Posts Tagged ‘smartphones’
Buzz4Boomers
Staying focused is tough especially when you’re a home-based entrepreneur. I never realized how ADHD I was until I left the corporate office world where I had specific work hours , a defined job description and a list of specified daily tasks and responsibilities. Working solo, developing a business from scratch and being based at home leaves everything wide open and undefined. It’s wonderful, exciting and overwhelming. This blog by “Hello, My Name Is Scott” Ginsberg offers some useful advise:
http://www.hellomynameisblog.com/2011/02/how-to-focus-your-face-off.html
Adam Singer writes a digital marketing and PR blog called “Future Buzz”. Although his blog seems targeted at people in the Millenials and GenX’ers, it does contain advice that can be useful to entrepreneurial Boomers. For instance:
http://thefuturebuzz.com/2011/02/22/paid-promotional-tactics/?utm_source=feedburner&utm_medium=email&utm_campaign=Feed:+TheFutureBuzz+(The+Future+Buzz)
Boomer Authority is a web-based social network for Baby Boomers. The organization has a website named Boomer StrataGEMS which provides useful information like this:
http://www.boomerstratagems.net/2011/02/how-marketers-can-use-mobile-technology.html?utm_source=feedburner&utm_medium=twitter&utm_campaign=Feed:+Boomerstratagems+(Boomer|StrataGEMS™)&utm_co
Check them out and let me know what you think about these ideas. I’d also be interested to learn what types of information would be of most interest to you!
Smartphone Decisions
Eighteen months ago, I inherited my wife’s old BlackBerry and started using it when I was at a convention. Previously, I’d been using an old Nokia as a cellphone just to check messages and to make or receive an occasional call. I didn’t want the outside world to be able to access me during every moment of every day. However, it dawned on me that it would be much easier checking and sending emails from the Blackberry while at the convention rather than lugging around my laptop and searching for WiFi hotspots.
Now, of course, I’m constantly checking email for business and texting with my family. My Blackberry isn’t particularly adept at connecting me with websites and I don’t have the ability to access apps. It seems like it’s time for me to graduate to a more advanced phone.
Many of my friends seem very happy with their Droid smartphones and it does seem like the Droid is replacing the BlackBerry as the phone most favored by traditional business people. The iPhone is favored by creative types and, let’s face it, Apple has been brilliant at positioning the iPhone as the standard by which all other smartphones are judge and at generating all the industry buzz.
But I don’t like to be cavalier when making these kinds of decisions. We became AT&T wireless customers years ago due to an arrangement made by a former employer. Although we live near an airport and the cellphone service near our house is terrible, we haven’t had many problems with AT&T. I’m not sure that switching to Verizon would make much sense or that Verizon’s much vaunted superior service will continue when all those AT&T customers transfer over and clog up the Verizon network.
It seems like there’s a lot to consider and that’s why I found this recent article by Shelly Palmer useful.
http://www.shellypalmer.com/2011/02/how-to-switch-from-att-to-the-verizon-iphone-4/”>
2011 Web Threat Predictions
If you use a smartphone and especially if you’re an iPhone, iPad or Mac user, pay attention. I know, the folks at The Apple Store told you that you really don’t need anti-virus protection because Apple products are virus-proof. But that could soon change. Like squirrels trying to access the food in your bird feeder, hackers are apparently obsessed with cracking the Apple codes.
PC Magazine reports:
McAfee on Tuesday (12/28/10) released its list of threat predictions for 2011 and it highlighted things like URL shorteners, location-based services, Apple products, and Internet TV. McAfee on Tuesday released its list of threat predictions for 2011 and it highlighted things like URL shorteners, location-based services, Apple products, and Internet TV.
What else made McAfee’s threat list?
• Hacktivism: McAfee predicted a rise in the number of politically motivated cyber attacks. “More groups will repeat the WikiLeaks example,” McAfee said, though strategy will become more sophisticated and leverage social networks.
• Friendly Fire: McAfee predicted a rise in the use of malicious content disguised as e-mail from sources you know. “Signed” malware that imitates legitimate files will become more prevalent, and “friendly fire,” in which threats appear to come from your friends but in fact are viruses such as Koobface or VBMania, will continue to grow as an attack of choice by cybercriminals, McAfee said. This could go hand-in-hand with social network attacks, which could eventually overtake e-mail attacks.
• Botnets: McAfee Labs predicts that the recent merger of Zeus with SpyEye will produce more sophisticated bots due to improvements in bypassing security mechanisms and law enforcement monitoring. Additionally, McAfee Labs expects to see a significant botnet activity in the adoption of data-gathering and data-removal functionality, rather than the common use of sending spam.
You can read the entire PC Magazine article here:
http://www.pcmag.com/article2/0,2817,2374784,00.asp