Monday, March 22, 2010
Tag, you're social.
I’ve been dutifully checking in all over Springfield, OH and really don’t feel like as a user I have reaped the benefits of Foursquare. The places that I’m going don’t seem to have any “tips” associated with them. I begrudgingly admit that this is possibly because we are in a smaller city in the Midwest – maybe in NYC, Chicago, or Miami the tips are abundant and hotspots are easy to pick out via Foursquare.
In April I’m travelling to Atlanta for a few days an am looking forward to using Foursquare while I’m there – to see if it really makes a difference in how I’m experiencing the city! I also vow to use Foursquare more the next time I’m in Columbus because I’m positive there’s got to be more at least going on there than here.
Okay – so what do you think? Here are a quick article from Social Media Examiner about ways to make geotagging work for your small b2c business, How to Drive More Customers to Your Local Business with Social Geotagging.
Tuesday, March 9, 2010
Would you freedom march for ... internet access?
I found this article fascinating primarily because I had never given though to whether or not my freedom to use the internet could ever be taken away. Can you imagine if the government began enforcing a law against the internet? (While I realize that this is extremely unlikely, the thought still mystifies me.) Seriously... We'd all need to go buy an encyclopedia and carry it everywhere with us or something. We are so dependent on our ability to get answers and get them fast that I can't even imagine what would happen.
Wednesday, February 24, 2010
Widespread Data Breaches Uncovered by FTC Probe
The Federal Trade Commission has notified almost 100 organizations that personal information, including sensitive data about customers and/or employees, has been shared from the organizations’ computer networks and is available on peer-to-peer (P2P) file-sharing networks to any users of those networks, who could use it to commit identity theft or fraud. The agency also has opened non-public investigations of other companies whose customer or employee information has been exposed on P2P networks. To help businesses manage the security risks presented by file-sharing software, the FTC is releasing new education materials that present the risks and recommend ways to manage them.
Peer-to-peer technology can be used in many ways, such as to play games, make online telephone calls, and, through P2P file-sharing software, share music, video, and documents. But when P2P file-sharing software is not configured properly, files not intended for sharing may be accessible to anyone on the P2P network.
“Unfortunately, companies and institutions of all sizes are vulnerable to serious P2P-related breaches, placing consumers’ sensitive information at risk. For example, we found health-related information, financial records, and drivers’ license and social security numbers--the kind of information that could lead to identity theft,” said FTC Chairman Jon Leibowitz. “Companies should take a hard look at their systems to ensure that there are no unauthorized P2P file-sharing programs and that authorized programs are properly configured and secure. Just as important, companies that distribute P2P programs, for their part, should ensure that their software design does not contribute to inadvertent file sharing.”
As the nation’s consumer protection agency, the FTC enforces laws that require companies in various industries to take reasonable and appropriate security measures to protect sensitive personal information, including the Gramm-Leach-Bliley Act and Section 5 of the FTC Act. Failure to prevent such information from being shared to a P2P network may violate such laws. Information about the FTC’s privacy and data security enforcement actions can be found at www.ftc.gov/privacy/privacyinitiatives/promises_enf.html .
The notices went to both private and public entities, including schools and local governments, and the entities contacted ranged in size from businesses with as few as eight employees to publicly held corporations employing tens of thousands. In the notification letters, the FTC urged the entities to review their security practices and, if appropriate, the practices of contractors and vendors, to ensure that they are reasonable, appropriate, and in compliance with the law. The letters state, “It is your responsibility to protect such information from unauthorized access, including taking steps to control the use of P2P software on your own networks and those of your service providers.”
The FTC also recommended that the entities identify affected customers and employees and consider whether to notify them that their information is available on P2P networks. Many states and federal regulatory agencies have laws or guidelines about businesses’ notification responsibilities in these circumstances.
Samples of the notification letters can be found at: http://www.ftc.gov/os/2010/02/100222sampleletter-a.pdf , http://www.ftc.gov/os/2010/02/100222sampleletter-b.pdf , http://www.ftc.gov/os/2010/02/100222sampleletter-c.pdf . The fact that a company received a letter does not mean that the company necessarily violated any law enforced by the Commission. Letters went to companies under FTC jurisdiction, as well as entities such as banks and public agencies over which the agency does not have jurisdiction.
The FTC appreciates the assistance of the Department of Health and Human Services, the Securities and Exchange Commission, the Federal Reserve Board, the Federal Deposit Insurance Corporation, the Office of Thrift Supervision, and the Office of Comptroller of the Currency.
The new business education brochure – titled Peer-to-Peer File Sharing: A Guide for Business – is designed to assist businesses and others as they consider whether to allow file-sharing technologies on their networks, and explain how to safeguard sensitive information on their systems, and other security recommendations. This information is available at www.ftc.gov/bcp/edu/pubs/business/idtheft/bus46.shtm . Tips for consumers about computer security and P2P can be found at www.onguardonline.gov/topics/p2p-security.aspx .
The Federal Trade Commission works for the consumer to prevent fraudulent, deceptive,
and unfair business practices and to provide information to help spot, stop, and avoid
them. To file a complaint in English or Spanish, click http://www.ftccomplaintassistant.gov
or call 1-877-382-4357. The FTC enters Internet, telemarketing, identity theft, and other
fraud-related complaints into Consumer Sentinel, a secure, online database available to
more than 1,700 civil and criminal law enforcement agencies in the U.S. and abroad. For
free information on a variety of consumer topics, click http://www.ftc.gov/bcp/consumer.shtm .
Wednesday, February 3, 2010
HBG writes about OTG!
Tuesday, January 26, 2010
Are you riding the [Google] Wave?
And then lastly - give me your opinion! I want to know!
Friday, January 15, 2010
Books > Computer.
Now, in this departure from all things technological, I give you...
MY FAVORITE READS FROM 2009:
This book did exactly what a 'favorite' book should do - I laughed, cried, gasped, and fell in love with the characters. This deeply striking and honest memoir deals largely with two topics that we'd rather look passed: racism and religioun ... and it does it in the midwest in the 1980s. A book I suggest you immediately put on your own 'to read in 2010' list.
Favorite tug-your-emotions book:
I realize that I'm a little behind on this one. I'm sure you've already tucked this fantastic, quick read under your belt. I finally dug into it and spent a few solid summer afternoons pouring over Eddie's life and his wanderings through 'heaven.' It was a beautiful portrayal of love and cyclicality of life that we all (or at least I) often overlook.
Favorite brain candy:
And here's what's on my list...
TO READ IN 2010:
- Hotel On The Corner of Bitter and Sweet by Jamie Ford
- The Lost Symbol by Dan Brown
- The Road by Cormac McCarthy
- The Kite Runner by Khaled Hosseini
Saturday, January 9, 2010
DVD-R or DVD+R, Which is Better?

According to the DigitalFAQ, DVD-R format tends to have a playback compatibility of about 90-95% with all DVD players that exist. The DVD+R format tends to have a playback compatibility of about 85-90% with all DVD players that exist.
Regardless of which media format you choose, the most important thing to consider is the brand of media. There are only a few manufacturers of DVD and CD media in the world and this media is re-branded into hundreds of different brand names. Most media is fine for burning and will work in any DVD or CD player but if you're archiving data or creating a DVD movie collection you'll want a higher grade of media that will last the test of time. My personal favorite DVD and CD media is Taiyo Yuden (which was recently purchased by JVC). JVC Taiyo Yuden ranks as professional grade media and has the least hard and soft errors in lab tests. Verbatim and Ritek also make professional grade media. High grade media usually can't be found locally in stores and can only be found online at such places like Meritline. The good news is that media such as JVC Taiyo Yuden disks are competitively priced if not cheaper than the blank media found in neighborhood stores.
Tuesday, January 5, 2010
"Maintained & Refurbished" is the new "Shiny & New "
To boil it down to potential oversimplicity – this article is about making your IT stuff last longer. The writer, Ann Bednarz, is suggesting that instead of replacing equipment as soon as something goes wrong or begins to age, that we should consider preventative maintenance and willingly accept the expense it takes to fix it. As the article said, “"For every dollar they spend refurbishing and redeploying, they defer $14.50 in new procurement. It's a huge gainer in terms of preserving capital," Houghton says.”
Monday, January 4, 2010
Easily keep your email from being blocked or mistaken as SPAM? Not so easy after all!
Many of today's Anti-Spam filters use an SPF record to authenticate that the message was sent by the person it claims to be sent by. This reduces the chances of users receiving "Spoofed Emails" in their inbox. What a great technology right? Who wouldn't sign up to make sure their recipients receive fewer spam messages and less advertisements for drugs and landmines shipped discreetly to your door? I know I would like to do anything that will cut my spam levels, so I decided to get on board with creating an SPF record for our domain: http://www.theohiogroup.com/ where our mail servers send out all of our corporate email.
This is the point at which I discovered that no one I knew, except the other technicians, would ever be able to do this without calling me for help. It was a nightmare to get setup and to make sure that I put in all the information needed, i.e: server Ip address, MX records, and Reverse DNS for our domain, just to create the SPF record. What a hassle! And none of my customers probably have the experience tinkering with their domain DNS Zone Records to even know how to add an SPF, let alone set it up correctly. This is when I searched google for an answer to my woes, and alas, Microsoft had the answer: An easy to use wizard! "Sender ID Framework SPF Record Wizard" that you just fill in a few questions and they will automatically generate your SPF record. This wizard won't automatically add it to your domains DNS zone file... however, a simple call to your domain registrar, or to us, can quickly solve that problem and make sure that all email that gets sent from your domain will end up in the inbox rather than the Junk Mail folder of the person it was sent to. You will also be doing your part to help mainstream this practice!
For more information, or to receive help setting up your SPF record, DNS Zone file, or make changes to your Domain, please visit us at http://www.theohiogroup.com/