Category Archives: Other

A guide to Facebook privacy settings

Ghacks has published here a small but useful guide to basi security settings in Facebook.

Suggestions include the fact that “[…] , this menu is entirely customizable. If you do not want anyone who is not on your friends list to access any of your information then you can do this from here. If you don’t mind if friends of friends also have access to your profile then this is an option too. For example, if I wanted everyone to be able to see when my birthday is then I would first click on the ‘Customize Settings’ tab. From here, I would enable everyone to see my birthday. It is as simple as that. Let’s take a closer look at each of the different settings that you can edit when it comes to Facebook privacy. […]

First of all is the ‘Posts by me’ section. This will include any status updates that you write, any wall posts that you make, or any photos that you upload. Obviously, the most sensible thing to do here is to set this to ‘Friends only’. This is because you do not want people that you do not know getting access to things that you have said, or your personal information or images.
The ‘Bio and Favourite Quotations’ section is up to you whether or not you would like to make this section private. However, it is important to remember that you may be putting private information about yourself in the Bio section which others will be able to see if you do allow this section to be public rather than private. The ‘Family and Relationships’ section is another one that is best kept private. The reason for this is because if you allow this information to be public then everyone can see members of your family which not everyone would be comfortable with. Of course, it is up to you, but it is best to be on the safe side. The rest of the information in this section of the privacy settings would usually be better if it were set to ‘Friends Only’, because it is all personal information. […]”

I think the guide is useful despite the fact that this brain confusing level of security that is implemented by Facebook for me is still unreliable and difficult to understand by average user.

This post as a comment also here.


Protecting yourself from radiations

Wikihow has published a good guide to teach more useful ways to protect yourself from radiations  (full article here).

In this times of nuclear fear, worth a read.


Getting access to Google Body

Google body is to anatomy what Google earth is to geography.

To get access you need to go to browser site (here).

You will need to have a WebGl enabled browser.

This is the kind of applications that should be written: fast, detailed, open and educationals.

 


Windows live messenger features

Ryan Dube at makeuseof.com shows us some useful WLM features :

“[…] Integration with every IM […] You can import contacts from all of your top social networks and email systems like Facebook, LinkedIn, Outlook, AOL Mail and even your Gmail account. […] Once you open up a chat with one of your online contacts, at any point during the chat, you can send over a file by clicking on “Files” and “Send a file or photo…” […] How to enable WLM for mobile […] Voice clipping and other […]” (full article here)

I’m not a big fan of Windows live Messsenger, but in some way can help you working better


Aiim social roadmap white paper

Aiim (site here), for over 60 years, AIIM has been the leading non-profit organization focused on helping users to understand the challenges associated with managing documents, content, records, and business processes.

Now among other interesting articles, Aiim proposed a”[…] roadmap [that] is a tool to help organizations effectively develop social business processes and to help identify and address potential issues before they become real problems. […] The social business roadmap consists of eight primary steps. Each step is briefly described here and is addressed in substantially more detail over the course of the document. Links to the eight steps take you to our wiki, where we discuss the “what’s next”, case studies, and your additional thoughts and feedback. […]

Main steps are

 

  • Emergence. In this step the organization is not using social technologies in any formal or organized way. Instead, individuals or small groups within the organization are experimenting with social technologies to determine whether there is business value to them.
  • Strategy. Once the organization begins to develop experience with social technologies and has identified potential business value from their use, it is important to create a framework that identifies how it expects to use these technologies, and the goals and objectives for their use.
  • Development. With the strategy in place, the organization can make informed decisions about what tools to implement, how to implement them, where to implement them, and how they will potentially scale more broadly within the organization.
  • Monitoring. Initially the organization should spend time monitoring and listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are. This is perhaps more visible in externally focused processes but is important for internal ones as well.
  • Participation. Once the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.
  • Engagement. The goal is for participation to move to engagement – from speaking at or to customers to engaging with them. This means creating processes to respond to issues, both internally and externally, and ensuring that communications are clear, accurate, and authentic.
  • Governance. This step describes the process for developing an effective governance framework for social business processes. Some of the steps are specific to certain tools or capabilities, while others are more broadly applicable, such as an acceptable usage policy.
  • Optimization. Once social business processes are in place, they should be actively managed and reviewed to ensure that the organization is realizing the expected benefits. This includes but is not limited to monitoring the tools in real time, identifying and measuring specific metrics, and training users on new or evolving tools and processes.
  • […]” (full article here, direct download link for white paper here)

    In a complex contest like the one of “going social” I think that a rationalization effort is really important also to avoid smaller organizations getting lost into fuzzy and fancy words.

     

     


    When talking is wrong

    Tina at Make use of writes an article on 8 predictions that were “a little bit” wrong 🙂 (full article here).

    My favourite one is from Bill Gates in 1987 :”I believe OS/2 is destined to be the most important operating system, and possibly program, of all time” lol.

    This post as a comment also here


    Aliens everywhere

    There’s a lot of talk in this days on aliens, Xfiles, disclosures,…

    Evan Ackerman at Dvice reports that “[…] a paper on […] website by NASA astrobiologist Dr. Richard B. Hoover that showcases a variety of microscopic fossilized structures from inside meteorites that are possibly the remains of extraterrestrial bacteria. Aliens, for real. […] ” (Full story here, original article in Journal of cosmology, here , Jack Loftus at Gizmodo here).

    I’m quite convinced that somewhere in the universe there are living entities, I have imagined them in different ways for years.

    I know that on a scientific POV they are likely to be like this one, but, on a more idealistic POV I hoped for something different 🙂 .

    But at least this EBE managed to get here….

    This is the picture

    This post as a comment also at http://dvice.com/archives/2011/03/nasa-researcher.php and at Gizmodo


    Using iTunes Home share feature

    Kelly Clay at Lockergnome (http://www.twitter.com/kellyhclay) wrote a good tutorial on how to use Apple Home Share feature. Simply “[…]

    1. Open iTunes on one computer connected to your home network.
    2. Select Home Sharing from the sidebar of iTunes.
    3. Enter your iTunes account information.
    4. Authorize this computer, if not authorized yet.
    5. Repeat steps 1-4 on each additional computer of the home network. Keep in mind you can only authorize 5 computers for each iTunes account, so you may want to set up your kids or leeching roommates with their own accounts, or create a new iTunes account

    […]” (full article at http://www.lockergnome.com/windows/2011/03/04/how-to-use-itunes-home-sharing-at-home-or-work/).

    Please remember you can authorize at most 5 computers.


    Steve’s way

    At Arcamax (http://www.arcamax.com/businessnews/s-845606-464627?source=1930) report that Steve Jobs has been welcomed with a standing ovation at iPad 2 event.I don’t believe that Steve Jobs is someone so dedicated to work that he needs to be present just because is part of his work.Nor I think that Steve is so attached to money to be tehre just because otherwise his company will loose money.What he said is something like “we worked so much for this that I wanted to be here”. And this despite his health.Is something near to natural leadership and is made of a well blended mix between being attached to work, believe in what you do and of course, a little bit of “being at the crenter of spotlight”.I don’t like some things in Apple way, but this appearence is something other companies should be scared of, because of the embedded implications it has, ranging from motivation to money matters.
    This post as a comment also at http://www.arcamax.com/businessnews/s-845606-464627#posts


    Mobile traffic to increase 26x by 2015 but will infrastructures support it?

    Matthew Lasar at Ars technica (http://arstechnica.com/author/matthew-lasar/) reports some figures by Cisco Global Mobile Data Traffic Forecast (source here).

    Here are the highlights:'[…]

    • There will be 788 million mobile-only Internet users by 2015.
    • Global mobile data traffic will increase by a factor of 26 by 2015.
    • World mobile data grew by a factor of 2.6 in 2010 from 2009.
    • Average smartphone usage doubled: 79 MB per month, up from 35 MB per month in 2009.
    • Android operating system data use is rapidly catching up to the iPhone.
    • In 2010 almost a third of smartphone traffic was offloaded onto fixed networks via dual-mode or Femtocells.
    • Millions of people around the world have cell phones but no electricity, and by 2015 a majority in the Middle East and Southeast Asia will live “off-grid, on-net.”

    […]” (full article at http://arstechnica.com/tech-policy/news/2011/03/world-mobile-data-traffic-to-explode-by-factor-of-26-by-2015.ars)

    I think that supporting such an expansion is also a challenge of network support, that, in most cases is running at nearly full capacity.

    I’m not confident that in 4 years we can build and reinforce networks more than was done in last 10 years.

    The other fact that is really worrying is that nearly 1/3 of world population will live “on net and off grid”. This is a radical shift, because moves mobile access to primary needs, and I think that accessing the net is important, but not vital nor for development, nor for surviving.

    This post as a comment also at http://arstechnica.com/tech-policy/news/2011/03/world-mobile-data-traffic-to-explode-by-factor-of-26-by-2015.ars?comments=1&p=21385440#comment-21385440

     


    %d bloggers like this: