Friday, July 13, 2007

Mac desktops are 'smarter money,' says CIO














Property asset management company Capital & Regional is
evaluating Linux desktops and Apple Macs as a way to reduce its
dependency on Microsoft.

While the U.K. company has about
700 PC users and currently runs Windows XP Pro and Office XP Pro, Chief
Information Officer Richard Snooks has criticized Microsoft's
aggressive licensing policies.

"We are feeling the pinch of the aggressive revenue targets
of Microsoft," Snooks said. "We are asking ourselves, 'Are they
(Microsoft) fit for our business?'"

In particular, Snooks isn't convinced by the arguments for
upgrading to Microsoft's latest Windows operating system, Vista, and is
actively looking at alternatives, including a small trial of a Suse
Linux desktop inside the IT department.

"I feel we are being railroaded, and the market generally
forced (us) into a corner or even a cul-de-sac. In a free market, we
have made Microsoft dominant, and now we have the collective
responsibility to reverse this situation to re-establish balance and
competition. If I am being driven down the Vista route, then an Apple Mac is smarter money and cheaper."





Snooks said the browser-based ATMs at Capital & Regional's shopping
outlets could potentially run on Suse Linux with a Firefox browser,
while Apple Macs may be a better alternative to Windows PCs.


A Microsoft representative said the company offers a range of licensing
agreements for different business needs and cited security and energy
efficiency as benefits of moving to Vista.

"Vista is the most secure, reliable and flexible OS
available from Microsoft, and is easy and cost-effective to deploy and
maintain," she said. "The reduced complexity facilitates maintenance
and support, which allows IT management time to be deployed more
effectively elsewhere, and the in-depth security ensures protection of
sensitive data at all times."


Andy McCue of Silicon.com reported from London.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

InfiniBand backer files for IPO















InfiniBand is going public.


Voltaire, which sells networking equipment and software for the high-speed communication technology, filed plans
Tuesday with the Securities and Exchange Commission to hold an initial
public offering of its stock. The company, based in Herzeliya, Israel,
and Billerica, Mass., said it hopes to raise $67.5 million.


Several major companies, including Intel and IBM, once
envisioned InfiniBand as a general-purpose server communication
technology, but instead it has found its main niche linking numerous
servers together into high-performance technical computing clusters.
But InfiniBand has stayed a step ahead of other technologies, such as
the ubiquitous Ethernet and the storage-specific Fibre Channel, and
backers still hope to see it used for general business computing.








InfiniBand hasn't been a recipe for stand-alone success among start-ups. QLogic acquired one InfiniBand specialist, PathScale, and Cisco Systems acquired another, TopSpin Communications. Voltaire itself has diversified; its InfiniBand switches also have high-speed 10-gigabit-per-second Ethernet abilities.



Voltaire had revenue of $30.4 million in 2006 and $8.6 million in the
first quarter of 2007, the company said in the filing. For those
periods, it reported a net loss to shareholders of $13 million and $4.2
million, respectively.


The company plans to sell 5.77 million shares at a price
between $12 and $14 per share. In addition, other Voltaire shareholders
are selling 1.92 million shares in the offering. As many as 865,462
shares from Voltaire and 288,488 shares from the other shareholders
also can be sold to cover overallotments, the company said.

The target of $67.5 million raised via the stock offering
comes from a value of $13 per share and accounts for expenses and
discounts to the IPO underwriters, the company said.



The company plans to trade under the ticker "VOLT" on the Nasdaq market.








--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Don't be so quick to click that Web page
















What
a world. First worms and viruses, then phishing schemes. But now,
cautions Trend Micro Chief Technology Officer Raimund Genes, your
online life may get that much hairier.


Welcome to the brave new world of booby-trapped Web pages. If Trend Micro's predictions hold up, more cyberattacks will originate from the Web than they do from e-mail.


That shift is expected to take place sometime next year, according to
Genes. CNET News.com caught up with Genes to find out how he sees the
battle lines shifting.



Q: At the Gartner IT conference earlier this year, you talked about how Web threats are going to outdo or surpass e-mail threats. Can you flesh that out a bit? What do you mean by a Web threat?

Genes: Yes. A Web threat is something which uses the Internet to
execute malicious activity. So, for example, even something which
arrives via e-mail, if it can't survive without additional downloads
from the Internet, it still constitutes a Web threat. It might be an
e-mail containing a URL, but all the rest works via the Internet.



If an e-mail contains the URL, does it qualify as a Web threat or is it still an e-mail threat, according to your definition?


Genes: It's a Web threat because everything which needs the Internet to
execute a malicious activity is a Web threat. What we are also seeing
among enterprise users, with pretty tight security on e-mail, is that
the main infection vector is actually over the Web. They do a good job
in e-mail filtering, but a bad or no job at all when it comes to Web
filtering.




Is that the only reason that Web threats are becoming bigger?


Genes: No, it's also because it's more attractive for the bad guys. If
Webmasters are careless, then you have a perfect infection scene. You
have a silent killer and you don't have the e-mail evidence to trace it
back to the initial infection scene. It's perfect for espionage and all
kinds of stuff.





Are these Web threats targeted at a particular audience or are they pretty much trying to get whoever they can get?


Genes: Overall, they try to get anyone they can because it's mainly to
plant a bot or to hijack a computer. Let's face it: everybody is a
consumer somehow--especially the enterprise users who use a notebook at
home.



How do you defend yourself?
Genes: You
could outsource e-mail security. But with Web security, it's more
difficult. You're talking about massive investments from the hosting
sites to do this at an acceptable speed via an external proxy. I
haven't seen this model really working. There are some start-ups
offering this, but I wonder how much money they lose every month.






What can consumers do to guard or protect themselves?

Genes: They could do a lot. They regularly have to patch the operating
system and the browser. No. 2: They should use alternative browsers.
They shouldn't use widespread browsers like Internet Explorer. This
doesn't mean that Firefox does not have vulnerabilities, but most of
the Web threats we are seeing are connected to having Internet
Explorer. By moving to an alternative browser, you already do a kind of
risk mitigation.




You're not saying the solution is to install some kind of security software?


Genes: No. Of course installing security is, for me, baseline. It's
like patching an operating system. But look: We could come out and say
we will be able to protect all our users. But we never will be able to
offer 100 percent protection. Nobody can.



What happens with typical Web threats? What do these things do to your computer or what do they attempt to do?


Genes: They attempt to convert your computer into a bot. It could be a
spambot or it could be a distributed denial-of-service attack bot. It
could be a key logger, an information stealer. It tries to use your
computer power.

Most of the bots we see are really to create spam on the
infected machines. They also attempt to use them for distributed
denial-of-service attacks, to hold people ransom and to attack them
with a lot of computers. The third thing they try is, of course, to
function as an information stealer. It is trained to recognize the
format of your credit card while you type in the number or while you do
your online purchases. It will look for certain keywords and documents.




You talked about using a different browser or
using a virtual machine. Should corporations do the same things or are
there different things you recommend?

Genes: No. Based on user behavior this will just be
difficult to enforce. And of course, there's a loss of productivity.
Some companies are pretty radical about what they're using...and they
strictly define what is allowed within a corporate environment. For
instance, whether (instant messaging) is allowed or if peer-to-peer
networking is allowed.

In a corporate environment this could be
company-threatening. Maybe the malware hasn't been targeted to actually
attack the company. But guess what happens when the attacker sees a lot
of documents or a lot of stuff that's confidential? He will try to sell
it.











What's the breakdown between e-mail threats versus the Web threat definition?


Genes: There is an increase in Web threats compared with normal
worms...the number of worms has increased by 22 percent since
first-quarter 2005, while Web threats have increased by 540 percent.


Would you call this a new era of threats or is there no such big word needed to describe Web threats?


