Available Balance
What Are the Benefits of Magazine Advertising?

In the 21st century, advertising in print or in digital magazines may seem pointless. Television reaches millions more consumers. Advertising on your website costs less than on TV. And aren’t magazines folding left and right? In reality, the magazine industry, even in hard copy, is doing well. New magazines are constantly appearing, and a number of them succeed and thrive. Buying ad space may not be cheap, but it can be effective.

Narrow Focus

Cable TV has some niche channels, but magazines take specializing to the next level. Advertising in a magazine that caters to a niche audience of enthusiasts or professionals targets that audience very precisely.

Cigar Aficionado caters exclusively to cigar-smoking readers. Writer’s Digest readers are interested in anything that helps their writing careers. Crossties is the bible of the railroad crosstie industry. If a magazine serves your dream demographic, it could be a match made in heaven.

That said, magazines can’t target customers the way a direct mail or telemarketing campaign can. You’ll pay ad rates based on total readership, even if you’re only interested in some of the subscribers — the very wealthy, the very young, singles or gays, for instance. For a major magazine, that may not be worth the ad price.

Geographical Focus

The big guns of the magazine world are national: Cosmopolitan, People, Time, Reader’s Digest, Seventeen. Many other magazines cover a specific region, state or city. Durham Magazine. North Dakota Business. Nevada Magazine. If you’re targeting customers in a specific locale, you can advertise cheaper in an area magazine than a national one. People are often passionate about their local magazines, so you may gain credibility by hitching your wagon to their brand.

Safe and Comforting

The days when people could click on Internet advertising and not worry about viruses, phishing or other hacking attacks are long gone. This isn’t an issue with print ads. Just the fact you shelled out for an ad in an established publication gives you an aura of legitimacy. If your target market is a senior demographic, even better. They’re the consumers least likely to spend time online and the most comfortable with traditional media.

Shelf Life

An ad spot runs on TV, then it’s over. The same is true for radio. The daily paper gets thrown out. Magazines may sit on a coffee table for months, or in a doctor’s waiting room for months’ longer. After the buyer finishes reading the magazine, family members may read it, or they may give it to a friend or they may donate it to their local library. The ability to sell can continue long after you paid for the ad.

Rate This Content
Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
November 9, 2017

Cloud Computing Definition

NIST Definition of Cloud Computing

A good starting point for a definition of cloud computing is the definition issued by the U.S. National Institute of Standards and Technology (NIST) September, 2011. It starts with:

Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction. This cloud model is composed of five essential characteristics, three service models, and four deployment models. (The NIST Definition of Cloud Computing, SP800-145.pdf)

Before getting to the essential characteristics, service models, and deployment models of the cloud model mentioned at the end of the definition, let’s pause for a moment and consider this first part of the first sentence. It mentions a shared pool of configurable computing resources. This aspect of Cloud Computing is not new. In fact, it is fair to draw a direct line from time-sharing—that was initiated in the late 1950s and saw significant growth in the 1960s and 1970s—to today’s Cloud Computing. Adding to that, however, is the essential characteristic of Cloud Computing known as elasticity. The second part of the first sentence alludes to elasticity by stating there are computing resources … that can be rapidly provisioned and released with minimal management effort or service provider interaction. (We’ll get to service provider later.)

The end of the first sentence of the definition mentions a service provider. In Cloud Computing, the elastic computing resources are used to provide a service. It is unclear how rigorous we should view the term service in this definition. Nevertheless, Cloud Computing is very much involved with the software engineering term service. A service is the endpoint of a connection. Also, a service has some type of underlying computer system that supports the connection offered (in this case the elastic computing resources). See:

The NIST Definition of Cloud Computing lists five essential characteristics of Cloud Computing. It is reasonable to assume that missing any one of these essential characteristics means a service or computing capability cannot be considered as Cloud Computing.

  1. On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.
  2. Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).
  3. Resource pooling. The provider’s computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand. There is a sense of location independence in that the customer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter). Examples of resources include storage, processing, memory, and network bandwidth.
  4. Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be appropriated in any quantity at any time.
  5. Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Typically this is done on a pay-per-use or charge-per-use basis. Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.

So, Cloud Computing is measured, on-demand, elastic computing using pooled resources, usually on the Internet.

Next, the NIST Definition of Cloud Computing list three service models:

  1. Software as a Service (SaaS). The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web-based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.More on Software as a Service (SaaS)
  2. Platform as a Service (PaaS). The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages, libraries, services, and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application-hosting environment. More on Platform as a Service (PaaS).
  3. Infrastructure as a Service (IaaS). The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). More on Infrastructure as a Service (IaaS).

Although it is not part of the NIST Definition of Cloud Computing, Network as a Service (NaaS) is sometimes factored out of IaaS. See Network as a Service (NaaS).

