shadow

Best practices for eLearning

Preparation

The eLearning is held live or on-line in which what we would correctly call a virtual class or recorded, in self training. In the case of a virtual class, voice is broadcasted through an audioconference or via Skype and for a broadcast only, it would be done through WEBcast directly on the WEB. The WEB page of a training center could display a list of courses for the registered WEBconferences that in fact constitutes the resume of the programs for the customized training. In the chapter regarding the personalized coaching, the presence indicator with Skype allows to be informed of the accessibility of a colleague, to ask for the opinion and to ask, by clicking, to share with the person your screen, to consult over a document.

Progress

The array of Conferenceware functionalities can contribute to help the training and sharing. The PowerPoint presentation and the screen sharing to make a demonstration or display Word or Excel documents are the privileged tools. Several presenters may interact while on a training, like a pedagogue accompanied by a contents specialist, no matter where they might be. The presenter might transmit to the participants an image or a file, such as a reference document finally, to make it more dynamic, the presenter may propose a quiz that the participants answer and to which he/she could display the results.

Follow up

As a follow-up for a WEBconference course, the participants might be subjected to an exhaustive exam. To do so, we offer a poll service in order to easily configure a multiple choice questionnaire to evaluate the knowledge acquired. The display report allows, in itself, the supervision of the completion of the self training program for each employee. In fact, the recording of the courses, actually meaning their edition to eliminate the superfluous segments, allows the conservation and the timely broadcasting.

7 Things to Look for in a New Desktop PC

7 Things to Look for in a New Desktop PC If you're not a techie, buying hardware can be an arduous task. Use these tips for buying a machine that best suits your business needs.

Does your old clunker make wheezing noises when it boots up? Has your typing become faster than your computer? Tired of looking at the Windows hourglass for minutes at a time?

Perhaps it's time for a new desktop computer.

Computer manufacturers continue to struggle with weak business. Meanwhile, component manufacturers are making their goods smaller, faster and cheaper. The upshot: You can get a good deal on a powerful machine.

I can't recommend individual machines. They might not be on the market when you read this. Instead, let's go through the components that make up computers. Use these to help decide what you need.

Following are seven points to ponder before you buy:

The Microprocessor

This is one of the most expensive parts. Microprocessors for Windows machines are made by Intel and AMD. Those for Apples are made by IBM and Motorola. So here's my first piece of advice: Don't worry so much about who makes the chip. All four are good. For Windows machines, you have a choice of the AMD Athlon XP, the Intel Pentium 4 and the Intel Celeron, an economy chip. The Pentium 4 and Athlon XP are upper end chips. The fastest Pentium 4 runs at 3.2 Gigahertz — a very fast speed indeed. It's also very expensive. The comparable AMD chip, the 3200+, is slightly less expensive.

You may need these fire-breathers if you're doing lots of video editing. Ditto if you're working with computer-aided design or playing advanced games. Otherwise, look to chips running at 2.4 GHz to 2.6 GHz (or 2400+ to 2600+, in AMD-powered machines). They're cheaper, and they perform nearly as well as the top-end chips.

Intel's Celeron is a budget chip. If you do typical office duties and surf the web, you probably wouldn't notice the difference between a top-end Celeron and a Pentium 4 running at the same speed. But you could save some money.

Apple and AMD chips run at lower speeds than those made by Intel. AMD uses the + symbol, as in 3200+, to imply that its chips are faster than comparable Intel microprocessors, despite running more slowly. Indeed, tests often show that to be the case.

Apple claims that its top-end machines are faster than those running Windows. That is a matter of controversy; there are websites devoted to debunking Apple's claims. Apple's chips run at much lower speeds, so they are difficult to compare directly. If you're interested in an Apple computer, test one at a store, then test a Windows machine. Apple computers are more expensive than comparable Windows machines.

Both Apple and AMD have new 64-bit microprocessors. They can crunch twice as much data as 32-bit chips. But there are virtually no programs that take advantage of this power now. That will change in the future, but these expensive new chips don't offer as much value today.

The Operating System

Windows XP and Apple's OS X are also difficult to compare. But there's really no need. Both are stable and fast. You'll probably be satisfied with either.

Windows XP comes in two flavours: Home and Professional. Windows XP Professional has all of Home's goodies, plus some other stuff. Most of it is networking capability. Professional costs more.

But it does have some nice features. One is Remote Desktop, which allows you to access one computer from another. For instance, you could sign onto your office computer from home and check your email. It also allows you to encrypt files and folders.

Random Access Memory

You will need a minimum of 256 megabytes of memory. If you can afford it, get 512 MB. I'd go to one gigabyte for demanding applications, such as video editing. Memory is relatively inexpensive, so don't skimp.

Hard Drives are Big and Bigger

If you do a lot of video work, you need a big hard drive. Video files are huge. Hard drives at 200 to 250 GB are common and relatively inexpensive.

Otherwise, the gargantuan drives common today far outstrip the customer's needs. Even low-end machines today have 40 GB hard drives. You are unlikely to fill that. I recommend putting your extra money elsewhere.

The Video System

The video system sends the picture to the monitor. Many inexpensive computers use the main-system RAM to run video. The video processor is built into the motherboard (the main circuit board). This works, but is less desirable.

Better computers have a separate circuit board, called a video card. This includes the video processor and memory. For video cards, 64 MB of RAM is pretty standard. That's more than enough for day-to-day computing.

However, if you are doing video work or playing advanced games, get a card with 128 MB of RAM. Truly hardcore game players can get cards with 256 MB of RAM.

The Monitor

Do you need to buy a monitor? Most people get one without thinking. But monitors don't necessarily come with computers. Often, you can lower your cost by refusing the monitor. If you're satisfied with your current monitor, it should work OK with your new computer.

There are two basic types of monitor, as mentioned above: CRTs and flat-panels. CRTs are the cheaper option: I would not buy a CRT monitor that was less than 17 inches. Keep in mind that that measurement is diagonal, and includes a portion of the screen hidden behind the bezel. A 17-inch CRT will have a visible screen size of 16 inches or less.

Flat-panel monitors are far more expensive than CRTs. They come in two flavours: analogue and digital. Digital signals are produced natively by the computer; they do not need to be converted. Analogue signals are converted from digital by the video system. Some consider digital signals clearer.

CDs and DVDs

All computers come with optical drives — either CD or DVD. All but the very cheapest have burners. ("Burning" is the process of making a CD or DVD.) CD-RW burners are still the most common, but DVD burners are available on more expensive machines.

DVD is wildly popular, but remains troubled by incompatible standards. You're likely to see DVD+R/RW or DVD-R/RW on a computer. They are incompatible, but most players can handle R discs made on either. R means a disc can be recorded once. RW stands for rewriteable, meaning a disc can be recorded numerous times. DVD burners can also make CDs.

I recommend that you purchase a CD-RW, at least.

One final point: I hear from so many people wondering when the best time to buy a computer is. There will always be something faster, better, hotter, cooler, bigger or smaller coming. If you need a computer, buy one now.

Reverse Cell Phone Search

Tracking down the identity of an unknown caller is not as hard as you might think. Although you could find out the information you want for free, a lot of your success will depend on luck. It is far easier to get a membership at a private reverse cell phone directory because you are guaranteed to get what you want -- owner details, like name, address and wireless service carrier.

People need to lookup phone number details for a variety of reasons. Whether you are concerned about the kids your teenager has been hanging out with, or need to stop a very annoying prank caller, or even need to stop a harassing stalker, conducting a reverse cell phone trace is a very legitimate means of investigating a questionable person -- especially if you suspect your significant other may be cheating on you.

But again, in order to find out an unknown person's identity for free, you're going to have to be lucky. The only way you can find his or her private information is if they have willingly put it up on the Internet. That way, you can find it by doing a search with their phone number on the major search engines, like Google, Yahoo and MSN. Otherwise, your only option is to make a small investment with a real cell phone database that allows you to conduct reverse lookups on virtually any phone number.

