This is an answer to Scott Sakamoto on his blog post on Portland Westside Guy about “dumb questions”, titled High Tech: Asking the Correct Questions.
Hey, all questions gladly accepted. Answers? That’s a whole ‘nother can of worms. Continue reading
Actually there are probably more than 5 reasons to not use service provider email addresses. You know what I am talking about. These are the email addresses we all get “FREE!” from our cable, telephone, or other service provider. The email addresses we might have for personal or small business use.
It’s a BAD IDEA to use those email addresses. Here’s why: Continue reading
First off, I never personally met Steve Jobs, but like many people, I did have brushes with his genius.
When I first joined Tektronix in 1985, my desk came with the typical desktop terminal with connections to the Internet through UNIX servers from Gould and VAX. This was standard for technical employees, but not particularly useful for marketing employees outside of sending email. So I ordered a Continue reading
There’s a certain charm to Jules Verne. Maybe it’s the innocence of the era, the belief in a better world–notwithstanding his bleak view of the future in The Time Machine–or it could be that he was so right about our future technologies. Either way, today New York City and London are involved in a trans-Atlantic experiment that has a Jules Verne twist almost 200 years after his birth!
What I find interesting is that today we can easily reach in our pocket, pull out a mobile phone and simply call someone in London. So why are so many people in two of the more sophisticated cities in the world enamored with this idea? Is it the steampunk physicality (check this site for more steampunk) or is it a basic human reflex of communicating?
Most of us spend a large portion of our day communicating. We talk, type, text and sign. We are drawn to the unique. As business people we look for new ways to get our message across, to excite and entice our audience to engage in conversation and purchase from us instead of the guy down the street (or from around the world in today’s Internet age).
Obviously, there is a human-interest draw in this art installation. There is the happenstance of connecting and meeting with people one does not know personally. The novelty of the installation removes the fear of strangers and helps people interact. My father would say “it’s just damn fun, stop thinking about it,” but we can all see how the idea of a novel way to communicate has removed the barriers between people.
With a little work, we can apply this same process to our business communications. Start a newsletter, follow and respond to customers on Twitter (build a customer group on Twitter), update our web sites more frequently with new information, there’s dozens of actions we can take to be more interesting and exciting, and to draw more customers. By doing something new and unexpected, people will follow, and business will follow the people.
What new twists on existing communications technology have you put in place or just think might be interesting?
We all certainly use passwords for our hard drives and encryption for our sensitive files–but none of this matters anymore if someone can gain access to a computer that is still powered on.
This is a difficult issue for small businesses such as doctor offices, health clinics, accountant offices, and others working very hard to protect client information. Some information is required by law to kept private and there are horrendous penalties–business-ending penalties–for disrupting that privacy.
Now it turns out that none of our security defenses matters if our computers are left operating when we are not present. According to a new report from ars technica, a group of Princeton computer scientists has hacked through all the security measures available–including on a new Macintosh, a computer celebrated for it’s security!
Pull the encryption information from the RAM before it has a chance to clear itself.
Fortunately, there is one simple answer to the problem outlined in the paper: make sure your computer is completely shut down before you physically leave it. This is true for desktop computers as well as laptop computers.
It seems that RAM holds onto memory for far longer than previously, up to an hour or more if handled properly. The scientists found they could extend the residual memory by cooling the RAM chips using a can of compressed air similar to those found in many photography and computer store, or even sewing stores and hobby shops.
The only sure defense is to completely shut down the computer and allow the RAM to clear. This means overnight back-ups may need to be re-timed to occur during work hours in order to avoid leaving operating computers in a small office overnight. It means shutting down your laptop any time it might not remain in your hands, putting the laptop in sleep mode or hibernation means the security is exposed once the laptop is awakened.
Granted, thieves still need access to the hardware, but this may be fairly simple if your business contains information of value to the thieves. So remember to keep physical control of your computer at all times, and ensure that the computer is shut down whenever you leave the premises.