in the company. Once this was done, we could assign asset numbers to everything and use the reports TrackIT generated to make sure that all the machines were properly accounted for and positioned during the move.

Documentation of the WAN and phone circuits took a fair amount of time, and we discovered that we had a number of data circuits we were still paying for but no longer using. We photographed all our installations and put these, along with Visio drawings of all the equipment and their connections, into a communications binder. This binder helped tremendously when we met with various vendors to explain what we were proposing. Shortly before the move, we made a detailed inventory of the critical servers using Ecora (www.ecora.com) in case we had problems with them after the move.

Start a project binder

On the first day of the project, we put together a project binder. At the front of the binder, we put a zip-lock pouch for our pens, keys, and other odds and ends we needed. Next came a couple of pages stapled with all the business cards we collected during the project. We used these pages a lot. The rest of the binder was divided into four parts: Data, Phones, Move, and Configuration. In the back of the binder, we stored our large floor plans.

As time went on, the binder became unmanageable with all the information we added, so we created further subdivisions. The binder was our bible, and it went with us whenever we went to the new building. In addition to the binder, we kept a running log of all the conversations we had with various people, along with the action items that came out of those conversations. This turned out to be useful for reminding vendors of things they promised to do and then conveniently forgot as work progressed.

Meet with the vendors

As early as possible in the project, identify all the contractors and vendors you will need to help you and come up with a list of questions you will need to ask. At the beginning of the project, we used some mind-mapping software and a couple sessions of brainstorming to come up with an overview of the move and to identify which vendors were needed to help us. This early brainstorming showed us that there would be a considerable change in our LAN, WAN, and phone configurations and that if these were not handled properly, it would cause immense problems.

As soon as we could, we called in the main vendors. The phone guys would take care of our internal phone circuits and voice mail, while the telco would handle the external phone and WAN circuits. The ISP (in conjunction with the telco) would switch over our Internet service, and finally, the consultant—an individual from a company we had just hired to look at our current IT situation—would help us with the logistics of the move. One of the chief praises we heard from all concerned was the amount of lead time we had given them. Everyone told us horror stories of people leaving the phone, WAN, and ISP connections to the last minute and paying the price for doing so. Still, even with the long lead time, we experienced trouble with some of the vendors.

Meet with the builders

Schedule time with the architect (if necessary), the general contractor, and subcontractors as soon as possible. If there are previous tenants of the building, try to meet with their IS/IT people as well. In our case, the previous IS group left us server racks, custom patch cables, and Krone patch panels, which ended up saving us a huge amount of time when we moved—not to mention a considerable amount of money.

With the vast changes taking place within the building, it was not feasible to use the current LAN and phone wiring. Our consultant and the LAN subcontractor both recommended we proceed with all new Cat 5e wiring, which we did. In our opinion, to use any of the current wiring would be asking for trouble. The meeting with the contractors allowed us to get our ideas on the table early. We determined that we would come up with the room-numbering system, the number and placement of LAN/phone drops, the layout of patch panels, etc. The contractors then gave recommendations on the best way to accomplish what we wanted.

Plan the physical room layout

One of our first objectives was to lay out the room-numbering system and determine what equipment would go in each room. We broke the floor plan for the building into logical suites that could fit on four single 8.5" x 11" pages. We then made up two floor plans, one that showed where each computer, fax, printer, and modem went, the other showing the layout of the individual drops in each room. Copies went into the project binder and were given out to all contractors and move committee members to ensure that we were all on the same page when it came to what happened in each room. This turned out to be a never-ending task because the floor plan changed numerous times, as hard as we tried to keep it nailed down. We had to redo our numbering scheme on more than one occasion.

We also made schematics of the LAN and phone patch panels showing where each connection terminated and gave them to the wiring subcontractor. This documentation proved to be tremendously useful and allowed us to switch phones and computers between rooms with the greatest of ease, unlike in our previous poorly documented building.

Plan the new network

We had a fair idea of how we wanted our new network to look. After sketching it on a white board with the help of our consultant, we transferred it to Visio and added it to our project binder. We set up the network so that each switch would have a logical part of the organization attached to it. That way, if there was a problem, we could instantly spot which switch/circuit it was on, and traffic would be localized to specific switches for specific areas. We adjusted the IP subnet arrangement we had for our current system.

Plan the power consumption and server setup

This would be the first time that all our servers would be together in one room, and a quick look at the power consumption showed us that our current UPS setup would not be able to keep all the servers, switches, and routers up for any length of time if the power went out. This led us to find out all the volt ampere statistics for the equipment that would be plugged in to the UPS units and showed us that we would have to purchase an additional UPS.

Plan the server room layout

Our current room was a narrow corridor with the backs of the servers and equipment racks right up against the wall. Behind the racks was a tangle of wire that was almost impossible to get through to see the connections at the back. Our new room would be different. The servers would be mounted on mobile server racks that had ample room for books, tapes, tape drives, and other devices. The racks would stand off from the wall by a couple of feet so that we could get behind the rack to the connections on the back of the servers. The switches would be mounted in an adjourning room on racks left by the previous occupant. These stood away from the wall, giving us lots of room to get behind when we needed to.

We made sure that we had plenty of cabinet space, but we had to give up some workbench area. It turned out to be a good tradeoff. We installed a separate HVAC unit to keep the room cool, as the building A/C was switched off during the night. We worked closely with the office manager who was in charge of moving the furniture for each office. She gave us layout diagrams for each room so that we knew which jacks to make hot well before the move.

Manage the phone company

Our first meeting with our telco allowed us to hammer out what we would need for the move: new phone numbers for our direct-dial numbers, new fax numbers, new frame relay, and point-to-point WAN connections. The most critical need was for the new phone and fax numbers. Keeping our old phone numbers would have been very expensive, but we were able to secure a block of numbers that allowed us to keep our last four digits. Only the prefix would change. The fax numbers would all change too. We had to keep nipping at the telco to get the information to us as soon as possible since new stationery, letterheads, business cards, and other items had to be purchased, and letters with address changes had to be mailed out to customers and vendors.

None of this could go out until we had a firm commitment from the telco that the numbers were written in stone. It took a few weeks for this to happen. Telephone companies definitely move at their own pace—a snail’s pace, in most cases. We also started working on the ISP cutover. This seemed as if it would be straightforward, except for the fact that the telco had to install the line that our ISP would connect over. (For a while, this situation seemed as if had disaster written all over it, as we will see shortly.)

After the phone and fax numbers were nailed down, we had to assign them. We built an Excel spreadsheet that could be sorted by name, room number, four-digit extension, old number, and new number. This made life a lot easier when the inevitable changes came about. We gave the spreadsheet to the phone guys early on, and they were able to make sure that we had all the equipment necessary to support the required amount of people.

Build A Time Matrix

Early in the project, we used Project 2000 to start building a timeline for the project using our own swags and those of the various contractors. The problem was that none of us was really an expert with Project, and we had a hard time showing who was doing what at various times. We eventually abandoned Project 2000 and went to a simple Excel matrix that had all our vendors and support organizations along the top and the days leading up to the move down the left side. We printed this out on a wide carriage plotter and taped it to our door. We then filled in who was doing what on any given day and put any extra comments out on the right side of the sheet. It was very easy to use and see what was going on at all times.

We entered critical events into our Outlook 2000 calendars with reminders set. This setup allowed us to see how the project was progressing at a single glance. As the time approached for the move, we broke out the tasks and put them on a checklist. We then printed the list and checked off the tasks as jobs were completed. It turned out that there were a number of details we did not see when we first started making our plans. We added these items to the checklist as we came across them. Writing down tasks became increasingly supremely important as the day of the move got nearer and life got more hectic. At the beginning of each month during the life of the project, we got together and made sure everything was still on track as we saw it.

Problem, problems, problems

As much as we tried to avoid problems through careful planning, they still reared their ugly heads. Most of the problems had to do with lack of communication, either between our vendors and us or internally, within the vendors themselves. The worst offender was our telco. We had been warned by many people to keep an eye on it and to not believe what it told us. This turned out to be true.

Our first hint of trouble came when a voice mail message from the telco installer told us that he had installed four new Network Interface Units (NIUs) in the new demarcation room. We wanted a PRI, a frame, and a point-to-point connection, so what the heck was the fourth? We took a look and found three NIUs but no indication as to what they were. By this time, we were figuring that NIU stood for Nonexistent Interface Unit. We tried to call the tech back on the number he left, but that turned out to be a wrong number. All this took place on a Friday.

The following Monday, the ISP told us that we were to have someone on site so that the telco could install the ISP connection and that it would not do it unless somebody was present. So we kept someone on site all day at the demarcation room—and nobody showed up. Irate e-mails went to the ISP, but they were directed in the wrong direction. It turned out that the telco had installed the circuit on Friday by accident and did not install the frame circuit we requested. A few days later, we got a call from a telco tech saying he was installing the frame circuit. Unfortunately, he was installing it in the wrong facility. Apparently, there was a mix-up in the paperwork, he said. No kidding! Eventually we got it all sorted out, or so we thought. The telco was not finished with us yet.

More problems down the stretch

As time got closer to the move, other problems arose. Some last-minute room changes caused the wiring subcontractor to mess up his LAN terminations. We had sent the changes to the electrical contractor, but somehow they never got to the LAN guys. For some reason, instead of swapping out the mismatched wires, they pulled all the wiring out and started punching them down again. Something was suspicious here, but we were never able to figure out what went on.

For a while, there was no activity at all, and the days ticked by. We had to start rattling cages for things to start moving. But by then, the project was in trouble. We could see it, the subs could see it, but the general contractor refused to see it. We would not be done by move day. We wanted the server room to be the first room finished so we could move our infrastructure in and have everything set up and ready for the day of the move. It was not to be. It turned out that the server room was actually the last room finished, which caused us a great deal more work than we bargained for. Having a week of cushion between the time the contract ended and when we moved in would have been of great benefit to all.

Where is the consultant?

As the move got closer, it became harder for us to find our consultant. We think he had another project that was taking up his time, and we were small potatoes to him. To help us with our routed environment we called on a router guy, another independent contractor we had worked with before who knew our setup well. Even though he came in at a late stage of the project, he turned out to be the most reliable of our vendors and bent over backward to see that our routed environment worked. In truth, we did not need our original consultant since our plans were sound and we were well prepared.

Advance configuration pays off

We made some major changes to the WAN environment involving frame relay and point-to-point connections to other facilities on circuits provided by the telco. Since our distrust of the telco was growing rapidly by this time, we started putting routers in place and configuring them to test the circuits. Naturally, there were problems, and the router guy grew to be on intimate terms with the telco’s tech support. But we were able to take care of the problems well before the move day. We now knew we had good connectivity to all our facilities, which was a good thing since the telco was about to let us down again. If we hadn't set up connectivity before the move, it would have increased our stress level many times and probably caused us to miss being up on Monday.

The final week

During the final week, we had conference calls with all our vendors to make sure that we were all on the same page. Even though the telco sounded like it knew what it was saying, it was to drop the ball yet again. Our telco account manager was heading out on vacation, but we got the phone and pager numbers of all the other reps we could find. As it turned out, we needed them. We packed up everything in boxes and labeled them with the room numbers they were bound for. It was a far less hectic week than we imagined it would be; however, the weekend would make up for it.

The movers

We can’t say enough about the moving guys. And believe it or not, it is almost all good. They were fantastic to work with and had moving down to a science. We had it in our heads that large, sweaty, gorilla-like individuals manhandling furniture and equipment over the space of five or six days would move everything individually. Not these guys. They told us we would be completely moved and basically set up over a single weekend.

One of the major barriers we had to a conventional move was that the two buildings we were leaving had no elevators. This was not a problem for these guys! They removed fire escape doors and railings on the second and third floors and brought in a high-lift forklift to get all the furniture down from the upper stories. Computers did not move with the furniture. All the computer

equipment from each room was picked up, bubble wrapped, and placed in what looked like a cupboard on wheels, which they called a gondola. When the gondola was full, it was covered in plastic shrink-wrap. All the gondolas were moved in a single truck. Every piece of furniture, every phone, every computer was tagged with the room number it was destined for. It did not work out perfectly, of course, but we could fault the movers for very little. They had great attitudes and they played a huge part in making the move as successful as it was.

The floor plans

Make sure the new building has large floor plans posted on the walls in as many places as possible. Ours were a bit confusing and caused things to move more than once after they were placed the first time. In addition, every room had a furniture position diagram and room number on it taped on the wall outside. The movers were able to place the furniture in the correct position immediately and had very few re-moves later on.

Making the move

When it’s time for the IS/IT department to physically tear down the equipment, get some help. Our IS group consists of three network/systems people and one database programmer: not enough to handle the move. We hired an intern who worked with us the previous year and hunted down a user who was pretty savvy with computers and had him help us as well. Everybody was busy during the teardown. Unfortunately, a number of users simply walked away from their machines and did little to prepare them, ignoring our instructions. To avoid this, you should send out a memo instructing them on how to prepare their desks for the move and follow up a few days prior to make sure that everyone understands the importance of this.

Our move took place over the last weekend in March. The accounting department shut down on Thursday evening. They were not getting new cubicles, so their current cubes were going to be removed and reassembled over Thursday evening and into Friday before the main move took place. The last thing we needed would be more contractors stumbling over each other on Friday.

Before the accountants started shutting down computers, we had them perform a few tasks for us so we would not be so busy running around helping them come back up on Monday. (These instructions applied to everybody, not just the accountants.) They had to delete all their printers since the printing environment and printer names would be changing. They also had to clean up any junk they had on the servers and on their own machines. Finally, they had to release their IP addresses, as many computers would be switching subnets. The teardown of server equipment was pretty straightforward. Everything was marked, and we knew where they would be positioned once they moved.

The ISP cutover took place in the morning. We had a spare router with a built-in CSU/DSU and a laptop with all the necessary IP addresses in place, so all we had to do was take it to the new demarcation room, plug it in, and get online with the ISP. After some confusion on the ISP’s part, the link came up, and one of our biggest worries vanished: E-mail and Internet access would be available on Monday.

Once we arrived at the new building, the mayhem started. Our server room was still not ready; the wiring contractor was still punching down and testing the LAN wiring. The fiber-optic backbone had the wrong connectors, the electricians were wiring the UPS in place, and the phone guys were muscling their equipment in. There were four people wedged into the telco closet, where the fairly dim light made it a pain to work. We should have had some fluorescent

lamps installed before we moved; it would have made life a lot easier. As we did not have a chance to set up our room before the move, it was piled high with boxes crammed with books, cables, tools, etc. If we had had a chance to set up the room beforehand, we could have had power strips, extension cables, patch cords, and handset cables all ready to go. As it was, we had to go scrambling through boxes to find these things.

By the end of Friday evening, all the servers, switches, and routers were in place and communicating. Saturday was spent hooking up and testing each patch cord as it was plugged into the patch panel. Doing this helped us catch a couple of bad cords and crossed wires. So much for the LAN wiring certification! The patch panels were all marked with the room number and socket number that corresponded to the faceplates in each room. This made it really easy for us to switch room layouts when users found their rooms were not set up as they wanted.

We had numerous problems with the telco and the local phone guys getting things going between them. For the most part, we left them to deal with each other, as we had enough on our plates.

Sunday continued with bringing the system up and hooking up workstations and phones. Even though the phone guys said everything was okay when they left, we found numerous problems that took a couple of weeks to fix. By that time, the individuals who set up our system were long gone on other jobs, and we had to make do with our regular tech, who appeared a bit lost at first. It took him awhile to get all the bugs ironed out. The battle with our telco took a lot longer. It put in an extra frame relay circuit we did not need in another facility, then took awhile to set things up the way we wanted. We thought we’d made what we wanted clear to the telco. There was probably more confusion within the telco than anything else.

Post-move activities

When Monday rolled around, users came in to find their computers and phones ready to use. However, it still took about two weeks for things to settle down enough for us to finally get our office set up. Our documentation paid off in spades. We were able to make a spreadsheet with the phone port numbers, phone numbers, and room numbers. This, along with clear markings on the phone patch panels, allowed us to fix phone wiring problems in a fraction of the time it would have taken us in the old building, and we did not even have to tone the lines.

The server racks on casters worked beautifully, and we were immediately able to move them about the room while the contractors finished working. It was easy to get behind the racks to plug in wires and plug other equipment into the power strips. We also pasted the names of the servers on the back of the racks so that we could figure out which was which from the back.

Final word

It was finally over. The project had been quite a pain because of the additional work we had to do over the last three months, but it was well worth it. We learned a tremendous amount about setting up an office from scratch, and we were able to come out with a better, more organized information systems structure in the end. We hope that our experiences documented here can help others have a successful and less stressful move.

My Windows 7 Upgrade Experience

I have to admit, Windows 7 leaves a lot less to fuss about than Vista. It’s nice to start your computer in the morning, do stuff on it all day, and not experience any difficulty.  I concede, it is much better than Vista. But there are things to consider...

Of course, us Linux or MAC users, still have to struggle with what isn’t there in Windows 7 that have been so common in Linux for years, the ability to work with multiple screens (panes or sessions). But I’ll take reliability any day! Perhaps Microsoft will catch up some day.

But will I upgrade any of my workstations to Windows 7 right now? No No NO. I find the initial investment to be prohibitive and nobody looks forward to the learning curve. 

They are not giving windows 7 away and this is no upgrade path from Windows XP.

Windows XP has proven to be very reliable over the long hull, and, as they say, “if it ain’t broke  don’t fix it. So I will leave all but my development workstation on XP (plus one Vista laptop).

But when it comes time to replace one of my workstations or laptops, I’ll take Windows 7.

One word of caution: Before ordering that computer with Windows 7, make sure Windows 7 will work with your printers, scanners, and software.

My computer is too slow - what can I do'

One of the most common complaints is: "My computer is too slow! What can I do?" There are actually a number of reasons why this could be happening, and luckily, a number of ways to solve the problem. Here are our top five recommendations to help boost your desktop or notebook speed and perrformance. 

1. Clean up your hard drive
A typical hard drive is crammed full of files you really don’t need. The less stuff that’s on your hard drive, the faster your computer will be.  

The best way to free up space on your PC is with the Windows® Disk Cleanup utility. To access it, go to Start -> Programs -> Accessories -> System Tools, and then click Disk Cleanup. You might need to specify which drive you want to clean.  

In the Disk Cleanup box, scroll through the content of the Files to delete list and check the items you want to remove. If you’re not sure what to get rid of, the safest bets are temporary Internet files and programs you’ve installed that you no longer use. When you’re done, click OK. 

If you don’t want to delete files altogether, such as things like photos and music or video files, consider moving them to an external hard drive. 

2. Get rid of visual effects
Windows Vista® comes with some cool visual effects, but they can drain system resources. Disabling some will speed your system. To do this, click on the Start button, and then Control Panel > System and Maintenance > Performance Information and Tools

Click on Adjust Visual Effects. You may be asked to enter an administrator password. Then click on the Visual Effects tab, and select Adjust for Best Performance. Then click OK. 

3. Scan for viruses and spyware
One of the main culprits of sluggish PC performance is malware: viruses, spyware, Trojan horses, worms, and other kinds of malicious unwanted software. If you don't already have some kind of antivirus protection installed, you should do so right away! Consider using Microsoft Windows Defender, which is included in Windows Vista, and is available as a free download for Microsoft XP SP2. Make sure to schedule an automatic virus scan at least once a month. You should also always keep a firewall running to help block malware from getting to your PC in the first place.  

4. Add more RAM (the easy way)
Adding system memory (also known as random access memory or RAM) can be a good way to improve a PC's performance. However, upgrading memory can sometimes be difficult and costly. Windows Vista now offers Windows ReadyBoost, which allows you to add memory without having to install anything. It allows you to use a flash memory device, such as a USB flash drive or a secure digital (SD) memory card, as an additional memory cache. 

5. Run a defragmentation utility
Disk Defragmenter is a Windows utility that consolidates files and folders on your computer's hard disk so that each occupies a single space, which in turn speeds up reading and writing to the disk. 

To defragment your hard drive, go to Start > Programs > Accessories > System Tools > Disk Defragmenter, then select the drive you want to defragment. Then go to Settings and make sure there's a tick beside the two options in the section When defragmenting my hard drive, then click OK twice to begin. When the defragmentation is done, you'll probably have to reboot your computer. 

After following these tips, you should notice an improvement in your computes performance.

RSS Feeds What are they and How Can I Use Them?

The days of getting the news by reading ten newspapers before breakfast are gone. Soon, you won't even have to scan all of your favorite online sources to be up on the latest news. There's a service that can do it for you – fast, and for free!

It's called Real Simple Syndication, better known as an RSS feed.

You've probably seen the little orange icons marked “RSS” already. Click on one and you'll enter a whole new speed zone on the information highway. 

What kind of information can you receive?
Imagine you are visiting a site that offers the RSS feature, a site like the HP Online Courses, HP Events or HP Promotions. If you like the content, click on RSS icon and subscribe to the site. When a new article is uploaded, you'll automatically receive a notification that includes the title and a short description of the content. If you're interested, click on the title and you'll be linked to the full article instantly. 

It doesn't stop there—RSS isn't just for articles. Pretty much any information source that can be broken down into discrete items can be syndicated via RSS: recent additions to blogs, details of special discounts, or alerts as to when new web content is available. 

You determine what you see by subscribing only to your favorite sources. When you do, you'll receive hot-off-the-press, customized information that you can conveniently and quickly scan. You can even see RSS feeds on wireless devices like your mobile phone or handheld.

How does RSS work?
To access RSS feeds, you need a feed reader (sometimes called a news reader or aggregator). This can be software that you install on your computer, or a service you access through the web. Feed reader software is generally free to download. 

There are a number of companies that offer the software, and since feed readers are constantly evolving, you may want to do a web or Wikipedia search to find the latest options for your needs and for your operating system. 

Web-based services require you to register as a user with the website providing the service. Some examples of web-based services are My Yahoo!, Bloglines and Google Reader. Mozilla Firefox®, Windows® Internet Explorer® 7 and Microsoft® Office Outlook® 2007 have feed readers directly integrated – one click and you've subscribed.  

To find more RSS feeds, visit one of the many Internet sites such as CompleteRSS, and Search 4 RSS that maintain large listings of available feeds.

How do you send your own content out in feeds?
Have your own site? Wish you could connect with your customers more often? Got a new blog with helpful how-tos? Install RSS functionality on your site, create a banner to get your visitors to subscribe, and start sending out your new content via RSS. 

If you want to reach a wider audience, you can set up an account with an online media distribution service like Feedburner. Your content will be aggregated and distributed to subscribers around the world. With RSS feeds, finding information is now a skill everyone can learn.

Need A Loan - Know What Banks Want

Most requests for bank finance are turned down, not because clients are a poor credit risk, but because they have approached their bank ill-prepared. Providing banks with what they want to see will enable you to get what you want on the first try...

CASHFLOW

Provide data that shows you understand and can manage your working capital (debtors, creditors and stock) and that the cash in your business is sufficient to cover the bank's interest (as well as other key costs such as tax, dividends and replacement capital). "Cash is king" and even profitable businesses can fail if cash is not managed. Understand your cash movements and you may even need to borrow less.

OUTLOOK

Present forecasts which communicate the amount required, payback period, risk and return to the bank. Figures should be more sophisticated than forecast sales and profit and should ideally show the relationship between profits, your balance sheet and cash flows. Sensitivity analysis is important to help the bank understand when they risk non-repayment. Forecasts should always be based upon the most up to date actual data.

MARKETS

Explain your market. Focus 20% of your efforts explaining what has happened and 80% on what you expect to happen and why. Do not worry, top economists sometimes get this wrong too. The point is you need to show the bank you have thought about it, considered the likely outcomes and that you have a clear action plan.

MIX AND QUALITY OF CLIENTS

Detail clients by name/industry/region/contract length. The strength of your clients and their ability to pay = the strength of your business. Building your business around one client is high business risk.

UPDATE

Give the bank up to date management information especially if annual accounts are dated. Information should be produced at least quarterly, split into division/region and include profit, balance sheet and cash flow breakdowns. Management information should be used to update forecast/budget data and any differences should be explained.

NEED FOR LIQUIDITY

Show the bank that your business is liquid and can survive. Tell them how quickly you get your hands on the cash and know your debt maturities, credit terms and what cash is tied up in assets. Think beyond a simple current assets/current liabilities ratio and consider your ideal liquidity position. Remember too much liquidity means assets could be generating a higher return elsewhere.

INCOME

Know your financial definitions. Are you talking about gross profit, operating profit, net profit or EBITDA (earnings before interest tax, depreciation and amortization)? All are common in the financial analysis of businesses. Also ensure you can discuss the seasonality and cyclicality of your industry.

COMPETITION

Tell the bank how you have you performed in comparison to your competitors? Be prepared to discuss your competitors' strengths and weaknesses. This provides confidence that you are a proactive management team that really understand the business.

ACTIVITIES

Break your business down by activity/division and tell the bank which activities are performing well and which are a cash drain and why. Explain how divisions complement or overlap each other and the strategy for each. Be ready with forecasts if necessary.

TRACK RECORD

Unless starting up, provide at least 3 years accounts to a bank (5 years ideally if approaching a new bank) and up to date management accounts. A bank will need this data for the financial analysis of the trends in ratios and margins. It will also give them confidence in your management track record.

EQUITY, DEBT AND THE BALANCE SHEET

Communicate your risk (equity/directors' loans) versus the risk to the bank. Know the real strength of your balance sheet by having current market values of assets to hand and full details of debt (including off-balance sheet exposure such as leases and guarantees). Be clear at the outset what security is and is not on offer.

About the Author: Forward Financials are experts in the financial analysis industry and as Qualified Accountants, Qualified Bankers and City Analysts combined we speak the language. With our comprehensive financial pack you can make a professional approach to lenders, shop around for the best deal and negotiate fees from a stronger position. We do not believe in a template approach as every business has different drivers and needs. We therefore build bespoke financial models to forecast sales, profits and cash flow. We also provide historic, competitor and market analysis.

Negative Review Responce by Julie Lin

Are you one of many business owners who lose sleep over a negative review? Worse, are you unaware of negative feedback about your business? Whether we like it or not, online reviews are here to stay and customers have more power than ever to affect our businesses. Rather than feeling upset, helpless, or even angry, you can take control of the situation by handling your negative reviews in a professional manner. Here are some guidelines to help you control potential damage to your reputation from negative reviews.

1) Check Your Reviews Regularly
It’s important to respond to negative reviews in a timely fashion.  If you respond quickly, the person who wrote the review is more likely to respond positively because you showed that you care.  Also, other Yelpers who are reading the negative review will have the opportunity to read your comments and see how you responded.

2) Thank the Reviewer
We should always thank Yelpers for taking the time to share their experiences.  Often, they are providing valuable feedback and suggestions. Treat your negative reviews like a suggestion box. In some cases, they can help you improve upon your customer service or business.

3) Acknowledge the Problem
If the gripe is legitimate, apologize for the situation and invite the reviewer to come back after you have rectified the problem. You may offer them a refund or an incentive on a future visit [if the situation warrants this type of action.]

4) Golden Rule – Customer is Always Right
If  you disagree with the complaint, do not show it.  Just thank them for their feedback and do not try to offer them an explanation unless their review contained a factual mistake.  Follow the golden rule of NEVER arguing with the customer.

5) Ignore the Haters
If you receive a verbally abusive review, do NOT respond. Flag the review and move on.  Unfortunately, there are negative people in this world.  You can’t win them all.

6) Always Stay Professional
What is more important than the negative review is what your potential customers think about your response.  No matter what is in the negative review, Yelpers will view you and your business by your reaction.  Stay calm, take the high road, and always stay professional.

Netbooks - Are They Ready For Prime Time Business Use?

Defined by it's small size, light weight, low price, horsepower, and operating system, Netbooks are becoming very popular. But are Netbooks ready for \"Prime Time\" business use?

Netbooks run either Windows XP Home edition or Linux (not only is Linux unfamiliar to many, but the versions of Linux on Netbooks are not the mainstream popular distributions like Debian, Ubuntu, or Red Hat). They do not run XP Professional, Vista, or Apple OS X. Microsoft arbitrarily restricts Netbooks from running the Professional Edition of Windows XP Professional. Likewise, Apple arbitrarily restricts OS X to Apple hardware and it has never played in the low-end realm that Netbooks occupy. Windows Vista requires too much horsepower to run on a Netbook.

Basic Netbook Spec:

Screen Size: 9 to 10 inches

Screen Resolution: Up to 1024x600

Processor: Intel Atom processor

Ram: Up to 1 gig

Storage: Up to 16 gigs (several models use ram drives instead of mechanical hard drives)

Price Point: Between $300 - $400

Interface: Usually a Ethernet port and/or WiFI

Operating System: Windows XP Home or Unknown Linux Desktop Distribution

Wow! Sounds Interesting! Specially the Price!

But are Netbooks ready to replace Laptops in Business or Corporate Networks???

According to Gartner Group analyst Leslie Fiering, “Netbooks are coming in as a 'second laptop' that workers are buying  themselves". It would be very surprising at this time if Netbooks were taken seriously as laptop replacements. After all, Netbooks run on Linux desktop operating systems or Windows XP Home. Linux does not run Microsoft Office, the flagship of business desktop applications, and nobody should be running XP Home on a business network for security reasons.

There are a few Netbook exceptions such as the HP 2140 Minithe,  the Acer Aspire One, Lenovo S10, and the Asus N10, ... that are more business-friendly  priced between $450.00 and $650.00. Buy why bother! At that price range you could buy a good laptop running XP Pro, Vista Business, and all of your corporate  sanctioned software.

Netbooks - Why Not:

1. Small Screen Resolution: Netbooks have either a 9\" or 10\" screen with a maximum resolution of 1024x600 VS a laptop with 14" to 17" screens and minimum 
1024x800. Netbook limited screen resolution makes it difficult for modern program applications and Web pages to work. And it is more than the pain of extra 
scrolling on a Netbook. Many of these applications, web pages, and pop-up screens will lock up a Netbook, or present an unclickable dialog box. The box may 
say "Click here to continue" but you can't see the click button. Typically, Netbook users running business apps end up rebooting their Netbooks many times to 
complete some simple tasks resulting in data corruption and a very frustrated Netbook user experience.

2. Itsy Bitsy Keyboard: Business users that do even a modest amount of typing may "go postal on you" trying to type on that itsy bitsy keyboard. The keys are 
smaller, closer together, and lack the touch, feel, and endurance of their business laptop counterparts.

Another major issue is that the keyboard is not a standard layout. Some keys may appear in a different place; some keys may require the pressing of a "fn" 
(function key) to access; some of the keys may be missing all together. This results in more productivity drain and user frustration.

3. Multitasking - What Multitasking: The Netbook standard Intel Atom processors with 1 gig of ram can run one application pretty good. But make one of your 
apps MS Outlook and anything else, or a large Excel spreadsheet and anything else, plus your AntiVirus software, and your are in for a long day!

Summation: Netbooks might good since for an entry-level home computer. But when it comes to the office, leave it at home!

Network Mapping Software

ManageEngine OpManager maps all the devices in your network to give detailed visual representations of your LAN and WAN. The maps are automatically generated and can be scheduled to always present the latest picture of your network; so you need not go back to creating maps when devices are added/moved/removed. Real-time status of devices and bandwidth heat maps help administrators quickly identify problem spots to then drill down and troubleshoot. The maps can also be exported into Microsoft Office Visio, edited and used for reference at the NOC/datacenter.

In addition to providing network maps, OpManager is also a monitoring, reporting and troubleshooting tool for your network. Used by over 8,500 businesses worldwide, OpManager is the flagship product from ManageEngine, the leading provider of low-cost enterprise IT management software. A free 30-day trial copy is available for download, with free support over a toll free number.

PacketTrap IT is a comprehensive and affordable network monitoring and IT infrastructure management solution. PacketTrap’s ease of install use combine with broad and deep monitoring capabilities to provide administrators with unprecedented visibility into the performance of the network itself, as well as the devices and applications running on the network. PacketTrap is able to monitor all the devices on your network, including routers, switches, firewalls, servers, desktops, VoIP, virtual servers and wireless access points. With PacketTrap’s own ptFlow technology you can monitor NetFlow, sFlow and J-Flow enabled devices, and even unsupported devices; ensuring that you can monitor traffic on all your network devices. The most common benefit PacketTrap users realize stems from our ability to pinpoint the specific problems on the network and see where its coming from. PacketTrap also provides automatically updated, easy-to-view network diagrams and advanced email and SMS alerts.

InterMapper provides an at-a-glance, real-time view of your network devices, services, applications, connections, and traffic patterns. Drilling down on maps and charts uncovers details needed to fix performance problems and keep mission-critical networks up to service level requirements.

InterMapper can be used for spotting and fixing performance problems, notifies you that the network performance threshold has been exceeded, makes sure that web, email, databases and other business-critical services are available 24/7 and overall network troubleshooting.

Leveraging a unique multi-level discovery technique, LANsurveyor automatically discovers your LAN or WAN and produces comprehensive, easy-to-view network diagrams that integrate OSI Layer 2 and Layer 3 topology data (including switch-to-switch, switch-to-node, and switch-to-router port connections). With two mouse clicks, this data can be exported into Microsoft Office Visio and easily shared with your colleagues.

Additionally, LANSurveyor will automatically track and account for changes to the network in real time with a unique continuous scan feature that can immediately detect new devices on the network and dynamically update the network map.

Download Spiceworks completely free customizable network mapping software for IT pros in small to medium businesses. *This is NOT a free trial, "freemium", or stripped down verision.* Spiceworks provides access to the entire software suite whether you're a one-person operation or you manage 1,000 network devices. And it's free forever - including live support and all product upgrades! In addition to network map capabilities, Spiceworks software also offers free access to: network monitoring and management tools, a full-featured help desk, troubleshooting fixes, asset management software, power management tools, and an online community of IT pros like you to answer questions, share tips, and solve IT problems. Download today - and share with your peers!

TechGenix Reviews & Awards:

SANDeploy Server is a powerful iSCSI target software for Microsoft Windows, that allows you quickly convert any Windows machine became an Multi-Target, Multi-LUN, Multi-iSCSI SAN in less than 1 minute. SANDeploy Server was designed for easy configuration, so any user can use iSCSI SAN without expert.

SANDeploy Server not only supports the common features but also a lot of features that the others do not have, such as: standard image disk device, physical disk device, physical optical device, virtual CD/DVD-ROM emulator and even SPTI device.

Edraw Network Diagrammer provides a common graphics technology for network mapping across departments and disciplines, helping IT professionals transform raw data into visual understanding.

Using the Edraw solution, network professionals can; Quickly assemble network diagrams using intelligent, data-driven shapes, Create accurate, up-to-date network documentation, Provide hyperlink to build the relation in Assets, Pre-defined network shapes to build networks, Accurately track assets and costs, Diagram directory hierarchies to produce migration scenarios.

WhatsUp Gold Premium edition is a powerful, proactive monitoring and management solution, designed to easily manage networks of all sizes, from SMB to enterprise. It’s tried, tested, and proven on networks just like yours – over 100,000 of them. With WhatsUp Gold managing your network infrastructure 24x7, your life as the network manager just got easier. WhatsUp Gold Premium ensures you have clear visibility, actionable intelligence and complete control to make not only fast decisions, but better ones. When you invest in WhatsUp Gold Premium to manage your network infrastructure, you’re not just buying some software, you’re teaming up with a company that’s been building robust, easy to deploy and hassle free network management solutions for nearly 20 years.

10-Strike LANState is a network mapping, monitoring, management, and administration software for corporate Microsoft Windows networks. LANState generates a network map, which speeds up accessing to remote hosts' properties and resources, and managing those. Scan your network, find hosts, place them on a network diagram, and monitor their state! The program can export network diagram to graphic image, Microsoft Visio, and XML scheme.

The program also includes a number of useful features for obtaining information on remote computers. LANState has a rich host monitoring functionality with multiple types of host checks allowing you to see the state of your network at any time. The program displays a network map, monitoring device's state (active/inactive) in real-time. You just click a tray icon at any time, and see which servers and computers are switched on, and which do not respond. Web access is also supported (LANState Pro).

 

Networking Two Buildings Together

From choosing the right physical media and conduit size to pulling cable to making long-term infrastructure decisions, networking two buildings is a challenging undertaking. These pointers will help you effectively plan and execute this type of project. 

1. Wireless may not be the best solution: Too often, when a team is contemplating how to connect two buildings, someone will offer a wireless solution. Yes, there are wireless solutions that will connect two buildings, and antenna boosting equipment for better service. However, a hard line connection is more reliable if installed in conduit correctly. Here's a general rule of thumb: "Use a hard line connection unless you can't".

Site-to-site connections using wireless connections are frequently disrupted by an obstruction, weather (in some technologies and applications), or interference. Also, wireless technologies have a shorter lifespan, as replacement technologies are rapidly developing for this market space.

2. When dealing with conduit, think big: Most building connections today will be a fiber connection in hard plastic conduit. This conduit is usually buried about two feet below the ground. When sizing out what type of conduit to use (even if you're working with a heavy equipment or installation professional), always think larger than you need.

Example: You can fit the bare cable of fiber optic networking in just about any size conduit. However, if this project is a "one of a kind' type, you may have some price pressure to deliver the best solution for the technology need. When you size up the equipment and supplies, you may require a set of fiber cutting tools to end the line at each point. But the most cost-efficient solution may be simply ordering a to-length fiber optic cable that's pre-terminated. In this case, you may save a great deal on fiber tools, but you should go up to the next size (and test the entire fit) for pushing a termination through conduit. For a recent project I did, we pulled two SC connectors through 1-inch conduit.
----------------------------------------------------------------------------------------------------------------------------
Best practice: When pulling fiber through a conduit, be careful with the line. Take the following steps to make it easier on the pull:

Get the pull line to the end of the conduit the easy way: Make a small ball of tape, put it in a plastic bag (sandwich size), tape the pull line to it, and pull it through with a medium duty vacuum on the end side.

Have conduit straightened out before pulling the fiber through.

Insulate the header of the cable well with electrical tape. Any pressure will then be taken by the tape instead of the connector or cable.

Have people on each side pulling at the end and feeding the cable into the beginning to minimize stress points.
-------------------------------------------------------------------------------------------------------------------------------

3. Go absolute cutting edge for physical media : Thinking for all future connections, select the best physical connection (usually fiber or multiple fiber lines) for what will be buried. You don’t want to have to dig it up or remove this connection once it's in place. It makes no sense to run CAT-5 over copper when in a few years, you may remove this medium for the backend of most networks.

4. Call before you dig!: Each state has a "call before you dig" service. A simple Google search of Call before you dig Ohio (or any other state) will take you to the site that can give you procedural information, underground line requirements for your state, and other important facts. When networking two buildings, you will want to use orange markings to identify the connection as a communications system. Most locations use orange for all communications media, but check your local requirements before starting any work and arranging your support staff for the project.

--------------------------------------------------------------------------------------------------------------------------------
Important safety note: Digging can be very dangerous, as there are many underground utilities, including gas and electric, that can be deadly. It goes without saying to follow all relevant precautions and enlist the services of heavy equipment and facilities or installation professionals for projects of this nature.

Best practice: When digging, it's advisable to have a team that's familiar with operating the necessary equipment to help you lay the conduit. A ditch digger may seem like a fun tool, but enlist your facilities maintenance staff or others more suited to operate this equipment.

---------------------------------------------------------------------------------------------------------------------------------

5. Run extra media through the conduit: While you're there, you may want to tag on an extra line or two. For example, if you plan to connect two buildings with a fiber connection, run an extra fiber and maybe a few CAT-5 lines as well. These extra lines may come in handy later. You can group relevant categories of connections in the conduit freely. You can't, however, run power through these lines--no mixing communications and power types. PoE (power over Ethernet) may be considered a power conduit instead of a communications conduit if you seek to pair it with another type.

6. Leave a pull string in the conduit: In case you decide to pull another type in the conduit in the future, leave a pull string (even high test fishing line does well) in the conduit. Simply tape it to the header of the piece you're pulling through and when you feed your fiber or other type in, also feed the pull string.

7. Avoid the telco whenever possible: If your buildings aren't very close together, you may not be able to avoid a telco for the connection. But in short-distance situations, you might be able to work out arrangements with local authorities and property neighbors to coordinate the installations of private conduit. If the two buildings are fairly close, it may be worth the effort and higher initial cost to get a private conduit instead of the ongoing cost of an ISP or carrier service.

8. Think below protocol layers: When designing the basic objectives of your connectivity project, don’t think in terms of VLANs and IP addresses at first. You want to establish your connectivity in a way that extends your manageability to the highest level, so focus on Layer 1 and Layer 2 of the OSI model. Who knows, we may dump TCP/IP in a few years anyway for something better, if IPv6 is not well received. You may also consider using WAN protocols for efficiency or segregation on this connection instead of simple TCP/IP configurations.

9. Share Internet connection points: The last thing any IT department wants is an additional monthly payment, so be sure to keep your Internet connection points centralized where possible. Ensure that your networking configuration allows you to manage the access by the different geographical locations (buildings), by user, or by some other manageable mechanism. Also, having two connection points (one in each building and a LAN connection between the buildings) poses a security threat of multiple entry points. However, a case can be made from a disaster recovery or business continuity perspective to have a backup carrier connection in another building, yet accessible.

--------------------------------------------------------------------------------------------------------------------------------
Best practice: Be sure that the Internet traffic, or any other traffic, is throttled, cached, or otherwise managed from a QoS perspective if there's a large number of clients or a lot of traffic in the other connection point.

--------------------------------------------------------------------------------------------------------------------------------

10. Make long-term infrastructure decisions now: For the network clients in the second building, make decisions about the local name resolution, file server storage resources, e-mail servers, and authentication/directory servers that may be local to the first building. Should the second building involve a small number of clients and less traffic, you may not want to have a true data room there. You can simply extend the back-end services from the primary building. But if the second building will double traffic to your server room--and possibly over a limited-speed connection--you may need to make some of those resources central to the destination.

New Google Algorithm Could Devistate Your WebPage Ranking

It's official. On January 19, 2012, Google announced that it will penalize sites with pages that are top-heavy with ads. Such WebPages will either disappear from Google Ranking or move down significantly. Google says, "Be mindful of having too many advertisements on any of your pages, in relation to "meaningful" content. There seems to be a direct correlation between the number of advertisements on a page (especially above the fold advertising), and the overall ranking of a page. Make sure you have plenty of quality, relevant content to balance out your web pages." The change  called the "page layout algorithm" takes direct aim at any site with pages where content is buried under tons of ads.

Google Continues: "This update is designed to reduce rankings for low-quality sites - sites which are low-value, copy content from other websites or sites that are just not very useful. At the same time, it will provide better rankings for high-quality sites - sites with original content and information such as research, in-depth reports, thoughtful analysis and so on. It is important for high-quality sites to be rewarded, and that's exactly what this change does."

Read More – Click Here!

Read More - Click Here!

 

Next Microsoft Patch Tuesday January 10

Microsoft’s first batch of patches for 2012 will include fixes for security vulnerabilities in the Windows operating system and Microsoft Developer Tools and Software.

In all, Microsoft plans to ship 7 bulletins, one rated “critical,” Microsoft’s highest severity rating. A critical bulletin typically deals with security holes that allow remote code execution attacks with minimal user action.follow Ryan Naraine on twitter

The Windows vulnerabilities will apply to all versions of Microsoft’s flagship OS, including the newest Windows 7 and Windows Server 2008 R2.

Microsoft also announced that one of the bulletins will fix an issue described as a “Security Feature Bypass.”  It is the first time Microsoft has used this label on a security update.

The patches will be released next Tuesday (Jan 10, 2012) at approximately 1:00 PM EST

Nissan Leaf 100 Miles per Charge - Did They Lie?

According to every ad and brochure Nissan put out, the Leaf gets 100 miles per charge. Because after driving this car for five months, I can tell you I have yet to get 100 miles per charge. The last three times I measured, it was 55, 58 and 58. My life now revolves around a near-constant calculation of how far I can drive before I’ll have to walk. The Nissan Leaf, I can report, is perfect if you don’t have enough anxiety in your life.

I told a friend of my disappointment, and his response was, to say the least, humbling. “You mean to tell me,” he said, “a car advertisement lied?” Click Here - Read More!

One Hour Of Downtime Enterprise

(ITIC) Over 95% of large enterprises with more than 1000 employees say that on average, a single hour of downtime per year costs their company over $100,000, over 50% say the cost exceeds $300,000 and one in 10 indicate hourly downtime costs their firms $1 million or more annually.

Moreover, for a select three percent of organizations, whose businesses are based on high level data transactions, like banks and stock exchanges, online retail sales or even utility firms, losses may be calculated in millions of dollars per minute.

Those are the results of ITIC’s 2013-2014 Technology Trends and Deployment Survey, an independent Web-based survey which polled over 600 organizations in May/June 2013. All categories of businesses were represented in the survey respondent pool: 37% were small/midsized (SMB) firms with up to 200 users; 28% came from the small/midsized (SME) enterprise sector with 201 to 1,000 users and 35% were large enterprises with over 1,000 users.

These statistics are not absolute. They are the respondents’ estimates of the cost of one hour of hourly downtime due to lost revenue and lost end user productivity. Additionally, these figures did not take into account the cost of additional penalties for regulatory non-compliance or “good will” gestures made to the organization’s customers and business partners that were negatively impacted by a system or network failure. In fact, these two conditions can cause downtime costs to skyrocket even further.

The overarching message is clear: downtime of even a few minutes is expensive and unwelcome. Only five percent of enterprise respondents said that downtime costs their companies less than $100,000 in a single hour.

There is well documented evidence from a variety of sources in recent years, tracking the rising cost of downtime in the Internet age where business is increasingly conducted 24 x 7. To reiterate, hourly losses of $50,000, $100,000 or even millions due mainly to lost productivity and lost business revenue are common.

ITIC’s own 2013 Technology Trends and Deployment Survey found 63% of large enterprises with 1,000 or more workers reported that one hour of downtime costs their business from $101,000 to $400,000 per hour exclusive of any litigation or compliance penalties.

  • Some 11% of large enterprises with over 1,000 end users indicated that a single hour of downtime costs their organizations $1 million or more, on average.
  • Only five percent of the large enterprise respondents said that an hour of downtime cost less than $100,000!

Consequences of Downtime

There is never a good time for a network, system or service failure. The hourly costs associated with downtime paint a grim picture. But they do not tell the whole story of just how devastating downtime can be to a business’ bottom line, its productivity and its reputation.

The ITIC survey data revealed that although monetary losses topped users’ list of downtime concerns, it was not the only factor worrisome to organizations. The top five business consequences that concerned users are (in order):

  • Transaction/sales losses
  • Lost/damaged data
  • Customer dissatisfaction
  • Restarting/return to full operation
  • Regulatory compliance exposure

Consider these scenarios:

  • Healthcare: A system failure during an operation could jeopardize human lives.
  • Banking and Finance: Unplanned outages during peak transaction time periods could cause business to grind to a halt. Banks might be unable to process deposits and withdrawal transactions and customers might not be able to access funds in ATM machines. Brokerage firms and stock exchanges routinely process millions and even billions of transactions daily, could conceivably lose millions of dollars if transactions or trading were interrupted for just minutes during normal business hours.
  • Government Agencies: A system failure within the Social Security Administration (SSA) that occurs when the agency is processing checks could result in delayed payments, lost productivity and require administrators to spend hours or days in remedial action.
  • Retail: Retailers and sales force personnel trying to close end-of-quarter results, would be hard pressed if an outage occurred, which rendered them unable or delayed access to order entries and the ability to log sales. This could have a domino effect on suppliers, customers and shareholders.
  • Travel and Transportation: An outage at the Federal Aviation Administration’s (FAA) air traffic control systems could cause chaos: air traffic controllers would find it difficult to track flights and flight paths, raising the risk of massive delays and in a worst case scenario, collisions. An airlines reservation system outage of would leave the airlines unable to process reservations and issue tickets and boarding passes via online systems.

In these situations and many others, business grinds to a halt, productivity is impaired or ceases altogether and the impact on customers swiftly follows. Aside from the immediate consequences of being unable to conduct business and loss of revenue, unreliable systems also undermine quality of service, potentially causing firms to be unable to meet SLA agreements. This can lead to breach of contract, cause the company to lose business and customers, and put it at risk for expensive penalties and litigation.

Online Action System

The purpose of the Action System is to allow users a means for entering and monitoring Action Items. In turn, the responsible departments can monitor and take action on the requests, and mark them Complete with a Complete Date when finished.

 

As such, Action System has three user tools in the main menu, Items Entry, Items View, and six filter lists, Active, Unassigned, Pending, InActive, ListAll, and Complete. The program uses a Web Browser and can be accessed from the Goer IntraNet site.

The main screen consists of two windows, a menu window to the left and Activity screen to the right. Selection from the menu will display in the Activity screen. The menu screen will remain active at all times to allow rapid movement through the program.

Main Menu
Place your mouse arrow on the desired selection and click.

Item Entry

To enter an Action Item, click Item Entry
Enter the desired information. The tab key or a mouse click will take you from one entry field to the next.
1. Enter your UserID, the same ID used to log into the Network or DataFlo, IE rmcnary (12 characters max).
2. Select the responsible department from the list - the one that can fix the problem
3. Select the Customer Commodity Code from the list, IE line for Linens 'n' Things (4 characters max)
4. Enter the part number (9 characters max).
5. Enter the Work Order Number (9 characters max).
6. Description is used to describe the problem. Don’t leave anything out but be as brief as possible.

7. Click the \"Add Action Item\" button to save your request. The system will assign an \"Item Number\" for quick tracking purposes. Reset to erase your request

Item View:

To view Action Items, simply click Item View This option will allow you to filter your list by the following criteria: Item Number, UserID, Customer or Commodity Code, Part Number, Work Order Number, Department, and Assigned.

Select One Only please, then click \"View Selected Item\"

The system will display a list of Items based on your filter selection. You can view or edit an Item simply by clicking on the desired Item number.

You can View and/or change any data at this point. To save the changes click \"Update Item\".

You can also select another menu option or click the back arrow on the WebBrowser Tool Bar.

Active Items

Active Items will allow you to view a list of all Active Items. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

Unassigned

Unassigned Items will allow you to view a list of all Items that are not assigned. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

Pending

Pending Items will allow you to view a list of all Items that are waiting a long period of time for additional information or funding. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

InActive Items

InActive Items will allow you to view a list of all item where no action will be taken. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

List All

List All will list every Item in the system regardless of status or assignment. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

Complete

Complete Items will allow you to view a list of all Completed Items. If you wish to view a specific Item, simply click the desired Item number. The data will be displayed in a view form that allows update of information.

Since this program uses a web browser, you can use the forward and back arrows, make a new selection from the menu, or exit the browser to close the program.

Open Dyslexic Font For Dyslexic Users

OpenDyslexic is a new open sourced font created to increase readability for readers with dyslexia. The typefaces includes regular, bold, italic and bold-italic styles. It is being updated continually and improved based on input from dyslexic users. There are no restrictions on using OpenDyslexic outside of attribution.

Your brain can sometimes do funny things to letters. OpenDyslexic tries to help prevent some of these things from happening. Letters have heavy weighted bottoms to add a kind of "gravity" to each letter, helping to keep your brain from rotating them around in ways that can make them look like other letters. Consistently weighted bottoms can also help reenforce the line of text. The unique shapes of each letter can help prevent flipping and swapping.

OpenDyslexic also takes a different approach to italic styles. It is generally recommended that italics be avoided in reading material for dyslexia. However, instead of taking the normal approach of "slant x% for italic," OpenDyslexic's italic style has been crafted to allow for its use for emphasis while maintaining readability.

Download the newest package, and additional dyslexia typefaces in the downloads section.

Open Source Cloud Debate Rages On

One, and only one, open source project usually gains the upper hand in a new software category, but cloud has three tough contenders in OpenStack, CloudStack, and Eucalyptus. Must one win?