These service models need illustrations an further discussion to make them easier to understand. You can find such illustrations and further discussion of these service models in Categories of Cloud Providers.

Finally, the NIST Defintion of Cloud Computing lists four deployment models:

  1. Private cloud. The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. More on Private Clouds.
  2. Community cloud. The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. More on Community Clouds.
  3. Public cloud. The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or government organization, or some combination of them. It exists on the premises of the cloud provider. More on Public Clouds.
  4. Hybrid cloud. The cloud infrastructure is a composition of two or more distinct cloud infrastructures (private, community, or public) that remain unique entities, but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load balancing between clouds). More on Hybrid Clouds.
Rate This Content
Looking for a job in social media? Here’s how to work towards it
May 25, 2017

Social Media is a mammoth recruiter when it comes to jobs. With countless start-ups and media companies blooming under the aura of today’s IT sector, there are great opportunities for employment. If you are looking for a job in social media you need to brush up some of your technical as well as communication skills to gain finesse.

“·Have a striking Resume- The foremost prerequisite for gaining an upper hand over others is to have an impressive resume in your kitty. Your resume should reflect creativity and management skills as the social media industry needs fresh talent and a strategic workforce.

“·Learn to work as a team- Technical and creative skills are important but the spirit of working as a team is equally important. Social Media requires a good amount of interactive skills that you’ll need to exercise every now and then to get your projects completed.

“·Hone your Vocal skills- Managing a company’s social media space requires a good hold on English language. You need to be in both written as well as verbal arenas to be able to communicate efficiently.

“·Technical Knowledge- More than rudimentary knowledge of social media and media tools, you need to have a thorough knowledge of media techniques and technical tools used in media systems. Analytic, monitoring, engagement and reporting tools are the essentials of a media system. Your skills should be vibrant and you must have practical knowledge of implementing these tools. There are a number of softwares in rage in the media industry these days. Make sure that you are well versed with the basic ones.
Take a little time to become skilled at the top social media tools and leading practices being used in modern business.

“·Build up measurable results- If you are looking for a social media job you will need to show how useful and productive you have been in the past. You should have some influential media strategies in mind whether or not you have previously worked upon them. It will considerably increase your chances of bagging the job if you have some successful results to show. If you have worked with websites, driven users from one social media platform to an e-commerce site, have been successful in motivating traffic towards a blog or a site, you’ll surely be having higher chances of getting recruited.
Results do matter and every executive running a media company wants analytics who can drive home quantifiable results.

“·Build a good online value for yourself- It is essential to have a noticeable online marketing strategy for yourself. Make sure that good things pop up when you are searched online! Build up a positive personal brand so that you get a good feedback on your presence on the web. Keep your social media profiles updated and be more professional with your virtual personality.

For all those who want a career in Social Media, there is a long road ahead. Marketing knowledge, creativity and a competitive spirit will take you a long way!

Rate This Content
Corporate governance of information technology
May 24, 2017

Information and technology (IT) governance is a subset discipline of corporate governance, focused on information and technology (IT) and its performance and risk management. The interest in IT governance is due to the ongoing need within organizations to focus value creation efforts on an organization’s strategic objectives and to better manage the performance of those responsible for creating this value in the best interest of all stakeholders. It has evolved from The Principles of Scientific Management, Total Quality Management and ISO 9001 Quality management system.

Historically, board-level executives deferred key IT decisions to the company’s IT management and business leaders. Short-term goals of those responsible for managing IT can be in conflict with the best interests of other stakeholders unless proper oversight is established. IT governance systematically involves everyone: board members, executive management, staff, customers, communities, investors and regulators. An IT Governance framework is used to identify, establish and link the mechanisms to oversee the use of information and related technology to create value and manage the risks associated with using information and technology.

Various definitions of IT governance exist. While in the business world the focus has been on managing performance and creating value, in the academic world the focus has been on “specifying the decision rights and an accountability framework to encourage desirable behavior in the use of IT.”[1]

The IT Governance Institute’s definition is: “… leadership, organizational structures and processes to ensure that the organisation’s IT sustains and extends the organisation’s strategies and objectives.”[2]

AS8015, the Australian Standard for Corporate Governance of Information and Communication Technology (ICT), defines Corporate Governance of ICT as “The system by which the current and future use of ICT is directed and controlled. It involves evaluating and directing the plans for the use of ICT to support the organisation and monitoring this use to achieve plans. It includes the strategy and policies for using ICT within an organisation.”
The discipline of information technology governance first emerged in 1993 as a derivative of corporate governance and deals primarily with the connection between an organisation’s strategic objectives, business goals and IT management within an organization. It highlights the importance of value creation and accountability for the use of information and related technology and establishes the responsibility of the governing body, rather than the chief information officer or business management.