The reason that you can't find cell phone details online for free is because of the transitory nature of a cell phone number's life span. People are always changing cell numbers, and as a result they are just too difficult to track on a consistent basis (for free). Maintaining an accurate and up-to-date cell phone database is simply too difficult and costs too much money for it to be available online for free. People are also worried about having their phone numbers out in the open for telemarketers to exploit, so the government has made it very difficult for people to uncover cell phone number details.

But don't worry, accurate and current reverse cell phone number lookup directories do exist and are very affordable. The best ones will allow you to purchase a lifetime membership for unlimited searches, or, if you don't feel the need for unlimited access, you can make a smaller investment for just one lookup. They will allow you to do a free preliminary search to see if the information you are seeking is available in their database, at which point you can decide whether or not you want to get it.

Woman’s search for a husband goes online

Finding a rich husband may be a bad business deal, or so an anonymous 25 year old woman was advised recently.

The woman, who posted an ad on the New York Craigslist.org was looking for advice on the best way to acquire a husband who made, at minimum, more than $500,000 a year.  This may seem like a large sum, but on Wall Street, where bankers can earn yearly bonuses of up to $10 million, an annual salary of more than a half of a million dollars, while not exactly common, is not unheard of, either.

“I know how that sounds,,” said the woman in her ad, “but keep in mind that a million a year is middle class in New York City, so I don’t think I’m overreaching at all. I dated a business man who makes average around 200-250, but that’s where I seem to hit a roadblock. $2350,00 won’t get me into Central Park West.”  The woman went on to describe herself as both “spectacularly beautiful,” and “superficial.”

The ad was answered by a so called “mystery banker” who claimed to fit the qualifications, and offered the anonymous woman some advice, after describing her proposition as “plain and simple a crappy business deal.”

“Your looks will fade,” he said, in an online response to her posting. “And my money will continue into perpetuity. . . in fact, it is very likely that my income increases but it is an absolute certainty that you won’t be getting any more beautiful!”

“So in economic terms,” he continued, “you are a depreciating asset and I am an earning asset. Let me explain, you’re 25 now and will likely stay pretty hot for the next 5 years, but less so each year. Then the fade begins in earnest. By 35 stick a fork in you!”

A report that a banker from JPMorgan Chase was responsible for the ad posting responses has been dismissed by the bank as “an error.”  According to Brian Marchiony, spokesman for JPMorgan Chase, a banker’s email signature became accidentally attached to the ad and responses when he forwarded them on to his friends.

A spokeswoman for Craigslist.org told the New York Times that the posting and responses, both of which have since been removed, “looked as if they were made sincerely.”

According to the InternetDatingGuide.com, 30% of all Americans have used an online matchmaking site or service in the past year.  10% of these people reported that posting ads on sites like Craigslist.org also figured into their online date seeking.

NewsFlash ! Frank Thomas leaves EDC GOLD

This week !

Classified Ads - (A directory of nothing but spam)

Much like a newspaper Classified Ad section, there are hundreds if not thousands of places online you can submit a “website promotional” classified Ad to promote your business. Unfortunately, the format of these things simply invites severe spamming as a few hundred webmasters out there will continuously spam each single Ad millions of times, sometimes daily, to the same directory!

You may have never seen one of these things because they are hidden away where human eyes would not likely go. They are most usually stumbled upon from the other side, when some scam artist sells a newbie an “Ad Blasting” or some similar ploy guaranteeing that the poor guy’s listing will be posted in thousands of different places.

On the bright side, such a listing is placed in a category so that any resulting traffic would be semi-targeted. Also, Ads are instantly posted to these automatic boards, so any traffic would be instant as well. But that’s where my enthusiasm ends. Since there are so many Ads coming in, yours will only stay on the top page for a few seconds, if that long. To my knowledge, no one has ever read one of those horrible, spammy ads and no one in their right mind ever will.

Search Engines avoid these locations like the plague and being found in them can actually HURT your Search Engine rankings! Quite likely, these listings will likely do more harm for your site than good. I highly recommend keeping your distance.

Outside the safe zone

Businesses around the world are being bombarded with sophisticated threats against their data and communications networks every day.

As enterprises invest heavily in fortifying their IT infrastructures and enforcing comprehensive and constantly upgraded security policies against malicious code attacks, another home-grown threat - the mobile workforce - is opening the floodgates to compromised enterprise data and corporate network contamination.

