preferential-lite
shadow

5 Super Wealth-Building Tips Pave the Way to Financial Freedom

There are so many things involved with building wealth that it would take much more than one article to explain it all. So, we've put together a simple five-step guide to help you get a great start in building wealth for a lifetime.

Step 1: Set Specific Goals

Goal setting is a task that can be easily put off - especially when you are extremely busy in day-to-day activities. However, goal setting is the first and one of the most important steps you'll take to achieve wealth. Set both short-term and long-term goals. Short-term goals may be daily, weekly and monthly goals. These should reveal where you would like to be financially by a certain time in the near future.

Long-term goals include the amount of wealth you would like to accumulate within a year, two years, or maybe even five or ten years. Both types of goals are necessary to build wealth. Without goals, you are wondering blindly with no care or thought of what's ahead. This pattern of life is sure to leave you empty-handed!

Step 2: Create a Business Plan

Every successful business from the past and today started with a plan. Your business plan should illustrate where you are now, where you plan to be in the future, and how you're going to get there. Write these few notes down on paper. Then, fill in the blanks to create a rough business plan. It's easier than you think.

*Your current income

*Business profits and expenses (if you already own a business)

*Business budget (or personal budget if working for someone else)

*Capital needed upfront to promote and operate business

*Plans to acquire the capital needed (source of capital)

*Spending plan (promotions, supplies, inventory, online expenses, etc.)

*Expectations (What results do you expect from your initial efforts?)

Creating a business plan is a necessary step to build wealth through your own business. Even if you don't own a business, you should write down a similar plan to reach your personal wealth goals.

Step 3: Avoid Harmful Debt

Debt is the one of the key reasons many people never accumulate wealth. But remember, there are two types of debt: harmful debt and necessary debt. Harmful debt is the debt you create for things you do not need such as excessive shopping, luxury items, expensive cars that you can't afford, etc. Necessary debt is a debt most people must have to live, such as a mortgage, car loan (affordable), medical, college, etc. These debts are a part of life for most families and will be for many, many years. However, even these types of debts should be kept well within your income limitations. If you can only afford a $250/month car loan, then shop around until you find one at this price. Don't give in to the temptations and pressures to buy the fancier, more expensive car with a $450/month payment. It's not worth the risk!

You may ask, "I thought these steps were for building wealth?"

As it happens, debt is the opposite of wealth.  The more debt you have, the less wealth you will accumulate. You can't save money or invest money that belongs to someone else. If you earn $3,000 in income this month, but owe $2,000 in loans (before everyday living expenses), you can't possibly have extra money to save. You must either earn more or sell some items to pay off your debt. You should avoid this "debt trap" if you intend on building wealth for the future.

Another type of debt is one for your business. You may take out a small business loan to get things started or to promote your business. If you are uncertain about whether the business will bring profits, try to avoid business debt until you have tested it a while.

Step 4: Develop a Personal Plan

Above, you developed a business plan. Now it's time to create a personal plan. What tasks will you do daily to build wealth? Put yourself on a schedule and a strict budget. Work toward your goals daily by making a list of things to do and marking off each item on the list as you complete the tasks. In your budgeting, include a set amount of money you will put away in savings (savings account, IRA, stocks, bonds, etc.) If you plan to invest, be sure to diversify your investments. Choose only one or two high-risk investments and several "safer" investments such as mutual funds or bonds.

Step 5: Stay focused on the Goal, not the Circumstances

No matter what circumstances you find yourself in, keep your eyes on the wealth-building goal ahead. Even if sales are down in your business, don't stop dead in your tracks. Remember, businesses have ups and downs. If you remain steadfast toward your goal during the slow times, the busy times are bound to be much better than ever. Your income will grow and you will have the extra money needed to reach your wealth-building goals.

In a nutshell, building wealth does not happen over night with one get-rich-quick program. It happens with consistent labor toward the goals and tasks you have created. You can build wealth for your future if you do not waver from these basic truths that have worked for millions of others!

Generation Y’s At Work San Diego’s Search Engine Entrepreneurs

October 2, 2007. It’s a typical day at SEOhaus in the largest office located within the company’s 1400sqft. space, employees sit in a semi-circle around a cordless speaker phone.

"We need to really focus on improving our PR," a client says, his voice on speaker phone audible throughout the room.

