New Research Says Talking To Yourself Can Improve Your Brain

Talking To Yourself Can Improve Your Brain

You’ve probably seen someone talking to themselves and thought they were really weird, right? Well stop thinking it and start saying it to yourself, because people who talk to themselves are actually pretty brilliant. Why?

They organize their thoughts better.
That’s right. Those who talk to themselves are better at organizing their thoughts and processing more than one thought at a time. They focus on saying their thoughts aloud in the hopes they can get a better grip on them. They actually have greater mental clarity as a result.

They have a better memory.
People who say things out loud to themselves are likely able to memorize and recall things better than those who don’t. It’s a way of reinforcing a thought inside of your brain.

Their brains are more efficient.
Some studies have indicated that talking to yourself helps you think quickly and with clarity. They found that when people talk to themselves at the store, they find what they need quicker than those who didn’t.

They achieve their goals.
People who talk to themselves, particularly about their goals, are more likely to achieve them than those who don’t. Saying it out loud helps create a laser-like focus on your goals and gets you closer to them.

Start Talking…!!

SOURCE

Advertisements
Posted in Entrepreneur | Tagged , , , , , , , , | Leave a comment

Why can’t SMBs have the big kids’ toys?

Small and medium-size businesses need to compete despite smaller budgets and fewer resources. How can they get their hands on the technology they need without breaking the bank?

image

In a volatile and competitive world, small and midsize businesses understand that technology is important to success. Two-thirds of SMBs see technology as a primary factor in pursuing business objectives, according to a CompTIA report, while 31 percent rate it as a secondary factor. And the SMB Group found that 72 percent of SMB decision-makers feel technology solutions can help them significantly improve business outcomes or run their businesses better.

However, understanding technology’s importance and having the wherewithal to act on that understanding are different things.

“SMBs need to compete, but they face budget and resource constraints when managing their IT environments,” says Bob McKenna, global SMB marketing manager at Hewlett Packard Enterprise.

Despite these constraints, SMBs are getting their hands on the tools they need to forge ahead. How are they doing so? First, it’s worthwhile to consider the factors that are driving SMBs to invest in new technologies.

SMB IT investment drivers

small business concept hand drawing on tablet pc“New customers often approach us after a security breach or when a server goes down,” says James Haggerty, principal at technology consulting and services firm Westminster Information Technology. Both instances force an SMB to rethink its IT strategy, due to security risk or the cost of downtime.

McKenna adds three items to the list of technology purchase drivers: “The driving force for purchase is often a new branch, a new workload, or an IT modernization upgrade.” Of those three factors, increased workloads most often influence new investments.

That’s not necessarily a matter of company size, McKenna notes. It’s also about the types of workloads a company is running. If an SMB uses IT as a competitive advantage or strategic asset, they move to newer technologies much more quickly. Some workloads, such as data analytics and the Internet of Things (IoT), force technology modernization on their own, says McKenna, because old systems just can’t handle those tasks.
Some workloads are latency-sensitive. “Take a point-of-sales system, for example,” McKenna says. You want to capture the transaction quickly and authenticate it quickly. You need a reliable and efficient set of systems to do so, and that’s another upgrade driver.

On the other hand, an SMB that uses IT for support alone won’t look to upgrade as long as everything works. Between budget limitations and an “if it works, don’t fix it” mindset, there isn’t a burning desire to upgrade just because new technology is available. However, the sun-setting of old infrastructure can make SMBs decide to upgrade. According to a Spiceworks study, end-of-life was listed as a factor in buying new technology by 70 percent of respondents.

Getting past budget and resource constraints

Despite the obvious limitations, many SMBs are keeping up with—and sometimes even surpassing—the technology deployed by much larger companies. Here’s how.

Invest in scalable IT

bigstock-cute-little-girl-in-the-classr-51215545A number of enterprise vendors have come out with prepackaged, scaled-down versions of their products, says Haggerty. This enables SMBs to “buy into” an infrastructure and then expand as the company grows.

A key strategy is scalability, meaning the ability to start small with systems that easily grow to handle additional demand such as more users and workloads. And much of the ability to scale comes from the cloud.

