Saturday, July 4, 2015

Tips For Launching Your Own Blog Blogging Tips

Posted by Unknown


Blogging has developed from a specialized hobby to a full-time occupation. Many writers live off of their blogs, and anyone with something unique to say can gain an audience and a steady paycheck with the right techniques.

Starting A New Blog
Launching a blog requires some planning. This starts with the name and address of the blog.

It’s important to pick a good domain name, as the URL of a website is one of the most powerful tools that a blogger has at his disposal for repeat traffic. Think of a domain name as a 21st century toll free number: It has to be memorable or it won’t be effective.

blog’s domain name should be descriptive of its subject and preferably a bit unusual. For example, a blog about arrowheads could simply be titled, “Arrowheads And How To Identify Them,” but something like “As The Arrowhead Flies” would be more memorable.
Bloggers should also try to pick a unique subject or to bring a unique perspective to the entries. Writing about hundreds of subjects will rarely lead to a successful blog. Content should be focused and direct. Visitors should know exactly what type of information that they can find on the blog, and using direct and simple approach improves the chances of regular traffic.

Blog Hosting Providers
Most bloggers use a hosting provider like WordPress.com or Blogger. There are several major advantages to these services. They’re inexpensive and may even be free until a blog develops large amounts of regular traffic. Also, the online blogging software provided by these hosting services offers instant, easy organization for a blog of any size.

Many bloggers know only basic HTML and don’t really want to invest a lot of time into things like page design. For these individuals, integration with a hosting provider can keep costs down while streamlining the blogging process. They’re also ideal for first time bloggers because they simplify the process. By using a hosting provider you’ll spend more time writing and less time worrying about page design and web programming languages.

Professional and amateur bloggers will need to consider the price and uptime of various hosting providers before making a selection. The service packages of websites like WordPress.com and Blogger change quite often in both price and offerings. It’s usually a good idea to start out with a package that offers at least 50% more capability for incoming traffic than you plan on using each month. This way, your blog won’t suddenly crash if you write a successful post.

Blogging services can quickly become expensive. They’re worth the money in the long run, as they’ll allow you to keep all of the earnings from ads on your new blog–which is something that free alternatives with “unlimited bandwidth” won’t offer you.

Speaking of money, you’ll have to be on the lookout for ways to make a profit from a blog. Most blogs use ads from Google and Amazon Marketplace. Many bloggers also offer other services and products directly from their sites.

Promoting Your Blog
Blogs need to be promoted in order to flourish. It’s very rare for a blog to receive large amounts of traffic from search engines like Google alone, especially when the blog’s just getting started. A good promotion strategy is absolutely essential, and a strong promotion strategy begins with social media websites.

Promote each blog post from a new blog on websites like Twitter and Facebook. Don’t spam your friends and followers; only post a single link to each blog post, and try to reach out to other bloggers through social websites. Developing a relationship with other writers will allow you to learn about the good habits that lead to regular traffic. You can even ask another writer to post a guest entry on your blog from time to time. This is a good way to build an audience of regular readers.

Always check the comments for each entry and respond to your readers. Cultivate a sense of community by interacting with each commenter and even addressing some of their questions or comments directly in new blog posts. This encourages the return traffic that is important for a new blog.

Finally, blog regularly. Any blog will fail if it doesn’t have regular posts. Posting once a day or more will keep visitors coming back and will quickly lead to better opportunities for money and better traffic. Every blogger should consider consistency to be extremely important–keep a consistent stream of quality entries for the best possible success.
source http://www.computertips.com/
Read More

Tips on Selecting the Best Printer for You

Posted by Unknown


Learn how to choose a printer with the right capabilities for your needs

Printing Tips

Most consumers do their homework when it comes to selecting a new laptop PC, but in many cases, the purchase of a printer is an afterthought. If you are a business professional or student who relies on producing top quality proposals or research papers, your choice of a printer is critical to your success. You should pinpoint the equipment that is capable of handling the type of work you require, is convenient and trouble-free, and incorporates seamlessly into your workspaces.

The Choices
Depending on your expectations, any of a number of printer types may fill your bill. If you need a full-service machine that includes a scanner, fax, copier, and printer, you are in the market for an all-in-one unit. This type of printer is a great workhorse for a busy office in which you produce printed materials, sign documents and scan them for emailing, plus receive and send information by fax.

If you are not set up with a land-line phone however, you may not want a fax machine, selecting instead an all-in-one without a fax component. You will save a few dollars too. Before you scale back further, though, deciding that copying and scanning are features you don’t need, remember that you may have unforeseen occasions when you are glad your printer can perform these functions.

If you need a specific printer dedicated to a single purpose, such as photo printing, you should select your equipment accordingly. You can save on the purchase price of an all-in-one if you already have such a machine and only need a dedicated fax or an extra scanner.

Another consideration when selecting a printer is the price of replacement ink cartridges for inkjet models or toner cartridges for laser printers. Sometimes a low-priced unit is not such a great buy if you must devote big bucks to purchasing refills. Also check whether the printer comes with full-sized cartridges or “starter” cartridges that will require you to purchase refills sooner.

Check the Specs
When you have narrowed down your choices, check the specs on the box for compatibility with your PC’s operating system, especially if you use Windows XP or earlier Windows systems. Printer manufacturers gear their latest products toward the latest Windows version, so currently most of them are designed for Windows 7 and Vista compatibility.

If a wireless printer is a must for your work environment, choose one that will serve all the PCs in your home or small business network via wireless modem. If you plan to use your printer at home while connected to your work PC via a remote desktop application, make sure that the printer you purchase works compatibly with the operating systems on your work and home PCs.

Other Functional Options
You should look for other specs that may be important for your specific printer applications to ensure that the device is going to answer all your needs. One useful way to compare the numerous functions of your top three models is to compare them side by side on an office supply website that sells several kinds.

Some of the printing functions that might make a difference in your use of a printer include automatic duplexing–two-sided printing; enlargement or reduction of an original document; and the resolution–measured in dpi or dots-per-inch–of both black and color documents that the printer can produce and fax.

Media Choices
If you run large print jobs that you cannot always supervise, you should check the paper-tray capacity of the printer as well as the speed with which it processes, expressed in terms of pages per minute. Be sure the printer is tough enough for your usage by checking the number of images per month it is designed to process.

Also, if you plan to print more than just paper and envelopes, check to see if the printer accepts media such as banners, greeting cards, magnet sheets, or iron-on transfer sheets. Can the copier use legal-sized paper as well as letter-sized?

Further Considerations
Don’t overlook some common-sense issues in making your printer selection. If you have limited space and need a machine with specific dimensions, be sure your the machine is sized appropriately. Double check what kind of connection the printer requires–USB, high-speed USB, Ethernet, etc–to prevent nasty surprises when you try to set it up.

If you are still dithering between models, consider the manufacturer’s warranty and the price of the printer. All other factors being equal, choose the unit with the best warranty and the lowest price.
source http://www.computertips.com/
Read More

Computer Buying Tips Should You Buy a Mac or a PC?

Posted by Unknown


Deciding whether to buy a Mac or a PC should be based on two main points: your budget and whether the computer is primarily for business or pleasure. Both types of computers are excellent for specific tasks, although if you are planning to go to work and bring your computer with you, you may need to consider what types of computers your coworkers will have to make it easier to swap files or compare notes. Here a few basic tips on how to choose the right computer for you.

Budget
There’s no debate—Macs are far more expensive than PCs. If money is a big issue for you, you’ll want to buy a PC. However, Macs aren’t overpriced. Unlike PCs, each computer is designed for maximum efficiency in both processing speed and ease of use. While PCs frequently crash and are vulnerable to spyware and viruses, Macs resist most viral attacks and operate at a consistently high standard with virtually no technical issues. If you can afford it, a Mac is an excellent investment which will work for you for years.

Business
While Macs have always been the preferred computer of graphic designers and other creative individuals, for most corporate office work, PCs have long been favored over Macs. For this reason, PCs still dominate in most business settings.

Up until a few years ago, the major software designed for business suites, like the Microsoft Suite, was designed chiefly for PCs. However, the popularity of other Apple products such as the iPod and iPad has started to change the way Macs are perceived in the larger corporate world. Most business software now has versions available for both Macs and PCs. Because of their heftier price tag, Macs still have a long way to go in making a dent in the corporate world, although in terms of functionality they perform just as well as a PC.

Graphically, Macs have richer displays and a Linux based operating system that makes them ideal for manipulating complex information such as layered graphical displays. Photoshop was initially designed for the Mac. If you are buying a computer for use in a professionally creative setting, your coworkers will likely also be using Macs.

Programming
Computer programmers are evenly split on whether Macs or PCs make better programming tools. The truth is, it comes down to a matter of personal preference. Macs developed a comprehensive suite of developer tools with their OS 10 which, if used properly, can help you get to the moon. PCs have always been oriented toward programming; in fact, the DOS/Windows interface was developed mainly as a way to stay competitive with the user friendly Mac interface. However, many programmers have complained that Macs are slower than PCs when it comes down to executing large amounts of freshly programmed code.

Personal Use
If you enjoy playing video games in your spare time, buying a PC is probably the best choice. This is partly because PCs are easier to hook up to auxiliary equipment like television sets or other devices. Although USB ports are evenly distributed between Macs and PC, the higher data transfer portals of a Mac do not always adapt easily to most conventional televisions, making it difficult to quickly relay information between the two devices, whereas the higher data transfer portals of a PC are usually very adaptable to auxiliary devices.

If, on the other hand, you prefer to design or develop creative projects in your personal time, Macs are a much better choice. Because Apple has invested so much time in making the user interface incredibly easy to use, spending time creating music or drawing or editing movies becomes less about the computer and more about the activity; you forget you are using a computer, and can instead focus on the act of creation. PCs have a more rigid approach; it’s hard to forget that you’re on a computer.

Cloud Computing and the Future of Virtualization
Of course, with the tech community excited about the potential of cloud computing, computer memory is going to become less of an issue, with flexibility, mobility, and processing speed becoming increasingly important when making purchasing decisions. Mac’s suite of mobile devices are far better adapted to shifting between different geographical areas while also offering enough functionality to make them viable business tools. However, for now you should buy the computer that best suits your needs, and plan on the inevitable: no matter what you buy now, in a few years it will be completely outdated anyway!
source://www.computertips.com/
Read More

PC Troubleshooting Tips Why is My PC Crashing?

Posted by Unknown


Nothing can put a damper on productivity quite like a computer that crashes on a regular basis. Sometimes, a crash is preceded by the dreaded “blue screen of death” or another warning; other times, a computer simply shuts off without any warning at all. In either case, the end result is a whole lot of frustration, aggravation and lost work. If your computer has been crashing frequently, you’d probably like to put an end to it. Unfortunately, getting to the bottom of things if often easier said than done. The following tips about improving your computer’s performance, though, are excellent places to begin.

Possibility #1: Corrupted System Registry Files
Every Windows-based PC has something called a Windows registry. The registry contains several files that are integral to the performance and operation of your computer. Over time, some of those files can become corrupted, be misplaced or get lost altogether. When that happens, the system registry becomes compromised – and frequent crashes are all-too-common symptoms. The best way to rule this possibility in or out is by running a Windows registry cleaning program. Such programs scan your Windows registry for problems then automatically make repairs. If you run a registry cleaner and the crashes persist, they are probably being caused by a different issue.

Possibility #2: Disorganized Files
Windows operating systems handle file organization in a way that isn’t very intuitive. Basically, they break files up and fit them into gaps in the computer’s memory. As time goes by, these disorganized files can prompt frequent crashes. Luckily, a great optimization solution is built right into Windows-based PCs: the disk defragmentation utility. Although its location on a computer varies, you can generally locate it within the System and Security section inside the Control Panel. By running a defrag once every few months, you may be able to keep those pesky computer crashes at bay.

Possibility #3: Malicious Software
Malicious software can take many different forms. Sometimes, it’s a virus that is accidentally unleashed after opening a strange email; other times, its adware that tags along with other information that is automatically downloaded from a website. Whatever type it is, there’s no question that malicious software can wreak havoc on a computer’s performance. Happily, there are many topnotch programs out there that regularly scan your computer for the presence of such problems – and that help guard against them, too. Buy one, install it and use it regularly; your crash issues may come to an end.

Possibility #4: Too Little Available Memory
When you buy a new computer, it feels like there’s no end to the amount of memory that it has. Of course, this isn’t true at all. As never-ending as the available memory on your PC may initially seem, the fact is that it can be depleted with incredible speed. You can find out for sure by checking the information within “My Computer.” If it appears that your available memory is low, you can use a PC cleanup program to remove unnecessary files; such programs remove things like temporary Internet files and other file debris that can suck away much-needed memory.

Possibility #5: Overheating
If you’ve run through all of the preceding possibilities and continue experiencing frequent crashes, a hardware issue could be to blame. An easy one to rule out is overheating. A computer’s CPU, or central processing unit, includes a fan that is designed to keep it running cool. Sometimes, the fan wears down and doesn’t work as efficiently; other times, it’s just not able to handle the work that your computer has to do. In either case, buying a bigger, better fan isn’t very expensive. If it puts an end to your PC crashing problem, it will have been more than worth it.

Don’t Put Up with Frequent Crashes!
As discussed, frequent computer crashes can be triggered by a wide variety of issues. Luckily, many of these issues are relatively easy to remedy. Work your way through the preceding list; chances are, you’ll be able to pinpoint the problem and put an effective cure to work. Nine times out of ten, a computer simply needs a little bit of routine maintenance to get it back on track again. In the future, keep these points in mind. Any time you buy a new computer, keep up with its basic maintenance right from the get-go. By doing that, you could avoid “blue screen of death” and crashing problems altogether – and that’s something that you’re bound to appreciate!
source ://www.computertips.com/
Read More

How to Protect Your Computer From Viruses

Posted by Unknown

With millions of computer users browsing the web at any given time, there are plenty of targets for malicious coders. While computer experts don’t always know why coders choose to build harmful computer programs, the fact is that it happens all the time. Computer viruses can steal personal information, interfere with normal operations, attract spam and even shut down your computer’s hard drive. Protecting your computer is critical for browsing success.

Start With the Basics
Most computer systems come with security features already in place. For example, the Windows operating system is packaged with Microsoft Windows Security Center. When you first open, boot up and register a new computer, you should make sure that this program is functioning. It will give basic protection against spyware, viruses and malware. In addition, a basic firewall is built into this program, providing additional protection and stops for potentially harmful programs. Upon activation, don’t be surprised if your security system needs immediate updating. Software that protects your computer needs regular and consistent updating to stay useful. Viruses are constantly being generated and the several-month lag between when your computer was made and when you first started using it can mean that the database the security system is loaded with is severely out-of-date.

Upgrade to Meet Your Needs
Many people operate computers for a long time with only basic protection in place. However, heavy computer users or those who have risky browsing habits can sometimes benefit from upgrading their virus, spyware and malware protection, as well as using a fuller-featured firewall; this is especially important if you use a networked computer system. Basic or free virus protection will still scan and update for viruses. Paid programs, however, offer more features, including ease-of-use and convenience features. The most important thing is to verify the publisher and make sure you are getting what is promised. Most well-known virus protection programs, such as AVG and Norton Security, have reviews available to help you make your choice.

Learn About Spyware Risks
Spyware creates risks that many computer users are not aware of. If you are only protecting against viruses, you could be leaving your computer open to damage. Most people are familiar with spyware that initiates and attracts annoying ad programs. Spyware, however, can be much more malicious as well. Your shopping habits can be tracked by spyware. While not exactly harmful, some people consider this a breach of privacy. The worst spyware programs interfere with normal operations and can even track what you type, sending personal information to people who want to steal your identity. Some spyware redirects your browser to different web addresses, increasing your risks of virus infection and fraud.

How Viruses Work
The main difference between spyware and viruses is how they are spread. A virus reproduces itself and attaches to any document that the computer sends, while spyware can be stored as a cookie or tracking code. A virus is most often found traveling with a piece of computer software, such as a document, picture or piece of music. When dealing with email, it is necessary to open an attachment to become infected, indicating that, in most cases, the computer user must somehow invite the malicious software to replicate on their system. Of course, most people have no idea it is there or what is happening. Some of the sneakiest and most harmful viruses actually masquerade as virus protection software, making them extremely hard to detect. Because of this, it’s crucial to be familiar with your particular virus protection program and know what it looks like and what the normal scripts and prompts are during operation. Viruses do some of the same things that spyware does; they just accomplish it differently. An active virus can steal personal information, generate ads or shut down your system, including the very virus protection programs that can fix the issue.

Take Steps For Protection
Like anything, the best way to protect against viruses is to be educated. Become familiar with what malicious software may look like. If you get an email or are asked to download a file that you don’t recognize or looks suspicious, do your homework. Research virus protection, spyware, malware and firewall programs and use them to their fullest capacity. Set the software to update and scan automatically to make sure that the system is constantly monitored. In addition, regularly check on the databases published by various virus protection services; many will provide lists of symptoms and risks, as well as the standard way the file gains access for no cost to the public.
source://www.computertips.com/
Read More

PC Maintenance & Utility Software

Posted by Unknown
Auslogics Disk Defrag– Easy to use, free, and fast. Features optimization, consolidation of free space, automatic defrag and scheduler. Portable version available.

EASEUS Partition Master Home Edition – Excellent free and comprehensive hard disk partition management; Resize, move, create/delete, hide/unhide, format, copy, merge, wipe, convert.

PrivaZer – Excellent free cleaning and privacy tool. Deep cleans many areas. Securely erases all traces for enhanced privacy. Best in its class. Portable version available.

CCleaner – Very popular free privacy and cleaning tool. Removes temporary files, internet traces, and includes basic registry cleaner. Very safe and easy to use.