Genes: I wouldn't call it a new era, it's just logical. Nowadays, the
bad guys try to make money out of it. To make money they have to
control something as long as possible. And they have to update it
because the bot, after a certain amount of activity, gets outdated in
about a week.





--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

'Rock Band,' 'Halo 3' and Disney movies on Xbox 360

Microsoft announces big titles at E3
From E3 in Santa
Monica, Calif.: Microsoft shows off 'Rock Band,' 'Halo 3,' Disney
movies available in the Xbox Marketplace and more.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Microsoft's 'Cloud OS' takes shape














DENVER--Microsoft is in the early stages of a plan that will see
virtually its entire lineup of underlying Internet services opened up
to developers, the software maker made clear this week.



In addition to making available its existing services, such as mail and
instant messaging, Microsoft also will create core infrastructure
services, such as storage and alerts, that developers can build on top
of. It's a set of capabilities that have been referred to as a "Cloud OS," though it's not a term Microsoft likes to use publicly.


"Cloud-centric is probably a better way to say it because Cloud OS
makes it sound like it is only running on the cloud," said Brian Hall,
general manager of Windows Live. "A lot of the data, a lot of the apps,
a lot of the interesting things are on the edge. They are on the PCs.
They are on the Xboxes. They are on the phones."

But, quibbles over nomenclature aside, Microsoft made clear
this week that it aims to play the same role on the Internet that it
plays today on the desktop--that of providing its own applications as
well as the underlying plumbing and tools that developers use to build
their products.


In a speech to partners at its Worldwide Partner Conference here, Microsoft Chief Executive Steve Ballmer promised that the company would be talking to developers later this year
about the first version of its developer platform, some pieces of which
are currently available in beta form. Hall echoed the message that
Microsoft plans to open up much of the technology that powers Windows
Live as well as the underlying infrastructure.


"What's ours is yours," Hall told the crowd.

The
ambitious promise comes more than a year and a half after Bill Gates
first announced the company's plans for Windows Live at a November 2005
event in San Francisco. Since then Chief Software Architect Ray Ozzie
and a team have been working on turning Microsoft's Internet business
from a series of separate services offered directly by Microsoft into a
set of more unified services that can be offered either by Microsoft
directly or through partners.


At this year's Mix '07 show,
Ozzie, who has been crafting the Live strategy, did talk about allowing
programmers access to some of its higher-level services, such as
Windows Live Spaces. But he was largely silent on the topic of the
underlying developer platform.

"I've nothing to announce in that realm at this time," Ozzie
told CNET News.com in an interview then. "Yet, it's pretty clear that
we're working on some stuff."


Late last month, Microsoft introduced two new Windows Live Services,
one for sharing photos and the other for all types of files. While
those services are being offered directly by Microsoft today, they
represent the kinds of things that Microsoft is now promising will be
also made available to developers.

Among the other application and infrastructure components,
Microsoft plans to open are its systems for alerts, contact management,
communications (mail and messenger) and authentication.

"Windows Live is here as a platform for our partners," Hall
said. That's not exactly the case--yet. Microsoft has made a couple of
pieces, such as its Virtual Earth service, available commercially.
Other components are available either for broad or limited testing,
while still others have yet to be offered to developers. Instant
messaging, for example, will be made broadly available to developers in
test form in October.


'A real computer science challenge'
One of the
key challenges Microsoft faces is trying to write tools that allow
developers to code in such a way that it doesn't necessarily matter if
it is a phone or a PC that is accessing the service, or whether a file
is stored locally or in the cloud.

"There's a real computer science challenge for abstracting
all of that well, abstracting how do you find and manage devices, how
do you access devices and do it in a way that is transparent to the
developer," Hall said.


Hall likens it to Windows in its early days.

"A
lot of what Windows was doing early on was memory management, storage,
all of the things today we take for granted," Hall said. "The vast
majority of developers (today), they are not thinking, 'how am I going
to store this particular piece of data in memory?' It just happens. The
same thing is going to happen in the mesh model."