Use Hybrid IT

imageThe Hybrid IT approach, where technology resources exist both on premises and in the cloud, is uniquely suited to scalability. The setup enables SMBs to retain their existing systems while scaling up as needed.

Need a place to put a new workload? Need to store tons of data and then analyze it? Need lower latency with other cloud-based systems? Then moving off premises is the way to go. This trend can be seen in the RightScale State of the Cloud Report, which revealed that 61 percent of technical professionals are looking to the cloud to provide greater scalability.

As midsize companies have bought into Hybrid IT, smaller businesses (with fewer than 100 employees) have not. While the majority of small business owners (62 percent) trust the cloud, Salesforce’s Connected Small Business Report shows fewer use cloud-based technology services to its full potential. Only 10 percent have more than 50 percent of their technology in the cloud.

“Small businesses are still a bit apprehensive about the cloud,” says Haggerty. Part of the reason is that the cloud shifts capital to operating costs. The accounting department may see that as an advantage. However, cloud services are subscription-based; SMBs worry that they’ll spend too much each month per person, and that’s unsupportable.

Again, scalability comes into play here. Being able to expand your cloud use as you grow can help scale costs as well. You buy capacity as need and revenue grows.

Define your IT priorities

imageCherry-pick the technology purchases that have the biggest impact, says McKenna.

Unlike enterprises, which have much larger budgets, SMBs need to choose one or two things they can do over the next year. They cannot compete in every facet of business, so they have to focus on one, be it operations, marketing, or some other competitive dimension.

This can be a problem, or a blessing in disguise. Being forced to focus really helps in budget choices.

“One of our clients is a law firm that’s very concerned with high availability,” says Haggerty. Because the firm has briefs that are due and deadlines to meet, it is under tight time constraints that can’t be moved. That could have meant a lot of technical decisions, but it didn’t have the budget or attention to shepherd several projects.

The law firm decided to focus on setting up a 15-minute backup and restore window using redundant servers. It can also fall back to the cloud if necessary; while slower, that can keep the firm up and running.

By focusing in on high availability, the firm could buy into the same technology that enterprises use, despite a smaller budget and fewer resources. In the end, it all came down to choosing one important project and then moving forward with it.

Another facet of thinking smarter is focusing on “low-hanging fruit” technologies. A lot of the toys that big companies are using may be out of reach, says Haggerty. “However, redundancy and scalability? SMBs can get their hands on that without spending a lot of money,” he says.

Take advantage of new functionality

Staffing1_924x520_acf_cropped-1Two new factors are making it easier for SMBs to get their hands on new technologies, says Haggerty.

First, new equipment can accomplish more. For example, unlike years ago, a server can perform many functions rather than one, and it can do it faster. That enables SMBs to spend less when upgrading old technology.

Second, newer technologies are often easier to manage, typically from a central point of control. This advantage enables an SMB to grow without the expense of adding new IT staff to support that growth.

Rent expertise

Hand with calculator. Finance and accounting business.SMBs have trouble hiring people who can take advantage of the enterprise-level technology. Nobody can know every technology, after all.

“An IT manager at an SMB may not be familiar with how a scaled-up data center works, and that can limit their vision,” says Haggerty.

This can lead an SMB exec to make less-informed decisions that cost the company a lot down the road.

How they get past this? By bringing in a partner.

iStock-640307998-e1499153557336_1040x585_acf_croppedA cloud partner can educate SMB IT managers, help them plan and implement new technology, and provide ongoing support. Partners may also provide a bundled set of services, including software and systems management. Bundling really helps, says Haggerty, because it often brings down both the purchase cost and ongoing licensing fees.

“Many SMBs are thinking strategically,” says Haggerty, “not just trying to patch holes and upgrade old equipment.” By limiting their risks using the tips above, technology investments pay off in the long run. If it means playing with the big kids’ toys, too? That’s all the better.

Getting the tech your SMB needs: Lessons for leaders
  • Start small with a hybrid architecture that can scale as the SMB grows.
  • Focus your IT budget on one or two projects that can make a difference rather than trying to do it all.
  • Use new, more versatile technologies to help get more done with less.
  • Find the right cloud partner to bring expertise to the table and save costs.
Posted in Business Tools, Entrepreneur, IT Consultant, Leadership | Tagged , , , , , , , , | Leave a comment

Future Apple iPhones expected to come with dual-SIM support and upgraded modems.

3-iphones-380

After predicting that Apple may release two new iPhones with OLED displays, Ming-Chi Kuo, KGI analyst has now predicted that these iPhones which are predicted to be launched in 2018, would also support dual SIM slots. Apple’s first iPhones with dual SIM slots would also have the dual SIM and dual standby (DSDS) facility.

According to MacRumours, the analyst said that the smartphones are expected to come with Qualcomm’s Snapdragon X20 modems and Intel’s XMM 7560. These would be an upgrade from Intel and Qualcomm’s previous models, which were Qualcomm’s MDM 9655 and XMM 7560, respectively.

Now both the chipsets will have a higher baseband from 2×2 MIMO technology to 4X4 technology, thus increasing higher transmission of LTE or wireless connectivity.

Meanwhile, as mentioned before, the dual SIM support may support dual SIM and dual standby as well. Thereby, both the SIMs can be used actively.

Additionally, it has also been predicted that the chipset in the iPhone will support LTE connection for both the SIMs. The same LTE SIMs are expected to provide better connectivity.

According to the analysts, Intel would supply most of these chips, which account for 70 or 80 percent of them.

This can be good news for those who carry around with two phones due to lack of dual SIM facility in iPhones; this can prove to be a better alternative.

Apart from dual SIM, it has also been predicted that from now on, both the phones would support Face ID as a feature to unlock the iPhones. Previous report tells that if the Face ID becomes popular it would take over Touch ID.

Enjoy.!

Posted in Apple, I Phone | Tagged , , , , , , , , , | Leave a comment

Beyond the basics: 5 security tips for consumers to protect their identity in the era of data breaches

Password-security-380Though it might be shocking to read, the truth is that a big majority of people around the world are not conscientious when it comes to securing their online access. The most common password of 2016, making up 4% of all the surveyed passwords that were hacked in the last year was “123456.” The top 25 list was rounded off by 123456789, qwerty, and the word password itself among them. Cyber hackers know this only too well and they are ever ready to exploit these loopholes.

security-tips-albany-gaIndia too has seen its fair share of data breaches and security hacks in the recent past. WannaCry and Petya were devastating, with India being noted as one of the most affected geographies the world over. The concept of online safety and being on guard against malicious attacks is slowly gaining a foothold, but many still are in denial about how easy it is to be compromised in the online world. The humble password is the first guard against any obtrusive entry and is an important step to safeguard our identity as well as information.

New methods of authentication are needed to replace or supplement out dated methods that rely on personal information or passwords to verify identity. These changes will take time as new technologies, systems and policies emerge to replace legacy methods.

In the meantime, users must take proactive measures to protect themselves online. Consumers should follow basic security hygiene and keep abreast of emerging technologies. One should also follow security advice from experts to keep safe from cyber hackers and help safeguard their digital identities.

Security-TipsHere are five measures that are a good jump off points to be safe in the virtual world:

Ideal Password = A Long, Nonsensical Phrase

Most websites that contain sensitive information follow a password process to ensure they are not easily broken – at least 8 characters long, with either one or more alphanumeric characters. However, experts now suggest that a long nonsensical phrase, or “passphrases” is a better way to safeguard your online identity. It is a string of unrelated words which are tied together, and are at least 20 characters. These are much harder to crack either by guessing or in security parlance through brute force using compute power.

Do not re-use passwords

Every website worth its salt requires you to sign up for an account and it can quickly get overwhelming to remember all the passwords. Hence, many use the “same” password for ALL the websites. Research indicates that 81% to 87% of people re-use passwords. Hackers know this. And once they have cracked one account, the rest is pretty much open season to abuse.

However, memorising passwords is a real struggle. So a good way is to store passwords in a digital vault. The vault, in addition to storing passwords also help generate strong new ones when required. And rather than remember multiple passwords, one just has to memorize one password to access the digital vault.

Lie on your Security Questions

All good websites, especially ones for financial data have security questions as backups. They often have to do with personal information that are now easily accessible online such as mother’s maiden name, first school, address etc. Rather than go for these options, select questions that are opinion based, and hence harder to crack like favourite ice cream flavour. Another tactic is to use fake responses to ensure that only you would know the answer.