Diskeeper 2011 – Will keep your hard drive operating like when it was new! Diskeeper runs in the background constantly working to keep your drive defragmented when your computer is idle. Diskeeper also offers scheduled defrags, Master File Table defragmentation, and paging file defragmentation. Diskeeper allows boot time defragmentation, which can defrag the files, MFT, and paging file before Windows even starts. What does this mean? The most thorough defragmentation possible.

Recuva – Recuva is free software which helps recover accidentally deleted files from hard drive, camera card, MP3 Player or flash drive.

Revo Uninstaller – A free uninstaller that goes above and beyond the uninstaller built into Windows. Will search for and delete leftover files and registry items. Includes a couple of handy tools and has a portable version too. *Free edition does not include support for 64-bit applications.

Geek Uninstaller – Terrific free portable uninstaller. Fast scan and removal of leftovers. ‘Force Removal’ mode for broken or stubborn programs. Full support for both 32-bit and 64-bit applications.

HWiNFO – Free portable system information and diagnostics utility. Displays information relating to the system’s hardware. Real time monitoring, including core temps. Available in 32-bit and native 64-bit portable editions.

MooO System Monitor – The most comprehensive free system monitoring tool with more than 70 fields to choose from. Extensive, portable, and highly customizable.

TeamViewer – is remote control software that connects to any PC or server around the world within a few seconds. You can remote control your partner’s PC as if you were sitting right in front of it. This is a great tool to troubleshoot and fix computers without having the computer in front of you!

WinPatrol – A versatile startup manager with a free version. Disable startup processes and prevent software from adding itself without your knowledge/permission.

WinRar – Is my pick for compressing files. WinRar offers better compression rates and faster operation than its competition. WinRar also comes with a lifetime license. WinRar supports more zip formats than WinZip and is full featured without requiring add-ins to function. Great for emailing large files and securely archiving your data. Give it a try.

PeaZip – Free Zip files utility – Open RAR TAR 7Z ZIP ZIPX files, 150+ formats supported
Supported systems: Windows 9x, Windows NT/2K/XP, Windows Vista/7/8/8.1 (32 and 64 bit), ReactOS, Wine

7Zip – You can use 7-Zip on any computer, including a computer in a commercial organization. You don’t need to register or pay for 7-Zip. Supported formats: 7z, XZ, BZIP2, GZIP, TAR, ZIP and WIM.

Bandzip – Easy to use archiver, simple extraction. Supports all popular formats. Supports 30 formats for extraction, including RAR, ISO, and IMG. Portable version available!
source://davescomputertips.com/
Read More

Internet & Email Software

Posted by Unknown
Firefox is truly a great browser. Firefox is more secure by design, allowing you to surf the web without worrying about drive by downloads, spyware, and other nasties. The language of the internet is “html” and pages, such as this one, displayed in your browser are written in html. Firefox adheres to the html standard. This means that web pages display as they should be, not how Microsoft wants them to be. Firefox is also much more customizable than other browsers. There are literally thousands of extensions you can add to Firefox for free. There are extensions to do just about anything you can imagine!

Google Chrome -Very fast browser with a simple uncomplicated interface, now with extensions available too. Rapidly gaining popularity.

KeePass – Store passwords securely with this free program. Works great for websites! Saves a lot of time entering passwords, usernames, and sign-ins.

MailWasher – Excellent email/spam manager. Preview and/or delete emails on the server. Includes white list and blacklist, visual and audio notifications, automatic deletion. Never download unwanted emails to your computer again.

Sandboxie – Free software which creates a virtual environment (sandbox) for safe surfing. When you delete the contents of the sandbox everything, including any malware, is erased. Everybody should have Sandboxie installed!

Thunderbird – A completely free full-featured email program from the authors of Firefox. Very popular and fully customizable with add-ins.

WOT (Web Of Trust) – Excellent free site advisory service integrates with your browser to provide safety ratings for search results and individual sites. A must have!!

Roboform – This program is the next best thing since sliced bread! This program integrates into Internet Explorer, Chrome, and Firefox. It generates very secure passwords at the click of a button. How do I remember these complex passwords? Roboform allows you to save passwords and personal data in an encrypted format. A master password (yes only one password to remember!) allows access. Roboform in IE and Firefox works like a super powered bookmark. You click the site you want to go to and Roboform opens the site, enters your username and password for the site (if required) and – as if by magic – clicks the submit button and logs you in. If you shop online Roboform can enter your personal information and credit card information, which is also stored in a secure encrypted file, in one click. A real time saver with great security thrown in to boot! Free version is limited to 10 logins.
source ://davescomputertips.com/
Read More

Audio & Video Software

Posted by Unknown
Convert your MP3, WAV, OGG, WMA & CDA files with a right click! Includes an integrated CD ripper for easy CD ripping! Professionals will find this tool indispensable. Home hobbyists will find Audio Converter Pro a very handy addition to their arsenal of audio tools. A great little program I use frequently to change formats and bitrates of my digital music. Converts mp3, WAV, OGG, WMA to any other format. You choose the bitrates. It’s the best format converter I’ve used.

iWisoft Free Video Converter – Free and easy to use with a simple polished interface. Excellent range of output profile presets plus plenty of settings to tweak bit rate, frame rate, video size, sample rate, etc.

VLC Media Player – A great free video and audio player. Supports most video formats without needing to download additional codecs. Brilliant range of features. Portable available.

Backup & Recovery Software

Acronis True Image Home – Do you value the data on your computer? Do you value your time? How much time will you spend recovering data and returning your computer to its original state after a hardware failure or software glitch? Acronis True Image is my #1 pick for backup software! True Image consistently creates backups 10-20% smaller than its competitors and doesn’t require Microsoft’s .Net framework to run like Norton. True Image creates backups to internal drives, external drives, network drives, and directly to CD/DVD. If you value your data you need this program! Read my backup strategy here.

Macrium Reflect – Create, save and restore entire disk images for free with Macrium Reflect. Features include; Excellent compression. Mountable images. Save to Network, USB, firewire drives and DVD. Linux based Rescue CD with Network access and full GUI.




Aomei Backupper – Easy to use free image-based backup solution. Full system backups. Scheduling. Cloning. Create bootable media, including disc and USB, for disaster recovery. Highly recommended.

FBackup – A free yet very simple and effective file backup program. Backup important files and folders to local, external (USB) or network drives. Backup to ZIP compressed file or exact copy. Includes scheduler, file filters, verification, password protection and more.

CrashPlan – Free automated backup to multiple locations. Use the Crashplan software to automatically encrypt your files and backup to external media, other computers on your network, or the computers of friends miles away. There is also a paid service available, which allows you to backup to Crashplan’s servers that starts at $1.50 per month if you choose to use it.
source ://davescomputertips.com/
Read More

Trends and Search in Social Media:

Posted by Unknown
You want to know where to go to search for different things regarding social media on the social web and you want to know where you can go to really find trends:
Alltop
This is one of my favorite resources when it comes to researching social media and the social web. It splits up different blogs and different categories to help let you know what’s going on across the Web. It’s easy to navigation and easy to understand.
Google Custom Search
This is an easy way to use Google. But customize it so that you’re only seeing results from blogs or social networks that may have the answer.
Technorati
This is another resource you can use to see what is being said across the social web. It’s easy to use, so you don’t have to sift through Google results. Instead, you can head right over and know that you’re getting the most recent and up-to-date information. Not just an article that happens to have a lot of backlinks.
Google Trends
This is probably the best way to see what is trending in social media on the social web.
source://smallbiztrends.com/
Read More

Forums and Q&A Tools:

Posted by Unknown
Learning more about social media for your business often involves finding forums and having places to ask questions. Ironically, using social media to learn about social media is a great trick:
LinkedIn Groups
LinkedIn groups and communities are often great ways to ask questions and get answers from those in the social media industry. (Or your industry, for that matter.) It’s also great because you can see exactly whom these answers are coming from.
Quora
Another great place to ask questions. I once asked a question about a service called BuzzStream , and I received several well thought out answers. One from the owner of the tool.
WikiAnswers
Here you can ask questions and usually get straightforward answers. You don’t always know if the answers are reliable because anyone can get involved. But it often works very well for basic inquiries that you need an answer to fast.
source://smallbiztrends.com/2
Read More

Tips and Tricks to Research the Social Web

Posted by Unknown
Researching the social phenomenon is all about understanding the resources available. It’s no secret that social media is becoming more and more important for businesses. So as you can imagine, there are many different resources out there to help make your life easier. Unfortunately, there are so many resources available that things can get overwhelming.
It helps to break up some of these resources into sections. Below details different aspects of social web research and some of the most popular ways to make sure you’re taking advantage.
source ://smallbiztrends.com/
Read More

Tips and Tricks For You to Research the Social Web

Posted by Unknown








Without a doubt, research is incredibly important in every industry. You not only want to research a specific topic in your field or a topic that interests you, but you want to research – how to research.
It’s research that powers Google and gives search engines such importance. In the world of online marketing, there is plenty of talk that discusses how to improve social media marketing or tips to complete a certain action regarding social media.
But it’s always good to take a step back and determine where you’re really finding this information.
source ://smallbiztrends.com/
Read More

Friday, July 3, 2015

6 Tools & Tips: Online Social Networking for Scientists

Posted by Unknown


As Joanne Kamens has pointed out, there’s surely no better place for scientists to meet and mingle with other scientists than at a conference. But in this increasingly wired world, more and more of our day-to-day personal interactions are taking place online. And if findings from network science apply to scientists, then building and maintaining an open social network is key when it comes to career success. In this enterprise, more scientists are finding online tools to be instrumental.

As Holly Bik and Miriam Goldstein wrote in their PLoS Biology paper, “In the age of the internet, social media tools offer a powerful way for scientists to boost their professional profile and act as a public voice for science.” In “An Introduction to Social Media For Scientists ,” Bik and Goldstein offer many tips on how to take advantage of mainstream social media from them. The article focuses on some of the popular social media tools available and the potential benefits that can be reaped from using these tools.
Most of you probably know at least a little something about Facebook and Twitter (for more on Twitter see our earlier post “Why Scientists Should Give Twitter a Try”). And those can be useful ways to stay connected with friends, family, and colleagues and, particularly in the case of Twitter, to follow the science news of the day. For professional purposes, LinkedIn is probably the best of the mainstream tools.

But, sometimes those noisy mainstream channels are little more than distractions. No worry, after a slow start, social networking tools aimed specifically at scientists and researchers have begun to take off. According to a Nature survey on online collaboration, more and more scientists are finding these sites useful for maintaining their profile and “professional presence.”

6 Popular Online Networking Tools for Scientists & Academics:
ResearchGate ’s “mission is to connect researchers and make it easy for them to share and access scientific output, knowledge, and expertise.” Based on the Nature survey, they seem to be leading the pack of research-oriented social networks.
Academia.edu calls itself “a platform for academics to share research papers.” Academia.edu may be less popular than ResearchGate, but the company says it has more than 21 million people signed up.
Mendeley combines an online reference manager with tools for online sharing and collaboration.
ResearchID assigns researchers with a unique ID to make it easier to update personal profiles with new publications and to identify potential collaborators.
Epernicus is a Boston-based company open to current and former research scientists. They allow scientists to create their profiles, connect with colleagues, and find people in their network with particular expertise.
Twitter is a great place to engage with other scientists. A number of scientific fields, such as synthetic biology and genome engineering, have robust communities on Twitter - scientists tweeting and retweeting the newest publications, news, practical advice, and more. Just follow scientists in your field or relevant journals to stay up-to-date with minimal effort.
6 Tips for Using Online Scientific Networks to Your Advantage
Choose the right tool. Explore the various social networking options. Consider your personal interests and goals and choose the one or maybe two networking sites that are the best match for you.

Make yourself known. Set up an online profile at your social networking site/s of choice that introduces your background, research interests, publications and expertise in a way that’s approachable for colleagues, journalists and the general public.

Start building your network. Find people to connect with, whether you know them personally or not. Identify people with common interests and follow them or invite them to connect with you virtually. If you find yourself deluged with irrelevant information, don’t hesitate to stop following someone or explore ways to organize or filter your connections.

Make a plan and set limits. Social networking requires engagement, but it’s easy to find yourself wasting time. Set regular times to check your online networks and to connect with others online.

Consider your tone. The nature of online conversations may vary a lot from one network to another or among groups within a network. If you aren’t sure about the tenor of the conversation at first, it’s OK to lurk for while.

Bring your virtual network to life. Online social networks can be good places to identify people who you’d like to meet in person. Look for opportunities to do that at an upcoming conference, workshop, or speaking engagement.

We encourage you to explore. And, if you’ve got something to say about how these tools have been useful to you (or not), please feel free to share in the comments.


References:

Bik HM, Goldstein MC. An introduction to social media for scientists . PLoS Biol. 2013;11(4):e1001535. doi: 10.1371/journal.pbio.1001535. Epub 2013 Apr 23.
Richard Van Noorden. Online collaboration: Scientists and the social network. (2014 August 15). Nature News .
More Scientific Networking Tools:

Social Networking for Scientists: The Wiki - a wiki community that has organized a number of resources related to science communication, including information about scientist-geared networks
figshare - an online digital repository which aids scientists in making their data sets open and publically available; figshare users can also collaborate with other figshare users in Project Spaces .
sourc://blog.addgene.org/
Read More

What is Social Engineering?

Posted by Unknown
Social engineering is the art of manipulating people so they give up confidential information. The types of information these criminals are seeking can vary, but when individuals are targeted the criminals are usually trying to trick you into giving them your passwords or bank information, or access your computer to secretly install malicious software–that will give them access to your passwords and bank information as well as giving them control over your computer.

Criminals use social engineering tactics because it is usually easier to exploit your natural inclination to trust than it is to discover ways to hack your software. For example, it is much easier to fool someone into giving you their password than it is for you to try hacking their password (unless the password is really weak).

Security is all about knowing who and what to trust. Knowing when, and when not to, to take a person at their word; when to trust that the person you are communicating with is indeed the person you think you are communicating with; when to trust that a website is or isn’t legitimate; when to trust that the person on the phone is or isn’t legitimate; when providing your information is or isn’t a good idea.

Ask any security professional and they will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. It doesn’t matter how many locks and deadbolts are on your doors and windows, or if have guard dogs, alarm systems, floodlights, fences with barbed wire, and armed security personnel; if you trust the person at the gate who says he is the pizza delivery guy and you let him in without first checking to see if he is legitimate you are completely exposed to whatever risk he represents.

Common social engineering attacks
Email from a friend. If a criminal manages to hack or socially engineer one person’s email password they have access to that person’s contact list–and because most people use one password everywhere, they probably have access to that person’s social networking contacts as well.

Once the criminal has that email account under their control, they send emails to all the person’s contacts or leave messages on all their friend’s social pages, and possibly on the pages of the person’s friend’s friends.

These messages may use your trust and curiosity:

Contain a link that you just have to check out–and because the link comes from a friend and you’re curious, you’ll trust the link and click–and be infected with malware so the criminal can take over your machine and collect your contacts info and deceive them just like you were deceived.
Contain a download–pictures, music, movie, document, etc., that has malicious software embedded. If you download–which you are likely to do since you think it is from your friend–you become infected. Now, the criminal has access to your machine, email account, social network accounts and contacts, and the attack spreads to everyone you know. And on, and on.
These messages may create a compelling story or pretext:

Urgently ask for your help–your ’friend’ is stuck in country X, has been robbed, beaten, and is in the hospital. They need you to send money so they can get home and they tell you how to send the money to the criminal.
Asks you to donate to their charitable fundraiser, or some other cause – with instructions on how to send the money to the criminal.
Phishing attempts. Typically, a phisher sends an e-mail, IM, comment, or text message that appears to come from a legitimate, popular company, bank, school, or institution.

These messages usually have a scenario or story:

The message may explain there is a problem that requires you to "verify" of information by clicking on the displayed link and providing information in their form. The link location may look very legitimate with all the right logos, and content (in fact, the criminals may have copied the exact format and content of the legitimate site). Because everything looks legitimate, you trust the email and the phony site and provide whatever information the crook is asking for. These types of phishing scams often include a warning of what will happen if you fail to act soon, because criminals know that if they can get you to act before you think, you’re more likely to fall for their phish.
The message may notify you that you’re a ’winner’. Maybe the email claims to be from a lottery, or a dead relative, or the millionth person to click on their site, etc. In order to give you your ’winnings’ you have to provide information about your bank routing so they know how to send it to you, or give your address and phone number so they can send the prize, and you may also be asked to prove who you are often including your Social Security Number. These are the ’greed phishes’ where even if the story pretext is thin, people want what is offered and fall for it by giving away their information, then having their bank account emptied, and identity stolen.
The message may ask for help. Preying on kindness and generosity, these phishes ask for aid or support for whatever disaster, political campaign, or charity is hot at the moment.
Baiting scenarios. These socially engineering schemes know that if you dangle something people want, many people will take the bait. These schemes are often found on Peer-to-Peer sites offering a download of something like a hot new movie, or music. But the schemes are also found on social networking sites, malicious websites you find through search results, and so on.

Or, the scheme may show up as an amazingly great deal on classified sites, auction sites, etc.. To allay your suspicion, you can see the seller has a good rating (all planned and crafted ahead of time).

People who take the bait may be infected with malicious software that can generate any number of new exploits against themselves and their contacts, may lose their money without receiving their purchased item, and, if they were foolish enough to pay with a check, may find their bank account empty.

Response to a question you never had. Criminals may pretend to be responding to your ’request for help’ from a company while also offering more help. They pick companies that millions of people use like a software company or bank. If you don’t use the product or service, you will ignore the email, phone call, or message, but if you do happen to use the service, there is a good chance you will respond because you probably do want help with a problem.