The primary goals for information and technology (IT) governance are to (1) assure that the use of information and technology generate business value, (2) oversee management’s performance and (3) mitigate the risks associated with using information and technology. This can be done through board-level direction, implementing an organizational structure with well-defined accountability for decisions that impact on the successful achievement of strategic objectives and institutionalize good practices through organizing activities in processes with clearly defined process outcomes that can be linked to the organisation’s strategic objectives.

Following corporate governance failures in the 1980s, a number of countries established codes of corporate governance in the early 1990s:

Committee of Sponsoring Organizations of the Treadway Commission (USA)
Cadbury Report (UK)
King Report (South Africa).
As a result of these corporate governance efforts to better govern the leverage of corporate resources, specific attention was given to the role of information and the underpinning technology to support good corporate governance. It was soon recognized that information technology was not only an enabler of corporate governance, but as a resource, it was also a value creator that was in need of better governance.

In Australia, the AS8015 Corporate Governance of ICT was published in January 2005. It was fast-track adopted as ISO/IEC 38500 in May 2008.[3]

IT governance process enforces a direct link of IT resources & process to enterprise goals in line of strategy. There is a strong correlation between maturity curve of IT governance and overall effectiveness of IT.
IT governance is often confused with IT management, compliance and IT controls. The problem is increased by terms such as “governance, risk and compliance (GRC)” that establish a link between governance and compliance. The primary focus of IT governance is the stewardship of IT resources on behalf of various stakeholders whose ranking is established by the organisation’s governing body. A simple way to explain IT governance is: what is to be achieved from the leveraging of IT resources. While IT management is about “planning, organizing, directing and controlling the use of IT resources” (that is, the how), IT governance is about creating value for the stakeholders based on the direction given by those who govern. ISO 38500 has helped clarify IT governance by describing a model to be used by company directors.

While directors are responsible for this stewardship it is not unusual that will delegate this responsibility to management (business and IT) who are expected to develop the necessary capability to deliver the performance expected. Whilst managing risk and ensuring compliance are essential components of good governance, the primary focus is on delivering value and managing performance (i.e. “Governance, Value delivery and Performance management” (GVP)).
There are quite a few supporting references that may be useful guides to the implementation of information and technology (IT) governance. Some of them are:

AS8015-2005 Australian Standard for Corporate Governance of Information and Communication Technology. AS8015 was adopted as ISO/IEC 38500 in May 2008
ISO/IEC 38500:2008 Corporate governance of information technology,[4] (very closely based on AS8015-2005) provides a framework for effective governance of IT to assist those at the highest level of organizations to understand and fulfill their legal, regulatory, and ethical obligations in respect of their organizations’ use of IT. ISO/IEC 38500 is applicable to organizations from all sizes, including public and private companies, government entities, and not-for-profit organizations. This standard provides guiding principles for directors of organizations on the effective, efficient, and acceptable use of Information Technology (IT) within their organizations.
COBIT (Control Objectives for Information and related Technology) is regarded as the world’s leading IT governance and control framework. COBIT provides a reference model of 37 IT processes typically found in an organization. Each process is defined together with process inputs and outputs, key process activities, process objectives, performance measures and an elementary maturity model. ISACA published COBIT 5 in April 2012 as a “business framework for the governance and management of enterprise IT”. COBIT 5 consolidates COBIT4.1, Val IT and Risk IT into a single framework acting as an enterprise framework aligned and interoperable with TOGAF and ITIL.
Others include:

CMM – The Capability Maturity Model: focus on software engineering
Non-IT specific frameworks of use include:

The Balanced Scorecard (BSC) – method to assess an organization’s performance in many different areas
Six Sigma – Focus on quality assurance
The Open Group Architecture Framework (TOGAF) – methodology to align business and IT, resulting in useful projects and effective governance
Certified in the Governance of Enterprise Information Technology (CGEIT) is a certification created in 2007 by the Information Systems Audit and Control Association (ISACA). It is designed for experienced professionals, who can demonstrate 5 or more years experience, serving in a managing or advisory role focused on the governance and control of IT at an enterprise level. It also requires passing a 4-hour test, designed to evaluate an applicant’s understanding of enterprise IT management. The first examination was held in December 2008.

Rate This Content
May 22, 2017

In today’s networked world, the need for real time information has been increasingly important for most people and it is evident how social media was able to answer that.

If we backtrack over the past few years, we don’t actually have the luxury of getting important information on real time. But now, where do we get that news worthy stories? Where do we hear the entire buzz that is happening all over the world? The answer is in the conversations that we are having on Twitter, Facebook and all the other social clouds that we get into.

It is also prevalent in the business scene how Social Media is changing the world of internet marketing and how businesses are now looking into the concept of real time engagement. If we look into the old Internet Marketing standard, it used to be that the amount of attention you could generate depends on how big or small is your budget. The amount of exposure you could generate for your business was based on how much one could spend on ads. But today, the scale and media buying power is no longer an advantage for anyone in the new marketing scene. What’s so valuable for anyone in this new platform is how you can create a buzz over the web 2.0 space and how you instantly get involved with the conversations that are happening in real-time.

