* [Please post your job openings here] *

October 22, 2009

Product Review: Kingston MobileLite G2 Card Reader

Kingston Digital, Inc. has released a new flash card reader, the MobileLite G2, which conveniently plugs right into any available USB port to transfer data between a variety of flash memory cards and either PCs or Macs.



The MobileLiteG2 has retractable covers on each side to protect the USB connector and the Flash memory cards from damage. To use the MobileLiteG2, you just push in both sides, plug a compatible flash memory card in on one side, and plug the USB connector on the other side into the computer. The unit is a bit wide, so you may need to use the provided USB extension cable if there is not enough space for the unit.

The device comes in three different package types -- either just the reader; the reader plus a 4GB SD HC card; or the reader plus an 8GB SD HC card. (Note that HC stands for High Capacity. Many newer digital cameras can accept these higher capacity cards.)

When I plugged the MobileLiteG2 into an available USB port on my PC it appeared as two drive letters. In my case, that was F:\ and G:\. The SD card slot turned out to be drive F:\ on my pc. I inserted a variety of SD cards and one microSD card (needed an adapter). All cards were recognized very quickly on my Windows XP system. Data transfer between the card and the computer is no different than transferring data between any two drives or storage devices. It couldn't be easier.

Supported card formats include SD, SDHC, microSD, microSDHC, Memory Stick® PRO Duo™, Memory Stick® PRO-HG Duo™ and Memory Stick® Micro™ (*M2).

The MobileLiteG2 is backed by a two-year warranty.

According to Kingston, the MobileLite G2 is compatible with the following operating systems:
Windows 7; Windows Vista® (SP1, SP2); Windows XP (SP1, SP2, SP3); Windows 2000 (SP4); Mac OS X v.10.3.x+; and Linux v.2.6.x+.

The suggested retail price for the MobileLiteG2 Flash Card Reader alone is $11.00. For the reader plus either the 4GB SDHD card or the 8GB SDHD card, the suggested retail price is $28.50 and $46.00 respectively.

This simple little device will make a great holiday gift for anyone with a computer that doesn't have a slot to read the various card types indicated above. And if you know someone who needs some simple, portable extra storage, or has or will be receiving a new digital camera, they will really appreciate the combination package with the 4GB SD HC card or the 8GB SD HC card.

Richard L. Kuper,
Editor
The Kuper Report

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

June 07, 2009

Warning: Have you been "Tagged"

Have you received email with a subject line such as: "John Sent You Photos on Tagged :)" -- except instead of "John" in my example, it is the actual name of someone you know?

If you were the suspicious type, and you should be, you would have sent an email to that friend or relative or business associate and first asked them if they actually sent it. If not, then you probably need to do the following things immediately:

1. Write to the person and tell them about the email you got.

2. Advise them to send out a real email to all the people in their email address book warning them not to open any such email (because it didn't come from them) and not to click on any links in such an email and definitely not to fill out anything on the website that link goes to.

3. Advise them to make sure their anti-virus, anti-malware, and anti-spyware programs are up-to-date and to scan their computer.

4. After you've done that, you will want to follow the exact same advice yourself.

5. In the future, you (and they) will hopefully be more careful and suspicious.

Additional notes:

Some folks who went so far as to click on the link and de-selected the entire list of email ids that this site captured from their address book thought by doing so no one else would get spammed. It appears that is not the case, since the site already has that information and has apparently used it to spam everyone in that address book.

Please be careful. And while I have your attention, if you are one of those people who forwards chain emails or things that really seem just too good to be true, please stop immediately. And even if you are forwarding real valid emails, unless it is in a work environment where showing who has been involved in the communication chain has some value, just cut and past the relevant part -- don't include the hundred other email addresses buried in the email. That's another way spammers get valid email addresses to use. And when sending email to a group of people who may not all know each other or wish to have their email shared with the world, use the BCC option.

Richard L. Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

November 04, 2008

Review: Plantronics Stereo Bluetooth Headsets

Richard Kuper
The Kuper Report
http://thekuperreport.com/

I evaluated two Bluetooth headsets from Plantronics: The Plantronics Voyager 855 Stereo Bluetooth Headset, and the Plantronics Pulsar 590A with Universal Bluetooth Adapter. Both have pros and cons, depending on your personal preferences and needs.

Neither the Voyager 855 nor the Pulsar 590A listed my current cell phone, a Samsung Juke (SCH-u470) that doubles as an mp3 player, as a compatible bluetooth phone. Samsung did not list either of these headsets as compatible. Despite those omissions by both companies, both headsets easily connected (the term used for connecting bluetooth devices is "paired") with my phone, and neither needed the indicated code to pair up.

For stereo listening, bluetooth devices must support the Bluetooth Audio Distribution Profile (A2DP). Devices that do not support the A2DP profile must use the Plantronics universal adapter to work wirelessly with these headsets. The adapter only comes with the Pulsar 590A. Also, bluetooth mobile phones with built-in MP3 must support the Bluetooth Audio Distribution Profile (A2DP) for stereo listening.

Used as a cell phone headset

Voyager 855

The Voyager 855 works either as a standard mono bluetooth headset, or as a stereo bluetooth headset.



This is an in-ear headset. To use it as a standard mono headset, you can either insert the primary unit in your ear or, if you need an over-the-ear hook to hold it in place, attach the provided hook. To use it as a stereo headset, the in-ear add-on is attached to a thin cord connected to it's own over-the-ear hook. There are also three different sized earbud adapters. I've tried all three sizes and haven't quite found the right size for one of my ears that I personally find comfortable. And if I fully set the earbud in my ear to "seal out the noise", I find that I hear myself echoing in my ear when I talk, as when one simply holds their hand flat over their ear and talks. But that's just me. You may not have this experience.

To answer an incoming call, you either extend the sliding boom on the primary unit so that the mic is closer to your mouth, or tap a button. Since my phone is also an mp3 player, I was happy to find that when I answered a call it paused the music, and resumed it when the call ended. The
sound was clear on phone calls using the unit as a mono headset, and was even more so when using the unit in stereo mode (probably because I was now listening in both ears). One issue that folks at the other end of the calls mentioned was when I was outdoors in breezy or windy weather they had trouble hearing me, so I found myself cupping my hand over the mic to block the wind, which helped. I've had this issue with wired headsets in the past.

Plantronics claims up to 7 hours talk time, 6 hours stereo listening time, 160 hours standby time from a single charge. I don't make/receive a lot of calls and have mostly used the Voyager 855 to listen to music. In that mode, I estimate that the claim of 6 hours of listening time before needing
to recharge is reasonably accurate. Unfortunately, the only way to determine the battery status is either to somehow notice a blinking red (hard to do when the unit is on your ear), or else you suddenly hear a series of beeps when the battery is really low. At that point, the battery dies soon afterwards and needs to be recharged.

In addition to the items mentioned above, the Voyager 855 comes with an AC charger and a pouch to hold the headset. The Voyager 855 does not come with a USB cable to charge the unit via your pc. Such a cable is available, however, for an extra charge. In my opinion, this cable should be included with the headset.

I will address music listening, and what happens if I get a call while listening to music after a basic review of the Pulsar 590A.

Pulsar 590A

The Pulsar 590A is more than an over-the-head stereo bluetooth headset. It can also be used as a wired headset or wired headphones.



With the provided universal bluetooth adapter, it can also be used to listen wirelessly to iPods and virtually any device with a headset/headphone out jack. And if that's not enough versatility, it also comes with an in-flight cable so you can listen to the music or movie on a plane. It also comes with a desktop charging stand, an AC charger, a travel case, and a USB charging cable.

The mic on this unit is a small tube that looks like a small fuse. It seems to be a glass tube, so some care is needed. I found it a little difficult to extend it initially, but it loosened up a bit over time. Other than that, the test results were comparable to the 800, including when I answered a call it paused the music, and resumed it when the call ended. In the case of this headset, however, you need to press a button to answer a call.

Extending the tube does not engage the phone-answer action.

For the Pulsar 590A, Plantronics claims up to 12 hours talk time, 10 hours stereo listening time, 130 hours standby time from a single charge.

Listening to music

The main reason I was interested in stereo bluetooth headsets was to listen to music on the mp3 player part of my cell phone. Headsets are not stereo systems, and mp3 files are not the same as full-fledged audio recordings intended for play on a real stereo system, and so such comparisons would be unfair. Comparisons to a high-quality headphone connected by wire to such a stereo system would also be an unfair comparison to wireless listening. So the only reasonable comparison for most listeners would be to compare the sound to an iPod and it's provided earphones. Both the Voyager 855 and the Pulsar 590A provided comparable sound quality to iPod earphones, and also to the wired headset that came with the cell phone. The Voyager 855 sounds best when inserted in the ear in a manner that blocks out outside sound.

As mentioned earlier, though, the Pulsar 590A comes with some extra tricks. One is the ability to use it as a standard wired headphone. The provided cable comes with a 3.5mm plug - the size used on iPods and personal computers and such. With a separately purchased stereo phono-plug adapter from such stores as Radio Shack or amazon, it can also be used as a wired headphone on a real stereo system. I did connect it this way, and although it did not measure up to my high-end headphones, it provided very nice sound. I then tried out the Universal Bluetooth Adapter, attached to my stereo system. It was quite a treat to be able to walk around without wires and listen to my stereo, and the sound was very nice. I was able to set up my stereo to play both through the systems speakers and through the headphone jack that the adapter was connected to (via my 3.5mm to phono plug adapter) and discovered that there is a delay in getting the signal to the headset. It was like being in a stadium where the announcers voice echoes. I also connected the Universal Bluetooth Adapter to an iPod and enjoyed wireless listening that way too. I was also able to pair the Voyager 855 headset to the Universal Bluetooth Adapter.

Other features

With both headsets you can raise and lower volume. I was able to skip forward and back on the tracks on my mp3 phone and mute and pause with both headsets. I have not been on a plane in while, so I was unable to test the in-flight option with the Pulsar 590A.

In conclusion

All in all, I was impressed with both headsets. They both met my needs for stereo listening and making/receiving phone calls on my cell phone/mp3 player. The Pulsar 590A had many more options.

The Plantronics Voyager 855 Stereo Bluetooth Headset is an in-ear headset, and can be used either as a mono headset or a stereo headset.

The Pulsar 590A with Universal Bluetooth Adapter, is a stereo over-the-head headset.

The Voyager 855 lists for $149.95, while the Pulsar 590A lists for $249.95. Each can be found for about half those amounts at places like amazon.

More information about these and other Plantronics headsets can be found at the Plantronics website, http://plantronics.com.

Labels: , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

October 04, 2008

Review: NXPowerLite Revisited

Richard Kuper
The Kuper Report
http://thekuperreport.com/

Back in July 2006 I reviewed a product called NXPowerLite, the file compression software developed by British company Neuxpower Solutions Ltd., that did some serious shrinking of powerpoint files. The product has expanded its capabilities since then and can now compress Word and Excel files as well.

Back in 2006 I reported that NXPowerLite was able to shrink some of my PowerPoint files by up to 77%. I went back and used a more recent version of NXPowerLite and got similar results to those reported in my previous review. Now that the product also shrinks Word and Excel files, I went in search of some large files. I don't use Excel much these days, and so I didn't have any files that needed shrinking. I did, however, have a few Word files I could try, and I did. In some cases I got minimal shrinkage, but with one very large file (16.3MB) containing lots of text and embedded graphics and documents, NXPowerLite reduced it to 5.1MB, or to less than 1/3 of its original size using "normal" compression, and it shrank it down to 4.5MB with "extra compression." Amazing.

Even more amazing, the price is still only $45 for a single copy, and less if you get multiple copies. It is also available in a server edition.

NXPowerLite even received NATO accreditation after being successfully deployed by Headquarters Allied Rapid Reaction Corps (HQ ARRC) for a demanding military campaign in Afghanistan.

Are you looking for a product that will enable you to carry around many more of your files on your usb drive? Perhaps you need to shrink that file so you can send it in an email? Maybe you need more space on your hard drive and wish you could just shrink some of your larger PowerPoint, Word, or Excel files. If you need to shrink your files for any reason at all,
NXPowerLite is the product for you.

Labels: , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

August 30, 2008

Safe Computing Tips

Richard Kuper
The Kuper Report
http://TheKuperReport.com

********************************************************
NOTE:
This article was originally posted August 8, 2007 but is still relevant,
and so we are reposting it now.
********************************************************

If someone is truly determined to hack into your computer or your emails and they have the tools and knowhow, then they will probably succeed. But you can make it harder for them to do so. Unless it is the government. On Monday, President George W. Bush signed into law an expansion of the Foreign Intelligence Surveillance Act (FISA), giving government expanded rights to intercept phone calls and e-mails without warrants.

You can protect your computer by installing a suite of protection products. One such product, Grisoft's AVG Internet Security Suite has previously been reviewed. (See the original review here and the follow-up here.)


Such suites provide protection from spyware and viruses and a variety of other malware. That would be an excellent first step. And of course be sure to keep it up to date and proactive.

Be very careful what emails you choose to open, and set your email to hide graphics by default. If you are confident that a particular email is from a trusted source, you can always activate the graphics for that individual email as you are viewing it. Turning off graphics in email is a simple way to prevent a lot of the newer means of introducing malware to your computer that just might start capturing everything you do, including all your passwords.

Be very careful about clicking on links, especially in emails that look like they came from your financial institution. The safest way to deal with your financial institution online is to not click on links in emails, but instead go to their website by entering their web address directly into your browser. Otherwise you may end up at a very good copy that looks like your financial institution's website but is instead a rogue site that will collect all the information you type and then will use it to potentially steal your identity, or at least order lots of stuff in your name billed to you but shipped somewhere else.

When connecting to the internet, never do so from a computer id that has administrative rights except when absolutely necessary (e.g., to download and install new software that you purchase online from a reputable source). Being connected to the internet with administrative rights is akin to leaving your front door open while you are not at home and expecting no one will walk in andpotentially walk out with many of your valuables.

When creating passwords, try to use a combination of letters and numbers, and the longer the password the better. Of course, don't write it down and leave it by the computer or where someone could find it.

And if you really want secure communication in email, you need to be sending encrypted email. That's not as easy as all of the other suggestions above. It requires a means for encrypting by the sender and decrypting by the receiver, and the encryption/decryption codes can only be known by just those parties for it to truly be of value.

