Friday, October 31, 2008

Is Someone Stealing Your Source Code

Writen by Michael Southon

That's a question that worries many people on the Internet. And some people go to great lengths to hide their source code.

There are several reasons you might want to conceal the source code of your web pages:

=> you have web pages that rank highly in the search

engines and you don't want people to see your meta tags

=> you don't want people copying your web page design

or java scripts

=> you want to protect your website from email harvesters

and other spam utilities

But can you hide your source code?

The short answer is no - to display a web page, the browser has to be able to read the source, and if the browser can read it, so can your visitors.

But there are ways to make it more difficult for your visitors to read your source code. Here are some of them:

(1) Adding dozens of carriage returns at the top of your HTML page

This one has fooled me a couple of times. All you see is a lot of blank space - but just keep scrolling down and you'll find the source code.

(2) Using frames

When you try to view the source code of a page using this technique, all you see is the first ten or fifteen lines of HTML. But just save the page to a folder on your hard disk and then look for a sub-folder where the images in that page were saved to.

In the sub-folder you'll find an HTML file that contains the source code you were looking for. Again, this won't fool experienced users, but it's worth a shot. Here is the code: http://www.ezine-writer.com/framescode.html

(3) Disabling Right Click

This is an old trick and experienced surfers know how to get around it. Here it is anyway - a script that disables Right Click: http://www.ezine-writer.com/rightclick.html

(4) Disabling View Source

I searched high and low for a script that disables 'View Source' in the browser menu bar, and couldn't find one.

Here is a script that is supposed to disable 'View Source' - I tried it out in my browser (IE 6.0) and it didn't work, so perhaps it only works in older versions of IE: http://www.ezine-writer.com/no-source-code.html

(5) Encryption plus frames

This is a technique that will work on all but the most experienced web surfers. Here is the code for doing it: http://www.ezine-writer.com/hidesource.html

I've created a copy of my index page using the above technique - if you click on View Source, all you see is a jumble of characters: http://www.ezine-writer.com/encrypted.htm

Well, that's it! All you need to know about hiding your source code.

------------------------------------------------------------
Michael Southon has been writing for the Internet for over 3
years. He has shown hundreds of webmasters how to use this
simple technique to build a successful online business. Click
here to find out more: http://ezine-writer.com/
------------------------------------------------------------

Thursday, October 30, 2008

How To Earn Additional Extras From Your Subscription Website

Writen by Craig Dawber

Mostly people think that they can earn only from subscriptions on a subscription website. However, this is not so. There are also a number of other ways in which you can earn through your subscription website. Some of these ways are enumerated below:

1. Advertisements – Even a subscription site is like a normal website therefore like any other website you can have advertisements on it. However, take care that you don't crowd the page.

People who pay would not be so tolerant of your advertisements. To get around this problem you can try to demarcate areas on your site to be sponsored. You can also try to categorize all the advertisements in a directory to make them available to those who want to have a look at them. This way you can have your earnings without worrying about annoying anyone.

2. Consultation Services - You can also start a consultation service on any topic that you may have expertise on. For this, you can have consultation fee, which could be separate from the subscription fee. You never know, maybe this consultation service would become the high point of your website.

3. Make non-subscribers pay – You already have the subscribers but now the turn is of the non-subscribers. You have to attempt to get them to subscribe to your site or pay for the areas/content that they want to view.

For your site, you are continuously developing content. This content would be available to the subscribers and in parts to the non-subscribers also. As a result, there is a possibility that the non-subscribers will want to have full access to some such content, but don't want to become full-fledged members.

You can solve this problem by selling some of your content independently to the non-subscribers. This way you will be able to make the non-subscribers pay without becoming subscribers.

This is just a generic view of how you can get around to earning additional income from your subscription websites. You can customise and adapt the schemes to suit your individual website and the client base. It has to be done in a way so that your regular subscribers would not be offended. In addition, care should be taken that at no stage should the subscribers feel that the non-subscribers have access to some information at cheaper rates or that they have paid extra for some product.

This article was written by Craig Dawber of smarket.co.uk Need advice and guidance with your online business check out the resources found in this website.

Wednesday, October 29, 2008

Get Cash Now For Your Business Note

Writen by Justin McWhirter

BACKGROUND AND FUNDAMENTALS

A business note is generated every time an individual sells a business and chooses to carry the financing and collect regular payments from the new business owner(s). There are literally millions of dollars in business notes in the United States.

People are interested in selling business notes for several reasons. Usually, the prospective seller has decided that he would rather receive the lump sum value of the business, rather than monthly payments. Often that's because he wants to invest in a new business. Other times, the prospective seller has an incentive such as an expensive wedding bill, college tuition or a retirement trip.

Business notes are very similar to private mortgages or trust deeds. The main difference is that business notes are not secured by real estate. There is no real estate involved. (If a business is sold and it includes the real estate then a note is created which encumbers both the business and the real estate. Often times two notes are created, one for the business and one for the real estate).

SECURITY FOR BUSINESS NOTES

A Chattel Mortgage or Security Agreement These agreements list every piece of collateral that secures the business note. When working in a state which accepts the UCC terms, a security agreement is used; in other states they will find a chattel mortgage. "Chattel" refers to the chairs, tables, etc. These items are sometimes referred to as "F, F, and E" - furniture, fixtures, and equipment. The agreement will list everything that is included in the sale of the business. This is important because until the time that the loan is repaid, the buyer of the business can not sell or do anything with that security until he repays the debt.

A UCC-1 A UCC-1 shows that the seller has sold his business and has carried the financing. The UCC-1 filing is evidence of the seller's position as a secured party.

TRANSACTION DETAILS

In order to obtain an accurate quote, it is necessary to have up to date information about the note. All quotes will be subject to due diligence by the note purchaser.

The first critical item of due diligence will be verifying the credit worthiness of the payer (mortgagor). The lower the credit score, likely the lower the offer.

The second critical item is a drive-by appraisal or valuation with comparisons of similar houses and neighborhoods. The note purchaser wants to be sure there is adequate value.

One of the key things many people do not realize is they do not have to sell the whole note. The note holder will always receive more money over time if they only sell part of the note. We recommend that a note holder determine the amount of cash needed. A quote can be obtained telling how many payments will be required in order for the note holder to receive the necessary cash.

There are many options available when you have a contract or note and are trying to raise a lump sum of cash: 1) sell the entire balance of the contract; 2) sell a specified number of payments; 3) sell part of each payment, while continuing to receive the balance.

Would you like to turn your business note into cash? Save time and money... Work with a professional. With over a decade of experience, Louise Pointer can help you avoid common mistakes. Click -> http://www.NationalFundingResources.com

Tuesday, October 28, 2008

If Touch Screen Kiosks Can Help My Business Than Please Tell Me What They Are

Writen by Chadder McD.

Kiosks are basically a one stop information tool, let's first define the word kiosk to see the history of where they've come from so we'll be better able to understand what exactly what they are: ki·osk noun
1. A small open gazebo or pavilion.
2. A small structure, often open on one or more sides, used as a newsstand or booth.
3. A cylindrical structure on which advertisements are posted. The first recorded instance of the word "kiosk" was back in 1865 with reference to a newspaper stand. Kiosks are still known today as traditional freestanding retail booths. With the recent advent of low-cost pc's and the internet kiosks are taking on a whole new shape and definition.

Computer Or touch screen kiosks have forged their way into main stream.

The technology used in interactive kiosks is basically the same as that used in computers. Touch screen kiosks are mainly operated with the help of a control unit and a touch screen sensitive LCD monitor. To operate a kiosk the user simply needs to touch the area of the screen to navigates the custom built show. The touch screen operation of the kiosk make the functioning very simple and user-friendly. Considering that computer kiosks are run via PC computers, the utilization of video, images and text with sound all combine to offer a truly interactive experience.

When the Kiosks are not in use they can act as a screen saver to serve up advertising or upsell in store items to increase revenue.

The Benefits of Using Kiosks

Now a days kiosks have a wide range of applications and can be seen in department stores, airports or in government offices. The different services provided by a kiosk are accessing of live news from the newsroom with the very latest news and information, accessing of popular galleries with stills and video clips, information on number of job vacancies, etc.

The popularity of kiosks are stated below:
1) The long lasting steel construction of the kiosk helps it to be rugged and secure and is suitable for placing it at any environment.
2) A kiosk helps a lot in saving the valuable floor space. Just by plugging them in they are ready to go as the hardware and software comes within a single unit.
3) Kiosks are very easy to maintain as all the components of the kiosks are easily repairable and replaceable.
4) With the help of remote administration options the tracking of kiosks can be done via the internet or via e-mail or phone alerts for low paper or power failure.

Kiosks can be used for an infinite number of applications, including: Gaming, bill payment, eCommerce, human resource, customer service, location and mapping, credit application, vending machines, sales and marketing, internet access and adverting just to point out a few.

A kiosk project typically has 3 main components: Hardware, Software and Post Production.
Hardware:
Any tangible portion of the kiosk project will fall into the hardware category. Depending on the type you require, this can simply be a metal enclosure with a touch screen monitor attached to it with a PC inside. More complex kiosks have hardware components inside such as card readers, printers, telephone handsets, ruggedized keyboards, ruggedized pointing devices and other specialized peripherals.

Software:
Depending on what your kiosk is supposed to do, there may or may not be off-the-shelf kiosk software available for it. Kiosk software typically does the following: displays the content you want to display, prevents users from making changes to the PC's operating system, allows the owner to make changes remotely, make sure everything is working properly, and interfaces with peripherals inside the kiosk such as printers, card readers, scanners, etc..

Postproduction:
Depending on the size of your kiosk project, there are services such as kiosk site acquisition, kiosk installation, and on-site maintenance. For a small kiosk project, typically the owner of the kiosk does these things on their own. For larger deployments, a kiosk implementation company will be your best bet.

For business owners a kiosk can be used in a wide array of applications as seen above - the one point to consider is that a kiosk can deliver the right message at the right time, consistently every time. There's no doubt kiosks are here to stay - watch for them next time you go out into your community!

Submitted by Chad McDonald to provide information about kiosks online and further kiosks web info.

Monday, October 27, 2008

Bright Planet Deep Web

Writen by Sam Vaknin, Ph.D.

www.allwatchers.com and www.allreaders.com are web sites in the sense that a file is downloaded to the user's browser when he or she surfs to these addresses. But that's where the similarity ends. These web pages are front-ends, gates to underlying databases. The databases contain records regarding the plots, themes, characters and other features of, respectively, movies and books. Every user-query generates a unique web page whose contents are determined by the query parameters. The number of singular pages thus capable of being generated is mind boggling. Search engines operate on the same principle - vary the search parameters slightly and totally new pages are generated. It is a dynamic, user-responsive and chimerical sort of web.

These are good examples of what www.brightplanet.com call the "Deep Web" (previously inaccurately described as the "Unknown or Invisible Internet"). They believe that the Deep Web is 500 times the size of the "Surface Internet" (a portion of which is spidered by traditional search engines). This translates to c. 7500 TERAbytes of data (versus 19 terabytes in the whole known web, excluding the databases of the search engines themselves) - or 550 billion documents organized in 100,000 deep web sites. By comparison, Google, the most comprehensive search engine ever, stores 1.4 billion documents in its immense caches at www.google.com. The natural inclination to dismiss these pages of data as mere re-arrangements of the same information is wrong. Actually, this underground ocean of covert intelligence is often more valuable than the information freely available or easily accessible on the surface. Hence the ability of c. 5% of these databases to charge their users subscription and membership fees. The average deep web site receives 50% more traffic than a typical surface site and is much more linked to by other sites. Yet it is transparent to classic search engines and little known to the surfing public.

It was only a question of time before someone came up with a search technology to tap these depths (www.completeplanet.com).

LexiBot, in the words of its inventors, is...

"...the first and only search technology capable of identifying, retrieving, qualifying, classifying and organizing "deep" and "surface" content from the World Wide Web. The LexiBot allows searchers to dive deep and explore hidden data from multiple sources simultaneously using directed queries. Businesses, researchers and consumers now have access to the most valuable and hard-to-find information on the Web and can retrieve it with pinpoint accuracy."

It places dozens of queries, in dozens of threads simultaneously and spiders the results (rather as a "first generation" search engine would do). This could prove very useful with massive databases such as the human genome, weather patterns, simulations of nuclear explosions, thematic, multi-featured databases, intelligent agents (e.g., shopping bots) and third generation search engines. It could also have implications on the wireless internet (for instance, in analysing and generating location-specific advertising) and on e-commerce (which amounts to the dynamic serving of web documents).

This transition from the static to the dynamic, from the given to the generated, from the one-dimensionally linked to the multi-dimensionally hyperlinked, from the deterministic content to the contingent, heuristically-created and uncertain content - is the real revolution and the future of the web. Search engines have lost their efficacy as gateways. Portals have taken over but most people now use internal links (within the same web site) to get from one place to another. This is where the deep web comes in. Databases are about internal links. Hitherto they existed in splendid isolation, universes closed but to the most persistent and knowledgeable. This may be about to change. The flood of quality relevant information this will unleash will dramatically dwarf anything that preceded it.

About The Author

Sam Vaknin is the author of "Malignant Self Love - Narcissism Revisited" and "After the Rain - How the West Lost the East". He is a columnist in "Central Europe Review", United Press International (UPI) and ebookweb.org and the editor of mental health and Central East Europe categories in The Open Directory, Suite101 and searcheurope.com. Until recently, he served as the Economic Advisor to the Government of Macedonia.

His web site: http://samvak.tripod.com

Sunday, October 26, 2008

Catching The Crooks Is Your Wholesaler Dodgy Or Legitimate

Writen by Simon Slade

Fleeced, ripped-off, cheated, conned. We're all afraid of losing money to wholesalers who turn out not to be the real deal. The horror stories can certainly be very off putting – especially to those just getting started. The trick is to spot it and stop it before it's too late!

So what are signs that you're dealing with a crook?

In my experience, there are 6 particular indications in particular that you may not be dealing with a legitimate wholesaler:

· The wholesaler doesn't sound business-like or professional when answering the phone. For example, he will answer with a plain 'Yes?' or 'Hello?', without identifying himself or the business name.

· The wholesaler doesn't request your business license or sales tax ID during the initial contacts. Most true wholesalers will require one of these. While this is not a hugely important deal, if you are looking at dealing in large amounts you will need to get registered and should check that the wholesaler is registered as well.

· The wholesaler gets shifty when you request a product sample. Most wholesaler are only to happy to offer a sample of their product (usually at a higher price) so if they do not offer this be careful and question their reasons for not offering one.

· The wholesaler's claims to take a secure form of payment (credit card, Paypal etc…) but later turns around and says they only accept wire transfer or western union. Not all wholesalers that take western union and wire transfer are scammers, but this is the most common way scammers operate and you should always steer on the side of caution if you are asked to pay be these methods when not having dealt with or knowing the person first.

· Their website offers no physical address or contact phone for you to get hold of them. Be blunt, ask them for a contact address and phone number and if it is ok if you come in and have a look around their offices. If they are serious this will be no problem at all for them.

· They claim they don't currently have stock in and still expect you to pay up front. If this has been happening make sure you get some photographic evidence of their stock with the days newspaper or something (while this doesn't always work, it means some one must have stock that they know)

Although these are not hard and fast rules, you should certainly proceed with caution if one or more of the above apply to a new wholesale contact you have made.

If you have any tips to add or past experiences then we'd love to hear from you. Your experience is valuable to the SaleHoo community and I'm sure others would appreciate your comments.

SaleHoo.com

SaleHoo is one of the fastest growing wholesale websites on the internet. It contactins a database of wholesale suppliers and manufacturers offering thousands of products to consumers at prices considerably less than retail. Located at http://www.salehoo.com, visitors are allowed to sign up for unlimited and lifetime access to the completely searchable database of wholesale products. Deeply discounted brand name items may be purchased directly from the source for the customer's personal use or for resale purposes. Items may be sold at online auctions, flea markets and retail stores. The database is regularly updated, ensuring that the latest retail products are always available for purchase.

Click here for more details http://www.salehoo.com

Saturday, October 25, 2008

Shop Preowned Equipment For Smart Savings On Machinery

Writen by Tom Sample

Whether you're a drywall man or you run a heavy machinery business, the tools that help get the big jobs done must be in good condition or business will go south. Buying used construction equipment can be a big gamble, but oftentimes businesses just starting out cannot afford brand new machines. Smart used buys are out there; they just have to be found.

Although it's certainly true some used buys aren't worth the powder to blow them up, with careful and smart shopping great machines can be found. The key to buying the best used equipment to make sure business goes smoothly is to do some investigating before making a purchase. There's no reason why well cared for machines that are passed on through used sales can't get the job done right. It's just a question of finding the machines that have been treated properly and maintained as they should be. Remember, many businesses upgrade machinery on a regular basis and the pieces of equipment they replace oftentimes are in great shape. The trick is finding these machines!

Before buying used equipment:

* Determine your exact needs. If you're launching a lawn care company, for example, do you really need that stump grinder on a daily basis? Would a rental be smarter and money be better spent on heavy-duty mowing tractors? Should you be opening a business that needs warehouse equipment, a good forklift might come in handy, but is it necessary to get the biggest one coming out of the gate? Look for items that meet or exceed your expectations, but don't necessarily set your sights on the Rolls Royce of a particular machine if it's not required to get the job done right.

* Set a budget. This is very important, especially for new businesses starting out. Be realistic and prioritize your needs. If you have to buy the mid-line machine now, you may find yourself in a better position to buy that top model not too far down the road.

* Research brands, models. Know exactly what features you need and which products provide the best results. Look at machine specifications, reviews from past users and even look into what other industry pros you know personally say about machines. Pick a top make/model or two for each anticipated purchase.

Now's the time to start searching for the machines you need to get your business off the ground on the right foot. Shop around for the makes and models you've determined to be the best. Make sure to inspect machines, if possible, before a purchase and ask to see maintenance records if they're available.

A used machine purchase can be a great way to get a business going. Whether you need large construction machines like backhoes and earth movers or smaller ones like lawn tractors or forklifts, the purchases you make will effect the way your business gets done. Take a little time to do some research. Carefully consider needs and budgetary constraints. And, be certain to check into buys before making them if at all possible.

Friday, October 24, 2008

How Context Affects Value In Small Business Marketing

Writen by J D Moore

Here's another Marketing Comet principle: Value is always 100% subjective.

"But $1 is worth a $1, and some items are commodities with fixed values right?" Well, without going into economics the value of $1 changes (mostly based on perception). Even commodities have markets. A cup of coffee is worth absolutely nothing until somebody is willing to trade $3 for it.

The following comes from Judgment in Managerial Decision Making by Max Bazerman: Read this scenario twice - first with the words parentheses and excluding words in brackets, and second with words in brackets and excluding the words in parentheses.

You are lying on the beach on a hot day. All you have to drink is ice water. For the last hour you have been thinking about how much you would enjoy a nice cold bottle of your favorite beer. A companion gets up to go make a phone call and offers to bring back a beer from the only nearby place where beer is sold (a fancy resort hotel) [a small, rundown grocery store]. He says that the beer might be expensive and asks how much you are willing to pay for it. He says that he will buy the beer if it costs as much as or less than the price you state. But if it costs more than the price you state, he will not buy it. You trust your friend, and there is no possibility of bargaining with the (bartender) [store owner]. What price do you tell him?

20 years ago, the median prices were $2.65 for a beer from the resort and $1.50 for a beer bought from a store. Same thirst, same beer - 76% price difference. In Bazerman's book he is speaking about a concept called transactional utility - the value you place on the deal you are getting as opposed to the value you place on the commodity.

Why is this important to small business marketing? It shows clearly that controllable factors can affect what people are willing to pay for your products or services. Obviously, you would like to be able to maximize what you can charge - while still keeping your customers.

If you have a retail storefront - keeping it clean, comfortable, and in good repair can affect how people perceive the value of what you are selling. Your packaging is important, so are your business cards, web site, and everything else your customers see. Investing in a polished, congruent image is a good idea.

I still like the $3.95 pork fried rice from the hole-in the wall Chinese takeout, but I won't pay $8.95 for it. However, when I go to the sit-down Chinese restaurant with the white tablecloths, the nice decor, and the waiters in bow ties - I have no problem paying $11 for fried rice. the quality of the food might be better, but is it 178% better? It doesn't matter - because I'm not even making that calculation when I choose to eat there.

What can you do to increase the perceived value of what you are offering?

Copyright 2005 Marketing Comet

J D Moore - Marketing Comet Get my free e-course and learmn low-cost marketing methods that could multiply your profits twenty times or more! Go here now: http://www.marketingcometcoach.com/free_marketing_ecourse

Thursday, October 23, 2008

How To Think Statistically With Six Sigma

Writen by Tony Jacowski

The data gathering exercise results in quantitative data in abundance. How you want to analyze it depends broadly on your plan to arrive at the solution. Nevertheless, it depends on three fundamental questions. But as a precursor to these questions, one must keep in mind that the larger purpose of using wide ranging interacting data is to understand the processes, problems and the best possible solutions as applied to Six Sigma implementation.

Six Sigma: Statistical Thinking

Statistical thinking involves the tendency to want to study the complete contextual situation when a wide ranging statistical inputs and control factors of several natures may be interacting simultaneously to produce a particular output.

To understand the principle better, one can begin with the one factor at a time (OFAT) theory, which refers to the natural tendency of the investigator to change only one factor at a time and 'record' the results until all other factors are tested this way. The results need to be put in place in the natural logical manner that would have occurred had the study been conducted in the opposite of OFAT.

The Fundamental Question

As we discussed earlier, there are three fundamental questions that need to be addressed in the order that the data is analyzed.

1. Whether the level of the measurement of the variables is known? If yes;

a. Nominal or Crude Ordinal

b. Good Ordinal or Interval or Ratio

2. Size of the sample is another consideration. What kinds and how many of them are being considered?

a. One sample only

b. Two samples; Specify either dependent or independent

c. Multiple samples; Specify either dependent or independent

3. What are my anticipations about the statements on data that I will be able to make?

a. Define the sample data but without generalizing to the larger batch size

i. Discuss each factor such as distribution, central tendency and variation in the context of a single variable.

ii. Discuss the relationship between two or more variables if that is the case.

b. Now, moving away a bit, generalize the samples to the batch size from which they were drawn. The process of statistical inference or hypothesis testing, as this is called, relies on the probability theory to determine the risk of an inaccurate generalization.

i. For a single variable, discuss the various factors in the same way as in the above case.

ii. For two or more samples discuss the differences between them concerning whether they are independent or dependent?

iii. Relationship between two variables and again the relationship shared between more variables.

In continuance with the discussion, the choice for adopting the appropriate statistical technique and going ahead with the task on hand rests with the answers to the above questions. Nevertheless, the philosophy of effective statistical thinking and action on a further course is better based on the following guiding principles:

1. In a system all reactions occur in interconnected processes

2. Variation is part and parcel of all processes

3. The key to success lies in understanding and reducing variations

Statistical thinking succeeds in paving the way for a holistic approach to the deployment of Six Sigma. It can't be thought of in isolation.

Tony Jacowski is a quality analyst for The MBA Journal. Aveta Solutions – Six Sigma Online ( http://www.sixsigmaonline.org ) offers online six sigma training and certification classes for lean six sigma, black belts, green belts, and yellow belts.

Wednesday, October 22, 2008

Privacy Toms Ten Data Tips

Writen by Tom Breur

Privacy is one of those topics that nobody cares about until their own privacy is being violated. Privacy threats have been compared to George Orwell's "1984" where a totalitarian regime decimated individual freedom. Nowadays, the privacy threat doesn't come from communist states but from capitalism, free markets, exchange of digital information and smart use of advanced technology.

In the 'off-line' world we've learned that sustainable industrial development doesn't compromise the environment, it must preserve it. Or else there wouldn't be enough employees and customers around to maintain a market standing. By the same token, the conveniences of our increasingly electronic world should not threaten privacy. Instead, control over disclosure of personal information is a necessary prerequisite, or progress in our digital economy will come to a standstill.

1. Technology forms no threat, people do

Technology is often discussed as if it were an autonomous force, and thereby the culprit of so many privacy threats. This suggestion completely misrepresents the issue. Technology has no autonomous will; it simply executes choices that are made by government, businesses, and individuals.

Because of technological advances (computers, increasing digital storage), we find ourselves in a world in which a tiny clerical error can propagate to devastating effects on a person's life (e.g. getting blacklisted, inability to apply for credit, etc.).

2. Central data storage aids rather than threatens privacy.

There is a widespread misconception that storing data in central "master databases" poses an additional threat to privacy. Actually the reverse is true. Data are stored for a purpose, and that "purpose" remains the same, the same need still exists, regardless of central or decentralized storage.

There are two major reasons why central storage is preferable. First, procedures to prevent unauthorized access to sensitive data are much more easily implemented and enforced on one location rather than ten. Secondly, privacy is only protected as well as the data quality permits. The most egregious examples of privacy violations in the past have invariably been accompanied by inaccuracies in data processing. These are much more readily restored in one location, rather than attempting to update ten different databases (with additional potential for yet more errors).

3. Privacy Protection Builds Trust

Protecting customer privacy is clearly in a company's best long term interest. It forms an integral part of a company's image and trust, its "brand value".

Unfortunately, because so many business leaders are focused on their next quarter's earnings, this simple truth doesn't always get the attention it deserves.

4. Identity Theft And Spam Are The Most Visible Violations Of Privacy Today

Although identity theft or takeover is (still?) largely an American problem, it is certainly on the rise in Europe as well (see tip #9, too). At an individual level this can have devastating consequences.

Spam is by far the most costly privacy violation of our time. It is estimated that 75-80% of all email messages are spam. That is over 45 Billion out of 60 Billion emails sent per day. Of these 45 Billion spam messages, 50-80% are sent by PC owners who have no awareness of taking part in these schemes, whose computers have been hijacked (so-called "zombie-PC's"). Interestingly, 200 known spammers are responsible for 80% of all spam (36 Billion spam messages per day). Talking about skewed distributions…

5. Some Spam Trends

The use of zombie PC's and scanning of their email contacts has allowed spammers to circumvent spam-filters more often: the recipient's spam filter 'thinks' the message is from someone familiar and lets it through.

Another innovation is the use of graphic spam where the email message is technically in the form of a graphic image containing text (it looks just like a normal message). Few spam filters can detect this form of spam. In 2005 this was 1% of all spam, in 2006 so far 12% of spam is based on this method.

6. A Powerful Weapon Against Spam Is Ruled Out, And Knock-out

An effective method against spam was devised by Blue Security Inc. from California. Users connected to their system are added to a "do not spam" list. When they receive spam, Blue Security sends a warning. If that isn't effective, an electronic complaint is filed. The overload of complaints arriving at spammers' servers will effectively bring down their server.

However, the Coalition Against Unsolicited E-mail has rejected Blue Security's "denial-of-service" tactics. Deliberate attempts to bring down other people's websites are deemed illegal. In May of this year a Russian based spammer counter attacked, through the use of tens of thousands of zombie-PC's. They also threatened to flood Blue Security's customers with viruses, and that's how they were forced to close their operation.

7. Keep Your Email Lists 'Clean'

Real-time Blackhole Lists (RBL's) are a quasi-legal entity that gather IP addresses of known spammers. It's easier to get on than off those lists. One of the things they monitor is the number and kind of bounces that come off mass distribution of emails. ISP's do business with RBL's to filter spam at the network level.

This is one more reason why you want to keep your email list as clean as possible. Once your IP address is associated with too many bounces, you may be blacklisted or blocked. You keep your email list clean by setting (conservative) bounce rules, and then removing suspect email addresses. Of course you wanted to track your campaign results in as true a fashion as possible anyway, so there always was a good reason for maintaining your lists well.

8. How (un-)Desirable Are Unique Person Identifiers like Social Security Numbers?

There has been enormous debate about acceptance of national personal identification numbers. Until now, privacy activists have managed to prevent any numeric key from gaining wide acceptance. However, the question whether this serves our data protection purposes best is not quite so simple.

The reason for concern is typically that people don't like the 'anonymous' nature of a number. But databases never identify people, they identify keys, be they names or numbers. The technical advantage of a numeric key is that internal coding (check digits) can enhance reliability. And matches are always unambiguous. A downside is deemed that numeric keys will facilitate data merging (by criminals) and therefore enable record consolidation.

The tradeoff is whether the potential for abuse poses a greater threat than accidental merging errors by legitimate parties when more error prone keys like name/birthdate are used. 'False positive' matches have been known to cause considerable harm to innocent victims. Clearly the potential for similar (sounding) names to be inadvertently consolidated poses yet another data quality problem, creating harmless "victims" of well intended privacy protection.

9. Phishing Is On The Rise In Europe, Too

For quite a while, phishing wasn't much of a problem in Europe. This difference was caused, fundamentally, by our stricter privacy regulation. Data sharing can be done more freely in he US, and therefore criminals in Europe have a much harder time piecing together a victim's identity. Credit Bureau and state records are much less easily obtained in Europe.

In 2006, the number of phishing email attacks and the number of phony sites that aim to entice the consumer to leave sensitive details has almost doubled in Europe, compared to 2005. With these sensitive details (e.g. credit card, or personal data) identity takeover attacks are planned whereby the criminal will transfer funds in the name of the victim.

10. Data Protection Laws Have a Huge Impact On Companies' Ability To Market Their Products And Services

Database marketing has been, and continues to be, one of the key areas of focus of data protection legislation. The 1998 Data Protection Act applies to both new and existing customers. All need to be informed to what end their personal data are being, or will be used, and by whom. Non-obvious uses or disclosures should be properly described. For instance cross-marketing or list rental require prominent notification.

Compliance pertains to fair and lawful use. In laymen's terms this means that you need to be able to demonstrate that you actually need the data to run your business properly, and/or it is in the customer's best interest to do so. In particular "sensitive" data (a new, 1998 Schedule 3 definition), require explicit consent. These data are frequently used for credit scoring and targeting for instance. It is likely that currently many businesses are at risk of non-compliance claims.

Further reading

An excellent book on Privacy (unfortunately out of print):

Database Nation – The Death of Privacy in the 21st Century.

Simson Garfinkel (2001) ISBN# 0596001053

Source Privacy - Tom's Ten Data Tips

Tom Breur: Biographical Sketch

Tom Breur is a consultant out of deep passion for his work.
He can be profoundly analytic, in his passionate quest to drive out the deepest business issues and the nexus point of a business model. It's all about finding where the least effort will generate the most results.

Once the business challenge becomes clear Tom loves to roll up his sleeves and get his 'hands dirty'.

Be it data analysis, market research, data mining or database work. Once the hands-on work gets started, his eyes begin to flicker, and he has a tendency to get carried away.

Tom has an academic background in Psychology, an education he took up twice. Initially he majored in Clinical Psychology (1986), years later he went back to college to study Economic Psychology (1996) with an emphasis on quantitative methods.

Tom is fluent in Dutch, English, French and German.

XLNT Consulting - Turning Data Into Dollars

Tuesday, October 21, 2008

Top 10 Things To Make Your Next Company Meeting More Exciting Part 1

Writen by Kevin Lloyd

10. Take notes in finger paint.

9. Bring a huge jar of Vaseline to the meeting. Display it prominently and keep muttering the words "I came prepared"

8. Laugh uproariously at a quip that was made 2 or 3 minutes ago. Say, "Oh, _now_ I get it!"

7. Wear a disposable paper facemask. Tell the group: "Hey, you don't want to catch what I've got!"

6. Make a face like somebody beside you farted.

5. Stand up and act indignant. Demand that the boss tell you "the real reason" this meeting has been called.

4. Have someone deliver a large cardboard box to you in the conference room. Apologize while you sign for it. About half an hour later, have a different person deliver another one.

3. Spill coffee on the conference table. Produce a little paper boat and sail it down the table.

2. Complain loudly that your neighbor won't stop touching you. Demand that the boss make him/her stop doing it.

1. Stay behind as everyone else, including the boss, leaves. Thank them for coming.

Have your own Top 10 List or something else to make a meeting more exciting, submit to OfficeComedy.com and Share it with the world.

OfficeComedy.com - Your source for Office related humor. Pictures, Business Humor, jokes, and articles.

Sunday, October 19, 2008

Friday, October 17, 2008

Thursday, October 16, 2008

Wednesday, October 15, 2008

Sunday, October 12, 2008

Thursday, October 9, 2008

Wednesday, October 8, 2008

Friday, October 3, 2008

Quality Printing For Your Brochures

Writen by Gary Wells

A professional quality brochure can attract interest to any business, organization, or cause. On the other hand, a poor quality brochure invites readers' criticism or scorn. Your brochure has a single shot at representing your interests to the public at large. That's why it is so important to use a top-notch print piece for your office, as a mailer, or in various locations throughout the community.

When preparing your brochure for print, make sure it has a clear format, design, and layout. This will give the printer a well-organized document for easy reproduction. Write readable text, use an easy-to-read font style and size, and provide generous margins. A sloppy print piece will be difficult to manage, and it may require several layouts until both the company and printer are satisfied.

You will need to find a reliable printer before the project is ready for duplication. Start with the yellow pages. Check out various ads, and call for estimates. You might want to visit the print shop for an idea of how organized, clean, and busy it is. Ask to see samples of print jobs or obtain contact information for references. If you know of printers in the neighborhood, stop in and introduce yourself. You also can get a word-of-mouth recommendation from someone who has received satisfactory or excellent print work.

Another way to find a professional printer is through your community's chamber of commerce. Many self-employed individuals and small companies register there, and some even advertise. You may get to know a printer personally before requesting help with a brochure-printing job. Just don't become too friendly, keeping in mind the old adage that business and pleasure don't mix.

Browse the Internet for quality print work, as well. You may have to email or fax a master copy for duplication, but copies can then be returned by mail, saving you transportation costs and time. Of course, you probably will have to pay mailing costs, but these may be cheaper than fuel expenses. Give the printer enough time to prepare the order and make any necessary adjustments before the final deadline of your brochure project.

Always get a written estimate up front, keeping in mind that slight adjustments may be necessary, depending on how the job goes. After the brochures have been printed, count them to be sure you get the correct number. Examine print type to check for smudges or fading. Look at the margins on each one, unless you have a huge order, to ensure that they are even and consistent. If the printer also folded or trimmed your brochures, look for uneven edges.

If the job comes back in acceptable format, keep the printer's contact information on hand for future jobs or referrals. But if you experience problems with the way your brochure turns out, and if the printer does not work willingly with you to resolve these problems, take his or her name off the Rolodex and start looking for another one.

For more information about brochures, visit Brochure design, brochure printing and more.

Hospital in Tennessee Thailand Hotels

Thursday, October 2, 2008

Connecting And Accessing Data Through Adonet

Writen by Pawan Bangar

Microsoft's ADO.NET technology offers a solution to many of the problems associated with data access.

Accessing data has become a major programming task for modern software programming, both for standardalone applications and for web based applications. Microsoft's ADO.NET technology offers a solution to many of the problems associated with data access.

ADO.NET is an improvement to Microsoft ActiveX Data Objects (ADO). It is a standards-based programming model for creating distributed data-sharing applications. ADO.NET offers several advantages over previous versions of ADO and over other data access components. These benefits fall into the following categories:

Interoperability

Maintainability

Programmability

Performance.

Connecting to a database:

For performing and operation we need to connect to a database. This is done automatically through ADO connection, of which code is associated with VS.net Programming environment.

Connecting Database

sharp1.cs class xyz1 {

public static void main()

{

try

{

System.Data.ADO.ADOConnection s;

S=new System.Data.ADO.ADOConnection();

System.Console.Writeline("C-Sharp);

}

catch(System.Exception e)

{

System.console.Writeline(e.ToString());

}}}

Above program can be compiled through command line at DOS promot giving command line option as /r:System.Data.Dll

Because the code for ADO.Connection is available at this DLL. The above program consists of an object s resembling as System.ado.adoconnection .

Thus we are creating the object s by the statement:

System.Data.ADO.ADOConnection s;

From the output it is clear that the constructor has thrown no exception, as otherwise catch block would have been executed.

About The Author
Presently working in the capacity of the Technical Director of Birbals, an e-consulting firm based in India dedicated in providing innovative and effective web, Hospitality and consultancy services to public, private and non-profit organizations. Successfully founded Birbals and other IT companies like Ebirbals and SeoBirbals.

Hospital in Tennessee Thailand Hotels

Wednesday, October 1, 2008

Laser Cutting Systems

Writen by Thomas Morva

Laser cutting systems are quite in demand for normal and high quality laser cutting of various substances?from fabric to metal. Depending on the need for laser cutting, there are different types of laser cutting systems. These are high speed cylindrical laser cutting systems, CO2 laser cutting systems, ion lasers, diode lasers, fiber lasers, etc.

Ion lasers stimulate the emission of radiation between two levels of ionized gas providing moderate to high continuous-wave output of around 1mW to 10W. Carbon dioxide lasers, on the other hand, use the energy-state transitions that exist between the vibrational and rotational state of the CO2 molecule to emit radiation that is of 10 µm, wavelengths. Carbon dioxide lasers have the ability to maintain a continuous and high level of power and are typically used for purposes like cutting, welding, etching, and marking applications.

Diode lasers are tunable and allow for adjustments so that they can emit any one of several different wavelengths. The other type of laser is fiber laser that uses optical fibers that are doped with low levels of rare-earth halides used as lasing medium for amplifying light.

Each of the above laser types has its individual laser-making systems, which can be varied according to their use. The strength of different types of lasers produced by different laser systems makes them versatile enough to be used for cutting even sensitive and delicate substances like thin cotton, and also to be used for cutting, scribing, marking, joining, and surface treating a variety of hard materials and metals.

A lot of these laser-cutting systems are high precision equipments. These are attached to computers that control the exact amount and strength of the laser beam. These are excellent for delicate or precision cutting as per exact requirements.

Thus, the choice of a particular laser system totally depends on the type of material that the laser is to cut as well as the purpose of the cut.

Laser Cutting provides detailed information on Laser Cutting, Laser Cutting Companies, Laser Cutting Machines, Laser Cutting Services and more. Laser Cutting is affiliated with Lean Manufacturing Seminars.

Hospital in Tennessee Thailand Hotels