Saturday, November 8, 2014

Netiquette IQ Blog Of The Day - Another Sign Of The Demise Of Internet Privacy

Every day we read about new events such as spying, theft and sabotage on the Internet. It is hard to find anyone who believes significant privacy exists any longer. The following is still yet another twist to the mounting incidents of degradation. This particular situation has a very conflicting tone where a site does spy on people so it can inform them of their security weaknesses - all without permission. Please make your own judgement if you care to have these types of companies around.
=========================================
Is Internet Privacy Dead? This Creepy Website Could Be Streaming Footage Of You
Internet privacy could be a thing of the past, as revealed by a website which streams live footage from thousands of sources. This website, Insecam, could be watching you as well and you wouldn’t even know it.

The NSA could be secretly collecting your personal information without you knowing it, but this isn’t the NSA exploiting a weakness in your webcam security. Insecam is attempting to make a point of simply collecting data from non-secured cameras around the world to show us how important passwords are.

With the release of the Xbox One, fears escalated over how much we are being watched when Microsoft announced the latest Kinect. This was a high-tech camera with the ability to determine who is in front of it so nobody else can log in to your account. The fears of internet privacy came along when we realized it had to be on all the time.
Ubisoft’s release of the game Watch Dogs capitalized on the idea that anything can be hacked, by giving you a playable character who could do just that.

It seems that Ubisoft wasn’t far off when it came to camera hacking. Insecam has been discovered streaming footage from over 73,000 cameras around the world, including 11,000 in the U.S. alone.

The site claims to be making a statement about webcams, and the fact that so many owners fail to change their default passwords. It gives you a link to the vast number of cameras it has access to, along with serial numbers, passwords, and even where they can be located. The location is given as latitude and longitude coordinates you can check on Google Maps.
If you happen to find your own home being watched on Insecam, the site claims the solution is simple. Change your camera’s password and you’ll no longer be the potential victim of failed internet privacy as strangers around the world watch you without your knowledge.
 ===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
========================================== 

Netiquette Images

The following are Netiquette IQ images to look for:








Netiquette IQ Quotation of The Day - Process Excellence In Email

"Excellence is a continuous process and not an accident."
A. P. J. Abdul Kalam
 ===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
========================================== 

Friday, November 7, 2014

Netiquette Basic Standards - A Composite Checklist To Use Before You Send An Email



Checklist for an email – a set of standards for your NIQ process

1)    Enter recipients (sometimes you may wish to do this last). 
A.    Any “reply all” names not necessary?
B.    Any “reply all” recipient not included?
2)    Subject field
A.    Is the description still relevant?
B.    Check for capitalization, punctuation.
C.   Check for spam triggers
D.   Are there between three to nine words?
E.    Are any connections, referrals or common elements mentioned?
3)    Attachments
A.    Insert attachments.  Some senders do this before entering the recipient.
B.    Are attachments properly named?
C.   How many attachments are there?
D.   What size are they?
E.    Are attachments in a common format?
4)    Salutation
A.    Is the title (if used) appropriate?
B.    Check spelling!
C.   Are there nicknames?  If so, make sure they are acceptable to the recipient.  Do not assume this is the case.
5)    Preview window
A.    Are some keywords visible?
B.    Does the document have a good crisp appearance?
C.   Are there any attention generating items?
6)    First paragraph
A.    Is the purpose of the message stated right away?
B.    Does the stated purpose match the subject line?
C.   Use power words.
D.   Avoid all idioms, clichés and slang.
7)    Body of text
A.    Are paragraphs overly long (eight or more sentences)?
B.    Are most paragraphs too short (one to three sentences)?
C.   Do sentences flow well if you change topics?
D.   Use power words.
8)    Review
A.    Does your email achieve the promise of the subject line?
B.    Have you tested all links?
9)    Closing
A.    Is your closing too informal?
B.    Does your closing convey anything negative?
C.   Are you lacking a closing?
10)   Signature
A.    Is there full contact information?
B.    Is the signature free of messages, slogans and unnecessary graphics?
 ===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
========================================== 


Netiquette Quotation of The Day - The Great Effect That Even The Small Words Can Bring

 My blog of 11/6/14 spoke to contemporary words which are often used but should not be used in business. These can be extremely damaging. And so, the quotation below is quite wise and savvy!
 ==================================
 “Because even the smallest of words can be the ones to hurt you, or save you.”
Natsuki Takaya
 ===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
========================================== 

Thursday, November 6, 2014

Netiquette Core Words Not to Use in Business -Via Netiquette IQ

Childish words to never use in a business or employment email


        I have often written, in both my first book, "Netiquette IQ A Comprehensive Guide to Improve, Enhance and Add Power to Your Email", and my blog about simplicity in writing. When sending to someone whose primary language in not English, I have suggested that you write the equivalent of emails to a teenager.

        As simple as this sounds do not carry this process too far!  The following words or categories can ruin any business email even a foreign one.  Here is a list:
====================================================

1.           Cool

2.           Super

3.           My bad

4.           No worries

5.           Awesome

6.           Nitpick

7.           Feels

8.           Stupid

9.           Most slang

10.        Most clichés

11.        Gross

12.        Weird

13.        Silly

14.        Dumb

15.        Lucky

16.        Pick

17.        Psyched

18.        No problem

19.        Any emotion

20.        Contractions

21.        Hot
===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:
 www.amazon.com/author/paulbabicki
 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
========================================== 

Netiquette IQ Technical Term of The Day - Virtual Memory Balooning



Virtual Memory Ballooning
Margaret Rouse
WhatIs.com
Virtual memory ballooning allows a physical host to recapture unused memory on its guest virtual machines and allocate the resource where needed. Improve efficiency 
Virtual memory ballooning is a computer memory reclamation technique used by a hypervisor to allow the physical host system to retrieve unused memory from certain guest virtual machines (VMs) and share it with others. Memory ballooning allows the total amount of RAM required by guest VMs to exceed the amount of physical RAM available on the host. When the host system runs low on physical RAM resources, memory ballooning allocates it selectively to VMs.
If a VM only uses a portion of the memory that it was allocated, the ballooning technique makes it available for the host to use. For example, if all the VMs on a host are allocated 8 GB of memory, some of the VMs will only use half the allotted share. Meanwhile, one VM might need 12 GB of memory for an intensive process. Memory ballooning allows the host to borrow that unused memory and allocate it to the VMs with higher memory demand.  
The guest operating system runs inside the VM, which is allocated a portion of memory. Therefore, the guest OS is unaware of the total memory available. Memory ballooning makes the guest operating system aware of the host's memory shortage.
Virtualization providers such as VMware enable memory ballooning. VMware memory ballooning, Microsoft Hyper-V dynamic memory, and the open source KVM balloon process are similar in concept. The host uses balloon drivers running on the VMs to determine how much memory it can take back from an under-utilizing VM. Balloon drivers must be installed on any VM that participates in the memory ballooning technique.
Balloon drivers get the target balloon size from the hypervisor and then inflate by allocating the proper number of guest physical pages within the VM. This process is known as inflating the balloon; the process of releasing the available pages is known as deflating the balloon. 
VM memory ballooning can create performance problems. When a balloon driver inflates to the point where the VM no longer has enough memory to run its processes within itself, it starts using another VM memory technique known as memory swapping. This will slow down the VM, depending upon the amount of memory to recoup and/or the quality of the storage IOPS delivered to it.
===============================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki


 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.

==========================================