Microsoft is also trying to make sure that its business
terms are attractive enough to woo the next MySpace or YouTube to bet
on its technology. It has spent months talking to existing partners,
but also to venture capital firms and start-ups.

For now, Microsoft is offering up many of its services free
for up to 1 million users, while saying it wants to strike some kind of
deal if a service exceeds that threshold.

"If this becomes a big, big commercial success we want to
have a value exchange, but we'll give you plenty of ramp room," Hall
said.




As it
works to build out the underlying core services, Microsoft is also
offering up applications to partners, such as Windows Live Hotmail,
Windows Live Messenger and the Spaces blogging tool.

Until now, most of the deals have been one-off deals that
the company has had to individually negotiate. Among Microsoft's early
deals are a few colleges and universities, such as the University of
Pennsylvania, as well as some telecommunications firms. On Wednesday,
Microsoft announced a deal with Qwest, which will offer its Internet
subscribers the option of using a Qwest-branded version of Microsoft's
Windows Live services.


"It was a much more custom engagement model," Hall said. "Now we are moving to a scalable come one, come all approach."


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Nokia seen gaining from Motorola woes


Market share of the world's top cell phone maker Nokia is rising,
industry analysts said, after its closest rival Motorola warned
investors of a second-quarter loss and lower sales.



Analysts said U.S.-based Motorola had lost market share,
much of it probably to Nokia, which sells more than one in three cell
phones in the world, news that lifted the Finnish firm's shares.



Nokia was up 1.2 percent at 21.21 euros by 08:27 GMT, against a DJ Stoxx technology index up just 0.2 percent.


"With Motorola losing market share in several regions--Europe and
Asia--I think the biggest beneficiary is Nokia," FIM Securities analyst
Jussi Hyoty said.

"Nokia has a very strong product mix from the bottom to the
top. This is a good chance to put distance between it and the number
two and increase scale benefits."

Motorola said on Wednesday it no longer expected its cell
phone business to be profitable this year, blaming weak sales in Asia
and Europe.

"Motorola lost a lot of share," Charter Equity Research
analyst Ed Snyder told Reuters, after the company warned investors on
profits and rival Sony Ericsson released its second-quarter results.



"A little bit went to Sony Ericsson. A lot went to somebody else, probably Nokia."


Analysts said earlier this month they expected surging cell phone
demand from emerging markets to have cemented Nokia's leading position
in the April to June quarter.







Motorola said it shipped 35 million to 36 million handsets in the
quarter, down from 45.4 million in the first three months, which could
see third-place cell phone maker Samsung Electronics knock Motorola
from its No. 2 ranking.



Before Motorola's profit warning, Nokia was forecast to have sold around 100 million handsets in the quarter.


"Motorola's market share is coming down strongly and it could
continue...As it comes down, Nokia benefits directly from the vacuum in
the market left by Motorola," Danske Markets analyst Ilkka Rauvola
said.

"Sony Ericsson said competition has tightened and I think
this is due to Nokia having ramped up its midrange and high-end
products," Danske's Rauvola said.


Shares in Samsung rose on Thursday on expectations ahead of its second-quarter results announcement on Friday.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

New and improved PSP

Hear what's new with the PSP
From E3 2007: Sony unveils the new and improved PSP, complete with video out to your home television.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Java flaw poses widespread security threat

Google's security team has discovered vulnerabilities in the Sun Java Runtime Environment that threaten the security of all platforms, browsers and even mobile devices.

"This is as bad as it gets," said Chris Gatford, a security expert from penetration testing firm Pure Hacking.

"It's a pretty significant weakness, which will have a considerable impact if the exploit codes come to fruition quickly. It could affect a lot of organizations and users," Gatford told ZDNet Australia.

Australia's Computer Emergency Response Team analyst, Robert Lowe, warned that anyone using the Java Runtime Environment or Java Development Kit is at risk.