Does your cell phone have internet access? Then it can be hacked just as easily as your desktop or notebook computer.

One more thing. It does not matter what brand computer or cell phone you have. All are vulnerable.

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

June 21, 2008

Privacy & Security Watch: Diebold Summer Sale Offers Used Voting Machines

This also gets categorized under: "Who wants to steal the election?"

According to this article, Premier Election Solutions, formerly known as Diebold, makers of those easily hackable electronic voting machines, (just do an internet search on "hackable Diebold" if you doubt that statement), is "selling off everything from used touch-screen voting machines ($600/each) to ballot boxes ($1,000/each), voter and poll supervisor smart cards that are used to initiate voting on machines on election day ($2.00/each), and tamper-evident security seals ($0.15/each) that are supposed to protect machines from intruders."

Richard L. Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

Privacy & Security Watch: TJX Fires Employee for Disclosing Security Problems

As readers of this newletter know, TJX, the parent company of T.J. Maxx, Marshalls, and Home Goods stores, had a serious security breach over a long period of time. (See http://www.TheKuperReport.com/2007/03/stolen-data-from-tjx-tj-maxx-marshalls.html
and subsequent articles on this subject). Well, it seems they still haven't learned from their mistakes. According to this article, a young employee in a Lawrence, KS T.J. Maxx store tried, but failed to convince management that running their server in administrator mode and giving everyone id's with blank passwords was a very bad and insecure thing to do. So he anonymously posted about this lack of security to an online forum. TJX found out it was him and they fired him. No word on whether they address this serious security breach.

Richard L. Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 04, 2008

Updated: Privacy & Security Watch: Beware of fake emails appearing to be from the IRS


Richard Kuper
The Kuper Report
http://TheKuperReport.com

(Originally posted April 23, 2008)

I received the following email today. Beware! It is a fake!

===

From:
"Internal Revenue Service"
(the associated email address was: easytref [at] tax.ref.co.us)

Subject: Tax return (Message ID IRS-9438-2825)

A Secure Way to Receive Your Tax Return

After the last annual calculations of your fiscal activity we have
determined that you are eligible to receive a tax refund of $620.50.
Please submit the tax refund request and allow us 3-9 days in order
to process it.

A refund can be delayed for a variety of reasons.

For example submitting invalid records or applying after the deadline.

To access the form for your tax refund, please click here

Note: For security reasons, we will record your ip-address, the date
and time. Deliberate wrong inputs are criminally pursued and indicated.

Regards,

Internal Revenue Service

Copyright 2008, Internal Revenue Service U.S.A. All rights reserved.

===

Also note that the link (not included here) seems to point to a website for a boy scout troop in Virginia!

UPDATE:
Due to the hacking of that boy scout website, the ISP shut the site down.
Also, there are other scam emails out there regarding the Stimulus Rebate checks being sent out, also appearing to be from the IRS.

If you get any such scam emails, the best way to help the IRS track down the perpetrators is to first, if your email program has the option, choose "show all headers" or something similar. Then forward the email to the following address (and substitute the "[at]" with "@"):
phishing[at]irs.gov

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 05, 2008

Review: D-Link Powerline HD Network Starter Kit

Richard Kuper
The Kuper Report
http://TheKuperReport.com



As you might have surmised by the name of this product, it uses your electric power line. This kit comes with two DHP-300 Ethernet Adapter devices, two ethernet cables, a quick install guide, and, of course, a CD. Additional DHP-300 Ethernet Adapters can be purchased separately.

Setup is very simple. Follow the provided instructions (not my summary here) for the correct order of steps and specifics.

My goal was to be able to connect a notebook PC to the internet at the same speed as the desktop pc in a different room. I plugged one of the units into an outlet and connected it via a provided ethernet cable to my router. I plugged the other one into the outlet in the room near where I wanted to connect the notebook PC. I followed the onscreen instructions in the order instructed, including encryption information. Once I was done, I connected the other provided ethernet cable to the unit in the other room and connected it to the notebook pc. Within moments I was online and surfing away at the same speed as on the desktop pc via my cable modem.

You can also use the kit to set up a small network, or buy extra adapters to connect additional devices. According to the box, you can use the Powerline HD to "stream HD video and enjoy intense online gaming". And according to the website, "D-Link’s Powerline HD Ethernet Adapter is ideal for connecting an Ethernet-enabled digital media device such as a Tivo® or Slingbox™ to your network and the Internet."

Some things to note:

First, the ethernet adapters get very, very hot and stay that way, so be careful.

Second, for this to work, all the electric outlets in question need to be on the same self-contained grid. For most, this will not be an issue. However, if, for example, your had your home or office wired in such a way that the computer and such are on their own grid so that they are not affected by power issues in the rest of the office or home, then this won't work unless you run an extension cord or otherwise provide connection to that other grid so that the units are on the same grid.

If the caveats above are not an issue for you, and you want faster speed than wireless and a quick and easy way to set up a network or expand the number of pc's that can connect to the internet, then look into the D-Link Powerline Network Starter Kit.

Labels: , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

February 23, 2008

Privacy & Security Watch: Beware of fake emails appearing to be from a financial institution

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Your money and your identity are precious to you. You money and identity are also of great value to thieves. It is important to be extra vigilant, especially in emails and on the Internet, to protect both.

At the link below, you will find an example of one such real-looking communication, but it could just as easily have been set up to look like it was from whatever bank or financial institution you do business with.

Please note that in order ensure you that you are actually going to the real HSBC website indicated below (they provided this to warn their customers about this particular scam), I have not encoded the link. Please copy it and open a *new* web browser (or new tab), and paste it into your web address bar, and press ENTER. (If you do it on the same page that you are viewing this newsletter on you will need to hit the BACK button on your browser to get back here to read the rest of this article.)

Copy and paste this link to a new web page or new tab:
https://www.us.hsbc.com/1/2/3/personal/inside/securitysite/alerts/alert-1

As you saw if you followed the above instructions, someone was very creative and sophisticated. It looks real.

Remember that just because the text looks legitimate, if it is a live link that you can just click on, you need to verify that where the link is going is where the link claims to be going. I'll provide an example:

Click on the below link (which looks just like the link above):
https://www.us.hsbc.com/1/2/3/personal/inside/securitysite/alerts/alert-1

Other than the fact that the above is a link you can click on (try it - it will open in a new window), you cannot tell by looking at it that it will actually go somewhere else. And if I had created a fake HSBC-looking web page and pointed the link there, you might not have noticed at all because the resulting page would have looked just like an HSBC page (instead of taking you to ThisIsMyStore.com).

Now, move your mouse over the above link and right-click. You will get a list of options, one of which is "properties". Now click on "properties" and you will see that the link will actually take you to http://ThisIsMyStore.com and not to the secure HSBC page. This is an easy way to check where a link may actually be taking you. But note that the link displayed might still look kind-of legitimate, so it is always safest to go directly to your financial institution's website by
entering the proper web address yourself.

Labels: , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

January 17, 2008

Privacy and Security Watch: Backup Tape Missing With Personal information On About 650,000 Customers

Richard Kuper
The Kuper Report
http://TheKuperReport.com

According to this article, "Personal information on about 650,000 customers of J.C. Penney and up to 100 other retailers could be compromised after a computer tape went missing." About 150,000 of those missing records contained social security numbers. GE Money, part of General Electric Capital Corp., is the credit card operations for Penney's and the other retailers. They apparently discovered the tape was missing last October. There is no explanation in the article why this is first coming to light now. The tape was being stored at a warehouse run by Iron Mountain Inc.

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

December 17, 2007

Review: magicJack

Richard Kuper
The Kuper Report
http://TheKuperReport.com

magicJack

Are you looking for a way to reduce your phone bill to practically zero? Do you have a windows pc, running Windows XP or Vista (Mac version promised soon). Then you may wish to check out magicJack.

How it works
Basically, you need to have your pc on and you need to be logged in. Then you take magicJack, which looks like an oversized thumb drive with an exposed circuit board, and plug it into an available USB port. If you wish or need to, it comes with a USB extension cord if it's too crowded to plug the device in without it. But do be sure to plug it directly to a USB port and not to a USB extension port.

Then just wait for a minute or two, and answer any prompts you may get along the way, such as what area code you want and where you live (for 911). Then you are pretty much ready to start making calls for free to anywhere in the US and Canada. You can either plug a regular land-line phone into the magicJack, or else use a computer-connected headset. You will need to go into the menu and change the default to use the headset. Then you are ready to make calls. I was even able to use it to send a fax from a standard fax machine plugged into magicJack, but that option is not officially supported.

Want to call folks outside the US and Canada. Just have them get a magicJack and they will get a US-based phone number and then you can call each other for free.

It even works on PCs with USB 1.1 (it's just slower to set up and start up).

And you can take it with you and plug it into any pc and you will have the same phone number wherever you are. And your email will get notified that you have voice messages, and you can even listen to them online.

Some caveats
The instructions say not to have a cd or dvd playing when you plug in/set up magicJack. I also discovered that my backup program needed to be disabled during magicJack startup.

It works best if you are physically connected to the internet, by cable modem, or DSL, or T1 or such. I encountered some drops when I tried using it on a notebook connected wirelessly to the internet. Your experience may be better.

The product is still listed as being in beta.

And, of course, you need your pc to be on in order to use it.

Is it really free?
Well, almost. It costs around $40 to get one. That gets you one full year of use. After that, its about $20 a year. Yes, those are yearly figures, not monthly.

One last caveat
For security and backup, one should also maintain a real land-line phone number and standard phone that does not require electricity to operate. When there is a power outage, the computer won't work, and so neither would any internet phone from your cable company or magicJack.


Recommended
You can't beat the price, the sound quality is terrific, and it is really simple to use.

For more information and to order, go to http://magicJack.com

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

August 18, 2007

SpeechTEK 2007: August 21-23 in NYC

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Most major companies, and many small to mid-sized companies are using speech technology in many different ways. Are you using speech technology in your business? Should you be? And if you are, are you using it properly and effectively? Find out by attending SpeechTEK 2007 August 21-23 in NYC. Registration is also available the evening of August 20.

Who should attend?
* C-Level Executives
* Enterprise IT Decision Makers
* Telecom IT Decision Makers
* Customer Service Managers
* Call Center Professionals
* Speech Programmers/Developers
* Marketing Executives
* Voice User interface Designers
* Consumer Electronics Designers
* Internet Services Strategists
* Anyone Wishing to Learn More About Speech Technologies

More information can be found at http://SpeechTEK.com

Labels: , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

July 05, 2007

Is the iPhone hype leaving out some important details?

Richard Kuper
The Kuper Report
http://TheKuperReport.com

I've been randomly monitoring several different groups, some containing absolute early adopters, others containing a wider cross-section of business-minded folks. The early adopters love it, but still have some gripes, similar to those expressed by the major technology columnists in the print media. Others already have some issues. I am on a different cell network and am also no longer an early hardware adopter, having spent big bucks for things that either were replaced within a short period of time or disappeared entirely from the marketplace.

In any event, the most interesting detail I've learned so far is that, like the iPod, the battery in the iPhone is not consumer replaceable. You cannot get a spare battery or change it yourself. If the battery needs replacing, you need to send the iPhone to Apple for a replacement, leaving you without a phone/pda for an unknown period of time, unless you opt to rent one in the meantime or, perhaps in time, pay extra for some kind of coverage that will provide a loaner phone in the interim.

As far as I know, with iPods, you don't get back the same one you sent in, you get a refurbished replacement. I wonder if that will be the same model for the iPhone. I suspect that will cause some issues for folks who will first need to remember to back up everything on their iPhone before the battery dies, such as phone numbers and music and any customized preferences and whatever else they've chosen to store on it, and then when the replacement arrives reverse the process before being able to use the iPhone in the manner to which they have become accustomed.

It also seems that, except for the cool looking interface, most of the touted features are already available on other similar devices, and the software choices for other pda-type devices are extensive, while there are few or none for the iPhone.

I think I'll wait and see what the competition comes up with. And, hopefully, they won't follow the Apple model and make phones with non-replaceable batteries and then charge a small fortune for the phone and the battery replacement and leave you without a phone in the meantime.

Addendum:
The other unknown at the moment, if indeed you would get back a different iPhone than the one you sent in for a battery replacement, is what happens to the iPhone you send in for replacement and all of your data that is on it?

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

June 28, 2007

Update: AVG Internet Security Suite

Richard Kuper
The Kuper Report
http://TheKuperReport.com

In case you missed the earlier review of Grisoft's AVG Internet Security Suite, you can read it here.

Nowadays, many product vendors give you only one choice in purchasing their product: download it from their website. Well, that creates several issues. First, you must dedicate time and space for downloading the files that will then be used to actually install the product. If you want the install files to also be available on CD, in case your hard drive dies or the computer one day decides not to work anymore, then you need to create this CD yourself. This can be very time consuming and inconvenient, and for the less sophisticated user, something they just cannot do or are afraid to do. So when a company also is willing to continue to make their products available on CD for purchase, I applaud them and encourage them to continue to provide the choice.

Grisoft has released a retail version of the AVG Internet Security Suite on CD. Note, however, that the CD is the only item in the box. The only printed instructions (which are pasted onto the CD sleeve), are to insert the disk into the computer, and what to do if the disk does not automatically start. There is no printed user manual or quick reference guide. My recommendation to all vendors is to at least include a printed quick reference guide of the most common tasks one might perform using their product.

So if you want to get this recommended product that will help keep your computer protected from the various forms of malware out there (spam, viruses, spyware, etc.), you can purchase it either on a CD or you can download it directly. Just click on any of the Grisoft links in this article for the downloadable version or an occasional special deal that will include a CD. Otherwise, you can find the CD version at many retailers, such as some of the stores found at ThisIsMyStore.com.

Labels: , , , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 16, 2007

Privacy and Security Watch: IBM loses tapes with personal information on current and former employees

It seems even the great IBM can be affected by such problems as losing tapes containing social security numbers and other personal information on employees and retirees, along with records of customer transactions.

According to this article, "An outside vendor was transporting the tapes from one IBM facility to another on Feb. 23 when the tapes fell out of a contractor's vehicle in Westchester County, N.Y., not far from IBM headquarters in Armonk. IBM representatives went to the scene and couldn't find the tapes."