Though mobile working offers gains in commercial and operational value, enterprise security policies often stifle the effectiveness and productivity of mobile workforce devices.

Here we examine why best of breed softwares, in isolation, are not able to provide the mobile workforce and their laptops with the same high level security afforded to office based workers.

Two lines of defence in a protected corporate environment

Currently organisations anticipate, detect, and prevent threats from laptops attacks via a layered approach.

This is coupled with centralized, uncompromising IT policy which overrides an individual’s control over his/her own laptop.

As IT departments prioritise corporate IT governance, their primary method of effectively enforcing organizational security policies is by controlling all networking components.

When connecting to the Internet from within the corporate network, laptop users are protected by two lines of defence:

A comprehensive set of IT security appliances running secured and hardened Operating Systems, and security software including firewalls, Intrusion Prevention/Detection System, antivirus, antispyware, antispam, and content filtering, all of which are completely controlled by the respective corporate IT organization.

Personal firewall and antivirus software installed on the user’s laptop and controlled by the user.

In addition, when laptops are within the protective corporate environment, the organization’s IT department can exercise full and consistent control over (and visibility of) any device, which is a critical operational consideration. This means the IT team can:

consistently update respective laptops with data, policies, etc.

monitor the entire network effectively vis-?-vis the status of all network components.

Outside the safe zone

Once a laptop starts 'roaming' outside the enterprise governed network, the 2-line defence system no longer applies, as the laptop is essentially no longer protected by the corporate security appliances layer, and is exclusively dependent on the security software installed on the local operating system.

The roaming laptop is exposed to potential threats from nearby wireless and wireline devices (in hotels, business lounges, airports, WiFi at Internet Cafes, etc.).

These threats signify a danger far beyond the scope of the individual laptop, as intrusive code may proceed to use the laptop as a platform for breaching corporate security, once the laptop had returned to its base, and is connected to the network.

Relying solely on the best of breed software on the laptop is flawed due to:

Operating System Inherent Vulnerabilities - by definition, security software running on Windows is subject to inherent Windows vulnerabilities, effectively exposing personal firewall and antivirus applications to malicious content attacks.

Unknown Threats – the security software can only defend against known threats. By the time these threats are added to the knowledge base, it may be too late.

Immediate Damage - malicious content executes directly on the platform to be protected, rather than on a security appliance designed to filter the content and serve as a buffer.

Managing Security Level – making sure all the computers have installed the latest security updates and enforcing a unified security policy can be very difficult. When the computers themselves are at the frontline, these security weaknesses can be disastrous to the entire network. In other words, it’s “all or nothing”, either the entire network is secured or nothing is secured.

Consequently, many organizations adopt tough security policies prohibiting most wireless networking options (significantly limiting user productivity and remote computing freedom), or imposing strict, costly and difficult to enforce cleansing procedures for laptops that return from the “field”.

Best of breed software made mobile

A growing number of CSOs have decided to place computers behind a robust security gateway, usually a dedicated security appliance, to counteract the current weaknesses in laptop security.

Unlike PCs, these appliances are equipped with hardened operating systems that do not have security holes, “back-doors”, or unsecured layers. They are designed with a single purpose, to provide security.

The fact that these security appliances are hardware-based and not software-based provides the following advantages:

Cannot be uninstalled – security attacks often start by targeting the security software, and trying to uninstall it or to stop its activity.

Software-based security solutions, as any software program includes an uninstall option that can be targeted.

In contrast, appliance-based security cannot be uninstalled as it is hard coded into the hardware.

Non-writable memory - hardware-based solutions manage the memory in a restricted and controlled manner. Security appliances can prohibit access to its memory, providing greater protection against attacks on the security mechanism.

The use of hardware allows the combination of a comprehensive set of security solutions in a single device.

Hardware also allows the combination of best-of-breed enterprise-class solutions with proprietary developments working on both the lower and higher levels (e.g. packet and network level, application level etc.).

In addition, the well known tension between users and IT managers over their computing freedom can be overcome via hardware.