"Delivery of exploits in this manner is attractive to attackers because even though the browser may be fully patched, some people neglect to also patch programs invoked by browsers to render specific types of content," said Lowe.

According to Gatford, the bugs threaten pretty much every modern device. "Java runs on everything: (mobile) phones, PDAs and PCs. This is the problem when you have a vulnerability in something so modular--it affects so many different devices."

"Also, this exploit is browser-independent, as long as it invokes a vulnerable Java Runtime Environment," Gatford added.

Pure Hacking's Gatford said the problem is compounded by the fact that organizations are unlikely to take on the daunting process of patching all of their Java Runtime vulnerabilities.

"It would be an extremely difficult and laborious process for an organization trying to patch Java Runtime across the enterprise," he said.

Liam Tung of ZDNet AUStralia reported from Sydney.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Blog Tagging. What's This New Game All About? by Lance Dwayne Ronald Brown

In addition to writing articles and participating in forums it seems
I have stumbled on to this fun new way of generating back links to your
site. I don't know who came up with this or who started this game but
it seems to me the possiblities are endless. I thought I should write
an article about it.
The game is called "blog tagging." Here is how you play the game:


You find 5 blogs of similar interest or content as yours and then post
a comment to them saying " you have been tagged " with a link back to
your site. Getting response shouldn't be hard as people like games if
there is something in it for them. At your site you have an explanation
something along these lines:


Blog Tagging. What's It All About?


Ok. Maria did this tagging thing with me. She doesn't know either who
started the game, but it's a fun and creative way to get links back to
your blog. If you get tagged, expect to write a post giving your
reasons for blogging, include a link back to the person who tagged you,
then tag 5 other bloggers. Personally I blog to get readers to my site
and to build friendships. I hope you respond to this tag game.


You'll notice above I mentioned the person who introduced me to the
game. Mentioning their name adds a nice personal touch. You must
hyperlink this person's blog in the text of your explanation. This is
easily done in the back office of your blog where you edit your posts.
When you write the post you will need to click on compose and then
highlight the words you want to hyperlink. In this case it is the name
Maria I highlight. Another box will come up where you put in their blog
link to their site. Presto! You have followed the rules and finished
your explanation of the game.


If you do the math on this you will have a least 25 links to your site
for every 5 people you tag. Imagine what would happen if you tagged 2
or 3 people a week for a year. That's right. Hundreds of back links to
your site which the search engines will pick up on where people will be
able to find your site.


It occurs to me one can change the topic of the game too. Instead of it
being why you blog it could be " lessons you have learned on the
internet " or " favorite hobbies " or " celebrities I don't like "
or...well you get my drift. Whatever gets people to respond to your
tag. You are limited only by your imagination here.


As anything else you will have to spend a little time checking out
other blogs and finding people with similar blog topics as yours. I
don't need to mention blog traffic exchanges but just in case you don't
know about them blogsoldiers is a good place to start. There are many
others though. Spend some time with Blogger or Wordpress reading other
blogs. It's all about community isn't it?


I did a little research on the internet to see if anyone had written an
article about this game. I couldn't find much. It may be absolutely new
and fresh. Or it may be I am behind the times and this has been around
for awhile. I do expect people will see the benefit of this game and
run with it. We'll probably start to see a rash of blog tagging topics.
You may want to start your own tag game now. You can use me and my blog
as the person who referred you if you want. Much appreciated if you do.
I think it is best to keep the game simple and easy to duplicate. Happy
blog tagging. I invite your comments and opinions on this topic.

About the Author


Great help with your home business
http://ezmakedollars.blogspot.com
Free article writing teleseminars
http://www.myarticleexpert.com


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Tracking AdSense Ads In Blogger by Ad Tracker

You have permission to publish this article electronically or in print, free of charge, as long as the bylines are included and entire footer remains intact. A courtesy copy of your publication would be appreciated.

Author: Ad Tracker Email: ad.money.today@gmail.com

Begin Article ===================================================================

Tracking AdSense Ads In Blogger

I recently decided to do some serious research on tracking software for my Google AdSense program and was a little bit surprised with the results.

There are several nice looking products out there, some of which are available for free as open source programs while others are for sale with a free trial or a money back guaranty. A simple Google search for "adsense tracking software" will keep you busy for hours.

There is, however, a problem with all of these options if you are one of the many bloggers hosting your Google AdSense ads on blogger.com or any of the other free blog hosts. You will find that all third party software programs require files to be loaded on the server. This issue alone excludes them from use on your free blog.

For those bloggers using a free platform, the question becomes, "How do I track my AdSense ads?". Rest easy dear friends. There is a solution. Granted, it's not as slick or simple as one of those cool self contained programs, and this method will not produce quite as much data, but it is free and it will work and it's not overly complicated.

The first thing you have to do is take advantage of the channels option when you set up your ad designs. It is a very simple process to complete. After you have chosen the size and colors of the add block, you will be asked to "Choose Ad Channels". Click "add new channel" and enter a name for this new channel. I prefer to use a name that describes the ad or referral link, such as "Top Banner", "Right Wide Tower", "FF Referral", etc. This way I can easily recognize each ad block or referral in my reports and gauge it's performance. If you have multiple sites, be sure to include a site prefix in each name. ("Dogs Right Link Box", Cats Left Referral Button") For proper tracking, it is necessary to go through this process for each ad unit, link box, referral button, or text link.

Next go to Google Analytics. Get your account set up, then install the javascript code into your template and wait for the system to start gathering information. This process takes overnight because the Google Analytics system collects and compiles it's data every 24 hours. When this data starts to flow you will have plenty to look at for a while until you decide exactly what is important to you. You can dissect this information any number of ways including the all important "Keywords" category and you can set up the system to report multiple websites.

I also like to set up an account for each site over at Sitemeter.com. One benefit to having the sitemeter account is that it reports in real time instead of having to wait until the next day for your hit count.

Now you have the ability to see exactly which ad units and referral links are performing and which are not by checking your AdSense report with channels. You can monitor the flow of traffic through your site(s) including the referring URL, keywords used, and tons more through Google Analytics. You have a source for real time hit data with sitemeter. All of which was free.

With these three tools in place you should be able to generate all of the data you need to manage a successful Google Adsense experience.

About the Author

Ad Tracker is the author of the AdSense Tracker Blog, a community experiment with Google AdSense where she does all of the work and everyone receives the experience. Email Ad Tracker at here.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Major Search Engine Submission by Rose DesRochers

Bloggers often ask how to get their blog listed in the major search engines.


Here's how:


1. Submit Directly: Submit your blog via Google's free submitting form. http://www.google.com/addurl/?continue=/addurl


2. Submit your sitemap to Google. http://www.google.com/webmasters/sitemaps/


3. Submit your site to DMOZ, the Open Directory Project. Keep in mind
that DMOZ is run by volunteers; therefore it may take some time before
you are listed and a submission does not guarantee listing.


4. Get a Qualified Backlink: Get linked from a website that search
engines crawl regularly and add your link to forum signatures. Google
states, "Google's robots jump from page to page on the web via
hyperlinks, so the more sites that link to your pages, the more likely
it is that we'll find them quickly."


5. If your blog isn't already listed in Google's Blog search engine,
you can submit it manually. Add your blog to Google's Blog Search. http://blogsearch.google.com/ping


It usually takes a new website about a month before it's fully indexed
by Google. Google Blog Search indexes blogs by their site feeds, so be
sure that you publish a site feed.


Keep in mind that, while Google dominates the web, it isn't the only search engine on the web.


Yahoo Search is one of the major search engines and directories online
as well, so you are going to want to submit your blog to Yahoo's
Directory. http://add.yahoo.com/fast/add?17051064


It could take eight to ten weeks before you are listed in Yahoo.


