Wednesday, February 25, 2009

10 Geeky Tricks for Getting Out of Bed in the Morning

Awesome list! Useful suggestions. I hate sleeping but unfortunately my body kicks my butt if I don't....

10 Geeky Tricks for Getting Out of Bed in the Morning: "Getting out of bed early can be difficult — but with the right techniques, you can make it easier.

"



(Via Wired: Top Stories.)

A collection of additional Safari 4 Beta hidden settings

Here's my favorite page with settings, though you need to know what the 'Terminal' is to engage them... http://swedishcampground.com/safari-4-hidden-preferences


A collection of additional Safari 4 Beta hidden settings: "In addition to restoring in-window tabs, it turns out that there are a number of other hidden preferences available in the Safari 4 Beta. In the interest of efficiency, I've chosen to list all of them that I know about (as of today, at least) in this one hint. As more are uncovered in the future, I'll run those as standalone hints. But for now, here's a list of seven (in addition to the one to move the tab bar) more tweaks you can apply to Safari 4 Beta.

Each of these are boolean variables, meaning they take a TRUE or FALSE argument. They also all default to TRUE, so to enable each one, you need to set its value to FALSE. To do that, use this command template in Terminal:

defaults write com.apple.safari key_name -bool FALSE
Replace key_name with the variables as shown below. To disable any one of the hacks, you can either reverse the ...



Add to digg
Add to Reddit
Add to Slashdot
Email this Article
Add to StumbleUpon


"



(Via Clippings.)

Tuesday, February 24, 2009

Ballmer: Microsoft anticipating Android threat to desktop OS

Ballmer's discussion recently is quite interesting. If anyone could make Linux viable on the desktop, it would be Google. They've launched fairly successful phones with their Android operating system and the prospect of a desktop operating system is really interesting to me. I believe Microsoft took a huge hit with poor Vista deployment and while I haven't had a chance to try Windows 7 yet (I have the disk, I just need to sit down and install it), if it isn't a near home-run, there will be some serious opportunities.

Ballmer: Microsoft anticipating Android threat to desktop OS: "

Steve Ballmer has stated that Microsoft believes that it will see Google as a growing force in desktop operating systems in the coming year – admitting the company is very much focused on Linux, Android and Mac OS X as key rivals.

Ballmer, speaking to Wall Street analysts at a Redmond 'strategic update' briefing, admitted the company sees Google's Android moving to laptops in the coming months, but described Apple's growing market share as 'not necessarily as dramatic as some people think'.

'From a market share perspective in the OS market Windows 'licensed' is number one in the market,' said Ballmer.

Windows 'Pirated'

'Number two is Windows 'Pirated' or unlicensed; that's a competitor that's tough to beat because it's at a good price and a heck of a product, but we're working on it.

'Linux and Apple certainly increased share somewhat. You can probably say Apple increased market share in [the] last year by a point or more and a point of market share on a number of 300 million is interesting...

'It's an interesting amount of market share, while not necessarily being as dramatic as people might think, but we're very focused in on both Apple as a competitor and Linux as a competitor.

Linux dynamic

'I think the dynamic with Linux is changing somewhat and I assume we're going to see Android-based and Linux-based laptops in addition to phones.

'We'll see Google more as a competitor in the desktop operating system business than we ever have before.

'The seams between what is a phone operating system and PC operating system will change and so we have ramped investment in client operating systems.'

Ballmer's stance is interesting, with the focus on Google showing Microsoft's awareness that Android is not likely to stay in the domain of the mobile phone.

Windows 7 - currently in beta - is garnering positive press, but Microsoft is clearly happy to invest to keep its place as the dominant force in operating systems going forward.



"



(Via TechRadar: All latest feeds.)

Monday, February 23, 2009

Why enterprise software is so shockingly bad

Why enterprise software is so shockingly bad: "Enterprise software is bad because it separates developers from users. A chief complaint is that it serves the CIO rather than corporate users; ease of use is lost in development."



(Via Clippings.)

In Depth: The 15 best file syncing apps on the planet

Great list of file syncing apps. I personally use a few of them and many are quite different but great list if you're looking for something for syncing. I personally find the Dropbox meets most of my needs; it's great being able to go from one computer to another and the files are always up to date.

In Depth: The 15 best file syncing apps on the planet: "

A desktop computer at home, one at work and a laptop for the road...

If you're like us you're probably using multiple machines every single day, and you'll need access to the same files on each one.

One solution is to carry your important work around on a USB stick - but nothing beats having access to a full backup, whether on an external drive, your laptop or online.

We pick the 15 best tools and services for synchronising and backing up your files.

1. Syncplicity
Easy to install on Mac or PC, Syncplicity backs up folders and files of your choosing to its cloud of servers. Working transparently once configured, you get 2GB of storage on two machines for free. 50GB for unlimited machines is $9.99 a month.

2. Live Sync
The first of three free-to-use entries from Microsoft, Live Sync enables you to access files and folders on a designated machine from any other computer. Your Windows Live ID is the key to all your files, allowing easy synchronisation between machines.

3. Live Mesh
Currently in beta but destined, we presume, to eventually replace Live Sync - Microsoft Live Mesh boasts similar computer-to-computer synchronisation features, but also allows you to back up files to the web using Live Desktop, with 5GB of free storage. There's Mac support coming too.

4. Mobile Me
Apples' Mobile Me file synchronisation service came under fire following bugs at launch. It's settled down into a useful tool for storing contacts, files, photos online, syncing with OS X apps, iPhone and - to a lesser extent - Windows . Subscription starts at $99 per year.

5. Drop Box
Available on Mac, Windows and Linux, Dropbox is a transparent tool for backing-up files and folders to the web. Files can be shared, accessed online and photos can be displayed in public galleries. A basic 2GB account is free, 50GB storage will cost $9.99 a month.

6. SyncToy
Aimed primarily at photographers, Microsoft SyncToy is free Windows software for creating and updating duplicate folders on separate machines or external drives. Useful for batch renaming, updating back-ups and combing folder contents.

7. Carbonite
Struggling a little to catch up with a recent influx of young pretenders, Carbonite works in a similar way to Syncplicity and Dropbox, but without their unlimited machine licensing. At $49.95 per year, it's great for simple back-ups on Mac and Windows.

8. MozyHome Free
Available on Mac and Windows, with unlimited backup for $4.95 a month and 2GB for free, Mozy fits the standard commercial pattern - but can handle unusual synchronisation jobs like Exchange, Outlook and SQL databases. Files are stored with 448 bit encryption for maximum security.

9. SyncBack Freeware
Free Windows software for synchronising dedicated files or folders between two machines. With SyncBack you can also back up to an FTP server or over a network - making it ideal for creating a 'roll your own' online synchronisation solution. Commercial versions are available too.

10. Second Copy
Second Copy for Windows synchronises files to and from any computer accessible location. Choose to simply copy, compress or synchronise between folders and configure advanced settings to select which fiels to backup.

11. Allway Sync
Freeware, Windows based synchronisation software with support for multiple file systems. Can be used to backup in 'one way' mode or sync. Best of all? Allway Sync runs from a USB Flash drive, making it the most portable solution. One for the toolkit.

12. ChronoSynch
The best commercial synchronisation tool for the Mac, ChronoSync will set you back $40. It not only synchronises files to external drives and networked machines, it creates bootable back-ups. Detailed log analysis tools enable you to check that you sync has gone swimmingly.

13. Unison File Synchroniser
Hardcore Linux users may prefer rsync - but we're suggesting Unison for its easier interface and cross-platform chops. Running on Mac, Windows and multiple UNIX flavours, Unison synchronises between folders. It matters not where your changes are made.

14. DirSync Pro
Fully open source, rather than just freeware, DirSync Pro is a lightweight backup and sync tool for Windows, Linux or Mac. Programmed in Java, you can carry it around on a USB stick and use it synchronise between different file systems.

15. GBridge
An extension that sits on top of Google Talk, GBridge enables you to create a VPN between designated machines, sharing folders, automatically syncing files and even sharing your desktop. Access your own machines or your Google Talk using friends. A bit like Live Mesh, but more Google-centric.

-------------------------------------------------------------------------------------------------------

Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register



"



(Via TechRadar: All latest feeds.)

Using your iPod Touch or iPhone to Sync Gmail Calendars and Contacts

Google enabled the calendar and contacts synchronization functionality over Microsoft's ActiveSync which is part of the 2.2+ software on the iPhone and iPod Touch. This is pretty cool in that you can sync your Gmail contacts and calendars now. Of course this won't work if you already are syncing to an Exchange server since you can only have one ActiveSync account setup but for those who have Gmail accounts and have an iPhone or iPod touch for personal use, this is awesome!

http://www.google.com/support/mobile/bin/answer.py?hl=en&answer=138740

How-To: Use Your iPhone as a Wireless Laptop Modem

Of course I can't endorse doing this however it is feasible and several people have confirmed it to work....

How-To: Use Your iPhone as a Wireless Laptop Modem: "The next time you’re stranded without an open WiFi network (but your 3G signal is going strong), you’ll be glad you installed Addition’s iPhoneModem 2 (free to try, full license is $9.99).



Add to digg
Add to Reddit
Add to Slashdot
Email this Article
Add to StumbleUpon



"



(Via Clippings.)

Sunday, February 22, 2009

In Depth: How to make a user friendly 404 error page

In Depth: How to make a user friendly 404 error page: "

As much as web design is about big things – getting your site structure right, creating a compelling visual design, ensuring your code doesn't cause browsers to copiously vomit error messages on an absurdly regular basis shortly before committing seppuku – it's also about little things.

A good site is polished and finely tuned, taking care to include and refine content that many users won't ever see, because the savvy designer knows full well that some of them will.

A case in point: the humble 404 error, an HTTP standard response code that's shoved in your face when a browser communicates with a server and promptly discovers that what it was looking for isn't there.

There are a whole bunch of reasons why a user might happen across such an error message, but they usually arrive because of one of two reasons: user error or webmaster error – unintended or otherwise.

Spulling mistokes

Probably the most common reason for a 404 is that someone with sausage fingers (or, indeed, perfectly normal fingers, but that's a much less funny image) hammered away at the keyboard, hit Enter, and failed to realise that the URL they wanted doesn't actually exist due to, for example, cunningly spelling 'contact-details.html' with some exciting extra characters that really shouldn't be there.

Net result: the server unintelligently goes 'We're all out of cpntact-details.html, I'm afraid' and spews out a 404. The other issue is your fault (assuming you're a designer, developer or general website-making person), if you've linked to something that doesn't exist (due to some amazing sausage-finger handiwork of your own) or if a once perfectly valid URL is now a dead link, due to you moving content about.

Depending on your hosting environment, the 404 can take on all manner of guises, most of which are somewhat unhelpful. On IIS, you often get an error message that makes perfect sense to web designers, but that will make the typical user squeal in horror at its barrage of technical information.

Apache is rather more blunt, uttering 'Not Found' and scant other information, doing the rough digital equivalent of slamming the door in your face and grumpily muttering about 'when it was much quieter around these parts and you didn't keep getting interrupted'. And if you're using Internet Explorer, there's a good chance it'll hijack whatever it should be showing to instead display Microsoft's 'friendly' error message anyway. (To be fair to Microsoft, its message is friendlier than the standard one, but hijacking default behaviour is always reprehensible and makes us angry.)

Creating custom error messages

With a little thought, most of this nastiness can be avoided, since it's simple enough to create custom error messages for the vast majority of hosting environments. This means that instead of seeing whatever garbage a server spews out, or whatever branded message your host has decided to apply (several hosts now cunningly hijack 404s to present an equivalent page with a URL back to their homepage, rather than yours), you get to decide exactly what appears on the error page. The important thing is to ensure that whatever you present is a lot better than what exists by default.

Jakob Nielsen more or less suggests that because default error messages are so appallingly bad, the very act of changing them at all is an improvement. However, he cites as a starting point taking into account three basic guidelines.

First, the error message must be written in a language that can be fully understood by everyone, including non-technical users, and in a way that doesn't imply what's happened is the user's fault. Secondly, the message needs to detail precisely what's gone wrong. Finally, suggestions need to be made regarding how the user can deal with the problem at hand.

A quick scoot around dozens of 404 pages shows that the majority of sites don't in fact take a great deal of notice of such advice. Some actually go as far as to call the user a ham-fisted idiot, which might just about be OK for a cartoon site for teens, but it's not going to win much praise for a shopping portal.

Too many sites also have a seriously geeky love-in, peppering their 404 pages with imagery and in-jokes that'd even make the typical B3ta aficionado wince and then request a claw hammer for uncurling their toes. (As a quick sidenote, the characters '404' are particularly overused as a design device, despite meaning nothing at all to non-technical people.) Most importantly, many of the pages simply aren't usable: they don't provide any indication of what's happened to get the user there, nor do they offer any means of helping them figure out what to do next.

Amazon's 404 page is brutally simple but surprisingly effective, and covers most of Nielsen's points in just a few lines of text. The user is told that the address entered is not a functioning page on the website, and a clear link is provided back to Amazon's homepage (along with a logo, which does the same).

Yes, the company could do more to help, but as a minimum Amazon's is a good model to follow. Play.com, by comparison, commits one of the worst sins in 404 world, by just redirecting you to its homepage instead of displaying any kind of error message.

The problem there is that a user might assume that the site itself is defective (rather than their typing or a search-engine listing) and go elsewhere. At the very least, it'll take a second attempt to get to relevant content, which psychologically makes people think negatively of the site that's being used.

If no-frills 404 doesn't appeal, others have taken their pages a bit further, with varying degrees of success. BBC News offers simple branding on a white background, and displays '404 - Page Not Found' in red.

Underneath, there's a clear explanation of why this page may have been arrived at, including a brief explanation of link conventions, stating that spaces and capital letters don't exist in BBC URLs. It also explains that the user can click the back button, and gives links to homepages and the BBC's full list of sites and services.

Note that the BBC provides a link to its sites and services, rather than nailing a site map to its error page. The latter was once considered good practice, but it can be overwhelming on an error page for lost users; nowadays, a diminishing number of sites use site maps in this way.

Search boxes

One device that's proving harder to shift, however, is the search box. Although it often makes sense to enable users to search from an error page, it's almost a method of avoiding truly helping the user out: you're providing the pretence of doing so, but actually forcing them to do further work themselves.

If you're keen on integrating a search, follow Microsoft's example. On visiting its 404, you're presented with a search form, but with results based on the erroneous string that led to you ending up on the error page.

Common misspellings are also corrected using a 'Did you mean... ?' sentence, and the entire system is far friendlier and more helpful than just presenting a barren search box. (Also, if your site has integrated search, try using your standard layout for your 404 – more on doing this later.)

If you have neither the time nor the inclination to work on an advanced search tool, there are other ways of helping users access your content. You could, for example, present a short list of links to particularly popular items or pages, or to recent posts on a news site or blog.

These shouldn't become a distraction, though, and simple design devices – headings, coloured boxes and so on – enable you to separate information regarding what's happened from suggestions regarding what to do next.

Fully integrated 404s

A final consideration is whether to fully integrate 404s into your site's design. Again, opinion is divided, with some suggesting that error pages should be simple and have no distracting elements.

Others note that if you do use your site's design on the 404 page it should be stripped back, lacking things like navigation. Frankly, we're not so sure: if your site has a fairly simple design there's really no reason why the 404 can't be directly integrated.

One of the best examples of this is Happy Cog's 404, which uses the site's standard layout, typography and navigation. Because all of the components of the site are clear, the user shouldn't be confused, and because the site's standard navigation is there, access to site sections is only a click away, rather than forcing the user back to the homepage before progressing. (Note, though, how Happy Cog still uses inline links within the error text to direct users to the homepage, design work and company information page.)

Apple also uses this kind of layout although its 404 is less successful, due to welding a site map (albeit a simplified one) to the page. Some might argue that these links enable you to access content more quickly, but Apple has a serviceable search in its navigation toolbar, and dozens of links clamouring for attention isn't what a lost user needs.

Once you're settled on the type of 404 you want to create and have put it together, making it live depends on the type of hosting you have, but is generally a simple process. For example, on Apache you can create a .htaccess file and use the following line of code to redirect the error message to your custom page (replacing '/path/to/file/' with the actual path to your file):

ErrorDocument 404 /path/to/file/404.html

Once you have your custom error pages up and running, things will be easier for your users. However, you can also take advantage of errors to make things easier for you. Consider setting up a system that provides you with reports detailing the 404 errors on your site.

The bulk of 404s will be mis-typed URLs, but many will be links to dead content from search engines, and some might unearth problems in your site itself. If you see the same strings showing up time and time again, you can do something about them, such as fixing broken links or redirecting popular URL misspellings to correct locations.

-------------------------------------------------------------------------------------------------------

First published in .net magazine, Issue 185

Now read 10 things to put on your web design to-do list

Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register



"



(Via Clippings.)

In Depth: 7 ways to make your laptop battery last longer

In Depth: 7 ways to make your laptop battery last longer: "

With the latest portable PCs, working on the move has never been easier, but laptops are still slaves to the National Grid.

You can do practically anything on a modern laptop, but their advanced features drain battery life to the extent that you can only get a couple of hours out of your laptop before it turns up its toes.

While battery life is a chief cause of mobile moans, it's possible to get significant improvements by simple good practice and a few software tweaks. To help you get the most from your laptop battery, here are seven easy ways to make it last longer.

1. Dim your screen

The screen is one of the most power-hungry parts of the laptop. It takes serious amounts of battery power to keep your display looking clear and bright. Saving this power is simply a question of turning the brightness down. The screen brightness button is usually located as a second function of one of the F keys, and is represented by a little sun symbol with up and down icons. To use it, just hold down the correct function key and then choose up or down.

2. Change power settings

Windows Vista comes with some great power features, which enable you to eke out the best performance when you're plugged into the mains, and optimise battery life when on the move. Type power options into the Start Search box and choose Power saver from the list. The Windows Mobility Center has more methods for saving battery life. These include settings for powering off the monitor and kicking into sleep mode more quickly.

3. Switch off Wi-Fi

One of the biggest battery sappers is the wireless networking capabilities built into most laptops. Wi-Fi drains the battery by constantly drawing power from the battery and, when not connected, looking for networks. When you're using your laptop away from the grid, the likelihood is you're away from wireless networks, so you can turn this device off. Many laptops have a function button that enables you to turn off the wireless adaptor manually to save yourself the unnecessary waste, but older laptops often don't have this. If this is the case, just go to the Control Panel, access the Network Connections menu and disable your wireless connection manually.

4. Turn off peripherals

Using USB peripherals can put a big drain on your system, because your motherboard has to power them, so unplugging everything saves juice. USB sticks, mice and webcams are common offenders, so copy all your information across and eject your devices as soon as possible, and put up with laptop track pads over your USB mouse. Many laptops have function buttons to turn off the built-in webcam, which drains the battery if given the chance.

5. Eject your disc drives

Having a disc spinning in the drive is a huge drain on resources, and many programs constantly do this. Simply eject your discs before you switch to battery power to gain vital extra minutes from your working day.

6. Invest in some hardware

Good practice can go some way to extending your battery life, but if you need to use your laptop throughout your working day, you're going to need some help. Most laptops come with a six-cell battery, but many manufacturers offer eight- or even 12-cell optional upgrades, which can double your power. The alternative to expensive laptop batteries are products such as the Philips Portable Power Pack, which gives you valuable extra hours for all your devices. The Philips is a compact battery unit that has adaptors for most laptops and mobile phones, which is portable enough to be placed in a bag and has enough capacity to double the length of your charge.

7. Disable features

Windows Vista has some handy built-in features, but many put demands on your system that are unnecessary when working on the move. Take the simple measure of turning off Windows Aero and the Windows Sidebar when you're on the move to make your laptop more efficient.

-------------------------------------------------------------------------------------------------------

First published in Windows Vista: The Official Magazine, Issue 27

Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register



"



(Via Clippings.)

Saturday, February 21, 2009

Windows Client OS Tips & Tricks

Petri put together another outstanding resource. This time it's a collection of killer tips for XP, Vista, and Windows 7.

Windows Client OS Tips & Tricks: "This page contains a collection of tweaking tips & tricks, articles and how-to guides, all related to Windows operating systems.
Further Reading:
Other articles might fit into the Tweaking, Installation and Security sections, so make sure you look there too.



"



(Via Clippings.)

Friday, February 20, 2009

Video: A method for turbo-charging your meetings

Video: A method for turbo-charging your meetings: "

Are employees’ eyes glazing over at meetings? Do you start to wonder why you’re even there? Edward Muzio of Group Harmonics explains how to turbo-charge your meeting agendas by using a basic template that inlcudes ‘expected outcomes.’


[video = 237243]








"



(Via Clippings.)

Thursday, February 19, 2009

Work faster in Word and Excel with keyboard shortcuts

Work faster in Word and Excel with keyboard shortcuts: "

If you're familiar with keyboard shortcuts, you probably know that you can cycle through your open windows by pressing Alt-Tab. But you may not know that pressing Alt-Esc moves between your open windows in the order they were opened.


There are simply too many useful key combinations to remember, ...

"



(Via Clippings.)

Wednesday, February 18, 2009

Windows 7: Enterprise Features Explained

Windows 7: Enterprise Features Explained: "

The lions share of attention about the Windows 7 beta has been on consumer features. The new taskbar with its jumplists, mouse-hover features, easy navigation and the more controllable user account control are the immediate attention-grabbers. But the under-the-hood, less 'sexy' enterprise features of Windows 7 are not as well known.

Recently, Microsoft has taken some criticism for neglecting enterprise needs with Windows 7.

[ SeeInfoWorlds Special Report: Early looks at Windows 7. Then get the analysis and insights that only Randall C. Kennedy can provide on PC tech in InfoWorlds Enterprise Desktop blog. And download our free Windows performance-monitoring tool. ]

Popular blogger and editor of Supersite for Windows Paul Thurrott recently said in an interview with CIO.com sister site Network World that Microsoft is treating enterprises as an afterthought and 'arbitrarily locking Windows enterprise features to Windows Server 2008 R2 and asking corporations to spend a significant sum of money.'

To that, Gavriella Schuster, Microsofts senior director of Windows product management, admits that Windows 7 features that need Windows Server 2008 R2 are not going to be deployed overnight. 'Some of these features are part of a longer-term strategy,' Schuster says.

Nevertheless, Microsoft continues to spread the word about how Windows 7 can help enterprises. In a recent interview, Schuster drilled down into what Microsoft believes are the key features.

DirectAccess

The DirectAccess feature, which requires both Windows 7 and Windows Server 2008 R2, lets mobile workers connect to corporate networks without the use of a VPN, giving business users more flexibility and easing the burden on IT.

Schuster says that with DirectAccess, users only need an Internet connection to have access to everything on the corporate network; they will never have to stop what theyre doing and log on to a VPN. This will reduce the use of corporate bandwidth as remote users will mostly be using their own local broadband, she says.

The benefit of DirectAccess runs deeper for IT managers, she says. 'For IT, the biggest challenge is managing remote laptops, knowing how long theyve been off network, when they came back on and when they got patched. With DirectAccess, as long as a machine is on and connected to the Internet, it can be managed.'

As for security concerns over there being no official VPN, Schuster says that DirectAccess is used with Windows Server 2008 R2 in the background, which will use the most secure protocol, IPv6, to encrypt data transmitted across the Internet. 'Its not as if you dont have a VPN or firewall; weve just integrated that into DirectAccess,' she says. 'There is no longer a separate step to get to that secured tunnel.'

BranchCache

BranchCache, which also requires the use of both Windows 7 and Windows Server 2008 R2, is a feature designed to speed up networks in remote offices that are away from corporate headquarters. Basically, BranchCache will speed the accessing of large remote files stored on the corporate network, says Schuster.

For example, a copy of a file server is downloaded from the corporate network and cached locally on Windows Server 2008 R2 at the branch office. When another user at the branch office requests the file, it is downloaded immediately from the local cache rather than over a limited bandwidth connection back to headquarters.

Users dont have to go back to the corporate network and use up bandwidth to download it again, Schuster says.

'And what IT can do with BranchCache is set the amount of partition on desktops in branch offices that can be used for caching, set how current documents need to be before forcing users to go back to the corporate network to get them again, and check what level of permissions users need to have,' she says.

Desktop Search

Windows 7 has bolstered enterprise search functionality from the desktop.

Although Windows Vista enhanced desktop search, and Microsoft has invested in SharePoint portal search and Internet search, the problem, according to Schuster, is that those are three different searches and you need to go to three different places.

'With Windows 7 we have federated that search,' Schuster says. 'So right from your desktop you can expand search from the desktop to SharePoint sites to the Internet and then go find a document wherever it may be: on your computer, on your network or on the Internet.'

With the 'federated' search in Windows 7, users can select which intranet and SharePoint sites are available for searching or IT can pre-populate a users start menu with links to specific Windows portal sites. Search results are presented in Windows Explorer the same way that users of Windows XP and Vista are used to.

BitLocker to Go

The BitLocker hard-drive encryption feature was introduced in Windows Vista to protect data on lost or stolen laptops. In Windows 7, the feature has been extended to protect storage devices such as external hard drives and USB sticks.

Called 'BitLocker To Go' in Windows 7, the feature allows external storage devices to be restricted with a passphrase set by IT before users have permission to copy data to them.

This will give enterprises the same confidence in USB external drives that they have in multi-volume drive encryption, says Schuster, adding that this has become a necessity with the growing amount of USB devices.

'Its so easy to lose external devices without even noticing, so BitLocker to Go gives businesses extra confidence that no one can get that data.'

AppLocker

Like BitLocker, AppLocker is in the security and control camp of Windows 7, and aims to protect users from running unauthorized software that could lead to malware infections.

For safety, Microsoft recommends that enterprises run in standard user, meaning there are no administrative rights to users at all. But if IT does give administrative rights to users, AppLocker can safeguard against running suspicious types of software. It allows IT to specify which applications can run on employees desktops, blocking potentially harmful software and allowing the applications and programs that users need.

'AppLocker allows IT to say, users can only install these types of applications,' Schuster says. 'And they can specify by software publisher or by version. For instance, users can only install Adobe Acrobat 8.1 or later.'






"



(Via InfoWorld RSS Feed.)

Drive Mappings via GPO without a logon script

One of the things I really like about Windows Server 2008 is the new and expanded set of Group Policy Objects. You now have the option to map network drives and printers. While we haven't done the printers yet, we have just finished replacing the logon script's drive mappings with the new GPOs. Microsoft's Technet blog does a nice job of detailing the procedure here. They also describe how to map drives based on group membership which works perfectly for our accounting, servicing, and other groups. Once maps are setup (and remember to apply the GPO to the computers, not users), mapping drives is a matter of adding a user to a group and away you go!

In Depth: 10 hassle-free ways to update your social sites

In Depth: 10 hassle-free ways to update your social sites: "

Social media sites are supposed to help us keep in touch with our friends, get organised and stay updated. There are so many to choose from now though - and so many friends to keep happy - that it's an overwhelming task keeping them all current.

We say, work smarter - not harder. Here are 10 ways to make your online social life easier and still be the life of the party.

1. Update Flickr quickly
The easiest way to edit then batch upload photos to Flickr has to be Windows Live Photo Gallery. Drag photos to the application, then crop or filter as required. Select the images you want to upload then go to 'Publish' and choose 'Publish on Flickr'. Once authorised by the Flickr API, you can create new albums for your pictures and resize them on the fly.

2. Easy YouTube uploads
Adding videos to YouTube one at a time is a pain in the proverbial, so use the new Multi-Video Upload feature. You'll need Google Gears installed - Google's web application sandbox. Click on 'Upload' and choose the 'Bulk Upload Plugin' link. You'll be prompted to allow the site access to Gears when you click 'Add Videos to List'. You can now select multiple videos in the Browse dialogue, adding as many as you like in one go.

3. Use Twitter to post status updates
Why not cut down your Facebook time and get your Twitter feed to take care of your status updates? Go to apps.facebook.com/twitter to install the official application. What's more your Twitterless friends can find out what you're up to as well.

4. hellotxt is status
What's that? You need to update your status on multiple sites? Alright then - HelloTxt can take care of that. With one login you can update Facebook, Twitter, Bebo, LinkedIn, FriendFeed and a bunch of others.

5. TweetDeck sorts wheat from chaff
There are other microblogging sites - but Twitter's the king. Thing is, those messages come in thick and fast once you have a decent sized group of friends. Enter TweetDeck. This cross-platform, Adobe AIR app connects to your Twitter account, allowing you to filter the stream of Tweets into manageable categories - either by group or search keyword.

6. Easy Facebook updates
Facebook toolbar for Firefox helps you update Facebook, without going to Facebook. You'll get notifications sent to your browser when someone sends you a message, updates their page or pokes you. More pertinently, you'll be able to update them - and share web addresses with your chums without leaving the page you're on.

7. Get with the NetVibes
Choose NetVibes as your start page if you're juggling several social media accounts hungry for daily updates. Sign up then go straight for the 'Add Content' tab. There are update tools for MySpace, Bebo and, of course, Facebook.

8. iGoogle can help
If you've already got a Gmail account - or even if you haven't - iGoogle's a cleaner, leaner alternative to NetVibes. Go to www.google.com/ig and login in with your Gmail account details. Next, click 'Add Stuff' and start searching for tools to make your social media updates easier. You'll find gadgets for Facebook, Twitter, Flickr and many more.

9. Digsby crosses platforms
Like any good countdown, we're leaving the most powerful tools until last. Digsby's an industrial strength combo of cross platform instant messenger and social media status updater. Connecting with Windows Live Messenger, Google Talk, AIM and Yahoo - it also boasts Facebook, Myspace, Twitter and LinkedIn status update tools.

10. Flock - the social media browser
For industrial strength networking, download Flock. It's built on the same code as Mozilla Firefox, but boasts a shell that helps you stay connected to your favourite social media sites all day long. With updates delivered direct to your sidebar - post to blogs, change your status and upload videos all from the same place.

-------------------------------------------------------------------------------------------------------

Now read Top 15 things you should never do on Facebook

Sign up for the free weekly TechRadar newsletter
Get tech news delivered straight to your inbox. Register for the free TechRadar newsletter and stay on top of the week's biggest stories and product releases. Sign up at http://www.techradar.com/register

Follow TechRadar on Twitter



"



(Via TechRadar: All latest feeds.)

Tuesday, February 17, 2009

10 tech mistakes small businesses make (and how IT consultants can help clients avoid them)

10 tech mistakes small businesses make (and how IT consultants can help clients avoid them): "

Small businesses must concentrate their time and energy on knowing their own industry — and that often means that effective technology practices get overlooked. Erik Eckel explains the most common tech missteps he’s encountered, along with preventive measures to protect businesses and prevent serious problems.





In today’s microwave society — in which just-in-time manufacturing models, heightened customer expectations, and 24x7 accessibility demands burden both manufacturers and service providers — little time remains for much else. Small businesses often don’t have the resources or inclination to track the latest computer news, security threats, or even common break/fix tips. And not all small business owners are adept at maintaining best technology practices.


As a result, small businesses frequently make certain technology mistakes. Here’s a look at these mistakes, along with specific steps IT consultants can take to assist small businesses in correcting these common failures.


Note: This article is also available as a download, which includes an annotated PowerPoint presentation based on this information.


#1: Insufficient technical support


Many organizations go without technical support, relying instead upon an employee whose love of Warcraft may make him or her the local office ‘computer guru.’ Other organizations may depend upon a staffer’s friend or relative (who’s ‘interested in computers’) to provide technology advice or assistance when critical systems fail or slow unacceptably.


Some turn to their hardware manufacturer’s telephone support line for help, only to be disappointed when the solution to many problems proves to be performing a reinstallation (thereby resulting in the loss of all the business owner’s data). Some rely upon a big box electronic store’s service arm, never receiving the same (novice, often undereducated, and inexperienced) technician twice. And still others locate a student or individual who provides computer support ‘on the side.’


These support methods are not cost-efficient. Nor are they effective information technology investment, troubleshooting, or administration options.


Small businesses need knowledgeable, trusted technology partners who are proficient with current technologies and willing to help learn their industry’s operations requirements. Once a qualified technology expert is familiar with a client’s needs, appropriate services and solutions can be recommended and deployed. The result is almost always more cost-effective, more efficient, more profitable operations for the client.


#2: Hardware/software issues


Smart organizations set PC service lives at three or four years. There’s a reason.


‘When you look at costs — particularly around a four- to six-year lifecycle — it may seem like you are saving money,’ says Info-Tech Research Group analyst Darin Stahl. ‘But really it’s costing you.’ That’s because support expenses increase. Retaining PCs longer than three or four years often results in repair and support costs that meet or exceed the price of new systems.


This is the second common tech mistake businesses make: They fail to standardize hardware components and software applications, where possible. The result is a mishmash of components that complicate troubleshooting, repair, and deployment and require companies to support a variety of programs with different license terms and renewal dates. Incompatibilities often result.


Worse, older and obsolete hardware is less efficient, increases downtime likelihood, feeds staff and customer frustration, endangers sales, and threatens other lost opportunities.


Small businesses can overcome common hardware and software issues by:



  • Retiring equipment at proper lifecycles, typically three to four years.

  • Standardizing hardware components.

  • Standardizing software applications.

  • Working with an IT consultant to leverage vendor relationships and reduce costs/negotiate more attractive pricing.


#3: Insufficient power protection


A single power outage, surge, or spike can damage expensive electronic components and result in critical data loss. Consistent surges and brownouts, meanwhile, shorten the lifespan of computers, printers, network components, and other equipment.


Many businesses deploy simple power strips. Others continue depending upon surge suppressors deployed five and even 10 years earlier. When thunderstorms, electrical outages, and other disasters strike, the damaged systems and corrupted or lost data — not to mention downtime — resulting from insufficient power protection prove costly.


Organizations should deploy quality battery backup devices (with built-in surge suppression) for all critical desktop PCs. Further, technology professionals should connect all servers to uninterruptible power supplies and test them regularly to confirm adequate failover protection is in place.


When deploying battery backups, businesses should properly install and configure corresponding cables and communications software. Network protections should be leveraged whenever possible, as well, in attempts to remediate cable modem, DSL, and other surge sources that can destroy telecommunications and computing equipment.


Since surge suppressor quality varies, organizations should purchase such equipment from trusted vendors. And since surge suppressors (and batteries) wear over time, businesses should replace them regularly.


Simple power strips should be avoided whenever any computer, server, network device, or other important component is present.


#4: Illegal software


Possessing illegal software may be the easiest trap into which many organizations fall. The issue is widespread (the Business Software Alliance estimates 22 percent of all North American software is unlicensed), making it our fourth common tech mistake plaguing small businesses.


Certainly, licensing issues quickly prove perplexing. The differences between OEM, retail, and open license software escapes the understanding of many business owners. Yet manufacturers are becoming more aggressive in locking down licenses (via product activation technologies) and prosecuting offenders (often via the BSA, which has collected more than $81 million in settlements).


Many organizations don’t recognize they do not ‘own’ software, since programs and applications are commonly licensed. Worse, some firms use ‘borrowed’ applications or pirated programs. Problems arise either in the form of audits and penalties or challenging delays (due to product activation conflicts and other licensing issues) when returning failed systems to operation.


Businesses must understand there are no shortcuts to running legitimate operations. All software, applications, and programs must be properly licensed.


With more manufacturers implementing product activation features, in which software programs report their installation and usage back to the manufacturer, overuse or outright piracy is becoming more difficult or impossible, anyway. But violations still occur.


Businesses can protect against licensing errors and penalties, and help ensure the fastest recovery times when failures occur, by carefully documenting and tracking all software license purchases and deployments.


Further, software licenses (including for operating systems, business line, and office productivity applications, accounting programs, security tools, and other utilities) should be purchased only from reputable technology partners. License sales on eBay that look too good to be true are.


Finally, when installing new programs, organizations should pay close attention to the license agreements they accept.


#5: Insufficient training


Mention software training in most any conference room, and you’re likely to hear groans. Boredom, bad classroom experiences, lack of interest, or complexity all contribute to employees’ resistance to learning new applications. But that doesn’t change the fact that insufficient training ranks as the fifth common tech mistake impacting small businesses.


How bad is it?


It’s estimated that office staff understand less than 20% of the available features in the software applications they use. That means 80% of the features, time-saving capabilities, and cost-reducing functions remain unused.


Gross inefficiencies result. As a consequence, many processes — including repetitive data entry, complicated calculations, and automated data selection and reporting — are completed manually, which introduces a greater likelihood of errors entering the process.


Tasks that could be completed in moments often consume exponentially more time. Considering that many of those tasks are repeated each business day by multiple workers, it’s easy to see how the costs quickly become significant.


Most small businesses don’t employ full-time trainers. Therefore it’s imperative that small businesses identify technology partners, training centers, or other programs that assist staff in maximizing software applications.


Even when training resources are present, there’s no guarantee staff skills will improve. For that to happen, businesses must make computer and software training a priority. Tap technology partners or other consultants to conduct regular lunch-and-learn sessions. The business can spring for lunch and, for a few hours of consultant’s fees, expose entire departments to important new features and capabilities.


An organization’s technology training commitment can be reinforced using performance reviews. Businesses can add specific course, off-site training, and even certification requirements to staff education programs and performance review objectives. When partnering with a local training center, businesses can create customized instructional programs or select prepackaged modules.


Organizations with limited budgets, meanwhile, can leverage self-paced instruction manuals and computer-based training aids to assist employees in improving their skills after hours or in their own homes.


#6: Security failures


Small businesses frequently fail to accommodate security issues. Organizations either don’t recognize the risks or don’t take them seriously.


The costs are staggering. Large U.S. organizations lose some 2.2% of their annual income due to security attacks, according to an Infonetics Research ‘Costs of Network Security Attacks’ report. That’s expensive. The FBI estimates such computer crime costs U.S. industry in excess of $400 billion.


Organizations don’t need to have a high profile to become a target, either. Hackers have created innumerable automated programs that scour the Internet 24 hours a day, 365 days a year, seeking poorly secured systems, servers, PCs, and networks to infect and exploit.


Unfortunately, businesses everywhere are falling victim to compromised systems, robotic attacks, identity and data theft, and more. Organizations that fail to properly secure client and customer data often find themselves in the middle of security crises that result in bad press, lost sales, and forfeited customer trust.


Fortunately, completing simple steps assists small businesses in preventing security failures. Here are several best practices all organizations should adopt:



  • Implement and enforce strong password security policies for all PCs, servers, network equipmen, and software applications.

  • Regularly update operating systems, network equipment firmware, and applications with the latest security patches.

  • Deploy business-class firewalls in all locations; connect no systems directly to the Internet.

  • Secure all wireless networks.

  • Disable guest accounts.

  • Implement Internet and e-mail usage policies that preclude personal use of those technologies.

  • Prohibit file-sharing programs.

  • Deploy proven antivirus, anti-spyware, and anti-rootkit applications and update them regularly.

  • Regularly perform security audits and correct all deficiencies.


#7: Poor backup strategies


Despite numerous choices, methods, and options, many organizations fail to adequately back up data — a mistake that can be unrecoverable.


Statistics reveal there is a 50% chance an organization will cease operations immediately when critical data is lost. Worse, an organization’s odds of failure rocket to 90% within two years when critical data is lost. Data losses cost an average of 19 days’ productivity. Recovering data from damaged disks, meanwhile, is incredibly expensive.


Even organizations that believe their data is properly protected may find themselves at risk. Occasionally, incorrect data (as in the wrong data) is backed up. In other cases, tape backups prove unreliable. (Gartner Group estimates only half of all tape backups restore successfully.) Fortunately, small businesses can follow simple steps to securely protect their data.


Since data backups are so critical to an organization’s livelihood, small businesses should work with proficient IT consultants or technology partners to ensure the right data is being backed up and that it’s being backed up as frequently as required. In addition, technology professionals should regularly test backup sets to confirm the data can be recovered in its entirety.


Consultants can work with small businesses to determine what data, files, and information should be backed up, how often to create the data sets, where to locate the backups, and how often to test the sets’ integrity. Consultants also prove invaluable in updating backup routines when software upgrades, migrations, and other updates change critical file locations. Further, technology professionals can ensure business data remains secure, which is a critical concern for physicians, financial institutions, and even retail outlets.


#8: Virus exposure


Viruses not only remain a major threat, but their dangers are increasing. The BBC reports that unprotected PCs become infected within eight seconds of being connected to the Internet.


Infections are proving expensive, too. In the book The Dark Side of the Internet, author Paul Bocij estimates the average virus incident costs organizations $2,500 in remediation and data recovery expenses. A report by ICSA Labs places businesses’ costs even higher (at $99,000 per incident).


And the numbers, varieties, and types of threats only increase. Malware programs are evolving at such a clip that many security software vendors have eliminated daily updates in favor of distributing patches every four hours.


Often, businesses and users simply fail to implement protection. A survey conducted by the National Cyber Security Alliance revealed that 67% of the respondents did not have up-to-date antivirus software. Worse, some 15 percent had no antivirus application installed.


#9: Spyware exposure


Before we address virus solutions, let’s visit spyware, which is an equal threat — and potentially even more daunting.


Spyware differs from viruses in its nature (spyware typically aims to track user behavior, collect user information or sensitive data, and display unwanted advertisements, whereas viruses often destroy data, corrupt systems, or enable hackers to remotely control a system). But spyware’s business impact has reached epidemic levels.


The respected trade group CompTIA estimates spyware infections require two-and-a-half days to resolve and cost small and medium-size businesses $8,000 a year, which doesn’t factor lost revenue. As evidence businesses aren’t doing enough to protect themselves from the threat, CompTIA pointed to the information its research recently uncovered. More than a quarter of business users reported their productivity suffered as the result of a recent spyware infection, and more than a third reported being infected multiple times within the last six months, with some reporting being infected as many as 10 times!


No virus or spyware strategy is foolproof, but most technology consultants recommend the following steps:



  • Install reputable antivirus and anti-spyware applications.

  • In high-risk environments, a second standalone anti-spyware application is warranted.

  • Regularly update antivirus and anti-spyware programs.

  • Do not let antivirus and anti-spyware program licenses expire.

  • Perform regular automated antivirus and anti-spyware scans.

  • Regularly review security program log files to confirm proper operation.


Further, businesses should avoid deploying ‘free’ security products in businesses. These products are often deployed in violation of the license agreements (which require licensing the software in businesses, academic facilities, and nonprofit organizations) and don’t support frequent updates, real-time protection, or automated scans.


#10: Unsolicited E-mail


Most every business and user is familiar with the problem of unsolicited e-mail, also known as spam. Spam messages have become a serious issue, particularly for small businesses that often misunderstand the problem and fail to take effective countermeasures.


The Radicatti Research Group estimates spam costs businesses more than $20 billion a year. Further, almost half of all e-mail is estimated to be spam.


Thus, small businesses are investing valuable time, money, and system resources processing, delivering, and even storing these unsolicited e-mail messages. In addition to lowering productivity (staff must regularly sift through hundreds or more junk mail messages, deleting the spam, in search of legitimate e-mail), spam takes a toll on an organization’s servers and workstations, which often must dedicate processor cycles, disk space, and backup media to untold gigabytes of unwanted mail.


Technology consultants wield several weapons in the war on spam. In addition to network filtering software, consultants can deploy server-based spam protection. Some organizations choose to outsource e-mail processing to a vendor that can monitor e-mail streams and filter out unwanted messages.


But such filters can generate false positives. And they’re not cheap. Therefore, it’s often a good idea to begin by adopting effective methods for managing unsolicited e-mail messages. Here are several first steps all e-mail users and small business owners may take to minimize spam:



  • Do not publish e-mail addresses in plain text on Web sites; instead use form-based tools that prevent robotic harvesting.

  • Avoid forwarding chain e-mail messages.

  • Ignore credit repair, get-rich-quick, and other common e-mail solicitations.

  • Use reputable e-mail filters (such as those included in Microsoft Outlook, Google Gmail, and other programs).

  • Read all terms before ever submitting your e-mail address to another party.

  • Review privacy policies before ever providing an e-mail address.

  • Consider creating a free e-mail account (Yahoo, Hotmail, Gmail, etc.) for submitting to third parties.








"



(Via 10 Things.)