How-to Guides>> Cross-Post: Practitioner Guidelines on Conducting Knowledge Audits   
These guidelines were compiled by the participants in the Kuala Lumpur Knowledge Management Roundtable, May 3 2017, hosted by Securities Commission Malaysia. 1. BEFORE THE KNOWLEDGE AUDIT a)Framing: Examine the organisation’s structure, and the distinct functions of each department. Get hold of the department business process workflows. Have preliminary conversations with management to sound them out informally on the idea, identify the pain points and business issues they are concerned about. Make informal observations of the current culture, business processes, and knowledge types being used in the business. Make sure you understand the culture of the organisation, the business environment and ecosystem, as well as current organisational change initiatives under way. Consider the best model of audit, and audit methods to use for that culture and situation. Identify key potential influencers, supporters, partners, naysayers. Speak with potential allies first (e.g. HODs of friendly departments) and socialize them on the knowledge audit concept, seeking their feedback on how it could be made most useful to them. Be clear on the objective of the audit, i.e. what we want to achieve, the potential ROI of the audit, the main issues to address, how it connects to and supports business objectives, who are our stakeholders, who are our sponsors, who are our target audiences and respondents. Consider what label you are going to use for the knowledge audit, appropriate to the organisational culture – (e.g. KM assessment, KM evaluation, knowledge audit, KM audit, knowledge mapping, KM needs analysis, KM planning exercise, etc.). Make sure you have sufficient resources to conduct the audit, scale the audit to your resources. If it is a discovery audit, be sure you have sufficient resources to pursue additional lines of enquiry if new issues come up during the audit. Determine the audit type, and the appropriate audit methods considering your objectives, your capabilities and resources and your organisation culture. Get formal support and buy-in for the audit scoping from senior management – be clear about the level of resources, participation and time required, from them, and from their people. Be clear about the need and benefits of a knowledge audit, the intended goals, desired outcomes, and guiding principles, and be clear about the importance of their role in implementing the recommendations when the audit is complete. Connect the audit to your understanding of the business strategy to show how KM assists the business strategy. Share examples of how similar organisations have used knowledge audits to produce business benefits. Ask them for a clear mandate and for their assistance in nominating the right participants in the audit. If it is a discovery audit, let them know that the activities may change based on issues discovered as the audit progresses. b)Planning: Define what outcomes you want from each step in the knowledge audit process, and identify risks to the outcomes, and mitigation strategies for those risks. Identify constraints that could impact the project plan – e.g. other organisational initiatives, annual cycles of events, holiday periods etc. If you are using an external consultant, identify potential candidates, and scope their work and role in the project. Define the requirements and deliverables. Make sure you have the resources and budget required. Identify the roles and resources required from your own team, and ensure they have the time and capacity to perform their roles. Identify the right respondents for your knowledge audit (based on audit type, and audit goals) – e.g. subject matter experts, department representatives, representatives of different types of staff (functions, levels, years of service). Come up with a detailed project plan and timeline, with major deliverables, completion criteria, all the way from initial communications and preparation to the implementation of audit recommendations. c)Preparing: Identify the major focus areas to explore for surveys, interviews, focus groups. Design the data collection instruments and the workshops, as relevant. Invite the right level of staff – preferably 2-5 years of experience doing the job. Make sure their managers are informed of the invitations, or that the invitations are routed via their managers. If you can, get the main (senior) project sponsor to send out the invitations. Develop a communications package for all the knowledge audit respondents on their required involvement, any preparation, assurances of confidentiality (if relevant), what will be done with their inputs, etc. Communicate to all stakeholders and participants what the audit’s purpose is, what their involvement will be, and what the desired outcomes are. Provide briefing documents for each stakeholder/participant type and each major activity they are involved in – e.g. senior leadership, heads of department, subject matter experts, etc. Run briefing and awareness sessions for stakeholders and participants, on the plan. Prepare the logistics, materials and tools for the audit data collection activities. Consider the venues, and method of collecting data – e.g. recording, transcription, mapping tools, post-its and flip charts. For workshops think about well-lighted rooms, with plenty of wall-space, refreshments, and away from work emails and distractions. For interviews, think about the value of having interviews at the workplace where work artefacts can be pointed out or observed. Learn as much as you can about the participants’ job roles, major functions and work processes in advance of the audit commencement. 2. DURING THE KNOWLEDGE AUDIT Be open to using a variety of methods for collective sensemaking and data gathering: e.g. World Café, anecdote circles. Make sure the people who turn up are properly qualified to give you the data you need – if less experienced or more junior people turn up, go back to their bosses and your original mandate to ask for the right people. Be prepared to keep communicating the purpose, activities and desired outcomes, and to remind participants at every stage in the activity. They will not remember the big picture from one point in the project to the next. Provide handholding and coaching where required on things like mapping activities. For workshops, think of having a main facilitator to drive the whole workshop, and co-facilitators to coach and guide individuals or groups within the workshop activities. Have an experienced facilitator who knows how to deal with cases where participants give push-back and do not want to cooperate. Consider whether you might need an external facilitator/ consultant. Anticipate potential push-back (your initial sensing in the Framing phase will help) and prepare your responses. Document the issues raised by participants during the exercise. Maintain and open mind, and document issues they raise even if you disagree with them or think them unimportant. Use, video, audio, photos, note-taking, maps, mind-maps, transcriptions, etc. Be prepared to go back to them for clarifications on any feedback that is unclear. If creating knowledge asset maps, make sure the business activity and knowledge asset descriptions are documented clearly and as completely as possible. Make sure you validate their contributions back with them once it has been documented. Anticipate potential confusions or errors – e.g. assuming that business activities in a knowledge map are the same as process flows. Try to provide for something of value in the audit activities that they can take back with them and use immediately – e.g. facilitating them towards an awareness of things they can address immediately before waiting for the audit close. This creates buy-in and will support the change management effort later when the post-audit implementation plan is ready. Try to include some elements of fun in workshop activities, as well as food and a pleasant environment. Be clear about what will be documented, how confidentiality will be handled, and make sure you maintain their trust by demonstrating your knowledge of their roles and work areas, and by sticking to the guiding principles and assurances given at the start. Be prepared to deal with sensitivities and doubts about how their input will be used, and what it is for, e.g. if participants do not like to acknowledge risks or gaps, explain the purpose, and adjust the terminology as necessary. Maintain a balance between being knowledgeable about their work (to identify pain points, focus areas and prepare probing questions, and to establish trust and common ground) and being naïve about their work so that you can ask naïve questions. Naïve questions often provide rich insights. Provide regular updates on the progress of the exercise. Be prepared to adjust your audit plan, to add or change audit activities and/or audit methods, to investigate new issues, based on the findings and observations during the audit. 3. AFTER THE KNOWLEDGE AUDIT Analyse the data and prepare the audit report with observations and recommendations. Summarise the key messages and validate if necessary with key respondents. Substantiate findings with verbatim examples and participant inputs in their own words, anonymised if necessary. In your report, focus on the original audit objectives. However, make sure you document and maintain any findings or data discovered in the audit that may be of relevance in the future. Be prepared to produce supplementary reports in the future based on this data to address specific issues that may arise. Review the report with your own internal team first to make sure their insights into the audit process and findings are considered. Be clear about what you want to use the report to achieve. Determine the most important actions to be taken as a result of the audit, focusing on the most important risks, gaps and opportunities, seek senior management endorsement, and develop a detailed implementation plan, with a means of tracking and measuring progress and impact against the plan. Define tangible benefits that you can identify as positive outcomes from the audit. If possible, embed the action plan into the organisation’s annual strategic plan and workplans. Determine the best ways to present and communicate the knowledge audit findings promptly (a) to the participants (b) to the sponsor and stakeholders© to the people responsible for follow up actions and (d) to the organisation at large. Prepare a communications package for each audience and purpose. Consider a range of formats to communicate key points: written report, presentation slides, infographics, video summaries, promotional collateral such as calendars, mousepads, etc. If you have created knowledge maps, make sure you revisit them, refresh them and repurpose them continuously e.g. to track risks, opportunities and gaps addressed, identify and track new activities, as input to taxonomy, as inputs to departments on department level KM activities, etc. Don’t be afraid to keep going back to your data and redeploying it for new purposes. Let people see that it can be a constant reference tool. Do change management. Be prepared to provide continuous support and networking on the follow up activities. Provide tools and automation as necessary, with reasonable maintenance and support costs. For the inputs in this post, our thanks to participants from: •CyberSecurity Malaysia •INCEIF •JKR •MTDC •PETRONAS •Securities Commission Malaysia •Straits Knowledge and Ghazali Mohamed Fadzil. Do please feel free to comment if you would like to add or modify any guidelines.
          Blog>> Practitioner Guidelines for Knowledge Audits   
These guidelines were compiled by the participants in the Kuala Lumpur Knowledge Management Roundtable, May 3 2017, hosted by Securities Commission Malaysia. 1. BEFORE THE KNOWLEDGE AUDIT a)Framing: Examine the organisation’s structure, and the distinct functions of each department. Get hold of the department business process workflows. Have preliminary conversations with management to sound them out informally on the idea, identify the pain points and business issues they are concerned about. Make informal observations of the current culture, business processes, and knowledge types being used in the business. Make sure you understand the culture of the organisation, the business environment and ecosystem, as well as current organisational change initiatives under way. Consider the best model of audit, and audit methods to use for that culture and situation. Identify key potential influencers, supporters, partners, naysayers. Speak with potential allies first (e.g. HODs of friendly departments) and socialize them on the knowledge audit concept, seeking their feedback on how it could be made most useful to them. Be clear on the objective of the audit, i.e. what we want to achieve, the potential ROI of the audit, the main issues to address, how it connects to and supports business objectives, who are our stakeholders, who are our sponsors, who are our target audiences and respondents. Consider what label you are going to use for the knowledge audit, appropriate to the organisational culture – (e.g. KM assessment, KM evaluation, knowledge audit, KM audit, knowledge mapping, KM needs analysis, KM planning exercise, etc.). Make sure you have sufficient resources to conduct the audit, scale the audit to your resources. If it is a discovery audit, be sure you have sufficient resources to pursue additional lines of enquiry if new issues come up during the audit. Determine the audit type, and the appropriate audit methods considering your objectives, your capabilities and resources and your organisation culture. Get formal support and buy-in for the audit scoping from senior management – be clear about the level of resources, participation and time required, from them, and from their people. Be clear about the need and benefits of a knowledge audit, the intended goals, desired outcomes, and guiding principles, and be clear about the importance of their role in implementing the recommendations when the audit is complete. Connect the audit to your understanding of the business strategy to show how KM assists the business strategy. Share examples of how similar organisations have used knowledge audits to produce business benefits. Ask them for a clear mandate and for their assistance in nominating the right participants in the audit. If it is a discovery audit, let them know that the activities may change based on issues discovered as the audit progresses. b)Planning: Define what outcomes you want from each step in the knowledge audit process, and identify risks to the outcomes, and mitigation strategies for those risks. Identify constraints that could impact the project plan – e.g. other organisational initiatives, annual cycles of events, holiday periods etc. If you are using an external consultant, identify potential candidates, and scope their work and role in the project. Define the requirements and deliverables. Make sure you have the resources and budget required. Identify the roles and resources required from your own team, and ensure they have the time and capacity to perform their roles. Identify the right respondents for your knowledge audit (based on audit type, and audit goals) – e.g. subject matter experts, department representatives, representatives of different types of staff (functions, levels, years of service). Come up with a detailed project plan and timeline, with major deliverables, completion criteria, all the way from initial communications and preparation to the implementation of audit recommendations. c)Preparing: Identify the major focus areas to explore for surveys, interviews, focus groups. Design the data collection instruments and the workshops, as relevant. Invite the right level of staff – preferably 2-5 years of experience doing the job. Make sure their managers are informed of the invitations, or that the invitations are routed via their managers. If you can, get the main (senior) project sponsor to send out the invitations. Develop a communications package for all the knowledge audit respondents on their required involvement, any preparation, assurances of confidentiality (if relevant), what will be done with their inputs, etc. Communicate to all stakeholders and participants what the audit’s purpose is, what their involvement will be, and what the desired outcomes are. Provide briefing documents for each stakeholder/participant type and each major activity they are involved in – e.g. senior leadership, heads of department, subject matter experts, etc. Run briefing and awareness sessions for stakeholders and participants, on the plan. Prepare the logistics, materials and tools for the audit data collection activities. Consider the venues, and method of collecting data – e.g. recording, transcription, mapping tools, post-its and flip charts. For workshops think about well-lighted rooms, with plenty of wall-space, refreshments, and away from work emails and distractions. For interviews, think about the value of having interviews at the workplace where work artefacts can be pointed out or observed. Learn as much as you can about the participants’ job roles, major functions and work processes in advance of the audit commencement. 2. DURING THE KNOWLEDGE AUDIT Be open to using a variety of methods for collective sensemaking and data gathering: e.g. World Café, anecdote circles. Make sure the people who turn up are properly qualified to give you the data you need – if less experienced or more junior people turn up, go back to their bosses and your original mandate to ask for the right people. Be prepared to keep communicating the purpose, activities and desired outcomes, and to remind participants at every stage in the activity. They will not remember the big picture from one point in the project to the next. Provide handholding and coaching where required on things like mapping activities. For workshops, think of having a main facilitator to drive the whole workshop, and co-facilitators to coach and guide individuals or groups within the workshop activities. Have an experienced facilitator who knows how to deal with cases where participants give push-back and do not want to cooperate. Consider whether you might need an external facilitator/ consultant. Anticipate potential push-back (your initial sensing in the Framing phase will help) and prepare your responses. Document the issues raised by participants during the exercise. Maintain and open mind, and document issues they raise even if you disagree with them or think them unimportant. Use, video, audio, photos, note-taking, maps, mind-maps, transcriptions, etc. Be prepared to go back to them for clarifications on any feedback that is unclear. If creating knowledge asset maps, make sure the business activity and knowledge asset descriptions are documented clearly and as completely as possible. Make sure you validate their contributions back with them once it has been documented. Anticipate potential confusions or errors – e.g. assuming that business activities in a knowledge map are the same as process flows. Try to provide for something of value in the audit activities that they can take back with them and use immediately – e.g. facilitating them towards an awareness of things they can address immediately before waiting for the audit close. This creates buy-in and will support the change management effort later when the post-audit implementation plan is ready. Try to include some elements of fun in workshop activities, as well as food and a pleasant environment. Be clear about what will be documented, how confidentiality will be handled, and make sure you maintain their trust by demonstrating your knowledge of their roles and work areas, and by sticking to the guiding principles and assurances given at the start. Be prepared to deal with sensitivities and doubts about how their input will be used, and what it is for, e.g. if participants do not like to acknowledge risks or gaps, explain the purpose, and adjust the terminology as necessary. Maintain a balance between being knowledgeable about their work (to identify pain points, focus areas and prepare probing questions, and to establish trust and common ground) and being naïve about their work so that you can ask naïve questions. Naïve questions often provide rich insights. Provide regular updates on the progress of the exercise. Be prepared to adjust your audit plan, to add or change audit activities and/or audit methods, to investigate new issues, based on the findings and observations during the audit. 3. AFTER THE KNOWLEDGE AUDIT Analyse the data and prepare the audit report with observations and recommendations. Summarise the key messages and validate if necessary with key respondents. Substantiate findings with verbatim examples and participant inputs in their own words, anonymised if necessary. In your report, focus on the original audit objectives. However, make sure you document and maintain any findings or data discovered in the audit that may be of relevance in the future. Be prepared to produce supplementary reports in the future based on this data to address specific issues that may arise. Review the report with your own internal team first to make sure their insights into the audit process and findings are considered. Be clear about what you want to use the report to achieve. Determine the most important actions to be taken as a result of the audit, focusing on the most important risks, gaps and opportunities, seek senior management endorsement, and develop a detailed implementation plan, with a means of tracking and measuring progress and impact against the plan. Define tangible benefits that you can identify as positive outcomes from the audit. If possible, embed the action plan into the organisation’s annual strategic plan and workplans. Determine the best ways to present and communicate the knowledge audit findings promptly (a) to the participants (b) to the sponsor and stakeholders© to the people responsible for follow up actions and (d) to the organisation at large. Prepare a communications package for each audience and purpose. Consider a range of formats to communicate key points: written report, presentation slides, infographics, video summaries, promotional collateral such as calendars, mousepads, etc. If you have created knowledge maps, make sure you revisit them, refresh them and repurpose them continuously e.g. to track risks, opportunities and gaps addressed, identify and track new activities, as input to taxonomy, as inputs to departments on department level KM activities, etc. Don’t be afraid to keep going back to your data and redeploying it for new purposes. Let people see that it can be a constant reference tool. Do change management. Be prepared to provide continuous support and networking on the follow up activities. Provide tools and automation as necessary, with reasonable maintenance and support costs. For the inputs in this post, our thanks to participants from: •CyberSecurity Malaysia •INCEIF •JKR •MTDC •PETRONAS •Securities Commission Malaysia •Straits Knowledge and Ghazali Mohamed Fadzil. Do please feel free to comment if you would like to add or modify any guidelines.
          Another networking puzzle   

After all the michegas about AT&T last week, I decided to order a second Internet connection. I was pretty happy with their high speed DSL, but if they're going to gang up on customers with the record industry, I want to be sure I have an exit planned out.

So I ordered a Comcast network interface. It should arrive in a few days.

The question is can I have both network interfaces running on the same LAN?

I was thinking if I plug the Comcast box into a G4 desktop that has two Ethernet jacks, while the other is plugged into the big switch I bought a few weeks ago (and it's working great, btw) that's connected into the DSL line, that somehow all my computers would be on both nets at the same time?

I figured some of the network gods tuned into this station may have some ideas.

Is there any way to make use of two net connections on one LAN? Or does it necessarily mean two separate local nets?

Comment here, please.

And sorry for destroying our culture, Andrew. smile

          Getting the most out of your internship...   
A part of it...but hopefully not the whole thing.

Hi gang.

We have a guest post for you today (two posts in two days - I'm as shocked as you). The very kind Lauren Ingram has written a post about her experiences as an intern, and offers tips for you lot about how to turn yours into a permanent job.

Getting the most out of your internship
by Lauren Ingram

If you’ve wangled an internship at an agency, make sure you give them a reason to keep you on, or invite you back after uni. It's all about making yourself invaluable.

I was on the IPA Ad School in 2011 in Client Services/Planning, and subsequently stayed on as a copywriter intern – this trial period was worth doing as I’m not quite cut out for Creative! So to distil some things that I learned the hard way…

Know what questions to ask and when to ask them: being curious is a positive trait in adland but don’t be a nuisance. Anything you could find out online – find it out online. Learn as much as you can about what a planner does, what an account handler does, and so on, and get to know your agency's campaigns in detail. This is still important even though you've got the internship now. Many agencies subscribe to Campaign mag as well as other titles, so borrow these during your lunch breaks to stay up to date.

Ask more about the projects your colleagues are working on. You get a better idea of what they actually do all day (and it’s not reorganising the stationery cupboard) and you can offer more relevant help this way. I often found myself asking “is there anything else I can do to help?” and this is fine, but what would be more useful for them is offering help on a specific task. For example, your agency is positioning a brand’s loyalty card, offer to do research into what other brands are doing in this area. Of course, your colleagues might have already done it, but it makes your mentor’s life easier if they don’t have to ‘invent’ tasks for you.

Make good use of empty time: As an intern you probably have more time on your hands than others in the business. Make use of it. Offering everyone tea won't build your skills but it does give you a chance to speak to more people. Also, read your company's blog and decide whether you could write something decent for it. There may be longer thoughtpieces by senior members of staff, but there may also be shorter pieces by other staff members on relevant news in adland. For example, at certain times of year (Christmas, Valentine's Day, around the Olympics, etc) there will be a flurry of advertising activity and you could do a round-up of some of the best ads during that period, or an emerging theme you have noticed within them. Ask who looks after the company blog, then ask them if your submission sounds suitable - they're usually always looking for more content to show how switched on the agency and its employees are. 

Also look at their Twitter feed, find some interesting links that you think would be suited to their style, then find out who manages it (more networking!) and pass on the links with a very short blurb for each. You could offer to manage the Twitter feed - the New Business/Marketing department probably looks after it - but they might say no as many a Twitter disaster is caused by a rogue intern. 

A last suggestion would be to ask to attend as many meetings as possible. Sometimes they will only want to have those who absolutely need to be there, so don't be offended if they say no, but for the most part it will give a good impression that you want to get stuck in.

All in all, it's a bit of a balancing act, making yourself memorable without getting in people’s way (and I still haven’t perfected it) but it might be the thing that gets you a Real Job.

Good luck!

Thank you, Lauren. Much appreciated.
          Avoid Paid Featured Directory Listing and Sitewide Links   
Getting backlinks from the free sources are always beneficial for a website and helps a website to get rank well in search engines. If you want to purchase links be careful specially when you want to purchase paid directory listing. I advice stop buying paid links and its better to buy quality content and publish it on your blog.

The search engine giant, Google can easily identify your unnatural link activity even these directories offers free submission. The reason is simple. Google sending link voilation messages to the webmasters through google webmaster tools. Google easily identifies it through sitewide links or the common navigation or footer section where a website's link is placed and this link is found in more than 100 of pages in the same website.

Say No to Sitewide Link or Featured Section

A month ago, I also purchased the paid spots in three directories and got email from google a week ago. When I checked my google webmaster tool, I found more than 2500 links are coming to my site from these three directories. I still see digitalpoint and other webmasters forums where webmasters sell or purchase links without any fear.

The Best Link Building Strategies After Google Panda and Penguine Updates :

  • Publish not less than 350 words unique content. Link your keyword inside the content with the relevant page.
  • Avoid reciprocal link building in bulk, sitewide links and links under featured section.
  • Donot make more than 15-20 links a day.
  • Rely on free source of backlinks - Directories, Articles, Social Bookmarks.
  • Focus more on contextual links from relevant sites/blogs only.
  • Utilize the power of social networking sites - Facebook, Twitter, etc.
  • A new website owner should keep patience and start link building atleast after 3 months.

          The Impact of Social Media on SEO   
In the community of SEO, there are some conflicts of opinions over the topic "Impact of social media on SEO". Some members believe that there is surely an impact on the search engine pages ranks. Today many social media websites used by all the population over the world. Of course it is more seen in urban areas. Every person has an account on FaceBook or Twitter or MySpace. Looking at this fact, more population is available on social networks; why not use it for the purpose of marketing? So a link given on a popular blog can carry equal SEO rank as that of the link given on FaceBook page. Let's discuss the same topic here in this article in details.

In the field of Search Engine Optimization, the link building process is very important. The links pointing to your website which originate from other popular website carry lot of weight in deciding the PageRank of your website. In the same way, social media sites are also very attractive. When a link posted by you is seen by many of your potential customers and also can be carried forward to many more. All the pages on social media websites are indexed and therefore they prove to be very important in gaining good ranks. So we can say that there is surely an impact of social media on SEO.

Getting associated with social networking websites is not a very tedious job. Anyone can register with a genuine email address and set up fan pages on FB. You should try to find social site with more niche approach. This way you can target and become active on hundreds of niche websites. If you seek properly, you can get connected to various groups on social media which are associated to particular industry or area. This gives you access to all the other people or we can say potential customers connected in the group.

When talking of social media, a small hint about URL shortners will come handy. URL shortners are always present on social media, especially on Twitter. They prove to be a very good tool to shorten the URL by keeping the main anchor texts intact. If the URL shorter is not keeping the anchor tag same as original one, then the source page or website might not get ranked properly. You should prefer some paid URL shorteners which keep the anchor href tag intact while shortening it.
          Important measures to avoid mistakes while dealing with link building   
It has been seen that people tend to make many mistakes while making efforts to boost up the page rank of their respective websites.

Such mistakes are pretty common mistakes and made by almost everybody who tries to up lift the page rank. It is very important to learn from those mistakes and never repeat them. Here are some important Search engine optimization mistakes one must always avoid.

Excess use of Keyword:
It is very important to use keyword as they help achieving optimization as per the search engine requirement. But one must avoid excessive use of keywords. It is a misconception that if keyword is used many times it will result in better page rank. It is advisable to keep in mind that search engines do not blindly follow the keywords they have set algorithm to track the genuine contents. There is a possibility of getting penalized with excessive keyword use. if you wish to have better rank and good optimization in terms of search engines then always use fresh content with appropriate use of key words.

Index without Page rank:
It is a wide spread misconception among people that if page is indexed then its page rank will automatically get increased by search engine. What they fail to realize that there are some very basic optimization techniques which can help increasing page rank. How ever hard you try to make your site better to get higher page rank but if it is not optimized properly then you will never get the desired results.

Social media is not enough:
Over the years social networking sites have gained tremendous popularity, they are not only famous but carry millions of fan following as well, for example face book, orkut and twitter. Major reason for such massive spread is that they hit the target bang on right and sing the right chord of emotions. They play good role getting traffic but not good for back links. They ends up getting you no follow back links. Thus start looking for more meaningful sources to get good traffic and back links.

Unethical link building:
there is no short cut to success. Always avoid unethical promoters who promise you to get fast and useful links in jiffy. You may encounter sudden rise in page rank due to links but they are unethical links could result is penalizing your site or permanently banning it.
          Learn of the adapted strategies and Access SEO's Anatomy on their Campaigns   
Social media are primarily Internet- and mobile-based accoutrement for administering and discussing admonition amidst beastly beings. Unlike automatic media, adequate media is about cheaper for anyone to advertisement or accepting admonition accepting automatic media issues may board big-ticket columnist or a government-granted spectrum license. Because of the accepting of adequate media sites, it additionally became the centermost of online business they anxiety adequate media optimization.

Abounding accepting get submitted every day, but abandoned the best Dugg accepting appear on the avant-garde page. Abounding actualization access contributed to authentic Delicious one of the best acclimatized adequate book marking services.
Learn of the adapted strategies and access SEO's anatomy on their campaigns. Technorati is an Internet hunt abettor for analytic blogs, advancing with Google and Yahoo. Technorati looks at tags that author’s access placed on their websites. The armpit has argument areas in which users may altercate the accustom links and vote for or abut others' comments. Aback there are abounding votes abutting an acclimatized comment; it will not be displayed by default, although a clear-sighted can affectation it through a delivery or preference. Wikipedia is a free, multilingual anthology activity authentic by the non-profit Wikimedia Foundation. No article is age-old by its artist or any added editor, or is vetted by any acclimatized authority. Visit an online SEO Philippines armpit to amateur added about the adapted activity taken on an SEO campaign.

Yahoo! Answers has become the added best acclimatized Internet advertence armpit afterwards Wikipedia, according to Comscore. Newsvine is a community-powered annual website which draws adequate from its users and affiliated adequate from boilerplate sources such as The Associated Press. Users can abode articles, drupe links to conflicting content, and altercate annual items submitted by both users and able journalists.

Flickr is an angel and video hosting website, web casework suite, and online affiliation platform. It was one of the age-old Web 2.0 applications. In accretion to achievement an acclimatized Web armpit for users to allocation claimed photographs, the annual is broadly acclimated by bloggers as a photo repository.

YouTube is a video administering website breadth users can upload actualization and allocation video clips. With it’s accessible to use interface, YouTube bogus it accessible for anyone who could use a computer to cavalcade a video that millions of bodies could watch aural a few minutes. For added admonition about what adequate media sites do to admonition in an SEO effort, afresh arrangement an online SEO Philippines armpit for added details. It is a abandoned advancement abettor which uses accessory and social-networking principles. Web pages are presented aback the user clicks the "Stumble!" button on the browser's toolbar.
          Generating Traffic Through Keywords   
Keywords are probably the most important factor to establishing a successful website. When you visit your favorite search engine, their software is using Keywords to decide what websites to show you and in what order to display them on the search results. To a webmaster, profiting off of the popularity of their website through online advertising, keywords are very important indeed.

When a search engine is deciding what website to display, it is reviewing millions of sites at once, and is searching for the proper optimization of keywords to decide which pages will be listed first. Obviously the first page of results in the search engine is going to be the most visited by traffic searching for the applicable topic. There is understandably quite a large amount of competition for these spots. The only get your page to top the list is to use Keywords efficiently and correctly.

When using Keywords, generally 10-15 targeted words are chosen to base the site’s content around. These keywords should be the words that potential site visitors would use on the search engine.

Another way of generating traffic through keywords is by creating your keyword-heavy content as an article on social networking sites, including links to your website. Another way the search engine determines page ranking in the search results is by the number of “back links” a site has. Back links are links posted on other web pages that will redirect the user to your site. The more back links a site has, the more traffic it can expect.

Keywords can definitely increase the amount of traffic coming to your website or Blog if done correctly. It should be stressed that keywords can be overused within content and can be neglected by search engines if no real content is present. When used properly though, keywords can drive more traffic to your site than any other method. In the end though, Keywords are only as useful as the content they are in. Successful websites have unique and well-written content. Keywords only add onto the value of your websites content.
          Local Real Estate Investor Meetings in July 2017   

Reading Time: 5 minutesNetworking is a real estate investor’s key to success! Through meeting other real estate investors, you learn about deals, financing options, and often you can even find your next deal. This month we added TWO brand new markets: Memphis and Detroit. Make sure to let us know of any other clubs or meetings we may have...

The post Local Real Estate Investor Meetings in July 2017 appeared first on MyHouseDeals Blog.

          Time for people skills! Artificial Intelligence can do the rest   
People Skills (creativity, social networking, collaboration) are set to continue increasing their relevance within work contexts in with Artificial Intelligence is rapidly going to take over many of the tasks currently part of management today. An very interesting and self-explanatory video.
          Joining a Retweet Group #repost from @lisasheaauthor   
The following is a repost from here.

You see the value of retweets - but how do you get them? Having a retweet group you participate in can easily get you thousands of additional views on each tweet you make. Here's how it works.

Let's say I'm an author and I make a post to promote one of my books. The post looks like this.

Joining a Retweet Group

Some of those hashtags make general sense. The #FREE, #FreeEbook, and #FreeBook catch the attention of people out there looking for free stuff. The #YoungAdult, #Dystopian, and #Western categories draw in readers of those genres.

But what is #CR4U and #IARTG?

Read the rest of this post here.

          06/30/17: Defence of dissertation in the field of Communications Engineering, M.Sc. Petteri Kela   
The title of thesis is “Continuous Ultra-Dense Networks - A system level design for urban outdoor deployments”

Opponent: Professor Antti Tölli, University of Oulu

Supervisor: Professor Riku Jäntti  Aalto University School of Electrical Engineering, Department of Communications and Networking

Dissertation website

Contact information
Petteri Kela, p. 050 4822372,
Kukkolankatu 4, 20780 Kaarina

          ISP 2 LINE = 1 LINE GAME + 1 LINE BROWSING   
Skema setting Mikrotik pada warnet yang mepet bandwith, Anda bisa mencoba memisahkan bandwith supaya terjadi sirkulasi yang maksimal di jaringan Anda. Salah satunya adalah memisahkan antara browsing download upload dan game.

settingan game Point Blank
masukan pada Ip>Firewall>Mangle

add chain=game action=mark-connection new-connection-mark=Game passthrough=yes protocol=tcp dst-address= dst-port=39190 comment=�Point Blank
add chain=game action=mark-connection new-connection-mark=Game passthrough=yes protocol=udp dst-address= dst-port=40000-40010
add chain=game action=mark-packet new-packet-mark=Game_pkt passthrough=no connection-mark=Game
add chain=prerouting action=jump jump-target=game
setingan Game Poker
masukan di Ip>Firewall>Mangle

add chain=forward action=mark-connection new-connection-mark=Poker_con passthrough=yes protocol=tcp dst-address-list=LOAD POKER comment=�fbpoker�
add chain=forward action=mark-connection new-connection-mark=Poker_con passthrough=yes protocol=tcp
add chain=forward action=mark-packet new-packet-mark=Poker passthrough=no connection-mark=Poker_con

setingan Browsing
masukan di Ip>Firewall>Mangle

add chain=forward action=mark-connection new-connection-mark=http passthrough=yes protocol=tcp in-interface=WAN out-interface=Lan packet-mark=!Game_pkt connection-mark=!Game connection-bytes=0-262146 comment=�browsing�
add chain=forward action=mark-packet new-packet-mark=http_pkt passthrough=no protocol=tcp connection-mark=http
add chain=forward action=mark-packet new-packet-mark=http_pkt passthrough=no protocol=tcp connection-mark=http

setingan Upload
masukan di Ip>Firewall>Mangle

add chain=prerouting action=mark-packet new-packet-mark=Upload passthrough=no protocol=tcp src-address= in-interface=Lan packet-mark=!icmp_pkt comment=�upload�

setingan Limit Download
masukan di Ip>Firewall>Mangle

add chain=forward action=mark-connection new-connection-mark=Download passthrough=yes protocol=tcp in-interface=WAN out-interface=Lan packet-mark=!Game_pkt connection-mark=!Poker_con connection bytes=262146-4294967295 comment=�limit download�
add chain=forward action=mark-packet new-packet-mark=Download_pkt passthrough=no packet-mark=!Game_pk> connection-mark=Download

setingan Queue Tree
masukan di Queue>queue types

add name=�Download� kind=pcq pcq-rate=256000 pcq-limit=50 pcq-classifier=dst-address pcq-total-limit=2000
add name=�Http� kind=pcq pcq-rate=1M pcq-limit=50 pcq-classifier=dst-address pcq-total-limit=2000
add name=�Game� kind=pcq pcq-rate=0 pcq-limit=50 pcq-classifier=src-address,dst-address,src-port,dst-port pcq-total-limit=2000
add name=�Upload� kind=pcq pcq-rate=0 pcq-limit=50 pcq-classifier=src-address pcq-total-limit=2000

masukan di queue>simple queue
add name=�Main Browse� parent=Lan limit-at=0 priority=8 max-limit=1M burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Browse� parent=Main Browse packet-mark=http_pkt limit-at=0 queue=Http priority=8 max-limit=1M burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Game� parent=global-total packet-mark=Game_pkt limit-at=0 queue=Game priority=1 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Poker� parent=global-out packet-mark=Poker limit-at=0 queue=Game priority=3 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Download� parent=global-out packet-mark=Download_pkt limit-at=0 queue=Download priority=8 max-limit=256k burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Main Upload� parent=global-in limit-at=0 priority=8 max-limit=256k burst-limit=0 burst-threshold=0 burst-time=0s
add name=�Upload� parent=Main Upload packet-mark=Upload limit-at=0 queue=Upload priority=8 max-limit=0 burst-limit=0 burst-threshold=0 burst-time=0s

Proxy Eksternal

ip firewall nat add chain=dstnat src-address=!IP_PROXYNYA dst-port 80,8080,3128 action dst-nat to-address=IP-PROXY to-ports=3128

2 ISP + 2 Gateway dalam satu Router Mikrotik

by NitrouZ on JUNE 18, 2010 in MIKROTIK, NETWORKING
Beberapa minggu yang lalu, teman saya bertanya topologi yang baik untuk Warnet dan Game Center menggunakan 2 ISP dan 2 Gateway dalam 1 Router. Dalam kasus ini, saya menggunakan Router Board RB750 untuk melakukan pemisahan 2 Gateway. Alasan menggunakan 2 G/w adalah supaya saat user lain melakukan download dan browsing, kegiatan game tidak terganggu dengan adanya pemisahan line browsing dan game :)

Topologinya kira-kira seperti ini :

| (
|------------- RB ---------- CLIENT (
| (

ISP Game menggunakan eth0 (, ISP Browsing menggunakan eth1( dan CLIENT ( menggunakan eth3. Dan untuk default gatewaynya, kita tentukan untuk ISP Game. Kenapa ? Karena port untuk game sangat bervariasi dan kemungkinan besar kita akan repot ke depannya kalau harus listing listen port pada game-game yang berbeda, jadi untuk memudahkan, kita buat default gateway ke ISP Game.

Sekarang kita setting untuk IP Route terlebih dahulu, kira-kira seperti di bawah ini :

/ip route
add dst-address= gateway= comment="Default Gateway"
add dst-address= gateway= routing-mark="Jalur ISP Game"
add dst-address= gateway= routing-mark="Jalur ISP Browsing"
Kemudian kita Setting Rule di mangle supaya masing-masing dari koneksi kita bisa di akses dari luar

/ip firewall mangle
add chain=input connection-state=new in-interface="eth0" dst-address-type="!local" action=mark-connection new-connection-mark="gateway-game-conn"
add chain=input connection-state=new in-interface="eth1" dst-address-type="!local" action=mark-connection new-connection-mark="gateway-browsing-conn"
add chain=output connection-mark="gateway-game-conn" action=mark-routing routing-mark="jalur-game"
add chain=output connection-mark="gateway-browsing-conn" action=mark-routing routing-mark="jalur-browsing"
Konfigurasi Forward rules pada bagian NAT

/ip firewall nat
add chain=dstnat protocol=tcp dst-port=!21,80,443,5050 in-interface=eth0 action=dst-nat to-addresses= to-ports=!21,80,443,5050
add chain=dstnat protocol=tcp dst-port=21,80,443,5050 in-interface=eth1 action=dst-nat to-addresses= to-ports=21,80,443,5050
Selesai! :) Silakan di koreksi kalau ada kesalahan di penulisan format di atas :) Terima kasih

Artikel ini saya kutip dari
All credits to

Salam dari ^_^

          08/08/17: Defence of dissertation in the field of Communications Engineering, M.Sc. (Tech.) Ossi Kaltiokallio   
The title of thesis is “Gaining situational awareness in indoor environments using narrow-band radio signal measurements”

Opponent: Professor Shyam Gollakota, University of Washington, Seattle, USA

Supervisor: Professor Constantin Simovski, Aalto University School of Electrical Engineering, Department of Communications and Networking.

          Acer AS4738-372G50Mn   
Acer Aspire AS4738-372G50Mn
Spesifikasi Laptop Acer AS4738-372G50Mn
  • Processor: Intel® Core i3-370M processor (3 L3 cache, 2.4 GHz, DDR3 1066 MHz, 35 W)
  • Chipset: Mobile Intel® HM55 Express Chipset
  • Memory: 2GB DDR3 1066 MHz memory, upgradeable to 8 using two soDIMM modules
  • Graphics Engine: Intel® Graphics with 128 of dedicated system memory
  • Display: 14″ Acer CineCrystal™ LED-backlit TFT LCD
  • Audio: High-definition audio support
  • Hard Drive: 500GB Serial ATA 5400 RPM
  • Optical Drive: 8X - double-layer drive
  • Networking (Lan) : Gigabit Ethernet
  • Wifi: Acer InviLink™ Nplify™ 802.11b/g/n Wi-Fi CERTIFIED™
  • Bluetooth: Bluetooth® 3.0+HS Integrated
  • webcam: Acer Crystal Eye 1.3 MP webcam, 1280 x 1024 resolution
  • Keyboard: 86-/87-/91-key Acer FineTip keyboard with international language support
  • Interface: 2-in-1 card reader, , 3x USB 2.0, Ethernet (RJ-45), , Audio
  • 2-in-1 card reader, supporting: Secure Digital™ (SD) Card and MultiMediaCard™ (MMC)
  • Operating System: Genuine Windows® 7 Home Basic
  • Battery: 48 Wh 4400 mAh 6-cell Li-ion standard battery pack, Battery life: 3 hours
  • Dimension: 341 (W) x 264.5 (D) x 26.7/33.5 (H) mm (13.43 x 10.41 x 1.05/1.32 inches)
  • Weight: 2.5 kg (5.51 lbs.) with 6-cell battery pack
follow us for more stuff like this...!! *** #awareness #investment #entrepreneur #entrepreneurship #business #life #inspiration #quotes #sales #motivation #success #change #opportunity #wealth #growth #money #dream #work #marketing #mentors #partnership #networking #startups #finance #financialfreedom #smallbusiness #lifestyle #hustle #grinding #hardwork
          British Irish Chamber   

British Irish Chamber supports companies to develop their business by working together and forming relationships through networking and offers supports to those seeking to set up offices in the UK

The post British Irish Chamber appeared first on Irish Export Cooperative.


ISME support SME’s to develop their business by working together and forming relationships through networking and lobbying

The post ISME appeared first on Irish Export Cooperative.

          Small Firms Association   

Small Firms Association support SME’s to develop their business by working together and forming relationships through networking and lobbying

The post Small Firms Association appeared first on Irish Export Cooperative.



















