An Extremely Simple and Fully Customizable Launcher for Windows

October 31, 2010

When I get on a kick for something I seem to always stick with it for awhile. Here of late I have been kicking around and testing program launchers. My most recent article, ‘A Fun and Animated Program Launcher’ is just an example of myself feeding my obsession for these types of applications. Today I spent some time revisiting one of my favorites, called MouseExtender.

MouseExtender

The last time I reviewed MouseExtender (over a year ago) it was in the early stages of development. Since that review, MouseExtender has matured quite nicely and it is nice to see this application moving forward in its’ development. As a matter of fact, I was so impressed I continued working with it, completely customizing it for my personal use; and, decided to make it my main program launcher on my PC. You can setup MouseExtender to launch just about anything, from software applications to web sites. Once you start using it, the Windows Start Menu becomes a thing of the past.

Below is a sampling of my creation, complete with (7)-seven categories, that lead me to the programs that I mainly use.

MouseExtender

I think the main thing I like about MouseExtender over many of the other launchers I have tested, is that you can assign a hotkey, in combination with a mouse button, to unhide or hide the MouseExtender interface. When you use the hotkey combination, MouseExtender will show itself wherever your mouse pointer is positioned. In my case I took this even further.  I have a Logitech Mouse with additional side buttons where you can assign key combinations to the buttons. I can now toggle MouseExtender on and off via one of the side buttons. In essence I can rapidly pull up the MouseExtender menu and launch an application wherever the mouse pointer is located.

Since my last review of MouseExtender, some fine tuning has occurred that makes this application a top contender in program launchers. The feature list reflected below was copied directly from the developer’s website. You can click on any of the links to get further information and more insight on how MouseExtender functions.

Now that I am locked into using MouseExtender, and convinced that there will be continued development, I will be heading to the developer’s main website [ HERE ] and will also be visiting their coding website [ HERE ] .

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


What does the “G” represent in 3G and 4G?

October 31, 2010

If you are a mobile web user of the cellular phone systems, you may have heard the terms, 3G and 4G. I recently had someone ask me, “What does the “G” stand for?”.  Ironically, the answer to that question fell right into my lap while working on my blog.

Below is a clip from a PC Magazine Article, “What is 4G, And Do I Need It?” , that answers the “G” questions for us.

A “G” is a generation of wireless technology. Each generation offers significantly faster Internet access than the previous generation, but it’s incompatible with the previous generation—you have to upgrade your phone to use it, and carriers usually have to install new hardware.

The first G was the old analog cellular systems. 2G systems are digital, but slow. Many phones still use 2G. Internet speeds on 2G phones range from 9.6 Kbits/s to about 200 Kbps. 3G systems run from about 384 Kbps to—well, we’ll get to that.

4G systems such as LTE and WiMAX claim to have real-life speeds of 5 Mbits/s or greater, much like a home cable connection. The most recent versions of these technologies promise speeds in the hundreds of Mbits/s, faster than any home Internet connection available right now. 4G systems are also “all-IP.” Down the road, they’ll be able to replace the old circuit-switched voice phone calling with voice-over-IP systems. [SOURCE: PC MAGAZINE]

2/26/2012 – Also see another article on this same topic: What Is All This 2G, 3G and 4G Talk?

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

Gold Box: New Deals. Every Day.

[ CLICK HERE TO LEAVE A COMMENT ]


Cyberbullying – A Negative Result of Technology

October 29, 2010

I know I am from a generation of past; however, I have been fortunate enough to keep up to speed with technology and all the good and bad that is associated with it.

Today, I happened across a site called the Cyberbullying Research Institute that is dedicated to providing up-to-date information about the nature, extent, causes, and consequences of cyberbullying among adolescents.

Cyberbullying Research Center

If you are in the know, the term of the year for 2010 has to be the word “bullying”. Bullying is nothing new, and if you are from my generation (and prior), then you may have experienced it yourself at one point or another when you were an adolescent. Bullying is someone that persistently tries to dominant (and abuse) another through fear, threats and sometimes violence.