"We can do that," one of the employees says, glancing down at the yellow legal pad on her lap. "Let’s come up with a solution."

Ten minutes later, when the meeting ends, the employees disperse to their respective offices, and the company’s owners, William Senn, 26, and William Canu, 25, take a short break from their hectic work schedules to share what it’s like being an entrepreneur under 30.

"We’re growing so fast," Canu says, leaning back in his office chair and glancing over his shoulder at the busy traffic below on Kettner Blvd. "It’s amazing."

The two Williams, who started SEOhaus from the proceeds of their last business venture's mail-order DVD rental service, have seen their company grow from a single room with two employees (themselves) to a small business with approximately ten full-time employees and growing. Next week, the company will move to a much larger office suite down the hall.

"We’re excited," says Senn, a former Google employee." The walls of the new office are being painted right now, and it (the move) is starting to feel official."

SEO, or Search Engine Optimization, is all about the art of achieving increased traffic, presence, and page rankings (i.e. higher search results) for a website, and this is achieved by a variety of different methods, including, but not limited to: building links, writing and marketing SEO content articles, social bookmarking, and web design.

"SEOhaus is a boutique firm," Senn explains, "We specialize in customized services, and our employees are very good at what they do."

SEOhaus and it’s twenty-something owners, represent a growing trend in American business: young entrepreneurs making an impact in their respective industries and developing successful businesses before their 30th birthday.

Their generation, known as Generation Y (1981-1995) is a generation of young entrepreneurs. The online publication Inc.com recently released the list of the "thirty coolest entrepreneurs under thirty," profiling individuals who began their own companies---some while still living in their parent’s houses, and have seen them grow exponentially in only a few short years.

The passion for graphic arts

Many people love what they do. I would like to talk about the passion for graphic arts. The persons who have worked for many years in the printing industry, the persons who had professional achievements in graphic arts certainly became fascinated by this field.

You can feel how passion envelops you when you start liking it: the smell of printing ink, the smell of glue in the folding box gluing machine, the sound of cylinders of printing presses, the sound of die-cutters.

You see an offer for a sheetfed printing machine and you remember how printers beat the sheets to prepare them for printing, how they adjust the inking with the help of ink level control devices for ink units, how they check the colour density of the raster.

When graphic arts are your life, you can read one of the many online books thinking how it would look like if it were a printed book. The cover would be laminated, bright or matt, or it could be UV varnished. You would feel the smell of the heated adhesive of the book back gluing and back lining machines, you would see how the folding machine brings the large printing sheets to the small book format, you would feel the smell of fresh print when you browse through a book that has just been taken out of the production line.

You go to the supermarket and while you put the products in the shopping basket you lean to read the label of the jam jar. You look carefully to see if it is printed only with process colours: Cyan, Magenta, Yellow, Black  and you wonder whether it is varnished or not. Is it flexographic or offset printing? How many colour groups had the printing machine? Was the ink ecologic or not?

In the morning, you buy a newspaper to read. You are immersed in the titles of articles, but after some pages, your fingers turn black. You are fascinated by the smell of fresh print, but some questions spin in your head. What type of ink did the persons who printed the newspaper use? Was the web press of coldset or heatset type?

You receive the phone bill at home and you notice every time how exquisitely is the logo of the phone company printed. How beautiful the printing is! What is the contribution of the printer and of the machine for printing envelopes?  The label is printed so beautifully so that you get easier over the value of the invoice in the envelope even if it is quite high.

When you buy a pack of medicines from the drugstore you can notice the metallic foil applied on the box and you remember the equipment that did it, you can hear the noise made by the die-cutting equipment, you can see the boxes on the band in the gluing machine.

You receive a magazine advertising several products at promotional prices and you notice that the raster is a bit loaded and the pictures are not clear enough. You wonder if it is due to the pre-press when files were processed or something happened in the printing press.

All these mean passion, being committed to the printing field. You start liking the printing industry so much that you want to share the feeling with other people. How could you do this better than via the internet?

What if it is a virtual world, what if you see a picture or some details from a printing press? You can still feel the smell of ink.

Best practices for eLearning

Preparation

The eLearning is held live or on-line in which what we would correctly call a virtual class or recorded, in self training. In the case of a virtual class, voice is broadcasted through an audioconference or via Skype and for a broadcast only, it would be done through WEBcast directly on the WEB. The WEB page of a training center could display a list of courses for the registered WEBconferences that in fact constitutes the resume of the programs for the customized training. In the chapter regarding the personalized coaching, the presence indicator with Skype allows to be informed of the accessibility of a colleague, to ask for the opinion and to ask, by clicking, to share with the person your screen, to consult over a document.

Progress

The array of Conferenceware functionalities can contribute to help the training and sharing. The PowerPoint presentation and the screen sharing to make a demonstration or display Word or Excel documents are the privileged tools. Several presenters may interact while on a training, like a pedagogue accompanied by a contents specialist, no matter where they might be. The presenter might transmit to the participants an image or a file, such as a reference document finally, to make it more dynamic, the presenter may propose a quiz that the participants answer and to which he/she could display the results.

Follow up

As a follow-up for a WEBconference course, the participants might be subjected to an exhaustive exam. To do so, we offer a poll service in order to easily configure a multiple choice questionnaire to evaluate the knowledge acquired. The display report allows, in itself, the supervision of the completion of the self training program for each employee. In fact, the recording of the courses, actually meaning their edition to eliminate the superfluous segments, allows the conservation and the timely broadcasting.

7 Things to Look for in a New Desktop PC

7 Things to Look for in a New Desktop PC If you're not a techie, buying hardware can be an arduous task. Use these tips for buying a machine that best suits your business needs.

Does your old clunker make wheezing noises when it boots up? Has your typing become faster than your computer? Tired of looking at the Windows hourglass for minutes at a time?

Perhaps it's time for a new desktop computer.

Computer manufacturers continue to struggle with weak business. Meanwhile, component manufacturers are making their goods smaller, faster and cheaper. The upshot: You can get a good deal on a powerful machine.

I can't recommend individual machines. They might not be on the market when you read this. Instead, let's go through the components that make up computers. Use these to help decide what you need.

Following are seven points to ponder before you buy:

The Microprocessor

This is one of the most expensive parts. Microprocessors for Windows machines are made by Intel and AMD. Those for Apples are made by IBM and Motorola. So here's my first piece of advice: Don't worry so much about who makes the chip. All four are good. For Windows machines, you have a choice of the AMD Athlon XP, the Intel Pentium 4 and the Intel Celeron, an economy chip. The Pentium 4 and Athlon XP are upper end chips. The fastest Pentium 4 runs at 3.2 Gigahertz — a very fast speed indeed. It's also very expensive. The comparable AMD chip, the 3200+, is slightly less expensive.

You may need these fire-breathers if you're doing lots of video editing. Ditto if you're working with computer-aided design or playing advanced games. Otherwise, look to chips running at 2.4 GHz to 2.6 GHz (or 2400+ to 2600+, in AMD-powered machines). They're cheaper, and they perform nearly as well as the top-end chips.

Intel's Celeron is a budget chip. If you do typical office duties and surf the web, you probably wouldn't notice the difference between a top-end Celeron and a Pentium 4 running at the same speed. But you could save some money.

Apple and AMD chips run at lower speeds than those made by Intel. AMD uses the + symbol, as in 3200+, to imply that its chips are faster than comparable Intel microprocessors, despite running more slowly. Indeed, tests often show that to be the case.

Apple claims that its top-end machines are faster than those running Windows. That is a matter of controversy; there are websites devoted to debunking Apple's claims. Apple's chips run at much lower speeds, so they are difficult to compare directly. If you're interested in an Apple computer, test one at a store, then test a Windows machine. Apple computers are more expensive than comparable Windows machines.

Both Apple and AMD have new 64-bit microprocessors. They can crunch twice as much data as 32-bit chips. But there are virtually no programs that take advantage of this power now. That will change in the future, but these expensive new chips don't offer as much value today.

The Operating System

Windows XP and Apple's OS X are also difficult to compare. But there's really no need. Both are stable and fast. You'll probably be satisfied with either.

Windows XP comes in two flavours: Home and Professional. Windows XP Professional has all of Home's goodies, plus some other stuff. Most of it is networking capability. Professional costs more.

But it does have some nice features. One is Remote Desktop, which allows you to access one computer from another. For instance, you could sign onto your office computer from home and check your email. It also allows you to encrypt files and folders.

