Saturday, December 31, 2016

Space for Living

You need “green space.” Green spaces, formerly known as parks, have a multitude of psychological benefits. Spending time in nature has been shown to reduce stress and criminal behavior, restore attention, and increase people’s self-reported health. “This means space that you don’t have to make a special trip to, but space that you encounter in daily life — even green space that you see from your window,” McCay says. Much of the same holds for “blue spaces,” or ocean views. If you want to be more deliberate about getting your nature in, consider the Japanese practice of shinrin yoku, or wilderness bathing. You need “active space.” “When people are designing for health, this is the focus,” McCay says. “It’s a big opportunity for physical health, but there’s also a strong mental health correlation.” As in: Tons of research points to how physiological health drives emotional well-being, including a million-person study that came out last month saying that cardio protects you from depression. From an urban-design perspective, it’s not just parks that contribute to that, but active commutes, like walking and cycling — which are, coincidentally, the most energizing ways to get to work. RELATED STORIES Here’s a Much-Needed Strategy for Getting Good at Small Talk Why Declaring ‘I’m an Introvert!’ Limits Your Life You need “social space.” These are places where neighbors might spontaneously interact. “It’s a question of making public places more social, by, say, putting in more benches or setting up chessboards in a park or square,” McCay says. A bonus: It also reduces the need of going to bars. Providing spaces for bonding looks increasingly essential: Several decades of research point to how social support bolsters well-being and makes people more resilient; and a clever study of getting strangers to talk on commutes indicates that people are more eagerly open than they assume, even for introverts. And “safe space,” too. “This is crucial, whether it means security in terms of crime, traffic, or, for people with dementia, safety from getting lost,” McCay says. “But you don’t want to design a safe space so that it feels suffocating or sterile. For example, people should have choices about which route to take rather than being constrained into one specific ‘safe’ route.” These things have cascading consequences, as illustrated by a 2016 study of single working moms participating in an education program in Philadelphia. Women living in insecure neighborhoods didn’t feel safe letting their kids play outside, so they stayed in the home — making it harder to get their own schoolwork done. TAGS: URBANISMDESIGNCITIES

In the world of digital marketing, the numbers tell the story.

In the world of digital marketing, the numbers tell the story. Want to know if the time your are spending writing those clever Facebook posts is worth it? Check the number of reactions, comments and shares you are getting and see how many of your "Fans" and their friends you are reaching. Are your followers loving your tweets on Twitter? Check the number of retweets you are getting. It seems like every action you take online has a COMPLETE analytics suite to support it. That can be good, but it can also be a little - no A LOT - overwhelming! I will confess, I am a "numbers guy". But, I will even admit that, after awhile, everything runs together and the value of any single "metric" starts to lose its meaning. That's why I focus on just 5 numbers, the 5 digital marketing metrics that will drive your business in 2017. Key Metric #1 - Page Behavior on Google Analytics Google Analytics is a number lover's nirvana. The problem is there are literally thousands of numbers to look at. I go directly to a single screen to see how our website traffic as a whole, as well as any single individual page, is doing. It's the "All Pages" screen. Here's the one for kimgarst.com, one of our two websites. You can get there by entering Google Analytics, then selecting the "Reporting" tab first and scrolling down and clicking on "Behavior". Once there click on "Site Content" and then "All Pages". Look at the wealth of information! I can see our top perfroming pages ranked by "Pageviews" and all of the key data on each. From there I can make decisions about what's working, what's not and what our community wants more (or less!) of. For instance, from the data above I can see that two of our free offers are crushing it (#2 and #4) and that we might want to add a free offer on top Instagram Hashtags (that blog post received 63,000 pageviews and people spent, on average 10:01 on the page!) Key Metric #2 - E-Mail Open Rates What's the point of spending all of the time and effort building an email list if the people on the list never open the emails that you send them? Yes, email open rates are a critical metric that you should be intimately familiar with, but what's a good open rate? That's a question I get asked A LOT! My answer is "It depends", and that answer usually drives people crazy! But, let me explain and you will see why. So far in 2016 we have sent 65,823 "batches" of emails ranging from a single email to a single person to one reaching over 160,000 individual subscribers. Our opens rates ranged from a low of 5% to a high of 68% with an average of about 14%. The massive fluctuation is based on the segment of our entire subscriber base we choose for the mailing and the subject. For instance, the results below are for a follow-up email we sent to people who signed up for and attended one of our open training webinars. A whopping 48% of the subscribers opened the email and 15% actually clicked on one of the links in it. Whereas just 11% of the subscribers receiving one of our recent newsletters opened it and just 2% clicked on a link. However, the "top" performing email had 236 link clicks while the "bottom" performing one had 2,493! My point? Email open rates are a critical digital metric that will drive your business in 2017. Email open rates are a critical digital metric that will drive your business in 2017. CLICK TO TWEET You need to become familiar enough with yours to understand what a good open rate is versus a bad one based on your business, your market and the type of emails you are sending to the different segments of your list. Key Metric #3 - Facebook Post Engagement Our Facebook Fan Page numbers are HUGE. We have 400,000 Fans and our posts typically reach 1,000,000 - 10,000,000 people per week. However, in my opinion, those numbers don't mean a thing! What really matters is the number of people "engaging" (meaning reacting, commenting or sharing) with our Facebook posts. As a rough comparison, the number of Facebook Fans you have is similar to the size of your email list. The number, or percentage of post engagements is similar to your email open rate and link clicks. I know our posts for the week are particularly engaging when the post engagement rate (number of post engagements divided by Facebook Fans) is above 25%. In the screen shot above it's 29%, which is pretty strong. Key Metric #4 - Landing Page Conversion Rate Is this a good landing page? By good, I mean high converting. Let's find out. We have an absolute scale we measure our landing pages performance against. If our landing page conversions rate (the number of people who complete the information divided by the number of people who land on the page) is under 30% we pull the page, work on it and try again. From 30% to 50% is considered "average" for us and we leave the page up while we continue working on it. Above 50% is considered "good" and we pore a disproportionate percentage of our Facebook Ads budget to promote is. How do you calculate your landing page conversion rate? There are lots of ways. Google Tag Manager is free and pretty easy to set up. We use Facebook Ads and fiind the two pieces of data we need in the Ads Manager dashboard. The landing page conversion rate is simply the "Results" (the number of people who made it to the "Thank You" page) divided by the "Link Clicks" (the number of people who clicked the actual ad and were taken to the landing page). In the example above ,the landing page conversion rate is w whopping 60.2% (5,231/8688). So, the answer to my question is "Yes", this is an exceptional landing page. Key Metric #5 - Blog Social Sharing We use a WordPress plugin (Social Warfare) to make sharing our blog content quick and easy. How many people share our blog posts, and where, tells us the relative value of the information we are providing for our online community. For instance, the realtively new post above, a post about the best time to post on Facebook, has been shared 149 times...on Facebook! We have had posts shared 50,000+ times and other shared under 100. By tracking this metric we know which of our blog posts are resonating the best with our community. A Few Final Words about Digital Marketing Metrics What I have presented above are the 5 digital marketing metrics I use on a weekly basis to tell me, in a glance, how our website, email, Facebook, landing page and blog are performing. Each of the above is free and realtively easy to set-up. Don't be afraid of the numbers, embrace them. They provide amazing insights that will drive your entire business in 2017! Don't be afraid of the numbers, embrace them. They provide amazing insights that will drive your entire business in 2017! CLICK TO TWEET What are your favorite and/or the most powerful digital marketing metrics you look at? I would love to hear you answer in the comments section below. Share 20 Tweet 3 +1 4 Share 1 Pin 3 Buffer 8 SHARES 39 41de3b53b7fa1464306263-fb-live-checklist-below-post-optin.jpg Enter your name here... Enter your email address here... SEND IT TO ME! We promise to not use your email for spam! Filed Under: Business Building, Digital Marketing Leave a Reply Your email address will not be published. Required fields are marked * Comment Name * Email * Website POST COMMENT

Monday, December 26, 2016

searching for friends and family it’s entirely anonymous — so they’ll never know you did it. Try a search on Instant Checkmate right now to discover what secrets you can uncover.

Updated: 12/19/2016 - Sponsored by Instant Checkmate What Lies Have Been Written About You Online? What Lies Have Been Written About You Online? What lies have been written about you online? We all know that employers do background checks on potential employees, and it’s important for you to know exactly what could pop-up. Most people just Google themselves, but that basic search won’t reveal everything that’s out there. Think you’ve got nothing to hide? You probably don’t – really – but you could still have a damaged record. Whether some disgruntled ex lied about you on social media, you missed paying a bill years ago that went to the collectors, or someone has used your identity fraudulently, that information could ruin your future. Instant Checkmate is the leading background search site chosen by people all over America. It lets users perform background checks on themselves, friends, family, neighbors and acquaintances. Instant Checkmate finally gives you peace of mind, through quality searches across hundreds of millions of criminal, traffic, arrest records and much more. Through searching and compiling the information from millions of databases, Instant Checkmate provides: • Traffic and arrest records. • Criminal history, including DUIs and sexual offenses. • Online dating profiles. • Financial history. • Credit and debt information, including foreclosures and tax liens. • Properties owned and home value. • Current and past known home addresses. • Birth, death and marriage records. • Drives license information. • Email addresses and phone numbers. • Voter registration. • Corporate affiliations and job history. • Known associates, friends and family. It’s all available at your fingertips, and it’s only a search away. After getting a subscription you’ll also have access to unlimited searches, so you can look up potential employers, future dates, friends, neighbors and even your own family. Find out what they’ve been hiding. Suspicious that your date may be married, or some kind of predator? Instant Checkmate has also become a popular background check for single men and women around the country. Find out the facts before that first kiss! Of course, learning people’s secrets can be highly addictive. Fortunately, if you decide to start searching for friends and family it’s entirely anonymous — so they’ll never know you did it. Try a search on Instant Checkmate right now to discover what secrets you can uncover. Learn More This article sponsored by Instant Checkmate Copyright Howlifeworks.com 2016

Online Palengke Mall

DESCRIPTION We are an Advertising Company that will help you deliver your products to your Customer through our Website. Our Call Center Agent will help you purchase everything you need. Our ONLINE PALENGKE MALL will be your very first online site that provides all your market needs from 1 Kilo of dressed chicken, vegetables, porks, beef and all items that you basically see in your public market. Try and advertise your Business with us and you too will compensate having it all online... Things that you need... Today Is Your Palengke Day...Grab what you need and we will deliver it to your Door Step... GROUP TYPE GROUP TYPE Buy and Sell

Friday, December 23, 2016

SyntelVerified account @SYNTEL Syntel is the global leader in digital modernization services, with a core suite of automation-driven IT and knowledge process services. Troy, MI syntelinc.com Joined April 2009

http://www.syntelinc.com/ http://www.syntelinc.com/syntbots/ SyntBots®: Transform Your Business with Intelligent Automation Overview The digital age has brought together the technology and process maturity required to fundamentally transform IT services. Today, enterprises in every industry are under pressure to cut costs and become more agile. They face fierce competition from disruptive startups with a digital advantage, putting pressure on them to transform their businesses. Today’s “digital native” consumer is brand agnostic and attracted to ease of access and convenience. They expect services to be delivered anytime and anywhere, through social, mobile and other digital channels. Therefore, today’s enterprises must modernize and migrate their mission critical systems in order to engage digital native consumers and avoid a “digital disconnect”. In this environment, it has become critical for enterprises to: Create the financial and staffing capacity to plan and execute future business models, rather than day-to-day operations Quickly develop and market high-quality new products, services and functionality with lower costs Keep mission critical operations and systems running at peak performance around the clock To help enterprises cross this digital barrier, Syntel has built the SyntBots® platform. SyntBots is an integrated IT automation platform that enables efficient business transformation using recursive automation. Smart businesses are implementing intelligent automation by using SyntBots to transform and adapt to this new digital reality. SyntBots has certified integration with SAP NetWeaver, enabling clients to automate the implementation, rollout, and upgrade of SAP applications. It can be easily integrated into SAP environments and operates seamlessly with SAP applications. Services Syntel's Managed Services powered by SyntBots provides a holistic solution that enables businesses to thrive in the digital economy. SyntBots is a next-generation automation platform that utilizes intelligent automation to transform IT operations, DevOps, and processes across the entire enterprise. SyntBots addresses three key transformation areas: Ensure highly available IT systems and processes to serve customers across the globe over multiple channels using SyntBots for IT Operations Enable faster development of new products and ensure first time right using SyntBots for DevOps Automate processes to free up bandwidth to work on transformation ideas with SyntBots for Processes Three Pillars of SyntBots Three Pillars of SyntBots Three Pillars of SyntBots SyntBots for IT Operations SyntBots for IT Ops delivers a single, unified automation platform for managing an enterprise’s IT infrastructure, including application support, infrastructure support, monitoring, event handling and remediation. This is not simple trigger-based scripting that responds to failures and outages. SyntBots for IT Ops bases its actions on predefined business rules and guided machine learning to take precise and intelligent steps to keep the business running at peak performance. Through the power of predictive analytics, SyntBots for IT Ops can learn and understand trends — to enable preventive scaling instead of reactive recovery. It leverages recursive automation to virtually eliminate the cost associated with manual effort, reduces staff workload, and boosts system uptime. Solution Highlights: Automated management for applications and infrastructure, with auto remediation of monitoring, incident management and problem management Customizable levels of automation – from enriched or assisted to fully automated Creates a unified automation approach, vs. silos of tools 500+ ready to deploy SOPs for common recurring incidents Integration with ITSM tools for automatic updates Plug and play architecture Ticket enrichment and prioritization for problem tickets Rule-based workflows Metrics and reporting dashboards Enables increased offshoring and reduction in TCO 70% Improvement in SLA 35% Reduction in TCO Active Business Continuity Planning Reduced Operational Risk Insights SyntBots has helped customers address the challenge of transforming their businesses in the Digital Age. SyntBots has enabled many organizations to succeed in today’s marketplace, helped them revolutionize the way they use technology, and created future-ready enterprises. Video Overview Brochure Transform your Business with Intelligent Robotics Transform your Business with Intelligent Robotics Case Studies SyntBots Delivers Build Automation Processes SyntBots® Delivers Build Automation Processes SyntBots Helps Leading Financial Regulator with Successful Digital Transformation SyntBots® Helps Leading Financial Regulator with Successful Digital Transformation Reduce TCO by 35% in STP Exception Handling Operations with SyntBots Reduce TCO by 35% in STP Exception Handling Operations with SyntBots® SyntBots Delivers 60% More System Availability for Speciality Retailer SyntBots® Delivers 60% More System Availability for Speciality Retailer Contact Us To learn how SyntBots can power your digital transformation, get in touch with us today.