The concept of real time is that you have to be able to understand how instantly things are happening, how instantly news is breaking, how people are communicating and how you take advantage of the opportunity from those conversations. It is the idea that the quicker you are to react to something, the more likely it is beneficial to you.

Designate a dedicated team for your real time management

The first thing you need is a team of real time listeners and engagers. You can focus on Facebook and Twitter as a start. These people are the one who will carefully listen and track all the conversations that are happening in actual time. These people will provide a prompt response on any matter that has relation to your type of niche. Of course these are conversations that concern your business.

Develop real time guidelines

With your dedicated real time engagement team, you should be able to set your guidelines on how you are going to implement your strategy. It is essential to have some rules of engagement before you deploy your team to avoid difficulties and avoid some risks.

Implement real time systems

With a wide array of monitoring tools, you can implement an all-in-one system that allows you to monitor what is going on, analyse those data and be able to react instantly. Google Alerts and Social Mention, for example, are great tools that would help one and his team to get important information that would be needed by you specially those keywords that are significantly related to your brand.

Rate This Content
Freelance writing as a career
May 13, 2017

Robert Frost provides an amazing commentary on life’s choices in his poem ‘The road not taken’. He talks about the decisions that people make in life. Some end up following taking a decision which leads them to a profession which most people in the world are heading towards. On the other hand, there are people with a flair for writing and they choose the road less taken and prefer to turn writing into a career. One can easily doubt the credibility of writing as a full-fledged career. However, it has been a proven career with a steady flow of income.

 A lot of people aspire to convert their talent into a profession and become a freelance writer. However, eventually, they end up doing a mundane 9 to 5 job. They end up dressing up for their jobs, commuting at the same time every day to job and then take orders from their superiors. Whereas they could have become their own bosses, followed their own schedules and worked dressing up in a manner they desired. Most often than not, procrastination is the culprit. They see freelance writing as something that is frowned upon or something which is a target of many jokes. Freelance writing has never been considered as a real profession. This belief is something which is a matter of perspective. It all depends on the essence of ‘job’ or a ‘profession’. It depends on how one might perceive these two words. In fact, this is a general impression that people hold for jobs that can be done from home.

People who work jobs require a special skill set which can range from effective communication, maintaining interpersonal skills to technical know-how, strong financial deductions and perfecting a specific art. People may undertake studies to perfect a particular skill set. Some of the soft-skills can be developed and eventually sharpened. Freelance writing is no different. Just because someone works from home or decides to follow his / her own schedule, it cannot be disregarded as a career. It requires a skill set too. It requires one to have a general perception about whatever the writer is writing.

The writer must also have an ability to perform an in depth research about a topic. Sometimes the writer may be faced with a topic which has been encountered for the first time in life. This calls for a good preparation, research, and information gathering and then segregating it while working on the final write-up. A writer may fail at this if he / she fails to organise the research about the topic. Failing to have an organized research can lead to failure even if the writer has excellent writing skills.

The demand for skilled freelance writers is ever increasing. Several areas require content writers. An organization needs effective content to put forth its values and dedication towards consumers. This work is often delegated and they work closely with freelance writers. The need for skilled freelance writers will never cease. If you believe that you have a potential for it, freelance writing is, without doubt, an effective career.

Rate This Content
Do you know you can watch star wars????
May 10, 2017

I have never seen Star Wars. Yes, it’s true. I have not watched a single one of George Lucas’s immensely popular, fanatically followed science fiction films. Not even five minutes of one of them. My Star Wars knowledge is limited to short clips that exist in the pop culture ether—and what I picked up from Mel Brooks’s spoof Spaceballs, which, after all, is a classic.

I understand that my Star Wars ignorance might make me an anomaly, but really, I’m not alone. A number of people like myself were born well over a decade after the original trilogy premiered in 1977, which made us too young to have enjoyed Harrison Ford as hunky Han Solo and to understand the idea behind the Force. Also, by the time the prequel saga came out in 1999, it was so critically panned that my teenage self couldn’t drum up the interest or time commitment to watch the original three in order to understand what might be going on in these new movies starring Natalie Portman. Hence my Star Wars illiteracy.

But now a new era of Star Wars films is about to begin, starting with next week’s release of Star Wars: The Force Awakens, and suddenly I have a bad case of FOMO. After all, Lupita Nyong’o and Adam Driver are in this movie, so it must be good, right? But how do Star Wars newcomers even begin to catch up on everything they’ve missed? In what order should one watch these movies? And is it really necessary to catch up on all of them? After consulting with various Star Wars fanatics, here, I bring you the ultimate Star Wars binge-watching guide.