Random Access Memory

You will need a minimum of 256 megabytes of memory. If you can afford it, get 512 MB. I'd go to one gigabyte for demanding applications, such as video editing. Memory is relatively inexpensive, so don't skimp.

Hard Drives are Big and Bigger

If you do a lot of video work, you need a big hard drive. Video files are huge. Hard drives at 200 to 250 GB are common and relatively inexpensive.

Otherwise, the gargantuan drives common today far outstrip the customer's needs. Even low-end machines today have 40 GB hard drives. You are unlikely to fill that. I recommend putting your extra money elsewhere.

The Video System

The video system sends the picture to the monitor. Many inexpensive computers use the main-system RAM to run video. The video processor is built into the motherboard (the main circuit board). This works, but is less desirable.

Better computers have a separate circuit board, called a video card. This includes the video processor and memory. For video cards, 64 MB of RAM is pretty standard. That's more than enough for day-to-day computing.

However, if you are doing video work or playing advanced games, get a card with 128 MB of RAM. Truly hardcore game players can get cards with 256 MB of RAM.

The Monitor

Do you need to buy a monitor? Most people get one without thinking. But monitors don't necessarily come with computers. Often, you can lower your cost by refusing the monitor. If you're satisfied with your current monitor, it should work OK with your new computer.

There are two basic types of monitor, as mentioned above: CRTs and flat-panels. CRTs are the cheaper option: I would not buy a CRT monitor that was less than 17 inches. Keep in mind that that measurement is diagonal, and includes a portion of the screen hidden behind the bezel. A 17-inch CRT will have a visible screen size of 16 inches or less.

Flat-panel monitors are far more expensive than CRTs. They come in two flavours: analogue and digital. Digital signals are produced natively by the computer; they do not need to be converted. Analogue signals are converted from digital by the video system. Some consider digital signals clearer.

CDs and DVDs

All computers come with optical drives — either CD or DVD. All but the very cheapest have burners. ("Burning" is the process of making a CD or DVD.) CD-RW burners are still the most common, but DVD burners are available on more expensive machines.

DVD is wildly popular, but remains troubled by incompatible standards. You're likely to see DVD+R/RW or DVD-R/RW on a computer. They are incompatible, but most players can handle R discs made on either. R means a disc can be recorded once. RW stands for rewriteable, meaning a disc can be recorded numerous times. DVD burners can also make CDs.

I recommend that you purchase a CD-RW, at least.

One final point: I hear from so many people wondering when the best time to buy a computer is. There will always be something faster, better, hotter, cooler, bigger or smaller coming. If you need a computer, buy one now.

Reverse Cell Phone Search

Tracking down the identity of an unknown caller is not as hard as you might think. Although you could find out the information you want for free, a lot of your success will depend on luck. It is far easier to get a membership at a private reverse cell phone directory because you are guaranteed to get what you want -- owner details, like name, address and wireless service carrier.

People need to lookup phone number details for a variety of reasons. Whether you are concerned about the kids your teenager has been hanging out with, or need to stop a very annoying prank caller, or even need to stop a harassing stalker, conducting a reverse cell phone trace is a very legitimate means of investigating a questionable person -- especially if you suspect your significant other may be cheating on you.

But again, in order to find out an unknown person's identity for free, you're going to have to be lucky. The only way you can find his or her private information is if they have willingly put it up on the Internet. That way, you can find it by doing a search with their phone number on the major search engines, like Google, Yahoo and MSN. Otherwise, your only option is to make a small investment with a real cell phone database that allows you to conduct reverse lookups on virtually any phone number.

The reason that you can't find cell phone details online for free is because of the transitory nature of a cell phone number's life span. People are always changing cell numbers, and as a result they are just too difficult to track on a consistent basis (for free). Maintaining an accurate and up-to-date cell phone database is simply too difficult and costs too much money for it to be available online for free. People are also worried about having their phone numbers out in the open for telemarketers to exploit, so the government has made it very difficult for people to uncover cell phone number details.

But don't worry, accurate and current reverse cell phone number lookup directories do exist and are very affordable. The best ones will allow you to purchase a lifetime membership for unlimited searches, or, if you don't feel the need for unlimited access, you can make a smaller investment for just one lookup. They will allow you to do a free preliminary search to see if the information you are seeking is available in their database, at which point you can decide whether or not you want to get it.

