The Adverse Effects Of Technology - Part II

by: Tim Bryce


My earlier article entitled "Adverse Effect of Technology" resulted in an avalanche of e-mail from readers, all predominantly favorable. In that article I put forth an observation that "As the use of technology increases, social skills decreases." I want to take this concept a little further herein. Before we had computers and the sophisticated communication devices we now have in the work place, there was a lot of manual processing involved. Orders were processed manually, as were shipments, financial transactions, and many other business processes. All involved considerable paperwork with documents, reports, journals, logs, spreadsheets, etc. We of course used the latest technology of the day which included such things as typewriters, adding machines, filing systems, cash registers, and tabulating equipment. Nonetheless, the emphasis was on manual processing which meant we were forced to work together, like it or not, hence the need for better interpersonal communications. In other words, out of sheer necessity we were forced to socialize in order for the company to function properly. Since the business processes were so laborious, companies would worry about losing time on a task, hence the need for long range planning. Today, electronic automation is used to implement just about every business process in a company. The idea of operating without computer support or electronic communications is unimaginable. True, such devices have been able to expedite the processes, but in doing so people no longer have to interact in order to fulfill their jobs, hence the breakdown in interpersonal communications. And because our tasks are not as laborious as they once were, the technology allows us to make changes on the fly. Consequently, long range planning has been sacrificed and reactionary management practices have taken their place. In reality, long range planning is still very much needed in order to remain competitive in a world economy, but this is not the mindset in today's corporate cultures anymore. As I mentioned in my article, we have developed an overt dependency on our technology which results in three areas of concern: first, that a company comes to a standstill when the power is disrupted (we can no longer perform the business processes); second, it tends to emphasize short-term planning as opposed to long range (whereby we are content to perform small tasks), and; third, basic interpersonal relations are negatively affected because we are no longer forced to interact with others. Again, I am most definitely not anti-technology, but neither am I anti-human socialization. If I have learned anything in the 30+ years of experience in the information systems industry, it is that people matter most of all; that it is people who use information, not technology; that projects and business processes are executed by human-beings, not robots; that it is the human-being which is of paramount importance in everything. I have always found it rather easy to teach people technology, In fact, it is relatively easy to program a person to use a particular device. But it is much more difficult to teach them the socialization skills to effectively interact with others. This is why our corporate slogan remains, "Software for the finest computer - the Mind." If you would like to discuss this with me in more depth, please do not hesitate to send me an e-mail.

About The Author
Tim Bryce is a writer and management consultant located in Palm Harbor, Florida. You can find his work on the Internet at: http://www.phmainstreet.com/timbryce.htm He can be contacted at: timb001@phmainstreet.com Copyright © 2007 Tim Bryce. All rights reserved.

What is the Best Method to Back up Data?

by: James Walsh

This being the age of internet, chat rooms, blogging and innovative hackers, their expectation never gets fulfilled. The news always leaks out or is methodically publicised by a rival or a gleeful hacker. Thereafter, insult is added to their injury as irate customers and the eager press demand explanations about every unsavoury detail of the incident. But data loss is not a problem affecting only the big players only any more. All of us deal with some amount of data and almost all of it is important to us. Albums have been replaced by .jpeg files, our music is inside the hard drive of our pc or laptop, and our emails are stored in offline folders or software like Microsoft Outlook. Students keep their study material in their machines, and a doctoral thesis is usually a file on the hard disk instead of being a thick volume bound in leather covers. It is, therefore, strange that we keep losing data because we have not taken the precaution of backing it up elsewhere. Several start-up home businesses have not seen the light of the day anymore after an initial incident of data loss. All of this underlines the importance of backup, which really cannot be overstressed. Some Methods of Obtaining Backups The method, or rather, the medium chosen for backing up data will depend on the volume of data to be stored, as well as the nature of the data. Some common methods are being enlisted below: CD and Floppy: The floppy has largely gone out of use by now, due to its many limitations, small capacity and security problems. The CD is a good choice for obtaining backups, and is one of the favourite choices in both domestic and corporate spheres. It is cheap, readily available, portable and compatible with several file formats. Storing a CD and sharing information from it are also quite simple. DVD: The DVD is a good choice for storing audio visual information. It may not be as cheap as the CD, but offers better quality, often lasts longer, and has way more space. DVD RWs can be used in such a way that literally every bit is used to store information. A DVD also has the same facilities when it comes to sharing and easy transporting. However, the DVD RW, many market observers feel, may turn out to be an intermediate technology and be replaced by something superior but very similar in function, or may evolve in such a way that the problems would get solved. It must be noted here that the constant research in this regard, and inventions like the Blue Ray disk etc. point out that we can hope for a better technology soon. USB Devices: These are the new favourites all over the world. The greatest proof of the popularity of this technology lies in two facts. Firstly, the storage space of pen drives / flash drives/ memory sticks is constantly increasing. Secondly, their prices are plummeting downwards rapidly. Almost all kinds of files can be stored on these; they are very easy to carry, do not require a separate software or booting up of the machine to start functioning, and it is very convenient to share the data stored on them. For storing smaller music libraries, an iPod may be an option too. External Hard Drives: For larger data storage requirements, external hard drives are excellent solutions. Arrays or stacks of hard drives are available for corporate purposes and are provided by all good hard drive manufacturers. Seagate, Maxtor, ASB, LaCie all make external hard drives of varying capacities and prices. Online and Offline Storage Spaces: These are ‘spaces’ provided by professional firms, and are extremely secure for sensitive data storage. Tapes and Printouts: Traditional storage should not be left out of the list. There is some information that one simply needs to see on the good old piece of paper. Tape has been in use for a long time now, and will probably continue for some time.

