Hello everyone:

Posted in Uncategorized | Leave a comment

Keeping up with market trends

Posted in Uncategorized | Leave a comment

The Top 30 Internet Terms for Beginners, 2015

‘. Read more about protocals here: http://netforbeginners.about.com/od/h/f/what-is-a-computer-protocol-http.htm The most popular protocols are the World Wide Web, FTP, Telnet, Gopherspace, instant messaging, and email. The World Wide Web , or ‘Web’ for short, is the most popular portion of the Internet. Read more at this link. What is the World Wide Web? http://websearch.about.com/od/w/g/World-Wide-Web.htm The Web is viewed through web browser software. Grammar and spelling note: Use capitalized ‘Internet’ and ‘Web’ when using either word as a noun. Use lowercase ‘internet’ or ‘web’ when using either word as an adjective. e.g. ‘We were browsing the Internet on our television last night.’ e.g. ‘We found a really good web page about global warming.’ 2. http and https http is a technical acronym that means ‘hypertext transfer protocol ‘, the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser. https is ‘hypertext transfer protocol SECURED’. This means that the web page has a special layer of encryption added to hide your personal information and passwords. Whenever you log into your online bank or your web email account, you should see https at the front of the page address. :// is the strange expression for ‘this is a computer protocol ‘. We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing. Read more about http and https here … http://websearch.about.com/od/dailywebsearchtips/qt/dnt0513.htm 3. Browser A browser is a free software package that lets you view web pages, graphics, and most online content. Browser software is specifically designed to convert HTML and XML into readable documents. The most popular web browsers in 2013 are: Google Chrome , Firefox, Internet Explorer , and Safari. Read more about web browsers here … 2011 About.com Readers’ Choice Awards Winners – Best Web Browsers http://browsers.about.com/od/allaboutwebbrowsers/ss/2011-Readers-Choice-Awar ds-Winners-Web-Browsers.htm#step2 4. HTML and XML Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called ‘HTML tags’ that look like the following: * * * XML is eXtensible Markup Language, a cousin to HTML. XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following: * *

* XHTML is a combination of HTML and XML. Read more about HTML here … http://webdesign.about.com/od/html5/qt/what_is_html5.htm Read more about XML here … 5. URL URL’s, or ‘uniform resource locators’, are the web browser addresses of internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers. URL’s commonly use three parts to address a page or file: the protocol (which is the portion ending in ‘//:’); the host computer (which sometimes ends in .com); and the filename/pagename itself. For example: * https://personal.bankofamerica.com/login/password.htm * http://forums.about.com/ab-guitar/?msg61989.1 * ftp://files.microsoft.com/public/eBookreader.msi * telnet://freenet.edmonton.ca/main Read more about URL’s here … Understanding URL’s: How Internet URL Addresses Work http://netforbeginners.about.com/od/understandyourbrowser/a/urls.htm 6. IP Address Your computer’s ‘internet protocol’ address is a four-part or eight-part electronic serial number. An IP address can look something like ‘202.3.104.55’ or like ’21DA:D3:0:2F3B:2AA:FF:FE28:9C5A’, complete with dot or colon separators. Every computer, cell phone, and device that accesses the Internet is assigned at least one IP address for tracking purposes. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address acts like a type of automobile licence plate to enforce accountability and traceability. Read more about IP addresses here … What Is an ‘IP Address’? Is It the Same as ‘Domain Name’? http://netforbeginners.about.com/od/i/f/ip_address.htm Read more about IP Version 6 addresses here … http://netforbeginners.about.com/od/navigatingthenet/f/what-is-IPV6-internet -protocol.htm 7. Email Email (formerly spelled e-mail with a hyphen) is electronic mail . It is the sending and receiving of typewritten messages from one screen to another. Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook). Email has many cousins: text messaging, instant messaging, live chat, videomail (v-mail), Google Waving . Read more about email here … http://awards.about.com/od/Computing/Computing.htm 8. Blogs and Blogging A blog (‘web log’) is a modern online writer’s column. Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages. Web logs are usually arranged chronologically, and with less formality than a full website. Blogs vary in quality from very amateurish to very professional. It costs nothing to start your own personal blog. Read more on web logs here … What Is a Blog for Beginning Bloggers? http://weblogs.about.com/od/startingablog/p/WhatIsABlog.htm 9. Social Media and Social Bookmarking Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. Facebook.com and MySpace.com are very large social media sites, as are YouTube.com and Digg.com. Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other (‘tagging sites’). Read more about social media and social bookmarking here What Is Social Media? – Definition and Examples http://webtrends.about.com/od/web20/a/social-media.htm 10. ISP ISP is Internet Service Provider. That is the private company or government organization that plugs you into the vast Internet around the world. Your ISP will offer varying services for varying prices: web page access, email, hosting your own web page, hosting your own blog, and so on. ISP’s will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet). Today, you will also hear about WISP’s, which are Wireless Internet Service Providers . They cater to laptop users who travel regularly. Read more on ISP’s and WISP’s here… Internet Service Providers (ISPs) – Role and Function http://compnetworking.about.com/od/internetaccessbestuses/g/bldef_isp.htm Below is the second set of the 30 terms for beginners on the internet 2015. Link for second ten ie terms http://netforbeginners.about.com/od/internetlanguage/tp/the-top-internet-ter ms-for-beginners.01.htm 11. Download Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web. Commonly, downloading is associated with songs, music, and software files (e.g. “I want to download a new musical ringtone for my cell phone”, “I want to download a trial copy of Microsoft Office 2010”). The larger the file you are copying, the longer the download will take to transfer to your computer. Some downloads will take 12 to 15 hours, depending on your Internet speed . Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music. 12. Malware Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things: 1. vandalize your computer in some way 2. steal your private information 3. take remote control of your computer (‘zombie’ your computer) for other ends 4. manipulate you into purchasing something Malware programs are the time bombs and wicked minions of dishonest programmers. Read more about malware here … Understanding Spyware and Malware 101 http://netforbeginners.about.com/od/antivirusantispyware/a/malware101.htm http://netforbeginners.about.com/od/antivirusantispyware/a/malware101.htm 13. Router (aka ‘Network Router’) A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out. If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions. Read more about network routers here … Broadband and Wireless Router Networking http://compnetworking.about.com/od/homenetworking/a/routernetworks.htm 14. Keywords and Tags/Labels Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas: e.g. “horseback riding calgary” e.g. “ipad purchasing advice” e.g. “ebay tips selling”. Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web. Tags (sometimes called ‘labels’) are recommendation keywords. Tags and labels focus on crosslinking you to related content… they are the modern evolution of ‘suggestions for further reading’. Read more about keywords and tags/labels here… Learn Where and How to Put Keywords on Your Web Site http://websearch.about.com/od/seononos/a/spooky.htm What is Tagging? http://graphicssoft.about.com/od/glossary/a/tagging.htm 15. Texting/Chatting Texting is the short way to say ‘text messaging’, the sending of short electronic notes usually from a cell phone or handheld electronic device. Texting is popular with people who are mobile and away from their desk computers. Texting is something like the pagers of old, but has the file attachment ability of email. Read more about file attachments here: “Attachment” or “File Attachment” Definition http://netforbeginners.about.com/od/a/g/def_attachment.htm To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider. You address your text messages using the recipient’s phone number. In 2010, texting has spawned a controversial habit called ‘sexting’ , which is when young people send sexual photos of themselves to other cell phone users. Read more about ‘sexting’ here: What Is Sexting and Why Is It a Problem? http://familyinternet.about.com/od/computingsafetyprivacy/a/sexting_what.htm 16. I.M. I.M. (usually spelled ‘IM’ without the periods) is instant messaging , a form of modern online chatting. IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer. That IM software in turn connects you to potentially thousands of other IM users through the Internet. You locate existing friends and make new friends by searching for their IM nicknames. Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links. While the recipient sees your message instantly, they can choose to reply at their leisure. Read more on IM here … What is IM? Learn More About Instant Messaging http://im.about.com/od/imfornewusers/a/whatisim.htm 17. P2P P2P file sharing (‘peer-to-peer’) is the most voluminous Internet activity today. P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other. Through ‘uploading’ and ‘downloading’, users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P. Read more about the controversial world of P2P file sharing … Understanding Music Downloading: How P2P File Sharing Works http://netforbeginners.about.com/cs/peersharing/a/aap2p.htm 18. E-commerce E-commerce is ‘electronic commerce’: the transacting of business selling and buying online. Every day, billions of dollars exchange hands through the Internet and World Wide Web . Sometimes, the e-commerce is your company buying office products from another company (business-to-business ‘B2B’ e-commerce). Sometimes, the e-ecommerce is when you make a private purchase as a retail customer from an online vendor (business-to-consumer ‘B2C’ e-commerce). E-commerce works because reasonable privacy can be assured through technical means (e.g. https secure web pages), and because modern business values the Internet as a transaction medium. 19. Bookmark A bookmark (aka “favorite”) is a marker that you can place on web pages and files. You would bookmark something because: 1. You want to return to the page or file later 2. You want to recommend the page or file to someone else Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser. Bookmarks/Favorites can also be made on your Mac or Windows computer files. 20. Social Engineering Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information. All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards , bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you. Read more about social engineering here … Social Engineering Attacks http://antivirus.about.com/od/securitytips/tp/socialengineeringattacks.htm Below start the third and last set of internet terms for beginners in 2015. *Link to thurd set of ie terms http://netforbeginners.about.com/od/internetlanguage/tp/the-top-internet-ter ms-for-beginners.02.htm 21. Phishing and Whaling ‘Phishing’ is what modern-day con men do to defraud you of your personal accounts. Phishing is the use of convincing-looking emails and web pages to lure you into typing your account numbers and passwords/PINs. Often in the form of fake eBay web pages, fake PayPal warning messages, and fake bank login screens, phishing attacks can be very convincing to anyone who is not trained to watch for the subtle clues. As a rule, smart users distrust any email link that says “you should login and confirm this”. Read more about phishing and whaling here… Internet Phishing and Email Scams – What Phishing and Email Scams Look Like http://netforbeginners.about.com/od/scamsandidentitytheft/ig/Phishing-Scams- and-Email-Cons/ 22. Addons and Plugins Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web. Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages. Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader. Read more about addons here … Best Overall Add-On (Non-Security) http://browsers.about.com/library/bl-best-overall-addon.htm Read more about plugins here … Basic Web Browser Plug-Ins and Extensions http://netforbeginners.about.com/od/p/a/The-Best-Internet-Plugins.htm 23. Trojan A trojan is a special kind of hacker program that relies on the user to welcome it and activate it. Named after the famous Trojan horse tale, a trojan program masquerades as a legitimate file or software program. Sometimes it will be an innocent-looking movie file, or an installer that pretends to be actual anti-hacker software. The power of the trojan attack comes from users naively downloading and running the trojan file. Read more about trojan malicious programs here … Trojan – What Is a Trojan http://antivirus.about.com/od/whatisavirus/g/trojan.htm 24. Spamming and Filtering ‘Spam’ has two meanings. 