Yahoo Site Explorer allows you to explore all the web pages indexed by Yahoo Search. siteexplorer.search.yahoo.com


Submit your blog to Yahoo Site Explorer. siteexplorer.search.yahoo.com/submit


Submit Your Feed to the Yahoo! RSS Browse-by-Topic Directory. http://add.yahoo.com/fast/help/us/my/cgi_rss_submission


Submit your Media RSS Feed to Yahoo! Search -http://search.yahoo.com/mrss/submit?


You can submit your blog to Msn at http://search.msn.com.sg/docs/submit.aspx?FORM=WSDD


SubmitExpress.com will submit your blog free to the top 20 + Search engines.


If you don't already have a Technorati account, sign up for one at
Technorati.com and claim your blog at Technorati. Technorati is a
popular weblog search engine.


Bloggertalk.net offers a list of blog directories where you can also submit your blog to increase your exposure online. http://www.bloggertalk.net/blog_resources-cat-369.html


When submitting to directories, be sure to take the time to read the submission guidelines provided by each blog directory.


Getting listed in the major search engines alone doesn't guarantee
traffic. Your blog content guarantees that. Update regularly, provide
interesting content and the visitors will come, as will the spider
bots.

About the Author


Rose DesRochers is the founder of Blogger Talk Blog Community http://www.bloggertalk.net,
a friendly fast growing blogging portal, offering bloggers support,
advice, tools, tips and information about blogs and blogging. Visit her
blog at Rose DesRochers- World Outside My Window. http://rosedesrochers.todays-woman.net


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business ,internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Work at Home Jobs, At Home Job by Gerome Carreon

The rapidly increasing population demands a placement job to make a
comfortable living, but the available manpower is too many for the available
jobs. Most especially in the third world countries, though some of these
countries are being visited by investors to put up their manufacturing
businesses that needs a lot of manpower. This is actually one of the advantages
investors are grabbing. They go to countries with abundant manpower and offer a
not so good salary to the workers.


It should not be this way. Professionals and skilled workers alike are
competing for a position in a manufacturing industry. The reason is obvious for
these professional and skilled personnel. They do not have the knowledge of
other work, the work at home jobs.


Today, the next generation of job will be the work at home jobs. Working
through the comfort of you home opportunities are beginning to boom. Work at
home jobs lurk the internet. Every work at home jobs have flexible time schedule
and it really suits your needs. Simple work, part time or full time, and the
most important point, it offers a great salary and it is up to you if you want
to get a bigger pay check


Work at home jobs is the best option everyone should know. Since it offers
flexible schedule, you can work at anytime you prefer. You can make it as your
part time job, after all it will be done at home and all you need is a couple
minutes to test it. If suites your need then it's good, but if not, you can
always try another one. But before go into it, you should look for a work at
home job that really fits your interest.


Compared to your traditional work at the office, work at home jobs do not
require you to sit down 8 hours a day. You will be the one to set your schedule,
your work place and all. If you get tired, take a rest walk for a while or you
can watch the movie if you like, you are the boss of your own work. The paycheck
is always commensurate on the effort exerted. Though comparing to effort exerted
on your traditional job, you will get paid here maybe a double and surely bigger
than your regular salary.


When do you want to start? Act now, grab one for you. Explore the internet
for more information about work at jobs.




About the Author


Gerome Carreon, a BSBA major in Marketing graduate. His resources are Work At Home , Amazing Cover Letters and
Conversational Hypnosis
for online marketers.


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , mlm coder, internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Profits On Demand-Your Own Personal ATM Machine! by Gregg Lyell

How would you like to take profits from the Internet at will? I will show you
a program that will let you do just that if you listen to what they say. Is it
worth the $9.97 cents price tag to have a decent financial future?


Do you want to know what it will cost you to get this incredible money making
information, information that will make you money on demand.


$9.97.


Yes, I did not makea typo.Why only $9.97 and not $29.97 or $49.97? I'm only
charging $9.97 for this report, and not giving this report away, for 3 reasons.


