<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4294304146968793357</atom:id><lastBuildDate>Fri, 25 Oct 2024 11:24:15 +0000</lastBuildDate><category>Home Businesss Small Office Home Office</category><category>Microsoft office</category><category>outlook</category><category>xp</category><category>2000</category><category>2003</category><category>2007</category><category>Burlington Port Coquitlam Langley Vancouver Calgary Oakville Markham Toronto Kelowna Kitchener Security Internet Symantec</category><category>Desktop</category><category>Email Etiquette and  Productivity Tips</category><category>Facebook</category><category>Laptop</category><category>PC</category><category>Prevent Small Business Technology Failures. (Before they happen)</category><category>Skype</category><category>Small Business Outlook Microsoft BCC Blind Carbon Copy</category><category>Small to Medium Businesses are Adopting New Technologies</category><category>Technology</category><category>The Technology Coach</category><category>Twitter</category><category>Twitter and Blogger Social Media Small Business</category><category>Update</category><category>Upgrade</category><category>Virus</category><category>WIndows Seven</category><category>WIndows Vista</category><category>Windows 7</category><category>Windows Se7en</category><category>Yelp</category><category>adware</category><category>apple</category><category>automatic reply</category><category>ebook</category><category>email</category><category>ereader</category><category>exchange</category><category>express</category><category>gmail</category><category>hidden</category><category>home office</category><category>hoted exchange</category><category>http://www.blogger.com/img/blank.gif</category><category>iPad</category><category>live mail</category><category>marketing</category><category>microphone</category><category>netbook</category><category>options</category><category>out of office</category><category>reminder</category><category>secret</category><category>seven</category><category>small business</category><category>small medium business</category><category>sms</category><category>spyware</category><category>text</category><category>twt.tl Twitter mhansenhome attack phishing</category><category>vacation</category><category>vista</category><category>windows XP</category><category>windows mail</category><title>The Technology Coach</title><description></description><link>http://thetechnologycoach.blogspot.com/</link><managingEditor>noreply@blogger.com (The Technology Coach)</managingEditor><generator>Blogger</generator><openSearch:totalResults>305</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-6186804217635164414</guid><pubDate>Tue, 31 May 2011 20:18:00 +0000</pubDate><atom:updated>2011-05-31T16:18:34.652-04:00</atom:updated><title>Do You Have A Social Media Policy?</title><description>&lt;div class=&quot;style_SkipStroke_4 shape-with-text&quot; id=&quot;id4&quot; style=&quot;height: 57px; left: 357px; position: absolute; top: 324px; visibility: visible; width: 461px; z-index: 1;&quot;&gt;             &lt;div class=&quot;text-content Normal_External_461_57&quot; style=&quot;padding: 0px;&quot;&gt;               &lt;div class=&quot;Normal&quot;&gt;                 &lt;div class=&quot;Title&quot; style=&quot;padding-bottom: 0pt; padding-top: 0pt;&quot;&gt;Do You Have A Social Media Policy?&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;tinyText&quot; style=&quot;height: 1px; line-height: 1px;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot; style=&quot;padding-top: 0pt;&quot;&gt;If  you haven&#39;t got around to creating a Social Media Policy for your  employees, or, if you haven&#39;t reviewed your policy for more than a year,  then now would be a good time to start. &lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;Social media is growing by  leaps and bounds. You can&#39;t ignore it, you can&#39;t control it, and you  can&#39;t just let it happen naturally. Social media is getting more  complex, pervasive, and not giving your employees direction could end up  being dangerous to your brand.&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;&lt;a href=&quot;http://lookingoverseas.files.wordpress.com/2011/03/social-media.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://lookingoverseas.files.wordpress.com/2011/03/social-media.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Your employees are your  best brand advocates. Make it easy and non-threatening for them to talk  about your business on the social web by providing simple guidelines for  them to follow. You can find an excellent directory of well-known  company social media and blogging policies &lt;a href=&quot;http://bit.ly/ckiK5M&quot; title=&quot;http://bit.ly/ckiK5M&quot;&gt;HERE&lt;/a&gt;  on About.com. You can benchmark your own polices against what you find  in order to develop, or enhance, your own business&#39; guidelines.&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;Here are a few tips:&lt;/div&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol&gt;&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt;  Adhere to the Code of Business Conduct and the policies set out in your  employee manuals. Now is a good time to review policies with your  employees.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt;  Employees are responsible for their actions. Anything an employee posts  that can potentially tarnish the Company&#39;s image will ultimately be  their responsibility. Use common sense, social media is not where and  employee should deal with complaints.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt;  Let subject matter experts respond to negative posts. If you see  something online, point it out to the person or group in charge of  social media. (You do have someone in charge of social media, don&#39;t  you?)&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt; Be conscious when mixing your business and personal lives. Everything posted on line is public, and you can&#39;t take it back.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt; All employees who wish to officially represent your company online should be certified and trained.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt; Fully disclose your affiliation with your company, be transparent.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt; When in doubt, do not post&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt; Give credit where credit is due and don&#39;t violate other&#39;s rights, copyrights and trademarks&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt;  Remember that your local posts have global significance, what you post  today will be seen by other cultures on the other side of the world  tomorrow. Different cultures have different ideas of what is acceptable  behaviour.&lt;/div&gt;&lt;/li&gt;
&lt;li class=&quot;full-width&quot; style=&quot;line-height: 19px; margin-top: -1px; padding-left: 0px; text-indent: 0px;&quot;&gt;                     &lt;div class=&quot;paragraph_style_2&quot; style=&quot;text-indent: 0px;&quot;&gt;&lt;span class=&quot;Bullet&quot; style=&quot;position: relative; top: 2px;&quot;&gt;&lt;img alt=&quot;Bullet&quot; src=&quot;http://kimfletcher.net/Contract_IT_Consulting/People_for_Projects_Blog/Entries/2011/5/11_Do_You_Have_A_Social_Media_Policy_files/Watermark_bullet_default.png&quot; style=&quot;height: 16px; width: 16px;&quot; /&gt;&lt;/span&gt;  Know that the Internet is permanent. Once information is published  online it is essentially part of a global permanent record, even if you  delete it. The Internet &quot;remembers&quot; everything. &lt;/div&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;paragraph_style_1&quot;&gt;Article thanks to &lt;a href=&quot;http://kimfletcher.net/Contract_IT_Consulting/Contact_Me.html&quot;&gt;Kim Fletcher&lt;/a&gt;&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/do-you-have-social-media-policy.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-3036349959382119136</guid><pubDate>Tue, 31 May 2011 20:02:00 +0000</pubDate><atom:updated>2011-05-31T16:02:25.838-04:00</atom:updated><title>Intel Envisions the Rise of an entirely new kind of laptop, the Ultrabook</title><description>Ultrabooks are the future of mobile computing, according to Intel. The company says &lt;span data-mce-style=&quot;text-decoration: underline;&quot; style=&quot;text-decoration: underline;&quot;&gt;thin, lightweight notebook computers&lt;/span&gt;  from manufacturers like Apple, Lenovo and Acer are on the way, and  they&#39;re going to take a huge chunk of the laptop market. An Ultrabook,  according to Intel, features &lt;span data-mce-style=&quot;text-decoration: underline;&quot; style=&quot;text-decoration: underline;&quot;&gt;long battery life, a thin profile, no optical drive and, of course, specially designed Intel processors.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Intel has unveiled details of its plans for the breed of super-thin, rapid-on, tablet-like laptops which it calls &quot;Ultrabooks&quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;a data-mce-href=&quot;http://www.outhouseit.com&quot; href=&quot;http://www.outhouseit.com/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Intel UltraBook&quot; class=&quot;alignright&quot; data-mce-src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/05/30/asus-ux-small.jpg&quot; height=&quot;242&quot; src=&quot;http://i.i.com.com/cnwk.1d/i/tim/2011/05/30/asus-ux-small.jpg&quot; title=&quot;Thin Laptop&quot; width=&quot;420&quot; /&gt;&lt;/a&gt;The  computer chip giant expects Ultrabooks to take over 40 percent of the  laptop market within six to nine months. The new super-thin laptops run  on Intel&#39;s Sandy Bridge processor. The models will include a new edition  of the Apple MacBook Air, the Samsung Series 9, the Lenovo Thinkpad X1  and the Asus UX21. Ultrabooks will begin shipping as early as this  year&#39;s holiday season.&lt;br /&gt;
&lt;br /&gt;
New  features, which could launch Ultrabooks as a new subset of PCs, include  Smart Connect and Rapid Start Ideal features for a small business owner  or manager.&lt;br /&gt;
&lt;br /&gt;
Smart Connect, according to Intel, is a new form of  updating which can reload sites such as Twitter and Facebook and will  function even if the computer is in sleep mode.&lt;br /&gt;
&lt;br /&gt;
Rapid Start takes  advantage of on-board flash memory to speed up start-up times to mere  seconds. Even if the computer is off and without a battery, it will  still recall the programs and data which were open when it was turned  off.&lt;br /&gt;
&lt;br /&gt;
Ultrabooks share an extremely thin profile, variants of these  instant-on technologies, long battery life, lack of an optical drive  and use of the Sandy Bridge processor, according to Intel. The company  projects Ultrabooks will sell for under $1,000.</description><link>http://thetechnologycoach.blogspot.com/2011/05/intel-envisions-rise-of-entirely-new.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-6119443126845733580</guid><pubDate>Mon, 30 May 2011 21:29:00 +0000</pubDate><atom:updated>2011-05-30T17:29:54.010-04:00</atom:updated><title>Should you really trust the cloud with your valuable data?</title><description>&lt;div class=&quot;content&quot;&gt;     Cloud computing is the latest hottest thing right now, but should  you really trust Microsoft, Google, Amazon, or anyone else with your  valuable data?&lt;br /&gt;
&lt;br /&gt;
Okay, I am declaring it right here, right now:&lt;strong&gt; 2011 is the Year of the Cloud.&lt;/strong&gt;  This buzz word “cloud” is wielded by just about any company that sells a  server or an operating system these days. But what exactly are they  talking about? What does “cloud” mean and should you trust companies  like Microsoft, Google, Hewlett-Packard, Amazon, et al when they say the  can save you money and keep your data safe?&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.outhouseit.com/&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;Cloud Computing&quot; class=&quot;alignright&quot; height=&quot;228&quot; src=&quot;http://rdn-consulting.com/blog/wp-content/uploads/2009/02/cloud_computing.jpg&quot; title=&quot;Cloud Computing&quot; width=&quot;180&quot; /&gt;&lt;/a&gt;My approach to technology has always been if something comes along  that makes sense and makes my clients lives easier, I will encourage  them to adopt it as soon as it is practical. However, the people selling  cloud computing and other web-based services have yet to completely  convince me the merits of their products and services outweigh the  liabilities. Sure the cost savings is there, and the obvious practical benefits are clear, but the risks, oh the risks.&lt;br /&gt;
&lt;br /&gt;
I understand the potential of these services and I am willing to  entertain the idea, but there are so many questions unanswered, or  worse, glossed over. Just in the past month or so we’ve seen examples of  security breakdowns and outages that were very costly for companies  that had placed their critical functions in the cloud. (&lt;a href=&quot;http://www.searchenginejournal.com/googles-downtime-affected-5-of-the-internet/10463/&quot; target=&quot;_blank&quot;&gt;Google&lt;/a&gt;, &lt;a href=&quot;http://techcrunch.com/2008/02/15/amazon-web-services-goes-down-takes-many-startup-sites-with-it/&quot; target=&quot;_blank&quot;&gt;Amazon&lt;/a&gt;)&lt;br /&gt;
&lt;br /&gt;
Earlier this week, &lt;a href=&quot;http://www.techrepublic.com/blog/window-on-windows/does-azure-mean-the-death-of-the-datacenter-or-the-rebirth-of-windows/4336&quot; target=&quot;_blank&quot;&gt;Deb Shinder discussed Microsoft Azure&lt;/a&gt;,  which is the company’s “cloud services” platform. The striking thing  about the post, and the discussion that followed it, was the confounding  way Microsoft has presented the product. Much of the discussion  reflected confusion, uncertainty, and mistrust about security, up time,  and benefits. And these are my fellow IT professionals expressing those  concerns! No as IT professionals we’re usually pretty excited about “new  and shiny” so for us to resist there really must be a legitimate worry.&lt;br /&gt;
&lt;br /&gt;
Is it any wonder that a &lt;a href=&quot;http://www.thesba.com/the-small-business-authority/press-release/5-25-2011/&quot; target=&quot;_blank&quot;&gt;survey by The Small Business Authority&lt;/a&gt;  shows that 71% of small business owners had never heard of cloud  computing? For those of us in information technology that number may  seem staggering since we have been talking about the general concept for  years, but it shows that the companies selling cloud services have not  been communicating effectively with my clients, the small businesses.&lt;br /&gt;
&lt;br /&gt;
All of this uncertainty needs to be addressed before we get the mass  adoption of cloud computing services that many are predicting. And the  first uncertainty that needs to be addressed is trust.&lt;br /&gt;
So I am asking them, Should we trust cloud computing services? Can I  be assured that your data is safe in these systems? And, I’d be happy to  share my opinion with you as an IT professional, and tell you, can you  (should you) trust these services?&lt;br /&gt;
&lt;br /&gt;
If you’re looking for more details on cloud computing services I’d be happy to discuss.&lt;br /&gt;
&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/should-you-really-trust-cloud-with-your.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-1807176646129670274</guid><pubDate>Thu, 26 May 2011 11:59:00 +0000</pubDate><atom:updated>2011-05-26T07:59:15.261-04:00</atom:updated><title>Mac&#39;s Getting Viruses? I&#39;m afraid so.</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;a href=&quot;http://humphreymuthomi.tk/wp-content/uploads/2011/05/mac-virus.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;265&quot; src=&quot;http://humphreymuthomi.tk/wp-content/uploads/2011/05/mac-virus.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;For years, Mac owners have watched Windows users struggle with viruses and spyware. Mac owners laughed at Windows users. Apple even released commercials to this effect. You see, Macs were free from the malware, spyware and viruses that have plagued Windows users.&lt;br /&gt;
&lt;br /&gt;
Note that I used past tense. Those days are over. If you own a Mac, you are now being targeted by the online miscreants and criminals.&lt;br /&gt;
&lt;br /&gt;
There is no magical feature that makes Macs impervious to online threats.&lt;br /&gt;
&lt;br /&gt;
Malware developers have traditionally targeted Windows purely for economic reasons. Windows is the dominant operating system. There are more people using Windows than Macs. A virus written for Windows will affect more machines, which means greater profits. With such a small Market share, it didn&#39;t make sense to develop viruses for a computer less than 10% of the world was using.&lt;br /&gt;
&lt;br /&gt;
Back in 2008, a researcher made an interesting prediction: Attackers would target the Mac when its market share reached 16 percent. The Mac&#39;s market share is currently around 16 percent in the United States and Canada. Lo and behold, we&#39;re starting to see malware targeting Macs.&lt;br /&gt;
&lt;br /&gt;
Criminals have released a kit for creating malware that targets Mac OS X. MacDefender, MacProtector and MacSecurity are the first programs to come out of this kit. But they certainly won&#39;t be the last.&lt;br /&gt;
&lt;br /&gt;
In fact, just yesterday, the MacDefender creators released a variant called MacGuard. &lt;br /&gt;
&lt;br /&gt;
MacDefender is the first example of rogueware to appear on a Mac. Rogueware, or scareware, is fake antivirus that claims your computer is infected. These programs have been affecting Windows users for years.&lt;br /&gt;
&lt;br /&gt;
Clicking a malicious Web link can infect your machine with MacDefender. Hackers like using links that look like popular news stories. They also push infected images in Google&#39;s Image Search.&lt;br /&gt;
&lt;br /&gt;
Clicking a bad link or photo takes you to a malicious website. Clicking any link on the site downloads MacDefender. &lt;br /&gt;
&lt;br /&gt;
There are some ways you can stay safe. Only click on links from legitimate websites. If you find yourself on a suspicious-looking site, leave without clicking anything.&lt;br /&gt;
&lt;br /&gt;
Apple&#39;s Mac computers are a brilliant blend of style and function. If you&#39;re in the market for a new computer, definitely consider one. But keep me mind the advantage that Mac&#39;s used to have over PC&#39;s of being virus and spyware free no longer applies, it&#39;s a fair playing field now. See Last weeks article for more great Mac Vs. PC in the business world discussion.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/macs-getting-viruses-im-afraid-so.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-1630065429189322994</guid><pubDate>Thu, 19 May 2011 13:49:00 +0000</pubDate><atom:updated>2011-05-19T09:49:35.979-04:00</atom:updated><title>Are Mac&#39;s for Business Too?</title><description>&lt;div class=&quot;mailbox-question&quot;&gt;&lt;b&gt;A small business client recently asked: &lt;em&gt;Are macs a cost-effective way to go for my business needs? What are the pros and cons?&lt;/em&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;mailbox-a&quot;&gt;&lt;br /&gt;
&lt;/div&gt;My Answer has been pretty consistent for years, even as new Macs hit the market and new Operating Systems offer ever more features our go to answer is still the old reliable, it depends.&lt;br /&gt;
&lt;br /&gt;
To a great extent, it depends on the size and type of business, but I  can give you a few general pros and cons.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://dvice.com/pics/MacPC.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;216&quot; src=&quot;http://dvice.com/pics/MacPC.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Macs typically cost more  upfront, but can save in maintenance costs because they aren’t  susceptible to most malicious software attacks like viruses and spyware.&lt;br /&gt;
&lt;br /&gt;
Like Windows PCs,  they work with well with Microsoft Office Applications and even Microsoft Exchange email server. They run most standard productivity  software, like Microsoft Office, and can access most online business  sites and services.&lt;br /&gt;
&lt;br /&gt;
The one caveat is that there aren&#39;t any &quot;mainstream&quot; accounting applications for Mac, sure there are some, but you won&#39;t find the big guys (the ones your BookKeeper and Accountant already know). &lt;br /&gt;
&lt;br /&gt;
There are also many niche business applications that  are written for Windows only that you just can&#39;t get on a Mac.&lt;br /&gt;
&lt;br /&gt;
You can overcome this by running Windows  on a Mac for the occasional program. But if your business would best  operate using software that is only for Windows, you’d likely be better  off with a Windows machine.&lt;br /&gt;
&lt;br /&gt;
In Short the Mac does have it&#39;s advantages especially for those in the graphic arts, music arts or video production fields, but even the best graphic designers I know, still have&amp;nbsp; a PC sitting in a corner somewhere for email and accounting.&lt;br /&gt;
&lt;br /&gt;
Next Week, What about iPad for business?</description><link>http://thetechnologycoach.blogspot.com/2011/05/are-macs-for-business-too.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-7880416810510812733</guid><pubDate>Wed, 18 May 2011 23:16:00 +0000</pubDate><atom:updated>2011-05-18T19:16:55.907-04:00</atom:updated><title>Watch out for fake virus alerts</title><description>&lt;h1&gt;&lt;/h1&gt;Rogue security software, also  known as &quot;scareware,&quot; is software that appears to be beneficial from a  security perspective but provides limited or no security, generates  erroneous or misleading alerts, or attempts to lure users into  participating in fraudulent transactions.&lt;br /&gt;
&lt;h2&gt;How does rogue security software get on my computer?&lt;/h2&gt;Rogue  security software designers create legitimate looking pop-up windows  that advertise security update software. These windows might appear on  your screen while you surf the web.&lt;br /&gt;
The &quot;updates&quot; or &quot;alerts&quot; in  the pop-up windows call for you to take some sort of action, such as  clicking to install the software, accept recommended updates, or remove  unwanted viruses or spyware. When you click, the rogue security software  downloads to your computer.&lt;br /&gt;
Rogue security software might also  appear in the list of search results when you are searching for  trustworthy antispyware software, so it is important to protect your  computer.&lt;br /&gt;
&lt;h2&gt; What does rogue security software do?&lt;/h2&gt;Rogue  security software might report a virus, even though your computer is  actually clean. The software might also fail to report viruses when your  computer is infected. Inversely, sometimes, when you download rogue  security software, it will install a virus or other malicious software  on your computer so that the software has something to detect.&lt;br /&gt;
Some rogue security software might also:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Lure you into a fraudulent transaction (for example, upgrading to a non-existent paid version of a program).&lt;/li&gt;
&lt;li&gt;Use &lt;a href=&quot;http://www.microsoft.com/security/resources/socialengineering-whatis.aspx&quot;&gt;social engineering&lt;/a&gt; to steal your personal information.&lt;/li&gt;
&lt;li&gt;Install malware that can go undetected as it steals your data.&lt;/li&gt;
&lt;li&gt;Launch pop-up windows with false or misleading alerts.&lt;/li&gt;
&lt;li&gt;Slow your computer or corrupt files.&lt;/li&gt;
&lt;li&gt;Disable Windows updates or disable updates to legitimate antivirus software.&lt;/li&gt;
&lt;li&gt;Prevent you from visiting antivirus vendor websites.&lt;/li&gt;
&lt;/ul&gt;Rogue  security software might also attempt to spoof the Microsoft security  update process. Here&#39;s an example of rogue security software that&#39;s  disguised as a Microsoft alert but that doesn&#39;t come from Microsoft.&lt;br /&gt;
&lt;img alt=&quot;Example of a warning from a rogue security program known as AntivirusXP&quot; border=&quot;0&quot; class=&quot;nofloat&quot; height=&quot;368&quot; src=&quot;http://www.microsoft.com/global/security/publishingimages/pc-security/88303_xp-antivirus_F.jpg&quot; title=&quot;Example of a warning from a rogue security program known as AntivirusXP&quot; width=&quot;350&quot; /&gt;&lt;br /&gt;
Example of a warning from a rogue security program known as AntivirusXP.&lt;br /&gt;
For more information about this threat, including analysis, prevention and recovery, see the  &lt;a href=&quot;http://www.microsoft.com/security/portal/Entry.aspx?Name=Trojan:Win32/Antivirusxp&quot; target=&quot;_blank&quot;&gt; Trojan:Win32/Antivirusxp&lt;/a&gt; entry in the Microsoft Malware Protection Center encyclopedia.&lt;br /&gt;
Here is the legitimate Microsoft Windows Security Center:&lt;br /&gt;
&lt;img alt=&quot;Screenshot of legitimate Microsoft Windows Security Center&quot; border=&quot;0&quot; class=&quot;nofloat&quot; height=&quot;257&quot; src=&quot;http://www.microsoft.com/global/security/publishingimages/pc-security/screenshot_securitycenter.jpg&quot; title=&quot;Screenshot of legitimate Microsoft Windows Security Center&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
Screenshot of legitimate Microsoft Windows Security Center.&lt;br /&gt;
&lt;h2&gt;To help protect yourself from rogue security software:&lt;/h2&gt;&lt;ul&gt;&lt;li&gt;Install a firewall and keep it turned on.&lt;/li&gt;
&lt;li&gt;            Use  &lt;a href=&quot;http://www.microsoft.com/windows/downloads/windowsupdate/automaticupdate.mspx&quot; target=&quot;_blank&quot;&gt;automatic updating&lt;/a&gt; to keep your operating system and software up to date. &lt;/li&gt;
&lt;li&gt;            Install antivirus and antispyware software such as &lt;a href=&quot;http://www.microsoft.com/security/pc-security/mse.aspx&quot;&gt;Microsoft Security Essentials&lt;/a&gt; and keep it updated. For links to other antivirus programs that work with Microsoft,            see  &lt;a href=&quot;http://support.microsoft.com/kb/49500&quot; target=&quot;_blank&quot;&gt;Microsoft Help and Support List of Antivirus Vendors&lt;/a&gt;. &lt;/li&gt;
&lt;li&gt;If your antivirus software does not include antispyware software, you should install a separate antispyware program such as &lt;a href=&quot;http://www.microsoft.com/windows/products/winfamily/defender/default.mspx&quot; target=&quot;_blank&quot;&gt;Windows Defender&lt;/a&gt; and keep it updated. (Windows Defender is available as a free download for Windows XP and is included in Windows Vista.) &lt;/li&gt;
&lt;li&gt;Use caution when you click links in email or on social networking websites.&lt;/li&gt;
&lt;li&gt;Use a &lt;a href=&quot;http://windows.microsoft.com/en-us/windows7/Why-use-a-standard-user-account-instead-of-an-administrator-account&quot; target=&quot;_blank&quot;&gt;standard user account&lt;/a&gt; instead of an administrator account. &lt;/li&gt;
&lt;li&gt;Familiarize yourself with common &lt;a href=&quot;http://www.microsoft.com/security/online-privacy/phishing-scams.aspx&quot;&gt;phishing scams&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;If you think you might have rogue security software on your computer disconnect yourself from the internet immediately and give us a call at Outhouse IT, the longer it&#39;s on your PC uninhibited with internet access the more harm it can do.&lt;/h2&gt;&lt;h2&gt;Give us a call 905-366-8234&lt;/h2&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/watch-out-for-fake-virus-alerts.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-8460379167106400236</guid><pubDate>Wed, 11 May 2011 22:07:00 +0000</pubDate><atom:updated>2011-05-13T16:22:55.444-04:00</atom:updated><title>Newest online scam are &quot;tainted&quot; images</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://krebsonsecurity.com/wp-content/uploads/2011/05/destroyerkaputt-300x187.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://krebsonsecurity.com/wp-content/uploads/2011/05/destroyerkaputt-300x187.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:OfficeDocumentSettings&gt;   &lt;o:AllowPNG/&gt;  &lt;/o:OfficeDocumentSettings&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-CA&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:EnableOpenTypeKerning/&gt;    &lt;w:DontFlipMirrorIndents/&gt;    &lt;w:OverrideTableStyleHps/&gt;   &lt;/w:Compatibility&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin:0cm;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:&quot;Times New Roman&quot;,&quot;serif&quot;;}
&lt;/style&gt; &lt;![endif]--&gt;&lt;strong&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-ansi-language: EN-CA; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-CA; mso-fareast-theme-font: minor-latin;&quot;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12.0pt; mso-ansi-language: EN-CA; mso-bidi-language: AR-SA; mso-fareast-font-family: Calibri; mso-fareast-language: EN-CA; mso-fareast-theme-font: minor-latin;&quot;&gt;Never let it be said that scammers aren&#39;t innovative. The latest scam to come across the web are &lt;a href=&quot;http://krebsonsecurity.com/2011/05/scammers-swap-google-images-for-malware/&quot;&gt;&quot;tainted&quot; images from a Google Images search&lt;/a&gt;.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12pt;&quot;&gt;What happens is that certain images on click will redirect you to sites you didn&#39;t want to go to in order to sell you something you didn&#39;t want, or in more extreme instances leading to what&#39;s known as &quot;scareware&quot; sites to try and scam you into installing malicious software on your computer.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;span style=&quot;font-family: &amp;quot;Helvetica&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 12pt;&quot;&gt; The next time you perform an image search, be cautious because it will take time for Google to index the bad stuff and filter it out appropriately.Of course, a good anti-virus will protect you in most cases, but it&#39;s still better not to travel down the dangerous path if it can be avoided!&lt;/span&gt;&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/newest-online-scam-are-tainted-images.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-8671479768806898837</guid><pubDate>Tue, 10 May 2011 22:26:00 +0000</pubDate><atom:updated>2011-05-10T18:29:41.448-04:00</atom:updated><title>Social media marketing for Disaster Restoration Contractors</title><description>&lt;a href=&quot;http://www.drctradeshow.com/attendees.html&quot;&gt;&lt;/a&gt;&lt;br /&gt;
Scott Kendall of The Technology Coach has been invited to speak at the Disaster Restoration Contractors annual conference in Toronto may 12th&lt;br /&gt;
&lt;br /&gt;
Scott&#39;s popular talk on Social media advertising is always a hit, full of real world practical advice for small business owners on making the most of small business marketing budgets through the use of Facebook, Twitter and LinkedIn.&lt;br /&gt;
&lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;58&quot; src=&quot;http://www.drctradeshow.com/Images/who_27.jpg&quot; width=&quot;347&quot; /&gt;&lt;br /&gt;
&lt;span class=&quot;style6&quot;&gt;&lt;br /&gt;
&lt;span class=&quot;style9&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; All restoration industry professionals               &lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; Insurance Professionals&lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; Environmental Engineers&lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; Abatement Contractors&lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; General Contractors wanting to learn more about the industry                &lt;br /&gt;
&lt;img border=&quot;0&quot; height=&quot;12&quot; src=&quot;http://www.drctradeshow.com/Images/check.jpg&quot; width=&quot;12&quot; /&gt; Carpet Cleaners wanting to learn more about Water Damage        &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;b class=&quot;style12&quot;&gt;The top 3 reasons to attend the DRC Show:&lt;/b&gt;             &lt;span class=&quot;style6&quot;&gt;&lt;span class=&quot;style9&quot;&gt;&lt;b&gt;Network:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Join hundreds of industry professionals at Canada’s only Restoration Show.                             &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;DRC Sessions that are tailored for all:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Track O – Owners and Managers    &lt;br /&gt;
