tag:blogger.com,1999:blog-88430773252811507192023-12-12T09:01:02.025-05:00Goda ReportPaulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.comBlogger16125tag:blogger.com,1999:blog-8843077325281150719.post-9851166018294405182010-12-07T08:16:00.000-05:002010-12-07T08:16:38.293-05:00Cloudy on Cloud computing?<div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">It’s not just the Cloud, but Clouds.</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">Just as you access multiple cable channels you can access multiple clouds.</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">A good way of thinking about The Cloud is like cable channels. You have a basic package and can add as many other channels both paid and free as you work in the Cloud.<span class="apple-style-span"><o:p></o:p></span></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">The three segments of cloud computing: <o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">1. Cloud Infrastructure, the hardware and other infrastructure to be a cloud provider.<o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">2. Network Services, which provides the interconnection between all the points of a cloud, including the connection from the client to the cloud provider.<o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">3. Cloud Applications which concerns specific applications that would be accessed in the cloud instead of on-premise, such as HR, CRM or document management -- what's commonly known as software-as-a-service.<o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">As the IT industry moves to cloud computing one fact remains unmistakable: the cloud, still has to exist in the physical world as a data center full of heavy iron and humming like the factory that it is -- a factory manufacturing compute cycles.<o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="apple-style-span"><span style="color: #333333; line-height: 115%;"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></span></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="apple-style-span"><span style="color: #222222; line-height: 115%;">T</span></span><span style="color: #222222; line-height: 115%;">he biggest legitimate cloud provider is Google, made up of 500,000 systems, 1 million CPUs and 1,500 gigabits per second (Gbps) of bandwdith</span><span class="apple-style-span"><span style="color: #222222; line-height: 115%;">. Amazon comes in second with 160,000 systems, 320,000 CPUs and 400 Gbps of bandwidth, while Rackspace offers 65,000 systems, 130,000 CPUs and 300 Gbps.<o:p></o:p></span></span></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><span class="apple-style-span"><span style="color: #222222; line-height: 115%;"><br />
</span></span></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">You access one very secure cloud when you do online banking. You access another cloud when you buy online music for example. The payment for the music may come from the banking cloud so their connected but separate.</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">It is generally agreed that this dark web is much larger than the <i>World Wide Web. </i></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><i><br />
</i></span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">The world wide web could be considered one cloud, but it’s not the only cloud. There are clouds referred to as being in the dark web.</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">This is information that is not indexed by the popular search engines. It is shared on the web but only to authorized users. Most of the time this information is accessed through VPN’s (virtual private networks) and you need credentials to log on. Companies large and small collaborate and share information this way.</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;"><br />
</span></div><div class="MsoNormal"><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif;">For more information on managing you data in the cloud, contact me or visit my website <a href="http://www.paulgoda.com/">http://www.paulgoda.com</a></span></div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com1tag:blogger.com,1999:blog-8843077325281150719.post-33200929276501421952010-11-08T11:51:00.000-05:002010-11-08T11:51:01.945-05:00G-Cloud Security<div style="text-align: center;"><span class="Apple-style-span" style="color: green; font-family: Arial, Helvetica, sans-serif; font-size: 16px;"><strong><span class="style10" style="color: black;">A very robust solution to Cloud security by a name you know.</span></strong></span></div><div class="h1" style="color: green; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; font-weight: normal; text-align: center;"><strong>HP Labs shares its vision of how cloud computing</strong></div><div class="h1" style="color: green; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; font-weight: normal; text-align: center;"><strong>could transform public sector IT services</strong></div><div class="h1" style="color: green; font-family: Arial, Helvetica, sans-serif; font-size: 12pt; font-weight: normal; text-align: center;"><strong><br />
</strong></div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">One major impediment to the adoption of cloud computing has been a fear of placing sensitive data up ‘in the cloud.' That's an especially serious concern for government officials charged with managing services – such as healthcare, criminal justice, and defense – that require the storage of highly personal or secret information.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">It's one reason why governments want to create their own cloud networks, rather than run their services on public cloud systems.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="float: right;"><img alt="Martin Sadler, Director, Systems Security Lab." height="216" src="http://paulgoda.com/images/sadler_th.jpg" style="padding-left: 8px;" width="153" /><div class="style1" style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal; padding-left: 8px;"><span style="color: #666666;">Martin Sadler, Director,<br />
Systems Security Lab.</span></div></div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><strong>Virtualization as a solution to the security challenge</strong></div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">To achieve their potential, cloud networks necessarily separate service providers from the providers of the software and hardware infrastructure that run those services.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">"But that begs the question of who is taking care of security," says Martin Sadler, Director of HP's Systems Security Lab. "With all of those handovers and all those different groups of people, it can be anyone's guess."</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">One solution to this problem is to exploit the very technology that makes cloud computing possible: virtualization. By running virtual systems on top of actual, physical infrastructures, cloud networks can dynamically shift workloads to efficiently accommodate demand within the physical resources available.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">Similarly, the job of security can itself be virtualized.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">"In effect," says Sadler, "you create virtual machines to watch other virtual machines.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">" HP's G-Cloud Demonstrator shows a G-Cloud automatically protecting itself in this way using security technology developed in Sadler's lab. It also allows the cloud system to be viewed from a number of perspectives.</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">"For some people concerned with security, a top-level view of the system is the only thing that matters," Sadler notes. "But then other people want to see different levels of abstraction, all the way down to those who want to see packets flying around. And with this Demonstrator, you're actually able to do that."</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;">As a result, IT administrators can alter how they think about security. "It's now a resource," argues Sadler. "The moment you think you're under attack, the systems deploy more resources dynamically to mitigate it. But the moment you cease to be under attack, it releases those resources back up."</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><br />
</div><div style="color: #333333; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: normal;"><a href="http://paulgoda.com/" style="color: #0099ff;">Goda's</a> note. This is a synopsis to read the full article <a href="http://www.hpl.hp.com/news/2010/oct-dec/gcloud.html" style="color: #0099ff;">click here</a>.</div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-32514746120570592832010-11-05T14:49:00.002-04:002010-11-05T14:49:55.704-04:00Code<div class="MsoNormal">Interested in learning website design using Microsoft Expression Web? </div><div class="MsoNormal"><br />
</div><div class="MsoNormal">I started writing HTML years ago by hand. Have tried or used many programs over the years but found most of them to be lacking in some way or the other. I always had to fall back on hand coding to clean up the messy code that these programs produced.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Expression Web while not perfect is the best I’ve used so far. For anyone familiar with other Microsoft products it’s pretty easy to learn. But every one needs help at one time or another.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">I have been lucky to have an older cousin willing to help me over the years. Having some one to call or send my code for him to check has saved me from wasting a lot of time and frustration.</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">If you would like an older cousin’s help call 704-651-0585 or email <a href="mailto:paul@paulgoda.com">paul@paulgoda.com</a>. To see my work visit <a href="http://paulgoda.com/">http://paulgoda.com/</a></div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-63393931482944276692010-08-13T23:37:00.002-04:002010-11-13T10:53:46.718-05:00America: A new way forward?"<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;">Even if the economy eventually recovers all the losses of the recession, the Federal Reserve estimates that it will take five or six years to return to full employment. The pain of the Great Recession may last for the best part of a decade.</span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;"><br />
</span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;"></span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;">Obama administration’s</span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;"> </span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;"><a class="bodystrong" href="http://www.ft.com/cms/s/0/78dc215e-89ed-11df-bd30-00144feab49a.html" style="color: #003399; font-weight: 700; text-decoration: none;" title="FT - Obama sets up export growth panel">goal of doubling exports</a> </span><span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;">within five years." </span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;"><br />
</span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;">Of what? </span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: small;"><span class="Apple-style-span" style="font-size: 13px;"><br />
</span></span><br />
<span class="Apple-style-span" style="font-family: Arial, Helvetica, sans-serif; font-size: 13px;">Read this Financial Times article if you want to know what our choices on the economy look like for the next few years.</span><br />
<br />
<a href="http://www.ft.com/cms/s/0/3589e870-a63d-11df-8767-00144feabdc0.html">http://www.ft.com/cms/s/0/3589e870-a63d-11df-8767-00144feabdc0.html</a>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com2tag:blogger.com,1999:blog-8843077325281150719.post-79497874978141587382009-12-15T13:32:00.002-05:002009-12-15T13:32:53.311-05:00Along with the P’s of marketing we now have the C’s<div class="MsoNormal">Relevant user generated <b style="mso-bidi-font-weight: normal;">content</b> delivered in a <b style="mso-bidi-font-weight: normal;">context</b> that makes it easy for people to make <b style="mso-bidi-font-weight: normal;">connections</b> and build a <b style="mso-bidi-font-weight: normal;">community</b> based on a shared interest.<br />
</div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-70635336951052922102009-11-25T11:15:00.002-05:002009-11-25T11:15:46.820-05:00Viral Micro Marketing in Charlotte, NC.<div class="MsoNormal"><span class="apple-style-span"><span style="color: black; font-family: Verdana; mso-bidi-font-size: 9.0pt;">“Micromarketing is the practice of tailoring products and marketing strategies locally within a smaller region such as city and/or county. This practice of marketing is common with mom and pop restaurants, grocers, and other small business establishments that cater to a local audience. Micromarketing includes the practice of individual marketing where a marketing message is crafted more personally to a buyer.”</span></span><span class="apple-converted-space"><span style="color: black; font-family: Verdana; mso-bidi-font-size: 9.0pt;"> </span></span><br />
</div><div class="MsoNormal" style="mso-layout-grid-align: none; text-autospace: none;"><br />
</div><div class="MsoNormal" style="mso-layout-grid-align: none; text-autospace: none;"><a href="http://wiki.answers.com/Q/What_is_micromarketing">http://wiki.answers.com/Q/What_is_micromarketing</a><span style="font-family: Segoe; font-size: 15.5pt; mso-bidi-font-family: Segoe; mso-bidi-font-size: 10.5pt;"><o:p></o:p></span><br />
</div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com1tag:blogger.com,1999:blog-8843077325281150719.post-82465839656780890322009-11-23T16:50:00.001-05:002009-11-23T16:52:04.599-05:00What me worry<h3 style="margin-bottom: 7.5pt; margin-left: 0in; margin-right: 0in; margin-top: .75pt;"><span style="font-family: Arial; font-size: 12pt;">A must read for anyone interested in how new media effects us all.</span><span style="font-family: Arial; font-size: 12pt; font-weight: normal;"><o:p></o:p></span></h3><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333;">A tweet from <a href="http://twitter.com/GuyKawasaki" title="Guy Kawasaki"><span style="color: #0084b4;">GuyKawasaki</span></a> leads me to an excellent article by Buzz Canuck “</span><span style="color: #003366;"><a href="http://ow.ly/ERq4">16 Social Media Trends for 2010</a>”</span>.<o:p></o:p><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">That’s how information moves in new media.<o:p></o:p><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal">Mass Marketing is an oxymoron. Micro Marketing is the new meme. <o:p></o:p><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><strong><span style="color: #333333; font-family: 'Trebuchet MS';">7) Brandividuals</span></strong><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';">- borrowing the</span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';"><a href="http://authenticorganizations.com/harquail/2009/06/11/why-we-want-brandividuals-on-social-media/"><span style="color: #003366;">term from David Armano</span><span style="color: #003366; text-decoration: none;"><img border="0" height="1" src="file:///C:/DOCUME~1/PAULGO~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif" v:shapes="snap_com_shot_link_icon" width="1" /></span></a></span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';">that suggests personal brands = corporate brands - the myth that you can have a personal life and a professional life in social media simultaneously continues to wither away<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">with</span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';"><a href="http://buzzcanuck.typepad.com/agentwildfire/2007/05/user_generated_.html"><span style="color: #003366;">70% of what's on the web expected to be user generated or social by 2013</span></a></span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';">- you need to be everywhere<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">Or my favorite<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">with</span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';"><a href="http://wave.google.com/help/wave/about.html"><span style="color: #003366;">Google Wave</span><span style="color: #003366; text-decoration: none;"><img border="0" height="1" src="file:///C:/DOCUME~1/PAULGO~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif" v:shapes="_x0000_i1026" width="1" /></span></a>, never again will you be stuck in an email back and forth, think about</span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';"><a href="http://cc.fullcirc.com/browse/development/webex/"><span style="color: #003366;">WebEx</span><span style="color: #003366;"> </span><span style="color: #003366; text-decoration: none;"><img border="0" height="1" src="file:///C:/DOCUME~1/PAULGO~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif" v:shapes="_x0000_i1027" width="1" /></span></a>for consumers.<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">There are things we simply have to do like answering our email but how much more involved do I have to be? Do I need a blog; is twitter a required business skill for anyone doing business in the twenty first century?<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">What happens when you or your company is picked up because of for good or bad you’re part of a really interesting story? How prepared am I for my fifteen minutes of internet fame?<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><strong><span style="color: #333333; font-family: 'Trebuchet MS';">14) Word of Mouth Marketing</span></strong><b><span style="color: #333333; font-family: 'Trebuchet MS';"> </span></b><span style="color: #333333; font-family: 'Trebuchet MS';">- despite all form of exciting new tech and media advancements, the power of the human voice still ranks #1 ...and rising<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">He finishes this great article with this prediction: </span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';"><a href="http://www.techcrunch.com/2009/06/09/cisco-by-2013-video-will-be-90-percent-of-all-consumer-ip-traffic-and-64-percent-of-mobile/"><span style="color: #003366;">Estimates are as high</span><span style="color: #003366; text-decoration: none;"><img border="0" height="1" src="file:///C:/DOCUME~1/PAULGO~1/LOCALS~1/Temp/msohtml1/01/clip_image001.gif" v:shapes="_x0000_i1028" width="1" /></span></a></span><span style="color: #333333; font-family: 'Trebuchet MS';"> </span><span style="color: #333333; font-family: 'Trebuchet MS';">as 90% of internet traffic and 64% of mobile traffic will be video-based by 2013.<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">What will happen to broadcast TV with that many people’s eyes glued to the ultimate reality show, one that we all create together?<o:p></o:p></span><br />
</div><div class="MsoNormal"><br />
</div><div class="MsoNormal"><span style="color: #333333; font-family: 'Trebuchet MS';">Next, is Google Wave the next big thing?</span><br />
</div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-4224657692085460422009-11-21T20:59:00.000-05:002009-11-21T20:59:56.639-05:00Google WaveThe complete guide to Google Wave <a href="http://ow.ly/Ejue">http://ow.ly/Ejue</a>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-85250630928135474162009-11-17T23:52:00.004-05:002009-11-20T14:34:58.661-05:00Second opinionWe all know competition is tough. In today’s climate hard work and knowing your business is expected. But are you sure you're doing all you can? Are you willing to look at new ideas.<br />
<br />
That’s where a second opinion comes in. Some one with no product or service in mind gives an honest look at your marketing communications.<br />
<br />
If you need a second opinion contact me.Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-78958162503048497092009-10-27T12:48:00.001-04:002009-10-27T12:49:48.389-04:00Social Engineering.<br />
<br />
“it is much easier to trick someone into giving a password for a system than to spend the effort to hack into the system” Devin Mitnick reformed computer criminal turned security consultant.<br />
<br />
The hacker appears to be someone, in an official capacity, who he is not. The two people in most cases never meet each other.<br />
<br />
It starts with Pretexting. This is the set up where some plausible story is given as to why the sensitive information is needed. “We need your login in and id so we can reset them”.<br />
<br />
“No ones told me this was going to happen?” you ask. “We may have some suspicious activity here and need your help to check it out” they reply.<br />
This technique has worked many times and it seems the higher up in the organization you go the better it works.<br />
<br />
In a study first completed in 2003 and later repeated 90% of office, workers gave their password on a survey in exchange for a cheap pen.<br />
Bottom line.<br />
<br />
Never give out sensitive information to anyone who doesn’t have a “need to know” This is a tenant common when working in a government run security environment. <br />
Say a Friendly co-worker asks for your id and password. Why do you need it, you ask. Someone from the home office needs it. In this case, in the absence of a company memo I would be suspicious of some social engineering taking place.<br />
<br />
Therefore, the threat may come in the form of personal contact or more commonly from an email or phone call.Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-53155856567157348742009-10-14T15:20:00.001-04:002009-10-14T15:21:23.395-04:00<div class="separator" style="clear: both; text-align: left;"><a href="https://1.bp.blogspot.com/_njB01JaAdW4/StYkerwQqNI/AAAAAAAAAI8/PRmfkanwPyw/s1600-h/Nat+Security+Mo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img $r="true" border="0" src="https://1.bp.blogspot.com/_njB01JaAdW4/StYkerwQqNI/AAAAAAAAAI8/PRmfkanwPyw/s320/Nat+Security+Mo.jpg" /></a><br />
</div>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-79242838571156499982009-10-14T10:23:00.002-04:002009-10-14T10:28:02.592-04:00Halloween trick?<span style="font-size: large;">Suspicious?</span><br />
<br />
<span style="color: #666666;">-----Original Message-----</span><br />
<span style="color: #666666;">From: UK LOTTERY [mailto:cc-district-clerk@sbcglobal.net] </span><span style="color: #666666;"><br />
</span><span style="color: #666666;"></span><br />
<span style="color: #666666;">Sent: Friday, October 09, 2009 9:13 AM</span><span style="color: #666666;"><br />
</span><span style="color: #666666;"></span><br />
<span style="color: #666666;">To: undisclosed recipients:</span><span style="color: #666666;"><br />
</span><span style="color: #666666;"></span><br />
<span style="color: #666666;">Subject: </span><br />
<span style="color: #666666;">You have just been awarded, £800.000.00 GBP in the UK Online Promo, send us yourNames,Address,Country,Sex/Tel.</span><br />
<br />
<strong>You got to be kidding me.</strong> While I do not get much spam email, I did receive this little gem. Anyone who responds to this is at best wasting their time and maybe their money. Don’t do it. If you do, email me your horror story to share.<br />
<br />
The only thing I can attribute my lack of spam to is Go Daddy hosting my email. I don’t do anything special beyond the usual precautions. I run Norton, Windows Defender, CCleaner, and Malwarebytes.<br />
<br />
I am installing the Microsoft “October big drop” update for Windows XP. One interesting thing I picked up is Windows Malicious Software Removal Tool - October 2009. I might drop Malwarebytes if windows has as good a tool. <br />
<br />
If you have any comments please drop me a line. <br />
<a href="mailto:Paul@PaulGoda.com">Paul@PaulGoda.com</a>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-67097239958187294492009-10-13T17:44:00.000-04:002009-10-13T17:44:58.508-04:00I have been updating my website and found the search engines have been very kind to me. I’ve tried keywords and description tags in the header of the html page. Not much luck.<br />
It seems frequency of update to a web page helps it’s ranking. I don’t have many links to pages outside my website and only one incoming link. <br />
The trick is to associate Paul Goda with some service that people are looking for.<br />
<br />
Email <a href="mailto:paul@paulgoda.com">paul@paulgoda.com</a>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-29527502473464316352009-10-09T17:28:00.000-04:002009-10-09T17:28:27.095-04:00Website updateI have been working on a new personal web page at paulgoda.com. All the elements are set using external style sheets. It's taken me a couple of weeks but the fun was in the learning. <br />
<br />
Microsoft Expression Web is an excellent choice for people wanting a robust web authoring too.<br />
The css editor is very powerful once you get the hang of it.Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-57136910740060253522009-09-21T12:22:00.003-04:002009-09-21T13:19:03.703-04:00MyLifeI have been checking out a new social networking site called mylife.com. <br />
<br />
MyLife is one of those shady sites that collects and sells people’s information like Intelius and US Search. By assuming the appearance of a social networking site, they collect information on you and your friends to build a database of names, addresses, birthdates and email addresses. Not only do you pay for any information you get from them, you also set up your friends to be contacted by email with out your knowing or approving. <br />
<br />
If you want to find old friends try LinkedIn or facebook. These are reputable sites who do not use your information to bother your friends with unwanted email. If you have any questions on social networking email me at <a href="mailto:Paul@PaulGoda.com">Paul@PaulGoda.com</a>. I will be glad to answer any questions.Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0tag:blogger.com,1999:blog-8843077325281150719.post-67175321840454481712009-07-02T12:03:00.000-04:002009-07-02T12:21:46.599-04:00Page One NewsI am working on a business plan for a project called Page One News. It is a weekly publication distributed free in the Steele Creek area of Charlotte NC.<br /><br />The layout of the piece will be three columns on an 8 ½ by 11 sheet. Two columns on the left for copy and one on the tight for ads.<br /><br />Looking for writers to submit stories of local interest as posts to this blog. Here we can polish them for publication in the newsletter.<br /><br />Call Paul at 704-651-0585 or leave a comment here.<br /><br /><span style="font-size:85%;">Good marketing isn't about making the competition look bad. It's about raising yourself up.<br />by kthomas@cmswatch.com(Kas Thomas)</span>Paulhttp://www.blogger.com/profile/10503744962940479938noreply@blogger.com0