Sunday, September 28, 2014

Tech Doing Our Chores

Are we lazy or just making room and time to expand our potential for thinking and creativity. Technology and the expansion of mobile applications has conditioned us to expect ease, efficiency and speed in almost everything we do. Once it came from sewing machines and dishwashers, later from Google and Kayak, and most recently from start-ups that provide on-demand services like Uber for cars, Instacart for groceries and Munchery for dinner. Economists think about outsourcing chores in terms of opportunity costs. If you can work during the hour you would have spent mailing a package, it would probably be a better use of your time — as, perhaps, would taking a nap, going for a run or spending time with your child. If it is put in that perspective, it might just be the best solution to our so called 8 day week. What people do not realize is the value of time. We all have the same 24 hours in a day so how is it that some people are able to make much better use of it? Being able to outsource chores had been made easier by our smartphones which are able to sense location. What do you think?

Tuesday, September 16, 2014

Shopping Online

Do you prefer to shop online or in the store? Which do you think is safer to do? It’s just easier for hackers to profit by stealing information linked to credit cards swiped in physical stores, he said. Such data can be used to make counterfeit cards and presents fewer obstacles for thieves than information stolen from online shoppers. This is not to say that software development for the stealing of card online is not constantly expanding and evolving. More information is actually given when someone swipes the magnetic strip in a store than just by the number online. Of course there are also experts that claim that in store shopping is not more dangerous. By 2015, all retailers and and even banks will be required to use the chip and pin cards that use an embedded chip in the card as well as a pin to make any transactions. And now we have mobile payments thrown into the picture. I guess we will have to see which way payments will evolve.

Monday, September 15, 2014

More Life Lessons

I'm just going to get right to it and not beat around the bush. These are the things I learned growing up....though I am still growing up and probably will be for the next sixty years or so. Anyway, success will always come with failures. It has been shown that people who worry about mistakes get paralyzed by it and not go on. Those that are relaxed about doing badly, soon learn to do well and succeed. Speaking of success, people tend to believe that it matters what others think of them. First of all it is the important people, like your boss, that you have to worry about. Second of all, stop letting hypotheses about other people's hypotheses about you run your life. Think about it. Now on to beauty. You really think all that matters? Yes, the good looking people get preferential treatment in most situations but even though everyone is looking at them, they are never seen. Do you really want someone to marry your waistline and not that amazing mind that can solve ten different web application issues before breakfast?

Friday, September 5, 2014

How To Not Get Hacked

I am sure that you have probably heard of the nude photo leaks of celebrities. You are not immune, in case you needed a reminder. One of the most important things that you can do is not reuse passwords. If they get you, this is how you’ll get got. You need to take the time to really make strong passwords because the software development for figuring them out is getting more and more sophisticated, especially if you have a certain pattern to your passwords. Another thing you can do is set up a two factor authentication which means that if someone is logging in on a different device, a special code will be sent to an authorized device. A good password manager will help you create and manage strong passwords that you can use to log in from the Web or your mobile device. All you’ll ever need to know is the master password. The rest of your passwords are encrypted, and can only be unlocked by that master password.