Wednesday, December 21, 2016

Seattle Robotics Society

@SeattleRobotics Message Now http://www.seattlerobotics.org/ MORE INFO About We are a community of amateur and professional robotics enthusiasts. Company Overview We hold monthly meetings at Renton Tech on the third Saturday at 10 a.m. See the meetings page http://www.seattlerobotics.org/meetings.php for details. Our online discussion group is at http://tech.groups.yahoo.com/group/SeattleRobotics/. Join members in an online IRC chat. There are people around at all times, and an official gathering at 7 p.m. Pacific time each Monday evening. See http://www.seattlerobotics.org/contact.php#Monday for details.

Nytec @NytecInc Nytec is a product innovation and consulting company that partners with companies worldwide to design, develop, and deliver lifestyle technologies. Kirkland, WA nytec.com Joined February 2014

http://www.nytec.com/ NYTEC In our 41st year, we are a full service design and engineering consulting firm providing end-to-end solutions and resources to make on-demand consumer lifestyle products a reality. We have deep expertise in research, design, and engineering across hardware, software, and cloud services. We can work on or off site, managing projects completely end-to-end in our Product Innovation Center (PIC) or embedding our talent into your team where there are gaps, through our Consulting Services (staff augmentation). From innovative new startups to the most recognized Fortune 100 companies, we utilize a collaborative approach between clients and our world class interdisciplinary team, to bring insightful research, thoughtful design, and end-to-end engineering solutions. The Nytec Product Innovation Center offers our partners a fresh perspective and full service end-to-end product design and development in a secure state of the art center. This competitive edge allows design and engineering to bring both form and function, balanced with a strong business point of view to help our clients deliver on their business objectives. We pride ourselves in providing partners with creative, practical designs that add more value than competing product design companies, all with superior customer attention.

/design-develop EDUCATE YOURSELF 4 places to learn to code for free May 17, 2016

It took me more than a decade of “trying to learn” how to code to actually learn to code. Starting in high school I had a burning desire to learn the exotic languages of computer programming. Like most, my interest began in a computer class while playing around with HTML. But it was only about a year and a half ago that I finally felt competent coding. Maybe I’m not going to blow the doors off, but man, does it feel great to say “I can code.” This post is dedicated to those who truly want to learn to code — to understand the fundamentals — using free online coding classes and tools that are available to everyone. A word about formal education Before we jump into the free courses, I would be remiss not to mention formal training. When I first attempted to become a competent coder, I signed up for a community college course around the corner from my office. It felt like I was in an episode of Community. While I enjoyed the physical presence of a professor, plus the structured time commitment and grading pressure, I found the biggest challenge with this approach is that most college curriculum is far behind commercially used languages and frameworks. I understand this statement paints colleges with a very wide brush, and I’m sure there are some excellent programs out there, but I’m an advocate for the “teach yourself” method. So, onto the reviews. Note: I’ve personally used all the courses listed below. There are far more out there, which you can find here. Learn to code: Getting started What should you learn first? Backend? Frontend? What’s the difference? This is super-basic stuff, but here’s a quick refresher so that we’re all on the same page. Here’s how I am using these terms: Backend development is all about creating the “brain,” which does all the processing of your website or app. If you’re using Facebook, the backend is the part that tells the user-facing web page what to show. Frontend development is what you “feel and touch” when it comes to the website or app. It’s the color and operation of a button, or the way a picture is displayed and what a user can do to it. If you’re just getting started, I recommend learning frontend development first, for the simple reason that you can easily see changes and updates as you make them. For example, you alter the spacing on a window, then refresh the page and boom — see if the changes occurred as you expected. 4 free online classes to learn how to code 1. Codecademy Code Academy Learn to Code A big player in the space and probably the one you’ve already heard of is Codecademy. In my opinion, Codecademy is the easiest to use, and probably the most basic. I haven’t taken all their courses, but I did enjoy their JavaScript course twice, as well as the Make an Interactive Website course. Pros to Codecademy: Easy to use Most basic Cons to Codecademy: Limited scope of learning Courses felt repetitive 2. Code.org Hour of Code Learn to Code I’m not embarrassed to say that I took a coding course aimed at young grade schoolers, all thanks to Code.org. The website pairs their online courses with live demonstrations happening around the United States. As such, you’re given a really simple, graphical way of understanding code and computer science. You’re not going to learn functional languages here. But if you’re looking to grasp the basics of coding, it’s a great introduction to how computers “think.” Try the accelerated course for 6- to 18-year-olds. Pros of Code.org: Learn the basics of basic computer programming Great to understand how computers think Cons of Code.org: You’re not going to learn web languages 3. Harvard’s CS50 Harvard CS50 Learn to Code A few years ago Harvard offered their seminal Introduction to Computer Science course online for free, which you can now find here. This is a great combination of Codecademy’s focus on learning usable languages with Code.org’s theoretical approach. Plus, you almost feel like you’re attending Harvard. At least when I took it a few years ago, the course ran the same time as spring and fall semesters, so a bit of time scheduling is required. Pros of CS50: Good balance between theory and practice Great videos of the lectures (not boring at all) Harvard…‘nuff said? Cons of CS50: It can move quickly at times The course was designed for full-time students so be prepared to put in the work 4. Khan Academy Khan Academy Learn to Code Khan Academy is probably my favorite of all coding courses. It was also the most recent one I took. Overall, the courses are in-depth and I really appreciated the structures in place to learn. At the same time, they’re probably the most challenging. Khan Academy interlaces interactive coding demos and quizzes with videos of lessons taught by teachers. I found the balance between the two really helpful in their JavaScript course, and the challenge level was just enough to keep me motivated and encouraged. Pros of Khan Academy: Live video alongside interactive coding Most challenging (in a good way) Cons of Khan Academy: Requires dedication as it’s not easy to start and stop Help and support aren’t as robust as Codecademy Bonus: Code with a buddy One final bonus suggestion is to pair up with a friend when learning how to code. I was fortunate enough to sit beside a great developer and I’d just bug him constantly with questions. If you have a patient friend who you can sit beside for a few Saturday coding sessions, it will pay HUGE in dividends. When you understand code enough to get the jokes… That’s when you know you’ve made it. This is really the goal. If you can understand developer jokes, you’ve gotten past the biggest learning curve. Why do I believe this? They say the last thing you comprehend when learning a new language is the jokes. Humor always relies on a nuanced understanding of any dialect. After 10 years, I finally get the jokes, and now laugh confidently with the best of them. Did you use free online courses to learn to code? Please share in the comments! Also published on Medium. Image by Dean Hochman via Compfight cc https://www.google.com/search?q=Free+Coding+Classes http://en.lmgtfy.com/?q=Free+Coding+Classes

HEG and GoDaddy join forces to help more people get their ideas online

Host Europe Group (HEG) including their popular brands 123Reg, Domain Factory, and Heart Internet.

