business articles

June 29, 2004

Sleeping Around Wirelessly

Keywords: Wireless Vulnerability

With all the personal information on your computer, do you ever wonder what would happen if someone gained access or control? You may be thinking, "But I have nothing important – why would anyone bother?" Think again. People do bother – and the information they gain could lead to serious privacy or identity theft, not to mention alarming financial repercussions. How do I know this is true? Time for a confession…

Recently, while in Vancouver on business, I found myself in a newly renovated hotel. Although the network cable installers were working tirelessly in the wiring closet just outside in the hall, no internet was yet available from my room. I needed to access my e-mail. Enter wireless and the West-end of Vancouver direct to my balcony door.

I know that on any given day from my home or from the office, I can pick up at least a dozen wireless 802.11b or 802.11g networks. Often on these wireless networks the security layer is not enabled, allowing me uninterrupted access should I choose to connect.

Continue reading "Sleeping Around Wirelessly"
Posted by Angie at 08:19 PM

Which Password Did I Use? Don’t Forget to Remember

Keywords: Passwords

If you spend any time at all on the Internet, you know there are thousands of websites that want you to "log in" and create a username and password so you can see what’s behind the homepage. Many of these sites have noting to do with money or personal banking information. The log in helps them create a mailing list for marketing. There are other sites where credit card and personal information is requested.

Choosing a username and password can be very simple for those sites that pose no threat to your financial well-being (i.e. sites that do not ask for credit card or bank info). Use the same username and password. There is no reason to cook up James Bond passwords for a site anyone can "log" onto. Here's a simple idea: for a username, use the part of your eMail address in front of the @ sign. My eMail address is Mike@B... so my username for non-threatening sites is Mike.

Select a password and use it all the time. I have a friend who uses "Password" as his password. A simple, easy to remember, repetitive, Ho-Hum username and password approach is ONLY for the run of the mill, everyday Internet sites.

Continue reading "Which Password Did I Use? Don’t Forget to Remember"
Posted by Angie at 04:20 PM

June 28, 2004

Avoid the 5 Most Common Audio Product Mistakes

Keywords: Audio Products

Audio products are a great addition to an information product program. They can boost your profile and bring in extra income. The power of your voice can help you forge stronger bonds with customers. And customers can enjoy your material wherever they can take a portable audio player.

But there are five big mistakes waiting to trip up first-time audio producers, says audio expert Rob Schultz.

1. Falling prey to the seductive spell of technology. With the myriad of high-tech gadgets and toys on the market, it's easy to get seduced by technology. But technology alone will not make your audio product great, says Schultz. You still need good content and good planning.

On the flip side of the coin, too many people think if they know nothing about technology, they can't create good audio products. This belief is equally false, says Schultz. Even a simple recording on a tape cassette deck can do the trick if the content is good.

Continue reading "Avoid the 5 Most Common Audio Product Mistakes"
Posted by Angie at 06:52 PM

June 24, 2004

It Wasn’t a Tornado or an Earthquake; it was an Email. Managing the growing risk of critical data loss.

Keywords: Data Loss

With spring upon us, summer just a few weeks away, and a new season of severe weather swirling into motion, now is the perfect time for a business to consider what a natural catastrophe such as a tornado or flood would do to its operation.

Oh, and emails too! It is hard to fathom mentioning “malicious emails” as one of the catastrophes to consider when designing a Disaster Recovery Plan, but it is the truth.

It doesn’t have to be an F5 Tornado or the Flood of ‘93 to be considered a major disaster anymore. Businesses can officially include “malicious emails” that show up disguised from “grandma” as one of the top threats on the list. With the growing number of computer viruses, as well as the number of cases where data has been damaged as a result of unauthorized access, never before has a company’s health been so at risk.

For example, on June 14th, 1999, eBay executives, employees, traders, investors, the media, and the world watched as eBay stock value plummeted by $4 billion dollars. The devaluation occurred because of an all-day (22-hour) outage on its auction site. Executives at eBay estimated that the impact included a drop of $3 to $5 million in sales. Every hour that eBay was down resulted in an estimated $200,000 in lost sales.