$9.97 puts the report within reach of the vast majority of people. It's not
too expensive for even the humblest beginning online businessperson.


Anyone who's not serious enough about making money online to invest under $10
into this report isn't going to take the time to use the methods laid out in the
report anyway.


Anyone who is serious enough to put down the price of a fast food dinner and
buy this report has the opportunity to sell the report to others and get 75% of
the price of the report for every copy they sell. More details on how to do that
are in the report. (There is an affiliate program you can join to make back the
money invested)


http://tinyurl.com/2jzeqb


The program is called "On Demand Profits" and you use it when you need some
extra cash. Or you can use it all time and make it as another stream of income
in your internet plans.


The system is completely risk free. You are not required to spend a single
cent on advertising or anything else. As they say in the Financial world, there
are no hidden costs.


http://tinyurl.com/2jzeqb


So if you are interested in having your own cash machine and drawing money
from it anytime you want, then go to the link and see what i am talking about.
Your financial future will be far more secure with this extra proven way to make
money NOW..


Thank you, Gregg


--------------------------------------------------------------------------
Distributed by Hasan Shrek, independence blogger. Also run online business , mlm coder, internet marketing solution , online store script .
Beside he is  writing some others blogs for notebook computer , computer training , computer software and personal computer

--------------------------------------------------------------------------

Traces of BlackBerry found in Samsung’s latest solid-state based ultra-mobile PC

Posted by David Berlind @ 3:25 pm
Categories: General, Vista, Hardware Infrastructure, Mobile, Personal Technology, Wired & Wireless, Video
Tags: Hard Drive, PC, Ultramobile PC, RIM BlackBerry, David Berlind

If there’s an ultra-mobile PC (UMPC) that I’d most want
for myself today, that UMPC might very well be the newest Q1 Ultra from
Samsung. Earlier this year at CES, I got a real good gander
at Samsung’s then latest greatest: the Q1 SDD. The Q1 UMPC had
already been out for a while. But the Q1 SSD marked the first time that
the Q1 took on a solid state disk (SSD) instead of a traditional hard
drive with platters, heads, and moving parts.

SSD’s have their pros and cons. On the downside, relative to
their mechanical siblings, they don’t store nearly as much for
every square millimeter of space they take up. Where SSD’s are
making their appearances today, most of them are 32 GB in size. Just
moments before videotaping the latest UMPC (above), we videotaped some
new hard drives coming from Samsung as well, including a USB-based 80
gigger that’s basically the size of a credit card (thickness is
about 3 or 4 credit cards). So, that gives you some idea of how far
behind SSD technology is lagging hard drive technology.


On the pro side, SSDs are significantly faster than mechanical hard
drives and take less energy. The energy issue is of particular
importance. Not only are the batteries found in UMPCs usually smaller
than the ones found in notebooks, a typical UMPC may have more demands
being placed on its battery. For example, the touch senstive display
requires more power than a typical LCD, there’s a higher
likelihood that the Bluetooth radio (if one is present as it is in the
Q1’s) will be used for a wireless keyboard, and there is of
course the WiFi radio too.


With the new $1499 Q1 Ultra, Samsung has married its SSD technology
to the latest Q1 industrial design which, as can be seen from the
picture and the video, includes a BlackBerry-like QWERTY thumboard
that’s split down the middle with one half being on the right
side of the display and the other on the left. The Ultra has an Secure
Digital slot and plenty of ports for expansion (eg: USB for thumb
drives or a keyboard and a VGA port so it can be connected to an
external monitor). Anyway, check out the video and pay close attention
to a prediction that we’ll see bigger SSDs (eg: 64GB) in the very
near future. Now that rocks.


Samsung’s Q1 Ultra SSD



--------------------------------------------------------------------------
Distributed
by Hasan Shrek, independence blogger. Also run online business , mlm coder, internet marketing solution , online store script .
Beside he is
writing some others blogs for notebook computer , computer training , computer software and personal computer


--------------------------------------------------------------------------