The role of open source firms has been to consolidate a set of rapidly occurring changes in a class of commercial software, frequently adding their own updates to the code and then commoditizing them in the marketplace. The Apache Web server did that. The JBoss Application Server under Marc Fleury's team of developers did it.

But in cloud software, the opposite is happening. There are no leading commercial products, but there are four open source projects. The commercial products are not advertising the capabilities of a new class of software; the open source projects are. And while one, and only one, open source project tends to gain the upper hand in each new category, there are three contenders in the cloud space, with none of them having a clear advantage.

It was thus an unusual situation when leaders of the three projects appeared on a panel together Thursday at the GigaOm Structure 2012 event in San Francisco. They were: Chris Kemp, the self-assured, 34-year-old former CTO at NASA, a founder of the OpenStack project, and CEO of Nebula, an OpenStack company; Sameer Dholakia, the tough and poised general manager of the Citrix cloud unit that acquired Cloud.com and converted its product into the CloudStack Project at the Apache Software Foundation; and Marten Mickos, sagacious CEO of Eucalyptus Systems, with deep experience in managing open source code as a business.

The stage had been set with heightened tension between the three as Citrix announced in April that CloudStack would become an Apache project. Citrix had been a contributor to the OpenStack project. But Dholakia explained in an interview that Citrix bought Cloud.com "because we needed to be in the market sooner than OpenStack would allow to compete with VMware."

Among OpenStack supporters, Kemp in particular responded with bitterness to Citrix's establishing another and competing open source project. Citrix's earlier support for OpenStack had been a front and it never intended to stick with the project to see it bear fruit, he supposedly said in comments cited by Eric Knorr at InfoWorld. Dholakia says that isn't so. Citrix was a major contributor to OpenStack and remains a contributor to this day.

Read More - Click Here!

 

Paper Sizes and Standards

ISO paper sizes (plus rounded inch values)
Format
A series[3] B series[4] C series[5]
Size mm × mm in × in mm × mm in × in mm × mm in × in
0 841 × 1189 33.1 × 46.8 1000 × 1414 39.4 × 55.7 917 × 1297 36.1 × 51.1
1 594 × 841 23.4 × 33.1 707 × 1000 27.8 × 39.4 648 × 917 25.5 × 36.1
2 420 × 594 16.5 × 23.4 500 × 707 19.7 × 27.8 458 × 648 18.0 × 25.5
3 297 × 420 11.7 × 16.5 353 × 500 13.9 × 19.7 324 × 458 12.8 × 18.0
4 210 × 297 8.27 × 11.7 250 × 353 9.84 × 13.9 229 × 324 9.02 × 12.8
5 148 × 210 5.83 × 8.27 176 × 250 6.93 × 9.84 162 × 229 6.38 × 9.02
6 105 × 148 4.13 × 5.83 125 × 176 4.92 × 6.93 114 × 162 4.49 × 6.38
7 74 × 105 2.91 × 4.13 88 × 125 3.46 × 4.92 81 × 114 3.19 × 4.49
8 52 × 74 2.05 × 2.91 62 × 88 2.44 × 3.46 57 × 81 2.24 × 3.19
9 37 × 52 1.46 × 2.05 44 × 62 1.73 × 2.44 40 × 57 1.57 × 2.24
10 26 × 37 1.02 × 1.46 31 × 44 1.22 × 1.73 28 × 40 1.10 × 1.57
             
North American paper sizes
Size
in × in mm × mm Similar Canadian P size      
Letter or ANSI-A 8.5 × 11 215.9 × 279.4 P4: 215 × 280      
Government Letter 8.0 × 10.5 203.2 × 266.7        
Legal 8.5 × 14 215.9 × 355.6        
Junior Legal 8.0 × 5.0 203.2 × 127        
Ledger[12] 17 × 11 432 × 279        
Tabloid 11 × 17 279 × 432        
Index card 3 × 5 76 × 127        
Index card 4 × 6 102 × 152        
Index card 5 × 8 127 × 203        
business card 2 × 3.5 51 × 89        
             
Architectural            
Name in × in mm × mm Ratio      
Arch A 9 × 12 229 × 305 03:04:00 AM      
Arch B 12 × 18 305 × 457 02:03:00 AM      
Arch C 18 × 24 457 × 610 03:04:00 AM      
Arch D 24 × 36 610 × 914 02:03:00 AM      
Arch E 36 × 48 914 × 1219 03:04:00 AM      
Arch E1 30 × 42 762 × 1067 05:07:00 AM      
Arch E2 26 × 38 660 × 965 01:19:00 PM      
Arch E3 27 × 39 686 × 991 09:13:00 AM      
             
Photo Print in × in mm × mm Ratio      
2R 2.5 × 3.5 64 × 89 1.4      
- 3 × 5 76 × 127 1.6      
LD, DSC 3.5 × 4.67 89 × 119 1.3 (4:3)      
3R, L 3.5 × 5 89 × 127 ≈1.4286      
LW 3.5 × 5.25 89 × 133 1.5 (3:2)      
KGD 4 × 5.33 102 × 136 1.3 (4:3)      
4R, KG 4 × 6 102 × 152 1.5 (3:2)      
2LD, DSCW 5 × 6.67 127 × 169 1.3 (4:3)      
5R, 2L 5 × 7 127 × 178 1.4      
2LW 5 × 7.5 127 × 190 1.5 (3:2)      
6R 6 × 8 152 × 203 1.3 (4:3)      
8R, 6P 8 × 10 203 × 254 1.25      
S8R, 6PW 8 × 12 203 × 305 1.5 (3:2)      
11R 11 × 14 279 × 356 1.27      
A3+, Super B 13 × 19 330 × 483 ≈1.46154      
             
American ANSI in × in mm × mm Ratio Alias Similar ISO A size  
ANSI A 8.5 × 11 216 × 279 1.2941 Letter A4  
ANSI B 11 × 17 279 × 432 1.5455 Ledger[12]
Tabloid
A3  
ANSI C 17 × 22 432 × 559 1.2941   A2  
ANSI D 22 × 34 559 × 864 1.5455   A1  
ANSI E 34 × 44 864 × 1118 1.2941   A0  

Read More - Click Here!

Paperless Finances

(Jim Robinson) Spring cleaning is an American ritual which traditionally entails dusting places you normally don’t, cleaning out closets and straightening up places you might have been letting go. Check out ways vinegar can be used to clean your house.

But what about your file cabinet? Before you put your tax paperwork away this year, add something to your Spring cleaning list: eliminate as much paper as possible in your life.

We’re now at a crossroads on the journey to a digital world. Electronic storage has become so inexpensive that you can now purchase a $10 flash drive large enough to store every piece of paper you’ll encounter during your life. And yet many of us are still moving mountains of paper from our mailboxes to our file cabinets.

It’s time to stop. Embrace the ability to eliminate the paper you’re now reading, storing, organizing and misplacing. In the process you’ll save time, money, stress and maybe a tree or two. Here’s how to go about it.

First, check out this 90-second news story we recently did for a few tips on becoming paperless, then meet me on the other side for more.

Now let’s recap those tips with a bit more detail. Here are the five steps to paperless finances.

Step one: know what to stow and what to throw

The paper you should keep has already been, if you’ll pardon the pun, well-documented. For example, here’s an article by MSN that goes into excruciating detail, and there are plenty of others like it. But don’t bother printing any of these articles and putting them in your file cabinet. The internet is already storing them for you and all you have to do to retrieve them is do a search for “how long to keep paperwork.” Which leads us to step two.

Step two: start storing everything digitally

If you’re not receiving your bills online and doing your banking and investing online, start now. It’s faster, easier, cheaper and safer. Faster and easier because you can receive, review, retrieve, pay and digitally store bills and statements with a few mouse clicks. And if you organize them on your computer, you’ll probably also locate them faster should the need arise. It’s cheaper because neither you or those you deal with will need envelopes, stamps, file folders or cabinet space. And it’s safer because if you properly back up your digital files, they’ll never fade, get lost, feed a fire or float away in a flood. And they’ll be available from anywhere there’s Internet access for as long as you choose to keep them.

So if you’re not doing your banking or bill-paying online, start. Set up online banking and make it a goal to avoid receiving or paying any bills by snail mail. Do it one bill at a time if you want to start gradually, but work your way up until you develop a total digital solution that suits you. Check out that article above from MSN to see how long you need to keep certain paperwork, like investment confirmations or bank statements. So instead of getting this stuff in the mail and putting it in a file cabinet, request digital copies, create a folder on your computer, and save it there.

When you come home with a new owner’s manual, do a search and see if it’s available online. (Here’s one website that has owner’s manuals: Manuals Online.) If it’s online, download it and keep the file on your computer in a folder labeled “owner’s manuals”. If you get receipts you’ll need for your income taxes, scan those and store them in a folder called “2010 Income Taxes”, which you can then subdivide into folders that correspond to the deductions on your tax return. If you don’t know what those deductions are, look at a 1040 Schedule A and you’ll find a list of them. If you need a receipt for a warranty, scan it and put in a folder on your computer labeled “Receipts for Warranties.”

You get the idea: Whenever you have a piece of paper in your hand, make it a habit to ask, “Do I need this?” If the answer is yes, see if it’s already being stored online and either bookmark it or download it. If it’s not already online, scan it and store it on your computer. And speaking of scanning, that brings us to our next step…

Step three: eliminate the paper you’re now storing

Check out the list of what you need to keep from MSN’s article, then go through your file cabinets and see if you’re keeping paper you can toss. If you are, toss it, but be careful to first shred anything that contains sensitive information. If you do need to keep it, scan it. As I mentioned in the video above, you can easily find an inexpensive scanner. Here’s a printer/scanner/fax that’s gotten pretty good reviews for only $59: HP DeskJet F4480 Inkjet All-in-One Printer.

And if the thought of individually scanning all your old paperwork proves too daunting, here’s a suggestion: don’t do it. Eliminate the stuff you don’t need and keep the rest. Just resolve not to add to it by scanning everything going forward.

Of course, there are exceptions to every rule; you can’t store everything as a digital file. The expert we interviewed for our news story advised keeping any paper with an original signature on it. I’d add to that things that have raised seals. So the original papers you need to keep should be fairly obvious: wills, contracts, titles, deeds and the like. These documents should still be scanned, so you’ll have a backup copy, then store the originals in an ultra-safe place like a safe deposit box.

Step four: backup, backup, backup

While converting paper into digital files is certainly more convenient than filing them in a cabinet, there is a risk to storing important information on a complicated, sensitive machine… data loss. Almost everyone has suffered from a hard drive crash at some point, and while losing photos from your last vacation may be tragic, losing your tax receipts in the middle of an audit might be devastating.

So how should you backup? Keeping another hard drive in your house with copies of your important data might seem like the ideal solution, but if your house burned down, you’d lose your computer and your backup. Better solution? Use an “off-site” backup service. A popular one you’ve probably seen advertised is Mozy, but there are others available that can be found fairly easily with a Google search for ‘online backup’. And it doesn’t have to cost a lot. MozyHome gives you 2 GB of backup space for free, which should store the lives of most families, but if that’s not enough, you can always increase your storage for not much money.

Also keep in mind that your sensitive information is only as safe as your computer is. Always password protect your computer in case it gets stolen.

Step five: free organizing software

Now it’s time for the good stuff… Freebies! Here are some free software programs and websites that will help you get your stuff organized and keep it that way.

  • Evernote is free document organization program available for both Mac and PC that keeps your data “in the cloud”. This means that everything you store in it is automatically backed up to their server online. Evernote also has versions of its software for the iPhone, Blackberry, Palm Pre, Windows Mobile and Android phones, letting you access your documents anywhere, any time.
  • Scribd is a free website where you can upload your important docs for safe keeping. This site is made for sharing documents with friends, so make sure anything you don’t want the whole world to see is marked as “Private” when you upload it.
  • Know Your Stuff is a free software program from the Insurance Information Institute that helps you create a home inventory: worth its weight in gold in case of disaster.
  • Adobe Reader is important for viewing all those PDF files you’ll soon be downloading, storing and creating.

Bottom line? One day in the not-too-distant future, the advice in this article will seem quaint because it won’t be long until paper records follow vinyl records into oblivion. Digital is better so digital will win out. If you’re not already on board, this Spring cleaning/tax season is as good a time as any to start.

Read More - Click Here!

Parents Don't Know What Their Kid Do Online

A new US survey of more than 1,000 teenagers (13-17) and 1,000 parents of teenagers by online security company Mcafee has highlighted the discrepancies between what parents think about their teenagers' use of the internet, what is really going on, and what each group is doing to outsmart the other. 

The survey found that while three quarters of parents said they had had a conversation about online safety with their teenagers, only around half of teenagers indicated that these conversations had an impact on them.

When it comes to trying to control their teenagers' behavior online, 49.1 percent of parents had installed parental controls, 44.3 percent knew their teenagers' passwords, 27 percent had actually taken their teen's devices, 10.3 percent reported using location tracking to monitor their teens and 3.5 percent had even consulted a psychologist for help with their teens' online behavior.

However, despite these attempts by parents, the survey found that teenagers are seemingly managing to outwit their parents.

The survey found that 61 percent of teenagers felt confident they knew how to hide their online activity, and 71 percent had actually done so. Furthermore, 53.3 percent of teens clear their browser history, 19.9 percent change their social networking settings to block their parents, 19.5 percent "utilize private browsing," 18.9 percent "hide or delete" inappropriate videos, and, despite parents' best attempts, 12.8 percent of teenagers have disabled parental controls. 

Additionally, the survey found that 8.7 percent of teenagers have duplicated social media profiles that their parents do not know about, suggesting that even if it appears to parents that they are monitoring their teenagers' social networking activities, it may not be the case.

Despite these findings, a US survey of over 1,000 teenagers (13-17) by Common Sense Media released on June 26 found that 52 percent of teens thought social media "helped their friendships," while 43 percent indicated that they "wished they could get away from social media sometimes."

 

Point Pixel EMS Percent Conversion Table

Points  Pixels  Ems  Percent
6pt  8px  0.5em  50%
7pt  9px  0.55em  55%
7.5pt  10px  0.625em  62.50%
8pt  11px  0.7em  70%
9pt  12px  0.75em  75%
10pt  13px  0.8em  80%
10.5pt  14px  0.875em  87.50%
11pt  15px  0.95em  95%
12pt  16px  1em  100%
13pt  17px  1.05em  105%
13.5pt  18px  1.125em  112.50%
14pt  19px  1.2em  120%
14.5pt  20px  1.25em  125%
15pt  21px  1.3em  130%
16pt  22px  1.4em  140%
17pt  23px  1.45em  145%
18pt  24px  1.5em  150%
20pt  26px  1.6em  160%
22pt  29px  1.8em  180%
24pt  32px  2em  200%
26pt  35px  2.2em  220%
27pt  36px  2.25em  225%
28pt  37px  2.3em  230%
29pt  38px  2.35em  235%
30pt  40px  2.45em  245%
32pt  42px  2.55em  255%
34pt  45px  2.75em  275%
36pt  48px  3em  300%

Power Networking Seven Secrets

power networking(Karen Schwartz @ marieclaire.com) Your next job will likely come by way of a contact, so you better start mingling. Here, former banking exec Sallie Krawcheck, who owns 85 Broads, a global network for professional women, reveals how to schmooze your way to the top.

1. Think broad, not deep.

"Women tend to fall into the 'best friend syndrome.' We invest deeply in our friendships and conflate casual relationships with shallow ones. But your acquaintances play a crucial role in your career. Someone you see only twice a year may know about opportunities you haven't heard about."

2. Cast a wider net.

Networking within your profession won't take you very far. "You're aiming for reach—friends, classmates, neighbors. Plant a lot of seeds."

3. Don't make it all about you.

People approach career opportunities the way they do social ones: Nobody wants to hang out with, let alone help, someone who is overtly self-serving. "At the end of the day, what we're talking about is being sociable."

4. Remember the quid pro quo.

Networking can't be one-sided—both parties need to get something out of it. Ask yourself: What can I offer that makes the relationship worth the effort? Pay it forward by brokering introductions or proffering useful business insight. "The best kinds of connections are mutually beneficial."

5. It's not only about your job search.

Networking isn't just about finding a job. It's also about making you better at the one you have. "The more time you spend gathering diverse information [from people in different industries and professions], the more valuable you are as an employee."

6. Pursue your personal interests.

It's easier to break the ice with strangers when you're actually interested in a social event's subject matter. "It's not 'I'm here to network.' It's 'I'm here to learn about X, Y, Z.'"

7. Lock it up by following through.

Be sure to send a quick follow-up e-mail the day after meeting someone. "Follow-through is what turns a contact into a connection."

Your next job will likely come by way of a contact, so you better start mingling. Here, former banking exec Sallie Krawcheck, who owns 85 Broads, a global network for professional women, reveals how to schmooze your way to the top

 

Power Point: Hyperlink Your Summary Slides

Have you ever reach the end of your slide presentation  and had questions from your audience? The easy way to handle those questions is to hyperlink the summary items to their respective slides, and this is how we do it:

  1. Select the item on the summary slide.
  2. Choose Hyperlink from the Insert menu.
  3. Click Place in this Document.
  4. Identify the slide.
  5. Click OK.

With the summary slide on screen, you can click any of the hyperlinked items to return to the original slide for a quick review. Just be sure to add hyperlinks on each slide for the return trip to the summary slide.

Power Point: What To Do When Things Don't Work In Front Of An Audience

Someone introduces you as the next presenter. The audience sits expectantly, awaiting your arrival. You step up, prepare to begin your talk, launch your presentation and nothing appears on the screen. Or equally disconcerting, no sound emerges from the speakers....

Think it can't happen to you? Think again. I hope it doesn't, but if it does, here are some things to check.

1: Is the projector plugged in?

Of course you have checked the end of the power plug that goes into the outlet or the power strip. Make sure, though, and follow the line all the way to the end. If you have a number of cords going into a strip, it's possible that yours, the one for the projector, might have been disconnected. Also, remember that old song that Judy Collins sang, "Both Sides Now." Check the OTHER end of the power cord. If it isn't hard-wired into the body of the projector, it will have a plug connection. Make sure that connection is in place as well.

2: Is the switch turned on?

I'm really sorry if these first two points are insulting you, but they're too important to skip. Make sure the switch to the projector really is On. Chances are, the projector uses the international symbols for On and Off. Keep them straight by remembering that the symbol for On, the vertical line (|), looks like the number one, which is close in spelling to on.

3: Is the outlet live?

Even if the projector is plugged in, and even if the switch is on, the projector might not be getting power. Check any power indicator lights on the projector. If there aren't any, check the outlet itself. Are other devices from the outlet or strip getting power? If so, your projector should as well. If your projector is the only device, test the outlet or strip by using another device. Remember too that a strip itself can have an on/off switch.

4: Is the video connection physically in place?

Your projector needs more than just electric power. It also needs video signals from your computer. Usually, that connection comes from a cable with a D-shell connector or a USB connection. Make sure it's in place and it's tight.

5: Is the computer sending a video signal to the projector?

Maybe a video cable is in place, but your computer might not actually be using it. The computer might not be sending a video signal to the projector. To resolve this problem, look on your keyboard or in your computer documentation on how to enable such sending. For example, on many Dell laptops, pressing the function key along with the F5 key toggles the display mode from PC only to projector only to PC and projector simultaneously.

6: Is the projector set for input from the computer?

Even if the video cable is in place, and even if the computer really is sending a video signal to the projector, the latter might not be expecting it. Such displays often are designed to receive input from other sources, such as a DVD player. You may need to use a setup menu for the projector to change the source of input.

7: Is the projector sleeping?

Projectors often are equipped with an energy-saving sleep or hibernate mode. In such cases, hitting the power button once or twice quickly will take the projector back to active mode.

When I'm working with a projector, I try to avoid putting it into (or allowing it to go into) a hibernate mode. Instead, if I want to hide the projector display from the audience, I will simply put a piece of paper against the lens or loosely cover the lens with a lens cap. I want to take no chances with the projector and its hibernate mode.

8: Forward or reverse projection?

Projectors generally are set up so that they display images from the front of the screen. However, sometimes, for aesthetic reasons, you might want to display images from behind the screen. In that case, the projector needs to display images “backward.” If you see such backward images, check the forward/reverse projection setting.

9: Right side up or upside down?

Similarly, projectors can be designed to hang from the ceiling. In such cases, they are upside down, and their displays have to be adjusted accordingly. Therefore, if your image appears upside down, check the appropriate setup menu on the projector.

10: Is the display resolution compatible?

If you're still getting no display, make sure that the projector can handle the resolution settings of your computer. You might need to make your computer display less fine - that is, setting it to lower numbers. You can do so in Windows via the Control Panel Display icon (in classic view) or via the Change The Screen Resolution task under Appearance And Themes.

11: Are the sound settings correct?

If you're not getting sound, the problem could arise in any of three areas. First, look at the application that's generating the sound — for example, Media Player. Make sure the volume setting is greater than zero. Second, check the sound settings for your computer itself, via the Control Panel's Sounds And Audio Devices applet. Make sure that the volume here is also set to greater than zero. Most important, make sure that the Mute option is not selected.

12: Are you using the right sound jack?

If you're planning to get sound by plugging a 1/8″ minijack cable into your computer, make sure you're plugging the cable into the headphone jack, not the microphone jack. The latter might be labeled with a headphone icon, and it probably will resemble the letter “C” on its side.

PowerPoint Presentation From SmartPhones

SmartPhones have enough processing power these days to allow you to run a presentation off the devices. Imagine how great it would be to go the venue carrying a SmartPhone in your pocket instead of lugging a laptop bag. The following suggestions will help you make your SmartPhone PowerPoint presentation memorable…

  • First, search for a presentation package for your SmartPhone. Windows Mobile SmartPhones comes with PowerPoint which really makes it simple. However, if you are running Blackberry, Droid… there are plenty to choose from, including Pocket Slides from Conduits Technologies, Inc. The benefits and the pitfalls of the available presentation packages would fill volumes, so try a few and pick one you like.
  • You will need the venue to supply a computer attached to a projector or have a VGA adapter for the SmartPhone if you want your work to be seen by the entire audience. Some projectors use WiFI or BlueTooth. But if not, It is worthwhile to search online for VGA outkits for your model of SmartPhone; this would allow you to connect directly to a projector and deliver the presentation straight from the device.
    Or, you could connect your SmartPhone to a laptop using Remote Display via Bluetooth and, instead of being tied to a lectern, you could move around the audience, controlling the slides from your SmartPhone.
  • Alternatively, you could connect your phone to a laptop using Remote Display via Bluetooth and, instead of being tied to a lectern, you could move around the audience, controlling the slides from your SmartPhone.
    You could use the SmartPhone simply as a memory stick to bring the presentation to the venue and then transfer it to the venue’s PC; however, it would be just as easy to use a memory stick and not have to use ActiveSync although, in my bitter experience, it is a lot easier to lose a USB memory stick than a SmartPhone.
  • Most SmartPhones have a built-in voice recorder; a good time to use the recorder would be during the Q&A session. If your memory is as bad as mine, it’s best to record anything that requires a follow-up because failing to deliver on your promise of further contact is not a good way to further your career.

And, of course, make sure you deliver a good presentation. Many people mistakenly use every PowerPoint feature to embed video, music, animation, and far too much text in their presentations, thus creating a great demonstration of the presenter’s PowerPoint skill and often overshadowing the real message of the talk. A good presentation includes simple and meaningful graphics, such as graphs of market share and images of products teamed, with bullet-point type text that the speaker expands on verbally. Keep in mind that you can use your SmartPhone like it’s your personal cue card system.

One downside of delivering a presentation from a SmartPhone is the screen is smaller and a different shape than a PC screen, so when it is blown up on an OHP screen, the resolution will look grainy. You would have to tailor the text and graphics to allow for this resolution issue. It’s yet another reason to keep your PowerPoint presentation simple.

At the end of your presentation, you unplug the SmartPhone, put it in your pocket, and leave. How cool is that?

PowerPoint: Subliminal Message

Have you ever wondered if subliminal messages would work in a PowerPoint presentation? In the '70s when I went to a movie theater and suddenly got very hungry or thirsty, I often wondered if they put subliminal messages in the movie to make you that way.

Subliminal Message on TV and in the Movies, backward masking on records and songs (number nine was turn me on dead man on the Beatles White Album propagating the notion that Paul was dead (drop that kick backwards was we buried Paul))....

I am not recommending that you actually use this as a tool (buy my stuff), but if you wish to experiment with subliminal messages (buy my stuff), this is how we do it:

To include a subliminal message, go to the desired slide and insert the selected text or graphic object. Then, right-click the item and choose Custom Animation. Click Animation Effects (the yellow star) and choose Entrance. From the resulting submenu, select Flash Once. That’s it! During the presentation, PowerPoint will quickly flash the item, just once, when that slide is current.

That's (buy my stuff) it!

Prepare For Microsoft Internet Explorer 8 (9/4/2010)

'Prepare For Microsoft Internet Explorer 8','

The IT industry speaks highly of Microsofts next version of Internet Explorer, Microsoft Internet Explorer 8. There are several new features, including private browsing, advanced screening of malicious Web sites and downloads, and a compatibility tool that allows the software to correctly render pages designed for older browsers. Microsoft will be distributing IE 8 via Microsoft Update as a recommended upgrade for all Windows users.

The only problem with this plan is that unless your tech team is centrally managing your Windows updates with Windows Server Update Service or Systems Management Server 2003, your computer users on your network might upgrade to the new software automatically. Unless you have tested all your critical Web apps to make sure that they will work with IE 8, you could be in for some user support nightmares. Nothing will screw up your day like not being able to get the work done after an automatic update.

Rolling back to IE 7 once the later version is installed is not easy, so it would behoove us to prepare in advance. Microsoft has released a tool that can help you. They call it the Internet Explorer Blocker Toolkit, and it consists of an executable registry script (which can be run on any machine) and a template for Group Policy administrators. If you use the Blocker Toolkit, your machine won’t apply the IE 8 upgrade as part of its automatic update schedule.

However, if you have users on your network with administrator rights, be aware that IE 8 can still be applied with a manual visit to Microsoft’s update site.

 

Coral from Nuvox asked: Greg - How will this compare to Google Apps? Good question! Internet Explorer 8 competition is Google Chrome and FireFox. http://www.google.com/chrome I do not care much for Chrome. It is “new” but it may mature into something useful in the future. I use FireFox about 70% of the time. Internet Explorer is imbedded into the windows operating system and you really cannot function in windows without it. Also, some important banking, shipping, insurance, government, … websites demand internet explorer. Google Apps consists of: gmail: Fast, searchable email with less spam google talk: im (instant messaging) and call your friends through your computer google calendar: organize your schedule and share events with friends google docs: share online documents, presentations, and spreadsheets google sites: create websites and secure group wikis 20+ other google apps Google Apps competition is Microsoft Live. I don’t know who copied who, but they both do the same thing. Google Apps and Microsoft Live are good for “down ‘n’ dirty get ‘r’ done stuff and allows you to work online from anywhere. However, for most business use, Microsoft Office (good but expensive) or Open Office (good and free) does a much better job..

 

Prepare for a future without Internet Explorer

( @ InfoWorld) IE is on its way out, so it's time for IT and Web services creators to make the switch to the modern Web

For years, IT organizations have been tied to Microsoft's Internet Explorer browser, which for years was the standard Web browser. But IE fell further and further behind in terms of modern HTML compatibility. And as mobile devices and Macs grew in popularity, its proprietary technologies like ActiveX and Java versions shifted from being powerful tools to balls and chains that kept expensive-to-update specialty apps from working in a mobile, cross-platform world. The compatibility differences from one version of IE to the next made the situation even more difficult.

Microsoft has spent several years urging enterprises to move to the latest versions of IE, to little avail. Instead, usage of Google Chrome, Apple Safari, and Mozilla Firefox have soared, with many companies even standardizing on IE for legacy usage and Chrome for modern usage.

So, Microsoft has now taken a radical new tack in Windows 10: Introduce a new browser, called Edge (what had been code-named Project Spartan), that jettisons the legacy technologies and adopts much more of the modern HTML specification. Edge is a significant refactoring of Microsoft's Trident HTML rendering engine, focusing on the HTML5 specification, and dropping much of the legacy of earlier Internet Explorer releases. It's essentially Microsoft's Chrome or Safari.

As Windows 10 rolls out and (as Microsoft hopes) displaces Windows XP, Vista, 7, and 8, we're going to see older, less-capable, buggy, IE versions fade away. The old Trident rendering engine will still be available in IE11, but unless you've set the appropriate group policies, Windows 10 will default to using the Edge browser. And it's clear that IE11's inclusion in Windows 10 is as a transition aid; It should not count on its existence for much longer.

Microsoft's move to Edge will force IT to address the same issues that Chrome, Firefox, and Safari have already raised: dropping the legacy IE technologies can cause problems for existing sites and services. If you've been building sites that are designed for IE6 or IE7, you're going to have issues with a modern browser like Edge, as it won't support all many old APIs and features.

Print Internet Explorer Pages Without Headers and Footers

By default, IE (Internet Explorer) prints a web page along with those annoying headers and footers, giving you information (such as the date it was printed) that you may not want to advertise. You can turn off headers and footers for a particular print job by clicking File > Print Preview > Turn headers and footers on or off.

However, if you want to turn them off permanently, this is how we do it:

 

  1. Click File | Page Setup
  2. In the dialog box, under the section labeled \"Headers and Footers,\" remove the text in the boxes.
  3. Click OK.

Alternatively, you can change the information in the headers and footers. Example, &d or &D is what puts the date in the printout. Likewise, &t or &T inserts the time. If you want the footer to show the page number only, just put &p in the footer.

Public Libraries in the Digital Age

Photo(Daryl Nelson @ ConsumerAffairs)The good old public library. Boy, how it used to be a major stop in our weekly runs. 

Whether it was to pick up or drop off books, research something we were looking for, or just as a quiet place to read or study, the library rivaled places like the bank and the supermarket when it came to frequent visits.

All of that has changed now.

People are using their Kindle to access books and there's always the Internet if you want to research something. And when it comes to reading and studying, it seems people are going to places like Starbucks and Panera instead of the library for some reason -- even though these places are anything but quiet. And anything but free.

So just like a lot of places we used to frequent a lot, before we were sucked into the digital age, the library has become an afterthought to many, which is nothing like it was back in the day. I mean, remember when visiting your local branch at least twice a week was a normal thing to do?

Hoopla to the rescue

PhotoCertainly it's not like that anymore, but local libraries are taking a defensive swing at the digital age to stay relevant and to hopefully climb back towards the consciousness of consumers. And they're using an app called Hoopla to do it.

Hoopla allows you to use your library card to access online movies, audio-books, television shows and music, and the creators say you'll be able to access thousands of titles right on the spot.

And probably the best part of using the app is, there's no going back and forth to the library to pick up or drop off selections. You'll be able to use Hoopla to temporarily download or stream content immediately and access it through your smartphone, tablet or computer.

Your local library will have to set up an account with Hoopla if it hasn't done so already, and if a staff person isn't aware of the app, you could direct him or her to the website.

So far, the libraries that have an account with Hoopla include Charlotte Mecklenburg Library; Columbus Metropolitan Library; Edmonton Public Library; Los Angeles Public Library; Orange County Library System in Florida; Salt Lake County Library Services; Seattle Public Library; and Toledo-Lucas County Public Library.

Easy to use

And what has the feedback on Hoopla been so far?

Apparently, people like how easy it is to use and how fast it seems to works.

"Instantly borrowing and streaming content free from a library is great but this being the easiest app I've ever used makes it greater," one user wrote. "Never any waiting for content."

Other users like the music content, which may be a surprise to some, who might associate the library with having outdated selections. 

"Love this app," one user wrote. "Really good music content. Macklemore, Rihanna, Muse, Madonna, Prince and so many others."

However, one user said he had trouble getting the app to work on his device, and when he called his local library, he wasn't given any help.

Which means it's probably best to contact Hoopla if you're having any trouble instead of contacting the library directly. You would of course contact the library if your card is being rejected by the app or if Hoopla doesn't have any record of your library signing up with it.

"I can log in via the web, but can't get the app to work on my iPhone or iPad," wrote the user. "Library no help. No settings to check in app. Resetting password doesn't help. Useless if you can't get past the bad URL error."

Other apps

PhotoBut Hoopla isn't the only app that's connected to public libraries. Many branches throughout the U.S. have added a digital component. Some branches are using an app called 3M Cloud Library, which allows you to access fiction and non-fiction eBooks through your library card.

3M is another app that your local library will have to sign up for, and once it does, you'll be able to borrow thousands of titles instantly.

There are some who say the app takes a little while to load, but they put up with it because it's the only app their local library uses, which means it might be a good idea to speak to your local branch to see what types of apps and digital services it's using.

But each branch might be using more than one, as more and more public libraries will be going the digital route to keep up with everything else that has gone digital.

Quantum Computing Explained

(SARAH SILBERT@ EnGadget) Quantum computing -- it's a term we're hearing more and more, as companies such as D-Wave build their own early versions of super-machines. Microsoft, naturally, is investing considerable resources in the field as well; its Station Q research lab in Santa Barbara brings together experts studying topological quantum computing, with the goal of making a vastly more powerful successor to the classical computer.

We've covered some quantum computing milestones in the past, and while you might have a basic grasp on the difference between qubits and bits, Microsoft's Quantum Computing 101 video -- published below -- is a well-done explainer, putting the implications of this research in human terms. For a deeper dive, check out this long read on Station Q, detailing the researchers' complex and thoroughly interesting work.

 

Quickbooks Remote Access Setup

Set Windows access permissions to share company files

Set access permissions to share your QuickBooks company files in Windows 7, Vista, and XP.

Detailed instructions

Windows 7 and Vista

  1. Locate and select the folder containing your QuickBooks company file.
  2. Right-click the folder and choose Properties.
  3. Click the Sharing tab, click the Share button.
  4. In the File Sharing window, enter the name you want to add or use the drop-down arrow to select the user and click Add.

QBDataServiceUser also needs access

  • Click Close.
  1. In the Permission Level column, select the Read drop-down arrow and select Read/Write.
  2. Click Share.
  3. Click the Security tab
  4. Click the Edit button for the Group or user names section.
  5. Click QBDataServiceUserXX.
  6. In the Permissions for QBDataServiceUserXX section , select the Full Control checkbox in the Allow column and click OK.

Mapping a network drive in Windows 7 or Vista:

  1. Click the Windows Start button and select Computer.
  2. Click the Map network drive button at the top right of the window.
  3. Click the Drive button and select letter you wish to use for this connection, and then click the Browse button and locate the folder containing the data file.
  4. Select this folder and click OK.
  5. Click Finish.

Install QuickBooks Pro or Premier 2011

This article guides you through the installation of QuickBooks Pro or Premier 2011.

If you do not have your installation CD, you can download the QuickBooks installation files.

We have more information available if you are looking to Install multiple QuickBooks versions on one computer or if you are Installing the QuickBooks Database Server.

Detailed instructions

  1. Start the Installation Wizard:
  • From a CD: Insert the QuickBooks CD into the CD or DVD drive.

If the installation does not start automatically:

  • From a download: Double-click the downloaded installation file (.exe extension).

    Note: If you don't already have the file, you can download it now.

  1. Click Next to begin the installation.

http://support.quickbooks.intuit.com/library/INTUIT/SBG/FMS/LEGACY/SCREEN1_899294.JPG

  1. Read the Software License Agreement. If you agree, select I accept the terms in the license agreement, and click Next.

http://support.quickbooks.intuit.com/library/INTUIT/SBG/FMS/LEGACY/SCREEN1_899294.JPG

  1. Select the type of installation for this computer:
    1. Choose Express if you want to allow the installer to make the recommended choices for you. Then proceed to step 5.
    2. Choose Custom and Network options if you will use QuickBooks to share data with other users at the same time on a network
  1. Enter the License and Product numbers in the appropriate fields.

Note: These numbers appear on the yellow sticker that comes with your product or an email if you purchase the download. If you have previously registered your product, click the link at the bottom of the screen, I can't find these numbers, to go online and enter your contact information. Click the Submit button to search our system. 

  1. Click Install to continue, or click Back if you need to go back and review any of the previous screens.

http://support.quickbooks.intuit.com/library/INTUIT/SBG/FMS/LEGACY/SCREEN7_899294.JPG

QuickBooks will display the following message when the installation has completed:

 

http://support.quickbooks.intuit.com/library/INTUIT/SBG/FMS/LEGACY/SCREEN8_899294.JPG

  1. By default, the checkboxes Open QuickBooks and Help me get started will be selected. Modify these options if you like, then click Finish.

 If these steps do not resolve the issue, you can read discussions and post messages and questions relating to your issue on the Intuit QuickBooks Community site for free or you can contact a technical support agent for additional guidance. Fees may apply.

Set up and use Remote Access in QuickBooks

Note: Remote Access is not available for Mac.

The QuickBooks Remote Access Service enables you to work with QuickBooks over the Internet from a remote computer. With remote access, you don't have to take QuickBooks or your company files with you when you need to work away from your office. All you need is a computer with an Internet connection.

If you need to view or change something in a client's file, remote access service allows you to do that without being at the client's place of business or having them send in a disk. You can actually set up a company file on a client's computer and train your client as you work. To use remote access, both you and your client must have an Internet connection.

When you use the remote access service, you send a request to view the client's company file. When the client grants you permission, you can view the client's QuickBooks screen on your own screen. You can work with the client's QuickBooks software and other programs that integrate with QuickBooks, but not programs unrelated to QuickBooks.

During a remote access session, there is no data synchronization with your computer. You are working with your client's QuickBooks software and you have access to all the features and functions of the client's version of QuickBooks, except for the Accountant Edition functionality. If you would like to be able to use Accountant Edition features during a remote access session, suggest that your client upgrade to Accountant Edition.

Detailed instructions

Get pricing information here (Remote Access is included at no charge with QuickBooks Accountant). 

Follow these steps to set up remote access service, depending on what version of QuickBooks you have:

  • QuickBooks Accountant access:
    1. From the Accountant menu choose Remote Access.
    2. Follow the onscreen instructions.
  • QuickBooks Pro & Premier:
    1. From the File menu, select Remote Access.
    2. Follow the onscreen instructions.
  • Web-based login: https://qb.webex.com/qb/account/login.php

For information on how to use Remote Access, go here.

If this solution does not resolve the issue, you can read discussions and post messages and questions relating to your issue on the Intuit QuickBooks Community site for free or you can contact a technical support agent for additional guidance. Fees may apply.

 

 

Recover From Google Panda and Penguin issues

The longer your site sits there, not addressing Google Panda and Penguin issues - the harder it is to recover from the issues.  If you suspect you've been hit by Panda or Penguin, you want to jump right on getting it fixed.  You have a few options:

We've seen great success in sites that came to us because they took a hit.  We focused on cleaning up the on-page and off-page and then we built new content and ramped up social media.  We are seeing excellent progress when the focus is on all of those areas and not just focused on one particular area.

Social media is a touchy subject - so many people don't like it, or don't have time for it or have dabbled in and not seen results quick enough.  Social media is here to stay and it's creating all kinds of new opportunity for companies that learn to implement it properly.  Stay tuned for more information on social media and how to truly make it work for you.

Right now, I want you to do two things ...

1.       Look at your traffic and see if you've taken a hit that you haven't been able to recover from.

2.       If you have, take one of the actions above to recover - sooner rather than later. If you haven't been hit, take a moment to be very grateful and then review your site and marketing practices to ensure you aren't doing anything that will cause you to take a hit in the future.

Rock Paper Scissors - How to crush your opponent every time

 gallery

.

rock paper scissors

(Gayle Laird © Exploratorium/Flickr) 
The question of how to win at rock-paper-scissors has, believe it or not, plagued mathematicians and game theorists for some time.

 

While they previously had devised a theoretical answer to the question, an experiment by Zhijian Wang at Zhejiang University in China that used real players has revealed an interesting wrinkle to the original theory.

In the experiment, Zhijian noticed that winning players tended to stick with their winning strategy, while losers tended to switch to the next strategy in the sequence of rock-paper-scissors, following what he calls "persistent cyclic flows."

Here's how it works in practice: Player A and Player B both start by using random strategies. If Player A uses rock and Player B uses paper, Player A loses. In the next round, Player A can assume that Player B will use paper again and should therefore use scissors to win. In the round after that, because Player B lost, Player A can assume that Player B will use the next strategy in the sequence — scissors — and Player A should then use rock, thus winning again.

If you take the game on a theoretical level, the most mathematically sound way to play rock-paper-scissors is by choosing your strategy at random. Because there are three outcomes — a win, a loss, or a tie — and each strategy has one other strategy that it can beat and one other strategy that can beat it, and we don't care what strategy we win with, it makes the most sense to pick paper, rock, and scissors each one-third of the time. This is called the game's Nash Equilibrium.

While the Nash Equilibrium should be the best strategy in real life, Zhijian found a decidedly different pattern when he and some other researchers recruited 72 students to play the game. They divided the pupils into 12 groups of six players and had them each play 300 rounds of rock-paper-scissors against each other. Zhijian also added a payout in proportion to the number of victories.

 

View gallery

.

rockpaperscissors

(Harrison Jacobs) 
Losing players choose the next strategy in the sequence. 

When Zhijian reviewed the results, he found that students chose each strategy close to one-third of the time, suggesting the Nash Equilibrium theory. But when he looked closer, he noticed a more unusual pattern.

 

The pattern that Zhijian discovered — winners repeating their strategy and losers moving to the next strategy in the sequence — is called a "conditional response" in game theory. The researchers have theorized that the response may be hard-wired into the brain, a question they intend to investigate with further experiments.

For now, Zhijian suggests that exploiting the knowledge that most people use the conditional strategy may result in winning a lot more games of rock-paper-scissors.

NOW WATCH: A Chinese Mathematician Perfected A Strategy For Winning Rock-Paper-Scissors

Rotate Video Files in MAC or PC

rotate video file( Simon Slangen) It’s an error made by many. When filming with your cellphone, or even a real video camera, you’re not always thinking about ‘orientation’ – whether you’re filming in portrait or landscape.

 

 

Some devices take into account every flick of your wrist, but most don’t, and you end up with a video that’s rotated by 90 degrees.

Rotating that video again is not as easy as you’d think. The entire video has to be converted. Below are two ways to convert these videos – on Mac and Windows – using only standard applications that you should be able to find on every computer.

 

Rotate Video On Windows XP

Windows Movie Maker was installed as one of the default applications up until Vista came out. This part of the article details how to use the ‘old’ version of Windows Movie Maker, if you’re still using Windows XP.

Start by opening your video in the application via File -> Import To Collections… To be able to use your video, you’ll need to drag it from your collections to your storyboard, the big blue strip pictured at the bottom of the enclosed screenshot.

rotate video

On the left hand side of the screen, select Edit Movie -> View video effects. On the right side of the screen, you can now see numerous video effects, including various rotations. Drag the correct rotation onto your video in the storyboard to apply.

 

 

Go to File -> Save Move File… to export the project.

Rotate Video On Windows Vista/7

Windows Live Movie Maker, the successor to Windows Movie Maker, has been made remarkably easier to use. Rotating a video in it is hardly a bother. If the application has not yet been installed on your PC, you can download it for free from Windows Live Essentials.

rotate video file

Once you’ve opened your original video file in the application – which can be done by either using the File menu, or via drag and drop – the hardest part is already over. Simply click one of the rotation buttons from the ribbon on top of the screen, and select an export profile to the right.

Rotate Video On Mac OS X

This tutorial works the same for iMovie ’08 and iMovie ’09. If you’re still stuck with iMovie ’06, you’ll need to use a third-party plug-in.

Another point of conflict is the video format. Some of the more obscure ones, like 3GP, aren’t supported. A shame, because these are actually used quite regularly for mobile compression. For these files, you’ll first need to convert them to another file format. This can be done in QuickTime X, via File -> Save for Web.

Alternatively, you can use a third-party file converter like ReduxEncoder, or an online convertion tool like Zamzar.

rotate video

Use File -> Import Movies… to select your converted video. iMovie will analyze the video and generate thumbnails, so this can take a few minutes for larger video files.

rotate video

Before we’re able to use the video, you’ll need to add it to your Project Library from your Event Library. Just make sure you select the whole clip, and drag it over to the other side of the screen.

how to rotate a video

Now deselect the clip from your Event Library, and select the copy in the Project Library. To rotate your video, open the Crop menu, make sure it’s set to ‘Fit’, and use the rotate buttons. When you’re sattisfied, press Done.

how to rotate a video

You’ll notice that you’re video has now been rotated in your Project Library. To export it, go to Share -> Export Movie… or press cmd+E.

rotate video file

As with Windows Live Movie Maker, you can also upload your rotated movie directly to YouTube, or your personal MobileMe Gallery.

 

Router Stopped Working What To Do

(Peter Redmer) Practically anyone with a home network--no matter how big or small--has experienced the moment of doom when the Internet just. stops. working. The heart drops, the stomach flutters, and the spirit sinks as one realizes that all of the devices in their home have been left high and dry from the wonders of the 'net.

Never fear, though--there are several steps that one can take to troubleshoot this home network issue. Several factors could be influencing why the network went down, and often a simple procedure is all it takes to get things back up and running.

Do You Know How To Log In to Your Router?

Before you can do much in the way of troubleshooting, one needs to know how to log into the router itself.

Usually, this can be done by navigating to http://192.168.1.1 in your browser window (this is the IP address of the router, it can be thought of as its location on your network.) From there, a username and password is required. It's often "root/admin" or "admin/password" depending on the make and model of the router, but if it was changed when it was first set up, the new password will be needed.

Once in to your router's interface, you'll see a number of options--don't worry about them just yet.

#1: Reboot Your Router

This might sound obvious, but 95% of the time it resolves network related issues. A router is a computer, after all, with its own built in hardware and software (referred to as "firmware") and occasionally, things happen that require a reboot--much like your desktop computer.

Usually, this can be accomplished by pushing the power button on the router, or by logging in to the router itself--although not all routers have a reboot function in the interface. Make sure that you wait a minute or two after you power it off to turn it back on again, then give your network and its devices several minutes to settle in before you try things again.

#2: Power Cycle Your Router

This is similar to the first step, but goes a bit further to ensure everything gets reset properly. Instead of simply powering down your router, you'll actually unplug it from power completely, wait 5 minutes, plug it back in, wait a minute or so, and power it on.

#3: Check for Firmware Updates

Companies that manufacture wireless routers are always working to improve how they work in customers' networks, and as such udpates are often released that resolve issues reported by users, specific device support, or simply to enhance the product's performance.

You'll need to log into your router as mentioned before, and often it will automatically check for updates. Of course, if something is wrong with your raw Internet connection, this may not work (we'll get to that in step #4) but often the router can connect to the Internet itself, just not route properly.

If the router doesn't automatically prompt you for an update, you can manually invoke one--usually, this setting is located in the "Administration" area of your router's interface. After the firmware update completes, reboot the router and try again.

#4: Power Cycle your Modem (Or Whatever It Is Your Provider Uses)

If you have cable internet, you will have a modem that takes the raw Internet feed and allows you to plug it into your router as your pipeline to the web. This modem communicates with your service provider, and will occasionally need to be refreshed. If you've completed the above three steps, it's getting safer to say that the problem may not actually be the router.

If you have a modem, you can follow these steps to try to get things back online:

  • Unplug your router
  • Unplug your modem
  • Wait 5 minutes
  • Plug your modem back in
  • Wait 1-2 minutes
  • Make sure its indicator lights show the proper activity
  • Power your router back on
  • Wait a few minutes then try your devices again

It's also possible that you may need to contact your Internet provider--they can often remotely see the status of your modem and run updates or a refresh as necessary. In fact, some providers can perform a line refresh through their automated phone lines. Try that if the option is available, and if not, speak to a real human and have them diagnose your connection.

#5: Hard Reset Your Router (Using the Special 30-30-30 Method)

Since this method will completely "wipe" your router and return it to factory settings, I'm saving it for the last step. When you do this, all the original settings such as your wireless SSID and password, will be lost.

The procedure is very simple, and you can find full instructions for the 30-30-30 reset here. (While the instructions are for a NETGEAR specific product, this procedure can be used on any wireless router. You will just need to locate the Reset button on the back of the unit.)

Next Steps

If these 5 basic options don't work to resolve your network problems, you'll need to assess the situation. Here are some questions you should gather the answers to:

  • Does my connection work if I plug a device directly into the router? This rules out a bad internet connection from your provider, and localizes it to a router issue. You could also plug directly into your modem if you really want to isolate whether or not it's your ISP causing the issue.
  • Is it one specific device that doesn't get a connection? If this is the case, it could be a hardware problem with just that device, and not necessarily your router.
  • Do your devices connect, but the connection is slow or unreliable? This could mean that there is either a problem with your ISP, or with the router that could be hardware related. You will need to call customer support--make sure you have your make and model information available.
  • Are you having problems connecting to wireless with older devices? This may be due to the type of wireless encryption you are using. WPA2, one of the most secure and common encryption methods in use, is not supported by many older devices. If your router provides the option for a guest network, you can set that up with WPA or WEP to support your older devices.
  • Do devices close to the router work, but when they are far away your wireless connection becomes poor or nonexistent? This may not be a fault of the router, depending on the product you have, the distance, walls or objects in between the router and the device, and many other factors. Most manufacturers offer a range of models that provide various signal strenghts for different applications. If you have a giant mansion and a $20 router, that might be why your signal strength isn't so great.

Rural Internet Options Still Limited

Very few homes in rural areas have cable TV access because few cable providers find it profitable to go to the expense to install digital-capable cable to serve them. At the same time some telephone companies serving rural counties do not have digital equipment in these locations that can provide DSL service. At some point they may upgrade their equipment but they won't until they deem it to be profitable. And who knows when that might be.

Satellite Internet service is provided by HughesNet, WildBlue, StarBand and SkyWay. One of the biggest problems with satellite Internet service is latency. Latency is the delay between requesting data and the receipt of a response. This is no one's fault, it's simply physics. It takes time for the signal to travel from your computer to the satellite, which is way out there in space. Even when actual data download speeds are fast, the latency issue makes satellite Internet feel very sluggish.

Read More - Click Here!

Satellite Internet Installation

 
 

Satellite internet installation is more complicated than a cable or DSL modem installation. The satellite dish needs to be handled carefully and pointed at the correct location in the sky. An experienced technician should be called to help you install your satellite.

Even satellite internet providers require their installers to be certified to set up this kind of equipment. This is because each satellite system has transmitters which communicate with the satellite, and if it hasn't been set up properly, one unit can crash an entire network, something that isn't looked upon lightly by internet providers.

Satellite systems should be installed by a professional. Below are the steps illustrating how it's done, in the event that you wish to be familiar with what your technician is doing.

Equipment Required

satellite equipment diagram

The satellite broadband system consists of several major components:

  1. The receiver and transmitter modem
  2. The satellite dish assembly that is installed outside
  3. Cables for connecting the modems and your computer software
  4. A software and indoor equipment installation guide

Of Special Note

This guide is for installers with experience. The installer may be required to:

  • Drill holes into exterior and/or interior walls;
  • Locate and drill into rafters or trusses;
  • Assess the safety of drilling next to water pipes, electrical wiring, or gas lines hidden in the walls;
  • Route coaxial cable through the foundation wall, under floors, and through interior walls;
  • Ground the satellite dish and coaxial cable as recommended in the National Electrical Code (Your hired technician knows about it. It will be better to ask them as well to get familiar);

Installation Instructions

Your installer will follow the basic steps below.

  1. Use a laptop computer to determine antenna pointing values for your satellite dish
  2. Choose an installation site
  3. Select a mounting method
  4. Install the mount
  5. Assemble the satellite dish
  6. Install the satellite dish on the mount
  7. Run cable and ground wire to connect and ground the entire assembly
  8. Aim the satellite dish
  9. Install the software on your computer and connect the satellite
  10. modems to your computer

Connecting your Satellite Modem to your PC:

Connecting your satellite to your PC can be accomplished in the following steps

A. Connecting to a single PC:

Use the included network cable to connect the satellite modem to the PC.

