Saturday, September 6, 2014

Netiquette in Forwarding Invitations - Via Netiquette IQ



Netiquette in forwarding invitations


Considerable care and thought should always be given to forwarding invitations. Core etiquette and Netiquette principles maintain almost sacrosanct adherence to avoid misusing the privacy of communications. If a situation is presented where an invitee wishes to add someone to a private meeting, social event, or other gathering, there are a number of steps that should be taken:

1. Seek permission of the inviter (original sender).

2. Determine who should be on the distribution list.

3. Copy the original invitee.

4. Remove unnecessary threads, but keep confidentiality clauses and disclaimers.

5. Identify that this is a forwarded document.

6. Ask the recipient not to forward the document, or attach a legal notice, if necessary.
 

7. Never assume a sender will approve of forwarding correspondence.

8. Do not forward documents if under nondisclosure or confidentiality agreements.

9. Never add controversial, discriminatory, or derogatory comments

to the basic text.

10. Explain briefly and clearly to the recipient why the invitation is

being forwarded. One should be mindful that some people will be offended because they were not original invitees.
11. One may be selective in showing a full list of invitees, depending on any number of reasons, including size of the list, possible effect on attendance, specific instructions, or any number of other reasons.

Hello:
This meeting invitation is being forwarded to you with permission of (invitee). We both agreed you were inadvertently omitted from the initial list. Kindly excuse this oversight.
 
Sincerely,

Paul J. Babicki
Tabula Rosa Systems
609 8181802 office
609 462 8031 cell
www.tabularosa.net 
 ====================

+++++++++++++++++++++++++++++++++++++++++

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.

I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

Netiquette IQ Technical Term of The Day - NAT


From www.techterms.om
NAT
Stands for "Network Address Translation." NAT translates the IP addresses of computers in a local network to a single IP address. This address is often used by the router that connects the computers to the Internet. The router can be connected to a DSL modem, cable modem, T1 line, or even a dial-up modem. When other computers on the Internet attempt to access computers within the local network, they only see the IP address of the router. This adds an extra level of security, since the router can be configured as a firewall, only allowing authorized systems to access the computers within the network.
Once a system from outside the network has been allowed to access a computer within the network, the IP address is then translated from the router's address to the computer's unique address. The address is found in a "NAT table" that defines the internal IP addresses of computers on the network. The NAT table also defines the global address seen by computers outside the network. Even though each computer within the local network has a specific IP address, external systems can only see one IP address when connecting to any of the computers within the network.
To simplify, network address translation makes computers outside the local area network (LAN) see only one IP address, while computers within the network can see each system's unique address. While this aids in network security, it also limits the number of IP addresses needed by companies and organizations. Using NAT, even large companies with thousands of computers can use a single IP address for connecting to the Internet. Now that's efficient.
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================


Netiquette IQ Quote of The Day from Nelson Mandela

=========================================================

Education is the most powerful weapon which you can use to change the world.
Nelson Mandela
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================



Friday, September 5, 2014

Netiquette IQ Blog of The Day - The First Brain to Brain Communications Over The Internet! A Very Big Deal!



From PSYBLOG published 9/5/2014

Direct Brain-to-Brain Communication Demonstrated Over The Internet
Messages sent from India to France, directly from one human brain to another.
An international team of roboticists and neuroscigentists have demonstrated brain-to-brain communication between two people over the internet for the first time.
Professor Alvaro Pascual-Leone, of Harvard Medical School, explained the thinking behind the study:
“We wanted to find out if one could communicate directly between two people by reading out the brain activity from one person and injecting brain activity into the second person, and do so across great physical distances by leveraging existing communication pathways.”
“One such pathway is, of course, the internet, so our question became, ‘Could we develop an experiment that would bypass the talking or typing part of internet and establish direct brain-to-brain communication between subjects located far away from each other in India and France?’”
The scientists in France and Spain used EEG (electroencephalogram) and TMS (transcranial magnetic stimulation) technology (Grau et al., 2014).
The EEG allows you to read brain waves, so it can do the transmitting end; while the TMS allows you to ‘inject’ the message in the brain, so it can do the receiving end.
Here’s what the two people communicating with each other looked like:
On the left one person was sitting in India with an EEG headset on, which measured their brain waves.
The messages — which were ‘hola’ and ‘ciao’ — were encoded into binary and sent to the receiver in France.

On the right, TMS was used to stimulate the brain of the receiver with the binary message.
The person receiving the message ‘saw’ a series of flashes at the edge of their peripheral vision: this is the result of the magnetic stimulation of their visual cortex, which is located at the back of the brain.
The sequence of flashes allowed the receiver to decode the message.
Three different people sat under the TMS machine as receivers and successfully received the simple messages with only a 15% error rate.
Previous studies have demonstrated computer-to-brain communication over the internet, but this is the first to demonstrate human-to-human communication in this way.
Pascual-Leone continued:
“By using advanced precision neuro-technologies including wireless EEG and robotized TMS, we were able to directly and noninvasively transmit a thought from one person to another, without them having to speak or write.
This in itself is a remarkable step in human communication, but being able to do so across a distance of thousands of miles is a critically important proof-of-principle for the development of brain-to-brain communications.”
Image credit: Tim Sheerman-Chase & PLoS ONE
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================


Netiquette IQ Technical Term of The Day - Whaling Attacks

======================================
Whaling attacks from whatis.com


Whaling attacks are a sub-type of phishing attacks. According to the official WhatIs.com definition, "whaling is a type of fraud that targets high-profile end users such as C-level corporate executives, politicians and celebrities." Think of it like spear phishing against high-value, high-profile targets. Famous individuals including Paris Hilton were whaling victims before the term came to fruition. "Whales" are at increased risk due to the public nature of their personalities and lifestyles. Because there are additional risks to going after these targets, their service providers might also be targeted to get access to their clients' personal information.

If someone were to use pretexting to socially engineer a password reset for Paris Hilton's smartphone, the phisher could easily gain access again to whatever sensitive data she had saved on the device. Companies targeting whales as customers may want to keep these types of attacks in mind so they are not used to attack the whale itself.
   ============================================
 In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================

video