On one hand, users want to have complete freedom when using their computers, while on the other hand, IT managers try to enforce security policies (e.g. banning the use of P2P software).

By using a security appliance, IT managers solve the conflict between the user’s desire for computing freedom and the IT manager’s desire to control and enforce security policies.

With software, policy is part of the laptop or computer, whereas through an appliance security policy can be enforced outside the laptop and the user has complete freedom inside the safe computing environment.

In conclusion, to provide corporate level security for laptops operating outside the safe office environment, CSOs should consider layered security architecture on a hardware appliance.

A dedicated appliance can hold all of the best of breed security softwares, and is able to re-introduce the two lines of defense enjoyed by office based PCs.

By introducing a security gateway, should security be breached, the damage stops at the gateway.

Have You Made the Switch from Desktop to Laptop? What You Need to Know…

If you're one of the million who have given up bulky desktop computers altogether for the sleeker, lighter, more versatile laptop, there are a few things you should consider if you haven't already.

First, because they are portable and light, laptops aren't inherently as secure as desktop computers when it comes to theft.  And we're not just talking about coffee shops, airports, college campuses, and the passenger seats of cars (which is where most laptops tend to be stolen).  Even if you're in the practice of leaving your laptop on your desk when you go home for the evening, your risking theft should someone break into your office suite or if a door is left unlocked.  The first thing a thief would do is snatch up all the laptops.  They're valuable, they resell easily, and they're easy to remove undetected.

The answer to this problem is simple.  Attach a lockable laptop drawer to your desk.  We found high-quality models at Versa Tables for under $120.  Constructed of steel, these accessories bolt to the under side of almost any desk and allow for a laptop to be retracted under the desktop when not in use, and locked with a key.  The back of the drawer has an opening to allow the laptop to be plugged in and charging overnight.  While occupying your desk, simply pull the drawer out and use the laptop right there—it creates more space on your desk.

Second, back up your files.  Because laptops are mobile, they are at a higher risk of being dropped, kicked when your laptop case is sitting at your feet, or of having something spilled on them.  While the manufacturers of laptops are well aware of this, no piece of computerized machinery is indestructible.  Back up your files more often either by copying them onto a jump drive or by emailing them to yourself.

Third, be sure to have the necessary accessories at your fingertips.  We suggest an extra battery (kept charged), an approved extension cord, and outlet adapters if you plan to travel.  An additional USB cable is always good in case you need to plug into a printer and lightweight headphones will allow you to use your laptop anywhere (and still hear live streaming video or DVDs) while maintaining your privacy and without disturbing others.

The last thing you need to know is that ergonomically, laptops aren't as well-designed as your desktop computer probably was.  With desktops, most people now use keyboard trays that adjust to the comfortable tilt and height for the user and therefore, minimize the risk of Carpal Tunnel Syndrome and other conditions caused by repetitive motion.  Unfortunately, laptops pretty much just rest on your lap and if put on a desk, do not sit at the correct ergonomic height.  Experts predict that with the increased use of laptops, there will be an increase in repetitive motion symptoms and potentially disabling conditions like CTS.  A way to combat this is to use a laptop desk when working at home or the office.  Laptop desks, often referred to as 'Laptop Carts' because of their mobility, are available on the market.  Simply, they are height-adjustable carts designed to hold a laptop and allow the user to sit or stand while using them.  They don't provide the same ergonomic efficiency as a keyboard at a traditional desk, but they're better than flopping down on a sofa and sitting the laptop on your lap or having to reach up to type on the laptop keyboard at a regular desk.

Male Underwear will always help you to get noticed

There was a time when men used to live in jungles and caves. They used to wander here and there for food. Slowly and gradually men’s knowledge grew and gave them a dipper source to know them better. Men transformed themselves from the way of living naked and hide their lower parts with leaves. They were trying to find something better than this and at last they got male underwear, the next word to be naked.

Presently, men’s fashion has crossed all bars and moved its pace from wardrobe to ramp and modeling stage. You can catch your eyes to different style and color of male underwear that can fit your style and can make you a real male icon. The time is not only in the hands of women only; men have become more cautious about their outfits and well as inner. Every men unquestionably wants to have something unique and stylish as sexy as male underwear.