About The Author
James Walsh is a freelance writer and copy editor. If you are concerned about data loss and would like more information on Data Recovery see http://www.fields-data-recovery.co.uk

Why Photographers Need To Use Camera Downloader Program?

by: Martin Brinn


As a digital camera owner you may not be surprised to learn that digital import software to automate image transfer from your card-reader or digital camera is important. Everyone needs to get their images from point A the camera to point B the computer and we need this task performed with the minimum of fuss and bother. As photographers we are all aware that there are occasions when we will need images rotated or some pictures may require a little resolution correction. Using professional digital camera downloader program like RoboImport to automate photo transfer and to perform some image adjustments easily manages mundane digital camera workflow tasks. When purchasing your new digital camera it may come with program that claims to be the “gift with your purchase”, some quaint little image viewer. Usually this digital camera import software is offered on a trial basis or it is the bare minimum quality, if it’s any good at all. With the lower cost of digital cameras today many don’t even come with any digital camera downloader software at all, in fact if you’re lucky your camera package might come with a driver for your computer for digital camera communication but nothing else at all. Some new images may believe that since their new camera did not come with any special digital camera workflow program, it’s not required. Unaware that the uploading photographs from their camera does not require time consuming steps. They will begin by creating folders, then picking photos out one by one and face the next process of cataloguing and arranging. This is simply unthinkable for photographers or even new photography enthusiasts who have thousands of photographs to process and organize. Digital camera workflow program specifically developed to transfer your photos from your camera to your PC does far more than automate the picture transfer process. Any program that would just perform just this task is really quite inadequate. Photographers require professional digital camera workflow software such as RoboImport. This recommended digital camera workflow program will detect the camera connection for us photographers that may not be seasoned computer experts. RoboImport will create the required folders to transfer the images into, and even rename it accordingly. Some less professional digital camera import program may present a problem during the upload process by duplicating filenames and sadly overwriting other treasured photographs that may be present in the computer. RoboImport takes the precaution of renaming pictures from the standard number your digital camera presets, by reading and recording the EXIF information of the photographs to create a unique code representing the date and time the photo was photographed. The complete EXIF information including your cameras make, model and settings will also be transferred with your images, retaining this information is absolutely necessary for professional photographers. RoboImport will also rotate images when required, correct image resolution (DPI) and add any further IPTC-NAA information to the photos you would like to include. When managing hundreds of images this is an exceptional time saving feature. Wildlife and travel photographers are also considered with the added ability of RoboImport to include GPS coordinates of the photos location. Professional photographers who do not have access to their RAW photos do not do their work any justice. JPEG images are not as good in quality and are prone to bleeding and blurring the photographer was not responsible for, and certainly their camera did not create, this is a result of the compression required to convert photographs JPEG images or other formats. RoboImport saves both the RAW image file and the JPEG image in separate folders giving the photographer the photograph they really took, as security and backup against format conversion damage. Excellent digital camera workflow program like RoboImport will also open your Picajet photo manager, or other available digital photo manager you might have on hand for further assessment of your photographs. The time and fuss saved by using software to automate image transfer gives the photographer back their time to spend on the tasks they want to be performing, like taking masterpiece photos. To learn more please visit RoboImport’s home page: http://picajet.com/en/index.php?page=Digital-Image-Management-Software

About The Author
Martin Brinn, A 31 years old photographer and writer with in-depth coverage of a wide range of subjects: digital photo software review, travel, scenics, people, geography, lens review, luxury foods and handcrafted products. Based in Phoenix, Arizona state of US, I am available for assignments anywhere, but consider this area and USA, where I have lived for nearly 20 years, a specialty. http://www.picajet.com?writer=martinbrinn

Microsoft Certification: Your Career Is Waiting!

by: Scott Elliott


Microsoft, a leader in the IT industry, has developed a number of certification programs for professionals working in the business. The programs allow you to decide which certification is appropriate and best suited for your career. There are over 2 million IT professionals with Microsoft certification. You can join their ranks and greatly enhance your professional career with Microsoft Certification. It's important to note that Microsoft has restructured their programs to be very targeted. Microsoft provides plenty of support as you study for your various certifications. The training includes classroom training, self-study kits, computer-based training, online classes, and books, and certification guides. You can take advantage of the way that you learn best. Depending on the career path you have chosen, you will find a certification that matches your skill set. Microsoft plans to, over time, introduce exams that rely on simulations and performance items. You start by taking the appropriate entry- level certification. Prepare yourself with the most suitable Microsoft Certification Guides. You need to choose the right guide. A list follows of the various Certification Guides you can choose from. Match you expertise with these guides. MCSE certification (Microsoft Certified Systems Engineer) is an industry standard targeted at the IT professional and provides the skills and training needed to design and implement infrastructure functions based on the Microsoft Windows® 2000 platform and Microsoft server software such as MCSE Messaging and Security. MCSA certification (Microsoft Certified Systems Administrator) is for IT professionals who need skills and knowledge to administer system environments based on desktop and server operator systems. This training focuses on managing and troubleshooting system environments. With this level of certification you can now prepare for specializations like MCSA Security and Messaging. MCDST certification (Microsoft Certified Desktop Support Technician) is for students who need the right skills and training to troubleshoot ordinary hardware and software issues in Microsoft Windows environments. MCAD.NET certification (Microsoft Certified Application Developer ) provides you with the skills and knowledge that allows you to develop and maintain department level applications for Web clients, desktop client, components, and back-end data services all the way from development to maintenance. MCSD.NET certification (Microsoft Certified Solutions Developers) is for IT professionals with the skills and knowledge needed for developing and designing leading edge business solutions by using various Microsoft tools, platforms, technologies and architectures. This certification allows you to develop custom .NET-based applications. This training encompasses everything from analysis to design, development, testing and maintenance using Microsoft development tools, technologies, and platforms. You become an expert on all aspects of the application life cycle. MCITP certification (Microsoft Certified IT Professional Database Administrator) is for IT professionals who need to plan, administer, deploy, support and maintain databases created by using various Microsoft products. MCITP certification (Microsoft Certified IT Professional Database Developer) gives you the skills and knowledge to plan, deploy, support, maintain and optimize IT infrastructures and databases created by using Microsoft products such as Windows Application Developer, Web Application Developer, or Enterprise Applications Developer. MCPD certification (Microsoft Certified Professional Web Developer) distinguishes expert professionals who are Windows application developers, Web application developers, and enterprise application developers. Experts with these skills can build targeted applications using different platforms in the Microsoft.NET Framework 2.0. MCPD certification (Microsoft Certified Professional Developer) is for students who need to distinguish themselves as an expert in comprehensive Windows application development, enterprise application, and Web application development using platforms that use the Microsoft.NET Framework. This certification is a stepping- stone to other Microsoft certifications. MCTS.NET 2.0 certification (Microsoft Certified Technology Specialist) is designed fir IP professionals who target specific technologies and demonstrate in-depth knowledge of .NET 2.0 and other specialized Microsoft technologies. MCTS.NET 2.0 certification (Microsoft Certified Technology Specialist) is for IT professionals who work with enterprise environment databases. It provides students with in-depth training and skills for Microsoft SQL Server 2005 product. MOS certification (Microsoft Office Specialist) is designed for IT professionals who need the skills and knowledge to understand and use the advanced features of Microsoft Office software. MOS MI certification (Microsoft Office Master Instructor) qualifies you to teach MOS courses. Microsoft Certified Architect Program is designed for IT professionals who can apply successful frameworks and methodologies to create an architecture from beginning to end, through the IT life cycle. CLC certification (Microsoft Certified Learning Consultant) is a credential for expertise in designing and delivering customized learning solutions for other IT professionals. MCBDA certification (Microsoft Certified Database Administrators) are trained to design, implement and administer Microsoft SQL Server databases. MCT certification (Microsoft Certified Trainers) are instructors who are qualified to deliver Microsoft training courses. MCTs are authorized to deliver Microsoft Official Curriculum (MOC) or Microsoft Developer Network (MSDN).

About The Author
Scott Elliott owns and operates http://www.it-certification-guides.com IT Certification Guides for Microsoft Certifications.

Blogging for Fun and Profit

by: Lewis Low


A blog is an online version of diary where people write and display almost anything - their opinions, photos, jokes, thoughts for the day and more. People also share stories about their pets, their passion for soccer, stamps... the limit is only your imagination! In the last few years, blogging has emerged to become a much more meaningful activity than simply maintaining a personal diary. People use it to advertise their products and services, in fact, quite a number of companies even create their online presence by using a blog instead of a website. Create Your Own Blog Starting a blog is free. You can create one at http://www.blogger.com - a free service from Google Inc. You don't need to register a domain name or buy hosting. When you sign up at Blogger, everything happens online. Your blog will be hosted by Blogger and you get an URL like http://yourdomain.blogspot.com. You simply log in to your account and start to write. This is much easier and cheaper than buying your own domain and hosting, then hiring someone to do the web design, writing and coding. Another free blogging service available online is WordPress which is also very popular and easy to use. WordPress supports more features than Blogger while allowing you to customize your blog with various plug-in. You can check it out at http://wordpress.org. Monetize Your Blog While blogging for your own interest, you can in fact maximize the potential of your blog for many marketing or commercial purposes. The quickest and easiest way to turn a blog into a money-making enterprise is to include advertising on your blog. This can be done with contextual ad programs like Adsense - an advertising program by Google. Basically, you get paid when people click on the ads displayed on your website or blog. Google Adsense program is free to sign up. You can visit http://www.google.com/adsense to learn more about the rules and guidelines of the program. Other Adsense type ads that you can use for blog monetizing are SearchFeed, AdBrite, and Yahoo's Publisher’s Network (YPN). Affiliate program is another potential way to make money blogging. By focusing on the subject of your blog post, you can promote relevant products from cost per sale affiliate programs like ClickBank and Amazon. You can write a review about the product or service with your affiliate links embedded inside so you get the commission whenever a sale is made. Boost Your Blog Traffic Blogs are quickly indexed by search engines, but you need to update it regularly. Search engines love fresh content and regular update will ensure that your website is indexed and ranked high up as well. The higher up it appears, the more traffic will come to your site, which means more sales. You can actively participate in forums discussion or post comments on other blogs to get more link back traffic. Whether you use your blog for fun or for work, remember that it’s a highly potential tool any which way. So what are you waiting for? Start blogging away right now!

About The Author
Lewis Low is the founding editor of OnlineBizPromo.com. For more Practical Online Business Ideas and Work-From-Home Opportunities, visit his Work-At-Home directory at http://www.OnlineBizPromo.com

