Sunday, September 28, 2014
Tech Doing Our Chores
Are we lazy or just making room and time to expand our potential for thinking and creativity. Technology and the expansion of mobile applications has conditioned us to expect ease, efficiency and speed in
almost everything we do. Once it came from sewing machines and
dishwashers, later from Google and Kayak, and most recently from
start-ups that provide on-demand services like Uber for cars, Instacart
for groceries and Munchery for dinner. Economists think about outsourcing chores in terms of opportunity costs.
If you can work during the hour you would have spent mailing a package,
it would probably be a better use of your time — as, perhaps, would
taking a nap, going for a run or spending time with your child. If it is put in that perspective, it might just be the best solution to our so called 8 day week. What people do not realize is the value of time. We all have the same 24 hours in a day so how is it that some people are able to make much better use of it? Being able to outsource chores had been made easier by our smartphones which are able to sense location. What do you think?
Tuesday, September 16, 2014
Shopping Online
Do you prefer to shop online or in the store? Which do you think is safer to do? It’s just easier for hackers to profit by stealing information linked to
credit cards swiped in physical stores, he said. Such data can be used
to make counterfeit cards and presents fewer obstacles for thieves than
information stolen from online shoppers. This is not to say that software development for the stealing of card online is not constantly expanding and evolving. More information is actually given when someone swipes the magnetic strip in a store than just by the number online. Of course there are also experts that claim that in store shopping is not more dangerous. By 2015, all retailers and and even banks will be required to use the chip and pin cards that use an embedded chip in the card as well as a pin to make any transactions. And now we have mobile payments thrown into the picture. I guess we will have to see which way payments will evolve.
Monday, September 15, 2014
More Life Lessons
I'm just going to get right to it and not beat around the bush. These are the things I learned growing up....though I am still growing up and probably will be for the next sixty years or so. Anyway, success will always come with failures. It has been shown that people who worry about mistakes get paralyzed by it and not go on. Those that are relaxed about doing badly, soon learn to do well and succeed. Speaking of success, people tend to believe that it matters what others think of them. First of all it is the important people, like your boss, that you have to worry about. Second of all, stop letting hypotheses about other people's hypotheses about you run your life. Think about it. Now on to beauty. You really think all that matters? Yes, the good looking people get preferential treatment in most situations but even though everyone is looking at them, they are never seen. Do you really want someone to marry your waistline and not that amazing mind that can solve ten different web application issues before breakfast?
Friday, September 5, 2014
How To Not Get Hacked
I am sure that you have probably heard of the nude photo leaks of celebrities. You are not immune, in case you needed a reminder. One of the most important things that you can do is not reuse passwords. If they get you, this is how you’ll get got. You need to take the time to really make strong passwords because the software development for figuring them out is getting more and more sophisticated, especially if you have a certain pattern to your passwords. Another thing you can do is set up a two factor authentication which means that if someone is logging in on a different device, a special code will be sent to an authorized device. A good password manager will help you create and manage strong passwords that you can use to log in from the Web or your mobile device. All you’ll ever need to know is the master password. The rest of your passwords are encrypted, and can only be unlocked by that master password.
Subscribe to:
Comments (Atom)