Miles Associates LLC

Jim Miles – IT & IT Security Consultant – Web Sites for Growing Organizations

Google Gives Search a Refresh – WSJ.com

To provide answers that arent already in Google’s ever-expanding database, the company will blend new semantic-search technology with its current system to better recognize the value of information on websites and figure out which ones to show in search results. It would do so by examining a Web page and identifying information about specific entities referenced on it, rather than only look for keywords.

via Google Gives Search a Refresh – WSJ.com.

Five Leadership Lessons From James T. Kirk

My favorite lesson from Captain Kirk:

2. Have Advisors With Different Worldviews

“One of the advantages of being a captain, Doctor, is being able to ask for advice without necessarily having to take it.”

via Five Leadership Lessons From James T. Kirk – Forbes.

Your Complete Guide to Facebook Timeline

Facebook has been rolling out Timeline slowly since December, after first introducing it at its F8 developer conference in September. The project is one of Facebooks most ambitious and significant redesigns to date, as it seeks to become your digital scrapbook with the capability to document your life from birth to present day, and revisit old posts more easily.

While not everyone is on board with Timeline, the switch is inevitable. Heres our complete guide to Facebook Timeline, from making the switch to adjusting your privacy settings, in order to make the transition easier.

via Your Complete Guide to Facebook Timeline.

“Someone tried to steal my identity” – CSO Mag

A cautionary tale regarding Facebook profile privacy:

Someone has spent the last three months trying to get prescription drugs using my name.I learned of this when I got home last night to a note on the kitchen table with a Salem, N.H. police officers name and number with a message to call him back.

Far as I can tell, he got the idea to use my identity from my Facebook page. I don’t give my address or year of birth, but I have had the day of birth on my profile. Given the mistakes the guy has made, it seems reasonable to connect it to my Facebook page. That doesn’t mean he didn’t get my information elsewhere, but it’s all I got at the moment.

I’ve since removed all birthday information, and feel rather stupid for letting that much information onto the profile to begin with.

via Someone tried to steal my identity.

You practice safe computing, so why do you still see malware?

…just being connected to the internet and using email or doing some web browsing especially if you do image searches is likely to expose you to this darker side of computing. Second, a number of these pieces of malware point to people becoming exposed to not infected by malware by visiting trusted web sites…

There are a few things you can do to mitigate these risks on any computer:

Read more of this post

iPad 2 vs. business class tablets

iPad2 is the gold standard, but Fujitsu Stylistic and GammaTech Durabook are strong contenders

Tech lovers have been flocking to the iPad 2 and other tablets in order to watch movies, read books, surf the Web and make video calls on the latest, greatest, thinnest, lightest, coolest devices. But where do tablets fit within the enterprise?

We tested 10 tablets to see which had the strongest set of business-related features… We focused on business-related features, such as business-oriented programs and apps, security components, developer programs poised towards the enterprise, and accessories targeting business use. We also looked at battery life and Java-based browser performance.

via Network World.

Bad Siri! She lets anyone use a locked iPhone 4S

Screen shot

The voice-activated feature on the new iPhone 4S will let anyone use the phone to send e-mails and text messages and make calls even if it is passcode locked….. There is an easy fix for this situation… In the Passcode Lock settings, switch Siri to “Off”.

via Bad Siri! Shell let anyone use a locked iPhone 4S | Security – CNET News.

Reduce Friction, Increase Happiness

Brenden Mulligan, entrepreneur:

There has been a reoccurring theme on my mind recently… It revolves around the goal of reducing friction.

Reduced friction in a product leads to less user frustration, high conversion, and overall user happiness. I’d like to use a few examples to illustrate what I mean.

I’m sure that “reducing the friction” involved in using IT and Security tools increases adoption and increases the effectiveness of the tool.  Do you have any good examples to share?

via Reduce Friction, Increase Happiness | TechCrunch.

What’s new in iOS 5

Since I am an iPhone user, articles like this are of great interest to me.  I would love to see comments from anyone who has done the upgrade…

Start here to learn the most useful new features and enhancements for your iPad or iPhone

iOS 5 has been out for a day now, and if you have a compatible iPhone, iPod Touch, or iPad, you’re probably still trying to get familiar with it… But if you want the quick summary of what’s new in iOS 5, read on.

via http://www.networkworld.com/news/2011/101311-whats-new-in-ios-5-251925.html.

Google hacking 2011

An interview with Johnny Long, “regarded as a leading authority on Google hacking. Between his speaking engagements and returning to Uganda, Long found time to straighten out my misperceptions”.

via Google hacking: It’s all about the dorks | TechRepublic.

%d bloggers like this: