How to: Upgrade Windows XP to Windows 7


Uploaded on Oct 15, 2009

It’s a painful install since Microsoft provides no direct upgrade path, but we can help. For more CNET videos, go to

Welcome to the world of tiered clouds

Featured Image -- 3819

Originally posted on Gigaom:

When Microsoft(S msft)  launched Azure Basic a few weeks back, it may have started a trend. Microsoft, while matching Amazon’s previously announced price cuts, also unveiled a set of “basic” general-purpose instances that are 27 percent cheaper than its own “standard” instances. What Basic doesn’t include is the load-balancing or auto-scaling that come as part of standard instances, according to a blog post. 

Fast forward to this week when Amazon roped off older EC2 instances from their newer brethren. When users go to buy EC2, they’ll be steered to the shinier, more muscular instances but if they really want the older stuff, it’ll still be there — if they look for it. At least for now.
aws old instances

Constellation Research analyst Holger Mueller expects we may see two-tier pricing from all IaaS vendors, with Microsoft Azure Basic blazing the trail.  Amazon did not respond to requests for comment.

Others characterize Amazon’s move as a continuation of…

View original 268 more words

iControl Networks Acquires Blacksumac, The Company Behind The Piper Home Monitoring Device

Featured Image -- 3736

Originally posted on TechCrunch:

Earlier this year, Google ushered in consolidation of the home automation and monitoring space with its $3.2 billion acquisition of Tony Fadell’s Nest. Today, iControl Networks followed that trend with its purchase of Blacksumac , which makes the Piper home automation device .

iControl historically has sold its products through various channels, including home security companies and cable service providers. Founded about a decade ago, iControl has spent the last several years signing up customers like ADT, Comcast, Time Warner Cable, Rogers, and others with white-labeled home monitoring products.

The company has raised about $130 million since being founded, from institutional investors such as Charles River Ventures and Kleiner Perkins, as well as strategic investors that include Intel Capital, Comcast Ventures, Cisco, and others.

Blacksumac, meanwhile, is an early upstart in the home monitoring market. The company first came to light with an Indiegogo campaign for its Piper home monitoring…

View original 298 more words

Breaches are inevitable: Cybereason brings Israeli defense expertise to the cyber-security fight

Featured Image -- 3731

Originally posted on PandoDaily:


The internet is a dangerous place for anyone holding sensitive information. I know it, you know it, and corporations know it. Historically, however, knowing this has meant little in terms of preventing cyber attacks. Cyber-crime still costs the global economy north of $300 billion per year, and the US economy north of $100 million according to a July 2013 study by The Center for Strategic and International Studies.

The problem, according to most experts, is that there are too many attack vectors to protect against and cyber-criminals are evolving faster and playing by a looser set of rules than those people trying to keep them at bay.

Today, Cybereason, a new cyber-security company founded by ex-Israeli Intelligence Services experts and with operations in Cambridge, Mass. and Tel Aviv, Israel, is launching out of stealth to offer what it claims is an altogether different solution than anything currently on…

View original 1,052 more words

A Few Thoughts On Free Windows

Featured Image -- 3725

Originally posted on TechCrunch:

Hot damn, changes. ZDNet and The Verge reported on a story that, at first blush, sounds downright strange: Microsoft may do away with charging for Windows in the future .

Microsoft selling Windows to OEM partners is even more entrenched than apple pie is to Americanism. No more of that? It’s almost unthinkable.

However, once you get past the oddity of the concept, it can make sense if you approach it properly. Let’s do this in a section-list format for brevity:

1. Microsoft has made billions selling Windows to consumers through its OEM partners. It now also sells Windows to consumers on devices that it builds. This means it has new ways to monetize a New PC To Consumer.

2. The era in which Microsoft made the bulk of its Windows income is not now. Windows OEM revenue is falling. If it weren’t for corporate PC sales, the top line that…

View original 562 more words

10 Myths About Writers and Writing

Originally posted on Pilot Fish:

In order to write creatively, we need to exercise our free-spirited and impulsive right brain.  It might take a while to “liberate” this side of the brain especially if we have worked in fields that are linear, concrete, and require rationale thought.  This is what happened to me many years ago when I switched from a career in teaching and publishing to full-time writing.   As I began my apprenticeship in the creative arts,  I had to dispel several myths about the writing process and writers.
"Incognito: The Hidden Self-Portrait" by Rachel Perry Welty, DeCordova Museum.

“Lost in My Life (Price Tags) ” by Rachel Perry Welty, DeCordova Museum.

1.  Myth: Writers Are Strange.

There is an element of truth to this!  Writers (and other creative people) must be willing to look below the surface of everyday life and explore the world and relationships like a curious outsider.  This perspective sets us apart, but at the same time, it allows us…

View original 587 more words

Edward Snowden-Interview in English

Sally's Special Services:

edward snowden-CIA whistlebloweredwardsnowden
Edward Snowden
System Administrator
  • Edward Joseph Snowden is an American computer specialist, a former Central Intelligence Agency employee, and former National Security Agency contractor who disclosed top secret NSA documents to several … Wikipedia

Originally posted on Counter Information:

Video – German Television 01/26/2014

Posted January 28, 2014

US Media Blacks Out Snowden Interview Exposing Death Threats

By Bill Van Auken

January 28, 2014 “Information Clearing House - “WSWS” - The former National Security Agency contractor Edward Snowden appeared Sunday night in his first extended television interview. Citing published statements by unnamed US intelligence and military operatives calling for his assassination, he warned that he faces “significant threats” to his life and that US “government officials want to kill me.”

The interview, broadcast by the German television network ARD, was largely blacked out by the US media. The New York Times carried not a word of what Snowden said, while the cable and broadcast news programs treated the interview with near total silence.

The American media’s reaction stood in stark contrast to that of both broadcast and print media in Germany, where the interview conducted with Snowden in…

View original 1,005 more words

Be careful out there: Conduit Search spyware is annoying the Internet

Originally posted on Daily Slice:

We’re seeing a lot of reports of something called Conduit Search showing up on customer computers over the last few weeks, causing problems ranging from an inability to get to certain websites to getting completely locked out of your Internet connection. Conduit Search is essentially a browser hijacker: a program or an add-on that attaches to your web browser and changes settings in ways you did not authorize.  In this case, browsers that are infected with Conduit will have their home page changed to, and any searches performed will go through Conduit’s search engine rather than Google, Bing, Yahoo, or whatever search engine you are used to using. This search information is collected by Conduit for marketing and ads, then search results are displayed that make the business money with each click.

View original 710 more words

Hacking & ID Theft: Are You Next?

Originally posted on GulfDogs:

At least 110 million consumers were affected by the hack involving Target and Neiman Marcus retailers. Whether or not millions more will have their identities manipulated and finances ruined within the coming months due to more breaches of security at other stores is anyone’s guess, says identity theft recovery expert Scott A. Merritt.

“By necessity, I became an expert on identity theft. My information was stolen in 2006, and in repairing the damage, I learned some not-so-obvious ways we can all protect against identity theft in the first place,” says Merritt, CEO of Merritt & Associates and author of ( “Identity Theft Do’s and Don’ts.”

View original

10 Myths About The NSA Debunked

Originally posted on YouViewed/Editorial:

“If You Have Nothing To Hide, You Have Nothing To Fear,” And So On… It’s Time To Face These Government Slogans And Lies”



” The debate Edward Snowden envisioned when he revealed the extent of National Security Agency (NSA) spying on Americans has taken a bad turn. Instead of a careful examination of what the NSA does, the legality of its actions, what risks it takes for what gains, and how effective the agency has been in its stated mission of protecting Americans, we increasingly have government officials or retired versions of the same demanding — quite literally — Snowden’s head and engaging in the usual fear-mongering over 9/11. They have been aided by a chorus of punditscolumnists, and present as well as former officials offering bumper-sticker slogans like “If you have nothing to hide, you have nothing to fear,” all the while claiming our…

View original 112 more words

How the NSA Threatens National Security

Originally posted on CLINGERS... BLOGGING BAD ~ DICK.G: AMERICAN !:

How the NSA Threatens National Security

Schneier on Security ^ | 1/13/2014 | Bruce Schneier

Posted on Monday, January 13, 2014 2:49:48 PM by NewHampshireDuo


First and foremost, the surveillance state is robust. It is robust politically, legally, and technically. I can name three different NSA programs to collect Gmail user data. These programs are based on three different technical eavesdropping capabilities. They rely on three different legal authorities. They involve collaborations with three different companies. And this is just Gmail. The same is true for cell phone call records, Internet chats, cell-phone location data.


Our choice isn\’t between a digital world where the NSA can eavesdrop and one where the NSA is prevented from eavesdropping; it\’s between a digital world that is vulnerable to all attackers, and one that is secure for all users.

Fixing this problem is going to be hard. We are long past the…

View original 86 more words

Google Joins Forces With NSA And DARPA As Military Contractor

Originally posted on GulfDogs:

Google has spent the last decade building databases on everything, including each and every computer-using American citizen. Now it intends to join forces with the United States Military to put all that info to good use. The giant “swooshing sound” you are hearing right now is the major leap forward of the Mark of the Beast.

The DC: Google CEO Larry Page has rapidly positioned Google to become an indispensable U.S. military contractor. Google recently purchased Boston Dynamics, a robotics pioneer that produces amazing humanoid robots for the U.S. Defense Department.

This development invites attention to Google’s broader military contracting ambitions — especially since Boston Dynamics is the eighth robotics company that Google has bought in the last six months.

read more here>>>

View original

Tales From Your Police State: Former DARPA Head & now-Google Exec Wants to Microchip You

Originally posted on Scott Rhymer:

Regina Dugan has plans for you…the former head of DARPA, and current head of Advanced Technologies at Motorola (owned by Google) wants citizens to submit to an edible microchip to “authenticate your identity.”

“This pill has a small chip inside of it with a switch,” said Dugan. “It also has what amounts to an inside out potato battery. When you swallow it, the acids in your stomach serve as the electrolyte and that powers it up. And the switch goes on and off and creates an 18 bit ECG wide signal in your body and essentially your entire body becomes your authentication token.”

She claims it’s perfectly safe for the user. And, of course, there’s no chance of this being used to nefarious purpose…no! Her even creepier idea is an electronic tattoo on your throat to read subvocalized speech — the kind most people do every day when censoring themselves…

View original 14 more words

The NSA’s Spy Catalog

Originally posted on Engineering Evil:

EEV: As Promised, in no particular order. This information already has been fully compromised internationally, over the past few days.


View original

What is SEO? One of the Free SEO Toolbars

Uploaded on Mar 4, 2009

Free at … here is a video walkthrough of the SEO Toolbar.

Search engine optimization (SEO) is the process of affecting the visibility of a websiteor a web page in a search engine‘s “natural” or un-paid (“organic“) search results. In general, the earlier (or higher ranked on the search results page), and more frequently a site appears in the search results list, the more visitors it will receive from the search engine’s users. SEO may target different kinds of search, including image searchlocal searchvideo searchacademic search,[1] news search and industry-specific vertical search engines.

As an Internet marketing strategy, SEO considers how search engines work, what people search for, the actual search terms or keywords typed into search engines and which search engines are preferred by their targeted audience. Optimizing a website may involve editing its content, HTML and associated coding to both increase its relevance to specific keywords and to remove barriers to the indexing activities of search engines. Promoting a site to increase the number of backlinks, or inbound links, is another SEO tactic.

The plural of the abbreviation SEO can also refer to “search engine optimizers”, those who provide SEO services.

How to Improve Your Chances of Going Viral

How to Improve Your Chances of Going Viral

Edited by Teresa, Elyne, Lojjik Braughler, Lillian May and 16 others 

Almost everyone who’s savvy with the internet has heard about “going viral”. “Going viral” refers to the fact that your content resonates so enormously that it catches on fire, and ends up being the latest big thing across the internet. It is when your content gets liked, retweeted, republished, commented on, blogged about, talked about on the streets of LA to Viti Levu, and it earns you more views than your wildest dreams could ever have imagined.

It’s a powerful outcome for your web content and for your brand’s reputation (even if that brand is “you”). However, desiring the key to making something go viral is an unrealistic wish; certainly, you should do your best to make your content the most interesting and fascinating online experience possible, but nobody can really put their finger on what causes something to “go viral”. What you can do is improve your chances of achieving a viral outcome while accepting that much of going viral is going to be about luck and good fortune.



Appreciate the varying degrees of “going viral”. Your website content, photos, or a video you’ve created can “go viral”, your marketing can turn viral (“viral marketing“), and in the case of social media, a blog, a Facebook page or group, or a tweet can turn viral. In fact, any sort of content you create that is shared via phones, iPads, computers, or other electronic means can be viral, be it an app, game, puzzle, or a story, so don’t limit your idea of what can go viral to thinking about dancing baby videos or million pixel websites! The next great viral thing is… unknown!

  • Viral could mean within your interest niche, such as just among photography buffs, cooking fans, Star Wars collectors, or whatever, or it could go beyond your niche into the stratosphere of being enjoyed and shared around by everyone, just because there is something within your content that resonates with a wide group of people, such as a human interest element, a problem solved, a health scare, a video or story of a cute kid or pet, etc.

Understand the limits of going viral. It’s a good idea to get this straight before getting too excited – you cannot make your content go viral. You can hope for it, you can position your content to be at its best and most interesting with the underlying wish that it will catch on, but you cannot make it go viral. At the most, as Ann Handley and C.C. Chapman explain in their book Content Rules, you can “nudge, poke, and pray for it … [but] the truth is that viral is largely a happy accident.” So, don’t try to control the viral nature of your content; instead, concentrate fully on making it compelling, at the top of its niche, interesting, funny, moving, and definitely something able to resonate with a lot of readers or viewers. Accept that it will be your audience who makes the ultimate decision on the content’s “viral worthiness”.

Know what flows. One of the key things behind something going viral is that it touches people in some way. And what is most likely to touch a bunch of people who are tech-savvy, clued in, and ready for new information all of the time? Unsurprisingly, it’s the same as it has always been – things that are uplifting and make us feel good about ourselves and others. What is most likely to “flow” – that is, get sent around the social media networks – is content of the following nature:  Content that inspires awe. Think of “Christian the Lion“. Can you still get over the fact that two guys could even buy a lion cub in a large department store in the middle of one of the world’s biggest cities (Harrods) once upon a time, and that that lion could then frolic in local London gardens before being shipped to Africa and still recognize his original owners years later? That sort of awe-inspiring tale gives us all a sense of how amazing this world is and how we can all play intricate, valuable roles in life.
  • Content that triggers an emotional response.
  • Positive articles, positive, uplifting messages. Articles able to open the mind and broaden knowledge through positive messages are particularly enjoyed.
  • Articles that make us feel good about ourselves and others. One viral event that created a real feel good sense was the video “Validation”, in which people saw the good that comes of validating other people.
  • Articles that that create a sense of admiration and surpassing of mere self interest tend to be the most shared, showing that we do care a great deal about others and we’re moved by stories of others who are actively doing something to show this. 
  • Longer articles over short. Believe it or not, people will spend time reading thoroughly when the content merits it, and when it carries a clear message that they’re yearning to learn more about. Just be sure that longer means “more engaging” and not “long-winded and repetitive”! 
  • Quirky topics, especially the “unexpected”. Things that are out-of-the-ordinary, very unusual, and extremely interesting. 
  • Cute things. Laughing babies, crazy cats, dogs doing tricks, etc. – we’ve all watched or seen such content and loved it.

Have value, perceived or otherwise. Some examples of information that helps others improve their lives, understand things better, or make timely decisions include: 

  • How Tos and instructional content
  • News, especially breaking news 
  • Warnings (like a phishing scam or viruses online) 
  • Freebies and contests.


Have an abundance mentality. Information used to be something carefully protected and meted out to the masses. These days, it’s about sharing information as much as possible, although not just any information but useful, quality, informative, and even detailed information that people really need or want to make their lives better. The person, company, or group most willing to provide quality information to others that shares or solves something and doesn’t involve a secret agenda (such as sales or demands) is most likely to get respected followings, which enhances the chances of turning viral. However, be wary of how you promote this vast amount of productivity; see below for avoiding overdoing the promotion.

Make sure people can find your content. Content that’s buried and difficult to access won’t go viral for the simple fact that nobody can find it. Start with your domain or host; if you have your own domain, is it an easy-to-remember name or one that requires the memory of an elephant to get right? If you’re using another site to host your content, be sure to use one that has a good following, such as FlickrYouTubeVimeo, or Facebook, etc. And be sure that your content includes the very thing people would be looking for, such as a turn of phrase, a precise question, specific keywords, etc.

  • Search for your content using a search engine or two. Is it coming back to you easily or are you having to dig through page after page of returns before it shows up?
  • Use social media as another string to your bow. Active Facebook and Twitter accounts are the place to leave information about freshly uploaded content and to encourage the information to be shared around widely.
  • Provide easy search and categorization within your content so that people can find things quickly if they do want to look through more than one piece of content. Moreover, search engines love categories.
  • Tag and keyword everything you can. Search engines can find the content better this way.

Publicize yourself. While it isn’t possible to create a viral outcome, it is possible to encourage the potential for it. Publicizing your content through trusted channels is an important way to get your content seen, noticed, and possible picked up on by many others. In other words, make it very easy for people to notice that your content is there. Put your content on more than one site. Use Twitter, Facebook, YouTube, RSS feeds, microblogging sites, and even links via profile pages you have on various websites and your email signatures. Get onto forums, into IRCs, and anywhere else you usually frequent and casually mention your masterpiece and suggest that people might check it out
  • Use a link. The majority of retweets have links in them. When it comes to viral videos and webpages, the link is a crucial part of it. 
  • Send a link to your content to everyone you know such as friends, family, and co-workers, provided it’s not likely to be a nuisance to them. 

Don’t overdo your content promotion. Be very selective about what you encourage your readers and viewers to check out. You don’t want to convince them that every single piece of content you produce is the next latest greatest thing or they’ll start viewing you as the “boy who cried wolf” and stop even looking at your work. Be astute about what is the very best of your output and only put that forward as worthy of getting shared around. That way, you increase the chances of going viral because it’s both quality content and not about over-pressuring your initial content sharers.

From one to many...basically how a viral post works

Create momentum and incite action. Not only should you publicize yourself but you need to also help your viewers and readers do something with your content; it isn’t enough to simply put the content out and sit about hoping something will eventuate. Plant the suggestion for them and allow them to be the arbiter of whether or not they’ll follow through. For example, if you want to be retweeted, just ask. And be sure to try that six letter word, ‘please’. A higher percentage of retweets are found to contain the word “please” than not! Some ways to provide a call to action include (and the more of these you can do, the better):

  • Providing clear social sharing icons, such as Facebook, Twitter, LinkedIn, Google Reader, etc. These icons are fondly known as “social bling” and since they increase the ease with which people can pass around your content, make the most of them.
  • Tell people what you’re hoping to happen with the content by gently steering them with kind and thoughtful requests. Some of the ways to do this include saying such phrases as:Invite people to come and interact with you, your content, or something you’ve created around the content. Perhaps a webinar, or a Skype call, or a Twitter party. Be open to all the possibilities to enlighten people as to the potential for your content.
  1. Check out… (my link, my eBook, my post, my video, my article, etc.)
  2. Please embed my video/interactive quiz… (and make it easy for this to happen)
  3. Follow this person
  4. Download my widget/game/PowerPoint/eNook!
  5. Please vote!
  6. Help me…
  7. Questions, e.g. “What do you think of…?”, and so forth.

Watch your timing. As with most things in life, timing is everything and you need to have a sense of whether or not the time is right for the content you’re hoping to go viral. If it’s not, patience might be a virtue until the right moment appears but if it is, then don’t waste a moment in case someone else gets there ahead of you. Only you will be able to gauge the issue of timing as it will be very attuned to your topic and interests and is something you will need to monitor the pulse of yourself.In terms of timing the posting itself, this is a related but slightly different issue. Be sure to post at what you know is the most active time of being online for your target audience. The more people who are actively reading, viewing, or interacting with your content at the same time when it’s released, the greater are your chances of the content getting sent around amid the buzz of novelty and mutually sustaining sharing.


Leave room for connection. Ultimately it is the ability for conversation to take place that helps many a piece of web content to turn viral. Make sure it’s easy for people to contact you if they want to know more, either through comment boxes, IM, a chat forum, an email, or any other way you’re used to using. And be responsive, not reclusive!

  • Ratings systems can be helpful too, as can numbers of visitors. These do influence readers and viewers who can see what others are thinking about the content and how many other people are getting involved.


  • No matter how hard you try and how much you analyze existing viral content, some of “going viral” is just down to luck, happy timing, and the current mood of internet audiences. You can’t predict it, and people who insist that they can are practicing magical thinking, for which they’ll be soundly rewarded with less optimal outcomes than what they’re dreaming of.
  • Moderate comments to remove inappropriate, irrelevant, or offensive posts that are linked to your material. However, do not edit any relevant comments or remove relevant ones. This is merely about sweeping out comments likely to detract from the real conversation and buzz around your content, so that all genuine comments are easier for others to read, whether supportive or otherwise of your content.
  • Check that your settings on your blog, website, or other content collation source allow for sharing. You wouldn’t want your sharing held up by not ticking the right boxes!
  • If you want to use a centralized sharing service such as, this can make placing share buttons on your site a lot easier to do and manage.


  • Not everything that you think will go viral will. Accept that and be honest with yourself about the value, quality, and worthiness of the content in the first place.
  • Avoid engaging in magical thinking; this will prevent you from putting in the much-needed effort to make your content worthwhile.

Sources and Citations

  1.  Wikipedia, “Viral phenomenon”,
  2.  Ann Handley and C.C. Chapman, Content Rules, p. 113, (2011), ISBN978-0-470-64828-5
  3.  Ann Handley and C.C. Chapman, Content Rules, pp. 104-106, (2011), ISBN978-0-470-64828-5
  6.  Ann Handley and C.C. Chapman, Content Rules, p. 70, (2011), ISBN978-0-470-64828-5
  7. – (statistics obtained through the retweet mapper)

How to Optimize Your Website for Search Engine Use

Edited by Ianne, V Rod, Travis Derouin, Seattle SEO firm and 62 others 

Content still reigns as the king in the world of Search Engine Optimization (SEO). Some websites get on top of search engine rankings because of high-powered link building campaigns, but when you talk about visitor loyalty and traffic retention (and yes, public consumption), it will always require that good old optimized content


Dedicate some time to writing really great content. The saying goes that you should write for people first and search engines second. This basically means you should be creating really quality pieces that are useful and engaging for humans because the search engines will recognize your efforts. Your readers will share your work generating additional backlinks, not to mention extra traffic, and search engines will recognize your quality piece because it will flow naturally with not too many keywords (something which is penalized in the post Penguin Update world). 

  • Write content people want to share on Facebook, Twitter, Pinterest and other social networks. The search engine will read those social signals as a signal of the quality of your domain. You can accelerate the spread of your content on these sites by having an account on these social networks with lots of followers. 
  • Consider submitting your content to sites like Reddit, Delicious, Digg and other content aggregators that might gain you a few readers.  
  • Go back and SEO rewrite some old content. Chances are you know stuff about search engine optimisation that you didn’t know last year (not to mention changes in SEO best practices since last year). Re-visit some old content and re-write it with your search engine optimisation hat on, updating image attributes, changing keyword density, adding links to your home page and other relevant content on your site. Even consider republishing as a fresh article for extra brownie points with the search engines!
Get links to your pages from other trusted websites.
  • Even if you are new to the web, you have natural links you could try to get. All businesses have suppliers whether they be accountants, solicitors or raw material providers. All these suppliers are bound to have a website, contact them to ask for a link back, but do not offer a link in exchange. Link exchanges don’t violate Google’s TOS, but they will now work against you. When building links, always give other site owners a reason to want to link back to you. Perhaps write an article based on a particular client – everyone likes bragging rights and this can gain you additional links without even having to ask. All Google wants to see is links that have an editorial right to be there. 


  • Complete all image attributes. Pictures dress up your pages but search engines don’t really know how to deal with them unless you complete all the nitty-gritty details like title, caption, alternate text, description. Be ethical though, don’t use it as an opportunity to cram an extra few keywords onto the page as this will likely have a negative impact on your search engine ranking. Some people search for what they are looking for via Google image search, if you’re image is highly visible then your potential customers will likely visit your page.


Diversify internal anchor text links. There needs to be variations in the text when one creates those blue-highlighted anchor text links. The links on a page are what the search engine spiders follow in determining where they are being led. The text used in the links are used in helping the search engines figure out what the page it leads to is all about.  
Take note of word count. Although it’s been a classic rule that “readers online do not read”, it simply doesn’t mean that one has to deprive the online users of good, meaty content. Stick to at least 250 words a page. SEOs know that writing down for an appropriate length of text means being more able to include more related terms for the target keywords.  
Avoid duplicate content. The content on your website should be unique from other pages on your site, and from external sites as well. Consider using a tool such as Siteliner to look for duplicate content.


Page Format Issues

Title Tags

The first is your page title. It’s very important to put keywords in your page title; specifically try to get important keywords first and try to limit the overall length of your page title. Well-constructed title tags contain the main keyword for the page. It should contain less than 65 characters with no stop words such as: a, if, the, then, and, an, to, etc. Your title tag should also be limited to the use of alphanumeric characters, hyphens, and commas.


Header Tags
Next, it’s important to look at the header tags on your site-h1, h2, h3, h4 and so on. H1 is the most significant. Make sure you have the most important keyword labeled as h1 tag. This will help you with ranking for your site, especially if someone is searching for that particular key word or phrase.


Page Content
Next up is the content. You definitely want to put your keywords in the contents somewhere, but the object, though, is to make sure the content is very well written for visitors to your website. You want to insert the keywords for that page only where it makes sense. Page content should have between 300 and 700 words of descriptive content that contains the keywords specified in the keywords meta tag for the page. You also want to try to optimize your URLs. Make sure to include important keywords in the URL.


Meta Tags
Next are the Meta keywords and Meta description. These are pieces of code behind the scene. The code should look something like this: It should be placed directly under the title tag code <title> Your site tittle</tittle> <meta name=”description” content=”your site description” <meta name=”keywords” content=”keyword1, keyword2, keyword3″ Your keywords meta tag should contain between 5-10 keywords or keyword phrases that are also found in page content. Also one more important meta tag is description tag that contains information about the page’s content so you can persuade search engine users to visit your web site. It should have 15-160 characters, remember not to stuffed with keywords.


Next is to have proper navigation. Each page of your site should contain links to every other page so search engine spiders can find every page. This is an important step for the proper indexing and page ranking for your site.


Site Map
Next is having a proper site map. It’s important to use two site maps for your website–an XML version and a static version. The XML version can be created by sitemap generators tools such as The sitemap should then be submitted to the Google Webmaster Tools account for that site. This will aid in crawling of Google’s Spidebot. The static version should be a HTML page that contains links to every other page.



  • If you have a local business, get listed in the Google Local Business search results. 86% of people looking for something offline will search online using the likes of Google and Bing. Even businesses like hairdressers and butchers can’t afford to miss out on a spot of search engine optimization  Head over to the Google Local Business Centre and add your business to the map, that way your business info and contact details will appear next time a potential customer searches for a service you provide in your local area!
  • Usage of JavaScript, Flash & frames. Search engines are not always can correctly process links on JavaScript, therefore it is desirable to use them as less as possible. The elements of a site executed on Flash, are not indexed by many search systems. If internal links of the project are made in Flash, the majority of search systems will not find these pages. Each time when there is a new page on a site, it becomes to the known search engine only when it will be found by the robot of the search engine. If the page is located in the heart of a site, it can occur very much at a distant day. Sitemap placing frequently solves a problem of indexation and site re-indexation.
  • Dynamic pages are tough to index as it contains too many special characters, some bots takes much longer time to index those pages or sites as well. Try to avoid dynamical writing of site pages.
  • SEO-friendly content is no longer the restrictive, robotical-sounding content it used to be. Search engines, in their aim to continuously refine search are catering more to the online readers, the social aspect of the World Wide Web. Content comes out to be more human-centered, and ready for consumption.

You Can Now Send Photos Privately Using Twitter

Originally posted on thedailyblogreport:

Twitter users can now privately message photos to each other, the company announced today in a blog post.
The feature looks pretty straightforward. Using one of the company’s mobile apps, you can send and view photos using Twitter’s pre-existing direct message feature. On, users wil…
Read more about:
You Can Now Send Photos Privately Using Twitter

View original


Originally posted on Sally's Serenity Spot:

“The wicked flee when no man pursues them, but the [uncompromisingly] righteous are bold as a lion.”~~Proberbs 28:1

Bold Enough to be Led by the Spirit

“If we intend to succeed at being ourselves, we must reach a point where we can be led by the Holy spirit. Only God, through His Spirit, will lead us to succeed and be all we can be. Other people usually won’t, the devil certainly won’t, and we are not able to do it ourselves without God. Being led by the Spirit does not mean that we do not make mistakes or that we are perfect. The Holy Spirit does not make mistakes but we do.

Following the Spirit’s leading is a process which can only be learned by doing. We start by stepping out into things we believe God is putting on our hearts, and we learn by wisdom and experience…

View original 222 more words

Ten Steps You Can Take Right Now Against Internet Surveillance

Information Control


One of the trends we’ve seen is how, as the word of the NSA‘s spying has spread, more and more ordinary people want to know how (or if) they can defend themselves from surveillance online. But where to start?

The bad news is: if you’re being personally targeted by a powerful intelligence agency like the NSA, it’s very, very difficult to defend yourself. The good news, if you can call it that, is that much of what the NSA is doing is mass surveillance on everybody. With a few small steps, you can make that kind of surveillance a lot more difficult and expensive, both against you individually, and more generally against everyone.

Here are ten steps you can take to make your own devices secure. This isn’t a complete list, and it won’t make you completely safe from spying. But every step you take will make you a little bit safer than average. And it will make your attackers, whether they’re the NSA or a local criminal, have to work that much harder.

  1. Use end-to-end encryption. We know the NSA has been working to undermine encryption, but experts like Bruce Schneier who have seen the NSA documents feel that encryption is still “your friend”. And your best friends remain open source systems that don’t share your secret key with others, are open to examination by security experts, and encrypt data all the way from one end of a conversation to the other: from your device to the person you’re chatting with. The easiest tool that achieves this end-to-end encryption is off-the-record (OTR) messaging, which gives instant messaging clients end-to-end encryption capabilities (and you can use it over existing services, such as Google Hangout and Facebook chat). Install it on your own computers, and get your friends to install it too. When you’ve done that, look into PGP–it’s tricky to use, but used well it’ll stop your email from being an open book to snoopers. (OTR isn’t the same as Google Chat‘s option to “Go off the record”; you’ll need extra software to get end-to-end encryption. 

  2. Encrypt as much communications as you can. Even if you can’t do end-to-end, you can still encrypt a lot of your Internet traffic. If you use EFF’s HTTPS Everywhere browser add on for Chrome or Firefox, you can maximize the amount of web data you protect by forcing websites to encrypt webpages whenever possible. Use a virtual private network (VPN) when you’re on a network you don’t trust, like a cybercafe.

  3. Encrypt your hard drive. The latest version of WindowsMacsiOS and Android all have ways to encrypt your local storage. Turn it on. Without it, anyone with a few minutes physical access to your computer, tablet or smartphone can copy its contents, even if they don’t have your password.

  4. Strong passwords, kept safe. Passwords these days have to be ridiculously long to be safe against crackers. That includes the password to email accounts, and passwords to unlock devices, and passwords to web services. If it’s bad to re-use passwords, and bad to use short passwords, how can you remember them all? Use a password manager. Even write down your passwords and keeping them in your wallet is safer than re-using the same short memorable password — at least you’ll know when your wallet is stolen. You can create a memorable strong master password using a random word system like that described at

  5. Use Tor. “Tor Stinks”, this slide leaked from GCHQ says. That shows much the intelligence services are worried about it. Tor is an the open source program that protects your anonymity online by shuffling your data through a global network of volunteer servers. If you install and use Tor, you can hide your origins from corporate and mass surveillance. You’ll also be showing that Tor is used by everyone, not just the “terrorists” that GCHQ claims.

  6. Turn on two-factor (or two-step) authentication. Google and Gmail has it; Twitter has it; Dropbox has it. Two factor authentication, where you type a password and a regularly changed confirmation number, helps protect you from attacks on web and cloud services. When available, turn it on for the services you use. If it’s not available, tell the company you want it.

  7. Don’t click on attachments. The easiest ways to get intrusive malware onto your computer is through your email, or through compromised websites. Browsers are getting better at protecting you from the worst of the web, but files sent by email or downloaded from the Net can still take complete control of your computer. Get your friends to send you information in text; when they send you a file, double-check it’s really from them.

  8. Keep software updated, and use anti-virus software. The NSA may be attempting to compromise Internet companies (and we’re still waiting to see whether anti-virus companies deliberately ignore government malware), but on the balance, it’s still better to have the companies trying to fix your software than have attackers be able to exploit old bugs.

  9. Keep extra secret information extra secure. Think about the data you have, and take extra steps to encrypt and conceal your most private data. You can use TrueCrypt to separately encrypt a USB flash drive. You might even want to keep your most private data on a cheap netbook, kept offline and only used for the purposes of reading or editing documents.

  10. Be an ally. If you understand and care enough to have read this far, we need your help. To really challenge the surveillance state, you need to teach others what you’ve learned, and explain to them why it’s important. Install OTR, Tor and other software for worried colleagues, and teach your friends how to use them. Explain to them the impact of the NSA revelations. Ask them to sign up to Stop Watching Us and other campaigns against bulk spying. Run a Tor node, or hold a cryptoparty. They need to stop watching us; and we need to start making it much harder for them to get away with it.

Snowden’s legacy: The open web could soon be encrypted by default

Originally posted on Gigaom:

Well here’s one way to stymie the NSA: in a couple of years, much if not most of the open web will be encrypted by default. Following recent discussions between the big browser makers, standards-setters and other industry folks, the World Wide Web Consortium’s (W3C) HTTP Working Group announced on Wednesday that the upcoming second version of the HTTP protocol will only work with secure “https” web addresses.

Those “https” prefixes usually denote what’s known as Transport Layer Security (TLS), or sometimes its predecessor Secure Sockets Layer (SSL). Commonly used on banking or email services today — or really anything that needs protection of some kind — this kind of basic security technique was already on the rise before Edward Snowden revealed mass online surveillance. Now the movement has gained fresh urgency.

Engineering effort

A lot of this effort is taking place under the auspices of the W3C and the…

View original 621 more words

Twitter Book Offers Singular, But Fascinating Narrative Of Invention

Originally posted on TechCrunch:

The distillation of one human life into a few hundred pages is a task herculean enough to trip up even seasoned biographers. Expanding that to include four co-founders and a company with as explosive a history as Twitter’s is begging for disaster.

A new book called Hatching Twitter: A True Story Of Money, Power, Friendship and Betrayal, from New York Times reporter Nick Bilton attempts to do just that. It’s around 300 pages and packs in the nearly seven-year history of Twitter as a company and a bit more.

The introduction rips along, introducing us to the four people most responsible for Twitter: Noah Glass, Evan Williams, Biz Stone and Jack Dorsey.

A quick portrait of each of them is painted, albeit in fairly broad strokes. All talented, all intelligent, all searching for human connections and a way to enhance those connections using the Internet.

Bilton is also careful…

View original 1,079 more words

Spread My Work Ethic

Small Business-work ethics

Amen to that! The lazy liberals have less incentive to work for what they want.

Hell, if they can get things without working for it, why would they choose to work? Then they try to justify taking other people’s hard earned money by saying that it is not hurting anyone.

In truth, it is! It is hurting the hard working taxpayers, that choose to work for what they want, and the small businesses trying to survive.

Instead of “feeding them fish”, we need to teach them “how to fish”!!

Anyone collecting welfare should have to be drug tested, and do some kind of work in exchange for it. We need to teach people that you do not get something for nothing.

If you are NOT an American or sick, elderly, or disabled, then you should not be collecting taxpayers money. 

Give a man a fish, and you feed him for a day; show him how to catch fish, and you feed him for a lifetime.


A proverbial saying which suggests that the ability to work is of greater benefit than a one-off handout.


This proverb has fallen foul of the spurious etymological rule: ‘if you don’t know the origin of an enigmatic proverb, say it is ancient Chinese‘. May you live in interesting times and a picture is worth a thousand words suffer the same fate. There’s no evidence to link ‘Give a man a fish…’ with China. A further confusion over the origin is that the authoritative and generally trustworthy Oxford Dictionary of Quotations says it is of mid-20th century origin.

The expression actually originated in Britain in the mid 19th century.

Give a man a fish

Anne Isabella Ritchie, the daughter of William Makepeace Thackeray, (who, if her photograph is any guide, was a studious young woman) wrote a story titled Mrs. Dymond, sometime in the 1880′s and it includes this line.

“He certainly doesn’t practise his precepts, but I suppose the patron meant that if you give a man a fish he is hungry again in an hour; if you teach him to catch a fish you do him a good turn.”

The book was published in 1890 but the story was put into print a few years earlier. The American magazine Littell’s Living Ageprinted the story in its September 1885 issue and it was taken from an earlier but undated issue of the British Macmillan’s Magazine.

So, the proverb dates from 1885 or shortly before and there’s every reason to suppose that it was coined by Anne Ritchie.

The source of the mid-20th century and Chinese origin theories are various US magazines from the 1960s, for example The Rotarian, June 1964:

…the Chinese axiom “Give a man a fish, and you have fed him once. Teach him how to fish and you have fed him for a lifetime.”

Publications of that sort were what brought the proverb into general use but, as we have seen, weren’t the actual source.

Google puts a large mystery barge in San Francisco Bay.

Originally posted on Mario Murillo Ministries:

google barge

Google takes secrecy to new heights with mystery barge

By Ronnie Cohen and Alexei Oreskovic

SAN FRANCISCO (Reuters) – How badly does Google want to keep under wraps a mysterious project taking shape on a barge in San Francisco Bay? Badly enough to require U.S. government officials to sign confidentiality agreements.

At least one Coast Guard employee has had to sign a non-disclosure agreement with the Internet giant, said Barry Bena, a U.S. Coast Guard spokesman. Another person who would only identify himself as an inspector for a California government agency had to do the same.

Moored in the shadow of the Bay Bridge off of Treasure Island, a former military base, the nondescript barge is stacked several stories high with white shipping containers, and sprouts what appear to be antennas on top. The hulking structure, half shrouded in scaffolding, has stirred intense speculation in the Bay Area since reports…

View original 571 more words

Real US Unemployment Rates Reveal True State of Economy

Originally posted on wchildblog:

The ‘official’ US unemployment rates pushed by number cookers may seem grim, but the real unemployment rates within the US tell a much more realistic and concerning tale.

Source: by Daniel G. J.

Even recent drops in the numbers of unemployed people reported by the U.S. Labor Department were apparently too good to be true. The U.S. Bureau of Labor Statistics has admitted that the improved employment figures it recently reported were the result of a computer error, and that’s just the beginning. We’re looking at the ‘final breath’ of the economy before either collapse or reform that Anthony Gucciardi has detailed.

The Labor Department reported that the number of those applying for unemployment benefits fell by 31,000 during the first week of September. Yet just a week later a Labor Department spokesman admitted the real cause of the drop was that two states he wouldn’t identity changed…

View original 285 more words

Snowden leak: NSA secretly accessed Yahoo, Google data centers to collect information!

Originally posted on :


Despite having front-door access to communications transmitted across the biggest Internet companies on Earth, the National Security Agency has been secretly tapping into the two largest online entities in the world, new leaked documents reveal.

Those documents, supplied by former NSA contractor Edward Snowden and obtained by the Washington Post, suggest that the US intelligence agency and its British counterpart have compromised data passed through the computers of Google and Yahoo, the two biggest companies in the world with regards to overall Internet traffic, and in turn allowed those country’s governments and likely their allies access to hundreds of millions of user accounts from individuals around the world.

“From undisclosed interception points, the NSA and GCHQ are copying entire data flows across fiber-optic cables that carry information between the data centers of the Silicon Valley giants,” the Post’s Barton Gellman and Ashkan Soltani reported on Wednesday.

The document providing evidence…

View original 309 more words

Another Member Of Congress Calls Congressional Oversight Of The NSA An Utter Farce

Originally posted on TechCrunch:

Members of Congress calling Congressional oversight of the United States intelligence empire flaccid at best, and utterly incompetent at worst, is becoming a trend. Recently in The Guardian, Rep. Alan Grayson called Congressional oversight of the National Security Agency a “joke.”

Calling oversight in Congress nothing more than “overlook,” Rep. Grayson also stated that he has “learned far more about government spying on citizens from the media than [from] official intelligence briefings.” Us too, Congressman.

The comments of a lone, controversial representative in the House isn’t usually news, but Rep. Grayson’s comments come as a member of a larger grouping that is worth highlighting.

Sen. Bob Corker of Tennessee sent the president a letter, complaining that briefings provided to Congress were “limited” and did not provide “a fulsome accounting of the totality of surveillance activities conducted by the federal government, and in particular, by the NSA.”

He went…

View original 323 more words

9 Signs That China Is Making A Move Against The U.S. Dollar

Sally's Special Services:

And that is exactly what the Terrorist Usurper wants to destroy America and our economy! So far, he is doing a damned good job of it! It is the only thing he knows how to do besides LYING, BLAMING, and MAKING EXCUSES for his IGNORANCE!!

Originally posted on wchildblog:

by Michael Snyder, Economic Collapse Blog:

On the global financial stage, China is playing chess while the U.S. is playing checkers, and the Chinese are now accelerating their long-term plan to dethrone the U.S. dollar.  You see, the truth is that China does not plan to allow the U.S. financial system to dominate the world indefinitely.  Right now, China is the number one exporter on the globe and China will have the largest economy on the planet at some point in the coming years.  The Chinese would like to see global currency usage reflect this shift in global economic power.  At the moment, most global trade is conducted in U.S. dollars and more than 60 percent of all global foreign exchange reserves are held in U.S. dollars.  This gives the United States an enormous built-in advantage, but thanks to decades of incredibly bad decisions this advantage is starting to…

View original 1,279 more words

NSA collects millions of e-mail address books globally

Originally posted on A Moral Outrage:


The National Security Agency is harvesting hundreds of millions of contact lists from personal e-mail and instant messaging accounts around the world, many of them belonging to Americans, according to senior intelligence officials and top-secret documents provided by former NSA contractor Edward Snowden.

The collection program, which has not been disclosed before, intercepts e-mail address books and “buddy lists” from instant messaging services as they move across global data links. Online services often transmit those contacts when a user logs on, composes a message, or synchronizes a computer or mobile device with information stored on remote servers.

Rather than targeting individual users, the NSA is gathering contact lists in large numbers that amount to a sizable fraction of the world’s e-mail and instant messaging accounts. Analysis of that data enables the agency to search for hidden connections and to map relationships within a much smaller universe of foreign…

View original 65 more words

Acer Brings Another Chromebook To The Party

Originally posted on TechCrunch:

Acer was early to the Chromebook market, releasing the C7 for a mere $199 and the C710 for $299. These laptops – more tablets with keyboards than fully-featured machines – work well as “third screen” devices that you throw onto a coffee table or use for browsing and some mild document editing. Now Acer is back with the C720, a $249 with SD card reader, USB 3.0 port, and a front-facing HD webcam for video chats.

The new laptop now competes in the same space as the Pixel, a handsome Google-branded device, and the new HP Chromebook 11, an ultralight laptop that charges via Micro-USB. That doesn’t mean Acer’s creation is overrun with competition, it simply changes the space slightly.

While specs rarely matter in the Chromebook world, the C720 holds its own with 8 hours of battery life, 4GB memory, and a solid Intel Celeron 2955U processor with Haswell…

View original 116 more words

Glass Theft Auto: Google Glass Hack Beams Grand Theft Auto’s GPS Straight To Your Eye

Originally posted on TechCrunch:

You know, it’s been a while saince I’ve written up some clever Google Glass hack simply because it was awesome. Let’s fix that.

Looking to test the concept of using Glass as a second screen, Android developer Mike DiGiovanni has managed to capture Grand Theft Auto’s oh-so-crucial in-game GPS interface, beaming it to the player’s eyepiece in real time.

Now, if you’ve spent every free minute since GTA V’s release blasting around Los Santos, one caveat: Mike had to go back a few generations to make this work. It requires GTA to be running on a computer, which, as many a scorned PC gamer could tell you, means Grand Theft Auto V is out. GTA 4, meanwhile, didn’t want to boot up on any of Mike’s systems. So this is all built around 2001′s Grand Theft Auto 3.


(A render of what the player sees when using Mike’s setup…

View original 1,354 more words

McAfee on Obamacare: “This Is A Hacker’s Wet Dream”

By Jeff Poor 7:30 PM 10/03/2013

On Fox Business Network’s “Cavuto” on Wednesday, computer programmer and founder of McAfee, Inc. John McAfee said the online component of Obamacare “is a hacker’s wet dream” that will cause “the loss of income for the millions of Americans who are going to lose their identities.”

For starters, McAfee said the way it is set up makes it possible for fake websites be set up to fool people to think they’re signing up for Obamacare.

“It’s seriously bad,” McAfee said. “Somebody made a grave error, not in designing the program but in simply implementing the web aspect of it. I mean, for example, anybody can put up a web page and claim to be a broker for this system. There is no central place where I can go and say, ‘OK, here are all the legitimate brokers, the examiners for all of the states and pick and choose one.’”

“Instead, any hacker can put a website up, make it look extremely competitive, and because of the nature of the system — and this is health care, after all — they can ask you the most intimate questions, and you’re freely going to answer them,” he continued. “What’s my Social Security number? My birth date? What are my health issues?”

According to McAfee, there’s not a quick fix — and as long as it set up this way, it could be a playground for computer hackers.

“Here’s the problem: It’s not something software can solve,” McAfee continued. “I mean, what idiot put this system out there and did not create a central depository? There should be one website, run by the government, you go to that website and then you can click on all of the agencies. This is insane. So, I will predict that the loss of income for the millions of Americans who are going to lose their identities — I mean, you can imagine some retired lady in Utah, who has $75,000 dollars in the bank, saving her whole life, having it wiped out in one day because she signed up for Obamacare. And believe me, this is going to happen millions of times. This is a hacker’s wet dream. I mean I cannot believe that they did this.”