The reason I crafted this article is to inform people, especially those from my generation (and prior), that there is a new bully in town and he (or she) is called the Cyberbully. The Cyberbully is different in that the Cyberbully uses current technology to bully the victim in an attempt to gain power and control. The Cyberbullying Research Institute defines cyberbullying as this:

“willful and repeated harm inflicted through the use of computers, cell phones, and other electronic devices.”

Today’s technology makes it easy for the bully to harass others, due to the fact that the bully does not have to be physically in the  presence of the victim. With the wide reach of today’s technology, such as computers, cell phones, webcams, voice recorders, cameras, etc…,  incidents are occurring where adolescents are using these devices to harass, threaten, embarrass, intimidate, and humiliate others. For example, most cell phones today have the ability to record video and take pictures. There have been cases where bullying adolescents have taken pictures and videos of their peers in very compromising situations such as in a bedroom, a bathroom or other areas where privacy is typically expected; then posting the result on the internet.  Even something as simple as spreading rumors via text, instant, or email messaging can have devastating affects.

Again, my main purpose of this blog post is to make people aware that handing a cell phone, computer, or any electronic device over to a teenager, without rules and guidance, is a recipe for disaster that can lead to devastating affects.

If you would like to learn more about Cyberbullying, I encourage you to visit the Cyberbullying Research Center, a research group dedicated to tracking bullying behaviors online among youth.

Addendum:

  1. A fellow blogger, at 404 Tech Support, has an excellent article on this topic as well, titled ‘A Rant on Cyber-Bullying or ‘They’re 11. You, the Parent, Take Responsibility!’
  2. Parents, in this “digital age”, are faced with questions and challenges new to us humans. Tech, and the World-wide Web have changed the landscape. Tech Paul (at Tech-for Everyone) has assembled  ‘Some Tips for Parents’ that is a must read article.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


The Debate Continues – Should You Leave Your Computer “ON” or Turn it “OFF”

October 28, 2010

There has been a lot of debate over the years whether you should power down your computer daily or just leave it “on” all of the time. I’ve always been a firm believer of powering the computer”off” when finished using it at the end of the day. When I was managing a computer network, the standard I had in place required all users to power down their PC’s prior to going home. If I found a PC “on”, then I remotely powered it “off”. I still use this same practice at home. During the day, I turn the computer “on”, and all peripheral components (i.e. drives, router, etc…), via a power strip (surge protector); then, I power the computer “off” at the end of the day (prior to going to bed) or if I leave the house for an extended period of time. My theories and reasonings for this practice are as follows:

  1. A computer that is left “on” all the time, is a potential security risk and is an open invitation internally (by other people) and externally (by hackers and such). (Especially when your network is connected to the outside world AND due to the fact the majority of people, and businesses, do not keep their security software up to date.)
  2. Extends the life of the computer. (A common debate is that turning the PC “on” and “off” promotes a negative impact on the “service life” of the computer. I personally can attest that most computers, with today’s advanced technology, will reach the end of their “useful life” prior to their actual “service life”, even if you turn them “on” and “off” multiple times.);
  3. Could be a potential fire hazard. (I’ve seen computers and monitors go up in smoke.);
  4. Can save electricity. (See U.S. Department of Energy – “When To Turn Off Personal Computers“);
  5. Refreshes the memory and the memory resident programs and services in the computer when you completely do a “cold restart” of the computer. (Many people let their PC’s go into a “sleep/standy mode” or “hibernate” mode. I still prefer what is called a “cold” restart.);
  6. Will keep the internal components of the computer cleaner. (When a computer is “on”, the fans are pushing and pulling air to keep components cool; however, this air flow is a dust magnet.); AND FINALLY,
  7. Your icons on the computer screen, over the life of the computer, will start to war with each other. (Watch what actually can happen – click on the graphic, “Icon’s Story” for a demo. The demo is in Adobe Flash.)