For example, even though you know you didn’t originally ask a question you probably a problem with your computer’s operating system and you seize on this opportunity to get it fixed. For free! The moment you respond you have bought the crook’s story, given them your trust and opened yourself up for exploitation.

The representative, who is actually a criminal, will need to ’authenticate you’, have you log into ’their system’ or, have you log into your computer and either give them remote access to your computer so they can ’fix’ it for you, or tell you the commands so you can fix it yourself with their help–where some of the commands they tell you to enter will open a way for the criminal to get back into your computer later.

Creating distrust. Some social engineering, is all about creating distrust, or starting conflicts; these are often carried out by people you know and who are angry with you, but it is also done by nasty people just trying to wreak havoc, people who want to first create distrust in your mind about others so they can then step in as a hero and gain your trust, or by extortionists who want to manipulate information and then threaten you with disclosure.

This form of social engineering often begins by gaining access to an email account or other communication account on an IM client, social network, chat, forum, etc. They accomplish this either by hacking, social engineering, or simply guessing really weak passwords.

The malicious person may then alter sensitive or private communications (including images and audio) using basic editing techniques and forwards these to other people to create drama, distrust, embarrassment, etc. They may make it look like it was accidentally sent, or appear like they are letting you know what is ’really’ going on.
Alternatively, they may use the altered material to extort money either from the person they hacked, or from the supposed recipient.
There are literally thousands of variations to social engineering attacks. The only limit to the number of ways they can socially engineer users through this kind of exploit is the criminal’s imagination. And you may experience multiple forms of exploits in a single attack. Then the criminal is likely to sell your information to others so they too can run their exploits against you, your friends, your friends’ friends, and so on as criminals leverage people’s misplaced trust.

Don’t become a victim
Slow down. Spammers want you to act first and think later. If the message conveys a sense of urgency, or uses high-pressure sales tactics be skeptical; never let their urgency influence your careful review.
Research the facts. Be suspicious of any unsolicited messages. If the email looks like it is from a company you use, do your own research. Use a search engine to go to the real company’s site, or a phone directory to find their phone number.
Delete any request for financial information or passwords. If you get asked to reply to a message with personal information, it’s a scam.
Reject requests for help or offers of help. Legitimate companies and organizations do not contact you to provide help. If you did not specifically request assistance from the sender, consider any offer to ’help’ restore credit scores, refinance a home, answer your question, etc., a scam. Similarly, if you receive a request for help from a charity or organization that you do not have a relationship with, delete it. To give, seek out reputable charitable organizations on your own to avoid falling for a scam.
Don’t let a link in control of where you land. Stay in control by finding the website yourself using a search engine to be sure you land where you intend to land. Hovering over links in email will show the actual URL at the bottom, but a good fake can still steer you wrong.
Curiosity leads to careless clicking–if you don’t know what the email is about, clicking links is a poor choice. Similarly, never use phone numbers from the email; it is easy for a scammer to pretend you’re talking to a bank teller.

Email hijacking is rampant. Hackers, spammers, and social engineerers taking over control of people’s email accounts (and other communication accounts) has become rampant. Once they control someone’s email account they prey on the trust of all the person’s contacts. Even when the sender appears to be someone you know, if you aren’t expecting an email with a link or attachment check with your friend before opening links or downloading.
Beware of any download. If you don’t know the sender personally AND expect a file from them, downloading anything is a mistake.
Foreign offers are fake. If you receive email from a foreign lottery or sweepstakes, money from an unknown relative, or requests to transfer funds from a foreign country for a share of the money it is guaranteed to be a scam.
Set your spam filters to high. Every email program has spam filters. To find yours, look under your settings options, and set these high–just remember to check your spam folder periodically to see if legitimate email has been accidentally trapped there. You can also search for a step-by-step guide to setting your spam filters by searching on the name of your email provider plus the phrase ’spam filters’.
Secure your computing devices. Install anti-virus software, firewalls, email filters and keep these up-to-date. Set your operating system to automatically update, and if your smartphone doesn’t automatically update, manually update it whenever you receive a notice to do so. Use an anti-phishing tool offered by your web browser or third party to alert you to risks.
source://www.webroot.com/
Read More

Facebook and Social Networking for Artists

Posted by Unknown
As the Internet continues to evolve and play an ever more central role in our
lives, social networking websites, Facebook in particular, are rapidly becoming the single most effective ways to spread the word about your art. As with any communication model though, you have to know how to use it in order to reach the people you want to reach and get to where you want to go. Facebook is no panacea and just because you sign on doesn't automatically mean your art world profile is destined for success. The following list of do's, don'ts, recommendations and suggestions is designed to help you accomplish your art-related goals with maximal benefits to you and with minimum inconvenience or irritation to others...
DO'S:
* Treat other people as you would in real life. Just because you can't see them and they can't see you is no reason to conduct yourself in a manner other than how you would conduct yourself if you were speaking to them in person.
* Update regularly. Very few people will return to a page that's updated once a month or less. If they return at all, guess how often they'll return? About as often as you update... if that.
* Decide why you're on Facebook and focus on that. What do you want people to know about you and your art? How do you intend to get your message across? What are your goals and expectations? The better you understand and maintain focus on your motivations and intentions, the better others will understand them as well.
* Decide how public or private you want to be. If you are on Facebook for public reasons, especially to advance the cause of your art, then make your profile and postings as public as you feel comfortable doing. The more private you make yourself and the less accessible you are, the more difficulty people will have learning about you, trying to communicate with you, getting to know you and most importantly, seeing what you have to offer in terms of art. The more you make private, then more you give the impression that you're not really that interested in communicating all that much with people outside of your circle. Point of information-- if you're willing give them a chance, people you don't know can often go on to become some of your greatest fans.
* For easy cross-posting and cross-referencing, make sure that your name and username are identical on all social networking sites that you use. And the best name to use is the one you sign your art with, the one who people know you by. If you use aliases or pseudonyms that are not general knowledge, you make yourself harder (and sometimes even impossible) to find.
* Be consistent in the content of your postings. Unified posts on similar topics or with similar purposes make it easier for people to understand who you are, what you're like, what your perspective is and where you're coming from.
* Make your posts interesting. Focus on narratives or story lines or themes or plot lines or questions or opinions or whatever aspects of your art life are the most significant or meaningful to you. Update regularly-- at least several times per week-- and make people want to return to your page again and again for every exciting episode. Facebook is kind of like a realtime blog-- and an interactive one at that. The possibilities to actively involve others with your art are limitless.
* Give people a good reason to visit (and revisit) your page. Offer something-- tangible or intangible, it makes no difference-- as long as it's something. For example, talk candidly about your art or your day-to-day life as an artist-- your challenges, triumphs, inspirations, perspectives, and more. Make it more than simply about you. Make it something that others can be part of, learn from, gain insight from, relate to, share related experiences about or participate in, comment on, or respond to.
* If you want people to see or comment on examples of your art, give them a good reason. A good reason has to be more than "look at my art" or "my latest art" or "my art in process." A good reason includes the viewer, at least intimates some benefit for them, and most importantly, gives them opportunities to respond or participate in your thread. Post about your time in the studio, sourcing ideas, the progress of particular works, your process, your goals, the purpose of your art, your broader mission as an artist, and so on.
* No matter what you're posting about, present it in ways that encourage others to share their thoughts, feelings or experiences-- to comment or better yet "share" rather than simply click the "like" button. When people comment on or "share" your posts, those comments appear in their friends' news feeds. In other words, people who don't know you will be exposed to your posts, and if they find them interesting, might check out your page. And if they like what they see, they might "friend" you. This is the Facebook "ripple effect" of expanding your circles of friends and contacts, and people's awareness of your art.
* If you want to contact or "friend" particular gallery owners, dealers or anyone else in the art community who you admire or respect-- to make them aware of your art or your website or to find out whether they can help you in any way or even give you a show-- make sure IN ADVANCE that they're involved with art that's similar to yours, and represent or assist artists whose credentials or career experiences are comparable to yours. Because you're an artist and they're a gallery is NOT enough of a reason to make contact. And if or when you do make contact, give the relationship a chance to develop before making requests. You never want to give the impression that the only reason you're contacting or communicating with someone is to ask for favors.
* Participate in other people's posts or discussion threads, especially if they interest you or you'd like to know the poster better. The best way to show people you care is to comment or respond to their postings. Being generous and taking the time to share your thoughts with others appreciated as much on Facebook as it is anywhere else.
* Get to know people gradually, just like in real life. Friendships evolve over time. Respond to people's posts, "like" their posts, "like" their art, "share" their posts, and maybe-- very occasionally at first-- send them a short supportive or complimentary personal message.
* If you're looking for feedback or input about your art, offer feedback or input on the work of other artists or art people who you respect or appreciate-- assuming their posts invite those kinds of responses.
* Use chat functions sparingly, especially with people you hardly know or don't know at all. If you feel that you must get personal, have a really good reason for starting a conversation, and ask first whether the other person is busy or whether they have a moment to speak with you... before getting into your agenda. Initiating a Facebook chat is no different than walking up to someone at an art opening or anywhere else and starting a conversation.
* Think about who you want to friend and why. If someone you want to friend who doesn't know you, briefly explain why you are friending them. This is especially important if most or all of your personal information is private and the person you're friending doesn't know who you are. Better yet, make as much of your page public as you feel comfortable doing. That way, people who don't know you can get a good sense of who you are and decide whether to contact or engage with you personally.
* Review a potential friend's publicly available information on Facebook AND elsewhere before friending them. That way, you'll be better able to explain yourself in case they ask who you are. Better yet, explain yourself in advance. Nothing complicated is necessary here; a well-worded sentence or two will do just fine.
* If someone requests your friendship, review their available information on Facebook AND elsewhere before friending them. If you're not sure why they are friending you, ask. Make sure that you have at least some form of connection or commonality with everyone who asks to be your friend-- especially with respect to your art. You don't necessarily have to know them, but you do want to feel some sort of connection on some level. The purpose of Facebook is not to pile up friends for no reason other than to have piles of friends. All that does is distract you from your efforts. The purpose of Facebook is to initiate and hopefully establish mutually beneficial relationships.
* Whenever you post images of your art to your page, choose examples with thumbnails that resolve clearly and entice people to want to click over to the full-sized images, PREFERABLY ON YOUR WEBSITE. Images of your art may look great in full size, but if you can't get people to click over to view them in their full glory, then what good are they?
* Whenever you post an image of your art, say something about it. Briefly introduce it. This is essential especially for people who are seeing it for the first time. Provide enough background information or explanatory so that people who like how it looks, but who may not be familiar with you or your art, will have a better understanding of what it represents and who you are as an artist. Descriptions or comments always deepen people's experiences of your art. One to three sentences will do it in most cases.
***
DON'TS:
* If you don't do it in real life, don't do it on Facebook. As impersonal as Facebook might seem sometimes, your actions effect real people with real feelings.
* Whatever you do, DON'T ASK PEOPLE FOR MONEY-- especially people you don't even know!
* Don't post only about yourself. Boring. Bring others into the conversation. There's much much more to life than you, plus the fact that people prefer to visit pages where they can dialogue with others, get informed, share information, learn interesting things, be exposed to different ways of living and thinking, and so on.
* There's no need to call your page "Bill Smith Artist" or "Mary Jones Fine Art" or "Art by John." That's being redundant. What's important is to use your real name, the one you sign your art with, and format your page in a way that makes it instantly obvious to anyone who visits that they're on the page of an artist.
* Don't tag someone in an image unless it's an actual of that person (or a photo they took). That's super irritating, plus now they'll have to waste time untagging it (and maybe unfriending you as well). Tag an image of your art with someone's name if the art is a portrait of them-- and that's it.
* Dont' tag someone in a post or link or comment or thread just because you want them to see the post. For example, do not tag self-promotions, show announcements or images of your art with the names of people who you want to see it. See reasons above for why you shouldn't do this. If you want someone to know about your art or what you're up to, send them a private message instead-- but at all times, make sure you have a really good reason for doing so.
* If most or all of your information is private, don't friend strangers without first introducing yourself or explaining who you are or the nature of your request. If people have no idea who you are and can't find out anything from your page, then what reason do they have to friend you? Better yet, make as much of your information public as possible. If one of your goals of being on Facebook is to expand your fan base, then make it easy for people to get to know who you are.
* Don't spam or send mass emails or messages to groups of people. If you do send an announcement or invitation or request to more than one person, make sure the reason you're sending it has something to do with them. "Look at me" or "Look at my art" are not good reasons. If you're having an event, make an event page and invite friends that way. And NEVER use apps to spam friends on your behalf.
* If you make an event page, do not post or message people repeatedly on it. Posting over and over again is really irritating for all of us who either can't come or have no interest. Even we who are coming are likely to get tired of post after post after post. Those of us who can no longer endure your barrage will be forced to remove your page from our calendars. We know you're having an event; thank you for inviting us. Now that we've been invited, remind us maybe once or twice between now and whenever it's happening. That's more than enough... and best of all, it keeps us on your good side.
* Don't add people to a group you're either starting or already belong to unless you ask their permission first. If they don't want to be in the group, they're forced to go to the group's page and leave.
* Don't ask people you don't know to look at your art, go to your website, comment about your art or give you feedback unless you introduce yourself first, ask their permission, and provide some sort of explanation as to why you are contacting them.
* Don't ask people you don't know for free stuff-- merchandise, favors, advice, services, shows, to contact other people on your behalf, or whatever. Either have a good reason for asking them (one that they can understand and appreciate), cultivate a relationship with them first, ask whether they mind if you make a request, etc.
* Don't use apps to message your friends en masse. This is too impersonal a way to start a conversation-- especially if you're asking for feedback about your art or for other types of personal opinions. If you have a question for someone, ask it more personally-- like in an personal message, or if you know them, in a chat. Or first explain why you're asking your question... and then ask it.
* Don't post video after video of your favorite music, your pets, third-party quizzes, or other non-art related topics unless they directly apply to either you as an artist or to the type of art you make. Are you in this for art or are you in this for music or your kitty? Make up your mind. Plus, supposing someone likes your art, but hates your music or is allergic to dogs? Now you're screwed.
* Don't post on someone else's wall unless that post has something to do with that person, that person's interests, another post on their page, or something you know they or their friends will be interested in seeing. If it's all about you and has nothing to do with them or their friends, either message them personally, or save it for later when you know them better and will understand what you're up to.
* Don't post your response to a discussion thread separately on the wall of the person whose thread it is. Post it in the thread. Posting outside the thread just makes you look like you're more interested in calling attention to yourself than you are in contributing to the thread. Plus, those participating in the thread will not see your post.
* Don't use other people's discussion threads to promote yourself or your art-- unless those threads closely relate in some way to your art, or your comment or promotion relates in a direct and significant way to the post.
* Don't post unflattering photos, unrelated links or photos, or inappropriate links and comments on other people's pages.
* Don't initiate chats with people you don't know-- especially if your only reason is for them to look at your art, come to your show, go to your website, answer questions, or respond to other requests. If you want to chat with someone you don't know, email them first and ask whether it's OK.
* Don't send app or game requests to friends who don't use those or other apps or games. Visit their pages first to see whether they use any now, and assess how likely they might be to accept an invitation to use the ones that you use. If acceptance looks unlikely, don't make the request.
* Don't clog your page with games, apps or other non-art related information. People who might be interested in your art but aren't interested in the other stuff are unlikely to waste time plowing through oceans of irrelevancies. Plus an overload of games, apps or similar diversions makes you look like your diddling your life away rather than focusing on your profession as an artist.
* Don't email people to ask what they think of your art or your website or whatever. Post these requests on your page and ask your questions there. That way, you give everyone the option of responding without pressuring them. Forcing people to look at or respond to your art is uncomfortable for them and counterproductive for you.
* Never mislead or misrepresent your intentions. For example, don't email someone a link to what looks like an article about social justice or the environment when it's really a request for them to look at a piece of your art that may relate to those topics.
* Don't ask "friends" to do things for you unless they're really your friends-- like in real life. Only ask when you can explain the nature of your request in terms they can relate to, understand and appreciate. Better yet, position your requests so that there's also something in it for whomever you're asking.
* If you email someone to ask them for a favor and they email you back to decline, send them an email thanking them for at least considering your request. Simply not responding because you didn't get what you wanted is really rude-- and makes you look even more self-centered than you looked with you emailed them in the first place.
* Don't be a taker. Facebook is not a vehicle for you to try to sponge up as much free information, advice, favors, feedback and other perks for yourself and your art as possible. If you want to get somewhere, give first; ask later. The more you give, the more you get back in return. People are far more likely to respond positively to your requests once you've made yourself available to them in some sort of constructive capacity first.
source ://www.artbusiness.com/
Read More

Mobile Will Be Priority

Posted by Unknown


Social apps are among the most used features of mobile devices. In fact, 65% of social network activity is from mobile devices. This means that mobile devices are becoming the first choice for social media users. Also, more users will be getting smart devices, so there will be even more users consuming their web content from mobile devices than are doing so currently. In order to give them the best experience possible, and as mobile devices become even more popular, social networks are developing their platforms with the idea of “mobile first.”
This means that websites not only have to be responsive, they have to be developed from the ground up with the mobile user in mind. Ads and shopping systems will be tailored to mobile devices. They will be geo-targeted, allowing advertisers to display appropriate ads based on location.
source ://www.elegantthemes.com/blog/
Read More

2015 Social Media Trends Web Designers Need to Know

Posted by Unknown

The social media landscape is always changing. It changes so fast that staying head of the game is a real challenge.
With one quarter of the world’s population using social media, it’s in our best interest as developers and designers to stay ahead of the trends. There are several social media trends to look out for in 2015 that relate to running a website or web design business. This article will take a look at the trends that will make the biggest impact.
source ://www.elegantthemes.com/


Read More

Mobile phone security tips

Posted by Unknown
Smart phones are mobile computers, not just phones. Your smart phone likely has access to your email, DropBox, Facebook, and may contain other sensitive details. Its very important that you protect and secure your phone as you would your home computer. Following are some handy hints that will help make your phone, and the information it contains, safer.

