* [Please post your job openings here] *

October 22, 2009

Product Review: Kingston MobileLite G2 Card Reader

Kingston Digital, Inc. has released a new flash card reader, the MobileLite G2, which conveniently plugs right into any available USB port to transfer data between a variety of flash memory cards and either PCs or Macs.



The MobileLiteG2 has retractable covers on each side to protect the USB connector and the Flash memory cards from damage. To use the MobileLiteG2, you just push in both sides, plug a compatible flash memory card in on one side, and plug the USB connector on the other side into the computer. The unit is a bit wide, so you may need to use the provided USB extension cable if there is not enough space for the unit.

The device comes in three different package types -- either just the reader; the reader plus a 4GB SD HC card; or the reader plus an 8GB SD HC card. (Note that HC stands for High Capacity. Many newer digital cameras can accept these higher capacity cards.)

When I plugged the MobileLiteG2 into an available USB port on my PC it appeared as two drive letters. In my case, that was F:\ and G:\. The SD card slot turned out to be drive F:\ on my pc. I inserted a variety of SD cards and one microSD card (needed an adapter). All cards were recognized very quickly on my Windows XP system. Data transfer between the card and the computer is no different than transferring data between any two drives or storage devices. It couldn't be easier.

Supported card formats include SD, SDHC, microSD, microSDHC, Memory Stick® PRO Duo™, Memory Stick® PRO-HG Duo™ and Memory Stick® Micro™ (*M2).

The MobileLiteG2 is backed by a two-year warranty.

According to Kingston, the MobileLite G2 is compatible with the following operating systems:
Windows 7; Windows Vista® (SP1, SP2); Windows XP (SP1, SP2, SP3); Windows 2000 (SP4); Mac OS X v.10.3.x+; and Linux v.2.6.x+.

The suggested retail price for the MobileLiteG2 Flash Card Reader alone is $11.00. For the reader plus either the 4GB SDHD card or the 8GB SDHD card, the suggested retail price is $28.50 and $46.00 respectively.

This simple little device will make a great holiday gift for anyone with a computer that doesn't have a slot to read the various card types indicated above. And if you know someone who needs some simple, portable extra storage, or has or will be receiving a new digital camera, they will really appreciate the combination package with the 4GB SD HC card or the 8GB SD HC card.

Richard L. Kuper,
Editor
The Kuper Report

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

September 20, 2009

DTV: Problems Abound

If you receive your television signal via antenna, you most likely have noticed that your ability to watch and enjoy television has changed since the switch to digital television, or DTV. When you are able to receive the channel you want to watch, and the signal is strong, the picture is significantly better than what you saw before the switch, and sound is pretty good too.

However, the problem is actually getting that signal. With analog television (the way television was being broadcast until the switch), even in the event of a weak signal, you at least received a picture, even if it might have been a bit snowy, and the sound always came through. With digital television, it is a whole different story. With DTV, it seems to be close to an all or nothing proposition. Either you get the signal or you don't. Or, if you sort-of get a signal, the picture freezes or is pixelated, and the sound either continues with a jumpy or frozen picture, or everything just stops.

According to this article, at least part of the problem may be that stations that were previously broadcasting their digital signals on the UHF frequency have been forced to move to the VHF frequency. The indoor antennas that could bring in even weak analog signals on the VHF frequency seem unable to bring in weak digital signals on that frequency. But don't run out to buy a more expensive antenna because, due to the broadcast frequency problems and the weak power of some of those signals, a more expensive antenna may not bring any improvement.

Also, according to the same article: "[A]t least 20 VHF stations have asked the Federal Communications Commission to move their digital signals back to UHF, and more would like to do so. However, the government has sold off some of the UHF band to cell phone carriers, leaving less space for TV channels. Another portion is planned to be used for emergency services, which was another reason for the digital TV transition."

This writer and viewer hopes that a solution is found soon. It is very frustrating for many in this country, who either cannot afford or have no interest in switching to cable or satellite TV, when they can no longer watch television because the government essentially took that option away.

And, by the way, there are sometimes problems with cable and satellite TV. Pictures freeze there too.

Richard L. Kuper,
Editor
The Kuper Report

Labels: , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

June 07, 2009

Warning: Have you been "Tagged"

Have you received email with a subject line such as: "John Sent You Photos on Tagged :)" -- except instead of "John" in my example, it is the actual name of someone you know?

If you were the suspicious type, and you should be, you would have sent an email to that friend or relative or business associate and first asked them if they actually sent it. If not, then you probably need to do the following things immediately:

1. Write to the person and tell them about the email you got.

2. Advise them to send out a real email to all the people in their email address book warning them not to open any such email (because it didn't come from them) and not to click on any links in such an email and definitely not to fill out anything on the website that link goes to.

3. Advise them to make sure their anti-virus, anti-malware, and anti-spyware programs are up-to-date and to scan their computer.

4. After you've done that, you will want to follow the exact same advice yourself.

5. In the future, you (and they) will hopefully be more careful and suspicious.

Additional notes:

Some folks who went so far as to click on the link and de-selected the entire list of email ids that this site captured from their address book thought by doing so no one else would get spammed. It appears that is not the case, since the site already has that information and has apparently used it to spam everyone in that address book.

Please be careful. And while I have your attention, if you are one of those people who forwards chain emails or things that really seem just too good to be true, please stop immediately. And even if you are forwarding real valid emails, unless it is in a work environment where showing who has been involved in the communication chain has some value, just cut and past the relevant part -- don't include the hundred other email addresses buried in the email. That's another way spammers get valid email addresses to use. And when sending email to a group of people who may not all know each other or wish to have their email shared with the world, use the BCC option.

Richard L. Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

November 04, 2008

Review: Plantronics Stereo Bluetooth Headsets

Richard Kuper
The Kuper Report
http://thekuperreport.com/

I evaluated two Bluetooth headsets from Plantronics: The Plantronics Voyager 855 Stereo Bluetooth Headset, and the Plantronics Pulsar 590A with Universal Bluetooth Adapter. Both have pros and cons, depending on your personal preferences and needs.

Neither the Voyager 855 nor the Pulsar 590A listed my current cell phone, a Samsung Juke (SCH-u470) that doubles as an mp3 player, as a compatible bluetooth phone. Samsung did not list either of these headsets as compatible. Despite those omissions by both companies, both headsets easily connected (the term used for connecting bluetooth devices is "paired") with my phone, and neither needed the indicated code to pair up.

For stereo listening, bluetooth devices must support the Bluetooth Audio Distribution Profile (A2DP). Devices that do not support the A2DP profile must use the Plantronics universal adapter to work wirelessly with these headsets. The adapter only comes with the Pulsar 590A. Also, bluetooth mobile phones with built-in MP3 must support the Bluetooth Audio Distribution Profile (A2DP) for stereo listening.

Used as a cell phone headset

Voyager 855

The Voyager 855 works either as a standard mono bluetooth headset, or as a stereo bluetooth headset.



This is an in-ear headset. To use it as a standard mono headset, you can either insert the primary unit in your ear or, if you need an over-the-ear hook to hold it in place, attach the provided hook. To use it as a stereo headset, the in-ear add-on is attached to a thin cord connected to it's own over-the-ear hook. There are also three different sized earbud adapters. I've tried all three sizes and haven't quite found the right size for one of my ears that I personally find comfortable. And if I fully set the earbud in my ear to "seal out the noise", I find that I hear myself echoing in my ear when I talk, as when one simply holds their hand flat over their ear and talks. But that's just me. You may not have this experience.

To answer an incoming call, you either extend the sliding boom on the primary unit so that the mic is closer to your mouth, or tap a button. Since my phone is also an mp3 player, I was happy to find that when I answered a call it paused the music, and resumed it when the call ended. The
sound was clear on phone calls using the unit as a mono headset, and was even more so when using the unit in stereo mode (probably because I was now listening in both ears). One issue that folks at the other end of the calls mentioned was when I was outdoors in breezy or windy weather they had trouble hearing me, so I found myself cupping my hand over the mic to block the wind, which helped. I've had this issue with wired headsets in the past.

Plantronics claims up to 7 hours talk time, 6 hours stereo listening time, 160 hours standby time from a single charge. I don't make/receive a lot of calls and have mostly used the Voyager 855 to listen to music. In that mode, I estimate that the claim of 6 hours of listening time before needing
to recharge is reasonably accurate. Unfortunately, the only way to determine the battery status is either to somehow notice a blinking red (hard to do when the unit is on your ear), or else you suddenly hear a series of beeps when the battery is really low. At that point, the battery dies soon afterwards and needs to be recharged.

In addition to the items mentioned above, the Voyager 855 comes with an AC charger and a pouch to hold the headset. The Voyager 855 does not come with a USB cable to charge the unit via your pc. Such a cable is available, however, for an extra charge. In my opinion, this cable should be included with the headset.

I will address music listening, and what happens if I get a call while listening to music after a basic review of the Pulsar 590A.

Pulsar 590A

The Pulsar 590A is more than an over-the-head stereo bluetooth headset. It can also be used as a wired headset or wired headphones.



With the provided universal bluetooth adapter, it can also be used to listen wirelessly to iPods and virtually any device with a headset/headphone out jack. And if that's not enough versatility, it also comes with an in-flight cable so you can listen to the music or movie on a plane. It also comes with a desktop charging stand, an AC charger, a travel case, and a USB charging cable.

The mic on this unit is a small tube that looks like a small fuse. It seems to be a glass tube, so some care is needed. I found it a little difficult to extend it initially, but it loosened up a bit over time. Other than that, the test results were comparable to the 800, including when I answered a call it paused the music, and resumed it when the call ended. In the case of this headset, however, you need to press a button to answer a call.

Extending the tube does not engage the phone-answer action.

For the Pulsar 590A, Plantronics claims up to 12 hours talk time, 10 hours stereo listening time, 130 hours standby time from a single charge.