1) Spam can mean ‘the rapid reptition of a keyboard command’. But more commonly, 2) spam is the jargon name of ‘unwanted/unsolicited email’. Spam email is usually comprised of two sub-categories: high-volume advertising, and hackers attempting to lure you into divulging your passwords. Filtering is the popular-but-imperfect defense against spam. Filtering uses software that reads your incoming email for keyword combinations, andthen either deletes or quarantines messages that appear to be spam. Look for a ‘spam’ or ‘junk’ folder in your mailbox to see your quarantine of filtered email. More on spam and filtering here … Spam and How to Get Rid of It – About Email http://email.about.com/od/spamandgettingridofit/ 25. Cloud Computing and Software-as-a-Service (SaaS) Cloud computing is a fancy term to describe that your software is online and ‘borrowed’, instead of purchased and actually installed on your computer. Web-based email is the most prevalent example of cloud computing: the users’ email is all stored and accessed ‘in the cloud’ of the Internet, and not actually on their own computers. This is the modern version of the 1970’s mainframe computing model. As part of the cloud computing model, ‘Software as a Service’ is the business model that claims people would rather rent software than actually own it. With their web browsers, users access the cloud of the Internet, and log into their online rented copies of their SaaS software . Read more about cloud computing and SaaS here … What Is ‘Cloud Computing’? http://netforbeginners.about.com/od/c/f/cloudcomputing.htm 26. Apps and Applets Apps and applets are small software applications. They are designed to be much smaller than regular computer software, but still provide very useful functions. Lately, apps are very popular with cellphone and mobile platforms; specifically: with the Apple iPhone and the Google Android phone. Examples of apps: rangefinder GPS for golfing, song identification software, restaurant reviews, pocket video games, language translators for traveling. Read about popular apps here … What is the Best Free iPhone App – Readers Pick the Best Free iPhone App According to about.com http://cellphones.about.com/od/softwarereviews/f/readers-choice-awards-best- free-iphone-app.htm 27. Encryption and Authentication Encryption is the mathematical scrambling of data so that it is hidden from eavesdroppers. Encryption uses complex math formulas (‘ciphers’) to turn private data into meaningless gobbledygook that only trusted readers can unscramble. Encryption is the basis for how we use the public Internet as a pipeline to conduct trusted business, like online banking and online credit card purchasing. On the provision that reliable encryption is in place, your banking information and credit card numbers are kept private. Authentication is directly related to encryption. Authentication is the complex way that computer systems verify that you are who you say you are. More on encryption and authenticating … Encryption – 40-bit vs 128-bit Encryption – What is the Difference? http://compnetworking.about.com/od/networksecurityprivacy/l/aa011303a.htm 28. Ports and Port Forwarding ‘Network ports’ are thousands of tiny electronic ‘lanes’ that comprise your network connection. Every computer has 65,536 tiny ports, through which Internetworking data travels in and out. By using port management tools like a hardware router, users can control port access to better safeguard themselves against hackers. ‘Port forwarding ‘ is the semi-complex technique of opening specific network ports. You would port-forward to speed up your downloading and speed up your online connections for gaming and teleconferencing. Read more about ports and port forwarding here … What Is “Port Forwarding”? How Do I Set My Own? http://netforbeginners.about.com/od/p/f/What-Is-Port-Forwarding.htm 29. Firewall Firewall is a generic term to describe ‘a barrier against destruction’. It comes from the building term of a protective wall to prevent the spreading of housefires or engine compartment fires. In the case of computing, ‘firewall’ means to have software and/or hardware protecting you from hackers and viruses. Computing firewalls range from small antivirus software packages, to very complex and expensive software + hardware solutions. All the many kinds of computer firewalls offer some kind of safeguard against hackers vandalizing or taking over your computer system. Read more about computer firewalls for personal use… Top Free Personal Firewalls and Firewall Software Downloads According to about.com http://compnetworking.about.com/od/firewalls/tp/homefirewalls.htm 30. Archives and Archiving A computer ‘archive’ is one of two things: a compressed container of multiple smaller data files, or a purposeful long-term storage of files that are not going to be used often. In some cases, an archive can be both. The act of ‘archiving’, similarly, is one of two things: to combine and squeeze multiple files into a larger single file (for easier emailing); or, archiving is when you will retire data and documents to be put into long-term storage (e.g. your thousands of old emails in your inbox). Read about popular archiving software, WinZip … What Is ‘Zip’ and ‘WinZip’? How Do Zip Files Work? http://netforbeginners.about.com/od/downloadingfiles/f/how-zip-files-work.ht m Read about archiving your old email here … Archiving Old Mail in Outlook – Keep the PST File Small http://email.about.com/od/outlooktips/qt/et_archive_mail.htm
]]>

