Knowing your NICHE MARKET and where to find your NICHE is more important than the product you sell.
Most Netpreneurs take a narrow view of NICHE MARKETING as a limitation on their business, when in fact it is the POWER that provides longevity to their business.
The biggest mistake most new netpreneurs make online is that they have no idea where, or what, there NICHE MARKET is and therefore, sell their product to everyone and anyone and in the end sell to no one.
A common misconception is that – if you build it they will come. The truth is you have to find your NICHE and get them to come to your site.
In talking to new netpreneurs the first question I ask is who are you selling to? The almost instantaneous reply and always the same answer is: ‘everyone and anyone’.
The next successions of questions I then ask are:
* what type of product are you selling
* who would use your product
* What problem does your product solve
* Is your product distributed easily
* Who would benefit from using your product
Simple questions, but not so easy for many netpreneurs to answer. If you take some time and answer these very straight forward questions you will find that by defining your NICHE you will be better equip to go straight to the source, than taking a stab in the dark and hoping it will all work out.
You will also find that by defining your NICHE MARKET you will:
* Help define your Internet Marketing Strategy
* Develop products/services that appeal to your NICHE
* Set yourself up as an industry leader
* Optimise your site for search engines so your NICHE can find you easily
* Maximise your marketing budget where it counts.
Once again I ask you: WHAT’S YOUR INTERNET NICHE MARKET?
The truth can be found in your answers
Monday, December 22, 2008
Sunday, December 21, 2008
Five and a Half Ways to Amp Up Your Search EngineOptimization
Statistics show that 85% of pages visited on the Internet come from people who have gotten there from a search engine. Statistically, people look first at the top of the first page of the regular search results, then the bottom, and then they go to the sponsored listings.
There is an art and science to being ranked highly on the search engines. The science is formatting the pages with the right meta tags and submitting them in the right way to the search engines. The art is to make the site look and read normal in spite of filling it with key words.
Here are five and a half ways to get a higher ranking and more visitors:
1. Pick the right Key Words and Phrases
These are the words and phrases that people will put into search engines to try to find your product, business or organization. Having good key words and phrases is foundational to have good optimization. This takes research using such tools at Wordtracker and Overture’s Keyword Suggestion Tool. They give you a good idea of what people are searching for and what you should focus on.
2. Use Good Header Tags
Header tags are hidden in the code within your Web page. The most important one is the "title" tag, which isn’t considered a META tag. It tells what’s within your page and it’s important to have your keyphrases in it. It is also good to have keyphrases in your "description" META tag, though it doesn’t rank nearly as high as the "title" tag.
3. Use Keyphrases in Your Visible Page Title
Provide a unique title to each page on your site that is chock full of key words and phrases. Search engines like this because it means that there is a higher probability that your site is a good match for what people are looking for. This is should be placed within the H1 tag (top heading) of your page and is visible to the visitor. It also pays to have your keyphrases in subtitles on the page.
4. Provide Plenty of Content on Your Site
Shoot to have at least 450 characters on your page. Concentrate on putting key words and phrases in the first paragraph and last paragraphs.
5. Secure a Lot of Related Incoming Links
The more sites linked to your site, the higher you will be ranked by the search engines. These links can be from strategic partners, vendors, directories or other types of sites with whom you exchange links.
If you are a web site developer, put in your contract that you are going to put a developer’s link at the bottom of the site, such as, "Web site design by Green Chair Marketing Group," with an active link to your site. This will help your site grow in its link popularity.
5.5 Keep Optimizing Your Site
The more content on your site, the better. I suggest adding a couple pages a month, whether it’s case studies, more product information, testimonials, articles, press releases, etc. If you add just five new pages a month, you will have 60 new pages by the end of the year, and over 100 pages by the end of the second year.
You are bound to catch some people you would have missed because there is more content to choose from. And your site will be more highly ranked by Google, because they highly weigh sites that have more content.
While you’re at it, continue to get relevant links coming into your site. Google loves incoming links. And you might have people click through to your site from these other places.
If you don’t have time to work on the optimization or would feel more comfortable having someone else do it, consider strongly hiring a professional to do your search engine optimization. That way you can focus your energies on sales or creating more and better product.
One caveat, I would stay away from companies that initiate contact with you through emails or phone calls. They often use techniques that can get your severely penalized by the search engines. Ask people you know who have been successful in their search engine positioning who they use.
There is an art and science to being ranked highly on the search engines. The science is formatting the pages with the right meta tags and submitting them in the right way to the search engines. The art is to make the site look and read normal in spite of filling it with key words.
Here are five and a half ways to get a higher ranking and more visitors:
1. Pick the right Key Words and Phrases
These are the words and phrases that people will put into search engines to try to find your product, business or organization. Having good key words and phrases is foundational to have good optimization. This takes research using such tools at Wordtracker and Overture’s Keyword Suggestion Tool. They give you a good idea of what people are searching for and what you should focus on.
2. Use Good Header Tags
Header tags are hidden in the code within your Web page. The most important one is the "title" tag, which isn’t considered a META tag. It tells what’s within your page and it’s important to have your keyphrases in it. It is also good to have keyphrases in your "description" META tag, though it doesn’t rank nearly as high as the "title" tag.
3. Use Keyphrases in Your Visible Page Title
Provide a unique title to each page on your site that is chock full of key words and phrases. Search engines like this because it means that there is a higher probability that your site is a good match for what people are looking for. This is should be placed within the H1 tag (top heading) of your page and is visible to the visitor. It also pays to have your keyphrases in subtitles on the page.
4. Provide Plenty of Content on Your Site
Shoot to have at least 450 characters on your page. Concentrate on putting key words and phrases in the first paragraph and last paragraphs.
5. Secure a Lot of Related Incoming Links
The more sites linked to your site, the higher you will be ranked by the search engines. These links can be from strategic partners, vendors, directories or other types of sites with whom you exchange links.
If you are a web site developer, put in your contract that you are going to put a developer’s link at the bottom of the site, such as, "Web site design by Green Chair Marketing Group," with an active link to your site. This will help your site grow in its link popularity.
5.5 Keep Optimizing Your Site
The more content on your site, the better. I suggest adding a couple pages a month, whether it’s case studies, more product information, testimonials, articles, press releases, etc. If you add just five new pages a month, you will have 60 new pages by the end of the year, and over 100 pages by the end of the second year.
You are bound to catch some people you would have missed because there is more content to choose from. And your site will be more highly ranked by Google, because they highly weigh sites that have more content.
While you’re at it, continue to get relevant links coming into your site. Google loves incoming links. And you might have people click through to your site from these other places.
If you don’t have time to work on the optimization or would feel more comfortable having someone else do it, consider strongly hiring a professional to do your search engine optimization. That way you can focus your energies on sales or creating more and better product.
One caveat, I would stay away from companies that initiate contact with you through emails or phone calls. They often use techniques that can get your severely penalized by the search engines. Ask people you know who have been successful in their search engine positioning who they use.
Thursday, December 18, 2008
Microsoft CRM – Typical Customizations
Microsoft CRM was designed to be easily customizable. Microsoft CRM Software Development Kit (MS CRM SDK) which you can download from Microsoft website contains descriptions of the objects or classes, exposed for customization. It has sample code in C# and partially in VB.Net. In Visual Studio.Net you can analyze all the classes, used by Microsoft developers to create MS CRM - you will discover that most of them are not documented in MS CRM SDK. Microsoft will not support your customization if you use undocumented class or do direct SQL access to CRM database.
Let us describe you - programmer, software developer typical cases of MS CRM Customizations.
1. Integration with SQL Server application. If you have legacy system on MS SQL Server - let's say you are transportation company and have in-house developed cargo tracking database. Now in MS CRM you want lookup the shipments for the customer (or account in CRM). This is SDK programming and calling SQL stored proc to retrieve cargo info. Instead of SQL Server you can have other database (ORACLE, MS Access, PervasiveSQL to name a few) - you can access multiple Database platforms via ADO.Net connection from your .Net application, which is easily integrated into MS CRM Account screen.
2. Email capturing in MS CRM. You have customer with email Bill@customer.com. Now you want all the emails that you receive from customer.com domain to be attached to Bill who is account in CRM. This is more difficult customization - you have to create MS CRM SDK web service, that one will be creating email activity and call it from COM+ application - Microsoft Exchange event handler (ONSYNCSAVE database event sink). This example maybe complicated with the following requirement. Imagine that Bill, instead of answering to your email (sent from CRM and processed by CRM-Exchange connector) sends you new message from MS Outlook. Then this email will not follow into MS CRM (because it doesn't have GUID in the header and so is ignored by CRM Exchange connector). If you want to capture these emails - you have to do it in Microsoft Exchange event sink. There maybe scenario when you want to capture and analyze in the sink all the outgoing emails - this is even more complex - y!
ou have to place the sink on transport event.
3. ASP Application integration. You have legacy ASP application, where you capture orders from your customers and you want these orders be transferred to the CRM as activity. Here you understand that ASP doesn't deploy Active Directory security - and the best way is to create HTTP handler and call it from your ASP page. This HTTP handler in turn will call MS CRM SDK web service with predefined (web.config) Active Directory credentials.
Some cautions. Never create your custom SQL objects (like stored procedure, SQL view, table) in MS CRM database. Instead, create your own database and place your objects there. When you see the first caution - you will never try to alter existing CRM objects, like adding new field to the table.
Let us describe you - programmer, software developer typical cases of MS CRM Customizations.
1. Integration with SQL Server application. If you have legacy system on MS SQL Server - let's say you are transportation company and have in-house developed cargo tracking database. Now in MS CRM you want lookup the shipments for the customer (or account in CRM). This is SDK programming and calling SQL stored proc to retrieve cargo info. Instead of SQL Server you can have other database (ORACLE, MS Access, PervasiveSQL to name a few) - you can access multiple Database platforms via ADO.Net connection from your .Net application, which is easily integrated into MS CRM Account screen.
2. Email capturing in MS CRM. You have customer with email Bill@customer.com. Now you want all the emails that you receive from customer.com domain to be attached to Bill who is account in CRM. This is more difficult customization - you have to create MS CRM SDK web service, that one will be creating email activity and call it from COM+ application - Microsoft Exchange event handler (ONSYNCSAVE database event sink). This example maybe complicated with the following requirement. Imagine that Bill, instead of answering to your email (sent from CRM and processed by CRM-Exchange connector) sends you new message from MS Outlook. Then this email will not follow into MS CRM (because it doesn't have GUID in the header and so is ignored by CRM Exchange connector). If you want to capture these emails - you have to do it in Microsoft Exchange event sink. There maybe scenario when you want to capture and analyze in the sink all the outgoing emails - this is even more complex - y!
ou have to place the sink on transport event.
3. ASP Application integration. You have legacy ASP application, where you capture orders from your customers and you want these orders be transferred to the CRM as activity. Here you understand that ASP doesn't deploy Active Directory security - and the best way is to create HTTP handler and call it from your ASP page. This HTTP handler in turn will call MS CRM SDK web service with predefined (web.config) Active Directory credentials.
Some cautions. Never create your custom SQL objects (like stored procedure, SQL view, table) in MS CRM database. Instead, create your own database and place your objects there. When you see the first caution - you will never try to alter existing CRM objects, like adding new field to the table.
Wednesday, December 17, 2008
What is a domain name and why would I want one?
In this article we will cover the basics of what a domain name is, how they work and why you need to have at least one. I am going to try and avoid complicated computer terms and stick to explanations that should be easily understood by someone without a computer science degree.
What is a Domain Name? Before we can go into what a domain name is I'm going to tell you why we need them as the answers compliment each other. The Internet is just a really big collection of connected computers (a network). For the purpose of explaining domain names you can think of the Internet a bit like the phone system and just like the phone system every computer on the Internet has it's own phone number except an Internet phone number is called an IP addresses. This address is made up of up to 12 digits in the form 123.123.123.123, computers use these IP addresses to send information to each other over the Internet.