  1. Turn-off your PC
  2. Connect the Ethernet cable to the cable connector on the satellite modem
  3. Get the other end of the Ethernet cable or CAT5 cable and plug one end to the Ethernet port of your PC's NIC.
  4. Connect satellite dish.
  5. Turn on your PC and modem.

B. Connecting within a LAN:

To obtain satellite access for more than one PC, the modem can be connected to the LAN via a HUB/Switch. The modem serves as an internet router (DHCP-Server) for this network. You need to connect 2-NIC (network Interface Card) to your pc. One will be for internet distribution and the other for your PC's network.

  1. Turn off your pc.
  2. Connect the Ethernet cable to the cable connector on the satellite modem.
  3. Get the other end of the Ethernet cable or CAT5 cable and plug one end to the Ethernet port of your PC's NIC.
  4. Connect another Ethernet cable to the 2nd NIC in your pc
  5. Connect the other end of the 2nd Ethernet cable to the hub/switch or router.
  6. Connect satellite dish
  7. Turn on your pc and modem.

Satellite Internet Which plan is best for you

Photo(Mark Huffman @ ConsumerAffairs) If you live in rural America you may have found your Internet options are quite limited. Some areas don't even offer DSL because the telecommunications provider servicing the region has never updated its switching stations.

 

Until an expensive fiber optic network is built these regions are dependent on the new generation of Internet services delivered by satellite. Until recently satellite Internet was a frustrating mess. The satellites were too small to handle all the subscriptions and the ground receivers too slow.

But the new generation of these services – known as Gen 4 – have provided much better results. Now, there are three companies competing in this space – Exede, HughesNet and DishNet. All three companies offer various prices, based on speed and usage.

None offers a truly unlimited plan, as you would get with cable Internet, FIOS or even DSL. Instead, you get a monthly allotment of data for high-speed Internet usage. When you exceed your allowance your speed slows considerably. To get the best results you have to choose the right option for your needs.

Plans from Exede

PhotoExede offers four plans. The Classic 10 plan costs $49.99 a month and gives you 10 GB of data, at speeds of up to 12 mps down and 3 mps up. If you have two or three computers connected to the Internet and watch YouTube videos or listen to streaming music on a daily basis, you will probably exceed the allowance most months with this plan.

The Classic 15 is much the same, except that it offers 15GB of data. It costs $79.99 per month and while you may not exceed your limit most months, you won't be downloading movies every other night.

The Classic 25 offers 25 GB of data each month, giving users more flexibility when it comes to watching movies and video. But it also carries a higher price tag – $129.99.

Exede also offers what it calls the Evolution Plan, billing it as unlimited. However, it is only unlimited as far as viewing web pages and using email is concerned. For all other uses – downloading or streaming movies, for example – you are limited to 5 GB of data.

For all plans, Exede turns off the meter between midnight and 5 a.m., allowing for unlimited data usage for the night owls among its customers.

HughesNet offers four plans

PhotoHughesNet speeds and capacity rise with the price of its four plans. The base Connect plan provides up to 5 mps down and 1 mps up and costs $39.99 for 10 GB of data. The company recommends it for customers connecting only one computer.

The Power plan costs $49.99 and provides up to 10 mps down and 1 mps up, with a monthly allotment of 20 GB of data, making it suitable for handling larger files or for networks with two or three computers.

The Power Pro plan offers speeds up to 10 mps up and 2 mps down and a total of 30 GB of data, at a cost of $79.99. Again, it might provide plenty of capacity for a small business network.

The largest plan, the Power MAX, provides up to 15 mps down and 2 mps up. It offers 40 GB of data each month, the largest allotment of any satellite Internet plan, and costs $129.99.

DishNet's offerings

DishNet has three levels of high speed Internet service. The base package offers a 5 mps download speed and 10 GB of data, at a price of $39.99. It's designed for a single user.

The middle package ups the speed to 10 mps down and provides 20 GB of data at a cost of $49.99 a month. The top shelf package offers 10 mps down and provides 30 GB of data usage each month for $69.99.

While satellite Internet is far from perfect, one of the plans from these three providers may give you an adequate level of service – much more than rural Americans have been offered in the past.

Save Money On shipping

When I worked as a business consultant, I was often asked to help small businesses reduce shipping costs. With the continued increases in shipping costs, and continued economic crisis, companies can benefit by every opportunity to cut expenses. As you read about the ways that I have helped companies cut their shipping costs, think about how these examples might help your small business.
 
Never Pay for Packaging Again
 
When addressed by companies that want to reduce their shipping costs, the first thing that I suggest is to eliminate packaging expenses. Build a relationship with your local grocery store as grocers usually unpack and destroy hundreds of boxes a week. See if you can take boxes when you need them, or if you can take enough to get you through a few weeks at a time. It would not be unlikely to reduce your yearly shipping costs by hundreds or thousands by simply getting free boxes.
 
I tell employees to bring in their old newspapers and magazines whenever they have a chance. These can be used as package filler instead of bubble wrap and packaging foam. I have seen customers save hundreds of dollars a month by eliminating the need for packaging filler.
 
Delivery Area
 
One of my favorite tricks for reducing shipping costs is to show small business owners how to figure out their self-shipping area. By having your employees make deliveries and pick-ups for you, you should be able to see a significant decrease in your overall shipping costs. All you need is a map and some little markers.
 
Tag the locations on your map where your employees live. Connect these locations like connect-the-dots to show the area in which you can have your workers make deliveries or pick up product on the way to work or on the way home. Plot out any customers or suppliers in this area. Chances are good that you will be surprised at how much money you are wasting on shipping costs. How you get your employees to do this extra work is up to you. Paying for lunch, gas, or an extra hour's pay might be much less than the local shipping cost.
 
Is There an App for That?
 
App creators have come up with inventory and shipment tracking applications for tablet pcs and smartphones. Take a look at these apps and be mindful about all of the steps in your shipping process. Maybe one of the inventory apps can help streamline your overall process. There are chances that you might find an app that will help keep track of shipments that could be lost and hurt your bottom line. Maybe an app can be modified so that your customers can use the app to place their orders through their tablets and phones. This could help you to reduce your order-taking expenses which would ultimately reduce your shipping expenses.

Scan those Old Pictures and Albums

I used to think I knew a lot about scanning pictures. After all, I’ve used, sold, and trained people on scanners for over 15 years. But a couple months ago my wife pointed to a 32”x18”by18” chest that held ALL of the family’s photos and said “wouldn’t it be nice to have all of our pictures on computer so we could show them on the TV and use them on our Smartphone’s? Besides, if we had a fire or something, what would we do?” I was thinking this was going to be one of those “nice ideas” that never happened. But then she said “wouldn’t it be nice to show them to the kids when they visit over the holidays?” Whelp, she “suggested” a deadline, and I hate to disappoint her, so I put together a plan and went to work.

The scanner I use is an HP OfficeJet 8500, part of an all-in-one printer with HP Solutions Station software. They had a less expensive one, about $50, that comes with the same software that would have worked just as good. Other brands work fine too. Just make sure the scanner is “name brand” has a good user rating, and 300 resolution, cause that is the resolution you want to use. Now I don’t have any negatives or slides to scan. But if you do, make certain your scanner is setup for them.

The pictures I scanned ran the gamut, from hi-quality 4x6 glossy pictures taken with a 35mm professional camera to 10x12 portraits, to 3x3s taken long ago with a 110 instamatic, Polaroid’s, and 1x1 pictures from a photo booth at a fair. Some of the print finishes were glossy, some were matt finished, and some hung on the wall so long that the pictures stuck to the glass. We even had some old timey black ‘n’ whites on plates.

However, 90% of them were in albums with a clear plastic sheet over them, and that made it easy. Question is, do you take them out of the album or do you scan them through the plastic? I experimented and found that if the plastic was clean and flush with the picture, I couldn’t tell the difference. So I put whole album sheets on the scanner glass and did scanned them that way.

The software was amazing. An album page might have 4, 6, 8, or more pictures on it. The software detected the edges of each picture and saved each in its own file. After scanning it would display the pictures and allow me to rotate clockwise or counter clockwise by right-clicking the image. It would also allow me to crop, take out redeye, scratches and dust.

Some of the pictures required a little more massaging. Some were badly faded or the colors turned gray, blue, or brown. I used PhotoDraw, but most drawing software will do the same thing. It allowed me to click on something in the image that should be white. Based on that selection, it would alter the colors and make it right. And most of the time, it did a great job of fixing the color.

Whilst fixing pictures, you can also crop or enlarge. Don’t overdo it. If you enlarge more than 10 or 20%, the image might get “grainy”. But many times you can turn a picture of folks in the distance into a prized portrait. You can also get rid of X son-in-laws and brother-in-laws too (hee hee).

Whelp, I got ’r’ done. 5871 pictures, about 6 gigs worth. We put them on 2 computers and 3, 8 gig memory sticks, two sticks went in the safe and the other is plugged into the BluRay so we can see them on the TV. My Wife is grinning from ear to ear. While the job was grueling, the rewards were more than expected, in that whilst scanning, I remembered so many things that I should never have forgotten about people and progress, and what brought us to where we are today. Truly a rewarding (but not to be repeated) experience. My advice, get started, stay at it, enjoy the process, and reap the rewards.

Server Room Selection Keep Growth In Mind

You may not be thinking of scalability when you design a room to house your servers and other network components, but your job will be made much easier when the network starts to grow if you've taken that growth into account at the beginning. 

In a small business, "the" (one and only) server may sit in a corner of someone's office or hide out in a small storage closet. There are problems with those solutions: they aren’t very secure, and they aren’t very scalable. If office space is at a premium, it might be difficult to convince management that your servers need their own room (and good luck on getting the boss to sacrifice the only wasted space on the premises--part of his big corner office--to construct one).

But if the organization is serious about protecting its IT investments, it’s important to find a way to build a proper server room, one that offers physical security for the machines that host your most mission-critical applications and store your important data. But how do you make a small space scalable? Let’s look at some ways to do just that.

Selecting the space

If you have the option, select a space that’s larger than you currently need to accommodate future growth. Your business may be operating with a single server solution like Microsoft Small Business Server (SBS) now, but as the company grows, you’ll almost certainly find your network evolving beyond its limitations.

For security, performance and useability reasons, you will probably eventually want to separate your domain controller from other server functions, install the perimeter firewall on its own separate server, and perhaps create a DMZ or perimeter network where you’ll place mail and web servers and others that need to have direct contact with the Internet. When your company implements wireless, you’ll need a place for one or more WAPs. When it decides to cut the telco cord and go with Voice over IP, you’ll need room for a call server/IP PBX. All these new devices will necessitate more switches and routers.  And the heat they generate may dictate the need for a good cooling system.

You may be thinking that if the company grows large enough to need individual servers and all these extra goodies, you’ll have so many employees that you’ll have to move to different quarters anyway. That may or may not prove true. Many organizations today are saving money by allowing employees to work from home, implementing second shifts, and finding other ways to accommodate an increase in the number of employees without requiring more office space. However, the increased network traffic and productivity resulting from remote users and/or 'round the clock use of the network’s resources will increase the load on the IT infrastructure and will likely require restructuring and/or additional devices in the server room.

Populating the space

As you set up or add to the infrastructure, keep scalability in mind. For instance, if you add a second server, you might purchase a KVM so both servers can share a keyboard, monitor and pointing device. Instead of buying a two-port KVM to meet your immediate needs, it may make more sense in terms of scalability to look at one that will let you add additional servers as they’re needed.

Don’t forget the concept of physical scalability when you choose a form factor for those new servers, either. Especially in a limited space, a rack-mount or blade system is far more scalable than tower style servers. You can put a dozen rack-mounted servers in the same amount of space that would be used by only a couple of tower machines. The extra cost for the rack-mount form factor might be offset by the savings in space, especially in tight real estate markets where square footage is at a premium.

On the other hand, keep in mind that rack-mount servers are themselves limited in expansion capabilities. There’s little or no room to mount extra internal drives or to add expansion cards for additional functionality (for example, you might need to add additional network interface cards for multi-homed servers). These limits on expandability should be balanced against the space savings in accordance with your individual current and future needs.

Increasing scalability with virtualization technology

Another way to increase the physical scalability of your servers is to buy powerful machines and run several logical servers on one physical server with virtualization software. This can also save you money, since you’ll need to buy fewer machines.

You can use VMWare’s free VMWare Server or Microsoft’s Virtual Server 2005 to install multiple instances of your server operating systems, and then install the appropriate server applications on each. Thus you could have three logical servers, seen by the network as three different computers with their own individual IP addresses, running on a single machine.

Expanding the space

No matter how efficiently you pack the room, eventually you’ll probably need more space than it offers. That’s why it’s a good idea to consider, in the beginning, how and where you might be able to expand in the future. A server room that backs up to another room that you might later be able to commandeer could save you a lot of grief years from now. Which would you prefer to deal with: cutting a door into the office on the other side of the server room wall to double your floor space, or having to move everything (not to mention all that rewiring) in order to move into a room twice the size on the other side of the building?

Remember that as the organization grows, you’ll need that extra space for such things as a testbed network where you can check out new operating systems and applications or make sure service packs and updates are compatibility with your applications before deploying them on the production network, or distribution servers for more control over patch management.

Summary

Scalability is important in relation to more than just your network hardware and software; it’s also an important consideration when designing the space in which your network components live.

Should We Buy All Related Domain Names For Our Website, IE .NET .ORG .BIZ…?

Samuel … asked the question, “is it crucial to buy up all related domains for your website when u launch? such as yourdomain.com and the misspellings, as well as .org or .net domains?”

In times past that was the thing to do. Buying up all possible domain names meant higher traffic or more people finding your website. If your primary domain was, let’s say, traffic.com, you would probably buy traffic.com, traffic.org, traffic.net, traphic.com, traphic.org, traphic.net, as many iterations of traphic.com and misspellings that you could afford.

But that was a time where folks plugged in the domain name directly into the http address or URL field of a browser. Today, even if they know the URL or web address, they usually plug the name into a google or yahoo search field, click search, then pick the link from the search list. If they don’t know the domain name, they usually search keywords or find your site from a link on another site.

Once your site is found, many folks add your website to favorites or a bookmark and access it from there the next time, OR simply do a drop-down to find your website in history.

Buying all possible iterations of a domain name can be very costly. In yesteryear, we only had .com .org and .net. Now there are hundreds of domain extensions like .biz .tv .mob… and some have a price tag of $50 or more.

My recommendation is to put your money where it will do the most good, and that is rich effective website content so folks ‘do what you want when they get there’, and SEO (search engine optimization) so folks can find your website in the first place.

However, Samuel received lots of answers from a forum, and here they are:

TrentH  - Well, if you plan on going big? I'd say yes, atleast get the .org .net stuff, those are crucial. Than as time pass's find the common miss spellings and do them as well.

Brian-de-vie  - In principle it's a good idea, but reality has to kick in somewhen, have you calculated howmany ways 'yourdomain' could be misspelt ? Your prime domains should be .com .net .org & if applicable your country code ie .co.uk Other versions only if you expect to do some serious trading in those countries/regions, ie. .eu .cn etc.

fox80129  - Yeah, it's a good idea to buy at least .com .net and .org. Then, if your site/project is getting bigger and bigger, go for the misspelled domain names too ;-)

Junior Guru   - It's not "crucial" to buy up all the other extensions and misspellings. It may be helpful, though, but certainly not of the utmost importance.

If you publish many websites you could easily find yourself with many hundreds of domains and looking back wondering why you spent 5 figures in domain registration fees over the past few years.

shakir  - Mo chance of misspelling .org,.net instead of .com. but wise verse is possible.Its good to buy all domain .org.net and .info if you are keeping a trade name

greatandrew  - I am sorry, but I can see no reason for which it is expedient to be done!

WHT Addict   - You see, shakir, it is almost impossible to protect a trademark ordering multiple domains for the same website! For this reason it is enough to hire a good lawyer!

theuniverse  -  it depends on your site. buy yourdomain.com,.net,.org,.mobi. if your site is for specific country ,buy country extension also.

Newbie   - Yes, Its always a good idea to buy all the extensions for your main domain.

first, it helps in safeguard your brand, second, you could utilize it for other territories. Misspell version is helpful to avoid losing traffic. Don't forget to register a "sucks" version as well ex: yourcomanysucks.com

Should You Always buy new gear

Many shoppers will endure horrific lines to save 10 percent on the latest gadget, yet they shun 20- to 30-percent discounts on refurbished computers and other tech gear. The assumption is that a refurb will be faulty or buggy.

Customers do indeed return products because they didn't work correctly. But sometimes it's just buyer's remorse and the gear is fine. How do you know?

Go with a refurb from a major company. Tech giants like Apple and Dell fix, test and resell their products with the same support and warranty as new products. Apple even gives you a new battery on mobile products.

As long as you buy direct from the manufacturer (or a trusted reseller), and there's a good return policy and warranty in place, there isn't much of a downside to buying refurbished.

In Apple's case, you can even buy an extended warranty for a refurb!

Simple Website Designs Are Best

simple website design

Simple website design is by far the best website design strategy. This is a fact that has been backed by innumerable studies and focus groups. Simplifying your website design can make the difference between success or failure when it comes to your business’s website!

You’ve probably heard the phrase “work smarter, not harder.” Simple website design is the smart strategy when it comes to building your company’s website. Not only does it take less time to develop a simple, organized, streamlined website, but it can maximize your conversions, too!

Effective website design is about communicating as much as possible with as few elements as possible. Here are nine reasons simple website design is the best website design:

simple website design

9 Reasons Why Simple Website Design is Better

1. Simple website design gets more conversions

Study after study has proven that simple website design leads to more conversions than convoluted websites with excessive ornamentation. Many eCommerce store owners even report massive increases in sales after simplifying their websites.

It can be tempting to try and promote sales by pulling out all the bells and whistles, but trying too hard can actually have the opposite impact. People don’t like it when they feel like someone is trying to sell them something.

In fact, flashy websites tend to drive away conversions. Meanwhile, minimalistic sites allow visitors to easily make purchases or find important information without feeling like someone is actively trying to make them do so. This is not to say that your website shouldn’t contain any images, videos, or eye-catching colors. Rather, you should use these elements sparingly and in ways that highlight main conversion points like “add to cart” buttons, lead forms, newsletter subscription boxes, or “contact us” tabs.

simple website design

Notice how the above example has a clearly defined call to action? There is a visually appealing color scheme and some font variation to keep the web page interesting, but the overall simple website design and lack of excessive ornamentation allows users to click the largest, easiest to find button to contact one of our business development specialists about our social media advertising services. This page is optimized for conversions.

If you want more sales, consider optimizing your website by getting rid of any unneeded details that may distract users from main conversion points. Also, learn to effectively utilize white space to make a visually appealing website that is both professional and easy to navigate. Simple website design puts the focus of your site on the conversion points without leaving much room for users to stray away, thus driving sales.

2. Simple website design is timeless

In the world of website design, time moves at a rapid pace. Website fads come and go, making new styles outdated incredibly quickly. One of the only trends that has remained relevant pretty much since the advent of the Internet is simple website design.

Utilizing a simple design means you won’t have to update your site as often as it won’t soon become outdated. Some business owners are able to go years without making changes to their websites because they chose a timeless, minimalist design theme. Other business owners, however, have to update their websites constantly to keep up with evolving trends.

3. You don’t want to distract your website visitors

If someone clicked onto your website, they did so for a reason. However, that reason was probably not to admire your supreme graphic design skills. They know exactly what they want to find on your website and, as the website owner, your goal should be to make it as easy as possible for visitors to find what they are looking for.

That’s exactly why the menu or navigation bar is one of the website’s most vital elements. However, brands still tend to include and squeeze all of their pages in the main menu bar. And this can actually overwhelm the users rather than helping them locate the page they’re looking for. The optimum number of tabs in the main navigation bar should be at least 6 tabs with only a few options for each.

Removing unnecessary distractions from your website creates a more clear, concise, and streamlined user experience. The easiest way to improve the user experience on your website is to simplify it.

Don’t make your website visitors overthink. The paradox of Choice states that the more choices you give someone, the less likely they are to make any choice at all. If you overwhelm your website visitors with dozens of clickable buttons and hyperlinks, eye-catching images, videos, gifs, and more, they become much less likely to click where you actually want them to click.

simple website design

Take a look at your website. Which features can you remove to simplify your website design? Certain features may be more distracting and less important than you think.

For example, a pop-up requesting that users sign up for your newsletter may seem like a good idea. However, what if that person was going to make a purchase and you distracted them with your pop-up? Now, not only may they not make a purchase, but they might become irritated and even less likely to sign up for your newsletter than if the form was at the bottom of the page where they expected it to be.

Going a step farther, no one is going to read every word on your website. It’s best to put the most important information front and center and remove any lesser information someone might otherwise read instead. The absolute best way to ensure people will read the information you want them to is to remove any other information and streamline your website.

When you provide too many different things for people to look at and interact with on your website, it can create a great deal of confusion. Users might not know where to look or even where to start when it comes to navigating your site. Simple website design allows you to guide users’ eyes along your website with effective use of white space and clear navigation tools.

simple website design

4. Simpler designs appeal to users’ expectations

People have certain expectations for the layout of specific types of websites. Have you noticed that most of your favorite ecommerce sites have very similar layouts? That is because they are following the expected layout pattern in order to maximize conversions. If your website visitors already know exactly where to click to get to where they want on your site, even if they’ve never visited your site before, they are more likely to convert into customers.

simple website design

The screenshot above shows the bottom of the homepage of our website. Users typically expect to see a few items on specific areas of a site including a clickable logo in the top left corner that will bring them back to the homepage, a menu or navigation bar along the top of each page, and contact information at the bottom of the page. Other popular conventions you may want to consider utilizing on your site include shopping cart icons for users to view their cart if you run an eCommerce store and a search bar near the top of the page.

Websites that stray too far from expected layouts risk confusing their visitors. There is a certain amount of credibility involved with simple website design that adheres to expected conventions. When your website is both familiar and easy to navigate, it erases the learning curve and speeds up the process of a visitor becoming a customer.

If your website does not adhere to standard web design patterns, no one is going to marvel at your innovation. They’ll only be left wondering why certain buttons or pieces of information were not where they expected them to be.

5. Simple website design is universally appealing

A 2018 study by Google proved that visually complex websites are consistently rated as less appealing than websites with simple website design. A simple website design is able to quickly establish trust with your website visitors. Meanwhile, websites that contain too many images or different colors and fonts tend to look spammy.

No matter who your target audience is, they are more likely to be able to trust and easily navigate your website if it has a minimalist style. Older audiences can sometimes have a difficult time reading fancy fonts, text over brightly colored backgrounds, and heavy blocks of text without a lot of white space. Likewise,  are even more likely to be distracted by an overabundance of images and videos. The best way to optimize your website for all audiences is to simplify it.

6. Simple websites load quicker

Fast load times are absolutely imperative, not only for a great user experience, but also for good SEO rankings. According to the experts, users tend to abandon websites that take longer than three seconds to load. That may not seem like much time, but in the digital age, people are accustomed to expecting information at the click of a button. Waiting for a web page to load is not an option.

Furthermore, Google uses site speed as a part of their search engine optimization ranking algorithm. The faster your website is able to load, the higher it will rank as a result when people search affiliated keywords. Simple and well-organized website structure can do wonders to boost your website’s Google search engine ranking.

simple website design

Cluttering your website up with too many images, gifs, videos, etc. can drastically slow your load speed. By opting for a more simple website design, you can ensure your website will load much faster. Simple designs also reduce the workload on your server, which can improve load times even more. Videos and large image files take up massive amounts of space to host, and removing them from your website is one of the quickest and easiest ways to improve your website’s load speed. Most hosting companies charge by how much space your website takes up on their server, as well. So not only can simplifying your website improve your load time and increase sales, but it can also save you money!

simple website design

Notice how in the above screenshot from GoDaddy, complex sites require a more expensive web hosting plan then simpler sites.

7. Simple website design looks professional and trustworthy

Clean, simple website design legitimizes your business. It establishes trust and makes users more likely to return to your site at a later date. A 2017 poll found that 48% of people determine the credibility of a business based on its website design. In fact, the vast majority of Internet users report that the presentation of a website directly impacts how much they trust a business.

So how do you achieve this beautiful but simple style on your own website? The answer is white space. White space is all the blank space on your website that appears in margins as well as in between words, letters, images, and headlines. Effective use of white space helps users focus on one piece of your website at a time, streamlining the conversion process.

simple website design

The webpage above is a great example of how to effectively utilize white space (and how white space does not actually have to be white). There is plenty of blank space between the headline, body text, image, and call to action button. This allows the eye to easily navigate the page and quickly find the call to action.

It’s a simple fact that people are more willing to make a purchase or fill our a lead form on a website that looks professional. The easiest way to achieve a professional look on your site is to adopt simple website design with plenty of white space and careful use of fonts and media.

8. Simple website design is easy to adapt

The more complex your website is, the more opportunities there are for things to go wrong. Also, making updates to a highly detailed site can be a nightmare. Keeping the code of your website clean and simple can save you or your web developer countless hours in the future when maintenance to your website becomes necessary.

Eventually, there will come a time when you will need to make updates to your website. Whether you need to fix a bug or add new information, the simpler your website design is, the easier it will be to make those updates. Simple website design isn’t just important for user friendly navigation and conversion centered layout, it is also necessary for easy routine maintenance!

simple website design

9. Simple website design is proven to be effective

There’s a reason most major brands have simplified their logos in the past few years. Simple designs are better designs! Take a look at the images below to see how some of the world’s most popular brands have simplified their logos over the years:

simple website design

simple website design

You can adapt these same design simplification ideas to your company’s website! Notice how Google switched from a serif font to a sans serif font? This is because sans serif fonts tend to be easier for most people to read since they are more simple. Dropbox and Spotify both opted to remove text from their logos since the images speak for themselves. When possible, convey information on your website through images or infographics instead of large blocks of text. As long as the images aren’t too complicated, this can be a great way to streamline a web page and encourage more people to actually look at the information you are providing.

Takeaways

No matter what industry you’re in, simple website design is always going to be the most effective website design strategy for you. You can boost conversions, improve user experience, save money on web hosting, and even improve SEO all by simplifying the design of your website.

Sleep Mode-Shutdown-Hibernate What Should I Use???

Sleep mode, Shutdown, and Hibernate are options that we can choose to use when our computers are not in use. The best method/s to use really depends on our objectives. Do we need instant access? Are we “Green Conscious” and trying to save energy? Are we trying to maximize the life our our computer? Armed with a clear objective and a knowledge of how each of the three features works, we can make a decision that will enable us to meet our goals. So let’s dig in and find out what Sleep, Hibernate, and Shutdown are all about.

Sleep mode: A special power-saving setting that resembles a coma. Sleep mode, also known as Stand By or Suspend, saves energy but doesn’t quite turn the computer off completely. The monitor, hard drive, and various other components may be shut down, but the Operating System (Windows MAC Linux) saves our current activity in ram memory so that it can continue right where you left off when the computer resumes (comes out of sleep mode). Power consumption my be reduced as much as 90% whilst in sleep mode and your monitor and hard drive may last a little longer because of less-use. Since the computer isn’t completely off, the computer resumes quickly, and will put you right back in the program that you were working in before it entered Sleep mode. There is a downside to Sleep mode; if your computer loses power whilst in Sleep mode, you will loose unsaved documents and there is a slight risk that you could corrupt your program.

Shutdown: Shutdown is very simple. Programs are closed, data is either saved or discarded, the computer ceases to functions, and no power is used during Shutdown.

Hibernate: Hibernate shuts down your computer completely. However, a “Snap Shot” of what you were doing at the time of shut down is retained, that is, saved to your hard drive. When the computer comes back on, it starts programs and opens data/documents, so that you can continue working right where you left off. Unlike Sleep mode, no power is used when the computer hibernates. This is good from an energy point of view. However, the start-up time is much longer than Sleep mode and Shutdown.

What we do: We usually do not Shutdown our computers. Computer seldom break down because of use. The power savings is is minimal, and this allows us to automatically run updates, virus scans, and backups at night rather then fight or compete with them during the day. Since memory is only made to remain stable for about 24 hours, we restart our computers each morning to refresh memory and delete cache.

Sleep mode and Hibernate have an interesting feature that can be used to great advantage. They both have the ability to “Wake Up” when called upon to do so by program like AntiVirus and Microsoft Update. So what we do is set the computer to go into Sleep mode after 15-30 minutes of inactivity, then Hibernate after 1 hour of inactivity. In that way, we get the best of both worlds. We save some energy during the day when the computer is not in use, and we can access our data quickly when it comes out of sleep mode. At night we save energy but still received automatic computer updates and Virus Scans.

Why not just leave the computer on all the time? Fact is, Safe Mode, Hibernate, and Ram Memory don’t always work as designed. Power blips and Ram imperfections may cause data loss or file corruption. So if we plan to be away from our computers more than a few minutes, we should save our data and exit our programs, especially at night when we go home for the evening.

Bottom line: It is best to use all three modes, Sleep, Shutdown, and Hibernation, in combination for efficient computer operation and energy savings. But always remember to restart your computer in the morning to insure a trouble-free day.

Small Business Technical Missteps During A Tough Economy

'In this tough economy, some small businesses have considered cutting back on regular maintenance for their networks and computers. The following is a list of the 10 most common technical missteps that have resulted in system failures with data loss:

Insufficient technical support
1. Unresolved Hardware/software issues
2. Insufficient power protection (no battery backups or UPS with dead batteries)
3. Illegal software
4. Insufficient training
5. Security failures
6. Poor or no backup strategy
7. Virus exposure (no antivirus or out of date subscriptions)
8. Spyware exposure
9. Unsolicited e-mail
10. Not maintaining and enforcing a technology and email policy

It is imperative that small businesses adopt or maintain the following business practices:

1. Implement and enforce strong password security policies for all PCs, servers, network equipment, and software applications.
2. Regularly update operating systems, network equipment firmware, and applications with the latest security patches.
3. Deploy business-class firewalls in all locations; connect no systems directly to the Internet.
4. Secure all wireless networks.
5. Disable guest accounts.
6. Implement Internet and e-mail usage policies that preclude personal use of those technologies.
7. Prohibit file-sharing programs.
8. Deploy proven antivirus, anti-spyware, and anti-rootkit applications and update them regularly.
9. Regularly perform security audits and correct all deficiencies.
10. Maintain and evenly enforce a technology and email policy

So You Wanna Work From Home

Whether you’re an employee of a company or an independent professional working for yourself, working from home might make sense,. However, you should also be aware that working from home can cause problems if you are not prepared. So here are some tips for successfully working from home.

1. Dress the part:
No, you don’t have to don the three piece suit or the wing tip shoes or the

   female equivalent. But neither should you simply roll out of bed and move to your desk, clad

   in your pajamas. Yes, it’s unlikely your co-workers or clients will see you dressed this way.

   Nonetheless, the way you dress can affect your attitude and your productivity. In addition, the

   act of changing can help you distinguish, psychologically, between work and home — an

   important distinction, discussed more below.



2. Keep a separate office:
For the same reason your dress should be different for work, so

   should your office. You probably could work from the kitchen counter or in the family room.

   However, the chances of distractions and of lowered productivity increase significantly

   compared to working in your own separately defined home office. The separate area might

   also be necessary to satisfy IRS home office requirements (but check with your tax advisor to

   make sure).



3. Discipline yourself regarding break times:
Yes, you can knock off work every 10 minutes to

   watch television or pop in a DVD. If you do, though, you might go through the day without

   accomplishing anything. The need for time management and discipline becomes even

   greater when you’re on your own. Establish those periods of time when you work and those

   times when you take a break and stick to them.

4. Discipline yourself regarding snacks: In other words, watch what you eat. It’s easy to wander

   to the kitchen for a snack. Too much snacking will ruin your productivity and your waistline.

   Exercise discretion and discipline here as well.

5. Check insurance: Make sure your homeowner insurance covers your work-at-home activity.

   This issue is particularly important if you anticipate having visitors, such as co-workers or

   clients. You might even check to see whether your company will subsidize part of that

   insurance.

6. Educate and set guidelines for the family: Do you have a spouse, children, or even parents

   living with you? Make sure they know about this arrangement. It might be difficult, but they

   need to realize that even though you’re at home, you’re still, at times, “at work.” Having a

   constant knocking on the door to handle this or that domestic emergency will prevent you

   from concentrating and completing your tasks. Establish guidelines for when you are

   available and stick to them.

7. Establish start and stop times: Many people think that working from home helps achieve

    work/life balance. Yes, it can, as long as you keep clear the distinction. If you don’t, your

    work/life balance actually could become even worse because you won’t know when to stop

    “working” and start “homing”. As with dress and with your office, set clear times when you

    start working and when you stop. When the latter time comes, really DO stop. Avoid going

    back to your home office or just to send one more e-mail.” That one e-mail will become a

    second, and a third. Once the time comes, just stop until the next day.

8. Use a separate phone line for business: Regardless of whether you’re an employee or on

    your own, get a separate line for your business. Having your five-year-old answer the phone

    for relatives or friends might be cute, but it could mark you as unprofessional to others who

    might call. If you use an answering machine or service, call your own line and check the

    quality of your greeting. You don’t want to sound like you’re speaking from the wreckage of

    the Titanic.



9. Clarify computer ownership and policies:
Whose computer equipment will you be using? Will

    the company supply you with a computer or will you be using your own? If the latter, how will

    any acceptable use policies affect your computer? Does your company use of your own

    computer preclude you from using it for personal matters? What antivirus or patch update

    policy will you need to follow? Clarify these questions before you begin your computer work,

    because they touch on important privacy and security issues.

10. Check zoning if necessary: Check with your local government about your work arrangement.

    If you’re receiving visitors or receiving regular deliveries, the government might be concerned

    about traffic and parking. However, if all you’re doing is plain work, you likely will have less, if

    any, problem. In any event, it’s always good to make sure.

11. Keep in touch with the boss: I’m sure you have heard the saying, “out of sight, out of mind”?

    Don’t let that happen to you. Make sure your boss knows about your accomplishments. If

    your schedule calls for you to be physically at your “real” location once or twice a week,

    consider meeting with your boss about what you’ve been doing. Otherwise, make sure your

    boss knows about your projects and successes, either via phone or e-mail. You don’t want

    your lowered visibility to hurt your chances of promotion and salary increases.

Social Media - Deal With It - Suggested Social Media Policy Content

When the social networking phenomenon began, many companies dealt with it by not dealing with it — they simply banned/blocked social networking sites on the company network. Like the U.S. government's attempts at Prohibition of alcohol in the 1920s, that didn't work so well. Today's young workers have grown up with Internet access and come to the job with the expectation that they'll have those resources at their disposal. If you deny them the ability to check their Facebook pages during lunchtime or tweet when they're taking a coffee (or more likely, energy drink) break, they might find a way around it or may leave to work for a company that has fewer restrictions.

But it's not just about catering to spoiled workers. In many business types, businesses are learning that social networking, used properly, can be an effective business tool...

Having your employees involved in the community can enhance the company's reputation and bring in more business — so long as it's done right. Thus many large firms, especially in the technology industry, are actually encouraging their employees to blog, tweet, and participate in forums and social sites on company time.

Even so, you still need to exert some control over how these sites are used. You can't just give employees free rein and hope they'll all exercise common sense. And you can't, in all fairness, blame them for violating rules that don't officially exist. You need a social networking policy that explicitly lays out what is and isn't permissible, both on the company's network and outside of it if they're presenting themselves as representatives of the company.

If you do decide to take the “easy” way out and just block social networking sites at the company firewall, remember that what employees are posting from home can still affect your company's reputation, so you still need a social networking policy. In this article, we'll provide some tips on what you should be sure to cover in your social networking policy.

1: A clear company philosophy

Before you can develop a policy, you need to define the company's overall attitude toward social networking. Is it something that you consider to be a strictly personal activity, which should be generally restricted — like personal phone calls and visits from family members — to the employee's break and lunch times? Or is the company interested in encouraging employees to use social networking for business purposes and incorporate it into their working time?

Some sites, such as MySpace, are primarily for personal socializing. Some, such as LinkedIn, are purely for business. But others, such as Facebook and Twitter, straddle the fence and are used by many for both purposes. You may want to allow or disallow use of specific sites during work time, but that's a challenge because new sites are always popping up and old sites are always evolving. For example, Facebook began as a venue for college students, but the demographics have changed. A recent study showed that the number of older Facebook users has grown tremendously  over the past year, in comparison to the number of younger users.

2: The definition of "Social Networking"

It may seem obvious, but it's important that your policy define what is meant by “social networking” or “social media,” since the term means different things to different people. Everyone knows Facebook is a social networking site, but what about Flickr (photo-sharing site), Indaba (musicians' collaboration site), or LiveJournal (blogging site)? Are Web forums, such as those hosted by many companies for their customers to ask questions, considered a form of social networking under your policy? What about “old-fashioned” online networking methods, such as email discussion lists and newsgroups? Or what about Digg, the “social news site” that allows people to share content?

You may want to name specific sites and technologies, but because new sites are always popping up, you should make it clear that the policies are not limited to the named sites.

3: Identifying oneself as an employee of the company

Your social networking policy should also make clear whether employees are allowed to identify themselves as representatives of the company. Most social networking sites have fields in the user profile for work experience, job title, etc. By identifying oneself as an employee of XYZ Inc., a social networker becomes, to some extent, a representative of that company, and everything he/she posts has the potential to reflect on the company and its image. Unless the employee is engaging in social networking for the specific purpose of promoting the company, some organizations prohibit their employees from listing the company name on such sites. If employees are allowed to advertise their association with the company, your policy should impress upon them that they take on the responsibility for representing the company in a professional manner.

If social networking users identify themselves as employees of the company, your policies should require that any personal blogs and other personal posts contain disclaimers that make it clear that the opinions expressed are solely those of the author and do not represent the views of the company.

4: Recommending others

Some social sites provide for members to write recommendations or referrals for friends/associates. If an employee does this as a representative of the company, it may give the appearance that the company endorses the individual being recommended. That could create a liability situation if another company hires the recommended person on the basis of the recommendation. For that reason, some company policies prohibit employees from making such recommendations or referrals.

5: Referring to clients, customers, or partners

Your company's relationships with clients, customers and partners are valuable assets that can be damaged through a thoughtless comment. Even a positive reference could be picked up by a competitor and used to your company's disadvantage. Your social networking policy should make it clear that employees are not to reference any clients, customers, or partners without obtaining their express permission to do so.

6: Proprietary or confidential information

Even though you may have other policies that cover the dissemination of the company's proprietary or confidential information, trade secrets, etc., the social networking policy should reiterate those policies and provide specific examples as they relate to social networking sites. Because social networking communications are somewhat informal, it's easy for employees to develop “loose lips” - especially when they think they are discussing only among themselves.

Social networking sites have varying levels of security and as public sites, all are vulnerable to security breaches. Your policy should make it clear that proprietary information is not to be discussed or referred to on such sites, even in private messages between site members who have authorized access to the information. You may want to spell out examples of information that is considered to be off limits, such as the company's financial information, intellectual property, information about customers, and so forth.

7: Terms of Service

Most social networking sites require that users, when they sign up, agree to abide by a Terms of Service (ToS) document. Your policy should hold employees responsible for reading, knowing, and complying with the ToS of the sites they use. It should not contain rules that require employees to violate the common ToS stipulations. For example, most ToS agreements prohibit users from giving false names or other false information, so the company policy should not require users to use pseudonyms when signing up for social networking sites.

8: Copyright and other legal issues

Policies should require that employees at all times comply with the law in regard to copyright/plagiarism. Posting of someone else's work without permission is not allowed (other than short quotes that comply with the “fair use” exceptions). Other relevant laws include those related to libel and defamation of character. A good rule of thumb is the one our mothers taught us long ago: “If you don't have something good to say, don't say anything at all.” Defamatory statements can lead to lawsuits against the author of the statement — and if that is one of your employees, at the very least it can bring bad publicity for the company. A slander suit was filed against singer Courtney Love for posts she made on Twitter.

9: Productivity impact

Social networking sites can be good tools for developing business relationships, but they can also turn into big time-wasters. It's easy to set rules for purely personal use of the sites, but it's more difficult to draw the lines when it comes to business-related networking. As with the “six martini lunch,” appropriate use often slips gradually into abuse without the employee even realizing it. That's why it's important to set guidelines and priorities. Your policies should make it clear that social networking activities are not to interfere with the employee's primary job responsibilities.

10: Disciplinary action

To have teeth, a policy must include consequences for violations. The policy should spell out that violation of the policy can result in disciplinary action, up to and including termination, and reference other company policies that lay out the appeals process and other relevant information.

Social Media Marketing Costs

Social Media Marketing CostsChief Marketing Officers, entrepreneurs and business owners are doing everything in their power to interface social media into the super-fast evolution of technology, and how they impact marketing.  They already know that social media connects them with their audiences, but the information gap on the true costs involved in a social media campaign is widening faster than the learning curve.  The time and resources invested in a campaign must be understood and evaluated in order to realize some level of return on that investment.

Three things to consider when contemplating a social media campaign:

Read More - Click Here!

Social Networking Sample Policy

Sample social networking policy

Introduction
Organizations may not know exactly how to manage social networking sites from a policy
perspective. While organizations cannot control what its associates do on these sites,
authoritative policies can be drafted to establish protocol for appropriate and inappropriate
behaviors as it relates to the workplace. The following is a  sample policy that you can use and customize to protect your organization’s interests. 

Social Networking Policy

Authority
This social networking policy applies to all associates, contractors, business partners or other
parties with a material interest in [Acme, Inc.] (collectively referred to as the associates). This
policy is approved by Human Resources and the executive steering committee. 
State of social media, Social media, professional networking sites, rapid-fire communications, blog sites, and personal
Web sites are all useful technologies; [Acme, Inc.] realizes this fact. Every associate has an
opportunity to express and communicate online in many ways, and [Your Company] encourages an
online presence. Above all else, everyone needs to use good judgment on what material makes
its way online. 

This policy will set forth guidelines that employees should follow for all online communications in
reference to [Your Company].
Relevant technologies
This policy includes (but is not limited to) the following specific technologies:
  Personal blogs 
  LinkedIn
  Twitter
  Facebook
  Google+
  MySpace
  Personal Web sites
  Digg

Responsibility
Any material presented online in reference to [Your Company] by any associate is the responsibility
of the poster. We encourage all communication to be made in an identifying manner, to
establish credibility above all else. Along with clear identification, associates must state that any
opinion is yours individually and not a form of official communication from [Your Company].

Topic matter guidelines
[Your Company] associates are encouraged to use the following guidelines in social networking
practices:
  Be relevant to your area of expertise.
  Do not be anonymous.
  Maintain professionalism, honesty, and respect.
  Apply a \"good judgment\" test for every activity related to [Acme, Inc.]: Could you be guilty of
leaking information, trade secrets, customer data, or upcoming announcements? Is it
negative commentary regarding [Your Company]? 

Activity showing good judgment would include statements of fact about [Your Company] and its
products and services, facts about already-public information, or information on the [Your Company]
Web site.

Further, if any associate becomes aware of social networking activity that would be deemed
distasteful or fail the good judgment test, please contact the anonymous social media response
center at: socialresponse@[Your Company].com. 

Company assets
The use of company assets (computers, Internet access, email, etc.) is intended for purposes
relevant to the responsibilities assigned to each associate. Social networking sites are not
deemed a requirement for most positions, and certain job titles are not permitted to access
these services over the Internet. For associates that are allowed to access these services, a
reasonable and limited amount of use of company assets are permitted for social networking
services. 

Inaccurate or defamatory content
Associates who participate in online communication deemed not to be in the best interest of
[Your Company] will be subject to disciplinary action. This online communication can include but is
not limited to:
  Company information or data leakage.
  Inaccurate, distasteful, or defamatory commentary about the company.

Disciplinary action can include termination or other intervention deemed appropriate by Human
Resources.

Off-Limits material
This policy sets forth the following items which are deemed off-limits for social networking:
Intellectual property, trade secrets, or customer data
[Your Company] 's intellectual property, trade secrets, and customer data are strictly forbidden from
any online discourse except through mechanisms managed internally by [Your Company]
communications or marketing groups. 

Online recommendations
Some sites, such as LinkedIn, allow members to \"recommend\" current or former co-workers.
[Your Company] forbids associates to participate in employee recommendations for reasons of
company liability. All communication of this type should be referred to Human Resources for
verification. 

Financial information
Any online communication regarding the company's financial data is strictly forbidden except
through mechanisms managed internally by [Your Company] communications or marketing groups.

Company-sensitive matters
Any online communication regarding proprietary information such as layoffs, strategic decisions,
or other announcements deemed inappropriate for uncoordinated public exchange is forbidden.   

 

 

 

Solid State Drives (SSD) vs Traditional Platters Hard Drives

Solid state drives offer a number of advantages over traditional platter-based hard disks. SSDs are smaller, faster lighter, and less prone to failure because they lack moving parts. But the big reason we aren't all using them is that they cost far more than a traditional hard disk drive. A quick check of tigerdirect.com shows several models of 160 GB SATA hard drives for under $40, or about 62 cents per gig. The least expensive 120 GB SSD is $155, or $1.29 per gig.  The largest SSDs at this time are around 360 gigs at over $1200. You can buy 8 or more 5 TB drives for that.

But is there a place for SSDs? SSDs are great for loading lots of small files very very quickly, like booting an operating system (like Windows or Linux) or running a program (like Microsoft Office or Open Office). There is much debate concerning SSDs effectiveness at reading large sequential files like videos, data files, and large pictures. In addition, modern CPUs easily handle data accessed from multiple drives and the internet. The CPU is not the bottleneck; it’s the hard drive.

Therefore, the best solution may be a hybrid solution. Use a 120 gig SSD for your operating system and programs, then use a large traditional hard drive for data storage. In this way, you get very fast access times whilst holding on to your precious dollars.

Solid State Hard Drive Maintenance (SSD Maintenance)

Overall, SSDs require very little maintenance. Fragmentation doesn't slow them down, though it wouldn't hurt to run defrag once a month. They can withstand a "drop to the floor off of the desk" much better than a standard hard drive (though we don't recommend testing this statement). Overheating does not seem to be a problem either.

We recommend that you keep an eye on available free space. Since SSDs are smaller than conventional drives, they can quickly become full.

We would also recommend a disk check once a month. Hard drive errors and broken permissions can destabilize SSDs over time and create disk errors, and loss of data.

In Windows, click Start, Computer, then right-click the disk, click Properties, Tools, and Check Now. Check the box that says "Automatically Fix Errors" and click start. If this is not a boot drive, check disk will start immediately. If it is a boot drive, check disk will start the next time you reboot your computer. The next computer startup might take several minutes longer than normal whilst running check disk. Errors are fixed automatically. However, if you receive unrecoverable errors, you might need to replace the drive.

With MACs (Apple), to run a disk check, go to the Utilities folder and find the Disk Utility program. Run Verify Disk from the First Aid tab. If errors are found, you can run the repair tool. As for Disk Permissions, you don’t really need to bother checking it. The crew at Apple's Genius Bar doesn’t. Go ahead and click "repair disk permissions."

SSDs will wear out over time, just like any other hard drive. Make sure you have a good backup system.

Spice Up Your Email Signature

Whether you want to impress a client or score a new job, it's vital that you stand out. But that doesn't always require big thinking -- sometimes the smallest details can be enough to get noticed. One easy way is to jazz up your email signature.

You can spice up your sign-off with different colors and fonts, but it's also important to showcase the many facets of your personality and skill set. Don't make email recipients search for your web presence -- provide links to your website and any relevant social media presence. Your email signature can give people a taste of your personality and the culture of your business.

That being said, you ought to keep the signature short and concise -- rather than including every single form of contact in your signature, stick with three. If anyone really wants to know more ways to get in touch with you, they'll likely be able to figure it out.

Here are six services that will help enhance your email signature. Have you gotten creative with your digital John Hancock? Let us know in the comments.

Read More - Click Here!

Squeeze More Juice out of your SmartPhone Battery

photo (1).JPG

(FoxNews) The more functionality we pack into our smartphones, the more power they need to run. It’s been over a year since J.D. Power surprised no one by revealing that poor battery life has the biggest impact on consumer satisfaction. Running out of juice is still the number one annoyance for smartphone owners. We’re not much closer to long lasting smartphone batteries, because we’re still reliant on the same old technology.

How do you make that battery last? What are the essential tips for saving smartphone battery life that will see you through the day? We’ve already looked at how to maximize your iPhone’s battery life, but in this article we’ll run through some general tips that will work for any smartphone. Then, we’ll take a look at advanced tips, accessories, and apps that could help.

  • 1Basic battery saving tips or 'turn it off'

    FoxNews.com

    Obviously, the No. 1 battery saving tip for your smartphone, is to turn it off. If you’re in a dead zone, or you need to conserve some battery for later, then you should definitely just turn it off. All of the basic battery saving tips you’ll ever see for smartphones are related to this idea. Maybe you can’t (or don’t want to) turn the device off. In that case, you should turn off some of the functions.

    Also, make sure you don’t have Wi-Fi, Bluetooth, GPS, or anything else on when you aren’t using it. Don’t allow push notifications for email updates. Don’t connect to a 4G LTE network when 3G will do. Turn your screen brightness and volume down. Turn vibrations off. Don’t use widgets or animated wallpapers. Whatever you do, don’t play games or watch video.

    Of course, no one really wants to hear this. We remember having mobile phones that handled calls and texts and nothing else. The battery life was amazing, comparatively speaking, but who wants to shell out hundreds of dollars for a phone that just enables calls and texts? What’s the point in having a smartphone if you can’t enjoy the features?

  • 2What makes sense for you?

    It is easy to make battery savings without missing out on the features you love. A lot of people never switch from defaults, even if they find them annoying, but they really should. Turning off vibration and sound feedback for typing is a good example. You may also find that you don’t really need to know every time a vague acquaintance posts something on Facebook or in a Google+ group that you’re part of. A lot of apps have push notifications on by default and they eat a huge amount of battery juice. They can also constantly distract you with inconsequential nonsense.

    RELATED: How to transfer your contacts between iPhone and Android

    Location tracking is another feature that is often left on, even although the smartphone owner is not using it. Watch out for apps that want to know your location. If you’re not actually using the smartphone for navigation right now, then there’s very little benefit to allowing location tracking.

    It doesn’t have to be a major chore. Many smartphones come with quick settings menus that allow you to turn off features with a tap when you don’t need them. If yours doesn’t, then you’ll be able to find an app that offers this functionality. Windows Phone actually has a built-in Battery saver feature which you’ll find in Settings.

  • 3Managing your screen

    As smartphone screens get bigger, the display is responsible for eating more and more of the battery life. On Android you can go into Settings > Battery, or Settings > About phone > Battery use and see exactly what ate your battery. Invariably, your screen will be top of the list.

    We’ve already mentioned reducing the brightness level. That will have an impact. You can also decrease the screen timeout. You’ll find it in Settings > Display. Make it as low as you possibly can before you find it terribly frustrating that your screen keeps turning itself off. On Windows Phone you’ll find the option in Settings > Lock + wallpaper > Screen times out after. On BB10 it’s Settings > Display > Screen Lock Timeout.

    RELATED: Apple beings investigation into iPhone 4s battery life

    If you have an AMOLED screen, then you can save battery by using a dark background. The technology turns off pixels when they are black, so if you have predominantly black wallpaper, then you can actually save a lot of juice.

  • 4Advanced tips for saving juice

    Keep your apps up to date. Developers often release updates for apps and games that offer improved optimization and this can have a big impact on battery life. If you discover a battery hog, then consider removing it. Don’t use task killer apps.

    Keep your smartphone as cool as possible. Sitting in direct sunlight on the dashboard of your car will actually drain the battery faster.

