Tag Archive for 2012

Never Check Email First Thing In The Morning

– Updated 03-18-12 – Science writer David Bradley on his blog ScienceText also recommends, “Avoid social networking and email first thing.” I know it works for me, I walk around and talk to staff before I get tangled up in the work everybody else wants me to do.

Never Check Email First Thing In The MorningSid Savara a widely regarded personal development trainer published 7 Reasons You Should Never Check Email First Thing In The Morning at his site sidsavara.com.

#1 – Ignorance Is Bliss … fully Productive – When it comes to email, ignorance is bliss. That’s why if you’ve got something important you want to make progress on, the author offers these four words for success:

SPAM computerDon’t check your email – As soon as you get in, work on something important for 30-45 minutes, and only then check your email. If you can stand it, wait even longer. The article suggests that as long as you’re ignorant of everything else that’s going on outside, you can concentrate on what you want to work on.

Any new information you get can cause you to get distracted.

#2 – It’s Not Your Todo ListMr. Savara you know what is most important for you to work on the first thing in the morning you should go ahead and do it! By checking email, you risk doing what someone else wants you to do. Or more bluntly, when you check your inbox, the emails you get are a to-do list someone else makes for you.

Who is in charge of your time – you, or the person emailing you?

Lack of Direction#3 – It’s An Excuse To Lack Direction – The author says that checking email is a low-priority activity and that you may be checking email first thing in the morning because your to-do list has gotten off track somewhere. He argues that when you don’t have a clear list of priorities, checking email becomes an urgent activity that you do at the expense of your important ones.

#4 – Reaction vs “Proaction” – When you check your email, you end up with more work to do – and because we’re in “check email” mode, we start replying to them at the expense of the task we were just working on. Rather than actively setting an agenda, email forces you to react to items as they come in – regardless of their true priority.

Mr. Savara says he prefers taking proactive actions. Work on the things that are important to you, regardless of whether they’re urgent or simply at the top of your inbox. Stop wasteful actions, and focus on productive actions instead.

social networking#5 – Searching For Excuses Blindly checking email (or Twitter, or Facebook, or any number iTime wasters) is usually just searching for an excuse to not do the work that must be done according to the author. Don’t fall into that trap. Don’t give yourself an out by checking your email for an excuse to fail. He urges, don’t check your email  – acknowledge the task you need to get done and do it.

Cross that bridge – it’s not going away.

#6 – There’s No Set Time Limit – Meetings get a bad rap for being a waste of time – but at least you usually know how long a meeting will last. But do you know how long you’re going to spend on email once you open your inbox, odds are you don’t know – or you’ll underestimate it.

The problem is, checking email only takes a minute but you can get sucked into follow-up activities that result from opening your email, and there’s no way of knowing how much time these will take. You have a set time limit for how many productive hours you have in a day don’t let email suck you in and cause you to devote more time to it than you can afford.

#7 – It Builds Expectation – A lot of people say, “But I have to check my email! People expect a response from me in the morning!” The author believes that there are some requests that need immediate responses, but they’re much less frequent than you might think.

TimeHe argues that people expect a response from you in the morning because you’ve always responded first thing in the morning and you’ve built that expectation. The more often you check email, the more often people will expect you to check it. Just stop checking it first thing in the morning, and people won’t expect it anymore.

Mr. Savara recommends the following email rules:

  • Only check if there is something specific you are looking for. Most important – don’t go fishing around. Check it with a specific plan, a specific email you’re looking for from a specific person.
  • Separate low-value emails via filters (“rules” in outlook) or separate email addresses so you don’t even see them in your inbox when you check
  • Set a time limit. Commit to checking for 5 minutes, just to look for that one piece of information – and have your exit strategy ready. Before you open your inbox, decide what you’ll do if 1) the email is there 2) the email isn’t there 3) the email is incomplete. Don’t be reactionary – proactively decide what action you will take based on the outcomes you expect.
Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Best Companies to Work For In Michigan – 2011

Best Companies to Work For In Michigan - 2011FORTUNE Magazine recently published the 100 Best Companies to Work For 2011. The magazine named three Michigan-based firms as some of the best companies to work for. They are:.