Friday, December 16, 2016

Virtual private network - Wikipedia https://en.wikipedia.org/wiki/Virtual_private_network A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared ... ‎Proxy server · ‎Tunneling protocol · ‎OpenVPN · ‎Virtual Private LAN Service

Virtual private network From Wikipedia, the free encyclopedia "VPN" redirects here. For other uses, see VPN (disambiguation). [hide]This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article may be in need of reorganization to comply with Wikipedia's layout guidelines. (November 2016) This article contains embedded lists that may be better presented using prose. (November 2016) VPN connectivity overview A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running across the VPN may therefore benefit from the functionality, security, and management of the private network.[1] VPNs may allow employees to securely access a corporate intranet while located outside the office. They are used to securely connect geographically separated offices of an organization, creating one cohesive network. Individual Internet users may secure their wireless transactions with a VPN, to circumvent geo-restrictions and censorship, or to connect to proxy servers for the purpose of protecting personal identity and location. However, some Internet sites block access to known VPN technology to prevent the circumvention of their geo-restrictions. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN). From a user perspective, the resources available within the private network can be accessed remotely.[2] Traditional VPNs are characterized by a point-to-point topology, and they do not tend to support or connect broadcast domains, so services such as Microsoft Windows NetBIOS may not be fully supported or work as they would on a local area network (LAN). Designers have developed VPN variants, such as Virtual Private LAN Service (VPLS), and layer-2 tunneling protocols, to overcome this limitation. Contents [hide] 1 Types 2 Security mechanisms 2.1 Authentication 3 Routing 3.1 Provider-provisioned VPN building-blocks 4 User-visible PPVPN services 4.1 OSI Layer 2 services 4.2 OSI Layer 3 PPVPN architectures 4.3 Unencrypted tunnels 5 Trusted delivery networks 6 VPNs in mobile environments 7 VPN on routers 8 Networking limitations 9 See also 10 Further reading 11 References Types[edit] Early data networks allowed VPN-style remote connectivity through dial-up modem or through leased line connections utilizing Frame Relay and Asynchronous Transfer Mode (ATM) virtual circuits, provisioned through a network owned and operated by telecommunication carriers. These networks are not considered true VPNs because they passively secure the data being transmitted by the creation of logical data streams.[3] They have been replaced by VPNs based on IP and IP/Multi-protocol Label Switching (MPLS) Networks, due to significant cost-reductions and increased bandwidth[4] provided by new technologies such as Digital Subscriber Line (DSL)[5] and fiber-optic networks. VPNs can be either remote-access (connecting a computer to a network) or site-to-site (connecting two networks). In a corporate setting, remote-access VPNs allow employees to access their company's intranet from home or while travelling outside the office, and site-to-site VPNs allow employees in geographically disparate offices to share one cohesive virtual network. A VPN can also be used to interconnect two similar networks over a dissimilar middle network; for example, two IPv6 networks over an IPv4 network.[6] VPN systems may be classified by: The protocols used to tunnel the traffic The tunnel's termination point location, e.g., on the customer edge or network-provider edge The type of topology of connections, such as site-to-site or network-to-network The levels of security provided The OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity The number of simultaneous connections Security mechanisms[edit] VPNs cannot make online connections completely anonymous, but they can usually increase privacy and security. To prevent disclosure of private information, VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques. The VPN security model provides: Confidentiality such that even if the network traffic is sniffed at the packet level (see network sniffer and Deep packet inspection), an attacker would only see encrypted data Sender authentication to prevent unauthorized users from accessing the VPN Message integrity to detect any instances of tampering with transmitted messages Secure VPN protocols include the following: Internet Protocol Security (IPsec) as initially developed by the Internet Engineering Task Force (IETF) for IPv6, which was required in all standards-compliant implementations of IPv6 before RFC 6434 made it only a recommendation.[7] This standards-based security protocol is also widely used with IPv4 and the Layer 2 Tunneling Protocol. Its design meets most security goals: authentication, integrity, and confidentiality. IPsec uses encryption, encapsulating an IP packet inside an IPsec packet. De-encapsulation happens at the end of the tunnel, where the original IP packet is decrypted and forwarded to its intended destination. Transport Layer Security (SSL/TLS) can tunnel an entire network's traffic (as it does in the OpenVPN project and SoftEther VPN project[8]) or secure an individual connection. A number of vendors provide remote-access VPN capabilities through SSL. An SSL VPN can connect from locations where IPsec runs into trouble with Network Address Translation and firewall rules. Datagram Transport Layer Security (DTLS) – used in Cisco AnyConnect VPN and in OpenConnect VPN[9] to solve the issues SSL/TLS has with tunneling over UDP. Microsoft Point-to-Point Encryption (MPPE) works with the Point-to-Point Tunneling Protocol and in several compatible implementations on other platforms. Microsoft Secure Socket Tunneling Protocol (SSTP) tunnels Point-to-Point Protocol (PPP) or Layer 2 Tunneling Protocol traffic through an SSL 3.0 channel. (SSTP was introduced in Windows Server 2008 and in Windows Vista Service Pack 1.) Multi Path Virtual Private Network (MPVPN). Ragula Systems Development Company owns the registered trademark "MPVPN".[10] Secure Shell (SSH) VPN – OpenSSH offers VPN tunneling (distinct from port forwarding) to secure remote connections to a network or to inter-network links. OpenSSH server provides a limited number of concurrent tunnels. The VPN feature itself does not support personal authentication.[11][12][13] Authentication[edit] Tunnel endpoints must be authenticated before secure VPN tunnels can be established. User-created remote-access VPNs may use passwords, biometrics, two-factor authentication or other cryptographic methods. Network-to-network tunnels often use passwords or digital certificates. They permanently store the key to allow the tunnel to establish automatically, without intervention from the administrator. Routing[edit] Tunneling protocols can operate in a point-to-point network topology that would theoretically not be considered as a VPN, because a VPN by definition is expected to support arbitrary and changing sets of network nodes. But since most router implementations support a software-defined tunnel interface, customer-provisioned VPNs often are simply defined tunnels running conventional routing protocols. Provider-provisioned VPN building-blocks[edit] Depending on whether a provider-provisioned VPN (PPVPN)[clarification needed] operates in layer 2 or layer 3, the building blocks described below may be L2 only, L3 only, or combine them both. Multi-protocol label switching (MPLS) functionality blurs the L2-L3 identity.[citation needed][original research?] RFC 4026 generalized the following terms to cover L2 and L3 VPNs, but they were introduced in RFC 2547.[14] More information on the devices below can also be found in Lewis, Cisco Press.[15] Customer (C) devices A device that is within a customer's network and not directly connected to the service provider's network. C devices are not aware of the VPN. Customer Edge device (CE) A device at the edge of the customer's network which provides access to the PPVPN. Sometimes it's just a demarcation point between provider and customer responsibility. Other providers allow customers to configure it. Provider edge device (PE) A PE is a device, or set of devices, at the edge of the provider network which connects to customer networks through CE devices and presents the provider's view of the customer site. PEs are aware of the VPNs that connect through them, and maintain VPN state. Provider device (P) A P device operates inside the provider's core network and does not directly interface to any customer endpoint. It might, for example, provide routing for many provider-operated tunnels that belong to different customers' PPVPNs. While the P device is a key part of implementing PPVPNs, it is not itself VPN-aware and does not maintain VPN state. Its principal role is allowing the service provider to scale its PPVPN offerings, for example, by acting as an aggregation point for multiple PEs. P-to-P connections, in such a role, often are high-capacity optical links between major locations of providers. User-visible PPVPN services[edit] OSI Layer 2 services[edit] This section needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2016) (Learn how and when to remove this template message) Virtual LAN A Layer 2 technique that allow for the coexistence of multiple LAN broadcast domains, interconnected via trunks using the IEEE 802.1Q trunking protocol. Other trunking protocols have been used but have become obsolete, including Inter-Switch Link (ISL), IEEE 802.10 (originally a security protocol but a subset was introduced for trunking), and ATM LAN Emulation (LANE). Virtual private LAN service (VPLS) Developed by Institute of Electrical and Electronics Engineers, VLANs allow multiple tagged LANs to share common trunking. VLANs frequently comprise only customer-owned facilities. Whereas VPLS as described in the above section (OSI Layer 1 services) supports emulation of both point-to-point and point-to-multipoint topologies, the method discussed here extends Layer 2 technologies such as 802.1d and 802.1q LAN trunking to run over transports such as Metro Ethernet. As used in this context, a VPLS is a Layer 2 PPVPN, rather than a private line, emulating the full functionality of a traditional local area network (LAN). From a user standpoint, a VPLS makes it possible to interconnect several LAN segments over a packet-switched, or optical, provider core; a core transparent to the user, making the remote LAN segments behave as one single LAN.[16] In a VPLS, the provider network emulates a learning bridge, which optionally may include VLAN service. Pseudo wire (PW) PW is similar to VPLS, but it can provide different L2 protocols at both ends. Typically, its interface is a WAN protocol such as Asynchronous Transfer Mode or Frame Relay. In contrast, when aiming to provide the appearance of a LAN contiguous between two or more locations, the Virtual Private LAN service or IPLS would be appropriate. Ethernet over IP tunneling EtherIP (RFC 3378) is an Ethernet over IP tunneling protocol specification. EtherIP has only packet encapsulation mechanism. It has no confidentiality nor message integrity protection. EtherIP was introduced in the FreeBSD network stack[17] and the SoftEther VPN[18] server program. IP-only LAN-like service (IPLS) A subset of VPLS, the CE devices must have Layer 3 capabilities; the IPLS presents packets rather than frames. It may support IPv4 or IPv6. OSI Layer 3 PPVPN architectures[edit] This section discusses the main architectures for PPVPNs, one where the PE disambiguates duplicate addresses in a single routing instance, and the other, virtual router, in which the PE contains a virtual router instance per VPN. The former approach, and its variants, have gained the most attention. One of the challenges of PPVPNs involves different customers using the same address space, especially the IPv4 private address space.[19] The provider must be able to disambiguate overlapping addresses in the multiple customers' PPVPNs. BGP/MPLS PPVPN In the method defined by RFC 2547, BGP extensions advertise routes in the IPv4 VPN address family, which are of the form of 12-byte strings, beginning with an 8-byte Route Distinguisher (RD) and ending with a 4-byte IPv4 address. RDs disambiguate otherwise duplicate addresses in the same PE. PEs understand the topology of each VPN, which are interconnected with MPLS tunnels, either directly or via P routers. In MPLS terminology, the P routers are Label Switch Routers without awareness of VPNs. Virtual router PPVPN The virtual router architecture,[20][21] as opposed to BGP/MPLS techniques, requires no modification to existing routing protocols such as BGP. By the provisioning of logically independent routing domains, the customer operating a VPN is completely responsible for the address space. In the various MPLS tunnels, the different PPVPNs are disambiguated by their label, but do not need routing distinguishers. Unencrypted tunnels[edit] This section needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. (August 2016) (Learn how and when to remove this template message) Main article: Tunneling protocol Some virtual networks do not use encryption to protect the privacy of data. While VPNs often provide security, an unencrypted overlay network does not neatly fit within the secure or trusted categorization. For example, a tunnel set up between two hosts with Generic Routing Encapsulation (GRE) is a virtual private network, but neither secure nor trusted.[22][23] Native plaintext tunneling protocols include Layer 2 Tunneling Protocol (L2TP) when it is set up without IPsec and Point-to-Point Tunneling Protocol (PPTP) or Microsoft Point-to-Point Encryption (MPPE).[24] Trusted delivery networks[edit] Trusted VPNs do not use cryptographic tunneling, and instead rely on the security of a single provider's network to protect the traffic.[25] Multi-Protocol Label Switching (MPLS) often overlays VPNs, often with quality-of-service control over a trusted delivery network. Layer 2 Tunneling Protocol (L2TP)[26] which is a standards-based replacement, and a compromise taking the good features from each, for two proprietary VPN protocols: Cisco's Layer 2 Forwarding (L2F)[27] (obsolete as of 2009) and Microsoft's Point-to-Point Tunneling Protocol (PPTP).[28] From the security standpoint, VPNs either trust the underlying delivery network, or must enforce security with mechanisms in the VPN itself. Unless the trusted delivery network runs among physically secure sites only, both trusted and secure models need an authentication mechanism for users to gain access to the VPN. VPNs in mobile environments[edit] Mobile virtual private networks are used in settings where an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points.[29] Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, while they travel between different subnets of a mobile network.[30] They are also used in field service management and by healthcare organizations,[31] among other industries. Increasingly, mobile VPNs are being adopted by mobile professionals who need reliable connections.[31] They are used for roaming seamlessly across networks and in and out of wireless coverage areas without losing application sessions or dropping the secure VPN session. A conventional VPN can not withstand such events because the network tunnel is disrupted, causing applications to disconnect, time out,[29] or fail, or even cause the computing device itself to crash.[31] Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a permanently associated IP address at the device. The mobile VPN software handles the necessary network authentication and maintains the network sessions in a manner transparent to the application and the user.[29] The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is designed to support mobility of hosts by separating the role of IP addresses for host identification from their locator functionality in an IP network. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks. VPN on routers[edit] With the increasing use of VPNs, many have started deploying VPN connectivity on routers for additional security and encryption of data transmission by using various cryptographic techniques.[32] Setting up VPN support on a router and establishing a VPN allows any networked device to have access to the entire network—all devices look like local devices with local addresses. Supported devices are not restricted to those capable of running a VPN client.[33] Many router manufacturers, including Asus, Cisco, Draytek,[33] Linksys, Netgear, and Yamaha, supply routers with built-in VPN clients. Some use open-source firmware such as DD-WRT, OpenWRT and Tomato, in order to support additional protocols such as OpenVPN. Setting up VPN services on a router requires a deep knowledge of network security and careful installation. Minor misconfiguration of VPN connections can leave the network vulnerable.[citation needed] Performance will vary depending on the ISP. Networking limitations[edit] One major limitation of traditional VPNs is that they are point-to-point, and do not tend to support or connect broadcast domains. Therefore, communication, software, and networking, which are based on layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported or work exactly as they would on a real LAN. Variants on VPN, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this limitation. See also[edit] Anonymizer Dynamic Multipoint Virtual Private Network Geo-blocking Internet privacy Mediated VPN OpenVPN Opportunistic encryption Split tunneling Tinc (protocol) UT-VPN Virtual Private LAN Service Virtual private server https://www.youtube.com/channel/UCCdGkE9wcNXF9sENUr1YMMw/videos VPNBook Further reading[edit] Kelly, Sean (August 2001). "Necessity is the mother of VPN invention". Communication News: 26–28. ISSN 0010-3632. Archived from the original on 2001-12-17. References[edit] Jump up ^ Mason, Andrew G. (2002). Cisco Secure Virtual Private Network. Cisco Press. p. 7. Jump up ^ Microsoft Technet. "Virtual Private Networking: An Overview". Jump up ^ Cisco Systems, et al. Internet working Technologies Handbook, Third Edition. Cisco Press, 2000, p. 232. Jump up ^ Lewis, Mark. Comparing, Designing. And Deploying VPNs. Cisco Press, 2006, p. 5 Jump up ^ International Engineering Consortium. Digital Subscriber Line 2001. Intl. Engineering Consortium, 2001, p. 40. Jump up ^ Technet Lab. "IPv6 traffic over VPN connections". Jump up ^ RFC 6434, "IPv6 Node Requirements", E. Jankiewicz, J. Loughney, T. Narten (December 2011) Jump up ^ SoftEther VPN: Using HTTPS Protocol to Establish VPN Tunnels Jump up ^ "OpenConnect". Retrieved 2013-04-08. OpenConnect is a client for Cisco's AnyConnect SSL VPN [...] OpenConnect is not officially supported by, or associated in any way with, Cisco Systems. It just happens to interoperate with their equipment. Jump up ^ Trademark Applications and Registrations Retrieval (TARR) Jump up ^ OpenBSD ssh manual page, VPN section Jump up ^ Unix Toolbox section on SSH VPN Jump up ^ Ubuntu SSH VPN how-to Jump up ^ E. Rosen & Y. Rekhter (March 1999). "RFC 2547 BGP/MPLS VPNs". Internet Engineering Task Force (IETF). Jump up ^ Lewis, Mark (2006). Comparing, designing, and deploying VPNs (1st print. ed.). Indianapolis, Ind.: Cisco Press. pp. 5–6. ISBN 1587051796. Jump up ^ Ethernet Bridging (OpenVPN) Jump up ^ Glyn M Burton: RFC 3378 EtherIP with FreeBSD, 03 February 2011 Jump up ^ net-security.org news: Multi-protocol SoftEther VPN becomes open source, January 2014 Jump up ^ Address Allocation for Private Internets, RFC 1918, Y. Rekhter et al., February 1996 Jump up ^ RFC 2917, A Core MPLS IP VPN Architecture Jump up ^ RFC 2918, E. Chen (September 2000) Jump up ^ "Overview of Provider Provisioned Virtual Private Networks (PPVPN)". Secure Thoughts. Retrieved 29 August 2016. Jump up ^ RFC 1702: Generic Routing Encapsulation over IPv4 networks. October 1994. Jump up ^ IETF (1999), RFC 2661, Layer Two Tunneling Protocol "L2TP" Jump up ^ Cisco Systems, Inc. (2004). Internetworking Technologies Handbook. Networking Technology Series (4 ed.). Cisco Press. p. 233. ISBN 9781587051197. Retrieved 2013-02-15. [...] VPNs using dedicated circuits, such as Frame Relay [...] are sometimes called trusted VPNs, because customers trust that the network facilities operated by the service providers will not be compromised. Jump up ^ Layer Two Tunneling Protocol "L2TP", RFC 2661, W. Townsley et al., August 1999 Jump up ^ IP Based Virtual Private Networks, RFC 2341, A. Valencia et al., May 1998 Jump up ^ Point-to-Point Tunneling Protocol (PPTP), RFC 2637, K. Hamzeh et al., July 1999 ^ Jump up to: a b c Phifer, Lisa. "Mobile VPN: Closing the Gap", SearchMobileComputing.com, July 16, 2006. Jump up ^ Willett, Andy. "Solving the Computing Challenges of Mobile Officers", www.officer.com, May, 2006. ^ Jump up to: a b c Cheng, Roger. "Lost Connections", The Wall Street Journal, December 11, 2007. Jump up ^ "Encryption and Security Protocols in a VPN". Retrieved 2015-09-23. ^ Jump up to: a b "VPN". Draytek. Retrieved 19 October 2016. [show] v t e Virtual private networking [show] v t e Cryptographic software Categories: Network architectureComputer network securityInternet privacyCrypto-anarchismVirtual private networks Navigation menu

online communities

Global Rewards More THW Global has designed a system that rewards everyone for the efforts that drive our community. THW Global is not looking to be biggest player in the online video market, we just want to reward more people while becoming one of the world’s largest, best known online communities. Why THW Global FREE to Join Earn for doing things you’re already doing. Over 1,556,620 members in less then 90 days and growing at thousands per day. Don’t get left out, Join for Free Today! Earn By Taking Surveys Watching Videos Shopping Online Search the Web Playing Games Inviting Others Who Do the Same https://advertisingiv.thwglobal.com/ https://www.facebook.com/pg/thwglobalads/about/?ref=page_internal https://www.facebook.com/thwglobalcom-1124039054300952/ CONTACT INFO thwglobal.com Message Now http://www.bobo.thwglobal.com/ MORE INFO About Welcome to THW Global This Is A Pre-Launch Registration Page! THW GLOBAL ADVERTISING Starts on The 4th of July 2016 Becom Company Overview Welcome to THW Global This Is A Pre-Launch Registration Page! THW GLOBAL ADVERTISING Starts on The 4th of July 2016 Becom General Information Welcome to THW Global This Is A Pre-Launch Registration Page! THW GLOBAL ADVERTISING Starts on The 4th of July 2016 Becom https://play.google.com/store/apps/details?id=com.wWelcometoTHWGlobal&hl=en THWGlobal - Android Apps on Google Play https://play.google.com/store/apps/details?...wWelcometoTHWGlobal... Rating: 4 - ‎425 votes - ‎Free ATENCION! OPORTUNIDAD GRATIS. OPORTUNIDAD UNICA!!! TE IMAGINAS SI YOUTUBE TE PAGARA POR VER SUS VIDEOS Seria buenísimo ... Translate the description back to Spanish Translate 🌟🌟🌟ATENCION! FREE OPPORTUNITY 🌟🌟🌟 UNIQUE OPPORTUNITY !!! IF YOU THINK YOU PAY FOR YOUTUBE VIDEOS SEE YOUR It would be really terrific !!!!! THWGlobal gives you that only chance. --Promueve And win just to see their videos and give comments. You --Ganarás $ 250 a week 10 hours a week maximum $ 25 per hour. You --Ganarás $ 5 for each direct referral. You --Ganarás $ 1 for each referral to level 10. READ MORE REVIEWS 4.1 425 total 5 267 4 51 3 36 2 14 1 57 hasan Ansari not worry reply me i try to register with my all correct information but it's can not accepted i don't know way there is something that i don't know maybe i reply me and let me know how to register in it AMAN KUMAR Is so solely loading videos So many add Jay Patidar scam why no started at 4 July why you making foolish pepole. there no have news. no any update. no any massage about start. we are waiting and we are making other people to foolish. if you are truly then clear it doubt all. if you scamer then go to Hall you Can't login Can't login, no error msgs. In a different language and no option to change it. WHAT'S NEW Nueva sección survey center nueva ventana anuncios Alunas mejoras notables Nueva seccion de noticias Opcion de traduccion de la pagina Detecion de ubicacion Creacion de acceso en el escritorio Entre otros ADDITIONAL INFORMATION Updated September 20, 2016 Installs 10,000 - 50,000 Current Version 4.0 Requires Android 2.3 and up https://www.youtube.com/channel/UCCdGkE9wcNXF9sENUr1YMMw/videos Content Rating Rated for 3+ Learn more Permissions View details Report Flag as inappropriate Offered By GeuriG. Developer Visit website Email geuri.garcia@hotmail.com https://www.youtube.com/channel/UCCdGkE9wcNXF9sENUr1YMMw/videos https://play.google.com/store/apps/details?id=com.wWelcometoTHWGlobal&hl=en