DEMO – Watch What Happens to Your Icons At Night If You Leave Your Computer “ON”
(click on the logo, then wait for it to load)

Icon's Story

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[CLICK HERE TO LEAVE A COMMENT ]


Geek Squeaks’ of the Week (#83)

October 27, 2010

Welcome to another great round of Geek Squeaks’. This week is no exception; the articles reflected are simply awesome. Take a moment to check them out and do not be afraid to let the authors know that you paid them a visit.

Geek Squeaks'

Bill Mullins’ Tech Blog – Tech Thoughts
Boost Your Productivity With Free Right-Click Context Menu Extender

Bookmarks4Techs
Featured Tech Site – InformationWeek

Canadian Tech Blogger
Google Admits To Accidently Harvesting Full Emails and Passwords

Mrintech
Grab avast! Anti-Virus Free 1 Year License Now!

thePC Security
Cloud Based Antivirus – Free Anti Virus Malware Security from KingSoft

Right On Technology
Apple’s New MacBook Air, FaceTime for Mac, OS X Lion, and iLife 11

Evilfantasy’s Blog
Free Internet safety calendar

Plato On-Line
Wikileaks’ Assange Walks Out of CNN Interview

Faster PC! Clean! Clean!
How to Remove Tazinga Redirect Virus

RGdot
Freeware Quick Cliq Is An Innovative Launcher And More

Laptop’s Review Central
A look at HP’s Slate 500

Paul’s Home Computing Blog
Internet Security: Protect Yourself While Shopping Online

TuneUp Blog about Windows
Give Your Windows Media Center a Facelift:
How To Change the Default Style!

Lifehacker
TabCloud Syncs Your Browser Tabs
Across Chrome Installations [Video]

Rarst.net
Photovisi.com – easy multi-photo collages

Tech-for Everyone
Protect your computer from cybercrime..

Free PC Security
Malicious Sites October 26

Tied Up in the (World Wide) Web
You’re a creature of habit who needs to stop.

Chicago Mac/PC Support
Microsoft vs. Apple: Whos winning? The numbers dont lie ZDNet

AKSGEEK Live
Lumigon T1 Mobile Phone Unveiled

Online Storage Reviews
Is USB Storage Appropriate for Business Use?

Malware Removal Instructions
How to remove System Tool (Uninstall Guide)

Netbook Freeware
KeePass Password Safe: Securely Store And Manage Passwords

I Love Free Software
Download CrystalWolf Audio Player Free

Worthy Tips
McAfee SiteAdvisor Plus with Free 1 Year Subscription License

404 Tech Support
Remember The Good, Old MTV? Recreate It With This Mashup of YouTube and Last.fm

I Want Ice Water
The Trouble With Sheep

TTC Shelbyville
Windows 7 has Cloud features built in

Snakebytez
Search and Download MP3 songs for free with Songr

My Technology Guide
Repair MBR To Restore Windows 7 To Your Multiboot Options [How To]

Awesome Wallpapers
Windows Se7en Wallpaper Set 33

What’s On My PC
When Windows 7 Will Not Boot

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


A Fun and Animated Program Launcher

October 25, 2010

I have always had an interest in finding ways to make navigating the computer easier. As a result of that interest I became a fan, and expert of sorts, of menus and program launchers. From the early days of MS-DOS, there is probably not one that I have not tested or tried.

Even when computers was my full time job, I would customize (and standardize) the Windows Start Menu to make launching applications an easy task for the end-user. The advantage to this was that it kept the sticky fingers of the end user out of many areas of the computer, plus it made my job easier when it came to maintaining numerous systems. Many system admins, very seldom, will go to that trouble.

Today, when customizing the appearance of my computers, my goal is to find ways to avoid the Windows Start Menu altogether, by using  third party program launchers. Of  all of the program launchers I have tried and tested, I keep going back to one. That “one”, is the very popular Stardock’s Objectdock.

ObjectDock

If you are into customizing the look of your computer and want to making getting to your most used programs easier, then ObjectDock is the way to go. ObjectDock is a featured enriched dock type program launcher that can be made to look 3D, with mirroring and translucent effects; AND, with numerous themes to select from. Version 2.0 of ObjectDock was recently released and it is awesome. There is a FREE version and a paid version available.