Posted in Uncategorized | Leave a comment

September's Vision: Virtual payment has arrived, join us for GBTA in a city near you & slashing travel costs…

Subject: September’s Vision: Virtual payment has arrived, join us for GBTA in a city near you & slashing travel costs… Date: September-30-15 8:32 AM September’s Vision: Virtual payment has arrived, join us for GBTA in a city near you & slashing travel costs… Virtual payment, credit security and easy reconciliation comes to Vision Travel Vision Travel is offering a great new payment service giving you and your travellers the benefits of security, easy reconciliation, easy booking compliance and so much more. The control of centralized payments with easy reconciliation The combination of a virtual credit card system, mobile payment app and purchasing card to provide your businesses with powerful spending control and automated processes, along with the mobile convenience that business travellers need… ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS3-0/c.aspx ) GBTA Sourcing Series Coming to a city near you These unique buyer-only forums are intended to aid travel buyers and managers, as well as professionals who may be responsible for sourcing travel as only a component of their role. Each half-day event will be filled with hands-on learning concerning the best-practices for keeping costs down and succeeding in all areas of travel sourcing. Click here ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS4-0/c.aspx ) to view the agenda. Calgary October 7 | 8am – 1pm Toronto October 15 | 12pm – 5pm Ottawa December 8 | 12pm – 5pm Vancouver December 10 12pm – 5pm ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS5-0/c.aspx ) @VisionTraveller – Vision Travel’s new Twitter feed will keep you up-to-date on what you need to know for your business travel Back to business flight pass promotion ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS6-0/c.aspx ) Travelling Within The Rules: How to keep business travellers safe? ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS7-0/c.aspx ) @BDRobertson’s latest entry on @HuffPostCanada: Slash Business Travel Costs with These Five Tips ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS8-0/c.aspx ) ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1RDFDT-0/c.aspx ) Billy Bishop Toronto city airport pedestrian tunnel is complete The new Billy Bishop Airport pedestrian tunnel will provide travellers with fast, reliable and convenient access to the airport. Whether you’re travelling for business or taking a well-deserved vacation, the pedestrian tunnel takes the stress out of getting where you need to go and makes it easier than ever to travel to the airport in the heart of Toronto. To access the tunnel, travellers descend 100 feet and travel along the main passageway via four moving sidewalks. At the south end of the tunnel, travellers will ascend to the island atrium and airport’s check-in area using one of the longest escalator systems in Canada – the complete journey will take less than six minutes…. ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1SCXS9-0/c.aspx ) ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1RDFDV-0/c.aspx )Important : Have you given your consent? At Vision Travel we love to share travel news and promotions with our valued clients. Click Here ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1RDFDV-0/c.aspx ) to confirm you still want to receive emails from us. Seeing Travel Your Way Vision Travel is committed to a more personalized and responsive approach to the business of travel ( http://e-vision2000.ca/1OSV-3NOPW-EO1YME-1RDFDW-0/c.aspx ) Ontario | British Columbia | Quebec | Alberta | TICO #50018498 | CPBC # 51523]]>