    RELATED: Sony rumored to be working on a sensor-shifting camera that ‘autofocuses’ any lens

    Different batteries respond to different charging schedules and they will all eventually degrade. Most smartphones have lithium-ion batteries in them. One thing that many people do which can degrade the battery’s health is to leave it plugged in after it is fully charged. If you’re going to charge your phone overnight, then try to use a charger that shuts off once the battery is full. It’s also best not to let your battery fully discharge too often. Once a month is handy to ensure that calibration is correct (so your phone can tell you accurately how much battery life is left), but in general you want to charge it before it drops too low.

  • 5Battery saving apps

    You’ll find various battery saving apps on all the major platforms. Some of the best options can help you identify what is eating your battery and allow you to save juice without having to dig into individual features and do a lot of manual tweaking.

    The most popular option for Android is Juice Defender. It’s completely free and you can choose preset profiles, so there’s no need to get your hands dirty, unless you want to. Android gives apps more power to influence your battery drain than other platforms, but you can still use apps on other platforms to gain an insight and find more tips.

    On iOS, the free Battery Doctor app provides useful insights and reminders. For Windows Phone 8, there’s a popular app called Battery, which displays how much battery life you have left and gives you access to quick settings. Battery Lover is a very similar app for BlackBerry 10.

  • 6Battery accessories

    f you have a device with a removable battery, then you can always buy a spare battery and carry it around with you for emergencies. For some smartphones you can even buy bigger batteries with replacement back covers that accommodate the extra size, but you will inevitably be adding bulk to your device.

    You might consider getting a case with a built-in battery. These are specifically designed for certain models, which means that you’ll find plenty for the iPhone, but you might struggle to find one for a less popular phone. For example, Mophie is a popular brand for the iPhone. You’ll also find a good option from PowerSkin for the Z10 in our best BlackBerry Z10 cases roundup. Seidio offer extended battery cases for quite a few smartphone models.

    Chargers that fit the lighter socket in your car can be snapped up cheaply. They’re ideal for extending your smartphone battery when you’re on the road, especially if you use your smartphone for navigation.

Start Your New Business With 12 Basic Tools

( @ SiteProNews) Entrepreneurs literally have to shoulder the world. Starting a new business is daunting, all-consuming, and depending on your niche, extremely expensive. There’s an endless assortment of to-do’s, huge decisions to make every day, and a herculean assortment of needs to get the vision launched and thriving.

Thank goodness for the myriad of free tips and tools available all across the web. If you’re in the starting stages of launching a brand new business, feast your eyes on this invaluable assortment of free tools to make the process easier.

Entrepreneurs literally have to shoulder the world. Starting a new business is daunting, all-consuming, and depending on your niche, extremely expensive. There’s an endless list of to-do’s, huge decisions to make every day, and a herculean list of needs to get the vision launched and thriving.

Thank goodness for the myriad of free tips and tools available all across the web. If you’re in the starting stages of launching a brand new business, feast your eyes on this invaluable list of completely free tools to make the process easier.

1) Business Startup Kits from Entrepreneur.com

For business owners still contemplating the type of business they’d like to launch, these startup kits from Entrepreneur are fantastic. They divulge the ins and outs of many major business categories, and give complete overviews of what it takes to achieve success.

2) Get a Reality Check

Before you invest loads of time and money, visit BizFilings’ Startup section to see if you really have what it takes to be an online business owner. BizFilings offers a host of resources for the aspiring entrepreneur, including a valuable guide listing all the steps to take on before you start your business.

3) Free Online Business eBook

Author Jennifer Laycock has been involved in launching online businesses since 1995, virtually since the practice debuted. She generously penned this comprehensive startup ebook and offers it for free by download to budding entrepreneurs. Titled “Zero Dollars, a Little Talent, and Thirty Days“, the book explores all kinds of successful tactics, including affiliate marketing, SEO, viral marketing campaigns, and savvy networking.

4) Solidify Your Vision, Visually

The Startup Toolkit is a unique and terrific free tool that aids entrepreneurs in the process of visually defining their business idea. As your hypothesis evolves, the Startup Toolkit helps you to make sense of all the complexities in a very pictorial fashion, which can help you see gaps and special areas of focus more clearly.

5) Impressive Suite of Free Business Tools

Looking for the most comprehensive collection of must-have business tools, like email, chat, bug tracking, instant messaging, collaboration tools, and customer retention management (CRM), all free of charge? Zoho to the rescue. Zoho offers free versions of dozens of applications to individuals just starting out, including calendar tools, project management, meeting software, and all kinds of reports. Subscription fees apply as your business grows, but you can get what you need without spending a dime through your entire launch phase.

6) Best Free Destination to Get Educated

This is one heck of a competitive world, so once you focus on your niche, it’s crucial to be educated about all the nuances of your business realm. The BizInfoLibrary is an outstanding resource loaded with free information for any entrepreneur. You’ll learn everything you need to know about topics like governance, legalities, marketing tactics, risk management, HR, and financial management.

7) Build the Perfect Business Plan

Communicating your vision to would-be investors and partners is an integral part of launching a new company. If you’re ready to take the plunge into penning a business plan, check out the wonderful free resources at Bplans. You’ll find an endless array of valuable tips and templates, outlines, sample content, and related advice.

8) Guide to a Magnificent Visual Presentation

Once you have a well-crafted business plan, visit PlanCruncher for the finishing touches and a step-by-step guide to the ideal visual presentation. Words alone won’t sway the investors and partners you need to make your business a success, and this free, no-registration tool can help you take your plan to the next eye-popping level.

9) Startup SEO Tools

If you’re launching an online business, setting up stellar organic SEO strategies on day one is essential to success. SEOBook has created an awesome suite of free SEO tools for business owners that are must-haves at launch. Offerings include SEO toolbars, a rank checker to keep tabs on your search placement, keyword suggestion tools, and a meta tag generator.

10) List of Free Press Release Distribution Sites

Once you are ready to alert the world that your company is live, visit Mashable’s list of free press release distribution sites. You’ll be able to submit press releases to a myriad of services and start sounding the alarm that you are open for business.

11) Learn the Ropes from the Pros

If online courses are more your style, MyOwnBusiness will make you cheer. They offer a completely free and very robust online course that covers nearly everything you need to know about launching a new business. Additionally, the site has courses for folks looking to expand an existing business too.

12) Manage Your Finances for Free

Once you are tracking sales and expenses, queue the very necessary assistance of FreshBooks. The tool is free to business startups with three or less clients. FreshBooks lets you track online invoicing and payment processing, and will even assign a free business consultant to assist you in making the most out of every feature.

Stealth Search Engine Offers Private Internet Browsing

Quick Pitch: Search the web anonymously

Genius Idea: Stealth is a search engine that does not store cookies, track IP addresses or save search terms.Your internet footprint can be minimized with a new stealthy search.

The Stealth search engine allows users to search the Internet without being trailed by cookies and other tracking devices. The startup is all about protecting privacy.

Jon Cook, the founder of the startup, was inspired by the intermingling of Google’s social media and search engine. Google’s updated privacy terms nudged Cook to roll out a service that allows users to avoid being tracked online.

Stealth doesn’t store cookies, track IP addresses or save browsing history like many of the top search engines such as Google and Yahoo do. Websites and a user’s browser communicate and share information through cookies, which can pick up private data from users.

“One of the scary things about Google is they track everything you do even when you aren’t on Google,” Cook said. “I think people want real privacy and that is what Stealth offers.”

Read More - Click Here!

Stop Programs from Starting when you Boot Your Computer

There are a number of programs that start automatically when boot up your computer, and some of them are not necessary, causing your computer to boot slow and run slow. There is an easy way to prevent programs from starting automatically, and this is how we do it:

  1. Click your user account icon or type your password to log on.
  2. Now immediately press the Shift key.
  3. Hold it until the desktop and taskbar load.

Easy – HuH!

Stop Wearing Your Earphones the Wrong Way

(Michael Calore @ Wired) I love listening to music on in-ear headphones. The sound is rich and perfectly clear, they block out external annoyances, and they’re super light and portable. As such, I frequently recommend them to friends when they ask me what kinds of earphones they should buy. But just as frequently, those friends come back and tell me they’re unsatisfied with the sound. Tinny, they say. Not enough bass. And they fall out too often. This is usually the point where we both realize it’s an issue of fit, not function.

In-ear headphones look like earbuds, but they don’t work the same way. They don’t hang in the crevices of your ear-folds like a traditional bud. They’re meant to be worn fully inserted into your ear, so the squishy tip can form a tight seal with all of the walls of your ear canal — like a cork in a wine bottle. If you don’t get that proper seal, the transference of sound will suffer (especially the low frequencies) and too much outside noise will creep in.

You don’t just jam them in there, though. You have to properly seat them in your ears. Here’s a fail-safe method:

Start by placing the tips in your ears and pushing them in just a little bit. Then, use both hands to seal them up. For your left ear, reach up with your right hand and grab your left earlobe. Pull the lobe downwards a little to widen your ear canal. Then, use your left index finger to gently push the tip further into your ear. Don’t shove it all the way in, but far enough to where you feel the seal. Finally, let go of your earlobe. Your ear canal returns to its normal size, and you’ll feel the seal tighten. Now do the same for your other ear.

You’ll notice the sound coming out of the earpieces is louder (go ahead and turn the volume down a little) and that the bass is much improved. You’ll also notice you’re pretty isolated in there. Some people don’t like this — it can feel claustrophobic. But the music is much more immersive when there’s less outside noise coming in. So learn to enjoy the solitude.

Getting the perfect seal also requires finding the correct tip size. Most in-ears come with a few different sizes of tip, as well as different materials like rubbers and foams. Start with the medium size rubber tip. If that doesn’t give you a great seal, move down one size to the smaller tip and try that first. Try the largest size last — you’d be surprised, but a smaller tip sometimes gives you the more comfortable seal. If the rubber tips aren’t working, try the foam variety. There’s a company called Comply that makes excellent foam tips for all different kinds of earbuds and in-ear headphones. So if none of the tips that came in the box work for you, give Comply a shot.

Photos: Josh Valcarcel/WIRED

Stop using free email addresses and this is why

There are several reasons why you should stop using free email addresses for your business. Using free email addresses, such as gmail or hotmail, could position your business as spam and give potential customers the view that your business is not properly established or credible.

Think of your favorite brands. Are there any that use free email addresses to communicate? The reason why most of them don’t is because having a professional email address helps businesses have a professional outlook.

With free email addresses, because there are often time millions or even hundreds of millions of businesses using the services, it is often difficult to get an email address relevant to your website. With your own custom emails, you can create a business email address for yourself. This is an effective way of branding yourself and your business and would make your email address more memorable to your clients.

Many organizations also block free email accounts so as to prevent viruses and spam. And, one of the most important aspects of having an email address is so that people will receive and read the emails you send.

Having a custom email account reduces your risk and lowers your cost as a credible business, since the goal is to have customers and prospects read your emails, communicate with you and purchase. Also, a custom email address has a very low overhead. The cost to your company is less than the price of a movie ticket. - See more at: http://www.yola.com/blog/why-your-small-business-needs-its-own-email-add...

Success 20180216

Success is answering the question "How Can I..."  Followed quickly by the statement "DONE!"

Successful WebPages

The homepage of your website is often the landing page and is critical to the success of your online business. When people land on this page, you have just a few seconds to capture their interest. This page will be a giant factor in your conversion rate which is the ratio of visitors that respond to your goal action. This goal action can be subscribing to your newsletter, signing up for your ecourse, ordering your products, etc.

Your homepage needs to contain certain elements to be successful in raising your conversion rate. Read the list carefully and check to see if your homepage meets all of the following criteria.

1. Color - The color you choose for your website can have a big effect on your visitors. The type of site you have should be a factor in the colors you choose. There are essentially two types of colors - cool and warm.

Browns, blues and greens are cool colors and can make you feel relaxed, calm and assured. These colors are good for sites pertaining to medicine, relaxation and other sites that have reassuring answers to your problems.

Yellows, reds and oranges are warm colors that bring out feelings of energy, excitement and happiness. These colors work well for exercise sites, sports sites and other energetic type sites.

Purple is a good color for fashion and jewelry sites. It emulates sophistication, royalty, and luxury, but it is also feminine and romantic.

2. Clutter - How does it make you feel when you walk into a business that is messy and full of clutter. It doesn't exactly bring out the confidence in said business. Your website is the same way. You don't want it to look like a junk-filled mess! Keep it simple, clean, consistent and easy to follow. Don't fill your site with flashing banners, junk ads or fancy hard to read font.

3. Header - The header you use for your homepage is very important. You have just a few seconds to "capture" your visitor and the header can be a vital factor in achieving that goal. Make your header professional, short and to the point. You want the header to get the visitor to want to know more about you and your products/services. The header should outline in a few words what the benefits of your site are in a way that will make the visitor stay longer. Color is also a consideration.

4. Ease of Navigation - Another critical point to consider is how easy it is for people to navigate your site. Does your site feel like a maze with doubts on how to get from here to there? Visit your site as a customer and take note on how easy it is to navigate and how well laid out and simple the page is. Is your menu easy to find and follow? Is the font easy to see and read? Does one part of the page flow into another? Are your links prominent and easy to find? Look over every aspect of navigation with an extremely critical eye because people will not stay on a site that makes them feel lost and confused.

5. Use Testimonials - Testimonials are invaluable to your site because they reassure the visitor by increasing your credibility thus allowing them to trust you and your products more easily. Sprinkle a few short testimonials on your landing page where appropriate and have a section saved just for some of your best testimonials. Use detailed testimonials as opposed to more generic ones. For example: "I love your product and will purchase more" is not as good as "Your product helped me lose 20 lbs in just 6 weeks!"

6. Contact Information - Nothing makes me leave a site faster than when no contact information or email address is found. This, to me, says the person does not want to be bothered with customers, questions or anything else. I wouldn't ever do business with a website that does not provide complete and accurate contact info. More than likely, not many people would so it is extremely important to have your contact info prominently displayed on your homepage and every other page of your website.

7. Capture Visitors' Email Addresses - Most of us are familiar with the phrase, "the money is in the list." In a big way, this is true. Capturing your visitors' emails allows you to keep in contact with them so you can build that ever important relationship that will turn them into customers. Most people will not purchase anything on a first trip to a website so by capturing their emails you can astronomically boost the chances of converting that person into a customer. You can put a subscription form on every page of your site and be sure to have one on your landing page. Building a mailing list will help you market your sales, specials, etc. and will also help you build a solid customer base.

8. Call to Action - A Call to Action is a specific thing you "order" your visitors to do. This can be done with a text link or graphic. For example: Clíck here for a free marketing ecourse. You are giving the visitor very clear and concise instructions on what to do. Sometimes your visitors need a little push to complete the call to action so you would use something like this: Provide incentives to help your visitor make the decision to complete your call to action. Have just one clear call to action. Do not give you visitors too many choices because it will just result in confusion and indecisiveness.

9. Always Proofread - Always proofread and proofread again to be sure you catch all typos, grammatical errors and so forth. Make sure all your links work and everything on your landing page is in working order and correctly done.

10. Analytics - Be sure to take advantage of your site stats and analytics. This information can be critical to making your page a success. Google Analytics is free and provides a great service for anyone who has a website. You want to see how many people are going from your landing or homepage to other pages of your site. And if they are not, try to find out why, so you can improve your homepage. Monitor your bounce rate, conversion rate and other valued information.

You just cannot throw up a website and expect to boost your revenue. You have to nurture, maintain and care for your site and always be improving it. Keep abreast of the latest trends, info and data and always be learning how to make it better. Your landing and/or homepage is critical because it often decides the fate of your site so be sure to make it the most efficient and effective webpage possible.

Support FAQ For Solid State Drives SSD

There’s a lot of excitement around the potential for the widespread adoption of solid-state drives (SSD) for primary storage, particularly on laptops and also among many folks in the server world.  As with any new technology, as it is introduced we often need to revisit the assumptions baked into the overall system (OS, device support, applications) as a result of the performance characteristics of the technologies in use.  This post looks at the way we have tuned Windows 7 to the current generation of SSDs.  This is a rapidly moving area and we expect that there will continue to be ways we will tune Windows and we also expect the technology to continue to evolve, perhaps introducing new tradeoffs or challenging other underlying assumptions.  Michael Fortin authored this post with help from many folks across the storage and fundamentals teams.  --Steven

Many of today’s Solid State Drives (SSDs) offer the promise of improved performance, more consistent responsiveness, increased battery life, superior ruggedness, quicker startup times, and noise and vibration reductions. With prices dropping precipitously, most analysts expect more and more PCs to be sold with SSDs in place of traditional rotating hard disk drives (HDDs).

In Windows 7, we’ve focused a number of our engineering efforts with SSD operating characteristics in mind. As a result, Windows 7’s default behavior is to operate efficiently on SSDs without requiring any customer intervention. Before delving into how Windows 7’s behavior is automatically tuned to work efficiently on SSDs, a brief overview of SSD operating characteristics is warranted.

Read More - Click Here!

Additional Article - Click Here!

Tablets Won't Replace PCs - Not Anytime Soon

I'm a big fan of tablets. I recommend them for most organizations as a springboard for encouraging employees at all levels to innovate, as well as for friends whose computing needs begin and end with email, Web browsing, and when they start to feel adventurous, e-books and online news feeds.

But let's not get carried away. From now through the foreseeable future (defined as three years for every business except the Psychic Hotline), tablets aren't going to replace PCs for most employees. There are just too many things PCs can do that tablets can't and, in many cases, aren't going to do.

Here's a look at where tablets fall short and where they fit in.

The tablet in the business environment
To make sure we're using our words the same way: If you give an employee a tablet and run a VDI client on it, the tablet hasn't replaced a PC so far as your software architecture is concerned. VDI doesn't replace PCs; it's just a different way to provide them. That, in fact, is the whole point -- your software doesn't have to change.

Also: As mentioned previously in this space, no matter how much we blather on about untethering knowledge workers, most employees who use PCs need them for heads-down production applications. Customer-service call centers, insurance underwriters, accounts payable staff -- fill in the blanks if you like, it's a very long list -- aren't going to get their jobs done on tablets because ... do I really have to spell this out?

But the PC is more than a software platform. It's a portal -- a window into a universe of information and capabilities. From that perspective, it's reasonable to ask whether tablets might, in fact, replace PCs as the employee portal of choice.

The answer: It depends on the employee. The more sophisticated the employee is in using information technology, the more likely it is the employee will want a tablet as an adjunct and won't accept one as a replacement. They'll want the tablet because when it can do what they need it to do, from anywhere and in a comfortable sitting position (for the employee, that is), untethered because it has batteries that last a day.

Where tablets fall short
For those employees, the tablet will be complementary rather than a replacement because of the long list of shortcomings when comparing current tablet technology to PCs.

Tablet shortcoming No. 1: Windows.

Here we're talking about the user interface style, not the Microsoft OS. PCs (I include Macs in the category) let you have more than one application open simultaneously -- that is, you can see more than one application at the same time.

Whether you're cutting and pasting information from a Web page into a document, clicking on a link in an email to open a Web page, or pasting an Excel chart into PowerPoint, having everything open in front of you makes a big difference. But you knew that.

(Of course, Galaxy Note 10.1 and the forthcoming Windows 8 Metro do include two-app split-screen capabilities, so window functionality may mature sooner than my three-year "foreseeable future." Let's hope.)

 


Tablet shortcoming No. 2: Screen real estate.

An average desktop PC has more than 200 square inches of real estate on hand. A laptop has about half that, which is still twice what an iPad provides. If a desktop or laptop user needs more, adding a second monitor is cheap and easy.

Whether the employee is working with a big spreadsheet or a layout-intensive document, is moving information around from one application to another (using the windowing capability), or is accessing an application while viewing a scanned document, having enough screen real estate is a bigger deal than just avoiding eyestrain. It allows for certain forms of work possible that would be impossible in a more cramped situation.

But you knew that too.

Tablet shortcoming No. 3: Work that goes beyond text entry.

Here are features I use all the time that aren't even glimmers on the iPad's horizon, whether your mobile word processing app of choice is Pages, Quickoffice, Office2HD, or Documents to Go:

  • Style-driven interparagraph spacing (although each app places space automatically between paragraphs, only Documents to Go users can specify the actual before and after spacing)
  • Mail-merge
  • Footnotes
  • Image captioning with automatic table and figure numbering
  • Cross-references
  • Document markup and commenting (although Office2HD on the iPad does Word-style -- and Word-compatible -- commenting and markup)

If you're sophisticated in your use of Microsoft Word, you knew all of this without my having to mention it. If, on the other hand, you're among those who say, with pride, "I only use 10 percent of Word's features anyway!" then you probably also say, with pride, that you don't know how to balance your checkbook.

Some advice: Learn more features. In this day and age, it's a hallmark of basic professionalism.

Tablet shortcoming No. 4: Printing.

While you can print from iOS and Android devices, caveats abound. To put it simply, with a PC I can print without hassles, on the printer I already own, without requiring new software.

Tablet shortcoming No. 5: Document scanning.

With a PC you can connect to any of a wide variety of cheap scanners or all-in-one devices. With an iPad, you can't. Sure, there are apps that "transform" your iPad into a scanner, but when it comes done to it, they don't cut it compared to what you can connect to a PC.

Tablet shortcoming No. 6: Pivot tables.

I don't use pivot tables very much, but I know lots of people who do. If you perform or consume analytics at any level, this is a big deal. If you did better on your SAT verbals than math, you won't care.

Tablet shortcoming No. 7: Blogging.

Many blog technologies use the TinyMCE editing system. Many people blog, which means many people use TinyMCE -- though likely not on their iPads because several of the selection-based features of TinyMCE don't translate well to the platform. With Android, it's even worse. (To be fair, the situation is improving, but we're a long time into the tablet "revolution" for it to still be as bad as it is.)

Tablet shortcoming No. 8: Backup and restore.

I have an external hard drive I use to back up my laptop. Combined with Allway Sync (or whatever other backup software you happen to like), backing up a PC is straightforward, even if you don't have a centralized IT department to handle the task for you automatically.

With an iPad, you can back up to your PC (hint: this means you're using a PC), or you can rely on cloud-based storage that automagically keeps your tablet synchronized with online storage.

But autosync isn't the same as backup and restore, for a very simple reason: Autosync propagates your mistakes to the cloud, at which point you're sunc -- that is to say, sync sunk. Autosync protects you from device failures, but not from the dreaded oh-no second (the fraction of a second separating your pushing the wrong button from your realizing you did so).

 


Tablets vs. PCs: Augment, not replace
I got tired of adding "but you knew that" -- except there's nothing here you didn't know. There's also nothing here those touting tablets as complete PC replacements for "average users" don't know. But there's a difference between what people know and what they know right now, when we're talking about the subject, because the usual discussion is about what tablets can do, not what they can't do.

Bottom line: For many employees -- those with heads-down production responsibilities -- tablets are irrelevant. For the rest, tablets are more likely to be an add-on technology, not a replacement. That's annoying from a cost perspective -- and yet another good reason to encourage BYOD.

This is the opportunity that was Microsoft's for the taking. Given the disastrous advance reviews Windows 8 has been receiving, though, it looks like Microsoft won't be taking advantage of it -- which means, sadly enough, that we won't either.

This story, "No, tablets won't replace PCs anytime soon," was originally published at InfoWorld.com. Read more of Bob Lewis' Advice Line blog on InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

Read More - Click Here!

Replace PC? Not So Fast!

I'm a big fan of tablets. I recommend them for most organizations as a springboard for encouraging employees at all levels to innovate, as well as for friends whose computing needs begin and end with email, Web browsing, and when they start to feel adventurous, e-books and online news feeds.

But let's not get carried away. From now through the foreseeable future (defined as three years for every business except the Psychic Hotline), tablets aren't going to replace PCs for most employees. There are just too many things PCs can do that tablets can't and, in many cases, aren't going to do.

Here's a look at where tablets fall short and where they fit in.

The tablet in the business environment
To make sure we're using our words the same way: If you give an employee a tablet and run a VDI client on it, the tablet hasn't replaced a PC so far as your software architecture is concerned. VDI doesn't replace PCs; it's just a different way to provide them. That, in fact, is the whole point -- your software doesn't have to change.

Also: As mentioned previously in this space, no matter how much we blather on about untethering knowledge workers, most employees who use PCs need them for heads-down production applications. Customer-service call centers, insurance underwriters, accounts payable staff -- fill in the blanks if you like, it's a very long list -- aren't going to get their jobs done on tablets because ... do I really have to spell this out?

But the PC is more than a software platform. It's a portal -- a window into a universe of information and capabilities. From that perspective, it's reasonable to ask whether tablets might, in fact, replace PCs as the employee portal of choice.

The answer: It depends on the employee. The more sophisticated the employee is in using information technology, the more likely it is the employee will want a tablet as an adjunct and won't accept one as a replacement. They'll want the tablet because when it can do what they need it to do, from anywhere and in a comfortable sitting position (for the employee, that is), untethered because it has batteries that last a day.

Where tablets fall short
For those employees, the tablet will be complementary rather than a replacement because of the long list of shortcomings when comparing current tablet technology to PCs.

Tablet shortcoming No. 1: Windows.

Here we're talking about the user interface style, not the Microsoft OS. PCs (I include Macs in the category) let you have more than one application open simultaneously -- that is, you can see more than one application at the same time.

Whether you're cutting and pasting information from a Web page into a document, clicking on a link in an email to open a Web page, or pasting an Excel chart into PowerPoint, having everything open in front of you makes a big difference. But you knew that.

(Of course, Galaxy Note 10.1 and the forthcoming Windows 8 Metro do include two-app split-screen capabilities, so window functionality may mature sooner than my three-year "foreseeable future." Let's hope.)

 



Tablet shortcoming No. 2: Screen real estate.

An average desktop PC has more than 200 square inches of real estate on hand. A laptop has about half that, which is still twice what an iPad provides. If a desktop or laptop user needs more, adding a second monitor is cheap and easy.

Whether the employee is working with a big spreadsheet or a layout-intensive document, is moving information around from one application to another (using the windowing capability), or is accessing an application while viewing a scanned document, having enough screen real estate is a bigger deal than just avoiding eyestrain. It allows for certain forms of work possible that would be impossible in a more cramped situation.

But you knew that too.

Tablet shortcoming No. 3: Work that goes beyond text entry.

Here are features I use all the time that aren't even glimmers on the iPad's horizon, whether your mobile word processing app of choice is Pages, Quickoffice, Office2HD, or Documents to Go:

  • Style-driven interparagraph spacing (although each app places space automatically between paragraphs, only Documents to Go users can specify the actual before and after spacing)
  • Mail-merge
  • Footnotes
  • Image captioning with automatic table and figure numbering
  • Cross-references
  • Document markup and commenting (although Office2HD on the iPad does Word-style -- and Word-compatible -- commenting and markup)

If you're sophisticated in your use of Microsoft Word, you knew all of this without my having to mention it. If, on the other hand, you're among those who say, with pride, "I only use 10 percent of Word's features anyway!" then you probably also say, with pride, that you don't know how to balance your checkbook.

Some advice: Learn more features. In this day and age, it's a hallmark of basic professionalism.

Tablet shortcoming No. 4: Printing.

While you can print from iOS and Android devices, caveats abound. To put it simply, with a PC I can print without hassles, on the printer I already own, without requiring new software.

Tablet shortcoming No. 5: Document scanning.

With a PC you can connect to any of a wide variety of cheap scanners or all-in-one devices. With an iPad, you can't. Sure, there are apps that "transform" your iPad into a scanner, but when it comes done to it, they don't cut it compared to what you can connect to a PC.

Tablet shortcoming No. 6: Pivot tables.

I don't use pivot tables very much, but I know lots of people who do. If you perform or consume analytics at any level, this is a big deal. If you did better on your SAT verbals than math, you won't care.

Tablet shortcoming No. 7: Blogging.

Many blog technologies use the TinyMCE editing system. Many people blog, which means many people use TinyMCE -- though likely not on their iPads because several of the selection-based features of TinyMCE don't translate well to the platform. With Android, it's even worse. (To be fair, the situation is improving, but we're a long time into the tablet "revolution" for it to still be as bad as it is.)

Tablet shortcoming No. 8: Backup and restore.

I have an external hard drive I use to back up my laptop. Combined with Allway Sync (or whatever other backup software you happen to like), backing up a PC is straightforward, even if you don't have a centralized IT department to handle the task for you automatically.

With an iPad, you can back up to your PC (hint: this means you're using a PC), or you can rely on cloud-based storage that automagically keeps your tablet synchronized with online storage.

But autosync isn't the same as backup and restore, for a very simple reason: Autosync propagates your mistakes to the cloud, at which point you're sunc -- that is to say, sync sunk. Autosync protects you from device failures, but not from the dreaded oh-no second (the fraction of a second separating your pushing the wrong button from your realizing you did so).

 



Tablets vs. PCs: Augment, not replace
I got tired of adding "but you knew that" -- except there's nothing here you didn't know. There's also nothing here those touting tablets as complete PC replacements for "average users" don't know. But there's a difference between what people know and what they know right now, when we're talking about the subject, because the usual discussion is about what tablets can do, not what they can't do.

Bottom line: For many employees -- those with heads-down production responsibilities -- tablets are irrelevant. For the rest, tablets are more likely to be an add-on technology, not a replacement. That's annoying from a cost perspective -- and yet another good reason to encourage BYOD.

This is the opportunity that was Microsoft's for the taking. Given the disastrous advance reviews Windows 8 has been receiving, though, it looks like Microsoft won't be taking advantage of it -- which means, sadly enough, that we won't either.

This story, "No, tablets won't replace PCs anytime soon," was originally published at InfoWorld.com. Read more of Bob Lewis' Advice Line blog on InfoWorld.com. For the latest business technology news, follow InfoWorld.com on Twitter.

Read More - Click Here!

 

Take Control of Windows 10 Updates

Earlier this year, Microsoft made major changes in the Windows Update process to reduce the likelihood that a feature update will catch you by surprise, and the company even made it possible to skip a feature update and switch to an annual upgrade schedule instead of being forced to follow Microsoft's every-six-months calendar. But the rules are still confusing, and if you want to take charge of the process, you'll need to understand how the release schedule works.

To help make the process more understandable, I've broken it down into five steps.

STEP 1: GET THE DETAILS ABOUT YOUR WINDOWS 10 INSTALLATION

The easiest way to do this is to open Settings > System > About. Scroll to the section headed Windows Specifications where you will find details about the current installation, including two that are crucial here: the edition (Home, Pro, Enterprise, Education) and the version number. This screenshot shows a system that's running Windows 10 Pro, version 1903.

win10-version-info.jpg

This block provides crucial information about your Windows 10 installation


STEP 2: LOOK UP THE AVAILABILITY DATE AND END-OF-SERVICE DATE FOR THAT VERSION

You'll find both of these dates in a table on Microsoft's Windows 10 release information page. Look for the entries alongside the Semi-Annual Channel servicing option. (Ignore entries for the Semi-Annual Channel [Targeted], which is no longer supported.)

One of the most important aspects of an identity and access management (IAM) program is the securing, management and governance of the accounts belonging to superusers — privileged accounts. Like the accounts used by regular users, these superuser...


For Windows 10 Enterprise, the rules have changed slightly as of 2019. For the H1 release (1903), the end-of-service date is 18 months after availability; for the H2 release (1909), this date extends for a full 30 months after initial availability.


The following table shows these dates for all currently available versions, as of September 2019.

win10-end-of-service-by-version.jpg

The end-of-service date is the most important one to know.


For the PC running Windows 10 version 1903, the relevant dates are 2019-05-21 (availability) and 2020-12-08 (end of service).

STEP 3: DETERMINE WHETHER YOU ARE AT OR NEAR THE END-OF-SERVICE DATE FOR YOUR VERSION

If the end-of-service date you looked up in the previous step is less than 90 days away, you're in the red zone. Microsoft may deliver a new feature update to your PC and schedule it for installation at any time.

For Windows 10 Pro and Home editions, versions 1709 and earlier are all past their end-of-service date. Version 1803 is less than 90 days away from that date.

If you are running any of those versions, you need to upgrade to a newer version ASAP, as I explain in the next step. Kicking the can down the road is not an option, as Microsoft's update servers will insist on scheduling an upgrade literally any day, and you won't have the option to postpone it.

For PCs running Windows 10 Enterprise or Education, version 1703 is literally days away from its end-of-service date. With later versions, you still have at least a few months to prepare.

For our PC running Windows 10 Pro, version 1903, the date to circle in red on the update calendar is September 8, 2020, which is 90 days before the end-of-service date.

STEP 4: CHOOSE YOUR NEXT FEATURE UPDATE

Depending on which Windows 10 version you are currently running, you might have a choice of subsequent versions to choose as an upgrade. For example, if you are running a version that is past its end-of-service date, you might have as many as three different versions to choose for an upgrade.In our PC running version 1903, we know that there will be a choice of two possible upgrades: version 1909, which should be released in the next month or so, or the one after that, which will be ready in the first half of 2020.

Which one is the correct choice? That decision involves a balancing act between two factors. The longer the interval since a version was released, and the larger its installed base, the more likely that any issues have been identified and patched. But that maturity also comes with a counterbalancing factor: the end-of-service date for that version is also sooner.

The end result of that balancing act is that anyone running Windows 10 Home or Pro has two options:

  • You can wait three months or less after a Windows 10 feature update is released before upgrading. On that schedule, you can safely skip the next version and upgrade every other version, once per year. In this example, assuming next year's first feature update is released in May 2020, we would plan to install it in August, and then follow the same schedule in subsequent years.
  • You can wait four months or more after a Windows 10 feature update release before upgrading. Here, that would mean installing the version 1909 feature update sometime between February and August 2020. If you choose that option, you should then commit to installing each succeeding feature update six months later. On that calendar, you can't skip a feature update or you will run smack into the end-of-service deadline and potentially end up with an upgrade scheduled against your will.

If neither of those options seems palatable, you have a third option:

  • Upgrade to Windows 10 Enterprise and standardize on the September feature update. That particular combination supports a 30-month servicing lifecycle, which means you can adopt a significantly longer upgrade cycle, with the option to wait two full years before upgrading. Assuming the version 1909 feature update is available in October 2019, its end-of-service date would be in April 2022, which means your next update could be the September update for 2021.

STEP 5: ADJUST YOUR WINDOWS SETTINGS AND MARK YOUR CALENDAR

If you thought everything up to this stage was complicated, I have good news and bad news.

The good news is that as of 2019 you no longer have to worry about Windows Update automatically installing an unwanted feature update -- at least not as long as you've avoided bumping into the end-of-service date.

The bad news is that installing the right version at the right time can be tricky, especially if you want to delay that upgrade for more than six months as Microsoft works through the inevitable list of bugs for a new version.

Let's start with the simplest scenario: You want to install a feature update within six months of when it is publicly available, and your system has no blocking issues. Easy: Set a reminder in your calendar, and when that alert pops up, check Windows Update and install the feature update, which should be waiting under the Optional Updates heading.

As an alternative, you can go to the Download Windows 10 page and run the Update Assistant.

Alas, neither of these options are reliable if you're planning to wait more than six months before installing a feature update. You run the risk that Windows will offer the current feature update instead of the comfortingly mature one you were hoping to install instead.

To avoid that possibility, plan ahead. Use the Media Creation Tool (also available on the Download Windows 10 page) to save an ISO copy of the version you plan to install. Do this while it's still available, before the next version is released. Save that ISO file and use it to manually upgrade when you're ready.

If you don't have the foresight to do that before it's needed, you'll have to scramble to find that slightly outdated version when you need it. If you have a Visual Studio (formerly known as MSDN) subscription, you can download older versions there. But mere mortals don't have any such option, which is why it pays to be prepared.

Taking Your Office with You - Business Travel

Business Travel: Taking Your Office with You image business travel 300x197(Leiden Johnson @ Business 2 Community) Business Travel: Taking Your Office with YouTechnology has certainly done its share to make the world a smaller place, with communication over long distances, not only possible, but also done quickly, easily and cheaply. Today it is nothing special to hold video or phone conferences with people from other countries, or employees to work for a company that is in an entirely different state.
 

But while communication is now a lot easier, there are still things that need to be done in person. When that happens, a video conference won’t cut it, and people will have to pack up their bags and travel a bit. But technology comes to the rescue again as on the road does not mean dropping everything back at the office. On the contrary, if you need to take your work with you when you are on the road you certainly can, and do something productive on those on layovers at the airport.

If you to take your work with you, you will have to address four basic needs. There are others, but you can do without them in a pinch. Order to be able to work away from the office you will need:

  1. Internet Access –Staying connected in the internet is relatively easy if you are just staying in a hotel, since most hotels provide Wi-Fi. The problem is when you are actually mobile, such as riding in a train, or writing at the airport, or if the rate for the Wi-Fi at your hotel is too expensive. You will need a reliable connection so going to the park or coffee shop to find free Wi-Fi hotspots will not do. For a reliable connection you will need to get yourself a mobile hotspot, letting you stay connected anywhere and let you connect multiple devices at the same time.
  2. Access to your files –Keeping a copy of your files on external hard disks or flash drives is a good idea, but this means added things to bring along, and these devices may very well get lost or damaged during the trip. The simplest way to access files from the office would be by using a cloud storage system. This way you can access your files from any device as long as it is connected.
  3. Safety – As this is not a need that is immediately apparent, it is taken for granted most of the time, but you will need to keep your files and information private and safe from other people, especially during the times when you can’t avoid using public Wi-Fi. Configuring your devices security and firewall settings is the first step in ensuring your data remains private, but the best solution would be to get a VPN or virtual private network. That way all the information that enters and leaves your device is encrypted and remains private.
  4. Power – The need to stay charged is more acute when you are on the road as you can’t simply plug your device in whenever you want. Without power, you won’t be able to use your device, which means no emails, or VoIP calls and you can forget about editing that PowerPoint presentation as well At the very least make sure your device is fully charged before you leave. For added power you can bring along an extra battery, or a powerbank and a travel charger kit and voltage adaptor will help with the different types of wall sockets.

There are many other things to help you work comfortably on the road, such as lightweight equipment designed for to be portable and frugal with its battery life, or the dozens of apps out there, but once you have taken care of the four basic requirements, you should be able to conduct business wherever you are.

The Five‐Phase Lean Approach by Jack N. Fults II

Introduction: Companies today continually strive to eliminate waste in order to maintain a competitive edge.  In order to remain competitive, organizations must adopt principles and concepts that will help  them operate more efficiently.  As many companies face increasing pressure to drive down prices  they become more open to new ways of thinking, such as the five‐phase lean approach.   Tool/Concept Defined  So what is lean? “At a high level it is a way of giving people at all levels of an organization the  skills and a shared means of thinking to systematically drive out waste by designing better ways of  working, improving connections and easing flows within supply chains.” (Wood) By eliminating  waste companies can simultaneously reduce costs, make better use of resources and deliver better  customer value. (Wood) The five‐phase lean approach is one approach that allows companies to  overcome obstacles such as, proper integration and communication involved in becoming lean. This  approach builds the principles of lean which are customer defines value, eliminate waste, customer  establishes pull, involve and empower people who add value, and the total cost is the ultimate  performance metric. The five‐phase lean approach is a systems approach that allows each phase of  implementation to build on each other. The different phases of implementation are as follows:  stability and flexibility, continuous flow, synchronous production, pull systems, and level production.  Stability and Flexibility    Building a lean system can be disastrous if the systems don’t allow for stability and  flexibility. “Systems must handle the changes involved in lean manufacturing and the instability that  occurs as change takes place.” (Allen) All companies are unique and require a certain strategic fit for  successful implementation. It’s important to understand that problems will arise and changes will  need to be made in order for the system to function correctly.

Don’t overreact or rush processes
just because a problem arises. This doesn’t mean that the lean approach is a complete failure. It’s  important to realize that lean is not a collection of tools but a way of thinking across your company.  (Flinchbaugh) Companies must be open to new ideas and ways of solving complex problems.  Problem solving techniques such as the PDCA (Plan‐Do‐Check‐Act) can help determine any sort of  deviation from the standard.   Continuous Flow  A balanced production line requires improvements and ongoing observation to eliminate  waste and examine connections and flows. Continuous flow requires products to flow from  workplace to workplace. (Wood) If product isn’t flowing the way it should then customers aren’t  getting what they need. Document the way the process is done, and use that standard to eliminate  variation in the process or how the operator does the job.” (John Allen) McDonalds, for example,  has a very detailed operations manual that consists of several hundred pages and weighs about four  pounds. (Schlosser) Detailed documentation of processes allows companies to standardize  production and synchronize employee workstations. A clear view of processes helps eliminate  wastes and identify areas where bottlenecks might occur.   Synchronous Production    Synchronous production occurs when the rate of production equals the rate that satisfies the  customer.(Allen) The rate is called the takt time. The takt time can be defined as the maximum time  allowed to produce a product in order to meet demand. (Wikipedia)  If products aren’t continually  flowing then the takt time will be at an unacceptable level. Standardized production will allow for  acceptable takt time rates and appropriate measures to complete production on time.   

Pull Systems
Pull systems pull products from one workstation to the next. (Allen) Pull systems are unique  in the fact that they require seamless coordination among different workstations. Each workstation  can’t complete the desired task unless the previous workstation performed their intended duty.  Unfinished work creates waste and an increase in takt times. John Allen suggests, “Structure your  line or conveyor process so that it will stop if the unit is not accepted in the next workstation. If the  conveyor does not stop when a part fails to move on, work‐in‐process accumulates or operators  struggle to produce more than one unit in the established takt time.” If systems aren’t flexible, then  product will back up and customers won’t receive product.   

Level Production    
Level production means all products must be leveled into the production sequence on the  basis of volume, mix, and sequence. (Allen) Replacement parts should be made in small volumes in  order to level out the production. The purpose of this is to level production of the highest volume  units and have long‐term objectives built into the others. Smaller component parts can be made  periodically at times that don’t disrupt higher volume items. This shows how the lean phases can  accommodate unique situations and adapt to changing issues. Frequent tests of these tools should  match against underlying principles of lean. Commitment to the implementation of lean and  development of a long‐term strategy are essential to the five‐phase lean approach.   An Example Where the Tool/Concept is Used    A company that manufactured merchandising equipment in the Midwest had a huge spike in  demand. The welding process was one of the major processes that were slowing production at the  plant. Managers decided to implement lean into the process where the base of the equipment was  welded together. The company needed immediate results so they moved to the flow and pull phases of  implementation.  
    
Before - After 
   
The company had processes and workstations all over the place. In between each workstation, material  was moving by forklift which was very inefficient. In order to pull things together they hired another  group leader; eliminated a scheduler in one line; moved unneeded people to other departments; gave  one operator two jobs; moved component materials closer to workstations; and established new  systems to allow product to move freely. “In five months, subassembly inventory decreased 61%,  manpower was reduced 9%, and ROI was 281%. (Allen) Since product was continually flowing through  the system, inventories decreased and takt time decreased.  However, since the first two phases of  flexibility and stability were ignored, preventative maintenance was almost non‐existent, employees  weren’t properly trained, and eliminating errors wasn’t a primary focus. Companies must follow all the  steps of the five‐phase lean approach to achieve maximum results. Skipping phases opens the doors for  small mistakes that will become major problems in the future. Every company is unique and must form  the five phases of lean to adapt their strategic fit.                
    
Works Cited and other valuable resources  
Allen, John H. “Make Lean Manufacturing Work for You”. Manufacturing Engineering. Dearborn: June  2000. Vol. 124, Iss. 6; pg. 54.    

Flinchbaugh, Jamie. “Lean is Born from How We Think: Fostering Sustainable Business and People  Success Through New Ways of Thinking”. Products Finishing. 2007‐06. Vol. 71, Iss. 9; pg. 34‐35.    

Hicks, B.J. “Lean Information Management: Understanding and Eliminating Waste”. International Journal of Information Management. 2007‐08. Vol. 27, Iss. 4; pg. 233 (17)    

Jacobs, F. and Chase, R. Operations and Supply Management: The Core. New York: McGraw‐Hill    International Edition, 2008.    Schlosser,

Eric. Fast Food Nation: the Dark Side of the All‐American Meal. US: Houghton Mifflin Books,  2001. 1‐356.    
Wood, Nigel.“Lean Thinking: What It Is And What It Isn’t”. Management  Services. 2004‐02. Vol. 48, Iss.  2; pg. 8‐11.           

More information  “Evaluation Of The Lean Approach To Business Management And Its Use In The Public Sector”.   
November 11, 2007.   http://www.scotland.gov.uk/Publications/2006/06/13162106/19    Hicks, B.J. “Lean
Information Management: Understanding and Eliminating Waste”. International Journal       of Information
Management. 2007‐08. Vol. 27, Iss. 4; pg. 233 (17)    Nash, Mark, and Sheila Poling. quot;Strategic Management of Lean.quot; Quality 46 (2007).    Ozelkan, Ertunga, Gary Teng, Thomas Johnson, and Tom Benson. quot;Building
Lean Supply Chain and  Manufacturing Skills Through an Interactive Case Study.quot; Industry & Higher Education 21 (2008).  Keyword: lean implementation.    Peccei, Riccardo, and Jimen Lee. quot;Lean Production and Quality
Commitment. a Comparative Study of  Two Korean Auto Firms.quot; Personnel Review ( Farnborough ) 37 (2008).

The Hard No!

If you polled managers and asked them to list the things they have the most difficulty doing, somewhere near the top of the list would be “saying no.” I can already hear many of you saying, “Well, my boss tells me no all the time.” But it is, in fact, a difficult act for more managers than you think.

I’ll qualify the above by saying that I am talking about the hard no and not the easy no. If an employee comes up to you and says, “Boss, can I buy that new piece of equipment we talked about?” and you look at your budget and quickly see that you are running near deficit, then saying “no, we can’t afford it” is an easy no. It’s easy because;

  1. you have indisputable facts to back up your decision,
  2. it’s a person with less power and authority asking, and
  3. your relative risk for saying no is low; thus, we have the easy no.

On the other hand, when there are situations in which managers have to say yes or no to a question that is based solely on one’s best judgment, when you have to do it publicly, and when it means denying a peer or other authority, it can have serious repercussions - that is what I mean by a hard no.

Project managers are often faced with the situation described above regarding scope creep. They may find themselves in a meeting where they are being ganged up on by a group of customers and feel boxed in. The clients clearly want something that is out of scope, and the project manager knows that by giving in, not only will it add time and expense to the project, but it stands a good chance of jeopardizing the success of the project altogether. The project manager has only his or her best professional judgment to rely on, and the client challenges it or discounts it in a public setting. It is at this point that many project managers buckle under the pressure being applied to them and yield to the client, thus, failing to issue a hard no.

Obviously the situation described above can be described as difficult, at best. The project manager is being challenged publicly and, perhaps more importantly, his or her judgment is being called into question - never an easy thing.

I have found though that there are ways of helping yourself when it comes to the hard no — to make it less of a painful process.

Get comfortable speaking in front of a group and managing a meeting. Some folks just lack confidence when addressing more than a handful of people. While they may be brilliant one on one, for whatever reasons, working in front of a group makes them nervous. The remedy is knowledge and experience: knowledge, regarding how to manage a meeting, read people, and communicate effectively; and experience, because the process has become more familiar the more times you’ve been through it. This is definitely a case where practice can help to make perfect.

Know the facts. The more knowledge you have regarding the issue, the better prepared you are to defend yourself and cut through the BS.

Believe in yourself. If you doubt yourself, you are less likely to show a “spine” when you are pressed in public, particularly if your judgment is being called into question.

Don’t take it personally. Try to remain as emotionally detached as you can; you can be resolute and even passionate about your position, but the minute you find yourself feeling angry, sad, or scared, you diminish your effectiveness and lower your confidence, as well as impair your ability to think rationally.

Understand your position relative to others. Realize that saying no is a statement of position and the weight of your no is dependent on your relative position of authority/power and your persuasiveness. You can be in a position of power and your no will have the weight of authority, or you can have little authority but be very persuasive and have an equally weighty no. Conversely, you can have the authority but never exercise it; thus, your nos become insignificant. You can also have little authority — and act like it — and never be heard.

I personally do not like to say no, because often times that shuts down dialogue to a workable solution. However, I am always prepared to say no if it is needed, and I do not fear using it when I feel it is necessary. As I sit here and think about it, the hard no is a lot like a firearm. It should be used with authority when absolutely required, yet never used recklessly. It should be used with a great deal of consideration, but when the decision is made, it should be decisive.

Skillful use of the hard no is an important part of leadership. No one respects a spineless manager, or one who is reckless in his or her decision-making. Becoming proficient with issuing the hard no takes practice and good judgment. Master it and you will make your managerial life much easier.

The Web That Is No More - What We Lost

The tech industry and its press have treated the rise of billion-scale social networks and ubiquitous smartphone apps as an unadulterated win for regular people, a triumph of usability and empowerment. They seldom talk about what we've lost along the way in this transition, and I find that younger folks may not even know how the web used to be.

So here's a few glimpses of a web that's mostly faded away:

  • Five years ago, most social photos were uploaded to Flickr, where they could be tagged by humans or even by apps and services, using machine tags. Images were easily discoverable on the public web using simple RSS feeds. And the photos people uploaded could easily be licensed under permissive licenses like those provided by Creative Commons, allowing remixing and reuse in all manner of creative ways by artists, businesses, and individuals.
  • A decade ago, Technorati let you search most of the social web in real-time (though the search tended to be awful slow in presenting results), with tags that worked as hashtags do on Twitter today. You could find the sites that had linked to your content with a simple search, and find out who was talking about a topic regardless of what tools or platforms they were using to publish their thoughts. At the time, this was so exciting that when Technorati failed to keep up with the growth of the blogosphere, people were so disappointed that even the usually-circumspect Jason Kottke flamed the site for letting him down. At the first blush of its early success, though, Technorati elicited effusive praise from the likes of John Gruber:

[Y]ou could, in theory, write software to examine the source code of a few hundred thousand weblogs, and create a database of the links between these weblogs. If your software was clever enough, it could refresh its information every few hours, adding new links to the database nearly in real time. This is, in fact, exactly what Dave Sifry has created with his amazing Technorati. At this writing, Technorati is watching over 375,000 weblogs, and has tracked over 38 million links. If you haven’t played with Technorati, you’re missing out.

  • Ten years ago, you could allow people to post links on your site, or to show a list of links which were driving inbound traffic to your site. Because Google hadn't yet broadly introduced AdWords and AdSense, links weren't about generating revenue, they were just a tool for expression or editorializing. The web was an interesting and different place before links got monetized, but by 2007 it was clear that Google had changed the web forever, and for the worse, by corrupting links.
  • In 2003, if you introduced a single-sign-in service that was run by a company, even if you documented the protocol and encouraged others to clone the service, you'd be described as introducing a tracking system worthy of the PATRIOT act. There was such distrust of consistent authentication services that even Microsoft had to give up on their attempts to create such a sign-in. Though their user experience was not as simple as today's ubiquitous ability to sign in with Facebook or Twitter, the TypeKey service introduced then had much more restrictive terms of service about sharing data. And almost every system which provided identity to users allowed for pseudonyms, respecting the need that people have to not always use their legal names.
  • In the early part of this century, if you made a service that let users create or share content, the expectation was that they could easily download a full-fidelity copy of their data, or import that data into other competitive services, with no restrictions. Vendors spent years working on interoperability around data exchange purely for the benefit of their users, despite theoretically lowering the barrier to entry for competitors.
  • In the early days of the social web, there was a broad expectation that regular people might own their own identities by having their own websites, instead of being dependent on a few big sites to host their online identity. In this vision, you would own your own domain name and have complete control over its contents, rather than having a handle tacked on to the end of a huge company's site. This was a sensible reaction to the realization that big sites rise and fall in popularity, but that regular people need an identity that persists longer than those sites do.
  • Five years ago, if you wanted to show content from one site or app on your own site or app, you could use a simple, documented format to do so, without requiring a business-development deal or contractual agreement between the sites. Thus, user experiences weren't subject to the vagaries of the political battles between different companies, but instead were consistently based on the extensible architecture of the web itself.
  • A dozen years ago, when people wanted to support publishing tools that epitomized all of these traits, they'd crowd-fund the costs of the servers and technology needed to support them, even though things cost a lot more in that era before cloud computing and cheap bandwidth. Their peers in the technology world, though ostensibly competitors, would even contribute to those efforts.