ObjectDock

With the FREE version [ CLICK HERE ], you can:

  • Put shortcuts on your dock
  • Display running applications on your dock
  • Put docklets on your dock
  • Icons zoom on mouse-over
  • Optional swinging icons on mouse-over
  • Skinnable backgrounds with reflections
  • Change the appearance of the icons of running tasks and shortcuts
  • Position dock on any edge of the screen
  • Optionally hide Windows taskbar
  • Optionally represent running programs by snapshot of their window
  • Ability to autohide dock for maximized applications

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Perform A Search Times Two With Goog-A-WHO?

October 24, 2010

If you are someone that is a search engine junkie and knows how to use the top search engines to get results, then you are going to like “Goog-A-WHO?” .

Goog-A-Who

“Goog-A-WHO?” is a web based search tool (not a search engine) that allows you to enter your query (or search term) one time, just like a search engine; however, once you click the button to “double your search” the end result is phenomenal. Your search results are presented instantly from Google and another search engine at random, side-by-side (in a dual pane interface). If you are like me, and have a widescreen monitor, this type of dual pane interface really takes advantage of my widescreen monitor by using the entire space of the monitor to present me with more information.

For example, to see “Goog-A-Who?” in action, with a search for, What’s On My PC, click [ HERE ] .

Googawho does its best to provide you with the fastest way to compare ALL of the internet’s top search engines with just one search on just one page!

Goog-A-WHO? does not stop there. Once your search results are up, you can now manipulate your search results by viewing results from eight other top search engines (Google, Yahoo!, Bing, Ask, InfoSpace, AltaVista, Lycos, and Dogpile). Now how cool is that! Plus, you can go full screen with any of the search engines by clicking on the small “load engine full screen” button.

Screenshot - Goog-A-Who

“Goog-A-WHO?” also takes advantage of the tabbed browser interface with a button called a “Tabulizer”.  Click on the Tabulizer and your search results will be opened by all eight search engines in their own separate tabs.

My opinion, this web based search tool, “Goog-A-WHO?”,  is a keeper and a must for anyone who is a search engine junkie.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Some Really Good Security Advice for the Everyday Computer User from Paul, Paul and Bill

October 23, 2010

Was making my typical rounds of the blogs that are associated with the What’s On My PC blogroll (see blogroll round up HERE) and noticed three articles, from three bloggers (Paul, Paul, and Bill), that are offering up some very important security info (first aid) advice to people that I want to share with my readers.

It is not everyday the circumstances present itself where three of the top bloggers out there, at the same time, are giving away valuable information such as this. Stop by, read their articles (that will help keep you safe) and tell them that Ramblinrick sent you…

Computer Security - First Aid

Paul’s Home Computing Blog: Wireless Networks: Is Yours Secure?

For those of you who have wireless networks in your home: here’s some bad news. Half of them are vulnerable to be hacked…in 5 seconds! So states an article in NetworkWorld. But take heart in the fact that it’s not difficult to secure your home wireless network. – [ READ MORE ]

Paul at Tech-for Everyone: Send and Receive E-cards Safely

While Valentine’s Day is months away yet, we are nearing Hacker¹ Season. Criminal activity will double, and redouble, the nearer we get to the “Holiday shopping season”. It is time for us to ratchet up our paranoid cautiousness factors, and vigilance. – [ READ MORE ]

Bill Mullins’ Weblog – Tech Thoughts: Defensive Downloading – The Basics

BitDefender is currently warning, on its Malware City site, of a fake Stuxnet removal tool which, once downloaded and installed, will wipe out the contents of the victim’s Hard Drive. – [ READ MORE ]

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Uninstalling Security Applications

October 23, 2010

In today’s world of computing the choice of security applications, that we are presented with, to use on our computers are astounding and is like picking apples from a tree. Years ago, the competition was a select few; however, the internet of today, where cybercrime is prevalent, has produced more security application options like never seen before. For example, names such as avast!, AVG, Avira, ESET, Kaspersky, McAfee, Norton, Symantec, Trend Micro have become household names.

Where the problem comes into play is when you decide you want to switch the apples for oranges and change the security application(s) that you are currently using. What people do not realize, and I emphasize this, uninstalling (or removing security apps) is not the same as uninstalling normal software. Security applications are complex in nature, are viturally alive on your PC at all times (monitoring and scanning), write to the Windows registry (and your computer) in many places, and sometimes I truly think (due to the intense competition) the developer deliberately does everything possible to keep you from uninstalling it.  As a matter of fact, from my own experience, I have found that the uninstall module built into these applications themselves will not even thoroughly get the job done and will even fail. Again, this is more likely due to the complexity of the app than anything else.

So what do you do?

You can research the uninstall process at the developers site; however that task alone is like looking for ticks. Many times the site will offer up an utility program to perform the uninstall; however, to the everyday computer user, the removal process described can appear intimidating.

The easy way of thoroughly removing a security app, providing the app is in the database, is to use a program called AppRemover.

AppRemover

AppRemover is a free utility that enables users to remove antivirus and other applications as well as left over files from incomplete uninstallations. There’s no more need to mess around with your registry.

AppRemover is very easy to use.  Download, run, then follow the steps.  AppRemover will scan your system and will walk you through the automatic removal of the security application; even applications that may have failed their original uninstall process.

AppRemover

Sample – Scan Results

AppRemover

AppRemover is my go to application when I need to uninstall a security application. AppRemover is very popular and has been downloaded over 3/4’s of million times.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


A FREE, Portable, Simple and Easy Notes Program with Online Syncing

October 22, 2010

If you are a flash drive junkie and carry your computer programs on a stick, then I am going to point you in the direction to a very simple note keeping program that you can carry on that stick (your flash drive) , called ResophNotes .

ResophNotes

What makes ResophNotes standout from the rest of the pack is that it serves as a client note keeping program that will sync with the online note keeping service called Simplenote. The advantage to this is that not only will your notes be available to you on your flash drive; they will also be available to you anywhere there is internet access. If you compose or update a note online (using Simplenote), the note will then be in sync with your flash drive version of ResophNotes and vice versa.

ResophNotes

To get started, go to Simplenoteapp.com and sign up for an account (it is FREE).

Simplenote

After you have your online account setup, go to the ResophNotes site [HERE] and download/install the portable version of ResophNotes to your flash drive. After launching ResophNotes you will go into the configuration settings to enter your SimpleNote account information. Other options are available in the settings to auto or manual sync your notes, as well. Once you complete those couple of steps, you are good to go.

Neither of these programs are a ramped up program like Evernote; however, if you are looking for a basic notekeeping option with portable app capability and online syncing that is stinking fast, then this pairing (ResophNotes and Simplenote) is a good option.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Quick and Easy Way to Print an Envelope

October 21, 2010

I came across this little program called Envelope Print that is setup to print onto a #10 envelope.  The program is pretty easy to use and will even store the addresses that you generate for future use.

A #10 envelope is a standard business-sized envelope which measures 4 1/8 x 9 1/2 inches.

Envelope Print

Most people do not take advantage of printing envelopes with their printer.  With Envelope Print you simply input your “from address” and the “to address” and hit “print”.  As with software that uses a printer, alignment may be an issue. You can change the alignment by adjusting the vertical and horizontal settings in the Envelope Printer software. Most printers have built-in support for popular envelope sizes. Some even have special trays for feeding envelopes. If your printer has an envelope tray, be sure to enable the “load from envelope tray” option in the print dialog box before printing. May take some experimenting, but in the long run, this may be quick and easy way to print an envelope when the need arises.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Geek Squeaks’ of the Week (#82)

October 20, 2010

If your passion is for computers and information technology, then the sites featured each week in Geek Squeaks’ is the places to satsify that passion. The articles reflected below are provided by the members of the What’s On My PC blogroll and are articles that have been posted in the past week.

Geek Squeaks

Tied Up in the World Wide Web
Internet, how do I love thee?

Awesome Wallpapers
Space/Fantasy Wallpaper Set 38

My Technology Guide
Crave World Clock:
Display Current Time Of Major Cities
On Your Desktop [Giveaway]

TTC Shelbyville
5 indispensable IT skills of the future

404 Tech Support
WSJ Catches Facebook Apps Sharing Identifying Info
With Advertisers; Is There A Story

I Want Ice Water
Stimulating the Economy (via Sargastic Irrevalence)

Techolar
How To Measure Your Popularity on Facebook ?

I Love Free Software
Create Free Photo Gallery Online: Min.Us

Netbook Freeware
SuperbarMonitor: Freeware For Monitoring Battery, CPU, Disk And Memory Status Of Your Netbook

Worthy Tips
3TB Internal Hard Drives From WD And Seagate Coming Soon

AKSGEEK Live
MSI Announced FX700 and FR700 Multimedia Laptops

Online Storage Reviews
Onsite vs. Offsite Data Storage

Malware Removal Instructions
How to remove ThinkPoint (Uninstall Guide)

Chicago Mac/PC Support
Two ways to create Mac installation packages

Gadgetsholic
AT&T Stores Getting iPad on October 28th

Free PC Security
Malicious Sites October 19

Tech-for Everyone
Step-by-Step Security Tutorial – Internet Explorer

Rarst.net
alternativeTo.net – massive similar software directory

Lifehacker
Avoid “Everything Buckets,”
aka Why I Can’t Get Into Apps Like Evernote

TuneUp Blog about Windows
Windows Styling Tips

Technogran’s Tittle Tattle
Spaces to WordPress step by step. Using Live Writer with WordPress

Paul’s Home Computing Blog
Internet Security Tip: Lock Your Doors! By Disabling Java Plug-in

Laptop Reviews
Asus releases 1015PN netbook on Amazon

RGdot
Freeware TSR Watermark Image Protects Your Images

Carol’s Vault
Free Studio all-in-one YouTube , video and audio app collection

Faster PC! Clean! Clean!
How to Remove Pushbot

Plato On-Line
Facebook Impersonation: Easy

Bill Mullins’ Weblog – Tech Thoughts
Crime And Punishment In The Internet Age

thePC Security
Free DVD Ripper for iPhone, iPad, iPod – Free Licence Keys

Mrintech
New Payment Options are Now available on eBay India!

Canadian Tech Blogger
Google Makes $2 Billion In 3Q

Bookmarks4Techs
Featured Site – Gear Log

What’s On My PC
The What’s On My PC Blogroll on Speedtile

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Bet You Did Not Know About Google’s Dashboard

October 18, 2010

Steve over at Scoronococlo has done it again! When it comes to blogging, Steve is focused on quality of content and not quantity. This go round, Steve informed me that he drafted an article about a relatively unknown component of Google, called Google Dashboard . The article is titled, “Google Dashboard – How Much Does Google Know About You? “. To be honest with you, I have heard of the Google Dashboard, but I never really explored it; until now.

Google's Dashboard

The dashboard component of Google’s service, that Steve refers to, is available to anyone that has an account with Google. In other words, if you have a Gmail account you can get to your personal dashboard.

What is so special about Google Dashboard? Well, as Steve phrases it:

“Google Dashboard can help you to understand how much of your personal information is being stored on Google’s servers.” .

In a nutshell, the dashboard is a summary of what information you are actually sharing with Google and the stats for the various Google accounts you maintain. Now, for the grand finale, [ CLICK HERE ] to find out how you can access this dashboard and give Steve a great round of applause.

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


Improve Your Browsing Experience with Speedtile

October 17, 2010

Most of the popular web browsers out there today give us the ability to setup a homepage that will tile our favorites sites into an interface (of web page thumbnails) that is commonly called a speed dial. Typically, this interface can be setup, depending on the browser, as a browser option, addon or extension. The beauty of this interface is that once your homepage loads you can quickly go to your most frequently visited sites by visually selecting one of the thumbnails. The speed dial interfaces are completely customizable and defintiely will make your internet browsing experience more efficient.

Typically, once you set up your speed dial, the data is stored on your computer; BUT, what if you want the same interface (you created) on another computer (for example at work)? The closest solution that I found, to make this happen with minimal fuss, is with an online service called Speedtile. With Speedtile you can access your speed dial anywhere there is internet access.

Speedtile

Speedtile requires you to setup up an account (which is FREE) where a login is required to get to your very own online speed dial interface. It is very simple to create your individual tiles by adding your favorite sites (or URL’s). Once you enter the web address of the site, a mini version of the site will magically appear (called a tile). You can even add categories.

Speedtile

See the What’s On My PC blogroll on Speedtile

With Speedtile you can share your bookmarks with others. For example, and this is very cool; I took all the sites on my blogroll and created a public Speedtile site. If you would like to see what a speed dial looks like, consisting of links from the What’s on My PC blogroll, then [ CLICK HERE ].

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]


The Facebook Addiction, Is it worth it?

October 15, 2010

I admit, I spend more time on the computer than the average person, but it is not on Facebook. There is just too much more to do other than to be consumed by the social antics of others and the raising of virtual animals and crops.

I had actually signed up for an account, early on, to explore the service and to share my blog articles, but it just did not connect with me. Please do not take offense, I’m just a computer guy that knows that there is a whole other world on the internet outside of Facebook and that a personal computer can do a whole lot more than raise virtual crops and animals at Farmville.

Facebook Addiction

I have come to the conclusion that most people now primarily use their computer, at home (and probably at work), to access Facebook so that they can communicate with their friends and become part of a real-world soap opera.

Some Facebook Facts
[Source: Facebook]

More than 500 million active users

50% of our active users log on to Facebook in any given day

Average user has 130 friends

People spend over 700 billion minutes per month on Facebook

There are over 900 million objects that people interact with (pages, groups, events and community pages)

Average user is connected to 80 community pages, groups and events

Average user creates 90 pieces of content each month

More than 30 billion pieces of content (web links, news stories, blog posts, notes, photo albums, etc.) shared each month.

I suppose sharing updates of events occurring in one’s life is important in a close family circle; however, when that sharing extends out to a virtual reality group of “so called” friends that continue to populate your social connection then I can see where it can become an actual addiction and a unsafe one at that. Your privacy and even your safety can be compromised, as a result. The more information you put out there, the higher the risk and the more overwhelming it can become to manage that information. Just remember that Facebook is a cloud based service that is managed (and controlled) on the internet level.  Once you put it out there, it is out there and there is no taking it back.

Like in real life, those virtual friends can turn on you in a heartbeat or will use information you post to spread gossip. For example, I was at work and an employee approached me about another employee, who is in a position of responsibility, and stated, “you should see how they are dressed on Facebook”. In another instance, an employee who should have been working was Facebooking.  What they forgot was that one of their connected friends was the boss.

Another thing to really think about, is that the information you are posting is like pieces to a puzzle. With enough pieces (about you), a profile is developed that is used for advertising purposes. Think about it…  How do you think Facebook makes their money?  It is through advertising. The information you are putting out there is being collected, behind the scenes, in one form or another, for advertising purposes.

Then there are the scammers, the spammers and the the malware that makes its’ rounds on Facebook.  Remember, where the people gather, the cybercriminal will prey.

To me, it is not worth all this…

It is not that I am anti-social, it is that I am concerned; especially for the younger generation being exposed to this type of social networking. They are being lead to believe it is Ok to tell all, when in fact telling it all and exposing ones’ inner self may not be for the best.

Maybe I am missing something here. I would love to here your comments about Facebook, pros and cons…

StumbleIt

jaanix post to jaanix

Bookmark and Share

Bookmarks4Techs_Blogger2

[ CLICK HERE TO LEAVE A COMMENT ]