For some reason, only some of the missing tapes were encrypted.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 11, 2007

Home Entertainment Show May 11-13, 2007

The 2007 Home Entertainment Show is currently (through May 13) at the Grand Hyatt Hotel in NYC. Although it is called the "Home Entertainment" show, it would be more accurate to call it the "High End Audio Show With A Few Video Choices." The majority of products being demonstrated are not targeted to today's average consumer, whose modern-day audio/video system is comprised of compressed audio and video files,watched and listened to on a computer with computer speakers and maybe a sub-woofer.

Although some of the audio demonstrations were pleasing to the ear and in some cases more than pleasing, I had to quickly walk out of many of the rooms I walked into because the sound was so offensive. Many of the manufacturers and demonstrators apparently feel that they must play whatever they are demonstrating very loudly, and by doing so often present distorted sound that hurts the ears.

My recommendation to the manufacturers and demonstrators is to turn down the volume a bit, and try not to choose music choices that do a poor job of showing off your systems.

My recommendation to the show organizers is to rename the show to more accurately represent what is being presented. The products were, primarily, high end audio, not what most average consumers would consider purchasing when creating a home entertainment system. I would guess that the average consumer, when upgrading to a high definition TV for example, would either listen through the speakers provided with the TV, or, perhaps, simply buy whatever the store salesperson convinced them to buy to create surround sound. And for most, that would be just fine, because they either really can't hear the difference, or don't really care. That is not the audience this show is targeted to. There were, however, a few systems that were tied in with Windows Vista, for those who truly want to marry technology with high-end sound and video. And there was a product that you could connect to the internet that could broadcast internet radio to your stereo system - but the price tag was several times the cost of an average personal computer.

So if you are into high-end audio, or want to see what high-end is all about, then check out the show. More information can be found here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 10, 2007

Privacy and Security Watch: University of Missouri Hacked For Second Time This Year

According to this article, The University of Missouri has been hacked for the second time this year. The hacker gained access to the social security numbers of over 22,000 students and alumni through a Web page that was used "to make queries about the status of trouble reports to the university's computer help desk."

Back in January, there was a similar breach. In that case, "a hacker obtained the Social Security numbers of 1,220 university researchers, as well as personal passwords of as many as 2,500 people who used an online grant application system."

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 09, 2007

Court Permits Search of Personal Computer in Workplace

According to this article at findlaw.com, "a federal court has just held that an employee did not have a reasonable expectation of privacy in the personal computer he brought to work." It seems that because this employee and a co-worker otherwise had to share a common personal computer, this employee decided to bring in his own computer and connect it to his employer's system. The employer, in this case, was a city government. The employee made no effort to protect any information on his personal computer and left it on and in a public space -- even when he was not at his desk. This failure to password or otherwise protect and guard the personal information on his personal computer eventually led to the discovery of child pornography on his personal computer. That eventually led to the appellate court case that resulted in this decision.

As the article concludes, "if you want to maintain your privacy rights under the Constitution, you yourself must keep your private matters private."

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 05, 2007

Transportation Security Administration, a division of Homeland Security, loses hard drive with personal data on 100,000

According to an Associated Press report, "the Transportation Security Administration has lost a computer hard drive containing Social Security numbers, bank data and payroll information for about 100,000 employees."

The privacy and security of personal information is clearly not being addressed by government agencies, as previously reported in The Kuper Report and in various news reports over the years. This breach by a division of the Homeland Security Department is just the latest reported problem. As the Congress perhaps begins to address this problem in the private sector, it needs to also address this problem in the public sector. However, unless there are severe consequences for breaching the privacy, this problem will not end.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

May 01, 2007

There's More To Search Than Google!

* Do you only use one search tool (e.g., Google) when searching the web?

* Do you have difficulty finding what you are looking for whenever you do a search on the internet?

Then you'll want to attend this presentation for ideas and tips on how to find what you are looking for.

* Limited Seating *

** Door Prize **

More information and registration:

http://FindItSeminar.com

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

Review: MSGTAG Status - Version 2

When you send a letter via regular mail, you never really know if the recipient has received it. If you want to know, you add a return receipt, and the post office notifies you that the letter has been delivered. It's a pretty dependable system, with only an occasional glitch, but it requires the recipient to acknowledge receipt.

Most email products (except for most online email services) provide a return receipt request feature. Unlike postal mail return receipts, email return receipts can be ignored.

MSGTAG (http://msgtag.com) has created a service that it claims will notify the sender of the following:

* The message that has been received;
* The time that it was received;
* The time it was sent;
* The time elapsed between sending and receiving.

The recipient has no action to take, and won't even know that you are tracking that they have received it.

The website says the product will work with almost any email program, including Outlook, Outlook Express, Eudora, Pegasus, Netscape Mail and Incredimail. I do not use any of those. I use Mozilla Thunderbird for outgoing email. It took a little doing and guesswork, but I was able to get it to work.

