Facebook is Becoming Less Personal and More Pro… jon mitchell Tags:#Social Web#web Let’s be grown up about this. Pinterest is an app for sharing lists of scrumptious-looking stuff. It’s not for girls or guys, it’s for people who like looking at things. The story I’ve heard is that it was designed for architects and designers and “then brides found it.” This is why, my sources explain, it tends toward the jewelry-and-table-settings end of the spectrum.But like on any social network, it just depends on whom you’re following. On Pinterest, you have fine-grained control over what pins appear in your feed. In fact, for all Google’s efforts to figure out how to control unwanted social stuff with Circles, I daresay they got it backwards. Pinterest is the reverse of Google+ circles, and it’s better for users.Pinterest has been around for a while, but lately it has caught on intensely. The statistics suggest that lots of women use it, but lots of non-women and businesses also use it. It’s inspiring blatant imitators, and Alexia Tsotsis even thinks that Google wants to buy it. Why all this interest all of a sudden? Pinterest is visually driven, which makes it easy and pleasurable to use, but I think its mechanics as a social network are more interesting than that. Related Posts The Dos and Don’ts of Brand Awareness Videos Guide to Performing Bulk Email Verification Facebook’s Smart Lists and Google+ Circles have popularized the idea that we need the ability to share different things with different audiences. That lets us have fun with some people and be boring with others without having to maintain two profiles. But neither of those networks offer much control for the person on the receiving end.Facebook’s News Feed algorithm is a bit of a magic soup. You can tell it you want more or fewer updates from certain things in certain situations, but for the most part, if they’re sharing it with you, you’re going to get it. Google+ lets you turn down the volume on your circles, so you can adjust the noisiness of groups you’re following, but the people in those circles are just sharing wherever they share. The recipient has to do her or his best to keep all the senders organized.Pinterest Is the Reverse of Circles But Pinterest nails the mechanics of this. On Pinterest, users create “boards” for different things they want to share. When you follow a person on Pinterest, you follow all their boards. You can also follow individual boards. If someone you like has a board for “desserts,” which you like, and a board for “spaceships,” which you love, but they also post to their “cute puppies” board all day long (and you hate puppies), the solution is simple: You unfollow “cute puppies,” and everything else remains.Both the pinner and the follower only have to think about their own tastes. They don’t have to guess what other people are like. People are more likely to enjoy themselves that way. Because hey, if Pinterest teaches us anything, it’s that we have impeccable taste.Do you use Pinterest? Do you need an invite? Let’s get some invite gifting going in the comments. A Comprehensive Guide to a Content Audit
Is there savings report that can be provided to management on using power save option? How can we prove to them that we used this many KW of power before and this is the usage after the changes and this is the saving in dollars…..is it possible through Intel/LANDesk combo…. We have LANDesk and vPro. What do we have to do to start using these features? Can we have Jessie’s email address – I am in the planning stage of implementing vPro and it would help if I can get some advice from him…. Response LANDesk supports all current versions of vPro. There are several manufacturers that provide vPro systems. We do not recommend one over another. It is best if you make the choice as to which manufacturer best meets your needs. The vPro implementation is similar across all. The best thing to do is go to the vPro Expert Center and look for the vPro LANDesk Quick Start Guide. That shows you what to do. You can also find demos on both the Intel and LANDesk websites. http://communities.intel.com/community/openportit/vproexpert/activation?view=all&tagSet=1025 Does LANDesk works on windows 7 Yes, in fact you can change from TLS to non TLS mode inside the LANDesk console What difference for at least power management would there be with using vPro to do it or the built in LANDesk functionality to control machines for example to power on a machine, patch it and then shut it back down? Sure! [email protected] 763-287-5490 Yes, the LANDesk solution supports Zero Touch Provisioning and other methods of provisioning clients for Enterprise and Small Business mode with or without TLS. In addition you can update BIOS versions through the LANDesk console. We use the OEMs flash tools and can schedule a job to remotely flash BIOS. Is LANDesk capable to activate vPro bios inside of common MB Bios? Especially HP notebooks have vPro Bios configuration disabled, and you have to do motherboard Bios change to enable “CTRL-P”. Can LANDesk do it remotely on “branded” PC??” What do you define as new PC configuration? What takes 5 minutes that used to take 90? Yes, PCs that are deployed in your environment can be provisioned via the LANDesk agent once you configure the infrastructure to support the remote provisioning (no physical touch). See the quick start guide for details. Is LANDesk as vPro provisioning server able to work without TLS or only with TLS? Regarding vPro manageability, not speaking about provisioning. Thanks. Otto. Yes, there is a quick start guide available on the Intel vPro Expert Center: http://communities.intel.com/docs/DOC-1381 The server side can be VM, absolutely. The client machines need to be physical hardware. 🙂 Not currently, but it will when Windows 7 ships or shortly thereafter Can the test lab be in VM HP would need to have a utility that allows you to change BIOS configurations remotely. Once vPro is enabled, you can use LANDesk to enter the BIOS remotely on reboot and edit BIOS settings. I know Lenovo has a tool that allows remote BIOS changes and this utility can be used with LANDesk technology to change BIOS settings remotely like enabling vPro ME in the BIOS. Activate Today! Realize ROI with Intel® vPro™ Technology and LANDesk is now available for viewing and downloadWe are hosting a series of ROI and activation webinars on Tech Republic; each one is focused on a specific management console – Symantec Altiris, Microsoft System Center Configuration Manager, and LANDesk.Join the team from the Intel vPro Expert Center for an informative Webcast on the ROI savings and activation process for PCs with Intel® vPro™ technology and LANDesk.This live TechRepublic Webcast, featuring Q&A, will be hosted by James Hilliard and feature special guest speakers from Intel Corporation, Jeff Marek, Director of End User Platform Engineering, Digital Office, and Jeff Torello, Staff Architect, Digital Office and Rich Williams, Director of Strategic Alliances, LANDesk. They will discuss the ROI possible with Intel vPro technology usage models activated, a review of the primary usage models supported by LANDesk, and an overview of the activation process using LANDesk. Question You cannot virtualize the vPro client as the vPro functionality is inside the chipset of the machine, not in the Operating System software. For a lab, there would be no benefit to virtualizing the client systems as you need physical machines in order to test the vPro features. Previously at any given time, there were usually 20% of the machines turned off and on weekends even higher. With ‘green’ initiatives, many companies are requiring most PCs to be turned off. However, to patch machines, LANDesk needs the PCs turned on. So they either have to be left on or be turned on remotely. The savings comes from being able to turn machines on to patch them and turn them back off. If they are on, LANDesk can patch them and then turn them off if the corporate policy allows this. I hope that addresses your question. Where is that inventory script to identify vPro capable computers? You can visit this site: click here Is this guide specific to vPro and LANDesk? Is LANDesk agent able to provision vPro Bios? LANDesk has a power savings estimation tool you can use to predict power savings. (http://pmdb.cadmusdev.com/powermanagement/quickCalc.html) There is a product that is part of the LANDesk management suite called LANDesk Power Manager that can assist with this. LANDesk uses its Unmanaged Device Discovery to find vPro machines. After a discovery of devices, vPro enabled systems will show up in the vPro system field and then you can drop an agent onto these machines. There are also reports and database queries you can run to show all vPro systems. Is LANDesk capable to overtake text boot screen and also keyboard remotely. Like press “F1″,”F2” etc… remotely We have customers who are using Intel vPro and LANDesk to image new machines. With certain hardware, these customers are using LANDesk to image those machines which used to take 90 minutes for the various steps, to just 5 to 10 minutes when the steps are automated. Yes. However, some key sequences do not work on certain systems due to BIOS issues. Note: As part of vPro Remote Boot Manager in LANDesk, you can enter a client’s BIOS during restart by checking a box and then remotely change settings in the BIOS via the LANDesk console Is there a step by step guide to configuring LD for vPro Have questions that aren’t covered here? Please post them in the Ask An Expert forum and we’ll get them answered for you. Are all AMT type computers considered vPro and how can I tell the management engine is enabled There are a few generations of AMT and the latest versions will qualify for the vPro logo. The latest versions are AMT 4 & 5. If you don’t need the additional features that were added in these versions, you can buy a version referred to as Intel Standard Manageability. So there are two versions to look for. The 2nd question about the management engine state. I’d suggest looking for a utility on the vPro Expert Center called iAMT Scan. This runs an application at the client called MEINFO and puts the info into the registry. You can then query the registry to see what version of the Management Engine (ME), its state – enabled or not, as well as versions of supporting software on the client. You need to provision the VPro config on the PC’s. Is there an easy way to do this for PC’s that are already in company? Yes, that is correct. If you’re looking for additional information on vPro, please see: http://www.intel.com/go/vproexpert How can we tell what machines are vPro capable in the ld console? What if I convert a vPro machine to virtual – will it still not work in vm environment… Is there a specific vPro client recommended when using LANDesk LANDesk with 8.8 sp2 using wol has power management features(setting policy, waking machines up and patch for example) so we are looking at that and I was wondering what benefit using vPro for that functionality would provide if any. In the LANDesk console when you check the wake up box as part of patch management or software distribution, LANDesk will automatically wake up a system via vPro first. Since vPro works over TCP/IP it is more reliable than Wake On LAN. After LD tries to wake up systems via vPro, it then automatically sends out a WOL packet. There are not separated check boxes inside LANDesk to send out vPro and WOL packets, the software does this automatically.
Meagan was on holiday in Hawaii, when she got this last message two weeks before Hughes’ death.A close friend of Phillip Hughes has made public the last text message he sent to her before he died in a Sydney hospital two days after getting hit by a cricket ball.Hughes had met Meagan Simpson, 26, three years ago in a Sydney pub and became good friends ever since. “We were at his favourite pub in Sydney, The Palace at Breakfast Point… he tried to pick me up and told me he was a banker. I didn’t know who he was at that point,” Meagan told Daily Mail.Meagan was on holiday in Hawaii, when she got this last message two weeks before Hughes’ death. After their first meeting at the pub, both of them bonded over late night phone calls, coffee and shopping trips. Meagan, who works as a sports coach for AFL team the Giants was probed by players in her team, about how she knew Hughes.Hughes had met Meagan Simpson, 26, three years ago in a Sydney pub and became good friends ever since. “They said ‘he’s an Australian cricketer’. I felt like a silly bugger. But that was him being humble,” Meagan said.”We had both been through pretty bad breakups; neither of us wanted to start anything new and didn’t want to hurt each other.”He said ‘I really want you in my life forever’ and we just became friends,” Meagan explained.Meagan is still to come to terms after the loss and said she still questions what Phillip saw in her that first night they met. She described Phillip as “the best friend anyone could ask for”.advertisement”He was always there when you needed him and that says a lot when someone is so famous and when he has so many other things going on. Whenever I needed him he was there,” Meagan said.”He was cheeky and funny and always made you laugh. He just had a genuine interest in you and invested time into our friendship. I still don’t know how I got so lucky to have him as a friend; obviously he saw something in me, she added.
© 2018 The Associated Press. All rights reserved. Krebs, the top official in the department’s National Protection and Programs Directorate, noted in the letter that DHS lacks the equipment and funding to detect Stingrays even though their use by foreign governments “may threaten U.S. national and economic security.” The department did report its findings to “federal partners” Krebs did not name. That presumably includes the FBI.The CEO of ESD America, Les Goldsmith, said his company has a relationship with DHS but would not comment further.Legislators have been raising alarms about the use of Stingrays in the capital since at least 2014, when Goldsmith and other security-company researchers conducted public sweeps that located suspected unauthorized devices near the White House, the Supreme Court, the Commerce Department and the Pentagon, among other locations.The executive branch, however, has shied away from even discussing the subject.Aaron Turner, president of the mobile security consultancy Integricell, was among the experts who conducted the 2014 sweeps, in part to try to drum up business. Little has changed since, he said.Like other major world capitals, he said, Washington is awash in unauthorized interception devices. Foreign embassies have free rein because they are on sovereign soil.Every embassy “worth their salt” has a cell tower simulator installed, Turner said. They use them “to track interesting people that come toward their embassies.” The Russians’ equipment is so powerful it can track targets a mile away, he said. Shutting down rogue Stingrays is an expensive proposition that would require wireless network upgrades the industry has been loath to pay for, security experts say. It could also lead to conflict with U.S. intelligence and law enforcement.In addition to federal agencies, police departments use them in at least 25 states and the District of Columbia, according to the American Civil Liberties Union.Wyden said in a statement Tuesday that “leaving security to the phone companies has proven to be disastrous.” He added that the FCC has refused to hold the industry accountable “despite repeated warnings and clear evidence that our phone networks are being exploited by foreign governments and hackers.”After the 2014 news reports about Stingrays in Washington, Rep. Alan Grayson, D-Fla, wrote the FCC in alarm. In a reply, then-FCC chairman Tom Wheeler said the agency had created a task force to combat illicit and unauthorized use of the devices. In that letter, the FCC did not say it had identified such use itself, but cited media reports of the security sweeps.That task force appears to have accomplished little. A former adviser to Wheeler, Gigi Sohn, said there was no political will to tackle the issue against opposition from the intelligence community and local police forces that were using the devices “willy-nilly.””To the extent that there is a major problem here, it’s largely due to the FCC not doing its job,” said Laura Moy of the Center on Privacy and Technology at Georgetown University. The agency, she said, should be requiring wireless carriers to protect their networks from such security threats and “ensuring that anyone transmitting over licensed spectrum actually has a license to do it.”FCC spokesman Neil Grace, however, said the agency’s only role is “certifying” such devices to ensure they don’t interfere with other wireless communications, much the way it does with phones and Wi-Fi routers. This undated file photo provided by the U.S. Patent and Trademark Office shows the StingRay II, a cellular site simulator used for surveillance purposes manufactured by Harris Corporation, of Melbourne, Fla. The Department of Homeland Security says it has identified suspected rogue cell tower simulators in Washington. The suspected simulators, known popularly as Stingrays, were detected by a DHS contractor in early 2017 during a 90-day pilot. (U.S. Patent and Trademark Office via AP, File) More information: DHS letter to Sen. Ron Wyden: apne.ws/eJ7JipMDHS enclosure in letter to Sen. Ron Wyden: apne.ws/dBMPqWw This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. In this Nov. 28, 2017, file photo, Sen. Ron Wyden speaks during a committee hearing on Capitol Hill in Washington. TFor the first time, the U.S. government is publicly acknowledging the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages. In a March 26 letter to Wyden obtained by the Associated Press, the Department of Homeland Security acknowledged that it identified suspected unauthorized cell-site simulators in Washington last year. (AP Photo/Carolyn Kaster, File) The reply from DHS official Christopher Krebs noted that DHS had observed “anomalous activity” consistent with Stingrays in the Washington area. A DHS official who spoke on condition of anonymity because the letter has not been publicly released added that the devices were detected in a 90-day trial that began in January 2017 with equipment from a Las Vegas-based DHS contractor, ESD America . The use of what are known as cellphone-site simulators by foreign powers has long been a concern, but American intelligence and law enforcement agencies—which use such eavesdropping equipment themselves—have been silent on the issue until now.In a March 26 letter to Oregon Sen. Ron Wyden, the Department of Homeland Security acknowledged that last year it identified suspected unauthorized cell-site simulators in the nation’s capital. The agency said it had not determined the type of devices in use or who might have been operating them. Nor did it say how many it detected or where.The agency’s response, obtained by The Associated Press from Wyden’s office, suggests little has been done about such equipment, known popularly as Stingrays after a brand common among U.S. police departments. The Federal Communications Commission, which regulates the nation’s airwaves, formed a task force on the subject four years ago, but it never produced a report and no longer meets regularly.The devices work by tricking mobile devices into locking onto them instead of legitimate cell towers, revealing the exact location of a particular cellphone. More sophisticated versions can eavesdrop on calls by forcing phones to step down to older, unencrypted 2G wireless technology. Some attempt to plant malware.They can cost anywhere from $1,000 to about $200,000. They are commonly the size of a briefcase; some are as small as a cellphone. They can be placed in a car next to a government building. The most powerful can be deployed in low-flying aircraft.Thousands of members of the military, the NSA, the CIA, the FBI and the rest of the national-security apparatus live and work in the Washington area. The surveillance-savvy among them encrypt their phone and data communications and employ electronic countermeasures. But unsuspecting citizens could fall prey.Wyden, a Democrat, wrote DHS in November requesting information about unauthorized use of the cell-site simulators. What are cell site simulators? And how do they work? Citation: APNewsBreak: US suspects cellphone spying devices in DC (2018, April 3) retrieved 18 July 2019 from https://phys.org/news/2018-04-apnewsbreak-cellphone-spying-devices-dc.html In this April 30, 2015, file photo, a Capitol Hill staffer looks down at papers while on a cell phone while walking inside the Russell Senate Office Building on Capitol Hill in Washington. The Department of Homeland Security acknowledges detecting suspected cell tower simulators in Washington, D.C. These devices can track specific cell phones and even intercept or divert calls and text messages. (AP Photo/Jacquelyn Martin, File) Explore further For the first time, the U.S. government has publicly acknowledged the existence in Washington of what appear to be rogue devices that foreign spies and criminals could be using to track individual cellphones and intercept calls and messages.