26. Plante & Moran
29. Quicken Loans
68. Stryker

Michiganrb-

So please note that none of these high-performing companies are car companies. I wrote about Michigan leading that nation in new tech jobs here.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Your Dog Can Run, But He Can’t Hide

Your Dog Can Run, But He Can't HideThere is a new pet-oriented Global Positioning Systems (GPS) on the market. The new GPS system now makes it possible to constantly track your best friend according to a report in MIT’s Technology Review. The GPS devices made just for pets are generally small enough to be attached to a dog or cat collar which allows Owners to track their furry companion’s every paw print in real-time.

GPSThe New Jersey Star-Ledger points out unlike microchips embedded in the skin of an animal which store identifying information, these devices aren’t invasive, and owners don’t have to wait for a stranger to find and bring their lost pet to an animal shelter to scan the chip.

“This could easily be a multi-million-dollar category,” David Lummis, a “pet market analyst,” at New York-based market research firm Packaged Facts, recently told the New Jersey Star-Ledger. Dog owners are now more “crazy” about their four-legged friends than ever. If the recession is any indication, Mr. Lummis told the paper that the $58 billion pet products industry has merely slowed a few percentage points during the recession.

tagg logoThat kind of consistent growth has attracted the attention of Qualcomm (QCOM) the biggest maker of mobile phone chips.  San Diego-based Snaptracs, a wholly-owned subsidiary of Qualcomm, has released Tagg the Pet Tracker.

The rechargeable Tagg device can be attached to a collar (provided it’s not a spiked or bejeweled one), plus a home base unit. Owners are able to set a virtual perimeter for the dog to wander. TR says a text message or email alert will be sent if Fido strays too far. The device has a battery life of some 30 days and is water-resistant; it’s intended for dogs (or cats) 10 pounds or heavier. The necessary hardware and one year of Verizon (VZ) service cost $200 according to Technology Review. The service costs $5 a month after that. It’s a small price to pay, Dave Vigil, president of Snaptracs told the paper, considering pets are becoming increasingly “like family members.” Users can also find their pets at any time through a computer or smartphone.

Jessie and WileyGPS giant Garmin (GRMN), has also entered the dog lo-jack market. The paper says the Olathe, Kansas-based company released the GTU 10 device, a 1.7-ounce gadget. Garmin users can also set up a perimeter and receive alerts, or track real-time from a mobile device or computer. The GTU 10 operates on AT&T‘s (T) wireless network and costs $200 for the first year and $50 a year after that.

Another competitor is Retriever. TR says Retriever has similar functions with virtual fences and alerts but adds a social networking element. Retriever will share Spot’s location with a friend, presumably so if your dog gets loose while you’re out-of-town, you can help steer the on-site rescue. To judge from its site, Retriever appears to not yet be on the market, nor is a projected price listed.

Technology Review also notes other products in this niche. Global Pet Finder, is not available any more on Amazon (AMZN) as of this article. The SpotLight device costs $169.99 and is limited to T-Mobile coverage. SpotLight costs $179.88 per year for a subscription. The Love My Pets device and 1-year subscription cost $189.95 use the Sprint (S) network. The Love My Pets system costs $14.95 per month for a subscription according to a CSR.

rb-

Qualcomm’s goal is to encourage new uses of its radio chips, not to make a hit product. These products are part of the Internet of Things. As the Apple (AAPL) iPod and iPhone have shown, people are willing to shell out a lot of cash for things, but it is in the services where the money is to be made on the Internet of Things. Content is still king.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

Tablet Info

The Tablet PC has long been a pet project for Microsoft founder Bill Gates, who showed the first Tablet PC prototype in 2000 at Comdex. Mr. Gates described the device, which featured input via stylus only, as an evolutionary step in PC functionality and usability. For the next ten years leading up to CEO Steve Ballmer‘s introduction of the new “slates”, which support Windows 7 touchscreen features, the company has tried to make the Tablet catch on but with little success according to PCWorld.

MSFT Office Coming To iPad Next Year – Report

Microsoft Office for the MacMicrosoft may be bringing Office to the iPad next year, according to a report in The Daily. The report cites unnamed sources and says that Microsoft (MSFT) will also update its version of Office for the Mac next year.