Ten Ways to Write Great Blog Posts That Get Attention

by: Courtland Bovee


Millions of blogs fight for readership online (over 75 million by some counts), with thousands more being created every day. Making yours stand above the rest may seem like a daunting task, but here are ten suggestions for making your blog posts stand out from the crowd. 1. Write each post title so it grabs the reader's attention. It is the first thing someone reads, and it should get your reader's attention right away. Your title should both pique the reader's interest and be informative. Do not write "Business Writing Advice"; instead, say "The Best-Kept Secret to Reducing Your Business Writing Worries." Longer titles have the advantage of describing in detail what your post is about; 8-12 words are a good range. 2. Keep sentences short and clear. A little goes a long way. Readers are busy people and they will not spend hours detangling complex syntax or sifting through blocks of text. Also, use strong language. Start a new paragraph every few sentences, and limit each post to 250 words, if possible. If you cannot write it in under 250 words, split it into two entries. 3. Break up the text. Use numbered lists, bullet points, and subheadings to make your posts easy to scan. Lots of white space on the page is a good thing-it allows your reader to take mental breaks and let the knowledge soak in. In addition, with the inevitable clutter of banner ads and side text, this technique puts some distance between your writing and all those distractions. 4. Keep current. No one wants to read old news. Your job is to stay up-to-date so your readers do not have to themselves. Read newspapers. Scour the web for references. For example, if you write a blog about business communication, subscribe to Google News Alerts using keywords related to the field, such as blogs, podcasting, instant messaging, business letters, memos, and business reports, so you will always be well informed. Posting items from last month or last year will lose your reader's interest faster than you can say "Enron." 5. Be bold. Timidity is an easy path to anonymity. Do not be afraid to create and state your opinions. Of course, there are some situations in which objectivity rules-but you have to give people a reason to read this blog by you and not by the person next door. 6. Be accurate. If you make a statement, be prepared to back it up. Know what your sources are and quote them accurately. Misinformation spreads like wildfire online; do not be the spark that sets it off or the wind that fans it. 7. Contribute to the conversation. Links are great-but then what? Do not just post links to the same tired sites, offer your reader something new. Contribute to the conversation. Your goal is to be the site to which everyone else is linking-so you had better have something worth writing about. 8. Stay focused. Once you have defined the theme of your blog, stick to it. A blog about piggy banks has no business posting about the latest innovation in alternative energy. Such a deviance will only confuse your reader and chip away at your virtual authority. 9. Use key words liberally. Keywords are, well, key. Harness your blog's search engine potential by dousing your title and post with effective keywords that will help interested parties find your page in the vast, muddled blogosphere. This is one of the most important elements of getting your blog read-go at it with gusto. 10. Be consistent. Keep a schedule and stick to it. Post frequently-at least several times per week if you want to increase your potential of attracting new readers. Let your blog languish for weeks without updates and your audience will move on to fresher ground. Maintaining an informative blog that people want to read takes hard work and good writing skills. Find what makes your writing unique-and flaunt it for all it is worth.

About The Author
Courtland L. Bovee, one of America's leading instructors in clear and effective communication, co-authors several leading college-level texts with John V. Thill, a prominent communications consultant and current Chairman and Chief Executive Officer of Global Communication Strategies. Their website, Business Communication Headline News, the #1 business communication site on the web, is at http://www.businesscommunicationheadlinenews.com

Eight Steps to Writing an Outstanding Podcast

by: Courtland Bovee


Podcasts are on the cutting edge of business communication, allowing you to speak with your own voice directly to your audience. They add variety to your blog or website and prove that you know how to stay ahead of the pack. But hitting "record" without putting some thought into what you're going to say and how you're going to say it is a fatal mistake. Here are eight steps to follow for creating a podcast that makes your listener want to come back for more. 1. Choose a theme. Pick an issue about which you feel confident speaking. Try to narrow it down to a particular angle or perspective-think news clip, not university lecture. The best podcasts touch on a specific subject and cover it in depth, rather than attempting to discuss the history of Western Europe in three minutes or less. 2. Consider your audience. How much does your audience know about your subject? What style of reporting will connect with them? The more you put yourself in your listeners' shoes, the better you will be able to speak directly to them. Be sure to include a response to any previous questions or suggestions-your audience doesn't want to feel ignored. 3. Prepare an outline. Expand on your theme by coming up with four or five main elements or topics to discuss. Put the most important and engaging information first; this will hook your listener and entice them to hear out the rest of it. Even if you don't write your script word for word, an outline will help you organize your thoughts into a tidy framework. 4. Think ahead for interviews. If you want to include an interview in your podcast, it's a good idea to plan ahead. Make a list of questions you want to ask for sure, but remember that sometimes the best sound bites happen off-the-cuff. Feel comfortable enough with your interviewee to ask follow-up questions and allow the conversation to travel somewhere more interesting if the opportunity arises. 5. Use simple sentences and language. Keep the tone natural and conversational, as if you are speaking with a listener face-to-face-just as you would for any business writing. Toss any words that would send someone reaching for the dictionary; likewise, avoid long sub-clauses and complex syntax (these things only bury the point). Just because your sentences are short and clear does not mean your language has to be dry. Do not be afraid to use sensory descriptions to put your listener right in the heart of the action. 6. Keep it succinct. The length of your podcast depends on your subject and audience-but no matter how much information you feel is absolutely crucial to your point, listeners will lose interest if it drags. No footnotes or unnecessary diversions here; just the facts, ma'am. 7. Do a practice run. This is especially important if you're working from a basic outline. Read the script for a friend or family member for their (honest!) feedback, or record yourself once and listen to it. Be on the lookout for awkward pauses, confusing sections, and stumbling points. Make notes and do another few run-throughs with the changes incorporated. 8. Print it out. It's much easier to read from a piece of paper than from a computer screen, so print out your script before you record. Enlarging the font helps too. If you're worried about losing your place during recording, highlight a few key words or mark the beginning of different sections to keep you on track. The more thoroughly you prepare your script, the more confident you will be when it comes down to recording it-and the more effective your podcast will be because of it.