When the Internet was first created it quickly became clear that these IP addresses were not easy to remember and another method was need to make these addresses more human friendly. The solution to this was the Domain Name System (DNS). Basically the DNS is a really really big phone book for computers. When you type a web site address into your web browser it checks the DNS for that website name and finds the IP address. Once it has the IP address it can then send a message to that computer and ask it for the web page you wanted.
Ok so you know a domain name is part of a web site address but which part? Lets look at a website address so we can identify and discuss what bit of it is a domain name.
http://www.itxcel.com/index.html
The above address is the home page of the itXcel web site. It can be split into 3 main parts. The first part is http:// this just tells your web browser what kind of information it is going to get and how to get it. The last part is /index.html this is name of the files on the remote computer that you want your browser to get. The bit in the middle www.itxcel.com is a domain name. This is the name that your computer sends to the DNS to get back the IP address.
So you know what a domain name is and that there is a phone book called the DNS to change your easy to remember domain name into an IP address that you computer can understand. The Internet phone book (DNS) is special in that everyone on the Internet needs to be able to use it. This makes the DNS very very big (100+ million addresses big). Due to the size of this phone book it needed to have a carefully organised and managed structure.
Domain names themselves are split into different levels like a hierarchy. The DNS system uses this hierarchy to search the DNS for the IP address of the domain name it is trying to find. The last bit of a domain, in the previous example the com part is called the top level domain. There are a large selection of top level domains like com, net, org and info. There are also very similar endings called country level domains like uk and de. Each of the top level and country level domains are managed by a different organization, sometimes these are companies or non profit organizations and sometimes governments. In the domain business these organisations are referred to as the registries. Each registry looks after it's own part of the domain name system.
If you decide you want to use a domain name in the top level domain com, like mycompany.com you would have to have this name assigned by the registry that manages that top level domain (for .com a US company called VeriSign). The process of being assigned a domain name is called domain registration.
Domain registration is more like a lease than a purchase. You are renting the second level domain (the mycompany bit) from Verisign for a specific amount of time normally between 1 and 10 years at a time. Most of the organizations that allow you to register a second level domain charge a fee for each year that you register the domain for. With almost all domain names you are also given the option to renew your registration (lease) when it is close to running out (expiring).
Once you have registered a second level domain you are free to create as many third level domains (sometimes called sub domains) as you like. In our previous example the www is a sub domain of itxcel.com
Most of the registries that manage these top level domain names do not allow individuals or businesses to register domains directly with them. To register a domain you need to use a company like itXcel. We act as a registrar and send all the required information and the registration fee to the registry. Registrars are useful as they hide the differences that exist in each of the registries from the customer and provide a simple step by step process for registering a domain. A registrar also allows you to manage and track all your domains from one place rather than having to deal with a different company for each top level domain.
OK so I know what a domain name is, Why do need one? Can you image what a nightmare it would be if you had an email address like myname@123.246.128.255 or a web site address http://123.246.128.255/. These addresses are possible but not very easy to remember. Now if you register a domain name you could create an email address like myname@mycompany.com and a web site address like http://mycompany.com These are much easier to remember and look 100 times more professional.
One of the important points about registering a domain is that once done you have an exclusive right to use that domain for as long as you keep the domain registered in your name. If you do not renew a domain at the end of it's registration period it will again become available for registration by someone else. For this reason even if you don't want or need a web site at the moment, it's still a good idea to register a domain as soon as possible. Just imagine if your competition registered the domain name of your company or product. Although there is a process in place to retrieve these domain it can be long and complicated. It is definitely simpler to spend a little money up front to secure your chosen domain names.
To find out what domains are available and to quickly and cheaply register them visit http://www.itxcel.com now and enter your desired name in the domain search box.
What is a Domain Name? Before we can go into what a domain name is I'm going to tell you why we need them as the answers compliment each other. The Internet is just a really big collection of connected computers (a network). For the purpose of explaining domain names you can think of the Internet a bit like the phone system and just like the phone system every computer on the Internet has it's own phone number except an Internet phone number is called an IP addresses. This address is made up of up to 12 digits in the form 123.123.123.123, computers use these IP addresses to send information to each other over the Internet.
When the Internet was first created it quickly became clear that these IP addresses were not easy to remember and another method was need to make these addresses more human friendly. The solution to this was the Domain Name System (DNS). Basically the DNS is a really really big phone book for computers. When you type a web site address into your web browser it checks the DNS for that website name and finds the IP address. Once it has the IP address it can then send a message to that computer and ask it for the web page you wanted.
Ok so you know a domain name is part of a web site address but which part? Lets look at a website address so we can identify and discuss what bit of it is a domain name.
http://www.itxcel.com/index.html
The above address is the home page of the itXcel web site. It can be split into 3 main parts. The first part is http:// this just tells your web browser what kind of information it is going to get and how to get it. The last part is /index.html this is name of the files on the remote computer that you want your browser to get. The bit in the middle www.itxcel.com is a domain name. This is the name that your computer sends to the DNS to get back the IP address.
So you know what a domain name is and that there is a phone book called the DNS to change your easy to remember domain name into an IP address that you computer can understand. The Internet phone book (DNS) is special in that everyone on the Internet needs to be able to use it. This makes the DNS very very big (100+ million addresses big). Due to the size of this phone book it needed to have a carefully organised and managed structure.
Domain names themselves are split into different levels like a hierarchy. The DNS system uses this hierarchy to search the DNS for the IP address of the domain name it is trying to find. The last bit of a domain, in the previous example the com part is called the top level domain. There are a large selection of top level domains like com, net, org and info. There are also very similar endings called country level domains like uk and de. Each of the top level and country level domains are managed by a different organization, sometimes these are companies or non profit organizations and sometimes governments. In the domain business these organisations are referred to as the registries. Each registry looks after it's own part of the domain name system.
If you decide you want to use a domain name in the top level domain com, like mycompany.com you would have to have this name assigned by the registry that manages that top level domain (for .com a US company called VeriSign). The process of being assigned a domain name is called domain registration.
Domain registration is more like a lease than a purchase. You are renting the second level domain (the mycompany bit) from Verisign for a specific amount of time normally between 1 and 10 years at a time. Most of the organizations that allow you to register a second level domain charge a fee for each year that you register the domain for. With almost all domain names you are also given the option to renew your registration (lease) when it is close to running out (expiring).
Once you have registered a second level domain you are free to create as many third level domains (sometimes called sub domains) as you like. In our previous example the www is a sub domain of itxcel.com
Most of the registries that manage these top level domain names do not allow individuals or businesses to register domains directly with them. To register a domain you need to use a company like itXcel. We act as a registrar and send all the required information and the registration fee to the registry. Registrars are useful as they hide the differences that exist in each of the registries from the customer and provide a simple step by step process for registering a domain. A registrar also allows you to manage and track all your domains from one place rather than having to deal with a different company for each top level domain.
OK so I know what a domain name is, Why do need one? Can you image what a nightmare it would be if you had an email address like myname@123.246.128.255 or a web site address http://123.246.128.255/. These addresses are possible but not very easy to remember. Now if you register a domain name you could create an email address like myname@mycompany.com and a web site address like http://mycompany.com These are much easier to remember and look 100 times more professional.
One of the important points about registering a domain is that once done you have an exclusive right to use that domain for as long as you keep the domain registered in your name. If you do not renew a domain at the end of it's registration period it will again become available for registration by someone else. For this reason even if you don't want or need a web site at the moment, it's still a good idea to register a domain as soon as possible. Just imagine if your competition registered the domain name of your company or product. Although there is a process in place to retrieve these domain it can be long and complicated. It is definitely simpler to spend a little money up front to secure your chosen domain names.
To find out what domains are available and to quickly and cheaply register them visit http://www.itxcel.com now and enter your desired name in the domain search box.
Tuesday, December 16, 2008
Microsoft Great Plains Project Accounting – overview for IT Director/Controller
Microsoft Business Solutions is now in process of creating so called Microsoft Suites: Microsoft Financials, Microsoft Logistics, Microsoft Manufacturing, Microsoft Professional Services - this last one will be based on Solomon Project module. The long story of Great Plains Software Project Accounting - it was originally created by MatchData, which was bought by Great Plains in late 1990-th and renamed into Great Plains Project Accounting. Great Plains Project accounting future is uncertain - it will not ( according to rumors in Microsoft) become the base for one of the Microsoft suites. However right now it is used by variety of businesses and has good functionality to fit general project accounting needs.
Strong Points:
* It is very simple and intuitive - if you are certified accountant and know the GAAP on project accounting - you should be able to understand all the data flow and distribution in GL - Great Plains Project Accounting is following the rules.
* Simple budgeting and project tracking - if this is your goal - consider it, especially if you already have Great Plains implemented in your company.
* Microsoft SQL Server platform allows you to deploy all the industry tools, such as Crystal Reports, SQL Stored Procedures and Views
* Seamless integration into Great Plains interface - Great Plains Project Accounting is Dexterity-written module, so it is in Dexterity interface and security model.
Weak Points:
* Poor customization possibilities - I would say that Dexterity is now a good option here, because Project Accounting is itself Dexterity third party dictionary - Dexterity is good to customize core DYNAMICS.DIC, not third parties. VBA/Modifier are available but we would not recommend them, because they are now legacy technologies.
* Poor integration with Microsoft Office tools - as of right now Microsoft is in process of moving all its ERP packages: Great Plains, Navision, Solomon into .Net platform. So, this is where all the efforts are applied. Microsoft Office is now the second priority
Good luck deciding and implementing and if you have issues or concerns – we are here to help! If you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum.com
Strong Points:
* It is very simple and intuitive - if you are certified accountant and know the GAAP on project accounting - you should be able to understand all the data flow and distribution in GL - Great Plains Project Accounting is following the rules.
* Simple budgeting and project tracking - if this is your goal - consider it, especially if you already have Great Plains implemented in your company.
* Microsoft SQL Server platform allows you to deploy all the industry tools, such as Crystal Reports, SQL Stored Procedures and Views
* Seamless integration into Great Plains interface - Great Plains Project Accounting is Dexterity-written module, so it is in Dexterity interface and security model.
Weak Points:
* Poor customization possibilities - I would say that Dexterity is now a good option here, because Project Accounting is itself Dexterity third party dictionary - Dexterity is good to customize core DYNAMICS.DIC, not third parties. VBA/Modifier are available but we would not recommend them, because they are now legacy technologies.
* Poor integration with Microsoft Office tools - as of right now Microsoft is in process of moving all its ERP packages: Great Plains, Navision, Solomon into .Net platform. So, this is where all the efforts are applied. Microsoft Office is now the second priority
Good luck deciding and implementing and if you have issues or concerns – we are here to help! If you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum.com
Monday, December 15, 2008
Get Personal With Google
Anyone who's been on the net any time at all knows that Google has been the search engine of choice for many for a while now. Whether that continues remains to be seen, but for now, with MSN still in development and Yahoo going through some growing pains, many still feel that Google is the leader. As such, it's worth dropping in to the Google Labs every now and then to see what's going on there.
For example, Google's Personalized search offers a fun and useful way for searchers to interact with part of the mysterious and closely-guarded Google search algorithm. You can set a search profile that's stored as a cookie on your computer. The easy-to-use Google profile interface allows you to pick specific topics that interest you. Once chosen and saved, you can then do a search from the Personalized search page. At first, you'll see normal Google results. But at the top of the page is a slider bar, and by moving this to the right, those same search results will be dynamically altered to narrow in to focus on your personalization settings.
For example, a standard search for "restaurants" (without the quotes), will return several large, well-known sites among the first 5 results. These include restaurants.com, zagat.com, restaurantrow.com, the official Subway corporate site, and the Yahoo restaurants directory. But let's say you've selected Texas as a geographic area of interest in your personalization profile. Move the personalization slide all the way to the right on the same search, and now the top 5 results are from guidelive.com, Landrysseafood.com, Houston Citysearch, and Austin360, followed by restaurants.com. Each of your personalized results are marked with small spheres of red, blue, and yellow.
There are many personalization topics to choose from, including Arts, Business, Computers, Health, and many other categories which can be further narrowed.
For example, Google's Personalized search offers a fun and useful way for searchers to interact with part of the mysterious and closely-guarded Google search algorithm. You can set a search profile that's stored as a cookie on your computer. The easy-to-use Google profile interface allows you to pick specific topics that interest you. Once chosen and saved, you can then do a search from the Personalized search page. At first, you'll see normal Google results. But at the top of the page is a slider bar, and by moving this to the right, those same search results will be dynamically altered to narrow in to focus on your personalization settings.
For example, a standard search for "restaurants" (without the quotes), will return several large, well-known sites among the first 5 results. These include restaurants.com, zagat.com, restaurantrow.com, the official Subway corporate site, and the Yahoo restaurants directory. But let's say you've selected Texas as a geographic area of interest in your personalization profile. Move the personalization slide all the way to the right on the same search, and now the top 5 results are from guidelive.com, Landrysseafood.com, Houston Citysearch, and Austin360, followed by restaurants.com. Each of your personalized results are marked with small spheres of red, blue, and yellow.
There are many personalization topics to choose from, including Arts, Business, Computers, Health, and many other categories which can be further narrowed.
Sunday, December 14, 2008
To The Next Level With Google Groups 2
If you haven't visited the Google Labs lately, they have released a beta of Google Groups 2 that you may want to check out. This is Google's answer to Yahoo Groups, and they've added some new features to make their service more useful.
For those who don't know, such groups allow anyone to easily and quickly start their own announcement lists and discussion forums. There is no need to install scripts or anything else on a web site, and no technical knowledge beyond email and posting to a discussion board is needed. If you want, you can use Google Groups to post to and read Usenet postings as well.
Of course, nothing is truly free, and Google Groups is no different. In exchange for making the technology available to host your group, Google displays relevant text ads on your group's home page on Google. "Relevant" is determined by the content of your Google Group discussions. This is the same type of technology used by Google to display AdSense advertising on web sites and relevant text advertising on their free Gmail email service.
The process to create a group is fast and painless. Just create your group's name and email address, and invite your members to join. You are able to make your group either public or private, and Google has provided a new interface so that you can see your group's postings sorted any of several different ways. The Beta 2 Google Groups also features dynamic conversations, with both Usenet and mailing list postings created within 10 seconds, and indexed within 10 minutes from post.
Families, old college running buddies, online communities, and many others may find benefit in using Google Groups, and the Beta 2 release is worth a try.
For those who don't know, such groups allow anyone to easily and quickly start their own announcement lists and discussion forums. There is no need to install scripts or anything else on a web site, and no technical knowledge beyond email and posting to a discussion board is needed. If you want, you can use Google Groups to post to and read Usenet postings as well.
Of course, nothing is truly free, and Google Groups is no different. In exchange for making the technology available to host your group, Google displays relevant text ads on your group's home page on Google. "Relevant" is determined by the content of your Google Group discussions. This is the same type of technology used by Google to display AdSense advertising on web sites and relevant text advertising on their free Gmail email service.
The process to create a group is fast and painless. Just create your group's name and email address, and invite your members to join. You are able to make your group either public or private, and Google has provided a new interface so that you can see your group's postings sorted any of several different ways. The Beta 2 Google Groups also features dynamic conversations, with both Usenet and mailing list postings created within 10 seconds, and indexed within 10 minutes from post.
Families, old college running buddies, online communities, and many others may find benefit in using Google Groups, and the Beta 2 release is worth a try.
Saturday, December 13, 2008
Destination: Desktop for Google
First we had the original Google search that evolved into the leader in its class. In fact, it became so popular that the word "google" worked its way into our everyday language as a verb, as in "to google" something. Google later introduced a toolbar that was plug-in for some browsers like Internet Explorer. The Google toolbar features a direct Google search box with quick access to image and group searches, a pop-up blocker, and for Internet marketers mostly, a PageRank (PR) indicator.
With competition like Yahoo and MSN threatening to start nipping at Google's heels, Google has introduced several new services to try to stay ahead of the pack. Recently they introduced Gmail, their web-based free email service (currently offered by invitation only). And still in the Google lab is the Google Deskbar (for Windows users only).
The Google deskbar is a plug-in that resides in the Windows taskbar, the little control panel that contains your start button, perhaps some quick launch icons, the clock, and the system tray. Search engines and marketers have realized that to maintain and increase their competitive status, they will need to find ways to get surfers and customers to invite them to their desktops.
The deskbar features quick access to Google's results, no matter which application you're currently using. Researching a class report? Check facts and sources quickly. Working in Excel? Look up the formula to calculate the volume of a tube easily. Following breaking news? Check it from the deskbar without leaving Photoshop! You'll be able to preview your search results with the small "floater" window that will close automatically.
From students to senior executives, from casual surfers to serious Internet marketers, the Google Deskbar may add to your productivity and fun online. It's worth a look.
With competition like Yahoo and MSN threatening to start nipping at Google's heels, Google has introduced several new services to try to stay ahead of the pack. Recently they introduced Gmail, their web-based free email service (currently offered by invitation only). And still in the Google lab is the Google Deskbar (for Windows users only).
The Google deskbar is a plug-in that resides in the Windows taskbar, the little control panel that contains your start button, perhaps some quick launch icons, the clock, and the system tray. Search engines and marketers have realized that to maintain and increase their competitive status, they will need to find ways to get surfers and customers to invite them to their desktops.
The deskbar features quick access to Google's results, no matter which application you're currently using. Researching a class report? Check facts and sources quickly. Working in Excel? Look up the formula to calculate the volume of a tube easily. Following breaking news? Check it from the deskbar without leaving Photoshop! You'll be able to preview your search results with the small "floater" window that will close automatically.
From students to senior executives, from casual surfers to serious Internet marketers, the Google Deskbar may add to your productivity and fun online. It's worth a look.
Great Plains Customization Upgrade– overview for CIO/IT Director
When Microsoft bought Great Plains Software, then Navision it formed special subdivision - Microsoft Business Solutions. Several accounting/ERP systems: Great Plains Dynamics/eEnterprise, Navision Attain, Axapta, Solomon, later QuickSell - all written in different programming languages and manner and on different DB platforms were in Microsoft disposition at this time. While assuring existing customers in its commitment to support all these applications, Microsoft had to develop unification strategy. Around the same time Microsoft made its move with .Net introduction and tried to gain portion of cheaper databases market: Pervasive SQL/Btrieve, Ctree/Faircom - and launched free MSDE database program. General direction for all its accounting systems was chosen - Microsoft announced future releases of so called Microsoft suites: Microsoft Financial, Microsoft HR, Microsoft Logistics, Microsoft Manufacturing to name a few. However Microsoft did not announce which product (!
Great Plains, Solomon or Navision) will become the base or will be transformed into each specific suite. Al these suites will be integrated into web-based Microsoft Business Portal
This move, probably wise in the long run, exposed businesses with heavily customized MBS products to serious customization upgrade problems. We'll give you our recommendation, based on our practice. In this article we'll talk about Microsoft Great Plains.
1. Great Plains Dexterity Customizations – Microsoft announced that its products will be moved to .Net platform. This means that Dexterity will be phased out/discontinued. However, even now Microsoft Great Plains 8.0 is still Dexterity-based application. So, if you have Dexterity customization - our recommendation is to phase it out or consider replacing it with these: Crystal Reports, SQL Stored Procs and triggers, Web Publishing (Visual Studio.Net) from Great Plains database, eConnect (SDK created to eCommerce developers to deploy Great Plains as back end)
2. Pervasive SQL/Ctree migration to MS SQL - If you are still on these old platforms - then you are in trouble - you will be without Microsoft technical support by the end of 2004. When you do standard data migration via migration tool - Great Plains tables are migrated by the tool, however migration tooll has no info about your custom tables - these tables should be migrated manually. You can use MSSQL Server Linked Server construction to link to Pervasive/Ctree data. ODBC drivers can be installed from GP CDs.
3. VBA/Modifier/Continuum – all these are good candidates for replacement by newer technologies, because these will not have their place in .Net platform.
Additional notes: When Great Plains Software designed Dexterity as the replacement to its discontinued Great Plains Accounting - it proclaimed that Dexterity is DB independent - which is true to some extent. However there are specifics, and Dexterity customization should be analyzed and tuned to work with MS SQL Server, if it was originally designed for btrieve/ctree. We are talking about customization upgrade for Great Plains Dynamics/eEnterprise 5.0, 5.5, 6.0, 7.0 to Microsoft Great Plains 8.0 or 7.5.
Great Plains, Solomon or Navision) will become the base or will be transformed into each specific suite. Al these suites will be integrated into web-based Microsoft Business Portal
This move, probably wise in the long run, exposed businesses with heavily customized MBS products to serious customization upgrade problems. We'll give you our recommendation, based on our practice. In this article we'll talk about Microsoft Great Plains.
1. Great Plains Dexterity Customizations – Microsoft announced that its products will be moved to .Net platform. This means that Dexterity will be phased out/discontinued. However, even now Microsoft Great Plains 8.0 is still Dexterity-based application. So, if you have Dexterity customization - our recommendation is to phase it out or consider replacing it with these: Crystal Reports, SQL Stored Procs and triggers, Web Publishing (Visual Studio.Net) from Great Plains database, eConnect (SDK created to eCommerce developers to deploy Great Plains as back end)
2. Pervasive SQL/Ctree migration to MS SQL - If you are still on these old platforms - then you are in trouble - you will be without Microsoft technical support by the end of 2004. When you do standard data migration via migration tool - Great Plains tables are migrated by the tool, however migration tooll has no info about your custom tables - these tables should be migrated manually. You can use MSSQL Server Linked Server construction to link to Pervasive/Ctree data. ODBC drivers can be installed from GP CDs.
3. VBA/Modifier/Continuum – all these are good candidates for replacement by newer technologies, because these will not have their place in .Net platform.
Additional notes: When Great Plains Software designed Dexterity as the replacement to its discontinued Great Plains Accounting - it proclaimed that Dexterity is DB independent - which is true to some extent. However there are specifics, and Dexterity customization should be analyzed and tuned to work with MS SQL Server, if it was originally designed for btrieve/ctree. We are talking about customization upgrade for Great Plains Dynamics/eEnterprise 5.0, 5.5, 6.0, 7.0 to Microsoft Great Plains 8.0 or 7.5.
Friday, December 12, 2008
Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?
The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgagerelated issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgagerelated issues do concern information security.
It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mindboggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.
Since the companies have filed for bankruptcy and are no more, the potential victims involved have no legal recourse, and are left to fend for themselves. In a way, it makes sense that companies that have filed for bankruptcy are behaving this way. (Not that I'm saying this is proper procedure.) For starters, if a company does wrong, one goes after the company; however, the company has filed for bankruptcy, it is no more, so there's no one to "go after." In light of the company status, this means that the actual person remaining behind to dispose of things, be they desks or credit applications, can opt to do whatever he feels like. He could shred the applications. He could dump them nearby. He could walk away and let the building's owner take care of them. What does he care? It's not as if he's gonna get fired.
Also, proper disposal requires either time, money, or both. A bankrupt company doesn't have money. It may have time, assuming people are going to stick around, but chances are their shredder has been seized by creditors. People are not going to stick around to shred things by hand, literally.
Aren't there any laws regulating this? Apparently, such issues are covered by FACTA, the Fair and Accurate Credit Transactions Act, and although its guidelines require that "businesses to dispose of sensitive financial documents in a way that protects against 'unauthorized access to or use of the information'" [msnbc.com], it stops short of requiring the physical destruction of data. I'm not a lawyer, but perhaps there's enough leeway in the language for one to go around dropping sensitive documents in dumpsters?
Like I mentioned before, inappropriate disposal of sensitive documents has been going on forever; I'm pretty sure this has been a problem since the very first mortgage was issued. My personal belief is that most companies would act responsibly and try to properly dispose of such information. But, this may prove to be a point of concern as well because of widespread misconceptions of what it means to protect data against unauthorized access.
What happens if a company that files for bankruptcy decides to sell their company computers to pay off creditors? Most people would delete the information found in the computer, and that's that-end of story. Except, it's not. When files are deleted, the actual data still resides in the hard disks; it's just that the computer's operating system doesn't have a way to find the information anymore. Indeed, this is how retail data restoration applications such as Norton are able to recover accidentally deleted files.
Some may be aware of this and decide to format the entire computer before sending it off to the new owners. The problem with this approach is the same as deleting files: data recovery is a cinch with the right software. Some of them retail for $30 or less-as in free. So, the sensitive data that's supposed to be deleted can be recovered, if not easily, at least cheaply-perhaps by people with criminal interests.
Am I being paranoid? I don't think so. I've been tracking fraud for years now, and I can't help but conclude that the criminal underworld has plenty of people looking to be niche operators, not to mention that there are infinitesimal ways of defrauding people (look up "salad oil" and "American Express," for an example). An identification theft ring looking to collect sensitive information from bankrupt mortgage dealers wouldn't surprise me, especially in an environment where such companies are dropping left and right.
The economics behind it make sense as well. A used computer will retail anywhere from $100 to $500. The information in it, if not wiped correctly, will average many times more even if you factor in the purchase of data recovery software. Criminals have different ways of capitalizing on personal data, ranging from selling the information outright to engaging in something with better returns.
Is there a better way to protect oneself? Whole disk encryption is a way to ensure that such problems do not occur: One can just reformat the encrypted drive itself to install a new OS; the original data remains encrypted, so there's no way to extract the data. Plus, the added benefit is that the data is protected in the event that a computer gets lost or stolen. However, commonsense dictates that encryption is something ongoing concerns sign up for, not businesses about to go bankrupt. My guess is that sooner or later we'll find instances of data breaches originating from equipment being traced back to bankrupt mortgage dealers.
Wednesday, December 10, 2008
Web Copy – How Much is Enough?
These days, there’s widespread acceptance that a website is an integral part of the marketing plan of any business. Likewise, it’s commonly accepted that web copy is a vital component of any website. But how much web copy is enough?
The pure volume of information available on the Internet is daunting – often counterproductive. There are approximately 550 billion documents on the web, and every day another 7 million are added. According to an A.T. Kearney, Network Publishing study (April 2001), workers take so long trying to find information that it costs organizations $750 billion annually!
Yet people continue to use it. Information gathering is the most common use of the Internet (American Express survey, 2000). And it seems work-related searches are amongst the most common, with 48% of people using the Internet to find work-related information, as opposed to 7% who use magazines (Lyra Research, 2001).
Interestingly, however, the average person visits no more than 19 websites in the entire month in order to avoid information overload (Nielsen NetRatings in Jan 2001).
So how do you ensure your site is one of those 19? How do you make your content helpful without making it overwhelming? That’s what this article is about…
I’ve written several articles on WHAT to write on your website in order to make it helpful. (See http://www.divinewrite.com/benefits.htm, http://www.divinewrite.com/webbenefitwriting.htm, and http://www.divinewrite.com/webwriting.htm.) But that’s only half the battle… Businesses also need to know HOW MUCH to write. Here are 5 quick rules of thumb to help you decide how much is enough.
1) Know your audience (Reader or Search Engine?)
Think about whether you’re targeting human readers (potential customers) or search engines. This must always be one of your very first questions, as the answer will determine your approach to content.
In general, human readers think less is more. Search engines, on the other hand, think more is more (well, more or less…). In many ways, it comes down to a question of quality versus quantity. Human readers are interested in quality, whereas search engines are interested quantity. Human readers want you to answer their questions and make it clear how you can benefit them. And they don’t want to wade through volumes of text. Search engines want a high word count, full of relevant keywords, and short on diagrams. (See http://www.divinewrite.com/seocopy.htm for more information on writing for search engines. See http://www.divinewrite.com/SEOCEO.htm for an introductory article on search engine optimization.)
You need to think carefully about your audience. In most cases, it’ll be a trade-off. A high search engine ranking is important (or at least beneficial) to most businesses, so a happy medium is required. The following tips will go some way toward providing this balance.
2) Make it concise
Say everything you need to say, but always ask, “Can I say it with fewer words?” The literary world may be impressed by complex writing, but visitors aren’t. Keep it simple, and keep it brief. Your home page shouldn’t be more than 1 screen long. In other words, visitors shouldn’t have to scroll. Subsequent pages can be longer, but try to keep them to a maximum of about 300-400 words each (approximately 1 scroll). A lot of people will tell you that you also need 300-400 words or more on your home page for a good search engine ranking. You don’t. If you focus on the right keywords and generate a lot of links to your site, you can achieve a high ranking without losing your readers’ interest by padding
TIP: For most businesses, a good rule of thumb is to make it conversational. Old school writers and would-be writers oppose conversational copy; don’t listen to them. Unless you’re writing for an old-school audience, feel free to write as people talk.
3) One subject per page
On this, both readers and search engines agree. Don’t try and squeeze too much information onto a single page. For example, instead of trying to detail all of your products on a single Products page, use the page to introduce and summarize your product suite, then link to a separate page per product. This way, your content will be easier to write, your readers won’t be overwhelmed, and you’ll be able to focus on fewer keywords (so the search engines will get a clearer picture of what you do).
4) Make it scannable
According to a 1998 Sun Microsystems study, reading from a monitor is 25% slower than reading from paper. As a result, 79% of users scan read when online. So make sure you accommodate scanning. Use headings and sub-headings. Highlight important words and sections. Use bulleted lists and numbered lists. Use tables. Use statistics. Use meaningful indenting. Use short sentences. Most importantly, be consistent in your usage. Oh… and follow rules 2 and 3 above.
5) Use a simple menu structure
Try to keep your high-level menu (Home, About Us, Contacts, Products, Services, etc.) to a maximum of about 10 items (5-8 is ideal). If you have too many options, your site will seem unstructured and your visitors won’t know where to start. In order for a visitor to want to come back to your site, they need to feel comfortable when they’re there. They need to know what to expect. If they can’t identify any logic in your menu structure, they will always feel lost. What’s more, this lack of structure will reflect badly on your business.
The Internet can be an incredibly cost-effective form of promotion because the cost per word to publish is so low. Don’t be fooled into thinking more is more just because it costs less. Audiences – even search engines – don’t want everything; they just want enough.
Happy writing!
The pure volume of information available on the Internet is daunting – often counterproductive. There are approximately 550 billion documents on the web, and every day another 7 million are added. According to an A.T. Kearney, Network Publishing study (April 2001), workers take so long trying to find information that it costs organizations $750 billion annually!
Yet people continue to use it. Information gathering is the most common use of the Internet (American Express survey, 2000). And it seems work-related searches are amongst the most common, with 48% of people using the Internet to find work-related information, as opposed to 7% who use magazines (Lyra Research, 2001).
Interestingly, however, the average person visits no more than 19 websites in the entire month in order to avoid information overload (Nielsen NetRatings in Jan 2001).
So how do you ensure your site is one of those 19? How do you make your content helpful without making it overwhelming? That’s what this article is about…
I’ve written several articles on WHAT to write on your website in order to make it helpful. (See http://www.divinewrite.com/benefits.htm, http://www.divinewrite.com/webbenefitwriting.htm, and http://www.divinewrite.com/webwriting.htm.) But that’s only half the battle… Businesses also need to know HOW MUCH to write. Here are 5 quick rules of thumb to help you decide how much is enough.
1) Know your audience (Reader or Search Engine?)
Think about whether you’re targeting human readers (potential customers) or search engines. This must always be one of your very first questions, as the answer will determine your approach to content.
In general, human readers think less is more. Search engines, on the other hand, think more is more (well, more or less…). In many ways, it comes down to a question of quality versus quantity. Human readers are interested in quality, whereas search engines are interested quantity. Human readers want you to answer their questions and make it clear how you can benefit them. And they don’t want to wade through volumes of text. Search engines want a high word count, full of relevant keywords, and short on diagrams. (See http://www.divinewrite.com/seocopy.htm for more information on writing for search engines. See http://www.divinewrite.com/SEOCEO.htm for an introductory article on search engine optimization.)
You need to think carefully about your audience. In most cases, it’ll be a trade-off. A high search engine ranking is important (or at least beneficial) to most businesses, so a happy medium is required. The following tips will go some way toward providing this balance.
2) Make it concise
Say everything you need to say, but always ask, “Can I say it with fewer words?” The literary world may be impressed by complex writing, but visitors aren’t. Keep it simple, and keep it brief. Your home page shouldn’t be more than 1 screen long. In other words, visitors shouldn’t have to scroll. Subsequent pages can be longer, but try to keep them to a maximum of about 300-400 words each (approximately 1 scroll). A lot of people will tell you that you also need 300-400 words or more on your home page for a good search engine ranking. You don’t. If you focus on the right keywords and generate a lot of links to your site, you can achieve a high ranking without losing your readers’ interest by padding
TIP: For most businesses, a good rule of thumb is to make it conversational. Old school writers and would-be writers oppose conversational copy; don’t listen to them. Unless you’re writing for an old-school audience, feel free to write as people talk.
3) One subject per page
On this, both readers and search engines agree. Don’t try and squeeze too much information onto a single page. For example, instead of trying to detail all of your products on a single Products page, use the page to introduce and summarize your product suite, then link to a separate page per product. This way, your content will be easier to write, your readers won’t be overwhelmed, and you’ll be able to focus on fewer keywords (so the search engines will get a clearer picture of what you do).
4) Make it scannable
According to a 1998 Sun Microsystems study, reading from a monitor is 25% slower than reading from paper. As a result, 79% of users scan read when online. So make sure you accommodate scanning. Use headings and sub-headings. Highlight important words and sections. Use bulleted lists and numbered lists. Use tables. Use statistics. Use meaningful indenting. Use short sentences. Most importantly, be consistent in your usage. Oh… and follow rules 2 and 3 above.
5) Use a simple menu structure
Try to keep your high-level menu (Home, About Us, Contacts, Products, Services, etc.) to a maximum of about 10 items (5-8 is ideal). If you have too many options, your site will seem unstructured and your visitors won’t know where to start. In order for a visitor to want to come back to your site, they need to feel comfortable when they’re there. They need to know what to expect. If they can’t identify any logic in your menu structure, they will always feel lost. What’s more, this lack of structure will reflect badly on your business.
The Internet can be an incredibly cost-effective form of promotion because the cost per word to publish is so low. Don’t be fooled into thinking more is more just because it costs less. Audiences – even search engines – don’t want everything; they just want enough.
Happy writing!
Tuesday, December 9, 2008
Setting Up a Network -- Wired or Wireless?
To Wire or Not to Wire
Wireless networks are en vogue, but your installation won’t be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. This often involves installing cables through walls and ceilings and can present a challenge for anyone.
If the computers in your home or office are all within 500 feet of each other, a wireless network might be for you. A wireless network has no cables. It can connect computers on different floors of a building or even across the street. Aside from the obvious benefit of not having wires, wireless networks are more convenient since the setup, configuration, and reconfiguration can often be done within minutes, without extensive planning.
Wireless networks, however, are not as fast as wired networks. If you play computer games or want to view streaming video or other high-speed multimedia, a wireless network might not have enough capacity. But, if you just want to check e-mail and view web pages, a wireless network is a good choice. To install a wireless network, you need a Wireless Access Point and a wireless network card for each computer. You will need to buy a wireless network card for each desktop computer, although most newer laptops come equipped with one.
Security is not a large concern in a wired network, since someone would have to physically connect to a wired network to break in. In wireless networks, a car parked outside with a laptop could easily connect to your network if you don’t have proper security in place. To prevent this from happening, encrypt your wireless network connections, or set a password to access the network, or do both.
Do It Yourself or Call a Professional?
If you decide to use a wired network, consider whether you will install it yourself or hire a professional. If you have a small number of computers that are all situated very close to one another, you may be able to buy pre-assembled network cables and connect them yourself. If you need to wire multiple floors and lay wire through ceilings and walls, you need a professional installation. If you go this route, it is best to begin with a floor plan of your office or home, determine what your current needs are, and consider how the network design can be adapted to future needs. A professional installer should be familiar with EIA/TIA standards, local wiring and electrical codes, and making custom cables. Network cabling professionals are often judged by the neatness of their work, because sloppy cabling is more apt to deteriorate over time, harder to manage, and poses more of a fire risk.
Having a wireless network or a wired network is not mutually exclusive. Many small offices have a wired network in addition to one or more wireless networks, depending on their needs. Wireless networks are continuing to get faster, more secure, and less expensive. Wired networks will continue to coexist with wireless networks, often in the same homes and offices.
Wireless networks are en vogue, but your installation won’t be successful unless you chose the right type of network and set it up properly. Wired networks require that each computer be connected via a wire to a central location, called a switch or hub. This often involves installing cables through walls and ceilings and can present a challenge for anyone.
If the computers in your home or office are all within 500 feet of each other, a wireless network might be for you. A wireless network has no cables. It can connect computers on different floors of a building or even across the street. Aside from the obvious benefit of not having wires, wireless networks are more convenient since the setup, configuration, and reconfiguration can often be done within minutes, without extensive planning.
Wireless networks, however, are not as fast as wired networks. If you play computer games or want to view streaming video or other high-speed multimedia, a wireless network might not have enough capacity. But, if you just want to check e-mail and view web pages, a wireless network is a good choice. To install a wireless network, you need a Wireless Access Point and a wireless network card for each computer. You will need to buy a wireless network card for each desktop computer, although most newer laptops come equipped with one.
Security is not a large concern in a wired network, since someone would have to physically connect to a wired network to break in. In wireless networks, a car parked outside with a laptop could easily connect to your network if you don’t have proper security in place. To prevent this from happening, encrypt your wireless network connections, or set a password to access the network, or do both.
Do It Yourself or Call a Professional?
If you decide to use a wired network, consider whether you will install it yourself or hire a professional. If you have a small number of computers that are all situated very close to one another, you may be able to buy pre-assembled network cables and connect them yourself. If you need to wire multiple floors and lay wire through ceilings and walls, you need a professional installation. If you go this route, it is best to begin with a floor plan of your office or home, determine what your current needs are, and consider how the network design can be adapted to future needs. A professional installer should be familiar with EIA/TIA standards, local wiring and electrical codes, and making custom cables. Network cabling professionals are often judged by the neatness of their work, because sloppy cabling is more apt to deteriorate over time, harder to manage, and poses more of a fire risk.
Having a wireless network or a wired network is not mutually exclusive. Many small offices have a wired network in addition to one or more wireless networks, depending on their needs. Wireless networks are continuing to get faster, more secure, and less expensive. Wired networks will continue to coexist with wireless networks, often in the same homes and offices.
Your Computer Can't Keep Time
A computer needs a certain amount of information to operate; for example, the date and time, the amount of memory installed, the number of drives and their configuration, and so on. In the early days of computers, either the user typed in this information each time the computer started, or it was set using DIP switches and jumpers. Today, computers store this information in a CMOS chip that uses a small battery to retain the information when the computer is shut off.
CMOS (complementary metal oxide semiconductor) is type of chip that consumes very little power; therefore, while the computer is turned off, the battery discharges very slowly. But the battery will totally discharge if you leave your computer turned off for a year or so. Even if you turn your computer on every day, the battery is designed to last only a couple of years. Occasionally a battery will fail prematurely.
Today's plug-and-play computers can detect most of the necessary settings, but if your CMOS battery is dead, your computer will not be able to retain the date and time. The computer will also lose any custom settings, for example, the boot sequence. If you set a password in CMOS, you may be locked out of the computer. If the CMOS battery does fail, you might receive the message "System Configuration Lost" when you start the computer. It would be wise to record all the CMOS settings as a precaution.
To record the CMOS settings, watch for an on-screen prompt when you first start your computer. The prompt tells you to press a key, usually the Del or F2, to enter CMOS. To enter the CMOS configuration utility, you have to press the indicated key while the message is on the screen. After the CMOS configuration screen appears, follow the instructions provided to page through all the screens and record all the settings.
If your computer loses its time setting overnight, the CMOS battery may not be holding a charge. The CMOS battery is located inside the case on the motherboard. Changing the battery is usually a job for a computer technician. In fact, a layman might not even be able to find the battery.
If you want to locate the CMOS battery in your computer, be aware that a static discharge from your hands can damage components inside the case. After taking proper precautions, open the case and look on the motherboard for a battery. If you have a diagram of your motherboard, locate the battery on the diagram first.
Different motherboards use different types of batteries. The battery may be shaped like a barrel or a coin. Some motherboards use a component that resembles a chip which contains the CMOS and the battery (made by DALLAS or Benchmarq). Batteries come in different voltages, so make sure you get an exact replacement.
Sometimes the battery is mounted in a holder. Sometimes it is soldered to the motherboard. De-soldering and re-soldering a battery is usually a job for a computer technician. An inexperienced solderer can cause a lot of damage. If you want to try to do it yourself, first practice on an obsolete circuit board. You may change your mind.
If the CMOS battery has failed because it's too old, this might be an opportunity to upgrade your motherboard. When upgrading a motherboard, the most important considerations are to make sure the new motherboard is the correct form factor for your case, and that the new motherboard has the correct bus connector slots for your expansion boards.
CMOS (complementary metal oxide semiconductor) is type of chip that consumes very little power; therefore, while the computer is turned off, the battery discharges very slowly. But the battery will totally discharge if you leave your computer turned off for a year or so. Even if you turn your computer on every day, the battery is designed to last only a couple of years. Occasionally a battery will fail prematurely.
Today's plug-and-play computers can detect most of the necessary settings, but if your CMOS battery is dead, your computer will not be able to retain the date and time. The computer will also lose any custom settings, for example, the boot sequence. If you set a password in CMOS, you may be locked out of the computer. If the CMOS battery does fail, you might receive the message "System Configuration Lost" when you start the computer. It would be wise to record all the CMOS settings as a precaution.
To record the CMOS settings, watch for an on-screen prompt when you first start your computer. The prompt tells you to press a key, usually the Del or F2, to enter CMOS. To enter the CMOS configuration utility, you have to press the indicated key while the message is on the screen. After the CMOS configuration screen appears, follow the instructions provided to page through all the screens and record all the settings.
If your computer loses its time setting overnight, the CMOS battery may not be holding a charge. The CMOS battery is located inside the case on the motherboard. Changing the battery is usually a job for a computer technician. In fact, a layman might not even be able to find the battery.
If you want to locate the CMOS battery in your computer, be aware that a static discharge from your hands can damage components inside the case. After taking proper precautions, open the case and look on the motherboard for a battery. If you have a diagram of your motherboard, locate the battery on the diagram first.
Different motherboards use different types of batteries. The battery may be shaped like a barrel or a coin. Some motherboards use a component that resembles a chip which contains the CMOS and the battery (made by DALLAS or Benchmarq). Batteries come in different voltages, so make sure you get an exact replacement.
Sometimes the battery is mounted in a holder. Sometimes it is soldered to the motherboard. De-soldering and re-soldering a battery is usually a job for a computer technician. An inexperienced solderer can cause a lot of damage. If you want to try to do it yourself, first practice on an obsolete circuit board. You may change your mind.
If the CMOS battery has failed because it's too old, this might be an opportunity to upgrade your motherboard. When upgrading a motherboard, the most important considerations are to make sure the new motherboard is the correct form factor for your case, and that the new motherboard has the correct bus connector slots for your expansion boards.
The Development of Printer Ink Cartridges
With the introduction of the inkjet printer and printer ink cartridge in 1984, the task of printing your documents and changing printer ink cartridges became more convenient, reliable and cleaner than the previous methods of changing ribbons or inserting a toner cartridge.
Prior to 1984, the ink delivery systems were not as dependable as they are now. The inkjet system replaced the old dot matrix method, which required changing a ribbon. It wasn’t long before the printer industry began conceptualizing a new ink delivery technique, including the drop on demand method. Several companies were the driving forces behind developing the inkjet technology, and by 1990 the method was widely accepted. Today it is the method of choice for printing requirements, and will print both black and white documents as well as color graphics and photos.
The quality is excellent, thanks to the development of printer ink cartridges. It is possible to print on many different sizes and types of paper, fabric, film, etc. These printers are used in businesses, in schools and the homes of millions of people worldwide.
Each printer uses a specific printer ink cartridge, most often one each of black and color. Each cartridge is given an identifying number and lists the model number of each printer in which it can be used. While each printer manufacturer recommends its own brand of printer ink cartridge, it is possible to refill the cartridge yourself, or purchase a refilled, remanufactured or a compatible cartridge.
There are two types of refilled cartridges: You can do it yourself with a kit that allows you to refill your own cartridge. Refill kits are available at a very low price and are sometimes the choice of those who don’t mind doing the filling in order to save money. The other alternative is to buy a refilled cartridge from a manufacturer. This method involves drilling, filling and sealing an empty cartridge.
A remanufactured cartridge is an original printer ink cartridge that has been taken apart and outfitted with ink and new parts if necessary. It is then inspected and tested before being placed in the marketplace to re-sell. The workmanship in these cartridges is usually guaranteed against defects during the life of the cartridge. The lifetime is generally the same as the original, they are safe to use in all printers, and the warranty on your printer will not be affected. The cost is lower than the original.
Another kind of cartridge that has evolved in recent years is the “compatible” cartridge. Simply put, it is a cartridge that is built to the same specifications as those of the original manufacturer and is generally cheaper than the original. It is also guaranteed against defects during its lifetime.
Inkjet printers using printer ink cartridges have a bright future ahead, thanks to their capability to produce high-quality printed material quickly and inexpensively. The manufacturer’s printer ink cartridge is one option, and the use of alternative printer ink cartridges is another option. When shopping for printer ink cartridges, always buy from a reputable dealer. A huge inventory of hundreds of types of cartridges can also be found by shopping on the Internet, which is a convenient, safe and reliable method of finding the best deals on printer ink cartridges.
Prior to 1984, the ink delivery systems were not as dependable as they are now. The inkjet system replaced the old dot matrix method, which required changing a ribbon. It wasn’t long before the printer industry began conceptualizing a new ink delivery technique, including the drop on demand method. Several companies were the driving forces behind developing the inkjet technology, and by 1990 the method was widely accepted. Today it is the method of choice for printing requirements, and will print both black and white documents as well as color graphics and photos.
The quality is excellent, thanks to the development of printer ink cartridges. It is possible to print on many different sizes and types of paper, fabric, film, etc. These printers are used in businesses, in schools and the homes of millions of people worldwide.
Each printer uses a specific printer ink cartridge, most often one each of black and color. Each cartridge is given an identifying number and lists the model number of each printer in which it can be used. While each printer manufacturer recommends its own brand of printer ink cartridge, it is possible to refill the cartridge yourself, or purchase a refilled, remanufactured or a compatible cartridge.
There are two types of refilled cartridges: You can do it yourself with a kit that allows you to refill your own cartridge. Refill kits are available at a very low price and are sometimes the choice of those who don’t mind doing the filling in order to save money. The other alternative is to buy a refilled cartridge from a manufacturer. This method involves drilling, filling and sealing an empty cartridge.
A remanufactured cartridge is an original printer ink cartridge that has been taken apart and outfitted with ink and new parts if necessary. It is then inspected and tested before being placed in the marketplace to re-sell. The workmanship in these cartridges is usually guaranteed against defects during the life of the cartridge. The lifetime is generally the same as the original, they are safe to use in all printers, and the warranty on your printer will not be affected. The cost is lower than the original.
Another kind of cartridge that has evolved in recent years is the “compatible” cartridge. Simply put, it is a cartridge that is built to the same specifications as those of the original manufacturer and is generally cheaper than the original. It is also guaranteed against defects during its lifetime.
Inkjet printers using printer ink cartridges have a bright future ahead, thanks to their capability to produce high-quality printed material quickly and inexpensively. The manufacturer’s printer ink cartridge is one option, and the use of alternative printer ink cartridges is another option. When shopping for printer ink cartridges, always buy from a reputable dealer. A huge inventory of hundreds of types of cartridges can also be found by shopping on the Internet, which is a convenient, safe and reliable method of finding the best deals on printer ink cartridges.
How to Make the Most of Your Website Copywriter
Many people feel uncertain when dealing with copywriters. Like any artform, writing is subjective; instead of black and white, most business owners and marketing managers see indistinguishable shades of grey. But copywriting possesses one key element that most other forms of art don’t – a commercial imperative.
Because the copywriter’s audience is driven by the realities of the business market, so too is the copywriter. Although the good ones love to write, they don’t necessarily love to write about toilet paper and real-estate. Copywriters – in particular website copywriters – write because it’s their job. And like any job, copywriting has very defined objectives and parameters which determine how the copywriter works, and the kind of material they produce.
So, if you need black and white, this is where you’ll find it.
There are two primary commercial realities for a website copywriter. Understand these realities, and you’ll understand the writer. Ignore them, and your job will take longer, be more frustrating, be less engaging, and earn you less money.
REALITY 1 – READER-FRIENDLY AND SEARCH-ENGINE-FRIENDLY
A website copywriter needs to adhere to certain guidelines to ensure your website is both reader-friendly and search-engine-friendly. This is black and white.
Because most websites rely on search engines for their traffic, your website copywriter has to write for two broad audiences: human and computer. This introduces a number of complexities because, quite often, these audiences want different things.
For instance, with humans, less is generally more. But with computers, more is more. Humans need to understand, so the fewer words the better. Search engines, on the other hand, are programmed to think that anything important enough to be ranked highly has to have a lot of words. A website copywriter must balance these conflicting requirements. Your copywriter will work faster and more efficiently if you don’t demand too few words or too many.
TIP: If your site needs both humans and search engines, try not to set your heart on less than 100 words per page or more than 300 words. Generally speaking, somewhere in the middle is a nice compromise for both audiences.
And it’s not just the number of words used that’s important. Humans tend not to like repeated words, whereas search engines do. Humans will understand from your heading what it is you do, and if it’s relevant. Mention it once, and they’ll generally remember. Search engines are not so smart. They need to be told again and again. This is how they figure out how relevant your site is.
TIP: Don’t ask your website copywriter to be a minimalist. The search engines won’t like it. By the same token, don’t ask them to simply jam every page full of hundreds of your primary keyword phrases, because your human readers won’t like that (in fact, neither will the search engines). The trick is to expect each page to repeat one or two primary keyword phrases 5-10 times.
TIP: Remember, balancing human and computer requirements is time consuming. Try to have a clear understanding of the objective of each page before your writer starts. You’ll get a much better product with fewer time consuming iterations.
REALITY 2 – BENEFITS, AUDIENCES, PRODUCTS, SERVICES, FEATURES
A website copywriter deals in benefits, audiences, products, services, and features. This is black and white.
These things may be painfully obvious to you, but they won’t be to your copywriter. And although a good copywriter will be able to draw them out of you, they won’t be able to accurately and comprehensively identify them alone.
TIP: Before you engage a website copywriter, make a list of what you do, who you do it for, and what benefits it gives them. Your job will cost more if your brief consists of one line, “I want to increase sales!”
When it comes down to it, a good website is written around benefits. Customers are only interested in how you can benefit them. This means benefits are the website copywriter’s inspiration. By the end of the project, you’ll be sick and tired of hearing your copywriter ask, “But what are the benefits of that to your customer?” You’ll definitely thank them for asking though.
TIP: Don’t confuse features with benefits. A feature is what you do or how you do it. A benefit is what advantage that brings to the customer. Your list should make a clear distinction between the two. This will save your copywriter a LOT of time, and save you a lot of money. Most importantly, it will MAKE you a lot of money because your website will engage your customer.
Website copywriting is an artform. But because it’s an artform with a commercial foundation, it can be understood by anyone in business. And when you understand the commercial realities of the copywriter, the greys of the artform will begin to seem more like the familiar black and white of the nine-to-five. Then, and only then, will you be able to make the most of your website copywriter.
Because the copywriter’s audience is driven by the realities of the business market, so too is the copywriter. Although the good ones love to write, they don’t necessarily love to write about toilet paper and real-estate. Copywriters – in particular website copywriters – write because it’s their job. And like any job, copywriting has very defined objectives and parameters which determine how the copywriter works, and the kind of material they produce.
So, if you need black and white, this is where you’ll find it.
There are two primary commercial realities for a website copywriter. Understand these realities, and you’ll understand the writer. Ignore them, and your job will take longer, be more frustrating, be less engaging, and earn you less money.
REALITY 1 – READER-FRIENDLY AND SEARCH-ENGINE-FRIENDLY
A website copywriter needs to adhere to certain guidelines to ensure your website is both reader-friendly and search-engine-friendly. This is black and white.
Because most websites rely on search engines for their traffic, your website copywriter has to write for two broad audiences: human and computer. This introduces a number of complexities because, quite often, these audiences want different things.
For instance, with humans, less is generally more. But with computers, more is more. Humans need to understand, so the fewer words the better. Search engines, on the other hand, are programmed to think that anything important enough to be ranked highly has to have a lot of words. A website copywriter must balance these conflicting requirements. Your copywriter will work faster and more efficiently if you don’t demand too few words or too many.
TIP: If your site needs both humans and search engines, try not to set your heart on less than 100 words per page or more than 300 words. Generally speaking, somewhere in the middle is a nice compromise for both audiences.
And it’s not just the number of words used that’s important. Humans tend not to like repeated words, whereas search engines do. Humans will understand from your heading what it is you do, and if it’s relevant. Mention it once, and they’ll generally remember. Search engines are not so smart. They need to be told again and again. This is how they figure out how relevant your site is.
TIP: Don’t ask your website copywriter to be a minimalist. The search engines won’t like it. By the same token, don’t ask them to simply jam every page full of hundreds of your primary keyword phrases, because your human readers won’t like that (in fact, neither will the search engines). The trick is to expect each page to repeat one or two primary keyword phrases 5-10 times.
TIP: Remember, balancing human and computer requirements is time consuming. Try to have a clear understanding of the objective of each page before your writer starts. You’ll get a much better product with fewer time consuming iterations.
REALITY 2 – BENEFITS, AUDIENCES, PRODUCTS, SERVICES, FEATURES
A website copywriter deals in benefits, audiences, products, services, and features. This is black and white.
These things may be painfully obvious to you, but they won’t be to your copywriter. And although a good copywriter will be able to draw them out of you, they won’t be able to accurately and comprehensively identify them alone.
TIP: Before you engage a website copywriter, make a list of what you do, who you do it for, and what benefits it gives them. Your job will cost more if your brief consists of one line, “I want to increase sales!”
When it comes down to it, a good website is written around benefits. Customers are only interested in how you can benefit them. This means benefits are the website copywriter’s inspiration. By the end of the project, you’ll be sick and tired of hearing your copywriter ask, “But what are the benefits of that to your customer?” You’ll definitely thank them for asking though.
TIP: Don’t confuse features with benefits. A feature is what you do or how you do it. A benefit is what advantage that brings to the customer. Your list should make a clear distinction between the two. This will save your copywriter a LOT of time, and save you a lot of money. Most importantly, it will MAKE you a lot of money because your website will engage your customer.
Website copywriting is an artform. But because it’s an artform with a commercial foundation, it can be understood by anyone in business. And when you understand the commercial realities of the copywriter, the greys of the artform will begin to seem more like the familiar black and white of the nine-to-five. Then, and only then, will you be able to make the most of your website copywriter.
How To Format A Hard Drive
Here's how to format a hard drive (Legal Stuff: We are not responsible for any damages, lost data, or anything of the sort)...
If you have a computer, you surely know what a hard drive is. If you don't have one, or simply don't know what a hard drive is, then this article will begin with a short description of the hard drive. Then we will cover formating a hard drive...
Step 1: What Is A Hard Disk Drive?
A hard disk drive in computing is a type of storage device made up of hard disk platters, a spindle, read and write heads read and write arms, electrical motors, and integrated electronics contained inside an airtight enclosure.
Now you know what the hard drive is. Let's stick to the point and start with the information on the title of this article. How to format a hard disk drive....
Step 2...
First of all, you should have a reason if you really want to learn how to format a hard drive. But don't forget that formating a hard drive does NOT permanently delete your data!
Of course, when you format your hard drive you think that the data is really deleted, but that is not the case.
The fact is that the data you have "deleted" can be restored. Nonetheless, you should not experiment with formatting a hard drive because you never know what may happen. Of course, it also depends on the software you use, for example, there are such products that will permanently delete the data you want and then you can continue the process of how to format a hard drive.
Step 3...
In fact there is nothing so difficult in it. You first need to decide what operating system you intend to load after formating a hard drive.
It is best and easiest to use a boot disk for that Operating System, such as MS Dos6.2 or Windows95b or Windows98SE. You will need the proper Windows95/98 boot disk in order to load these operating systems on the computer, else it will reject loading due to the wrong Operating System on the computer.
Step 4...
Then you will have to insert your boot disk in the floppy drive and start the computer.
Once the system has completed booting and an A: prompt appears. You will need to type format C: /s and then press Enter. The function of this command is to tell the system to format your "C" drive and when it is finished to copy the system files to the drive.
The "/s" switches for "System". You can format a different drive this way by using a different drive letter.
Step 5...
After that you will see on the screen the following text: "WARNING, ALL DATA ON NON-REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y/N)?" and if you really want to continue, type [Y] and then press Enter.
Your screen should display the size of your drive and a countdown in percentage of formatting completed. Depending on your computer's speed and the size of the drive it can take from a few minutes to over 15 minutes.
When it reaches 100% complete, you will see a new message: FORMAT COMPLETE. SYSTEM TRANSFERRED. This message is to indicate that the files required to boot your computer from the hard drive have been copied from the floppy to the hard drive.
The computer can now boot from the hard drive without a boot disk in the floppy drive.
The last message that will appear on your screen is the following: "Volume label (11 characters, ENTER for none)?" You can either press any key to continue, or simply to press Enter. And now, you can finally begin to load your Operating System.
Keep in mind that you can receive an error message, which says "insufficient memory to load system files". If you do receive such message, do not worry. It is caused by the lack of a memory manager loaded at boot and your PC can only access the first 1mg of ram memory.
You can handle this situation with two options. The first one is to omit the /s switch when formatting. You should do it by typing this: FORMAT C: and then press Enter. Then when the format is complete, manually add the system files to your hard drive by using this command: SYS C: and press Enter again.
The second solution is to load a memory manager in order to overcome this issue. If you don't have any you can easily download one from one of the million sites on the Internet.
Step 6...
You see, we have finally reached the end of How To Format A Hard Drive. and consequently – the end of this article. Now you surely know how to format a hard drive. But, once again, don't play with the commands if you are not serious about formating a hard drive.
Even if the data is restorable you may do something wrong to your computer. That is why, you should be careful! And now, good luck!
If you have a computer, you surely know what a hard drive is. If you don't have one, or simply don't know what a hard drive is, then this article will begin with a short description of the hard drive. Then we will cover formating a hard drive...
Step 1: What Is A Hard Disk Drive?
A hard disk drive in computing is a type of storage device made up of hard disk platters, a spindle, read and write heads read and write arms, electrical motors, and integrated electronics contained inside an airtight enclosure.
Now you know what the hard drive is. Let's stick to the point and start with the information on the title of this article. How to format a hard disk drive....
Step 2...
First of all, you should have a reason if you really want to learn how to format a hard drive. But don't forget that formating a hard drive does NOT permanently delete your data!
Of course, when you format your hard drive you think that the data is really deleted, but that is not the case.
The fact is that the data you have "deleted" can be restored. Nonetheless, you should not experiment with formatting a hard drive because you never know what may happen. Of course, it also depends on the software you use, for example, there are such products that will permanently delete the data you want and then you can continue the process of how to format a hard drive.
Step 3...
In fact there is nothing so difficult in it. You first need to decide what operating system you intend to load after formating a hard drive.
It is best and easiest to use a boot disk for that Operating System, such as MS Dos6.2 or Windows95b or Windows98SE. You will need the proper Windows95/98 boot disk in order to load these operating systems on the computer, else it will reject loading due to the wrong Operating System on the computer.
Step 4...
Then you will have to insert your boot disk in the floppy drive and start the computer.
Once the system has completed booting and an A: prompt appears. You will need to type format C: /s and then press Enter. The function of this command is to tell the system to format your "C" drive and when it is finished to copy the system files to the drive.
The "/s" switches for "System". You can format a different drive this way by using a different drive letter.
Step 5...
After that you will see on the screen the following text: "WARNING, ALL DATA ON NON-REMOVABLE DISK DRIVE C: WILL BE LOST! Proceed with Format (Y/N)?" and if you really want to continue, type [Y] and then press Enter.
Your screen should display the size of your drive and a countdown in percentage of formatting completed. Depending on your computer's speed and the size of the drive it can take from a few minutes to over 15 minutes.
When it reaches 100% complete, you will see a new message: FORMAT COMPLETE. SYSTEM TRANSFERRED. This message is to indicate that the files required to boot your computer from the hard drive have been copied from the floppy to the hard drive.
The computer can now boot from the hard drive without a boot disk in the floppy drive.
The last message that will appear on your screen is the following: "Volume label (11 characters, ENTER for none)?" You can either press any key to continue, or simply to press Enter. And now, you can finally begin to load your Operating System.
Keep in mind that you can receive an error message, which says "insufficient memory to load system files". If you do receive such message, do not worry. It is caused by the lack of a memory manager loaded at boot and your PC can only access the first 1mg of ram memory.
You can handle this situation with two options. The first one is to omit the /s switch when formatting. You should do it by typing this: FORMAT C: and then press Enter. Then when the format is complete, manually add the system files to your hard drive by using this command: SYS C: and press Enter again.
The second solution is to load a memory manager in order to overcome this issue. If you don't have any you can easily download one from one of the million sites on the Internet.
Step 6...
You see, we have finally reached the end of How To Format A Hard Drive. and consequently – the end of this article. Now you surely know how to format a hard drive. But, once again, don't play with the commands if you are not serious about formating a hard drive.
Even if the data is restorable you may do something wrong to your computer. That is why, you should be careful! And now, good luck!
Got Virus?
GOT VIRUS? Your Data is NOT lost forever!
In the wake of so many computer viruses running wild, “Hope is not lost”!
With the recent release of such viruses as: mydoom; netsky; mofei, lovegate and many more destructive viruses, there is an affordable solution to recover your lost files from your hard drive.
Selecting a Data Recovery Service Company can be a challenging and confusing undertaking to say the least.
ECO Data Recovery located in Palm Beach Gardens, Florida has come to the rescue of many individuals, small business and large corporations around the world. When down time means lost revenue and it seems like there is no light at the end of the tunnel, you can always count on ECO Data Recovery to get you up and operating asap.
These days you never know when your computer system will go down due to viruses, sabotage or natural disaster. We suggest that everyone back-up their files regularly. Nobody ever wants to think about their hard drive crashing or a virus taking over their computer, so backing up your files is the last thing on your mind.
Often time is of the essence. We know that when your business is down, fast is never fast enough, therefore, ECO offers an expedited service for time sensitive situations.
As technology advances, so do the skills of what we refer to as “Hackers”. These “Hackers” are responsible for many of the damaged files we have recovered. As the “Hackers” skills evolve, so must our teams of engineers. We understand that there will always be some hacker out there with the goal of causing “chaos”. Eco Data Recovery will be there to undo the damage they may have done and get you up and running in the fastest time possible.
Viruses are not the only cause of lost files!
When a hard drive is making an awful noise, more often then not you have a hardware problem. ECO Chief Engineer, Sean Flanders, warns “If you hear strange noises emanating from your computer, shut it off immediately before further damage is incurred”.
When a drive is still grasping to life (barely spinning) many times people try the cheapest solution and attempt to run a data recovery software utility. This is a major mistake! “Attempting to utilize recovery software can make your data hard to salvage if not impossible in some cases. “These programs may write data on the drive which then overwrites your original data, making data recovery almost impossible”, states Brian Cain, VP of sales at ECO.
Take heed in the words of Charles Roover, President of Eco Data Recovery, “Be aware of the fate that could befall your computer and/or network and take precautions. Back-up your files often! Nobody likes to think about losing their data, however, when you have a disaster, we’re there to rescue you!”
Over the past 10 years ECO Data Recovery has saved many individuals and companies by retrieving their lost data! We’re only a phone call away!
In the wake of so many computer viruses running wild, “Hope is not lost”!
With the recent release of such viruses as: mydoom; netsky; mofei, lovegate and many more destructive viruses, there is an affordable solution to recover your lost files from your hard drive.
Selecting a Data Recovery Service Company can be a challenging and confusing undertaking to say the least.
ECO Data Recovery located in Palm Beach Gardens, Florida has come to the rescue of many individuals, small business and large corporations around the world. When down time means lost revenue and it seems like there is no light at the end of the tunnel, you can always count on ECO Data Recovery to get you up and operating asap.
These days you never know when your computer system will go down due to viruses, sabotage or natural disaster. We suggest that everyone back-up their files regularly. Nobody ever wants to think about their hard drive crashing or a virus taking over their computer, so backing up your files is the last thing on your mind.
Often time is of the essence. We know that when your business is down, fast is never fast enough, therefore, ECO offers an expedited service for time sensitive situations.
As technology advances, so do the skills of what we refer to as “Hackers”. These “Hackers” are responsible for many of the damaged files we have recovered. As the “Hackers” skills evolve, so must our teams of engineers. We understand that there will always be some hacker out there with the goal of causing “chaos”. Eco Data Recovery will be there to undo the damage they may have done and get you up and running in the fastest time possible.
Viruses are not the only cause of lost files!
When a hard drive is making an awful noise, more often then not you have a hardware problem. ECO Chief Engineer, Sean Flanders, warns “If you hear strange noises emanating from your computer, shut it off immediately before further damage is incurred”.
When a drive is still grasping to life (barely spinning) many times people try the cheapest solution and attempt to run a data recovery software utility. This is a major mistake! “Attempting to utilize recovery software can make your data hard to salvage if not impossible in some cases. “These programs may write data on the drive which then overwrites your original data, making data recovery almost impossible”, states Brian Cain, VP of sales at ECO.
Take heed in the words of Charles Roover, President of Eco Data Recovery, “Be aware of the fate that could befall your computer and/or network and take precautions. Back-up your files often! Nobody likes to think about losing their data, however, when you have a disaster, we’re there to rescue you!”
Over the past 10 years ECO Data Recovery has saved many individuals and companies by retrieving their lost data! We’re only a phone call away!
Sunday, December 7, 2008
Pinging Tricks
You’re a blogger and are constantly hearing about pinging. The thing is, you don't know what it is and what it can do for your blog. Well that's fine because a lot of bloggers don't quite understand pinging. In this newsletter, we will explain what pinging is, how it helps your blog, and what the best pinging services are. After you've read this newsletter, you'll know exactly how to use pinging to make your blog popular.
What is pinging?
When a blog is pinged, it essentially tells a web blog tracking system that the blog has been updated. Thus, pinging is the process of telling tracking services that a site has been updated.
So how does pinging work? Well, a ping service scans regularly blogs for updates. Whenever there is a new update for a particular blog, that is reported back to the pinging service’s site. You can almost think of ping services being just like search engine spiders—both scan sites looking for information, and both report that information back to their specific site. The difference is, a ping service only reports back new blog posts.
Why is pinging useful for my blog?
Pinging, in effect, tells people that there is a new blog posting available. Those who are loyal followers of your blog will see the ping and want to visit your blog. Those who haven’t read your blog before will see the ping and perhaps think “hey, there’s a new blog I haven’t been to before, I think I’ll check it out”. Pinging helps to increase your traffic because it tells people when your blog is updated. Those who visit sites with pinging services will see this information in the form of a scroll on the left or right side, or top of the page. The scroll is usually in XML format and typically includes the title and URL of your blog, as well as the date and time of the update.
OK, so now I know what pinging is. Who offers pinging?
The answer is, there are several pinging services available which you can use to have your blog pinged. We’ll go over some of them right now.
Weblogs.com
Weblogs.com is probably the most well-known pinging service. Weblogs.com monitors sites for updates and then pings whenever there is an update to report. Virtually every blog software is available to use Weblogs.
Yahoo’s Blo.gs
Another popular pinging service. This one is offered by Yahoo and has a built-in integration with movable type and other tools. One cool thing about this service is that it offers the ability to give out updates via Instant Messenging services like AOL and ICQ. It is a direct pinging service, so those who sign up for subscriptions to your blog will be sent an email anytime your blog is updated.
Blogrolling.com
Blogrolling allows its bloggers to manage their blogrolls (updates) through a web-based interface. Recently updated blogs are also highlighted on Blogrolling’s web site. Data is automatically retrieved from other sites like blogger.com and weblogs.com every 5 minutes. Often times your blog is already being pinged by Blogrolling, so you might not have to sign up for it. Search on the site first for your URL before signing it up.
Technorati
Available at http://rpc.technorati.com/rpc/ping, Technorati is another service that pings blogs. It gets its data from a variety of places and is definitely a site you should go to for blog pinging.
These are just 4 of the many different blog pinging services available. A quick search on Yahoo or Google will reveal many other possible blog pinging services to use for your blog. It is best to sign up for as many as you possibly can to ensure that your blog is well-pinged. A well-pinged blog will definitely help your blog attract more visitors. So sign up for as many as possible and watch your blog traffic increase.
Pinging tells people when your blog is updated. It is an incredibly useful, and easy to sign up for service, so be sure to sign your blog up for pinging!
What is pinging?
When a blog is pinged, it essentially tells a web blog tracking system that the blog has been updated. Thus, pinging is the process of telling tracking services that a site has been updated.
So how does pinging work? Well, a ping service scans regularly blogs for updates. Whenever there is a new update for a particular blog, that is reported back to the pinging service’s site. You can almost think of ping services being just like search engine spiders—both scan sites looking for information, and both report that information back to their specific site. The difference is, a ping service only reports back new blog posts.
Why is pinging useful for my blog?
Pinging, in effect, tells people that there is a new blog posting available. Those who are loyal followers of your blog will see the ping and want to visit your blog. Those who haven’t read your blog before will see the ping and perhaps think “hey, there’s a new blog I haven’t been to before, I think I’ll check it out”. Pinging helps to increase your traffic because it tells people when your blog is updated. Those who visit sites with pinging services will see this information in the form of a scroll on the left or right side, or top of the page. The scroll is usually in XML format and typically includes the title and URL of your blog, as well as the date and time of the update.
OK, so now I know what pinging is. Who offers pinging?
The answer is, there are several pinging services available which you can use to have your blog pinged. We’ll go over some of them right now.
Weblogs.com
Weblogs.com is probably the most well-known pinging service. Weblogs.com monitors sites for updates and then pings whenever there is an update to report. Virtually every blog software is available to use Weblogs.
Yahoo’s Blo.gs
Another popular pinging service. This one is offered by Yahoo and has a built-in integration with movable type and other tools. One cool thing about this service is that it offers the ability to give out updates via Instant Messenging services like AOL and ICQ. It is a direct pinging service, so those who sign up for subscriptions to your blog will be sent an email anytime your blog is updated.
Blogrolling.com
Blogrolling allows its bloggers to manage their blogrolls (updates) through a web-based interface. Recently updated blogs are also highlighted on Blogrolling’s web site. Data is automatically retrieved from other sites like blogger.com and weblogs.com every 5 minutes. Often times your blog is already being pinged by Blogrolling, so you might not have to sign up for it. Search on the site first for your URL before signing it up.
Technorati
Available at http://rpc.technorati.com/rpc/ping, Technorati is another service that pings blogs. It gets its data from a variety of places and is definitely a site you should go to for blog pinging.
These are just 4 of the many different blog pinging services available. A quick search on Yahoo or Google will reveal many other possible blog pinging services to use for your blog. It is best to sign up for as many as you possibly can to ensure that your blog is well-pinged. A well-pinged blog will definitely help your blog attract more visitors. So sign up for as many as possible and watch your blog traffic increase.
Pinging tells people when your blog is updated. It is an incredibly useful, and easy to sign up for service, so be sure to sign your blog up for pinging!
How to Backup Windows XP Home Edition
Your computer cost you from hundreds to thousands of dollars, but the computer itself is not the most valuable part. The data on the hard disk is the most valuable part. How many hours of work did you put into creating that data? One little event, like a power line spike from a lightning strike, and all that work could be lost. Unfortunately, backing up with Windows XP Home Edition is not as simple as it should be.
The first step is to choose a backup device. You might choose a tape drive or a DVD drive, but those devices might require drivers to be installed before you could restore from them. The simplest option is to install a second hard drive in your computer.
The second hard drive doesn't have to be equal to your main hard drive. You can use an older, smaller hard drive as the backup device, as long as the backup drive has more "Free Space" than the main hard drive has "Used Space".
Install a Second Hard Drive
When installing a second hard drive in your computer, it's important to configure the drives correctly. Your motherboard should have two ATA (sometimes called IDE) connectors. The primary connector should have a cable with two drive connectors. The end connector should go to your main hard drive, the middle connector can be used for a backup hard drive. The second motherboard ATA connector should go to your CD-ROM.
On the back of each hard drive is a jumper. The jumper on your main hard drive should be set to the "Master" position. The jumper on your backup hard drive should be set to "Slave" position. Most modern computers use "Cable Select", so you can set both jumpers to the "Cable Select" position. Don't forget the power connector for the second drive.
When you restart your computer, the second drive should be automatically recognized and be designated with the next drive letter available, usually E: (D: being used for the CD-ROM drive).
Format the Second Hard Drive
Generally, you will want to re-format the second hard drive after installation to remove any previously installed operating system and to remove any previous file access rights. To format the drive, select Start | Settings | Control Panel | Administration Tools | Computer Management. In the "Computer Management" window, under "Storage", click on "Disk Management".
Right click on the backup disk's drive letter. In the popup menu, select All Tasks | Format... In the Warning dialog box that appears, click on the "Yes" button. In the "Format" dialog box, in the "File system" drop-down list, select NTFS. Click on the "OK" button. Again, in the Warning dialog box that appears, click on the "Yes" button.
Install the Backup Utility
Windows XP Home Edition doesn't install the Backup utility by default. You'll need to install it manually from your Windows XP CD-ROM.
1. After inserting the CD-ROM, open Control Panel's "Add or Remove Programs" utility. In the "Add or Remove Programs" utility", click on the "Add New Programs" button, then click on the "CD or Floppy" button.
2. In the "Run Installation Program" dialog box that appears, navigate to the VALUEAD/MSFT/NTBACKUP folder on the CD-ROM and select the file NTBACKUP.MSI. Click on the "Finish" button. The Backup utility will be installed.
Perform a Full Backup
To perform a backup, select Start | Programs | Accessories | System Tools | Backup to open the Backup Utility.
Note: If you don't find Backup listed in System Tools, double click on the file name ntbackup.exe in the Windows\system32 folder.
In the "Backup or Restore Wizard", click on the "Advanced Mode" link. In the "Backup Utility" dialog box, select the "Backup" tab and set the checkbox next to the drive to backup (c:) and set the checkbox next to "System State".
In the "Backup media or file name" text box, enter the path to the file for the backup (example E:\Backup.bkf). Click on the "Start Backup" button.
In the "Backup Job Information" dialog box that appears, set the radio button next to "Replace the data on the media with this backup". Click on the "Start Backup" button. The "backup Progress" dialog box will appear.
Even when you backup to relatively fast media like hard disk, the process can take 30 minutes or longer depending upon how much data is on the main drive.
When the backup is complete, turn off the computer and remove the data and power cables from the backup drive. It doesn't make sense to leave the backup drive connected because if the cause of a failure is a power spike, it will take out both drives. Next time you want to backup you'll need to reinstall the cables.
How to Perform a Restore
In the unfortunate event that your computer crashes and you can't get it back by any other means, you'll need to reinstall Windows XP from the CD-ROM. (Automated System Recovery is not supported in Windows XP Home Edition.) You'll need to re-install the Backup utility. Then you'll need to shut down the computer to install the data and power cables to the backup drive. Restart the computer and use the Backup Utility to restore Windows XP from the backup file.
When using this backup method, it's important to be careful not to break any pins when you are removing and installing the data cable of the hard drive. And if your computer doesn't use "cable Select", don't forget to change the jumper on the main hard drive back to "Single".
The first step is to choose a backup device. You might choose a tape drive or a DVD drive, but those devices might require drivers to be installed before you could restore from them. The simplest option is to install a second hard drive in your computer.
The second hard drive doesn't have to be equal to your main hard drive. You can use an older, smaller hard drive as the backup device, as long as the backup drive has more "Free Space" than the main hard drive has "Used Space".
Install a Second Hard Drive
When installing a second hard drive in your computer, it's important to configure the drives correctly. Your motherboard should have two ATA (sometimes called IDE) connectors. The primary connector should have a cable with two drive connectors. The end connector should go to your main hard drive, the middle connector can be used for a backup hard drive. The second motherboard ATA connector should go to your CD-ROM.
On the back of each hard drive is a jumper. The jumper on your main hard drive should be set to the "Master" position. The jumper on your backup hard drive should be set to "Slave" position. Most modern computers use "Cable Select", so you can set both jumpers to the "Cable Select" position. Don't forget the power connector for the second drive.
When you restart your computer, the second drive should be automatically recognized and be designated with the next drive letter available, usually E: (D: being used for the CD-ROM drive).
Format the Second Hard Drive
Generally, you will want to re-format the second hard drive after installation to remove any previously installed operating system and to remove any previous file access rights. To format the drive, select Start | Settings | Control Panel | Administration Tools | Computer Management. In the "Computer Management" window, under "Storage", click on "Disk Management".
Right click on the backup disk's drive letter. In the popup menu, select All Tasks | Format... In the Warning dialog box that appears, click on the "Yes" button. In the "Format" dialog box, in the "File system" drop-down list, select NTFS. Click on the "OK" button. Again, in the Warning dialog box that appears, click on the "Yes" button.
Install the Backup Utility
Windows XP Home Edition doesn't install the Backup utility by default. You'll need to install it manually from your Windows XP CD-ROM.
1. After inserting the CD-ROM, open Control Panel's "Add or Remove Programs" utility. In the "Add or Remove Programs" utility", click on the "Add New Programs" button, then click on the "CD or Floppy" button.
2. In the "Run Installation Program" dialog box that appears, navigate to the VALUEAD/MSFT/NTBACKUP folder on the CD-ROM and select the file NTBACKUP.MSI. Click on the "Finish" button. The Backup utility will be installed.
Perform a Full Backup
To perform a backup, select Start | Programs | Accessories | System Tools | Backup to open the Backup Utility.
Note: If you don't find Backup listed in System Tools, double click on the file name ntbackup.exe in the Windows\system32 folder.
In the "Backup or Restore Wizard", click on the "Advanced Mode" link. In the "Backup Utility" dialog box, select the "Backup" tab and set the checkbox next to the drive to backup (c:) and set the checkbox next to "System State".
In the "Backup media or file name" text box, enter the path to the file for the backup (example E:\Backup.bkf). Click on the "Start Backup" button.
In the "Backup Job Information" dialog box that appears, set the radio button next to "Replace the data on the media with this backup". Click on the "Start Backup" button. The "backup Progress" dialog box will appear.
Even when you backup to relatively fast media like hard disk, the process can take 30 minutes or longer depending upon how much data is on the main drive.
When the backup is complete, turn off the computer and remove the data and power cables from the backup drive. It doesn't make sense to leave the backup drive connected because if the cause of a failure is a power spike, it will take out both drives. Next time you want to backup you'll need to reinstall the cables.
How to Perform a Restore
In the unfortunate event that your computer crashes and you can't get it back by any other means, you'll need to reinstall Windows XP from the CD-ROM. (Automated System Recovery is not supported in Windows XP Home Edition.) You'll need to re-install the Backup utility. Then you'll need to shut down the computer to install the data and power cables to the backup drive. Restart the computer and use the Backup Utility to restore Windows XP from the backup file.
When using this backup method, it's important to be careful not to break any pins when you are removing and installing the data cable of the hard drive. And if your computer doesn't use "cable Select", don't forget to change the jumper on the main hard drive back to "Single".
Wednesday, December 3, 2008
Microsoft Navision DB Selection: C/SIDE or MS SQL Server - overview for IT Specialist
Microsoft Business Solutions Navision serves both European and American megamarkets. It was originally written by Denmark-based Navision Software in its own proprietary language C/SIDE (Client/Server Integrated Development Environment). You should consider several factors in deciding on the database selection. Currently Navision is supported on two platforms - Navision native (C/SIDE) database and on Microsoft SQL Server. There are certain pluses and minuses in both cases and you should make your decision, based on your company needs. We'll give you some hints in this subject and you should know then where to look further.
• Legendary Strength of C/SIDE database - the history of Navision design reveals the primary goals to have its own proprietary database with the built-in features of database transaction integrity. As far as database is proprietary - Navision can manipulate its and tune it to serve its application. You can have users use the system heavily and suddenly shut down the power - when power is back on - Navision will be in the same good shap. The second goal was to provide robust graphical interface.
• What is the volume of your data? - Navision was originally targeting mid-size and large corporations. Now, however, Microsoft is trying to target it to large corporations with sophisticated manufacturing. In this case you could expect huge volume of data - Microsoft SQL Server is better positioned to deal with that.
• Do you have MS SQL Server Administrator? - Microsoft announces that MS SQL Server is moving to "zero-maintenance needed", but we would like to warn you - if you use Navision - you are more likely mid-size or large company. In this case you should have somebody to secure your database - in the case if you would like to deploy MSSQL Server
• Do you plan on Crystal Reports? - you can always deploy C/ODBC to enable your C/SIDE database for Crystal Report, but MS SQL Server has such nice features, as SQL Views and Stored Procedures, which make SQL Server preferable platform
• Do you need OLAP/Datawarehousing? - then SQL Server is the way to go. It has built in Analytical Server with OLAP cube creation and Excel data pivoting
• Do you plan to expose Navision data to other applications? - Navision has tools to expose the data from C/SIDE database (C/ODBC, C/FRONT), but in the case of SQL Server you certainly have standard Microsoft technologies in your disposition
Good luck in database selection and if you have issues or concerns – we are here to help! If you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum.com
• Legendary Strength of C/SIDE database - the history of Navision design reveals the primary goals to have its own proprietary database with the built-in features of database transaction integrity. As far as database is proprietary - Navision can manipulate its and tune it to serve its application. You can have users use the system heavily and suddenly shut down the power - when power is back on - Navision will be in the same good shap. The second goal was to provide robust graphical interface.
• What is the volume of your data? - Navision was originally targeting mid-size and large corporations. Now, however, Microsoft is trying to target it to large corporations with sophisticated manufacturing. In this case you could expect huge volume of data - Microsoft SQL Server is better positioned to deal with that.
• Do you have MS SQL Server Administrator? - Microsoft announces that MS SQL Server is moving to "zero-maintenance needed", but we would like to warn you - if you use Navision - you are more likely mid-size or large company. In this case you should have somebody to secure your database - in the case if you would like to deploy MSSQL Server
• Do you plan on Crystal Reports? - you can always deploy C/ODBC to enable your C/SIDE database for Crystal Report, but MS SQL Server has such nice features, as SQL Views and Stored Procedures, which make SQL Server preferable platform
• Do you need OLAP/Datawarehousing? - then SQL Server is the way to go. It has built in Analytical Server with OLAP cube creation and Excel data pivoting
• Do you plan to expose Navision data to other applications? - Navision has tools to expose the data from C/SIDE database (C/ODBC, C/FRONT), but in the case of SQL Server you certainly have standard Microsoft technologies in your disposition
Good luck in database selection and if you have issues or concerns – we are here to help! If you want us to do the job - give us a call 1-866-528-0577! help@albaspectrum.com
Subscribe to:
Posts (Atom)