DEC. 14, 2016 How to Protect Your Personal Information Online

DEC. 14, 2016 How to Protect Your Personal Information Online Runa Sandvik, The New York Times’s director of information security in the newsroom, and Nicole Perlroth, who writes about cybersecurity and privacy, answered reader questions about cybersecurity and protecting personal data online. Read the full transcript below. Runa Sandvik Director of Information Security, The New York Times 8:26 PM ET Hello! I’m Runa, the Director of Information Security for the Newsroom at The New York Times. What questions do you have about information security and how to protect yourself online? Please submit your questions in advance and we’ll answer some of them during tomorrow’s chat. Nicole Perlroth Reporter, The New York Times 9:04 PM ET Hi, I’m Nicole and I cover all things cybersecurity and hacking for The Times. I’m looking forward to your questions and hearing about how you have dealt with your issues around data protection. Runa Sandvik Director of Information Security, The New York Times 1:57 PM ET Hi everyone - we’ll be starting our chat shortly. Nicole is unfortunately running late, but we’re looking forward to answering your questions! M Marc Reader, United Kingdom 2:00 PM ET Should I buy a 2FA token or continue using my mobile phone to secure my account? How would you describe to my tech-illiterate relatives the importance of securing their email accounts? Runa Sandvik Director of Information Security, The New York Times 2:00 PM ET Marc - I usually say that not securing an online account is like not having a lock on your front door. The better the lock, the harder it is to get in. Describing the importance of security to others is all about figuring out what matters most to them; sometimes it’s more about access to content and not so much encryption and security and privacy. A Andrew Reader, Netherlands 2:01 PM ET Besides a firewall and anti-virus software, do you recommend encrypting a harddrive as an extra measure against cyber crime? Runa Sandvik Director of Information Security, The New York Times 2:02 PM ET Andrew - that’s a great question! Encrypting your hard drive will protect data stored locally on the drive if the computer is ever lost, stolen or seized. To protect data you have stored in the cloud, I recommend that you consider good passwords and two-factor authentication where possible. CK Charles Koppelman Reader, Berkeley, CA 2:03 PM ET Without giving away too much, can you tell us what security protections NY Times reporters take in their communications? Especially with sources. Runa Sandvik Director of Information Security, The New York Times 2:03 PM ET Charles - earlier today we launched a tips page with secure communication channels for sources. This page (https://nytimes.com/tips) tells sources how to reach us on Signal, WhatsApp, SecureDrop, via encrypted email and postal mail. In short, we are familiar with and frequently use various secure communication tools to ensure that we protect our communications, data, and sources. R Rosie Reader, Philadelphia, PA 2:10 PM ET I am one of the unfortunate yahoo users. To update “security” they are asking for my phone number and another email. Isnt this just foolish to give to the site? What else can I do? What happens if you shut down an account (which I have never tried to do) Runa Sandvik Director of Information Security, The New York Times 2:10 PM ET Rosie - I’m sorry to hear you were affected by the Yahoo breach! If you’re not confident that the provider can protect the additional information it is now asking for, you may want to consider other providers. The provider will still have all the contents you’ve given up so far, but at the very least you won’t give up more going forward. J Julie Reader, Ireland 2:11 PM ET If your browser asks, “Do you want to remember this password?” what should you choose? Runa Sandvik Director of Information Security, The New York Times 2:12 PM ET Julie - instead of relying on a single browser to remember passwords for you, I recommend you look into a password manager instead. The password manager will help you create and remember good, unique passwords for all your sites and services. By using a password manager, you can access your passwords from any computer, regardless of the browser you are using. WS Waheed Shams Reader, Brooklyn, NY 2:12 PM ET Can I make a new e-mail account and transfer all data to the new address for protection? Runa Sandvik Director of Information Security, The New York Times 2:12 PM ET Waheed - you could technically create as many email addresses as you want, but the bigger question here is what you’re trying to protect yourself or the emails from? If the emails are already with a provider, moving to a different provider isn’t going to change the fact that the first one already has access. WS Waheed Shams Reader, Brooklyn, NY 2:13 PM ET What can I do AFTER finding my e-mail was hacked? Runa Sandvik Director of Information Security, The New York Times 2:13 PM ET Waheed - in situations where one of your online accounts have already been hacked, it is highly recommended that you secure the account as best as you can. This means changing the password, setting up two-factor authentication (if possible), reviewing active sessions and devices for anything suspicious (that is, for devices and activity you don’t recognize). JG Joan Garrity Reader, White Marsh, MD 2:13 PM ET Is it really realistic at this point to think it is possible to protect one’s personal information from being hacked?? Runa Sandvik Director of Information Security, The New York Times 2:13 PM ET Joan - within the information security community we always say that nothing is 100% secure. What’s important is that you consider how the service will use the information you’re providing; this is essentially information that you are trusting the service with, information that could leak at some point in the future. This is true not only for emails, but for social media, messages, etc. L Liz Reader, Boston, Massachusetts 2:17 PM ET How do I validate an email from my email provider telling me I need to change my password if there is a chance it is a hacker? Runa Sandvik Director of Information Security, The New York Times 2:17 PM ET Liz - some phishing emails look very realistic and it can be hard to tell a phish from a real email. A few things to look out for include; is the sender someone you recognize? did the email come from the provider itself? if you hover over the link in the email, does it point to the domain owned by the provider? If you receive an email requesting that you change your password, I suggest you open a new tab in your browser, go directly to the email provider’s website and change your password there. Do not use the link in the email to do so. P Patrick Reader, San Francisco, CA 2:18 PM ET What is a 2 FA token Runa Sandvik Director of Information Security, The New York Times 2:18 PM ET Patrick - good question! 