Woman’s search for a husband goes online

Finding a rich husband may be a bad business deal, or so an anonymous 25 year old woman was advised recently.

The woman, who posted an ad on the New York Craigslist.org was looking for advice on the best way to acquire a husband who made, at minimum, more than $500,000 a year.  This may seem like a large sum, but on Wall Street, where bankers can earn yearly bonuses of up to $10 million, an annual salary of more than a half of a million dollars, while not exactly common, is not unheard of, either.

“I know how that sounds,,” said the woman in her ad, “but keep in mind that a million a year is middle class in New York City, so I don’t think I’m overreaching at all. I dated a business man who makes average around 200-250, but that’s where I seem to hit a roadblock. $2350,00 won’t get me into Central Park West.”  The woman went on to describe herself as both “spectacularly beautiful,” and “superficial.”

The ad was answered by a so called “mystery banker” who claimed to fit the qualifications, and offered the anonymous woman some advice, after describing her proposition as “plain and simple a crappy business deal.”

“Your looks will fade,” he said, in an online response to her posting. “And my money will continue into perpetuity. . . in fact, it is very likely that my income increases but it is an absolute certainty that you won’t be getting any more beautiful!”

“So in economic terms,” he continued, “you are a depreciating asset and I am an earning asset. Let me explain, you’re 25 now and will likely stay pretty hot for the next 5 years, but less so each year. Then the fade begins in earnest. By 35 stick a fork in you!”

A report that a banker from JPMorgan Chase was responsible for the ad posting responses has been dismissed by the bank as “an error.”  According to Brian Marchiony, spokesman for JPMorgan Chase, a banker’s email signature became accidentally attached to the ad and responses when he forwarded them on to his friends.

A spokeswoman for Craigslist.org told the New York Times that the posting and responses, both of which have since been removed, “looked as if they were made sincerely.”

According to the InternetDatingGuide.com, 30% of all Americans have used an online matchmaking site or service in the past year.  10% of these people reported that posting ads on sites like Craigslist.org also figured into their online date seeking.

NewsFlash ! Frank Thomas leaves EDC GOLD

This week !

Classified Ads - (A directory of nothing but spam)

Much like a newspaper Classified Ad section, there are hundreds if not thousands of places online you can submit a “website promotional” classified Ad to promote your business. Unfortunately, the format of these things simply invites severe spamming as a few hundred webmasters out there will continuously spam each single Ad millions of times, sometimes daily, to the same directory!

You may have never seen one of these things because they are hidden away where human eyes would not likely go. They are most usually stumbled upon from the other side, when some scam artist sells a newbie an “Ad Blasting” or some similar ploy guaranteeing that the poor guy’s listing will be posted in thousands of different places.

On the bright side, such a listing is placed in a category so that any resulting traffic would be semi-targeted. Also, Ads are instantly posted to these automatic boards, so any traffic would be instant as well. But that’s where my enthusiasm ends. Since there are so many Ads coming in, yours will only stay on the top page for a few seconds, if that long. To my knowledge, no one has ever read one of those horrible, spammy ads and no one in their right mind ever will.

Search Engines avoid these locations like the plague and being found in them can actually HURT your Search Engine rankings! Quite likely, these listings will likely do more harm for your site than good. I highly recommend keeping your distance.

Outside the safe zone

Businesses around the world are being bombarded with sophisticated threats against their data and communications networks every day.

As enterprises invest heavily in fortifying their IT infrastructures and enforcing comprehensive and constantly upgraded security policies against malicious code attacks, another home-grown threat - the mobile workforce - is opening the floodgates to compromised enterprise data and corporate network contamination.

Though mobile working offers gains in commercial and operational value, enterprise security policies often stifle the effectiveness and productivity of mobile workforce devices.

Here we examine why best of breed softwares, in isolation, are not able to provide the mobile workforce and their laptops with the same high level security afforded to office based workers.

Two lines of defence in a protected corporate environment

Currently organisations anticipate, detect, and prevent threats from laptops attacks via a layered approach.

This is coupled with centralized, uncompromising IT policy which overrides an individual’s control over his/her own laptop.

As IT departments prioritise corporate IT governance, their primary method of effectively enforcing organizational security policies is by controlling all networking components.

When connecting to the Internet from within the corporate network, laptop users are protected by two lines of defence:

A comprehensive set of IT security appliances running secured and hardened Operating Systems, and security software including firewalls, Intrusion Prevention/Detection System, antivirus, antispyware, antispam, and content filtering, all of which are completely controlled by the respective corporate IT organization.

Personal firewall and antivirus software installed on the user’s laptop and controlled by the user.

In addition, when laptops are within the protective corporate environment, the organization’s IT department can exercise full and consistent control over (and visibility of) any device, which is a critical operational consideration. This means the IT team can:

consistently update respective laptops with data, policies, etc.

monitor the entire network effectively vis-?-vis the status of all network components.

Outside the safe zone

Once a laptop starts 'roaming' outside the enterprise governed network, the 2-line defence system no longer applies, as the laptop is essentially no longer protected by the corporate security appliances layer, and is exclusively dependent on the security software installed on the local operating system.

The roaming laptop is exposed to potential threats from nearby wireless and wireline devices (in hotels, business lounges, airports, WiFi at Internet Cafes, etc.).

These threats signify a danger far beyond the scope of the individual laptop, as intrusive code may proceed to use the laptop as a platform for breaching corporate security, once the laptop had returned to its base, and is connected to the network.

Relying solely on the best of breed software on the laptop is flawed due to:

Operating System Inherent Vulnerabilities - by definition, security software running on Windows is subject to inherent Windows vulnerabilities, effectively exposing personal firewall and antivirus applications to malicious content attacks.

Unknown Threats – the security software can only defend against known threats. By the time these threats are added to the knowledge base, it may be too late.

Immediate Damage - malicious content executes directly on the platform to be protected, rather than on a security appliance designed to filter the content and serve as a buffer.

Managing Security Level – making sure all the computers have installed the latest security updates and enforcing a unified security policy can be very difficult. When the computers themselves are at the frontline, these security weaknesses can be disastrous to the entire network. In other words, it’s “all or nothing”, either the entire network is secured or nothing is secured.

Consequently, many organizations adopt tough security policies prohibiting most wireless networking options (significantly limiting user productivity and remote computing freedom), or imposing strict, costly and difficult to enforce cleansing procedures for laptops that return from the “field”.

Best of breed software made mobile

A growing number of CSOs have decided to place computers behind a robust security gateway, usually a dedicated security appliance, to counteract the current weaknesses in laptop security.

Unlike PCs, these appliances are equipped with hardened operating systems that do not have security holes, “back-doors”, or unsecured layers. They are designed with a single purpose, to provide security.

The fact that these security appliances are hardware-based and not software-based provides the following advantages:

Cannot be uninstalled – security attacks often start by targeting the security software, and trying to uninstall it or to stop its activity.

Software-based security solutions, as any software program includes an uninstall option that can be targeted.

In contrast, appliance-based security cannot be uninstalled as it is hard coded into the hardware.

Non-writable memory - hardware-based solutions manage the memory in a restricted and controlled manner. Security appliances can prohibit access to its memory, providing greater protection against attacks on the security mechanism.

The use of hardware allows the combination of a comprehensive set of security solutions in a single device.

Hardware also allows the combination of best-of-breed enterprise-class solutions with proprietary developments working on both the lower and higher levels (e.g. packet and network level, application level etc.).

In addition, the well known tension between users and IT managers over their computing freedom can be overcome via hardware.

On one hand, users want to have complete freedom when using their computers, while on the other hand, IT managers try to enforce security policies (e.g. banning the use of P2P software).

By using a security appliance, IT managers solve the conflict between the user’s desire for computing freedom and the IT manager’s desire to control and enforce security policies.

With software, policy is part of the laptop or computer, whereas through an appliance security policy can be enforced outside the laptop and the user has complete freedom inside the safe computing environment.

In conclusion, to provide corporate level security for laptops operating outside the safe office environment, CSOs should consider layered security architecture on a hardware appliance.

A dedicated appliance can hold all of the best of breed security softwares, and is able to re-introduce the two lines of defense enjoyed by office based PCs.

By introducing a security gateway, should security be breached, the damage stops at the gateway.