This isn't our web today. We've lost key features that we used to rely on, and worse, we've abandoned core values that used to be fundamental to the web world. To the credit of today's social networks, they've brought in hundreds of millions of new participants to these networks, and they've certainly made a small number of people rich.

But they haven't shown the web itself the respect and care it deserves, as a medium which has enabled them to succeed. And they've now narrowed the possibilites of the web for an entire generation of users who don't realize how much more innovative and meaningful their experience could be.

Back To The Future

When you see interesting data mash-ups today, they are often still using Flickr photos because Instagram's meager metadata sucks, and the app is only reluctantly on the web at all. We get excuses about why we can't search for old tweets or our own relevant Facebook content, though we got more comprehensive results from a Technorati search that was cobbled together on the feeble software platforms of its era. We get bullshit turf battles like Tumblr not being able to find your Twitter friends or Facebook not letting Instagram photos show up on Twitter because of giant companies pursuing their agendas instead of collaborating in a way that would serve users. And we get a generation of entrepreneurs encouraged to make more narrow-minded, web-hostile products like these because it continues to make a small number of wealthy people even more wealthy, instead of letting lots of people build innovative new opportunities for themselves on top of the web itself.

We'll fix these things; I don't worry about that. The technology industry, like all industries, follows cycles, and the pendulum is swinging back to the broad, empowering philosophies that underpinned the early social web. But we're going to face a big challenge with re-educating a billion people about what the web means, akin to the years we spent as everyone moved off of AOL a decade ago, teaching them that there was so much more to the experience of the Internet than what they know.

This isn't some standard polemic about "those stupid walled-garden networks are bad!" I know that Facebook and Twitter and Pinterest and LinkedIn and the rest are great sites, and they give their users a lot of value. They're amazing achievements, from a pure software perspective. But they're based on a few assumptions that aren't necessarily correct. The primary fallacy that underpins many of their mistakes is that user flexibility and control necessarily lead to a user experience complexity that hurts growth. And the second, more grave fallacy, is the thinking that exerting extreme control over users is the best way to maximize the profitability and sustainability of their networks.

The first step to disabusing them of this notion is for the people creating the next generation of social applications to learn a little bit of history, to know your shit, whether that's about Twitter's business model or Google's social features or anything else. We have to know what's been tried and failed, what good ideas were simply ahead of their time, and what opportunities have been lost in the current generation of dominant social networks.

So what did I miss? What else have we lost on the social web?

Read More - Click Here!

This Is My DataCenter - IBM SoftLayer

Whenever Francisco Romero hears a client tell him they need so many thousand cloud VMs and an X amount of storage and connectivity across the sites that will host them, in his head, he converts the requirement into megawatts. They may be asking for 10,000 VMs of various kinds, but to him that means he has to deliver 1MW or 2MW of data center capacity, depending on the VMs. Little drives home the physical nature of cloud computing better than this.

As chief operating officer of IBM SoftLayer, Romero oversees the data center strategy that underpins IBM’s entire cloud business, as the company battles in the market dominated by Amazon Web Services and, to a much lesser extent, Microsoft Azure. All major US hardware vendors have tried and failed to become formidable rivals to Amazon in the cutthroat cloud infrastructure market; all except IBM, which continues to expand both technological capabilities of its cloud and the global infrastructure that makes it all possible.

IBM’s Infrastructure-as-a-Service cloud, its Platform-as-a-Service cloud, called Bluemix, as well as the plethora of Software-as-a-Service offerings, including services enhanced by Watson, its Artificial Intelligence technology, run in SoftLayer data centers. “We are the main delivery mechanism for those,” Romero, who joined SoftLayer four years before IBM acquired the Dallas-based data center provider in 2013, said.

Taking into account IaaS alone, IBM had the fourth-largest cloud market share in 2015, according to Structure Research. With an estimated $583 million in revenue that year, its IaaS business was slightly behind Rackspace’s, which turned over $646 million. For the sake of comparison, AWS raked in $7.88 billion, while Microsoft Azure is estimated to have made $1.209 billion, according to Structure.

Map of IBM SoftLayer data center locations, as of October 2016. (Image: IBM)

Growing in Place

Expansion in existing locations has been an important part of the strategy. As more enterprise customers deploy more critical workloads in the cloud, they are engineering those applications to take advantage of multiple availability zones in each region for load balancing and disaster recovery. In response, Romero’s team has been adding data centers in existing regions to increase the number of availability zones IBM’s cloud offers.

The European Commission’s annulment of Safe Harbor laws last year added another incentive to expand capacity in existing regions. When the set of rules that had for 15 years governed cross-border data flows between the US and all EU countries was in place, cloud customers had little concern about having a primary data center in Frankfurt, for example, and a disaster-recovery site in Amsterdam. Once Safe Harbor was struck down and each country was left to its own devices to regulate data flows, cloud users became a lot more interested in multi-site infrastructure within a single country, Romero said. This past August, Europe enacted a replacement for Safe Harbor, a set of regulations titled EU-US Privacy Shield, but companies have been slow to sign up, many weighing other compliance options.

Expanding the Empire

The newest markets IBM recently entered with SoftLayer data centers are Seoul and Oslo. The company weighs a number of factors before deciding to extend infrastructure into a new market. The most obvious one is demand: there has to be a critical mass of customers it knows will want cloud capacity in a new geography before it makes the investment. Another big consideration is network infrastructure. India, for example, has lots of demand for cloud services, but very limited and expensive connectivity options, Romero said. IBM announced the first SoftLayer data center in India, located in Chennai, one year ago.

Like other cloud providers, SoftLayer prefers to team up with a local partner when going into a new market. It partnered with local telcos in both Seoul and Oslo on launching data centers in those cities. Besides having a partner familiar with the local market, this strategy also helps in places with subpar infrastructure. Partnering with a telco, for example, means the partner will be incentivized to invest in new infrastructure to ensure the venture succeeds, Romero explained.

Cloud by the Megawatt

While emerging markets in Asia are growing fast, demand for cloud services in the US continues to grow faster than anywhere else in the world, according to Romero. “The US for sure is ahead of everybody else,” he said. This is because the US cloud market is the most mature one.

While even in Europe most cloud customers are still testing the waters with cloud services, US companies are now starting to shift really large critical workloads to the cloud, he said. IBM is now seeing cloud deals in the US that require commitments of 3MW to 5MW of data center capacity, keeping Romero and his team busy working in a whole new paradigm in capacity planning and deployment.

Unlike Amazon, Microsoft, and Google, who lease data centers and build their own, SoftLayer has so far relied exclusively on data center providers. Today, it uses around six providers, but its biggest one is Digital Realty Trust.

IBM is Digital Realty’s biggest tenant by annualized rent, occupying close to 1 million square feet in 23 locations and generating more than $115 million in annualized rent for the San Francisco-based data center REIT, according to investor documents available on Digital’s website. These include both leases with SoftLayer and with IBM, which has numerous non-SoftLayer data centers built for various purposes around the world.

One of the reasons Digital Realty gets so much SoftLayer business is that the cloud provider has a very specific uniform design for all data centers it deploys, and Digital has been delivering on that design for many years. It includes specific cooling and power density requirements, room layouts, strict PUE caps, tight SLAs for temperature and humidity ranges, and infrastructure redundancy, among other things.

Unlike other cloud giants, who use N+1 redundancy for UPS systems and other electrical infrastructure components in their mega-scale data centers, SoftLayer requires 2N UPS and treats this requirement as a major differentiator, Romero said. Put simply, N+1 means there are enough UPS units to handle the required load and one extra to compensate if one of the primary ones fails. 2N means there is full redundancy for the entire UPS plant.

Link to a video of our DataCenter - Click Here

SoftLayer’s design requires the ability to deliver variable power densities on the data center floor, anywhere between 3kW and 16kW per rack, for example. While power draw by physical hosts for cloud VMs is fairly predictable, power can fluctuate widely for bare-metal cloud servers, Romero said. Those rack-density ranges also change on a regular basis. The team revisits them about every six months, as Intel introduces new chipsets, to evaluate how much power the next generation of servers will need.

Changes Ahead

Romero doesn’t expect SoftLayer’s design requirements and its overall data center strategy to remain static. IBM’s cloud business has reached a scale where starting to invest in building its own data centers is an ongoing discussion for his team.

They are also evaluating new design innovations, such as modular in-row cooling, and becoming curious about data center providers with new ideas about structuring leases with their clients. Instead of pushing the client to reserve big chunks of capacity ahead of time, whether there is immediate need for it or not, these companies offer the option to increase the commitment incrementally, while still willing to build ahead to ensure capacity is available when the need comes. “Now we’re seeing providers that are willing to be much more creative with those commercial terms,” Romero said.

Three Monitors One Computer Video Card

Two monitors are Great, Tthree monitors are even better! With three monitors, there's a "center" to focus on, and 50% more display area. While there's certainly a point of diminishing returns for additional monitors, I think three is the sweet spot.

I was excited to learn that the latest AMD and nVidea Graphics cards have gone from two to three video outputs, which means you can now use triple monitors with a single video card upgrade at a modest price point!

nVidea GeForce GTX 590

The GeForce GTX 590, in very few words, is one graphics card made out of two graphics processors. Internally they are connected through a PCIe connection (onboard) and then they operate in SLI mode. To accomplish something really sturdy and powerful, NVIDIA took their fastest GPUs available and without any compromises on the number of shader processors etc. inside that GPU they started designing the card.

The end result is a dual-GPU product that runs two ICs called and tagged as the GF110, the very same stuff you find in the GeForce GTX 580, and in its bare essence the GTX590 is in fact two 580s albeit clocked slower. Memory wise NVIDIA has sizable and expensive memory volumes due to their architecture, we pass 1 GB per GPU as standard these days for most of NVIDIA's series 500 graphics cards. Each memory partition utilizes one memory controller on the respective GPU, which will get 256MB of memory tied to it. The GTX 590 has six (x2) memory controllers (12x256MB) = 3072 MB of GDDR5 memory. The TDP is roughly 365 Watts, a very respectable number really. TDP = Thermal Design Power. Roughly translated, when you stress everything on the graphics card 100%, your maximum power consumption is the TDP.

Read Full Review Here!

AMD Radeon HD 6990

So then, again a dual-GPU card, it is based on two Cayman GPUs. Take a Radeon 6970 and multiply everything by two. And that is roughly the R6990 in a nutshell, features and specification wise, yet now it's one card.

The AMD Radeon HD 6990 graphics card features dual-BIOS capabilities. This feature is controlled by an “Unlocking Switch” sitting close to the CrossFireX connector on your board. The switch toggles between the factory-supported Performance BIOS of 375W TDP (BIOS1), and a more extreme Performance BIOS (BIOS2) that unlocks higher clock speeds and up to 450W TDP of performance.

The reference default is BIOS1 which we'll use. The Radeon HD 6990 comes armed with an astonishing 3072 shader processors, thus 48 SIMD based shader clusters, split up in a twofold engine per GPU. The domain and shader clock is locked in at 830 or 880 MHz. The card comes paired with 4 GB of memory clocked at (effective) 5000 MHz (2GB per GPU).

Read Full Review Here!

For instructions on setting up your three monitor system, Click Here!

Matrox TripleHead2Go DisplayPort Three Monitor Laptop

Laptops can do it too, but you will pay a premium price for both the laptop and side attachment. The Matrox TripleHead2Go DisplayPort Edition external multi-display adapter adds up to three monitors to your laptop or desktop computer. It connects to the video output of your system and uses the system's existing GPU to provide high-quality, uncompressed graphics and video across all monitors. Ideal for professionals requiring more desktop space for maximum productivity and gamers wanting a totally immersive experience, this little black box lets you run different applications on each display or view one application across multiple monitors. Organize your workspace more efficiently, multi-task more comfortably and make fewer errors with a Matrox TripleHead2Go-powered multi-monitor setup.

Read Full spec!

 

 

Throwable Ball Camera May Revolutionize How We Watch Sports by: Max Thompson, Eric Adelson

Can you imagine seeing Santonio Holmes' Super Bowl-winning catch against the Cardinals captured from the perspective of the ball, surrounded by a packed stadium and flying past some of the best athletes in the world? Or perhaps the moment just after Lionel Messi fires at goal, but just before the keeper extends to stop the shot? We have the goal cam, the field cam, and the helmet cam. But the best may be still to come: the ball cam.

Read More - Click Here!

Time Management: Honor Thy Calendar by Anne Bachrach

Prepare the night before for your next day’s events. Print out your schedule for the next day and have everything you need to realize the results you want from the activities listed.

For every appointment or activity you do, you always want to think about what is the result you want to have happen and then do the things that help put you in the best possible position to attain that result.

What do you need for each phone call, for each meeting, for everything that gives you the highest probability to reaching your goal?

If you have a meeting somewhere, print the directions out in advance.

If you have a meeting with someone, make sure to have all their contact information printed out and/or a file prepared with everything you will need.

What got us to where we are today isn’t necessarily what will get us to where we want to be.

Review every process and system you currently have in place and ask yourself if this system currently is effective at achieving the results you desire.

You may have to make minor adjustments and enhancements to the way you have been doing things to achieve the future results you want.

Always put yourself in the highest probability position to achieve your goals.

Tips for Choosing a Payment Gateway

Five Tips for Choosing a Payment Gateway image shoppingonline

() If you accept donations online, conduct a web-based business, or even if you just have a traditional store but also allow customers to order online, then your website will need a way to securely accept customer payments. The technological means for doing so is usually referred to as a “payment gateway.”

Nearly all web-based businesses use a third-party service provider for these payment gateways, rather than try to build them themselves. Because there are so many options for a business owner to choose from, it’s helpful to understand the ways that the payment gateway service providers may differ, in order to be able to choose between them.

Fees

The first thing you are likely to look at is the fee structure for a given service provider. Most charge some mix of a flat or monthly fee, plus a per transaction fee that may be a flat fee plus a percentage, or simply a percentage fee. Unless you’re switching from to a new payment gateway service, and you have a history of online transactions with customers, it can be difficult to know exactly what your transaction volume is likely to be. It’s therefore important to choose a provider that makes it easy to switch to a higher or lower volume fee structure in order to keep your costs as low as possible.

Ease of Integration

Because the actual payment processing will occur on the service provider’s web servers, it will be necessary to integrate the payment processing with your website. In many cases the easiest solution is to select a provider where you send your customer to their website at the point it becomes necessary for the customer to enter credit card information, and the service provider sends them back to you once the transaction is complete. Keep in mind you’ll also need to make sure that any payment gateway provider you are considering can integrate with your website’s shopping cart software. The easier a provider makes it to integrate, the better.

Recognizability and Reputation

You may want to consider the recognizability and reputation of a particular payment gateway provider. Most web shoppers will be familiar with PayPal, some will be familiar with Amazon Payments and Google Checkout, and fewer may be familiar with some of the other services. Users want to be ensured that their personal data is securely being collected and sent across the internet.

Brandability

You may wish to consider whether a payment gateway service allows you to include your logo or other branding on the customer payment page. This might give your customers an additional level of comfort when they are sent to another site to complete a transaction. Also consider if the payment gateway provides a way to accept payment without having to leave your website.

Quickness of Payment Back to You

Finally, consider the stated practices of each payment gateway service for remitting payment back to you. Look for providers that have a very fast turnaround time, and do a little web research to see if other businesses have experienced any problems with receiving payment, or with chargebacks from customers.

Now What?

By taking these various factors into account, you’ll increase your chances of finding a payment gateway service provider that you’ll be able to work with for a long time into the future.

Tips for taking better Selfies

   

Denmark's Prime Minister Helle Thorning-Schmidt snaps a selfie with British Prime Minister David Cameron and U.S. President Barack Obama during the memorial service of former South African President Nelson Mandela in Johannesburg on Tuesday, December 10. "Selfie" has been named the global <a data-cke-saved-href='http://www.cnn.com/2013/11/19/living/selfie-word-of-the-year/index.html' href='http://www.cnn.com/2013/11/19/living/selfie-word-of-the-year/index.html'>word of the year</a> by Oxford Dictionaries. Click through the gallery to see other celebrities taking selfies. (Heather Kelly @ CNN) Denmark's Prime Minister Helle Thorning-Schmidt snaps a selfie with British Prime Minister David Cameron and U.S. President Barack Obama during the memorial service of former South African President Nelson Mandela in Johannesburg on Tuesday, December 10. "Selfie" has been named the global word of the year by Oxford Dictionaries. Click through the gallery to see other celebrities taking selfies.

There is no wrong way to take a selfie. The medium has grown into its own form of self-expression, and the artistic choices people make are as varied as the faces themselves.

On Tuesday, President Barack Obama was photographed taking a selfie with Denmark Prime Minister Helle Thorning-Schmidt and UK Prime Minister David Cameron at a memorial service for Nelson Mandela. The incident has attracted attention and criticism, but one thing is clear: It has helped cement 2013's status as the year of the selfie.

"Selfie" was named word of the year for 2013 by the Oxford Dictionary, which defines it as a self-portrait that is typically taken with a smartphone camera and posted to social media like Instagram, Twitter and Facebook.

If you want to get in on the trend, here are some tips on taking the best possible selfie.

Compose Yourself

 

How 'selfies' can boost self-confidence

 

Smartphone cameras are not the best cameras, but they have one major advantage that has helped them kill the point and shoot market: convenience. People always have their phones with them.

To get the best possible shot out of a smartphone, use the higher resolution back-facing camera. If you are using the front camera, handy for getting the exact framing you want, make sure you tear your eyes off yourself long enough to look into the lens for the photo.

If you hold the camera too close to your head you might experience some lens distortion, making your face and features look wider than they really are. Hold the camera far away from your face for the most flattering look, but be aware of that outstretched arm. If you change your posture to extend it too much, it can cause you to face the camera at a bad angle or make a straining face.

Distance is also necessary if you have to use the flash. Too close and you can blow out your features, take on a sickly yellow hue, or temporarily blind yourself.

Make sure you are lit from the front or the side. If you're standing in front of a bright light source, your face might be completely in the dark and the background properly exposed. If you focus on your face, the background can end up a bright white blur.

Background check

You are the star of your selfie, but that doesn't mean you should ignore what's behind you. Turn around and check out your backdrop. Be aware of potentially odd intersections, like a beam or tree that would appear to be sticking out of your head. Look for potential photo bombers lurking about, or a scene that would accidentally be a bad match for your cheerful, smiling face, like a funeral procession or house fire.

If you truly want your face and nothing but your face to be the focus of the shot, choose a neutral, empty background like a wall, or fill the frame with your visage.

Often with selfies, the setting is the reason for the photo. Perhaps you are traveling and want to document yourself in front of the Taj Mahal or Golden Gate Bridge. Offset your face so there's room in the frame to capture the scenery. It's still a selfie if you use a tripod and timer to take the picture, which would allow you to blend in more with your surroundings.

Pull in guest stars

If you find yourself sitting next to someone famous like, say, the president of the United States of America, ask him if he's game to take a group selfie you can show your friends back in Denmark. When taking group shots, especially with strangers who are indulging you, always use the front-facing camera. Even though the back camera on smartphones is higher quality, it is harder to correctly compose an image without seeing the preview on the screen. You don't want to accidentally cut someone out or awkwardly have to re-take the picture.

If necessary, it is acceptable to ask the President to help steady your camera.

Selfies have emerged as an acceptable way to document important world events, especially ones that involve crowds. In Thailand, protesters at recent anti-government rallies posted a number of great selfies that showed a more personal angle of a larger news story.

All by my selfie! Blogger shows how to take travel photos by yourself

Fix your face

"Pig nose, giant forehead and beefy shoulder are all preventable selfie faux pas," says model and artist Gina Teichert, who is working on a series of paintings based on her selfies. She recommends making sure your head is tilted down enough that you are not getting a selfie of the inside of your nose, and not turning your head more than 30 degrees in any direction, which can cause foreshortening.

Focusing too much on looking attractive can get in the way. Some people decide they look best making a particular face and stick to it religiously. (This has led to the dreaded duckface phenomenon.) Don't be afraid to put aside vanity and mix up your expressions to show different emotions, angles and crops.

Try on a style

Some of the most interesting selfie-ographers have picked a specific style or look for their self-portraits. Spanish Instagram user Isabelitavirtual posts stunning, artistic fashion photos of herself while keeping her face from view. Palomaparrot picks vast white backdrops for her minimalist selfies.

We already said mixing up your facial expressions is good, but sometimes having the exact same look in every photo can be pretty fantastic, too. Just ask Benny Winfield Jr., the self described "leader of the selfie movement." Winfield has hundreds of photos of himself sporting the exact same smile in every single shot. It is entertaining and very impressive.

The theme doesn't have to be visual. Professional skater Steve Berra took a selfie every single day for 366 days. The style and setting differs from day to day; the overall product is a unique way to document a year in his life.

Selfie named word of the year for 2013

Follow the trends

Sometimes a specific selfie trend will sweep social media. Look out for interesting hashtags and join the fun. For example, Thursdays have become "throwback Thursdays," or #tbt, when people post photos of themselves from years gone by. Many of these are selfies, miraculously taken before the word selfie was a thing.

After Gawker site Jezebel posted a rant calling selfies a cry for help, people on Twitter who argued they could be an empowering way to promote different standards of beauty started posting selfies with the hashtag #feministselfie.

The #fromwhereistand tag is for people taking shots of their feet and the surrounding scene, like piles of fall leaves, sandy beaches or other interesting spots.

Opinion: What's the etiquette of 'selfies' at funerals?

Be smart about timing

There have been some odd and controversial selfie trends in the past year, including young folks behind the wheel taking photos with one hand while driving, or people taking shots of themselves at funerals.

A high school student snapped a photo of himself standing in front of his pregnant teacher, who appeared to be going into labor. The shot quickly went viral. Some wealthy kids on Instagram post photos of themselves indulging in expensive leisure activities, like showering in champagne and jumping off yachts. They tag the images with the tag #weatlh.

Take a moment to consider what's going on around you and if taking a selfie is in good taste. Also, remember all the people who will be able to see it online -- forever.

Tired of Texting - You are not alone

Text messaging in the United States is on the decline, according to a survey (PDF) released Thursday by CTIA-The Wireless Association. The numbers of SMS text messages sent and received nationally dropped from 2.3 trillion in 2011 to 2.19 trillion in 2012.

While 2.19 trillion may seem like a colossal number and not much less than 2.3 trillion, it is still nearly a 5 percent drop. According to a report released last week by research firm Informa, one of the reasons that texting may be declining is because several chat applications -- such as Apple's iMessage, WhatsApp, Viber and BlackBerry Messenger -- are becoming users preferred method of communication.

Text messaging really got going in the U.S. about six years ago, according to the Associated Press. While carriers used to charge users about 10 cents for each message in the past -- that kind of pricing is now usually bundled into either text or data packages.

Even though there has been a drop in texting, it doesn't seem like the practice is going to wither away. According to the Associated Press, the 2.19 trillion number still represents 19 text messages sent or received per person daily.

CTIA noted that its survey is put together from aggregated data from carriers serving 97 percent of all estimated mobile subscribers.

CTIA-The Wireless Association

 

This article originally appeared on CNET.

To Survive You Need Productivity Prudence & Profit

What a year! For many, 2008 was a year they would like to forget. Between over-leveraged mortgages, banks that failed or were too big to fail, and a restructuring of the auto industry, many individuals and businesses alike are looking to 2012 with a more hopeful outlook.

In the coming months, the healthcare debate, business incentives and changes to the tax code will be at the forefront of local and national debates. Though important, these are issues in which the individual small business owner has minimal say. Instead of focusing on these larger issues, entrepreneurs should focus their efforts on enhancing small business productivity, prudence, and profit as we move into 2012. But how???

Productivity

In the last few years, many companies learned to do more with less as cuts in spending and employment left many small businesses demanding more out of their employees. In 2010, small business productivity will remain vital as employees continue to carry a heavy workload. For companies to succeed, they need to arm their employees with the right small business productivity tools.

By identifying and implementing the right small business solutions, entrepreneurs can get more out of their employees and save money. Increased productivity among full-time employees can result in more sales, the development of better products and services, faster completion of tasks, and improved customer service.

Regardless of the industry, many companies will turn to small business communication solutions that can improve productivity. For example, a doctor's office may select an Interactive Voice Response system (IVR) to more efficiently handle and direct calls during and after business hours. Companies with hourly employees, like field service repair companies, may use location-based services to track field technicians and redirect them based on cost drivers like fuel consumption. Or, many companies may look to deploy BlackBerrys to their staff to help them stay connected anytime, anywhere helping fuel better small business productivity. Finding small business solutions that improve productivity will greatly impact a bottom line.

Prudence

While the economic freefall has halted and the economy even had some bright spots in 2009, most companies are not popping celebratory champagne. And as much as we'd all like to see 2010 herald a recovery of small business productivity, many economists and so-called "financial experts" are predicting only a slightly stronger economy in 2012. Next year, prudence will be the name of the game when it comes to small business solutions.

With a sharp eye on spending, small businesses will need to be prudent in their decision making and ensure they are making the right investments. Finding employees that have the right skill set, investing in developing or marketing your best product, and selecting small business solutions that will help your company grow will all demand prudence.

But this careful decision making will not only focus on spending, but on all aspects of small business productivity. Many companies may reexamine their niche market or how they \"have always done things" to find new and better small business solutions. Just as Thomas Jefferson once wrote, "...a little rebellion now and then is a good thing,\" a shake-up of how your small business operates may be in order.

Profit

One consequence of the downturn is that many companies unfortunately closed their doors. As a result, those who survived the recession now have fewer competitors vying for customers. As the economy stabilizes, banks begin to loan more money and businesses are more comfortable with spending money, the small businesses that positioned themselves correctly will have a stronger opportunity for market penetration than they've likely seen in recent years. By making prudent decisions and focusing on driving small business productivity, companies will be well-positioned to profit in 2012 and beyond.

If the past 12 months have taught us anything, it's that no amount of economic forecasting is completely precise. But, let's all look forward to 2010 with a focus on productivity, prudence, and profit, as well as the promise of what a new year will bring to small businesses.

Top 20 Blog Ideas For Small Business

I blog to provide my customers with tips on better utilizing the computer & network technology that you already own. It also keeps me in front of my customers when I'm not physically there. There are lots of good reasons to blog that provide a good return on investment. Here is my top 20:


1. Current events
. Can you link what you do in your business to a current event? Open up your daily newspaper or your RSS news reader and see what's happening in the world, your country, your state, or your city. Give your opinion about the event and a solution, if you have it, and relate that to your business if you can.

2. Trends in your industry. I read constantly and subscribe to more industry publications than I have time to review. However, there are a handful that I do regularly read, and it's to those that I look to for what the trends seem to be. When you blog about the trend, put your unique perspective on it, or write a rebuttal post, disagreeing with the relevance of the trend.

3. Get personal. Tell a story about what's happening in your life or in your business that would be useful or instructive for your readers. Chronicle both your highs and lows, your wins and your struggles. One key to successful blogging is getting personal with your readers. The more \"real\" you are with your readers, the better your reader gets to know you and begins to like and trust you. You become a \"real, live\" human being to them who faces similar issues that they face.

4. Top 10. Most of my writing is in the form of a Top 10 list because it's an easy way for me to outline the points I want to make and then go back and fill in the details for each point. In this case, each of your points for a topic can become an individual blog post, and when all the points are complete, you can compile the full list for an article for your ezine or website.

5. Frequently asked questions. If you've been in business for awhile, you know the questions that clients and prospective clients ask you to answer over and over again. Instead of repeatedly responding to the same questions, write a series of blog posts that answer your target market's most frequently asked questions.


6. How you helped a client solve a problem. Clients hire you to solve a specific problem they're having, whether they do that when they buy your service or your product. List 3-5 most recent problems that you have helped your clients solve. Create a post that talks about the problem and the solution you provided (either with your client's permission, or by making it generic enough to hide the client's identity) that becomes a learning experience for your readers.

7. Interview an expert. What people do you know and admire in your industry? If you admire them, chances are that members of your target market do, as well. Contact them for a short email or recorded interview and ask them 3-5 questions that you'd like to hear them answer about their lives, their businesses, industry trends, or how to solve a particular problem. Publish the interviews as blog posts, adding audio and graphics if you have them.

8. Solicit and answer questions. Ask your ezine subscribers or blog readers to ask you their most pressing question related to what you do. I do this and get questions for 1-2 blog posts per week, and it helps me stay in touch with the needs of my readers, as well.

9. Review something. Read a good book lately related to your industry? Just purchased a product to help you solve a problem? Reviews aren't limited to the critics at the New York Times. Blog about your experience with a product, book, or service, highlighting both the high points and low points, and whether you would recommend that others use or purchase it.

10. Read other blogs. Go to Google's Blog Search or Technorati and find other blogs related to your industry or your target market. Add those to your blog reader and take an hour or two each week to read the posts on those blogs. Do you agree or disagree with the post? Have another point of view? Think the blogger was on target but you want to expand on her point of view? Reading other blogs is a great way to generate ideas for your own blog.

11. Keep an idea file. Sometimes a blogging idea or concept will strike you when you don't need (or want) to blog. Begin a blog idea file by creating a document or spreadsheet to track your ideas and thoughts. If you're in the zone, go ahead and write the post, and then you can post it to your blog on a day when the idea well is dry.

12. Create a tutorial. There's always something you can tell your target market how to do. Create a written, audio, or video tutorial of the process as your blog post. Depending on the complexity of the tasks, the tutorial may need to created in multiple parts, like Part 1, Part 2, etc., which would make for multiple posts to your blog.

13. Share a positive/negative email. I often share exceptionally positive or negative emails I receive from people (without names to protect their identity as appropriate) either to celebrate kudos I've received or to demonstrate how I responded to a particularly nasty or upsetting comment. I get the most mileage out of the negative emails, and I often ask for feedback about how my readers might respond to the situation.

14. Take a tour. Take a self-made in-person or virtual tour of something useful to your readers. For example, if you're a dating coach, tour the top 5 online dating sites and report your experiences as a client in each. If you're a restaurant consultant, visit 3 local restaurants and evaluate what's often overlooked in staff training based on your experience as a customer.

15. Write about a Twitter or Facebook update. You only get 140 characters in Twitter to write about something. If you need more space, or want to respond in greater length to someone's Tweet or Facebook status update, do so in your blog. Thought-provoking questions are often asked on Twitter, and the answers may inspire you to blog.

16. Create a \"Best of\" list. What are the top 7 blogs to read in your industry? How about the top 5 people to watch? What about the 10 most useful online tools you use? Nothing attracts attention on a blog quicker than a list, so create one yourself or ask your readers to help you in the process.

17. Report from an event. Attending a professional trade show, conference, or networking event? You can report live about your experiences at the event on your blog. Talk about the workshops your attended, the vendors you met, the speaker you heard -- the sky's the limit!

18. Debunk a myth. Each industry is plagued with myths and fallacies about success/failure or what does/doesn't work that the industry professionals would like to see vanquished once and for all. Use your blog to debunk some of the most common myths/preconceptions/notions in your industry and set the record straight.

19. Talk to newbies. Picture yourself as a newbie in your industry once again. What do you know now that you didn't know then? What questions did you ask? What knowledge do you have that you think everyone knows? Getting back to the basics can help bring all of your blog readers up to speed.

20. Write about a client conversation. Many times I'm inspired to blog as an expansion or continuation of a conversation I had with a client. The blog post focuses on a topic of the conversation, not the conversation itself. Typically the strategy/idea/technique you've discussed with one client will benefit your blog readers as well.

This is just the tip of a very large iceberg of ideas for posts to your blog. Take a look around your life, your business, conversations with clients and colleagues, and what's happening in the world around you. You'll soon begin to see more potential for blog posts than you ever thought possible!




Toyota - My Have Things Changed

In 1988, a local remanufacturer of automobile automatic transmissions, WTI (Williams Technologies (now Caterpillar)), invited Toyota to come to their facilities in Summerville, SC to present the idea of using remanufactured transmissions instead of new transmissions as warranty replacements. The use of Remanufactured transmissions instead of new would reduce Toyota's replacement cost by 50% and would create a lucrative opportunity for WTI and the local economy.

It took years to get Toyotas attention because, in the mind of Toyota, they could not conceive of the idea that one of their transmissions would fail. Their planning, engineering, manufacturing, and quality checks were “world renown” TPS (Toyota Production System) was the goal or envoy of every manufacturer; they truly believed that they would not produce a product that would fail. And in practice this proved to be true. Folks bought Toyotas because they never broke down AND they retained one of the highest resale values in the business.

Finally, in '92, Toyota agreed to a test. They send 25 broken Toyota transmission to Summerville. These units were not documented in any way. No paperwork, no documentation of what the transmission is, what vehicle it came out of, or what broke. WTI's mission was to identify each transmission, the root cause/s for failure, and to document the corrective action. Then, WTI was to remanufacture each transmission and return it to Toyota where it would be tested like one of their new transmissions. A major task indeed.

I remember the day Toyota came to town, 10 men dressed in black suits, as though they were going to a funeral. They were led to a special part of the main production floor where the 25 transmission were laid out in perfect diagonals, in five by five rows. Each transmission was covered with a clean white sheet. As such the transmissions resembled coffins.

I was simply not prepared for what came next, and neither was anyone else. The QM (quality manager) moved to the first transmission and lifted off the sheet whilst the 10 men in black suites turned to face the transmission, and bowed in unison as though honoring a Conrad lost in battle. The QM read the spec sheet identifying the unit and possible vehicle application. The interpreter indicated that the unit identification was correct.

Then came the most bizarre thing I ever saw. The QM began listing the causes for failure. The 10 men from Toyota began bowing low and muttering in Japanese. Of course I could not understand what they were saying, but I could tell they were sincerely cut to the heart and extremely remorseful as though they were personally responsible for the death of that transmission.  Later, the interpreter told us that the 10 men from Toyota were acknowledging their failures, apologizing to their coworker for letting them down, to the company for putting a blemish on Toyota's good name, and to the country for besmirching it's repetition. But most of all, apologizing to their customer who trusted Toyota to provide a quality automobile. This process was repeated again and again until all 25 transmission viewings were complete, and each time the 10 men reacted with the same level of intensity. I fully expected to see the 10 men the next day less 1 pinky finger (Ninja / Yakama style).

Never again would we see the “men from Toyota”. The transmissions went back to Japan for testing. WTI received a report, with many thanks, stating that their assessments were correct and that the remanufactured transmission test results were nearly as good as new transmissions. However, Toyota believed it was in the best interest of their customers to use the experience to improve their existing products and to continue to use new transmissions as warranty replacement. Strangely, Toyota recommended to Honda and Nissan that they consider Williams Technologies for their warranty replacement products. WTI remanufactured Honda torque converters and Nissan transmissions and steering boxes for many years.

But this recent Toyota accelerator and brake issue, What's with that? Could it really be that, what was the envoy of the automotive world, is now the bane of the industry? After this experience with Toyota 20 years ago I can hardly believe what I am hearing. How could a company with a culture fully focused on quality and customer satisfaction, A have such a failure and B not take responsibility, and C try to hide it from their customers and D be Sooo Slooow To Fix IT? Is it Greed or simply bad association with other manufacturing cultures like China and the US? Is true commitment to customer satisfaction dead? Perhaps Ford has a better idea!

Of course I always try to derive some kind of learning experience from things I see and read. In this case, it's the same old story. If you remain fanatically focused on your Customer's wants and needs, profits will never die and you may be able to pick up additional market share when the Toyota of your industry gets greedy.

Turn Your Printer/Scanner Into A Copy Machine

Yes you can turn any scanner/printer combo into a copy machine using software, and you don't even have to pay for it...

A free program called (appropriately enough) Photocopier works with XP, Vista and even older versions of windows like NT and Windows 98. Simply set the number of copies and the lightness level, click the Copy button and, well, IT MAKES COPIES!!! it just works.

Click the link below to download the program:

http://www.pcworld.com/downloads/file/fid,21240/description.html?loomia_ow=t0:s0:a41:g26:r25:c0.013669:b20067169:z0

Turn your Windows 10 upgrade files into ISO disk image

Microsoft wants you to have a free Windows 10 upgrade, and they really want you to use Windows Update to get it over the Internet. If you have a PC that qualifies for the upgrade, you should do this if possible. It really is the best, fastest, cleanest option for the vast majority of Windows PCs.

But a lot of my readers want traditional installer files, either on a DVD or in an ISO image file that is the equivalent of a DVD. If you are old school, you want an ISO because installing Windows on bare metal is just what one does, period.

I get that, I really do.

Having that installer image available gives you access to some installation and repair options that you don't have otherwise, such as the option to create bootable media. That's mandatory if you want to set up a dual-boot installation, for example.

For the Insider Preview, Microsoft makes an ISO available for download with every Slow ring release. But Fast ring updates are delivered only via Windows Update, and at this point we don't know whether or how Microsoft will make ISO copies of the final Windows 10 release available for download.

I know long-time Windows users have wake-up-in-a-cold-sweat nightmares about Windows upgrades gone horribly wrong. But those days are long gone. I have done hundreds of clean installs and upgrades, on physical and virtual machines, using the Windows 8.1/10 installer family.

 

The staged installer used with Windows 8.1 and Windows 10 is as close to failsafe as software gets. If something goes wrong, you can roll back easily. (I've done those rollbacks a lot during this beta.)

After the upgrade is complete, you can create an ISO file from the cached upgrade files.

Or you can start the upgrade, wait until the installer files are fully downloaded, and then cancel. In either case, you'll find the large installer file stashed in a hidden folder called C:\$Windows.~BT, in a subfolder called Sources.

 

 

Here's how to find it in File Explorer. (Note that I've enabled the option to view hidden files.)

 

01-find-install-esd-file.jpg

 

This file, Install.esd, is saved using a compressed format introduced with Windows 8.1 and specifically designed for electronic software distribution (thus the .ESD file extension).

If you're an IT pro responsible for deploying Windows in your organization, you can use the Windows Assessment and Deployment Kit (ADK) to decompress and decrypt that image, turning it into an ISO file using Microsoft-approved tools. A blog post by Microsoft MVP Johan Arwidmark contains detailed instructions on this technique.

If you don't want to install the full deployment toolkit, here's a faster way to build that ISO using the same tools, packaged by community members for this specific purpose.

Step 1: Download the ESD-Decrypter files. There's a download link in this post on the Microsoft Answers forum, although you can also find the files elsewhere. Note that this file is saved in 7z format, so you will need a third-party decompression utility such as 7-Zip to extract it.

Step 2: Extract the ESD-Decrypter files to their own folder and then copy the Install.esd file to the same folder.

Step 3: Right-click the Decrypt command file and choose Run As Administrator. (It's a batch file, so you can see exactly what it's going to do.)

 

02-run-esd-decrypter-as-admin.jpg

 

Step 4: Choose the first option in this menu and press Enter.

 

03-esd-decrypter-menu-options.jpg

 

The command file displays the status of current operations as it works. After a few minutes (the exact time depends on your hardware), you end with an ISO file in the same folder as the ESD.

 

05-successfully-reated-iso-from-esd.jpg

 

You can now create bootable media from that ISO file. You can also attach it to a virtual machine to install Windows 10 in a VM. You can double-click to mount it in File Explorer in Windows 8.1 or Windows 10 and run Setup directly from within Windows.

Note that because this is using preview versions, you shouldn't need product keys for installation. That will probably change for the final release, of course.

In the next installment of this series, I will go into more detail about the range of installation options you have, with or without this ISO file.

Twitter Language Lessons


(Copyright: Science Photo Library)

(Philip Ball BBCNEWS) The social media channel is a valuable tool for linguists, allowing them to explore how language changes over time through the spread of slang expressions.

This piece contains strong language from the beginning, as they say on the BBC. But only in the name of science – for a new study of how slang expressions spread on Twitter could offer insights into a more general question in linguistics: how language changes and evolves.

You might, like me, have been entirely innocent of what “af” denotes in the Twittersphere, in which case the phrase “I’m bored af” would simply baffle you. It doesn’t, of course, take much thought to realise that it’s simply an abbreviation for a vulgarity – a tamer version of which is “as hell”. What’s less obvious is why this pithy abbreviation should have jumped from its origin in southern California to a cluster of cities around Atlanta before spreading more widely across the east and west US coasts, as computer scientist Jacob Eisenstein of the Georgia Institute of Technology in Atlanta and his co-workers Brendan O’Connor, Noah Smith and Eric Xing of Carnegie Mellon University in Pittsburgh report in an, as yet unpublished, study.

Other neologisms have different life stories. Spelling bro, slang for brother (male friend or peer) as bruh began in the southeastern US (where it reflects the local pronunciation) before finally jumping to southern California. The emoticon “-__-“ (denoting mild annoyance) began in New York and Florida before colonising both coasts and gradually reaching Arizona and Texas.

Who cares? Well, the question of how language changes and evolves has occupied linguistic anthropologists for several decades. What determines whether an innovation will propagate throughout a culture, remain just a local variant, or be stillborn? Such questions decide the grain and texture of all our languages – why we might tweet “I’m bored af” rather than “I’m bored, forsooth”.

There are plenty of ideas about how this happens. One suggestion is that innovations spread by simple diffusion from person to person, like a spreading ink blot. Another idea is that bigger population centres exert a stronger attraction on neologisms, so that they go first to large cities by a kind of gravitational pull. Or maybe culture and demography matters more than geographical proximity: words might spread initially within some minority groups while being invisible to the majority.

Sophisticated computer models of interacting “agents” (that is, virtual people having virtual conversations) can be used to examine these processes, but they tell us little unless there are real data to compare them against. Such data has been extremely difficult to obtain, but now social media channels provide an embarrassment of riches – a precise and searchable record of our exchanges, which are being used to explore everything from the cycle of emotions experienced in everyday life to the changing social sentiment during the course of the Arab Spring.

Twitter, FTW! :-)

In this case, Eisenstein and colleagues scoured through messages from the public feed on Twitter. They collected around 40 million messages from around 400,000 individuals between June 2009 and May 2011 that could be tied to a particular geographical location in the USA because of the smartphone metadata optionally included with the message.

The researchers then assigned these to their respective “Metropolitan Statistical Areas” (MSAs): urban centres that typically represent a single city. For each MSA, demographic data on ethnicity are available which, with some effort to correct for the fact that Twitter users are not necessarily representative of the area’s overall population, allows a rough estimate of the ethnic makeup of the message source.

Eisenstein and colleagues used statistical analysis techniques to work out how these urban centres influence each other – to tease out the network across which linguistic innovations like “af”, “bruh” or “-__-“catch on. The result is a map of the USA showing not just how these phrases spread between population centres, but what the direction of that influence is.

What, then, are the characteristics that make an MSA likely to spawn successful neologisms? It’s well established that Twitter has a higher rate of adoption among African Americans than other ethnic groups, and so it perhaps isn’t surprising that they now find that innovation centres, as well as being highly populated, have a higher proportion of African Americans, and that similarity of racial demographic can make two urban centres more likely to be linked in the influence network. There is a long history of adoption of African American slang (cool, dig, rip off) in mainstream US culture, so these findings agree with what we might expect.

But these are still early days, and the researchers – who hope to present their preliminary findings at a workshop on Social Network and Social Media Analysis in December organised by the Neural Information Processing Systems Foundation – anticipate that they will eventually be able to identify more nuances of influence in the data. The real point at this stage, however, is the method. Twitter and other social media offer records of language mutating in real time and space: an immense and novel resource that, while no doubt subject to its own unique quirks, can offer linguists the opportunity to explore how our words and phrases arise from acts of tacit cultural negotiation.

Read More - Click Here!

Two Routers on Same Network

While most home computer networks only use one router, adding a second router makes sense in a few situations:

Upgrading a wired network to also support wireless devices.
Extending the wireless range of a home network to reach dead spots.
Networking a wired device that's too far away from the original router.
Creating a separate subnetwork within the home to stream video among some devices without bogging down connections to others.

Making it all work requires just a few steps.

Positioning a Second Router
An illustration of how to position two wireless routers in a two-story home.
Nusha Ashjaee ©Lifewire 
When setting up a new router, place it near a Windows PC or another computer that can be used for the initial configuration. Both wired and wireless routers are best configured from a computer connected via Ethernet network cable. The router can be moved to its permanent location later.

Connecting a Second Wired Router
A second (new) router that doesn't have wireless capability must be connected to the first (existing) router via an Ethernet cable. Plug one end of the cable into the new router's uplink port (sometimes labeled "WAN" or "Internet"). Plug the other end into any free port on the first router other than its uplink port.

Connecting a Second Wireless Router
Home wireless routers can be connected to each other via Ethernet cable the same as wired routers. Connecting two home routers via wireless is also possible, but in most configurations, the second one will only be able to function as a wireless access point instead of a router. The second router must be set up in client mode to utilize its full routing functionality, a mode that many home router's don’t support. Consult a specific router model's documentation to determine whether it supports client mode and how to configure it.

Wi-Fi Channel Settings for Wireless Home Routers
If both the existing and second new routers are wireless, their Wi-Fi signals can easily interfere with each other, causing dropped connections and unpredictable network slowdowns. Each wireless router utilizes certain Wi-Fi frequency ranges called channels, and signal interference occurs whenever two wireless routers in the same house use the same or overlapping channels.

Wireless routers use different Wi-Fi channels by default depending on the model, but these settings can be changed via the router's console. To avoid signal interference between two routers in a home, try setting the first router to use channel 1 or 6 and the second to use channel 11.

IP Address Configuration of a Second Router
Home network routers also have a default IP address settings depending on their model. The default IP settings of a second router do not require any change unless it is to be configured as a network switch or access point.

Using the Second Router as a Switch or Access Point
The above procedures enable an additional router to support a subnetwork within a home network. This is useful when wanting to maintain an extra level of control over certain devices, such as placing extra restrictions on their internet access.

Alternatively, a second router can be configured as an Ethernet network switch or (if wireless) an access point. This lets devices connect to the second router as normal but does not create a subnetwork. For households simply looking to extend basic internet access plus file and printer sharing to additional computers, a no-subnetwork set up is sufficient, but it does require a different configuration procedure than above.

Configuring a Second Router Without Subnetwork Support
To set up a new router as a network switch, plug an Ethernet cable into any free port of the second router other than the uplink port and connect it to any port of the first router other than the uplink port.

To set up a new wireless router as an access point, configure the device for either bridge or repeater mode linked to the first router. Consult the second router's documentation for the specific settings to use.

For both wired and wireless routers, update the IP configuration:

Check the second router's local IP address and change it if necessary to ensure it is within the address range of the network as configured on the first router and not conflicting with any other device on the local network.
Set the DHCP address range of the second router to fit inside the address range of the first router. (Alternatively, disable DHCP and manually set the IP address of each device connected to the second router to fall within the first router's range.)

US Kohls Now Accepts Amazon Returns

More than 1,100 Kohl’s stores in the U.S. are now accepting returns of Amazon purchases, a move that began Monday and was announced back in April.

The arrangement is seen as mutually beneficial for the retailers. For Amazon, it’s an easy and fairly hassle-free way to return items to Amazon. Customers just take an eligible returned item to a Kohl’s store and Kohl’s will get it back to Amazon. There’s no need to put the item in a box or make out a label.

What’s in it for Kohl’s? The possibility of a lot more foot traffic. Chances are good that many of these Amazon customers aren’t Kohl’s customers, so bringing them to the latter’s brick and mortar locations may help increase sales.
‘Biggest initiative of the year’

There’s evidence to suggest this just might work. After a pilot program of the partnership was launched in the Chicago market, revenue and sales transactions increased for Kohl’s stores in the area. As the partnership rolls out further, Kohl’s has high expectations.

“The nationwide rollout of the Amazon Returns program is our single biggest initiative of the year,” said Michelle Gass, Kohl’s CEO. “Our top strategic priority is driving traffic, and this transformational program does just that. It drives customers into our stores, and we are expecting millions to benefit from this service.”

Other brick and mortar retailers have tried various ways to compete with Amazon. Both Walmart and Target have beefed up their online marketplaces while improving customer experiences in stores. Kohl’s is taking a “if you can’t beat ‘em, join ‘em” approach.

Under the terms of the partnership, eligible items will be returned free of charge regardless of return reason and regardless of whether the items are packaged or unpackaged for shipping.

In addition to driving traffic, becoming a return center increases Kohl’s relationship with Amazon. Kohl’s has already agreed to carry some of the e-commerce giant’s products in more than 200 of its stores.

Upgrade to Windows 10 Pro for Free

How to upgrade an old PC to Windows 10 - free

[This article has been completely rewritten to incorporate developments in later updates to Windows 10. The most recent update was published May 26, 2018.]

If you purchase a new PC with Windows 10 Home preinstalled, prepare to be annoyed. This down-market edition (maybe we should just call it Windows for Cheapskates) doesn't have the features you need for getting real work done: Remote Desktop server access, BitLocker disk encryption, group policy support, and control over when updates get installed, just for starters.

You could pay $99 for an upgrade, but before you reach for your wallet, consider a less expensive option.

Do you have an old product key from Windows 7 Pro, Windows 7 Ultimate, or Windows 8/8.1 Pro lying around? Those keys can be reused to enable an upgrade from Windows 10 Home to Windows 10 Pro, potentially saving you the upgrade fee. In fact, you can use a product key from any of these older Windows versions to perform a clean install or to upgrade to Pro.

upgrade-home-to-pro-product-key-accepted.jpg

In recent versions of Windows 10, the upgrade from Home to Pro is quick and easy.


It's worth rummaging through your garage, storeroom, or email archives to see if you can locate one of those old keys. Maybe you still have a key for one of the heavily discounted upgrades to Windows 8 Pro that Microsoft offered in the first few months after that product's ill-fated launch in 2012.

Or perhaps you have a shrink-wrapped retail copy of Windows 7 Professional or Ultimate, where the license associated with the product key is no longer in use.

In fact, you only need to use the older product key one time. After you upgrade from Windows 10 Home, the Windows 10 Pro digital license is attached to the specific hardware you just upgraded, allowing you to reinstall that edition of Windows on that hardware anytime, without the need for a product key.

This scenario worked during the early Windows 10 upgrade program, and after some testing and multiple reports from independent testers worldwide I can confirm that it still succeeds in mid-2018.

Microsoft first made this option available in Windows 10 version 1511. Since then, they have simplified the process dramatically.

I've been testing upgrade/activation scenarios on a wide variety of hardware recently to see how things work. Here's the scoop.

UPGRADING A NEW PC FROM HOME TO PRO

Let's say you buy a new PC with Windows 10 Home installed by the OEM. Some vendors offer an upgrade option as part of the purchase, but many PCs sold in the retail channel are preloaded with Home edition.

This could also be the case if you took advantage of the free Windows 10 upgrade offer on a PC running a Home edition of Windows 7 or Windows 8.x.

In either case, the upgrade takes just a few minutes. Start at Settings > Update & Security > Activation, where you should see a screen that looks something like this:

upgrade-home-to-pro-options.jpg

The Pro upgrade accepts product keys from older business (Pro/Ultimate) versions of Windows.


If you don't have a Pro product key and you want to buy one, you can click Go to the Store and purchase the upgrade for $100. Easy.

But if you have a product key for Windows 10 Pro, Windows 7 Professional or Ultimate, or a Windows 8/8.1 Pro, you can click the Change Product Key button and enter it here.

upgrade-home-to-pro-product-key-entry.jpg

Enter a product key here and then follow the prompts.


Using an older version's product key to perform this upgrade used to require two steps. Fortunately, in recent feature updates this two-step process isn't necessary.

After entering the product key, follow the prompts to perform the upgrade.

You'll see a succession of progress screens and your system will restart. After the upgrade completes, you should see a Success notification. Check the Activation screen again to confirm that you're now running Windows 10 Pro.

CLEAN REINSTALL

After you've successfully performed a Home-to-Pro upgrade, you can safely throw away the key. Your upgrade is now a digital license, attached to your unique hardware. If you perform a reinstallation of Windows, Microsoft's activation servers will recognize the hardware and activate Windows 10 automatically.

I tested this scenario by upgrading the SSD in an HP Spectre x360 that originally shipped with Windows 8.1 Home and had then been upgraded to Windows 10 Pro. After the upgrade was complete, I used a USB flash drive to reinstall a clean copy of Windows 10 Pro.

Twice during the installation process, I was prompted to enter a product key. Both times I chose the option to skip entering the key. When prompted, be sure to choose Windows 10 Pro as the edition to install.

clean-install-with-upgrade.jpg

If your PC already has a Pro license, don't enter a product key when reinstalling.


When setup was complete, I signed in and checked the activation status (Settings > Update & Security > Activation). The system was properly activated, because Microsoft's servers recognized the hardware and used the digital license.

CLEAN REINSTALL, WITH EDITION UPGRADE

The one gotcha in this series of scenarios comes when you have a system that includes digital licenses for both Windows 10 Home and Windows 10 Pro. In that scenario, you can inadvertently restore Windows 10 Home.

This happened during my testing when I used the recovery image for a PC that originally shipped with Windows 8.1 Home and then upgraded the restored PC using Windows 10 recovery media. Not surprisingly, I ended up with an installation of Windows 10 Home.

If that happens to you, don't bother searching for your original product key. Instead, use Microsoft's generic product key to force the upgrade.

Go to Settings > Update & Security > Activation and click Change Product Key. Next, enter the default Windows 10 Pro product key:

VK7JG-NPHTM-C97JM-9MPGT-3V66T

Follow the prompts to upgrade from Home to Pro. Because your hardware already has a digital license for the Pro edition, it will activate automatically.

That generic product key isn't magical, of course. If your hardware doesn't already have a Pro license, you'll get an activation error and you'll need to supply a proper product key or pay for an upgrade.

View windows side-by-side in XP

Every want to view two spreadsheets side-by-side? Or perhaps a program and a Word document? This is how we do it:

  1. On the taskbar, click the button of the first window that you want to display in the side-by-side view.
  2. Hold the CTRL key while right clicking the second window.
  3. Click Tile Vertically in the right context menu.

Want Windows 10 Update Now - This Is How We Do It

(Jeff Grubb @ GamesBeat) Windows 10 is here! Well, it’s here for a lot of people, but many of us still cannot download it until Microsoft says it’s OK (unless you want to do it manually).

You see, Microsoft plans to release Windows 10 in waves. That means even if your computer is ready, you won’t necessarily be able to download Windows 10 right away. But I don't like to wait!

Even if the Windows 10 install app still says it will “notify you when ready,” you can force Windows 7 or Windows 8 to start downloading the Windows 10 files (thanks to Reddit’s Windows 10 subreddit for helping us figure this out). We’ve laid out the instructions with screenshots to guide you through it. Just make sure you are ready for it! 

Caution: Try this at your own risk!!! It worked for me but it might not work for you!!!

First, navigate to “C:\Windows\SoftwareDistribution\Download” (you may need to replace C: with a different drive letter if you installed Windows elsewhere) and delete all the files there. This will give Windows Update a clean slate.

Open Windows Update by hitting the Windows key, typing “Windows Update” and clicking on it.

Open up the command prompt by hitting the Windows key and typing in cmd. Don’t hit enter. Right click and choose “Run as administrator.”

Type (but do not enter yet) “wuauclt.exe /updatenow” — this is the command to force Windows Update to check for updates.

Back in the Windows Update window, click “Check for updates” on the left hand side. It should say “Checking for updates…”

While this is happening, switch back to the command prompt and enter the command you already typed in.

You should now see Windows Update say that it is downloading Windows 10. Before you actually install it though, back everything up and make sure you’re ready.

Web Conference In Place Of Travel - Unattended Conference Call (ucc)

UCC has the potential to replace a lot of business travel. Think about it! Most users have been invited to attend a Web conference, but many of them aren’t \nbeing proactive by managing their own meetings. (Of course, some of us choose \nnot to let technology suck up all of our energy, but that's another discussion.) \nWeb conferencing can definitely be a big help in this area, and there are a \nnumber of products that offer lots of flexibility. Here are four products to \ncheck out:

All of these products let users conduct meetings over the Internet. Imagine — \nno travel delays, no business class costs, no lost equipment, no harried, \nsleep-deprived employees. Just log in and go! Web conferencing has the potential \nto save your clients money and improve their response time and effectiveness \nwith their own clients. (Do'™t forget, stay-at-home employees can benefit from \nWeb conferencing as well.)

Most of my experience is with Microsoft Office Life Meeting, which I love. \nYour clients systems and needs will dictate the best product for them. If your clients are not already using Web conferencing, be proactive and take the idea \nto them before they come to you.

Web Inabled TV - Roku streaming wonder

(Kim Kamando) Roku has made the life of cable cord-cutters much easier. It's one of the most popular streaming boxes around! With more than 700 channels and tons of cool goodies, it's hard to deny its staying power.

This week, Roku released a new streaming box that raises the bar even higher. The Roku 3 has a gorgeous new look, a better remote and a faster processor. As if that wasn't enough, Angry Birds Space comes pre-loaded.

Priced at $100, it's a big shot to Apple's beloved Apple TV. How do these two stack up to each other?

 

 

Apple TV

Roku HD Roku 2 XD Roku 3 Roku LT Boxee TV Google TV
Price $100 $60 $80 $100 $50 $100 Varies by product
Resolution(max) 1080p 720p 1080p 1080p 720p 1080p 1080p
Video connections HDMI HDMI, Composite HDMI, Composite HDMI, Composite HDMI, Composite HDMI HDMI
Audio connections Optical HDMI, Composite HDMI, Composite HDMI, Composite HDMI, Composite HDMI HDMI, Optical
Other connections micro-USB microSD microSD microSD, USB No 2 USB Ports 2 USB Port
Wired networking Yes No No Yes No Yes Yes
Wireless networking 802.11n Wi-Fi b/g/n, Bluetooth Wi-Fi b/g/n, Bluetooth Wi-Fi b/g/n, Bluetooth Wi-Fi b/g/n 802.11n 802.11n
Remote Control Yes No No Yes No Yes Yes
Local Storage None microSD microSD microSD, USB port None 2 USB Ports 2 USB Ports
Paid movies & TV iTunes, Netflix, Hulu Plus, sports Netflix, Hulu Plus, Amazon Prime, sports, more Netflix, Hulu Plus, Amazon Prime, sports, more Netflix, Hulu Plus, Amazon Prime, sports, more Netflix, Hulu Plus, Amazon Prime, sports, more Netflix, Vudu, MLB.tv Netflix
Free movies & TV Youtube, Vimeo Crackle, Fox News, Huffington Post, more Crackle, Fox News, Huffington Post, more Crackle, Fox News, Huffington Post, more Crackle, Fox News, Huffington Post, more Broadcast, YouTube, Vimeo Youtube, Crackle
Music iTunes Pandora, SHOUTcast, Rdio, Soma FM, more Pandora, SHOUTcast, Rdio, Soma FM, more Pandora, SHOUTcast, Rdio, Soma FM, more Pandora, SHOUTcast, Rdio, Soma FM, more Pandora, Spotify Pandora, Rhapsody, Google Music
Other services Flickr 700+ channels including games 700+ channels including games 700+ channels including games 700+ channels including games HD antenna, Cloud DVR ($10 a month, unlimited storage) Chrome browser, Google Play, Voice Search, Social Media
Purchase Stream, Rent Stream, Rent, Own Stream, Rent, Own Stream, Rent, Own Stream, Rent, Own Stream, Rent Stream, Rent, Own

Website Benchmark - Show us yours and we will show ours

They say organic seo is dead. Our numbers say natural seo (search engine optimization) is very much alive. We have never used adwords, or ppc (pay per click).

Our website attracts visitors from our geographical marketing area who are interested in our products and services.

The Numbers in Yellow and Light Blue are important, because they list only human visitors. 

Are you getting this kind of internet activity directly to your website? If not, please contact us - we can help.

Website Success 6Cs : clear, concise, correct, consistent, complete, and clickability

There is only one "page one" on Google, Yahoo, and MSM and over 300 million websites vying for that coveted spot. Therefore, good design fundamentals and plain language are essential for website success.

Clear:

  • use active voice rather than passive voice
  • incorporate strong nouns, verbs, and modifiers

Concise:

  • use short simple sentences and short paragraphs
  • design the site to be read quickly by the reader (scanability)

Correct:

  • update pages as time goes by to reflect all changes.
  • review site for spelling, grammar, and HTML coding mistakes

Consistent:

  • use a single \"look\" and feel for every page in your Web site
  • ensure the reader can view the site no matter the operating system or browser used       

Complete:

  • ensure information is useful, current, readable, reliable, and helpful
  • make certain that no information has been omitted
  • research all the information that is included in the site to ensure accuracy
  • provide a content-rich web site, with appropriate keywords to draw readers and search engines to the site

"Clickability":

  • make the layout effective
  • confirm the links are up to date
  • make certain the information is found easily and is it accessible
  • connect pages along routes of use and user thinking
 

What Are Drop Ship Internet Resellers

Drop ship Reselling  is a supply chain management technique in which the retailer does not keep goods in stock. Rather than stock inventory, the reseller transfers relays the customer orders and shipment detail to the manufacturer or a wholesaler, who, in turn, ships the goods directly to the customer. As in retail businesses, the retailer make their profit on the difference between the wholesale and retail price.

Some drop shipping retailers may keep "display items" on display in stores in a “brick and mortar store, so that customers can inspect an item similar to those they can purchase. Other retailers may provide only a catalogue or website of their products.

Most drop ship resellers take measures to hide this fact and to keep the wholesale source from becoming widely known. This can be achieved by "blind shipping" (shipping merchandise without a return address), or "private label shipping" (having merchandise shipped from the wholesaler with a return address customized to the retailer). A customized packing slip may also be included by the wholesaler, indicating the retailer's company name, logo, and/or contact information.

Drop shipping can occur when a small retailer who typically sells in small quantities to the general public receives a single large order for a product. Rather than route the shipment through the retail store, the retailer may arrange for the goods to be shipped directly to the customer. Drop shipping is also very common with big ticket items like steel buildings where the retailer will take a deposit and have the building shipped direct to the buyer's building site from the supplier's manufacturing facility.

Online auctions sellers, such as eBay, also drop ship. Often, a seller will list an item as new and ship the item directly from the retailer or wholesaler to the highest bidder. The seller profits from the difference between the winning bid and the wholesale price, minus any selling and merchant fees from the auction site. Of course, most resellers have figured out how to pass those cost to the customer in something call “S&H” (shipping and handling fees).

Custom products: An emerging trend in the drop ship business is private label drop shipping, in which a manufacturer produces a custom item for a retailer and drop ships it. The range of private label drop shipped items varies from simple key chains and t-shirts with custom logos or pictures to customized formulations for vitamins and nutritional supplements.

Two significant benefits of drop shipping are the elimination of upfront inventory and a positive cash-flow cycle. A positive cash flow cycle occurs because the seller is paid when the purchase is made. The seller usually pays the wholesaler using a credit card or credit terms. Therefore, there is a period of time in which the seller has the customer's money, but has not yet paid the wholesaler.

Drop shipping also eliminates some duplication of effort, since only one warehouse will pick, pack and ship the product. This approach can reduce total inventory management and shipping costs. These cost reductions can subsequently reduce the price to the consumer.

Risks: As in any business, some risks are involved in drop shipping. For example, backordering may occur when a seller places a shipment request with a wholesaler, but the product is sold out. Backordering may be accompanied by a long wait for a shipment while the wholesaler waits for new products, which may reflect badly on the retailer. A good wholesaler will keep retailers updated, but it is the business owner's job to be aware of the quantities that the wholesaler has available.

Drop shipping has also featured prominently in some Internet-based home business scams. Scam artists will promote drop shipping as a lucrative "work from home opportunity." The victim who buys into this scam will be sold a list of businesses from which drop-shipment orders can be placed. These businesses may not be wholesalers, but other businesses or individuals acting as middlemen between retailers and wholesalers, with no product of their own to sell. These middlemen often charge prices that leave little profit margin for the victim, and require a regular fee for the retailer's usage of their services.

What Are Twitter Lists?

Twitter Lists are like “groups”. They offer a way for you to bunch together other users on Twitter into groups so that you can get an overview of what they’re up to. That’s because Lists aren’t just static listings of users, but rather curated Twitter streams of the latest tweets from a specified set of users.

In other words, you can create a list that groups together people for whatever reason (the members of your family, for example), and then you can get a snapshot of the things those users are saying by viewing that list’s page, which includes a complete tweet stream for everyone on the list. Lists allow you to organize the people you’re following into groups, and they even allow you to include people you’re not following.

What Is An Internet Affiliate Program

An affiliate program is a great way to make money on the Internet. Many internet retailers have programs where you can get a commission if you can get people to go to their web site and buy their products. After establishing an account with the retailer, you write an article/s about that product and promote the article so that people read it. In the article you have links to the retailers product that you have written about. When your reader clicks through your article to the retailers product, your account number is included in the link so that the retailer can identify you as the affiliate partner. If your reader buys that product, you get a commission on the sale.

The reason affiliate programs work so well is becuase you're not relying on a computer to match up ads to your content. You do it yourself. You know best what ads would work best on your content and which products and services to recommend. And when your readers see that you've taken the time to review a product or service, they're going to feel more comfortable buying that product.

How Do Affiliate Programs Pay?

Most programs have very specific rules about how they pay commissions, however, the most common ways are:

  • Pay per click - This is similar to most online advertising, and you get paid whenever someone clicks on the link, button, or image you placed on your site. Pay per click is usually fairly low paying, but you get something even if your reader doesn't make a purchase.
  • Pay per sale - Instead of paying you everytime someone clicks on a link from your site, this method of affiliate payment tracks what the customer does once they leave your site. You might be paid a percentage of any sales, or you might get paid every time someone moves deeper into the target site. This method, especially when you get a percentage of sales, can be very lucrative.

How much can you make on an affiliate program? That depends on the commission structure offered by the retailer, and your ability to get your readers to buy the retailers product/s.

What Is An Internet Domain Name (Stuff You Need To Know)

People like names; computers like numbers. Example, at work your name is “Joe” but your employee number may be 123. In this way accounting can calculate your payroll check by using a computer program and mail it to your address by equating your name with your employee number. In the internet world, people find the WebSite Active Technologies by using the Domain Name active-technologies.com. However, computers use an online system of Domain Name Servers (DNS) which equates active-technologies.com to it’s number or IP address, 74.54.176.82, thus getting you to the desired website.

People try to obtain Domain Names that represent what the Website does or that represents the Website owner. I chose activeblognews.com because it does both, it is the name of the publication AND it describes what the Website does. This not only makes a WebSite easy to find and remember, but it helps the WebSite get a better listing in search engines like Google, Yahoo, and Bing.

Today, with over 129 million active Domain Names (according to dailychange.com), it is extremely difficult to get a Domain Name that properly represents your website. This has spawned an entire industry that buys, sells, and auctions domain name leases, some at a modest cost, others with glitz and glamor names, for ginormous amounts. What’s in it for us? If you start a business today AND lease a Domain Name that has been in existence for 5 years, somehow the search engines give you credit for being in business for 5 years (the length of time the Domain Name has been around), and that adds to your Search Listing Credibility.

Domain names are obtained through a Domain Registrar. You might deal directly with the Registrar or you may purchase it from a Domain Reseller, ISP, Web Hosting Company, or other places, but ultimately, the Domain Names comes from a Registrar. The registrar sets the rules, conditions, and prices on domain name leases. They are also responsible of making certain that your new Domain Name and corresponding IP address is released to DNS servers around the world so that folks can see the WebSites using the Domain Name VS IP address.

DNS Servers are operated by ISPs (internet service providers), governments, businesses, and just about anybody that wants one (you could have your own if you want). It is the responsibility of the DNS Server owner or provider to make certain that they have the latest DNS information. Just last week, a major local ISP dropped a list of IP address from their DNS server. That meant that nobody on that ISP service could see those dropped Websites. The results was that my customer could not see her own WebSite on her work computer, but her neighbor next door could (and she could see it on her cell phone too) because they used different ISPs. The offending ISP was notified of the problem and the the issue was resolved within a few hours. It took time because DNS Servers usually update their records on a schedule, and the schedules vary between companies. My personal DNS Server updates every 30 minutes, whilst my ISP updates theirs once every 24 hours, at midnight. That is why changes can be made to a Domain Name, and some folks will see it right away, and others may not see it for 24 to 72 hours, the time it may take to propagate all of the DNS servers around the world.

Domain Names are leased, and not owned. When you resister a new domain name, you are buying the right to use the name for a specific period of time. The minimum lease is 1 year, maximum of 10 years. When a domain reaches the expiration date, the Domain Name can be renewed for 1 to 10 years at the current rate, or allowed to expire.

Domain Names as Trade Marks and Copyrights have different rules. In times past, when the internet was new, you could buy a Domain Name that may benefit a company and make tons of money by holding it for sale at a huge price. Soon, large corporations went to court claiming that they had the right to these names because they were identified with their “National Brand”. However, there is still a vibrant market for internet Domain Names that are kool and catchy.

Reclaiming Expired Domain Leases can get really tricky. The reason is that each Domain Registrar flies by their own rules. Some Registrars have varying “Grace Period” whereby you can renew the lease without penalty; others haven none. Some offer a “Redemptive Period” of varying lengths of time, where the domain name may be “Redeemed” for a fee. Still other Domain  Registrars may place the Doman Name open for general public consumption, place it in an auction, set a sale price an offer it for sale like a used car, keep the Domain Name for themselves, or retire the domain name so that it can never be used again (estimated 380 million retired Doman Names). In addition, rules can change.

Expiration Bots: These bots are internet scripts or programs that constantly ply the internet looking for domain names that are reaching their expiration date. As soon as the Domain Name expires, they attempt to lease them, keep them for a period of time, then offer them for sale at a premium price. Many of the companies that buy and sell Domain Names use such programs.

Therefore, renewing Domain Names before expiration is extremely important.

Domain Thieves are rampant and one that you should be aware of is a little form comes to your in the mail. The letterhead is impressive and the message looks very official. I can’t name any of the companies because I would be sued into oblivion, but the form reads “Domain Name Expiration Notice”. “As a courtesy to domain name holders, we are sending you this notification of the domain name registration this is due to expire in the next few months". Now we charge less than $20.00 per year for domains, but they will take your domain for only $35.00 per year. And you wouldn’t believe how may good people sign the form and enter their credit card information. Read Carefully OR you could loose your domain!

Domain Transfers are regulated by ICANN (Internet Corporation For Assigned Names and Numbers). There are lots of rules concerning Domain Name Transfers, but the main rule to be aware of is the “60 Day Rule”. This rule was put in place to keep folks from hijacking a desirable Domain Name. Basically what it says is that Domain Name Ownership cannot change in the first 60 days after the Domain Name is first created, and it cannot be changed in the first 60 days after ownership has changed. This rule, while cumbersome, has greatly reduced Domain Name Hijacking.

.com .net .org .edu .gov .mil: In times past, you could tell the type of WebSite by the designation at the end, .com = commercial site, .net= ISP, .org=non-profit, edu=education, .gov=government, .mil=military. Today, only government and military designations are protected. Anyone can get a .com .org .net. .mobi is another designation that is quickly gaining popularity for mobile computers and SmartPhones. And now that all the kool .com Domain Names are taken, others like .bus. .biz,  and .co are cropping up.

The US Truth in Domain Names Act of 2003, in combination with the PROTECT Act of 2003, forbids the use of a misleading domain name with the intention of attracting Internet users into visiting Internet pornography sites. Domain Name AntiCyberSquatting And Consumer Protection Act passed in 1999 aimed at preventing TypoSquatting and deceptive use of names and trademarks in domain names.

What Is An Internet Reseller Program

An internet reseller program works much the same as a physical brick and mortar retailer or reseller program. You buy products, usually from a distributor or manufacturer, at one price (typically wholesale price) and resell the product and a higher price (retail price).

In the physical marketing world, there is a plethora of examples surrounding the reselling of product. The field that it is most apparent in is the retail stores that sell products of many different companies. A supermarket, for example, purchases products from various manufacturers for a fraction of the actual price, while setting custom retail prices and profit margins from any product. By doing this, the supermarket becomes a mediator between the manufacturer and the customer, while making money for it. The manufacturer benefits, as he saves the need to deal with customers and operate a sales force. The customer saves the trouble of seeking out the manufacturer, while gaining availability and comfort. The advantage that the reseller gains is apparent – cash flow AND (hopefully) profit.

Think about your favorite breakfast cereal that is sold in your neighborhood supermarket – the store is not the manufacturer, clearly, and not even the importer. We can safely assume that you would not want to travel to the manufacturer warehouse to purchase the cereal, or to the farmer that grows the ingredients, and go through the processes of making your own cereal. It's much easier to peruse the cereal aisle at your local grocery store, pick up a box, and pay for it at the checkout. Thus, the supermarket is a reseller in a reseller program that is maintained by the manufacturer/s.

In many cases, the reseller programs have rooted themselves so deep, that the manufacturer no longer sells to customers – just try to purchase a Special K set directly from Kellogg’s and you will see what I mean.

Internet Reseller Program

The reseller program model plays well on the internet, with all the benefits intact. In the digital world, reselling takes less effort, as in most cases, no stock management is required – and selling online saves the cost of manpower and marketing fees AND buying or building a physical store.

If the product itself is digital - a program, a license or a service – additional costs are reduced as you can provide the product digitally and save the shipping and distribution costs.

Utility-wise, the online reseller programs are often conducted using one of the common tools the web offers – shopping carts and virtual stores. When a client places an online order, he rarely stops to think whether the products they buy are sold by the programmer or someone on his behalf. if the product and service is good, it doesn't matter. In addition, a reseller may provide terms and perks that the manufacturer can't or doesn't offer, I.E. lower price, extended service plans, peripheral products and more – to win the competition over the customer's interest.

The tools that are provided online allow you to engage in reselling simply and easily – often, the only action required is the opening of an account – so no intricate logistics are required. Additionally, current-day technology offers a great deal of flexibility, allowing the reseller to launch his own brand and offer products he did not make under his banner, logo and trade mark. It is a huge advantage when fighting for consumer attention, as every bit of additional customer interest might tip the scale in your favor, rather than the competition.

What Is The Best Connection VGA DVI DisplayPort or HDMI

HDMI vs. DisplayPort vs. DVI vs. VGA (Geoffrey Morrison @ CNET) With televisions, HDMI is the most common connector. But if you want to connect a computer to your TV (or you've got a new computer monitor), the options tend to be HDMI, DisplayPort, DVI, and sometimes old-school VGA.

Each connection has its pros and cons, and perhaps the best cable to use with your display is more than just "what it came with."

Here are the differences.

Before we start, it's important to note that with the exception of VGA, all the other connections here are digital. So while the pixel resolution potentials vary with each connection, the quality otherwise does not. As in, 1,920x1,080/60 over HDMI is going to look the same as 1,920x1,080/60 over DVI and DisplayPort (assuming all other settings are the same). The logical extension of this is that the cables themselves also don't make a difference, in terms of picture "quality." Any cable capable of a specific resolution is either going to work over a certain distance, or not work. Check out my article "All HDMI cables are the same" for why this is.

HDMI
All TVs and most computer monitors have HDMI. It's easy to use, the cables are cheap, and best of all, it carries audio. If you're plugging your computer into a TV, your first choice should be HDMI. It will save you lots of hassle.

HDMI has limitations, though, and isn't always the perfect choice. For example, your TV likely has HDMI 1.4 connections, which max out at 3,820x2,160-pixel resolution at 30 frames per second. If you've gotten a new 4K monitor, you're limited to 30fps. Not until HDMI 2.0 will you be able to do 4K over HDMI at 60fps. You'll also need new hardware (and probably a new TV).

So in most cases HDMI is fine, but for really high resolutions and frame rates, one of these other options might be better.

DisplayPort
DisplayPort is a computer connection format. There is only one television with DisplayPort, and don't expect it to see much further adoption on the TV side. It's capable of 3,840x2,160-pixel resolution at 60fps, if you have at least DisplayPort 1.2 and the Multi-Stream Transport feature. If you're looking to connect a computer to a monitor, there's no reason not to use DisplayPort. The cables are roughly the same price as HDMI.

DisplayPort can also carry audio.

DVI
The video signal over DVI is basically the same as HDMI. The maximum resolution potential depends on the equipment, though. Some cables and hardware (called single-link) can only do 1,920x1,200, while others (dual-link) can do more.

DVI generally doesn't do audio (it varies). So if you're using a TV, use HDMI. Since computer monitors don't usually have speakers, this isn't an issue.

VGA (aka PC-RGB, D-sub 15)
The old-school VGA connector is a cable of last resort. It's not too common anymore, and hardly ever found on TVs. A recent e-mail asked about it, so I'm including it.

Don't use VGA, not if you can help it. While it is capable of fairly high resolutions and frame rates, it's an analog signal. You're not likely to get a pixel-perfect image with today's LCD monitors (hence why you'd use DVI).

What about Thunderbolt?
The Intel/Apple love child of Thunderbolt is technically only available on one monitor (Apple Thunderbolt Display). There are likely to be more, but don't expect some sort of Thunderbolt revolution. The connection is compatible with Mini DisplayPort.

Converting
You can convert some of these cables into others. For example, DVI and HDMI are generally convertible using a simple adapter. Some DisplayPort connections will also work with DVI and HDMI with an adapter, but not all.

Native resolution
All modern televisions will convert the incoming signal to whatever their "native resolution" is. For most TVs, this is 1,920x1,080 pixels. So if you send a TV 1,280x720-pixel-resolution material, it will upconvert that to 1,920x1,080. TVs tend to be pretty good with this (though they won't accept every resolution; check your owner's manual for which ones). However, you're better off setting your computer's resolution to be the same as the TV's (presuming it doesn't set itself automatically, as it should). Matching resolutions mean pixel-for-pixel accuracy and no upconversion blurring or artifacts. This is especially true for computer monitors, which rarely have the quality converting processing that their TV cousins do. Send a computer monitor a non-native resolution, and it will work...but it's not going to look as good as it should.

Check out "What is upconverting?" for more info.

Bottom line
OK, so, generally, HDMI is fine. If you're using a really high-resolution monitor, go DisplayPort. Otherwise the options all start having serious drawbacks. If you're connecting a PC to a TV, check out this post on how to use your TV as a computer monitor for gaming, videos, and more.

Lastly, the one tricky factor in all this is that not all your equipment might support the native resolution you want to send. With TVs this isn't likely a problem as nearly all are 1,920x1,080, but with monitors and their more varied native resolutions, it's a little trickier. Check your owner's manual to verify what your monitor's native resolution is (always send the native res, when possible), and to make sure it's capable of accepting that resolution with the cable you want to use.

What Makes A Good Web Design

Whether you are just starting a web design project, looking at revamping an existing site, or just wanting to double check the usability of your current web site you should consider these 7 Basics of Good Web Design.

These basics are aimed at new visitors/customers; your repeat customers will be judging your web site on different values. Just like wearing the appropriate clothes for a job interview, these basics will help you pick out the \"look\" of your web site so that you make a good first impression.

1. Fast Loading Web Site - Any way you look at it, a fast loading page should be your number 1 concern. The web is all about speed, fast searches, fast purchases, fast information. You can't have any of that with a slow loading page. Ask yourself this question - have you ever been on Google doing a search for something important and a link you clicked on didn't open up immediately? What did you do? Patiently wait for the page to open or move onto the next link on the page? My favorite sites open almost immediately.

So, a few suggestions: Make sure that your images are properly optimized. Don't use very many large images, save those for a different page. Keep any auto-running multimedia to a minimum, provide links to run media instead. Check your code for anything else that could affect your page loading times. Since text loads almost instantly go ahead and use all the text you want, just keep everything else under control.

2. No Meaningless Splash Page - Do you appreciate a fancy animation page that doesn't tell you anything and you have to wait for before the web site will open? Neither do I. The last thing I want once I find an interesting site is to wait through some animation before getting to the first page. This doesn't mean that I don't want multimedia on a site, I do. I just don't want an animation before the first page that forces me to wait for it to finish before getting onto the site. It's like having to wait for a salesperson to finish their memorized speech before you can ask them a question. No thanks! I like animation, just in the right place and at the right time. Plus, if I am a returning customer, I will have already seen that animation and don't need to see it again.

My suggestion is to use a smaller animation contained in your main landing page which also includes your main message and links to the rest of your site. It will make for a faster loading page (smaller file) and your visitors can go ahead with accessing your site without having to wait for the animation to finish.

One final note, don't ever put your logo as the only content on your landing page with a link that says \"Enter Site\". This just screams Unprofessional and will drive away potential visitors in droves. The last thing I want to do is to click on another link just to get into the site. This is a total waste of my time. I usually will skip a site if I see this.

3. No Annoying Web Gimmicks - Now that you have your visitor on your site quickly the one thing you don't want to do is to drive them away just as quickly. So, don't put anything annoying on that first page. No loud background music that makes them quickly hit the volume control or the back button on their browser. No flashing animations while they are trying to read your content. No popup, flyout, expanding ads that cover your home page. Basically, leave the gimmicks alone until you are sure that your visitor will stay on your site. Most casual visitors will leave your site in just a few seconds, no sense on driving them away more quickly.

Multimedia is great on a web site, just don't bombard your visitor with it first thing. If you want audio, then put in a nice picture with a link, like a picture of yourself with text saying something like \"Let me tell you how to make fifty thousand this month!\" If they are interested, they will click on the link and listen to your message; if they are not interested in audio, then you should be using a different pitch anyway.

Also, monitor what advertisers are putting on your site if you sell ad space. I am sure you have seen those ads with the animated dancing figure, cute the first time you see it. But after seeing it 10,000 times with every imaginable character I have added the company to a líst I keep of companies I won't do business with. So their animation has gone from \"look at me\" to \"you annoy me\" in my mind. Ads like these will impact your visitor's experience. So even if your site is perfectly designed, one misplaced ad can ruin all of your hard work.

4. Have a Clear Message - Too many web sites are a mish-mash of content. This is especially true of blog pages. Certain types of sites lend themselves to stream of consciousness content, but most don't. Make it easy for your viewer to understand what your web site is about, don't make them guess. Have a clear topic headline, followed by clear and concise text. This is also where a picture is worth a thousand words, but only if the picture directly pertains to your message.

You want your visitor to quickly understand what your message is. If they like your message, they will take the time to read the rest of your page and look around your web site. If they don't like your page, then it won't do you any good having them stay on your site anyway. So, don't make your visitors guess, let them know what you are about quickly and cleanly and you will have happy visitors. And when thinking about a sales page, a happy customer is a buying customer.

5. Coordinated Design - This one should be self evident, but it is surprising how many sites change their design for every page. You want your visitor to be comfortable in your site and one way to achieve that is by having a coordinated web design. Having a consistent logo, using a consistent color scheme, keeping your navigation in the same place. All of these help to create a coordinated design. This does not mean that you can't change colors or the \"Look\" on different segments of your site, but if you do, the changes should not be so drastic that it feels like you have moved on to a different site.

If you select one place for your logo, one place for your navigation, one look for your buttons or other common graphic elements and stick with those then you will be well on your way to a coordinated design. If you change colors for a different section, but keep the same logo location, the same navigation location, the same button shape, then your visitors will not become lost as they move from page to page.

6. Easy Navigation - Once you have grabbed your visitors attention you want them to be able to easily move around the different areas of your web site. This is done with easy to use navigation. There are three standard, accepted locations for navigation elements on a web page: along the top, on the left side, and at the bottom. I will usually put my main navigation either along the top or along the left side. I will then put text based navigation at the bottom of the page, this text based navigation is more for the search engines than anything else, but it also makes it easy for your visitors to move to the next page when they have reached the bottom of the current page.

Most people start reading a page from the top left and then read towards the bottom right. So navigation at the left or top will be seen as soon as someone enters your page. Also navigation at the left or top will not move or change position if the browser window is adjusted in size. The worst thing you can do is to put your main navigation on the right side of the page and have your page set for a large screen size. Let's say that your page is set for 1024 across with the navigation on the right, and someone views your page at 800 across, they will not see your navigation at all. The left side of your page will show perfectly, but the right side will be hidden outside of their viewing area. Of course by using floating or popup menus you can overcome some of these design limitations and keep your navigation visible at all times.

Unless you know that your audience will enjoy it, don't use Mystery Navigation. This is where your navigation is hidden within images, or spaced around the web page in some mysterious random order. This can be fun on gaming sites, or social networking sites, but in most cases the navigation should be easy to see and easy to use. If you do want to use Mystery Navigation, I would recommend keeping the text based navigation at the bottom of the page, just in case.

7. Have a "Complete" web site - And finally, no one wants to go to a web site only to find that the site is \"Under Construction\" and the content they are looking for is not there. These are words that you shouldn't ever use. If a section of your web site is not ready for prime time yet, then simply don't show it yet. It is better to have your site look complete and professional, then to have it look like a work in progress that should not be up on the web yet.

You can easily tell your visitors that you will be having more content in the future without having your site look like it is unfinished. Just use phrases like \"Content Updated Weekly\" or \"New Products Added Monthly\". Both of these will tell your visitors that it would be worth their time to come back and visit later, but neither one will make your site look unfinished. So no matter how small your web site is, give the impression that you have taken the time to complete the site before putting it up on the internet, this makes for a more professional presentation and a better visitor experience.

In Closing - By following the simple Basics of Good Web Design you will be well on your way to having an easy to use and successful web presence. Just keep in mind what you look for when you first land on a web page after doing a web search in Google or Yahoo, or other search engine. If you want fast loading pages, make sure your pages load fast. If you want to be able to find what you are looking for quickly and easily, then make sure you have easy navigation. Just keep your first time visitor in mind, put yourself in their web shoes and make your web site an enjoyable place to visit and success should follow.

 

What To Do When The Power Shuts Down

Uninterruptable Power Supplies (Battery backups) are an added expense, and they are only needed when the power goes out. But what if the power goes out when you need your network the most?

Most small business server rooms have at least one UPS (Uninterruptable Power Supply). Of course the intent of a UPS is to provide power to the servers, switches and internet connections in case of a power failure. The UPS also helps to regulate power and keep it clean from surges, spike, sags and brownouts. The more servers and network equipment you have, the more UPS units you will probably find in the server room.

We find that in most small business with only one or two servers, the UPS usually provides just a few moments of battery power to allow you to shut down the servers gracefully when the power fails. Some UPS units can be programmed to automatically shut equipment down in case of an extended outage or incase the power goes off at night. Without spending an arm and a leg and with careful calculations, you can purchase enough UPS juice to power your server room for several hours.

If you really need it and can afford it, you can buy UPS units for larger server rooms that will power your equipment for several or eight hours. Most UPS batteries have to be replaced every few years so be sure to budget for that. If your servers are really mission-critical, you can invest in a diesel generator. Of course companies like Ford, Nissan, and Allison Transmission have that kind of power, and it is a major investment and expense.

However, one smaller company I worked with had sub-offices/plants in two different states that depended on a data system in Charleston. A $15000 investment was paid for that first time the power went down during a spring thunderstorm. Power in Charleston was down for seven hours but the other two plants never lost a beat. This company had five small servers. With one or two servers the cost would be under $7000.

Educate management on UPS expectations

When I joined this company, I happened to come on board at a time when there was some construction going on down the street. One of our neighbors required more power than the city could provide so they were adding additional capacity in the underground conduits. It seems like we were experiencing power outages every few days. Most would last only a few moments so the servers never shut down.

One day, the power went out unexpectedly. The outage lasted longer than our batteries could provide the needed power for the servers and they began to shut down. Our phone system is located in the server room and is also plugged into the UPS units. When the batteries were exhausted, we lost our phone service too. Then I had to explain to the President of the company why phone system stopped working.

I tried to explain that the batteries had run down but he acted like that was the first time he had heard that such a thing could happen. “You mean they aren’t supposed to last for more than an hour?” I replied in the affirmative and watched his face turn red. We’ve got to do something to get the phones back online now! "I told him I had nothing to offer and reminded him of my proposal for a larger UPS.

Summary and conclusion

Did the boss agree to spring for the UPS after this little episode? Yes! and boy was I on the hook! Every meeting for several weeks he brought up the expense of the UPS until that one thunderstorm hit that took the power out for the entire day. Keeping those other two plants up and keeping the phone system running during that one outage paid for the new UPS. Now the UPS has been written into the company sales script, talking about our modern network system with eight hours of redundant reserve power translating into no missed shipments or phone calls due to Charleston thunderstorms.

If you require additional information or assistance with this item, please give us a call.

What to do before recycling or discarding your computer

(Mark Huffman @ ConsumerAffairs) Simply deleting files isn't enough.... Even though consumers are using their smartphones instead of PCs more and more, nearly everyone has a computer or two around the house, taking up space. And because so much is being done on phones and tablets, computers might not be needed any longer.

Maybe you've thought about selling an unwanted device on Craigslist or taking it to an electronics recycler. Before you do, there are some steps you need to take to make sure that you have left no traces of sensitive personal information behind.

As you may have heard during the recent presidential campaign, simply deleting files isn't enough. All you're doing is deleting the way your device can quickly and easily find the information. The information is still there on your hard drive.

Reformatting the computer's hard drive may help a lot, and unless you have sensitive banking and other financial information on the drive, that might be enough. But even with reformatting, someone who knows that they are doing can probably retrieve some data. Some experts suggest using special software that overwrites your data so that it can't be read.

Windows wiping tool

PC World reports that, beginning with Windows 8, Microsoft added a feature to the operating system that makes wiping deleted files easier than it used to be. You simply use the “reset your PC” command, then choose the “fully clean the drive” option.

As you can see, it's hard to be sure you've completely wiped your hard drive. So, why not just discard your old machines? Sorry, that's not a good option either.

For starters, you could run afoul of the law. According to Earth911, many state laws are stricter than federal statutes when it comes to how you can get ride of an old computer. These devices contain all sorts of materials that are hazardous to the environment if they aren't discarded properly.

Your best bet may be a certified computer recycling center, which will take extensive steps to remove data before reusing the machine's components in other devices.

What's The Bing Thing?

Chances are that you've already heard of and even visited Bing, Microsoft's new search offering launched earlier in June, replacing the Live search of yesterday. It's new, shiny, and has pretty pictures, but does it really have much effect on the market?

There have been those headlines claiming it's "taken a bite out of Google," but, looking at the statistics, it hasn't really affected the search industry at all.

It's been going around the web that Bing has won a glorious one percent of Google's market share-- that's what the headlines say, anyway. Taking a closer look, though, we see it's not really that exciting and that it's probably too early to tell one way or the other, anyway.

Though Bing did gain market share in the past month, and Google's market share did decrease, headline-happy journalists are blowing things a bit out of proportion. \"Bite\" is hardly the word to use, and "nibble" is also probably incorrect as well. According to StatCounter, since the introduction of Bing, Microsoft's share in US searches grew by .42 percent (sorry, rest-of-the-world-- you're again being represented by one country's statistics). According to the same statistics, Google's share dropped by only .24 percent during the same time span.

That's hardly detrimental to Google, and is actually normal and most likely has little to do with Bing. Like stocks, companies' shares in just about everything often go up and down in increments from period to period without any alarm, especially companies with as many customers as Google has. Stepping back and looking at the bigger picture, Google's shares in March dropped to 76.49 percent and then climbed back up to 79.08 percent in April-- a bigger difference than this past month.

All in all, the difference in percentages means very little in such a short amount of time. I'm no analyst except for my own personal speculations, but I think it's safe to say that Bing should get six months of being out in the wild before we begin to say it's cannibalizing other search engines.

When does cell phone dependence become addiction?

Photo

© imtmphoto - Fotolia.com

(Mark Huffman @ ConsumerAffairs) Addiction is when something you enjoy – like eating chocolate, for example – becomes an obsession. You indulge so much that it begins to have a negative impact on your life.

That's why it's so easy for many people to become addicted to drugs. The euphoria of the first experience takes over and the user stays high so much they can't function in their everyday life.

So it's probably wise to pay attention when psychologists start talking about cell phone addiction, and they're beginning to talk about it more and more. In America, there are more cell phones than people.

Previous study

A Baylor University marketing professor, James Roberts, sounded the alarm 2 years ago, warning that on college campuses at least, smartphones have evolved from a consumer tool to status symbol.

At the time, Roberts suggested that the need to constantly text and respond to texts is driven by materialism and impulsiveness, much like the pathologies that lead to compulsive buying and running up credit card bills.

So Roberts decided to look into the issue more deeply. In a study published in the Journal of Behavioral Addictions, he said he found that female college students spend, on average 10 hours a day using their phones in one way or another. Men, he found, use their phones for about 8 hours a day.

“That’s astounding,” Roberts said. “As cellphone functions increase, addictions to this seemingly indispensable piece of technology become an increasingly realistic possibility.”

Not in denial

Just as astounding, most college students are not in denial about their dependence. The study found that 60% admitted that they could suffer from a form of addiction.

The cell phone activities that produced the most addiction associations were checking Pinterest and Instagram. Other activities that might be thought of as linked to addiction – web surfing and playing games – were not.

Even though the latest smartphones come laden with new features and apps, the most common activity remains texting – something cellphone users have been doing since the flip phone. The average respondent estimated about 90 minutes of texting activity each day.

While men tended to rely on smartphones for more utilitarian purposes, women used them most to stay connected with friends. Men also turn to their devices for entertainment purposes, or as one participant put it, “for wasting time.”

Who talks anymore?

Cellphones now are more like small computers you can carry in your pocket, rather than a telephone. People still use them for voice communication, but it's becoming so uncommon that almost all cellular providers now offer unlimited calling as part of their packages.

With a smartphone, you can not only communicate instantly with a friend half a world away, you can check who is saying what on social media, listen to music or watch a movie. These are amazing devices, full of endless possibilities. No wonder people spend so much time using them.

Causing conflict

But does that make them addictive? In an educational setting, Roberts believes they can be. He says excessive or obsessive cellphone use can cause conflict inside and outside the classroom: with professors, employers and families.

“Some people use a cellphone to dodge an awkward situation. They may pretend to take a call, send a text or check their phones,” Roberts said.

The test of addiction, he says, is if cellphone activities move from being a helpful tool to one that undermines the users well-being and that of others.

Psychologists have also begun to worry about the possibility of cell phone addiction. ReStart is an Internet addiction recovery program in Washington State. It provides help to consumers who feel their dependence on technology has made their lives worse.

It starts, however, with recognizing smartphone use has become a problem. If you panic when you can't find your phone, using it during social/family events, take it with your everywhere and wake up in the morning looking for it, ReStart says you may have a problem.

Where Did My Ram Go

Problem: “I bought a computer with 4 gigs of ram memory. However, Windows only shows 3 gigs. Where is the other gig of ram?”

There could be several reasons for this:

  1. Some computer motherboards have a bios chip that will only allow the system to recognize a certain amount of ram. We saw a system two weeks ago with 2 gigs of ram installed, but the bios would only recognize 512 megs per bank for a total of 1 gig. This limitation was created by the manufacturer as a 32 bit Pentium processor can recognize 4 gigs of ram.
  2.  
  3. In another case, just last week, a new computer showed 3 gigs of ram in use whilst the system bios correctly showed 4 gigs installed. This system, like many built today, uses something called “memory mapped IO reservations,“ which means some of the memory is reserved for use by system hardware, caching, or dynamic video memory. If, for instance, you have 4 gigs of ram but Windows reports 3.5 gigs of ram, .5 gigs or 512 megs is being used or reserved for computer hardware use and cannot be accessed by Windows.

A Pentium 4, is a 32 bit processor with 32-bit register has memory 232 addresses, or 4 GBs of RAM, could be referenced.

A Dual Core is a 64 bit processor effectively increases the memory ceiling to 264 addresses, equivalent to approximately 17.2 billion gigabytes, 16.8 million terabytes, or 16 exabytes of RAM.

However, there are several issues with 64 bit computers:

  1. Most 64 bit computers have artificial memory limits between 2 and 8 gigs
  2.  
  3. 64 bit Vista is buggy and more expensive
  4.  
  5. You must use 64 bit versions of your favorite software – expensive and buggy.

If you feel the need to have 4 gigs of ram, make certain your hardware will supporting before turning loose of the coins.

For a full explanation, please try the following links:

http://blogs.msdn.com/hiltonl/archive/2007/04/13/the-3gb-not-4gb-ram-problem.aspx

http://en.wikipedia.org/wiki/64-bit

Who pays Power surge Destroys Computer table cellphone appliances

Photo(Mark Huffman @ ConsumerAffairs) March 19, 2014 was a quiet, ordinary day on Vickie's street in Michigan Center, Mich. Then suddenly the lights began to flicker.

The walls started popping, my kitchen filled with smoke due to the stove being hit, and my furnace was hit,” Vickie writes in a ConsumerAffairs post.

Vickie and her neighbors called the fire and police departments. Consumers Energy, the local utility, sent trucks to the scene. The problem was traced to a power surge that caused damage to appliances in Vickie's house, as well asappliances in the homes a few of her neighbors.

“I called the furnace repair company the next day and the cost was $404.00 to replace the transformer in my furnace,” Vickie writes. “It ruined my stove, at a cost of $550. My neighbor lost his TV, stereo, microwave, amplifier. Not sure what the other neighbors lost.”

Damage claim denied

Vickie filed a claim with Consumers Energy, assuming it was responsible for the problem and should pay for her damage. But she says she received a letter from the company, telling her the claim was denied.

“They are stating they are not at fault,” she writes. “How can they get away with this?”

Terry DeDoes, a spokesman for Consumers Energy, was familiar with the incident when we contacted him. He told us a tree fell on power lines, causing an outage that produced a power surge before the lights went out.

“We do not discuss damage claims activity on an individual’s account due to customer privacy issues, but in general terms damage claims are typically denied unless there was negligence on the part of Consumers Energy,” DeDoes said.

Photo

Avoiding future damage

While Vickie and the power company may disagree over who is at fault here, the fact remains that Vickie and her neighbors suffered some real damage from the incident. What recourse do they have and how can they prevent similar power surges from causing damage in the future?

To compensate for their current damage, DeDoes says customers are encouraged to contact their home insurance provider for damages that are not the result of negligence on the part of Consumers Energy. Beyond that, he says the company encourages all customers to have surge protection for their homes.

Standard homeowners insurance policies typically do not cover damage to appliances from a power surge, though such coverage is available as an option. Renters insurance policies usually don't provide this kind of coverage, meaning tenants must get compensation from their landlord.

Power surge suppressors

Nationwide Insurance offers coverage against equipment breakdowns due to power surges as part of its business insurance policies. It also suggests installing a surge protector is a prudent defensive measure.

A good point-of-use surge protector many consumers use to power their PCs and other electronic equipment are inexpensive, usually costing between $10 and $20. But these devices have their limitations and tend to lose their effectiveness over time.

An alternative is a whole-house surge suppressor installed at the main service panel. Service panel surge suppressors are designed to deal with large power surges as they enter the property, reducing the impact on equipment down the line.

These suppressors are more expensive – as much as $700 – and must be installed by a licensed electrician and inspected from time to time.

 

Why Buy New Hardware During A Recession'

I Know, many organizations curtail all possible spending in a recession. Budgets are cut, staffs are reduced, and new hardware purchases are often eliminated. During difficult economic periods, cost-cutting measures are prudent, even necessary for companies struggling to survive. But suspending hardware investments can prove shortsighted. Eliminating system replacements and PC upgrades may well worsen an organization predicament. Here are 8 reasons why new hardware purchases should be considered during a recession.

1. Equipment Still Wears Out: As bad as an economic recession becomes, one fact doesn't change. Power supplies, hard disks, motherboards, displays, and other components still fail. The laws of physics don't rest just because the economy is in turmoil. Electrical surges still occur, mechanical failures continue, and planned obsolescence keeps marching along. Simply put, PCs, servers, network components, and other business-critical items will fail, even in a recession. This equipment must be replaced.

2. Productivity Is Paramount: When PCs, displays, or network switches fail, it may be tempting to visit an old parts closet to dig out replacements. Old, entry-level Celeron- or Pentium-powered PCs with 256MB of RAM and rattling power supplie won't help managers (now often responsible for production tasks, too, due to departmental layoffs) efficiently complete expanded task lists. Nor will such machines enable overworked colleagues to run QuickBooks, CRM applications, or proprietary programs smoothly. Nor will a 15" CRT enable productivity gains when replacing a 22 widescreen monitor used to display customer information alongside order entry software.

The same is true for network equipment. Outdated hubs and routers were decommissioned for a reason. They were either too slow, failed to operate properly, or didn't meet the organizations needs. They certainly won’t improve productivity now, when staff sizes are smaller, remaining employees must absorb the workload of laid-of staff, and stress levels climb ever higher. The subsequent delays and inefficiencies translate to lost opportunities poor customer experiences, and less revenue.

3. Downtime Is Expensive: Older equipment fails more often. Outages and downtime are even more acutely felt during tough economic downturns, when fewer staff are available to diagnose the failure, identify appropriate fixes, obtain replacement parts, replace the failed component, and then test the repair.

Meanwhile, other employees facing more burdensome task lists are dead in the water. Their productivity drops to zero. Depending upon the situation, a single failure can prevent employees from accessing CRM systems, entering sales, billing clients, printing invoices, answering customer inquiries, processing claims, dispatching service personnel, and otherwise fulfilling critical operations. Sales plunge, revenue is lost, and an organizations financial standing declines.

4. Equipment Vendors Offer Discounts: Just like everyone else, computer manufacturers are facing hard times. Fourth quarter U.S. sales were off 3.5 percent. A January 2009 Time magazine article questioned whether the PC market will ever completely recover.

Manufacturers are scrambling to develop intriguing new product lines (witness netbooks) and improved, more cost-efficient distribution (including via layoffs and new strategic partnerships). In the interim, deals are available or the taking. Organizations shouldn't feel obligated to pay a posted online price (even if already discounted) for a new PC or pay the first price presented for a new bank of rack servers. Due to current economic conditions, sales representatives are more likely than ever to rework pricing for corporations needing new equipment.

5. Running Older Hardware Longer Costs More: Trying to squeeze a few extra years out of PCs or servers actually ends up costing organizations more in the long run than does replacing old equipment. According to Info-Tech Research Group lead analyst Darin Stahl, “When you look at costs -- particularly around a four- to six-year life cycle -- it may seem like you are saving money, but really it’s costing you, because you are going to increase your support costs".

Yankee Group Research Inc. research fellow Laura DiDio concurs. “One of the classic mistakes is [being] penny-wise and pound foolish. Some companies are not prescient enough to say, it's better keep good records and do regular inventories and asset management to see which servers, of which groups of power users, might need to be upgraded or refreshed sooner than others."

In a January 2008 Channel Pro magazine article, in which organizations are encouraged to replace 25 percent of their systems every year, author Carolyn Heinze added, “In the long run, these older systems wind up costing more in lost efficiencies, compatibility issues, service and maintenance, and downtime
6. Interrupting A Purchase Cycle Is Expensive: By replacing a quarter of an organizations PCs every year, for example, companies ensure critical employees receive new, faster, more reliable equipment annually. Then, the critical employees systems can be handed down to the next tier of operations staff. In short, using this method, every employee receives a hardware "upgrade every year, and no system is ever more than four years old.

Interrupting such purchase cycles is expensive, and not only due to the lost efficiencies, compatibility issues, and downtime costs. If an organization waits longer to replace the majority of its users systems, out-of-pockets costs spike (instead of remaining steady). Pay now or pay more later. That's the moral of this entry.

7. Newer Versions Of Software Demand Greater Resources: Many new technologies -- everything from new versions of accounting and bookkeeping software to CRM tools and new server platforms, such as Windows Small Business Server 2008 -- have greater hardware requirements than the older platforms they replace. Windows Small Business Server 2008 won't even run on 32-bit servers; the popular small business server OS now requires 64-bit hardware.

Organizations are being forced to upgrade system hardware, as programs become increasingly sophisticated and as Microsofts desktop operating systems demand more computing power. Windows XP, for example, required only a Pentium 233-MHz CPU, 64MB of RAM, and 1.5GB of hard disk space, whereas Windows 7Busines hardware requirements call for a 1-GHz CPU, 1GB of RAM, and 128MB video RAM, along with 15GB of free disk space. Companies that choose to suspend hardware investments subsequently automatically forfeit the time-saving, cost-reducing advantages many new software applications deliver.

8. Employee Retention: Good employees are as valuable as ever. Even though the pool of potential replacement hires grows with the unemployment rate, the cost of locating and training new staff remains significant.
When a good employee leaves an organization, his or her department often experiences a slowdown while a suitable replacement is recruited and trained. Worse, vast institutional knowledge can be lost when the veteran employee leaves, never to be replaced.

Fortunately, hardware investments are among the elements that can improve job satisfaction. Rewarding valuable employees with new (faster, more reliable, more modern, sleeker) equipment can go far in reducing frustration, while also confirming an employees value and contributions. Awarding new PCs to key workers critical to ongoing operations is a simple step. Best of all, productivity gains usually result, as well.

Why StrategyB4Tactics? Small Business Marketing! by Alan Adler

Most small business marketing (as well as mid-sized business) efforts seem to be floundering in today’s post recession market. Many are barely hanging on—just making it week-to-week, while others are doing remarkably well; considering the chaotic economy and changing market trends.

I’ve interviewed hundreds of decision makers, representing B2B, B2C and not-for-profit companies. While many issues were raised, the primary difference I discovered between struggling organizations and those thriving has to do with the existence and use of strategic plans to help guide their way. In virtually every instance, organizations making the Forbes “list of 100 Most Admired U.S. Companies” and Fortune Magazine’s annual list of “Best Places to Work,” put a high priority on creating and using strategic plans. For the most part, organizations with poor performance are scrambling, implementing and trying to manage tactics with no strategic plan. This is an example of what I would call “ready-fire-aim.”

“If you have no strategy, how do you know what tactics to employ?” asks Walter Wise, a Business Success Architect at BPI Strategy Group in Boston. He suggests that “without a plan, the outcome of failure is predictable. Many companies fail to plan properly, but none ever plan to fail.” Others agree, like Peter Ross, Senior Consultant at Capgemini in Charlotte, NC, who says “objectives and strategy are essential before implementing tactics. Determining the strategies will help achieve the objectives – break down the strategies into actionable steps (tactics) that will get you there. This approach allows you to assign “owners”, track progress, and measure success – all while helping to make certain tactics remain in support of objectives and strategies.” Janine Soika, MBA – Channel Marketing Executive in the Greater Denver Area, sees this more of a balance issue. She says, “Clearly you must know where you want to go, otherwise how will you know when you have arrived? But should you plan your trip in 2 weeks or 10 weeks? I opt for action, so chart your course, pick the best way to get there and go! Define your strategy, establish benchmarks, measure your progress and make course corrections as needed. Take action! In today’s market you need to be nimble and quick.”

I recall hearing one of my business professors, in grad school, pounding it into our heads that, “you can’t manage what you can’t measure.” However, when you can measure the level of effectiveness, it is easier to see what is working and what’s not.  My friend and colleague, Paul Davis of NextStep Marketing, Charlotte, NC, says, “Strategy without tactics is the slowest route to victory.

We know how difficult it is when you spend all your time working “in” your business and don’t take the time to work “on” your business. You must expect that your company will react accordingly. Bottom line… no increase in value. There are many ways to get off the crisis management treadmill. If your organization doesn’t have the time or intellectual capital to create a strategic plan from within, then you should consider a strategic planning consultant. This will bring “fresh eyes” to your organization.  A consultant will ask the questions that need to be asked and deliver a plan that’s been created in collaboration with the owner and organization.

Physician and Corporate Wellness Director Chris Hawley from Modesto, CA says that “Investing the time to create strategies before jumping to tactics insures a quality heartbeat for the business. It also helps owner/managers enjoy the journey, working smarter not harder.”  Sr. Business Development Professional Chris Craven of Charlotte, NC takes a stronger position, “Without strategic plans you are doomed to fail,” he says.

Finally, Michael Oddi, Chief Marketing Officer at KSL Media in LA, advised that we consider the perspective presented by Seth Godin in his book, Poke the Box, “Sometimes companies suffer from planning overload and never implement their strategy. The most successful companies are driven by individuals who aren’t afraid to push the go button.”

Why You Should Blog - The rest of the story...

Several have asked, “since you did all of that bragging about blog numbers at the first of the year, why didn’t you post ALL of the interim numbers?”

Short answer, Big results achieved by revolutionary change is Big News!

Incremental increase over time, not so big. However, the numbers show that we are still growing at a nice steady pace. This is why we do it!!!

September 2012 Numbers

February 2012 Numbers

 

Read More - Click Here!

Why Your Business Needs a Website

Websites work. No matter what your business or profession, a website can generate business, promote goodwill among customers and prospects, and deliver strong marketing messages - whether your business is small, large or in-between, well-established or brand-new.

People use the Web in greater and greater numbers, more and more every day. Even if you are a completely local small business, service, contractor or consultant, odds are people have used search engines to look for your web site - and if you don't have a web site... well, you get the picture?.

Your business Web page delivers that picture to your customers and prospects, and does it 24/7/365.

Perhaps the most common misconception about business websites is that they must offer products for purchase, accept credit cards and process financial transactions, and so on. Nothing could be farther from the truth.

While ecommerce websites are increasingly popular, the vast majority of business websites are still for information and communication rather than purchase-oriented. If your business offers products and services appropriate for retail sale over the Internet, then by all means you should consider an ecommerce website. And if not, a website with product listings and directions to your store can get them "in the door".

The first thing you will need is a Web hosting service - that's the address of your business Web page, and the company that actually stores your business's website on its computers and makes it available to Web users. Many Web hosting companies offer both domain and hosting services. Here are some things to consider as you build a website for your business:

Choosing a Domain Name

Ideally the address of your website will match the name of your business, such as ABC.com; in reality, many addresses are already taken. If that's the case for you, give some thought to an original Web page address/name that reflects your business: ABCmytownname.com, perhaps, or something similar. Remember: your Web page address should deliver your business's name as closely as possible, as well as being memorable and distinctive. Your website's address is a marketing tool too.

Hiring a Web Hosting Service

Look for a Web hosting service that's well-established and has a reputable history. Also, don't forget the future - you will find that your business Web site can easily be expanded and updated to match future needs. Make sure your Web hosting service can accommodate changes and additions, quickly and economically.

Finally, choosing a full-featured service is smart. Does the Web hosting company also offer website creation and website software? What other features, services and products are available or included?

Creating a Website Design

Creating a website yourself is inexpensive. However, websites created with "website creation software or builders" does not have the ability to optimize the website to attract search engines. And without that, it may be very difficult to find your website.

Custom website design is not that expensive. If done right, they can quickly provide a measurable return on investment.

So let's get started....

'Summerville Economy Earth Moving Events

In the last 2 years we learned that "shovel ready" doesn't mean squat. But "earth moving" is a different matter, and there are several projects that affect the Summerville economy where earth is moving, tractors are rolling, pipe is going in the ground, you can hear it and you can see it for yourself. Here are 10 project you should know about:

#1. In June of 2009, the Rockefeller Group began construction of a 2.7 million square foot foreign trade terminal at their 400 acres tract on the north side of I-26, east of the Jedburg exit. Drop-off Road has been repaved (DONE) and extended down to the property, dozers are moving dirt, and you can see pipes sticking out of the ground. The plan includes improvements to the Jedburg exit on I-26 and a new on-ramp where Sheep Island road crosses I-26 (Maple Street may extend to meet up with Sheep Island). A new road is planned that will skirt the north end of the Rockefeller property and the Hillwood property (Ross Perot Jr.) formally owned by Balcolm Nursery. The new road will extend from the new Sheep Island Parkway to Jedburg road. What is real is the dirt flying on the Rockefeller property. Don't take my word for it - Go see for yourself:
http://www.rockgroupdevelopment.com/sc/charleston_ftz.html

#2. Project Neptune, now identified as TBC Corporation, the owner of Tire Kingdom, has been moving dirt since January 2010 at a 1.1 million square foot facility on Drop-Off road in Jedburg.  The project is scheduled to finish by 4th quarter 2010 and will initially employ over 100 people. In addition, TBC will move tens of thousands of containers through the Charleston Port each year, which will equate to additional jobs for dock workers, truckers, ect.
Read about it at: http://www.live5news.com/global/story.asp?s=11300707

Incidentally, the southern I-26 frontage road, known as Red Bay Road, has been paved to expose new property for commercial development.

#3. 17a at Hwy 61 has been changed and rearranged to accommodate a new Mead Westvaco subdivision and Industrial Park. No dirt is flying at the Industrial Park but the road has been changed and we have a new stop light to deal with at 61 and 17a. In addition, trees are being cut and pipes laid in the ground for lane expansion of 17a up to the new Hwy 61 stop light.

#4. Have you heard of Bridlewood Farms, a 300 home subdivision off of hwy 27 in Ridgeville? 30+ homes have either been moved into, completed or are out of the ground. I'm happy about this because most folks think the earth ends at Old Orangeburg Road. Now the "end of the earth" will be hwy 27 in Ridgeville. In preparation for this expansion, The Summerville Chamber has created a new "nightsville Council" that met for the first time at "The Ponds" YMCA near where Central, 17a and Dorchester road come together. The new council has not formally decided what areas they will serve, but they did invite folks from Knightsville, Jedburg, Slandsville (areas south and west of Knightsville), and Ridgeville. Also, the Chamber of Commerce "Business After Hours" was held at Knights Redimix on Hodges Road, Jedburg.

#5. Boeing is moving dirt, backhoes are digging footers, and sewer and plumbing pipe is in the ground.# In addition, I-26 is widening, surface streets are changing. Yes Boeing is real and in-progress. Trident Tech is already offering courses that targets future positions at Boeing. What hasn't been in the press is the fact that Boeing will bring other business that will supply them with parts and technical services. Yes Boeing is Real and will bring high-paying jobs to the Tri-County area.

See Article Boeing To Bring 12K Jobs To SC
http://www.wyff4.com/news/21452616/detail.html

#6. State Ports Authority is dredging along the southeast end of the Former Naval Base in preparations for a new terminal. There are still many issues but the project appears to be moving forward.  According to Jim Newsome, SCSPA president & CEO. “Charleston has the deepest channels on the South Atlantic. Charleston can handle 90% of the world's existing and on-order container ships up to 9,000 TEUs. Even before the Panama Canal expansion is completed in 2014, I believe this port will see post-Panamax ships with more regularity and frequency. This is a competitive advantage for our customers.” Why Friday 2/26/2010, the first of these behemoth ships entered the Charleston Harbor with a length of over 1000 feet and a drawing over 45 feet. After the Canal expansion is complete, Charleston port traffic may increase as much as 38%, driving new jobs, businesses, and growth.
http://lac.sc.gov/NR/rdonlyres/0690E6FF-6D61-43E0-9755-2CAA3E911862/0/SPA_Summary.pdf

#7. Maersk Line, the world's largest ocean carrier, has signed a new, five-year agreement with the Port of Charleston. South Carolina State Ports Authority (SCSPA) President & CEO Jim Newsome announced during his first State-of-the-Port Address to the local maritime community. As you probably remember, just two years ago, Maersk said they were pulling out of Charleston. Evidently, conditions have changed and now Maersk is planning to expand it presents in Charleston, resulting in more jobs.
http://www.crda.org/news/local_news/maersk_line_commits_to_port_of_charleston-1258

#8.  Carnival Cruise has 67 port calls scheduled for Charleston SC Union Pier. The Carnival Fantasy is capable of carrying 2067 passengers. That's more than 2000 tourists per week! Many of these passengers will no doubt visit attractions in the area, stay at local motels, and eat in our restaurants.  In addition, Charleston is building a new cruise terminal at the Charleston Maritime center that may lure other cruise line opportunities.
See “South Carolina Ports Authority to unveil concept for new passenger cruise terminal”
http://blog.taragana.com/business/2010/02/09/south-carolina-ports-authority-to-unveil-concept-for-new-passenger-cruise-terminal-29456/

#9. Clemson announced a new $98M wind turbine test facility to be built in North Charleston. Pier Zulu is being cleared and modified to accommodate the project. The Restoration Institute and its partners have received a $45 million grant from the U.S. Department of Energy, which they will combine with $53 million in matching funding, to build and operate a large-scale wind turbine drivetrain testing facility at the institute's research campus on the former Navy base. The Department of Energy estimates that South Carolina could gain 10,000 to 20,000 new jobs related to the wind power industry during the next 20 years.

#10. Canadian apparel importer Gildan Activewear, which recently paid $20 million for the former Mikasa property on Clements Ferry Road, said it is shutting warehouses in Alabama and Virginia and consolidating their operations at its newly acquired Charleston distribution center.

The 580,000-square-foot structure, not including upper-level mezzanines and office space, will be used at first to handle imported socks and underwear for delivery to mass merchandisers and other retailers.

Director of communications Genevieve Gosslin says "Right now, our retail operations are fragmented… so we want to bring everything back together and generate cost reductions but also efficiencies by bringing everyone under one building." Gosslin also said the warehouse gives Gildan ample room to expand.

Conclusion: So there are come glimmers of hope for the Summerville area. The best news for me is that the new city map of Summerville included a Crack Barrel Restaurant where the old Quincy's used to be near I-26 and Main Street. In fact, when I drove by yesterday, a big backhoe was tearing down the old building. Anita and I Love Cracker Barrels. Not all of the projects mentioned are on Summerville soil, but it will certainly impact our economy in a positive way, and it's good to feel the economic earth moving under our feet.

Why eBay Keeps Getting Shoppers by Chris Crum'

You can hardly talk about eBay without bringing out the disgust in all of the people who feel they have been wronged by the eCommerce giant. This group is comprised mostly of sellers who feel eBay has treated them with anything but respect, particularly since changing feedback policies in early 2008 (of course that's not the only thing they don't like. See my top ten list of seller frustrations).

Although buyers have had their own fair share of complaints about eBay as well, it still continues to be one of the leading places that online shoppers go to purchase goods, although retail comparison site JiffyPrice recently showed that Amazon has lower prices on many items that are available for immediate purchase.

\"eBay

\"This goes to show how much savvy consumers can save by a very quick bit of shopping around,\" says JiffyPrice Founder Niall Thewlis. \"However, most consumers don't have the time to compare prices with umpteen different online retailers before making a purchase. We’ve simplified matters greatly, so that shoppers can quickly compare the price of an item between only Amazon and eBay, the two giants of online retail, in just a couple of seconds. We include only these retailers because they’re the ones that most people have used in the past and feel comfortable buying from.

Well that is one possible answer to the question. People feel comfortable buying from eBay (not everyone granted). Why do they feel comfortable? Because of the brand that eBay has established over the years.

Frustrated eBay sellers continue to flock to other sites to sell their goods, but none of them (Amazon excluded perhaps) carry the brand power that eBay does, and therefore can't possibly attract the number of customers that it can.

While not all eBay sellers are unhappy with the site, it seems that the core of them are. It is interesting to see a site that is driven by users continue to thrive despite the boycotting of many of those users who have helped it thrive in the first place. That is brand power.

There are plenty other sites out there that could compete with eBay, based on the testimonials from users who urge fellow ex-eBayers to use them. Yet we don’t really see any of them emerging as a real threat to eBay. eBay is to online auctions what Google is to search. Whenever someone cleans out their closet, they're encouraged to sell their stuff on eBay by their friends or family. I haven't often heard “eBay” used as a verb like with “Google,” but it might as well be one. “I have Sinbad's autograph. I wonder how much I could get for that on eBay.s Statements like that are commonplace (minus the Sinbad part).

Because people think about eBay as a place to sell stuff from their own closet, they also think there is a good chance to get some cool stuff that came out of somebody else’s. And they’re often right. This cool stuff could just as easily be listed on another site as well, but eBay is the first name that comes to mind. If any other competing site wants to truly leave a dent in eBay’s market share, it's going to have to so some really effective marketing.

 

Why you should blog about your business

(1/1/2013 Update) The yearly figures below all of 2012. As you can see the numbers have more than doubled since 2011. Blogging and linkedin has definitely had a positive impact on our business. quantity, quality, and customer retention.

(2/29/2012 Update) The yearly figures below now includes February of this year. As you can see the numbers are still growing at a healthy rate, and the business phone rings are increasing too. Please read the rest of the article and consider adding a blog to your webpage. Blogging has definitely had a positive impact on our business. quantity, quality, and customer retention.

(1/31/2012 Update) The yearly figures below now includes January of this year. As you can see the numbers are still growing at a healthy rate, and the business phone rings are increasing too. Please read the rest of the article and consider adding a blog to your webpage. The results speaks for itself.

New Customers – Credibility - Customer Retention – Generate Web Traffic Quickly

I've been blogging since 1992. I blog, first and foremost, because I love writing. I don't  write for a living because I never thought I was good enough to make a living from it. But I really enjoy writing, and blogging is the perfect vehicle for expressing myself.

My customers love it because of the value they receive from it, I.E. "free information on better utilizing the computer & network technology that they already own”. I know this because I receive emails telling me so.

However, the biggest benefit is that the business blog allows me to be in front of my customers when I can't physically be there. Blogging allow me to add value to my customers 24/7 and keeps my name fresh in their minds  as a valuable asset to their business. When wooing new business, sometimes the technology blog is just the thing that adds credibility beyond what my competitors offer, and it also is a major factor with customer retention:

The cost for blogging? $155.40 per year ($12.95 per month) for web hosting and $19.95 per year for the domain name, and the time I spend researching and writing articles.

Return on investment? Enormous! Blogging is my #1 marketing and customer retention machine.

Generate Lots of Web Traffic  

On 9/1/2011 we decided to move our blog from a dedicated blog site to our main homepage, active-technologies.com, and you wouldn’t believe the difference. On August 31, we averaged 48 visitors to our website per day and a total of 1510 per month. In September we averaged 161 visitors per day and 4853 for the month. And that is just the first month. Along with the 4 fold increase in daily web traffic, we received 4 times the inquiries, many of which resulted in sales. But the best part is that our search engine rank (google – yahoo – bing – ask) pushed us higher than our competition in our market for every keyword.  It’s like our business has taken on another life, blasting through space rather than clawing it’s way on the ground. You should try it!

It's one thing to create a blog; it's another to create a blog that readers want to visit again and again. If you're serious about using blog hosting to meet your business goals, there are nine tips to follow when developing a business blogging strategy:

#1: Find a valuable niche
The ideal blog dares to be different. Find a neglected (or new) area of your industry that will appeal to your target audience. Your goal should be to write your blog so that the time your customer spends, at that moment, reading your blog, is more valuable to them than time spent doing anything else. If you can accomplish this one thing, your blog and business will be a huge success.

#2: Enjoy yourself
Business blogging should never feel like a chore. When you create a blog because you're interested in its topic, your readers will appreciate,  and even reciprocate, your enthusiasm.

#3: Look at the big picture
While it's only natural to focus on the products and services you offer, you can also benefit from broadening your scope. For example, if you create a blog for your pet toy store, your target audience may be interested in posts about pet health and nutrition, or even pet rescue programs. Stick with your overall business blogging theme, but explore diverse (yet related) topics. In this way your blog will truly ad value in the minds of your customer rather than coming off like an infomercial.

#4: Know your competition - See what's out there
Online sources like Technorati ® and Google ® Blog Search can help you determine how many blogs are currently covering the topics you are considering. You might also want to look at the additional topics these blogs are discussing, which can inspire new ideas of your own.

#5: Network with other bloggers
Connect with other bloggers in your industry by using Technorati ®, Google ® Blogs, and other social sites to find like-minded bloggers. Once you find relevant blogs, you should bookmark them, comment often, talk with the author, and social tag their blog entries. By building these relationships, you can gain new links to your blog and – ultimately - new readers.

#6: Add media
Blogs don't have to consist of text alone. Video, images and surveys can all add interest to your blog. Mix the creative media into the text instead of placing it at the top or the bottom.

#7: Encourage interaction
Blogs have a unique ability to encourage conversations and create interaction. A blog with no comments isn't really a blog it's an editorial column or a standard website. Be sure to invite readers to leave comments each time you post.

#8: Keep up the good work
Develop  and stick to  a schedule when you create a blog. Your readers should know when to expect a new post, whether you're posting daily, weekly, semi-monthly, or monthly. Make certain your new blog material is regular and ON-TIME.

#9: Don't give up
It can take months to build a loyal base of readers when you create a blog. Plan to make business blogging a regular part of your communication strategy for at least a year.

When you create a blog for your business, your overall goal should be to attract repeat visitors. By following the nine tips for business blogging, you can keep readers coming back for more.

Wi-FI: How It Works

A typical Wi-Fi setup contains one or more Access Points (APs) and one or more clients. An AP broadcasts its SSID (Service Set Identifier, "Network name") via packets that are called beacons, which are usually broadcast every 100 ms. The beacons are transmitted at 1 Mbit/s, and are of relatively short duration and therefore do not have a significant effect on performance. Since 1 Mbit/s is the lowest rate of Wi-Fi it assures that the client who receives the beacon can communicate at at least 1 Mbit/s. Based on the settings (e.g. the SSID), the client may decide whether to connect to an AP. If two APs of the same SSID are in range of the client, the client firmware might use signal strength to decide which of the two APs to make a connection to. The Wi-Fi standard leaves connection criteria and roaming totally open to the client. This is a strength of Wi-Fi, but also means that one wireless adapter may perform substantially better than another. Since Wi-Fi transmits in the air, it has the same properties as a non-switched wired Ethernet network, and therefore collisions can occur. Unlike a wired Ethernet, and like most packet radios, Wi-Fi cannot do collision detection, and instead uses a packet exchange (RTS/CTS used for Collision Avoidance or CA) to try to avoid collisions.

[edit] Channels

Except for 802.11a, which operates at 5 GHz, Wi-Fi uses the spectrum near 2.4 GHz, which is standardized and unlicensed by international agreement, although the exact frequency allocations vary slightly in different parts of the world, as does maximum permitted power. However, channel numbers are standardized by frequency throughout the world, so authorized frequencies can be identified by channel numbers.

The frequencies for 802.11 b/g span 2.400 GHz to 2.487 GHz. Each channel is 22 MHz wide and there is a 5 MHz step to the next higher channel.

The maximum number of available channels for wi-fi enabled devices are: – 13 for Europe - 11 for North America - 1 for Japan (Channel 14) [1]

In North America, it is recommended that only channels 1, 6, and 11 be used for 802.11b/g to minimize interference from adjacent channels.[2]

[Advantages of Wi-Fi

Allows LANs to be deployed without cabling, typically reducing the costs of network deployment and expansion. Spaces where cables cannot be run, such as outdoor areas and historical buildings, can host wireless LANs.

Wi-Fi silicon pricing continues to come down, making Wi-Fi a very economical networking option and driving inclusion of Wi-Fi in an ever-widening array of devices.

Wi-Fi products are widely available in the market. Different brands of access points and client network interfaces are interoperable at a basic level of service. Products designated as Wi-Fi CERTIFIED by the Wi-Fi Alliance are interoperable and include WPA2 security.

Wi-Fi is a global set of standards. Unlike cellular carriers, the same Wi-Fi client works in different countries around the world.

Widely available in more than 250,000 public hot spots and millions of homes and corporate and university campuses worldwide.

As of 2006, WPA and WPA2 encryption are not easily crackable if strong passwords are used

New protocols for Quality of Service (WMM) and power saving mechanisms (WMM Power Save) make Wi-Fi even more suitable for latency-sensitive applications (such as voice and video) and small form-factor devices

WiFI: Hotspot Networks

WiFI Hotspots are usually set up indoors and serve some type of retail establishment such as a coffee shop, book store, airport, hotel lobby or other establishment that provides services to people that roam from one city to the next on business.

A WiFI Hotspot usually consists of a single access point (radio) and a billing gateway. A complete WiFI Hotspot should cost around $500 to build and operate.

Customers of WiFI Hotspots are usually business travelers who are equipped with some type of computing device such as a laptop, personal digital assistant (PDA) or a cell phone that uses their own wireless CPE (customer premises equipment) antenna to access the WiFI Hotspot wireless network.

The most important feature of WiFI Hotspots is that it is “self-serve”; customers provision themselves. As soon as a user is within range of a WiFI Hotspot and the click on the view wireless networks option on Microsoft XP operating system, they are presented with the WiFI Hotspot's Landing Page.

The landing page is the first screen that a user sees when they attempt to login to the network. The landing page provides a form whereby the customer can enter their username and password in order to logon to the network. If the user doesn't have a username and password, they can buy one with a valid credit card.

Most WiFI Hotspots are a member of one or more roaming network aggregator services that allow their users to log on to any member network with a single username and password.

Allowing any customer to sign up for service while roaming into a WiFI Hotspot is a very important feature that is included NISP networks.

In a NISP network, the access point is set up as an outdoor WiFI Hotspot. Once the operator turns on the access point, all neighbors with some type of wireless antenna that are within range of the broadcast signal can sign themselves up as a customer.

Will Online Sales Tax Bust Online Businesses

(Zach Walton @ WinProNews) One of the most controversial pieces of legislation currently making its way through the Senate is the Marketplace Fairness Act. In essence, it would allow states to collect taxes from online purchases even if the online store doesn't have a physical presence in the state. Brick-and-mortar stores claim the bill levels the playing field with online retailers while opponents say it would put undue regulations on online businesses while making the tax code even more cumbersome. Guess which side the White House agrees with.

The Hill reports that the White House has formally announced its support for the Marketplace Fairness Act. The newfound endorsement was a key factor in the Senate voting in favor of the bill during a procedural vote on Monday evening.

Do you support an online sales tax? Do you think small online businesses have anything to fear? Let us know in the comments.

The idea of an online sales tax is nothing new. Retail stores, represented by the National Retail Federation, have been pushing for an online sales tax bill for years after the Supreme Court ruled in Quill Corp v. North Dakota that a state could not levy sales tax against a company if it had no physical presence in the state. Numerous online retailers use this to get around sales tax, and retail stores say this gives them an unfair advantage.

The White House completely agrees. In a statement to the press on Monday, White House press secretary Jay Carney said the bill would level the playing field for brick-and-mortar stores and online retailers:

"This administration has carefully considered the legislation, and our team has met with a broad array of people on the issue. And we have heard overwhelmingly from governors, mayors and the business community on the need for federal legislation to level the playing field for our businesses and address sales tax fairness."

The Nation Retail Federation isn't the only group pushing for the Senate to pass the Marketplace Fairness Act. Governors around the country, including Chris Christie of New Jersey and Rick Snyder of Michigan, have voiced their support for the bill. States are hurting for revenue, and they feel that a national mandate on sales tax will bring billions of revenue back to the states. Carney echoed the governors by saying that the potential tax revenue would help states fund "K-12 education, police and fire protection, access to affordable health care, and funding for roads and bridges."

Even if the bill is able to pass the Senate during a final vote later this week, it faces plenty of opposition. The Republican-controlled House is just one of the many challenges the Marketplace Fairness Act faces as it progresses through the legislature. Obviously online businesses are coming out against it. Ebay has been especially hostile towards the legislation, and has even started recruiting its sellers to protest the bill.

The common complaint from Ebay and other businesses opposed is that the bill would put undue burdens on online retailers. The current tax system has created a symbiotic relationship between online companies and the states. The states attract online companies to set up a physical presence in a state through a number of perks while the company brings tax revenue and jobs to the state in question. A universal online sales tax destroys that relationship by making online companies collect sales taxes for states that they receive no benefit from.

The current legislation offers sales exemptions to online businesses that make less than $1 million annually. Ebay is currently lobbying Senators to add an amendment that would up this exemption to $10 million.

One company that's already benefiting from that symbiotic relationship has come out strongly in favor of the bill though. Amazon, which has a number of distribution centers across the country, says that it favors the bill because it creates a unified national framework for tax collection.

Despite the Senate's overwhelming support of the bill, TechDirt points out that Sen. Ron Wyden has come out strongly against it saying that it negatively impacts innovation.

Wyden on How the Online Sales Tax Harms Innovation

Another group standing in the bill's way is Wall Street as it argues that the legislation, as it stands, could negatively affect financial transactions. One group in particular, the Financial Services Roundtable, says that a sales tax on financial transactions would hurt just about everyone:

"A transaction tax on financial services products will hurt retail investors, retired Americans, and small businesses, effectively making it more expensive for them to invest and plan for the long-term. Without hearings, these implications and others will not be properly addressed."

Do you agree with those in favor of the bill? Or the opposition? Let us know in the comments.

It should be noted that the Marketplace Fairness Act isn't a done deal in the Senate. Monday's vote was only procedural. Now the Senate will get to work on adding amendments to the bill with a final vote scheduled for Thursday or Friday.

Unless something disastrous happens, the bill will probably pass the Senate without much of a fight. A glowing endorsement from the White House has made sure of that.

During the debate in the Senate and the House, you're likely to see the following argument - Do we even need an online sales tax bill? Is there any real reason to throw a bone to the retail businesses that implement stupid strategies like a $5 window shopping fee.

One compelling argument is that retail stores should find ways to better compete with online businesses. The retail store still has a few advantages over online businesses, but are they really capitalizing on those advantages?

At this point, it's too early to tell exactly what kind of damage, if any, the Marketplace Fairness Act would cause. It could possibly do nothing, but some are right to fear that it would legitimately hurt the operations of online retailers.

Will Your Business be Obsolete by 2020

Whether they call it digital transformation, revolution, or disruption, businesses feel threatened by the start-ups that are in its vanguard, according to research released Wednesday by Dell. The Digital Transformation Index shows that over three-quarters of businesses (78 percent) believe digital start-ups pose a threat to them now, or will in the future.

Dell put together the index from a survey by Vanson Bourne of 4,000 “business leaders” from mid-size and large companies in 16 countries and a dozen industries. Almost half of those surveyed (45 percent) fear they will be made obsolete in the next three to five years by “digital-born start-ups.”

Slightly more than half of those surveyed say they have experienced significant disruption in their industry in the past three years, and just under half say they do not know how their industry will change in the next three.

“So far the fourth industrial revolution has proved as ruthless as its predecessors. If companies can’t keep up, they will fall behind … or worse. The ‘delay until another day’ approach simply won’t work,” Jeremy Burton, chief marketing officer for Dell Technologies said.

Dell divided the companies surveyed among five rankings, from “digital leaders” to “digital laggards.” Unfortunately, the latter category includes 15 percent of companies surveyed, while the former includes only 5 percent.  The rest are distributed more heavily towards the lower end as well, though companies tend to recognize their digital shortcomings.

Between two-thirds and three-quarters of those surveyed recognize the need to prioritize their technology strategy, plan to invest in IT infrastructure and skills, and are expanding their software development capabilities. Converged infrastructure is the top area for planned investment to keep pace with digital transformation, ahead of ultra high-performance technologies, and big data and analytics.

Dell found that just a third of companies are performing well in five digital business areas perceived as critical by a consensus of business leaders in 2015.  Worse, only 7 percent are performing well in all five, though that number increased from 4 percent a year ago. The good news is that in each individual area or “attribute,” company-wide performance increased by more than double.

The survey also shows that almost six in ten companies are not meeting customers top demands, such as better security or 24/7 access.

“In the near future, almost every business will have software development expertise at its core. Many of these companies will be brand new, others – having not written a line of code in 20 years – will have been on a momentous journey. New digital products and services will drive the transformation of IT infrastructure as businesses struggle to manage 1000x more users and 1000x more data, Burton said.

A study released last month by IBM indicated that hybrid cloud should be included in many businesses digital transformation plans to spur innovation and customer satisfaction.

Will Your Computer Run Windows 8 Hyper-V?

I’m talking about Hyper-V, the virtualization technology that is being built into a desktop version of Windows for the first time. Windows 7 offered similar capabilities through the use of an add-on program called Windows Virtual PC. Hyper-V integrates this capability directly into the operating system, using technology that has proven itself in the server versions of Windows for more than three years. The average consumer will never need it, but it’s a godsend for IT professionals, developers, security researchers, and enthusiasts.

Read More - Click Here!

Will Your NetBook Run Office or Outlook?

The popularity of NetBook computers has taken both hardware and software makers by surprise. What was considered a niche market has become the new growth area for computer hardware. But will your NetBook run Microsoft Office or Outlook?

Operating system

Not all NetBooks use Windows, the cheaper ones reach that lower price by skipping the cost of Windows and using a version of Linux instead.

There's nothing wrong with Linux especially since you can download OpenOffice v3 for free to run on it. OpenOffice v3 can read but not write to the Office 2007 document formats. But you might decide to pay a bit more for the familiarity of Windows. After a slow start, Microsoft has sharpened their pricing on Windows XP for NetBook makers.

NetBooks have a slower processor and less memory than most laptops/desktops so Windows XP is preferred over Vista (there's little to commend Vista on a NetBook in our view). Make very sure that the NetBook has Windows supplied. We've seen some machines which aren't clear about the operating system and invariably that means there's a non-Windows OS involved..

Memory

With the slower Atom processor and slower hard drive, memory becomes an important factor. More memory means software can run more efficiently and hard drive use is cached better.

Generally speaking, the video memory is shared with standard RAM. For example a 512MB NetBook could actually running in only 448MB because 64MB is reserved for video.

We believe that 1GB of RAM is the least amount for anyone using Microsoft Office on a NetBook. If the extra cost isn't too much, jump to 1.5GB or 2GB. If you want to run that eternal resource hog, Microsoft Outlook, get as much memory as you can.

Keep in mind that installing memory into an existing portable computer can be expensive and cumbersome We suggest that you buy the NetBook with the hardware you need now and for the foreseeable future.

Hard Drive

Hard drives are generally around 80GB, though 160GB is possible.

Solid State Drives (SSD) will raise the price promising power savings and higher speed (though these claims are disputed). SSD drives are also smaller sizes with 4GB, 16GB or 32GB the most common. The sizes of SSD are increasing fast and in the next year you can expect to see 128 and even 256GB drives becoming available, for a price.

We like the idea and promise of SSD but are wary of the new technology. There are limitations and questions around the medium and long term write stability of SSD. We're inclined to hold off on SSD until the price comes down and Microsoft tweaks Windows to work efficiently with SSD (at present Windows assumes it's dealing with a standard hard drive).

A 4GB SSD is totally impractical for regular use with Windows with 16GB being the practical but still absolute minimum in our view.

Much depends on how much disk space you think you might need then add some because most people underestimate their disk space needs. If you're travelling you'll need space for your photos and maybe videos as well as any music and videos you bring from home for entertainment. Office users will need space for all necessary documents.

Windows always needs some free hard drive space to work with - about 512MB or a 1GB. Under that level Windows can start acting strangely.

On balance we're inclined to go for the 80GB hard drive option or larger. If you want to try SSD, go for the largest one available, probably 64GB.

USB ports

The MacBook Air, among many limitations comes with a single USB socket which is really insufficient for regular use. A single socket means you have to carry around a USB hub to use more than one device.

USB sockets can be used for external keyboard, mouse, external storage, memory card sockets and charging smaller devices like mobile phones/MP3 players (the latter two important for travelers).

Your NetBook should have at least two, preferably three USB sockets.

Battery

The Apple Mac book Air and now the Mac book Pro 17" have in-built non-replaceable batteries which we think is a thinly veiled piece of deliberate obsolescence. We're continually amazed at reviewers saying that the fixed battery isn't a problem because people replace their portable computer before the battery expires. Only people who get a regular re-supply of their hardware could say that.

In the real world, where people pay for their own computer, a laptop can last for years except that the battery loses ability to hold a charge over time. Eventually it only works with the AC power attached, which rather defeats the purpose of a portable computer.

The simple fix is to buy a replacement battery. With a new battery your NetBook can last a few more years quite easily.

Bottom line: make sure the NetBook has a replaceable battery.

Screen Size

NetBook screens are smaller than laptops around 9 or 10 inch screen dimension.

In terms of screen resolution you usually get a standard width but a shorter height than a laptop or desktop screen. For example a NetBook might have a 1024x576 or 1024x600 resolution instead of 1024x768 on a laptop.

The shorter screen is an issue when using MS Office. Most software has been designed with ever larger screens in mind - not smaller ones. Office suite software has the problem of making plenty of workspace available (ie document or worksheet view) while also showing enough features and status information. We'll talk about that some more later in this article.

Most NetBooks have glossy screens which look nice in the showroom but aren't so good in practice. The glossy screen is harder to see in brighter/sunny conditions. Your reflection in the screen can be distracting. We prefer the non-glare / matt screen which is readable in lighter conditions plus Peter doesn't have to look at his aging visage as he types.

An external VGA port is a good idea, it lets you plug the NetBook into a larger screen when you're at home and use it as a second computer. Many hotels now have video input sockets on the in-room TV's to let you move from a tiny screen to a really big one.

Keyboard

The keyboard is necessarily smaller than usual. That's OK for occasional use and web browsing but if you're likely to be typing a lot then you might find your fingers rebelling against you.

Try out the keyboard properly yourself before buying to make sure you're comfortable with it. Just a few key presses isn't enough - type a few paragraphs.

The multiple USB sockets we suggested above let you plug in an external keyboard and mouse for longer jobs.

A small wireless notebook mouse is a useful extra buy.

So will your NetBook run Office or Outlook – maybe – if you have time for the pain. I wouldn’t do it.

However, if you insist:

Office 2003

(This section applies to Office 2003 and most of it works with earlier versions of Office as well.)

The main toolbars in Office 2003 applications are on one or two rows.

See the controls for menu and toolbar display by right-mouse clicking on the toolbar or menu and choosing the Customize menu at the bottom (or Tools | Customize from the menu). There are three tabs, Toolbars, Commands and Options.

Word 2003 - Tools - Customize dialog

Under options, uncheck the box Standard and Formatting toolbars on two rows. This will put both toolbars side-by-side. Unfortunately, it also means you won't be able to see all the toolbar buttons as they'll disappear off the right of screen. For that reason you might decide to stick with two rows of toolbars.

You could remove toolbars entirely by unchecking them from the long list under the Toolbars tab - then you can work with remembered shortcuts and the menus alone.

An advanced option is to make your own custom toolbar with the icons you want from Standard and Formatting toolbars. You can do that by going to Tools | Customize | Toolbars, clicking New then copying icons from the supplied toolbars to the new one.

Leave off Options | Large Icons - they take up too much room.

Normally we suggest turning on the 'Always show full menus' option so you can see all menu items immediately. However, on a NetBook screen the menus can scroll off the bottom of the shorter screen so you might prefer to turn on 'Show full menus after a short delay'. Office 2003 will initially show common menu items plus those you've used in the past.

While Office 2003 can use less screen height than Office 2007 (because of the single or dual toolbars) the Ribbon minimization trick in Office 2007 lets you see all the ribbon features when needed and get them out of the way as you type.

Screen Views

To see text while typing (plus your choice of toolbars and menu) choose View | Normal. This removes margins etc and puts only text editing area on the screen.

You can switch to View | Page Layout at any time to see the overall look of the page. Even then you can see more text on the page by choosing View | Zoom | Text Width.

View | Full screen will get rid of toolbars, menus and status bars (again it works best if you start from Normal view). Move your mouse to the top of the screen and the Office menu will drop down. The 'Close Full Screen' button is there to help people who switch to this view and can't work out how to get back to the standard display - all you have to do is press Escape.

Reclaiming screen space

The status bar at the bottom of the screen is controlled from Tools | Options | View | Show | Status bar

In Print View the 'white' space between pages (it's the dark grey area on the screen) can go away by clicking in that area (a hide/show white space tip will appear) or from Tools | Options | View | Print and Web layout options | White space between pages.

The vertical ruler on the left in Print view is controlled from Tools | Options | View | Print and Web layout options | Vertical Ruler.

The horizontal ruler can be toggled on/off from View | Ruler.

Office 2007

The much maligned ribbon interface in Office 2007 has several features which make it ideal for smaller screens - though that's certainly not what the smarties at Microsoft envisaged when developing the ribbon.

The ribbon is a fixed height which the same height as Office 2003 with three toolbars.

\"Office

Office 2003 - 2007 height comparison

However Office 2003 can be reduced to two, one or even no toolbars - see above.

Office 2007 has three main virtues for smaller screens:

Minimize the ribbon

You can minimize and restore the entire ribbon when needed. This is quite clever; we've talked about it several times before. The entire ribbon disappears leaving just the tabs, the Office button and the Quick Access Toolbar.

Word 2007 -minimized ribbon

The easiest way to get ribbon minimization working is to double-click on the currently active tab or two double-clicks on a non-active tab. Once minimized the ribbon will appear when needed then disappear again.

More details in the Office Watch article - Make the Office 2007 ribbon go away.

Variable Width

Office 2007, unlike earlier versions of Office, copes more elegantly with variable screen widths.

In Office 2003, a long toolbar simply falls off the right-hand side of the window if there isn't enough room.

The Office 2007 ribbon 'collapses' into smaller chunks depending on the width of the window. Chucks / sections of a ribbon on the right are the first to reduce in size (one of our gripes with the current ribbon).

Word 2007 - very narrow window with pop-down menu

Click on one of the down arrows under an abbreviated chunk to see all the usual options.

Keyboard shortcuts

Office 2007 has a powerful set of keyboard shortcuts both new ones and old favorites.

Simply pressing the Alt key will display prompts to keyboard sequences to all ribbon features see Office 2007 - new look - same shortcuts and More Office 2007 keyboard shortcut tips

A common misconception about Office 2007 is that the previous Office shortcuts don't work - but that's not true. All (or almost all) the common keyboard shortcuts from way back to Word 1 for Windows are still there even if the menu structure that originated them has gone. Try your favorite shortcuts and see … for example:

  • Ctrl + N still opens a new default document.
  • Alt+F then N opens the new document dialog box.
  • Alt + F then P still opens the Print dialog.

Window Basic – Minimize - Maximize /Restore – Close

Whenever you open content (a program, picture, document, or video) the content will appear in a window.

Windows offers standard controls and features so that you can control the program or content using standard features. The only exception is when a program “Turns Off” certain features.

The following are a list of basic window controls and features:

The Title Bar displays the name of the content or program.

The Title Bar also allows you to move the window to a different part of the desktop by right-clicking the Title Bar and dragging the window to the new position.

Minimize, Maximize / Restore, and Close buttons can be found on the right side of the Title Bar.  

The Minimize button is on the left and looks like a minus sign. Clicking on the Minimize Button places the window on the taskbar, usually found at the bottom of the screen. The windows is not closed or gone, it is simply out of the way of other windows, waiting to be opened or used again. To open the window again, click on it from the taskbar.

The Maximize / Restore button is in the middle and has two states. When a window is “Full Size”, you can make it smaller. When the window is small, you can maximize it to full size.

The Close button is the one on the right with the X. Clicking the Close button will close the window or program.

Most computers have a menu bar with File, Edit, View, Help, and other menu items depending on the type of program you are running, or the content being viewed. Some programs turn off the menu bar. Some give you the option of turning the menu bar back on, whilst others, like Microsoft Office 10, us a “Ribbon Bar”.

The Status Bar is located at the bottom of the window and provides information about the window.

A window can be resized horizontally by grabbing the right or left side of the window and moving it left or right.

A window can be resized vertically by grabbing the top or bottom of the window and moving it up or down.

Both Horizontal and Vertical resize can be accomplished at the same time by grabbing the corner of the window and moving it to a new location.

Full Screen – waiting to be Restored

Restored waiting to be Full Size

Windows 10 Action Center

( @ PCWorld) New in Windows 10 is the Action Center, a unified place for all system notifications and quick access to various settings. It lives in a slide-out pane that appears at the press of an icon in the taskbar. It’s a nice addition to Windows, and it’s plenty customizable. Here’s a quick overview of your options.

Customize quick actions

Quick actions might be the most useful feature of the Action Center: Thanks to quick actions, you can quickly and easily adjust your screen brightness, turn Wi-Fi on or off, switch on Quiet Hours (Windows 10’s notification-silencing feature), and more. You can collapse this pane, and when you do, only four quick actions will be visible, but you can choose which four appear here.

windows 10 action center quick access buttons

Open the Settings app, click System, and then Notifications & actions. Under the Quick actions heading, you’ll notice four boxes, each representing one of the four actions that remain visible at all times. Click the boxes to get a menu that lets you pick and choose which actions will get one of the coveted four slots.

Toggle notification options

Under the Notifications subheading on the same Settings page, you’ll find a handful of general options that you can toggle on and off:

  • Show me tips about Windows: When this is switched on, Windows 10 will occasionally serve up tips and tricks through its notifications feature. If you aren’t an experienced Windows user, you may find these useful; if you’re more knowledgable, you may find these annoying.
  • Show app notifications: When turned on, you’ll receive notifications from apps installed on your PC.
  • Show notifications on the lock screen: This one’s pretty self-explanatory, but if you would rather not have prying eyes see that you’ve received notifications while you were away from your desk, you’ll want to turn this one off.
  • Show alarms, reminders, and incoming VOIP calls on the lock screen: If you’re concerned about privacy, you may want to turn this off, but you may also find it convenient to see your appointment reminders at a glance.
  • Hide notifications while presenting: When turned on, Windows 10 will prevent notifications from appearing onscreen while you’re giving a PowerPoint presentation. You might want to turn this one on.

Silence oversealous apps

Would you rather not get an alert every. single. time. you get an email message? You’ll be happy to know that you can switch off notifications on a per-app basis. While atSettings > System > Notifications & actions, scroll down to the “Show notifications from these apps” subheading.

winddows 10 actoin center settings

The Notification & Actions portion of the Settings app hides a wealth of options and tweaks.

To silence all notifications from a particular app, toggle the switch for that app to the “off” position. If you would like to receive some kinds of notifications from an app—for example, you’re cool with the notification banners but would rather not have an alert sound play—click the name of the app in question. Next, toggle the settings on the resulting screen as you please. You can disable or enable notification banners and sounds, or decide, “I don’t want any notifications for you, thank you very much.” It’s your call.

Some apps, such as Twitter's Windows app, offer more granular options over what sort of actions generate a notification. Poke around in the settings of the apps you use to see if 

Clear out notifications

After a while, you might accumulate quite the collection of notifications in your PC’s Action Center. Clearing them out is a cinch, though.

Open Action Center by clicking the Action Center icon in the system tray—it resembles a speech bubble. From here, you can delete individual notifications, clear out an entire section, or clear the whole thing.

windows 10 action center clear all

Don't feel like reading all those individual Tweet notifications? Just click Clear all.

To delete individual notifications, mouse over the notification you want to get rid of, and click the “X” button that appears. If you would like to clear out an entire section, mouse over the section heading, then click the “X” button.

Finally, if you want to delete all notifications, click Clear all in the upper right corner of the Action Center pane.

Windows 10 Clean Install

Doing a clean install is quite simple, as long as you make sure you have a valid license. Here’s what you need to do:

1. Back up all your data first! Doing a clean install erases everything on your hard drive—apps, documents, everything. So, we do not recommend continuing until you have backed up any and all of your data.

2. If you bought a copy of Windows 10, you will have a license key in the box or in your email. Grab this license key and have it on hand.

3. If you were previously a Windows 7 or 8 user, you are eligible for a free upgrade. However, according to Microsoft, you have to upgrade an existing computer to do so. So, even if you want to do a clean install, wait for the Windows 10 update to hit your computer, then install the upgrade first. It feels like a waste of time, but it’s the only way to ensure you you get your free license. Once you’ve done so, you won’t need a key—Windows will just “know” your computer from then on, even if you erase the drive. Just skip any prompts for license keys, and after installing Windows 10 it should activate itself automatically.

4. Once you’ve either got your license key or installed the free Windows 10 upgrade, head tothis page and download Microsoft’s Media Creation Tool. Launch it when it finishes downloading.

5. Select the “Create installation media for another PC” option and click Next (even if you’re using the computer on which you’re installing Windows 10).

6. Choose your language and edition of Windows. If you bought Windows 10, it’ll say which edition you have on the box or in your email. If you upgraded from Windows 7 or 8, you can check which version you have under Control Panel > System and Security > System.

7. Choose what kind of media you want to create. We recommend using a USB flash drive.

8. The Media Creation Tool will download and burn the installation files for you. When it’s done, restart your computer, keeping your flash drive plugged in.

9. Boot from your flash drive. You can usually do this by pressing F12 (or a similar key) at startup, then choosing your flash drive from the list that appears. If that doesn’t work,read this article for more options.

10 You should be greeted with the Windows 10 installer. Follow the initial prompts and, when given the option, choose “Custom: Install Windows Only”.

11. Select the hard drive you want to install Windows 10 on. If you aren’t sure which drive or partition it is, look for the largest one, or the one that says “Primary” in the right column—that’s probably it (but make extra sure before continuing, because you will erase that hard drive!)

12 Click the “Format” button. (If the Format button is grayed out, click “Delete”, then click “New”.) Press Next to install Windows on that drive.

13 Allow the installation wizard to guide you through the rest of the process.

There may be other methods that work (we’re still investigating), but this method worked well for me. Once you’ve installed Windows 10, just grab all your favorite apps and enjoy setting up your fresh machine!

Windows 10 Update Registry Hack

Word of Warning: automatic updates are typically a good thing and I recommend leaving them on in general. As such these methods should primarily be used for preventing a troublesome update from automatically reinstalling (the crash loop) or stopping a potentially troublesome update from installing in the first place.

We are not responsible if your system breaks!!!

Limitations - For Windows 10 Home users there is no way to stop security updates. These are not delivered using the Windows Update Service, but I would not recommend stopping them in any case. The methods below are to give you power over feature and driver updates, less essential areas where I believe users should have control.

Option 1: Stop The Windows Update Service

As central as it is to the core of Windows 10, Windows Update is actually just another Windows process so it can be stopped with these simple steps:

  1. Open the Run command (Win + R), in it type: services.msc and press enter
  2. From the Services list which appears find the Windows Update service and open it
  3. In ‘Startup Type’ (under the ‘General’ tab) change it to ‘Disabled’
  4. Restart

To re-enable Windows Update simply repeat these four steps, but change the Startup Type to ‘Automatic’

Option 2: Setup A Metered Connection

Windows 10 offers users on metered connections a compromise: to save bandwidth Microsoft confirms the operating system will only automatically download and install updates it classifies as ‘Priority’.

While Microsoft doesn’t reveal its method of classification, this does cut down more frivolous updates which typically include new drivers and software features - both of which have already caused stability problems.

  1. Open the Settings app (Win + I)
  2. Open the ‘Network & Internet’ section
  3. Open ‘Wi-Fi’ and click ‘Advanced Options’
  4. Toggle ‘Set as metered connection’ to ‘On’

Note: If your PC uses an Ethernet cable to connect to the Internet the Metered Connection option will be disabled as it works with Wi-Fi connections only.Option 3: Group Policy Editor

This is a halfway house: the group policy editor will notify you about new updates without automatically installing them (how previous generations of Windows always worked) - though again security updates will still install automatically.

Note: Windows 10 Home users have to sit this one out, it is only for Windows 10 Education, Pro and Enterprise editions.

  1. Open the Run command (Win + R), in it type: gpedit.msc and press enter
  2. Navigate to: Computer Configuration -> Administrative Templates -> Windows Components -> Windows Update
  3. Open this and change the Configure Automatic Updates setting to ‘2 - Notify for download and notify for install’
  4. Open the Settings app (Win + I) and navigate to -> Update and Security -> Windows Updates. Click ‘Check for updates’ which applies the new configuration setting
  5. Restart

Registry Hack: Make sure you know what you are doing!!!

  1. Open Registry Editor.

  2. Go to the following Registry key:
    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowsUpdate\Auto Update

    Set the AUOptions DWORD value here to one of the following values:

  3. 1 = Never check for updates
    2 = Check for updates but let me choose whether to download and install them
    3 = Download updates but let me choose whether to install them
    4 = Install updates automatically

    See the following screenshot:
    Windows 10 change windows update settings

  4. Restart your computer.

Windows 10 Uses YOUR PC to Update PCs Around The World.

While I don't mind the idea of Windows 10 mandatory update policy, what I don't want is to use my precious bandwidth to distribute updates to everybody else's computer.  

Windows 10 uses a p2p (peer-to-peer) update distribution system called WUDO (Windows Update Delivery Optimization) to distribute the update to PC users around the world....

The good thing about WUDO and how it distributes updates and patches to computers on your own network. When one computer receives the patch, the other computers on your network will also receive the update from that computer instead of each one hogging up bandwidth downloading them directly from Microsoft. The time and bandwidth savings can be significant.

The BAD news about WUDO is that Microsoft will use YOUR computers and bandwidth to upload updates and patches to PCs around the world. In other words, Microsoft has switched from using their servers and bandwidth to using our servers and bandwidth. And I don't like that one bit!

The good news is that by changing a few settings, we can update our own computers and block Microsoft from using our bandwidth to update other people, and this is how we do it:

  • Settings > Update & Security > the Windows Update section > Advanced options
  • Select PCs on my local network only for WUDO to only be used for your PCs, or
  • Switch it off so each PC has to get their own downloads

Hope you find this helpful.

Windows 8 Installs and Upgrades Much Faster

In the past it too hours to install or upgrade an operating system. According to St. Pierre, a clean install -- where all files and data are wiped from the drive prior to installing Windows 8 -- should wrap up in 21 minutes, 35% less time than the 32 minutes Microsoft said it takes Windows 7 to do the same. For what Microsoft called a "medium upgrade," one on a PC with 213,000 files and 77 applications, Windows 8 is three times faster, finishing the upgrade in just 42 minutes, versus Windows 7's two hours and 11 minutes.

Read More - Click Here!

Windows 8 Manuals

Download latest Windows 8 Manual Documents in PDF files:

How is Windows 8′s Performance? Check reviews from most popular medias:

Windows 8 Versions

  • Windows 8 - Windows 8 is the basic edition of Windows for the x86 and x86-64 architectures. This edition contains features aimed at the home market segment and provides all of the basic new Windows 8 features including the Start screen with semantic zoom, live tiles, Windows Store, Internet Explorer 10, connected standby, Microsoft account integration, the Windows desktop and more.
  • Windows 8 Pro - Windows 8 Pro is comparable to Windows 7 Professional and Ultimate and is targeted towards enthusiasts and business users; it includes all the features of Windows 8. Additional features include operating as a Remote Desktop server, the ability to participate in a Windows Server domain, Encrypting File System, Hyper-V, and Virtual Hard Disk Booting, Group Policy as well as BitLocker and BitLocker To Go. Windows Media Center functionality will be available only for Windows 8 Pro as a free “add-on.”
  • Windows 8 Enterprise - Windows 8 Enterprise provides all the features in Windows 8 Pro (except the ability to install the Windows Media Center add-on), with additional features to assist with IT organization (see table below). This edition is available to Software Assurance customers, as well as MSDN and Technet Professional subscribers, and was released on August 16, 2012.
  • Windows RT - Windows RT will only be available pre-installed on ARM-based devices such as tablet PCs. It will include touch-optimized desktop versions of the basic set of Office 2013 applications to users—Microsoft Word, Excel, PowerPoint, and OneNote, and support device encryption capabilities. Several business-focused features such as Group Policy and domain support are not included.

Unlike Windows Vista and Windows 7, there are no Starter, Home Basic, Home Premium, or Ultimate editions.

Windows 8 Start Button Withing Install Anything

Where is the Start Button; Where is the Start Menu?. If you are running the Windows 8 Consumer Preview and you want some or all of the Start Menu functionality when you're in desktop mode, you can have it your way without installing anything, and this is how we do it:

  1. Get your Run dialog box by pressing Windows Logo Key + R
  2. Check the Desktop option in the taskbar's Properties | Toolbars setting
  3. Add the Search box to the taskbar by checking Address in the same setting

Read More - Click Here!

Windows 8 starter guide

(Jon Phillips PC Mag) The year is drawing to a close, so there's a very good chance that you now find yourself staring straight down the gaping maw of Windows 8. Maybe someone gave you a new Windows tablet or PC as a gift. Or maybe you decided to use your holiday down time to upgrade an old PC. The details don't really matter. You're now using Windows 8 for the very first time, and you're searching for answers on how to make the OS an integral, productive part of your high-tech life.

Sound familiar? Then walk with me as we take a tour of recent PCWorld Windows 8 coverage. I trust we have answers to all your Windows 8 questions. Getting started with Windows 8 Right when the new OS launched, we published a number of essential how-to guides for first-time Windows 8 users. You can start your orientation process with this handy guide to maximizing your first 30 minutes with the new OS. But perhaps even more useful is our compendium of 20 must-know Windows 8 tips and tricks, which starts off with a thorough look at keyboard shortcuts—you should know them all if you don't have a touch screen. But if you do have a touch screen device, then head straight to our guide to Windows 8 gesture commands.

In this article (and in its accompany video) we describe how to navigate the initially confusing touch commands that leave many first-time users wondering what the heck just hit them. You really can't get the most from the new Windows 8 modern interface unless you have a 10-point multitouch display. And if you don't have a touch screen monitor for the new OS, you should definitely read our guide to picking the right upgrade display for full Windows 8 compatibility. Windows 8 drivers, utilities and customizations

Once you've become somewhat acclimated to the new Windows 8 landscape, it's time to fine-tune the OS experience to your personal preferences. At the top of the list is driver management. It's very possible that your new Windows 8 device boots up fine, but unless all your device drivers are up-to-date, you won't get the most high-performance experience possible (and driver issues may stop some peripherals from working altogether). See our exhaustive guide on the whys, hows and wheres of Windows 8 drivers to nip all these issues in the bud. Utilities like Win8 Start Button will help restore a bit of normalcy in the new OS. Some Windows 8 problems have nothing to do with drivers. Instead, the OS itself is just innately challenging.

To alleviate some of the built-in pain points, you absolutely must read our guide to the 8 worst Windows 8 irritations and how to fix them. Microsoft's decision to omit the traditional Start Button is among a host of bizarre development decisions, but luckily three different third-party utilities—Win8 Start Button, StartMenuPlus8 and Start8—can return the erstwhile Windows mainstay to your desktop. But, hey, Microsoft didn't kill all the good things from previous versions of Windows. It just relegated many of them to hidden, second-class status. For a bunch of great tools hiding beneath the surface of Windows 8, check out this collection of 6 awesome Windows 8 utilities that no one knows about. Diving deep into Windows 8 power tools In the weeks since the new OS launched, we've published a number of deep-dive tutorials that explore the system's more innovative, richer features.

For example, BitLocker To Go is built directly into Windows 8, and helps you quickly encrypt external storage devices like USB flash drives and portable hard drives. If you're concerned about your data security, you should also read our how-to on activating Windows Defender, a basic anti-malware tool that's not immediately exposed in many default installations of the OS. Another great built-in Windows 8 feature is Storage Spaces, a tool that lets you combine all your sundry storage hardware into a single, virtual data pool—which you can then allocate more efficiently, for data redundancy and general file management. Besides explaining Storage Spaces, we also posted a great article on using Client Hyper-V, a tool that lets you virtualize older versions of Windows from within Windows 8. Portable drives can be tapped for use in both Storage Spaces and BitLocker To Go.

Finally, it's possible that you just installed Windows 8 on a machine from yesteryear, and your gear isn't up to the task of running the new system in all its glory. If you find yourself in this sorry lot, read our tutorial on optimizing Windows 8 for older hardware. It explains which features to turn off, or otherwise disable. Windows 8 apps and games to explore and download Windows 8 comes with a bunch of pre-installed "modern UI" apps, so you might as well familiarize yourself with the most high-profile entries.

We have detailed primers on Music, Photos, Mail, Calendar, SkyDrive and People. None of these apps is perfect, though the SkyDrive cloud service is an integral part of the new Microsoft ecosystem, so you really should check out its implementation in Windows 8. Precisely because Microsoft's built-in apps are so lacking, you'll want to hit up the Windows Store for Windows 8 apps to populate your new Start Screen.

On the day Windows 8 launched, we published our top 10 list of the Windows 8 apps to download first, but just this week we updated the concept with a new article geared specifically to Windows 8 tablets. New Windows 8 hardware owners should also read our suggestions of the best streaming media apps for cord cutters, the best Windows 8 casual games (our author tested a vast selection, and then chose the 15 most worthy), and best productivity apps.

Windows 8.1 Need To Know

Microsoft Windows Tune up 8.1.jpg

(Meghan McDonough @ Digital Trends) Microsoft’s Build conference is just two days away, and though details about what the company will announce are still MIA, there’s one thing we’re ready and waiting for: the release of Windows 8.1.

While plenty of rumors are floating around about what Microsoft will release and talk about during its two scheduled keynote speeches, we know for sure that one of the biggest things to come out of the conference will be Windows 8.1. This update to last year’s Windows 8 is expected to fix many of the quirks and frustrations users complained about, as well as add new features to the Windows operating system.

Here’s what we can expect when Windows 8.1 debuts at Build this week.

Start button

Windows 8.1 Everything you need to know start button

The Start button’s back and better than ever! Okay, maybe it’s not better due to the lack of a full menu, but at least it’s back. Absence makes the heart grow fonder as none of us realized how much we would miss the Start button when it disappeared from our lives upon the release of Windows 8. Now, the Start button’s coming back in Windows 8.1 with a white stylized four-pane look that changes color depending on the application. It essentially serves the same purpose as the Windows key on your keyboard, but it’s not buried underneath your hand. As Microsoft demonstrated at Computex earlier this month, clicking on the Start button slides the Metro interface in over your desktop wallpaper.

Easier settings access
For years, the Control Panel has been the central hub for changing settings, adding printers, changing screen resolutions, and connecting to networks, though there were several other context locations to make the same changes. Some of that easy access disappeared when Windows 8 debuted as it required users to first go to the desktop and then go into the Control Panel from there. Late last month, Microsoft announced that the settings found in the Control Panel will now also be found in the updated PC Settings found in the Modern UI. Why they didn’t just call it Control Panel is beyond us, but at least it’s there.

Boot to desktopWindows 8.1 Everything you need to know Boot to desktop

Microsoft is really pushing its one user interface to rule them all between Windows 8 and Windows Phone, but those of us who have enjoyed working from the default desktop setup since Windows 95 were none too pleased when it was ditched upon boot up for Windows 8′s Modern UI. The good news? The company is not only bringing back the option to boot to the desktop, but it’s also adding the ability to boot to your list of apps, too. There may be other boot options that Microsoft hasn’t revealed yet, but we’re just happy to have our old familiar desktop back.

Search everywhere
One the disadvantages of storing your files all over the place, such as on the hard drive or in the cloud, is that you frequently forget where you put it. In addition to letting users automatically save files to SkyDrive, Windows 8.1 well help those of us with faulty memories by upgrading to a new global search that’s powered by Microsoft’s favorite search engine, Bing. Global search will be available from the charm bar and will search not only your hard drive and SkyDrive files, but also the Web for sites and images that are relevant to your query. 

Search results will appear in color-coded panels based on the type of content found. Clearly, Microsoft wants to make it easier for you to use Bing as your default search engine so you don’t have to go into your browser where you might be tempted by another, more “oogely” search engine.

Aesthetic improvements

Windows 8.1 Everything you need to know windows 8.1 Aesthetic improvements

If Windows 8 left you feeling like your machine was less personalized, then you’ll like the visual updates in Windows 8.1. First up, there are more wallpaper options, including active ones, for the Modern UI Start screen. The live tiles are now resizable for easier use. Since Microsoft found that users were frequently moving tiles on accident, they now require a right-click to move around.

The lock screen is also getting a makeover. Instead of displaying just one image, the lock screen can be turned into a makeshift digital picture frame with a slideshow of your images – just like the kind of slideshow you’d find as a screensaver option.

NFC printing
At the TechEd conference earlier this month, Microsoft tipped its hand in regards to printing with Windows 8.1. Need to print something from your tablet? The updated OS has you covered as long as your device has NFC capabilities. Slap an NFC tag on your printer and you’ll be able to send docs to that printer. Don’t have NFC? Windows 8.1 also supports Wi-Fi direct printing, which creates a peer-to-peer network between your device and your printer.

Windows Store

Windows 8.1 Everything you need to know Windows Store

For wanting to sell apps and make money, the Windows Store in Windows 8 was abysmal. As we’ve lamented, it’s hard to navigate and even harder to read. Recently, we’ve heard rumblings that the store will be updated to version 2.0 when Windows 8.1 debuts. Among the upgrades will be an easily accessible “Your Account” button and a better organized store with specialized categories such as Popular Now, Special Offers, Top Free, New Releases, and Picks for You.

Wi-Fi hotspot capability
Another feature confirmed at TechEd is Wi-Fi hotspot capabilities. Many of the improvements in Windows 8.1 are business-user friendly, though we think sharing a mobile broadband connection is a bonus for everyone from students to families. Here’s how it works: if only one guy has a broadband USB stick, he’ll be able to turn his laptop into a Wi-Fi hotspot and everyone he’s with will be able to connect to the Internet using his single connection. While it might not offer the fastest speeds, this Windows 8.1 feature could be invaluable for collaborators.

Fingerprint reader

Windows 8.1 Everything you need to know fingerprint reader

Fingerprint readers on laptops are nothing new, but now Microsoft is getting in on the software that powers them. Rumor has it that Windows 8.1 will include native fingerprint scanning software. According to what Microsoft’s senior product marketing manager, Michael Niehaus, said at TechEd, the difference with Microsoft’s implementation is that users will be able to lock down and secure individual folders with the flick of a finger. Most fingerprint applications currently available only let users log in or lock their computer during the day.

Business feature improvements
Microsoft is proactively working to make the latest version of Windows more attractive to businesses who won’t give up XP, and there are many improvements Redmond has touted in Windows 8.1. While we’re sure the company still has a few tricks up its sleeve for the keynote, we do know it’ll be easier to log into a VPN and there will be more granular management of devices that employees bring into the company to use for work.

Internet Explorer 11

Windows 8.1 Everything you need to know Internet Explorer 11

Internet Explorer has always been the ugly duckling of Web browsers. Millions of office workers are forced to use it – many of whom are still stuck with Windows XP. Microsoft is definitely working on reshaping the public perception of IE, starting with a Vine video campaign entitled “Not Your Father’s Browser.” Windows 8.1 will include IE11, which will no longer set limits on the number of open tabs. Plus, it’s expected to support WebGL, which gives browsers the ability to render 3D graphics. Currently, IE is the only major browser that does not support this Web standard.

Outlook 2013
Windows 8.1 isn’t just coming to the full version of Windows 8, it’s also arriving for Windows RT as well as Windows RT 8.1. One of the most common complaints of Windows RT is the lack of Outlook for managing mail. Instead, users have been left to depend on the meager Mail app for email management. At Computex, Microsoft announced that the Windows RT 8.1 update will, in fact, include Outlook 2013. Though RT currently ships with Office 2013 Home & Student, that version of Office doesn’t include Outlook, which has always struck us as annoying, but it’s nice to see Microsoft throwing the fledgling RT a bone.

We already know a ton about what will be included with Windows 8.1 when it’s officially released at Build this week. What’s going to be exciting is the extra goodies we haven’t found out about yet. If you want to be one of the first people to take the public preview of Windows 8.1 for a test drive, Microsoft detailed how to do it. In the meantime, stay tuned for more information about Windows 8.1 from the conference.

Windows 8: Not for Older PCs

image

(WALTER S. MOSSBERG Wall Street Journal) After the upgrade, the Lenovo ThinkPad X301's touch pad couldn't scroll in the tabletlike Start Screen.

If you're thinking of upgrading your PC to the new Windows 8, be prepared for hassles and disappointment, especially if the computer is more than a year or two old—even if it technically meets the basic requirements to run the new version.

I know this, because I've spent big chunks of the past week trying to upgrade to Windows 8 two big-name, well-regarded PCs—a 2008 Lenovo laptop and a 2009 Hewlett-Packard touch-screen desktop. The process was painful, and it resulted in lost capabilities, even though both PCs ran Windows 7 quite well and met the minimum requirements for running Windows 8.

Walt Mossberg shows us what he has learned from installing Windows 8 on his PCs that are more than two years old. Unfortunately, as he found, upgrading to Windows 8 on existing PCs has proven to be a hassle. (Photo: AP)

To be sure, people upgrading newer PCs, whose makers anticipated Windows 8 or have software patches ready to accommodate it, will likely have a much better experience. I learned—too late—that neither of the computers I was upgrading was on the list of models for which their manufacturers provided such patches. This may be because, in both cases, aspects of their hardware weren't up to snuff for Windows 8's more demanding requirements.

For instance, the touch pad on my Lenovo ThinkPad X301 laptop can't be used to scroll in the new tabletlike Start Screen environment in Windows 8, or to perform certain Windows 8 gestures. And, on the HP TouchSmart 300, the touch screen isn't precise or sensitive enough to reliably perform Windows 8's touch gestures every time. Plus, the microphone doesn't work. Oh, and to get the HP to stop freezing, I had to perform a procedure that wiped out most of my installed software, including HP and Microsoft programs.

What to Know About Sharing Photos

[image]

After watching friends and relatives struggle to share photos using Facebook, Apple's Photo Streams and Google+, Katherine Boehret organized some tips and tricks that might surprise even the most share-happy shutterbugs. Here is her guide in the Digital Solution.

It isn't unusual for somewhat older PCs to be unable to take full advantage of a new version of an operating system. And Windows 8 is a big change. But I was surprised by how hard it was to discover that my two PCs weren't going to be able to fully work with the new system. I assumed Microsoft's installer would let me know, but it didn't.

Part of this problem was my fault, I guess. If I had thought to burrow through the Lenovo or HP websites, I might have found that my models weren't considered by their own makers to be fit for upgrading.

For instance, HP's information page, at http://bit.ly/SdTCVp, said this about my TouchSmart, after I located and entered its obscure, official product number: "HP has not tested this PC. For this reason, HP is unable to provide upgrade instructions or Windows 8 drivers. You may lose basic functionality & stability if you try to upgrade." Alas, I learned this only after I had upgraded.

A spokeswoman for HP explained: "With any PC, it's critical that the hardware and software work well together and some older PCs in our portfolio, including the TouchSmart 300 which was introduced in 2009, are simply not able to take advantage of the extensive new features Windows 8 has to offer."

[image] Microsoft

Upgrading two machines to Windows 8 Pro was harder than expected.

Tips for an Upgrade

What to know before you upgrade a PC to Windows 8

1. Don't try upgrading any machine older than two years, preferably one year.

2. Dig around in the manufacturer's site before buying the upgrade to make sure the company supports your model for Windows 8 use.

3. Run the Upgrade Assistant first.

4. Even if your PC is supported for Windows 8, be prepared to spend time applying patches, and following complicated instructions. One HP document on the upgrade process runs to 29 pages when printed out.

And a Lenovo spokesman said: "The X301 is five years old and Lenovo decided not to support it for Windows 8 upgrades. The touch pad hardware really can't support all the features of Windows 8."

Microsoft does offer Upgrade Assistant software that might have warned me of the problems, available at http://bit.ly/SdUxFo. But the box for the Windows 8 Pro DVD I was using only suggested running this utility and checking with the manufacturer's website, in tiny type at the bottom of its back cover.

My problem was that I had too much confidence in Microsoft's Windows 8 installer software. I had expected the installer, which also checks a PC to see if it can handle the new operating system, to tell me if there were key incompatibilities. It found exactly one: the Bluetooth utility in each machine. It told me to uninstall these before proceeding, and I dutifully did so.

I asked Microsoft why the installer didn't warn me of the other incompatibilities I ran into, and an official said it simply doesn't know how every model might perform and that's why it recommends users look for the manufacturer's instructions and warnings.

Also, I had problems with the installer itself. On the HP, it wouldn't work with either the DVDs or a downloaded version of Windows 8. So I had to transfer the downloaded version to a 4 gigabyte USB flash drive to get it to work. (It requires at least a 3 gigabyte drive.)

For a limited time, until the end of this month, you can buy an upgrade to Windows 8 for $40 via download or $70 via DVD. This gets you only the high-end Pro version, with added features that let users tap into certain corporate networks. Microsoft hasn't announced the eventual regular pricing, but I expect it to be at least $100 for standard Windows 8, and around $200 for Pro.

The basic requirements for running Windows 8 are a processor running at 1 gigahertz or faster, and at least 1 or 2 gigabytes of memory, depending on whether your PC is a less demanding 32-bit or more demanding 64-bit system (the installer tells you). You'll also need at least 16 or 20 gigabytes of free storage, again depending on whether the PC is 32-bit or 64-bit, and a graphics system that can handle a Microsoft graphics standard called "DirectX 9 with WDDM driver."

In my tests on both machines, the actual installation took about two hours, but a full workday or more was spent tweaking each machine, and getting updates to Windows 8 and its built-in apps. For instance, after the installation seemed done, I discovered I had lost the Wi-Fi Internet connection on both machines and had to temporarily turn off the firewall to restore it and then upgrade my antivirus software.

The problems were worse on the HP, which I had thought would be easier because it's newer and has a touch screen. On the HP, Windows 8 proved so buggy at first that I couldn't even get back to the Start Screen—home base for the system—after opening apps and the computer froze up frequently. I was forced to perform a "Refresh," a process that reinstalls Windows 8 without erasing your data files, but wipes out all third-party traditional Windows programs except the new-style apps you've bought from Microsoft's online store. This Refresh got my HP running much better—except for the lost microphone and the inability of the older-style touch screen to work as well as new ones do.

However, I lost dozens of programs, such as HP's touch software suite, the Google Chrome browser, iTunes, Windows Live Essentials, Firefox and more. So I had to spend more time reinstalling some of these.

In the end, both machines ran Windows 8 pretty quickly, but clumsily. And both started up faster than before.

But there was a penalty: Each machine wound up with 12 to 13 gigabytes less free storage than before. This is mainly because the installer gathers up incompatible files into a special folder called Windows.old. You can delete this folder to recover space, or Windows will delete much of it automatically after 28 days.

The industry really wants you to get Windows 8 via an all-new PC, and most people who adopt it will go that route. But, if you don't, or can't, and have even a three-year-old PC, you may want to just stick with the Windows you've got.

Read More - Click Here!

Wired OR Wireless – It’s Not Either/OR

Here is an interesting statistic— according to the Yankee Group, nearly 52 percent of today's workforce is mobile—and this number is growing. What does that mean to your organization? To some, it means staunchly refusing to face what's in front of you, and continuing to act as if wireless is something that you have to deal with only on a fringe basis.

Unfortunately, I see this happening in many organizations and it is just another sign that IT is not leading in the organization, but is instead lagging behind and having to play catch up and accommodate when forced to do so.

This, frankly, is the wrong attitude to take. If you haven't figured it out by now—a seamless blend of wired and wireless is the wave of the future. I say seamless, because your workforce will want to go from wired to Wi-Fi to cellular broadband, all within the same workday and all without having to jump through extraordinary hoops to do so. Any attempt at stopping this will make IT look obstructionist and behind the curve.

So what does this mean in terms of your planning? It should mean several things. Here are a few of them to consider:

  1. Your organization needs to plan its infrastructure growth around providing secure wireless as part of the overall network, not just as an afterthought.
  1. The Internet is part of every knowledge worker's regular tools. They will need to access it all the time, wherever they work from.
  1. Expect that there will be a significant number of connections to your corporate network from OUTSIDE your firewall as part of regular business.
  1. People will want all their applications delivered to them on a variety of devices.
  1. People will expect their applications to perform similarly no matter where they are.
  1. You NEED to get control of all mobile devices for your organization. In order to do so, you NEED to build flexibility into your standards. If you are going to demand only one kind of device and won't support the rest—you are asking for trouble.
  1. It is ridiculous to supply all workers with a desktop and a variety of mobile devices. Find ways to make their mobile units part of their everyday devices.
  1. Video streaming is a part of mobile computing. Stop trying to fight it and work on ways to control it and enhance it within your organization.
  1. If VOIP isn't part of your infrastructure, it will be.
  1. Integration is your key word.

Having listed things you need to consider in your planning, what are some of your possible solutions?

  1. If you do not have a way to deliver your applications as a Web application, you need to develop this capability. I am specifically talking about remote desktop solutions provided by companies such as Citrix, Microsoft or other vendors.
  1. If you aren't thinking about heading toward a thin-client environment, you should be. After all, if you are working on ways to provide the same level of seamless application use no matter what the device, why are you paying for all the horsepower of a traditional desktop? Yes there will be exceptions - but it's not the rule.
  1. If AJAX isn't in your developer's tool kit, it should be.
  1. Your applications will need to be able to support ALL browsers and operating systems as mobile computing devices take a variety of forms.
  1. VPN is old school. Create an environment where you can manage connections from a variety of platforms—whether YOU manage them or not.
  1. You need to be able to provide and support security from a number of platforms to a wide variety of platforms. This is also a good time to be thinking about single-sign-on capability.
  1. Bandwidth management tools are no longer a luxury, they are a necessity.
  1. You NEED to get phones and PDAs under your domain now! It should not be a difficult case to make.
  1. You need a STRATEGY to move forward in order to handle the complexity that comes with integration—everything I have mentioned here needs to be considered in your strategy.
  1. The computing devices of the future are here today; take a look at the Sony VGN-UX280P to see where things are headed.

Obviously there must be a great deal of thought and planning that needs to go into your IT strategy for the future. My point, though, is that if your mobile strategy is separate from your overall strategy, you have a severe disconnect and need to rethink your plan. Mobile and wireless need to be integral to the way you think and plan in all areas—from application development to infrastructure. If they aren't, you will find yourself playing catch up while the rest of your organization does an end run. And when they do - don't forget I told you so.

WordPress DreamWorks Galery Plugin

Use [dreamwork] to display the galery in your posts. It also allows you to display the gallery in the template. It supports categoris and multple imag

  1. Install automatically through the 'Plugins', 'Add New' menu in WordPress, or upload the 'wp-dreamworkgallery' folder to the '/wp-content/plugins/' directory.

  2. Activate the plugin through the 'Plugins' menu in WordPress. you can find "dreamwork" link on left side navigation, clilck on to configure plugin Options.

short codes for content

  • [dreamwork]- Use this short code in the content / post to display all images under all categories which are not disabled.

  • [dreamwork cats=2,3]- Use this short code in the content / post to display all images under the categories with ID's 2,3.

  • [dreamwork imgs=1,2,3]- Use this short code in the content / post to display images which has ID's 1,2,3.

short codes for template

  • <?php echo do_shortcode('[dreamwork]');?>- Use this short code in the template (php file) to display all images under all categories which are not disabled.

  • <?php echo do_shortcode('[dreamwork cats=2,3]');?>- Use this short code in the template (php file) to display all images under the categories with ID's 2,3.

  • <?php echo do_shortcode('[dreamwork imgs=1,2,3]');?>- Use this short code in the template (php file) to display images which has ID's 1,2,3.

  • If you have any problems in using this plugin please contact at addons@wpslideshow.com

Working demo: http://wpslideshow.com/dreamwork-gallery/

Installation Video: http://www.youtube.com/watch?feature=player_embedded&v=GeSOt2yrPMs

WordPress Gallery Plugin Top Ten

1. NextGEN Gallery Plugin

NextGEN Gallery is a full integrated Image Gallery plugin for WordPress with a Flash slideshow option. It allows you to add image effects, custom templates for your theme. You can even move images between galleries. It also provides other useful functions like watermarking and zip upload.

nextgen-gallery-plugin

2. Cincopa WordPress Plugin

Cincopa Content Gallery creates an automated, fully customizable image gallery, slideshows, video and music playlists anywhere within your WordPress site. Choose your videos, images and music and display skin, pages or posts with custom overlay text and a rotating thumbnail belts. It supports iPhone/iPod and smart phones.

cincopa-image-gallery

3. WP Photo Album

This plugin is designed to easily manage and display your photo albums within your WordPress site. It gives you the option to setup albums and categories – and upload photos via the WordPress backend.

wp-photo-album

4. Picasna WordPress Plugin

Picasna enables you to present your photos in a stylish and easy-to-browse way on your WordPress Blog. You can upload photos unswervingly to Picasa Web Albums and they will emerge on your web page in seconds.

picasna-wp-plugin

5. Flickr Photo Album

This Flickr plugin for WordPress will allow you to pull in your Flickr photosets and display them as albums on your WordPress site. There is a pretty simple template provided which you can customize to 100% match the look and feel of your own site. There are options to allow you to hook it up with a number of different Lightbox-style popup overlay display libraries. Third party commenting services such as Disqus are also supported, allowing your visitors to comment on your photos without hopping over to Flickr.com.

flickr-photo-album

6. SuperSlider-Show

SuperSlider-Show is your Animated show plugin that uses Mootools 1.2 javascript to replace your gallery with a Slideshow. Highly configurable, theme based design, css based animations, auto minithumbnail creation. Shortcode system on post and page screens to make each slideshow unique. Degrades gracefully with javascript turned off, or plugin removed / disabled.

super-slider-show-plugin

7. Lightbox Gallery Plugin

This plugin changes the view of galleries to the Lightbox view and also displays the associated metadata with the images. The caption for each image is viewed through a tooltip when you hover your mouse on a thumbnail.

lightbox-gallery-plugin

8. Media Library Gallery

Media Library Gallery automatically creates a gallery with every images posts have in attachment. It supports thickbox as well.

media-library-gallery

9. PhotoSmash Galleries

PhotoSmash Galleries plugin allows you to create user contributable photo galleries in WordPress posts and pages with extensive options. It lets you control who can upload images: Admin only, Authors & Contributors or registered users and higher. You can receive email alerts for new images that need to be moderated.

photosmash-gallery-plugin

10. Page Flip Image Gallery

Image Gallery with Page Flip effects for your blog where you can upload Images from FTP folder. It has features like zoom, full screen mode etc.

page-flip-image-gallery

Honorable mentions -

You are what you measure: Choose your metrics wisely

Today’s shared B2B social media posts can show you some new ways of managing your online marketing to connect with your target audience, measure your success, run your social profiles more efficiently and start a blog with the correct things in mind. There are also some writing tips from Hemingway thrown in for good measure. Better understanding of what you are doing and why, along with solid writing, will get further than you are today in your social media marketing.

Read More - Click Here!


 

eCommerce Carts Ready for a World of Shopping

E-Commerce Carts That Are Ready for a World of Shopping(Vivian Wagner @ E-Commerce Times) E-commerce is a global enterprise, and shopping carts and checkout procedures must cater to customers from around the world. That's the word from companies that help e-tailers customize the shopping experience for consumers, no matter where they are doing the scrolling, pointing and clicking.

 

 

Shoe shoppers from Antigua to the United Kingdom, when visiting the Jildor Shoes website, can click a link for the "International Website" on the homepage and enter their country and currency. Immediately, the prices, shipping costs, duty fees and taxes for every pair of boots, pumps, and slippers on the site adjust automatically.

From the sales pages to the shopping cart, the site essentially becomes customized for that shopper's country.

It's all part of making international e-commerce seamless, streamlined, and easy -- all goals for businesses that sell their wares around the world.

"It's an excellent way to go," Gil Levy, a managing partner with ECommerce Partners, which provides consulting services to Jildor Shoes, told the E-Commerce Times. "It's good to put it on the homepage: 'We ship internationally.'"

 

 

Shopping For the Details

A variety of companies, such as FiftyOne, International Checkout, and Bongo International provide international checkout and fulfillment services for e-commerce businesses that want to sell globally.

These companies convert currencies, calculate shipping costs, and figure duty fees and taxes in order to simplify the process of selling -- and buying -- internationally.

"Bongo provides the API Technology to display an accurate, full, landed cost to the international customer in the checkout environment in real time, or an estimate given through the duty/tax calculator on our website," Jennean Morrison, product manager with Bongo, told the E-Commerce Times.

"Additionally, we offer fraud protection, full export compliance, shipment repackaging and consolidation to drive down shipping costs, a localized customer experience and several payment options for the international customer."

Creating a localized, accurate, and user-friendly international shopping experience can be a challenge, and companies that specialize in global checkout can make life easier for e-tailers by attending to all the myriad details that surround international sales.

"Localization is one of the biggest challenges in e-commerce," noted Morrison. "Displaying website information in the customer's native currency and language can be very expensive and time-consuming to integrate. Other hurdles to consider are denied party screening, specific country restrictions, and product classifications."

Duties and taxes are commonly inflated by a customs department when assigned in-country, if items aren't classified to the full 10-digit Harmonized Commodity Description, she added. "This can equate to chargebacks for a merchant to deal with, or a decline in repeat business."

In addition to all the complicated calculations and other considerations, some of the features of an internationally friendly site are deceptively simple.

"Simple changes, like instead of just 'state,' using 'province/state' and 'postal code' instead of 'zip code,' can streamline the checkout process," Jimmy Rodriguez, chief technical officer with 3DCart, told the E-Commerce Times. "3DCart allows internet retailers to completely customize their site, (which) is key when optimizing your online store for international markets, in order to adjust the elements on your site to accommodate international visitors."

Playing on a Global Field

Customized site designs, shopping carts, and checkout pages make all the difference when it comes to international sales, since no two e-commerce businesses are exactly alike.

"Our modular approach enables us to create a custom international solution for all types of U.S. retailers," said Morrison. "We offer a wide range of benefits from export compliance to payment processing. Our solutions were created to fit the needs of the full spectrum of online retailers interested in expanding globally."

Bongo International does not outsource its operations or customer service, and all technology was created in-house, she added. "This provides the most flexible solutions in the marketplace."

E-commerce businesses, if they want to stay ahead of the curve, must accommodate international sales. Global-friendly site designs and checkout procedures are fast becoming necessities.

"Though e-commerce in the U.S. has been around for many years, the growth in popularity in other countries, including Europe and Latin America, is hitting double digits every year and doesn't seem to be anywhere near leveling off," said Rodriguez. "Most online stores receive international visitors on a daily basis, and by not being able to deliver to these markets they would be at risk of missing opportunities."

iPhone Must Have Stealthy Cases - Check It Out

The wannabe spy in us all will be delighted by the existence of these iPhone cases with stealthy, secret compartments.

We have found 10 covers that cunningly conceal slimline storage space within their confines, giving you a private place for cash, bank or ID cards, keys and important notes written in invisible ink.

  • Stealth-case_white_both_iphone-5_1

    1. HEX Stealth

    Built into HEX's "Stealth" is storage for bank cards with space for cash. Cunningly, the compartment has been specially designed to allow RFID-enabled wave-, or tap-to-pay transactions without removing the card from the case.

    Cost: $34.95

    Image: HEX

     
  • Bullettrain-safe-wallet-a-key-issue-medium

    2. SAFE Wallet

    This wallet-replacement case can conceal up to five bank cards, house keys and cash, but measures in at a slimline 16 millimeters and weighs around an ounce.

    Cost: $49

    Image: BulletTrain

     
  • Iph-1122-red_e_1

    3. Incipio Stowaway

    You can hide three bank cards inside the "Stowaway," while the flip open back doubles as a stand.

    Cost: $34.99

    Image: Incipio

     
  • 7-eyn-ip5_black_500_2

    4. Eyn

    The eyn's hinged back reveals not just space for three bank cards and some cash, but a built-in mirror for subtle, spinach-in-teeth checks.

    Cost: $29.99

    Image: Eyn

     
  • Iphn5smartflexcardfam001

    5. Speck SmartFlex Wallet

    In a variety of colors, the SmartFlex Wallet offers space for folded bills and bank cards, all accessed via a built-in thumb release mechanism.

    Cost: $34.95

    Image: CauseWorld

     
  • Download

    6. Targus Wallet Case

    In three shades of faux leather, this sophisticated wallet case has space for a couple of banks cards in the secure, secret compartment on the back of the phone.

    Cost: $29.99

    Image: Targus

     
  • Il

    7. iLID Wallet

    With the boast of being the world's thinnest iPhone wallet case, iLID's offering has space for all your essentials and a built-in money clip for your cash.

    Cost: $39.95

    Image: iLID

     
  • Ca

    8. Case-Mate Barely There ID Case

    This simple solution comprises of a super-slim case with space for two bank cards.

    Cost: $25

    Image: Case-Mate

     
  • Iph-847e_2_1

    9. Incipio Stashback

    This flip-top iPhone cover gives you secret, "stealth space" for up to three cards.

    Cost: $39.99

    Image: CauseWorld

     
  • C133_1_of_2_1024x1024

    10. CaptCase

    Finally, the classy CaptCase is a book-style cover with a magnetic closure flap. Its secretive capabilities come with a subtle, slim pocket on the back perfect to stash cards or cash.

    Cost: $45

    Image: CaptCase

inShare6 Email this article Print article Laptop Shot Heard Round The World: The Dad Speaks Out

Tommy Jordan shoots his daughter's laptopThe man who shot his daughter's laptop and posted the video of it on YouTube just happens to be a solution provider.

Tommy Jordan, CEO of Twisted Networks, Greenville, N.C., said in an exclusive interview with CRN that he may even gain business as a result of the notoriety, adding he's received support from customers, employees and other solution providers since the video went viral. At last count, at least 50 solution providers across the U.S. have reached out to him.

Jordan shot the laptop in an emotional response to his daughter's Facebook post, in which she complained pretty strongly about having to do chores. The video has been viewed more than 28 million times since being uploaded Feb. 8 and clips have been shown numerous times on national television.

Read More - Click Here!

open source PC - stop you being a slave to your hardware

Huang on how his path to building an open source computer started with a childhood fascination with the Apple II and why we need to rediscover open hardware.

When Andrew Huang was eight years old his dad bought a clone of an Apple II PC.

Peering at the maze of circuits inside and the esoteric diagrams in its schematics the young Huang knew this machine was something special.

"The cool thing was the Apple II shipped with schematics and a source code, so it was actually open source in a manner of speaking. It wasn't this closed thing where there was no hope of me understanding it.

"I kept staring at it and I would get books at Radio Shack and from the library and read about it, and eventually all the pieces would fall into place. I could keep peeling that onion until I could get to the core."

 

 

appleiischematics.png

Part of the schematics for the Apple II

 

Huang's diligence paid off and at a time when other kids were focused on getting a high score on Asteroids, he was reading DIY electronics guides in Byte magazine and building add-on cards for the Apple II.

Today Huang, who goes by the nickname 'bunnie', has just drummed up more than $700,000 through the website Crowd Supply for his project to build an open source computer called Novena.

Huang is setting out to create a machine whose inner workings are as transparent as the computer that three decades ago sparked his lifelong interest in creating hardware.

Why make an open laptop? He cites a desire to pass on the pleasure he got from realising it was within his power to modify the machine whose workings had once seemed mysterious.

"I'd be 'Oh my god, I can build my own card for the Apple II'. I'd go to Radio Shack and buy the parts, build little things, plug them in and they'd work. It was satisfying to have that sense that I could, in fact, modify these things, that I wasn't just a slave to the technology.

"That's one of the great messages about open hardware and openness. People can master the hardware, as opposed to being mastered by their hardware."

Unlike off-the-shelf tablets and PCs, whose inner workings remain largely opaque and in some instances sealed inside cases designed not to be opened, the guiding principle for Novena was openness.

Datasheets showing the designs of printed circuit board inside components - from the motherboard through to the battery board - are freely available online. And anyone with the expertise can build firmware for components from source.

Huang's other motive for building the Novena was more personal. As a hardware engineer with a degree in electrical engineering Huang's day job involves building embedded systems, and he and his co-designer xobs wanted to build something that they would use in their everyday lives.

His engineering focus led to the laptop version of the Novena incorporating some pretty unusual extras by consumer standards, such as a field programmable gate array - a piece of hardware whose core logic can reconfigured using software.

The openness of the Novena's design is what makes it easier for Huang or anyone else to customise the machine and graft on creations of their own.

"Say you are a graduate student in geology and you have to do some field studies. You have to carry a big suitcase full of equipment, which includes the laptop and a bunch of discrete components. If you want to integrate that into the laptop it's inaccessible, the laptop is closed and you have to take the screws of the back, you have to reverse engineer the connectors and the schematics and possibly violate some end user license agreements before you can even add things to your hardware."

In contrast the Novena has been designed specifically to be extendable, there is no need to guess at the workings of the open and documented components, the laptop case is easy to open and left almost half empty to leave room for additional boards, and there are no legal barriers to modifying the computer and sharing your designs.

 

novena-desktop-configurationproject-body.jpg

The Novena laptop

 

As for what modifications are possible, a third party company, MyriadRF, has already built a software-defined radio add-on board for the Novena, something that could have applications ranging from collecting telemetry from model rockets to making phone calls. Elsewhere Huang has even suggested the open design would make it easier to spot if someone had tampered with the machine, something it was recently confirmed the US National Security Agency is not above doing.

The Novena has a broad appeal said Huang, and it's for this reason that so many people felt compelled to stump up cash for the crowd-funding campaign.

"There is a group of people who really care about the wider open source aspects, about the security aspects, about the open hardware aspects - so actually the laptop is actually scratching the itch of a fairly large group of people.

"Every person is seeing a different angle that hasn't been met."

The popularity of the Novena, with its open design and ARM-based processor, partly stems from a lack of choice in the mainstream computing market, said Huang.

"The industry has really become very homogenised around x86 and its feature set. You really have just two choices, which is Apple or an x86 Windows-based system and even between those two choices it is fundamentally the same machine on the inside."

With PC hardware platforms standardising, today these machines are increasingly differentiating themselves through the apps and services they offer.

"That's the crux of the problem, because once you've abstracted all the hardware away the guys who make the hardware have lost their differentiation.

"So the guys making the hardware layer are struggling to find reasons to get people to buy their brands, aside from cost and when you're competing solely on cost it clearly hurts your margins."

In contrast, Huang believes opening up a hardware platform provides fertile ground for an ecosystem of custom, third-party hardware to grow around it. Open hardware will likely become increasingly common, as hardware manufactures look for new ways to make their product stand out.

"Opening it up creates a certain appeal, it creates a certain aesthetic, by involving the end-users in customising the hardware they can build brand value."

The folly of the crowd

The Novena isn't the first piece of hardware Huang has designed and manufactured in his professional life. Perhaps the best known product he worked on is the Chumby open source internet appliance.

His experience kept the promises he made in his pitch for the Novena's Crowd Supply campaign rooted in reality.

"I think we would not have succeeded had I not had a fair bit of experience of succeeding and failing in consumer hardware, of knowing the realistic limits of what you can do. If I didn't have an understanding of the design process, was't able to look at the factory and make sure it's manufacturable and have a reality check on the process. It's one thing to conceive your own laptop, it's another to be able to fully execute it."

 

His pragmatic approach has caused some to question the price of the machine and the components used to build it.

andrewhuang.png

Huang decided to make choices in life that make him happy.
 Pauline Ng / Public Domain

"People complain about how expensive it is or how it's not using a faster processor and a bunch of other things, but at the end of the day the reason why it's priced the way it is or the reason why it's constructed that way is I know I can produce it.

"Of course I would love to make it half the price and the campaign would be way more successful but then I wouldn't be able to deliver it to anybody. "

Unlike Novena, ambition too often outstrips reality in crowd-funded projects born on sites like Kickstarter, said Huang.

"The pitfall of a lot of these crowdfunding campaigns is people get overly-optimistic, they don't have the experience, they don't know how hard it is," he said, predicting more failures to come.

"That's a huge danger and that's part of the reason that I went for Crowd Supply and away from Kickstarter. I think Kickstarter has not done a good enough job of vetting hardware projects, there's very low protection for consumers at the end of the day.

"Of course Kickstarter has only hosted a few true failures at this point in time but from my perspective the number of failures in progress worries me."

Prioritising an open hardware design for the Novena also meant compromising in areas like processing performance. For instance the machine runs a Freescale iMX6 CPU, a quad core CPU based on Arm's Cortex A9 design, which is more often found in smartphones and TV set top boxes than powering desktop or laptop computers.

"One of the big things I worried about was whether people would buy-in on what is in many ways an inferior laptop for twice the price. But the good news is that the market has given us some validation that their needs haven't been met by the big players."

#winning

From a personal perspective Huang feels that having the freedom to design his own computer, which he describes as a geek fantasy, and work as an independent hardware engineer for his own business in Singapore is pretty much exactly where he wants to be in life.

We have some base rules like 'We don't work with a..holes'

"I think freedom is underrated by a lot of people. When you work for a large corporation, it's very stable but you don't have a lot of freedom per se, you have a lot of obligations to the overall corporate structure and shareholders.

"The key thing about being independent is you get to do what you want to do.

"We have some base rules like 'We don't work with assholes', even though you may come to us with lots of money if you're just a jerk we'll say 'No' to you. Working with assholes makes your life unhappy and unpleasant. This isn't the optimal outcome for profitability but it's the optimal outcome for my happiness, I can sleep well at night."

Huang puts his philosophy down to a realisation that after getting his phD in electrical engineering from MIT he had spent too long in tech startups pursuing far off future rewards.

"In early parts of my life I was enthralled by the venture capitalists and chasing after money. I thought if I chased after money I could get it and once I had the money I'd focus on being happy. But that just led to an equation of me chasing after money and never getting any, and being unhappy all the time.

"I decided I wasn't getting any younger and it was time to decide 'If I'm not going to choose to be happy now I'll never be happy, so I'll make choices that make me happy'."

Novena's legacy

Part of the reason for the success of the $35 Linux computer the Raspberry Pi has been the community of users that has grown up around the device and created tools, guides and tailored software for the board.

Huang has ambitions to create a similar community around Novena.

"I'm hoping we can create a solid community around the platform and create enough momentum to allow us to do another one. We want to just keep making it better and better and create a model around open hardware for developers that's sustainable."

Beyond Huang's hopes for the future of the device, he is cautiously optimistic the Novena will play its part, however small, in popularising open source hardware design.

"There's a whole bunch of factors at play around the ideology of open source and of sustainable crowd funding. I can't imagine it will be the end of story on that, hopefully it will be part of a much bigger movement. Just trying to take baby steps in that direction is all we can hope for each day."

Just as the Apple II set Huang on his path 30 years ago, perhaps the Novena will inspire a new generation to champion open hardware.

The Novena is available as just the board for $500; an all-in-one desktop for $1,195; a laptop for $1,195; and an heirloom laptop with a hand-crafted wood and aluminium case for $5,000. Boards are expected to ship from November this year, with the other SKUs becoming available over the following six months.

Specifications:

The board

  • Freescale iMX6 CPU
    • Quad-core Cortex A9 CPU with NEON FPU @ 1.2GHz
    • NDA-free datasheet and programming manual
  • Internal memory:
    • Boot from microSD firmware
    • 64-bit, DDR3-1066 SO-DIMM slot
    • SATA-II (3Gbps)
  • Internal ports & sensors:
    • mini PCI-express slot
    • UIM slot for mPCIx mobile data card support
    • Dual-channel LVDS LCD connector with USB2.0 side-channel for a display-side camera
    • Resistive touchscreen controller
    • Stereo 1.1W, 8-ohm internal speaker connectors
    • 2x USB2.0 internal connectors for keyboard and mouse/trackpad
    • Digital microphone (optional, not populated by default)
    • 3-axis accelerometer
    • 3x internal UART ports
  • External ports:
    • HDMI
    • SD card reader
    • headphone + mic port (compatible with most mobile phone headsets, supports sensing in-line cable buttons)
    • 2x USB 2.0 ports, supporting high-current (1.5A) device charging
    • 1Gbit ethernet
  • Fun features:
    • 100Mbit ethernet - dual Ethernet capability allows laptop to be used as an in-line packet filter or router
    • USB OTG - enables laptop to spoof/fuzz ethernet, serial, etc. over USB via gadget interface to other USB hosts
    • Utility serial EEPROM - for storing crash logs and other bits of handy data
    • Spartan-6 CSG324-packaged FPGA - has several interfaces to the CPU, including a 2Gbit/s (peak) RAM-like bus - for your bitcoin mining needs. Or whatever else you might want to toss in an FPGA.
    • High-speed I/O expansion header - useful for implementing a wide variety of functions, from simple GPIO breakouts to high-performance analog data sampling front-ends

All-in-one desktop

Includes the motherboard, with the following case and accessories.

  • Gen-2 hacker case - not for casual home users
    • Injection molded ABS bottom shell
    • Injection molded ABS port farm cover
    • 2x anodised aluminium bezels (one blue in colour, other colour TBD)
    • Unique air spring actuator and latch mechanism
    • Speaker box kit (speaker box + gaskets + 2x speakers + cables + screws)
    • LCD mounting kit
    • SSD mounting kit
    • Rubber non-slip feet
    • Peek Array (array of M2.5 bosses covering the empty space, for mounting your extensions and projects)
    • A selection of metric screws
    • An Allen key and/or screwdriver as required for assembly
  • 13.3-inch amorphous silicon TFT active matrix LCD
    • 1920 x 1080 (Full HD)
    • 166 ppi
    • IPS
    • 350 cd/m2 luminance (max brightness)
    • 700:1 contrast ratio (typ)
    • 14ms Tr, 11 ms Tf (typ)
    • Wide viewing angle: +/- 89 degrees V/H (typ)
  • LVDS to eDP adapter board
    • IT6251 chipset
    • Includes 56-pin flexible PCBA for connecting to main board
    • Includes 30-pin, 250mm long IPEX cable for connecting to LCD
    • Breakouts for USB and 4-wire resistive touchscreen upgrade options
  • Internal accessory connectors
    • 2x USB and power switch PCBA + cables
    • Lid closed detector PCBA

Most components are pre-assembled in the case, including the internal accessory connectors, the motherboard, and eDP adapter board. User assembly required for LCD bezel selection, and for speaker box.

The laptop

All of the components from the desktop version above, plus: Intelligent Battery controller board.

  • SATA-style connector to route power and control signals to the main board
  • Works with battery packs used by most RC enthusiasts
    • Pre-populated with 3S1P balancing tap connector
    • Cheap and easy to buy
    • User can "pick their capacity" - the battery life isn't fixed by design, it's up to the user
  • Classic Molex disk connector for battery connector
    • Requires adapter cable to the RC battery pack
  • Fast-charge capability
    • Rates in excess of 4A
    • Charge a 45Wh 3S1P pack in ~1 hour
    • Active cell balancing
  • Learns your battery pack
    • Over a few charge/discharge cycles, the controller determines the actual capacity of the pack
    • Tracks capacity degradation over time
    • Optimises charging to reduce wear and tear on packs
    • Computes an accurate estimate of remaining battery capacity
  • Statistics reporting
    • SMBus standard power interface
    • Stats such as remaining capacity, charging rate, current discharge rate, voltage, etc. available
  • STM32 master controller
    • Runs ChibiOS
    • Enables autonomous operation when CPU board is powered off
    • Reprogrammable by host CPU, but requires a physical button press to enable programming, as a guard against surreptitious malware insertion
    • Has DAC output to drive an analog panel meter

240 GiB SSD:

  • SATA-II interface (3Gbps)
  • Intel 530 series or equivalent (SanDisk drive in the photos is a throw-away for our dev purposes only, we would not subject end users to such a drive)
  • Full desktop Debian firmware load

Battery pack:

  • 3000mAh 3-cell lithium battery pack
    • 3-4 hours battery life depending on backlight level
    • May improve with firmware tuning of power management functions (measurements done with no CPU throttling, all peripherals powered on even if unused)
  • Manufactured by Turnigy and shipped separately, installed by user
  • User can swap in their own battery pack
  • Cable adapter from Molex to in-line 4mm bullet connector provided

Mechanical dimensions:

  • 330 mm x 225 mm x 27mm to bezel surface (30mm with socket cap screws)
  • 1.36kg (3 pounds) in configuration as pictured

About Nick Heath

Nick Heath is chief reporter for TechRepublic UK. He writes about the technology that IT-decision makers need to know about, and the latest happenings in the European tech scene.