About The Author
Courtland L. Bovee, one of America's leading instructors in clear and effective communication, co-authors several leading college-level texts with John V. Thill, a prominent communications consultant and current Chairman and Chief Executive Officer of Global Communication Strategies. Their website, Business Communication Headline News, the #1 business communication site on the web, is at http://www.businesscommunicationheadlinenews.com

Cisco PIX/ASA Security Appliance: How to Configure Banners

by: Don R. Crawley

Banners can be configured to display when a user first connects (MOTD), when a user logs in (login), or when a user accesses privileged mode (exec). Banners are used for legal warnings such as when a user is cautioned not to access a restricted system or that their access of a system is subject to monitoring and logging. Banners are also used on locked systems placed at customer locations by service providers to provide contact information for device access or technical support. The Cisco security appliance supports the use of login banners in console sessions and Telnet sessions, but not in SSH sessions. Exec and MOTD banners are supported in console, Telnet, and SSH sessions. Banners can be up to 510 characters in length. You can create multiple line banners either by creating multiple banner statements or by using the keystroke sequence of "\n" which inserts a carriage return. Here's how banners are displayed: MOTD Banners--When usernames are not configured, MOTD displays at login in a serial console session and before login in Telnet sessions. When usernames are configured, MOTD displays before login in a Telnet session and after login in a serial console session. Login Banners--The login banner displays before login in Telnet and serial console sessions. Exec Banners--The exec banner displays upon login in all sessions. How to Configure a Banner Note: The following procedures were tested on an ASA 5505 Security Appliance running software version 7.22. Other hardware or software platforms may require modification of these procedures in order to function properly. To configure a banner, use the following configuration mode commands: asa(config)#banner motd This is a restricted system. asa(config)#banner motd Do not attempt unauthorized access. Notice the use of two banner motd statements to create a multi-line banner. As mentioned previously, you can also use the "\n" key sequence to insert a carriage return. You can view the banners you created with the following privileged mode command: asa#show running-config banner Hands-On Exercise: Creating Banners on the Security Appliance The following procedures are for training purposes only and should only be performed on devices in a laboratory environment. Under no circumstances should these procedures be performed on equipment in a live, production environment without first verifying their suitability in a laboratory environment. In the following hands-on exercise, you will create MOTD, login, and EXEC banners. Step 1: In configuration mode, enter the following commands: asa(config)#banner motd This is the MOTD banner asa(config)#banner login This is the login banner asa(config)#banner exec This is the EXEC banner Step 2: Display the banners you just created with the following command: asa(config)#show running-config banner Step 3: Type exit repeatedly until you are logged out of your laboratory security appliance. Notice which banners are displayed. Step 4: Enter privileged mode with the command "enable" and notice which banners are displayed. Step 5: From your laboratory computer, start a Telnet session and again observe which banners are displayed. When you are finished, exit the Telnet session. Step 6: Also from your laboratory computer, start an SSH session and again observe which banners are displayed. When you are finished, exit the SSH session. Note: The above procedures are similar to the procedures used to configure banners on other Cisco devices including routers. Copyright (c) 2007 Don R. Crawley

About The Author
Don R. Crawley Visit http://www.soundtraining.net to learn more about soundtraining.net's business skills training programs for IT professionals, plus accelerated technical training programs for IT professionals in the areas of Cisco, Microsoft, and Linux products. To learn more about soundtraining.net's Two-Day Cisco PIX/ASA Firewall hands-on seminar, visit http://www.soundtraining.net/onlinestore/categories/category34.html

How Important Is Wikipedia In The Grand Scheme Of Things?

by: Bill Platt


Wikipedia is the center of the online encyclopedia universe. Millions of entries on every conceivable topic makes this website an authority source that many young students and adults turn to from all corners of the globe. The widespread popularity of Wikipedia has made it an easy target for quite a bit of controversy and critique. Many academic institutions disapprove of any use of unverified Internet sources, including Wikipedia articles. Ironically, Wikipedia prides itself on the idea that its information is verifiable. Read more about Wikipedia's Verifiability policy here: http://en.wikipedia.org/wiki/Wikipedia:Verifiability Wikipedia Basics Founded in 2001, Wikipedia is a free content resource that anyone can submit information to according to certain submission rules. Articles are written and submitted by anyone interested in the topic being discussed. Authenticity is supposedly ensured by the ability of others to edit previously submitted information and correct any errors. Grossly inappropriate or incorrect articles can be nominated for deletion. Wikipedia users are given a week to vote on the appropriate response to a deletion nomination. These safeguards have been built into Wikipedia's design as a way of preserving both its credibility and authenticity. While Wikipedia's systems of checks and balances are not failsafe, they do eliminate quite a few of the errors that would otherwise occur. The fact that the website's content is made up exclusively by donated content and that it has over 2 million topic articles is a testament to the popularity of this style. While there are no basic rules for submitting articles, there are basic guidelines that Wikipedia asks submitting authors to follow. Maintaining a neutral tone and presenting the information in a fair unbiased way are the perfect tones that dictate encyclopedia articles. Authors and editors are expected to be respectful of the work of others and not to modify anything without a good reason or verifiable references. Controversy Academic institutions and authority reference sources such as encyclopedia companies have been less impressed with Wikipedia than the general public. There are many reasons for the less than enthusiastic response from institutions of higher learning and professional reference companies. The publishers of Encyclopedia Britannica became enraged when a study claimed that the accuracy of Wikipedia was comparable to the accuracy of Britannica's long-standing published encyclopedia. They widely disputed the results, insisting that their publication is by far the more superior publication. Public opinion sides with Britannica. The majority of most people, when polled, have great faith in the reputation of Britannica and hold it in much higher regard than its online counterparts. The convenience of the Internet encyclopedia version is where a lot of its competition with Britannica arises. Being able to access any information with the click of a mouse brings research to a whole new level. Wikipedia and Academics Studies are regularly inconsistent on the accuracy of Wikipedia. There is a wide range in the quality and accuracy of the Wiki articles online. Articles are constantly being modified and improved upon. When doing research, it is very important to double-check all information. Wikipedia is a great resource, but it should never be trusted as the final word on any topic. Members of academia are prone to carry negative feelings towards to the use of Wikipedia. Most become agitated when their students source Wikipedia, because they feel their students are not able to tell the difference between a good resource and a bad one – a truthful fact or an erroneous statement. A commonly held belief is that a student lacks the common sense or ability to differentiate between a good article and a biased, inadequate presentation of a story as fact. Academia also points to the general lack of solid research supporting most Wikipedia articles. Lazy Research There is no excuse for laziness, but the blame for it is often placed on the presence of technology instead of where it actually belongs – on the people who rely on technology to provide them the shortcuts they take. The modern age is one of advanced technology and many students are more than willing to take advantage of the ease of relying on computers and minimal online research. The primary function of schools is to teach children. Not only are they responsible for teaching them facts, but also for teaching them how to think and solve problems for themselves. When students are no longer able, or willing, to logically decide something, academics are quick to blame the ease of access to technological advances, separating themselves from the blame. Unfortunately, schools hold as much blame as the technology they bash, for the falling ability of students to produce results on their own. When I was in high school during the early 1980's, calculators were prohibited in all classes except for the advanced mathematics classes that required the use of scientific calculators. By the mid-1990's, the children of friends were telling me that they were required to bring a simple calculator to the classroom to assist them in their basic math calculations. Academia is generally as responsible for the falling academic performance of students as website sources such as Wikipedia. Although academia shares in the blame for falling academic performance with poor resources like Wikipedia, this shared blame should not excuse Wikipedia's less than ideal service record. One Thousand Monkeys Typing The Next Great Novel Wikipedia and all of its sister projects are not perfect. They are websites dedicated to providing knowledge to everyone. Those willing to share what they have learned donate to this knowledge base in hopes of helping others. At least, that is what they do in theory. The Wikipedia frontier has real possibility for the future, but behind the scenes, it is rife with "monkeys learning to type the next great novel," as sourced in the Infinite Monkey Theorem at (http://en.wikipedia.org/wiki/Infinite_monkey_theorem). There are some areas of the Wikipedia that are definitely lacking in information and credibility, and yet when someone makes a gesture to add to the Wiki knowledge base, some editors frame these new contributions as unsupportable and unacceptable additions to the Wikipedia world. The Wikipedia world relies upon its published Code Of Conduct to drive the decisions of its editors. Examples of the Wikipedia Code Of Conduct include: http://en.wikipedia.org/wiki/Wikipedia:Reliable_sources http://en.wikipedia.org/wiki/WP:BIO The Wikipedia Monkey Brigade One extreme example of the "Wikipedia Monkey Brigade" is the story of how Danny Sullivan noticed the attempt by some editor to delete the Matt Cutts chapter in the encyclopedia. For those involved in the study of search engines, Danny Sullivan is one of the most recognized experts in the field of search engines, and has been since 1997. As the founder of Search Engine Watch, and now the editor-in-chief of Search Engine Land, Danny even has his own page in the Wikipedia world: http://en.wikipedia.org/wiki/Danny_Sullivan_%28technologist%29 It seems some Wikipedia editor decided that Matt Cutts was not notable enough for his own chapter in the Wikipedia. For those of us who work in the search engine optimization community, such a suggestion is absolutely obscene. As a quality control engineer for Google and the voice of Google's spam detection department, people in the search industry pay close attention to what Cutts says about the future of search placement within Google. Sullivan suggested that the attempt to delete the Matt Cutts page was at the very least an example of how "inept" the Wikipedia editors have shown themselves to be. You can read Sullivan's heartfelt argument here: http://searchengineland.com/070108-170335.php Almost as interesting as Sullivan's blog post about the suggestion to delete the Matt Cutts page from the Wikipedia, was the page where people argued the decision about whether the page was worthy of deletion. You can read that interchange here: http://en.wikipedia.org/wiki/Wikipedia:Articles_for_deletion/Matt_Cutts Those supporting the deletion of the page were quick to point out the Wikipedia guidelines on Notability at: (http://en.wikipedia.org/wiki/WP:BIO) Strangely, I had read the guidelines myself and I felt that Matt Cutts was a slam-dunk for inclusion. The Good Faith Argument Much to my own surprise, the fellow who originally suggested that the Matt Cutts page should have been deleted got into the fray that resulted from his action. He even made reference to having read Sullivan's comments and chose to use them as a springboard to belittle Sullivan: "The sources provided by Sullivan in his blog are interesting and some would even make great additions to a number of AfD-submitted articles to help fulfill notability (it's a shame he spent the time to make personal commentary about me on his blog than to improve these poorly drafted articles, but to each his own)." For a guy who quotes the Wikipedia guidelines about "assuming good faith" (http://en.wikipedia.org/wiki/WP:AGF) as frequently as he does, I think his own comments about Sullivan betray his double standards about "good faith". It is true that one would not expect anyone who studied Bioinformatics (http://en.wikipedia.org/wiki/Bioinformatics) in college to understand who the players are in the search industry, but then one would also not expect a person who knew nothing about an industry to judge who is notable in that industry either. It would be like me assuming to be able to identify notable people in the bioinformatics field... Yep, that would be dishonest and silly. Final Thoughts The one thing that makes the world of Wikipedia both great and terrible is the same; it is the ability of people to make corrections to the Wikipedia encyclopedia when they see the need to do so. But, the truth is that any monkey with a keyboard and an Internet connection can create and edit documents in the Wikipedia community. Even I am a Wikipedia editor... I may even be a monkey editor, but at the end of the day, I don't monkey around editing information about which I am clueless.

About The Author
Bill Platt helps his customers with link building for their websites, through his program at: http://www.LinksAndTraffic.com By writing original informational articles that would be of interest to his client's potential customers, he is able to provide keyword-embedded links to his client's website from contextually relevent pages on the Internet. If you have more questions, you may visit Bill's website or give him a call at (405) 780-7745, between the hours of 9am-6pm CST, Mon-Fri.

Green With Envy In The Google Game

by: Bill Platt


Beginning on April 14th, 2007, a firestorm blew through the Internet community with the search engine optimization (SEO) community burning the hottest. The embers were warm and waiting for a strong wind to blow and kick up the flames, but it took Matt Cutts, the Google engineer extraordinaire to fire the flames with an off-the-cuff comment about "paid links." The flames raged and in most forums, the wind quickly shifted moving the firestorm back towards Cutts and Google. Thread Watch offered the most biting rebuttal to Cutts' comments: http://www.threadwatch.org/node/13925 and http://www.threadwatch.org/node/13941 Aaron Wall at Thread Watch is a respectable fellow, and he tore into Google with a ferociousness that I had not anticipated. Matt Cutts tried to answer some of Aaron's questions, but it seemed that Cutts' rebuttals only added more fuel to the fire. I would not have wanted to be in Matt Cutts' shoes that week. Oh my, it was brutal! Even on Cutts' own blog where the "paid link" comment originally surfaced (http://www.mattcutts.com/blog/hidden-links/), Danny Sullivan posted a question that went unanswered, so Sullivan commented about it on his site: http://searchengineland.com/070420-111550.php Search Engine Watch even mentioned this issue and linked to additional forums where the debate was raging: http://blog.searchenginewatch.com/blog/070416-020746 What Most Readers Took From Cutts' Comments There were only a few readers who took Matt Cutts' comments to be brotherly-advice. The vast majority of people were screaming that Google intended to exercise their "monopoly control" over the Internet to run all of their competitors out of business. Generally, I am not a "reactionary" type person. But for about an hour, even I had a ball in the pit of my stomach. The ball passed from the pit of my stomach when I read a post that mirrored an opinion I have openly written about numerous times before: How does Google determine the "intent" of a person making a link? They can't! Understanding The Nuances Of Similar Items Some people suggest that I should be ashamed of myself for speculating about the future of Google's algorithms. There is even one clown, who has suggested that I should fear mentioning Matt Cutts' name in an article, because I am bound to draw Cutts' ire against me and my businesses. But, I am not worried. I am simply laying out my "speculative" opinion about what Cutts' comments might mean to my business and yours. You are free to use your own brain to judge the value of my words. Am I playing a double standard when I say that Google cannot determine the intent of the person placing a link, and then I comment on how I interpret the future of the Google search algorithms? I don't think so, and let me tell you why. Google uses algorithms (software programs) to make distinctions about what a web page is about, how they value that page, and to judge the nature of a link. I use my intellect (or as some would suggest, my lack thereof) to make a judgment about what Google has told us we should expect from them in the future. I trust software to a certain extent, but software cannot always read the nuance that separates two very similar items. So, how can the Google algorithm be expected to determine the intent of a person who placed a link? It has always been my contention that humans are "required" in any process that must make an interpretation of nuance. In my businesses, we refuse to trust computers to make judgments of nuance, because they can't. That is the reason we employ human beings to process orders. What Is Google's Intent Behind The Paid Links Issue? The whole of Cutts' argument seems to hinge on nixing "paid links" that are designed to manipulate or "game Google's PageRank" and to a lesser extent, their organic search results. Google seems to be really agitated that webmasters are "selling links based on the PageRank value of a page." The problem is that webmasters are selling an intangible asset that is wholly owned by Google and maintained for "Google's benefit." Webmasters are selling this Google asset, but Google will not receive any of the proceeds from that sale. As a result, Cutts suggested that webmasters should use some method that Google's spider can use to recognize and distinguish "paid links" from "given links." Since Google's algorithm is based on the theory that links are given to websites that deserve those links, the paid links on high PageRank pages can really skew Google's PageRank values and its organic search results. Here Is Where It Gets Ugly Both honest and dishonest people inhabit this Internet. Google wants webmasters who are selling links to distinguish paid links from given links, so that Google can ignore "links purchased to influence PageRank." If honest people distinguish paid links in a way that Google can recognize, then the market demand for those links will dry up. Once the PageRank value of a link is taken away from the buyer, the buyer will be forced to purchase links based only on the traffic that the specific web page receives. If all paid link decisions were based only on a web page's traffic, then the market value of a link would be decimated. Once a webmaster tells his link-buying customers that his or her links will no longer carry PageRank value to the buyer's website, then the value of that link will drop in most cases by 80% or more. Why would a webmaster want to reduce the market value of his links by 80%? Although Google's links do not pass PageRank to the websites that are in their index or paid listings, we have to ask ourselves one thing. Would Google be willing to take a step that would reduce the market value of their own links by 80%? They certainly would not do anything that would cut their own bottom line that deeply, yet they are asking webmasters to do just that. This is the reason people are teed off at Google. At least 80% of the market value of a link is driven by the PageRank value of the web page where the link will be placed. Dishonest people don't care to play by the rules; they will continue to sell their PageRank value, as long as they continue to have buyers. Only the honest will suffer. Link Buyers Are Green With Envy Link Buyers are envious of the PageRank value given to other web pages, and they want a bit of that value passed over to their own websites. Link buyers are green with envy, because they can see that little green bar in the top of their browser that tells them how much value Google gives a web page in its algorithms. If Google were to keep PageRank as a private value, known only to them, then "paid links" would not be an issue for them to manage. If the public cannot see what a page's PageRank value is, then link buyers would not be able to use PageRank to influence their link buying decisions, and webmasters would not be able to market their PageRank value to other websites. How Simple Is That? All Google has to do to solve this problem of theirs, is to take away the indicator people use to buy and sell PageRank. Someone suggested to me that Google would never do away with the PageRank indicator in their toolbar, because Google feels that it is the only thing that ensures that people will keep the Google toolbar in their browser. Personally, I will continue to use the Google toolbar for my searches, even if the PageRank indicator was not there, because I like the search results Google gives to me. But that is just my opinion, and I am only one person out of millions of Google toolbar users. What it boils down to is this. If Google is serious about nixing schemes to buy and sell PageRank, then they would simply take their PageRank indicator away from us. But will they take it away? Only time will tell.

About The Author
Bill Platt offers article ghost writing and article distribution (http://thephantomwriters.com/ghostwriting) services through thePhantomWriters. He also offers a guaranteed link building (http://www.linksandtraffic.com) service, utilizing article marketing as its foundation, through LinksAndTraffic. If you have any questions about Bill's services, you can reach him by phone from 9am-6pm, Monday through Friday at 405-780-7745.

What Is DSL?

by: Toh Poh


DSL stands for Digital Subscriber Line. It is a service that makes the use of existing copper telephone wires for delivering data services at extremely fast speed rates. It does not hamper the existing telephone line. You can surf the Internet and talk on the phone, simultaneously. DSL offers speeds that are around 5 to 25 times higher than a typical 56Kb dial-up connection. It is an always-on type of connection. This implies that websites would load quickly, downloads would be faster, buffering of videos would be fast and smooth and the domain of Online games would be illimitable. Based on the types of service, DSL can be can be categorized in three divisions which are ASDL, IDSL and SDSL. ADSL stands for Asymmetric Digital Subscriber Line. It offers download speed of 1.5 Mbps and upload speed of 384 K. In order to acquire a ADSL connection, your location has to be within 3 miles of your local telephone office. Also, a DSL router is needed for this type of connection. IDSL is a ISDN Digital Subscriber Line service which requires an ISDN router. It provides a connection speed of 144 K. in this type of connection distance is not a component to be considered. SDSL means Symmetric Digital Subscriber Line. The speeds available under this type of DSL connection depends on the distance between your location and your local telephone office. The speed of downloads and uploads can go up to 1.1 Mbps. Advantages of DSL No installation of new wires is required. DSL uses the present telephone line to connect to the Internet. It provides extremely fast connection. Depending on the offer, you would not even have to pay for the DSL modem installation charges, since it is provided free by some of the companies on selection of the appropriate plan. The download rate is much higher in DSL connections. Many business organizations have gained the benefits of DSL. A DSL connection is very secure. Disadvantages of DSL The quality of your DSL connection depends on the distance between the DSL providers office and your location. Nearer you are, the better quality connection would you get. So, consumers located far from the local DSL office may face some trouble. DSL provide high speeds for downloading stuff but upload speeds are not that good. DSL vs Cable Modems The services provided through a cable modem can sometimes slow down or get hanged. It depends on the number of users accessing that particular service. But, in a DSL connection there is no such problem. The speed of DSL is consistent and high. This does not allow any kind of conjunction on the network. It provides more security than the cable modem connections. The popularity of DSL has risen to new heights which has resulted in disconnections and up gradations of the cable modem connections.

About The Author
Toh Poh Leng owns and operates http://www.dsl-upgrade-help.com Dsl Upgrade

High Speed Internet Connection

by: Toh Poh



Internet has almost become a lifeline for the new generation. Many businesses now depend entirely on the Internet. People residing in different parts of world are able to talk to each other via the medium of Internet. Video conferencing is a live example of it. Many marriages are also made with the help of the Internet. The list of benefits that Internet provides is limitless.

But, what would you do when you have a slow speed internet connection that takes a lot of time? That internet connection would simply be useless to you.

The speed at which you are connected to the Internet plays a very important role in enjoying the advantages offered by it. For example, suppose one of your relatives who is residing overseas, has sent you a holiday clip. Now, if your Internet speed is slow then first of all it would take a long time to load the mail website. Then you would enter your user name and password. It would again take extra time to verify it. Also, downloading the clip would be very slow, even if its size is very small. Overall, you can say that having a low speed Internet connection (dial-up connection) is not a good thing.

There are many choices available for a high speed Internet connection. DSL, Cable and Satellite are some of them. You can select the best one from them. Here are some of the common benefits that all these high speed Internet connections provide.

* Viewing of streamlining clips or videos is very easy and fast in these connections. Dial-up connections may not even allow their access. * You can upload web pages and download any kind of information or software with more than twice the speed of dial-up connection. * Downloading of images and huge e-mail files can be done almost promptly. * High speed Internet connection has proven to be a boon for all businessmen. They can now access the world wide web within a few seconds. Their businesses have been highly benefited through efficient and quick video conferencing which would have been impossible in a slow dial-up connection. * For those people who work from home, a high speed Internet connection can assist them in increasing their overall work efficiency and output. * On a long term basis, the high speed Internet connection can prove to be highly economical.

DSL: The best choice for high speed internet connection Now-a-days, DSL has become the leading choice for a high speed Internet connection. DSL works on existing telephone lines. With a DSL connection you can browse the web and talk on the phone at the same time. Generally, a DSL connection requires a DSL router, a dedicated phone line and a network card or a modem for each system. The installation of DSL at your location is the responsibility of the service provider. Last but not the least, this high speed Internet connection is offered at very affordable prices.



About The Author

Toh Poh Leng owns and operates http://www.dsl-upgrade-help.com Dsl Upgrade