Seeing QR Codes, But Don’t Know What They Are?

As smartphone technology continues to improve in terms of providing connectivity, it follows that your internet marketing strategies must be able to accommodate these advances. One strategy you can employ is using QR codes, a simple and effective way to market yourself. Smartphones are becoming more and more popular these days, as both hardware and software developers add features to phones and operating systems that make them much more appealing to potential buyers. And as smartphone technology continues to improve in terms of providing more connectivity to the user – not only through the mobile network but to the internet as well – it follows that your internet marketing strategies will need to incorporate the smartphone factor. One simple strategy that you can employ is using QR Codes, or Quick Response Codes, which are simple 2D barcodes that can be scanned using a smartphone. Numerous scanning applications are available to read these barcodes, and once read the code will redirect the user to any link you set up. QR Codes are also fairly easy to create, making them a great on-the-fly strategy if you want to market something quickly and easily. An additional strength of QR Code-driven marketing lies in the volume of people who use smartphones today – which gives you a large audience from the get go. For such a small piece of code, there are countless options for how you can use them to your advantage. If you are interested in learning more about using QR Codes, give us a call and we can come up with several strategies that can cater to your specific needs.

Life’s Little Truths

Going to church doesn’t make you a Christian any more than going to a garage makes you a mechanic. If you must choose between two evils, pick the one you’ve never tried before. My idea of housework: Sweep the room with a glance. Artificial intelligence is no match for natural stupidity. No husband has ever been shot while doing the dishes. Junk is something you keep for years then throw away 3 weeks before you need it. By the time you can make ends meet, they’ve moved the ends. Blessed are those who can laugh at themselves for they shall never cease to be amused. Don’t forget Daylight Saving Time Begins Sunday, March 13 th . Spring forward! Be sure to set your clocks an hour ahead when you go to bed.

The Lighter Side… Funny And Odd Quotes On Computers:

“To err is human, but to really foul things up requires a computer.” – Farmer’s Almanac “Imagine if every Thursday your shoes exploded when you tied them the usual way. This happens to us all the time with computers and nobody thinks of complaining.” – Jef Raskin “Programming today is a race between software engineers striving to build bigger and better idiot-proof programs, and the Universe trying to produce bigger and better idiots. So far, the Universe is winning.” – Rick Cook, The Wizardry Compiled “To err is human – and to blame it on a computer is even more so.” – Robert Orben “If the automobile had followed the same development cycle as the computer, a Rolls-Royce would cost $100, get a million miles to the gallon and explode once a year, killing everyone inside.” – Robert X. Cringely “Where a calculator on the ENIAC is equipped with 18,000 vacuum tubes and weighs 30 tons, computers in the future may have only 1,000 vacuum tubes and perhaps weigh 1.5 tons” – Popular Mechanics Magazine, 1949

Can Criminals Use Your GPS To Burglarize Your Home?

The Story: A couple of weeks ago a friend told me that someone she knew had their car broken into while they were at a football game. Their car was parked on the green which was adjacent to the football stadium and specially allotted to football fans. Things stolen from the car included a garage door remote control, some money and a GPS which had been prominently mounted on the dashboard. When the victims got home, they found that their house had been ransacked and just about everything worth anything had been stolen. The thieves had used the GPS to guide them to the house. They then used the garage remote control to open the garage door and gain entry to the house. The thieves knew the owners were at the football game, and they knew when the game was scheduled to finish, so they knew how much time they had to clean out the house. It seems they even brought a truck to empty the house of its contents. True Or False? While there are cases in which GPS devices have been used in crimes against their owners, this particular story is a “friend of a friend” e-mail legend according to www.Snopes.com . That said, there is a valuable lesson here: Don’t leave valuables in the car! GPS devices, like cell phones and laptops, are expensive electronic devices that are attractive to thieves. Plus, you should always make it a habit to lock your electronic devices using a strong password (one that contains upper and lowercase letters and numbers).

Shiny New Gadget Of The Month: www.rescuetime.com

This month’s “Gadget” is not an electronic device. It’s an online tool I’m sure you’ll be interested in checking out. RescueTime is a web application that tracks where you spend your time while working on your PC and then reports how productive you are based on what you consider productive time. Want to know how much time you REALLY spend checking e-mail, watching YouTube videos or on Facebook? RescueTime will tell you. After you’ve let it collect some data, you can go back to the site and tag various activities such as “work” or “fun time” to better track where your time is going every day. You can also set goals for yourself on how much productive versus unproductive time you should be spending every day and get notifications when you aren’t hitting your goals. They offer a free version you can download or a paid version that will track the productivity of your employees or a team of people.

Macs: Hardly Malware-proof

Security firms and experts are finding out that since people tend to be more complacent security-wise when using a Mac, they make for pretty ripe pickings for unscrupulous online scammers, fraudsters, and thieves. Macs are famous for a lot of things – some true, some false. For instance, many people believe that Macs are virus- and malware-proof – but unfortunately that’s not true. Just because many of the malware and viruses out there are targeted toward the Windows OS, Macs are not impervious to attack as well. And the operative word is “targeted”. Security firms and experts are learning that since people tend to be more complacent security-wise when using a Mac, they make for pretty ripe pickings for unscrupulous online scammers, fraudsters, and thieves. Not only are more security flaws being discovered on the Mac OS and programs, but also more viruses are being created that specifically target those vulnerabilities. Of course, the scale of the threat can be debated – but while it is true that more viruses and malware are designed for Windows, it’s also true that some of these viruses can be applicable to Macs as well, in addition to those specifically designed to attack the Mac OS platforms. If you aren’t convinced, then this video might just turn you into a believer: https://www.youtube.com/watch?v=RTeSYmQS820&feature=player_embedded . Here, a Mac anti-virus program catches a would-be Trojan. And that’s just one of the many hundreds of thousands of Mac viruses and malware out there. Is it sound business practice to take risks with your system security? Whether you use Windows or Mac, you need malware protection – because too often all it takes is a single incident to bring your whole system on its knees. Give us a call and we’ll be happy to discuss your options with you and offer a tailor-made security solution that is guaranteed to keep you safe, regardless of which OS you’re using.

A Peek into the Windows Phone 7 OS

It’s sometimes difficult to choose which smartphone to get – not only because of hardware specs, but also the OS it uses. One new promising option worth trying out is Microsoft’s Windows Phone 7. A growing tech trend these days is the steady increase of smartphone use, as more and more people discover the value – both business and personal – of constant connection to the internet and the ability to remain productive even on the go. There are many options to choose from, and one very viable and promising smartphone platform/OS that’s making waves recently is the new Windows Phone 7 OS, released late last year. A successor of sorts to Microsoft’s Windows Mobile, WP7 has been rebuilt from the ground up and is packed with new features designed to make it perform at par (or better in some cases) than the competition. One major improvement in Windows Phone 7 is the new user interface, which is much more fluid and easy to navigate. It also allows for more customization and organization according to user preferences. Another plus for the platform is the generally faster performance, as well as the smooth response of the virtual keyboard. The WP7 OS will also be available in different smartphones, so you need not worry about it being locked to a single device. A downside of Windows Phone 7 is the lack of applications at this time, though this is largely due to the relative newness of the platform. However, reviews of Windows Phone 7 have been largely positive, and more apps are expected to become available as the platform gains steam in the market. So if you are in the market for a new smartphone, in addition to checking out the standard leaders such as iPhone, Blackberry, and the Google Android-based smartphones, you might want to consider giving the Windows Phone 7 a look as well.

Recognizing Phishing Messages

What’s phishing? How does it work? Keep yourself aware of basic phishing techniques and you might just save yourself from becoming yet another victim of these unscrupulous fraudsters. Online oracle Wikipedia defines phishing as: “the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.” We probably don’t need to tell you what kind of damage unscrupulous people can do with that kind of data in their hands. This is why it’s important to identify phishing messages from the get go and prevent becoming a victim. What makes a phishing message tick? How are they different from spam? What makes phishing different from spam is that phishing messages masquerade as official correspondence from a trusted source. While spam can be filtered, many phishing messages manage to bypass these filters precisely because they seem to be legitimate messages. They can be disguised as communication from your bank, your credit card company, or even from a large company such as Microsoft or Google, or social networking sites like Facebook, or MySpace. These messages come complete with official-sounding content and even logos stolen from the legit websites. The website links in the message, however, direct you to a fraudulent but official-looking website where you are asked to divulge personal information. You can check these links by simply hovering your mouse pointer over them – watch out for misspelled or faked / masked websites. Sometimes a telephone number is posted, and when called, you are asked for personal information. Remember, legitimate companies never ask for your password or similar data. Another identifying factor: phishers bait people with everything from ultimatums (such as a deadline or expiry date) to shocking statements (such as, “you’ve won a hundred thousand dollars!”). These kinds of phrases are designed to create a sense of urgency, making users fill out forms and click on links without fully considering the consequences. If you want to know more about phishing and how you can safeguard yourself against it, we’ll be happy to fill you in and discuss a customized security plan to keep you fully protected.