Listening to music

The main reason I was interested in stereo bluetooth headsets was to listen to music on the mp3 player part of my cell phone. Headsets are not stereo systems, and mp3 files are not the same as full-fledged audio recordings intended for play on a real stereo system, and so such comparisons would be unfair. Comparisons to a high-quality headphone connected by wire to such a stereo system would also be an unfair comparison to wireless listening. So the only reasonable comparison for most listeners would be to compare the sound to an iPod and it's provided earphones. Both the Voyager 855 and the Pulsar 590A provided comparable sound quality to iPod earphones, and also to the wired headset that came with the cell phone. The Voyager 855 sounds best when inserted in the ear in a manner that blocks out outside sound.

As mentioned earlier, though, the Pulsar 590A comes with some extra tricks. One is the ability to use it as a standard wired headphone. The provided cable comes with a 3.5mm plug - the size used on iPods and personal computers and such. With a separately purchased stereo phono-plug adapter from such stores as Radio Shack or amazon, it can also be used as a wired headphone on a real stereo system. I did connect it this way, and although it did not measure up to my high-end headphones, it provided very nice sound. I then tried out the Universal Bluetooth Adapter, attached to my stereo system. It was quite a treat to be able to walk around without wires and listen to my stereo, and the sound was very nice. I was able to set up my stereo to play both through the systems speakers and through the headphone jack that the adapter was connected to (via my 3.5mm to phono plug adapter) and discovered that there is a delay in getting the signal to the headset. It was like being in a stadium where the announcers voice echoes. I also connected the Universal Bluetooth Adapter to an iPod and enjoyed wireless listening that way too. I was also able to pair the Voyager 855 headset to the Universal Bluetooth Adapter.

Other features

With both headsets you can raise and lower volume. I was able to skip forward and back on the tracks on my mp3 phone and mute and pause with both headsets. I have not been on a plane in while, so I was unable to test the in-flight option with the Pulsar 590A.

In conclusion

All in all, I was impressed with both headsets. They both met my needs for stereo listening and making/receiving phone calls on my cell phone/mp3 player. The Pulsar 590A had many more options.

The Plantronics Voyager 855 Stereo Bluetooth Headset is an in-ear headset, and can be used either as a mono headset or a stereo headset.

The Pulsar 590A with Universal Bluetooth Adapter, is a stereo over-the-head headset.

The Voyager 855 lists for $149.95, while the Pulsar 590A lists for $249.95. Each can be found for about half those amounts at places like amazon.

More information about these and other Plantronics headsets can be found at the Plantronics website, http://plantronics.com.

Labels: , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

October 04, 2008

Review: NXPowerLite Revisited

Richard Kuper
The Kuper Report
http://thekuperreport.com/

Back in July 2006 I reviewed a product called NXPowerLite, the file compression software developed by British company Neuxpower Solutions Ltd., that did some serious shrinking of powerpoint files. The product has expanded its capabilities since then and can now compress Word and Excel files as well.

Back in 2006 I reported that NXPowerLite was able to shrink some of my PowerPoint files by up to 77%. I went back and used a more recent version of NXPowerLite and got similar results to those reported in my previous review. Now that the product also shrinks Word and Excel files, I went in search of some large files. I don't use Excel much these days, and so I didn't have any files that needed shrinking. I did, however, have a few Word files I could try, and I did. In some cases I got minimal shrinkage, but with one very large file (16.3MB) containing lots of text and embedded graphics and documents, NXPowerLite reduced it to 5.1MB, or to less than 1/3 of its original size using "normal" compression, and it shrank it down to 4.5MB with "extra compression." Amazing.

Even more amazing, the price is still only $45 for a single copy, and less if you get multiple copies. It is also available in a server edition.

NXPowerLite even received NATO accreditation after being successfully deployed by Headquarters Allied Rapid Reaction Corps (HQ ARRC) for a demanding military campaign in Afghanistan.

Are you looking for a product that will enable you to carry around many more of your files on your usb drive? Perhaps you need to shrink that file so you can send it in an email? Maybe you need more space on your hard drive and wish you could just shrink some of your larger PowerPoint, Word, or Excel files. If you need to shrink your files for any reason at all,
NXPowerLite is the product for you.

Labels: , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

August 30, 2008

Safe Computing Tips

Richard Kuper
The Kuper Report
http://TheKuperReport.com

********************************************************
NOTE:
This article was originally posted August 8, 2007 but is still relevant,
and so we are reposting it now.
********************************************************

If someone is truly determined to hack into your computer or your emails and they have the tools and knowhow, then they will probably succeed. But you can make it harder for them to do so. Unless it is the government. On Monday, President George W. Bush signed into law an expansion of the Foreign Intelligence Surveillance Act (FISA), giving government expanded rights to intercept phone calls and e-mails without warrants.

You can protect your computer by installing a suite of protection products. One such product, Grisoft's AVG Internet Security Suite has previously been reviewed. (See the original review here and the follow-up here.)


Such suites provide protection from spyware and viruses and a variety of other malware. That would be an excellent first step. And of course be sure to keep it up to date and proactive.

Be very careful what emails you choose to open, and set your email to hide graphics by default. If you are confident that a particular email is from a trusted source, you can always activate the graphics for that individual email as you are viewing it. Turning off graphics in email is a simple way to prevent a lot of the newer means of introducing malware to your computer that just might start capturing everything you do, including all your passwords.