Mobile Phone Tip #1
Every phone has a unique identification number (IMEI). Find out what yours is by dialling *#06# (star, hash, zero, six, hash) then write it down. Knowing this will help your service provider block your phone from being used if it is stolen.

Mobile Phone Tip #2
Turn Bluetooth off when you aren't using it to prevent hackers accessing your information.

Mobile Phone Tip #3
Think before you click. Do not open multimedia messages (MMS) or attachments in emails, or click on links in emails and SMS messages, unless you are expecting them.

Mobile Phone Tip #4
Passwords and PINs make it more difficult for your phone to be used if your phone is lost or stolen. Set a pin on your phone and set it to lock automatically if you haven’t already.

Mobile Phone Tip #5
Turn GPS off when not using it. While GPS can provide great benefits in finding out where you need to go, it can also be used by others to see where you or your phone is located.

Mobile Phone Tip #6
Smart phones, just like computers, can get viruses and malware. Don’t download content or applications from unknown or unreliable sources on your mobile internet browser and consider installing a reputable anti-malware app.

Mobile Phone Tip #7
Smart phone OS updates and App updates sometimes fix security holes that might let someone take over your phone or allow your Internet traffic to be intercepted. Always stay up to date with updates.

Mobile Phone Tip #8
Back up your data regularly. Set up your phone so that it backs up your data when you sync it, back it up to a separate memory card, or back up your data ‘to the cloud’.

Mobile Phone Tip #9
It’s great to recycle your old phone but make sure you delete your personal information first. Reset the phone to factory settings and remember to remove or wipe any inserted memory cards.

Mobile Phone Tip #10
If your smart phone is lost or stolen, using an app or service to track your device can help you to find your phone. A great free app for iPhones and iPads is Find my iPhone .

Mobile Phone Tip #11
Be aware of excess data usage charges and roaming data usage charges. While overseas, accessing the Internet or allowing your email to be checked automatically can be very expensive.

Mobile Phone Tip #12
Apps, ‘Jailbreaking’, ‘Rooting’, and third-party ‘ROMs’ can expose your device to additional threats. Do you understand the changes that you’re making to your device? Do you know where your apps and ROMs are coming from and do you trust the software author? Only accepting Apps and Mobile OS Updates from the manufacturer of your device, and their authorized App stores, is usually safest.

Mobile Phone Tip #13
Always be aware that using your smart phone or laptop at a public or ‘Free WiFi’ access point may allow your Internet traffic to be intercepted. Only connect to WiFi networks that you trust, and only log on to sites that use ‘https’ in the website URL.

More Information:
For more information please visit the Stay Smart Online government website.
source s://www.its.uq.edu.au/
Read More

Mastering the Phone Interview

Posted by Unknown


You just got word that you landed a job interview with a company that really interests you -- only there's a slight catch.

You won't be meeting with your interviewer(s) face to face. Instead, you'll be taking part in a phone interview, the results of which will determine whether you're invited to meet with company representatives in person.

Many companies use phone interviews as an initial employment screening technique for a variety of reasons. Because they're generally brief, phone interviews save companies time. They also serve as a more realistic screening alternative for cases in which companies are considering out-of-town (or out-of-state and foreign) candidates.

So the chances are pretty good that, at some point in your job hunt, you'll be asked to participate in a 20- to 30-minute phone interview with either one person or several people on the other end of the line. In many ways, the way you prepare for a phone interview isn't all that different from the way you'd get ready for a face-to-face interview -- save for a few slight additions to and modifications of your list of preparation tasks.

Here's what to do:

Treat the phone interview seriously, just as you would a face-to-face interview.
Have your resume and cover letter in front of you.
Make a cheat sheet.
Get a high-quality phone.
Shower, groom and dress up (at least a little).
Stand up, or at least sit up straight at a table or desk.
A phone interview seems so informal on the surface that it can be easy to fall into the trap of "phoning it in" -- i.e., not preparing for it as well as you would for an in-person interview. Don't get caught with your guard down. Be sure to research the company, study the job description, and practice your responses to anticipated questions, just as you would for any other interview.

You'll almost certainly be asked about some of the information that appears on these documents. You might also want to have in front of you any supporting materials that relate to information in your resume and cover letter, like documents you've designed or written, a portfolio of your various projects, or the written position description from your key internship.

Jot down a few notes about the most critical points you want to make with your interviewer(s). Are there certain skills and experiences you want to emphasize? Do you have certain interests or passions you want your interviewer(s) to know about and understand? Be sure these pieces of information appear on your crib sheet. Then touch on them during the interview, even if your only chance to do so is at the end of the session when the interviewer asks you if you have any questions or anything to add.

This isn't the time to use a cellphone that cuts in and out, or a cheaply made phone that makes it difficult for you and your interviewer(s) to hear and understand each other.

Odd advice? Perhaps. But focusing on your appearance, just as you would for a normal interview, will put you in the right frame of mind from a psychological standpoint. You won't do as well in your phone interview if you're lying in bed, for example, or if you're draped over your couch in your pajamas.

Again, there's a psychological, frame-of-mind aspect to consider here. But on a more tangible level, research has shown that you project yourself better when you're standing up, and you'll feel more knowledgeable and confident.

Phone interviews can be tricky, especially since you aren't able to read your interviewers' nonverbal cues like facial expressions and body language during the session -- a big difference from the typical interview. But if you prepare well for your phone interview, you won't need to read anyone's nonverbals to gauge your performance. You'll know for sure how you've done because you'll be invited to a face-to-face interview, where you'll have yet another opportunity to prove you're the best person for the job.
source://career-advice.monster.com/
Read More

Phone Interview Tips

Posted by Unknown


Employers use telephone interviews as a way of identifying and recruiting candidates for employment. Phone interviews are often used to screen candidates in order to narrow the pool of applicants who will be invited for in-person interviews. They are also used as a way to minimize the expenses involved in interviewing out-of-town candidates.

While you're actively job searching, it's important to be prepared for a phone interview on a moment's notice.

You never know when a recruiter or a networking contact might call and ask if you have a few minutes to talk.

Be Prepared to Interview

Prepare for a phone interview just as you would for a regular interview. Compile a list of your strengths and weaknesses, as well as a list of answers to typical phone interview questions. In addition, plan on being prepared for a phone conversation about your background and skills.

Keep your resume in clear view, on the top of your desk, or tape it to the wall near the phone, so it's at your fingertips when you need to answer questions.
Have a short list of your accomplishments available to review.
Have a pen and paper handy for note taking.
Turn call-waiting off so your call isn't interrupted.
If the time isn't convenient, ask if you could talk at another time and suggest some alternatives.
Clear the room - evict the kids and the pets. Turn off the stereo and the TV. Close the door.
Unless you're sure your cell phone service is going to be perfect, consider using a landline rather than your cell phone to avoid a dropped call or static on the line.
Practice Interviewing

Talking on the phone isn't as easy as it seems. I've always found it's helpful to practice. Have a friend or family member conduct a mock interview and tape record it so you can see how you sound over the phone. Any cassette recorder will work. You'll be able to hear your "ums" and "uhs" and "okays" and you can practice reducing them from your conversational speech. Also rehearse answers to those typical questions you'll be asked.

During the Phone Interview

Don't smoke, chew gum, eat, or drink.
Do keep a glass of water handy, in case you need to wet your mouth.
Smile. Smiling will project a positive image to the listener and will change the tone of your voice.
Speak slowly and enunciate clearly.
Use the person's title (Mr. or Ms. and their last name.) Only use a first name if they ask you to.
Don't interrupt the interviewer.
Take your time - it's perfectly acceptable to take a moment or two to collect your thoughts.
Give short answers.
Remember your goal is to set up a face-to-face interview. After you thank the interviewer ask if it would be possible to meet in person.
After the Interview:

Take notes about what you were asked and how you answered.
Remember to say "thank you." Follow with a thank you note which reiterates your interest in the job.
More Interview Tips:

Phone Interview Etiquette
Phone interview etiquette is just as important as in-person job interview etiquette when it comes to getting hired. That's because, regardless of how you interview, a successful interview will get you to the next stage of the hiring process.

Phone Interview Questions and Answers
It's important take time to review the typical phone interview questions you'll be asked and to prepare answers. In addition, plan on being prepared for a phone conversation about your background and skills.

Phone Interview Questions to Ask
When you are invited for a phone interview, in addition to reviewing the typical phone interview questions you'll be asked, it's important to have a list of questions ready to ask the interviewer.

Read More:


  • Behavioral Interviews
  • How to Interview
  • Interview Question and Answer Samples
  • Interview Tips

source://jobsearch.about.com/


Read More

iPhone 5 Screen Protectors – Available Now!

Posted by Unknown


Zagg have been quick off the mark to announce their range of iPhone 5 Screen Protectors, which includes the following options:

– Option 1) Original for Military-Grade Scratch Protection

– Option 2) Hi-Definition for Advanced Clarity and Glass-like Surface

– Option 3) EXTREME for Break Protection and Shock Resistance

– Option 4) Smudge-Proof for Fingerprint Resistance


The above versions start at $19.99 which represents great value compared to the cost of replacing that shattered screen!
Zagg are leaders in the field and if you want to be sure of quality and protection, then there isn’t much need to shop around, head over to Zagg’s website now.

These first-to-market iPhone Screen Protectors offer the following benefits:

– Maximum coverage includes 0.2 mm thick strips to cover the antennas/stainless steel frame
– Military grade patented material is the best to protect your Apple iPhone 5
– Unique properties provide self-healing qualities
– Includes free lifetime replacement warranty for the life of your device

source://www.phonetipsandtricks.com/
Read More

The Lumia 920: Nokia’s Last Stand

Posted by Unknown


This launch marks a critical point in the future of the Finnish smartphone manufacturer, which is currently considered to be the fallen giant of the tech world.

Nokia’s previous range of Lumia smartphones phones have been a modest success, but have also failed to gain anywhere near the market share (currently only 3.7%) required to rescue the company’s fortunes.


Therefore the media event yesterday in New York was a last stand of sorts. In order to compete with the juggernaut that is Samsung and the cult of Apple, they needed to pull a rather significant rabbit out of the hat.
Comments so far have been mostly positive, however Nokia’s share price is where it matters the most and unfortunately for Nokia this has seen a 15% fall following the launch.

With their new smartphone, Nokia really do have an uphill battle to gain market share against Apple and Samsung. Chief Executive Stephen Elop gave a clue as to their strategy and marketing pitch however, when he said the devices offer “an alternative to the faceless grid of applications – the black and grey monoblocks.”

Whether or not enough consumers are tired of those grids and are ready to switch ecosystems is up for debate though.

source://www.phonetipsandtricks.com/
Read More

Top Ten Tips for Painless Technology Integration

Posted by Unknown


10. GAIN PERSPECTIVE

Put last year into perspective. To achieve this perspective, ask yourself these questions:

Did I use technology?
If I did, did the technology enhance the lessons? If not, why not?
If I didn't use technology, how can I use it this year to enhance and/or reinforce what I teach?
9. GET ORGANIZED



Go through old files and delete those that are useless or outdated.
Group remaining files in folders by subject and/or topic.
Back up important and regularly used files.
Transfer all previous student projects to a flash drive.
Check all bookmarked Internet sites, and delete those that are no longer valid or useful.
Organize remaining bookmarks by subject or topic.
8. TAKE A COURSE



Take an online course to learn about teaching and learning with technology. There are tons of tutorials on the Internet on a variety of topics. (Check out Bob Bowman's Guide to Free Educational Technology for links to free online tutorials and how-to guides.)
Attend local workshops on software or hardware you might want to use. (You won't have the time or energy once school starts!)
7. NETWORK WITH PEERS

Join a networking goup for teachers, such as the Google for Educators Discussion Group . Or start your own group. (Visit Social Networking for Teachers for more information.)
Contribute to a discussion or message board.
Subscribe to a mailing list or newsletter, such as those offered at Surfing the Net with Kids or Education World.
6. EXPLORE THE LITERATURE

Subscribe to online or print publications, such as Learning and Leading with Technology (International Society for Technology in Education), Reading Today (International Reading Association), and Instructor (Scholastic), to learn more about integrating technology into your teaching and student learning! (Visit Educational Technology Journals for a list of online educational technology publications.)

5. EXPERIMENT WITH SOFTWARE

Explore new software programs to use with your students. Create a temporary folder and practice using the programs. If what you do doesn't work, don't save it. If it does work, save it as a template or guide.
Choose the best programs and decide which lessons might fit best with each. Practice teaching a sample lesson. Trying new programs for the first time in front of students is the wrong time to find out it doesn't work.
Design student instruction sheets for simple projects or activities using the best programs. Easy, short, step-by-step directions will allow students to use the software independently.
4. INSTALL TIMESAVING TECHNOLOGY

Locate, install, and practice using technology that can make your job easier. Consider programs such as an electronic grade book to record student work, an electronic lesson planner, a word processing program to create parent letters (add clip art for interest!), and a database program to create labels and mail merge word-processed letters.

3. CREATE A CLASSROOM CLIMATE

Visualize the climate you want to establish and organize your classroom accordingly. Decide where to locate the learning centers, the writing center, and the computer center. (Be aware of the physical limitations of your classroom computers. Cords, for example, are only so long!)
Set up a computer-learning center and create a launch page of curriculum-related sites for students. Provide technology-related activities for each unit of instruction you plan to teach.
Decide how often and under what circumstances students will use technology. Post a list of rules.
2. PUNCH UP EXISTING LESSONS

Take a look at the previous year's lessons and decide which ones can use more punch or a technological boost. Many pencil and paper activities can easily be adapted to word processing, or a drawing program. Another easy way to integrate technology into the curriculum is to give students several options when creating book reports. Better Book Reports -- 25 Ideas! and More Ideas Than You'll Ever Use for Book Reports are two Web links for book report ideas that can easily be adapted to the computer. Making slide shows, multimedia reports, and posters are other options students might choose to explore individual learning styles.
Explore lesson plan archives to see what other teachers are doing. Visit such sites as Education World's Technology Archive, Awesome Library, and
Eduhound to find technology ideas, lessons, and activities that match your curriculum. If possible, find activities and projects that incorporate more than one curriculum area.
Search the Internet for Web sites that complement and extend your already successful lessons. Look for interesting text, pictures, movies, and activities that convey the message you want to give students.
Create a book-marked list of the best sites, and include the URLs in the appropriate places in your plan book. That will help you remember to use them when you get to the lessons and avoid the search for that slip of paper that has sunk to the bottom of your book bag.
Top Ten Tips for Technology Integration
Let's review the top ten tips from the Education World Tech Team:

10. Gain perspective.
9. Get organized.
8. Take a course.
7. Network with peers.
6. Explore the literature.
5. Experiment with software.
4. Install timesaving technology.
3. Create a classroom climate.
2. Punch up existing lessons.
1. Prepare something new.

The number one way to prepare to use technology in the coming year --

1. PREPARE SOMETHING NEW

Locate tools that will make learning more exciting, interesting, and relevant for students: A multimedia encyclopedia adds sound and video clips to basic information and provides links to related topics. A word processing program helps students with the steps in the writing process. Quality software can be individualized to allow students to practice curriculum skills at their own ability level. WebQuests can help students use the Internet to work toward curriculum goals. Telecollaborative projects, such as those found at Global Schoolhouse are a wonderful way to integrate curriculum while students work with their peers around the world.
Learn to use technology that extends the power of the computer, such as a scanner, digital camera, video camera, and projector. Use your new tools with presentation software to create curriculum-related presentations for the computer learning center. (If you use pictures or movies from a Web site, be sure to get permission to use the items.)
Plan lessons to teach students to use those tools to enhance their own curriculum projects.
Work with a partner to plan new curriculum units or lessons. It's lots more fun that way, and you and your partner can brainstorm ideas, share the planning, and contribute your individual strengths.
Design new curriculum incorporating technology. Design at least one brand-new adventure for this school year. Starting the school year with a newly designed unit will negate students' thoughts of "Oh, no! The same old stuff again!" and rekindle the spirit of adventure that got most of us into teaching in the first place!
Who Are They?

The Education World Tech Team includes 40 dedicated and knowledgeable educational-technology professionals who have volunteered to contribute to occasional articles that draw on their varied expertise and experience. Stay tuned in the months ahead as members of the Tech Team share their thoughts on a wide variety of topics.
Libby Adams, computer resource teacher, Troost Academy, Kansas City, Missouri

Pat Bihon, enrichment/technology specialist, Lincoln Roosevelt School, Succasunna, New Jersey

Kathy Campbell, regional coordinator,

* Louisiana Department of Education INCLASS Assistance Program

* Dave Figi, computer teacher, Parker High School, Janesville, Wisconsin

* Beth Gregor, elementary technology coordinator, Pleasantdale Elementary School, La Grange, Illinois

* Fred Holmes, Webmaster, Osceola High School, Osceola, Nebraska

* Mary Kreul, grade-2 teacher, Richards Elementary School, Whitefish Bay, Wisconsin

* Lydia Patrick, technology coordinator, Mountain Brook Elementary School, Birmingham, Alabama

* Marcia Reed, media center coordinator, St. Pius X School, Toledo, Ohio

* Lori Sanborn, technology specialist, Rancho Las Positas Elementary School, Livermore, California

* Russ Stamp, media specialist/district Webmaster, Manitou Springs Middle School, Manitou Springs, Colorado

* Lisa Wilson, computer lab coordinator, South Knox Elementary School, Monroe City, Indiana

* Katy Wonnacott, technology and social studies teacher, Signal Hill School, Belleville, Illinois

source://www.educationworld.com/
Read More