Posted in Uncategorized | Leave a comment

ABCs of DVD Drive Abbreviations

, http://www.pioneerelectronics.com/PUSA/ and was the first format compatible with stand alone DVD players. The group that promotes the technology calls itself the DVD Forum , which is “an international association of hardware manufacturers, software firms, content providers, and other users” with notable members such as Hitachi, Samsung, and Toshiba. The DVD-R/-RW format is based on CD-RW technology and uses a similar approach to burning discs. http://www.geeks.com/techtips/2004/Images/DVD3.gif The DVD+R/+RW format is a newer format, also based on CD-RW technology, and compatible with a large percentage of stand alone DVD players. The +R/+RW technology is not supported by the DVD Forum, and its main backing comes from a group called the DVD+RW Alliance . http://www.geeks.com/techtips/2004/techtips-29dec04.htm The Alliance “is a voluntary group of industry-leading personal computing manufacturers, optical storage and electronics manufacturers” with members such as Dell, Hewlett Packard, Sony, and Phillips Electronics. http://www.geeks.com/techtips/2004/Images/DVD4.gif The DVD-RAM format is based on PD-RW (Phase-Differential) drives, and actually uses a cartridge to hold the media (just like its PD-RW predecessor). Some DVD-RAM cartridges are double sided, making them ideal for companies to use as system backup, hence DVD-RAM is usually found only in commercial applications, and most end-users won’t ever need to use or see this type of drive. The DVD-RAM standard is also supported by the DVD Forum just like the DVD-R/RW format. However, because of its use of a cartridge (limiting it’s compatibility), and the scarcity and price of the media used, DVD-RAM is a distant third when compared to the DVD+R/+RW and DVD-R/–RW technology. The +R/+RW and –R/-RW formats are similar, and the main difference DVD+R technology has is the ability to record to multiple layers (with its new DVD+R DL format), where DVD-R can only record to one layer (not all +R drives are capable of dual layer burning, but no -R drives are). The Plextor PX-504U http://www.geeks.com/details.asp?invtid=PX-504UF-SW-R &cat=DVD is an example of an external DVD+R/+RW drive capable of recording single layer discs in the +R/+RW format, but also able to read discs recorded by a DVD-R drive. What is DVD±RW? DVD±RW is not actually a separate format, but the designation given to drives capable of both –R/–RW and +R/+RW operation. This type of drive is typically called a “Dual Drive” (not to be confused with a “Double Layer” drive) since it can write to both the +R/+RW and –R/–RW formats. The Samsung TS-H552 is a DVD±RW drive capable of reading and writing every format discussed http://www.geeks.com/details.asp?invtid=TS-H552-BLK-BULK-N &cat=DVD so far, and then some. It takes advantage of DVD+R DL (Double Layer) technology available with the +R format, allowing the appropriate media to store virtually double the 4.37 GB capacity of a typical single layer disc. The other main thing to consider with DVD burners is selecting the correct media. Media for DVD-R , DVD-RW, http://www.geeks.com/details.asp?invtid=DVD-R16X-25-25 DVD+R http://www.geeks.com/details.asp?invtid=DVDPLUSR8X-50-50 &cat=MED and DVD+RW media may all look the same, but they are slightly different in order to match the specific recording formats. The price of media for either format is generally the same, with RW media costing a good deal more than R media of either format. Double Layer media is even more expensive, and is the only way for an owner of DVD+R DL drive to take advantage of the tremendous capacity increase. As the amount of Double Layer drives increase in the market, the price of the DVD+R DL media is expected to fall with increased production of the media. DVD Burners (as these drive are often referred to) can be picky about the media supported, so be sure to choose your media wisely. DVD in a Nutshell · DVD-ROM : Reads DVD discs · DVD+R : Writes to DVD+R media (will also typically write to CD-R and CD-RW media) · DVD+RW : Writes to DVD+RW media (will also typically write to DVD+R, CD-R and CD-RW media) · DVD+R DL : Writes to DVD+R DL (Double Layer) media (will also typically write to DVD+R, DVD+RW, CD-R and CD-RW media; many Double Layer drives are ALSO dual drives – that is, able to write to BOTH +R/RW and –R/RW media) · DVD-RAM : Writes to DVD-RAM cartridges (not in wide use on consumer market – mainly a business format; can also read PD-RW discs. Will not usually be able to write to any other format including CD-R or CD-RW) · DVD-R : Writes to DVD-R media (will also typically write to CD-R and CD-RW media) · DVD-RW : Writes to DVD-RW media (will also typically write to DVD-R, CD-R and CD-RW media) · DVD±RW : Writes to DVD-RW and DVD+RW media (will also typically write to DVD-R, DVD+R, CD-R and CD-RW media; typically called “Dual Drives” since it can burn to two different DVD formats) Final Words This article took a look at the more common formats of DVD drives in order to shed some light on all the choices available. The differences between them all may be subtle, but the compatibility issues can be quite frustrating. The simple answer to anyone considering a drive is to forget about + and – by themselves, and shoot for universal compatibility with a good DVD±RW with DVD+R DL support.]]>