Be very careful about clicking on links, especially in emails that look like they came from your financial institution. The safest way to deal with your financial institution online is to not click on links in emails, but instead go to their website by entering their web address directly into your browser. Otherwise you may end up at a very good copy that looks like your financial institution's website but is instead a rogue site that will collect all the information you type and then will use it to potentially steal your identity, or at least order lots of stuff in your name billed to you but shipped somewhere else.

When connecting to the internet, never do so from a computer id that has administrative rights except when absolutely necessary (e.g., to download and install new software that you purchase online from a reputable source). Being connected to the internet with administrative rights is akin to leaving your front door open while you are not at home and expecting no one will walk in andpotentially walk out with many of your valuables.

When creating passwords, try to use a combination of letters and numbers, and the longer the password the better. Of course, don't write it down and leave it by the computer or where someone could find it.

And if you really want secure communication in email, you need to be sending encrypted email. That's not as easy as all of the other suggestions above. It requires a means for encrypting by the sender and decrypting by the receiver, and the encryption/decryption codes can only be known by just those parties for it to truly be of value.

Does your cell phone have internet access? Then it can be hacked just as easily as your desktop or notebook computer.

One more thing. It does not matter what brand computer or cell phone you have. All are vulnerable.

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 04, 2008

Updated: Privacy & Security Watch: Beware of fake emails appearing to be from the IRS


Richard Kuper
The Kuper Report
http://TheKuperReport.com

(Originally posted April 23, 2008)

I received the following email today. Beware! It is a fake!

===

From:
"Internal Revenue Service"
(the associated email address was: easytref [at] tax.ref.co.us)

Subject: Tax return (Message ID IRS-9438-2825)

A Secure Way to Receive Your Tax Return

After the last annual calculations of your fiscal activity we have
determined that you are eligible to receive a tax refund of $620.50.
Please submit the tax refund request and allow us 3-9 days in order
to process it.

A refund can be delayed for a variety of reasons.

For example submitting invalid records or applying after the deadline.

To access the form for your tax refund, please click here

Note: For security reasons, we will record your ip-address, the date
and time. Deliberate wrong inputs are criminally pursued and indicated.

Regards,

Internal Revenue Service

Copyright 2008, Internal Revenue Service U.S.A. All rights reserved.

===

Also note that the link (not included here) seems to point to a website for a boy scout troop in Virginia!

UPDATE:
Due to the hacking of that boy scout website, the ISP shut the site down.
Also, there are other scam emails out there regarding the Stimulus Rebate checks being sent out, also appearing to be from the IRS.

If you get any such scam emails, the best way to help the IRS track down the perpetrators is to first, if your email program has the option, choose "show all headers" or something similar. Then forward the email to the following address (and substitute the "[at]" with "@"):
phishing[at]irs.gov

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 05, 2008

Review: D-Link Powerline HD Network Starter Kit

Richard Kuper
The Kuper Report
http://TheKuperReport.com



As you might have surmised by the name of this product, it uses your electric power line. This kit comes with two DHP-300 Ethernet Adapter devices, two ethernet cables, a quick install guide, and, of course, a CD. Additional DHP-300 Ethernet Adapters can be purchased separately.

Setup is very simple. Follow the provided instructions (not my summary here) for the correct order of steps and specifics.

My goal was to be able to connect a notebook PC to the internet at the same speed as the desktop pc in a different room. I plugged one of the units into an outlet and connected it via a provided ethernet cable to my router. I plugged the other one into the outlet in the room near where I wanted to connect the notebook PC. I followed the onscreen instructions in the order instructed, including encryption information. Once I was done, I connected the other provided ethernet cable to the unit in the other room and connected it to the notebook pc. Within moments I was online and surfing away at the same speed as on the desktop pc via my cable modem.

You can also use the kit to set up a small network, or buy extra adapters to connect additional devices. According to the box, you can use the Powerline HD to "stream HD video and enjoy intense online gaming". And according to the website, "D-Link’s Powerline HD Ethernet Adapter is ideal for connecting an Ethernet-enabled digital media device such as a Tivo® or Slingbox™ to your network and the Internet."

Some things to note:

First, the ethernet adapters get very, very hot and stay that way, so be careful.

Second, for this to work, all the electric outlets in question need to be on the same self-contained grid. For most, this will not be an issue. However, if, for example, your had your home or office wired in such a way that the computer and such are on their own grid so that they are not affected by power issues in the rest of the office or home, then this won't work unless you run an extension cord or otherwise provide connection to that other grid so that the units are on the same grid.

If the caveats above are not an issue for you, and you want faster speed than wireless and a quick and easy way to set up a network or expand the number of pc's that can connect to the internet, then look into the D-Link Powerline Network Starter Kit.

Labels: , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

February 23, 2008

Privacy & Security Watch: Beware of fake emails appearing to be from a financial institution

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Your money and your identity are precious to you. You money and identity are also of great value to thieves. It is important to be extra vigilant, especially in emails and on the Internet, to protect both.

At the link below, you will find an example of one such real-looking communication, but it could just as easily have been set up to look like it was from whatever bank or financial institution you do business with.

Please note that in order ensure you that you are actually going to the real HSBC website indicated below (they provided this to warn their customers about this particular scam), I have not encoded the link. Please copy it and open a *new* web browser (or new tab), and paste it into your web address bar, and press ENTER. (If you do it on the same page that you are viewing this newsletter on you will need to hit the BACK button on your browser to get back here to read the rest of this article.)

Copy and paste this link to a new web page or new tab:
https://www.us.hsbc.com/1/2/3/personal/inside/securitysite/alerts/alert-1

As you saw if you followed the above instructions, someone was very creative and sophisticated. It looks real.

Remember that just because the text looks legitimate, if it is a live link that you can just click on, you need to verify that where the link is going is where the link claims to be going. I'll provide an example:

Click on the below link (which looks just like the link above):
https://www.us.hsbc.com/1/2/3/personal/inside/securitysite/alerts/alert-1

Other than the fact that the above is a link you can click on (try it - it will open in a new window), you cannot tell by looking at it that it will actually go somewhere else. And if I had created a fake HSBC-looking web page and pointed the link there, you might not have noticed at all because the resulting page would have looked just like an HSBC page (instead of taking you to ThisIsMyStore.com).

Now, move your mouse over the above link and right-click. You will get a list of options, one of which is "properties". Now click on "properties" and you will see that the link will actually take you to http://ThisIsMyStore.com and not to the secure HSBC page. This is an easy way to check where a link may actually be taking you. But note that the link displayed might still look kind-of legitimate, so it is always safest to go directly to your financial institution's website by
entering the proper web address yourself.

Labels: , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

January 17, 2008

Privacy and Security Watch: Backup Tape Missing With Personal information On About 650,000 Customers

Richard Kuper
The Kuper Report
http://TheKuperReport.com

According to this article, "Personal information on about 650,000 customers of J.C. Penney and up to 100 other retailers could be compromised after a computer tape went missing." About 150,000 of those missing records contained social security numbers. GE Money, part of General Electric Capital Corp., is the credit card operations for Penney's and the other retailers. They apparently discovered the tape was missing last October. There is no explanation in the article why this is first coming to light now. The tape was being stored at a warehouse run by Iron Mountain Inc.

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

December 17, 2007

Review: magicJack

Richard Kuper
The Kuper Report
http://TheKuperReport.com

magicJack

Are you looking for a way to reduce your phone bill to practically zero? Do you have a windows pc, running Windows XP or Vista (Mac version promised soon). Then you may wish to check out magicJack.

How it works
Basically, you need to have your pc on and you need to be logged in. Then you take magicJack, which looks like an oversized thumb drive with an exposed circuit board, and plug it into an available USB port. If you wish or need to, it comes with a USB extension cord if it's too crowded to plug the device in without it. But do be sure to plug it directly to a USB port and not to a USB extension port.

Then just wait for a minute or two, and answer any prompts you may get along the way, such as what area code you want and where you live (for 911). Then you are pretty much ready to start making calls for free to anywhere in the US and Canada. You can either plug a regular land-line phone into the magicJack, or else use a computer-connected headset. You will need to go into the menu and change the default to use the headset. Then you are ready to make calls. I was even able to use it to send a fax from a standard fax machine plugged into magicJack, but that option is not officially supported.

Want to call folks outside the US and Canada. Just have them get a magicJack and they will get a US-based phone number and then you can call each other for free.

It even works on PCs with USB 1.1 (it's just slower to set up and start up).

And you can take it with you and plug it into any pc and you will have the same phone number wherever you are. And your email will get notified that you have voice messages, and you can even listen to them online.

Some caveats
The instructions say not to have a cd or dvd playing when you plug in/set up magicJack. I also discovered that my backup program needed to be disabled during magicJack startup.

It works best if you are physically connected to the internet, by cable modem, or DSL, or T1 or such. I encountered some drops when I tried using it on a notebook connected wirelessly to the internet. Your experience may be better.

The product is still listed as being in beta.

And, of course, you need your pc to be on in order to use it.

Is it really free?
Well, almost. It costs around $40 to get one. That gets you one full year of use. After that, its about $20 a year. Yes, those are yearly figures, not monthly.

One last caveat
For security and backup, one should also maintain a real land-line phone number and standard phone that does not require electricity to operate. When there is a power outage, the computer won't work, and so neither would any internet phone from your cable company or magicJack.


Recommended
You can't beat the price, the sound quality is terrific, and it is really simple to use.

For more information and to order, go to http://magicJack.com

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

November 10, 2007

eBook Review: "How To Keep Your Boss From Sinking Your Project"

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Don't let the title of this eBook by Andrew Stellman and Jennifer Greene scare you off if you think you have a great boss. Perhaps a more accurate title for this would have been the title of the first chapter: "Why Do Projects Fail?" The authors succintly get to the heart of the matter about why projects fail and what you can do to help reduce the chances of project failure and to help prevent your boss from being part of the problem. The chapter titles tell you what you will learn:

* Why do Project Fail?
* Set Expectations Early and Keep Them Up to Date
* Make an Informed Selection of a Software Process
* Keep Your Manager Involved with the Project
* Make Intelligent Course Corrections
* Alter Your Tactics, but Stay True to Your Strategy

The authors seem to target programmers as the intended audience, but in this writer's opinion this is a handy guide for all members of a project team.

