Having trouble convincing your boss that Twitter isn't a waste of time? Then you might find it interesting to learn that social media evangelists across the U.S. federal government are blasting out Tweets several times a day to their constituents. Here are their suggestions for how to integrate new media tools such as Twitter, Facebook and Flickr into a large, old-fashioned bureaucracy:
Written by Carolyn Duffy Marsan •
10 April 09 03:23
Your web startup needs to cut through the clutter and reel in customers, and search engine optimization (SEO) can be just the ticket. SEO helps improve your search rankings so your website shows up higher on Google, Yahoo and other popular search engines. "SEO is really [fundamental]. It should be a line item when you're developing your website," says Greg Bozigian, founder and chief media officer of new media marketing company Visionary View.
<a href="http://www.pcworld.com/tags/Google+Latitude.html">Google Latitude</a> is a useful--if slightly <a href="http://www.pcworld.com/businesscenter/article/158985/privacy_lobby_slams_google_latitude.html">creepy</a>--way to track your location on a mobile phone or GPS laptop. But you can get roughly the same sense of fleeting privacy on any old Wi-Fi PC; Google Latitude automatically pegged me within about 100 feet of my ground-floor office on GPS-free laptop.
It's great to have multiple computers. On the first of them, you can install a database or crunch spreadsheets. On another, you can simply browse the Web, listen to music, and check your e-mail. Yet another can have a supercharged configuration for playing games. Sure, you could have all of your programs on the same, single computer, but some applications -- such as games -- can't run concurrently with other programs.
My guess is most people don't use Google's new Chrome Web browser as their primary browser yet. Google still has a long way to go with the browser adding features and fixing problems. Nevertheless, I've collected what I think are some of the most useful tips and the most interesting tweaks for the Chrome browser.
Are you worried about malware and spyware plaguing your system? I have a cool, free tool that gives you an extra layer of defense when you're Web surfing. I also have two free utilities that can lock up and hide your sensitive folders and keep them from prying eyes. Plus, for readers who didn't like my earlier tip for disabling the Insert key, I offer a nifty program to watch your Insert, Caps Lock, and Num Lock keys.
Spinlocks are the lowest-level mutual exclusion mechanism in the Linux kernel. As such, they have a great deal of influence over the safety and performance of the kernel, so it is not surprising that a great deal of optimization effort has gone into the various (architecture-specific) spinlock implementations. That does not mean that all of the work has been done, though; a patch merged for 2.6.25 shows that there is always more which can be done.
They are four applications designed to serve different purposes: A web browser, a music player and organizer, another that does the same for video, and a word processor for screenwriters. Yet they share one thing in common: All were built with a Mozilla-based toolkit, either the Gecko Runtime Environment or its successor, XULRunner. Both toolkits use the same codebase which runs Firefox.
Google is synonymous with searching the Web, but search isn't the company's sole focus. Google also provides top-notch services that other businesses can use to improve their Web presence, reach new customers, and make boatloads of money.
One of the fundamental principles of Linux kernel development is that user-space interfaces are set in stone. Once an API has been made available to user space, it must, for all practical purposes, be supported (without breaking applications) indefinitely. There have been times when this rule has been broken, but, even in the areas known for trouble (sysfs, for example), the number of times that the user-space API has been broken has remained relatively small.
Companies wanting to get the most use of voice over IP (VOIP) need to know the steps involved in hardening their network and Internet infrastructure to get the best results out of their digital voice deployment projects.
The Internet has brought a lot of business to My1Stop, a Kansas, U.S.-based printing company. About half of its $US20 million in annual revenue comes from Web traffic, says Michael Joseph, vice president of e-commerce.
For any corporate wireless infrastructure to remain secure, using 802.1X for authentication is a must - after all, it provides much more granular control of authentication credentials and can provide accounting for wireless LAN usage. Setting everything up can be a complex process fraught with choosing the right EAP type that both your clients and your RADIUS server supports in addition to putting in place the PKI infrastructure that some EAP types require. During this whole process one thing can often be overlooked - the security of the RADIUS server itself.
Data leakage prevention (DLP) refers to a class of detection and enforcement technologies aimed at securing internal information. The latter can be anything from compliance-related data (social security and credit card data) to intellectual property (IP). Enforcement capabilities extend from detection and alerting all the way to blocking, quarantining, or encrypting the outbound network traffic. Initial technology deployments focused on e-mail (an easily proxied protocol) but have recently begun to include HTTP, FTP, and various chat or IM services as well as encrypted transports such as SSL and SSH.
So, you've just installed Ubuntu 7.04, otherwise known as the "Feisty Fawn" release of everyone's favorite (for now) flavor of Linux. You booted the <a href="http://releases.ubuntu.com/feisty/" target="_blank">installation disc</a> , looked around the test environment to discover that your hardware was working, and double-clicked the Install icon on the desktop. The Ubuntu installer helped you make room for Linux on your hard drive, and even copied over some of your documents and settings from Windows.
How do you know if your computer, or any of the computers in the network you manage, has become infected with zombie code? After all, the programs that turn a computer into an undead slave for spammers and phishers don't install a desktop icon or an entry on the Windows Start menu. A survey of experts reveals some agreement on basic steps you can take to reduce the risk of having your machines join the army of the evil botnet undead.
Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.