Posted in Uncategorized | Leave a comment

How to make a pantry more accessible?

Posted in Uncategorized | Leave a comment

Read and relax

Posted in Uncategorized | Leave a comment

BlackBerry's First Android Phone? What You Need to Know

Posted in Uncategorized | Leave a comment

Helpful tips for October 2015

Phinney Neighborhood Association, a nationally recognized neighborhood group in Seattle. 2. Block those leaks One of the best ways to winterize your home is to simply block obvious leaks around your house, both inside and out, experts say. The average American home has leaks that amount to a nine-square-foot hole in the wall, according to EarthWorks Group. First, find the leaks: On a breezy day, walk around inside holding a lit incense stick to the most common drafty areas: recessed lighting, window and door frames, electrical outlets. Then, buy door sweeps to close spaces under exterior doors, and caulk or apply tacky rope caulk to those drafty spots, says Danny Lipford, host of the nationally syndicated TV show “Today’s Homeowner.” Outlet gaskets can easily be installed in electrical outlets that share a home’s outer walls, where cold air often enters. Outside, seal leaks with weather-resistant caulk. For brick areas, use masonry sealer, which will better stand up to freezing and thawing. “Even if it’s a small crack, it’s worth sealing up,” Lipford says. “It also discourages any insects from entering your home.” 3. Insulate yourself “Another thing that does cost a little money — but boy, you do get the money back quick — is adding insulation to the existing insulation in the attic,” says Lipford. “Regardless of the climate conditions you live in, in the (U.S.) you need a minimum of 12 inches of insulation in your attic.” Don’t clutter your brain with R-values or measuring tape, though. Here’s Lipford’s rule of thumb on whether you need to add insulation: “If you go into the attic and you can see the ceiling joists you know you don’t have enough, because a ceiling joist is at most 10 or 11 inches.” A related tip: If you’re layering insulation atop other insulation, don’t use the kind that has “kraft face” finish (i.e., a paper backing). It acts as a vapor barrier, Lipford explains, and therefore can cause moisture problems in the insulation. 4. Check the furnace First, turn your furnace on now, to make sure it’s even working, before the coldest weather descends. A strong, odd, short-lasting smell is natural when firing up the furnace in the autumn; simply open windows to dissipate it. But if the smell lasts a long time, shut down the furnace and call a professional. It’s a good idea to have furnaces cleaned and tuned annually. Costs will often run about $100-$125. An inspector should do the following, among other things: Throughout the winter you should change the furnace filters regularly (check them monthly). A dirty filter impedes air flow, reduces efficiency and could even cause a fire in an extreme case. Toss out the dirty fiberglass filters; reusable electrostatic or electronic filters can be washed. 5. Get your ducts in a row According to the U.S. Department of Energy, a home with central heating can lose up to 60% of its heated air before that air reaches the vents if ductwork is not well-connected and insulated, or if it must travel through unheated spaces. That’s a huge amount of wasted money, not to mention a chilly house. (Check out this Ducts aren’t always easy to see, but you can often find them exposed in the attic, the basement and crawlspaces. Repair places where pipes are pinched, which impedes flow of heated air to the house, and fix gaps with a metal-backed tape (duct tape actually doesn’t stand up to the job over time). Ducts also should be vacuumed once every few years, to clean out the abundant dust, animal hair and other gunk that can gather in them and cause respiratory problems. 6. Face your windows Now, of course, is the time to take down the window screens and put up storm windows, which provide an extra layer of protection and warmth for the home. Storm windows are particularly helpful if you have old, single-pane glass windows. But if you don’t have storm windows, and your windows are leaky or drafty, “They need to be updated to a more efficient window,” says Lipford. Of course, windows are pricey. Budget to replace them a few at a time, and in the meantime, buy a window insulator kit, Lipford and Broili recommend. Basically, the kit is plastic sheeting that’s affixed to a window’s interior with double-stick tape. A hair dryer is then used to shrink-wrap the sheeting onto the window. (It can be removed in the spring.) “It’s temporary and it’s not pretty, but it’s inexpensive (about $4 a window) and it’s extremely effective,” says Lipford. 7. Don’t forget the chimney Ideally, spring is the time to think about your chimney, because “chimney sweeps are going crazy right now, as you might have guessed,” says Ashley Eldridge, director of education for the Chimney Safety Institute of America. That said, don’t put off your chimney needs before using your fireplace, Eldridge advises. “A common myth is that a chimney needs to be swept every year,” says Eldridge. Not true. But a chimney should at least be inspected before use each year, he adds. “I’ve seen tennis balls and ducks in chimneys,” he says. Ask for a Level 1 inspection, in which the professional examines the readily accessible portions of the chimney, Eldridge says. “Most certified chimney sweeps include a Level 1 service with a sweep,” he adds. Woodstoves are a different beast, however, cautions Eldridge. They should be swept more than once a year. A general rule of thumb is that a cleaning should be performed for every ¼ inch of creosote, “anywhere that it’s found.” Why? “If it’s ash, then it’s primarily lye — the same stuff that was once used to make soap, and it’s very acidic.” It can cause mortar and the metal damper to rot, Eldridge says. Another tip: Buy a protective cap for your chimney, with a screen, advises Eldridge. “It’s probably the single easiest protection” because it keeps out foreign objects (birds, tennis balls) as well as rain that can mix with the ash and eat away at the fireplace’s walls. He advises buying based on durability, not appearance. One other reminder: To keep out cold air, fireplace owners should keep their chimney’s damper closed when the fireplace isn’t in use. And for the same reason, woodstove owners should have glass doors on their stoves, and keep them closed when the stove isn’t in use. And for the same reason, woodstove owners should have glass doors on their stoves, and keep them closed when the stove isn’t in use. Checkout this site where you can Search for a CSIA Certified Professional Simply enter your Zip Code and hit enter or click Search for a list of the CSIA Certified Chimney Sweeps and CSIA Certified Dryer Exhaust Technicians within the mileage radius you designate . http://www.csia.org/ 8. Reverse that fan “Reversing your ceiling fan is a small tip that people don’t often think of,” says Lipford. By reversing its direction from the summer operation, the fan will push warm air downward and force it to recirculate, keeping you more comfortable. (Here’s how you know the fan is ready for winter: As you look up, the blades should be turning clockwise, says Lipford.) 9. Wrap those pipes A burst pipe caused by a winter freeze is a nightmare. Prevent it before Jack Frost sets his grip: Before freezing nights hit, make certain that the water to your hose bibs is shut off inside your house (via a turnoff valve), and that the lines are drained, says Broili. In climes such as Portland, Ore., or Seattle, where freezing nights aren’t commonplace, you can install Styrofoam cups with a screw attachment to help insulate spigots, says Broili. Next, go looking for other pipes that aren’t insulated, or that pass through unheated spaces — pipes that run through crawlspaces, basements or garages. Wrap them with pre-molded foam rubber sleeves or fiberglass insulation, available at hardware stores. If you’re really worried about a pipe freezing, you can first wrap it with heating tape, which is basically an electrical cord that emits heat. 10. Finally, check those alarms This is a great time to check the operation — and change the batteries — on your home’s smoke detectors. Detectors should be replaced every 10 years, fire officials say. Test them — older ones in particular — with a small bit of actual smoke, and not just by pressing the “test” button. Check to see that your fire extinguisher is still where it should be, and still works. Also, invest in a carbon-monoxide detector; every home should have at least one. Article source page: http://realestate.msn.com/article.aspx?cp-documentid=13107899 _________________________ From the pages of Donna’s travel diary Traveling alone At the best of times, traveling alone for anyone could be a bit of everything; lonely, boring, scary, anxious, and so much more. However, when you are blind and have to depend on sighted assistance in unfamiliar territory, it sure makes for some very interesting challenges. As for me, I would like to refer to myself as a fairly seasoned traveler but for all that this is worth, I still have a plethora of feelings each time I do it alone. I do my best to line up sighted assistance before I embark on my trip. That is, I notify the airline or train company that I am traveling with that I am a blind passenger and would need help. I have found that nine out of ten times, it works and staff at these companies is more than willing to help me. The most anxious moments for me come when I have to go through security; they are not always very accommodating as they often tend to want to take my cane away from me without first asking or advising. Or when I am waiting to board either the train or plane. I sit there with fists clenched praying that they do not forget me. I’m Donna J. Jodhan enjoying my travels. On your next trip you could enrich your down time with some of my audio mysteries. Take them with you wherever you go! In the car, on the plane, on the bus or train, at the beach, anywhere! Affordable, portable, (computer or i device) and you could either purchase or Subscribe for unlimited access to my library at www.donnajodhan.com/store.html and you can now take advantage of our free downloads here.]]>