Continue reading "It Wasn’t a Tornado or an Earthquake; it was an Email. Managing the growing risk of critical data loss."
Posted by Angie at 10:49 AM

June 23, 2004

Creating A Network That Works

Keywords: Networking

Do you ever stand in awe of those people who seem to know everybody and everything? I know I do! Regardless of what you're looking for, these people have their finger on the pulse of the 'Net and know where to find it. Their network of resources and people is incredible! Yours can be, too. It's actually very simple to create a network that works to bring you business, offers feedback and provides those resources that we all need to have.


---- Make A Wish List

The first step in creating a network that works is making a list of what you want. Go ahead, think of the perfect situation where you would have anything you needed at your fingertips. For example, if you have a Web design business you might find it very helpful to create associations with people who offer services that compliment yours. Why? Because if these people are heavily involved with the process of getting a Web-based business up and going, they could send you many leads and that could turn into paying clients.

Continue reading "Creating A Network That Works"
Posted by Angie at 10:15 AM

June 18, 2004

Connections Matter

Keywords: Networking

Knowledge is power and sharing it can build even more capability for the person sharing and the organization. Yet, this concept can be a hard sell to those who have been raised on the belief that giving away their knowledge is surrendering power.

Changing Behavior is the Big Challenge

Continue reading "Connections Matter"
Posted by Angie at 02:52 PM

7 tips To speed up your PC

Keywords: PC Speed

Did you know that very soon after you start using your computer it begins to slow down and loses that responsive,

"fresh out of the box" sort of feel.

You only bought your new super-speed, top of the range computer a few weeks ago. You start surfing the internet, downloading a few new programs to try out and today you're working away and you notice it just doesn't seem as fast as it was before.

If that's ever happened to you, then there are a few things you should know which I'll be covering in this article that will get the pep back into your PC.

Continue reading "7 tips To speed up your PC"
Posted by Angie at 01:42 PM

SSI: Why and How to Use Server Side Includes What Every Webmaster Should Know

Keywords: Webmastery

If you are a webmaster or a website owner and have not yet used server side includes (SSI), I am about to make your life soooo much easier. SSI can save you a lot of time updating your site. Set them up right at the beginning and you will be forever grateful that somebody thought up SSI.

In this article we will look at what SSI is, why it makes life so easy, and exactly how to set up SSI on your website...and then I'll share two little bonus tricks I've discovered.

What is SSI?

SSI actually covers a number of features to improve your website. I am going to speak here of just one critical improvement, referred to as an "include" file.

Continue reading "SSI: Why and How to Use Server Side Includes What Every Webmaster Should Know"
Posted by Angie at 01:13 PM

Zen and the Lost Art of Software Design

Keywords: Design

How come, after 30 years plus in the computer business, I still don't know how to use my fax software properly?

Nor, for that matter, do I use more than 20 per cent of the super-dooper-word-processor-with-business-graphics-drawing-and desktop-publishing-features. Why?

And, when it comes to my feature-packed database program that will store and keep track of everything, why do I prefer the old program that I've had around for 10 years and refuse to discard?

Do you know why? Because desktop software is still not that easy to use even for programmers and highly experienced super-users. I've been reflecting on this problem for awhile now and I think I've finally figured it out.

Continue reading "Zen and the Lost Art of Software Design"
Posted by Angie at 11:58 AM

Internetworking: Cabling Cisco Devices

Keywords: Networking

In this article, you will learn about how Cisco devices are connected to a network.

One of the most common cable endings for connecting Cisco devices is UTP (Unshielded Twisted Pair). UTP is a cable that has four pairs of wires twisted inside it to eliminate electrical interference. UTP cables are connected using RJ-45 connectors that have eight connector pins. The data equipment that is used for internetworking is classified as Data Terminal Equipment (DTE e.g. router interfaces) and Data Communication Equipment (DCE e.g. A WAN connects DTEs through DCE network).

UTP cables are used in many configurations and for different purposes, to form an internetwork including: Straight-through, Crossover and Rollover. The applications of UTP include: Serial transmission, Integrated Service Digital Network (ISDN) connections, Console connections and Modular & fixed interfaces. A discussion on these follows.

Continue reading "Internetworking: Cabling Cisco Devices"
Posted by Angie at 10:07 AM

June 17, 2004

Deciding Whether to Offer Your New Gadget as a Product or Service

Keywords: New Products

If you have ever made and designed your own software, you will
have likely already learned the lessons in this article. The
same lessons can be applied to the businesses of most Internet
marketers.

The main lesson I learned was that it does not matter how good
your software product is, the quality of the product does not
ensure its financial success.

Microsoft of course is an exception for a number of reasons.
First off, Microsoft has always sold their product first to the
computer retailer. Secondly, they have built the legal war
chest to force businesses to pay for their products. They also
have the war chest available to promote their products with
tens or hundreds of millions of dollars.

Continue reading "Deciding Whether to Offer Your New Gadget as a Product or Service"
Posted by Angie at 05:53 PM

Disposable E-mail Addresses

Keywords: Email

E-mail is the lifeblood of the Internet. Unfortunately, it remains far too easy for spammers to abuse the goodwill shown when people make their e-mail address known publicly. There are several ways to prevent this problem when you sign up for things online; but only one works if you need to provide a real, working address (to be able to receive a confirmation e-mail, for example), the creation of disposable e-mail addresses.

Most ISPs allow you to have several e-mail accounts and provide the mechanism online for you to create and delete them. Usually, you go to a Member Services page, log in and then select "E-mail" to administer your accounts. If you have the ability to create extra e-mail accounts, you should consider the benefits of creating one you have no intention of reading. Even if you don't use an ISP that allows additional accounts, you can still create free accounts on Yahoo!, Hotmail or any of the other free services.

Continue reading "Disposable E-mail Addresses"
Posted by Angie at 01:18 PM

June 16, 2004

Why Split-Run Testing Does Not Work... for those who are doing it wrong.

Keywords: Split-Run Testing

There is a wealth of information out there about the benefits of split-run testing or how to conduct such tests, and a huge selection of software solutions that help to implement it.

I'm am not going to attempt to describe the concepts of testing, nor will I pitch any software solution.

I want to talk about why so many people fail in their attempt to improve the conversion rate of their sites while using split-run testing techniques.

Continue reading "Why Split-Run Testing Does Not Work... for those who are doing it wrong."
Posted by Angie at 11:53 AM

Dr Pepper Your eMail

Keywords: Email

If the post office delivers mail to to a box on your porch or on a stick out front, you probably check the mail every day. If you have a box at the post office, it is a given te=hat you get in the car and visit the post offeice every day. With eMail, you can and should, check your mail on a daily basis, at the minimum. Better yet, Dr Pepper it.

Dr Pepper was first introduced at the 1904 World's Fair in St. Louis. The same place Hamburgers and Hot Dogs were first served on buns and where the ice cream cone was introduced.

It was in 1924 when the Dr Pepper people discovered research proving that sugar provided energy, duh, and that the average person experienced a letdown during the normal day at 1030a, 230p and 430p (a sugar LOW).

That was the origin of Dr Pepper’s most famous advertising slogan, "Drink a bite to eat at 10, 2, and 4."

Continue reading "Dr Pepper Your eMail"
Posted by Angie at 11:14 AM

June 15, 2004

Avoiding Identity Theft

Keywords: Identity Theft

You've probably seen horror stories on the news about identity theft recently, or seen the sad-but-funny commercials in which you see the identity-theft victim talking in the thief's voice about all the things the thief was able to buy and do with the stolen identity. It's a very real problem, and in our technological age, with all our reliance on computers and the Internet, it's getting worse.

Fortunately, there's no need to throw the baby out with the bathwater. There are steps you can take to ensure the security of your identity while still taking full advantage of all the Internet has to offer.