Now-a-days men have various options for their inner wear. If you want to wear good (http://www.1underwearstore.com/-male underwear)

then first thing that you have to keep on your mind is the material, quality, style and weather conditions. It is advisable to purchase cotton male underwear, as cotton does not irritate the skin. If you are thinking to wear underwear made of satin, lycra or any other fabric then find some those crotch should be made of cotton.

There are a wide variety of male underwear available now and if you are thinking to buy then choose the right one that can suit you good. Many men love to wear standard briefs when at work or at gym, while pumping muscles. But other prefers to wear boxer briefs, which they feel are really comfortable. Male underwear will always be in the trend and will always help you to get noticed.

Panama Vessel Registration

Panama's Ship Registry is number-one worldwide in popularity due to the ease of use and very low registration taxes and fees as compared to other countries throughout the world. Marine vessel registration in Panama is widely used by international shipping companies due to the numerous advantages.

At the time of registration all vessels must pay a one-time enrollment fee, based on a variable scale, plus a government fee. Registration of the bill of sale is $0.20 per net registered ton or fraction thereof, plus 20% surtax. Annual tax is $0.10 per net ton, plus other charges.

Liberal labor laws concerning Panama flag vessels are also an important consideration, and income earned on international shipping activities are specifically and expressly exempted from Panama income taxes.

Yacht Registration

It is possible to register recreational yachts in Panama. This has a different pricing structure than the ship registration described above. The registration certificate is issued for a two-year period, which is renewable after this period.

Applicable Registration Tariff:

* $1,500.00 - if owned by a foreigner

* $1,000.00 - if owned by a Panamanian (or a Panamanian corporation which is a nominal expense to arrange)

This tariff must also be paid upon renewal of the Registration.

Documents required for Registration:

1. Sale & Purchase Agreement, Bill of Sale - or if the yacht is newly built, then a Builder's Certificate

2. Power of Attorney

3. Deletion Certificate from previous registry (or Builder's Certificate if brand new)

Please note: you must also comply with the Radio Operator requirements, in order to register the yacht in Panama. If the yacht is more than 20 years old, then it will also be required to undergo a survey and safety

inspection.

Anonymous Yacht Ownership - What is done is the yacht is purchased in the name of the Panama bearer share corporation. The ownership of such a corporation is anonymous in that no ownership records are in any database or registry. Thus if the yacht is owned by the corporation which is anonymous, the yacht ownership is anonymous. The nominee directors and your law firm (us) can handle the transaction for you completing all paperwork. We can wrap additional layers around the boat by having the Panama Bearer Share Corporation owned by a Panama Private Interest Foundation which is also anonymous, yet controllable by you. There are a number of different strategies we can employ to keep the ownership of your vessel anonymous and confidential as a tool to protect you from kidnapping, extortion, criminals and to keep your affairs private in general. Panama excels in privacy. Unfortunately financing with conventional lenders does not work with anonymous ownership strategies. If you were wondering when it comes time to sell the boat you basically just sell the corporation which owns the boat leaving the boat ownership in tact. There is no requirement to report new owners of Panama corporations.

To learn more about Panama Corporations click here:

http://www.panamalaw.org/bearer_share_corperation.html

To learn more about Panama Foundations click here:

http://www.panamalaw.org/panama_foundations.html

Two Yacht-Based Panama Residency Visa Approaches

Because your yacht is owned by a Panama anonymous bearer share corporation and your investment is over $150,000, immediate residency is granted. You must have 3 full time Panamanian employees along with your company, which is easy to do with the standard minimal wage at $253 a month for crew members. This would be under the so called inversionista (business investor) program. However, if you invested $200,000 or more you could qualify under the solvencia economia propia program (person of means visa) and not even have the requirement of hiring at least three Panamanian crewman, since it can be easily argued that you are buying a home, albeit a moveable one. This latter probably would require investing in a full time moorage at a Panama port which would become your home away from home.

Full residency with a cedula is granted after one full year of holding the provisional residency card and after 5 years full citizenship is granted! (Click here for more details in our Panama residency section on these two visa classifications).