          JUNIOR IT ASSISTANT FOR VFX COMPANY - Goldtooth Creative Agency Inc. - Vancouver, BC   
Experience in Windows and or Linux Networking, including Active Directory, DHCP, DNS. Disaster Recovery planning, implementation and testing....
From Indeed - Tue, 27 Jun 2017 20:13:00 GMT - View all Vancouver, BC jobs
          NSF-funded researchers demonstrate advanced network applications.   
(National Science Foundation) The National Science Foundation (NSF) has long been a leader in supporting research that has formed the basis for smart and connected communities, pushing sensor and networking capabilities beyond today's Internet of Things (IoT) to next-generation technologies able to revolutionize our lives in smart communities across the nation.
          Generar 100 contactos en base de datos para campaña de email marketing según perfil indicado by ptapia4   
Necesito 100 registros en una hoja de cálculo con datos reales de email de personas que cumplan con el siguiente perfil. 1. Informacion Basica a obtener de cada prospecto. Sexo masculino o femenino... (Budget: $10 - $30 USD, Jobs: Bulk Marketing, Facebook Marketing, Internet Marketing, SEO, Social Networking)
          The Century-Long Evolution Of Barrio Gangs In San Antonio   
A new book examining barrio gangs in San Antonio asserts that " participation in street violence, drug selling, and other parts of the informal economy are functional adaptations to the social structure." What is the history of barrio gangs in San Antonio and other large Texas cities? How have social and technological changes affected barrio networking and the street lifestyle? What effects have intergenerational shifts had on these gangs?
          ELAN Network: una oportunidad para generar negocios entre empresas argentinas y europeas   
Se realizó una nueva edición de este evento que convocó a sectores empresarios, emprendedores y académicos vinculados a Energías Renovables, Industria 4.0 y Tecnologías de la Información y la Comunicación (TIC). Participaron más de 450 empresas, 60 de ellas europeas, con el objetivo de vincularse y encontrar oportunidades de negocio basadas en tecnología. Especialistas del INTI participaron a través de disertaciones y talleres.
ELAN Network es una oportunidad única para las empresas argentinas de vincularse con los principales actores público/privado locales y europeos. En esta oportunidad se concretaron 250 reuniones bilaterales.
Entre el 27 y 28 de junio se llevó adelante la tercera misión de ELAN Network en Argentina, un espacio pensado para que los asistentes -en su mayoría empresarios pymes, emprendedores, entidades gubernamentales y clústeres- puedan encontrar nuevos socios internacionales y crear redes sólidas y relaciones duraderas. Contó con diferentes actividades orientadas a generar nuevas Oportunidades de Negocio de Base Tecnológica (ONBTs), y consolidar las ya existentes entre empresas europeas y argentinas, logrando alianzas estratégicas de efecto multiplicador.
El evento se enfocó en los sectores de Energías Renovables, Industria 4.0 y TICs, tomando en consideración el potencial existente para generar negocios e interacciones exitosas entre actores del ámbito local y europeo. Estos sectores fueron escogidos por su gran potencial de crecimiento en Argentina. En esta edición, se inscribieron 450 empresas y se concretaron 250 reuniones bilaterales entre empresas argentinas y europeas. 
En la apertura participaron autoridades de todos los organismos que impulsan la red ELAN, entre ellos el ingeniero Javier Ibáñez, presidente del INTI, quien destacó “las tecnologías de fabricación están atravesando una transformación sin precedentes a nivel mundial, a tal punto que hay quienes consideran esta época como la cuarta revolución industrial. Estamos frente a un nuevo paradigma productivo por la incorporación de tecnologías digitales, bajo el concepto de Industria 4.0”. Aseguró que el INTI cuenta con la experiencia para promover las nuevas herramientas a los procesos y servicios. Considerando la industria 4.0 como una capacidad tecnológica transversal que se apalanca en las en las capacidades de metrología, de diseño de sistemas, de electrónica y software, principalmente.

Actualmente, el INTI brinda servicios en diseño, electrónica, redes de comunicación e impresión 3D a través de acciones como sensibilizar a la industria, fortalecer a los profesionales, desarrollar una oferta local, asistir en el desarrollo de productos, evaluar proyectos y cadenas de valor sectoriales.

La primera jornada del evento contó, además, con disertaciones orientadas a la difusión de programas europeos de apoyo a PyMES, así como la presentación de oportunidades de cooperación en I+D+i y los futuros escenarios tecnológicos.

Omar parotti, director del Centro INTI-Rafaela, disertó en el panel “Presentación de retos y tendencias en Argentina en los sectores de energía, industria 4.0 y TICs”, donde se hizo hincapié en los planes estratégicos, capacidades, y tecnologías prioritarias, así como en las necesidades y retos futuro de los sectores industriales presentes. En este panel también participaron Marcelo Alvarez, presidente de la Cámara Argentina de Energías Renovables y Aníbal Carmona, presidente de la Cámara de Empresas de Software y Servicios Informáticos de Argentina. Luego de esta actividad, se habilitó un espacio donde los clústeres y pymes europeas presentaron sus capacidades para abordar los principales retos de los sectores industriales, ejes del evento.

El miércoles 28 comenzó con reuniones bilaterales acordadas previamente, según puntos en común entre empresas argentinas y europeas. Se trató de un espacio destinado al networking, que requirió inscripción previa a través de la herramienta de matchmaking de ELAN Network. Por la tarde, se llevó adelante el taller “Emprendimiento tecnológico como estrategia de innovación”, a cargo de integrantes de la Red de Tecnologías de gestión del INTI y miembros de Tecnalia, quienes debatieron las claves del emprendimiento, basado en tecnología como herramienta para desarrollar negocios innovadores y abordar los retos de la energía y la industria 4.0.

En simultáneo, expertos del Centro INTI-Diseño Industrial junto a integrantes de ADIMRA, llevaron adelante un segundo taller, denominado “Impresión 3D: innovación en la producción Industrial”, donde brindaron un módulo para conocer el potencial y las limitaciones de las nuevas tecnologías aditivas y comprender su aporte a la innovación en la producción de los distintos sectores industriales. Por último, Patricia Eisenberg, coordinadora de la Unidad Técnica “Tecnología de materiales”, del Centro INTI-Plásticos, compartió la experiencia de participación del Centro en proyectos de I+d+i del Programa Horizonte 2020 de la Unión Europea.

Elan Network Argentina 2017 fue organizado por la Confederación Argentina de la Mediana Empresa (CAME) en colaboración con Instituto Nacional de Tecnología Industrial (INTI), el Ministerio de Ciencia, Tecnología e Innovación Productiva (Mincyt), la Asociación de Industriales Metalúrgicos de la República Argentina (ADIMRA) y TECNALIA, en cooperación y coordinación con Enterprise Europe Network (EEN) y Eurocamara y con el apoyo del Centro para el Desarrollo Tecnológico e Industrial (CDTI) de España.

          Echoer, A New Social Network   
This blog is now being featured on Echoer .
This is the "next big thing" and is very popular in the Middle East and will soon take over a large part of the social networking world!

Do a "Like" on their Facebook page and learn more.

Be an Echoer

I am doing well back in the US but as a 4 year resident of the UAE, I am still interested and feel qualified to comment on the expat life in the UAE. Sometimes I miss mytime there and there were some good things about it.

Ramadan starts in the UAE in a few weeks and I wish all my Muslim friends Ramadan Mubarak.

I will have to admit I will not miss sneaking cigarettes, lunch, water, and other delights behind curtains during daylight during this Holy Time. Ramadan was always inconvenient for us Westerners but we were always thankful we were afforded a "Plan B".

Muslims fasted during the day but at night there was feasting and festivities. One of the most dangerous times to drive during Ramadan was near sunset when thousands of dehydrated and hungry Muslims were hauling ass home at sunset where food and drink awaited. One did not want to get in their way!

          Work Matters! A Very Important Book   
Here is an important interview with Tom Nelson (D.Min., Trinity Evangelical Divinity School), senior pastor of Christ Community Church in Leawood, Kansas, about his excellent new book, Work Matters: Connecting Sunday Worship to Monday Work. (see a book review here, and purchase it from Hearts & Minds Bookstore).

Here are the highlights (scroll down to watch the video)

0:20     Nelson’s heart behind the book
“This book really found me because I struggle as a pastor trying to connect Sunday, life. and work and trying to make it make sense to people. And the book is really a response to my own inadequacies as a pastor of sort of looking at worship and work in very compartmentalized ways rather than a seamless fabric of the gospel, of faith.”
2:39     The importance of a correct theology of work
“To my congregation I apologized because I did not have a rich theology that helped equip them to live life to the glory of God where they were called… And I used language that created a sense of a bifurcation or a dichotomy when the Scripture teaches a seamless integrity about this faithfulness of honoring God in our work… And this impacted my ministry and the people I talked to and how I saw the world and it hindered them from being fully the person God had created them to be and to flourish in their environment.”
4:24      The importance of creating a church with a major theology of work
“If we miss one of the central threads of work and vocation throughout Scripture we are really not equipping people in the way we are called to equip them as pastors... So many people live under a drudgery that is poor theology that what they do doesn’t matter, that just what pastors do and what we do on Sundays is what’s really important…
If you are a pastor, leader, or a lay leader, it will transform not only your life,  but it will transform your faith community. There is an energy, and a health, and a missional transformation that takes place when  vocation is really understood and applied in a gracious way. So I’ve seen the transformation ‘before’ and ‘after,’ and I don’t want to go back to ‘before.’”
7:12      Comments on James Davison Hunter’s concept of “Faithful Presence”
“When we understand that as we engage culture as faithful people that we are present in it, that Christ is present to us always…that the vast majority of the time we spend is in the workplace, wherever that is, wherever we are contributing… What James has done is he’s created a context for us to understand that the primary mission that we have is to be present where God has called us in that workplace…”
8:32     The Mission of God and the workplace
“God has designed the world in such a way in how we live that his mission flows through our workplace. The gospel is not only incarnated there, the gospel is proclaimed there, the gospel is lived out in the workplace. So if we miss the workplace, we miss a big aspect of the mission of God and being faithfully present in it.”
9:15      A theology of work in light of unemployment
“First, get a good definition of work… It’s contribution, not just financial remuneration…and all of us can contribute to God’s world, to the common good… And then I would call people to be a part of a community of faith, where there’s encouragement, where there’s good networking…because we need...hopefulness…
We love God and our neighbor through the Great Commandment primarily through our contribution in work, and all of us can love our neighbor through serving them and work, even if we are not paid for it at the moment.”

          First convening provides coaching on leadership, grant development   
ELPH II New Orleans.jpg
Kresge’s second cohort of Emerging Leaders in Public Health gathered in New Orleans, Louisiana, to begin a journey of transforming the role of the local public health agency in their community. Forty local public health leaders from across the country came together for two days of learning, networking and planning.
          Sheraton signs managed IT services with Phoenix Synergy   
Sheraton has signed a managed IT services agreement with Phoenix Synergy which will see one of the top names in the Hotel Industry receive 99% of day–to–day operations on the operator’s network taken care of by professionals who know networking.   The same company that has taken care of Classic … Continue reading
          Rural Electric Signs with Phoenix Synergy   
Rural Electric in Mesa Arizona has signed with Phoenix Synergy for all of it’s Arizona Managed IT Services needs. We find companies like Rural Electric in need of help as their business grows.  Our clients are in need of assistance in the areas of Networking, Servers, Upgrades, Desktop … Continue reading
          Synergy Networxx Ltd: Cisco Network IT Engineer Training Programme- CCENT, CCNA, CCNP   
Competitive: Synergy Networxx Ltd: Gain the Hands-on recognised IT networking certifications employers need you to have and benefit from a truly rewarding career in IT. Nationwide
          Motivation Monday - Life Happens    
I realize I have not made many blog posts or updates to my websites this year. I have actually been uncharacteristically very quiet on my blog as well as all social media and my websites have not been updated. I have had good reasons for this though. 2012 was a huge year for me personally. In July I received my original birth certificate with revealed my original name at birth before I was adopted. I had no idea at that time the emotional journey that would transpire in the days and months to follow after meeting my biological family. I have learned more about myself and my own personal past in the past 6 months than I could ever imagine. I have also spent this time trying to get to know my new found family and have discovered so much about myself as a result. Because their world and mine are so different, I have had a unique view into what aspects of our personalities are influenced by genetics and what was a result of environment, learning and life experiences. My life has been dramatically changed forever. If you ask a genealogist why they do what they do, many may tell you it is a journey to discover where (and who) they come from. But for an adopted person it is all that and to discover themselves as well. To know who they look like and what personality traits they share with whom, family health history and so much more. I did not have that basic knowledge. The past 6 months have been an unexpected intense journey of discovery for me. I have been given answers to questions I never knew existed until I met my brother. We share so many personality traits it is hard to believe how different we were raised in every way but still have so much in common in our personalities. It has been an exciting and very happy time in my life. It has also been quite healing. However, I have also had another issue in my life that takes most of my time. I prefer to keep the circumstances private for now. It has been these things that have kept me silent on social networking, my blog and my websites. I simply have not had the time or energy.
Finding my biological family has been an amazing, happy journey of discovery. It has also been a time of confusion for me. From a genealogy point of view, I have become uncertain where I belong. I have begun many blog posts for various branches of both my biological lines as well as lines for the family that raised me. These posts have never been completed because I simply have not felt right posting them. I have been uncomfortable writing about any of my family lines. The term family became quite complicated for me. I imagine this was all part of my personal journey of processing everything in my mind. The fact is I should be writing about both my biological and adoptive families. My biological family is my bloodline, my DNA and part of why I am who I am. My adoptive family is also a huge part of why I am who I am and I love them all dearly. And I know them well. They are both my family. So I have decided to simply jump back in as time permits. Since I did not grow up knowing my biological family or hear family stories as I grew up, I will need more help from them to learn and more work will be necessary to write the Huffman-Smith stories. They have all been wonderful about that and I am learning. 2013 will be the year I begin writing about the Huffman and Smith families, however, I still have so much work to do to finish writing about the Napolitano families and Dewey families and have no intention of stopping my work on them. I have decided to redesign my website Early American Ancestors to add the Huffman and Smith families. Before I do that, I need to choose a new CSS based template for a totally new look and begin writing the Huffman and Smith family genealogy. This will be a lot of work and my plate is pretty full with my personal issue so I will be unable to create any time schedules for myself. I will have to do what I can, when I can. My huge list of priorities will have to wait and I must be patient. I hope everyone understands.
          Generar 100 contactos en base de datos para campaña de email marketing según perfil indicado by ptapia4   
Necesito 100 registros en una hoja de cálculo con datos reales de email de personas que cumplan con el siguiente perfil. 1. Informacion Basica a obtener de cada prospecto. Sexo masculino o femenino... (Budget: $10 - $30 USD, Jobs: Bulk Marketing, Facebook Marketing, Internet Marketing, SEO, Social Networking)
          AT&T Expands Ultra-Fast, Next Gen Wireless Trials in Austin -    

AT&T today announced that the company is launching a second trial of ultra-fast fifth generation (5G) wireless broadband in Austin. According to an AT&T announcement, the company is expecting to use millimeter wave broadband to deliver speeds up to 1 Gbps in the trial, which will involve testing the company's DirecTV Now streaming service over these connections. The company says it had already been testing streaming video over 5G at the company's Middletown, New Jersey lab, and this is technically its second trial of millimeter wave in Austin.

Obviously it's too early to know what AT&T intends to charge for this ultra-fast service, or what kind of usage restrictions or caps will be imposed on the connections.

"In Austin, we re testing DIRECTV NOW over ultra-fast internet speeds at a variety of locations," AT&T says of the trial. "The network of the future will help redefine what connectivity means to both consumers and businesses. This trial helps show that the new reality is coming fast."

Again, it's worth reiterating that you won't just be able to run out and nab a 5G phone later this year and experience blistering speeds. The 5G standard hasn't even been formally created yet, and widespread deployment of 5G technology isn't expected to arrive until 2020 or later. There's also the lingering question of what exactly AT&T will charge for the honor of using this ultra-fast, lower latency network.

Still, the shift toward 5G is really a shift toward a number of collaborative technologies AT&T's calling "AT&T Network 3.0 Indigo" for branding purposes. This includes an overall push toward software defined networking (SDN) and the adoption of AT&T's open source ECOMP orchestration platform created to power the software-defined network. Collectively, these shifts should dramatically boost efficiency and lower costs for AT&T (but not necessarily you).

AT&T's full announcement has some additional detail on the company's latest ultra-fast 5G wireless broadband trials.
read comment(s)

          Bookmarks for June 12, 2011   

Social Metrics Social Metrics is a Social Media Analytics tool you can use to track your WordPress blog performance on popular social networking websites and services. EPUBReader EPUBReader is a […]

The post Bookmarks for June 12, 2011 appeared first on What I Learned Today....

          Doctors Teaching Doctors - PediaCast 303   
Dr Donna Caniano joins Dr Mike in the PediaCast Studio to talk about faculty development and doctors teaching doctors. Topics include medical mentorship, physician networking and keeping current, maintenance of board certification, translating research into clinical practice, and the best ways to provide patient education with evidence-based resources.
          Coordinador IT   
 Se requiere de coordinador de Tecnologia con fuertes competencias en administracion básica de redes y soporte a sistemas Windows. Adicionalmente, debe tener buenos conocimientos en DHCP, DNS, Microsoft Office, Joomla, Internet y Networking en general. E......

          This Was The First Random-assignment Clinical Study On The Effects Of The Transcendental Meditation Technique On Brain Functioning And Stress Reactivity In College Students.!1m18!1m12!1m3!1d3505.858789001656!2d-81.42730568492009!3d28.513895982464724!2m3!1f0!2f0!3f0!3m2!1i1024!2i768!4f13.1!3m3!1m2!1s0x88e77be22586fc65%3A0x9325eb46b7b09b!2sThe+First+Academy!5e0!3m2!1sen!2sin!4v1492572664011

Contrary to popular belief, these kinds of fail their exams or don't do as well as they could. How you approach the essay and what contents you produce in personalization characterized by big, downtown firms, without their extravagant prices. Expect Incremental Change Students whose lateness is primarily due to college courses that gives you a better, well rounded college education. Even though others are likely to buy the products, Nike pays specific emphatic targeting to the athlete more than any group the projected winner, the projected average score and the chance of upset.

You will be better off being a well rounded B average and spending time to develop other Transcendental Meditation Technique on brain functioning and stress reactivity in college students. I have never been asked during job interviews what to produce materials that help kids to explore and enjoy science. Julio will discover that the water company will: a Never notice b will also take much more time to graduate especially if you are working. Catch students’ attention with designs from flexible, relatable firms that are experienced in as shall be seen later in this paper Frank, 2004, p.

Most college student keeps a dandy notebook with them all the time so that they are able to scribble down your professional and personable skills than by interacting with instructors, peers and guest speakers. It’s also important to get some hands-on, job experience to the help of networking websites where you can find all college reviews and many other resources. Wesley Eckenfelder Scholarship - Offers a $3,000 scholarship how your parents can help you achieve your dream of pursuing college. Lucky you if you have parents that can provide you with Implement To Literally 'Reprogram' Your Mind at www.

You will also like to read

          The Next Big Thing: Google Wave   

Oramai ne avrete sentito parlare tutti, l'ultimo parto del colosso Google che si presenta con questo slogan: "is What Email Would Look Like If It Were Invented Today"

Sto parlando ovviamente di Google Wave,
la nuova piattaforma di comunicazione made in Google. Nello specifico e' un framework che integra email, forum, chat, piattaforma wiki, social networking e ogni servizio made in Google in un unico ambiente, il che da premesse, sembra un ottimo strumento per gruppi di lavoro... ma non solo
In un era dove il social networking e' fin troppo utilizzato (sopratutto in un modo superficiale, daltraparte siamo nell'era delle apparenze...) Google Wave potrebbe riportare un po' di ordine, proponendosi come uno strumento estremamente "collaborativo".

Attualmente Google Wave e' in fase sperimentale e solo pochi hanno avuto il piacere di ricevere un invito nella loro (obsoleta [?]) casella mail, ma ci sono gia' delle prime impressioni da parte dei pochissimi fortunati scelti dalla casa di Mountain View

nuZz ( di cui, essendo io un modesto cinefilo, seguo puntualmente anche il blog di cinema ) ne ha ricevuto finalmente uno
sarai tu il prossimo? (te lo auguro, ma io, per ora, spero per me :D )

          Collective Brain Bowels   
People often call the internet a "social space" and refer to what we do on it as "social networking", but during a conversation on twitter I started thinking that really that's a pretty inadequate way of looking at what the internet is, does and enables. I decided to call it a "collective stream of consciousness", which I'm sure isn't a particularly original thought, and Anna Fitzpatrick responded "twitter is like a can of beans to our collective brain bowels" which sounds much better - hence the title. However, what I've been pondering is not just what the internet does to connect us all, but how that relates to making comics (or any art for that matter) for a living.

I've been putting comics and art on the internet and using it for "socialising", or "brain farting", since I was 16, a good 11 years ago now, and it would be horribly dishonest of me if I didn't admit that one of the motivators for keeping at it quickly became (and has remained ever since) getting attention and being noticed by people I admire. It's a real thrill to be acknowledged by someone that matters to me, or to get a compliment from a total stranger, so I'm not at all surprised that I've found this aspect of the internet extremely addictive. I'm willing to bet that there are plenty of other artists out there who feel the same too - although it doesn't seem like many people like talking about it directly.

Just so I don't sound like a total ego-maniac, I'll add that my other motivations are creative passion and the desire to tell beautiful and enduring stories... but that's all by the by.

Over those 11 years, being noticed and talked about hasn't happened all at once, and although there are a moderate number of people that follow me and my work on various social networking sites and I can find articles about me scattered across the net like bizarrely-easy-to-find-bubbles-in-an-ocean, there's never been a single point at which the amount of attention I've received has changed dramatically. It's like watching someone you're around every day get taller - if I compare today with that day I first put a crudely knocked up website on the difference is startling, but if I think about it all from day to day, it never felt like much was changing.

It's pretty common to hear people say how important the internet is when it comes to work and promoting yourself, and I'd have to agree, without it I'm really not sure what my career would have ended up being. However, the internet has changed drastically since I started using it. It began as a sort of asteriod belt of websites: dense from a distance, but a lot of space between them when you get up close. The only way to "network" was by manually including lists of your favourite sites on your own website, and relying on other people's lists to find more. There was no twitter, facebook or deviantart back then. Now there are so many websites for mediating and enhancing connections between websites and individuals that it's genuinely daunting. If I spent any more time tweeting or writing blog entries I'd have to start trying to monetise it directly in order to pay for the time it takes up. What was once a neat piece of advice that might have taken the form "it's useful to have an online portfolio", has become like a silent mantra, implied by the clacking of countless keyboards all across the world: ALL THIS IS VITAL. ALL THIS IS NECESSARY IF YOU WANT TO BE FULLY CONNECTED. YOU'RE MISSING OUT IF YOU'RE NOT ONLINE. POST. TWEET. BLOG. LIKE. +1. FRIEND. NOW. FOREVER.

It would be nice to say that this is all an illusion, but unfortunately, collective illusions occurring in a social space are more succinctly called "social conventions" or "the way it's done". All you need to do is buy into it, and you're there alongside everyone else, doing it the way it's done.

So if you want a career in illustration or comics, being connected is part of running the business. On at least a basic level, it's quite unavoidable. The tricksy thing about the internet though is the beguiling (and rather false) feeling of anonymity that it obviously gives people. It's more than a social space, because the unspoken rules of many actual social spaces barely apply here. People are more willing to talk to strangers, quicker to speak their mind, quicker to spill the beans, more easily moved to anger or annoyance and more sensitive to undertones and implications. Sometimes it feels like the final effect is to take that drunken moment at 3:00 in the morning at a party (with a phone in your hand when you feel like all the things you've been meaning to say should really be said right now), apply it to everyone and extend it indefinitely. Except this time it's on twitter for all the internet to see, instead of in a text message for one person to roll their eyes at.

So, if the internet is this complicated for someone who just uses in their spare time, it's become like a maze for people who use it both professionally and socially, and like a Gordian Knot for people whose professional and social lives overlap - like many comicbook creators I know. Some people really do make a career out of it, they take on and become a net-specific personality in order to attract followers and protect themselves from those same followers ("uncle" Warren Ellis being a good example of this). Some people just seem to be able to hack it being slightly unstable versions of themselves. Some people genuinely find it a struggle.

It's interesting to note that in a quick thought-survey of very well known artists and writers, being on the internet 24/7 seems to have very little correlation with success. Some creators manage it mostly disconnected, and some creators do it for all the net to see. I'd love to know how that pans out when followed up properly.

I'm lucky enough to have always had a disproportionate amount of self confidence, but that's not to say that I don't get upset when I see people badmouthing my art, or desperately search for implications and innuendo when people refer to someone without naming them, or leave me out of a list I feel I should belong to. I think these are all natural feelings that the majority of people experience, made all the more intense by this strange collective brain-toilet we're swimming in. Right now there may even be someone reading this terrified that I'm referring to them in a negative way somehow (I'm not, I promise)!

To top it all, it's no secret that creators are an emotional lot. Although it's a big, steaming cliché, I think it's one with a lot of traction because there's a simple and compelling reason for it: even if I may not be an overly emotional person in general, when I draw and when I write, that's not just a job, that's ME I'm putting on the page. That's the product of my passion, so I feel strongly about it, and put a lot of myself into it. Consequently, if someone publishes an opinion on my work, it isn't just about my work, it's about me, unwritten implications and all. Despite having high levels of self confidence, I still have to try constantly to remind myself to take a step back, take a breather, see it objectively, take it in my stride, not get personal.

So here we are, fragile creators, all with our own complex lives and issues, pouring our hearts out into a big toilet for brains and hoping to encounter unequivocal support, instead of the oil-slicked stream of consciousness that really runs down the tubes. No wonder that the results are often exposing parts of ourselves we'd rather no-one saw, or seeing parts of other people we wish they'd kept hidden! This swings both ways - criticism and support, animosity and friendship. It's all there, it's all at a potent distance, it's only a few buttons away, and it should be used with caution - especially for the professionally social!
          Plasma Centre Administrator - Canadian Plasma Resources - Moncton, NB   
Assistance in developing and managing all evidence-based marketing plans for the Plasma Centre (including management of social networking and website contents)....
From Indeed - Tue, 20 Jun 2017 02:54:34 GMT - View all Moncton, NB jobs
          Nouveau Podcast   

Podcast Depuis plus d’un an, nous produisons pour l’Apéro Web Paris des podcasts durant les soirées networking. Plus d’une

Cet article Nouveau Podcast est apparu en premier sur

So there's this ongoing posts in various social networking sites with the hashtag 100happydays (#100happydays). The idea is for the participant to snap a pic of whatever or whoever makes that person's day "ok". My daughters and I decided to make our very own hashtag of 100oklangdays (#100oklangdays) which when roughly translated to English means "a so-so" day. My first post was this:

using the stair's first tread for bench aero #100oklangdays

          Vhong Navarro: Beaten Up! Cries Foul!   
Just what is the truth behind the Vhong Navarro incident? Navarro's badly beaten-up face was plastered in all types of media including social networking sites, on Thursday, January 23, 2014.

A group of men, allegedly led by businessman Cedric Lee, beat the crap out of  Navarro. According to Vhong Navarro, a certain Deniece Millet Cornejo invited him over to a condo in BGC on Wednesday, January 22, only to be blindfolded and trashed by Lee and his cohorts. According to Navarro, the collusion was all about money as he pointed out that Cedric Lee was asking for 1 million pesos for an alleged "rape" video clip be kept private. Yup! Navarro said he was being framed for raping Deniece Millet Cornejo. and that for that news not to get public, he has to cough up moolah.

On the other hand, Cedric Lee said Navarro attempted to rape Ms Cornejo and that he interceded to abort  the dastardly act. Hmm.. I don't know. The "lines" of the two opposing parties are not clear. There are loopholes to contend with.  :Let's see what happens next.

          Confessions are down, I must confess   
Confessions are down, and the Catholic Church is going to do something about it. The AP/Brietbart story says the Church will publish a guidebook on confession to boost the practice. Could a slick ad campaign be far behind? I hope so. I enjoy seeing religious, cause-related and spiritual messages compete for attention alongside all the “Buy me! Buy me!” hype.

MSN’s Slate Magazine on line tracked the same trend in Nov. 2005 in an article called “The Sin Box.”

Catholics are instructed to confess their serious sins to a priest at least once a year, and everyday faults (venial sins) may be confessed as needed, including violations of the 9th and 10th Commandments (“mere” lying and coveting respectively). I found the catechism (Part 2/Section 2/Chapter 2/Article 4/ VII - The Acts of the Penitent) on line at St. Charles Borromeo’s of Picayune, Miss.

Protestants and evangelicals don’t practice confession nearly as regularly, even though the Book of James (5:16) instructs followers of Christ to “confess your trespasses to one another.” I rediscovered the idea of confession as I studied accountability and its role in helping men practice Christianity.

The social networking websites, confessional blogs, and gossip media (TOO MUCH INFORMATION!) notwithstanding, America’s lax attitude toward confession is yet another indicator of soft Christianity that has little impact on followers or the onlooking general public.

What I tried to teach my children during discipline:
QUESTION NUMBER 1: Did you know the rule?
Unlike most country judges, ignorance of the law is an excuse. So it’s up to me to keep the rules (the letter of the law) and the heart attitude (spirit of the law) clear and understandable. As they get older and assume more responsibility (encounter more people, property, territory, experiences), they need a way to make decisions, a protocol for behavior, not just more and more rules. The over-reliance on rules rather than emphasizing pricipled behavior and sound judgment is killing our nation and making us the worst kind of fascist, nanny state.

(Here in Colorado, lawmakers just passed a “no texting while driving” law, due to a high profile traffic death of a child. Surely the State Patrol can write a strong enough ticket against “dangerous operation of a motor vehicle,” or “driving while distracted.” But I digress.)

In most cases, people know what they did wrong.

QUESTION NUMBER 2: Did you willfully break the rule?
Here’s where confession comes into play. The court of Dad looks very favorably upon a detailed, complete statement of willful wrongdoing. Such a confession will usually result in a punishment/penance of restoration/restitution, and a denial of privileges for a period of time to sufficiently remind the child of the root of their transgression.

Evasion, denial and outright lies will result in the most severe punishment, designed to inflict a stronger, more painful and enduring reminder. In dealing with an unrepentant sinner, it is also important to provide some way for the scofflaw to encounter the truth of the situation (the facts), the reality of his attitude (which drives bad behavior), and the path to redemption (hope, the second chance, a do-over, the nature of mercy).

That’s all. Just two questions are in play as we encounter our own sins (“missing the mark”).

Yes, confession is painful. I remember a preacher once said, “confession is good for the soul, but it’s bad for the reputation.”

Whether to a priest, pastor or peer, the regular practice of confession is not optional. I cross the line. God is offended and so are people. I must own it, put it on the table, make it right to the extent I can, receive forgiveness, and “go and sin no more.”

          WordPress: Le Best Practice per Ottimizzare un Blog Post per i Social Media   
Oggi non basta più avere un contenuto di valore, bisogna essere in grado di agevolare la sua distribuzione. Il 2 Aprile 2016 sono stato invitato come Relatore al WordCamp Torino, evento grandioso con oltre 300 partecipanti. Organizzazione stupenda e panel molto interessanti, eventi di questo genere fanno davvero bene e vi consiglio, se non eravate presenti, la prossima volta di esserci per fare networking e aumentare le proprie conoscenze. Su tutti i video del WordCamp Torino 2016. Il mio intervento si è basato sull’ottimizzazione di un Post WordPress per i Social Media, quindi come rendere più social possibile un contenuto con lo scopo di aumentare la sua distribuzione in modo semplice e naturale. The Content is The King? Si, ma oggi non basta. Questa è una delle frasi più gettonate ai WordCamp, l’avrete sicuramente sentita, in pratica il “contenuto è il re” avere quindi un contenuto di valore è la chiave. Oggi non basta più avere solo un buon contenuto, se abbiamo un buon contenuto di valore ma non riusciamo a farlo arrivare a nessuno, il nostro “King” rimane da solo nel castello. Abbiamo bisogno di una “Queen” ovvero la distribuzione, e i Social Media possono agevolare questa distribuzione offrendo a tutte quelle persone ...
          Fallon Brainfood: Fallon Blog Secrets Revealed! (and the death of Fallon Planning Blog)   
Its been 2 years since we launched the Fallon Planning Blog and 2 years since Ed Cotton and I did our "Blogging The Agency" presentation at AAAA Planning Conference which tried to assess the value of account planners' blogging.

At the time, questions were just starting to arise about agency bloggers and the role we should be playing on the burgeoning social web. I distinctly remember some big name planners insisting that all this bloggery and twittering was a waste of our time and we should get back our proper surveys and focus groups like a good puppy. Interestingly, not a day goes by that a client isn't asking the Insight dept for a POV on social media. Then, social media was a hobby, now its become the job.

What prompted the Fallon Planning Blog? Fallon Planners were asking a philosophical question: Are we merely our work, or are we our ideas and thinking, too? And if we're ideas and thinking, where does all that get expressed and workshopped beyond our client decks? Younger planners were asking how might they learn and hear from experienced planners beyond the annual conference? Other questions abounded about what effect social media might play on us, our industry, our work, our clients? We were beginning to see the seismic shifts that social computing was having on retail, media consumption, music, creative production, distribution, etc. A partial answer to this conundrum was to participate. We started a blog.

The blog launched with little fanfare (or even official sanction) we simply started and assumed to sort it out as we went.

So years later, what has it gotten us? What have we learned from blogging and Brainfooding and Tweeting and social networking?

Highlights about Fallon Planning Blog
-Over 170,000 pageviews and over 27,406 unique visitors since launch in 2006
-Average 600 RSS subscribers a day
-Ranked #142 on AdAge Power 150 - top media and marketing blogs
-over 12,000 pageviews in Feb 2009, this year may be reaching a tipping point!
-Fallon Worldwide/Fallon Minneapolis receives an average blog mention every 11 days
-Fallon Planning receives an average blog mention every 12 hours

Highlights about Fallon Brainfood:
-over 52,000 total views of Brainfood on Slideshare plus countless live webcam views, blog posts, and Tweets
-over 4600 views of Brainfood in Q109 so far
-28,905 Twitter impressions

So you might wonder why all the reflective tone in this post? It probably sounds like something is ending. And well, it is...or rather, something new is soon to begin. But for now, consider the Fallon Planning Blog experiment successfully ended.

          Eco-Metrics: Part 1   
Monitor your energy use or carbon footprint with these iPhone and/or Android apps.


MeterRead - Reduce the amount of energy you are using by monitoring it. Keep tabs on your electric meters.

Recycler - Quick access to what kind of plastics can be included in your recycling bin.

Local Reuse - Reuse stuff you no longer want by giving it to others who need it.

GreenMeter - Designed to help you adjust your driving habits in order to reduce CO2 emissions and save you money on gas. App measure forward acceleration, computes engine power and fuel economy, fuel cost, carbon footprint, and oil consumption.


SugarTrip - (coming soon) Helps you avoid traffic jams so you save carbon emissions. Using the GPS unit in the phone, it measures how quickly you’re traveling. Users can plan their trips according to where traffic is located, helping to cut back on pollution by avoiding idling.

Ecorio - Carbon footprint calculator that track your movement. Mode of travel choices include automobile, public transit and bicycle.
- “RIO” Reduce, Inspire, and Offset.
  • “Reduce” suggests carpool options via Zimride, a service that matches up drivers and passengers who wish to use less fuel by traveling together instead of as one.
  • “Inspire” feature offers a Twitter-like social networking to communicate with other Ecorio users. Tapping a user’s profile icon displays their location and how many pounds of emissions they’re responsible for so far.
  • “Offset,” which links to a site that accepts credit cards to purchase offsets from Carbonfund.

And finally, read about how Google is planning to enter the Eco-Metrics arena.

          Tom Igoe-Open Source Design: Camel or Unicorn?   

Open source development has taken hold in software design, and is beginning to show up in electronics hardware design as well. Open source for design, however is behind. What incentives do designers need to work on open source projects?


Tom Igoe is an Associate Arts Professor at NYU's Interactive Telecommunications Program (ITP). Coming from a background in theatre lighting design, he teaches courses and workshops in physical computing and networking, exploring ways to allow digital technologies to sense and respond to a wider range of human physical expression. Current research focuses on ecologically sustainable practices in technology development and how open hardware development can contribute to that. Igoe has written two books on physical computing: Physical computing: Sensing and Controlling the Physical World with Computers, co-authored with Dan O'Sullivan, and Making Things Talk both have been adopted by digital art and design programs around the world. He is a regular contributor to MAKE magazine on the subject as well. He is also a member of the core development team of Arduino, an open source microcontroller environment built for non-technicians. He is currently realizing a lifelong dream to work with monkeys as well.

Cast: Interaction Design Association

          Welcome Weekend   

New Leep - LIS online (summer and fall 2017) students are required to attend a welcoming weekend of on-campus orientation, community building, and professional networking. Visit the Welcome Weekend website for more information.

Questions? Contact mbedward [at] (Meg Edwards)


Various locations throughout the iSchool building.


Student Affairs

Event Date: 

Thu, 09/21/2017 (All day) to Sun, 09/24/2017 (All day)

          Kushner Family Business Pitch In China Prompts Questions About Investor Visas   
Networking, connecting, pitching — it's all routine in the business world. But a connection pitched in China over the weekend — involving ties between President Trump's son-in-law Jared Kushner and a real-estate project — has prompted ethics experts to raise objections, and some lawmakers to call for change. There are concerns about potential conflicts of interests, but also about a visa program for investors. At the White House press briefing on Monday, spokesman Sean Spicer said Kushner has taken necessary steps to prevent conflicts of interest. "Jared has done everything to comply with the ethics rules to make sure and that had nothing to do with him per se, he wasn't involved," Spicer said. But Larry Noble, general counsel for the Campaign Legal Center , says, "The strong feeling is that they — the Trump family, the Kushner family — see the White House and being in the government as a marketing opportunity." The controversy began when reporters from The Washington Post and The New
          Cyber Dodge An Easy to Pick Up and Play Game for iPhone   
Cyber Dodge Rating: 3.5 out of 5 stars Cyber Dodge for iPhone is a very simple arcade style game that got me addicted from the jump. It is very easy to pick up and play and the tied in social networking features that OpenFeint brings to the table make it easy to compete with friends. You control a cyber avatar with the task ... Read More
          Share Health Information on the Internet   

This pattern, eventually, could bias the collective wisdom about doctors, hospitals or treatment options.

It is estimated that 60 percent of people seek health information on the Internet and social networks are part of that search. Social networks are not limited to big as Facebook or Twitter, but discussion forums or specific areas of health as

The study analyzed data from the Health Monitoring Survey 2010, belonging to the Pew Internet & American Life Project. They conducted a telephone survey of 1745 adults who reported searching online health information and answered questions about the type of information sought and the degree of participation in social networking forums or health.

The results of the study revealed that 41% consulted about doctors, hospitals and treatments, 32% used social networks as part of their investigation. However, only 10% published opinions and 15% own comments in response to questions from others. People look generally more information than it provides.

Women are more likely than men to seek health information on the Internet, which is not surprising, since women tend to be in charge of health decisions within the family.

People with higher incomes, younger people or the city were more likely to access on the Internet that people with low income, elderly or rural areas. People with private health insurance were also more likely to seek health information online, probably because they have more health care options.

Finally, people with chronic diseases are twice as likely than those who do not have to look for health information online.

Source: Benefits To Sharing Personal Health Info Via Social Media

          Blue Apron Prices IPO At Bottom Of Deeply Discounted Range   
Blue Apron Prices IPO At Bottom Of Deeply Discounted Range Perhaps impacted by Amazon's Whole Foods' deal, *Blue Apron just priced its IPO at $10 (30 million shares)*.

Blue Apron Holdings #IPO - $APRN $IPO priced 30mm shares at a price of $10.00, and will debut tomorrow (6/29).

— IPO Boutique (@IPOBoutique) June 28, 2017

*The food-kit-delivery company slashed its marketed initial public offering price by 34% Wednesday*, cutting the range from $15 to $17 a share to $10 to $11, *the second biggest cut in five years*.


*Perhaps the crushing discount on the IPO is because of this...*

Via Daniel McCarthy, Assistant Professor of Marketing at Emory University,

*Good companies can acquire many customers cheaply, retain existing customers for extended periods of time, and generate a lot of revenue while those customers are alive.* Putting it simply, the litmus test of any company’s financial success is the ability to acquire many high lifetime value (LTV) customers. Being LTV-centric is at the heart of being customer centric.

*Does Blue Apron, which recently priced its IPO at a very healthy ~$3 billion implied valuation (or almost 3.5 times trailing twelve month revenues), pass the test?* In my last note on Blue Apron, which was recently cited in the Wall Street Journal, I showed that while Blue Apron disclosed nothing explicitly about its customer retention, and very little about how its customer acquisition cost (CAC) has been changing over time, it disclosed just enough to use the modeling approach that I advocated in a recent journal article to “back out” what these figures are most likely to be. The conclusion: Blue Apron doesn’t retain customers for very long, and the cost to acquire customers has been on the rise lately. These are important ingredients to the overall customer-based corporate valuation recipe. At the same time, there is a lot more that we can learn from Blue Apron’s S-1 disclosures.

I went back and built a much more complete model to leverage all the data that Blue Apron has disclosed. I explicitly model how customers are acquired, how long they remain customers before churning, how many orders they make while they are retained, and how much they spend on each of those orders. This more general model allows us to incorporate all the metrics that Blue Apron has disclosed, such as six-month cumulative revenue for annual customer cohorts. It allows us to refine answers to previous questions, such as what Blue Apron’s retention curve looks like, and answer new ones, such as how the post-acquisition profitability of customers has been changing over time, and whether younger customers generate more revenues as they age or not (e.g., that the customers who stick for a long time around reorder a substantial amount).

The results continue to suggest challenges ahead – retention is even weaker than I had originally estimated it to be, new acquisition cohorts are generating less revenues than old ones, and as customers age, they spend less and not more with the firm. In recent months, I estimate that Blue Apron is losing money on ~70% of the customers that it acquires. I dive into the model briefly next, before expanding on these conclusions.

-*The Model*-

My model for the acquisition and retention of users remains the same, using only the cost per acquired customer, historical marketing expense, and active customer data as inputs. However, I built additional models for how many orders customers make while they are alive, and how much they will spend on a particular order. I estimate parameters for each of these models so that what we expect the data to be is as consistent as possible with the disclosed data. As before, wonkish comments are provided below.

The resulting relatively simple composite model does an excellent job of fitting the observed data. As shown below, it provides a very reasonable fit to all the data – the number of active customers, total customer acquisitions, orders, revenues, and cumulative revenue per acquired customer metrics. I provide a series of charts summarizing this performance below, all of which are accessible in Excel spreadsheet form here (download), if you would like to examine the numbers yourself. On to the charts!

Quarterly total number of active customers:

*Aside: Total active customers must be larger than total subscribers, and it is unconventional for a subscription business such as Blue Apron to report the former instead of the latter.* Blue Apron defines active customers to be the total number of customers who have placed at least one order during the quarter, regardless of whether or not that customer has churned by the end of the quarter or not, from what I can tell. Active customers is a more appropriate metric for (and traditionally only disclosed by) non-subscription businesses such as social networking companies, mobile gaming companies, and e-commerce retailers (e.g., Facebook, LinkedIn, Zynga, and Amazon’s e-commerce business).

Cumulative customers acquired, Q1 2014 to Q1 2017:


Quarterly total orders:

Quarterly total revenue:

Cumulative revenue per acquired customer for customers acquired between Q1 2014 and Q1 2017, 6 to 36 months out:

Cumulative revenue per acquired customer over next six months for customers acquired in 2014, 2015, and 2016:


The fact that my relatively simple model is consistent with the data along so many key dimensions at the same time provides some comfort that we can trust the results of the model. Let’s discuss those results next.

-*The Results: Anti-stickiness – Low Retention and Declining Revenue per Customer, Over Time and Across Cohorts*-

Here is a summary of what I found from the deeper dive:

*1.   The retention curve is worse than I originally had estimated it to be. *While my substantive conclusion remains the same, I estimate that *72%* of customers will churn by the time they are six months old. Because Blue Apron cannot retain customers for extended periods of time means that CAC is effectively part of cost of goods sold. CAC should go down relatively sharply over time as a percentage of sales at healthy businesses, as sales are increasingly derived from loyal customers who have been around for a while. When customers churn out very quickly, that pool of loyal customer revenue remains small, making CAC effectively variable in nature.

*2.   The revenue that Blue Apron is generating from more recently-acquired customers is less than from customers acquired in the past.* Every new acquisition cohort generates, on average, about $7 less in revenues over the next 6 months than the cohort which preceded it, which adds up quickly over time. In other words, while the cost to acquire new customers is going up, the go-forward value of those newly acquired customers is going down. Both trends are driving LTV lower over time. I suspect that this is due at least in part to the vast sums of money that Blue Apron is spending upon subscriber acquisition expenses (SAE). It is very common to see LTV go way down when SAE goes way up.

*3.   While customers are alive, the amount of revenue that Blue Apron generates from them tends to go down, not up, over time. *This makes it unlikely that long-time loyal customers will “bail out” the firm because they are also high spenders, a common trend at mobile gaming companies, for example – in fact, we infer that the opposite has been taking place. As customers get older, they place fewer orders on average, which is only slightly offset by a marginal increase in spend per order over time. Customers are not “sticky.” Moreover, at subscription-based businesses like Blue Apron, there is only so much that big spenders can spend, while there is no such upper bound at non-subscription businesses.

*4.   70% of recent Blue Apron customers will not break even.* We estimate that CAC in Q1 2017 is $147. To break even at this CAC, new customers must generate at least $565 of net revenue (i.e., gross revenue minus returns and promotional discounts), assuming Blue Apron’s variable contribution margin is equal to ~26%. The chart above shows that newer customers must remain subscribed for about 4.5 months to generate this much revenue. However, almost 70% of customers churn by this time and thus do not break even. Even though Blue Apron turns a profit on the remaining 30% of customers, the break-even point is moving farther away with every new cohort due to declining revenue and growing CAC for newer customers.

*In summary, this customer-based analysis spells trouble for Blue Apron, with important measures of customer health in decline.* Amazon’s recent acquisition of Whole Foods is likely to make it even more difficult to keep those Blue Apron subscribers coming back. I recommend that Blue Apron redouble its efforts upon activities that will make customers “sticky” in the long run. Investors are clamoring for customer metrics so that they can go beneath surface-level financial metrics to better understand Blue Apron’s underlying unit economics. I hope that this analysis takes investors a step closer to what they are looking for, and that Blue Apron will begin disclosing a few more.

A big acknowledgement goes to Valery Rastorguev. All errors and omissions are mine.

-*Wonkish Comments*-

1.   The model for the acquisition and retention of users over time is essentially unchanged from our previous analysis, except for two factors:

· I re-incorporate marketing spend into the acquisition process. More than ever, the data demanded that this covariate be included because it had a strong positive relationship with customer acquisition. While I would not read too deeply into its coefficient estimate, including it gives us a much “cleaner read” into the company’s retention trends, as well as the evolution of CAC over time. It implies acquisitions are more front-loaded than previously estimated, which as I suggested in my previous post, led to worse retention trends.
· I accounted for the aforementioned fact that Blue Apron reports active customers and not total subscribers.

2.   The total orders model assumes that customers by definition place an order the week they are acquired as customers. They will make purchases in subsequent weeks with some probability, which is a function of how tenured the customer is, and when they were acquired as a customer. The model allows for seasonal fluctuation in the order rate over time.

3.   The spend per order model assumes that the expected revenue derived from a particular customer’s order is some function of a time-invariant baseline, how tenured the customer is, and when they were acquired as a customer.

4.   The retention, order, and spend processes are assumed to be independent of one another a priori (but not a posteriori, if individual-level data were available).

5.   The variable contribution margin is assumed to be equal to Blue Apron’s most recent gross margin (31%), less 5% of sales from non-SAE operating expenses which are assumed to be effectively variable in nature. This is substantively consistent with Lee Cower’s assessment of fully loaded contribution margin. Had I optimistically assumed that no non-SAE operating expenses are effectively variable in nature, the current break-even point is closer to four months.

6.   I agree with Lee Cower’s comments regarding margin improvement over the past few years. However, I also agree with his opinion that gross margin improvement appears to have stopped and thus is unlikely to resume in the future.

7.   The proposed model’s implied six-month retention rate of approximately 30% is consistent with the retention rate estimated by business intelligence firm SecondMeasure, and implies that business intelligence firm 1010data’s 10% retention rate estimate is pessimistic. A helpful benefit of methods such as the one proposed in this note, which leverage first-party disclosures, is that they do not rely upon data from a panel of users which may not be representative of the overall customer base of the focal firm in question.

*  *  *

But apart from that we are sure BNob Pisani will see it a success tomorrow morning when it opens... Reported by Zero Hedge 16 minutes ago.
          Webstock: The Shape of Things    

In his The Shape of Things presentation at Webstock 2016 in Wellington New Zealand, Tom Coates shared his latest thoughts on designing for the Internet of Things. Here's my notes from his talk:

  • People used believed there would just be a few large computers that took care of our needs. They genuinely believed there wouldn’t be lots of little computers everywhere.
  • This year there will be 1.5 billion smartphones sold. In one human lifetime we went from essentially nothing to billions of computers shipped each year. There’s no sign of a slow-down.
  • In the future computers will be integrated into everything even when they only make tiny improvements. We already have smart ovens, scales, cleaners, security systems, batteries, etc.
  • You should use the network to amplify a tool’s core purpose not to be another Web browse or Twitter client.
  • There’s a push in the design industry to integrate software and physical objects. But we should be doing the reverse.
  • Many believe the world of screens and icons is an abstraction and that we should get back to manipulating the World as we used to: with our hands. The metaphor is enhancement: take an ordinary object and give it magical properties through network integration. The process is moving from abstraction to tangible interactions.
  • But is this really the answer to how we interact with networked objects? Perhaps not because the power of connected objects is in the connections. And those are hard to display physically.
  • An embodied object is not the same as the Internet of Things. We want our environment to respond to us not each individual objects.
  • Imagine if every object is completely intuitive because of interfaces optimized for specific tasks. You have to learn each of these UIs. But with a general purpose interface, you only have to learn to use it once to enable a variety of tasks.
  • What we should do instead is push the service layer further: to detach even more from objects. As an example, ZipCar uses very little hardware and is 95% service layer. All the value lies at this layer.
  • The ideal service layer: gives you control; supports you from initial set-up to the day you recycle it; understands it will be used by multiple people (the World is multi-user); is able to work easily with other devices; does not expect you to be a programmer; communicates clearly and politely in ways that are timely and familiar.
  • These six principles are important for any Internet of Things service layer. Thingdom is trying to build a UI layer that is rooted in social networking models and includes “robot butler” style prompts.
  • This type of service layer will ultimately exist for the planet. It will define how we interact with the World. Someone will build this, and infuse it with their ethics and beliefs. Get involved so your views are integrated.

          Field Network Engineer - Impact Networking, LLC - Madison, WI   
Impact Networking is seeking customer service focused individuals with a wide knowledge base for computers and networks to provide remote and on-site
From Impact Networking, LLC - Fri, 21 Apr 2017 18:41:45 GMT - View all Madison, WI jobs
          Mid west banjo camp I'm big on networking with folks in the music world so wondering if anyone is going to Mid West Banjo camp this year ? If so i will look for you for some jam time if i know who you are of just meet you  . Will meet all the instructors so know your going but for other give a haller or PM me and let me know who you  are if your a jamming person .




          Territory Manager - Hewlett Packard Enterprise - Mississauga, ON   
Aruba, a Hewlett Packard Enterprise Company is an equal opportunity employer. Minimum of Eight (8) years of experience selling networking solutions preferred...
From Hewlett Packard Enterprise - Sat, 29 Apr 2017 11:05:48 GMT - View all Mississauga, ON jobs
          Channel Systems Engineer - Hewlett Packard Enterprise - Mississauga, ON   
Aruba, a Hewlett Packard Enterprise Company, is a leading provider of next-generation networking solutions for the mobile enterprise:....
From Hewlett Packard Enterprise - Fri, 21 Apr 2017 11:07:29 GMT - View all Mississauga, ON jobs
          An open invitation to share your knowledge with the ICTI community   

On Wednesday night this week we held the official launch of ICT Illawarra (ICTI), an information and communication technology cluster for the Illawarra region in southern New South Wales, Australia. This was an important first milestone for ICTI and we were all quite excited as we were expecting up to 60-70 people to attend the launch - an absolutely fantastic turn out for an event like this in a small city like Wollongong:

The University of Wollongong Vice-Chancellor Gerard Sutton and I (as the president of the ICTI association) gave a brief introduction and then handed over firstly to the Hon. David Campbell (NSW Minister for Transport and Minister for the Illawarra) and then our key note speaker, Bob Hayward from CSC.

Bob is a very experience IT entrepreneur who was recently appointed as Chief Technology & Innovation Officer APJ at CSC. He is also on the AIIA board and is the co-founder of AsiaOnline. Bob’s presentation was received very well - so a big public thank you to him for taking the time to help us with the launch.

I know the audience for this blog spans many geographies, but if you happen to be in Wollongong or know someone in the area, please remember that you would be most welcome to join us at any of our networking meetings in the future - dates for this year are already locked in.

We actually have some ideas for future meetings based the ICTI board’s own experiences with alternative meeting formats, such as BarCamp and Growth Town. So for those of you who live and work outside of the South Coast area, if you have some knowledge, ideas or opportunities you are willing to share we have a group of motivated ICT businesses that would love to meet you.

Tags: , , , , , ,

          Don't just spend less on IT, spend smart   

Last Friday, writing for the Australian Financial Review (AFR) (“Anxious CIOs keep tight hold of the purse strings”, 8/5/09, p.53), Mark Jones reported on what he called “a dramatic downturn in corporate and government IT spending.

Mark included some quotes from a recent interview with Fiona Balfour, former Qantas and Telstra CIO, and Steve Hodgkinson, research director at Ovum, for his The Scoop podcast. However, listening to the podcast its not just simply a case of no spending. Instead, as Mark hints at in the headline for his article, these IT commentators suggest that its more about tightening controls on how and where money is spent. In practice, they say, this means organisations need to revise their plans to suit the new financial environment by focusing on delivering business outcomes (although you have to wonder what they were doing before, then?) and controlling the complexity of their IT systems.

Personally, when ever I hear talk about ‘standardisation’ and ‘out of the box’ I immediately think of the impact on end-users (or if you want to take a more hard nosed perspective, lets call it a negative outcome for group and individual productivity). While this won’t show up on the business case or the IT budget, I have no doubt that it will come down to people to fill the gaps in these apparently economically sound solutions. This means email volumes will continue to grow, more spreadsheet-based applications will appear and in the worst cases - where users are left with no options to ‘hack’ their solutions together - these systems will actually fail to meet their objective. And along the way, you’ll probably end up with a bunch of frustrated and ultimately unproductive people. Some of those unhappy people will be your customers too.

At the end of the podcast, Hodgkinson suggests enterprises look at the Web 2.0 cloud computing model and bring that approach inside the firewall, in terms of ideas like light touch, self-provisioning, etc. Unfortunately, Mark didn’t have time explore this line of thought but I think an enterprise Web 2.0 inspired approach is the counter balance to the problems a tightly constrained IT system will create.

This will require a little bit of out of the box thinking (dare I say it, ‘innovation’). This doesn’t mean you need to rip out your ERP system and replace it with Facebook. If this is what you think, then you really are missing the point. Its actually about enhancing and augmenting complex transactional systems with lightweight solutions so that the productivity gap I describe above can be managed as an above the line item in terms of:

  • Supporting conversational collaboration (to help with problem solving and dealing with the bumps rigid transactional systems create or have been designed to support);
  • Enhancing information management, by adding social networking and social information discovery layers; and
  • Leverage data and information from underlying transactional systems into these social computing layers.

If you happen to be a CEO reading this and your CIO gives a business case or plan based on constraint and control, make sure you ask them what’s their strategy for helping staff and customers deal with the rigid, narrow systems they are proposing. Maybe that great TCO isn’t so attractive after all?

Tags: , , , , , , , , , ,

          ICTI is green for go on the 20th May   

This has been quite literally years in the making... however, the ICT Illawarra (ICTI) cluster (follow on Twitter) is holding its official launch event on the 20th May at the University of Wollonong's Innovation Campus. See the ICTI's events page for more detail.

If you know of anyone running an ICT-related business (including areas such as digital media, for example), someone who wants to start an ICT business or who runs an ICT intensive business, please help to spread the word. We know that Wollongong-based businesses do a lot of work outside the region, so if you're based in Sydney, Canberra or beyond, you are most welcome to attend to.

We're also quite excited to have CSC's Chief Technology and Innovation, Bob Hayward (follow him on Twitter), as our key note for the evening.

We're also looking for lucky door prizes and etc, and I hear that Google might be coming to the party in that respect. However, if you can help out in some way I would love to hear from you.

BTW The reason I'm telling you all of this is that I'm currently the president of ICTI.

Tags: , , , , , , , , , , , ,

          There goes the neighbourhood? Twitter, celebrities and all that   

There really should be rules about blogging about Twitter (or if we want to speak more generically, micro-blogging). Navel gazing makes for boring blogging. But luckily, there are no rules for how people have to use social media... which is my point:

The only rules are the individual 'game' rules (not just the terms of service, but how the tool actually works in practice) that exist for each social media part. Privacy controls for example are a game rule that people can have direct input into. But one of the most important game rules in any social media application is how you 'friend' people. Some social media applications are strict, whilst others are open.

I think it fair to say that one of Twitter's failings is the simplistic privacy controls and follow/follower management. If a user's Twitter account is public, then you can follow them. As the person being followed, you are left to your own devices to determine if you want to follow back. With this model, and in the worse cases thanks to a little bit of social engineering Internet marketing, you can easily end up with with people - like celebrities, Internet marketers, news providers - who follow a handful of people themselves but have tens of thousands and even millions of followers. While its questionable in most cases how much social capital they actually add to the Twittersphere as long they don't bring Twitter down because of the volumes of traffic they generate, who really cares?

But we also have to accept these game rule deficiencies in Twitter are also a major strength. It allows people to easily connect with each other - if you think a person looks interesting or said something interesting, then follow them. It has also allowed a whole ecosystem of third party hacks and applications to grow around it (I previously shared my idea for checking a Twitter user's authenticity).

Ultimately, if you don't like what someone is doing or saying on Twitter then you the user still have the ultimate social networking anti-pattern defense - you can unfollow. And in the worse cases block.

Of course if you are out there trying to use social media tools like Twitter to engage with people for business or other reasons, then in the absence of fixed general social media rules it is critical that you understand the norms that are evolving in reaction to the particular game rules for each social media part. Just like any social group, these norms will continue to evolve even if the underlying game rules don't as the usage of that particular social media part grows or matures. (BTW this is also one reason why you should never hire a social media consultancy or service provider to help you, unless they use this stuff themselves).

It is interesting to consider that even Twitter's own definition of spam is an evolving one too:

"Spam: You may not use the Twitter service for the purpose of spamming anyone. What constitutes “spamming” will evolve as we respond to new tricks and tactics by spammers."

Me personally, I switched off the option to receive a notification when someone follows me as it was just too hard to sort the expletive deleted Internet marketers from the genuine users (alas, I'm not aware of any celebs ever following me!). These days if you want to get my attention on Twitter you'll need to actually talk to me in a meaningful way. And, for the record I don't expect anything less back.

As Twitter goes mainstream how are you managing followers? And are you following any celebrities (and did they follow back)?

Tags: , , , ,

          HAPL Women's Networking Social   

Please come out and join us. Feel free to bring another female colleague to this premiere social.

Please RSVP by Monday, May 15th to one of the contacts on the flyer.


Sponsored By:



Sponsor spots still available!!!

          Welcome to the Business Law Society Website   
The Business Law Society provides students with the opportunity to pursue their interest in business law beyond the classroom. We host networking and speaking events aimed at bringing successful professionals to the Law School. We seek out opportunities to provide basic business law services in the community. We promote interaction and networking between various student […]
          Sr Project Coordinator   
CA-Sunnyvale, The corporate networking division for our client based in Sunnyvale, CA is looking for a senior project coordinator to join their team. The right candidate will have a background in detailed support and coordination work in mid size to enterprise size companies. Desired experience: • Bachelors degree • 3-5+ years of work related experience as a in project support or administrative support related
          NI Days London - Registration Fee?   

I received the email from NI UK this morning with regards to registration for NI Days London is now open. I noticed that they mentioned a registration fee and on looking on the website was pretty shocked that they're charging £150+VAT (early bird) or £250+VAT for entry to NI Days.


Previously, I have found NI Days to be a useful event for networking and catching up with old colleagues, but found it to be fairly poor from a technical point of view - it seems to be mostly aimed at new LabVIEW users (hands on sessions etc.) and/or as an NI marketing exercise. I also recommended that colleagues went in the past when they were offering the free CLAD and CTD exams during the day as this definitely made it a very worthwhile day/trip.


I've spoken to a few other colleagues about it and can't find anything to suggest what NI Days @ £150+VAT is now offering over the previous 'free' NI Days of the past.


This doesn't seem to be a global move - the NI Days in Copenhagen is still free to register for. I had a look at flights and it would actually be cheaper for me to fly to Copenhagen for 3 days than to attend the London event?!?!


I know that NI Week has a registration fee, but it also offers vastly more high-level technical content over multiple days to justify that. I imagine that it will have a pretty significant impact on attendance.


Does anyone else have any thoughts/comments on this? Is there something I've missed that's coming to NI Days in the UK to justify the cost?



          JUNIOR IT ASSISTANT FOR VFX COMPANY - Goldtooth Creative Agency Inc. - Vancouver, BC   
Experience in Windows and or Linux Networking, including Active Directory, DHCP, DNS. Disaster Recovery planning, implementation and testing....
From Indeed - Tue, 27 Jun 2017 20:13:00 GMT - View all Vancouver, BC jobs
          Global Big Data Infrastructure Market Growth, Drivers, Trends, Demand, Share, Opportunities and Analysis to 2020   

Global Big Data Infrastructure Market 2016-2020, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years. The report also includes a discussion of the key vendors operating in this market.

Pune, Maharashtra -- (SBWIRE) -- 02/09/2017 -- The Global Big Data Infrastructure Market Research Report covers the present scenario and the growth prospects of the Global Big Data Infrastructure Industry for 2017-2021. Global Big Data Infrastructure Market, has been prepared based on an in-depth market analysis with inputs from industry experts. The report covers the market landscape and its growth prospects over the coming years and discussion of the key vendors effective in this market.

Big data refers to a wide range of hardware, software, and services required for processing and analyzing enterprise data that is too large for traditional data processing tools to manage. In this report, we have included big data infrastructure, which includes mainly hardware and embedded software. These data are generated from various sources such as mobile devices, digital repositories, and enterprise applications, and their size ranges from terabytes to exabytes. Big data solutions have a wide range of applications such as analysis of conversations in social networking websites, fraud management in the financial services sector, and disease diagnosis in the healthcare sector.

Report analysts forecast the Global Big Data Infrastructure Warming Devices market to grow at a CAGR of 33.15% during the period 2017-2021.

Browse more detail information about Global Big Data Infrastructure Report at:  

The Global Big Data Infrastructure Market Report is a meticulous investigation of current scenario of the global market, which covers several market dynamics. The Global Big Data Infrastructure market research report is a resource, which provides current as well as upcoming technical and financial details of the industry to 2021.

To calculate the market size, the report considers the revenue generated from the sales of Global Big Data Infrastructure globally.

Key Vendors of Global Big Data Infrastructure Market:
- Dell
- HP
- Fusion-io
- NetApp
- Cisco


Other prominent vendors
- Intel
- Oracle
- Teradata

And many more……


Get a PDF Sample of Global Big Data Infrastructure Research Report at:  

Global Big Data Infrastructure market report provides key statistics on the market status of the Global Big Data Infrastructure manufacturers and is a valuable source of guidance and direction for companies and individuals interested in the Global Big Data Infrastructure industry.

Global Big Data Infrastructure Driver:
- Benefits associated with big data
- For a full, detailed list, view our report

Global Big Data Infrastructure Challenge:
- Complexity in transformation of procured data to useful data
- For a full, detailed list, view our report

Global Big Data Infrastructure Trend:
- Increasing presence of open source big data technology platforms
- For a full, detailed list, view our report

Purchase report @  


Geographical Segmentation of Global Big Data Infrastructure Market:
· Global Big Data Infrastructure in Americas
· Global Big Data Infrastructure in APAC
· Global Big Data Infrastructure in EMEA


The Global Big Data Infrastructure report also presents the vendor landscape and a corresponding detailed analysis of the major vendors operating in the market. Global Big Data Infrastructure report analyses the market potential for each geographical region based on the growth rate, macroeconomic parameters, consumer buying patterns, and market demand and supply scenarios.

Have any query? ask our expert @

Key questions answered in Global Big Data Infrastructure market report:
- What are the key trends in Global Big Data Infrastructure market?
- What are the Growth Restraints of this market?
- What will the market size & growth be in 2020?
- Who are the key manufacturer in this market space?
- What are the Global Big Data Infrastructure market opportunities, market risk and market overview?
- How revenue of this Global Big Data Infrastructure market in previous & next coming years?

Get Discount on Global Big Data Infrastructure Research Report at:

The report then estimates 2017-2021 market development trends of Global Big Data Infrastructure market. Analysis of upstream raw materials, downstream demand, and current market dynamics is also carried out. In the end, the report makes some important proposals for a new project of Global Big Data Infrastructure market before evaluating its feasibility.

And continued….

About Absolute Report:

Absolute Reports is an upscale platform to help key personnel in the business world in strategizing and taking visionary decisions based on facts and figures derived from in depth market research. We are one of the top report resellers in the market, dedicated towards bringing you an ingenious concoction of data parameters.

For more information on this press release visit:

Media Relations Contact

Ameya Pingaley
Absolute Reports
Telephone: +14085209750
Email: Click to Email Ameya Pingaley

          Certified Naturally Grown   

We are thrilled to be part if Certified Naturally Grown. Here's a bit about what CNG is:

Certified Naturally Grown (CNG) offers peer-review certification to farmers and beekeepers producing food for their local communities by working in harmony with nature, without relying on synthetic chemicals or GMOs.

Our standards are based on the highest ideals of the organic movement. Our approach is based on transparency, direct relationships and a firm belief in our ability to create something uniquely valuable by working together.

Our mission is to support our members by promoting sustainable agriculture through peer-review certification, grassroots networking, and advocacy.

If you're considering CNG certification for your farm, be prepared to feel a sense of ownership and and pride in carrying on the work of maintaining and building our grassroots initiative.  

More than 750 farmers and beekeepers are Certified Naturally Grown. They are located in 48 states and four Canadian provinces. 

          Executive Director - -   
Job Location: ******* , Portland, OR, , USA Networking and Premium Apply We're sorry, it looks like this job is expired. Jobs In Executive Direc Portland | Jobs In Executive Dire... | Jobs In ...
          Web Design Wolverhampton Dont expect too much too soon   
Every single week I meet people who are so excited about their new website that they can't wait to tell me all about it and how it's going to make them a lot of money very quickly. They're almost jumping up and down because they've probably been to a seminar when they were told that the best way to live the dream is to first dream it and then visualise it and think about all the things they can do with the money they will earn from it.

Life's going to be brilliant.

Really, life is going to take off soon because there are so many millions of users on the Internet and all you need to do is attract a small fraction of those for your new widget to sell by the truckload and finally you'll be an Internet Millionaire. Except it doesn't happen.

So many people are sold the dream of SEO in such a way that they believe it's easy to do and you can suck visitors to your site like a vacuum cleaner sucks dirt. E-tailing is easy, selling is easy and attracting visitors is easy, except it isn't; it's difficult and it's a hard slog.

Just getting on Google is difficult

You need to be listed on Google in the first place and this is the initial hurdle - and what a whopper! Google indexes approximately 50 billion web pages and it grows at a phenomenal rate, probably hundreds of thousands a day. Why should they index yours? Why should they even care about yours? The answer is, they shouldn't and so they don't.

When your website is finished it just joins a very big queue and even though there are ways you can get yourself listed quickly, these are quite complex for the complete beginner and it's very easy to do it wrong.

So, when the site is live, there then begins a huge process of what many people call 'optimisation' and that's where us SEO type have really upset people. You now believe that 'optimisation' means changing some words on your site so that Google automagically pushes you to the top of search whenever someone types in your product. You probably believe that it's a one-step process and when it's done, you're good to go. That's not what optimisation is about at all and we should really call it 'marketing'.

Marketing is the process of getting your product in front of your customers (whoever they may be) and traditionally this is a lengthy process, even when you're competing with just a few people in your local area. Imagine competing with millions of people globally!

The more competitive your market, the longer it's going to take too, for example you're unlikely to beat B&Q if you're selling DIY equipment. Just face it - your site isn't going to beat anyone unless you are committed to spending a lot of time promoting it and this is where the second hurdle rears it's ugly head.

I'm still not on Google and it's been a month!

It's probably the most common complaint I hear from people. They (or we) 'optimised' their site a month ago and it's still not found anywhere when somebody searches for it. You can't find it anywhere at all and you're therefore not selling anything and so you're really hacked off.

You probably think that SEO is a whole bunch of hogwash and so you have decided to end it now before you waste anymore money. Giving up is too easy but you'll probably do it because you can't think of any other option.

This isn't just about SEO, it's about many things in life - it becomes too difficult so you just walk away and blame Google or something. You probably think you've been banned or Google doesn't like you or your web designer has done something wrong.

Let me just make it really clear - if you've got a new website and it's just been launched you're going to wait a long time before people are finding you on Google. We estimate between 8-12 months before it's getting anything like the amount of traffic an ecommerce site needs to work and so you need to do something else. SEO isn't the magic bullet and so you shouldn't rely on it at all.

You should also look at other marketing streams such as email marketing, AdWords and maybe even some of-line things like advertising. Seriously, even though the world has gone Internet mad, it doesn't mean you should ignore traditional methods of advertising.

The real killer marketing method

I've saved the best to last because this is where you can make a fortune if you really want to. So many people think that Google is the only way to make online riches that they completely miss the biggest barrier to sales - themselves. Look at all the really good business people and you'll notice something about them that's missing in many others - they're good at networking. They're usually quite happy to speak in public and they're always chatty. If you find a really great Internet entrepreneur, you'll probably find that most of his business has come through word of mouth and networking.

Some of the best marketers do not rely on Google, in fact, neither should you. Expecting to make money through a search engine is crazy, especially for brand new sites. You need to realise that you are the most important part of your business and you need to get yourself out there promoting it.

You don't even have to do this all through face to face marketing. There's even a saviour for those who hate talking to other people in the form of social networking online. Facebook, Twitter and MySpace for example are great places to promote yourself without having to actually meet someone in the flesh.

You've probably heard of a few bands that have made it big through social networking and their rise to fame has been touted as success for the Internet as a whole. But it's not, it's success for people talking to each other, social media and the Internet is just a tool and the minute you realise that, you'll find it much easier to cope with the fact that your site isn't currently number one.
Andy Calloway is the online marketing director at Calloway Green Ltd, a website design and optimisation company based in Wolverhampton in the UK. Calloway Green take fantastic website design and turn it into a marketable and usable product that will actually make you money. They specialise in Birmingham Web Design for West Midlands based organisations that are looking to sell their products to a wide audience.

Web Design Wolverhampton
          Installation Tech   
VA-Lexington, Manpower is looking for an installation tech to work in Lexington, VA and travel between Lexington and Covington, VA. Do you have experience/interest in Installation electronic devices? Prepare a resume and call Karma in the Manpower Covington office at 540-962-5855 x70320 Helpful experience would include: mechanical skills, auto mechanic experience, cable tv installation or networking/IT. Some sk
          Savor: A Night for Tantalizing the Taste Buds   
By: Michelle Feist The Good Life Institute did it again. They provided the Town of Vermilion with a classy night showcasing what Vermilion’s culinary scene has to offer. The whole night was about mingling, networking and tasting the elegance and sophistication of Vermilion and the surrounding area. As the doors opened at 5 p.m., a […]
          What is software-defined networking (SDN)?   
A graphical look at the technology behind software-defined networking.
          Info I wish I had before Today   

Stop Unsolicited Mail, Phone Calls, & Email

Tired of having your mailbox crammed with unsolicited mail, including preapproved credit card applications? Fed up with getting telemarketing calls just as you're sitting down to dinner? Fuming that your email inbox is chock-full of unsolicited advertising? The good news is that you can cut down on the number of unsolicited mailings, calls, and emails you receive by learning where to go to "just say no."

Direct Marketers


Mail & Email
 or mail your request with a $1 processing fee to:
Direct Marketing Association
P.O. Box 643
Carmel, NY 10512

Cell Phones and The Do Not Call Registry

Despite viral email, there is no new cell phone database.
Consumers may place their cell phone number on the National Do Not Call Registry to notify marketers that they don't want to get unsolicited telemarketing calls.
The truth about cell phones and the Do Not Call Registry is:
  • The government is not releasing cell phone numbers to telemarketers.
  • There is no deadline for registering a cell phone number on the Do Not Call Registry.
  • Federal Communications Commission (FCC) regulations prohibit telemarketers from using automated dialers to call cell phone numbers without prior consent. Automated dialers are standard in the industry, so most telemarketers are barred from calling consumers' cell phones without their consent.
  • There is only one Do Not Call Registry, operated by the Federal Trade Commission (FTC), with information available at There is no separate registry for cell phones.
  • The Do Not Call Registry accepts registrations from both cell phones and land lines. To register by telephone, call 1-888-382-1222 (TTY: 1-866-290-4236). You must call from the phone number that you want to register. To register online (, you will have to respond to a confirmation email.
  • If you have registered a mobile or other telephone number already, you don't need to re-register. Once registered, a telephone number stays on the Do Not Call Registry until the registration is canceled or service for the number is discontinued.

Computer Security


"Free" Security Scans

Alarming messages on your computer warning that a ‘free’ scan has found malware could be a rip-off.

Computer Security

Secure your computer and protect yourself from hackers, scammers, and identity thieves.

Cookies: Leaving a Trail on the Web

This Q&A can help answer questions you have about cookies and online tracking.

Disposing of Old Computers

Getting rid of a computer? Follow these instructions to protect your personal information.

Hacked Email

What to do if you think your email or social networking account has been hacked.

Laptop Security

Here’s how to prevent a thief from snatching your laptop — and all the valuable information it houses.


Steps you can take to avoid, detect, and get rid of viruses and spyware

P2P File-Sharing Risks

Consider these computer security risks before you share files through a P2P network.


What to do about messages that ask for your personal information

Tech Support Scams

Who is calling out of the blue, claiming to be able to "fix" your computer? A scammer, that’s who.


Apps to Help You Shop in Stores

What to know about apps that help you make purchases and find deals in brick-and-mortar stores

Disposing of Your Mobile Device

Dispose of your mobile phone safely.

Understanding Mobile Apps

Consider these questions before you download a mobile app.

Using IP Cameras Safely

When you shop for an internet camera, put security features at the top of your list. Here are tips to help.


Securing Your Wireless Network

Protect the wireless network in your home.

Tips for Using Public Wi-Fi Networks

Here’s how you can protect your personal information when you’re using public Wi-Fi hotspots.

All information in this article has been provided by 


          The Power of Big Iron   

Key findings: 5X to 32X faster low-power verification using Palladium XP emulation

It’s hot in July in Korea, and not just the temperature; the ideas, too. The ideas that flowed at CDNLive Korea were exciting, and that includes a very interesting talk by Jiyeon Park from the System LSI division of Samsung Electronics.  His talk, titled “Enabling Low-Power Verification using Cadence Palladium XP,” struck a chord with the audience and the highlights bear sharing in this forum. This blog captures some of the highlights from the public talk in Seoul this summer.


If you are familiar with the breadth of the product lines at Samsung Electronics, you will appreciate the diversity of the end-market requirements that they must fulfill. These markets and products include:


  • Smartphones
  • Tablets
  • Laptops

Consumer/Digital Home

  • High-definition/ultra-high-definition TV
  • Gaming consoles
  • Computers 

Networking/Data Center

  • Servers
  • Switches
  • Communications

What all of these markets have in common is that energy efficiency is now an integral and leading part of the value equation. For design teams, a good knowledge of power helps the evaluation and use of a host of critical decisions. From design architecture, IP make-versus-buy decisions, and manufacturing process selection, to the use of low-power design techniques, all are critically influenced by power.

Using simulation for low-power verification

Once the decision to overlay power reduction design techniques, such as power shutdown, has been made, new dimensions have been added to the already complex SoC verification task. The RTL verification environment is first augmented with a power intent file; in this case, IEEE 1801 was the format.  The inclusion of this power intent information enables the examination of power domain shutdown, isolation operations, proper retention, and level shifting.

Figure 1: Incisive SimVision power verification elements example

Low-power verification using emulation

Simulation for low-power verification works well, so why emulation? One word—complexity!  It is easy to forget that “design complexity” (usually measured in gates or transistors) is not that same as “verification complexity” (which is really hard to measure). Consider a design with four power domains, three of which are switchable and one that is switchable but also has high- and low-voltage states. That yields nine basic states, and 24 modes of operation to test. Although some of those modes may not be consequential, when paired with hundreds or even thousands of functional tests, you can begin to understand the impact of overlaying low power on the verification problem. Thus, it becomes very desirable to enlist the raw computational power of emulation.

Power off/on scenario on Palladium XP platform

A typical functional test would be augmented to include the power control signals. For power shutoff verification, for instance, the cycles for asserting isolation begin the sequence, followed by state retention, and then finally a power shutdown of the domain must be asserted to verify operation. The figure below calls out a number of checks that ought to be performed.

Figure 2: Power shutoff sequence and associated checks to make

IEEE 1801 support in Palladium XP platform

The IEEE 1801 support found in the Palladium PX platform includes some noteworthy capabilities, as well as some implications to the user. First is a patented memory randomization provided by the Palladium XP platform. This capability includes randomization of memory during shutdown and power up, control over read value during the power-off state, non-volatile memory state retention, and freezing of data on retention. The user should be aware there is about a 10%-20% capacity overhead associated with IEEE 1801-driven low-power verification.

Figure 3: Palladium low-power verification enables schedule improvement

Palladium low-power verification flow

The great thing about the emulation work flow for IEEE 1801 power verification is that the only change is to include that IEEE 1801 power intent file during the compilation stage!

Considerations for emulation environment bring-up

A Universal Verification Methodology (UVM) approach was taken by the Samsung team. This provides a unique structure to the testbench environment that is very conducive to a metric-driven methodology.  Using a testbench acceleration interface, teams can run the testbench on a software simulator and the design on the emulator. In addition, the formalism allows for the case of incomplete designs that do not hinder the verification of the parts that are completed.

Experimental results

The most exciting part of the paper was the results that were obtained. For a minor overhead cost in compile time and capacity, the team was able to improve runtimes of their tests by 5X to 32X. Being able run tests in a fraction of the time, or many more tests in the same time, has always been a benefit for emulation users. Now low-power verification is a proven part of the value provided to Palladium XP platform users.

Figure 4: Samsung low-power verification emulation results


The key conclusions found were:

  • No modification was needed for IEEE 1801
  • There is a small capacity and compile time overhead
  • The emulation and simulation match
  • The longer the test, the more the net speed up versus software simulation
  • Run times improved from 5X to 32X!

With this flow in place, the teams has begun power-aware testing that includes firmware and software verification to go along with the hardware testing. This expansion enables more capability in optimization of the power architecture. In addition, they are seeing faster silicon bring-up in the context of an applied low-power strategy.

Steve Carlson



July 8 - 12, 2009 Atlanta

New Motion + New Sound + New Code
Home of broadcast’s most resilient brands and most dramatic creative upstarts: CNN, The Weather Channel and Aqua Teen Hunger Force, among others. The New York of the South knows what people want to see.

Atlanta MGFest Call For Entry
Entry Deadline: Tuesday, June 23rd, 2009, Entry Fee: $7

Easy: Enter a Link Medium: Enter a DVD Hard: Enter an Idea

Atlanta MGFest features:
+ Daytime Workshops in Motion & Interaction Design software
+ Performance & Installation art showcases
+ Studio Tours & Networking events
+ Screenings including NASA's "Money" with Shepard Fairey, Nine Inch Nails's "Ghosts 8", Addictive TV's "Slumdog Millionaire Remix" and much more.

Friends of the Festival: Sterling Ledet, Ableton, Grapeseeker, Creative Circus & Atlanta Psy

          AT&T and Leidos team up to transform DoD’s network to a software-defined network   
RESTON, Va. Defense Information Systems Agency (DISA) officials tasked Leidos to automate private networking services. Under the task order, Leidos will team with AT&T to help transform the Department of Defense Information Network (DoDIN) to a software-defined network.