Posted in Uncategorized | Leave a comment

August recap: Cutting costs in corporate travel, The changing role of the Travel Manager…

August recap: Cutting costs in corporate travel, The changing role of the Travel Manager… Travel Manager 2020 Foundational Shifts in the Role of the Travel Manager Travel Management is an evolving process which shares characteristics with and is influenced by procurement and finance, but retains its own unique challenges and characteristics. Procurement generalists have a tendency to view travel as commodity purchases, which may be valid, but can result in glossing over the industry-specific nuances, like shifts in the travel value chain, and therefore may be less effective. Meanwhile, those with a finance perspective see expense control as the best way to improve company performance in general, making travel a category they want to control and manage closely. They may be more likely to focus on compliance with travel policy and in many organizations the finance department has direct input to the creation of travel policies. By incorporating and balancing both of these perspectives, a more effective and satisfactory travel program can be created… ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPID3-0/c.aspx ) Cutting the costs of Corporate Travel With Ian Race, Senior Vice-President, Sales & Account Management Even when the economy is buoyant, there are benefits in keeping a close rein on corporate travel costs. Recently I gave a presentation to the Global Business Travel Association in which I shared some of Vision’s top suggestions for cost containment. Then we asked members of the audience to chime in with some of their tried-and-true methods…. ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPID4-0/c.aspx ) @VisionTraveller – Vision Travel’s new Twitter feed will keep you up-to-date on what you need to know for your business travel The Aircraft Seat Supplier That Built a Business Designing a Better Premium ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPID5-0/c.aspx ) Travel Agents Get The Last Laugh In Las Vegas #VirtuosoWeek ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPID6-0/c.aspx ) New $82.5 million island airport pedestrian tunnel ‘a win for Torontonians’ ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPID7-0/c.aspx ) ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPBUS-0/c.aspx ) Slash Business Travel Costs with These Five Tips Business travel can be a double-edged sword for entrepreneurs — they need it to exponentially grow their business — whether to find cheaper overseas suppliers or finalize deals with potential clients; but it can also be a huge drain on finances, as the costs associated with a business trip is a sunk cost that impacts cashflow almost immediately. Often SMEs organize their travel on an ad hoc basis, only to find out at the end of their fiscal year that their travel expenses have ballooned. To manage your business travel costs, planning is key. Here are our top five industry tips to help slash your costs… ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QV6SR-0/c.aspx ) ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPBUU-0/c.aspx )Important : Have you given your consent? At Vision Travel we love to share travel news and promotions with our valued clients. Click Here ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QPBUU-0/c.aspx ) to confirm you still want to receive emails from us. Seeing Travel Your Way Vision Travel is committed to a more personalized and responsive approach to the business of travel ( http://e-vision2000.ca/1OSV-3MLJF-EO1YME-1QV6SS-0/c.aspx ) Ontario | British Columbia | Quebec | Alberta | TICO #50018498 | CPBC # 51523]]>

Posted in Uncategorized | Leave a comment