Two-factor authentication

Many services, particularly sensitive accounts like email and banking, allow for two-factor authentication (2FA). Enabling 2FA adds another layer of security checkpoint when certain risk factors are present. These risk factors include accessing the account from a new location of an electronic device.

2FA is quite familiar with users in India as multiple companies and websites already offer them, including banks and even hire cabs such as Ola.

Using biometrics

Even if one makes sure to apply all the steps above, we will soon move towards a time when the use of passwords as the sole to method establish identity isn’t enough. Biometric authentication uses our iris, fingerprints to verify identity. Aadhaar in India is the biggest example. In our daily use, iPhones already provide biometric authentication to safeguard access to the phone in lieu of passwords.

This too is not fool-proof, so experts have devised ways to make sure this data is collected and applied in a way that ensures privacy for consumers while preventing the ability for this info to be used by hackers. For devices that allow access via fingerprints, consider backing it up with a lock code.

As we continue to move our lives online, security will play an important role in safeguarding our presence. As in the real world, everyone will need to take robust and practical measures. Having a strong password is first step to ensure safety in the digital world.

Posted in Do You Know, Ransomware, Security, WannaCry | Tagged , , , , , , | Leave a comment

How a Ransomware Infects your Computer

Ransomware is probably the most dreaded cyberthreat that can strike anyone and at anytime unless we prepare ourselves against it. And the best way to start is to know how this malware works its way into your computer and how you can destroy its delivery mechanism. 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 0010101000000001010100010101010100001010101011111101010101011110101010 RANSOMWARE INFECT YOUR COMPUTER?

0101010000000010101000101010101000010101010111111010101010111101010100 0101010000000010101000101010101000010101010111111010101010111101010100 & WHAT YOU CAN DO TO STAY SAFE.

0010101000000001010100010101010100001010101011111101010101011110101010 HOW DOES a malicious software that locks your computer or encrypts your data and demands a ransom in exchange and thus the name ‘ransomware’ = ransom + malware is the 5th most Verizon Data Breach Investigation Report 2017 common form of malware in 2017.

Money demanded in some of the recent ransomware attacks of 2017 ranged from 79$ to 4000$ (mostly in Bitcoins)

EMAIL

THE 2 MOST COMMON CHANNELS ransomware use to infiltrate your computer Emails serve as the most resourceful tool to deliver ransomware. “93% of all phishing emails contained encryption ransomware in 2016.” PhishMe Q1 2016 Malware Review How is a phishing email used to infect your computer with a ransomware? A phishing email containing links to malicious websites – visiting such sites can drop a ransomware on your PC. A phishing email carrying attachments hiding ransomware – Downloading such attachments will execute a ransomware on your PC. These attachments are usually MS Office docs such as Word, Excel, and PPTs, and PDFs. To make a phishing email look more genuine and convincing, it is disguised as something that you’d expect – invoices, tax forms, letters from a co-employee or your boss, purchase receipts, etc.

COMPROMISED WEBSITES

An infected or a compromised website (in this case) is a webpage(s) where the attacker has hidden an exploit kit (a software designed to misuse software vulnerabilities). When you visit such a site, this exploit kit will scan your web browser or other software for security vulnerabilities it is designed to exploit (security vulnerability is a weakness in your computer that an attacker can misuse). And if a vulnerability is found, the kit will drop the ransomware. How do you land up on a site compromised with an exploit kit? By clicking on a link in a phishing email – the most common way By clicking on a malicious advertisement This attack is called malvertisement – ads loaded with malware. Malicious ads do not only appear on shady websites, they target genuine websites too. This means, clicking on an ad on a legitimate website can also infect your computer with a ransomware. Case in point: Malicious ads (containing the Angler exploit kit) appeared on The New York Times, the BBC, AOL, and the MSN homepage in 2016, delivering ransomware to the people visiting these websites. FREE! FREE! HOW DO YOU DEFEAT RANSOMWARE? X XBANG! Staying safe from ransomware means preventing it from getting inside your computer.

You can do this by…

#1. NOT CLICKING on links or downloading attachments from unknown or unexpected sources (even if the sender looks familiar).

#2. PATCHING all vulnerabilities in your Operating System and software by applying all recommended security updates.

#3. PROTECTING your computer with an antivirus that can block access to compromised websites and prevent ransomware from getting downloaded on the system.

#4. BACKUP YOUR DATA regularly. Consider storing them securely in multiple, offline locations. Should a ransomware infection occur, you can restore your data from these backups. 

#5. INSTALL AD-BLOCKERS on your web browsers. This will reduce your risk on clicking on malicious or harmful advertisements. STAY AWARE STAY SAFE

Here’s an infographic that will take you through this.

How a Ransomware Infects your Computer [INFOGRAPHIC]

Sources blogs.quickheal.com | phishme.com | http://www.us-cert.gov | http://www.wired.com | http://www.securityaffairs.co

Posted in Ransomware | Tagged , , , | Leave a comment

Microsoft is ending its free Windows 10 upgrade for users of its accessibility features

The next generation of Windows Windows 10

If you use Microsoft‘s accessibility features and want a free Windows 10 upgrade, better hurry up because Microsoft is closing this last deal on 31 December.

Microsoft stopped offering free Windows 10 upgrades in July last year but users who use accessibility features, got an extension of that promo, a report in ZDNet said on Saturday.

Accessibility features in Windows are options to help users who may have trouble using their computers normally.

In July, Microsoft announced: “We are not restricting the free upgrade offer to specific assistive technologies. If you use assistive technology on Windows, you are eligible for the free upgrade offer.”

According to the report, Microsoft quietly edited that page last week and updated the original statement “We will make a public announcement prior to ending the offer” to “The accessibility upgrade offer expires on 31 December, 2017”.

The general ‘Upgrade to Windows 10 FAQ’ page was revised to include the expiration date for this offer. That page was “last reviewed” on 24 October.

Posted in Windows, Windows 10 | Tagged , , , , | Leave a comment

Microsoft finally kills off the Kinect, but the tech will live on in other devices

kinect-for-windows-sensor

Microsoft’s Kinect had a rapid ascent and slow, sputtering demise — it was an inelegant end, as the company couldn’t find a permanent spot for the once revolutionary accessory. Now Microsoft is finally ready to put the final nail in that coffin.

Kinect creator Alex Kipman and Xbox GM Matthew Lapsen told Fast Co. that the company is finally end-of-lifing the peripheral, after a few years of taking the pedal off the gas. We’ve since  confirmed the move with Microsoft.

It’s not for lack of trying, of course. After a debuting the 3D camera for the Xbox 360, the company started shipping the Kinect with its new Xbox One — but ultimately backed down making it mandatory part of the purchase. Ultimately, gamers seemed to prefer a more traditional game pad experience. As Nintendo can tell you, these sorts of activity-based gaming trends tend to regress back to the mean after a while.

Of course, that’s not to say the Kinect wasn’t a rousing success in its time. The device was truly revolutionary when it debuted in 2010, and all told, the company managed to move around 35 million units. The product’s depth sensing and voice recognition ushered in a new era of interactive gaming, going well beyond what Nintendo had managed with its Wiimotes, four years prior.

The power of the Kinect also extended well beyond the console. It was a relatively cheap and accessible and became a favorite of the DIY community, spawning a sub-genre of Kinect hacks. For a while, the things were popping up in the most unexpected places. Over the years I’ve visited a number of universities that have used them for everything from 3D scanning to robotic vision. In 2012, I took a trip the set of Laika’s stop motion film, ParaNorman, where one was being used for production.

So, pour one out for the bygone peripheral, but don’t mourn it too much. The Kinect was just too good to kill off completely. Depth sensing has made its way onto a number of devices in the meantime, from Project Tango to the iPhone X, and Microsoft is also utilizing the tech it built for current and future products.

“Manufacturing for Kinect for Xbox One has ended but it is not the end of the journey for the technology,” a spokesperson told “Kinect continues to delight tens of millions of Xbox owners and Kinect innovations live on in Xbox One, Windows 10, Cortana, Windows Holographic and future technologies.”

Posted in Kinect, MicroSoft | Tagged , , , , , , , | Leave a comment