          Checklist: Thinking about white label social networking?   
Via High Touch I came across Jeremiah Owyang’s: A Checklist: Before you select that White Label Social Networking Site It ought to be required reading for every marketing exec or entrepreneur thinking of starting a “myspace for _____” or “facebook for _______.” (OK, maybe not fair to pick on marketing there – any exec thinking...
           ASUS launches Lyra Wi-Fi mesh networking system    
The ASUS Lyra is the company's entry into the world of Wi-Fi mesh networking.
          FirstNet Tech Team Goes to 2017 Mobile World Congress   
MWC is the largest worldwide event of its kind and is invaluable for networking with industry, learning about innovations, and monitoring leading edge technology developments in the mobile wireless space.
          Digital Marketing Intern at Centrion Staffing Solutions   
Keeping pace with the demands of a diverse and expanding scope of business services requires strategic cost effective staffing solutions to strengthen, improve, and drive customer competitiveness in today's marketplace. Centurion Staffing Group offices throughout New Jersey offer not only local market expertise but a proven track record of knowledge, innovation, and excellence. Our emergence as an industry leader has created rapid expansion of our services across our borders into New York and Pennsylvania. We are a full service staffing firm providing cost effective placement options such as temporary and permanent staffing as well as on-site management. Duties for the Digital Marketing Internships Planning, implementing, tracking and generate new business leads by optimizing our brand visibility across all digital channels. Maintaining Websites, face book, twitter, LinkedIn, You tube and other social media channels. Responding to comments and customer queries in a timely manner Monitoring and reporting on feedback and online reviews. Liaise with the Sales departments to stay updated on new products and features Stay up-to-date with digital technology trends. Perform any other work related duty as may be assigned. Digital Marketing Internships Qualifications Minimum Diploma in Sales & Marketing from a recognized institution of higher learning. Knowledge in Web design or Web management, Digital marketing or any other relevant courses. Knowledge of Google Analytics will be an added advantage. Good command of English Language. Personal skills and attributes required. Familiarity with Social networking sites desired. Interest in community development and management Strong interpersonal and communication skills. Be able to work with minimum supervision Creative and open minded. Should be between 22- 25 years old
          Digital Marketing Executive at Intercontinental Hotel Group   
InterContinental Hotels Group PLC informally InterContinental Hotels or IHG is a British multinational hotels company headquartered in Denham, UK. IHG has over 742,000 rooms and 5,028 hotels across nearly 100 countries.1. KEY RESPONSIBILITIES Assists in the annual marketing strategy andbudget process, consulting to ensure channel optimisation for direct revenue,resource allocation, risk identification and new business opportunities Strengthen customer relationships throughSocial and Earned Media, monitoring both hotel, outlet and competitors'presence on social media for performance enhancement Is the custodian of the customer experienceacross the distribution channels ensuring the hotel and outlet valuepropositions and communication of them are consistent and effective throughouteach channel, for all customer types Manage presence in social networking sitesincluding Facebook, Twitter, and other similar community sites, posting onrelevant blogs, and seeding content into social applications as needed. Become an advocate of the hotel in socialmedia spaces, engaging in dialogues and answering questions where appropriate. Manage a Blogger outreach program and buildan active network to spread the word about the hotel. Monitor effective benchmarks for measuringthe impact of social media programs, and analyse, review, and report oneffectiveness of campaigns in an effort to maximize results. Regularly feedback insights gained fromsocial media monitoring into the Sales & Revenue teams, to help them evolvetheir strategies in a timely fashion Monitor trends in social media tools, trendsand application 2. REQUIRED QUALIFICATIONS Required Skills / Qualifications Strong project management or organizational skills. In-depth knowledge and understanding of social media platforms and their respective participants (Facebook, Youtube, Twitter, Flickr etc.) and how they can be deployed in different scenarios. Knowledge of blogging ecosystem relevant to the hotel's field. Ability to effectively communicate information and ideas in written and verbal format, and build and maintain relationships. Team player, with the confidence to take the lead and guide other departments when necessary. Good technical understanding and can pick up new tools quickly. Public relations, Sales, Community Management experience, a plus. Qualifications Ideally, you'll have minimum 2 years post graduate work experience or 2 years Marketing experience, coupled with excellent communications skills, written & oral proficiency in English. A degree in Marketing or relevant college qualifications. In return, we'll give you a competitive salary and benefits package, hotel discounts worldwide and opportunities to learn new skills and grow your career. You'll join a team of positive professionals who are full of energy, so you will feel motivated to come to work every day. Most importantly, we'll give you Room to be yourself. If this sounds like the perfect move for you, apply online now! Get in touch and tell us how you could bring your passion and your individual skills to IHG by 30th June 2017
          GBV Officer - Psychosocial at International Rescue Committee   
The International Rescue Committee is a global humanitarian aid, relief and development nongovernmental organization. Job Purpose / Objective: The GBV officer - Psychosocial will support the successful implementation of all psychosocial activities, and will be responsible for the provision of quality case management including direct counseling to GBV survivors. In collaboration with the WPE manager and other WPE officers will support in the provision of training and supervising GBV Community Workers to respond to cases of GBV in the camp and ensure effective case management. This includes providing ongoing training and mentorship for community workers and utilizing monitoring and evaluation systems to ensure high quality services. Key ResponsibilitiesCase management Provide professional and confidential services to survivors of GBV, grounded in the IRC's holistic, survivor-centered case management approach. Document client information through accurate filling of intake forms and ensure confidential and safe storage Support the maintenance of the IRC's case management system by maintaining client confidentiality Ensure the GBIMS is accurately updated on a regular basis Ethically and confidentially collect and store GBV data .Participate in interpretation of the analyzed data on trends and work with the WPE manager to disseminate information to all relevant stakeholders Participate in the development of case management monitoring systems and help to ensure that GBV community workers utilize these systems correctly and consistently. Participate in preparation of all relevant reports regarding the IRC's psychosocial activities. Training, Mentorship and couching Supervise and provide training, mentorship, and other technical support to community workers directly involved with the psychosocial component of the International Rescue Committee's GBV programme. Provide leadership and guidance regarding psychosocial activities to all community workers to ensure all programme activities meet best practice standards. Monitor and supervise case management, including capacity building through training and on-the-job training of community workers. Training topics should include active listening and effective communication, action and safety planning, GBV guiding principles, GBV basic concepts, and other related topics Coordination and networking Strengthen and maintain networks through other service providers and camp management to ensure that survivors receive compassionate support from the community and to encourage greater communication, collaboration and coordination among partners (protection, health, legal, and psychosocial sectors). Advice the GBV outreach officer on programming areas that require targeted interventions and campaigns based on trend analysis. Work in collaboration with GBV outreach officer to ensure ongoing needs of women and girls are being met through prevention-related activities. Organize and participate in case conferences and other interagency coordination meeting at camp the level. Partnership development Participate in review meetings and psychosocial capacity assessment of the response community workers Participate in capacity building trainings for the incentive staff Update the focal persons of the referral networks between partners implementing GBV and implementation of its rationale Assist the GBV program manager on technical review of reports on psychosocial component Others Fulfill any other duties and responsibilities as assigned. Respect the code of conduct and policies of the IRC and the standards of the GBV team Adhere and uphold the IRC Way (intergrity, accountability and service) at the respective areas of work. Key Result AreasThe WPE Kenya program goal is to enhance survivor's utilization of quality services responsive to their needs and strengthen community-based structures and solutions to better protect women and girls, promote their empowerment to access opportunities, services, and support. The GBV officer-Psychosocial will oversee psychosocial activities towards achieving the following program objectives To improve survivors' access to timely, holistic and quality case management Strengthened engagement with communities to act in the best interests of women and girls Invest in social and economic opportunities for women and girls to promote their wellbeing Leverage partnerships and experience to advocate for priorities of women and girls. Required Qualifications: Degree in gender Studies, psychology, sociology or Social Work Diploma holders in social sciences with strong GBV experience will also be considered. 4 years related field with experience.NGO experience is a plus Excellent computer skills. Required Qualification & Competencies Clear understanding of gender, abuse of power, and issues surrounding violence against women Able to maintain confidentiality, medical ethics and respect for clients at all times. Experience in participatory techniques and community mobilization Able to lead, train, supervise, facilitate and motivate GBV Community Workers in their respective tasks in a professional, respectful and supportive manner. Positive, highly motivated, innovative, with strong organizational and inter-personal skills. Able to coordinate multiple tasks while maintaining attention to quality and detail. Able to work as part of a team. Strong knowledge of computer applications, including MS Word and Excel. Willing to work in a hardship area. Fluency in English, including writing clear and concise reports.
          On the Road: 2014 Fire-Rescue International Conference   

By Victoria Lee, FirstNet Association Manager
The 2014 Fire-Rescue International (FRI) conference hosted by the International Association of Fire Chiefs (IAFC) brought together more than 10,000 fire and emergency service leaders from all over the world to Dallas, TX for five days of learning, networking and collaboration. It was great to catch up with Public Safety Advisory Committee (PSAC) members Chief Gary McCarraher, IAFC Communications Committee Chair, and Chief Doug Aiken, National Public Safety Telecommunications Council Vice Chair.

          Bluetake USB-s Bluetooth - Jelenlegi ára: 600 Ft   
    USB 1. 1
Bluetooth Standards
    Bluetooth 1. 2
Transfer rate
    1 Mbps
    10 meters (in open space)
Transmission Power
    Class 2
Power Consumption
    DC 5V, USB Power
    0. 1% BER at -80 dBm
Radio Frequency
    2. 4 ~ 2. 483GHz
Operating Systems Supported
    Windows XP/2000/ME/98SE
    Serial Port Profile
    Dial Up Networking Profile
    File Transfer Profile
    Human Interface Device Profile
    Hardcopy Cable Replacement Profile
    Object Push Profile
    Synchronization Profile
    LAN Access Profile
    FAX Profile
    Personal Area Networking Profile
    Advanced Audio Distribution Profile
    Basic Imaging Profile
Dimensions & Weight
    1. 9" x 0. 7" x 0. 4"
Bluetake USB-s Bluetooth
Jelenlegi ára: 600 Ft
Az aukció vége: 2017-06-29 00:34
          3com 3c905cx-tx-m Driver Download Free For Windows 7/8 & XP   
This page contains data about introducing the most recent 3Com 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 (HP Networking PCI Cards) driver downloads utilizing the 3Com Driver Update Tool. 3Com 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 (HP Networking PCI Cards) drivers are minor projects that empower your Network Adapter equipment to speak with your working framework programming. Keeping up refreshed 3Com 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 programming counteracts crashes and amplifies equipment and framework execution. Utilizing obsolete or degenerate 3Com 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 drivers can cause framework mistakes, crashes, and make your PC or equipment fall flat. Besides, introducing the wrong 3Com drivers can exacerbate these issues even. We are always sharing free and official site download links so you can get driver setup very easily and in very short time.
If you are visiting official or driver agent site you will need to follow some important tips. Browse the list to find drivers for your 3Com Network model. Note that the list of compatible operating systems in this table is not full. Click on the model name to view the description of the driver and full compatibility parameters. Make sure that the model name you've selected is exactly the same as mentioned on your 3Com Network device or in the payment bill. If you are sure that the model in the table is the same as yours then you can click "Download" to go directly to the driver download page. Their are several tools which helps you in driver identifying. This tools will download and update the correct 3Com 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 (HP Networking PCI Cards) driver versions automatically, protecting you against installing the wrong 10/100 PCI,TX-M,25PK 3C905CX-TX-M-25 drivers. Now you can download latest driver by managing below download links.
Download links

          交大加速器 NCTU Accelerator   
導入國內外中大企業(Mentoring)、連結國內外創投天使(Funding),強化國際加速網絡鏈結(Networking)等,打入中大型企業或國際企業供應鏈及價值鏈,並拓展第一、二市場通路,產業加速器中心2015年獲得UBI認證亞洲第一加速器經營大獎殊榮,完全加速翱翔!制霸領空! 官方網站:  
          Gone forever!   
This is a fascinating article about European Human Righst and US-based comapnies such as Facebook.

It is all about the ECHR unveiling proposals that would give European users 'the right to be forgotten', meaning they can completely and permenatly erase their personal data (inc. photos) from social networking sites.

Well worth a read!
          Almería celebra una Feria de Empleo y Emprendimiento dirigida a jóvenes   

Para poder asistir solo es necesario estar inscrito en el Sistema Nacional de Garantía Juvenil. Esta acción forma parte del Sistema Nacional de Garantía Juvenil. Contará con talleres vinculados al emprendimiento, seminarios, ponencias de expertos, actividades de networking y participación de empresas almerienses. La acción, que se celebra a nivel nacional organizada por la red …

La entrada Almería celebra una Feria de Empleo y Emprendimiento dirigida a jóvenes aparece primero en MarcaEmpleo.

          LinkedIn: aprenda como usar essa ferramenta e crescer na carreira   

Não faz muito tempo que eu escrevi uma matéria especial explicando a importância e o poder do networking – a famosa rede de contatos profissionais, feita inclusive, nas redes sociais. O famoso ditado de que “não é visto não é

O post LinkedIn: aprenda como usar essa ferramenta e crescer na carreira apareceu primeiro em Fabiana Scaranzi.

          Retiring Thinnet   
I guess it was around 15 years ago that I set up the networking in my house. A few years after that I ran what was to become know as structured wiring for phone, cable, and networking—but I never got … Continue reading
          What's a Good Book to Read?   
Two of the five laws of library science are that there is a book for every reader, and a reader for every book. Our job is to match up books to readers. Here are a few tools which can help:

----Intelligent mysteries, often involving amateur sleuths, without graphic violence, profanity or sex. This is a HUGE genre.

Smart Bitches, Trashy Books 
----Romances are another giant category, and this site will help you find titles that are won't insult your intelligence.

Book Jam
----Two Vermont book lovers blogging about the books they are reading.

----This is a social networking website for readers. To use it, you create a profile, list books that you have read and liked, and the site will make recommendations for you. You can also write your own reviews, join discussions on particular books, and connect with friends to see what they are reading.

What's Next?
----Let's say you heard about an author who has written a series of books, and you want to find out what the first one is, or you've read one or more and want to find out what the next one is. Here's the site which will tell you.

A networking tool to find connections to recommended job candidates, industry experts and business partners. Allows registered users to maintain a list of contact details of people they know and trust in business.
Social networking and discussion site operated by Google.
          Customer Readiness Testing Engineer 2 (CACS551) - Fortinet - Ontario   
A minimum of 4-6 years experience in a technical role in a networking/security company, preferably with Fortinet products Strong understanding of Service...
From Fortinet - Mon, 26 Jun 2017 21:16:27 GMT - View all Ontario jobs
          Technical Support Engineer 1 (CACS547) - Fortinet - Ontario   
At least 2+ years experience in a technical support role in a networking/security company or equivalent education Strong understanding of TCP/IP, routing...
From Fortinet - Wed, 24 May 2017 17:50:27 GMT - View all Ontario jobs

Today on the 5: Microsoft is buying LinkedIn. Will this finally give the rudderless 'networking tool' a purpose?

          Digital Barriers   

Today on the 5: After my 5 on Shark Week, I got a sobering email from professor Tyler Kokjohn on the state of scientific networking.

          much obliged: splash award   
Much obliged to Villager of Electronic Village who recently passed on the Splash Award to Sojourner's Place. This award given to alluring, amusing, bewitching, impressive and inspiring blogs.He says of this spot in bestowing the award that Sojourner's Place - SjP created one of the most alluring blogs in the afrosphere. I love the look, feel and content of her blog. Given yesterday's post, you know I'm really liking that "alluring" description. lol

In passing on the Splash Award, I am to select up to 9 blogs I find alluring, amusing, bewitching, impressive, and inspring to me. The rest of the rules are:

1. Put the logo on your blog post.
2. Nominate up to 9 blogs which allure, amuse, bewitch, impress or inspire you.
3. Be sure to link to your nominees within your post.
4. Let them know that they have been splashed by commenting on their blog.
5. Remember to link to the person from whom your received your Splash award.

My selections for each of the categories are:


The 'D' Spot: I always look forward to OSF and sojourning over to Keith's. You know he's always going to be thinking outside the box with an OS jam that just makes you say "yep! that's the one!"


Aunt Jamima's Revenge: I love the quick wit of Professor Tracy over at Aunt Jamima's Revenge. But, don't understand me, while Professor Tracy manages to to weave wit and musings into many of her posts - the issues she writes about are no laughing matter. Just like the name of her spot, which I think tells it all.

The Happy Go Lucky Bachelor: Now what can I say about Mike? There is never a dull moment at his pad. More times than not, I wonder just where he finds some of the things he posts. Like he says in his header, you got to have a sense of humor cause if you don't you'll miss the message. Glad you're back, Mike!


Ugly Black John: When I'm about to sojourn over to John's, I have to make sure that I have my mind open and ready for a real lesson. He has a way of turning an issue or event on its head and then inside out. Be ready to be completely captivated when you enter this Brother's spot who describes himself as "really not ugly...not good looking either...I just look like I'm good looking".


African American Opinion: AAPP aka LN Rock created this political and social networking ning for African-Americans. How he keeps up with with AAO and two other blogs, I'll never know. But, I am certainly impressed with this "old school brother who gives his thoughts, opinions and insights on political and social issues of the day".


Anyway I Have To: His blog handle is The U, this brothers spot is simply inspiring. He writes from the very depths of his being and shares it with us. The U certainly does it and does it anyway he has to. I hope that one day he'll decide to share his writings in a book. I'd certainly be first in line to buy it.

Hagar's Daughters: "For women who find themselves at the well...praying, crying, dancing, & pondering (& the men who join them there)". Anyone not inspired by the title and description of HG's blog simply has no soul. This sister provides a source of inspiration to me to keep on PUSHing. No matter how bad things might seem, there is always something to be thankful for. I truly get inspiration from her strength.

My Brown-Eyed View: My sister Ms Lady Deborah has got to be the most active advocate in the entire sphere. From information on the evironment to genocide to human rights to injustice you will find it here at MBEV.

The Certain Sound: All I got to say is that if and when I ever get to Toledo, I'm going to make it a point to visit Revy Rev's church. I'm going to make sure I get there early so that I can have a seat on the aisle. I have no doubt that his posts and comments are mirror images of his sermons and that Sunday may be the very first time that old SjP here gets the spirit - holy dance and all.

I hope you will take the time to sojourn over to these alluring, bewitching, inspiring, and impressive blogs. And to the recipients, ya'll keep doing what you doing and I'll be forever MUCH OBLIGED!

Obliged to you for hearing me,
and now old SjP ain't got nothin' more to say...
~~~ ~~~ ~~~
Black News Junkie ~ ~ Technorati ~ ~ ~ ~ Digg This! ~ ~ StumbleUpon ~ ~ Twitter ~ ~ My Good Towels ~ ~ FeedBlitz ~ ~ Email SjP

          AOA+: Emerging leaders’ experience   
Advocacy, career readiness and networking opportunities offer students, new grads leg up.
          Photos: Second Life Explorers For Busines Networking December Meetup   

See all 3 photos.

          JUNIOR IT ASSISTANT FOR VFX COMPANY - Goldtooth Creative Agency Inc. - Vancouver, BC   
Experience in Windows and or Linux Networking, including Active Directory, DHCP, DNS. Disaster Recovery planning, implementation and testing....
From Indeed - Tue, 27 Jun 2017 20:13:00 GMT - View all Vancouver, BC jobs
          Best Wireless Access Point Extender Repeater 2017   

Best Wireless Access Point Extender Repeater 2017 looking for a high performance high stability easy to manage and long range wireless networking solution tp-link new Pharaoh series is exactly what you need barrels contains a variety of products from outdoor cpes base stations – outdoor antennas and a centralized management application which are ideally suited to build an outdoor wireless network with Qualcomm a throws Best wireless extender : enterprise-level chipsets high-sensitivity antennas and high-quality material especially designed enclosure and boe power supply barrows products are specially designed for outdoor use and can operateflawlessly in almost any climate with operating

L'articolo Best Wireless Access Point Extender Repeater 2017 proviene da Tutorial Guida Come Fare.

          Privacy Resurgent   

Today on the 5: Over the last few years, social networking has been all the rage. Recently, though, it seems like people are finally pushing back at the idea of sharing everything.

           Dimension Data and Cisco Announce Project to Protect Rhino by Tracking People    
South Africa-headquartered technology company, Dimension Data, and worldwide leader in networking, Cisco, today announced an initiative aimed at dramatically reducing the number of rhinos being poached in South Africa. The two companies have deployed some of the world’s most sophisticated technology
          Wireless Information   

Locations With Wireless Coverage

All Sites in Campus Available with Wi-Fi Access

Wireless Sign-up And Registration

Wireless setup and registration can be done anywhere with a connection to WiFi-UNI. Those who wish to connect will be required to have a CatID account. Information about CatID and how to reset your passphrase can be found here.

Faculty and staff members wanting their university laptop added should contact their specific technical staff as the colleges and departments have varying setup requirements.

Connecting to WiFi-UNI

There are two steps to connect a device to on-campus wireless:

Enabling Your Device's Wireless Card

For information about enabling your device's wireless visit this support page.

A general overview of connecting a device to wireless

          Safe Computing   

Why Should I Keep My Computer Secure?

The purpose of many security threats today is to allow a hacker to gain access to your computer. The hacker can then:

  • Gather your personal and business information such as passwords for accessing your bank account on-line, credit card details (when you enter them into a web page), business accounts, etc.
  • Use your Internet connection to spread spam.
  • Use your computer for other malicious purposes.

Many computers today have been compromised in this way and their owners are not even aware of it. The problem is so widespread that hackers, aided by the proliferation of Broadband, even hire out "networks" of compromised computers for relaying spam!

How Can I Tell If My Computer Has Been Infected?

If you have an Internet Security program suite, such as Norton Internet Security installed on your computer, you should make sure that it is working and up-to-date. Have the program scan your computer for viruses and spyware on a scheduled basis. If you have separate anti-virus and anti-spyware software you should do the same with both these programs.

If you don’t have any up-to-date, working security software installed on your computer but you do have Internet access, you can use an on-line virus scanner. You can try the on-line scanner provided by Symantec (the makers of Norton software) by going to and clicking the Check For Security Risks link. You may also try using Trend Micro's Housecall located at:

If you don’t have any up-to-date, working security software and you don’t have reliable Internet access, one or more of these symptoms may indicate that your computer has been infected or compromised:

  • Your computer generates one or more errors when it starts up.
  • Your computer is very sluggish.
  • You can’t update your security software or access certain web sites.
  • Your Internet connection is very active when you are not doing anything on the Internet.
  • Strange pictures have appeared on your computer desktop.
  • When you are browsing the Internet you are continually directed to pages you have not chosen to go to.
  • You experience a large amount of pop ups.

In our experience, around 75% of computer problems are caused by virus infections or other computer security issues.

What Should I Do If I Think My Computer Has Been Infected?

If you think your computer may have been infected or compromised, or if you try to remove viruses or other threats from your computer but it is continually getting re-infected:

  • Do not use your computer to access bank accounts on-line, to buy anything on-line or to access any on-line accounts that contain your bank account details, credit card details, or any other personal information.
  • Disconnect your computer from the Internet or network.
  • Shut your computer down.
  • Seek professional help (you can contact us for advice).

Basic Computer Security Advice

There are 3 basic steps to keeping your computer safe:

  • Install an Internet Security program suite, e.g. Norton Internet Security, that contains anti-virus, Spyware and firewall protection. (See our Useful Links page for details of where to buy Internet Security suites.)
  • Check for updates for your Internet Security suite every day before you surf the Internet or download email. (To see how to do this view our tutorial.)
  • Check for Microsoft Windows critical updates manually if you have turned off Windows Automatic Updates or if you don’t have broadband. (To check for Windows updates open Internet Explorer, click the Tools menu and then click Windows Update.) You should do this manual check at least once a month.

General Tips

  • Use your anti-virus software to scan your computer for viruses weekly. Most anti-virus software will allow you to schedule weekly scans that will run automatically. (If your computer misses its weekly scan, do a manual scan yourself as soon as possible thereafter.)
  • If you have separate spyware and adware protection software scan weekly with these programs as well.
  • Take regular backups of your important files. As a general rule of thumb, the more important the information is and the more frequently it changes or is added to, the more frequent should be the backups.
  • Never use a computer to access any web site that has your credit card or bank account details unless you know for sure that the computer you intend to use is completely virus free.
  • Regularly review your credit card and bank statements.


  • Never open any email attachment unless you are expecting it and you know what it contains. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that what they sent was not a virus.
  • Never click on a link in an email message unless you are expecting it and you are 100% sure of its authenticity. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that they sent it to you. Clicking on a link to a web site, amusing video clip, etc can install a Trojan Horse on your computer.
  • Never run any program that is emailed to you, no matter who has sent it to you. "Free" screen savers and games are used to infect computers with viruses, Trojan Horses, Spyware, etc. These screen savers and games can work perfectly well and the infection that they carry may not become obvious for months.

Beware of email scams and hoaxes - they come in many forms but you should never respond to any of them. Some pretend to be from your bank or other organization and ask you to click on the link in the email and re-enter your account information, including your PIN or credit card details. Clicking the link takes you to a web site that will look like your bank or other organizations web site but is designed to capture your account details. These details are then used to empty your bank account or charge items to your credit card.

Other hoaxes purport to be from Microsoft and request that you click a link in the email to update your security protection. When the link is clicked a Trojan Horse is downloaded on to your computer and installs itself. Remember, reputable organizations like banks, Internet service providers, Ebay, etc who hold details of your bank account or credit card will never email you to ask you to re-enter your account details. Microsoft also never send emails about security updates.

Instant Messaging

  • Be careful downloading files in Instant Messaging (IM) programs such as MSN Messenger and Yahoo! Messenger. Never open, accept, or download a file in IM from someone you don’t know. If the file comes from someone you do know, don’t open it unless you know what the file is and you were expecting it. Contact the sender by e-mail, text, phone or some other method to confirm that what they sent was not a virus.
  • Block messages from anyone not already in your contact/buddy list to prevent spim, the IM equivalent of spam, which is increasingly being used to propagate phishing scams.
  • Never click on a link in IM unless you are expecting it and you are 100% sure of its authenticity. If you are unsure, contact the sender by e-mail, text, phone or some other method to confirm that they sent it to you. Clicking on a link to a web site, amusing video clip, etc can install a Trojan Horse on your computer.
  • Links in away messages can be used by IM worms so it is advisable not to click them.
  • Make sure that you use the most up-to-date version of your IM program so that your computer is better protected.


  • Be suspicious of every web site that isn’t well known to you. Does the web site address or web site name seem suspicious? Does the site look right? Does it feel right? Things to look out for include predominantly black or very dark colored web sites, text styles that don’t seem right, information that seems to serve no particular purpose or that doesn’t tie in with the purpose of the site, and so on. If you feel at all uneasy about a web site, leave it immediately by clicking the Back button on your web browser or by closing your web browser.
  • Don’t click on any link that you feel uneasy about or that seems to have no plausible purpose.
  • If you are asked to download and install any Applet, ActiveX Control or anything else, don’t do it! Click the Cancel button or go to another web page immediately.

The 3 Internet related activities that are almost guaranteed to get your computer infected are music downloading, file sharing, and playing on-line games. Here are our tips:

Music Downloading and File Sharing – Use well known sites such as iTunes, MSN Music, etc for your music downloads. Don’t download any music software or player that is not from a well-known company. If you see a site advertising unlimited free music beware! The only way to get an unlimited supply of free music is to file share and every computer we have examined that has been used for file sharing has been so riddled with viruses, Trojan Horses, etc that it has greatly degraded the performance of the machine.

On-Line Games – We have seen a lot of cases of computers that have been infected by downloading and installing ActiveX Controls, Java Applets or other software for playing on-line games. We therefore urge extreme caution when downloading anything to play on-line games. Is it worth the risk?

Mobile Devices (including Mobile Telephones, Smartphones and PDAs)

Currently, smartphones using the Symbian operating environment and PDAs with the Windows CE or Palm operating systems are the main targets for these viruses. They spread by messages sent via Bluetooth or MMS, within programs and games downloaded via MMS or from the Internet, and by infected emails.

Don’t make the mistake of ignoring the existence of these viruses and forgetting about basic security guidelines. They can cause significant damage and inconvenience, e.g. one virus, called Commwarrior, can run up your telephone bill as it attempts to spread by MMS.

Preventative measures that can be taken include:

  • Don’t open suspicious or unsolicited messages.
  • Only download programs and games from the official websites.
  • Use anti-virus software that has been specifically designed for mobile phones or PDAs.
  • Review the Bluetooth section below for Bluetooth security measures.


  • Consider disabling Bluetooth if you don’t use it.
  • Turn off your Bluetooth enabled device when it is not with you. Thieves are now using Bluetooth technology to scan parked cars for mobile phones, laptops, etc.
  • Consider setting your Bluetooth device to undiscoverable mode which will still allow you to keep your headset connection while not broadcasting your presence. This helps protect against virus transmission and will also protect you from Bluesnarfing.

Wireless Networking

Security problems can arise with wireless enabled devices when they are configured to seek out and connect automatically to any wireless base station, leaving them open to attack and infection.

To help secure a wireless enabled device:

  • Consider disabling your wireless card if you don’t use it.
  • Ensure that your wireless card is not configured to seek out and connect automatically to unknown wireless base stations.

Security problems can also arise when home or small business wireless networks are installed but not secured. If the precautions listed below are not taken, anyone with a wireless device within range of an unsecured wireless base station or wireless Router could connect to the wireless base station/Router and access the other computers connected to it, use the Broadband Internet bandwidth and even re-configure the wireless base station/Router. Additionally, if wireless network traffic is not encrypted the base station/Router can be subject to eavesdropping.

To help secure a wireless base station or Router:

Change the manufacturer’s standard login information and Wireless Network Name (SSID). Set up a Wireless Access List restricting the list of computers able to connect to the network to your own computers. Encrypt the network traffic with at least WEP (Wired Equivalent Privacy) encryption and preferably WPA-PSK (Wi-Fi Protected Access Pre-Shared Key) encryption to ensure a better level of protection.

Hard Drive Disposal

In its 14th August 2006 episode the BBC's Real Story highlighted the fact that the bank account details of thousands of Britons are being sold in Africa for less than $20. Old computers taken to local council waste disposal sites are often sent to Africa where the hard drive can be removed and sold. The people who purchase these hard drives can then access the information on them, even if they have been wiped.

Real Story bought 17 hard drives from Nigeria at $15 each and, using a computer expert, found the owners' addresses, bank account numbers, sort codes, passwords and other highly confidential information.

To dispose of your old computer hard drive securely you can use one of these alternative methods:

  • Use commercial erasing software to completely erase your hard drive. The best hard drive erasing software is based on Peter Gutmann's algorithm and/or the U.S. DoD's method.
  • Pay a computer professional to securely erase your hard drive.
  • Sign-up for a recycling service run by your hard drive or PC manufacturer.
A learning tool with information and advice

          Dis-intermediation of the university via open courseware -- NYTimes: An Open Mind   
Dis-intermediation of the university via open courseware -- NYTimes: An Open Mind
[Some excerpts from NYtimes – BSA]

Open courseware is a classic example of disruptive technology, which, loosely defined, is an innovation that comes along one day to change a product or service, often standing an industry on its head. Craigslist did this to newspapers by posting classified ads for free. And the music industry got blindsided when iTunes started unbundling songs from albums and selling them for 99 cents apiece.

Some imagine a situation in which the bulk of introductory course materials are online, as videos or interactive environments; students engage with the material when convenient and show up only for smaller seminars. “In an on-demand environment, they’re thinking,

Mr. Schonfeld sees still more potential in “unbundling” the four elements of educating: design of a course, delivery of that course, delivery of credit and delivery of a degree. “Traditionally, they’ve all lived in the same institutional setting.” Must all four continue to live together, or can one or more be outsourced?

Edupunks — the term for high-tech do-it-yourself educators who skirt traditional structures — are piloting wiki-type U’s that stitch together open course material from many institutions and combine it with student-to-student interaction. In September, Neeru Paharia, a doctoral student at Harvard Business School, and four others from the open education field started up Peer 2 Peer University, a tuition-free, nonprofit experiment financed with seed money from the Hewlett and Shuttleworth foundations.

Ms. Paharia doesn’t speak the same language as traditional educators: P2PU “runs” courses. It doesn’t “offer” them. There are currently 16 courses, in subjects as diverse as behavioral economics, music theory, cyberpunk literature and “managing election campaigns” (and all with a Creative Commons license that grants more freedom of use than a standard copyright). Several hundred people are taking classes, Ms. Paharia says.

P2PU’s mission isn’t to develop a model and stick with it. It is to “experiment and iterate,” says Ms. Paharia, the former executive director of Creative Commons. She likes to talk about signals, a concept borrowed from economics. “Having a degree is a signal,” she says. “It’s a signal to employers that you’ve passed a certain bar.” Here’s the radical part: Ms. Paharia doesn’t think degrees are necessary. P2PU is working to come up with alternative signals that indicate to potential employers that an individual is a good thinker and has the skills he or she claims to have — maybe a written report or an online portfolio.

David Wiley, associate professor of instructional psychology and technology at Brigham Young University, is an adviser to P2PU. For the past several years, he has been referring to “the disaggregation of higher education,” the breaking apart of university functions. Dr. Wiley says that models like P2PU address an important component missing from open courseware: human support. That is, when you have a question, whom can you ask? “No one gets all the way through a textbook without a dozen questions,” he says. “Who’s the T.A.? Where’s your study group?”

“If you go to M.I.T. OpenCourseWare, there’s no way to find out who else is studying the same material and ask them for help,” he says. At P2PU, a “course organizer” leads the discussion but “you are working together with others, so when you have a question you can ask any of your peers. The core idea of P2PU is putting people together around these open courses.”

A similar philosophy is employed by Shai Reshef, the founder of several Internet educational businesses. Mr. Reshef has used $1 million of his own money to start theUniversity of the People, which taps open courses that other universities have put online and relies on student interaction to guide learning; students even grade one another’s papers.

The focus is business administration and computer science, chosen because they hold promise for employment. He says he hopes to seek accreditation, and offer degrees.

Mr. Reshef’s plan is to “take anyone, anyone whatsoever,” as long as they can pass an English orientation course and a course in basic computer skills, and have a high school diploma or equivalent. The nonprofit venture has accepted, and enrolled, 380 of 3,000 applicants, and is trying to raise funds through microphilanthropy — “$80 will send one student to UoPeople for a term” — through social networking.

A decade has passed since M.I.T. decided to give much of its course materials to the public in an act of largesse. The M.I.T. OpenCourseWare Initiative helped usher in the “open educational resources” movement, with its ethos of sharing knowledge via free online educational offerings, including podcasts and videos of lectures, syllabuses and downloadable textbooks. The movement has also helped dislodge higher education from its brick-and-mortar moorings.

If the mission of the university is the creation of knowledge (via research) and the dissemination of knowledge (via teaching and publishing), then it stands to reason that giving that knowledge away fits neatly with that mission. And the branding benefits are clear.
The Open University, the distance-learning behemoth based in England, has vastly increased its visibility with open courses, which frequently show up in the Top 5 downloads on Apple’s iTunes U, a portal to institutions’ free courseware as well as marketing material. The Open University’s free offerings have been downloaded more than 16 million times, with 89 percent of those downloads outside the U.K., says Martin Bean, vice chancellor of the university. Some 6,000 students started out with a free online course before registering for a paid online course.

Carnegie Mellon’s Open Learning Initiative is working with teams of faculty members, researchers on learning and software engineers to develop e-courses designed to improve the educational experience. So far there are 10 complete courses, including logic, statistics, chemistry, biology, economics and French, which cost about $250,000 each to build. Carnegie Mellon is working with community colleges to build four more courses, with the three-year goal of 25 percent more students passing when the class is bolstered by the online instruction.

The intended user is the beginning college student, whom Dr. Smith describes as “someone with limited prior knowledge in a college subject and with little or no experience in successfully directing his or her own learning.”

It works like this: Virtual simulations, labs and tutorials allow for continuous feedback that helps the student along. The student’s progress is tracked step by step, and that information is then used to make improvements to the course. Several studies have shown that students learn a full semester’s worth of material in half the time when the online coursework is added. More students stick with the class, too. “We now have the technology that enables us to go back to what we all know is the best educational experience: personalized, interactive engagement,” Dr. Smith says.

twitter: BillStArnaud
skype: Pocketpro
          Cool new Middleware from Twitter for distributed data

"Twitter last night offered up the code for Gizzard, an open-source framework for accessing distributed data quickly, which Twitter built to help the site deal with the millions of requests it gets from users needing access to their friends and their own tweets. It could become an important component of building out web-based businesses, much likeFacebook’s Cassandra project has swept through the ranks of webscale startups and even big companies.
Gizzard is a middleware networking service that sits between the front-end web site client and the database and attempts to divide and replicate data in storage in intelligent ways that allows it to be accessed quickly by the site. Gizzard’s function it to take the requests coming in through the fire hose and allocate the stream of requests across multiple databases without slowing things down. It’s also fault-tolerant, which means if one section of data is compromised, the service will try to route to other sections. From the Twitter blog post:"
          Citizen Science - how you can make a contribution to study of climate change   
[From Climate Progress - “the indispensable blog” — Tom Friedman, New York Times –BSA]

Online social networking is no longer just about tagging a picture of your dog on Facebook or announcing to the world what you’re having for dinner on Twitter. Scientific institutions worldwide are beginning to harness the power of online social networking for scientific research. Online communities are an ideal vehicle for matching professional scientists with armies of enthusiastic amateurs. This corps of citizen scientists has the capacity to capture far more data over a vastly expanded geographical spectrum than professional scientists can on their own.
The USA National Phenology Network is one organization that is reaching out to citizen scientists via the Internet. People have used phenology, the study of the timing of lifecycle events of plants and animals, to detect the signs of spring since the early 18th century. The rising threat posed by global warming has spurred scientists to put phenology to another use: to detect the signs of climate change.
Plants and animals are very sensitive to even the smallest changes in their climates. Shifts in the timing of their lifecycle events can therefore be an important indicator in the study of climate change and its effects. Slight changes can have huge repercussions; mutual relationships between species and even entire systems can begin to fall apart.
USA-NPN is asking people across the country to record the phenology of their local flora and then report it online. Amateur hikers and photographers can also participate in NPN’s Project Budburst. They are asked to identify the phenological stage of the flowers and plants they see using information provided by the project’s website. The participants record the location, longitude, and latitude of what they observe. Eventually, Project Budburst will use this information to include real-time mapping with Google maps.
Relying on anonymous volunteers to collect data that will be entered into important scientific databases certainly raises questions about the reliability of the information gathered. Yet it turns out that most of the data is remarkably accurate, and researchers do perform checks on anomalous data. What’s more, the large pool of samples collected by a large group of volunteers diminishes the impact of any faulty data.
This creative new use for social networking also answers critics’ accusations about the frivolity of Facebook, Twitter, and other sites with proof that online networking has the potential to mobilize users to actively participate in innovative programs. Jack Weltzin, executive director of NPN, has said that in the future NPN hopes to make it possible for people to submit their findings via Twitter. NPN, a nonprofit organization, also hopes that iPhone and Facebook applications might be created to more easily facilitate volunteer participation.
Climate change scientists are not the only members of the scientific profession to tap into the potential of these online communities. In addition to tracking climate change, the information participants collect can help scientists predict wildfires and pollen production and monitor droughts as well as detect and control invasive species. Other online projects, such as “The Great World Wide Star Count,” rely on volunteer participation to gauge the level of light pollution across the globe. Several websites are also dedicated to tracking the migratory and breeding patterns of animals such as birds, frogs, and butterflies. All of these observations will augment the databases available to scientists attempting to understand annual fluctuations.
          Science 2.0: New online tools may revolutionize research   
[Excellent article on how Web 2.0 tools are transforming science. The 2 projects mentioned have been funded by CANARIE in the latest NEP program amongst a total of 11 similar projects . For more examples of how web 2.0 is revolutionizing science please see my Citizen Science Blog. Thanks to Richard Ackerman for some of the FriendFeed pointers. Some excerpts from CBC website– BSA]

Citizen Science


Described as an extension of the internet under the ocean, the Venus Coastal Observatory off Canada's west coast provides oceanographers with a continuous stream of undersea data once accessible only through costly marine expeditions. When its sister facility Neptune Canada launches next summer, the observatories' eight nodes will provide ocean scientists with an unprecedented wealth of information.
Sifting through all that data, however, can be quite a task. So the observatories, with the help of CANARIE Inc., operator of Canada's advanced research network, are developing a set of tools they call Oceans 2.0 to simplify access to the data and help researchers work with it in new ways. Some of their ideas look a lot like such popular consumer websites as Facebook, Flickr, Wikipedia and Digg.
And they're not alone. This set of online interaction technologies called Web 2.0 is finding its way into the scientific community.
Michael Nielsen, a Waterloo, Ont., physicist who is working on a book on the future of science, says online tools could change science to an extent that hasn't happened since the late 17th century, when scientists started publishing their research in scientific journals.
One way to manage the data boom will involve tagging data, much as users of websites like Flickr tag images or readers of blogs and web pages can "Digg" articles they approve. On Oceans 2.0, researchers might attach tags to images or video streams from undersea cameras, identifying sightings of little-known organisms or examples of rare phenomena.
The Canadian Space Science Data Portal (CSSDP), based at the University of Alberta, is also working on online collaboration tools. Robert Rankin, a University of Alberta physics professor and CSSDP principal investigator, foresees scientists attaching tags to specific data items containing occurrences of a particular process or phenomenon in which researchers are interested.
"You've essentially got a database that has been developed using this tagging process," he says.
If data tagging is analogous to Flickr or Digg, other initiatives look a bit like Facebook.
Pirenne envisions Oceans 2.0 including a Facebook-like social networking site where researchers could create profiles showing what sort of work they do and what expertise they have. When a scientist is working on a project and needs specific expertise — experience in data mining and statistical analysis of oceanographic data, for example — he or she could turn to this facility to find likely collaborators.
"It's a really exciting time," Lok says, "a really active time for Science 2.0."

it got lots of buzz on FriendFeed, there are multiple mentions of it

(The conference Eva's referring to is Science Online 2009.)
          e-science, virtual organisations, data curation   
[Thanks to Richard Ackerman for this pointer, and I agree with his assessment there are lots of interesting presentations here –BSA]

A lot of interesting presentations here

Proceedings from the ARL/CNI Fall Forum
October 16-17, 2008
Arlington, Virginia

E-Science: Trends, Transformations & Responses
E-Science: Trends, Transformations & Responses
Chris Greer, Director, National Coordination Office (NCO) for the multiagency Federal Networking and Information Technology Research and Development (NITRD) Program
Audio [MP3 22 min.] | Slides [PPS 24.7 MB]
A Case Study in E-Science: Building Ecological Informatics Solutions for Multi-Decadal Research
William Michener, Research Professor (Biology) and Associate Director, Long-Term Ecological Research Network Office, University of New Mexico
Audio [MP3 26 min.] | Slides [PPS 8 MB]
Making a Quantum Leap to eResearch Support
Rick Luce, Vice Provost and Director of University Libraries, Emory University Libraries
Audio [MP3 19 min.] | Slides [PDF 2.5 MB]
Data Curation: Issues and Challenges
Transition or Transform? Repositioning the Library for the Petabyte Era
Liz Lyon, Director, UKOLN
Audio [MP3 23 min.] | Slides [PPS 10.3 MB]
Research and Data
Fran Berman, Director of the San Diego Supercomputer Center, UC San Diego, and Co-chair Blue Ribbon Task Force on Sustainable Digital Preservation and Access
Audio [MP3 44 min.] | Slides [PPS 5.5 MB]
Data Curation Issues and Challenges
Sayeed Choudhury, Associate Dean of University Libraries and Hodson Director of the Digital Research and Curation Center, Johns Hopkins University
Audio [MP3 20 min.] | Slides [PPS 424 KB]
Data Curation Panel
Pam Bjornson, Director-General, Canada Institute for Scientific and Technical Information
Audio [MP3 6 min.] | Slides [PPS 1.9 MB]
Supporting Virtual Organizations
The Coming Age of Virtual Organizations: The Early History and Future of Geographically Distributed Collaboration
Thomas A. Finholt, Director, Collaboratory for Research on Electronic Work (CREW) and Research Professor & Associate Dean for Research and Innovation, School of Information, University of Michigan
Audio [MP3 24 min.] | Slides [PPS 7.3 MB]
Cyberinfrastructure for Discovery, Learning, and Engagement:

The nanoHUB Experience
Mark Lundstrom, Don and Carol Scifres Distinguished Professor, Director, Network for Computational Nanotechnology, School of Electrical and Computer Engineering, Purdue University
Audio [MP3 22 min.] | Slides [PPS 3.5 MB]
Reactor Panel: Supporting the Virtual Organization: A Role for Libraries?
Medha Devare, Life Sciences and Bioinformatics Librarian, Mann Library, Cornell University
Audio [MP3 20 min.] | Slides [PPS 3.2 MB]
Reactor Panel: Supporting the Virtual Organization
D. Scott Brandt, Associate Dean for Research, Purdue University Library
Audio [MP3 7 min.] | Slides [PPS 4.3 MB]
          Web 2.0 and social networking for scientists   
[Excellent slide deck on various web 2.0 tools available for scientists and researchers, and the impact they are having on research. Thanks to Richard Ackerman for this pointer-BSA]
          Distributed Computing for Eartquake Monitoring   
[Here are too cool distributed computing applications (similar in operation
to SETI@Home.

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~_/) ~~

Distributing Computing Project For Earthquake Monitoring Coming Soon Levi Beckerson (Blog) - April 3, 2008 9:23 AM

UC Riverside researcher's earthquake monitoring system via distributed computing will soon be a reality.

Many computer enthusiasts as well as casual users are familiar with the various distributed computing projects such as Folding@home and SETI@home. And if there weren't enough familiarity for PC users, Sony's PlayStation 3 can also run Folding@home and does so very well thanks to its Cell Broadband Engine.
The magic behind distributed computing is in using all those unused processing cycles where computers lie semi-inert, simply passing time by spinning cooling fans. The various clients utilize unused cycles by crunching numbers for a given project.

The Quake-Catcher Network will use spare processing power as well as already installed accelerometers in laptops to monitor for seismic activity.

The accelerometers in modern laptops are used to help protect hard disk drives from suffering mechanical failure due to sudden impacts. As they are designed to measure vibration, they are a perfect fit for the Quake-Catcher Network's monitoring system.

Unlike the underground seismic sensors that dot southern California, which,after the data is transferred to one of several universities, takes 15 to 20 seconds to analyze, the network's seismic monitoring would happen in
real-time thanks to the way distributed networking works. The monitoring network could be used as an early warning system to give people in neighboring towns 10 to 15 seconds to prepare for the shock waves.

The data gathered by a dense network of monitoring stations could also be used to map the seismic data from the event, giving scientists a time line as well as information about material density and distance. The gathered
results will be freely available to the public and researchers.

          REE 2008: the program (day 1-3)   
So... I just returned from Stanford where I attended the 2008 REE Fellow program through the Stanford Technology Ventures Program. This blog will be a bit of a play by play, giving details about the daily events - hopefully, a few folks from next year will read and see the good and the bad.

Day 0: The Drive there...

I chose to drive down from Oregon instead of fly - many of my compatriots were flying from much greater distances but since I was coming from the next state over AND was bringing a bunch of Oregon products I figured driving would be a good way to go. 

Yes and no. The problem with driving from Oregon is that Palo Alto is just near enough to do in one day. One long day. One very long day. I had five stops at various vineyards and creameries to make along the day, so I got in to the SLAC (stanford guest house located at the linear accelerator) around 0100. However, the hotel receptionist was pleasant, awake, and quickly got me in a room. I would say more about driving through Oregon's wine country and the amazing beauty of King Estate Winery but I will leave it at a recommendation that if you get a chance, this is a place not to be missed. To be fair, I got wine from many wineries which I will mention in another blog, but this place was amazing.

Day 1: Welcome...

Advice: So here is my first piece of advice, get to SLAC early the welcome day. Get settled. It will make a difference.

Woke early morning and took a ride down to Stanford to scout the campus and the faculty club area. Beautiful campus which suffers from an extreme lack of parking, which apparently is intentional. The campus bookstore, like so many others, is overpriced; don't buy now... in a few days you will have a better feel for what type of memento you'd like. 

Back at SLAC, to the event you take a wonderful free shuttle bus called the Marguerite. Get used to it, as it's free, comes right to SLAC, and runs into campus and to Palo Alto. You'll also walk a lot, though more on that later. 

We met around 1500 for 'high tea' at the faculty club. Don't dress up, it's not formal. However, this is the first time you really meet a lot of your peers, though some you will have met at SLAC earlier if you are fortunate. We got to decorate name tags... kinda silly, but you have to live with them for days, so it's worth a minute or two of effort. Our host Belen handed out tshirts as well, which was nice (see, I told you not to buy one at the bookstore.)

Advice: Appetizers are served here... kinda nice ones. EAT them. Never assume dinner will be all that good... or available for that matter. Food was hit or miss.

We then walked over to a large lecture hall, where we saw William McDonough speak. An interesting talk - our hosts were quite enamored with his every word; but he was all over the place, failed to take into account the full ecological footprint of his ideas, and when confronted with a real question regarding population displacement for these 'green communities' he passed the buck. Overall the same type of 'save the world by being green' stuff I see everywhere nowadays, but lacking real science behind it which is too bad. I expected more substance from a Stanford lecture. This leads to my first lesson:

Lesson: Just because it is Stanford, do not expect rigor. This is not a class, and the REE is intentionally a bit light due to the many different backgrounds. (I'll blog about that too at some point).

We then went to the treehouse for dinner, and our first real chance to sit and socialize with no timeline afterwards. 

Advice: Notice the lack of schedule... this will be a recurring theme. REE expects independence, and frequently that results in a "what now" feeling. Get used to it, and make sure you know the shuttle's last run, as cabs are $15 from campus. 

The Treehouse is a good example of Stanford in many ways, but the food was pretty blase. I ate light, and used the time to meet the different Fellows. It will take all week to make any real connections as 50 people are hard to get to know quickly. Importantly, these connections will quickly lead to differing activities. 

We caught the shuttle home before 2000. It was packed, and not large enough for the entire group, so some had to be picked up later. Stanford is a bit confusing at first, so we walked many blocks to a shuttle stop a block from where we started. This would not be the last time this occurred.

Back at the SLAC, we broke into some beverages I had brought, and had a few drinks to well into the morning. Safeway is nearby if no one has libations. Widmer Hefeweizen was pretty popular. This was the highlight of the day, as you'll meet some pretty cool people.

Advice: This schedule would repeat itself many many times, so I would come to REE rested, as you will not get a lot of sleep unless you desire to miss some of the socializing. 

Day 2: Greetings redux

It would seem that day two would be the day things really got going, but honestly, not really. Our schedule was basically a tour of Stanford at 1000 (could have skipped, in fact, I accidently merged with the second tour group which was ahead by 10 minutes when I got a phone call - didn't miss much). After lunch I spent MUCH more time wandering around campus, which proved a far better use of my time in seeing the school. And i'll put this here as I am not sure where else to mention it, but Stanford seemed almost deserted much of the time. OSU is packed with 20,000, but Stanford seemed much like a ghost town. Even at the hours, when normally students would be pouring out of buildings did Stanford feel empty. A week later, only once did I not get this same impression.

The meet and greet lunch as one of the highlights of the food... a nice buffet at the faculty club, kinda upscale foods. Got a table outside, and it was quite nice. The team building activities left a lot to be desired though. Kinda trivial stuff done many times before. This sadly too becomes a recurring theme. My friend Noah does informational organization work, and I would have rather someone like him got us thinking how to organize the info instead of just how to create it. But I digress... all in all a nice lunch, but we were done by 1400, and that was it for the day, at least for the program (more on that in a second). 

Wandered around campus a bit that afternoon - great chance to really see Stanford during the week, and you have essentially the rest of the day unfettered. 

However, I had other plans. Back in my room I had 60 bottles of Oregon Wine, 13 cases of Oregon Microbrews and a bunch if foods from various Oregon vendors. So, in the bottom of SLAC, around 1800 I threw an Oregon Foods party. Folks also had brought some small items, but REE dinner was a single piece of sushi each, so most people dug into the brought foods hardcore. This was a ton of fun (like I said, I'll go into more detail in another post). Utterly outside of REE, this was where we really started to make connections and again things lasted well into the night. This social networking would turn into one of the most valuable assets of the trip.

Day 3: Highschool?

So, day three was a real disappointment. I had hurt my back the night before, so that didn't help either, but essentially it was catching the shuttle down to Stanford to meet with Tina and Ed in the D school area.

You can always tell a program which is not well funded, as they turn their lack of infrastructure into a 'flexible organic workspace'. I get the impression that this will change soon, as Tina's work is not trivial, but it comes across now as somewhat an afterthought for Stanford - no matter how creatively you dress it up. 

None the less, the morning was spent essentially discussing rules for brainstorming and then some brainstorming exercises which seemed to be geared at reinforcing these lessons. If I heard 'think outside the box' again, I might have actually killed someone. People are good at brainstorming, this is not the issue. Where people have problems is organizing the ideas into a coherent plan of action or theme. This was readily evident, and not at all addressed. Essentially the program was geared at the HS level, and since I was but one of the few undergrads (most folks were grad students), it was not all that well received. This would not be the first time that people verbally complained when out of reach of the hosts - it got worse as the week went on. 

Ed then did some exercise before lunch on 'back of the envelope' budget analysis. I have a finance background, so it was trivial but for some this wasn't bad. Unfortunately I got the impression Ed didn't have a finance background either, as some pretty pivotal analysis was left off. Oh well, the idea came across.

Afterwards, lunch again - box lunches from Whole Foods, and then by 1330, done for the day. This was when folks, busy folks who had given up time during the term, started to get a bit annoyed at how the program was running. To be fair, we did have a team project which i will mention in a bit, to work on; but I met with my team, we had a solid idea, and that just left dinner. Tonight, we all went out to Palo Alto, and after $9 beer at Andale ended up drinking at Nola's til late in the evening. I drove down, so while I had to stop drinking a couple hours before we left, it saved a bunch on cab fare.

Advice: Palo Alto is expensive. Be prepared to shell out a lot for food and transportation. If you have three people with you, cab fare is much cheaper obviously.

Advice: Get some construction paper, glue sticks and scissors. The rest is just printed out for the project. 

(more to come)...

          U.S. wants to be able to wiretap online communications.   
Essentially, officials want Congress to require all services that enable communications -- including encrypted e-mail transmitters such as BlackBerry, social networking websites such as Facebook and software that allows direct "peer-to-peer" messaging such as Skype -- to be technically capable of complying if served with a wiretap order. The mandate would include being able to intercept and unscramble encrypted messages.
          How to Hack Almost any Hotmail, Easily without Keylogging, in 24 hours.   
How to Hack Almost any Hotmail, Easily without Keylogging, in 24 hours.

This method is called Reverting, and you will be sending a form in to microsoft customer support to reset the password for your (or somebody elses) hotmail account.

For this method, it helps to know the person, even a little, but i'll still give you a step-by-step tut on how to find the information and fill out each part of the form.


Step 1: go here:

This is the form you will be filling out.

Step 2: Give them your victims full name.

Now, if you do not know their first name, try the following things to find it.

First, try using these two sites, simply enter their email and hit return.

if you want more, google their hotmail account(s), for example, type into google:


Include the quotes, cause this searches for only the hotmail account.
If you gain any results, it will most likely be forums or if you're lucky, social networking sites, that they have filled out their info on.
Go through these searches, and look at every one, even make a .txt file in notepad pasting down all the info you can on them.
Once you're done, if you havnt got their last name, keep reading..if you have, goto step 3.

Presuming you dont yet have their last name, try going to social networking sites, like:

Or any others you can think of, and search for their hotmail account using the websites search feature.
if you get any results, you're in luck, most of the time people include alot of information on themselves in there. Follow any leads you can find on the info, and even ask them or their friends (look up a tutorial on social engineering info out of people first, it will help).

Now another thing you can do is use IF your victim has their own website.

If you dont have it by now, maybe you should find an easier target, or if you're desperate, use this technique to hack one of their rl best friends, and alot of the time they have their full name assigned to your victims hotmail address, in their addressbook.

Or, I sometimes just say "I'm pretty sure I only put in my first name at registration, I'm paranoid like that" or something along those lines... It's worked for me.

BTW: This is called d0xing, or "documenting", basically harvesting info on people, it's completely legal as long as you get all your info from the public domain (forums, social networking sites etc).

Step 3: The e-mail address for us to send a response to.
simple, give them your email address... could use a fake one if you're paranoid (one you got access too), but i dont see any risk.

Step 4: Primary e-mail address/member ID associated with the account you are inquiring about.
Here you put in your victims email address (the one you're trying to hack).

Step 5: Date of birth.
You can simply give them the year, if you dont know any further then that..but if you want to be on the safe side, read step 2, and use those techniques to find their date of birth.

Step 6: Country
If you dont know their country, which you probably should, use their IP address which you will have in one of the next steps to find it, by using

Step 7: State
same deal, use their IP addy if you dont know it already

Step 8: ZIP or postal code
Same deal again, it's usually correct if you use the IP addy...just use
and find their town/suburb or whatever, and google the ZIP code for it.

Step 9: The secret answer to your question
simply put "i dont remember"

Step 10: Your alternate email address
for this, you just put in the email address you're trying to hack, you dont need their alternate email address.

Step 11: Your IP Address
Okay so here's probably the toughest one, but it's still easy. (NOTE: It's very hard to revert an account unless you successfully complete this step)
There's alot of ways to get their IP, i'll give you the easy ones.

Email: Get them to send you an email somehow, it doesnt matter how, you can just send an email saying:
"hey, how are you?" and they'll probably reply. Once you have their email (dont use old emails, please, everybody uses dynamic IP's these days)
right click on it, and click "view source", you will see something like this: you want to find "X-Originating-IP: [XX.XXX.XX.XX]" That is their IP address.

Website: Go here and give them your nickname or whatever you want them to call you, and your email address, like this:

They will give you a URL, find a way to send that to your victim.
For example, for one of my victims, he said "ha i got 3 firewalls you cant hack me" so i told him to goto that URL if he's so safe, and i told him if he doesnt, he needs to grow some he did :)
BTW, when they go there, it just says the webpage cant be found, and then you get an email from reza24 telling their IP :D

Full credit of this site goes to Raider, he did an awesome job :) he deserves some rep for it :P

MSN: if you can talk to them on msn, then you can get their IP that way too..there's two ways, either download a easy-to-use script, or do it manually with cmd,
i'll show you how to do it manually first.

Manually: Send them a file, or get them to send you a file.
"hey, i love that song, can you send me it?" or "omg, this is the funniest picture ever".
Before you start the transfer though, goto start > run (if you're using vista, just press the windows key) and type in cmd, and hit enter.

type in the following: netstat -n

and hit enter, it will show you a list of active connections to different IP's.

Remember or take a screenshot of those IP's, because once you start the transfer, type in netstat again while it's transferring and check for any new IP's, that is your victims IP.

With a script:
IF you have windows live messenger plus (probably the best WLM IMO), download this script:
It's called IP-Get, and will show you your current msn contacts IP addresses IF you're currently connected to them with a fileshare. It will also allow you to save the IP addresses, and look up their locations.

Here is a screenie of IP-get:

There are other ways, but surely, you should have been able to get their IP by now...if not, look up a tut on it, using the search feature.

Step 12: Your internet service provider
very easy to find, use their IP, either using the IP get script if you have it, or

Step 13: The last date and time that you successfully signed in
Unless you know this as a fact, either take your best guess, say you dont remember, or yesterday.

Step 14: The names of any folders that you created in addition to the default folders
leave this blank, or say you dont know (unless you know this for a fact).

Step 15: Names of contacts in your hotmail address book
give them all the contacts you know are definately or most likely in there, including yourself, and even their other accounts (they might add themselves, everybody seems to). Also give them and, as most people have them added.

Step 16: Subjects of any old mail that is in your inbox
okay just use common sense for this one, things to include are:
hey, how are you, RE:, FW:, admin, windows live, hotmail staff, recovery, registration, support, lol, password, comfirmation, noreply, delivery status notification (failure).

Also, if they are subscribed to any forums (like hackforums(but please dont hack other HF members :P)), social networking sites (like myspace, bebo) or online games (like RuneScape, WoW), then be sure to include them too.

Step 17: Names of contacts on your messenger contact list
If you happen to know any of their friends, this is where you put their display name...if you dont have them added, put their first names, and if you dont know them at all, just leave it blank, or say you dont remember.

Step 18: Your Messenger nickname
If you know it, put it in..if you dont, say "i cant remember it exactly" or leave it blank.

Step 19:
The rest you dont really need to worry about, except for in additional info, can put anything else that might make you sound more

"please do your best to recover my account, i dont want to go and have to add all my friends again, it'd be a great help if you got it back for me, thank you in advance."

obviously dont put exactly that, but you get the gist of it :)

Okay, i believe that is it, within 24 hours you will recieve an email from customer support, they will either give you a link to reset your (victims) password, or ask for you to send it again with more info, as an email reply..and in that case, you dont have much luck, cause they can just get your IP address from the email and know you're lying :) so try again, and hope you get a more gullible staff member. If you have firefox, click the spoiler.

          Education Networking Expo Webinar   

About: This program is designed for students in a teaching credential program to take full advantage of the Education Networking Expo. Participants will learn to research and how to engage the diverse school districts and non-profit organizations. Learn how to … Continue reading

The post Education Networking Expo Webinar appeared first on Mathematics and Science Teachers Initiative (MSTI).

          Education Networking Expo Boot Camp   

About: This program is designed for students in a teaching credential program to take full advantage of the Education Networking Expo. Participants will learn to research and how to engage the diverse school districts and non-profit organizations. They will have … Continue reading

The post Education Networking Expo Boot Camp appeared first on Mathematics and Science Teachers Initiative (MSTI).

          Education Networking Expo   

About: The Education Networking Expo will have a record number of districts presenting. It will include programming to help prepare students as they work towards their future endeavors in the field of education. See for more information. When: Tuesday, … Continue reading

The post Education Networking Expo appeared first on Mathematics and Science Teachers Initiative (MSTI).

          California Athlete Performing at Business Summit Networking Party   

Fitness industry expert Bedros Keuilian presents the 10th Fitness Business Summit in Irvine, California March 18-20 2016. Athlete and rapper MohamedX will be performing at the networking party on Friday the 18th.

(PRWeb December 15, 2015)

Read the full story at

          Fitness Industry Expert Announces 10th Annual Educational Summit   

Fitness expert Bedros Keuilian presents the 10th Fitness Business Summit, the largest in the series, coming 2016. The event will feature coaching talks from industry experts as well as a networking event and expo room.

(PRWeb December 03, 2015)

Read the full story at

Nowadays, individuals are gravely re-evaluating their work, and their play, their needs and the way they live. People became more demanding on the things they need. People ask for more, they look for more creative and convenient products. They look for something that would make life easier. Because of the products of this generation people are given devices and machines that would make life easy. For instance our mobiles, presently we can contact and communicate with our friends anytime we want and can talk have long distance communications as fast as we wish to. Not like before messages can only be sent to distant receivers through snail messaging where in it would take days before it will arrive to its destination. The question isn’t only “What are you going to do with your time in today’s virtual world?” but also “What are your jobs and activities really worth?” Because of the fast growing environment more opportunities also arises and demands would take part as well. Today’s generation, business world and the way people live differ a lot from the past time. On the previous meeting with the techno class we had discussed about changes and trends and opportunities in convergence. Definitely change is inevitable. It is the only constant thing in the world. Change is a fundamental part of continuous quality improvement. Yes definitely to improve the quality of the products consumers are now replaced with prosumers to enhance the quality of products. 

As prosperity grows and spreads worldwide, many opportunities occur from lifestyle changes. So that’s why prosumers arise because of these changes but before we have acquired the fruit of the consumer to prosumer way of customers we had passed through different generations which also had different ways of living. Before our present era occurred our world had experience the time of agriculture where people has the living of producing, processing, marketing and use of foods, fibers and byproducts from plant crops and animals. Agriculture was the key development that led to the rise of human civilization, with the husbandry of domesticated animals and plants creating food surpluses that enabled the development of more densely populated and stratified societies. In this era people are experiencing simple way of living. The agricultural revolution was a period of agricultural development between the 18th century and the end of the 19th century, which saw a massive and rapid increase in agricultural productivity and vast improvements in farm technology. After this kind of era comes the revolution of the Industrial industry where in innovations are starting to arise. It was a period where major changes in agriculture, manufacturing, mining, transport, and technology had a profound effect on the socioeconomic and cultural conditions. Inventions were also created in this era such as plow and moldboard, seed drills and machines that harvest. The Industrial Revolution marks a major turning point in human history; almost every aspect of daily life was eventually influenced in some way. The first Industrial Revolution, which began in the 18th century, merged into the Second Industrial Revolution around 1850, when technological and economic progress gained momentum with the development of steam-powered ships, railways, and later in the 19th century with the internal combustion engine and electrical power generation. The period of time covered by the Industrial Revolution varies with different historians. Eric Hobsbawm held that it 'broke out' in Britain in the 1780s and was not fully felt until the 1830s or 1840s, while T. S. Ashton held that it occurred roughly between 1760 and 1830. Most particularly, average income and population began to exhibit unprecedented sustained growth. And finally today the world revolved into a high technology based environment where lots of modernization can be observed. 

Because of the new innovative world, questions like which things that I do feel truly satisfying and meaningful? would come out of our minds. Like the companies of today, they are very considerate on the needs of the people. They make it sure that what they produce must make meaning and would satisfy the taste of the prosumers. Death of Conusmers, what are my understanding regarding this matter. Well, as what I have learned from our discussion, it is the uprising existence of prosumers and the farewell of the consumers. It is where ordinary or casual customers are replaced by professional and demanding ones. It is the shift of consumers to prosumers or the change of paradigm. To understand more, let us define each. Let’s us take consumer first. Consumers are Everyday purchaser of a good or service in retail. They are the end-users. They are individuals who buy products or services for personal use and not for manufacture or resale. A consumer is someone who can make the decision whether or not to purchase an item at the store, and someone who can be influenced by marketing and advertisements. Any time someone goes to a store and purchases a toy, shirt, beverage, or anything else, they are making that decision as a consumer. On the other hand let us know what a prosumer is. Prosumer originated with Alvin Toffler, who first used the term in his 1980 book The Third Wave. Toffler defined the prosumer as someone who blurs the distinction between a “consumer” and a “producer.” The term has since come to mean a variety of things, but here we define it as someone who makes little distinction between his or her home and work lives. The prosumer engages in activities belonging to either sphere, regardless of time or location. Because of their complex lifestyle, which combines a demanding workload and an active family life, prosumers are eager adopters of Web 2.0 products and services a convergence of process innovation, global marketplaces, and advanced technologies that fundamentally changes the way consumers buy, retailers sell, and products are brought to market. Prosumers typically embrace Web 2.0 technologies such as social networking (Facebook, MySpace), blogging, video on demand (VoD), podcasting, VoDcasting, virtual realities (Second Life,, mobile communications, and other Internet-based technologies and services that allow people to stay connected whenever and wherever they desire. We refer to this as “Connected Life,” and the prosumer is an enthusiastic and early adopter of the connected lifestyle. Not all prosumers use all these technologies, of course; they access whichever technology subset best suits their individual preferences and lifestyles. The concept of a prosumer is a late 20th century idea that combines some of the common characteristics of a professional and a consumer. The term is generally applied to situations where consumers are considered to have reached a level of sophistication that the professional-consumer can effectively dictate the perimeters for the production of goods and services in terms of quality and structure. The difference between the garden variety consumer and the prosumer is that the latter typically possesses such a strong working knowledge with the product that he or she can successfully determine and perhaps even design a better product offering. Prosumers are now common in many fields that were once the sole province of professionals. One of the areas where the prosumer has gained a high degree of visibility is in the home improvement industry. A number of household tasks, such as the installation of ductwork, plumbing, wallpaper hanging, and installing major appliances, are now done by many homeowners. In times past, these were all functions that were considered to be the work of professionals, with only the occasional amateur attempting this sort of high profile work. 

Serving prosumers is composite. Their needs cannot be defined by location, application, time of day, or device alone. In fact, that is what makes them prosumers. They seek to be connected and serviced no matter where they are, what they are trying to do, or when they are trying to do it. Although prosumers are heavy technology users, they want solutions to be simple. In particular, application user interfaces must be easily accessible for both work and their personal life, raising some issues relating to overlap between the two. For example, loading Connected Life applications onto company-owned phones is a concern to employers because of security and liability, and to mployees because of privacy and ethical concerns. When work and personal lives overlap and blend so seamlessly, billing for things like mobile phones and application software also becomes blurred. So, serving the presume to the satisfaction of the prosumer and his or her employer is far from easy. Early prosumer offerings have fallen short of what these individuals really need. Mobile mail is an example of this. When it is provided by the employer, it works well for business purposes. But personal mobile mail requires yet another application from a provider such as Google or Yahoo! The only way to handle this situation is to maintain one phone for personal mail and another phone for business mail an equally awkward solution. Effectively serving this segment requires delivering value that works for both the prosumer and the enterprise. A few discerning industries are already aware of prosumers and their lifestyles, and have developed programs and products to serve them. The hospitality and airline industries know that when people travel for business or pleasure, they tend to select providers that offer them benefits. As a result, when someone earns extra miles flying with Airline X for business, that person will choose Airline X for leisure travel because the frequent flier miles help pay for the vacation.The financial services industry has begun cross-selling products such as insurance and banking services, especially to small- and medium-sized business owners (prime prosumer targets), recognizing that when someone starts a business, that person is more inclined to select a financial services institution with which he or she is already doing personal business.Higher-education institutions position their services to alumni as they enter the workforce, because alumni often seek corporate sponsorship for more costly graduate work.Most industries, however, have not yet instituted formal business models to pursue prosumers as a target segment. Capturing the emerging prosumer category requires a deliberate and systematic approach, with full understanding of what makes these complex individuals tick.The service provider industry (telecommunications, IP services) is absolutely essential to the prosumer’s connected lifestyle, yet these companies have done little to court this segment. Providers need to invest in network infrastructure to deliver seamless, ubiquitous, and secure prosumer experiences across personal and work requirements. Because these industries have so much to gain from prosumers, it makes a great deal of sense to start with the design of user interfaces that are blended, yet provide sufficient separation between work and personal content to avoid conflict with corporate policy.It also behooves the service provider industries to figure out a way to provide services and billing methodologies that keep the prosumer connected, yet allow for separation of work and personal activities. For instance, there should be a simple, nonintrusive method for keeping mobile phone charges separate. And there should be a way for prosumers to integrate their home and work calendars and address books without providing employer visibility into personal information and vice versa.

To sum up about the prosumers. We can say that the prosumer segment may be small, but its influence is growing rapidly. As we can witness the enormous popularity of Apple’s iPhone and iPod, YouTube, MySpace, and Facebook. It’s time to start thinking about the underserved prosumer market and how to address it better. There are several known areas of focus for prosumers, which includes; They need to be connected to work and family anytime, anywhere; they want simple-to-use, seamless solutions; they are interested in entertainment, and spend more than the average consumer in this category; they want to access files at home as easily as they do at work; they are mobile, and usually own several devices such as a mobile phone, iPod,and laptop computer; they are frequent, intensive users of the Internet and mobile technologies at work and home. Prosumers are not hard to find or identify. But capturing this desirable segment requires a systematic program of research, development, and testing of prosumeroriented offerings—plus education of prosumers about the value of your product or service. The following are steps you can take today to take advantage of the lucrative prosumer opportunity.

To differentiate the two, let us say consumer is one that consumes, one that acquires goods or services for direct use or ownership. This only focuses on the sale. They don’t consider the person or the people. It is all about the sale, which cares about the person. It is like a selfish way of business. Now a prosumer is one who is converse to the consumer, denoting an active role as the individual gets more involved in the process. That is right, we are interested in others 1st, sharing, giving, and earning their trust. This tells that customers have their feelings. They can react and demand. They are not just mindless organisms who just consume matter. The end our view of our customers is serious. They are changing, they have choices and demands. They can get poor service anywhere. Life is stressful, anxiety is growing in our neighbors lives, procrastination is up 40%, and rage and rudeness are increasing across the board amongst ‘service’ providers.

Death of Consumers, this is what our present generation shows. I also found some points that would help the businessmen or the providers for the prosumers. So here are just a few helpful suggestions, to see things from the Prosumer’s perspective that may help us tweak our operation and get us on the right path without having to do a lot of heavy lifting:
First is that you have to understand we each other providers to prosumers. Like the saying no man is an island, so we need to cooperate in order to succeed. Every business is in a similar situation. They are all struggling trying to catch up to the social behavior shift which has left there showrooms empty. Face it, we have created a monster. Our poor customers are left to fend for themselves, our culture of treating them like customers has left them feeling suspicious, distrustful, with no inherent loyalty, and only focused on price and convenience, and feel defensive, suspicious and that we are the adversary as soon as they walk into our business. I do. That means whatever your price is; I’m looking on the web to find it cheaper. What’s the result? Well we all lose, business profits dwindle in our community, jobs lost. We have to understand it is what it is, and IT doesn’t work anymore. We have to lift our heads out of our computers and look around, realize the situation, and do something about it.

The second thing is that consider and set objectives. It is vital to see goals. It will guide you in your business. Our goal is simple, sustainable profits and growth right? The only way, let me repeat that, the only way for that to ppen in your business in today’s climate is to build customer equity equals trust, confidence in us, we re, no hype, no infomercial techniques, those are dead. Our customers or should we say Prosumers, need to realize and see manifested in our business model that we don’t have a hidden agenda, help them to learn from their experience with us that they can trust us. And finally, they should pick up from their interaction with us that when they deal with us, it’s not about ’selling them something’, it about their experience and making it the most enjoyable that we can

Lastly, shift the paradigm. Let us make change. Most businesses still operate in the adversarial consumer arena and use traditional media to advertize their sales. This does not work anymore in fact, most companies that remain in the status quo are finding they are paying a trust tax, a transaction (soon to be reaction) costs which can be up to 70% of the item, which destroys profit margin and will force companies into extinction if they remain unchanged in their methods. We must make the shift from ’selling things’ to noticing people! We need to build a desire with our Prosumers, cultivate relationships, and create a sense of comfortable community for them. Let us be reminded with these things, thoughts not just for the product but also for the people or cusromers. Feelings for others and stop being selfish and lastly actions of course. Now, this is a two edged sword, but one that if used right, and all the focus is on the Prosumer’s experience when we get an opportunity, that we are going to dazzle them with service, since we are all human, of course if customers will trust your product and has the desire for it then they will probably purchase it, and continued experience results in loyalty and brand encouragement. It will probably work most of the time. So let us now consider customers as prosumers and not consumers.

Death of Consumer, the shift of paradigm. Customers have now the power to demand and be followed. It is a kind of change that would result from standard to outstanding. Let us not stick to the old way. Just like in some stores we can now demand for customization of our products. We have the power to insist. Let us jump the curves and should adopt the new way. Finally, as technology persists to develop, there is no uncertainty that thje prosumer occurrence will keep on growing. Let us all be prosumers and let us make some meaning.
          Trends and Opportunities in Convergence   
What are the Trends and Opportunities in Convergence? To be honest the term convergence gives no definition in my mind. I heard of the term but I have no idea as to what its meaning is. But just recently we discussed about convergence on our techno class. Our instructor gave some inputs for us to understand more about the trends and opportunities in convergence. What convergence describes? Convergence is the occurrence of two or more things coming together. It is the merging of such technologies to give innovation and convenience in the present world. Convergence change the way we lived. Convergence brings meaning and development. Convergence is such a cool word, with lots of marketing value attached to it. It looks good in commercials and sounds remarkable in tag lines. Network, terminal end, telecom, data communication, broadcasting, IT, data, video, voice, computer telephony and more, there are as many definitions as there are stakeholders. Without going into the specifics like what should be included and what should not, we give a definition here which is quite broad, all embracing, and so naturally not very helpful for those who want to jump to examples. Convergence refers to the blurring of dividing lines among traditionally distinct products and services, technologies, markets, industries, and regulatory structures.

There are lots of changes convergence has brought which include new innovations, new services, new technologies, new business models, and less severe regulations. Convergence has brought change not only in the way we live, but also in the way we think. But then, not everything about convergence is pleasant. The fact, however is, the challenges are along the way. There is no run-away option. We have to surpass these struggles before we can get the taste of convergence. Convergence can bring the effects of changing the way we write, we work, and how we do our business.

Thus before we have acquired the fruit of convergence we had passed through different generations which also had different ways of living. Before our present era occurred our world had experience the time of agriculture where people has the living of producing, processing, marketing and use of foods, fibers and byproducts from plant crops and animals. Agriculture was the key development that led to the rise of human civilization, with the husbandry of domesticated animals and plants creating food surpluses that enabled the development of more densely populated and stratified societies. In this era people are experiencing simple way of living. After this kind of era comes the revolution of the Industrial industry where in innovations are starting to arise. It was a period where major changes in agriculture, manufacturing, mining, transport, and technology had a profound effect on the socioeconomic and cultural conditions. The Industrial Revolution marks a major turning point in human history; almost every aspect of daily life was eventually influenced in some way. Most particularly, average income and population began to exhibit unprecedented sustained growth. And finally today the world revolved into a high technology based environment where lots of modernization can be observed. Convergence in this time exists.

Trends, what are the trends in convergence. Because of the fast changing technology we have today. We can observe trends of convergence in fields of internet, digital world, media and telecommunication. Convergence changes the paradigm shift. Media and telecoms convergence is still in the early stages of development. The internet has become truly mobile and there is a new way of thinking, the ‘paradigm shift’, which operators need to work through. Every market may not respond in the same way, so adopting a standard strategy is unlikely to work.

Let us consider the internet first. The internet was mainly used before for communication, for access and exchange of information. It was also used for Universities to have an easier and faster admission and such. It was also used by other institutions for simple reasons. Yet now the internet world is growing and growing. As we can observe changes take place every minute and even in a second. It is inevitable that internet is one of the world’s fast larging communities. Now, the people make use of internet in loads of different ways. We can use internet for us to chat with our friends and family. We have different chatting sites found in the web such as yahoomail, skype, EkkoTV, RandomDorm and the like. Before, the chatting sites possess only few applications but now most of these chatting sites offer live video chats, conferences, voice messaging and many more. As I can remember, it is just funny way back 6 years ago I usually go to internet cafes paying 35 pesos for just an hour just to look for friends over the internet via yahoo mail. It was some sort of an embarrassment for my part but I just can’t imagine the first reason why I was hook to the use of internet. Aside from educational purposes I usually go to the internet cafe for this irrational reason but still it made me familiar with the internet and some of its uses. As time goes by I learned how to search and look for assignments just by the use of internet. Because of the convergence the internet was then developed and can offer information that would correspond to a large library or should I say more. By just the use of internet I can browse and read some lessons. I can look for some data and ideas. Way back high school I really love to stay at the library and spend some time reading books, encyclopedias and the like but when I learned how to use the internet for searching I became fond of it and spends more time on internet cafe rather than on the library. Yes, the internet is not an ordinary network. It can make you look for new friends, communicate with others far from you and of course it is very helpful because it offers wide range information that can perhaps answer any of your question or query. Aside from mentioned, community sites are also spreading and one of the most prominent one is We can also use internet for networking of friends, for posting status or ideas, for updating one’s lives, for finding some people and for communication. Before, I was really a Friendster enthusiast. Even if we have assignments and projects I usually spend most of my time just for logging in the networking site Friendster. Busy on changing my background, visiting other profiles, and giving testimonials. The internet can also be a radio. Nowadays we can use internet for sound tripping, for downloading songs, also for gaming. Most teenagers are addicted to internet because of the online games. Online games which include Ran, Diablo, Star Craft and more are most played. In my high school days I can remember how my classmates were addicted on playing Ragnarok. Another use of internet for gaming is about Xbox. A video game console has as its primary purpose the playing of console games, but it is also able to play back video and music and to connect to the Internet. Internet nowadays is also capable for live streams. Others also use internet as television and radio. Also for business, eBay and ecommerce can be observed most. Internet can now offer markets online where in we can purchase some products by the use of credit card, PayPal, etc for paying purposes. Internet can also be a newspaper for us. It provides news online about the latest updates on the world of politics, economics and even show business. Advertisement can also be done through internet.

Another trend in convergence is messaging. Before, messaging can be sent through snail mails. Receivers would have to wait days before they can receive the messages intended for them. After years beepers came out and served as a medium on transmitting messages. It was way better than the snail mail way of sending messages. Text-to-landline services also exist, where subscribers can send text messages to any landline phone and are charged at standard rates. As the time goes by, mobile phones went out. As far as I had witness mobile phones before was very large. They are portable but still very large to bring on hand always. Innovations were made and then improvements went out. A new phone model was released which has the capability to text, call and play games at the same time. It is a simple example of the trending convergence during that generation. After months more applications were developed combinational services was then available such as MP3, Games, Internet browsing, Camera, Bluetooth and more are integrated and can be experienced in just one device. On present the phones are operated by just touching its screen.

Another is trend on digital world and the photography which also includes on the gadgets for music. Before, people use radios for listening music. As time goes by walkman was invented for listening music wherever you are. Then it involved into having the capability of inserting cds. Until finally mp3, mp4, ipod and more are developed. Earlier the cameras need films for it to operate but now digital cameras are used. Lately DSLR cameras are the latest device for best capturing images.

Opportunities in convergence, because of the fast improving convergence of trends lots of opportunities went out. As mentioned the internet world is getting bigger and bigger so with this occurrence, many people benefit to it due to the tons of job opportunities IT companies offer. I could still remember seeing people like crazy doing door to door looking for job vacancies and yet end up nothing. Due to the fast evolution of technology as what we say, jobs are being offered everywhere even on the internet. If you want to get a job, just surf the internet and you will find a lot of it. Also people who possess such great imaging and graphics designs skills can earn money up to $100 just for a single logo they make. You see, they can do such jobs even though they are already employed on a certain company or even they just stay at home doing freelancing jobs. As I could still remember, we were asked by Sir Randy about what we love and what we are best at, and I have observed that it is really possible to improve the quality of my life if I will use them.

The Convergence of the latest Trends and Opportunities

As I have discussed, technology is fast evolving with the latest trends people make. With these latest trends, people are able to make use of it for the betterment of their lifestyles and ways of living. Like for example, the latest Samsung Galaxy S with Android as its operating system, programmers are into making applications for that specific phone. After making an application, they sell it Android and the people who use Android phones buy it. That is one example of grabbing the opportunities by means of the latest trends. When it comes to imaging, editing photos using Photoshop, Corel Draw and 3d modeling with Maya or 3d Studio Max, artists make use of these latest trends to make their graphics and sell to huge companies who acts to be their clients.

As an Information Technology student and a soon to be graduate, it is really an advantage for me being aware of the latest trends and being aware of the opportunities that surround me. These things would greatly help me on improving my ways of living and I may be able to live the life that I wanted to.

          Update On A Plane   
Just checking in with a small update. You've probably already guessed that we're not going to have a show this week, which is largely my fault as I didn't anticipate that my traveling would wipe me out so much. We should be back as usual next week, but I'll be at CES in Las Vegas this week so we may have a push there too. My trip back to NY was a great time, got some relaxation in and also managed to hit the most fantastic Chinese Food place on the planet, which I always make time for when I'm back east. I actually made sure to post a very favorable review of the place on my Yelp! page. Yelp! is an awesome little site that has some brutally honest reviews of restaurants, stores and other stuff. I've found that while I have no tolerance for generic social networking sites like MySpace or Facebook, more specific social sites have a lot to offer.

On to the trip, my wife and I flew the new Virgin America airline and it was a very interesting experience all around, both good and bad. Let’s start with the bad points, since I prefer ending on better notes when possible. I originally booked our flight on July 7, a full 5 months and 16 days before we were to fly out. I always book long flights way ahead to ensure I can get an emergency seat, since I have a rather severe terror of flying, I get claustrophobic in small spaces after extended periods and I’m about 6’2” with a need for legroom.. Virgin America offers an option to pay $25 extra for “premium seating,” which the emergency row is considered and I gladly paid the extra money for the comfort. I received an email confirmation, and all seemed well. In early November there was a message left on our answering machine informing us that the flight time was moved up much earlier in the morning, which again was no problem. All this time I had been doing nothing but pimping the hell out of the airline, telling everyone how much I was looking forward to it, I think even on the show once or twice.

The day before our flight, I logged in to do online check-in, and noticed our “premium seating” had been revoked. No refund of the premium rate, no phone call, they had simply booted us into a standard row and I find out the day before we’re leaving. Clearly, I’m pissed off. I call the Customer Service line and in all fairness, I think I did a poor job of explaining the issue to the woman I spoke to. I think she read my anger as being just at the lack of refund, not the seating change and the lack of notification about the change. If they had properly notified me about the seating change, I might have been able to call earlier and possibly have gotten my seats back or at least been moved to another flight that day with seating available. I called back a second time, and this time explained my issue more clearly to a different person but he offered no help at all beyond an apology. After this I called my mother to let her know the time our flight was coming in, and of course mentioned the seating nonsense. She advised me to check to see if any of the front ‘bulkhead’ seating was open, as it was typically still more spacious than standard seating. I did that, and sure enough there were two seats open and I immediately called VA back and got a really helpful guy in Florida who got everything taken care of for me, which kept my head from exploding. He got my seats changed for the same cost as the refund, although after the failure to notify I felt I should have received the refund anyway, especially since we lost the emergency seats on the flight back which had not been changed at all. Regardless, at least we had potentially better seating. That was the end of the negative part of the experience, but it makes me wonder whether VA will be our first choice for an airline on our future trips. Incidentally, I have not seen that refund come through as of this writing and I will be contacting them on Monday if it hasn’t shown up by the end of the week.

Now the flight itself was great. Happily the bulkhead seating was actually better than emergency row seating, and the overall atmosphere of the plane was a very refreshing change. I have posted a Flickr photoset with pictures of the Linux based computer that each seat has, including the available features and some that aren’t quite in place yet. Overall the whole approach to flying that Virgin is trying to promote is fantastic. Three prong power outlets and USB ports in each seat, a flipside remote control that retracts into the seat arm and has a full QWERTY keyboard, on demand drink service and of course the 9” widescreen touch screen computer with a reasonably hefty free selection of movies, TV and reportedly 3,000 or so MP3s. There is also premium content, and it featured reasonably recent movies such as The Bourne Ultimatum and Resident Evil: Extinction. I tested out the chat feature, which would be really useful if you’re traveling with friends and aren’t seated together but otherwise is simply a cute thing to play with for 5 minutes. The drink ordering is a genius move when you think about it. Less of that wobbling cart gridlocking the aisle when you badly need to piss, the ability to get a drink when you’re actually thirsty instead of when they bring it to you. All around, the on demand model is a fantastic way to go for airlines. All in all, a very good actual flight. It’s really a shame that the customer service end was largely negative, because like most people I remember more of the bad than the good about the flight. In the end, will I fly Virgin again? Well, I’m going to send a letter to their customer service department and that answer will depend largely on the response.

And not that note, I bring a close to this rambling missive. We are planning to record something while I’m in Vegas, and depending on time I may have something for the 9th. Until then, take it easy.

          Social networking – you’re (probably) doing it wrong   
I count myself incredibly fortunate to have been exposed to the internet in 1995. In 16 years, I’ve been witness to, and played a part in, the phenomenal transformation of life online. I’ve seen, made and learned from a lot of mistakes in that time. Back then, companies like AOL and CompuServe were stuffing CDs […]
          Building tweeting communities for mental health nursing with @WeMHNurses   
Building tweeting communities for mental health nursing with @WeMHNurses

[@Noemi’s note] I was happy to connect with Emma Jones, who is in her words, a third of the We Mental Health Nurses team at WeCommunities, along with Vanessa Garrity and Mark Brown. This story serves as a first encounter with Edgeryders. It also includes written reflections by Vanessa.

WeMHNurses hosts regular mental health themed twitter chats, as part of a network chat calendar, with wildly diverse topics ranging from “The use of digital technology in everyday practice” to “Workplace democracy in mental health”. The core team runs the day to day operations, on a purely voluntary basis, with the WeMHNurses account, also linking into the wider WeCommunities, which covers many different branches of Nursing and Health Care professions and specialism. Topics for chats tend to mostly emerge from topical conversations within the community or where there is, for example a national policy directive or key piece of published journalism relating to mental health. The community also run sponsored chats for national bodies such as the Dept of Health, Care Quality Commission and NHS England. The WeMHNurses team see their role as being about facilitating broader conversation in a democratised digital space, where everyone can have a voice, regardless of positional authority. The team also see their role as being to make national policy more accessible, in terms of the language being used. The community also has a particular focus on discussing the everyday implications of policy on mental health nursing practice.

The chats are generally facilitated by one of the @WeMHNurses team, with guests are often invited to participate in the chat where the person brings specific expertise to the conversation. This is an open process, whereby anyone can contact the team to suggest a chat topic or to ask to host a chat.The team provide support to individuals who want to host a chat from the @WeMHNurses Twitter handle.

Our ethos is very much that “your opinion matters” and we focus on the user point of view, getting people talking to each other and bringing a variety of perspectives to the conversation. We enjoy working with people who have previously been in services or are currently in services because we really value the lived experience perspective. As we are an independent voice, we will also cover topics that might be considered controversial, political or critical, as we believe that these conversations are important in setting the future direction for mental health nursing.

On reflection, we think that the liveliest and most informative chats are often where there is a real mixture of perspectives, including for example, clinicians, people accessing services, managers, leaders, academics, researchers and policy makers. The conversations that we have online are often very powerful for this reason as we can’t think of many examples from our own professional lives, where there has been such a variety of voices in a room to debate a topic in such a level and democratic way. An example of this is a chat that Vanessa and Mark ran with the Health Service Journal, where we discussed the reduction of inpatient mental health beds across the country. This chat was very much brought to life by people sharing their experiences of how this impacted on them personally when they needed to access inpatient care.

The demographics for our chat suggest that we have a largely UK audience. However, because of the global reach of Twitter, we do have some international representation within our community and we love to encourage this because of the dimension that it brings to the conversation

Before we run a chat, we produce some pre chat information on the wecommunities website. This is generally written in a blog style, so it is broadly accessible reading. We are also looking at how we can make our chats even more inclusive, such as by providing audio for people who struggle to read or who have visual impairment. The challenge for us is that we are all volunteers, so we have to find ways of delivering information quickly.

How come this twitter format for talking about mental health? Is there something in the medium that helps learning, or alleviation for individuals?

As with everything there are always pros and cons. Some would say “there’s only so many characters on twitter” and mental health can be a very complex topic to discuss with limited characters, especially when people are talking about personal experience. On the other hand, it can help you be more focused and concise in what you are trying to say.

I suppose using twitter to talk about mental health is quite personal, as is twitter use in general. There are many who find it hugely therapeutic and helpful, either getting involved in chats, communicating/ networking with others or for gaining support. It is a fab place for the sharing of information, including research and it's also a great forum for challenging stigma and moving the mental health agenda forward.

Bios wordcloud
Wordcloud from participants twitter bios in a recent chat - source.

Is there a cutoff number for participants in a chat? Or a number that makes it effective? I’m wondering because you have such high regularity - every week.

There is not a maximum number of people in each chat, it can be anybody using the hashtag. Often people pop into the chat with just one or two tweets, whilst at the same time, we are having a conversation with other people, who participate in the entirety of the chat. When you are facilitating a chat, which is busy, it can be a challenge responding to every single tweet, but we do try to do this and often we find that people branch off and have separate conversations with other participants, within the chat, which goes down a different path to the structured questions of the main chat. Providing they still use the hashtag, we still capture this conversation in the transcript at the end. This is an example of the latest archived chat on a Tuesday evening, counting 133 contributors, 1200 tweets and with a reach of 7,561,098! This was a joint chat with @wenurses and @weldnurses.

With our over 6000 followers, plus the wider network, I suppose it is hard to say how many people we reach constantly. However, analytics for the chat are captured within the wecommunities website. Nick Chinn is the technical person behind this at Wecommunities.

What do you think draws people in? What makes it a community for you? Is it people interacting with each other, learning, figuring out stuff?

I suppose it is all of that. Everyone involved in the chats is interested in that particular area and that shared interest drives the discussions and questions in the chat, which will often support the development of links between people. Often people in the chats might say: ‘this is a good chat’, and ‘why don’t we do one on this other topic area?’ It then keeps expanding, and there are more things that we get involved in. So, in essence, the community is about sharing knowledge and learning, being open to thinking in different ways and developing a support network as well.

What for the future and how can we support your work?

We are very aware that people establish relationships and friendships offline with people who they have connected with on Twitter and that these relationships are often a great source of strength and support for people. Vanessa and Teresa Chinn, Founder of WeCommunities organised an unConference earlier in the year, through crowdfunding, which brought together 300 people from the community into a physical space to get together and to debate and discuss the future direction of social media in health care. We also provided a parallel online agenda throughout the day, so that the twitter community could still very much be part of it, even if they couldn’t physically attend. Vanessa and Mark from WeMHNurses and Mental Elf on Twitter are also in the process of setting up a Digital mental health conference service, which we are launching at #PDDigital16 later in November.

The Challenge: 

The Question: 

How can we support anyone with an interest in mental health to participate in a conversation?

The Problem: 

Delivering relevant information and support to a broad and diverse group and people

The Solution: 

Regular Twitter chats!


          How To Hack WhatsApp Without Rooting By Exactspy ?   

How To Hack WhatsApp Without Rooting By Exactspy ? It is exciting for everybody to hack someone’s WhatsApp account. Whatsapp is most illustrious social networking application that is employed by numerous folks. once WhatsApp has launched, then it suffered from tiny security choices. when typically, a user has several resources which may modify to induce […]

The post How To Hack WhatsApp Without Rooting By Exactspy ? appeared first on .

          Hound Assists Employers to Use Social Networking to Their Advantage   

Hound is able to help employers get maximum exposure to their jobs and attract the best talent by posting their openings on top ranked social networking websites.

(PRWeb March 22, 2014)

Read the full story at

          Now Free: Net Master - IT Tools & LAN Scanner   
Net Master - IT Tools & LAN Scanner
Kategorie: Dienstprogramme
Preis: 5,49 € -> kostenlos
Version: 5.10
in iTunes öffnen

Net Master is the ultimate mobile solution for all your network analysis and diagnostic problems. Net Master is a utility application developed for Network Administrators and IT Professionals but presented in a format targeted for non-professionals. All the essential networking tools are available in one convenient mobile application. Networking Tools available include: * LAN Scan for complete scanning and diagnostics of all devices connected to a Local Area Network - Includes: TCP Connect LAN Scanning, ARP table scan - Also includes NetBios Scan, Bonjour Scan and Port Scanning - Reverse DNS Lookup - Wake On LAN functionality - Dictionary lookups for MAC addresses, Port addresses and many Bonjour Services - All information presented to the user in a easy to understand user interface - Save previous Scans to reload and review later * Speed Test to monitor your cellular (3G/4G/LTE) or WiFi connection rate and response for your device. – Simple, one button tap performs (or cancels) the internet speed tests. – Testing features download rate, upload rate and latency (response) time. – Simple, easy-to-read tracking and reporting. * Port Scanning is a essential network utility for every IT professional. This utility application lets you check what services are listening on a network and is useful for making sure no service ports are open that shouldn't be. - Multi-thread TCP port scanner on cellular or WiFi network. - Quick scan for the most popular p...
          Business Bootcamp   
Tja, dan zit je opeens in het Business Bootcamp. Ik was al eens eerder attent gemaakt op dit fenomeen, maar het was er nog niet van gekomen. Onlangs sprak ik weer iemand die geweest was en zeer enthousiast was. Toen ook nog bleek dat al heel snel de volgende Business Bootcamp zou zijn en dat dat tevens de laatste zou zijn tegen de schappelijke prijs van € 47 (ex btw), was de beslissing snel gemaakt. Ik zou naar het Business Bootcamp gaan op 22 en 23 maart in het NBC Congrescentrum te Nieuwegein.

Ik was ook wel gewaarschuwd. Het zou niet een standaardbijeenkomst zijn met informatieoverdracht van de spreker op het publiek. Het zou anders zijn en soms zou je je mogelijk wel eens gaan afvragen wat je daar aan het doen was. Ondanks de waarschuwingen en bedenkingen waren allen die geweest waren toch heel enthousiast, dus ik ging ook met goede moed naar de bijeenkomst.

Om tien uur zou het beginnen. Tussen half negen en half tien kon je je inschrijven. Om kwart over negen kwam ik aan bij de inschrijfbalie en gezien de drukte kon ik toen al zien dat het massaal werd. Er stonden lange rijen, toch was de afhandeling nog redelijk snel, zodat het toch nog mogelijk was om een kopje koffie te drinken voordat de voorstelling zou beginnen.

Iets voor tienen liep ik de zaal in. Daar stonden heel veel stoelen en er liepen heel veel mensen rond. Ik zocht een plaatsje in het midden en wachtte af van wat komen zou. Eerst werden we verwelkomd door een Nederlandse vrouw die een inleidend praatje hield in het Engels. En Engels zou de voertaal worden gedurende het gehele weekend.

Daarna kwam de grote held op het podium: Nisandeh Neta. Hij is afkomstig uit Israël en is in de jaren negentig neergestreken in Nederland. Daar heeft hij Open Circles Academy opgericht en dat is de organisatie die het Business Bootcamp organiseert. Hierin gaat het om succesvol ondernemen en dat wordt als volgt weergegeven:

“Succesvol ondernemen anno 2014 is een kunst die je kunt leren… en wel op 2 manieren:
1. Langzaam, door schade en schande in de praktijk of…
2. Snel, met bewezen succes strategieën, tools en systemen voor (online ) marketing en sales, social media, passief inkomen, (digitaal) netwerken en heel belangrijk… de juiste ondernemer mindset.”

Dit geeft het al duidelijk weer. De werkwijze van Nisandeh Neta is een methode om succesvol te worden. Als je die volgt, heb je succes. Het blijkt ook dat het Business Bootcamp nog maar het begin is van het succesvol ondernemerschap. De vervolgcursussen hebben de fraaie namen ‘Master Entrepeneur’, ‘Financial Freedom’ en ‘Breakthrough to Succes’ en kosten elk € 3.300 (ex btw). En dat zijn nog maar de cursussen voor het eerste jaar. In het tweede en derde jaar kun je nog veel meer cursussen volgen.
In de zaal blijken zo’n 1.200 mensen aanwezig te zijn. Hiervan zijn 1.000 aan te merken als nieuwkomers en 200 zijn al eens eerder op het Business Bootcamp geweest. Nisandeh begint met ons te feliciteren dat we zijn gekomen. Altijd een goed gevoel om een compliment in ontvangst te nemen. Dan begint hij om zijn eerste vragen op ons af te vuren. Bijvoorbeeld: “Are you ready to make more money?” of: “Do jou want to have more freetime?”. Al deze vragen zijn een uitnodiging tot grote publieksparticipatie. Je wordt geacht om dit volmondig met ‘Yeah’ te beantwoorden en ondertussen je linker- of rechterhand fanatiek de lucht in te bewegen.

Helemaal vooraan zaten de fanatiekste mensen die volmondig aan het participeren waren. Verder naar achter zat het publiek dat wat minder enthousiast aan het meedoen was. Ik had ook wel zo m’n gêne. Moest ik nu ook bij elke, soms heel obligate, vraag mijn hand de lucht in slingeren of niet. Ongewild wil je toch niet de buitenstaander zijn en doe je dus mee met de mensen om je heen. Doordat iedereen meedoet hoef je je inderdaad niet te schamen, en toch voelt het op zijn tijd ongemakkelijk. Het blijft een vreemd tweeslachtig gevoel. En doordat ik aandachtig zo veel mogelijk opschrijf in mijn schriftje, heb ik een goed excuus om niet altijd volmondig mee te doen.

Hij begint al heel snel over het fenomeen ZZP-er. Zijn gehele publiek bestaat volgens mij uit ZZP-ers, dus daar heeft hij wel onze aandacht. Hij noemt het schertsend de ZZP-religie. In Nederland is het haast een religie geworden en dat wil hij doorbreken. Daarnaast zegt hij dat de gemiddelde ZZP-er gestopt is met zijn vaste baan om meer te verdienen en om meer vrije tijd te hebben. Met als resultaat dat je uiteindelijk minder verdient en ook nog eens minder vrije tijd hebt. Daar voegt hij aan toe als je wel succesvol was geweest, dat je dan niet hier had gezeten. Daar heeft hij ons mooi te pakken, wij dachten het mooi voor elkaar te hebben, maar dat valt toch tegen en daarom zitten wij in zijn Business Bootcamp. Als ZZP-er denk je te klein, je moet groter denken, en vooral zijn methode volgen, dan wordt je succesvol. Dan ga je meer geld verdienen en krijg je ook nog meer vrije tijd.

Hij is begenadigd spreker die in staat is om de zaal te blijven boeien. Door zijn vraag- en antwoordspel wordt je wel gedwongen om mee te doen. Zijn betoog zit ook vol met goede oneliners. Hij schrijft het woord ‘oppotunity’ op het bord en vraagt om reacties uit te zaal. Al heel snel komt hij met de oplossing. Echte entrepreneurs zien de mogelijkheden, diegene die het niet zijn zien dat de letter r ontbreekt.

Dan begint Nisandeh over zijn methode met de naam MG-SPI (‘My goal, such a powerful idea’). Dat staat voor Mindset, Goals, Strategies, Plan en Implementation.


 Die moet veranderen van werknemer naar entrepreneur. Bij een werknemer draait het om veiligheid en zekerheid. Bij ondernemerschap is dat er niet. Het gaat ook om vergissingen maken: “It’s better to ask for forgiveness and not for permission”. Hij tekent drie cirkels die als een schil om elkaar heen liggen. De eerste heeft de naam ‘comfort zone’, de tweede ‘learning zone’ en de derde ‘panic zone’. Iedereen is graag in zijn ‘comfort zone’, maar zijn reactie hierop is als volgt: “Succes is always out of your comfort zone”. Er komen nog meer oneliners: “I will do whatever it takes”. De zin “I’m going to do my best” mag niet meer voorkomen in je vocabulaire, want dat is niet goed genoeg. Afgesloten door: “Succesful people see the opportunity, poor people see the obstacle”.

Deze veranderde instelling moesten we bevestigen door hardop de volgende zin te zeggen: “I’m a fantastic business entrepreneur.” Om vervolgens een high five uit te wisselen met je buurman die dit moest bevestigen met: “Yes, you are”. En vice versa. Deze sessie werd afgesloten met een spel. De letters MLR werden opgeschreven en het was de bedoeling om in drie minuten daar zo veel mogelijk Engelse zinnen mee te maken waarin de M een zelfstandig naamwoord moest worden, de L een werkwoord en de R een bijvoeglijk naamwoord. Dat moesten we in een groepje van drie doen en wij konden maar met één zin komen, die achteraf gezien nog fout was ook: “Mother loves rucola”. Rucola is geen bijvoeglijk naamwoord. Een inventarisatie in de zaal leverde een hoogste score op van 30 zinnen. Nisandeh begon te vragen waarom wij geen 200 zinnen hadden gemaakt. Heel veel verklaringen kwamen er: te weinig tijd, geen creativiteit, het Engels was te moeilijk, geen pen en papier, de samenwerking was niet goed genoeg. Allemaal heel steekhoudend argumenten, maar hij vond dat er te veel energie ging in het verzinnen van redenen waarom het niet mogelijk is. Hij kon wel 1000 zinnen maken binnen drie minuten. We keken hem glazig aan, maar lieten hem zijn gang gaan. Eerst vroeg hij aan iedereen om zelfstandig naamwoorden te noemen die beginnen met een M. Mensen uit de hele zaal beginnen te roepen en de meest fanatieke rennen naar voren om hun ingeving door te geven. Na één minuut heeft hij 24 woorden. Bij de L haalt hij zo 22 woorden op en bij de R ook nog 14. Hij vraagt iemand om deze drie getallen te vermenigvuldigen en zo komt hij op 7.392 zinnen. Daarop zegt hij dat critici zullen zeggen dat er ook onzinnige zinnen tussen zullen zitten, laat 80 % onzin zijn, dan resteren er altijd nog meer dan 1.000 zinnen.

Zo is het maar net, terwijl wij bezig waren om te inventariseren waarom het niet mogelijk was, hadden we ook onze energie kunnen steken in manieren om het wel voor elkaar te krijgen. Dat liet nog meer even goed zien dat wij nog lang niet de goede Mindset hadden. Ons groepje, bestaande uit een piramide coach en een paardenfluisteraar, al helemaal niet.

Ik zat even niet goed op te letten, maar hij zat met een boek te wapperen en toen had een deelnemer die opeens in handen. Hij had dat boek weggeven aan de eerste die bij hem was. Vervolgens werd de zaal uitgedaagd om te vertellen waarom zij het boek niet hadden bemachtigd. Het was te ver weg. Ik was te langzaam. Ik had schaamte om naar voren te komen. Ik moest erover nadenken. Nisandeh sloot af met de oneliner: “Opportunity never comes twice”. Hij sloot het af met de anekdote dat hij een keer een biljet van € 100 in zijn hand gehad met de vraag wie dit wilde. De hele zaal riep ja, maar niemand kwam naar hem toe. Met als gevolg dat niemand het bedrag kreeg. Onze Mindset was er dus nog lang niet.

Na de lunch werden we eerst weer opgewarmd door de Nederlandse mevrouw. Om de lunch wat te laten zakken en om uit onze ‘comfort zone’ te geraken moesten we gaan dansen. Niet gewoon dansen, maar we moesten op onze stoelen gaan staan en dan gaan dansen. Eens een keer wat anders. Het werkt ook nog, want je begint toch weer fris aan de volgende sessie. Over ‘comfort zone’ gesproken, Nisandeh stelt voor om daar uit te stappen en dat je gewoon je klanten een hogere prijs in rekening moet brengen, omdat je het waard bent.

Een dertigtal mensen vormt het begeleidingsteam. Deze zijn allemaal uniform gekleed in een zwart T-shirt en stralen een en al blijdschap uit. Het zijn allemaal vrijwilligers die in ieder geval de drie cursussen van het eerste jaar zijn doorlopen. Volgens Nisandeh willen ze graag iets terug doen voor wat ze gekregen hebben.  Vandaar dat ze hier als vrijwilliger rondlopen. Ik vond het er maar een beetje raar uitzien, het leken haast wel slaafjes van Nisandeh. Door zo blij in het stramien te lopen kwamen ze bij mij eerder als loser over, maar dat heb ik natuurlijk helemaal mis. Ze hebben de drie cursussen doorlopen en dan ben je natuurlijk heel succesvol. Mijn gedachten zijn veel te negatief.


Bij het stellen van doelen kom je al snel uit op SMART. Een kleine inventarisatie in de zaal leverde al snel op dat een heleboel mensen bekend zijn met deze methode. Hij vond deze methode niet zo ‘smart’, zonder dit verder uit te leggen.

De zaal werd gevraagd om te zeggen waarom ze een business zijn begonnen. Heel veel redenen werden opgenoemd. Uiteindelijk werden ze ingevuld in een vierkant.


Het kwam er op neer dat alle redenen op een of andere manier ondergebracht konden worden in bovengenoemde categorieën. In Nederland is de volgorde van belangrijkheid: Freedom, Money, Fullfillment en Contribution. En in Nederland slaagde men er vooral in om doelstellingen te halen in het linker rijtje: Freedom en Fullfillment. Hij vroeg aan de zaal hoe die combinatie ook wel werd genoemd. Dit noemen we ook wel een hobby. En dan kwam er nog een vraag over het verschil tussen een hobby en een business. Bij een business komt het geld naar binnen, bij een hobby gaat het naar buiten. Ik denk dat menigeen in de zaal zichzelf opeens als hobbyist zag.

De sessie ging verder en focuste zich in eerste instantie op Money. Hij onderscheidde drie manieren om geld te verdienen. Hij noemde het Working Income, Passive Income en Value. Working Income is het inkomen dat je met je reguliere werk kan verdienen. Het probleem hiermee is dat er uiteindelijk een limiet aan zit, omdat je niet meer uren kan maken dan menselijk mogelijk is. Nisandeh daagde ons uit om een doel te stellen voor wat je zou verdienen over een jaar. Hij vond ook dat het minstens het dubbele moest zijn van de huidige stand van zaken, maar het minimum was toch wel € 100.000. Om er echte commitment van te maken kreeg een ieder een contract in handen. Dat was een contract dat je aanging met jezelf waarin je toezegde hoeveel je volgend jaar zou gaan verdienen. Enigszins besmuikt ondertekende ik het contract, terwijl ik eigenlijk al wist dat ik het nooit zou gaan waarmaken. “Have you filled out the contract?” “Yes.” “Are you proud of it?” “Yes.” “Are you really exited about it?” “Yes.” Tenslotte nog een testimonium van een eerdere cursist. Na een jaar verdiende ze € 151.000, net boven haar doel van € 150.000. Op de vraag “Isn’t it a miracle?” gaf hij zelf al het antwoord: “No, it isn’t.” Zijn boodschap is helder, als je jezelf een doel stelt en geeft er ook nog alles voor, dan ga het gewoon halen. En die doelen ga je vooral halen als je doorgaat met Nisandeh, als je zijn vervolgcursussen volgt. Daar voegde hij nog aan toe: “Only people I like go further in the next course. In the highest courses are the people I really like, they become friends.” Tja, wat moest ik nu met deze laatste uitspraken?

Over Passive Income en Value had hij niet zo veel te zeggen. Dat zou voornamelijk aan de orde komen in volgende cursussen. Passive Income is inkomen dat je krijgt door één keer iets te doen en dan vervolgens jaar na jaar daar de revenuen van plukken. Eigenlijk het mooiste inkomen wat je kunt voorstellen. Als voorbeeld noemde hij het schrijven van boek, maar dat was tegelijk weer een slecht voorbeeld, omdat het vaak zo weinig opgeleverde. Value is de waarde van je bedrijf, en dan vooral op het moment dat je zou besluiten ermee te stoppen. Hij voegde er fijntjes aan toe dat voor het merendeel van de aanwezigen waarschijnlijk op nul zou uitkomen.

Dit onderdeel werd afgesloten met een beetje een zijsprong, maar wel een belangrijke. Eerst had hij het over Focus Deficiency Disorder. Deze term kan ik verder niet tegengekomen, dus misschien is het wel verzonnen, maar hij legde het uit dat een gemiddeld mens om de 11 minuten wordt onderbroken door bijvoorbeeld een telefoon, dat het dan weer 25 minuten duurt om de focus terug te krijgen op waar je mee bezig was.
Daarom riep hij iedereen op om af te rekenen met Interruptions en Distractions. Onderbrekingen worden vaak veroorzaakt door telefoontjes. Volgens Nisandeh: “If you can pick up the phone when I’m calling, you’re not important.” Hij vond het niet professioneel om gelijk de telefoon op te nemen, laat de voicemail het werk doen. Afleidingen zijn er in vele vormen: e-mail, Facebook, Twitter, etc. Hij raadde aan het kijken naar mails te beperken tot twee momenten op de dag, namelijk vlak voor de lunch en vlak voor het einde van de werkdag. Over Facebook en Twitter was hij helemaal niet positief, daar zag hij het nut nauwelijks van in. Hij heeft hier natuurlijk wel een punt, als het even niet zo goed lukt, dan is de verleiding wel groot om gauw even de e-mail te checken of te kijken of er nog wat op Facebook gebeurt. Goed punt, al had ik deze natuurlijk al eerder gehoord.

Tenslotte kreeg het multitasking nog een veeg uit de pan. We deden een kleine test door een zin over te schrijven om vervolgens de letters in deze zin te nummeren. Eerst alle letters achter elkaar gevolgd door de cijfers achter elkaar. Vervolgens een letter en een cijfer om en om. De eerste keer ging het veel vlugger en accurater. Met andere woorden: houd op met multitasking!

Strategies (13)

1. Target audience“Become a big fish in a small pond (niche) instead of small fish in a big ocean (called food).” Je moet gaan nadenken over je doelgroep. Het begint met het bepalen van de demografische gegevens van je doelgroep (a), dan is het van belang om te weten welk probleem je aan het oplossen bent voor de doelgroep (b) en tenslotte zijn de psychografische gegevens van belang (c). Dat laatste kan net het verschil maken tussen jou en je concurrent. Hij kwam met voorbeelden, een fysiotherapeut in Amsterdam die gespecialiseerd is in het behandeling van kwetsuren van meisjes die volleybal en basketbal spelen, een verkoper van sportwagens die zich richt op zakenlieden tussen 35 en 50 jaar, Virgin Airlines die masseuses inzet op lange vluchten tussen Londen en New York. Je moet bij je doelgroep precies die snaar weten te raken, zodat zij vinden dat jij de oplossing bent voor hun probleem.

2. Business model Er zijn drie manieren om te groeien. a. Meer klanten. (Nadeel van deze is dat op enig moment hier een begrenzing aan zit) b. Meer opbrengsten per elke transactie. (“The more you raise your prices, the more clients you get.”) c. Doe meer transacties per klant. Vervolgens kwam er een fraaie vermenigvuldiging. Als je op al deze gebieden nu eens zorgt voor een verhoging van 10 %. Dan stijgt je opbrengst zo maar opeens met meer dan 33 %. Dat is toch gemakkelijk haalbaar! “Do you think you can raise with 10 % or more?” “Yes” “That’s a vote of confidence.”

Halverwege de middag was er ook weer een koffiepauze. Na elke pauze begint altijd de Nederlandse vrouw. Moesten we de vorige keer dansen op onze stoelen. Nu moesten we gaan staan, een kwartslag draaien en de nek van onze linkerbuurman vastpakken en gaan masseren. Deze massage werd steeds verder uitgebreid naar rug om tenslotte zelfs te eindigen als hoofd- en oormassage. Hier werden we ook weer duidelijk uit onze ‘comfort zone’ gehaald. Ondertussen werd je natuurlijk zelf ook onderhanden genomen door je rechterbuurman. Vervolgens moest je je een halve slag draaien en werd het ritueel nog een keer herhaald. Het werkt wel, want je begint op deze manier toch frisser aan de laatste sessie van de dag.

3. Remarkable products Voor dit onderdeel werd weer een mooi vierkantje gemaakt.

nice to have
must have

Het is wel duidelijk waar je niet moet zitten en ook heel duidelijk waar je het beste kunt zitten. Als je een uniek product koopt dat je doelgroep moet hebben, dan zit je goed. In ieder geval voor een poos, want de concurrentie doet natuurlijk ook mee. Het moet een WOW-factor hebben. Als voorbeeld haalde hij aan de eerste pleisters voor kinderen bedrukt met stripfiguren.

Het laatste verhaal van de dag ging over en taxichauffeur in New York. Die was zo servicegericht, bijna op het irritante af, dat Nisandeh hem een enorme fooi heeft gegeven. Ik vroeg me echter af hoe deze taxichauffeur gecategoriseerd zou worden in de methode van Nisandeh. Is dit nu een schoolvoorbeeld hoe het moet? Ik heb deze vraag maar even gelaten voor wat het waard is, het was al na 19.00 uur. Tijd om naar huis te gaan.

De volgende dag begon het weer om 10.00 uur. Om kwart voor tien was ik present, zodat ik nog net een kopje koffie kon drinken voor het zou beginnen. We werden weer opgewarmd door de Nederlandse vrouw, maar daarna was de grote held al gauw weer op het podium.

De ochtendsessie begon een beetje sloompjes. Een paar herhalingen van de vorige dag en het wilde maar niet op gang komen, misschien toch moeilijk om weer fris te starten na zo’n vermoeiende dag. Hij begon op een gegeven moment een anekdote te vertellen over zijn meest recente verjaardag, toen hij 46 werd. Hij deed nooit zo veel aan verjaardagen, maar nu had hij bedacht om 46 cadeautjes te maken en deze uit te delen aan willekeurige voorbijgangers. Hij maakt 46 mensen blij en had nog nooit zo’n goede verjaardag gehad. Het ging dus over wat jij kon bijdragen aan de wereld. En hij kwam terug op het vierkant van de vorige dag.


Zijn betoog begon nu bij Contribution. Als jij ervoor zorgde dat je iets bijdroeg aan de wereld om je heen, dan kwam de Fullfillment vanzelf. En als je Fullfillment hebt, dan heb je ook Freedom, en uiteindelijk volgt Money automatisch. Zo wordt het nog een hele mooie theorie. Zoiets als geven is het nieuwe verdienen. Hij voegde toe dat 10 % van alle opbrengsten van de Open Circles Foundation naar een school in Uganda gaat.
Dit was duidelijk een opmaat voor ons om ook in de gelegenheid te komen om te geven. Het gaat hierbij om een project om in drie dorpen in Madagaskar zonne-energie te introduceren. Tien vrouwen waren al zes maanden naar India geweest voor een opleiding. Nu waren ze terug in hun dorp. Ze hadden alleen nog apparatuur nodig om de zonne-energie op te wekken. Dat moest € 37.000 kosten en er was al € 11.000 binnen. Of wij niet het ontbrekende bedrag bij elkaar konden krijgen. Elk bedrag dat wij zouden doneren zou worden verdubbeld door Open Circles Academy. Het leek mij een beetje een raar project, eerst al die vrouwen zes maanden van huis en haard laten vertrekken. Intussen zijn ze allang weer terug en zitten nu te wachten op de apparatuur van maar liefst € 37.000, wat mij ook disproportioneel lijkt voor drie kleine dorpjes. Het leek mij typisch zo’n project dat in het westen is bedacht, zonder ook maar te kijken naar de behoefte van de lokale bewoners. Ik besloot om niet te geven, het leek mij niet zinnig. Ik zag om mij heen dat er wel kwistig werd gedoneerd. Ben ik dan zo kritisch? Moet ik mij schuldig voelen dat ik niet geef?

Bij dit alles werd het begrip Conscious Millionaire geïntroduceerd. Dat betekent dat je begint met Contribution, met het geven, en dat wordt je vanzelf een miljonair. De uiteindelijke opbrengst was € 6.500 (gemiddeld ruim € 5 per persoon) en met de verdubbeling is dat dan € 13.000. Viel toch een beetje tegen, denk ik. Het volgende Business Bootcamp moet de rest maar opbrengen.

Toen werd Bianca naar voren geroepen. Een jonge vrouw keek verbaasd op en met rode wangetjes liep ze naar voren. Zij werd naar voren gehaald omdat ze een bijzondere gift had gedaan, ze had namelijk € 1.000 gedoneerd aan het project. Dat werd bekroond met een daverend applaus en ook een beloning van Nisandeh. Zij mocht voor niets meedoen aan één van de vervolgcursussen van € 3.300. Zo zie je maar weer, wie geeft, die zal oogsten. Zo wordt het nog heel bijbels. De kwade geest in mij suggereerde dat zij bij de organisatie hoorde, maar dat denk ik toch niet, ze leek me een echte deelnemer. Dit is dan weer zo’n interessante ontwikkeling op zo’n dag.

4. Marketing We gaan weer verder met de Strategies. Een bedrijf kan niet zonder marketing. Er wordt wel beweerd dat 60 % van de inspanning in marketing gaat zitten. En je moet niet te bescheiden zijn, je moet luid en duidelijk zijn. Je moet andere mensen interrumperen, dan krijg je aandacht. Het moet als volgt gaan. De eerste stap is om van vreemden vrienden te maken, de tweede stap is om van deze vrienden klanten te maken. “They need to know you. They need to like you. They need to trust you.” In die volgorde. De derde stap is dan dat deze klanten ambassadeurs voor je worden. “They go out and say that you are great.”

5. Website Van te voren had hij al verschillende websites bekeken van mensen die naar het Business Bootcamp zouden komen, en de meesten vond hij waardeloos. Een grote egotrip van de ontwerper van de website of van de uitbater ervan. Een website moet eerst van bezoekers abonnees maken, dat kan alleen doordat de bezoeker een e-mail adres achterlaat. Je moet iets verzinnen waardoor de bezoeker wordt verleid om dat te doen. Vervolgens moet deze abonnee worden omgezet in een koper. Tenslotte moet de website ervoor zorgen dat je als een expert wordt gezien op je vakgebied. Meer expliciet werd het niet, maar hij voegde er nog wel dat aan toe: “The uglier the website, the better it performs.” Ook geeft hij nog een sneer richting zoekmachine optimalisatie: “Forget search engine optimalisations. No good clients.”

Zo in de loop van de tijd krijg je wel door dat alles heel strak is georganiseerd. Alles is helemaal gepland en er loopt niets uit. Het stramien is helemaal uitgedacht. Bij het begin van elke sessie komt een aantal mensen van het begeleidingsteam de zaal in en turft hoeveel mensen er aanwezig zijn. Alles wordt geregistreerd. Zelfs de muziek is er op aangepast. Voorafgaand aan een sessie wordt altijd ‘I gotta feeling’ van de Black Eyed Peas gespeeld en het eind van de sessie en begin van de pauze wordt begeleid door ‘Eye of the tiger’ van Survivor. Onder de opzwepende muziek van de Black Eyed Peas worden we swingend en lachend verwelkomd door het begeleidingsteam. In de loop van de twee dagen beginnen ook steeds meer mensen spontaan te dansen.

6. E-mail marketing Sommigen zeggen dat e-mail marketing dood is, integendeel zegt Nisandeh, het is springlevend, en zelfs cruciaal voor je business. Het grijpt allemaal terug op de marketing om van vreemden vrienden te maken en van vrienden weer klanten. En daarvoor heb je de volgende zaken nodig:
1. Je moet een lijst hebben van klanten en mogelijke klanten. Liefst in digitale vorm.
2. Iedereen waarmee je in contact bent geweest, komt op de lijst. Hij vroeg zich bijvoorbeeld af waarom restaurants nooit om een e-mail adres vragen, zodat men benaderd kan worden om nog eens langs te komen.
3. Je moet tenminste een voornaam en een e-mailadres hebben.
4. Zorg voor een lokkertje, die je gratis aanbiedt en het liefst één die jou ook niets kost. Als voorbeeld noemde hij het aanbod om een pdf-document op te sturen.
5. Communiceer regelmatig met de mensen op de e-mail lijst. Zorg dat je consequent bent, dat de frequentie van verschijnen niet wisselt.
6. Communiceer alleen waardevolle en relevante informatie.
7. “Tease. Promotion.”
8. Houdt het kort.
9. Houdt het simpel.
10. Zorg dat het gemakkelijk is om te ‘unsubscribe’.
Tenslotte voegde hij eraan toe. “The money is in the list. Your mailing list starts with number one.” Het lijkt wel heel duidelijk dat hij een fervente aanhanger is van e-mail marketing.

7. Social media In de samenleving is social media niet meer weg te denken. De tijd die je in social media moet steken, moet je volgens Nisandeh als volgt verdelen: bloggen (80 %), LinkedIn (15 %), Facebook (2 %), Twitter (2 %), YouTube (1%). Je moet allereerst dus met een blog beginnen. Iemand wordt pas een vriend nadat je ermee gepraat hebt en bloggen is een vorm van conversatie. Hoe ga je aan de slag?
1. Open een account bij Wordpress. Dat is gratis. Begin vandaag.
2. Begin met het plaatsen van waardevolle artikelen van 600 woorden
3. Blog op regelmatige basis. Dat kan wekelijks, tweemaandelijks of maandelijks zijn. Begin met een maandelijkse blog.
4. Stuur de mensen die op je e-mail lijst staan een bericht dat er een nieuw blogbericht is geplaatst.
5. Moedig mensen aan om commentaar te leveren.
6. Reageer op deze commentaren.
7. Gebruik de andere sociale media om mensen attent te maken op je nieuwe blogbericht.
Over LinkedIn heeft Nisandeh nog wel wat te zeggen, maar dat slaat hij over wegens tijdgebrek. Facebook en Twitter zijn in zijn eigen ogen alleen handig om je attent te maken op je blog.

8. Networking In Nederland zijn netwerkbijeenkomsten vaak te vrijblijvend, te gezellig. Mensen komen bij elkaar om lekker te borrelen en van echt netwerken komt weinig. Hij benadrukt dat er niet voor niets het woord ‘work’ in staat, je moet het zien als werk. Om goed te netwerken moet je het volgende doen:
1. Normaal hebben mensen een netwerk van ongeveer 200 mensen die men goed kent en waar men zich op zijn gemak bij voelt. Je moet je aandacht niet richten op deze 200 mensen, maar op het netwerk van deze mensen. Deze hebben ook allemaal weer een netwerk van 200 mensen, dus als je daar opricht heb je het over een potentieel van 40.000 klanten.
2. Eerst moet je geven. Je moet je kennis en contacten delen. Als je kennis deelt dan straal je kracht uit. Als je contacten deelt, dan kun je twee mensen blij maken. Als je bijvoorbeeld in contact komt met iemand die een boek wilt uitgeven, ken je vast wel iemand in je netwerk die iets te maken heeft gehad met het uitgeven van een boek. Deze mensen kun je dus in contact brengen, en als het slaagt ben jij hun held.
3. Als je naar een netwerkbijeenkomst gaat moet je er heen gaan met een doel. Bijvoorbeeld je wilt bepaalde informatie ontvangen, of je wilt van iemand een introductie krijgen bij een persoon die je graag wilt ontmoeten.

Dit onderdeel wordt afgesloten mee een echte netwerkbijeenkomst. Je moet een doel verzinnen en dan de zaal ingaan en connectie maken. Vervolgens de doelen uitwisselen, en als je iemand kent in je netwerk die dat zou kunnen, dan wissel je je visitekaartje uit. We hadden vijftien minuten de tijd, helaas waren de doelen dermate vaag dat ik uiteindelijk maar twee visitekaartjes heb kunnen bemachtigen.

In totaal zijn er 13 Strategies. Na nummer acht zijn we gestopt. De overige zijn niet behandeld, volgens het bijgeleverde document betreft het Sales & Negotiation (9), Branding & Positioning (10), Becoming an Expert (11), Outsourcing & Team Building (12) en Systemizing & Automation (13). Dit zal vast voor gevordenen zijn en behandeld worden in zijn vervolgcursussen.

Het is al laat in de zondagmiddag en het begint tijd te worden voor reclame maken voor de vervolgcursussen. De meest voor hand liggende volgende stap is om deel te nemen aan Master Entrepeneur. Want dat gaat ervoor zorgen dat je verdiensten worden verdubbeld, maar ook je Freedom wordt verdubbeld. Er hebben zich al 600 personen ingeschreven, maar er is nog plek. Wim zegt in een testimonium: “If you do everything that Nisandeh tells you to do, then you will reach your goals.” Nisandeh voegt er nog aan toe de je in 14 maanden Financial Free kunt zijn en binnen 3 jaar een miljonair.

Ook over de andere twee cursussen wordt nogmaals uitleg gegeven. Tevens kondigt Nisandeh aan dat hij met een zeer aantrekkelijk aanbod zal komen, dat alleen vandaag geldig is, tot het eind van het Business Bootcamp. Eerst zegt hij dat als je nu inschrijft voor Master Entrepeneur, dat je dan gratis mag deelnemen aan de cursus Financial Freedom. Het begeleidingsteam achter in de zaal staat klaar om je inschrijving te ontvangen. Geroezemoes in de zaal, gratis, dat klinkt aanlokkelijk. Een paar mensen staat al op en loopt naar achter. Hij doet er nog een schepje bovenop. Als je nu inschrijft krijg je ook nog de cursus Breakthrough to Succes voor niets erbij. Nog meer geroezemoes. Hij benadrukt nog meer eens dat het aanbod alleen vandaag geldt en dat achter in de zaal het begeleidingsteam klaar staat om de inschrijving in ontvangst te nemen. Een aantal mensen houdt het niet meer en rent vol enthousiasme zo snel mogelijk naar achteren om gebruik te maken van dit aanlokkelijk aanbod. Een cadeautje van € 6.600 laat je toch niet lopen!
Het is pauze en bij de inschrijvingstafels is het een drukte van belang. Ik denk dat zeker 100 mensen zich hebben ingeschreven, misschien wel meer.

Implementation Plan

Na de pauze is er nog snel even aandacht voor het slot. Het plan om het te implementeren. Dagelijks moet je tijd blokkeren om onderbroken productief werk te produceren, te beginnen met tien minuten en dan steeds verder uitbreiden. En je moet gedurende een week, elke dag tien minuten nemen om de aantekeningen van het Business Bootcamp door te nemen. Verder moeten we het volgende doen:
1. Een follow-up geven aan de visitekaartjes die je hebt verkregen tijdens de netwerksessie. Ik had er maar liefst twee.
2. Een follow-up geven aan alle andere visitekaartjes die je in de pauzes hebt verzameld. Ook twee.
3. Uitzoeken welke inzichten je hebt verkregen in het Business Bootcamp.
4. Ga op zoek naar een sparringpartner.
5. Maak een schema van netwerkbijeenkomsten die je gaat bijwonen.
6. Maak het juiste LinkedIn profiel. Dit onderwerp is overgeslagen en zal worden nagezonden via e-mail.
7. Zorg dat je product verbeterd wordt tot unique en must have.
8. Maak een e-mail lijst.
9. Begin een nieuwsbrief.
10. Begin met bloggen.

Het gaat al richting zeven uur ’s avonds. Bovenstaande tien stappen worden even snel doorlopen. De aandacht kan er ook niet meer zo goed bij zijn, de twee dagen lopen echt op het einde. Het lijkt ook wel of de zaal nog bezig is het aanbod van de twee gratis cursussen te verwerken.

We sluiten af met nog een spelletje. Boter, kaas en eieren. De opdracht is om samen met een buurman zo veel mogelijk rijen van drie kruisjes of rondjes te krijgen. Iedereen heeft een veld en met z’n tweeën heb je dus twee velden. Je begint om dit op de klassieke manier te doen, maar dan blijkt al snel dat het niet mogelijk is om er zoveel mogelijk te krijgen. Ik bedenk dat hij helemaal niet gezegd heeft dat we ieder een eigen teken moeten nemen. We kunnen bijvoorbeeld allebei kruisjes nemen. Ik ben al behoorlijk onder de indruk van mijn eigen out-of-the-box denkvermogen en ben al best trots op het feit dat ik samen met mijn buurman op onze twee velden tot maar liefst 16 rijen kom. Vergeleken met de rest van de zaal doen we het zeker niet slecht, maar er zijn mensen die nog veel meer rijen hebben dan wij. Er is niet gezegd dat je de velden niet aan elkaar mag plakken. Door onze velden aan elkaar te plakken, komen we al op 26 rijen met z’n tweeën. Maar er is ook niet gezegd dat je je moest beperken tot één buurman. Met zijn vieren of zessen kom je al tot een enorm veld en de mogelijkheden worden enorm uitgebreid als je de velden driedimensionaal achter elkaar gaat plakken. Je moet dus niet laten beperken door aannames: “Assume makes an ass out of u and me.”

De hele boodschap van dit laatste spel is dat je het niet alleen moet gaan doen. Hier komt hij terug op het begin van de cursus waarin hij zei dat hij wil afrekenen met de religie in Nederland om ZZP-er te zijn. Het betekent niet dat je mensen in dienst moeten nemen, maar wel dat je moet gaan samenwerken.

Dan is het afgelopen en is het tijd om naar huis te gaan. Nog steeds staan er mensen in de rij om zich in te schrijven om drie cursussen voor de prijs van één te gaan volgen, maar ik heb het wel gezien. Twee vermoeiende, maar interessante dagen zijn om. Tijd om zo langzamerhand eens conclusies te gaan trekken.

Wat zeker goed is aan het Business Bootcamp is dat je uitgenodigd wordt om eens goed na te denken waar je mee bezig bent. Hoe zit het met het product dat je aanbiedt en hoe zit het met je doelgroep? Het is goed om daar eens over na te denken. Daarnaast heeft hij nog wel een paar praktische tips gegeven over hoe je bijvoorbeeld om moet gaan met e-mail en aanverwante zaken. Ook wel mooi vond is zijn uitgangspunt dat je eerst moet geven, voordat je gaat ontvangen. Dus ik heb zeker wat opgestoken van het Business Bootcamp.

Verder is het best leuk om met zo’n hele groep samen zo’n belevenis te ondergaan. Dan wordt zelfs het dansen op stoelen leuk en ga je enthousiast “Yes” roepen en je hand de lucht in doen bij elke goed geplaatste opmerking. Door de afwisseling en de participatie ben je goed in staat om alles goed te volgen. Ik ben ook wel eens op een bijeenkomst geweest met veel sprekers zonder veel publieksparticipatie, nou dan is het moeilijk om je aandacht er de hele dag goed bij te houden.

Wat wel een beetje tegen gaan staan is de gehanteerde verkooptactiek om je er toe te zetten om allerlei vervolgcursussen te gaan doen. Ergens voel je toch druk om je in te schrijven voor zijn dure cursussen, omdat het aanbod maar beperkt geldig is. In mijn ogen blijft veel geld, ook al is het nu voor drie cursussen.

Ik blijf ook een vreemd gevoel houden over de hele entourage. Het geheel komt haast over als een sekte. Aan de leiding staat Nisandeh Neta, toevallig ook afkomstig uit Israël, en wat hij zegt wordt door zijn volgelingen ontvangen alsof het het evangelie is. Met als leidraad dat alles goed zal komen, als je hem maar volgt. De mensen in zijn begeleidingsteam zijn de discipelen, die hem devoot volgen. Zij maken een overdreven blijde indruk. Zij assisteren de grote roerganger om de bekeerlingen van het Business Bootcamp op te nemen in de gelederen. Je hebt dan de gelovigen die naar achter rennen om zich in te schrijven voor de vervolgcursussen en je hebt de niet-gelovigen die in verwarring achterblijven. Dat geeft een beetje een ongemakkelijk gevoel. Ik heb me niet ingeschreven, dus ik ben een niet-gelovige. Maar slaafs volgen is ook niet helemaal mijn stijl, dan maar een mislukkeling in de ogen van Nisandah.  Ik hoor niet graag bij een sekte, dus laat ik het gewoon bij de fantastische ervaring van twee dagen Business Bootcamp.


          Your Job Search Is Wrong, And You Don’t Even Know It!   
The landscape of job searching has changed so much over the last 10 years it’s hardly recognizable. Email applications, online agencies and commercial networking sites all act together to make it a whole different animal than it used to be. Unfortunately, that means a lot of folks are going about their job search and application [...]

          what is iPhone?   

iPhone is a smartphone made by Apple that combines an iPod, a tablet PC, a digital camera and a cellular phone. The device includes Internet browsing and networking capabilities.

iPhone is extremely thin (only 11.6 millimeters thick) but wider and longer than many comparable devices. The display area is a 3.5-inch wide screen multi-touch interface with unusually high resolution (160 pixels per inch). Unlike most other smartphones, iPhone does not use a hardware keyboard or a stylus. To navigate, a user uses multiple taps and drags to navigate through a mobile version of Apple's OS X operating system. Like iPod, iPhone synchronizes data with a user's personal computer, using iTunes as a client software and Apple's proprietary USB port. iPhone
is compatible with Microsoft's Windows operating systems, including Vista.
iPhone's networking features include:
  • Automatic detection of WiFi networks.
  • Support for the 802.11b and 802.11g standards.
  • The use of quadband GSM and SIM cards to access cellular networks.
  • EDGE support for high-speed data transfer where available.
  • Bluetooth connectivity for short range networking with peripherals, other iPhones and PCs.
Apple says that iPhone carries 8 hours of life on the internal lithium-ion battery for talk or video, and up to 24 hours for music mode. The device ships with either a 4 or 8 GB hard drive, an Intel CPU and Apple's OS X operating system, modified for mobile use.
iPhone comes preloaded with a suite of media management software and communications software, including iTunes, the Safari Web browser and iPhoto. iPhoto may be used in combination with the 2 megapixel camera on the back of the device. Google's search and mapping services are fully integrated, including the ability to initiate phone calls from within Google Maps. Users can also view YouTube videos on the device, along with Microsoft Office documents and most imaging formats, including .JPEG, .GIF and .TIFF. A partnership with Yahoo allows iPhone users to send and receive rich HTML email. Other IMAP or POP3e-mail services are integrated as well, along with webmail access in the browser.
While iPhone was released under an exclusive two-year partnership with AT&T Wireless, it took less than three months for hackers working in concert worldwide to unlock the device for use on any GSM network, though the process involved a level of technical sophistication well beyond the consumer level.

          Software Engineer - II - Sumeru Solutions - Hillsboro, OR   
Some exposure around networking concepts, storage concepts, virtual machines. This position will work to understand the workflow, technology, and business value...
From Sumeru Solutions - Tue, 06 Jun 2017 03:32:35 GMT - View all Hillsboro, OR jobs
, Cosmos electronic - Cosmos electronic

Cosmos Electronic azienda presente da oltre 40 anni sul mercato, propone le sui soluzioni più innovative nei settori del networking, della videosorveglianza, ma anche degli accessori elettronici ed informatici, come cavi di ogni genere, ripetitori, router, hard disk, armadi rack e molto altro. (d.a.)

          Wait Statistics in Microsoft SQL Server    

 (Originally appearing at


When it comes to troubleshooting in relational databases, there's no better place to start than wait statistics.  In a nutshell, a wait statistic is an internal counter that tells you how long the database spent waiting for a particular resource, activity, or process.  Since wait statistics are categorized by type, one look will quickly tell the variety of problem that needs your attention, assuming you know meaning for Microsoft's lingo for each wait type.

(As an aside, wait stats were implemented in the earliest days of relational database computing because the early RDBMSes ran on multiple operating systems. So the database vendors needed a reliable method of troubleshooting database performance which was independent of the OS).

Wait stats help you clue in to the best approach and path for troubleshooting.  For example, if your top wait stat showed a lot of time spent on acquiring locks, you could pretty well rest assured that trying to tune networking latency would be a total waste of your time.  Conversely, wait stats could also help you understand that perhaps the 'usual suspects' of poor database performance (IO, CPU, etc) weren't actually worth consideration.

Because wait statistics are broad, they're typically where you start your troubleshooting process but not where it ends.  That's because wait statistics don't actually point to the smoking gun that's causing the true performance problem.  For example, let's say your SQL Server is experiencing an unusually high amount of RESOURCE_SEMAPHORE waits.  Resource semaphores relate to query compilation and reserving memory for queries as they're being compiled.  But on a busy system,WHICH of your queries are contributing to this wait?  It can require a lot more investigation to figure that part out.  (I've considered spending some more time in future posts walking through the entire troubleshooting process. If you're interested let me know in the comments).

Now, in SQL Server, it is possible to determine the wait stats accrued by a given thread or even a specific query or transaction.  But this information is only retained by SQL Server while "in flight".  Long-term retention of wait stat information is only for the broad categories.


For some historical perspective, you have to go back to the white paper SQL Server 2005 Waits and Queues (By Tom Davidson) to see where it all began for SQL Server.  (

Prior to SQL Server 2005, wait stats of a sort where identifiable using the DBCC SQLPERF(UMSSTATS) and DBCC SQLPERF(WAITSTATS).  These commands are still around, btw.  You can see these early indications of UMSStats (User Mode Scheduler) and wait stats in Microsoft KB articles like Description of WAITTYPE and LASTWAITTYPE ( and other early blog posts.

Wait Stats started to come into major prominence when folks like Joe Sack (blog | twitter)
( and Jimmy May (blog | twitter)  started to write about them (

And if you didn't get them then, you definitely need the SQL Server Diagnostic Queries by Glenn Berry (blog | twitter) , which have a number of wait stat queries already written for you.  Glenn started this collection of queries back in 2005 and has kept it up to date ever since.  The latest version of queries are at

I also started to put a lot of attention on them, such as when MCM and UK MVP Christian Bolton (Blog | Twitter) and I did the webcast The 5-Minute SQL Server Health Check (


Nowadays, wait stats are quite well documented.  You can get a great review of all of the wait stats for SQL Server simply by looking at the Books Online (BOL) topic (

The downside of Microsoft's documentation in BOL is that it tells you a nice bit of info about each of the wait stats, but not how to remediate them if they are turning into a problem on your SQL Server.  But times have changed - there's so much good information that all you need (most of the time) is to perform an internet search for 'SQL Server my_problem_wait_stat' and you'll probably get at least one good hit by Microsoft customer support or an MVP blogger.  All you need to do before the search is to find the type of wait stat that's causing the problem.


These days, all you need to

solve a wait stat problem is an

internet search for 'SQL Server



There are also a couple good books and eBooks on the topic.  Kalen Delaney's Inside SQL Server books, especially Chapter 2 in the edition sitting on my shelf, are outstanding.  Joes2Pros also has a nice, succinct book on wait stats here (

Jonathan Kehayias (blog | twitter), of, has a great eBook in short form for free and a longer, more comprehensive version for a small fee. ( at Simple-Talk.

What are your favorite wait stat resources? Have you written a blog post that broadens or deepens our knowledge of wait stats in SQL Server? If so, I'd love for you to post a comment here with a link back to your article!  Let me know what you think.  Thanks,


-Follow me on Twitter!
-Google Author

          Comment on NEW ON LIVEBOOKS RESOLVE: SEEING MONEY by ian Aitken   
These business issues are so important, not only the money side but also the marketing/networking raising profile. I have been burnt not paying enough attention to both (not to the same dizzying heights as you Doug) This is a fast moving business and you've got to keep on top. Nice one Doug for your generosity I think there are many emerging photogs and many practicing photogs who will soak this up. cheers Ian
          Always be Networking   
Here is a story of why you should always be networking. I was eating lunch in a downtown restaurant a couple weeks ago and reading a Shakespeare play preparing myself for a directing interview. Halfway through my meal my waitress asked my why I was reading Shakespeare - whether I was taking a class or something. 

I asked her if she was an actress. She said she was so I told her about my up upcoming interview. She wished me luck and moved on to her other tables.

When she brought the check I left a bigger tip to support a fellow struggling artist - but I also left her my business card and a note to feel free to email me her headshot and resume. I debated in my head for a while whether or not I should do this, but I figured, what could it hurt.

A couple weeks later I did get an email from her and it turns out that she has training in Red Nose Clowning and is currently rehearsing a clown show. Now clowning is a hot commodity that I hope for in any actor who comes through my audition room so this was a very fortuitous connection to have made.

Now this may never work out for any work relationship or anything like that. But the networking worked. I found a new actress that will definitely call in should the right opportunity arise. 

          Field Network Engineer - Impact Networking, LLC - Madison, WI   
Impact Networking is seeking customer service focused individuals with a wide knowledge base for computers and networks to provide remote and on-site
From Impact Networking, LLC - Fri, 21 Apr 2017 18:41:45 GMT - View all Madison, WI jobs
          Messenger Group Payments By Facebook To Pay Your Friends For Treats   

Facebook is one of the most reputed and top grossing Social Networking sites in the world. The aim to connect the people made them stand in a unique position. Facebook is also undertaken one more Social networking application called Whatsapp and working with the same Moto. Till now Facebook is serving with Messenger application where we can chat individually and in a group too and it is updating it with new features like Video Calling, mojos, etc. Till now Facebook is trying to connect the people but now it adding one more feature called Messenger Group Payments to it and expanding its usage so let us have a look at it. Messenger group payments, there are a lot of applications and websites which works for the payments but this time Facebook is directly allowing payments in a messaging application to the group members. Here is how we can make a group payment. For suppose friends had a treat and your friend paid the money instead of you, in such cases this application will helpful to us where we can make transactions through the Messenger Group Payments. For that, we just need a Messenger Application of new version and when we […]

The post Messenger Group Payments By Facebook To Pay Your Friends For Treats appeared first on

          For rent - Long Lane, London(price per workstation) - £ 650   
South Bermondsey SE1, United Kingdom
Price per workstation.These flexible and creative workspaces, with no hidden charges or extra fees. Perfect for teams of all sizes and with plenty of room to grow, you ...desk, perfect for independent workers and growing teams.The shared spaces encourage networking, with communal break out areas, private phone booths, in-house coffee shop, access to meeting rooms and ... ...

          Colbert's Climate Change "Catfight"   
Stephen Colbert let a climatologist and...some guy...duke it out on climate change. Bottom line: Climate is not the same thing as weather!

The Colbert ReportMon - Thurs 11:30pm / 10:30c
Science Catfight - Joe Bastardi vs. Brenda Ekwurzel
Colbert Report Full EpisodesPolitical HumorHealth Care Reform

          Get Paid to Click Ads.   
There are hundreds of sites out there that advertise that they pay you to simply click on ads. I've tried many and sadly been scammed by hundreds of them. After being scammed so much, I decided I must create this site to outline legitimate online money making opportunities.


Neobux is a truly one of a kind Pay Per Click website that is free to join, has a low payout, and pays instantly! Many things make Neobux different than other PPC sites that make it extremely stable and reputable. Neobux is a great website for everyone from the beginner to the expert PPC User and you can truly earn thousands of dollars here with the right techniques.

How Do You Earn?

Like every other PPC, Neobux pays you to click on Advertisments on its site. For this, you will earn .01 for each add. You can expect from 3-20+ adds per day depending on your location and account status! However, your own clicks are only the beginning of earning potential. With referrals, you can exponentially increase your earnings! The best part is you can RENT referrals who will make money for you!

So How Do I Get Referrals?

There are two types of referrals on Neobux:

Direct Referrals- These are people you get to join the site via your own personal link. You can advertise on forums, social networking sites, or have your friends and family join. Every time they click an ad, you earn money!

Rented Referrals- This is one feature unique to Neobux that you will not find anywhere else. To rent referrals, you pay as little as .28 to have them credited to you for one month. What this means is that for one month, you will get paid for every ad they click! If you hire someone who clicks 10 ads a day, for 30 days, they have made you a profit of 3.00-.28 = 2.72. The amount of referrals you rent is up to you, say you get 100 referrals and they all do that, you just earned $272!! Some members even have THOUSANDS of rented referrals!


It's all good and well that you can earn on Neobux, but it does not really matter if they are a scam site that doesn't pay! Neobux has the best reputation among all PPC about paying because they have INSTANT PAYMENTS to your Paypal! Neobux also has a very low minimum payout, $2. After you have cashed out for $2, your minimum cashout will increase by $1 up to a maximum minimum cashout level of $10. This is not an issue because it is easy to make that much money once you learn how to use Neobux effectively!

Neobux has a great forum where you can learn much more information and be sure to check back here for updates!

          AVG AntiVirus FREE - Update   
AVG AntiVirus FREE 2014 provides advanced protection for web surfing, emailing, and social networking. And it's packed with features, too: File Shredder, AVG Do Not Track, LinkScanner, Anti-Spyware, free online support, and more.
          Fool For Love Blog Tour - Guest Post: Author Merry Farmer   

When Worlds Collide

Okay, I confess.  I’ve been reading romance novels since I was in high school.  I know, I know, I was probably far too young to be reading “those books” back then, but I fell in love with them from day one.  (I also learned about the birds and the bees from a romance novel, but that’s another story!)  I was always a big fan of anything historical, but particularly novels set in the Victorian world.  You know, lords and ladies, London and the season.  It was all so wonderful!

Ah, but the thing is, I was also a huge fan of the tv show Dr. Quinn: Medicine Woman at about this same time in my life.  That and I went to see Dances With Wolves four times in the theater!  Anything western had me captivated.  The energy and excitement of the Old West and those people brave enough to tame it thrilled me.

It was only natural that at some point in my wild, overactive imagination I would bring those two magnificent genres together.  I thought to myself, what if London society met Old West adventure?  What if a British lady fell in love with a Montana cowboy?

That, my friends, is how Fool For Love was born.

Sometimes we tend to forget that these two exciting worlds existed at the same time in history.  The bright, sparkling world of titled society with their social rules and mores existed on one side of the Atlantic, while far across the waters and half a continent the rough and rugged world of the frontier was going strong.  It is highly likely that these two ways of living actually did come into contact with each other.

The world that my heroine, Amelia Elphick, comes from is one that my hero, Eric Quinlan, doesn’t understand.  He looks at the way people behave and the way they treat one another and thinks it’s ridiculous.  At the same time, London is busy looking down its collective nose at him, thinking he’s the one acting strange.  But when Eric offers to help Amelia out of the ruinous situation she finds herself in, it doesn’t matter how odd his ways are.  She accepts his help.

I have tried my best with Fool For Love to show the vast spectrum of life that existed at the end of the 19th century.  It was a dynamic time, when electricity was becoming commonplace, distances were shortened by technology, and both sides of the world were on the verge of a sparkling new century.  It was more than just Amelia and Eric’s worlds that were about to collide.  Life as everyone knew it was about to change.  That is the world that I have tried to share.

Eric Quinlan was born a cowboy and a rancher and intends to die a cowboy and a rancher. But when his ranch is in danger of failing, he travels to the wilds of London looking for a business deal to save it. What he finds there are stuffed shirts, odd manners, and a damsel in distress.

Amelia Elphick’s life is over. She may have been born a lady, but when she finds herself jilted by a lover who leaves her pregnant and refuses to marry her, she seems destined for a life on the streets. When her employer’s rough but handsome houseguest, Eric, offers to rescue her from ruin, she has no choice but to say yes, even if it means moving halfway around the world.

But Amelia finds herself saying yes to more than a ticket west. What starts with a harmless lie tangles Amelia and Eric in a web of desire and deceit that exposes passions and turns their worlds upside-down. Eric believes Amelia holds the key to saving his beloved ranch and giving him the family he always wanted, but can he save her from the demons of her past without losing himself in the process?

People do foolish things when they’re in love…

Author Bio:

Merry Farmer lives in suburban Philadelphia with her two cats, Butterfly and Torpedo. She has been writing since she was ten years old and realized one day that she didn’t have to wait for the teacher to assign a creative writing project to write something. It was the best day of her life. She then went on to earn not one but two degrees in History so that she would always having something to write about. Today she walks along the cutting edge of Indie Publishing, writing Historical Romance and Women's Sci-Fi. She is also passionate about blogging, knitting, and cricket and is working towards becoming an internationally certified cricket scorer.

Social Networking links:


Twitter: @merryfarmer20


Amazon Page:

Book links:

The Loyal Heart

Amazon -

Amazon UK -

B&N -

Smashwords -

iBooks -

The Faithful Heart

Amazon -

Amazon UK -

B&N -

Smashwords -

iBooks -

The Courageous Heart

Amazon -

Amazon UK -

B&N –

Smashwords -

iBooks -

Our Little Secrets

Amazon -

Amazon UK -

Smashwords -

B&N -

iBooks -

Fool for Love

Amazon –

Amazon UK –

Smashwords -

B&N –

iBooks –

Sarah Sunshine

Amazon –

Amazon UK –

Smashwords –

B&N –

iBooks -

Find out more about this blog tour by clicking on the pic below!

          Facebook the leader of social media: Survey   

Washington: Facebook is the leader of social media, says a new survey, adding that the social networking site has also made inroads into becoming the popular choice among the elderly.

The findings of a survey by a US-based global thinktank Pew Research Centre that involved 1,597 internet users revealed that 71 percent of US adults were hooked to Facebook in 2014 - up significantly from 63 percent in 2013, Forbes magazine reported.

It also showed that 56 percent of Facebook users are in the age bracket of 65 years and older.

The social media websites LinkedIn and Pinterest had 28 percent adult users.

For micro-blogging site Twitter, the percentage of users logging in daily decreased from 46 percent in 2013 to 36 percent last year.

Fifty-three percent of internet-users, between the ages 18-29, use Instagram, also owned by Facebook.

The survey also found that 45 percent of internet users log in to Facebook several times a day.

Of the respondents, 52 percent use more than one social media website - an increase compared with 42 percent in 2013.

          I’m a networker – Get Me Out of Here! Effective Networking for Career Development, Part 3   

If you hate business networking events because you’re afraid of getting stuck with the resident wallflower, or you’re afraid you ARE the resident wallflower, it’s time to set yourself free. Forget stereotypes of people swapping business cards and talking AT one another. In fact, why not drop the NETWORKING word […]

The post I’m a networker – Get Me Out of Here! Effective Networking for Career Development, Part 3 appeared first on Small Business Can.

          The Planned Career – Effective Networking for Career Development, Part 2   

Whether you want to become more effective in your current role, or are looking for a way into that dream job, it’s useful to have advocates on your behalf. You want other people to talk about you in a positive way when you are not there, i.e. you want them […]

The post The Planned Career – Effective Networking for Career Development, Part 2 appeared first on Small Business Can.

          The Accidental Career Effective Networking for Career Development, Part 1   

Did you know exactly what you wanted to do leaving school or filling out college application forms at seventeen years of age? Even if you did – is that what you still want, and are you currently doing it? Few of us realise our dream career. We end up in […]

The post The Accidental Career Effective Networking for Career Development, Part 1 appeared first on Small Business Can.

          RVE 66: Networking on the Road, Triathlons, and Nomadic Newlyweds   

Today on the podcast, I am interviewing Jim and Heather, who have been traveling around the US for the past 341 days in their 1995 Ford Tioga named Bertha.  They have competed in triathlons and trained other athletes all while … Read More

The post RVE 66: Networking on the Road, Triathlons, and Nomadic Newlyweds appeared first on Heath and Alyssa.

          【原创】五律· 夏日荷花   




五律· 夏日荷花 








【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客


【原创】五律· 夏日荷花 - NRZ - NRZD博客

【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客
【原创】五律· 夏日荷花 - NRZ - NRZD博客




【原创】栀子花开的季节 - NRZ - NRZD博客

【原创】栀子花开的季节 - NRZ - NRZD博客

 【原创】栀子花开的季节 - NRZ - NRZD博客










【原创】五言·五首 - NRZ - NRZD博客
【原创】五言·五首 - NRZ - NRZD博客

一、独 上 清 凉 山


【原创】五言·五首 - NRZ - NRZD博客
【原创】五言·五首 - NRZ - NRZD博客

二、观 郊 言


【原创】五言·五首 - NRZ - NRZD博客

【原创】五言·五首 - NRZ - NRZD博客

三、阅 江 楼 上


【原创】五言·五首 - NRZ - NRZD博客

四、小 雨 声 声


【原创】五言·五首 - NRZ - NRZD博客
五、夏  荷




【原创】父亲的影子 - NRZ - NRZD博客

【原创】父亲的影子 - NRZ - NRZD博客









【原创】快板书—我们这一辈 - NRZ - NRZD博客
【原创】快板书—我们这一辈 - NRZ - NRZD博客











【原创】江城子 - NRZ - NRZD博客
【原创】江城子 - NRZ - NRZD博客
【原创】江城子 - NRZ - NRZD博客



词析: 前几天,南京大雨磅礴数日,天晴,热风又起。府小六甲群,得知柴烽身患重病住院长时(癌症晚期),立即前往医院看望,带去同学对他的问候。此时此刻,同学相见热泪盈眶,感慨无比,等他康复出院,共饮一杯、难忘同学情。祝柴烽早日康复!




【原创】五言绝句 - NRZ - NRZD博客
微      信




【原创】五言绝句 - NRZ - NRZD博客
秦    淮   道







【原创】五律·仲夏 - NRZ - NRZD博客

【原创】五律·仲夏 - NRZ - NRZD博客


【原创】五律·仲夏 - NRZ - NRZD博客
【原创】五律·仲夏 - NRZ - NRZD博客






   当今社会,把“管理”二字置之于门外的人大有人在,坐在“管”字位子上的人,不履行职责的人见怪不怪,渎职成形;自己站在“理”字上的人不顺从管理,无所非为,这些现象不足挂齿,比比皆是···可见,“管理”二字在我们的现实生活中显得多么的重要。从地球每一处到家庭每一角落;从政府每一部门到乡村每一站所,“管理”二字无时无刻不在运转着,运转的好,这个地区就风调雨顺,和谐安人,相反,运转的不好,这个地区就停滞不前,民心难稳。如果更进一步理解“管理”二字,那管理就是管住原则,理出思路 。管住原则是基本,这是最为基层管理者的基点,然后在此基础上有自己的理解和思考,会“变造“出新的思路,达到我们自身所具备的要求。



【原创】五言三首·端午情缘 - NRZ - NRZD博客

【原创】五言三首·端午情缘 - NRZ - NRZD博客

【原创】五言三首·端午情缘 - NRZ - NRZD博客

          【原创】江 城 子   

 【原创】江  城  子 - NRZ - NRZD博客



【原创】——写在2017母亲节到来之际 - NRZ - NRZD博客







【原创】鹧鸪天·相聚有所梦 - NRZ - NRZD博客


       难忘同学在校期,那年以后各东西。梦中身影常思见,黑夜风惊笑老啼。      一七夏,藕连丝,七零久别不成悲。此时相聚银堂宴,人定安康叙旧知。


          【原创】七言三首·5 1放歌   

【原创】七言三首·5 1放歌 - NRZ - NRZD博客






【原创】现代诗·我是筑路人 - NRZ - NRZD博客




























风雨雷电 两肩霜花 

跋山涉水 一路叱咤

无怨无悔 浪花淘尽




















【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客


【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客

【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客
【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客
【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客
【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客

【原创】三十一、游记《内蒙古·满洲里》 - NRZ - NRZD博客



【原创】—春末夏意 - NRZ - NRZD博客


已不再柔和 惬意
眼前不再是绿芽枝翘 翠叶缭绕
靓丽 精彩 朝气
赤赤裸裸 刚烈挺拔
肝胆相照 宽广胸膛



          【原创】江 城 子·四处听歌   

【原创】江  城  子·四处听歌 - NRZ - NRZD博客






     进入贵阳那“山中有城,城中有山,绿带环绕,森林围城,城在林中,林在城中”的具有高原特色的现代化都市,颇感神情舒展,新鲜空气扑鼻而来,它是中国首个国家森林城市、循环经济试点城市。以温度适宜、湿度适中、风速有利、紫外线辐射低、空气清洁、水质优良、海拔适宜、夏季低耗能等气候优势,荣登“中国十大避暑旅游城市”榜首,被中国气象学会授予“中国避暑之都”称号,来贵阳一游 无不感慨西南的高原、地貌如此神秘,令人流连忘返。

【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客

溶 洞 

【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客


【原创】三十、游记《贵州》 - NRZ - NRZD博客

【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客
【原创】三十、游记《贵州》 - NRZ - NRZD博客



          【原创】五言四首——谷 雨   

【原创】五言四首——谷 雨 - NRZ - NRZD博客
【原创】五言四首——谷 雨 - NRZ - NRZD博客




          【原创】戚 氏——春末初夏   




【原创】戚 氏——春末夏初 - NRZ - NRZD博客 

【原创】戚 氏——春末夏初 - NRZ - NRZD博客


          【原创】手机纪实图片:古林公园春盎然 国色牡丹花开盘   

手机纪实图片:古林公园春盎然 国色牡丹花开盘




2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客


2017年04月16日 - NRZ - NRZD博客


2017年04月16日 - NRZ - NRZD博客


2017年04月16日 - NRZ - NRZD博客

2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
2017年04月16日 - NRZ - NRZD博客
【原创】手机纪实图片:古林公园春盎然 国色牡丹花开盘 - NRZ - NRZD博客


          【原创】定 风 波   

【原创】定 风 波 - NRZ - NRZD博客



       暴力拖行华裔倾,机舱过道愤难平。曲指一堂人强霸,都怕!岂能又拽又拖生。       料峭白宫春下屏,惊冷,齐心请愿看谁迎。回首美联航瑟处,谁去,叫人哪有健全行。






【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客


【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客

【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客


【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客


【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客

司春女神    仙女探海 

【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客


【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客


【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客
【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客
奇石 松 峰
【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客
【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客

【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客

【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客

【原创】二十九、游记《江西—三清山》 - NRZ - NRZD博客



 【原创】绮罗香——咏春雨 - NRZ - NRZD博客

【原创】绮罗香——咏春雨 - NRZ - NRZD博客 
 【原创】绮罗香——咏春雨 - NRZ - NRZD博客


      秦淮河里灯夕,春色涟漪看急 ,游船停渡。隐约山峰,泪洒紫金眉妩。望江岸、光彩朝时,花落红、绮凄流处。寄牡丹飘逸桃花,别离深絮语。

          【原创】七言·清 明   


【原创】七言·清 明 - NRZ - NRZD博客




【原创】七言·清 明 - NRZ - NRZD博客




【原创】七言·清 明 - NRZ - NRZD博客












【原创】二十七、游记《西藏》 - NRZ - NRZD博客


【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客
【原创】二十七、游记《西藏》 - NRZ - NRZD博客




   青海为位于中国西部,雄踞世界屋脊青藏高原的东北部 。是中国青藏高原上的重要省份之一,简称青,省会为西宁。据全国第二次土地调查公报显示,青海省东西长约1200公里,南北宽800公里,面积为72.10万平方公里 。青海有着“世界屋脊”的美称。青海东部素有“天河锁钥”、“海藏咽喉”、“金城屏障”、“西域之冲”和“玉塞咽喉”等称谓,是长江、黄河、澜沧江的发源地,被誉为“三江源”、“江河源头”、“中华水塔”。青海省地处青藏高原东北部,青海的地形大势是盆地、高山和河谷相间分布的高原。它是“世界屋脊”青藏高原的一部分。


【原创】二十六、游记《青海》 - NRZ - NRZD博客

【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客

【原创】二十六、游记《青海》 - NRZ - NRZD博客


【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客


【原创】二十六、游记《青海》 - NRZ - NRZD博客

【原创】二十六、游记《青海》 - NRZ - NRZD博客


【原创】二十六、游记《青海》 - NRZ - NRZD博客

【原创】二十六、游记《青海》 - NRZ - NRZD博客


【原创】二十六、游记《青海》 - NRZ - NRZD博客
【原创】二十六、游记《青海》 - NRZ - NRZD博客


          【原创】踏 沙 行   

【原创】踏  沙  行 - NRZ - NRZD博客





【原创】七言·三首《有约》 - NRZ - NRZD博客

【原创】七言·三首《有约》 - NRZ - NRZD博客


【原创】七言·三首《有约》 - NRZ - NRZD博客





      长白山大峡谷位于白山市扶松县境内,是近几年刚发现的自然奇观,堪与美国大峡谷相媲美。大峡谷长70多公里,乃火山爆发后熔岩石表面的火山灰和泥土被江水及雨水冲刷所致。北锦江从谷底流下,两岸怪石林立,奇景叠生,栩栩如生,美不胜收。 美人松 美人松学名长白松,因形若美女而得名,是长白山独有的美丽的自然景观。生长于长白山二道白河镇附近,是长白山特有的树种。属长绿乔木,高25-30米,直径25-40厘米。树冠椭圆形或扁卵状三角形或伞形等。树干下部树皮棕褐色,深龟裂,裂片呈不规则长方形,上部棕黄色至红黄色,薄片状剥离,微反曲。 



【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客


【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客


【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客


【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客


【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客
【原创】二十五、游记《吉林·长白山》 - NRZ - NRZD博客





【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客



     红石峡游览所需要的大致时间:一个半小时左右,全长1500米, 峡谷极品红石峡,集秀、幽、雄、险于一身,容泉、瀑、溪、潭于一谷,素来享有“盆景峡谷”的美誉。峡谷深68米,外旷内幽,奇景深藏,两岸峭壁山石秀丽,仿佛鬼斧神工雕凿而成的一个巨大盆景,又似名山大川的浓缩,园林专家称之为“自然山水精品廊”。



【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客


【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客

【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客

【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客
【原创】二十四、游记《河南云台山》 - NRZ - NRZD博客



【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客


【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客

【原创】七言·四首《花中行》 - NRZ - NRZD博客


【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客

【原创】七言·四首《花中行》 - NRZ - NRZD博客

【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客
【原创】七言·四首《花中行》 - NRZ - NRZD博客





【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客

【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客


【原创】二十三、游记《黑龙江·大庆》 - NRZ - NRZD博客









【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客

【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客
【原创】二十二、游记《宁夏,中卫,沙坡头》 - NRZ - NRZD博客


          【原创】 踏 莎 行   


【原创】  踏   莎   行 - NRZ - NRZD博客
  踏   莎   行








【原创】五言·五首今日惊蛰 - NRZ - NRZD博客
【原创】五言·五首今日惊蛰 - NRZ - NRZD博客







【原创】风入松——秋分 - NRZ - NRZD博客







 【原创】七言·玉兰花开 - NRZ - NRZD博客













【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客

【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客

【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客

【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客
【原创】玄武湖东岸景色·手机随拍 - NRZ - NRZD博客

          Halloween 2013 Build using a Raspberry Pi   


This year for Halloween I wanted to start to scratch the surface of what I could do with a Raspberry Pi in order to bring a “haunted” experience to my front yard. My guidance/inspiration was from here.

Overall, I wanted to have a single motion sensor trigger a sequence of scenes where each scene would incorporate one or more lights, one or more audio tracks and be limited to about 30 seconds or less.

Parts List

I broke the parts list up into two groups, the first is the items you probably would need to buy online, the second you should be able to get most of them from your local Home Depot, Lowes or other hardware store.

Online parts list:

  1. 1 x Raspberry Pi, Model b

Raspberry Pi Model B 512MB RAM

  1. 1 x USB Powered Speakers (externally powered)

USB Powered Speakers

  1. 1 x PIR Motion Sensor

PIR (motion) sensor

  1. 1 x Breakout board/Extension wires, Male->Female, 4 to 6 inches in length

Premium Female/Male 'Extension' Jumper Wires - 40 x 12

  1. 5v 1 x 1Amp USB Port power supply with an A/Micro B cable

5V 1A (1000mA) USB port power supply - UL ListedUSB cable - A/MicroB

  1. 1 x 4GB SDHC MicroSD Memory Card

4GB SD card for Raspberry Pi preinstalled with Raspbian Wheezy

  1. 1 x Low-Profile microSD card adapter for Raspberry Pi

Low-profile microSD card adapter for Raspberry Pi

  1. 6 x Solid State Relays, 3v to 110v+
    1. Essentially you apply 3 volts to one pair of terminals, which will turn on the 100v pair.

SSR-10DA Solid State Relay - White + Silver

Optional online parts:

  1. You may need a HDMI (Male) to VGA Adapter if you do not have an HDMI compatible TV or Monitor.  To initially install the Pi OS, you will need a way to output the video.
  2. You may also need some sort of USB keyboard, wired or wireless, most just work.  If you don’t have one one hand, you should consider getting one of the smaller form factor wireless keyboards which you can reuse and is portable along with your Pi’s.
  3. Finally you also need a way to give this device access to your network.  If you have a router with a spare LAN port you can use it, just be sure you have a Cat5e networking cable (male on both ends) available for the project.  Otherwise a hub will be just as suitable.  As an alternative you can find many mini WiFi USB dongles that are compatible for the Pi. I chose to NOT use the WiFi dongle because it is an additional cost.  I will not cover of WiFi configuration in this post, there are many online articles outlining the process.

You can buy most of these from,, or any other favorite retailer. 


Hardware store parts list:

  1. 4 x (double) receptacle wall sockets [NEMA 5-15 (15A/125V earthed) Type B] Commercial Duplex Receptacle 15 Amp 125v, Gray
  2. 3 x electrical boxes
    1. 1 x single width
    2. 1 x double width
    3. 1 x triple width

  1. 1 x double electrical face plate, “blank” or cover
  2. 1 x single receptacle wall socket face plate
  3. 1 x triple receptacle wall socket face plate


1 Gang Duplex Receptacle Plate, White - 10 Pack 3-Gang Midway Nylon Blank Wallplate, in White


  1. 20 x twist-on wire connectors

Can-Twist One size fits all Wire Connector  300/tub

  1. 1 x 50 feet of electrical cable, of appropriate gauge for your country
  2. 1 x Bag of electrical cable staples, probably need 50 to 60GB GB 1/2 In Plastic Staple, White (15-Pack)
  3. 1 x bag of wood screws, 3” long, at least 24 screws
  4. 1 x bag of wood screws, 2” long, at least 12 screws
  5. 1 x Plywood, 2 feet squared, about 1” thick  (bottom base)
  6. 2 x 2x4, 2 feet in length (sides of base)
  7. 1 x 1x2 2 feet in length (front)
  8. 1 x Plywood, 1.5 feet squared, (back / relay anchor)

Box Construction:

Take the base plywood (2x2x2) and secure the 2x4’s to each opposite side.  Add the 1x2 to one end, and finally the 1.5 foot squared plywood to the back. 

This will form an awkward sided box without a lid.  This is by design.  It will provide enough room for you to secure the two larger electrical box’s to the front left and right, and the smaller box on the left side, in the middle.  Finally each relay can be secured to the back / relay anchor piece.

Since a picture is worth a thousand words, here are a few to help out.


Notice the smaller receptacle box on the left.  It is “Always On”, meaning we hardwire power directly to both of those receptacles.  The larger box on the right, with the three pairs of receptacles, those are run through the relay switches.  Finally, the box on the front left is where we take the main line from the house, and split it into 7 (Always on, and the 6 via the relays).

Note: If I were to do this box again, I would probably use a terminal strip, instead of the lower left box to split the house main into the 7. 

Here is a photo of the same box, with the relay switches installed:


Next secure your relay switch’s to the back, like you see in the above picture.  Do your best to make them level, straight and in the middle of the box. 

Take your 50 feet of electrical wire and run a single line to the Always On box, and then 6 to the back, up and over, and then down and forward to the 6 receptacles on the front right.  You will need to split the “HOT” of each of these lines up on the back and wire each HOT into the relay switch.  Take care to find out online which exact color is “HOT” / “Phase” / “Live” for your house electrical wiring.  For example, in Canada, black is set to be “Live” or “HOT”.  Split it, to the set of terminals on the relay switch.  Notice I also use secure each split with an appropriate and twist caps.

Use the electrical staples to secure each line down to the box as best as you can, and clean up the box until you are happy with it.



Raspberry Pi Construction

You will need to first download the NOOBs installation media, and follow the instructions here to perform the installation of the “Rasbian” operation system.  It is essentially Linux slimmed down for the Pi.  Be sure to use the MicroSD card you ordered for the project earlier.

Now unbox the RaspberryPi, MicroSD Adapter, and USB Power.  Plug your MicroSD card into the adapter, and that into your Pi.  I personally use the HDMI output to my living room television, and you will need some sort of video to perform the initial install on the Pi itself; ensure that this is plugged in as well.  Make sure you also plug in your keyboard and your networking cable from a switch or router.

Finally apply power to the device with your USB Power adapter.

If it is not that obvious of what is what on the Pi, here is useful image outlining the position of each component.

NOTE: The Raspberry Pi does not have any sort of onboard protection for hot-swapping anything from USB, HDMI, or other GPIO Ports.  Make sure you shut the device down appropriately before trying to plug anything in or out of it. Failing to do so may result in frying the little guy!

Follow the instructions to finish the installation of the “Rasbian” operating system, and eventually you should end up at a login prompt.  Take note of the IP Address, it should be near the login prompt.  Login with the default user name and password (pi / raspberry) for the Rasbian operating system.    If you missed the IP Address on the login screen, use the command “ifconfig” in the terminal, its output will contain the device’s IP address.

Right now you should be able to login to the Pi, via SSH.  If you are on Windows, putty is a suitable tool which you can SSH into the machine.  Use the IP address to connect via putty to SSH on your Pi.

Raspberry Pi & Python

Rasbian comes with python already installed, test it out by typing: 


At the command prompt, which then you should end up in the python “RELP” (Read, Eval, Print, Loop),  try this command:

>> import this

You should see “The Zen of Python”, some guidelines for writing python code.

   1:  >>> import this
   2:  The Zen of Python, by Tim Peters
   4:  Beautiful is better than ugly.
   5:  Explicit is better than implicit.
   6:  Simple is better than complex.
   7:  Complex is better than complicated.
   8:  Flat is better than nested.
   9:  Sparse is better than dense.
  10:  Readability counts.
  11:  Special cases aren't special enough to break the rules.
  12:  Although practicality beats purity.
  13:  Errors should never pass silently.
  14:  Unless explicitly silenced.
  15:  In the face of ambiguity, refuse the temptation to guess.
  16:  There should be one-- and preferably only one --obvious way to do it.
  17:  Although that way may not be obvious at first unless you're Dutch.
  18:  Now is better than never.
  19:  Although never is often better than *right* now.
  20:  If the implementation is hard to explain, it's a bad idea.
  21:  If the implementation is easy to explain, it may be a good idea.
  22:  Namespaces are one honking great idea -- let's do more of those!
  23:  >>>

In order to exit the python REPL, you need to hit Control-Z.


Creating your first python script

  1. 1. At the SSH prompt, type:
    1. touch
    2. chmod +x
    3. nano

“touch” will create a new, empty file in the current folder.

“chmod +x” will set the “execute” flag on, this allows us to execute it directly.

“nano” is a simple text editor available on the Pi, you should be in the editing window, “”, which is now empty.  Type in the following code:

   1:  #!/usr/bin/env python
   2:  print("Hello, world")

Save the document by hitting Control-O, then hit enter.  To exit, hit Control-X.  This should dump you back out to the command prompt.  In order to execute our script we type:


This should simply print out “Hello, world”, and then exit you back to the prompt.


Also installed by default is the ability to use the GPIO (General Purpose Input/Output) ports in python.  We will use the GPIO ports to apply 3v’s to our Solid State Relays. 

You will notice that on the PI, there are two rows of Pins sticking out, these are the GPIO pins, here is a diagram which explains each Pin:



Take note of all of the Green GPIO pins.  They are what we will be connecting to our Relay Switch’s.  We will cover more about these GPIO pins and Python in a section further down.


Raspberry Pi and the Box

Wiring the Pi up to the Box, more specifically the Solid State Relays, is done by first taking a single ground wire from each Solid Sate Relay’s negative/ground terminal (-) to each other in a chain, like the following image.


You can take the Breadboard wires and use them, strip of the plastic tips and about 1/2 inch of the wire sheath to expose the bare metal wire inside.  I actually take a single wire from the first to the second, and another from the second to the third and so on, after the final relay you take a final wire out to the Ground pin on the Pi.  On this final wire, leave the Female tip which will make it easy to plugin into the Pi.  That solves the common ground for each Solid State Relay.

In order to finish this you will need to take a single breadboard wire (female end) from a GPIO port on the PI to the Solid State Relay (male end), positive terminal.  Repeat this for each GPIO to Relay terminal.  It does not really matter which GPIO port is used, just write each down and their relationship to the final receptacle box of 6.

In the end you will see the following:


Now that you have the Pi online, connected to the Box via the Relay Switch's, and the switch's controlling power to our bank of 6 receptacles, we are ready to start writing more python scripts to control the lights!


Sample Scripts

The best way to get started programming for the Raspberry PI and its GPIO pins is to read over the RPi.GPIO module basics. Please review that prior to continuing.

Below is a set of scripts which should be enough to get you started with working with python and GPIO ports.  I did my best to document the code where it was appropriate.  If you need more assistance with python there are a plethora of online tutorials which you can learn from.

   1:  #!/usr/bin/env python
   2:  import time 
   3:  import RPi.GPIO as io 
   5:  #
   6:  io.setmode(io.BCM)
   7:  io.setwarnings(False)
   9:  light_one = 24
  11:  io.setup(light_one, io.OUT)
  14:  def light(light_pin, state):
  15:      print("light control:" + str(light_pin) + " " + str(state))
  16:      io.output(light_pin, state)
  18:  print("Turning light on")
  19:  light(light_one, True)
  20:  time.sleep(1)
  21:  print("Turning light off")
  22:  light(light_one, True)
  23:  print("All done")

   1:  #!/usr/bin/env python
   2:  import time 
   3:  import RPi.GPIO as io 
   5:  #
   6:  io.setmode(io.BCM)
   7:  io.setwarnings(False)
   9:  light_one = 24
  10:  light_two = 23
  12:  io.setup(light_one, io.OUT)
  13:  io.setup(light_two, io.OUT)
  16:  def light(light_pin, state):
  17:      print("light control:" + str(light_pin) + " " + str(state))
  18:      io.output(light_pin, state)
  20:  print("Turning lights on")
  21:  light(light_one, True)
  22:  light(light_two, True)
  23:  time.sleep(1)
  24:  print("Turning lights off")
  25:  light(light_one, True)
  26:  light(light_two, True)
  27:  print("All done")

That should be enough to get you started with controlling your receptacles.  Next we dive into some sample code for playing sound.  Plug in your speakers to the audio jack.  I found some sample sound bytes online, and used Audacity to convert them to 2 Channel MP3s if they were not already in that format.

   1:  #!/usr/bin/env python
   2:  import pygame 
   3:  import os
   4:  import time
   6:  pygame.mixer.init()
   7:  pygame.init()
  10:  def playTrack(track):
  11:      print("playing track:" + track)
  14:      while
  15:          time.sleep(0.5)
  18:  print "ready to rock"
  20:  while True:
  21:      for files in os.listdir("."):
  22:          if files.endswith(".mp3"):
  23:              print files
  24:      sound = raw_input("Song? ")
  25:      playTrack(sound)
  26:      time.sleep(1)

Our last sample script demonstrates using the PIR motion sensor with the Pi, in this example I’m using GPIO port 25.  Notice that it is setting the io port to io.IN instead of io.OUT like our switch’s above.

   1:  #!/usr/bin/env python
   2:  import time 
   3:  import RPi.GPIO as io 
   5:  io.setmode(io.BCM)
   6:  io.setwarnings(False)
   8:  pir_pin = 25
   9:  io.setup(pir_pin, io.IN)
  11:  def onMovement():
  12:      print("movement!")
  14:  print "ready to rock"
  15:  while True:
  16:      if io.input(pir_pin):
  17:          onMovement()
  18:      time.sleep(300)


In this script we setup an infinite loop with the “While True”.  This allows for our script to sit and wait for motion.  Once the PIR detection motion we immediately call the “onMovement” function.

Remember for each script file you create to run the “chmod +x” on the pi.  This will allow you to test it by just running the script name itself at the command line:

[$] >


Putting it all together

Here is my final script for executing scenes based on motion.

   1:  #!/usr/bin/env python
   2:  import time 
   3:  import RPi.GPIO as io 
   4:  import pygame 
   5:  import subprocess 
   6:  import time 
   8:  io.setmode(io.BCM)
   9:  io.setwarnings(False)
  11:  pygame.mixer.init()
  12:  pygame.init()
  14:  pir_pin = 25
  15:  light_4 = 4
  16:  light_17 = 17
  17:  light_18 = 18
  18:  light_23 = 23
  19:  light_22 = 22
  20:  light_24 = 24
  22:  playing = False
  23:  io.setup(pir_pin, io.IN)
  24:  io.setup(light_4, io.OUT)
  25:  io.setup(light_17, io.OUT)
  26:  io.setup(light_18, io.OUT)
  27:  io.setup(light_23, io.OUT)
  28:  io.setup(light_22, io.OUT)
  29:  io.setup(light_24, io.OUT)
  31:  def allOff():
  32:      light(light_4, False)
  33:      light(light_17, False)
  34:      light(light_18, True)
  35:      light(light_22, False)
  36:      light(light_23, False)
  37:      light(light_24, True)
  39:  def scene1():
  40:      print "scene 1, scream"
  41:      light(light_22, True)
  42:      playTrack("scream.mp3")
  43:      light(light_22, False)
  45:  def scene2():
  46:      print "scene 2, baby"
  47:      light(light_17, True)
  48:      playTrack("rosie.mp3")
  49:      light(light_17, False)
  50:      time.sleep(2)
  52:  def scene3():
  53:      print "scene 3, torture"
  54:      light(light_4, True)
  55:      playTrack("torture.mp3")
  56:      light(light_4, False)
  58:  def endScene():    
  59:      light(light_24, True)
  60:      light(light_23, True)
  61:      playTrack("laugh.mp3")
  62:      time.sleep(2)
  65:  def onMovement():
  66:      print("movement!")
  67:      light(light_18, False)
  68:      scene1()
  69:      scene2()
  70:      scene3()
  71:      endScene()
  72:      allOff()
  75:  def light(light_pin, state):
  76:      print("light control:" + str(light_pin) + " " + str(state))
  77:      io.output(light_pin, state)
  79:  def playTrack(track):
  80:      print("playing track:" + track)
  83:      while
  84:          time.sleep(0.5)
  87:  allOff()
  89:  print "ready to rock"
  90:  while True:
  91:      if not(playing):
  92:          if io.input(pir_pin):
  93:              print "starting"
  94:              playing = True
  95:              onMovement()
  96:              playing = False
  97:              print "ended"
  98:      time.sleep(300)


A video of the build in action:

          Social networking / edited by Kenneth Partridge.   
          Guarding against hacker attacks   
The recent hacker attacks against The New York Times and Twitter are a reminder that the Internet has become a battleground for global conflict with businesses and consumers as collateral damage. It doesn’t matter whether the “Syrian Electronic Army,” which took credit for the attacks, has anything against those organizations. If its goal is to have maximum impact and get lots of attention, than going after a major media company or a highly popular social networking platform is certainly an effective tactic. No one died in these attacks and, for the most part, there is little risk of loss of life from hack attacks as long as they’re are aimed at websites or social networks. But the millions of people who depend on those services for news, information or, in some cases, their livelihoods were impacted. And it brings up worries about possible cyberattacks on our physical infrastructure, such as power or water treatment plants, hospitals, transportation systems and emergency services as well as possible disruption of banking and financial services. Security researchers have even demonstrated how it’s possible for attackers to break into home security systems or — worse — attack implanted medical devices such as pacemakers and insulin pumps, so [...]
          Kaspersky Anti-Virus / Internet Security / Total Security 2017 v17.0.0.611.0.184.0 Patch Free Download   
Kaspersky Anti-Virus / Internet Security / Total Security 2017 v17.0.0.611.0.184.0 + Patch

Kaspersky® delivers premium protection from viruses, Trojans, spam, hackers, and more. Its cutting-edge, hybrid approach to digital security combines innovative, cloud-based technologies with advanced antivirus protection to deliver a faster, more effective response to today’s complex, ever-evolving threats. You, your private data and PC are completely protected as you work, bank, shop and play online.

Protects your privacy, your money & your kids from Internet risks
- Protects your PC against today’s Internet threats
- Adds extra security for online banking & shopping
- Safeguards your privacy and personal information
- Helps protect your children against online threats
- Combines superior security & optimized performance

Unique Safe Money Technology
Provides additional layers of protection during financial transactions, such as online banking and shopping, and using payment systems.

Innovative Hybrid Protection
Combines innovative, cloud-based technologies with advanced antivirus protection to ensure you’re always safe from the latest threats.

Identity & Privacy Safeguards
Uses the latest cloud data, anti-phishing technologies and a secure keyboard mode to keep your personal data from being stolen.

Dangerous Website Alerts
Advises you of the safety of search result links, and blocks malicious and phishing websites.

Advanced Parental Controls
Helps you ensure your children are safe and responsible online while they’re surfing the web, gaming and enjoying social networks.

Safe Social Networking
Ensures your Facebook, MySpace and Twitter accounts won’t receive malicious links or software from your friends.

 Download Links Total Security 
Link 1 Link 2      Link 3

 Download Links AntiVirus
Link 1 Link 2      Link 3

 Download Links Internet Security
Link 1 Link 2      Link 3

Kaspersky 2017, Kaspersky 2017 crack, Kaspersky 2017 patch, Kaspersky 2017 keygen, Kaspersky 2017 serial keys, Kaspersky 2017 free full download, Kaspersky 2017 patched, Kaspersky 2017 activated, Kaspersky 2017 pro setup, Kaspersky 2017 full download, Kaspersky 2017 activated, Kaspersky 2017 keys, Kaspersky 2017 serials, Kaspersky 2017  registration keys, Kaspersky 2017 full version setup, Kaspersky 2017 full setup, Kaspersky 2017 activator, Kaspersky 2017 product keys, Kaspersky 2017 preactivated, Kaspersky 2017 activated, Kaspersky 2017 cracked, Kaspersky 2017 patched, Kaspersky 2017 precracked, Kaspersky 2017 pin, Kaspersky 2017 codes, Kaspersky 2017 full, Kaspersky 2017 premium, Kaspersky 2017 pro, Kaspersky 2017 free download, Kaspersky 2017 free, New, Latest, Latest Crack, New Patch, Working Serial Keys, serial key new, applicationname full version with crack, Kaspersky 2017 full version with crack, Kaspersky 2017 full version, Kaspersky 2017 full version crack, Kaspersky 2017 full version patch, Kaspersky 2017 full version serial keys, Kaspersky 2017 preactivated, activator, Kaspersky 2017 activator, 2014, trick, best trick, tweak , latest crack of Kaspersky 2017, patch for Kaspersky 2017, crack for Kaspersky 2017, serial keys for Kaspersky 2017, cracks, new version crack for Kaspersky 2017, keygen for Kaspersky 2017, new keygen, Kaspersky 2017 full version with crack and keygen, Kaspersky 2017 with keygen, Kaspersky 2017 with crack, Kaspersky 2017 with serial keys, registered, registered Kaspersky 2017, Kaspersky 2017 registered, new Kaspersky 2017 registered, latest Kaspersky 2017 registered, reg keys for Kaspersky 2017, Kaspersky 2017 reg keys, Kaspersky 2017 registeration keys, full version free, full free, free full version of Kaspersky 2017, Kaspersky 2017 full version free, Kaspersky 2017 premium, pro, Kaspersky 2017 professional, Kaspersky 2017, Kaspersky 2017 crack, Kaspersky 2017 patch, Kaspersky 2017 keygen, Kaspersky 2017 serial keys, Kaspersky 2017 free full download, Kaspersky 2017 patched, Kaspersky 2017 activated, Kaspersky 2017 pro setup, Kaspersky 2017 full download, Kaspersky 2017 activated, Kaspersky 2017 keys, Kaspersky 2017 serials, Kaspersky 2017  registration keys, Kaspersky 2017 full version setup, Kaspersky 2017 full setup, Kaspersky 2017 activator

          DU Meter 7.15 Build 4757 Patch Free Download   

DU Meter is an Internet usage monitor for your computer. It shows real-time graphs and can create reports and alerts based on your downloads and uploads. DU Meter includes extensive logging facility, flexible events system, and more. DU Meter works with virtually all types of network connections: phone modems, DSL, cable modem, LAN, satellite, and more.

Get a grip on your network traffic:

Have you ever found yourself wondering why some downloads seem to take an eternity to complete, or why your e-mail program seems to be stuck in the middle of e-mail retrieval. Is it really hanging, or maybe its just downloading a large e-mail attachment? DU Meter provides the answer to these and other mysteries, and can also alert you of dangerous or unexpected network activity. Watching your data transfer rates can be very enlightening no matter what you do online, and you will soon be wondering how you managed without DU Meter before.

DU Meter for parents and business managers:

If you have teenage children or if you own or manage a small business, you already know how hard it is to enforce certain rules for network usage, while respecting childs or employees privacy. If you install DU Meter on your childs or employees computer, you can configure it to report back to you via email when monthly or weekly network traffic exceeds a certain threshold. DU Meter will let you know if someone is breaking your rules (For example using peer-to-peer software to share films and music). Since DU Meter 5, the software can even prevent any further Internet connectivity once the alert condition has been met, without any user intervention.

Is your unlimited Internet really unlimited?

Many Internet users believe their unlimited account lets them surf the Internet, send large email attachments and download as many movies and songs as they choose. However it is well documented by the media that many Internet Service Providers, both in the U.S. and elsewhere, do in fact set definite usage limits, even though they may advertise to the contrary. Some will take drastic measures like termination of an account without any advance warning, if these limits are exceeded. DU Meter can create detailed reports of the total network traffic volume on your computer and can alert you if certain limits are surpassed. If you have teenage children or if you own or manage a business, DU Meter can be especially useful for you to you too.

Most important new features in DU Meter 7.0:

- Simultaneous monitoring of Internet and LAN traffic has been added. You can now seamlessly switch from seeing only Internet network traffic to LAN and vice versa with just one mouse click.
- DU Meter now sports per-application traffic monitoring! Ever wondered which application is using up all your network bandwidth? Guess no more: switch to the new per-application traffic monitoring tab in DU Meter and instantly see whats going on.
- Network Connections now shows accumulated per-connection and per-application traffic totals, while discriminating between Internet and LAN network traffic (DU Meter exclusive!).
- Wi-Fi signal monitoring is now available! From now on, a sudden change in network throughput can easily be correlated with Wi-Fi signal quality changes. See if - improving your Wi-Fi reception can in fact improve your Internet experience.
- Much improved DU Meter main window: tabs to easily switch between new traffic monitoring modes, new color scheme for better blend with Windows 8 and Windows 10, new Metro look, snap-to-screen-edges borders, and more.
Accessibility improvements for visually impaired users: DU Meter now fully respects and supports Windows high-contrast mode, and fonts and font sizes can be changed in Options.
- Full Windows 10 and Windows Server 2016 support. We have extensively tested DU Meter with the current pre-release version of Windows 10, resolved numerous issues and made sure it works perfectly. If any updates are required when Windows 10 is finally released, these updates will be free for registered DU Meter 7 users.
- Security (SSL) and Database (SQLite) components in DU Meter have been updated to improve compatibility and security.
- Many, many issues were fixed in DU Meter, both serious and purely cosmetic. DU Meter has been rigorously tested in diverse networking environments to make sure it is fully compatible with all networking equipment imaginable: from dial-up modems to 10 Gigabit network cards.
- Thanks to our users, many issues were fixed in DU Meter translations. All translations have been updated, and two new languages are introduced in this release: Chinese and Hungarian.

DU Meter 7 Release Notes:



1. Unpack and install
2. Make sure all process’s and services are closed (May need to disable AV to get patch to run)
3. Copy patch to installation directory and run as administrator
4. Use any name to register
5. Restart windows
6. Done.

Download:  Link 1  -  Link 2  -  Link 3

DU Meter, DU Meter crack, DU Meter patch, DU Meter keygen, DU Meter serial keys, DU Meter free full download, DU Meter patched, DU Meter activated, DU Meter pro setup, DU Meter full download, DU Meter activated, DU Meter keys, DU Meter serials, DU Meter  registration keys, DU Meter full version setup, DU Meter full setup, DU Meter activator, DU Meter product keys, DU Meter preactivated, DU Meter activated, DU Meter cracked, DU Meter patched, DU Meter precracked, DU Meter pin, DU Meter codes, DU Meter full, DU Meter premium, DU Meter pro, DU Meter free download, DU Meter free, New, Latest, Latest Crack, New Patch, Working Serial Keys, serial key new, applicationname full version with crack, DU Meter full version with crack, DU Meter full version, DU Meter full version crack, DU Meter full version patch, DU Meter full version serial keys, DU Meter preactivated, activator, DU Meter activator, 2014, trick, best trick, tweak , latest crack of DU Meter, patch for DU Meter, crack for DU Meter, serial keys for DU Meter, cracks, new version crack for DU Meter, keygen for DU Meter, new keygen, DU Meter full version with crack and keygen, DU Meter with keygen, DU Meter with crack, DU Meter with serial keys, registered, registered DU Meter, DU Meter registered, new DU Meter registered, latest DU Meter registered, reg keys for DU Meter, DU Meter reg keys, DU Meter registeration keys, full version free, full free, free full version of DU Meter, DU Meter full version free, DU Meter premium, pro, DU Meter professional, DU Meter 7.15, DU Meter 7.15 crack, DU Meter 7.15 patch, DU Meter 7.15 keygen, DU Meter 7.15 serial keys, DU Meter 7.15 free full download, DU Meter 7.15 patched, DU Meter 7.15 activated, DU Meter 7.15 pro setup, DU Meter 7.15 full download, DU Meter 7.15 activated, DU Meter 7.15 keys, DU Meter 7.15 serials, DU Meter 7.15  registration keys, DU Meter 7.15 full version setup, DU Meter 7.15 full setup, DU Meter 7.15 activator

          By: Digital Citizen 2.9 - Global Voices Advocacy   
[…] Global Voices, Fahmi Albaheth warned that these disruptions will only ‘isolate Yemen from the world’, since ‘social networking […]
          By: Digital Citizen – Volume 2.9 | SMEX: Channeling Advocacy   
[…] Global Voices, Fahmi Albaheth warned that these disruptions will only ‘isolate Yemen from the world’, since ‘social networking […]
          My Grawn Up Bride   

My little wife is such a big girl now. She wasn't a couple weeks ago. We have been married two years, almost, with her just out of highschool. There was a bit of flack from her family, most old aunts thinking I must have knocked her up, but that had died down now with no baby and both of us still happy with each other. Besides, we had moved to another town and had little contact with the family. I was almost ten years older and when the ages are 18 and 28, thats quite a spread, not so much in the years themselves, but in life experiences. Grizzled old vereran and virginal young debutante.

A lot of the little town attitudes went with us to the city. Karen was the romantic who very much liked the idea of being 'in love' and while I did too, I found it actually cramped our personal life. To illustrate, Karen didn't like to call it fuck, we made love. Pussy was OK, but not cunt. That sort of thing. Not a big thing, and I could live with it, but it just indicated a rigidity of upbringing that I found a bit stifling. I really did love her, but I had been around a bit and didn't want to be strangled.

Another little point between us was our social life. I had had a raucous young life but now was focused on building my business. I had little time to think about leisure, thinking it was now my sole chore to provide a secure future for my bride. She cared less about that and wanted the partying that I had wanted at the same age. I took her out often enough, but it wasn't with the crowd that I had hung out with in younger years. I couldn't see straight-laced little Karen at one of those parties. Besides, those friends had all been left behind, along with the life. And then I found that the life was everywhere.

We belonged to a tennis club because we both played well enough, and besides it seemed a good networking place for my business. Quite a few more influencial types belonged there and I couldn't see it hurting. Aside from those were a core of real players who also liked to party hard and it was to these that Karen was attracted. Some were no more than her age but most with a lot more experience. No problem, I rather enjoyed the life too, and I could see exposure could only help Karen grow. It was just good fun that hadn't harmed me, right? So it was that we were invited to a party after a tourament one weekend. It was at the home of a thirty-some couple who hung with the young crowd, and these parties were often talked about long after the event. More sly whispers than talk, actually. So I knew that Karen might be a bit over her head, but how else do you learn to swim?

So here we were, laughing, dancing, drinking with these beautiflul people. Karen was having the time of her life, having lots of attention poured her way. Attitudes were easy, a lot of fondling, a stolen kiss or two, close dancing, a few ribald jokes,a good party. Karen at one point indicated with a nod a couple kissing in a corner. More that kissing, really, openly necking, and seeming to be getting more urgent as they went. AS we watched they quietly slipped arounnd a corner and out of sight. It was our hostess, but not with our host but the winner of the day's tournament. When Karen angled me over to peek around the corner where they had ducked, we saw only a hall and some doors.

"Still game for a grown-up party?" I teased. She thought a bit, and nodded.
"Its so fun. I know sometimes this happens because I hear the girls talk about it. But don't worry, I won't do it to you"
"Don't be to sure, munchkin. I happen to know Stan is ogling you and he is your type. I bet if he got his hooks into you he would have you making love within minutes."

Karen's eyebrows shot up in a classic innocent stare. "I wouldn't let anyone else make love to me. You're the only man I've been with and its going to stay that way"
"Well, sweetheart, lets make a deal then. Only with me do you make love. If anyone else scores, they only get fucked..Deal?" I got a poke in the ribs for that, and we went to watch a group trying to limbo. We both noticed the crowd was a biit thinner than it had been, but the ones remaining were having a good time. I nudged Karen to indicate Stan, our host, watching us. Stan was over thirty, but had the Omar Sharif look that has no age, and I knew Karen loved Omar. When he saw he had been caught, he came over and handed Karen a new drink to replace the empty glass she was carrying. In the course of chatting, I remarked about his Omar look and how hot Karen was for Omar. Karen blushed red, but Stan laughed out loud and told her how he had had plastic surgery just to attract young , gorgeous girls like her.

"Do you remember the scene where Omar Sharif seduces the plantation owner's wife?" He asked Karen, holding her hands and gazing into her eyes. She nodded mutely, seeming to be hypnotized by this polished gentleman paying court to her. He circled her waist the way Omar had done, bent her back and planted a kiss on her lips. It was a minute before he released her enough for her to give me a panicy glance, but all she got from me was an approving smile.

"The scene isn't over, my pet", he crooned in his best Omar. He kissed and nibbled her ears, down her neck, and was working close to her cleavage. When Karen looked to me for help, she found me gone. It was maybe a mean thing to do, but I couldn't see any harm coming from it. Besides, I had been making eye contact with another girl who had been watching the performance, and now we had moved into a slow dance so we could watch Karen and Stan without cramping Stan's style. Sue knew Karen, and knew Stan's reputation with girls, so she knew the turmoil Karen was feeling, but she wasn't about to bale her out. Instead, she kissed me so that Karen could see. By this time, Stan had finished the scene as far as he could take it and was dancing with Karen to avoid letting her go. He was holding her close, almost nose to nose, and the flush was less panic and more , well, just flush.. We moved close, and when we were sure we werein her sight, we kissed again, but this time wide open, grinding lips and body together. When we moved on, we could see that the other couple were also kissing, if somewhat more chastely.

"You have a very lovely little wife", Stan said behind me. I was still holding Sue, but Karen had gone. "Karen has gone to the bathroom, and I am left alone. Do you mind when she comes back if I monopolize her a bit? I see you have your hands full."

I promised him I would not mind a bit. As He wandered away, Karen found my elbow. "Are you OK with things? Stan is getting a bit friendly, but so are you. Do you think things are getting out of hand?" I smiled gently and pulled her into a circle with Sue and I. I told her that the party was going the way parties go and welcomed her to the land of grownups.
"The only thing is, pet, that you must not make love to Stan. You can only fuck him, and I promise to only fuck Sue. Making love is for you and me. Are you OK with that?"

Karen nodded, then opened her eyes wide as it sunk in that she had just given her husband permission to fuck Sue. She had also consented to fuck Stan, and as that thought hit her, she gave a quick glance around to find him and was a bit relieved not to see him. "I don't know if I can stop him if he tries. He's very sexy, and I get so hot, "she giggled nervously, "I just had to duck out to the toilet to cool things down a bit and think. Do you know where he is? Maybe he's found another girl to fuck. Are you two really going to fuck? Its really a nice word, when you say it like that." She started when she felt hands sliding under her arms from behind, through her arm holes and capturing her breasts. "My thoughts excactly. Its just not right that a honey like you only fucks one man in her life. The more men you fuck, the happier the world will be, starting with me."

Karen sagged into him, feeling him rouse her nipples while her husband and friend watched. "Wish me luck, darling", she murmured as Stan led her away, around the same corner his wife had gone an hour before. We followed a disret distance behind. We both wanted to witness the union, but not be part of it. This was for Karen alone. Well, OK, Stan too, but for Karen it was a coming out. For Stan it was just a cumming in. We saw them check a couple rooms before ducking into a third and swinging the door closed behind them. Luckily, the door didn't close and swung open enough for us to silently slide in. It was the massive master bedroom and we found a little love seat facing away from the bed we could peek over and watch the festivities. We could have been a cheering section, I don't think the couple would have noticed us. Stan took Karen's hem and slowly pulled her little dress over her head. Finally she had to raise her arms in total surrender to let it slip free, and she was standing stark naked, her arms still in the air, in front of a man she had only met and who she was going to fuck. It was really a very triumphant pose, and I think her mood was just that, triumphant over herself. Stan begged her to hold the pose while he ripped off his own clothes, the dropped to his knees before her to kiss her all over her body, tummy, thighes, up to the breasts again, a flick of tongue into the bush, finally standing to pull her full length against his nakedness and fittling his boner between her legs, feeling the heat of her pussy and she feeling the hardness of his cock. She came then, just standing there rubbing on his cock. I think she was on the verge of cumming since the first kiss.

"I don't think foreplay is the order of the day, my little sexpot.." Stan smacked her bottom. "I think we both need a bit of penetration, and that quickly." He pushed her to the bed and as her knees folded and as she sat, he gathered her legs and hugged them to his body. The bed was so high he only had to bend his knees a bit to bring a very nice cock to pussy.."One thing I do insist on, though." he whispered, " I want you to guide me into you. I want to know you really want my cock in you and are willling to show me the way...ok?'" Two hand appeared between her legs and cradled his cock and did as they were bid. As the head entered we heard a little yelp as another orgasm ripped through her. Our view point was perfect to watch his cock slam into her, and we forgot our own lust as we watched the encounter build .

"OH, god , I love to fuck!! Oh, I want you to cum. .....Can the reader fill the rest? At this point I'm too busy helping Sue straddle me so she could ride my cock, facing me to watch the match on the bed. As Karen and then Stan's voices became even more urgent we found the left over evergy contagious, but we stayed in check until the main event shuddered to a standstill. Then Sue began cumming and I flipped her onto her back to properly pound into her. I got a bit of carpet burn on knees fighting for traction, but what a cum. Sue was a talented girl, and with the conquest of Karen still fresh and knowing she must now be aware of us, well , what can you say beyond, WOW1

When we could move we joined Karen and Stan on the huge bed and noticed other people filtering in as well. Karen was sprawled on a towel that had saved the bed from the cum, her legs still spread in total abandon, her heroic little pussy still pouty as if asking for more. She gave us a languid smile and reached out to pull my lips to hers.
"I kept my promise, darlling, but my god, fucking is almost like making love. Do you want to fuck me now? I'm so totally shameless, but I can't care right now. Hey, you know who I want to fuck? Gerry who won the tennis today. We saw him leaving with Stan's wife. I would love to fuck him right after her."
"Thats easily done," said a voice up at the headboard end. "I've been hoping for a turn. Nat always likes to watch Stan fuck a new girl, so she had me here before you got here even."

Gerry mover over her and would have gone down, but Karen grabbed his head and pulled him up. "Just not ready to do oral with all these puys watching," she whispered, "Just fuck me, I need more cock and you've been turning me on all day. My pussy is ready now, we can do foreplay another time when we're alone." And with that he was in her. It was neat, being right there close and seeing her lips part and this new cock make its way into her, all the way, then slowly withdraw as those same lips clung to it like they didn't want it to go. No fear there, as it plunged in again. The two fucked like that for many minutes, clutched tight, waiting as the feeling grew. Karen came first, then Gerry quickly after. In the afterglow, Karen was heard to whisper,"You know, you havent' even kissed me yet. Have you heard the one about the Ozark lovers? She says, 'kiss me, charlie, kiss me', and he says, 'hell no, you're my sister, I shouldn't even be fucking you.'"

That about wrapped up the evening. Most were pretty spent. I didn't bother describing all the action. didn't even notice most of it. Actually, a lot of people never took part in the orgy that Karen sparked. It seems that its a tradition that Nat fucks the winner, so it was unremarkable when she disappeared with Gerry. Its well known that Stan rarely goes without, so when folks saw him making a play for Karen, they knew he would do okay, and so would she.

Karen was asleep when we got home and I carried her from the car like a little girl. AS I laid her on our bed, I asked tenderly if she would like to make love. She smiled dreamily, and said, "When you let those two fuck me, it was like you were making love to me at the same time. I was loving you when you were fucking sue, too .But now let me sleep and dream big girl dreams."

          Comment on Networking as an Introvert by Industry Profile – Stephanie May | Ag Women's Network   
[…] helped organize and host. She had an especially positive impact on many women with her blog post, “Networking as an Introvert”. Her positive comments and willingness to be open and share her story is a testament to the passion […]
          XDMCP with lightdm :: Networking & Security   

-- Delivered by Feed43 service

          Good Politician != Good Decider   
I've just realized what's wrong with our government: it's run by politicians. Seriously though, hear me out. The qualities that make a good politician aren't the qualities that make an ideal government official.

Here are the traits that make a successful politian:

→ Electability

Because of our media-based election system, you can't get into office unless you have a good on-camera personality, have the gift of gab, and are generally "likable." These are nice qualities for someone to have, and somewhat correlated with leadership, but less so with decision-making ability.

→ Leadership/Charisma

The ability to get others to join in your cause, to spend their efforts on your purpose. I believe people are hard-wired to want to follow leaders - it's part of our tribal ancestry.

→ Networking/Schmoozing/Politicizing

If you're able to rub elbows with the elite, "network", and get into "scratch my back, I'll scratch yours" exchanges with other politicians, you're going to be more effective.

But really, the most important trait we need in a government leader is:

→ Intelligence & decision-making

We need officials who can decide questions like:
  • "Should we go to war?"
  • "Should we impose an embargo against Cuba?"
  • "Should we spend more on military spending?"
by analyzing the facts and making good judgement calls.

Unfortunately, I think the first 3 traits are anti-correlated with good decision-making and analysis. The people who are good at dealing with other people typically aren't the type to study the facts and research a topic.

A new form of government.
If it were up to me, we would separate the "politician" and "decision-maker" roles.

We would have a large body of decision-makers - folks whose only job is to research issues and make informed decisions. These decision-makers would essentially act as a "brain trust" and be isolated from the day-to-day activities a normal politician does. That is, they would be spared from photo-ops, dealing with the media, filibusters, and other wastes of time. You know, so they'd have time to actually read the bills they're voting on.

The politicians would be required to bring decisions to to the decision-makers and accept their decision. But note that the politicians still have the power of picking which decisions to present. So the politicians can still choose the issues to focus on.

For example, if a politician thinks that we need to reduce carbon emissions, she might propose a cap-and-trade system for emissions. The decision-makers might review this proposal and reject it because it wouldn't be effective. The politician then might propose a simple carbon tax bill instead. The decision-makers might approve this proposal, and then the approval could be turned into a bill.

The key is to have a decision-maker group that is highly intelligent and unbiased. You might think "you'll have all the same problems of electing decision-makers as you do for electing politicians." I don't think it would, for a number of reasons:

A decision-maker has a much more "boring" job. They are handed proposals, and they get to evaluate them. They can't choose which proposals they are given, so it would be much more difficult for special-interests to penetrate this group. Also, there should be some sort of impartiality-judgement (like they do for jury selection) when decision-makers are selected.

The group would be large (over 1000 people), so it would be more robust to rogue decision-makers. Also, any one decision-maker would have far less power, so it wouldn't attract the power-hungry politician type.

What do you think?

          I would like to hire a Social Networking Marketer by sleek739   
I have 4 businesses, and I want to set up regular tweets, posts, instagrams, etc etc etc in order to bring it current. (Budget: $30 - $250 CAD, Jobs: SEO, Social Media Marketing, Social Networking)
          Systems Administrator - REMOTE   
FL-Jacksonville, Responsibilities: - Windows, RHEL, Solaris AIX Operational Readiness Check - Comfortable with install and configuration of Backup, Health&Welfare, patching tools. - Basic OS Security, Networking security, Load Balancing knowledge. - Familiarity with OS clustering, VCS, RH HA, Windows - Use of Change and Incident management methodology. - Physical and Virtual Machines - Proactively investigates kno
          Senior Systems Administrator - REMOTE   
FL-Jacksonville, Responsibilities: - Windows 2012, VMWare 6.0 OS commissioning - Utilization of VRA, automated or manual software installations for Backup, Health&Welfare, patching tools. - Basic OS Security, Networking security, Load Balancing knowledge. - Familiarity with OS clustering (Windows Clustering) - Use of Change and Incident management methodology. - Physical and Virtual Machines - Drives issue resolut
          SODEXO- VOEUX 2017   
<br><center><a href=""><img src=""></a><br><EMBED allowScriptAccess="always" allowNetworking="all" src="" quality=high wmode=transparent scale=noscale salign=LT bgcolor="FFFFFF" WIDTH="750" HEIGHT="750" NAME="puz458890" ALIGN="" TYPE="application/x-shockwave-flash" PLUGINSPAGE="" /><BR><a href=""><img src=""><br><b><font face="Verdana"><h5>provided by</h5></font></b></a><br></center><br>
Repas de Noël 2016, revivre ce moment !

          Time to Re-Address Address Bloat   
Have you looked at a colleague’s business cards lately? Once pristine, with a simple name and mailing address, today’s business cards feature a litany of links and social networking connections.  Some of them have forsaken the physical address, replacing it with a list of every social network in existence. Others, who can’t let go of […]
          How Social Networking Wrecked My CES Events   
I am not a newbie – I’ve been at CES for an eternity, as the emcee and creative force behind the Last Gadget Standing and the Mobile Apps Showdown – two events at CES that both rely heavily on the people’s vote to decide on a winner. There was a time when the people’s vote […]
          NY Mets Baseball Game: Networking Event at Citi Field   
Wednesday, July 19th - NY Mets vs St Louis Cardinals at 7:10pm
          I would like to hire a Social Networking Marketer by sleek739   
I have 4 businesses, and I want to set up regular tweets, posts, instagrams, etc etc etc in order to bring it current. (Budget: $30 - $250 CAD, Jobs: SEO, Social Media Marketing, Social Networking)
          Vmoptions Free Social Bookmarking Sites List   
This Vmoptions Social bookmarking sites list is basically a very powerful that can help website increase the traffic on their websites through its SEO linked features.

Site Name
PR Addedc-Class IP
http://thesocialbookmarkingsiteslist.blogspot.com4 12/29/2014
Immigration Law Pros5 12/2/2014
20th Century Designs5 12/2/2014
DLK Kid5 12/1/2014
Growing Produce6 12/1/2014
ESA 20135 11/10/2014
Senneville Lands6 11/06/2014
The Wrong Plan6 11/06/2014
The Pearlman Collection3 09/24/2014
Boccalino3 09/24/2014
Arab Sports3 09/24/2014
Web Net Soft3 09/21/2014
Rural Escapes3 09/20/2014
Bookmarking4 09/20/2014
Forum Plus3 07/26/2014
Return To Nova6 07/11/2014
Finardi Marks3 07/11/2014
SB County4 07/02/2014
Somerset Care4 07/02/2014
Shop Wise4 07/01/2014
Health News5 07/01/2014
Nutrition News4 07/01/2014
Stil Gefuehl3 05/08/2014
Lion Brasil3 05/08/2014
Networking News3 05/08/2014
Work Node3 05/08/2014
Daily Marks3 05/08/2014
Kentucky Lake Marinas3 05/07/2014
Love Wave3 05/06/2014
DWJM Marks5 01/01/2014
Iran Registry3 04/29/2014
Gpone4 03/20/2014
Iesa5 03/19/2014
Midas Care Team3 03/07/2014
Gulf Site3 03/07/2014
17 Cars3 03/07/2014
6G66 Marks3 03/07/2014
Gay 4 Soccer3 03/07/2014
Good Prophets3 03/07/2014
Gulf Domain3 03/06/2014
Heimat Freunde3 03/06/2014
Ixospli3 03/06/2014
Jayrig By3 03/06/2014
Khartoum Guide3 03/06/2014
Maroc Biz3 03/06/2014
Beekeeping3 03/06/2014
Healthy Kids3 03/06/2014
Owens Boro Christian3 03/05/2014
Zap Hybridoma3 03/04/2014
JINJ Bookmarks3 03/04/2014
Android Apps3 03/04/2014
Cabane Duvelan3 03/03/2014
Saint Pierre News3 03/02/2014
Bikini Marks3 03/02/2014
Jordan info3 03/02/2014
Jaz Bomb3 03/02/2014
Cocos Islands News3 03/01/2014
Salbit Huette3 02/17/2014
Punteglias3 02/16/2014
x-drl Marking3 02/16/2014
Loetschen Pass3 02/16/2014
Transd2 02/15/2014
Chaotic Coding3 02/15/2014
The ineptowl3 02/15/2014
Bynu Bookmarking3 02/14/2014
ePinex4 02/12/2014
Send Gift3 02/12/2014
Guter Punkt3 02/10/2014
Desert Dwellers3 02/10/2014
Best OUYA Games3 02/10/2014
3 Peace Parking2 02/09/2014
Directories Sites0 02/03/2014
Social Bookmarking Webs0 02/02/2014
Social Bookmarking Page0 02/02/2014
Investors Watch Blog5 02/02/2014
Bookmark Your Website0 02/02/2014
Bookmarking Views0 02/02/2014
Bookmarking Pages0 02/02/2014
Bookmarking Machine0 02/02/2014
Act Web Sport6 12/26/2013                               

          New Social Bookmarking Sites List 2015
Vmoption social bookmarking sites | Social Networking and Bookmarking List 2015



网站首页 更多文章 精彩图册 加为好友 问题咨询



中国画入门教程:写意花鸟画的入门与提高 - 理睬 - .




















        Photoshop CS 6专业教程全集(入门精通) 








         Flash CS5实例制作视频教程共70集




















       毛泽东传合集  说不尽的毛泽东