I had the honor of meeting the authors recently when they presented essentially this material at a meeting of the New York City Software Process Improvement Network. They gave an interesting and lively presentation and there was some good back and forth discussion about process and project management. If you missed that event, or even if you attended it, this eBook makes a nice supplement. I recommend it for anyone involved in a project.

You can purchase it directly from the publisher's (O'Reilly) website for only $7.99.

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

August 18, 2007

SpeechTEK 2007: August 21-23 in NYC

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Most major companies, and many small to mid-sized companies are using speech technology in many different ways. Are you using speech technology in your business? Should you be? And if you are, are you using it properly and effectively? Find out by attending SpeechTEK 2007 August 21-23 in NYC. Registration is also available the evening of August 20.

Who should attend?
* C-Level Executives
* Enterprise IT Decision Makers
* Telecom IT Decision Makers
* Customer Service Managers
* Call Center Professionals
* Speech Programmers/Developers
* Marketing Executives
* Voice User interface Designers
* Consumer Electronics Designers
* Internet Services Strategists
* Anyone Wishing to Learn More About Speech Technologies

More information can be found at http://SpeechTEK.com

Labels: , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

July 05, 2007

Is the iPhone hype leaving out some important details?

Richard Kuper
The Kuper Report
http://TheKuperReport.com

I've been randomly monitoring several different groups, some containing absolute early adopters, others containing a wider cross-section of business-minded folks. The early adopters love it, but still have some gripes, similar to those expressed by the major technology columnists in the print media. Others already have some issues. I am on a different cell network and am also no longer an early hardware adopter, having spent big bucks for things that either were replaced within a short period of time or disappeared entirely from the marketplace.

In any event, the most interesting detail I've learned so far is that, like the iPod, the battery in the iPhone is not consumer replaceable. You cannot get a spare battery or change it yourself. If the battery needs replacing, you need to send the iPhone to Apple for a replacement, leaving you without a phone/pda for an unknown period of time, unless you opt to rent one in the meantime or, perhaps in time, pay extra for some kind of coverage that will provide a loaner phone in the interim.

As far as I know, with iPods, you don't get back the same one you sent in, you get a refurbished replacement. I wonder if that will be the same model for the iPhone. I suspect that will cause some issues for folks who will first need to remember to back up everything on their iPhone before the battery dies, such as phone numbers and music and any customized preferences and whatever else they've chosen to store on it, and then when the replacement arrives reverse the process before being able to use the iPhone in the manner to which they have become accustomed.

It also seems that, except for the cool looking interface, most of the touted features are already available on other similar devices, and the software choices for other pda-type devices are extensive, while there are few or none for the iPhone.

I think I'll wait and see what the competition comes up with. And, hopefully, they won't follow the Apple model and make phones with non-replaceable batteries and then charge a small fortune for the phone and the battery replacement and leave you without a phone in the meantime.

Addendum:
The other unknown at the moment, if indeed you would get back a different iPhone than the one you sent in for a battery replacement, is what happens to the iPhone you send in for replacement and all of your data that is on it?

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

June 28, 2007

Update: AVG Internet Security Suite

Richard Kuper
The Kuper Report
http://TheKuperReport.com

In case you missed the earlier review of Grisoft's AVG Internet Security Suite, you can read it here.

Nowadays, many product vendors give you only one choice in purchasing their product: download it from their website. Well, that creates several issues. First, you must dedicate time and space for downloading the files that will then be used to actually install the product. If you want the install files to also be available on CD, in case your hard drive dies or the computer one day decides not to work anymore, then you need to create this CD yourself. This can be very time consuming and inconvenient, and for the less sophisticated user, something they just cannot do or are afraid to do. So when a company also is willing to continue to make their products available on CD for purchase, I applaud them and encourage them to continue to provide the choice.

Grisoft has released a retail version of the AVG Internet Security Suite on CD. Note, however, that the CD is the only item in the box. The only printed instructions (which are pasted onto the CD sleeve), are to insert the disk into the computer, and what to do if the disk does not automatically start. There is no printed user manual or quick reference guide. My recommendation to all vendors is to at least include a printed quick reference guide of the most common tasks one might perform using their product.

So if you want to get this recommended product that will help keep your computer protected from the various forms of malware out there (spam, viruses, spyware, etc.), you can purchase it either on a CD or you can download it directly. Just click on any of the Grisoft links in this article for the downloadable version or an occasional special deal that will include a CD. Otherwise, you can find the CD version at many retailers, such as some of the stores found at ThisIsMyStore.com.

Labels: , , , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 16, 2007

Privacy and Security Watch: IBM loses tapes with personal information on current and former employees

It seems even the great IBM can be affected by such problems as losing tapes containing social security numbers and other personal information on employees and retirees, along with records of customer transactions.