On a business level, it might make sense the Apple (AAPL) iPad is making inroads into the enterprise, and having some sort of Office client available for it would let Microsoft earn at least some money from these Apple invaders. It would also help make sure that Office 365 the company’s cloud-based business services would work on the iPad according to the BusinessInsider,

Microsoft might even do this at the risk of driving some enterprise customers to stick with iPads instead of adopting Windows 8 tablets. After all, Office and related back-end products have been driving Microsoft’s growth for the last year, while Windows sales have been pretty stagnant (I wrote about Office’s profitability here).

The BusinessInsider points out that Microsoft has NEVER released Office for the Mac in the same year (or before) Office for Windows. Microsoft is building Office 15 for Windows. It’s going to be a ton of work to revamp it to work with the Windows 8 tablet interface, or risk having it relegated to traditional PCs only (and having one less reason for customers to choose Windows 8 tablets). The Mac version of Office almost always comes a year after the Windows version. It COULD be different this time, but that would require a diversion of resources to a minority platform (the Mac still has less than 5% market share for personal computers).

Microsoft said through a spokesperson: “We already deliver Office on multiple platforms and devices and are committed to expanding in the future, but have nothing further to share today.”

BI says that expanding Office to the iPad is not crazy.

Related articles

Dell Streak Discontinued

DellThe Dell Streak 7 tablet won’t even get to turn one year old. The BusinessInsider noted that Dell (DELL) is pulling the plug on its unremarkable tablet, as indicated on its site.

This is only shortly after discontinuing the Dell Streak 5 as well.

BI recalled Walt Mossberg‘s February 2011 AllThingsD review of the tablet, he sums it all up with one sentence: “I found the compromises Dell made to get to that low price make it impossible for me to recommend the Streak 7.

rb-

I wrote about hardware companies abandoning the tablet market in 2012 here. Does this move make Dell a market leader?

Related articles

Proof That The PC Is Dying

Proof That The PC Is DyingThe BusinessInsider noted this excellent chart from Horace Dediu @asymco as proof that the PC is dying a slow, painful death. Mr. Dediu’s chart shows PC sales, including Google (GOOG) Android and Apple (AAPL) iOS devices, from the dawn of time to today.

As you can see, PC sales have started to go flat. Based on recent numbers from last quarter, they may have already hit their peak.

proof that the PC is dyingMeanwhile, Macs are gaining steady momentum while Android and iOS tablet devices are blowing up.

One thing BI thinks could break the trend is all those fancy new Ultrabooks displayed at CES. Those could give PC sales a major boost considering how cheap and efficient they are.

Related articles

Apple Sues Chinese Outfit for Heresy

Apple Sues Chinese Outfit for HeresyApple (AAPL) is suing a Chinese company for making graven idols of its founder Steve Jobs reports TechEye. Chinese company In Icons created an “eerily realistic” 12-inch action figure of Steve Jobs. TechEye says the model comes with the clothes and accessories such as the black faux turtleneck, blue jeans and sneakers. It was being sold in a box that looks like Walter Isaacson‘s “Steve Jobs” biography cover and comes with a chair, a “One More Thing…” backdrop, as well as two red apples, including one with a bite in it.

Apple sees this as an affront and has told In Icons that using Apple’s logo or products, or Jobs’ name or appearance, is a “criminal offense.” The article points out that the Pope and Elvis have similar deals on their merchandise.

But it is clear that its threat is going nowhere In Icons is not giving up.

Tandy Cheung, the entrepreneur behind In Icons told TechEye said that he was an Apple fanboy, and a lot of people like him want to have Jobs’ action figure. Cheung spoke with several lawyers from Hong Kong who told him that he wasn’t in violation unless he decided to brand any of his designs with Apple products or logos. He told IB Times that Steve Jobs was not an actor, he’s just a celebrity. There is no copyright protection for a normal person. Steve Jobs is not a product.

BuzzFeed updates that the promo pics from toy company In Icons might suggest that the late Apple co-founder comes with cool accessories, like an iPad tablet, but alas. For $99 all you get is the black turtleneck-clad 12” action figure, no assembly required. Due to U.S. release in late February.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.

QR Codes Can Put Users at Risk

-Updated 01-26-12- It was just a matter of time and now the Websense (WBSN) ThreatSeeker Network has started spotting spam messages that lead to URLs that use embedded QR codes. According to a report at Help Net Security, this is a clear evolution of traditional spammers towards targeting mobile technology. The spam email messages look like traditional pharmaceutical spam emails and contain a link to the Web site 2tag.nl. Once the 2tag.nl URL from the mail message is loaded in the browser, a QR code is displayed, along with the full URL. When the QR code is read by a QR reader, it automatically loads the spam URL.

QR Codes Can Put Users at RiskQuick Response codes (QR codes) are a “new” type of barcode that can be used for a variety of purposes tracking, ticketing, labeling of products, etc. They can be put anywhere, in magazines, buses, websites, TV, tickets, and on almost any object which they might want to learn more about.

QR codeHelp Net Security writes that when used for legitimate purposes, they make life easier for users. “All you need to ‘visualize such a code is a smartphone with a camera and a QR reader application to scan it – the code can direct you to websites or online videos, send text messages and e-mails, or launch apps,” point out BullGuard’s researchers.

Unfortunately, QR codes can just as easily be used to compromise users’ mobile devices. “Much like URL shortening services can be and are used maliciously because of the fact that they obscure the real target URL, QR codes can also be used for such deception,Joe Levy, CTO of Solera Networks told DarkReading. “QR codes … provide a direct link to other smartphone capabilities such as email, SMS, and application installation. So potential attack vectors extend beyond obscured URLs and browser exploits very nearly to the full suite of device capabilities.”

Mobile malwareThere are several ways attackers are already using malicious QR codes to perpetrate their scams. A recent attack via QR code “Attaging” took place in Russia and involved a Trojan disguised as a mobile app called Jimm. Once installed, “Jimm” sent a series of expensive text messages ($6 each), racking up unwanted charges.

On Apple (AAPL) iOS devices, hackers are sending users to websites that will jailbreak the device and install more malicious malware. Tomer Teller, security evangelist at Check Point Software Technologies, told DarkReading, “a user scans a barcode and is redirected to an unknown website … the user phone will be jailbroken and additional malware could be deployed (such as key loggers and GPS trackers).

Google AndroidOn the Google (GOOG) Android  … Criminals are redirecting users to download malicious applications. All a user needs to do is scan a barcode and it will redirect to a website that will download the Android Application” according to the article.

In addition, attackers are using QR codes to redirect users to fake websites for phishing. “A QR code will redirect to a fake Bank that will look exactly like your bank. Since most smartphone screens are small, a normal user may not see the difference and will type in his or her (information) and hand it to the attackers,” Teller says. According to Mobile Commerce News some apps, like the NeoReader from Neomedia, that collect personally identifiable information (PII). This information is then sent to third parties who mine the data and possibly resell it.

mobile QR based paymentThe trend to mobile QR-based payment systems from firms like LevelUp, Kuapay, and Paypal are developing will drive QR code malware forward Mr. Levy says. “As our mobile devices and our wallets continue to converge through such technologies as near field communications (NFC), Bump and QR, malware authors are bound to prefer these very direct paths to the money. After all, these devices and apps are well on the road to becoming our new currency.”

So how do you protect yourself and the data on your mobile?

  • Download an app that scans QR codes and barcodes and shows the URL to which the codes want to take you. “Only use QR code reader software that allows the user to confirm the action to be taken i.e. visit a website link,” Paul Henry, security and forensic analyst at Lumension told DarkReading. “If you do not know and trust the link, cancel the action.
  • Do not scan QR codes from random stickers on walls and similar surfaces. Help Net Security says scammers are counting on people to do that because they can’t curb their curiosity.
  • Consider installing a mobile security app on your device, especially if it runs the Android OS. “Android is an open platform, which means that its source code can be examined by criminals and exploited easily when they find a weakness in, say, the Android browser,” according to the article. “That’s why most malicious apps transmitted via QR codes target the Android-based smartphones.”

rb-

I am not a fan of QR codes they seem to take you to an advertisement. Most of the destinations are fluff at best and dangerous at worst. Now that they have become nearly ubiquitous, they present more risk than necessary. Avoid QR codes.

Related articles

 

Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedInFacebook, and Twitter. Email the Bach Seat here.