If you want to watch them in chronological order:
Some people caution against watching the Star Wars films in chronological order because a few essential plot twists would be revealed early on. But unless you’ve been living under a rock all these years, even the most clueless Star Wars viewer knows that Darth Vader is Luke Skywalker’s dad. Start watching the series from Episode I: The Phantom Menace and make your way up to Episode VI: Return of the Jedi to understand why Anakin Skywalker crossed over to the dark side and became his son’s nemesis.

Viewing order: Episode I: The Phantom Menace, Episode II: Attack of the Clones, Episode III: Revenge of the Sith, Episode IV: A New Hope, Episode V: The Empire Strikes Back, Episode VI: Return of the Jedi
If you want to watch them as they were originally released:
Most people didn’t really appreciate the prequel saga, which is why loyal Star Wars fans suggest watching the series in the order they originally came out in movie theaters. Their reasoning is that the plots of the original three are vastly superior than the origin story of Anakin Skywalker in the prequel series. Plus, watching the advanced special effects of the prequel movies first might make the SFX in the late-’70s, early-’80s films seem more jarring than they should.

Viewing order: IV, V, VI, I, II, III

If you want to listen to the die-hard fans:
Star Wars superfan Rod Hilton suggested earlier this week a unique way of watching the franchise on his blog, Absolutely No Machete Juggling, which has since gathered steam. Called the “Machete Order,” Hilton argues that there’s no need to ever see Episode I of the series, as it’s irrelevant to the larger story. He also suggests once the big twist of Empire Strikes Back is revealed (that Darth Vader is Luke’s father), viewers should rewind back to the prequel series to get a better idea of why Vader crossed over to the dark side. Then, they should end their binge-watch with Return of the Jedi to conclude the series and leave them perfectly set up for The Force Awakens, which picks up after the events of Return of the Jedi.

Viewing order: IV, V, II, III, VI

If you only want to see one movie:
If you don’t want to spend an entire weekend binge-watching the six films, then hands down, most Star Wars connoisseurs suggest watching Episode V: The Empire Strikes Back to get a general idea of the universe and characters of George Lucas’s space saga. It’s widely regarded as the masterpiece of the series and it also introduces the wise and powerful Jedi Master Yoda.
If you don’t really care for science fiction and just want to enjoy a love triangle:
If you could care less about lightsabers, Jedis, and Ewoks, watch the very first movie, Episode IV: A New Hope, which, yes, features a wealth of science fiction action, but also spends the most time exploring the vaguely incestuous love triangle between Carrie Fisher’s Princess Leia, Harrison Ford’s bad-boy Han Solo, and Mark Hamill’s heroic Luke Skywalker.

24 hours of love, lightsabers, and Star Wars in New York City.

Let’s say you grew up watching the Star Wars trilogy, then had children sometime after 1999, when George Lucas started releasing the prequels.

When your kids are old enough, what order should they watch the films in? The order they were released — Star Wars (A New Hope) (1977), The Empire Strikes Back (1980), and Return of the Jedi (1983), then The Phantom Menace (1999), Attack of the Clones (2002), and Revenge of the Sith (2005)? Or the order the events happened in the Star Wars universe: Phantom Menace (I), Attack of the Clones (II), Revenge of the Sith (III), New Hope (IV), Empire Strikes Back (V), and Return of the Jedi (VI)?

Rod Hilton, a computer programmer in Colorado, has given this a lot of thought, and he probably has the best solution. His (correct) instinct is to start with New Hope (IV), because if you start with Phantom Menace (I) you lose the essential shock of learning Luke’s parentage in Empire Strikes Back. But he also wants to end on a high note — so, none of the prequels. Here’s Hilton’s “Machete Order,” named after his blog, Absolutely No Machete Juggling:
Let’s say you grew up watching the Star Wars trilogy, then had children sometime after 1999, when George Lucas started releasing the prequels.

When your kids are old enough, what order should they watch the films in? The order they were released — Star Wars (A New Hope) (1977), The Empire Strikes Back (1980), and Return of the Jedi (1983), then The Phantom Menace (1999), Attack of the Clones (2002), and Revenge of the Sith (2005)? Or the order the events happened in the Star Wars universe: Phantom Menace (I), Attack of the Clones (II), Revenge of the Sith (III), New Hope (IV), Empire Strikes Back (V), and Return of the Jedi (VI)?

Rod Hilton, a computer programmer in Colorado, has given this a lot of thought, and he probably has the best solution. His (correct) instinct is to start with New Hope (IV), because if you start with Phantom Menace (I) you lose the essential shock of learning Luke’s parentage in Empire Strikes Back. But he also wants to end on a high note — so, none of the prequels. Here’s Hilton’s “Machete Order,” named after his blog, Absolutely No Machete Juggling:
Next time you want to introduce someone to Star Wars for the first time, watch the films with them in this order: IV, V, II, III, VI.