Read more:


(h/t Real Clear Politics Video)


Follow Jeff on Twitter


Read more:

US officials claim Iranian hackers infiltrated Navy systems

Originally posted on END TIME HEADLINES:

Iran has been the target of several cyber attacks over the past few years.
US officials have claimed that Iranian hackers have infiltrated unclassified US Navy computer networks. According to a report by Wall Street Journal published on September 27, the US officials, whose names were not mentioned in the report, claimed cyber attacks against the Navy computer systems had been carried out by hackers affiliated with the Islamic Republic’s government. The report added however that, while US military officials have been briefed on the “intrusions,” the “Pentagon wouldn’t confirm the alleged Iranian hacks.” The unsubstantiated allegation comes while Iran has been the target of several cyber attacks itself. In June 2012, a report by the Washington Post said the US and the Israeli regime had cooperated in creating the computer virus Flame to spy on Iran. US National Security Agency, the CIA and the Israeli military worked together to create the Flame virus, the paper added. In addition, the New York Times also revealed in the same month…

View original 27 more words

Robots And Computers Could Take Half Our Jobs Within The Next 20 Years

Originally posted on END TIME HEADLINES:

Robot 2013What are human workers going to do when super-intelligent robots and computers are better than us at doing everything?  That is one of the questions that anew study by Dr. Carl Frey and Dr. Michael Osborne of Oxford University sought to address, and what they concluded was that 47 percent of all U.S. jobs could be automated within the next 20 years.  Considering the fact that the percentage of the U.S. population that is employed is already far lower than it was a decade ago, it is frightening to think that tens of millions more jobs could disappear due to technological advances over the next couple of decades.  I have written extensively about how we are already losing millions of jobs to super cheap labor on the other side of the globe.  What are middle class families going to do as technology also takes away huge numbers…

View original 71 more words

NASA releases stunning images of Pakistan’s ‘Earthquake Island’

Originally posted on END TIME HEADLINES:

Photo by NASA
Amidst the destruction caused by the devastating earthquake in Pakistan that killed more than 500 people, a new island emerged from the depth of the sea. NASA has released images of the newly formed islet. NASA has released before and after photos of a new terrestrial body that was born on September 24 during a quake that struck Pakistan.  Called Zalzala Jazeera, or a an earthquake island, the terrestrial formation can now be found 380 kilometers from the earthquake’s epicenter in Paddi Zirr Bay near Swadar, Pakistan in the Arabian Sea.  The first image of the island was taken  by NASA’s Earth Observing-1 satellite on September 26, while the second snapshot shows the same bay on April 17 with water and no landmass around the coordinates that the new island now inhabits. More

Photo by NASA

View original

Amid spying scandal, billion-dollar NSA data center may secretly open

Originally posted on Conservatives Against Tyranny:

9/26/13. Amid spying scandal, billion-dollar NSA data center may secretly open.

“The new National Security Agency building in Bluffdale, Utah will be the most expensive facility in the NSA’s history, but don’t expect any sort of grand unveiling when it’s finally functioning.

The $1.5 billion NSA data center is scheduled to officially open up this fall, but the Salt Lake City Tribune is now reporting that the facility may already be up and running. 

View original 444 more words

Hackers steal a million Social Security Numbers

Originally posted on :


Now might be a good time to check your credit history for anything fishy. A new investigative report from security researcher Brian Krebs shows that a group of identity thieves have successfully infiltrated the networks of three major data brokers, giving them access to Social Security Numbers, dates of birth, and other personal details that could put all our financials at risk. More

View original

What to know when choosing database as a service

Originally posted on Gigaom:

IT decision makers today must manage data of varying volumes, velocity, and variety from one end of the enterprise to the other. For now at least, that requires several types of databases, and understanding exactly how each works.

View original

LinkedIn ‘sponsored jobs’ will now show up in your homepage feed

Originally posted on VentureBeat:

Sponsored Jobs on LinkedIn just got a little more valuable. The company announced today that these paid-for job listings will now be pushed into users’ LinkedIn feeds found on the site’s homepage.

LinkedIn first released the option to buy sponsored jobs last year, but these listings did not show up in the targeted person’s feed. Now, both “active and passive job seekers” will be able to view your job postings, broadening the potential applicant pool while continuing to filter for those the company truly wants. This might serve as an attractive option in a time when many businesses’ first complaint is that they can’t find the right candidate.

It will also serve as a potentially lucrative ad product for LinkedIn. Social networks and Internet companies alike are searching for new ways to make revenue. In-stream job-lead generation could be a good avenue for LinkedIn, which has a very purpose-driven audience.

View original 68 more words



The Contemplative Thinker

Thoughts on Current Events, Positions, Remedies



Western Rifle Shooters Association

"When there's lead in the air, there's hope in the heart." - WRSA Reader


Apologetics, Eschatology & Politics

An Ol' Broad's Ramblings

Seen on a bumper sticker: If Democrats don't abort you, they'll tax you to death!

Christian Conservative

We the People Will Take America Back




Politics and my life in Central Florida

Voice of the People

We, the People seem to agree on most everything...

The Purple People Periodical

A political and social forum for people who are tired of the extremes and labels implied by words like Republican, Democrat, Conservative, Liberal, Left, Right, etc.

Truth-Anne Justice

When you have a name like mine, it's not unusual to have people ask you if your parents were attorneys, hippies or Puritans.


Just another site


Just another site

Constitutional Reset

Stand Again on the Law - That is Lawful!


God, Country, Constitution

Rightandwrongradio's Blog

Citizen By Birth, Christian By Grace, Patriot By Choice, Conservative By Reason

AmeriKim Patriot

One of Many AmeriKim Patriots On the RIGHT Side of America!

The Conservative Defender

Simply Stated Political Ideology

CNBC {Cracker Nation Broadcasting Corp}

All the news of Cracker Nation that's fit to print ---- and some that's not. lol

Winning the War against Islamic Fascism

The Fall of aniti-Semitism & Islamist mass murder.

The Revolution Road

"WE THE PEOPLE..." have had ENOUGH!

Fighting PTSD

Our Lives With Post Traumatic Stress Disorder and Traumatic Brain Injury


The Peaceful Revolution Liberate Main Street

America at War

Saving America from Itself

America's CURE - by Jeff Neal

Celebrating our Freedoms

Stacy on the Right

The Intersection of Politics and Style

Treason Among Us

A blog by Guido Volante Author of "Treason Among Us; Secrets of the S.E.C."

Patriot Come Lately talk show

Archives of the show recordings

Freedomfightermoe's Blog

Reasearching, Informing, and Educating.

Our Daily Bread

Daily Bible Devotional


Jesus is Lord

Adina Kutnicki

A Zionist & Conservative Blog

'I Am NOT Ashamed of the Gospel of Christ!'

World News Related To Prophecy

alyssa santos - rocks. roots. wings.

Finding Faith, Purpose and Freedom as a writer, encourager, wife, mom, gardener and somewhat reformed pew-rat

Politically Short

The American Reality Outside The Beltway

For God, Family, and Country

Freedom. It's what's for Dinner.


finding new homes for old goodies


Badge, Gun, Attitude. Yep, I'm Ready. Don't like my opinions? Go away, read another blog.


speaking truth to the new power

Give Me Liberty

Conservative Views and News.

Whole Truth Media

Reporting news and issues that matter

Pilot Fish

Your Guide Through a Sea of Change


Just another site

Daily Slice

Get your slice of TOAST...

German is easy!

The blog for all who want to learn German...

Apostle Islands Today

News & Views From The Apostle Islands & Chequamegon Bay Area


We'll leave the Snark on for you.


Get every new post delivered to your Inbox.

Join 788 other followers

%d bloggers like this: