Friday, December 31, 2010

"Effort only fully releases its reward after a person refuses to quit." ~Napoleon Hill http://bit.ly/hAxCPX
One resolution I have made, and try always to keep, is this: To rise above the little things. ~John Burroughs http://bit.ly/gq0cUH
To all my family & friends worldwide: New Year count down is about to begin. Here's sending my choicest blessing of happiness, loud cheers and shouts of joy galore and wishing you a stupendous and wonderful 2011. ~Daniel K http://bit.ly/gxn6DX
"There is no knowledge that is not power." ~ Ralph Waldo Emerson Quotes from The Selected Writings of Ralph Waldo Emerson http://bit.ly/gXbpIm
Believe in self and become awakened. Realize potential and become inspired. Manifest dreams and become who you really are. ~ Louis Lautman http://bit.ly/fboDPy
“ The best place to find a helping hand is at the end of your own arm. ” ~Swedish Proverb http://bit.ly/i2IiJY

Thursday, December 30, 2010

Without a rich heart, wealth is an ugly beggar. ~Ralph Waldo Emerson http://bit.ly/fpHeGB
"Keeping change alive starts with rewarding innovation, risk-taking and creativity." ~Mac Anderson http://bit.ly/fBQDa2
My religion consists of a humble admiration of the illimitable superior spirit who reveals himself in the slight details we are able to perceive with our frail and feeble mind. ~Albert Einstein http://bit.ly/gqVjFy

Wednesday, December 29, 2010

Your imagination is your preview of life's coming attractions. ~ Albert Einstein http://bit.ly/gkUygK
"Life's challenges are not supposed to paralyze you—they're supposed to help you discover who you are." ~Bernice Johnson Reagon http://bit.ly/dUUqSy
"Life is a process of becoming, a combination of states we have to go through. Where people fail is that they wish to elect a state and remain in it. This is a kind of death." ~Anaïs Nin http://bit.ly/gKXoIr
“ We must believe that we are gifted for something, and that this thing, at whatever cost, must be attained. ” ~Marie Curie (1867–1934) French physicist and chemist, two-time Nobel Prize winner http://bit.ly/gG8paT

Tuesday, December 28, 2010

"It's all about people. People matter most. Everybody counts."~Dr. Joe Stowell http://bit.ly/eGFzzP

Monday, December 27, 2010

20 Hot IT Job Markets | ITBusinessEdge.com

You’ll be surprised at some of the cities where IT hiring has picked up in the past year. They might not have the highest numbers of jobs listed on Dice.com, but these areas show the highest rate of IT job growth as of Nov. 1st. It’s interesting to compare them with figures from last March.



Other Sources:

http://www.itbusinessedge.com/slideshows/show.aspx?c=78802


“ The big rewards come to those who travel the second, undemanded mile. ” Bruce Barton (1886–1967) American advertising executive U.S. congressman http://bit.ly/eBjfmr
Only your real friends will tell you when your face is dirty. ~Sicilian Proverb http://bit.ly/hoCv90

50 Best Web Apps of 2010 | Webification

We are approaching the end of another year and this is always the perfect time to recall what happened during the last 12 months. The web world is always lunching new and interesting stuff. It’s actually so many things that sometimes is hard to keep track of it. So based on that we decided to do a list showing you 50 examples of well designed, interesting, useful and cool web apps that were launched during 2010.



Here you will see some really cool initiatives!



Some of them you probably already know, but some may be new to you, so check them out and give these apps a try, I believe you will really like them. ;)


Sunday, December 26, 2010

InstantXchange | Free unique traffic exchange service to increase your website traffic.

InstantXchange, is a manual traffic exchange where you view other member websites and in return they send visits to your website.



1. Sign up - there's no charge

2. Enter your website(s)

3. Start receiving traffic


First God created time; then God created man that man might, in the course of time, perfect himself; then God decided that He'd better create eternity. ~Robert Brault, www.robertbrault.com http://bit.ly/gh28PH
My dog is usually pleased with what I do, because she is not infected with the concept of what I "should" be doing. ~Lonzo Idolswine http://bit.ly/hU1YVy
Read The Daniel K Wentzel Daily ▸ today's top stories are contributed by @jgenzi @gilbsy123 and @ianreeveshttp://t.co/2J9VhkD http://bit.ly/fBsDfr

7 Tips for Succeeding as a Social Media Strategist | SEO News Search Engine Optimization Marketing Tools and Blogs

The role of social media is expanding rapidly and many organizations of all types are trying to stay afloat amidst the changes. Meanwhile, a small group of innovators pulls the industry onward.



In the past few years, the social media marketing role has become increasingly present, leading the way to more strategic social media programs. Enter the social media strategist.



Jeremiah Owyang, an industry analyst at Altimeter Group, a digital strategy consulting firm, recently spoke at the Word of Mouth Marketing Association Summit about the career path of the corporate social strategist, touching on current responsibilities and challenges, as well as the future of the role. His presentation was based on months of research funded by Altimeter, in which 140 enterprise-class social strategists across various industries were interviewed. Other online sources, such as LinkedIn and blogs, were consulted to gather job descriptions, profile work histories and catalog the ebb and flow of new hires in the social media space.



Owyang presented seven key tips for building a successful social media program and focused on how social media strategists can facilitate those successes. Read his tips below and add your thoughts in the comments.



Other sources:

http://seotradenews.com/ten-commandments-social-media/

http://mashable.com/2010/07/24/tips-social-media-marketing-jobs/

http://www.slideshare.net/jeremiah_owyang/career-social-strategist

http://mashable.com/category/linkedin


Saturday, December 25, 2010

Blessed is the season which engages the whole world in a conspiracy of love. ~Hamilton Wright Mabi http://bit.ly/dVwzot

Friday, December 24, 2010

"Sometimes our light goes out but is blown again into flame by an encounter with another human being. Each of us owes the deepest thanks to those who have rekindled this inner light." ~Albert Schweitzer http://bit.ly/hF9oY4
"The most valuable of all education is the ability to make yourself do the thing you have to do when it has to be done, whether you like it or not." ~Aldous Huxley http://bit.ly/iiOOWE
Full Effort Is Full Victory. ~ Mahatma Gandhi http://bit.ly/ii6Pya
You are the master of your own choices and either the beneficiary of or the slave to the consequences. ~ Dr. Leslie Van Romer http://bit.ly/fGLRIb
“ I just like to smile. Smiling's my favorite. ”Buddy the Elf from the film, Elf (2003) http://bit.ly/dVIArw

A techie's Christmas Carol | TR Dojo | TechRepublic.com

A must read for anyone who enjoys IT!



In 2001, TechRepublic blogger Jeff Dray wrote a wonderful, IT-inspired adaptation of Charles Dickens’ holiday classic, A Christmas Carol. This year, I’m republishing it in the TR Dojo blog in the hope that a new generation of IT pros will have a chance to enjoy it. And, like Jeff, I want to wish you all a happy holiday season.



For another IT-themed holiday tale, check out TechRepublic blogger Sterling “Chip” Camden’s, A visit from St. Geek–an adaptation of A Visit From St. Nicholas, also known as ‘Twas the Night Before Christmas.



Other sources: http://blogs.techrepublic.com.com/project-management/?p=277


Wednesday, December 22, 2010

In memeory of Dan Seals (England Dan) February 8, 1948-March 25, 2009 -- I'd Really Love To See You Tonight

Danny Wayland "Dan" Seals (February 8, 1948 – March 25, 2009) was an American musician. The younger brother of Seals & Crofts member Jim Seals, he first gained fame as the "England Dan" half of the soft rock duo England Dan and John Ford Coley, which charted nine pop and adult contemporary singles between 1976 and 1980, including the #2 Billboard Hot 100 hit "I'd Really Love to See You Tonight."



Source: http://en.wikipedia.org/wiki/Dan_Seals

Amplify’d from www.youtube.com

Dan Seals (England Dan) February 8, 1948-March 25, 2009 -- I'd Really Love To See You Tonight
See more at www.youtube.com
 

Just Tell Me You Love Me - England Dan and John Ford Coley

Another great old track by this great duo! This should jolt a few nostalgic memories! Enjoy !the moments

Amplify’d from www.youtube.com





Just Tell Me You Love Me


See more at www.youtube.com
 

10 Disappearing Jobs: Judge - CBS MoneyWatch.com

It may come as no surprise that the job of newspaper reporter is going the way of the buggy whip maker — but the forces of modernity have placed some unexpected occupations on the endangered species list as well. Using statistics from the Bureau of Labor Statistics’ Occupational Outlook Handbook 2010-2011, we identified 10 of the most surprising job categories whose numbers are projected to shrink in the coming years, plus a few that will grow so slowly that you might as well be sending your resume to Irish banks.



Source: http://www.efinancialnews.com/story/2010-11-19/irish-bank-losses


Never allow others to define your potential. ~ Marjorie Brody http://bit.ly/fjE7y8
“ What would life be if we had no courage to attempt anything? ” Vincent van Gogh (1853–1890) Dutch painter http://bit.ly/gPiJs8
"If we take care of the moments, the years will take care of themselves." ~Maria Edgeworth http://bit.ly/fjdNs8
Unless we think of others and do something for them, we miss one of the greatest sources of happiness ~ Ray L. Wilbur http://bit.ly/feEQSk
~ Researchers have discovered that chocolate produces some of the same reactions in the brain as marijuana. The researchers also discovered other similarities between the two but can't remember what they are. ~ Matt Lauer http://bit.ly/hBgEkA
http://tktzgt.alternativemedicinetoreremedieshealth.com http://bit.ly/esE7Jt

Tuesday, December 21, 2010

NASA's Voyager 1 reaches outskirts of the solar system (photos) | TechRepublic Photo Gallery

As NASA's robotic space probe Voyager 1 prepared for launch in August of 1977 on a mission to locate and study the boundaries of our solar system, researchers could only imagined the scope of the project's success.?



?Since its launch on September 5, 1977, Voyager 1 has traveled more than 10.8 billion miles, photographing some of the most spectacular and iconic images of our solar system's planets and moons, and returning stunning pictures of our very own home planet.?



?Here, the Voyager 1 spacecraft, encapsulated in a Centaur Standard Shroud, is hoisted up the gantry to be mated with its Titan-Centaur launch vehicle at Space Launch Complex 41 at Cape Canaveral Air Force Station.?



?Moving at a speed of 10.5 miles per second, the equivalent of more than 38,000 miles per hour, Voyager 1 is now the most distant man-made object from Earth, and last week, after a 33-year journey, it has reached the outer limits of our solar system.


"Patience and perseverance have a magical effect before which difficulties disappear and obstacles vanish." ~John Quincy Adams http://bit.ly/gCy75X
"Nature does not hurry, yet everything is accomplished." ~Lao Tzu http://bit.ly/hq6cEq

Study says computers more harmful to IQ than smoking marijuana | Career Management | TechRepublic.com

What happens if you are a Computer Geek that smokes marijuana as well? Not much hope for you, I suppose? Or maybe the next big Internet app awaits us? Who knows?



I think it's time now for a year end break!


How to Win Arguments - Associated Content from Yahoo! - associatedcontent.com

Persuasive debaters can win arguments using the force of their reason and by the skilful deployment of many handy techniques. Here are some general dos and don'ts to help you win arguments together with some sneaky

tactics to be aware of.



Do.



1. Stay calm. Even if you get passionate about your point you must stay cool and in command of your emotions. If you lose your temper - you lose.



2. Use facts as evidence for your position. Facts are hard to refute so gather some pertinent data before the argument starts. Surveys, statistics, quotes from relevant people and results are useful arguments to deploy in support of your case.



3. Ask questions. If you can ask the right questions you can stay in control of the discussion and make your opponent scramble for answers. You can ask questions that challenge his point, 'What evidence do you have for that claim?' You can ask hypothetical questions that extrapolate a trend and give your opponent a difficulty, 'What would happen if every nation did that?' Another useful type of question is one that calmly provokes your foe, 'What is it about this that makes you so angry?'



4. Use logic. Show how one idea follows another. Demonstrate that your reasons lead to your conclusions. Build your case logically. By the same token look for inconsistencies in your opponent's arguments and use logic to undermine his or her position. If for example they argue that people are overweight because they watch too much television point out that they have not proved a link. Challenge their assumptions and for each of their reasons be ready to ask whether it is relevant, adequate, necessary or sufficient to support the conclusion they draw.



5. Appeal to higher values. As well as logic you can use a little emotion by appealing to worthy motives that are hard to disagree with, 'Shouldn't we all be working to make the world better and safer for our children?'


Monday, December 20, 2010

"Small deeds done are better than great deeds planned." `~Clergyman, Peter Marshall http://bit.ly/eZ28wB
“ If we had no winter, the spring would not be so pleasant; if we did not sometimes taste of adversity, prosperity would not be so welcome. ” `Anne Bradstreet (1612–1672) British-American poet http://bit.ly/dJzEj6
Laughter is an instant vacation! ~ Milton Berle http://bit.ly/eT6Q3J

Hall and Oates - Private Eyes

Certainly brings back a few memories!

Amplify’d from www.youtube.com





Hall and Oates - Private Eyes


See more at www.youtube.com
 

Amazing Spectacle: Total Lunar Eclipse Monday Night

For a few hours on the night of Dec. 20 to Dec. 21, the attention of tens of millions of people will be drawn skyward, where the mottled, coppery globe of our moon will hang completely immersed in the long, tapering cone of shadow cast out into space by our Earth. If the weather is clear, favorably placed skywatchers will have a view of one of nature's most beautiful spectacles: a total eclipse of the moon.


Sunday, December 19, 2010

Make every experience in life vibrantly alive through being and radiating the character of your authentic self. ~ Nicholas Ogden http://bit.ly/dUQxIr

Saturday, December 18, 2010

Resolve to perform what you ought; perform without fail what you resolve. – Benjamin Franklin http://bit.ly/fowFAV

Friday, December 17, 2010

You go Sam! “ One benefit of risking failure: the risk of success. ” Sam Parker (1965 – ) Co-founder of JustSell http://bit.ly/eoQpoH

Thursday, December 16, 2010

10 Top Security Policies from the Knowledge Network | ITBusinessEdge.com

Let's face it, even the most security-aware employees will have a lapse every now and then. Or maybe your company security policy isn't all it can be, and your employees are doing the minimum because they don't know or don't have the inclination to practice safer security measures.



A good security audit will show that most security breaches are preventable. To prevent these breaches, companies need to develop and enforce solid security policy plans. To that end, we’ve collected the top security policies and templates from the IT Business Edge Knowledge Network to give you the tools to begin on your own company policy.



Sources:

http://www.itbusinessedge.com/slideshows/show.aspx?c=83018

http://www.itbusinessedge.com/cm/community/kn/


Wednesday, December 15, 2010

Tuesday, December 14, 2010

What Is PayBox.me? Is it a Scam? <- This is normally my first reaction!

What Is PayBox.me?  Is it a Scam? This is normally my first reaction!



Well! A friend asked me to join and I did a day or so ago, I now have $67.16 which includes two referrals and some survey work. By the way, these are PayBox or PB Dollars.



What's Peculiar About PayBox.me?



What this means is the money currently in your account is in PayBox dollars - as of now worth nothing until they are open to the public. They are in the experimental stage right now and will go public early next year. It is at that point when an actual value will be set to your PB dollars. The value of your PB dollars will change with the market rate set at the time of their opening.



Look at it as a way to help out a start-up company that could be as big as PayPal or eGold. They need people to test their system and they have limited funds right now to pay testers, so they are paying out in PB dollars. They have an honest intention of being a viable company in several months.



So long as you keep an active account by logging in everyday and participating in the surveys designed to get feedback so they can become competitive with other online payment processors, then you will be in line for an actual payment when the company officially opens.



If you are looking for a fast buck, this is not for you. If you are a person who believes in helping out other start-up companies on the principle of helping the little guy, then this is up your alley.



An Hypothesis!



I am not exactly sure how they are doing it, but here goes a(n) hypothesis: It is quite possible that they are using Google AdSense and affiliate networks as well as survey companies to generate funds. They then require you to take surveys every week in order to remain active! For example: The survey company that they are using has already paid me multiple times in my personal capacity prior to my signing up with PayBox.me.



For September 2010 PayBox.me had over 240,000 visitors and for October 2010 over 305,000 visitors. Good job PayBox.me! Nothing wrong with those numbers if you are a start-up in a developmental or experimental phase.



They recently updated the back office with Debit Cards with  all links going to Google AdSense!  Very smart strategy!



Let's Have Some Fun!



Oh and bt the way if you guys will sign up for a FREE EARLY BIRD PayBox.me account I will also receive PB$10.



Let's make PB Dollars! Who knows we may be experimenting with the next PayPal or eGold.



>>> PRESS HERE TO MAKE "25 PAYBOX DOLLARS NOW" <<<



Additional information



According to the terms of service under Account Balances:



"All account balances are held in PayBox currency. PayBox maintains a currency that is autonomous and independent of all nations and governments. The PayBox currency is denominated in dollars and cents (similar to the currency of the United States and over 20 other countries). The PayBox currency is currently in a closed system, and cannot be exchanged or spent. Before long we plan to open our currency to be spent and exchanged just as you can with any other currency. Our plans include person-to-person transactions (via the Internet and over cell phone text messages), integration with merchants and shopping cart systems, debit card transactions (through an issued debit card linked to your account), and more. The value of our currency is estimated to be close to that of the U.S. dollar. As is the case with any currency, once the PayBox currency becomes openly exchangeable, its value as weighted against other world currencies can and will fluctuate due to forces beyond our control."



Source(s):



http://www.paybox.me/terms.php



http://realchristianityandbusiness.com/What_is_PayBox.html



http://answers.yahoo.com/question/index?qid=20100915074657AAnG0Cg
“ Nothing strengthens the judgment and quickens the conscience like individual responsibility. ” ~Elizabeth Cady Stanton (1815–1902) American activist, writer and editor http://bit.ly/ggzSQ0

Are DDoS (distributed denial-of-service) attacks against the law? | Naked Security

It's not pleasant to be on the receiving end of a distributed denial-of-service (DDoS) attack.



Malicious hackers can commandeer thousands of computers around the world, and order them to deluge a website with traffic - effectively clogging it up, preventing others from reaching the site, and bringing the website to its knees.



As I've described before, DDoS attacks are the equivalent of "15 fat men trying to get through a revolving door at the same time" - nothing can move.



In recent days a number of websites have been struck by DDoS attacks, seemingly co-ordinated by supporters of WikiLeaks against firms and websites who they feel have turned their back on the controversial whistle-blowing website.



http://nakedsecurity.sophos.com/2009/08/06/fat-men-revolving-doors/


WikiLeaks – the REAL lessons behind the drama | Naked Security

Everyone out there - consider yourselves on notice about privacy, secrecy, security, encryption, data leakage prevention, and the rest of it.



It's not the data which WikiLeaks leaked, it's the leak of the WikiLeaks data.



Sean Richmond and I explain why, and what that means for you and your business in this podcast:


10 dirty little secrets you should know about working in IT | Tech Sanity Check | TechRepublic.com

Editor’s note: This article was first published in August 2007. It has now been updated and we’ve added a slideshow for those who prefer the visuals.



If you are preparing for a career in IT or are new to IT, many of the “dirty little secrets” listed below may surprise you because we don’t usually talk about them out loud. If you are an IT veteran, you’ve probably encountered most of these issues and have a few of your own to add — and please, by all means, take a moment to add them to the discussion. Most of these secrets are aimed at network administrators, IT managers, and desktop support professionals. This list is not aimed at developers and programmers — they have their own set of dirty little secrets — but some of these will apply to them as well.



You can also view this list as a slideshow.

http://content.techrepublic.com.com/2346-13416_11-490857.html


Monday, December 13, 2010

The Cost of Insecurity | CTO Edge

When times were good, malware attacks were pretty much the cost of doing business. They happened from time to time, but nobody ever really considered their real impact on the business.



Now that times are tough and the number of zero-day malware attacks have increased, the operational costs of security are becoming a much bigger factor.



That’s the primary finding of a survey of 564 IT security managers conducted by The Ponemon Institute on behalf of Lumension, which finds that security issues are becoming a bigger drain on limited IT resources.

The survey also finds that far too many IT organizations don’t have much in the way of control over security policies. Many report either not having any or simply lack the wherewithal to enforce them.



According to Ed Brice, senior vice president for worldwide marketing at Lumension, the study not only highlights the need for more effective policy enforcement, but it also shows that anti-malware software isn’t enough to make the overall IT environment secure. And without additional security measures, IT organizations are incurring significant additional operating expense cleaning up after malware infects their systems.



A comprehensive approach to security should not only include anti-malware software; IT organizations should be deploying application controls, policy-based management systems based on whitelisting techniques and data loss prevention (DLP) systems.



Unfortunately, the majority of the IT organizations surveyed by Lumension have yet to deploy any of these security technologies, even as their operational security costs continue to rise. Worse yet, with the rise of mobile computing in the enterprise, Brice contends that the security will become even more complicated to manage.



Of course, in these tough times, it’s sometimes hard to make a case for additional security investments. But when you start to factor in how much time and expense is being wasted in the aftermath of a malware infestation, suddenly the cost of security doesn’t look nearly as prohibitive.



References:

http://www.ponemon.org/index.php

http://www.lumension.com/


“ If not now, when? ” Hillel (30B.C.–10A.D.) Jewish scholar http://bit.ly/iebGJk
Don't be afraid to try—you never know what you are capable of until you do. ~ Rona Barrett http://bit.ly/grKr72
"A good leader inspires people to have confidence in their leader. A great leader inspires people to have confidence in themselves." ~Anonymous http://bit.ly/gvDbwF
A good plan violently executed now is better than a perfect plan executed next week. ~George S. Patton http://bit.ly/h7d5mc

Sunday, December 12, 2010

How do I use a RAM disk to help speed up disk-intensive applications? | Microsoft Windows | TechRepublic.com

here are certain applications that do an unusual amount of reading and writing data. Under normal operating circumstances, these applications work fine. But what happens when those disk-intensive applications start competing with other applications? When this happens, a serious slowdown can occur. You can prevent those slowdowns with the help of RAM disks.



A RAM disk is basically a special partition of your PC’s memory that has been formatted and configured (via a special application) to be used as a high-speed target for data reading and writing. These RAM drives are significantly faster than traditional storage, so those applications will see a noticeable boost. Let’s take a look at the process of creating a RAM drive in Windows for this purpose.



http://blogs.techrepublic.com.com/window-on-windows/



This blog post is also available in PDF format in a TechRepublic download.


Saturday, December 11, 2010

Video: If | Bread - simply beautiful

Nostalgic and beautiful

Amplify’d from www.youtube.com
 

Video: If | Bread - simply beautiful

Nostalgic and beautiful

Amplify’d from www.youtube.com
 

Procrastination is the bad habit of putting off until the day after tomorrow what should have been done the day before yesterday. ~Napoleon Hill http://bit.ly/eVU8aJ
The past was once the future which we made up as we went along. If you don't like where you've been, then change where you're going! ~ Tim Hutchinson http://bit.ly/eF1CDG
The greatest dangers to liberty lurk in insidious encroachment by men of zeal, well-meaning but without understanding. ~Louis D. Brandeis http://bit.ly/eL2Xx1
Men fight for liberty and win it with hard knocks. Their children, brought up easy, let it slip away again, poor fools. And their grandchildren are once more slaves. ~D.H. Lawrence, Classical American Literature, 1922 http://bit.ly/eCBWxe
Many politicians are in the habit of laying it down as a self-evident proposition that no people ought to be free till they are fit to use their freedom. The maxim is worthy of the fool in the old story who resolved not to go into the water till he had learned to swim. ~Thomas Macaulay http://bit.ly/epcjAU
We on this continent should never forget that men first crossed the Atlantic not to find soil for their ploughs but to secure liberty for their souls. ~Robert J. McCracken http://bit.ly/hLIUrv

Ten Online Project Management Mistakes to Avoid | ITBusinessEdge.com

A major transformation is taking place in how organizations use project management software.



Instead of being the sole province of the project managers, the rise of online project management applications heralds a new era of collaboration across the enterprise.



The challenge, of course, is getting the organization to embrace online project management in the first place, so here are some tips to get you started.


Shadow DNS is in the works: Do we need a second Internet? | IT Security | TechRepublic.com

When the Internet was first created under the auspices of academic and military institutions in the United States, part of the design goal was decentralization so that it could survive damage to arbitrary sections of the complete network. A big concern at the time was the ability of the nascent Internet to continue functioning as a whole even after key sites had been destroyed by nuclear attack.



Years later, in a 1993 TIME interview, EFF co-founder John Gilmore said “The Net interprets censorship as damage and routes around it.” This has, to some extent, proven true over the years. When small, regional organizations try to impose censorship controls on segments of the Internet, technology seems to almost magically find ways to bypass those controls.



Gilmore’s quote makes things sound a lot more one-sided than they have appeared to be in recent years, however. China gets a lot of press for its “Great Firewall of China”, by which a lot of Internet traffic available around the world is filtered out of availability for residents of China. Some savvy Internet users find ways to get around the filtering, but many do not — and those who do run the risk of getting in trouble with a government widely recognized to treat peaceful protest as a crime. China has reinforced its international reputation with high profile activities like cracking Google security to gain access to information about dissidents.



http://blogs.techrepublic.com.com/security/?p=2996


Friday, December 10, 2010

Do You Need An Antivirus On An Android Phone? [Geeks Weigh In]

Of the two smartphone platforms (iPhone and Android) which one is yours? We talk about Android here because its open-ended nature is great for tech-heads who want to muck about with their phones. But you may also be wondering if the open-ended nature of Android puts it at risk for a virus.


“ The smallest good act today is the capture of a strategic point from which, a few months later, you may be able to go on to victories you never dreamed of. ” ~C.S. Lewis (1898–1963) Irish writer and scholar http://bit.ly/elXwhB

Top 10 Privacy Issues for 2011 | ITBusinessEdge.com

The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011, according to Proofpoint, Inc., a leading provider of SaaS e-mail security, e-mail archiving and data loss prevention solutions. With more personal information available on the Internet, in everyday consumer applications and stored in corporate databases, risks to consumers and companies will only grow in the next year. In addition, increasing regulations and new laws will force many organizations in 2011 to review their handling of private information and implement new programs to minimize their risks. To deal with these increasing threats and obligations, Proofpoint expects more organizations to create stronger privacy policies and turn to encryption, Web filtering and secure managed file transfer.



Proofpoint predicts the following trends will dominate privacy discussions in 2011:


R-E-S-P-E-C-T: 25 Ways To Show It | By Laurie Weiss, Ph.D.

R-E-S-P-E-C-T: 25 Ways To Show It

Copyright 2004 Laurie Weiss, Ph.D.



Convicted criminals report that their violent behavior was

caused by perceived disrespect.*



Everyone wants to be treated with respect, but respect means

different things to different people. It also means

different things in different cultures, so treating others

with respect often becomes a serious problem. If you want to

avoid offending someone by being disrespectful, you must

think about both what they need and how you act.



Respect sometimes means ...


Thursday, December 9, 2010

Ten Most Dangerous Foods to Eat While Driving | Care2 Healthy & Green Living

By Health Watch Center via DivineCaroline



Have you ever thought how dangerous it might be to have to concentrate on opening a candy bar while you are driving? Or, have you ever been sitting at a stoplight and watched the dad in the minivan next to you unwrap six junior cheeseburgers for the kids in the car seats behind him?



According to car insurance companies around the country, there are indeed specific types of food that are considered more dangerous than others. These types of food are considered dangerous because you are more likely to rear end someone if you are eating (or drinking) them while driving. There are also specific types of food that if you’re eating, your reaction time may be slower than at other times.



We have compiled a list of the ten most dangerous foods to be eating while driving. Maybe it will save you on your car insurance, but it will for sure save you on cleaning up a mess in your car.





Read more: http://www.care2.com/greenliving/ten-most-dangerous-foods-to-eat-while-driving.html#ixzz17d1Wu1bc


“ Never give in, never give in, never, never, never, never. ” Sir Winston Churchill (1874–1965)British prime minister during WWII http://bit.ly/g63QlI
Don’t ask yourself what the world needs, ask yourself what makes you come alive. And then go and do that. Because what the world needs is people who are alive. ~Howard Thurman http://bit.ly/gPFheA
Happiness is not a reward – it is a consequence. Suffering is not a punishment – it is a result. ~Robert Ingersoll http://bit.ly/f42adU

Wednesday, December 8, 2010

Android 2.3 'Gingerbread': Feature list, screenshots, and video | Tech Sanity Check | TechRepublic.com

On Monday, Google officially unveiled the next version of Android, codenamed “Gingerbread” (version 2.3). Here is a list of new features, as well as screenshots and video.


Video: How to wipe a hard disk with DBAN | TR Dojo | TechRepublic.com

Any time a hard drive leaves your possession, whether you’re recycling, reselling, or returning it to the manufacturer, you should securely delete the data it contains. In this week’s TR Dojo episode, I show how to use Darik’s Boot And Nuke (DBAN) hard disk wiping utility. It’s recommended by lots of TechRepublic members, and best of all, it’s free.


Sunday, December 5, 2010

Saturday, December 4, 2010

“You will be the same five years from now as you are today except for two things: the people you meet and the books you read.” ~Mac McMillan http://bit.ly/dSjC15
"Our greatest glory is not in never falling but in rising every time we fall." ~Confucius http://bit.ly/ev7hUK

Survey: Apple and ASUS win in PC reliability, Dell and HP lose

Makes you think!

Survey: Apple and ASUS win in PC reliability, Dell and HP lose

  • Date: December 3rd, 2010
  • Author: Jason Hiner

The public has spoken about the laptop and desktop computers that are the most durable and offer the best support. The big winner is Apple, which isn’t a surprise since it’s the company most focused on building premium machines and offering premium service options (with a price tag to match). The big winner among Windows PC makers was Korean upstart ASUS. Meanwhile, computer giants Dell and Hewlett-Packard got clobbered.

The results come from a new survey of 79,000 users conducted by PC World, which asked five questions about reliability and four questions about service. PC World then aggregated the responses into three ratings:


  • Average

  • Better than average

  • Worse than average

Apple scored “better than average” in all nine categories in desktops and in eight out of nine in laptops. The one area where it scored “average” was in getting failed components replaced in laptops.

ASUS scored “better than average” in five categories for laptops and in two categories for desktops.

US computer giants Dell and Hewlett-Packard scored very poorly, but there was a silver lining for both of them. PC World broke out the product lines into home and business for Dell and HP, and both scored much better for their higher-quality business machines.

For its home product lines, Dell got “worse than average” marks in five out of nine categories for laptops and six out of nine categories for desktops. For HP’s home product lines, the company got “worse than average” for seven out of nine categories in laptops and four out of nine categories in desktops. Both companies got more balanced, mediocre ratings from the public for their business systems as you’ll see in the charts below.

Big takeaway

If you are a small business, do not buy Dell or HP laptops or desktops at retailers such as Best Buy or Office Depot. Those machines are of inferior quality and offer inferior service. If you want to buy a Dell or HP machine, buy it directly from the company over the Web and make sure you purchase a machine from their business lineup and get business-class support. Otherwise, if you do prefer to buy a computer at a retail location then get an ASUS or an Apple machine.

Laptops

Chart credit: PC World

Desktops

Chart credit: PC World

Also read


Jason HinerJason Hiner is the Editor in Chief of TechRepublic and an award-winning journalist. He examines the latest trends and asks the big questions about the technology industry. You can also find him on Twitter, LinkedIn and at JasonHiner.com.


Read more at blogs.techrepublic.com.com
 

“Be good to yourself. Be patient. Be kind. Be forgiving. After all, you’re all you’ve got.” ~Jack Brown Father http://bit.ly/fGA0xo

Thursday, December 2, 2010

Top 10 Privacy Issues for 2011 | ITBusinessEdge.com

The prevalence of mobile devices with personally identifiable location-based information and the increasing use of social media are top concerns for 2011, according to Proofpoint, Inc., a leading provider of SaaS e-mail security, e-mail archiving and data loss prevention solutions. With more personal information available on the Internet, in everyday consumer applications and stored in corporate databases, risks to consumers and companies will only grow in the next year. In addition, increasing regulations and new laws will force many organizations in 2011 to review their handling of private information and implement new programs to minimize their risks. To deal with these increasing threats and obligations, Proofpoint expects more organizations to create stronger privacy policies and turn to encryption, Web filtering and secure managed file transfer.



Proofpoint predicts the following trends will dominate privacy discussions in 2011:



http://www.proofpoint.com/


“Promise yourself to give so much time to the improvement of yourself that you have no timeto criticize others.” The Optimist Creed http://bit.ly/dOLpYH

Windows Small Business Server 2011

Wow! Check out these new offerings from Microsoft. I am really impressed by the Windows Small Business Server 2011 Essentials which is cloud-based. I only have one question for them, will it include Exchange in the cloud?


Wednesday, December 1, 2010

The 12 Scams of Christmas | ITBusinessEdge.com

Consumers would be wise to beware of the most common scams of the season before heading online to book travel and do holiday shopping. McAfee (NYSE: MFE) has revealed the “Twelve Scams of Christmas” – the 12 most dangerous online scams that computer users should be cautious of this holiday season.



“Scams continue to be big business for cybercriminals who have their sights set on capitalizing on open hearts and wallets this holiday season,” said Dave Marcus, director of security research for McAfee Labs. “As people jump online to look for deals on gifts and travel, it’s important to recognize common scams to safeguard against theft during the busy season ahead.”



McAfee advises Internet users to follow these five tips to protect their computers and personal information:



* Stick to well-established and trusted sites that include trust marks (icons or seals from third parties verifying that the sites are safe), user reviews and customer support. A reputable trust mark provider will have a live link attached to its trust mark icon, which will take visitors to a verification website of the trust mark provider.

* Do not respond to offers that arrive in a spam e-mail, texts or instant messages.

* Preview a link’s Web address before you click on it to make sure it is going to an established site. Never download or click anything from an unknown source.

* Stay away from vendors that offer prices well below the norm. Don’t believe anything that’s too good to be true.

* Make sure to use trusted Wi-Fi networks. Don’t check bank accounts or shop online if you’re not sure the network is safe.



McAfee (NYSE: MFE) Reference: http://tiny.ly/14qP


A new philosophy about failure…? | Change your thoughts

Everyday we should be getting better and better with what we do. It is futile to wait for things to be perfect. Perfection takes a lifetime!


Video: Safely edit the Windows Registry with these five tips | TR Dojo | TechRepublic.com

Editing the Windows registry is sometimes the quickest way to fix a problem or tweak the operating system to meet your needs. But unless you follow a few safety practices, it can also be a quick route to disaster. During this episode of TR Dojo, I share five tips to help you safely edit the Windows Registry.