Notice something? Yeah, Episode I is gone. Episodes II and III aren’t exactly Shakespeare, but standing next to the complete and utter trainwreck that is Episode I, they sure look like it. At least, III does anyway. Episode I is a failure on every possible level. The acting, writing, directing, and special effects are all atrocious, and the movie is just plain boring. Luckily, George Lucas has done everyone a favor by making the content of Episode I completely irrelevant to the rest of the series. [No Machete Juggling]

Read Hilton’s admittedly “amazingly long blog post” for his longer rationale and alternative viewing orders. Luckily, when the final three movies of the series come out (Episodes VII, VIII, and IX), they will be last under both chronologies. Assuming, of course, that they’re worth watching at all.
Senate Majority Leader Mitch McConnell (R-Ky.) on Wednesday argued that there is no need for a special prosecutor or an independent commission to investigate President Trump’s ties to Russia. On the Senate floor, McConnell said that because there are already ongoing investigations by the Senate and the FBI, adding another investigation would only muddy the waters. “Today we’ll no doubt hear calls for a new investigation, which could only serve to impede the current work being done to not only discover what the Russians may have done [but] also to let this body and the national security community develop countermeasures and war-fighting doctrine to see that it doesn’t occur again,” he said.

McConnell also stood by Trump’s decision to fire FBI Director James Comey. He shook his head at Democrats, including Senate Minority Leader Chuck Schumer (D-N.Y.), who have responded with outrage to Comey’s unexpected ouster Tuesday evening. McConnell noted that Democrats themselves had “repeatedly and sharply criticized” Comey. “Last year the current Democratic leader said it appeared to be an appalling act, one that he said goes against the tradition of prosecutors at every level of government,” McConnell said, referring to Schumer’s comments about Comey’s decision on the Hillary Clinton email investigation weeks before Election Day. “And the prior Democratic leader, when asked if James Comey should resign given his conduct of the investigation, he replied, ‘Of course. Yes.'”

McConnell declared that “partisan calls” should not delay the work of the Senate Intelligence Committee because “too much is at stake.” While Democrats have overwhelmingly led the call, Republican Sens. John McCain (Ariz.) and Richard Burr (N.C.), who is leading the Senate’s investigation, have also joined the push for an independent investigation.
Nobody can be blamed for missing the news that the director of the U.S. Census Bureau, John H. Thompson, is leaving the Trump administration. He announced his resignation Tuesday, in the midst of the fallout that President Trump had fired FBI Director James Comey.

This’ll likely get buried today but the US Census director quit. The census is a hugely important part of democracy. https://t.co/M0HViR0BWV

— Mike Ananny (@ananny) May 9, 2017

Thompson has served as director since 2013. His departure comes amid arguments over funding for the 2020 count; the Trump administration’s budget has been deemed insufficient. Additionally, last week Thompson revealed that the cost of a sophisticated new electronic data collection system has skyrocketed nearly 50 percent.

The Census Bureau’s director just resigned. Here’s the challenge his agency is facing ahead of the 2020 count. https://t.co/RTN1Lmi0OG pic.twitter.com/AIJ4Zlc1oe

— Ben Casselman (@bencasselman) May 10, 2017

Still, the resignation came as a surprise, especially as Thompson had been due to retire in December anyway. “I saw him as recently as two weeks ago, he was feeling very good about where things were, so I must say that this comes as a surprise, and a sad surprise, that he would feel he needed to do this,” Kenneth Prewitt, the director for the 2000 Census, told The Washington Post. “He’s a very, very competent man.”

Prewitt additionally worried about the void Thompson leaves behind. “That system is fragile, and it wouldn’t take much to damage it severely,” he told Science. “My real fear is that they don’t care enough to do a good job with the 2020 census. And then after doing a bad job, they decide to let the private sector take over.
Rest easy, America: President Trump is “small potatoes compared to Nazi Germany.” At a town hall Tuesday night shortly after Trump fired FBI Director James Comey, House Freedom Caucus member Rep. Tom Garrett (R-Va.) attempted to soothe his constituents by pointing to a moment in history that was worse than Trump’s presidency. “America has overcome amazing challenges that Donald Trump, as frightening as he is to some people, small potatoes compared to Nazi Germany,” Garrett said.

When constituents met that remark with jeers, Garrett doubled down. “So he’s worse?” Garrett said, literally asking the crowd if they’d rank America’s commander-in-chief as greater cause for alarm than the Third Reich. Garrett pointed out people were worried about former President Barack Obama too, and promised that, no matter what, “this great nation will continue to move forward by virtue of the collective of American people.”