According to this article, "An outside vendor was transporting the tapes from one IBM facility to another on Feb. 23 when the tapes fell out of a contractor's vehicle in Westchester County, N.Y., not far from IBM headquarters in Armonk. IBM representatives went to the scene and couldn't find the tapes."

For some reason, only some of the missing tapes were encrypted.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 11, 2007

Home Entertainment Show May 11-13, 2007

The 2007 Home Entertainment Show is currently (through May 13) at the Grand Hyatt Hotel in NYC. Although it is called the "Home Entertainment" show, it would be more accurate to call it the "High End Audio Show With A Few Video Choices." The majority of products being demonstrated are not targeted to today's average consumer, whose modern-day audio/video system is comprised of compressed audio and video files,watched and listened to on a computer with computer speakers and maybe a sub-woofer.

Although some of the audio demonstrations were pleasing to the ear and in some cases more than pleasing, I had to quickly walk out of many of the rooms I walked into because the sound was so offensive. Many of the manufacturers and demonstrators apparently feel that they must play whatever they are demonstrating very loudly, and by doing so often present distorted sound that hurts the ears.

My recommendation to the manufacturers and demonstrators is to turn down the volume a bit, and try not to choose music choices that do a poor job of showing off your systems.

My recommendation to the show organizers is to rename the show to more accurately represent what is being presented. The products were, primarily, high end audio, not what most average consumers would consider purchasing when creating a home entertainment system. I would guess that the average consumer, when upgrading to a high definition TV for example, would either listen through the speakers provided with the TV, or, perhaps, simply buy whatever the store salesperson convinced them to buy to create surround sound. And for most, that would be just fine, because they either really can't hear the difference, or don't really care. That is not the audience this show is targeted to. There were, however, a few systems that were tied in with Windows Vista, for those who truly want to marry technology with high-end sound and video. And there was a product that you could connect to the internet that could broadcast internet radio to your stereo system - but the price tag was several times the cost of an average personal computer.

So if you are into high-end audio, or want to see what high-end is all about, then check out the show. More information can be found here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 10, 2007

Privacy and Security Watch: University of Missouri Hacked For Second Time This Year

According to this article, The University of Missouri has been hacked for the second time this year. The hacker gained access to the social security numbers of over 22,000 students and alumni through a Web page that was used "to make queries about the status of trouble reports to the university's computer help desk."

Back in January, there was a similar breach. In that case, "a hacker obtained the Social Security numbers of 1,220 university researchers, as well as personal passwords of as many as 2,500 people who used an online grant application system."

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 09, 2007

Court Permits Search of Personal Computer in Workplace

According to this article at findlaw.com, "a federal court has just held that an employee did not have a reasonable expectation of privacy in the personal computer he brought to work." It seems that because this employee and a co-worker otherwise had to share a common personal computer, this employee decided to bring in his own computer and connect it to his employer's system. The employer, in this case, was a city government. The employee made no effort to protect any information on his personal computer and left it on and in a public space -- even when he was not at his desk. This failure to password or otherwise protect and guard the personal information on his personal computer eventually led to the discovery of child pornography on his personal computer. That eventually led to the appellate court case that resulted in this decision.

As the article concludes, "if you want to maintain your privacy rights under the Constitution, you yourself must keep your private matters private."

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 05, 2007

Transportation Security Administration, a division of Homeland Security, loses hard drive with personal data on 100,000

According to an Associated Press report, "the Transportation Security Administration has lost a computer hard drive containing Social Security numbers, bank data and payroll information for about 100,000 employees."

The privacy and security of personal information is clearly not being addressed by government agencies, as previously reported in The Kuper Report and in various news reports over the years. This breach by a division of the Homeland Security Department is just the latest reported problem. As the Congress perhaps begins to address this problem in the private sector, it needs to also address this problem in the public sector. However, unless there are severe consequences for breaching the privacy, this problem will not end.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 01, 2007

There's More To Search Than Google!

* Do you only use one search tool (e.g., Google) when searching the web?

* Do you have difficulty finding what you are looking for whenever you do a search on the internet?

Then you'll want to attend this presentation for ideas and tips on how to find what you are looking for.

* Limited Seating *

** Door Prize **

More information and registration:

http://FindItSeminar.com

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

Review: MSGTAG Status - Version 2

When you send a letter via regular mail, you never really know if the recipient has received it. If you want to know, you add a return receipt, and the post office notifies you that the letter has been delivered. It's a pretty dependable system, with only an occasional glitch, but it requires the recipient to acknowledge receipt.

Most email products (except for most online email services) provide a return receipt request feature. Unlike postal mail return receipts, email return receipts can be ignored.

MSGTAG (http://msgtag.com) has created a service that it claims will notify the sender of the following:

* The message that has been received;
* The time that it was received;
* The time it was sent;
* The time elapsed between sending and receiving.

The recipient has no action to take, and won't even know that you are tracking that they have received it.

The website says the product will work with almost any email program, including Outlook, Outlook Express, Eudora, Pegasus, Netscape Mail and Incredimail. I do not use any of those. I use Mozilla Thunderbird for outgoing email. It took a little doing and guesswork, but I was able to get it to work.

You cannot use this product to track emails sent from any online email product, such as yahoo mail or hotmail or gmail. As stated on the MSGTAG website: "You need to be using an SMTP mail server, which almost every home computer uses." Also, MSGTAG will not work with an MS Exchange mail server.

Here, basically, are my findings:

MSGTAG will only report that an email has been received if the recipient is using an email client set to receive HTML mail. If the recipient has their email set to only accept text emails (the more secure option), or if they use text-only email clients, including some PDAs and mobile phones, then you will not receive any notice that the email has been received. It seems, however, that a significant number of computer users use HTML-rendering email clients and MSGTAG works for these recipients. The important note here, though, is that you cannot make the assumption that if you do not get a receipt, the email was not received.

There are three flavors of MSGTAG. The version tested is the full-featured version for $59.99, which includes:
* A handy dashboard for tracking receipts
* The ability to customize how the product tracks email receipts
* The ability to flag specific emails or domains to ignore if you send group mail and don't need all those receipts
* The ability to customize email footers
* An option to have recipients who are set up to receive text messages to have to acknowledge receipt - like the existing option in most emails.

There is a less featured version for $19.99 and there is also a free version that will send you an email every time a tagged message has been opened (subject to the limitations I described above).

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 26, 2007

Privacy and Security Watch: Lawmakers decry continued vulnerability of federal computers

Corporate computers are not the only ones being breached. The Federal Government (and state and local governments as well) are also not doing a good enough job of protecting the data from unauthorized access. In the case of the Federal Government, some of our lawmakers are finally waking up to this problem and speaking out about the issues. Read all about it here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

Privacy and Security Watch: Group calls for federal data security breach notification law

With the massive data breach of TJX (see various articles on TheKuperReport.com), several banks are suing TJX Companies Inc. over the data breach that "exposed at least 45.7 million credit and debit card holders to identity fraud." You can read more about that here.

Because of this and the many other breaches at other firms, the Cyber Security Industry Alliance (CSIA) is lobbying Congress to pass a law that will require companies that are breached to notify victims. Read all about it here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 12, 2007

Problems installing Home Networking

David Pogue of the NY Times had a heck of a week trying to install some home networking equipment. His experiences sound similar to the kinds of issues I've run into in a variety of products that are supposed to be targeted toward the general consumer.

You will find his story here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

January 08, 2007

So how secure is your pc?

Richard Kuper
The Kuper Report
http://TheKuperReport.com

So how secure is your pc? According to a January 7, 2007 article in the NY Times titled "Attack of the Zombie Computers Is Growing Threat" by John Markoff, "the bad guys are honing their weapons and increasing their firepower." Programs are secretly installing themselves "on thousands or even millions of personal computers" and then using these computers and their collective combined power to commit crimes across the Internet. For example, the article states: "Last spring, a program was discovered at a foreign coast guard agency that systematically searched for documents that had shipping schedules, then forwarded them to an e-mail address in China." Elsewhere in the article, we are told about a program that collected data from 753 infected computers, generated 54,926 log-in credentials, 281 credit card numbers, affected 1,239 companies including "35 stock brokerages, 86 bank accounts, 174 e-commerce accounts and 245 e-mail accounts" -- and that was just one file that was intercepted that had collected data over 1 month. One company that monitors such things claims there are more than 250,000 new infections daily.

There were a number of other examples, including the spam regarding a penny stock that boosted the price of the stock significantly - just long enough for whoever spawned it to make a nice profit.

Even more interesting was this paragraph that appears near the end of the article:

"Serry Winkler, a sales representative in Denver, said that she had turned off the network-security software provided by her Internet service provider because it slowed performance to a crawl on her PC, which was running Windows 98. A few months ago four sheriff’s deputies pounded on her apartment door to confiscate the PC, which they said was being used to order goods from Sears with a stolen credit card. The computer, it turned out, had been commandeered by an intruder who was using it remotely."

So now that you know about these problems, what are you doing to prevent them? Are you making the mistake of Serry Winkler and turning off your antivirus, antispyware, antimalware products, or, worse, have you failed to even install such software or ensure it is up-to-date? Are you perhaps making the ultimate error of being connected to the internet 24x7 logged in with adminstrator rights and no password? If you are accessing the internet from home via cable or dsl, do you have both a hardware firewall and a software firewall? If you have gone wireless, are you sure no one can intercept what you are doing over the air?

There are a variety of very good antivirus, antispyware, antimalware and other products to protect your computer. Some are even available for free or very low cost. Some are bundled as suites.

And before someone tries to give you the old and tired line "just get a Mac", be advised that the recent Mac vs. Windows ads have raised the profile of the Mac and Linux operating systems and attracted the interest of the bad guys. There have been an increasing number of reports regarding breaches of such machines -- perhaps not to the level of Windows machines, but that is primarily because there are fewer such machines in use. Should machines running Mac or Linux continue to grow in popularity and become a larger portion of the user community, rest assured that there are folks out there who will manage to wreak the same havoc on those machines as well.

So make sure to take all the necessary steps to ensure that your computer and data are secure. If you are a company, your responsibilities may be further defined by a variety of laws.

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting
























































































This page is powered by Blogger. Isn't yours?







Who links to me?