You cannot use this product to track emails sent from any online email product, such as yahoo mail or hotmail or gmail. As stated on the MSGTAG website: "You need to be using an SMTP mail server, which almost every home computer uses." Also, MSGTAG will not work with an MS Exchange mail server.

Here, basically, are my findings:

MSGTAG will only report that an email has been received if the recipient is using an email client set to receive HTML mail. If the recipient has their email set to only accept text emails (the more secure option), or if they use text-only email clients, including some PDAs and mobile phones, then you will not receive any notice that the email has been received. It seems, however, that a significant number of computer users use HTML-rendering email clients and MSGTAG works for these recipients. The important note here, though, is that you cannot make the assumption that if you do not get a receipt, the email was not received.

There are three flavors of MSGTAG. The version tested is the full-featured version for $59.99, which includes:
* A handy dashboard for tracking receipts
* The ability to customize how the product tracks email receipts
* The ability to flag specific emails or domains to ignore if you send group mail and don't need all those receipts
* The ability to customize email footers
* An option to have recipients who are set up to receive text messages to have to acknowledge receipt - like the existing option in most emails.

There is a less featured version for $19.99 and there is also a free version that will send you an email every time a tagged message has been opened (subject to the limitations I described above).

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 26, 2007

Privacy and Security Watch: Lawmakers decry continued vulnerability of federal computers

Corporate computers are not the only ones being breached. The Federal Government (and state and local governments as well) are also not doing a good enough job of protecting the data from unauthorized access. In the case of the Federal Government, some of our lawmakers are finally waking up to this problem and speaking out about the issues. Read all about it here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

Privacy and Security Watch: Group calls for federal data security breach notification law

With the massive data breach of TJX (see various articles on TheKuperReport.com), several banks are suing TJX Companies Inc. over the data breach that "exposed at least 45.7 million credit and debit card holders to identity fraud." You can read more about that here.

Because of this and the many other breaches at other firms, the Cyber Security Industry Alliance (CSIA) is lobbying Congress to pass a law that will require companies that are breached to notify victims. Read all about it here.

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

April 08, 2007

Streaming Media East May 15-16, 2007 in NYC

Streaming Media East is celebrating it's 10th anniversary in 2007. The show covers video on the web along with the technology of streaming, downloading, Internet Television (IPTV), and mobile video delivery. The show will have more than 100 speakers from the media, broadcast, enterprise and education markets; over 50 exhibitors featuring hands-on-demos with the latest digital media audio and video technology; and keynotes from the leading digital media business executives.

For more information, click on the link below:




Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

March 22, 2007

Privacy and Security Watch: Stolen Data from TJX (T.J. Maxx, Marshalls and HomeGoods stores) since 2003 Used in $8M Scheme Before Breach Discovery

According to recent reports in eWeek (links below), massive amounts of data, dating back to 2003, were stolen from TJX (T.J. Maxx, Marshalls and HomeGoods stores) over an extended period of time, starting in 2005. The breach, or intrusion as TJX prefers to call it, was not discovered until December 2006.

This is just the latest story in the ongoing issue of data security. Companies need to get their acts together and ensure that they are protecting the personal and private data of their customers. It may be time for the government to step in and create financial incentives for companies to do this. Of course, the Federal government and many state and local governments are guilty of not protecting the personal and private data of its citizens either, so they would also have to fine themselves (not likely). So this problem will continue to be a major problem until the public starts making its voice heard and making this a priority for government and corporations to take more seriously.

Here are the links to the TJX story:

Stolen TJX Data Used in $8M Scheme Before Breach Discovery

TJX: Data Theft Began in 2005; Data Taken from 2003

Richard Kuper
The Kuper Report
http://TheKuperReport.com

Labels: , , , , , , , , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting

February 14, 2007

"Offshore-developed software projects have 2.8X as many bugs as average software projects"

Richard Kuper
The Kuper Report
http://TheKuperReport.com

At the NYC SPIN meeting last evening, Michael Mah of QSM Associates and the Cutter Consortium gave a very interesting presentation about extreme programming and productivity measurement. As he was wrapping up he provided some statistics regarding offshore outsourced projects.

An excellent write-up of this event has been published by Ed Yourdon, and I will not even try to improve on the work of such a distinguished writer ("Death March," "Byte Wars," the recent "Outsourcing: Competing in the Global Productivity Race," etc.). So instead I will direct you to his blog entry here:
"Offshore-developed software projects have 2.8X as many bugs as average software projects"

Labels: , , , , , , , ,




* [Please post your job openings here] *

ThisIsMyStore.com

FindJobsPostJobs.com CareerHotList.com
R.L. Kuper, Inc. - Management Consulting
























































































This page is powered by Blogger. Isn't yours?







Who links to me?