Feel better now?
Since President Trump abruptly axed FBI Director James Comey on Tuesday, Sen. Angus King (I-Maine) came up with another way Comey could still be involved in the investigation of Trump’s ties to Russian election meddling. King suggested that Comey could be “named to head the Senate Intelligence Committee investigation of Trump-Russia ties,” The New York Times’ Jonathan Weisman reported.

Of course, if Trump really fired Comey because of his handling of the Hillary Clinton email investigation as Trump has claimed, then this wouldn’t bother him one bit. But, King pointed out in an interview with NPR, the White House’s explanation for the ouster “doesn’t add up.”
After firing FBI Director James Comey during an active investigation into the White House’s possible ties to Russia, President Trump has only one item on his docket for Wednesday: a closed-door meeting with Russian Foreign Minister Sergey Lavrov. Which is … a choice you can make.

But when Lavrov rolled up to the State Department for a meeting with Secretary of State Rex Tillerson ahead of his Oval Office huddle, MSNBC’s Andrea Mitchell managed to get a response to her shouted question, “Does the Comey firing cast a shadow over your talks, gentlemen?”

Lavrov looked at her with a straight face and asked, “Was he fired? You’re kidding. You’re kidding.” He then rolled his eyes and marched out of the room:

“Was he fired? You are kidding!” – Russian Foreign Minister Sergei Lavrov asked in US about ex-FBI chief James Comeyhttps://t.co/IrFi991lJz pic.twitter.com/xbEnYQJJsC

— BBC News (World) (@BBCWorld) May 10, 2017

Many interpreted Lavrov’s snide remark literally — but let this be a warning to us all to never underestimate a Russian leader’s witheringly dry, sarcastic sense of humor.
On Tuesday night, Rep. Elijah Cummings (D-Md.) tried to imagine what would be happening right about now if the tables were turned, and Hillary Clinton had won the presidency and then fired the director of the FBI. “If this were Hillary Clinton, the Republicans would be trying to impeach her right now,” he said during an interview with MSNBC’s Rachel Maddow, just hours after President Trump unexpectedly fired FBI Director James Comey.

Cummings to @maddow: “If this were Hillary Clinton, the Republicans would be trying to impeach her right now.” https://t.co/n2hOMOiIYP

— Kyle Griffin (@kylegriffin1) May 10, 2017

Cummings, the top Democrat on the House Oversight Committee, called Tuesday night for “immediate emergency hearings” on Comey’s firing. “The White House was already covering up for [former national security adviser] Michael Flynn by refusing to provide a single document to Congress, and now the president fired the one independent person who was doing the most to investigate President Trump and his [2016] campaign over allegations of coordination with Russia,” Cummings said in a statement.

Trump has cited Comey’s handling of the FBI investigation into Hillary Clinton’s use of a private email server as his reason for Comey’s abrupt dismissal.
Anderson Cooper expressed his frustration with spin master Kellyanne Conway on Tuesday evening when he attempted to press her about President Trump’s whiplash-inducing flip-flop on FBI Director James Comey. “So now your White House is saying what [Comey] did was wrong but previously, as a candidate, Donald Trump was saying it was the right thing,” Cooper said, after playing a montage of clips showing Candidate Trump praising Comey during the campaign.

“You’re conflating two things that don’t belong together,” Conway replied. “Thanks for the trip down memory lane. I was on your show often last fall saying we were going to win Michigan and how we were going to do it. So that was fun.”

Cooper does not even try to hide his annoyance about her abrupt change in subject:

This @andersoncooper eyeroll when Conway, asked about Comey’s firing, changes the topic to winning Michigan. pic.twitter.com/c2gl4ykARl

— Sahil Kapur (@sahilkapur) May 10, 2017

Let’s see that one more time. Jeva Lange

this anderson cooper eyeroll at kellyanne conway is… choice pic.twitter.com/ZWHcvD2XDU

— tc (@chillmage) May 10, 2017.

Rate This Content
Zed ilife smallest laptop reviews
April 3, 2017

Zed ilife laptop, new brand for our family

their laptops are small and what I liked about so I put it in my bag and go everywhere. The look from out side is impressive, but if laptop was as good from inside as out.


the storage of this brand is small, but I can live with that since its only to use it at work as side laptop, This is laptop that needs to update its program the minute you use it, due to that the company installed outdated program. why they do that no sure why?

going with start the program and here we go the censor is not working, tried to move the cursor everywhere but not a single movement, why do not know, so I took it the shop to return it as I have to use laptop that is new but not working, but not acceptable to return electronice, but they will fix it, so I had to agree on that.

decided to wait a week as they said it may take two weeks though the company head office is in the same town. just after one week went to them holding the number of the laptop and found out that it is ready in the store, ok why did not you call me guys? No answr from them.

Fine just went home to use it and hope that this time it will be fine. But why to be fine?? The charger do not charge, so I have to keep the laptop charging all the life of the laptop as when I take it off it will not work.


bad experience with this laptop, I wish real branch is here so I talk to them, but they are abroad. speed is low if you like surfing


320GB. It has un reasonable videocard I bought it at 300 euro. And it has 2 gig

The colors are ok and the memory not bad for side laptop, but I fed up from fixing it always though I bought it in its box


Rate This Content
My experience with cheap web hosting
March 16, 2017

This post may turn out to be a bad review a certain website but after I had discovered bitcoin and faucets I decided to create a faucet of my own by using WordPress and its plugins, however the problem was funding it, I had enough to make a deposit to pay the first few users for the faucet and knew enough about web design to make the faucet however, I know first hand the amount of time and resources that must go into keeping a web server up and running while considering things like QoS(quality of service) to prevent bad reviews for the site so I had no illusions about what it would take to keep something like that up.
My first task was to find a cloud hosting service that could allow my faucet along with all user accounts and local wallets including the server side applications that would be needed to manage the wallets and send payouts. In other words, it wasn’t looking good because I’ll be hosting a service that basically keeps money on a database in the cloud which means my service is dependent on the quality of another service but the question that worried me was how much quality I could expect from a service I chose based on my budget and also because I had an amount of money in my neteller account that wasn’t enough for a withdrawal, I figured it makes more sense to find a hosting service that allows payments from there rather than to leave the money in the account. So I looked to the internet for articles on web hosting services at good rates with my payment option to gather more information about the websites before visiting them and I found a web hosting service that was apparently the cheapest option and this particular website is called hostnesta, the domain name will be excluded because I don’t believe people should visit it the website.
My issues were simple, the hosting service was an inconvenience and what frightened me most was the fact that I cloud not get a secure connection from the website which meant that all my work on my website could be intercepted meaning user accounts, user balances and much more. Another of many issues were how the hosting service was quick to confirm my payment but how long it took to help me with issues. After a few days of use I found that I could not access my website and its directories which meant I couldn’t even upload a page, keep in mind that I also had issues with my DNS which means for all I know, my domain might not have even been registered
After sending the support team an angry message about what horrible people they were I did what I should have done before I sent them money which was, look for website reviews, surely I cant be the only person with issues from them, and I wasn’t. I found more than enough reasons why I shouldn’t even consider hostnesta as a hosting service and one of the reasons should have become clear from the moment I saw the webpage, the review went something like “no company that offers hosting from $0.60 a month can be expected to provide a good service if any at all”, It made sense and I felt like an idiot having being so gullible and especially as a network administrator who would rather leave all his work in the hands of someone that does a worse job of managing a server.
I learnt a very valuable lesson that day, just because its cheap doesn’t mean you should spend your money on it and if you really need something to be done then just do it yourself, there’s no worse feeling than knowing that your’e in a bad situation because of someone else. Today I have left hostnesta to their ways and figured that the money spent isn’t worth what it could take to get it back considering how the support team doesn’t respond. So I have decided to save money wait until I have enough to make my desktop PC a reasonable web server and in the mean time develop my website as I have decided to make it a game. The incident has actually made me distrust the entire cloud system.

Rate This Content
cloud computing disadvantages for busniess
February 4, 2017

As cloud service providers take care of a number of clients each day, they can become overwhelmed and may even come up against technical outages. This can lead to your business processes being temporarily suspended. Additionally, if your internet connection is offline, you will not be able to access any of your applications, server or data from the cloud. Security Although cloud service providers implement the best security standards and industry certifications, storing data and important files on external service providers always opens up risks. Using cloud-powered technologies means you need to provide your service provider with access to important business data. Meanwhile, being a public service opens up cloud service providers to security challenges on a routine basis. The ease in procuring and accessing cloud services can also give nefarious users the ability to scan, identify and exploit loopholes and vulnerabilities within a system. For instance, in a multi-tenant cloud architecture where multiple users are hosted on the same server, a hacker might try to break into the data of other users hosted and stored on the same server. However, such exploits and loopholes are not likely to surface, and the likelihood of a compromise is not great. Vendor Lock-In Although cloud service providers promise that the cloud will be flexible to use and integrate, switching cloud services is something that hasn’t yet completely evolved. Organizations may find it difficult to migrate their services from one vendor to another. Hosting and integrating current cloud applications on another platform may throw up interoperability and support issues. For instance, applications developed on Microsoft Development Framework (.Net) might not work properly on the Linux platform. Limited Control Since the cloud infrastructure is entirely owned, managed and monitored by the service provider, it transfers minimal control over to the customer. The customer can only control and manage the applications, data and services operated on top of that, not the backend infrastructure itself. Key administrative tasks such as server shell access, updating and firmware management may not be passed to the customer or end user. It is easy to see how the advantages of cloud computing easily outweigh the drawbacks. Decreased costs, reduced downtime, and less management effort are benefits that speak for themselves.

Rate This Content