Continue reading "Avoiding Identity Theft"
Posted by Angie at 10:16 AM

June 14, 2004

10 Classic Ways To Successfully Use Autoresponders

Keywords: Autoresponders

1. Use your autoresponders to conduct simple polls.

Your polls can give you valuable information that you can use to make your ezine, site or product better. They can also help you to make decisions concerning making changes to your product, site, or ezine.

You can also make your ezine more interactive by running a poll in each issue and then publishing the results in the following issue.

Using polls in this way will help you to increase your readership as your readers will be interested in seeing the results of the polls you've run.

2. Use your autoresponder to deliver an email course that shares with your visitors the benefits of owning your product.

To create your course, you could use your articles as the main content of your course or you could use them as a guide to making your course.

You could also use questions you get from your visitors and customers to write a course that your visitors would be interested in and that increases your sales.

Continue reading "10 Classic Ways To Successfully Use Autoresponders"
Posted by Angie at 05:19 PM

Are You At The Mercy Of Computer Geeks?

Keywords: Managing Technology

Many business owners are sabotaging their business without even realizing it. They are completely out of the loop when it comes to all technology aspects of their operation such as websites, computers and software. They become completely dependent on their technical people and naively believe that things are "being taken care of".

This "head in the sand" approach is very dangerous. Here are just a few scenarios of what can happen:

* Your webmaster is the only person who knows the username, password and other improtant settings for your website. If the webmaster suddenly stops responding to your phone calls or e-mails (which I've seen happen many times), you would have no idea how to hand off the website updates to another person.

* Your programmer no longer wishes to work with you. When you hire a replacement, it turns out that there is no documentation for the program, the code is unreadable, and it will be cheaper for you to buy a new program than salvage this "sinking ship".

* The software that was developed for your business theoretically does all that was required, but there is one big problem: it is sitting idle because it is so confusing that nobody wants to use it.

Continue reading "Are You At The Mercy Of Computer Geeks?"
Posted by Angie at 04:53 PM

Comparing Web Browsers: The Top Three

Keywords: Web Browsers

There are three major Web browsers contending for the Windows PC market: Microsoft's Internet Explorer, the open-source Mozilla (basis for the Netscape browser), and Opera Software's Opera browser.

I use each of these fairly regularly, though I do have my favorites; however, recent changes in favoritism are what prompted this article. Each of the browsers has its merits and problems. For this discussion, I'll be listing them in order of their usage 'Net-wide and for the 4-point scoring system, Internet Explorer is the "benchmark" as it is the most widely used browser online (by far) and thus earns two stars per category.

I rate the browsers on useability, functionality, speed, and reliability. Useability is based on the browsers intuitive design features such as side bars, tabbed browsing, etc. Functionality is based on the browsers "extras" like use of plugins, browsing options, etc. Speed is obvious and reliability is based on how often the browser "locks up," "crashes," or incorrectly displays a website.

Continue reading "Comparing Web Browsers: The Top Three"
Posted by Angie at 02:33 PM

June 11, 2004

Wireless Privacy - Protect Your Computer From Wireless Theives!

Keywords: Wireless

Wireless is a great thing - and anyone who's worked with wireless technology for awhile knows how powerful it can be. But have you ever thought that you might be in danger through your laptop's wireless port? Here's something to think about!

Sleeping Around Wirelessly
By Robert Preston

With all the personal information on your computer, do you ever wonder what would happen if someone gained access or control? You may be thinking, "But I have nothing important – why would anyone bother?" Think again. People do bother – and the information they gain could lead to serious privacy or identity theft, not to mention alarming financial repercussions. How do I know this is true? Time for a confession…

Recently, while in Vancouver on business, I found myself in a newly renovated hotel. Although the network cable installers were working tirelessly in the wiring closet just outside in the hall, no internet was yet available from my room. I needed to access my e-mail. Enter wireless and the West-end of Vancouver direct to my balcony door.

Continue reading "Wireless Privacy - Protect Your Computer From Wireless Theives!"
Posted by DK at 02:52 PM
Syndicate This Information