Track M – Marketing &amp;amp; Sales&lt;br /&gt;
Track T – Technical   &lt;br /&gt;
Track C – Contents   &lt;br /&gt;
Track T1 &amp;amp; T2 – Technical   &lt;br /&gt;
Track D – Commercial Drying                             &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Great Line up of Exhibitors including our Green Aisle:&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
What other show allows you to stay up to date on  restoration products, equipment and services all under one roof?  The  DRC Show has become the Primary Purchasing Show for restoration  contractors so come prepared to save!&lt;/span&gt;&lt;/span&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/05/attendees-who-should-attend.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-2803360782387749100</guid><pubDate>Sun, 24 Apr 2011 15:22:00 +0000</pubDate><atom:updated>2011-04-24T11:53:28.668-04:00</atom:updated><title>This easter Protect Your Electronics From Dust Bunny Infestation!</title><description>&lt;div style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.unplggd.com/uimages/unplggd/042111dustbunny.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.unplggd.com/uimages/unplggd/042111dustbunny.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Everyone was eagerly anticipating  the upcoming Easter egg hunt which was tradition for the family. As the  adults prepared lunch in the kitchen, the children scampered about in  the yard. Sounds of glee filled the air as they innocently ran around,  everyone happy as can be. All while unaware of the impending Attack of  the Evil Easter Dust Bunnies!&lt;br /&gt;
&lt;blockquote&gt;&lt;i&gt;Dust bunnies are small clumps of dust that form under  furniture and in corners that are not cleaned regularly. They are made  of hair, lint, dead skin, spider web, dust, and sometimes light rubbish  and debris, and are held together by static electricity and felt-like  entanglement.&lt;/i&gt;&lt;/blockquote&gt;&lt;br /&gt;
This &lt;a href=&quot;http://www.computerdust.com/downloads/special_report_on_the_effect_of_dust_on_electronics.pdf&quot;&gt;special report&lt;/a&gt;  on the effect of dust on electronics reveals some startling facts. It discusses how dust can block  vents or insulate components internally to cause overheating of some of the higher power PC components like the CPU which can go up nearly 30o F. It can also  create problems with mechanical components, like fans and optical drives.Worst of all it can collect on hard drive connectors and components causing overheating and data loss!&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://amazingdata.com/mediadata22/Image/odd_fun_weird_interesting_dusty-pc_20090723150026665.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;http://amazingdata.com/mediadata22/Image/odd_fun_weird_interesting_dusty-pc_20090723150026665.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Test show that the temperature increases due to a build-up of dust causing an increase in temperature can lead to complete and abrupt failure.&lt;br /&gt;
&lt;br /&gt;
The keyboard and mouse are also affected by dust. Though these are easy to replace items, their&lt;br /&gt;
reliability can degrade rapidly when infused with dust. Stuck keys and “sticky” mouse operation are most frustrating to operators and can create both errors and productivity loss.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Slowing things down, reducing your computer lifespan and generally causing freezing, crashing and other annoying and unproductive technology problems. &lt;b&gt;Damn those bunnies!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.storyrhyme.com/stories/originals/dust_bunnies/files/page10_sidebar_2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://www.storyrhyme.com/stories/originals/dust_bunnies/files/page10_sidebar_2.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Dust can cause irreversible harm to computer electronics and its associated electromechanical components. Without protection from dust, serious computer errors, loss of information, or complete failure can result.&lt;br /&gt;
&lt;br /&gt;
So this spring, as you&#39;re thinking of cleaning the garage, the attic or the office, think also of your technology and give us a call, we&#39;d be happy to complete a on-site system tuneup at your office and ensure you&#39;re running in tip top shape!</description><link>http://thetechnologycoach.blogspot.com/2011/04/this-easter-protect-your-electronics.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-4995385879043432467</guid><pubDate>Thu, 14 Apr 2011 22:21:00 +0000</pubDate><atom:updated>2011-04-14T18:21:25.715-04:00</atom:updated><title>Two Ways Old Technology Hurts Your Business. Get Rid Of It As Soon As You Can</title><description>I can appreciate that with all the challenges you face as a small business owner, the idea of holding on to what works, for as long as it keeps working, seems to be a good one. After all, why shouldn’t you keep that ten year old printer?&lt;br /&gt;
&lt;br /&gt;
You can still get ink for it online at that specialty dealer in buffal, and it prints just fine. Or how about that 8 year old laptop, sure it’s not quite as fast as some of the newer models but it gets the job done right?&lt;br /&gt;
&lt;a href=&quot;http://www.ottawatechsupport.ca/images/stories/old%20computer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://www.ottawatechsupport.ca/images/stories/old%20computer.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
The powers that be in the tech world are ever pushing new advancements to drive sales and profits and you don’t want to contribute to this vicious cycle! I empathize with you. I too like to squeeze the last drop of productivity out of the things which I have invested. But lets consider some of the potential downside to holding on to technology too long.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Reliability: &lt;/b&gt;The cold hard truth is that things are designed to last for only a certain range of time. We have all come to know the term “built in obsolescence”. This is not to say that you can’t push these limits, but once you start down this road you are rolling the dice on uptime and overall performance. If any of these devices are involved with “mission critical” functions within your organization than you may be taking a risk without the appropriate level of reward in return. Most tech related devices have a lifespan of three to five years. If you take this into consideration ahead of time it is possible to budget for the necessary upgrades instead of having to face a crisis.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Productivity:&lt;/b&gt; This is a huge area of discussion because it is often difficult to measure. In the section above I mention “Mission Critical” functions. So, for example, we can look at a File or Email Server that is past its prime of 3 years. In the fourth year there are sporadic performance issues that ultimately lead to the need for replacement. If this results in a server down scenario then it is easy to count the number of hours that productivity has been halted. What is more difficult to measure is the loss of time and productivity during the periods when the server was not operating at peak efficiency. These losses could be the result of slower speeds, frequent need for techs to reboot server, email outages, etc.&lt;br /&gt;
&lt;br /&gt;
When we look at productivity issues for “Non Mission Critical” machines we find similar problems. I am consistently amazed to discover the inventive and ingenious methods workers employ in an effort to overcome technical stumbling blocks to complete their job functions. I am oft reminded of the days when the youngest family member would have to stand in a specific position with “tin folied” antenna in hand to get the perfect television reception. While these “work-arounds” are commendable, they are also great productivity killers that can be largely avoided with the proper technology in place to get the job done.&lt;br /&gt;
&lt;br /&gt;
So is your technology &quot;getting the job done&quot;? Is it as productive as it could or should be?&lt;br /&gt;
&lt;br /&gt;
Give us a call at Outhouse IT we&#39;d be happy to help you complete a small business technology assessment and see where you really stand.</description><link>http://thetechnologycoach.blogspot.com/2011/04/two-ways-old-technology-hurts-your.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-333198707235273961</guid><pubDate>Tue, 12 Apr 2011 13:18:00 +0000</pubDate><atom:updated>2011-04-12T09:18:46.385-04:00</atom:updated><title>Twilight Game Scam Spreading on Facebook [WARNING]</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;If you’ve been tagged in a Facebook friend’s photo album or seen a link promoting a &lt;em&gt;Twilight: Breaking Dawn&lt;/em&gt; game, be careful. It is likely a scam designed to spread on Facebook and grab your personal data.&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;post-fb-like&quot;&gt; &lt;span&gt;&lt;/span&gt;&lt;/div&gt;&lt;a href=&quot;http://4.mshcdn.com/wp-content/uploads/2011/04/twilight_scam.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; class=&quot;alignright size-full wp-image-585275&quot; height=&quot;250&quot; src=&quot;http://4.mshcdn.com/wp-content/uploads/2011/04/twilight_scam.jpg&quot; title=&quot;twilight_scam&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;If you click on the link, you’ll be invited to start playing the game. If you’re using Facebook HTTPS,  you will first be prompted to switch to a regular connection, which  should alarm some users.&lt;br /&gt;
&lt;br /&gt;
This particular scheme will make you “Like” the  game without your permission, and it will show on your Wall, thus  allowing it to spread further.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
If you continue, you will be asked  to give permission to a Facebook App, and finally you will be asked to  fill out a questionnaire with some personal data.&lt;br /&gt;
&lt;img alt=&quot;&quot; class=&quot;aligncenter size-full wp-image-585279&quot; height=&quot;176&quot; src=&quot;http://5.mshcdn.com/wp-content/uploads/2011/04/twilight_scam_2.jpg&quot; title=&quot;twilight_scam_2&quot; width=&quot;501&quot; /&gt;&lt;br /&gt;
As  always, you should definitely avoid clicking on suspicious links such  as these and verify each app before you give it additional permissions  on Facebook.&lt;br /&gt;
&lt;br /&gt;
If you’ve fallen prey to this scheme already, you should  delete any spam posts you may have inadvertently sent. Then, go through  your security settings and revoke any access for apps you don’t recall  signing up for.&lt;br /&gt;
&lt;br /&gt;
For more info on how to get rid of Facebook scams like this one, check out &lt;a href=&quot;http://mashable.com/2011/02/22/facebook-scam-southwest/&quot; target=&quot;_blank&quot;&gt;this guide&lt;/a&gt;.</description><link>http://thetechnologycoach.blogspot.com/2011/04/twilight-game-scam-spreading-on.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-1327973731340656890</guid><pubDate>Tue, 12 Apr 2011 00:07:00 +0000</pubDate><atom:updated>2011-04-11T20:07:00.402-04:00</atom:updated><title>Windows 7 finally overtakes Windows XP’s desktops</title><description>&lt;span id=&quot;intelliTxt&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;Desktop OS market share United States April 2011&quot; class=&quot;aligncenter size-full wp-image-69450&quot; height=&quot;300&quot; src=&quot;http://cdn2.ubergizmo.com/wp-content/uploads/2011/04/03_desktop_os_market_share_united_states_april_2011.jpg&quot; title=&quot;Desktop OS market share United States April 2011&quot; width=&quot;580&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
According to the latest results of the desktop OS market share in the  US for April 2011 collected by StatCounter, it looks like people are  finally leaving Windows XP behind and getting an upgrade to Windows 7.&lt;br /&gt;
&lt;br /&gt;
For the first time since it became the most popular operating system  around, Windows XP’s market share has been trumped by Windows 7.&lt;br /&gt;
&lt;br /&gt;
Windows  7 is now used on 31.71% of desktops in the US, while Windows XP has  dropped to 31.56%.&lt;br /&gt;
&lt;br /&gt;
Now the lead isn’t a lot but it does show that  Windows XP has finally peaked and is on its way out now.&lt;br /&gt;
&lt;br /&gt;
Windows Vista  is at third place with 19.07%, Mac OS X at fourth with 14.87%, Linux is  last with 0.70% and Other/miscellaneous operating systems make up 2.09%  of the chart.&lt;br /&gt;
&lt;br /&gt;
Importance of note is the increase in Mac OS which sat at less than 10% for many, many years, but now enjoys a much healthier percentage.&lt;br /&gt;
&lt;br /&gt;
It&#39;s important to note that this chart does NOT non-Desktop/Laptops so don&#39;t be surprised that the iPhone OS (iOS), blackberry and even Android aren&#39;t listed.&lt;br /&gt;
&lt;br /&gt;
Is your business still running windows XP applications? Does it need to be? Some applications previously only windows XP compatible are now fully functional in a windows 7 environment and with the added security and protection Win7 offers over XP it&#39;s worth a look.&lt;br /&gt;
&lt;br /&gt;
While we&#39;ve done our best in the past to help clients find windows XP computers from suppliers even up until the end of 2010, it&#39;s now almost impossible to find NEW copies of XP, sure you can go used, off lease or refurbished, but new, Windows XP is just not available in the marketplace for purchase anymore. Even our might netbooks are now windows 7 starter edition.&lt;br /&gt;
&lt;br /&gt;
So, is your business getting everything it can and should be out of it&#39;s operating system? Give us a call at Outhouse IT, we&#39;re here to help.</description><link>http://thetechnologycoach.blogspot.com/2011/04/windows-7-finally-overtakes-windows-xps.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-8161813871484896647</guid><pubDate>Mon, 11 Apr 2011 13:20:00 +0000</pubDate><atom:updated>2011-04-11T09:20:36.541-04:00</atom:updated><title>Clean the C&amp;@# out of your computer with CCleaner.</title><description>&lt;div class=&quot;c-4 space-1 takeaway&quot;&gt;&lt;span class=&quot;c-6 heavy&quot;&gt;&lt;/span&gt;&lt;/div&gt;There are a lot of tools out there that handle a lot of  tasks, from antivirus tools that also clean your drive of temporary  files and make you coffee to tools that promise to “make your computer  faster.”&lt;br /&gt;
&lt;br /&gt;
But as far as I’m concerned, few tools can make as much of a  difference as &lt;a href=&quot;http://www.piriform.com/ccleaner/&quot; target=&quot;_blank&quot;&gt;Ccleaner&lt;/a&gt;,  at least on a machine that’s not infected by a virus or malware.&lt;br /&gt;
&lt;br /&gt;
Ccleaner is easy to use and will keep your computer cleaner, more  secure, and running faster. It achieves this by safely removing  temporary Internet files (and other means of tracing Internet activity),  cleaning up the Windows registry, and removing temporary files and  recent file lists (MRUs) from various applications.&lt;br /&gt;
&lt;br /&gt;
But even though Ccleaner is a simple tool to use, that doesn’t mean you  should just jump in and start cleaning everything without a bit of  thought. Here are some things all users should consider before and  during the use of this powerful tool.&lt;br /&gt;
&lt;em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://dazzozo.com/boggs/blog/wp-content/uploads/2010/04/CCleaner_Logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://dazzozo.com/boggs/blog/wp-content/uploads/2010/04/CCleaner_Logo.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;h2&gt;1: Analyze before running the Cleaner&lt;/h2&gt;I know a lot of admins who just fire up Ccleaner and hit the Run Cleaner  button without doing an analysis first. Yes, this is a fast method of  getting rid of temporary Internet files. But there’s no way of knowing  what’s going to be deleted (until it’s deleted) and there’s no way of  knowing how much free space the deletion is going to create. Make sure  you hit the Analyze button first. Then, after you read the report, hit  the Run Cleaner button. Using Ccleaner this way ensures that nothing is  deleted that shouldn’t be deleted. Also, after you run the analyzer, you  can look at detailed information (by application) and then add  exceptions directly from the list.&lt;div class=&quot;area-4 left-2 sink-1 clearleft&quot;&gt; &lt;div class=&quot;ad-hotspot space-2&quot;&gt;      &lt;div class=&quot;hotspot&quot;&gt;&lt;/div&gt;&lt;img alt=&quot;&quot; height=&quot;0&quot; src=&quot;http://adlog.com.com/adlog/i/r=9108&amp;amp;sg=505473&amp;amp;o=12841%253A31905%253A&amp;amp;h=cn&amp;amp;p=&amp;amp;b=9&amp;amp;l=&amp;amp;site=11&amp;amp;pt=2100&amp;amp;nd=31905&amp;amp;pid=&amp;amp;cid=204399&amp;amp;pp=100&amp;amp;e=&amp;amp;rqid=01c13-ad-e6:4DA259D28F4B95&amp;amp;orh=&amp;amp;ort=&amp;amp;oepartner=&amp;amp;epartner=&amp;amp;ppartner=&amp;amp;pdom=&amp;amp;cpnmodule=&amp;amp;count=&amp;amp;ra=174.95.54.58&amp;amp;dvar=dvar_tag%253DRegistry%253BTool%253BCookie%253BCcleaner%253BProductivity%2523dvar_firstpage%253D1&amp;amp;ucat_rsi=%2526&amp;amp;pg=VvORZAoPOhwAAFExH98AAAA-&amp;amp;t=2011.04.11.13.13.21/http://i.i.com.com/cnwk.1d/Ads/common/dotclear.gif&quot; style=&quot;left: 0px; position: absolute; top: 0px;&quot; width=&quot;0&quot; /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;h2&gt;2: Set up cookies you want to keep&lt;/h2&gt;When you run the Cleaner, cookies are deleted. By default, cookies are  retained from Google and Yahoo, but other cookies might need to be  retained. To manage this, click on the Options tab and then on the  Cookies button. From that window, any cookie currently on the system can  be selectively added to the exclusion list. By adding these exclusions,  you don’t have to worry about important cookies disappearing after each  run of Ccleaner. &lt;br /&gt;
&lt;h2&gt;3: Always back up the registry&lt;/h2&gt;No matter how reliable Ccleaner is and no matter how many successful  registry cleanups it does, never do a cleanup without first backing up  the registry. Ccleaner will go so far as to remind you to back up the  registry every time you run a registry cleanup. If the registry is not  backed up, one of those corrupt or missing registry keys that Ccleaner  fixes might not really have needed fixing. If that key is then broken  and was not backed up, the issue caused by Ccleaner could become  catastrophic. Fortunately, Ccleaner makes backing up the registry as  simple as a couple of clicks. &lt;br /&gt;
&lt;h2&gt;4: Use the tools to manage startup applications&lt;/h2&gt;Ccleaner comes with a bonus: It lets you enable, disable, or remove  programs from startup. I have always found this method of managing  startup applications far easier than using the standard Windows method.  What I like most about this feature is that startup applications can be  enabled and disabled without removing them completely. This means if you  need to temporarily prevent an application from starting up, it’s easy  to do by going into the Tools tab, clicking the Startup button,  selecting the application to be enabled/disabled, and clicking the  appropriate button. When the application needs to be  re-enabled/disabled, reverse the process. &lt;br /&gt;
&lt;h2&gt;5: Use the uninstaller&lt;/h2&gt;One of the best aspects of Ccleaner is the ability to remove  applications from within it. It typically just starts the uninstaller,  but I have found that running the application uninstaller this way ends  with fewer registry issues than when I uninstall from the Windows  Add/Remove Programs tool. And if there are registry issues after the  uninstall, registry cleanup is only a couple of clicks away. &lt;br /&gt;
&lt;h2&gt;Great tool, used wisely&lt;/h2&gt;Ccleaner is more than just a tool to clean the registry or empty a  computer of temporary Internet files. It also makes it easy to remove  applications from startup and remove applications from the machine. Just  make sure you use this powerful tool intelligently to avoid rendering  your machine unusable. While they try to make it difficult to make mistakes, it is possible to render your computer unuseable by running some of the tasks ccleaner offers, so if you&#39;re not sure, err on the side of caution. And if you want to make the most of your technology, give us a call at Outhouse IT, it&#39;s what we do.</description><link>http://thetechnologycoach.blogspot.com/2011/04/clean-c-out-of-your-computer-with.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-1015050804283225475</guid><pubDate>Wed, 30 Mar 2011 00:23:00 +0000</pubDate><atom:updated>2011-03-29T20:23:31.584-04:00</atom:updated><title>Online Fax Security</title><description>&lt;span id=&quot;intelliTXT&quot; name=&quot;intelliTxt&quot;&gt;&lt;h2&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;img align=&quot;right&quot; alt=&quot;Online Fax Security&quot; src=&quot;http://askbobrankin.com/online-fax-security.jpg&quot; /&gt;  The security of fax transmissions is especially important to  healthcare, legal, and financial entities. Even occasional users may  wonder if Internet faxing, despite its many advantages, is secure enough  to protect their confidentiality and that of their clients. The answer  is, it depends...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;First, let&#39;s compare  Internet fax security to the security of normal fax transmissions over  phone lines.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt; Both are susceptible to eavesdropping and diversion of  transmissions, unless special precautions are taken. In the case of  Internet faxes, encrypting a digital transmission or uploading it to a  fax server over an encrypted Web connection provide good protection  against interceptions. You should make sure that these security features  are supported in any Internet fax service you consider.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&lt;a href=&quot;http://faxzero.com/&quot; target=&quot;_blank&quot;&gt;Faxzero&lt;/a&gt;,  an online faxing service I recommend, does encrypt all data before  transferring it to their fax servers.  In addition, their privacy policy  states that they will not release personal information (such as your  name, fax number or email address), nor information about the people you  send faxes to, unless a court order compels them to do so.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Email-to-fax services  can be spoofed, meaning someone can fake your email address in a message  header and send faxes in your name. If you pay for Internet fax service  that means you may be stuck with someone else&#39;s fax bill. A good  Internet fax service sends a confirmation email back to the sender&#39;s  email address with every fax it sends, providing an alert that an  unauthorized fax was sent using your account.&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Digital Delivery Offers Enhanced Fax Security&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Normal faxes end up  printed and deposited in a fax machine&#39;s receiving tray, where they lie  until someone comes to retrieve them. These paper copies are exposed to  everyone who has access to the fax machine, and may be accidentally read  by people searching for their own faxes in the stack. Email-based  Internet fax delivers faxes directly to the addressee&#39;s inbox (instead  of a fax machine), where it&#39;s less likely to be seen by others.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Another security scheme  stores received faxes on an online server. An email notice sent to the  addressee contains a web link which points to the digital fax document.  When clicked, the link opens a Secure Sockets Layer (SSL) connection to  retrieve the document and display it in a browser, from which the  recipient can save or print a copy. So the faxed document is never  exposed on an unsecured connection.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Redundant security can  be provided by using a Virtual Private Network (VPN) to establish  exclusive connections over the Internet. Coupled with encrypted fax  documents and PGP digital signatures, VPNs may be overkill when it comes  to secure Internet faxing.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;It&#39;s hard to control the  security implemented by business partners. If you send an Internet fax  to a partner&#39;s fax machine number, the printout is subject to the  security vulnerabilities noted above. If possible, you should get your  partners to use a more secure all-digital Internet fax solution such as  fax-to-email or the SSL method described above. Hopefully, they&#39;re just  as concerned with security as you are.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-family: arial;&quot;&gt;&lt;span&gt;Bottom line, my take is  that internet faxing is more secure than using good old-fashioned office  fax machines, because encryption is typically NOT used when sending  from one machine to another.  Faxes travel across the public telephone  network, and are subject to potential interception by motivated hackers.   But because encryption is used by online fax services, and faxes can  be delivered directly to the recipient&#39;s inbox, online faxing is a more  secure option.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/03/online-fax-security.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-5794146790163056960</guid><pubDate>Fri, 25 Mar 2011 19:38:00 +0000</pubDate><atom:updated>2011-03-25T15:39:47.038-04:00</atom:updated><title>Two Weeks After Japan Earthquake, IT Industry Faces Hurdles</title><description>Two weeks have passed since a magnitude 9.0 earthquake and subsequent tsunami rocked eastern Japan, and while a recovery among the country&#39;s technology manufacturers has begun, it could be several months before things start to normalize.&lt;br /&gt;
&lt;br /&gt;
Many factories were closed immediately following the quake, and most have been gradually returning to production in the last week. A handful of plants were hit harder and could be offline for months.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.techdigest.tv/japan-quake.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;201&quot; src=&quot;http://www.techdigest.tv/japan-quake.gif&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Companies face a daunting task.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Japan&#39;s biggest earthquake ever recorded, and the tsunami it spawned, left more than 10,000 people dead and an even larger number missing; several nuclear power plants remain in emergency condition and continue to spew radioactive contamination to the environment; hundreds of thousands are homeless; and the economy is being forced to adapt to power failures and supply disruptions. The end of the disaster is still not in sight.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;For IT companies, the loss of production at these plants could have widespread effects on the electronics industry.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Texas Instruments&#39; plant in Miho, northeast of Tokyo, is one of the factories that was hard hit. The plant, which produced chips and DLP devices for projectors, suffered &quot;substantial damage&quot; and it won&#39;t be until May when partial production resumes. Full production is not due until mid-July, and that could be further delayed by power problems, the company said.&lt;br /&gt;
&lt;br /&gt;
Toshiba estimates production at its mobile phone display factory in Saitama, north of Tokyo, will be stopped for a month because of damage sustained in the earthquake.&lt;br /&gt;
&lt;br /&gt;
Further north in Miyagi prefecture, a number of factories near the quake-hit city of Sendai suffered high levels of damage.&lt;br /&gt;
&lt;br /&gt;
A Sony plant responsible for magnetic tape and Blu-ray Discs was inundated with water when a tsunami washed through the town of Tagajyo and is one of six Sony plants currently idle. Two Nikon plants were severely damaged and won&#39;t be back online until at least the end of March. And Fujitsu&#39;s major chip plant in Aizu Wakamatsu is still closed with no estimate of when production will begin again.&lt;br /&gt;
&lt;br /&gt;
But some of the potentially biggest disruptions could come from the closure of two plants run by Shin-Etsu Chemical. Although not a well-known name to consumers, the company is a major supplier of silicon wafers. One of the halted plants, its Shirakawa facility in Fukushima prefecture, is responsible for around 20 percent of the world&#39;s supply of such wafers, according to IHS iSuppli.&lt;br /&gt;
&lt;br /&gt;
&quot;The wafers made by this facility mainly are used in the manufacturing of memory devices, such as flash memory and DRAM,&quot; said Len Jelinek, an IHS iSuppli analyst, in a statement. &quot;Because of this, the global supply of memory semiconductors will be impacted the most severely of any segment of the chip industry by the production stoppage.&quot;&lt;br /&gt;
&lt;br /&gt;
The knock-on effects of the quake to the global supply chain are already being felt.&lt;br /&gt;
&lt;br /&gt;
Sony suspended production of Bravia LCD televisions, digital cameras and other products at five factories far from the quake zone because it can&#39;t get raw materials and components. Suppliers are unable to deliver because of either quake and tsunami damage or because of disruptions to the distribution network.&lt;br /&gt;
&lt;br /&gt;
Industries beyond consumer electronics are also likely to feel the effects of these problems.&lt;br /&gt;
&lt;br /&gt;
The automobile industry is a big customer of chip companies and the products it buys are often custom-made.&lt;br /&gt;
&lt;br /&gt;
&quot;Products like microcontrollers and DSPs can&#39;t simply be swapped out for another chip, whether from the same vendor or another,&quot; said Tom Starnes, an embedded processor analyst at Objective Analysis in Austin, Texas. &quot;The programs aren&#39;t easily transferable between processors, and even changing other chips like analog may introduce cost, quality, or reliability issues not originally anticipated.&quot;&lt;br /&gt;
&lt;br /&gt;
The long-term effect on Japanese electronics manufacturers and the supply chain remains difficult to gauge. Several major companies have said they will delay the hiring of new workers, usually done on April 1, and some have adjusted or canceled dividend payments to shareholders. While a nascent recovery appears to be underway and some factories are coming back online, it will be weeks before the full extent of damage to the global IT supply chain becomes clearer.</description><link>http://thetechnologycoach.blogspot.com/2011/03/two-weeks-after-japan-earthquake-it.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-454116721687400444</guid><pubDate>Tue, 15 Mar 2011 23:04:00 +0000</pubDate><atom:updated>2011-03-15T19:04:31.082-04:00</atom:updated><title>Technology supply chain facing shortages and delays at hands of Japanese earthquake and tsunami.</title><description>&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-CA&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:DontVertAlignCellWithSp/&gt;    &lt;w:DontBreakConstrainedForcedTables/&gt;    &lt;w:DontVertAlignInTxbx/&gt;    &lt;w:Word11KerningPairs/&gt;    &lt;w:CachedColBalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin:0cm;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-fareast-language:EN-US;}
&lt;/style&gt; &lt;![endif]--&gt;  &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;&lt;span style=&quot;font-family: &amp;quot;Times New Roman&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 18pt;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;The continuing natural disaster in Japan has severely hindered the manufacture of basic components used in everything from computers to smart phones, increasing the likelihood that some of the world’s biggest technology companies will face product shortages and delays.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://blogs.aljazeera.net/sites/default/files/imagecache/FeaturedImagePost/images/japan-factory-sendai.JPG&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;http://blogs.aljazeera.net/sites/default/files/imagecache/FeaturedImagePost/images/japan-factory-sendai.JPG&quot; width=&quot;224&quot; /&gt;&lt;/a&gt;“You will see shortages of everything from screens to memory, and with it, an increase in prices,” said an analyst in Boston.&lt;br /&gt;
&lt;br /&gt;
Japan is the world’s biggest supplier of silicon used to make semiconductor chips and this could result in significant shortages of certain electronic components, potentially causing pricing for these devices to increase dramatically,”&lt;br /&gt;
&lt;br /&gt;
Because most semiconductor producers keep about two weeks’ worth of inventory on hand, the market likely won’t feel a pinch until the end of the month.&lt;br /&gt;
&lt;br /&gt;
“Before the disaster, semiconductor inventories in the global semiconductor supply chain were at high levels. The Japanese earthquake will cause the appearance of shortages to be delayed by a matter of weeks.”&lt;br /&gt;
&lt;br /&gt;
Much of the disruption is a result of shipping and logistics issues, rather than damage to Japanese manufacturing sites. Many companies will have problems getting material and employees in and out of their factories. In addition, some companies are shutting down production at some facilities voluntarily, in order to reduce the pressure on Japan’s battered power grid.&lt;br /&gt;
&lt;br /&gt;
Japan is a vital hub in the manufacture of components necessary to make technology such as flash memory and dynamic random access memory, which are key parts of most computing devices. Flash memory, specifically, has become increasingly popular in recent years, due in large part to a surge in the production of mobile devices such as tablet computers.&lt;br /&gt;
&lt;br /&gt;
Some of the world’s biggest technology manufacturers have announced temporary plant shutdowns. &lt;span class=&quot;company&quot;&gt;Sony Corp. &lt;/span&gt;has suspended operations in at least seven Japanese plants. In addition, the company is assessing damage at several other facilities, while other Sony plants have voluntarily suspended operations to help contain power outages. The suspended operations will have an impact on the production of everything from lithium ion batteries to DVDs to semiconductor lasers.&lt;br /&gt;
&lt;br /&gt;
The various delays and interruptions will likely affect almost every corner of the consumer electronics industry. Electronics giant &lt;span class=&quot;company&quot;&gt;Hitachi Ltd. &lt;/span&gt;for instance, confirmed damage at six of its facilities.&lt;br /&gt;
According to iSuppli, Hitachi supplies displays for the Nintendo DS hand-held video game system and for LG phones. FujiFilm also announced temporary disruptions to its operations, likely to affect some shipments of digital cameras. Even though the &lt;strong&gt;Toshiba Corp.&lt;/strong&gt; factories that produce memory chips were largely unaffected by the earthquake, the company could still see a drop in shipments because of infrastructure damage in Japan.&lt;br /&gt;
&lt;br /&gt;
In all, the disruptions in Japan’s technology industry could have an effect on everything from the film industry to car stereos.&lt;br /&gt;
&lt;br /&gt;
The unfolding tragedy’s massive impact on industry is especially difficult for the country’s electronics industry because of the precision required to build some technology. Intricate and highly technical components require a rigorous, secure production cycle involving clean rooms free from dust and other impurities. Unlike cars, for example, whose production cycle can be stopped and started, a power failure in the middle of manufacturing chips can ruin an entire shipment.&lt;br /&gt;
&lt;br /&gt;
“Japan will not have enough power to keep all its factories running non-stop and a lot of these manufacturing processes have to run 24/7 – so that’s a major problem,” he said. “It’s inconvenient to Toyota and Nissan, but it’s absolutely devastating to electronics manufacturers.”&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/03/technology-supply-chain-facing.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-396183390225793355</guid><pubDate>Fri, 11 Mar 2011 19:39:00 +0000</pubDate><atom:updated>2011-03-11T14:39:20.916-05:00</atom:updated><title>Firefox 4: What You Need To Know</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.comptalks.com/wp-content/uploads/2010/10/firefox-4-logo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;148&quot; src=&quot;http://www.comptalks.com/wp-content/uploads/2010/10/firefox-4-logo.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;!--[if !mso]&gt; &lt;style&gt;
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
&lt;/style&gt; &lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:TrackMoves/&gt;   &lt;w:TrackFormatting/&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:DoNotPromoteQF/&gt;   &lt;w:LidThemeOther&gt;EN-CA&lt;/w:LidThemeOther&gt;   &lt;w:LidThemeAsian&gt;X-NONE&lt;/w:LidThemeAsian&gt;   &lt;w:LidThemeComplexScript&gt;X-NONE&lt;/w:LidThemeComplexScript&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;    &lt;w:SplitPgBreakAndParaMark/&gt;    &lt;w:DontVertAlignCellWithSp/&gt;    &lt;w:DontBreakConstrainedForcedTables/&gt;    &lt;w:DontVertAlignInTxbx/&gt;    &lt;w:Word11KerningPairs/&gt;    &lt;w:CachedColBalance/&gt;   &lt;/w:Compatibility&gt;   &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;   &lt;m:mathPr&gt;    &lt;m:mathFont m:val=&quot;Cambria Math&quot;/&gt;    &lt;m:brkBin m:val=&quot;before&quot;/&gt;    &lt;m:brkBinSub m:val=&quot;&amp;#45;-&quot;/&gt;    &lt;m:smallFrac m:val=&quot;off&quot;/&gt;    &lt;m:dispDef/&gt;    &lt;m:lMargin m:val=&quot;0&quot;/&gt;    &lt;m:rMargin m:val=&quot;0&quot;/&gt;    &lt;m:defJc m:val=&quot;centerGroup&quot;/&gt;    &lt;m:wrapIndent m:val=&quot;1440&quot;/&gt;    &lt;m:intLim m:val=&quot;subSup&quot;/&gt;    &lt;m:naryLim m:val=&quot;undOvr&quot;/&gt;   &lt;/m:mathPr&gt;&lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState=&quot;false&quot; DefUnhideWhenUsed=&quot;true&quot;
  DefSemiHidden=&quot;true&quot; DefQFormat=&quot;false&quot; DefPriority=&quot;99&quot;
  LatentStyleCount=&quot;267&quot;&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;0&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Normal&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;heading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;9&quot; QFormat=&quot;true&quot; Name=&quot;heading 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 7&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 8&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; Name=&quot;toc 9&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;35&quot; QFormat=&quot;true&quot; Name=&quot;caption&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;10&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; Name=&quot;Default Paragraph Font&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;11&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtitle&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;22&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Strong&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;20&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;59&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Table Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Placeholder Text&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;1&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;No Spacing&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; UnhideWhenUsed=&quot;false&quot; Name=&quot;Revision&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;34&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;List Paragraph&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;29&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;30&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Quote&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 1&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 2&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 3&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 4&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 5&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;60&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;61&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;62&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Light Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;63&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;64&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Shading 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;65&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;66&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium List 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;67&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 1 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;68&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 2 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;69&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Medium Grid 3 Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;70&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Dark List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;71&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Shading Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;72&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful List Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;73&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; Name=&quot;Colorful Grid Accent 6&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;19&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;21&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Emphasis&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;31&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Subtle Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;32&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Intense Reference&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;33&quot; SemiHidden=&quot;false&quot;
   UnhideWhenUsed=&quot;false&quot; QFormat=&quot;true&quot; Name=&quot;Book Title&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;37&quot; Name=&quot;Bibliography&quot;/&gt;   &lt;w:LsdException Locked=&quot;false&quot; Priority=&quot;39&quot; QFormat=&quot;true&quot; Name=&quot;TOC Heading&quot;/&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:&quot;Table Normal&quot;;
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-priority:99;
 mso-style-qformat:yes;
 mso-style-parent:&quot;&quot;;
 mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
 mso-para-margin:0cm;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:11.0pt;
 font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;
 mso-ascii-font-family:Calibri;
 mso-ascii-theme-font:minor-latin;
 mso-fareast-font-family:&quot;Times New Roman&quot;;
 mso-fareast-theme-font:minor-fareast;
 mso-hansi-font-family:Calibri;
 mso-hansi-theme-font:minor-latin;
 mso-bidi-font-family:&quot;Times New Roman&quot;;
 mso-bidi-theme-font:minor-bidi;}
&lt;/style&gt; &lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:shapedefaults v:ext=&quot;edit&quot; spidmax=&quot;1030&quot;/&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;o:shapelayout v:ext=&quot;edit&quot;&gt;   &lt;o:idmap v:ext=&quot;edit&quot; data=&quot;1&quot;/&gt;  &lt;/o:shapelayout&gt;&lt;/xml&gt;&lt;![endif]--&gt;  &lt;br /&gt;
&lt;div style=&quot;line-height: 16.8pt; margin: 12pt 0cm 2.25pt;&quot;&gt;&lt;a href=&quot;&quot; name=&quot;4&quot;&gt;&lt;/a&gt;&lt;a href=&quot;http://feedproxy.google.com/%7Er/mashable/tech/%7E3/q0lZ0WUVX8g/?utm_source=feedburner&amp;amp;utm_medium=email&quot;&gt;&lt;span&gt;&lt;b&gt;&lt;span style=&quot;color: #000099; font-family: &amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 13.5pt; text-decoration: none;&quot;&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;/span&gt; &lt;/div&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;1. Tabs Are On Top&lt;/span&gt;&lt;/h2&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;&lt;img alt=&quot;tabs_on_top&quot; border=&quot;0&quot; class=&quot;alignnone size-full wp-image-285526&quot; id=&quot;_x0000_i1028&quot; src=&quot;http://4.mshcdn.com/wp-content/uploads/2011/03/Screen-shot-2011-03-10-at-2.15.55-PM.png&quot; title=&quot;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;As with Opera and Chrome, Firefox 4 tabs are placed by default above the search bar instead of below it.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;Alex Faaborg, the principal designer on Firefox, created a &lt;a href=&quot;http://www.blogger.com/%3cbr%20/%3e%20See%20an%20in-depth%20explanation%20of%20the%20decision%20here.%3cbr%20/%3e%20http:/blog.mozilla.com/faaborg/2010/06/24/why-tabs-are-on-top-in-firefox-4/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #000099; text-decoration: none;&quot;&gt;video&lt;/span&gt;&lt;/b&gt;&lt;/a&gt; to explain the thought behind this decision. The advantages of doing so, he says, are more logical visuals, space efficiency, and accommodation of new features like app tabs and a redesigned notification window that associates the notification with its site’s tab.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;2. App Tabs&lt;/span&gt;&lt;/h2&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;&lt;img alt=&quot;app_tabs&quot; border=&quot;0&quot; class=&quot;alignnone size-full wp-image-285526&quot; id=&quot;_x0000_i1031&quot; src=&quot;http://6.mshcdn.com/wp-content/uploads/2011/03/aviary1.png&quot; title=&quot;&quot; width=&quot;620&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;Mozilla 4 allows you to turn any tab into an “App Tab” by right-clicking on it and selecting “Pin as App Tab.”&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;These tabs stay put in the upper left-hand corner of the browser even as you scroll through your other tabs, which prevents the web applications you return to frequently from getting lost.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;When there’s an update on one of the app tab pages, like a new e-mail, Facebook message or Twitter update, the tab glows — rather classy compared to the bouncing, flashing alternatives.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;3. Switch to a Tab Via the Search Bar&lt;/span&gt;&lt;/h2&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;&lt;img alt=&quot;app_tabs&quot; border=&quot;0&quot; class=&quot;alignnone size-full wp-image-285526&quot; id=&quot;_x0000_i1034&quot; src=&quot;http://9.mshcdn.com/wp-content/uploads/2011/03/Screen-shot-2011-03-10-at-12.52.37-PM.png&quot; title=&quot;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;Start typing the address of a website that is already open in a tab, and Firefox 4 will suggest an option to switch to that tab, even when it’s in a different open window. If you’re someone who opens more tabs than you can remember, this feature can help prevent repeats.&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;4. Sync Across Multiple Devices&lt;/span&gt;&lt;/h2&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;&lt;img alt=&quot;firefox_sync&quot; border=&quot;0&quot; class=&quot;alignnone size-full wp-image-285526&quot; id=&quot;_x0000_i1037&quot; src=&quot;http://4.mshcdn.com/wp-content/uploads/2011/03/Screen-shot-2011-03-10-at-1.10.00-PM.png&quot; title=&quot;&quot; width=&quot;640&quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;The ability to &lt;a href=&quot;http://www.mozilla.com/en-US/mobile/sync/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: #000099; text-decoration: none;&quot;&gt;sync&lt;/span&gt;&lt;/b&gt;&lt;/a&gt; bookmarks, browsing history, passwords, form fill data, and open tabs across multiple computers and smartphone is built in to Firefox 4.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;While similar features have been default in Chrome and Opera for a while, Firefox director of engineering Johnathan Nightingale says that the organization took the time to develop “weapons-grade encryption.”&lt;/span&gt;&lt;/div&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;h2 style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;;&quot;&gt;5. Panorama&lt;/span&gt;&lt;/h2&gt;&lt;div align=&quot;center&quot; class=&quot;MsoNormal&quot; style=&quot;line-height: 140%; text-align: center;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;  &lt;hr align=&quot;center&quot; size=&quot;2&quot; width=&quot;100%&quot; /&gt;  &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;     Panorama (formerly tab candy) now allows you to overview all of your tabs and organize them into groups using a drag and drop interface.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;line-height: 140%;&quot;&gt;&lt;span style=&quot;color: black; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 10pt; line-height: 140%;&quot;&gt;The feature is accessed through an icon in the upper right-hand corner of the browser that opens to a blank workspace and icons for each of your existing tabs. You can create a new group by dragging two icons near each other, move and resize groups, and close all the tabs in a group with one click.&lt;/span&gt;&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/03/firefox-4-what-you-need-to-know.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-3368809303509527636</guid><pubDate>Mon, 07 Feb 2011 15:16:00 +0000</pubDate><atom:updated>2011-02-07T10:28:29.731-05:00</atom:updated><title>Manage Your Small Business Social Media Marketing From A Single Dashboard</title><description>Social Media Marketing via Facebook for small business is hot! And I don’t see it going away anytime  soon. That means your small business should be there. (Note: if you are  still one of the few small businesses that does not yet have a website,  Facebook would be a good place to start.)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
One of the drawbacks for small business owners when it comes to any  type of social media — whether that is blogging, Twitter, or Facebook —  is taking on one more thing to do in an already packed day. Yes, you can  outsource some of these activities, but the whole idea behind social  media is the social part (as in you need to be present and engaging).&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://services.allfacebook.com/content/l/11990a65a01b85a7d85e88bb0aa9e89b.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;149&quot; src=&quot;http://services.allfacebook.com/content/l/11990a65a01b85a7d85e88bb0aa9e89b.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;So I was pretty thrilled when a couple of messages landed in my email  box about a young startup called MediaFeedia. Its aim is to be &lt;b&gt;the answer&lt;/b&gt; for small business owners like you to manage your Facebook presence.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
And I think they’ve nailed that pretty well. Here are some of the things you can do.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;more-2089&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;ul&gt;&lt;li&gt;Manage multiple administered facebook pages from a single dashboard&lt;/li&gt;
&lt;li&gt;Send posts, complete with photos, links and link metadata from the dashboard&lt;/li&gt;
&lt;li&gt;Send posts in real-time or schedule posts in advance (hours, days, weeks or months in advance)&lt;/li&gt;
&lt;li&gt;Receive notifications via email for all posts and comments made to your page&lt;/li&gt;
&lt;li&gt;Respond to posts and comments via the email notification&lt;/li&gt;
&lt;/ul&gt;&lt;/blockquote&gt;&lt;h2&gt;What I Like About MediaFeedia&lt;/h2&gt;I took it for a test drive and really liked what I saw. Here are my  thoughts on the service along with some handy videos to show you how it  works.&lt;br /&gt;
&lt;b&gt;Scheduling a post is pretty easy.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
See the video, &lt;a href=&quot;http://www.youtube.com/watch?feature=player_profilepage&amp;amp;v=jpjGSRj2kgA&quot; target=&quot;_blank&quot;&gt;click here.&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Plus, you get (almost) instant notification of comments on your fan page via email and can click to interact.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
See the video, &lt;a href=&quot;http://www.youtube.com/watch?feature=player_profilepage&amp;amp;v=vvVD3NYNOCM&quot; target=&quot;_blank&quot;&gt;click here&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;I truly love the option of being able to schedule posts to your facebook page.&lt;/b&gt;  One of the keys to successful interaction is to be able to reach your  contacts when they are on the site. This option allows you to to do  that. You can see the example below. Note that the post source shows MediaFeedia.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; class=&quot;aligncenter size-full wp-image-2092&quot; height=&quot;145&quot; src=&quot;http://www.deniseoberry.com/wp-content/uploads/2011/02/atdpostonfb.png&quot; title=&quot;atdpostonfb&quot; width=&quot;446&quot; /&gt;&lt;br /&gt;
&lt;h2&gt;&lt;b&gt;Here’s What I Don’t Like&lt;/b&gt;&lt;/h2&gt;&lt;a href=&quot;http://www.mediafeedia.com/&quot; target=&quot;_blank&quot;&gt;MediaFeedia&lt;/a&gt;  is using the popular freemium model for their business — you get a free  version that has certain features and benefits and have to upgrade to  get more goodies. I’m actually okay with the model because I know  businesses can’t survive without cash flow. But what I’m not okay with for this particular site is the way it looks like they are going to price their service.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;&quot; class=&quot;aligncenter size-full wp-image-2096&quot; height=&quot;296&quot; src=&quot;http://www.deniseoberry.com/wp-content/uploads/2011/02/mediafeediafeatures.png&quot; title=&quot;mediafeediafeatures&quot; width=&quot;535&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
According to the welcome email, you will get full features for 30  days and then will have to upgrade to continue with full features.  You’ll still have a basic account, but notice that one of the &lt;b&gt;key options they take away is the fan page email notifications&lt;/b&gt;.  Ugh! Not good. The two key reasons why a small business owner like you  and me would use this service is to 1) have the ability to schedule  posts, and 2) be able to get notifications of comments via email. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.hyperalerts.no/files/hyperalerts.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;34&quot; src=&quot;http://www.hyperalerts.no/files/hyperalerts.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href=&quot;http://www.postling.com/images/design_home_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;81&quot; src=&quot;http://www.postling.com/images/design_home_logo.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;But there is an alternative. I could use MediaFeedia for the scheduling options and then set up the (totally free)&lt;a href=&quot;http://www.hyperalerts.no/&quot; target=&quot;_blank&quot;&gt; HyperAlerts &lt;/a&gt;to get email notification of wall posts. Or you could use one of the other new kids on the block like &lt;a href=&quot;http://www.postling.com/&quot;&gt;Postling&lt;/a&gt; to monitor comments. Problem solved.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Do We Recommend MediaFeedia? Yep.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
No matter what, though, I feel comfortable recommending &lt;a href=&quot;http://www.mediafeedia.com/&quot; target=&quot;_blank&quot;&gt;MediaFeedia&lt;/a&gt;  and plan on using it myself. I think it’s one answer to helping small  business owners be present and engaging with clients and prospects while  being able to balance all the balls in the air.</description><link>http://thetechnologycoach.blogspot.com/2011/02/manage-your-small-business-social-media.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-868882656847844814</guid><pubDate>Tue, 01 Feb 2011 22:34:00 +0000</pubDate><atom:updated>2011-02-01T17:41:07.774-05:00</atom:updated><title>Why your anti-virus software might have stopped working this week without telling you!</title><description>Why clients ask &quot;what&#39;s the best FREE anti-virus for my small business&quot; my answer is always the same, &lt;a href=&quot;http://www.microsoft.com/security_essentials/&quot;&gt;Microsoft&#39;s Security Essentials &lt;/a&gt;is a free no-nonsense, no-hassle anti-virus and anti-spyware tool that does 80% of what small businesses need. Microsoft&#39;s own tagline for the application is &quot;Proven anti-virus protection for free? That&#39;s what I need!&quot; And it&#39;s true... or at least it was, until this week.&lt;br /&gt;
&lt;br /&gt;
Microsoft released a new version of the Microsoft Anti-virus application a few weeks ago, and prompted everyone to &quot;Upgrade&quot; it&#39;s still free, but the upgrade takes about 20 minutes per PC and requires you to reboot when it&#39;s finished, so many people ignore it&#39;s prompting seen below.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWiSgDXDcygOPC-aoOZhJ6uVG7AaCP5SKtEgz9hBEw1u6ycvVRachx809owJgSMAVFqdHldOADww83X6EpW48tIt2zkkpBVEmHXcSta4EltQiacIUmXomiTNKubCi3hPs4L78LVHoEaiwr/s1600/MSSE+AV1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWiSgDXDcygOPC-aoOZhJ6uVG7AaCP5SKtEgz9hBEw1u6ycvVRachx809owJgSMAVFqdHldOADww83X6EpW48tIt2zkkpBVEmHXcSta4EltQiacIUmXomiTNKubCi3hPs4L78LVHoEaiwr/s400/MSSE+AV1.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;Again the problem being most people didn&#39;t take the&amp;nbsp; time to hit the &quot;Upgrade Now&quot; button the old version for some unexplained reason &quot;stopped working&quot; it never reported an error, or gave any signs of failure, but I&#39;ve now seen 3 Pc&#39;s in the last week with virus infections that I KNOW were protected, but didn&#39;t get upgraded. So did Microsoft miss a virus definition distribution? Did the program hiccup and let a virus through? We&#39;re not sure, but we do know that if you DIDN&#39;T Upgrade, you&#39;re likely unprotected, and possibly already infected without knowing it.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;So if you&#39;re using Microsoft Security essentials, as I recommend most small business do (&lt;a href=&quot;mailto:scott@outhouseit.com&quot;&gt;ask my why I tell 20% of my customers about a BETTER solution!&lt;/a&gt;) and you haven&#39;t already done the &quot;upgrade&quot; Microsoft recommended last week, you&#39;d better soon, or, give us a call and we can arrange to have a technician install it for you and do a thorough security check at the same time.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;Below is a screen shot of the older version not yet upgraded.&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOTo6LTgzGc8pXaLy4yFnsmoXH8nBjhIMgtD5xcchkEvKYfZS7qNdo8gpt2XZ8nhisTcQD4y4SKUD1fpvLNavZDbh_18Gxzhw4vThXwoy0ES8H5euEo9OGC8oH5Y8frCkhH_vohx64Jy_B/s1600/MSSE+AV2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;276&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOTo6LTgzGc8pXaLy4yFnsmoXH8nBjhIMgtD5xcchkEvKYfZS7qNdo8gpt2XZ8nhisTcQD4y4SKUD1fpvLNavZDbh_18Gxzhw4vThXwoy0ES8H5euEo9OGC8oH5Y8frCkhH_vohx64Jy_B/s400/MSSE+AV2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;And the upgraded version below already installed (note the gray lines instead of the solid blue background).&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://liveside.net/wp-content/images/2010/12/Microsoft-Security-Essentials-2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;285&quot; src=&quot;http://liveside.net/wp-content/images/2010/12/Microsoft-Security-Essentials-2.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/02/why-yore-anti-virus-software-might-have.html</link><author>noreply@blogger.com (The Technology Coach)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWiSgDXDcygOPC-aoOZhJ6uVG7AaCP5SKtEgz9hBEw1u6ycvVRachx809owJgSMAVFqdHldOADww83X6EpW48tIt2zkkpBVEmHXcSta4EltQiacIUmXomiTNKubCi3hPs4L78LVHoEaiwr/s72-c/MSSE+AV1.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-7973057700944952008</guid><pubDate>Tue, 01 Feb 2011 20:56:00 +0000</pubDate><atom:updated>2011-02-01T15:58:02.653-05:00</atom:updated><title>Top 10 sites businesses should ban during work hours.</title><description>One popular method of reducing employee web traffic to non-business sites is modifying the DNS (Domain Name System) settings on your server or internet router, many of our small office clients have asked us about ways to reduce non-work related internet traffic to minimize distractions and  keep workers productive and focused during working hours. The sites we found were blocked most often after we put the security measures in place are listed below.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRPRh5ybvNzImrvpVUrfbnFwkyV6OjPczxKqAbMwWq2WrYVVSw_9RMTeWGyGcTD8SiJqhxl-D9bX6AbyrJFfCFb6Keknv9xK_X_qqSPykGtXnF2dtGSmgK1Dn_apZdgTLWQvoWD5xfXQEK/s1600/How-to-Block-A-Website.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRPRh5ybvNzImrvpVUrfbnFwkyV6OjPczxKqAbMwWq2WrYVVSw_9RMTeWGyGcTD8SiJqhxl-D9bX6AbyrJFfCFb6Keknv9xK_X_qqSPykGtXnF2dtGSmgK1Dn_apZdgTLWQvoWD5xfXQEK/s200/How-to-Block-A-Website.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;No surprise here as Facebook was the most blocked site by businesses  with almost one in four trying to put the clamps on social  networking site, Myspace was second and is still a popular social networking site.&lt;br /&gt;
&lt;br /&gt;
Youtube, the internets second most searched website, I could hear arguments on youtube though, as much as it is primarily an entertainment site, it also contains wealths of useful information and great &quot;how to&#39;s&quot; for staff and management alike.&lt;br /&gt;
&lt;br /&gt;
Doubleclick, and ad.yieldmanager at numbers 4 and 8 are not &quot;traditional&quot; websites at all, these two sites are advertising agents that put the ads on other websites you visit.&lt;br /&gt;
&lt;br /&gt;
Twitter at number 5 is another popular social networking site.&lt;br /&gt;
&lt;br /&gt;
The biggest security threat of the bunch was probably number 6, hotmail, being an non-office email application it opens the doors to security threats in two ways, incoming and outgoing, both the threat of viruses arriving via hotmail and getting through the company email firewall AND sensitive files being sent OUT of the company via hotmail or similar web based email addresses were a concern.&lt;br /&gt;
&lt;br /&gt;
Orkut at number 7 is a social networking site now owned by google and recently relaunched and Meebo at number 9 is yet another popular social media site.&lt;br /&gt;
&lt;br /&gt;
And of course we can&#39;t forget ebay, I honestly think this site would have ended up MUCH higher on the list if it wasn&#39;t for what I call &quot;self regulation&quot; that is people who realize they&#39;re not supposed to be on that site, before they even try. eBay is one of the most popular websites on the internet, and a real &quot;time waster&quot; for employees.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;content&quot;&gt;&lt;div class=&quot;s-10 desc space-1&quot;&gt;The full list:&lt;br /&gt;
1. Facebook&lt;br /&gt;
2. MySpace&lt;br /&gt;
3. YouTube&lt;br /&gt;
4. DoubleClick&lt;br /&gt;
5. Twitter&lt;br /&gt;
6. Hotmail&lt;br /&gt;
7. Orkut&lt;br /&gt;
8. ad.yieldmanager&lt;br /&gt;
9. Meebo&lt;br /&gt;
10. eBay&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
If you&#39;re company hasn&#39;t already implemented an acceptable employee internet usage policy and doesn&#39;t have an easy way to enforce and monitor it, we&#39;d be happy to discuss cost effective solutions.</description><link>http://thetechnologycoach.blogspot.com/2011/02/top-10-sites-businesses-should.html</link><author>noreply@blogger.com (The Technology Coach)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRPRh5ybvNzImrvpVUrfbnFwkyV6OjPczxKqAbMwWq2WrYVVSw_9RMTeWGyGcTD8SiJqhxl-D9bX6AbyrJFfCFb6Keknv9xK_X_qqSPykGtXnF2dtGSmgK1Dn_apZdgTLWQvoWD5xfXQEK/s72-c/How-to-Block-A-Website.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-1390931648587952750</guid><pubDate>Thu, 20 Jan 2011 22:02:00 +0000</pubDate><atom:updated>2011-01-20T17:05:43.344-05:00</atom:updated><title>Where&#39;s  the best place to store those precious memories? Or critical backups?</title><description>Where should you really be putting your most important Data? CD/DVD Disc? An external hard drive? Tape Drive? USB Memory Stick/Flash drive? Something else perhaps?&amp;nbsp; And what can we really expect in the way of longevity out of today&#39;s storage mediums?&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://t2.gstatic.com/images?q=tbn:ANd9GcQQxjdbX5sroHA6dUexZ6q3gAU0aFZc33Gg7ZkHS1-EFUUIkEDocw&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://t2.gstatic.com/images?q=tbn:ANd9GcQQxjdbX5sroHA6dUexZ6q3gAU0aFZc33Gg7ZkHS1-EFUUIkEDocw&quot; /&gt;&lt;/a&gt;&lt;b&gt;CD/DVD&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The vast majority of blank optical media (blank CD&#39;s and DVD&#39;s) sold today are of very low quality.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
It’s very easy to tell if the spindle of blank DVDs you just bought are junk or not. Look at the sides of the discs in the stack. Do you see lumps, bumps and inconsistencies? &lt;br /&gt;
&lt;br /&gt;
If the answer is yes, they’re low quality. Don’t bother returning them because every spindle you buy will be like that unless you go with a specific brand which I’ll mention in a moment.&lt;br /&gt;
&lt;br /&gt;
Truly good optical discs have no imperfections that can be seen by the naked eye. So should you pop over to staples or best buy and look through all the spindles of optical discs? probably not.&lt;br /&gt;
&lt;br /&gt;
You know from above that off-the-shelf media today are going to fail, much the same way floppy diskettes failed at the end of their tenure. Manufacturers churn these things out without any consideration of quality file writes or reads for the long haul, they are not a &quot;long term solution&quot;&lt;br /&gt;
&lt;br /&gt;
If you do opt to use CD or DVD media, don’t plan on having anything last for longer than 2 to 3 years at most before read failure. It doesn’t matter if you have&amp;nbsp; the best optical drive available, because there’s nothing you can do to stop the breakdown of the quality over time.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://t1.gstatic.com/images?q=tbn:ANd9GcTnU6xcddQcTWzylPDnSrKOYWRRDCwz7L4Y_5g8U-fmK2BuzbI1WA&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://t1.gstatic.com/images?q=tbn:ANd9GcTnU6xcddQcTWzylPDnSrKOYWRRDCwz7L4Y_5g8U-fmK2BuzbI1WA&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;HARD DRIVE&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
One of the leading hard drive manufacturers Western Digital used to  offer lifetime warranties on consumer PC hard drives, they stopped. Why?&lt;br /&gt;
&lt;br /&gt;
There was a point in time when any Western Digital&amp;nbsp; Hard Disk Drive you  bought had a lifetime warranty. Then WD knocked that down to 7 years.  Then 5 years. Then for some models 3 or even just 1!&lt;br /&gt;
&lt;br /&gt;
What happened is that the manufacturing process changed, and certain  components on the inside of the Hard Disk Drive that used to be made  from metal were changed to plastic.&lt;br /&gt;
&lt;br /&gt;
I’m not saying WD drives are bad because I use them myself, but the  phrase &quot;they don’t make ‘em like they used to&quot; definitely applies.&lt;br /&gt;
&lt;br /&gt;
As a testament to this, there are still 286 PCs (circa 1982) out there  that when started, the drive takes a really long time to spin up, it’s  really loud once running, but it amazingly still works almost 30 years  later and all the data is accessible and ready to rock. I seriously,  seriously doubt hard drives made today will be able to boast that 30  years from now.&lt;br /&gt;
&lt;br /&gt;
In February 2007, Google Inc. released a study that they conducted on  their own computers entitled Failure Trends in a Large Disk Drive  Population. According to this study, which was the most extensive of  it&#39;s kind ever completed, hard drives are most likely to fail if they  are less than 3 months old, or more than 2 years old. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2 years!? &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
The best way to make a hard drive last as long as possible is to use two. A smaller hard drive for the operating system and a large one for storage. If you&#39;re not already doing this ask your IT technician about it, if you don&#39;t have one, we can help. This is a time-honored way of computing and it does allow for HDDs dedicated to storage to last longer than 2 years, but it&#39;s not an alternative to a backup, it&#39;s just better than one hard drive.&lt;br /&gt;
&lt;br /&gt;
As for how much longer, standard fare is 3 to 5 years. A dedicated storage HDD will last for 5 or greater before showing signs of eminent doom. Doom that doesn&#39;t scream &quot;hey I&#39;m dying in here&quot; until well, it&#39;s much too late. Luckily IT tech&#39;s have tools that measure the drive&#39;s S.M.A.R.T. (Self Monitoring and Reporting Tools) and can determine when a drive&#39;s on it&#39;s last legs, but only if they see it BEFORE that time comes.&lt;br /&gt;
&lt;br /&gt;
And yes there are plenty of instances where people have had hard drives last well beyond the 7-year mark, however it’s never wise to assume that you will achieve that just because someone else did.&lt;br /&gt;
&lt;br /&gt;
Heck lots of people have crossed the lake in early April because the ice looked thick enough, you want to go out on the ice too?&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://t0.gstatic.com/images?q=tbn:ANd9GcTJUhFODjsUbuRbZ9xyxxPQQO9iO0CJ5cQs7AVImQ32NB52UeHC&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://t0.gstatic.com/images?q=tbn:ANd9GcTJUhFODjsUbuRbZ9xyxxPQQO9iO0CJ5cQs7AVImQ32NB52UeHC&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;TAPEDRIVE&lt;/b&gt;&lt;br /&gt;
One word. NO. Not economical, not reliable, not cost effective, not easy to manage, not inexpensive, not an option.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://t3.gstatic.com/images?q=tbn:ANd9GcTL-By4-5-EKO8Qvq2eWecKyxY6CvwoYR7ofwGuyE0PtJBY8vnZaQ&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://t3.gstatic.com/images?q=tbn:ANd9GcTL-By4-5-EKO8Qvq2eWecKyxY6CvwoYR7ofwGuyE0PtJBY8vnZaQ&quot; /&gt;&lt;/a&gt;&lt;b&gt;USB FLASH&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
USB sticks have been around long enough to prove that they can definitely withstand the test of time better than any other immediately available affordable storage media. &lt;br /&gt;
&lt;br /&gt;
If you write data to a USB stick, toss it in a drawer then 8 years later go to use it again, it will work. A hard drive used that way is an iffy prospect at best and I’d never trust optical media to last that long even with premium brands.&lt;br /&gt;
&lt;br /&gt;
I’ll put it to you this way: If I were making a time capsule and wanted to put some data in it, I’d use nothing but USB sticks if I wanted something I could retrieve two decades later and have relative assurance it would still work and not have decayed beyond being usable.&lt;br /&gt;
&lt;br /&gt;
The only known thing that can kill a USB stick is either unmounting it improperly (pulling it out while it&#39;s still being written to or read from) or running out of file writes as it does have a predetermined limit - yes you read that right, predetermined number of file writes. USB sticks, as with Memory cards for camera&#39;s, cell phones and camcorders have a pre-determined number of writes, somewhere in the multi-billions before they simply give up. And to my knowledge there&#39;s no odometer that says &quot;almost done&quot; when it&#39;s time to move on.&lt;br /&gt;
&lt;br /&gt;
If it sounds like I’m telling you to burn discs less and use Flash media more, I am. Flash sticks don’t suffer from scratches or any damage from being a moving part because it doesn’t move.&lt;br /&gt;
&lt;br /&gt;
But that being said if you&#39;re looking for something for regular daily use I wouldn&#39;t trust a USB stick much longer than a year before I switched to a new one. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;CONCLUSION&lt;/b&gt;&lt;br /&gt;
&lt;a href=&quot;http://t2.gstatic.com/images?q=tbn:ANd9GcSqgk7SyiMy4Om_Bko2lJ7_vMeWEBM8yY0cyRyLwp9rG0zMwX2H&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://t2.gstatic.com/images?q=tbn:ANd9GcSqgk7SyiMy4Om_Bko2lJ7_vMeWEBM8yY0cyRyLwp9rG0zMwX2H&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
So wait,&amp;nbsp; what&#39;s the answer? Hard Drives aren&#39;t built like they used to be, optical discs aren&#39;t long term enough, usb sticks only work if you well, don&#39;t plan on actually using them, what&#39;s the right answer?&lt;br /&gt;
&lt;br /&gt;
A combination actually. A combination of a local USB flash stick backup of the most important files swapped for a new stick on a yearly basis And a hard drive backup, but not your hard drive, someone else&#39;s, somewhere else. &lt;br /&gt;
&lt;br /&gt;
While 80% of computer failures are caused by hard drive crashes, the other 20% are not, the other 20% are fire, flood, theft or sabotage. And if your USB stick backup and backup hard drive are plugged into your computer when the Fire, Flood, Theft or sabotage occur, you&#39;ve just lost everything.&lt;br /&gt;
&lt;br /&gt;
My real recommendation is use USB sticks daily or weekly to store the most critical data and an online backup solution (which backs up to someone else&#39;s hard drives somewhere else out of the way of fire, flood, theft and most cases of sabotage).&lt;br /&gt;
&lt;br /&gt;
But aren&#39;t someone else&#39;s hard drives just as likely to fail as your own? Yes, but online backup companies know that and prepare for it, everything you ask them to backup is backed up to not one but two hard drives at the same time, and the drives themselves are traded out for newer drives every 2-3 years depending on their previous failure track record.&lt;br /&gt;
&lt;br /&gt;
Worried about security? The security practices that REPUTABLE online backup companies use to store your data, is the same grade of security that the US and Canadian military use to store their data, I won&#39;t go into nitty gritty details but you know the story of a million monkey&#39;s on a million typewriters? Well all you&#39;d get is a lot of banana peels to compost.&lt;br /&gt;
&lt;br /&gt;
So if you&#39;re not sure the backup solution you&#39;re already using is &quot;ideal&quot; for your business needs, give us a call, we&#39;d be happy to discuss the details and provide a solution.</description><link>http://thetechnologycoach.blogspot.com/2011/01/wheres-best-place-to-store-those.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-2545505887457147115</guid><pubDate>Mon, 17 Jan 2011 19:42:00 +0000</pubDate><atom:updated>2011-01-17T14:42:18.081-05:00</atom:updated><title>Imporant tips for managing employee Internet access</title><description>&lt;div style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;There’s a fine line between being Big Brother and keeping employees  from wasting too much time on the Internet. And as we all know, there  are plenty of ways to waste time on the ‘net: Facebook, Twitter,  chatting, shopping, scores… you name it. But how do you manage control  of your employees — and what type of control do you extend over them?  Everything gets even more complicated if your business also depends upon  the type of PR and marketing to be had from the likes of Facebook and  Twitter. As more and more companies and businesses resort to these  outlets for free advertising, different levels of control must be put  into place.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Here are a few suggestions for tools you can use to manage this  control, policies to implement, and ways to keep your employees from  revolting.&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://askbobrankin.com/employee-internet-monitoring.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;166&quot; src=&quot;http://askbobrankin.com/employee-internet-monitoring.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;a href=&quot;http://www.bifsniff.com/images/cartoons/internet-usage.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;1st Make sure you have a clear access policy Instead of employing controlling software, it might better suit your  environment and employees to have clear policies in place that prevent  the usage of certain Web sites during work hours. This method does call  upon the honor system (unless you are using a monitoring tool), which  gives your work environment a more relaxed feel. The problem with this  method arises when you discover an employee abusing the policies and you  do not react. If you lay out a clear policy and do not punish those  ignoring it, you may as well throw that policy out the window.&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;If manually monitoring (over the shoulder) would take too much time or feel to intrusve to employees, as most managers feel it does, you&#39;ll want to look into tools that will monitor network  usage for you. With tools of this nature, you can keep tabs on what your users  are viewing online and then act accordingly. This is a much less Big  Brother approach to managing what your employees are viewing. By  handling this task this way, you are more inclined to have a lower  attrition rate from employees not wanting to work in a controlling  environment. Monitoring tools&lt;a href=&quot;http://www.net-monitoring-software.com/&quot; target=&quot;_blank&quot;&gt;&lt;/a&gt;  allow you to monitor employee Web usage from a single desktop. Some tools even allows the administrator to view employee bookmarks  and favorites. Although some think this a better approach than  implementing policies and preventing access to certain (or all) Web  sites, many people view this quite the opposite. As I said earlier, it’s  a very fine line.&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;DNS Redirection is an industry accepted method for Web content/security filtering using tools that are completely  Web based. With DNS control, you can filter content, prevent phishing, block  page bypass, protect against malware , delegate administration, and much more. You  will have detailed daily reports as well as archived logs and  statistics. With content filtering, you can select from more than 50  categories and prevent the use of proxies for bypassing filters.&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Along with having clear policies, you have to be willing to offer some  flexibility. During the holiday season, employees are going to shop  online. During March Madness, employees are going to check basketball  scores. You must be willing to give or you will find yourself with some  upset employees. If you are never willing to bend on your policies, the  attrition rate may rise during certain times of the year or with certain  cross sections of employees. (Older employees may be less apt to take  issue with such policies than younger employees.)&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;The saying “Everything is relative” applies here — as does “Everything  in moderation.” The real problem with employees surfing the Web happens  when it interferes with actual work. This could be too much browsing or  browsing to unsafe or inappropriate sites. You, as an employer (or  manager) must tread that fine line between too much and too little  control over what employees can do with their Web browsing.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/h2&gt;&lt;h2 style=&quot;font-family: Times,&amp;quot;Times New Roman&amp;quot;,serif; font-weight: normal;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;What measures does your organization rely on to manage employee Internet  activity? If your approach isn&#39;t working, or you don&#39;t have one at all, Give us a call at Outhouse IT, we&#39;re here to help.&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;/h2&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/01/imporant-tips-for-managing-employee.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-4181102503601326265</guid><pubDate>Tue, 11 Jan 2011 19:04:00 +0000</pubDate><atom:updated>2011-01-11T14:04:38.957-05:00</atom:updated><title>Your own email @facebook.com? Beware Facebook survey scam</title><description>&lt;h2&gt;&lt;a href=&quot;http://www.dataprotectioncenter.com/antivirus/sophos/your-own-email-facebook-com-beware-facebook-survey-scam/&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Your own email @facebook.com? Beware Facebook survey scam&quot;&gt;&lt;/a&gt;&lt;/h2&gt;Thousands of Facebook users have been hit by a scam which claims to give them early access to a facebook.com email address.&lt;br /&gt;
&lt;br /&gt;
Messages, appearing in the news feed of users who have fallen for the scam, read:&lt;tt&gt;&amp;nbsp;&lt;/tt&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;tt&gt;Just got my own email @facebook.com! Quickly get one before someone takes your name [LINK REMOVED]&lt;/tt&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;table class=&quot;ncode_imageresizer_warning&quot; id=&quot;ncode_imageresizer_warning_1&quot; style=&quot;width: 400px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;td1&quot; width=&quot;20&quot;&gt;&lt;/td&gt;&lt;td class=&quot;td2&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;img alt=&quot;Just got my own email @facebook.com! Quickly get one before someone takes your name&quot; height=&quot;240&quot; id=&quot;ncode_imageresizer_container_1&quot; src=&quot;http://sophosnews.files.wordpress.com/2010/12/own-email-1.jpg?w=640&quot; title=&quot;Just got my own email @facebook.com! Quickly get one before someone takes your name&quot; width=&quot;400&quot; /&gt; &lt;blockquote&gt; &lt;/blockquote&gt;However, clicking on the links leads you to a webpage which tricks  you into giving a third party application permission to post to your  Facebook wall.&lt;br /&gt;
&lt;br /&gt;
&lt;table class=&quot;ncode_imageresizer_warning&quot; id=&quot;ncode_imageresizer_warning_2&quot; style=&quot;width: 400px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;td1&quot; width=&quot;20&quot;&gt;&lt;/td&gt;&lt;td class=&quot;td2&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;img alt=&quot;Your own email @facebook.com?&quot; height=&quot;348&quot; id=&quot;ncode_imageresizer_container_2&quot; src=&quot;http://sophosnews.files.wordpress.com/2010/12/own-email-2.jpg?w=640&quot; title=&quot;Your own email @facebook.com?&quot; width=&quot;400&quot; /&gt; &lt;br /&gt;
&lt;table class=&quot;ncode_imageresizer_warning&quot; id=&quot;ncode_imageresizer_warning_3&quot; style=&quot;width: 400px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;td1&quot; width=&quot;20&quot;&gt;&lt;/td&gt;&lt;td class=&quot;td2&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;img alt=&quot;Rogue application&quot; height=&quot;334&quot; id=&quot;ncode_imageresizer_container_3&quot; src=&quot;http://sophosnews.files.wordpress.com/2010/12/own-email-3.jpg?w=640&quot; title=&quot;Rogue application&quot; width=&quot;400&quot; /&gt; Don’t, whatever you do, allow the app to have permission to access  your profile.  Because then it will start to spread the messages even  further, starting with your online Facebook friends.&lt;br /&gt;
&lt;br /&gt;
You won’t realise it’s doing that, of course, until it’s too late –  as you’re too distracted by the form asking you for your email details..  oh, and the revenue-generating online survey that the scammers have put  up in the front of it..&lt;br /&gt;
&lt;br /&gt;
&lt;table class=&quot;ncode_imageresizer_warning&quot; id=&quot;ncode_imageresizer_warning_4&quot; style=&quot;width: 400px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;td1&quot; width=&quot;20&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;td class=&quot;td2&quot;&gt;&lt;br /&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;img alt=&quot;Survey scam on Facebook&quot; height=&quot;328&quot; id=&quot;ncode_imageresizer_container_4&quot; src=&quot;http://sophosnews.files.wordpress.com/2010/12/own-email-4.jpg?w=640&quot; title=&quot;Survey scam on Facebook&quot; width=&quot;400&quot; /&gt; Note, these scam messages are not connected with Facebook’s genuine plans to give everyone a &lt;a href=&quot;http://nakedsecurity.sophos.com/2010/11/15/faq-security-and-facebooks-new-messages-system/&quot;&gt;@facebook.com public email address&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
Facebook expects to roll out that service more widely in the coming months, and will use your “publicusername” when live.&lt;br /&gt;
&lt;br /&gt;
Here’s a &lt;a href=&quot;http://www.youtube.com/watch?v=Or-qR0Y300w&quot; title=&quot;Link to YouTube video&quot;&gt;YouTube video&lt;/a&gt; where Sophos will show you how to clean-up your Facebook account if you were hit by this, or similar scams:&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;display: block; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.youtube.com/watch?v=Or-qR0Y300w&amp;amp;feature=player_embedded&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;300&quot; src=&quot;http://img.youtube.com/vi/Or-qR0Y300w/2.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/span&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/01/your-own-email-facebookcom-beware.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-5434952848499504085</guid><pubDate>Mon, 03 Jan 2011 20:52:00 +0000</pubDate><atom:updated>2011-01-03T15:52:29.803-05:00</atom:updated><title>Talking with techies</title><description>&lt;h2&gt;Talking with techies&lt;/h2&gt;           &lt;p&gt;As a techie* you probably have no difficulty communicating with your  peers. You use acronyms, terminology and examples that your colleagues  understand. The difficulty arises when you need to communicate with  techies in different fields or when you need to talk with non techies  such as customers, upper level management or the sales staff.&lt;/p&gt; &lt;p&gt;I write marketing material, presentations and web content for  technical products and services. When I talk with techies I need to play  the role of “designated idiot.”(I first heard this term used by &lt;a href=&quot;http://www.linkedin.com/profile/view?id=11870661&amp;amp;authType=name&amp;amp;authToken=S9MN&amp;amp;goback=.con&quot;&gt;Bruce Madole&lt;/a&gt; in 1994 at an &lt;a href=&quot;http://www.hpcaonline.com/&quot;&gt;HPCA presentation&lt;/a&gt;.)  I have found that techies often assume knowledge that their audience  may not possess. By being the designated idiot, I ask questions until I  understand the process or product. When I understand, know the acronyms,  expressions and terminology I can then write the web page, the white  paper, the case study, the testimonial story or the marketing brochure.&lt;/p&gt; &lt;p&gt;When techies are presenting, talking to customers or training their  sales staff they need to keep in mind the following principles .&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Know your audience.&lt;/strong&gt; Find out who they are, what they  need and want to know. Determine their level of technical  understanding. Some may not know the difference between an extruder and a  die, or a browser and a hard drive. You need to be able to talk to them  at their level – not down to them. You need to help them follow your  train of thought, and use real examples that they can understand.&lt;/p&gt; &lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Talk about the benefits of features. &lt;/strong&gt;As a subject  matter expert, you know your product better than anyone but sometimes  you see all the features and are blind to the benefits of your product.  The benefits are what interests potential buyers and it’s what sells the  product.&lt;/p&gt; &lt;p&gt;When talking to your sales staff or to a customer about design  issues, talk about the benefits of the features. Describe how a feature  will contribute to efficiencies, cost savings, or ease of use. Use  practical examples from the field, not from the lab.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Beware, the devil is  in the details.&lt;/strong&gt; Techies are  often frustrated because they want to talk about every detail such as  the thickness and type of plating on a particular part. But the audience  only needs to be assured that the part will stand up to the rigours of  use. You may have spent months testing various plating materials to come  up with the right one. So what? You now have the part that works  effectively and won’t wear out like the one competition uses. When a  savvy customer asks about the type of plating then you can provide the  justification for the type of plating.&lt;/p&gt;  &lt;p&gt;As a techie, you have a detailed knowledge about the products you  design, and we hope you demonstrate that enthusiasm for the product. Be  cautious about delivering a brain dump. Not only will you intimidate the  technically challenged and but you will fail to impress the  knowledgeable members of the audience. It is a fine balance. You need to  provide enough information without overwhelming.&lt;/p&gt; &lt;p&gt;A techie with well-developed communication skills can be a powerful  partner to sales staff and the marketing team, including outsourced  suppliers (such as buzz4biz). You can provide great support when you are  able to communicate with customers and provide in-depth and  understandable answers to customer questions.&lt;/p&gt; &lt;p&gt;*For the purposes of this article “techies” is an all-encompassing  and endearing term  to describe engineers, engineering technologist and  IT professionals of all kinds. It is  not a term of derision, but a term  of convenience.&lt;/p&gt; This article shared from&lt;strong&gt;&lt;em&gt; buzz&lt;/em&gt;4biz&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;em&gt;buzz&lt;/em&gt;4biz &lt;/strong&gt;creates success through the written word.&lt;br /&gt;&lt;p&gt;&lt;strong&gt;They write to&lt;/strong&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;motivate employees&lt;/li&gt;&lt;li&gt;protect brands&lt;/li&gt;&lt;li&gt;maintain customer awareness.&lt;/li&gt;&lt;/ul&gt;&lt;a href=&quot;http://www.buzz4biz.ca/2011/01/talking-with-techies/&quot;&gt;Full article &quot;Talking with techies&quot;&lt;/a&gt;</description><link>http://thetechnologycoach.blogspot.com/2011/01/talking-with-techies.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4294304146968793357.post-4260011541008131323</guid><pubDate>Fri, 24 Dec 2010 19:14:00 +0000</pubDate><atom:updated>2011-06-17T10:58:53.186-04:00</atom:updated><title>Merry Christmas!</title><description>&lt;table border=&quot;0&quot; cellpadding=&quot;10&quot; cellspacing=&quot;0&quot; id=&quot;content_LETTER.BLOCK3&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td align=&quot;left&quot; colspan=&quot;1&quot; rowspan=&quot;1&quot; style=&quot;color: #44440c; font-family: Arial,Helvetica,sans-serif; font-size: 10pt;&quot;&gt;&lt;span style=&quot;color: #44440c; font-size: x-small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;Wishing The&lt;/span&gt; &lt;/span&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;The Happiest of Holidays!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt; To your family from ours at The Technology Coach!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;2010 Was a VERY exciting year for us, both professionally and personally. Siobhan and I welcomed our first child &lt;span style=&quot;color: red;&quot;&gt;Saoirse Kendall Born Sept. 20th&lt;/span&gt;. If you&#39;d like to see pictures (and who doesn&#39;t!) of our new baby, &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://r20.rs6.net/tn.jsp?llr=gopfmtbab&amp;amp;et=1104133799101&amp;amp;s=740&amp;amp;e=001pgyqduljaTuN5AXC2IQiN3Jw9FT5T8IGu3zaPQk8mBbC0iQA10vgvi0-9GKanjK7_IiCVZvxRrv3YuuxbSy2BJiL0AsxaLy_eZPIYogY4Buc2IB81RZx_LDiL9VwjV_n&quot; shape=&quot;rect&quot; style=&quot;color: red; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;find us on facebook&lt;/a&gt;&lt;/span&gt; and we&#39;ll be happy to &quot;friend&quot; you. While you&#39;re there why not check out our &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://r20.rs6.net/tn.jsp?llr=gopfmtbab&amp;amp;et=1104133799101&amp;amp;s=740&amp;amp;e=001pgyqduljaTsD9e7VjG0O-lSBeOynU4-X4Y5_CWo8IXqqf7a0lEwUAsY3VRA6XCXIr5MhJzJYjwAmNiq1B-RCFSsoRfTINJ9FY-cJdV_4n4-yNnTUE4SLuojY8ES97_eRqfOCanf6QL-ngJFqBuN7EJ6XvjOZkMpYZshE8SdMEFNIhl0F2U4kKQ==&quot; shape=&quot;rect&quot; style=&quot;color: red; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;facebook fanpage&lt;/a&gt;&lt;/span&gt;,   full of tips and tricks we include our Blog entries and any news on  our  facebook pages. Social Media Marketing is a very powerful tool and  we&#39;d  love to help you explore how it can help your business, just ask!&lt;br /&gt;
&lt;br /&gt;
As if 2010 wasn&#39;t busy enough it was also our first year operating as an &lt;span style=&quot;color: red;&quot;&gt;incorporated company&lt;/span&gt;, if you&#39;d like to hear about why we made the decision to incorporate after 7 years in business just &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;mailto:scott@thetechnologycoach.ca&quot; shape=&quot;rect&quot; style=&quot;color: red; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;send us an email,&lt;/a&gt;&lt;/span&gt; we&#39;d be happy to tell you about why we made the decision and the professionals we involved to help us through it! &lt;br /&gt;
&lt;br /&gt;
Last  but not least the end of 2010 also marked the beginning of our new   branding, with the name change on the horizon for early 2011 we&#39;ve   already registered our new domain, thrown up a &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://r20.rs6.net/tn.jsp?llr=gopfmtbab&amp;amp;et=1104133799101&amp;amp;s=740&amp;amp;e=001pgyqduljaTsSRrfVViUNt-FcrhQd24xUhWyA_QFDBOeDYIZAMKHhkru_J3_bnnNZnjzssIZbWY5eRX01ZqVOBQRnlicZ9RDjCxodj0w8H9s4SSfLGa8Zfg==&quot; shape=&quot;rect&quot; style=&quot;color: red; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;temporary place holder website&lt;/a&gt;&lt;/span&gt; and created new email addresses for myself (scott@outhouseit.com).&lt;br /&gt;
&lt;br /&gt;
Keep your eyes peeled and ears open for more exciting news on the launch of &lt;span style=&quot;color: #ff6600;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;Outhouse   I.T. Inc, Where our mission is to provide small businesses with a full   service, cost effective alternative to an in house I.T. Departmen&lt;/span&gt;t.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #44440c; font-size: x-small;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;font-size: 14pt;&quot;&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;&lt;span style=&quot;color: #ff6600;&quot;&gt;&amp;nbsp;&lt;/span&gt; &lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt; &lt;span style=&quot;color: black;&quot;&gt;And now for our gift to you, our loyal customers and friends, this months technology tip is about creating an &lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;out of office email message&lt;/span&gt;&lt;span style=&quot;color: black;&quot;&gt; to automatically let others know you are away from the office during the holidays, you&#39;ll find details here on our &lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://r20.rs6.net/tn.jsp?llr=gopfmtbab&amp;amp;et=1104133799101&amp;amp;s=740&amp;amp;e=001pgyqduljaTtiOKMU8S9zzjEHSWnVvBtDW21tkfEkDAIwFD8WG65Y7NG03aQA61nRVd6hJdhJYaZoXIuk-N0Hecf1f-o-pD7WrSxpkUA7NcBqjFyqts_3VIG6qJlZEI2KSmw2_Hx6ruUPA9Abopi7UwhfxSQ-Xtee7G-rCnCpaTdMocbbsXJ3nj7Voy718jbtX0EaZDuTWz0=&quot; shape=&quot;rect&quot; style=&quot;color: red; font-size: 14pt; text-decoration: underline;&quot; target=&quot;_blank&quot;&gt;Blog.&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #44440c; font-size: x-small;&quot;&gt;&lt;span style=&quot;font-size: 12pt;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;As    many of us wind down for the Holiday Season. We&#39;re reminded at this    time of year of the importance of family, taking some time for  ourselves   and enjoying the rest of life as much as we enjoy running  our   businesses!&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black; font-size: 12pt;&quot;&gt;&lt;br /&gt;
Again a sincere Happy Holidays from our family to yours and all the best in 2011!&lt;/span&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><link>http://thetechnologycoach.blogspot.com/2010/12/merry-christmas.html</link><author>noreply@blogger.com (The Technology Coach)</author><thr:total>0</thr:total></item></channel></rss>