2FA is short for “two-factor authentication.” That’s when you use your username, password and a random code that, say, your phone has generated to log on to your account. In this case, your phone is the ‘token’ that generates the code. You can also receive the code via SMS, or you can use a hardware token, such as a YubiKey (looks like a tiny USB stick). B Bryan Reader, Chicago, IL 2:19 PM ET Can you suggest a password manager? There are so many to remember. Runa Sandvik Director of Information Security, The New York Times 2:19 PM ET Bryan - a password manager is a great option if you’re looking for ways to create and remember good, unique passwords for all your services. I highly recommend you look at 1Password, Dashlane and LastPass. M Marc Reader, West Islip, NY 2:20 PM ET Hi, do you recommend storing files on a separate drive to protect from ransomeware? Runa Sandvik Director of Information Security, The New York Times 2:20 PM ET Marc - I’ll always recommend creating backups of data you care about, whether you’re concerned about ransomware specifically or something different. For many, cloud services are great for backing up content. If you don’t want to put your data in the cloud, using an external hard drive is a great alternative. B Barb Reader, Philadelphia, PA 2:25 PM ET Are we really protected by secured apps if a hack were to happen? Runa Sandvik Director of Information Security, The New York Times 2:25 PM ET Barb - when we talk about secure messaging apps and what they can do for us, it is important to remember that while the apps may not provide 100% security or any guarantees, they do protect a bigger portion of the communications than if we didn’t use the apps. With Signal, for example, the app will encrypt the contents of the messages (and calls) and the service does not retain any metadata about the who and when and how often. Photo Subpoenas and Gag Orders Show Government Overreach, Tech Companies Argue Open Whisper Systems received a subpoena for information on its Signal app subscribers and an order not to talk about it, a practice Microsoft and others say is too prevalent, and unconstitutional. The New York Times WK William Kolb Reader, Memphis, TN 2:25 PM ET A billion were hacked; out of how many? How do I know if I’ve been hacked? Runa Sandvik Director of Information Security, The New York Times 2:25 PM ET William - I believe Yahoo is currently notifying users who were affected by the most recent breach. If you have not received such a notice, I’d still advice you to change the password on your account (and anywhere else where you’ve used the same password) and set up two-factor authentication where possible. This is true not just for Yahoo and email in general, but for any other account that you have. J John Reader, Pasadena, MD 2:27 PM ET Are password managers like keychain and lasspass really a good idea? Doesn’t this just mean that a hacker has to crack/discover/fish one password to get access to all your passwords? Runa Sandvik Director of Information Security, The New York Times 2:27 PM ET John - you’re asking a good question and I understand it may seem a bit backwards to put all your passwords in the cloud, hope the provider doesn’t get hacked and trust us all when we say this is better than not using a password manager. Realistically, using a password manager with a good, unique master password is better than not using one. If you’re not using one, you’re likely to start re-using passwords at some point and that’s far from ideal. Nicole Perlroth Reporter, The New York Times 2:29 PM ET Hello readers! Nicole Perlroth, cybersecurity reporter for the New York Times here. Sorry I’m late! Excited to jump in and answer your questions. C Cynthia Reader, Manhattan Beach, CA 2:34 PM ET Is there any way to permanently delete old messages from email and social media accounts? Runa Sandvik Director of Information Security, The New York Times 2:35 PM ET Cynthia - deleting content means that it’s no longer available to you or anyone who gains access to your accounts. The majority of service providers out there do retain content, however, even if you have deleted it yourself. Something to keep in mind depending on whether your concern is a hacker or someone taking legal action. L Larry Reader, Encino, CA 2:35 PM ET I am a CEO concerned about protecting my employees’ emails in the wake of this Yahoo attack. What can I do to prevent them from reusing passwords? Is 2FA an option for me? Nicole Perlroth Reporter, The New York Times 2:37 PM ET Larry, Your best defense is to encourage employees to enable two-factor authentication and to set policies that force employees to change up their passwords every 90 days or so. You are bound to hear some gripes, but some complaining is much preferred to having your data in the hands of hackers. J Jerry Reader, New York, NY 2:41 PM ET Are firewalls such as Sonicwall effective in preventing hacking? Runa Sandvik Director of Information Security, The New York Times 2:41 PM ET Jerry - a firewall is one tool in the security toolbox that can help you protect your network and the devices on it. There is sadly no one tool that can defend against all possible attacks. Keep in mind that you also need to secure all your online accounts - we’ve talked a bit about use of two-factor authentication and password managers as starting points for doing so. Nicole Perlroth Reporter, The New York Times 2:47 PM ET Jerry- Firewalls are never a bad idea. But I put them in the same bucket as antivirus software, in that they make it harder for hackers, but are not a cure-all. It’s important to layer on other security defenses, like two factor authentication for email, to protect your data. A Arne Reader, Dallas, TX 2:41 PM ET Is it true that most SMS message apps are easily read by outside parties, but that Signal cannot be? R Rosie Reader, Arlington, MA 2:41 PM ET I heard iPhones are encrypted. Should I be using Signal anyway? Runa Sandvik Director of Information Security, The New York Times 2:45 PM ET Nicole has a good point here about the iPhone and the Signal messaging app; the iPhone does encrypt the data stored locally, but does by default not do anything for your communications using the phone. That’s where apps such as Signal come in; the app will encrypt your messages and your calls, and the service is designed to retain as little metadata as possible. Correction 12/16/16: Suggesting that the iPhone does not do anything to protect your communications is an oversight on my part. iOS does, by default, use end-to-end encryption for messages sent using iMessage from one iPhone to another. In addition, FaceTime will encrypt audio and video calls by default. If you are communicating with someone who does not have an iPhone, however, it is recommended that you use an app such as Signal to ensure end-to-end encryption. — Runa Nicole Perlroth Reporter, The New York Times 2:41 PM ET Arne and Rosie had similar questions about protecting text messages from snoopers. iPhone content is encrypted and harder for hackers to intercept, but I also recommend that people use secure, encrypted messaging apps like Signal and Wickr for more sensitive communications. P Phil Reader, Cary, NC 2:43 PM ET Runa, you said to use an external hard drive to protect data from ransomware. Doesn’t ransomware take all drives connected to the computer hostage? Runa Sandvik Director of Information Security, The New York Times 2:44 PM ET Phil - you’re correct in saying the ransomware will grab whatever is on the local drive and any attached devices. What you could do is either use the cloud to back up your data or use a hard drive that you attach, back up the data on, detach and store somewhere safe. G George Reader, Tampa, FL 2:50 PM ET How reliable is checking to see if the email comes from the alleged sender? My niece published an op-ed in today's Times explaining how she became a victim of a spear phishing attack courtesy of Qatar. Can phishers fake domain names? And I believe the Times reported on the Israeli company that developed the hacking tools and sold them to Qatar. See http://www.nytimes.com/2016/08/26/technology/apple-software-vulnerability-ios-patch.html. Runa Sandvik Director of Information Security, The New York Times 2:51 PM ET George - it can sometimes be difficult to tell a fake email from a legit one, and the people behind these emails are getting more and more creative with how they do it. Sometimes they create fake domain names that look just like the real ones you’re expecting to see, other times the contents of the email is almost exactly the same as what the real company would send out (minus a spelling mistake or two). A great piece on what it’s like to have your accounts hacked is this one from Mat Honan https://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/ D David Reader, Austin, TX 2:51 PM ET I’m still unconvinced about using a password manager, in effect ‘putting all your eggs in one basket’- it seems like these companies would be prime targets for hackers. How long before we hear of one of these 'vaults’ being hacked? Nicole Perlroth Reporter, The New York Times 2:51 PM ET David, You’re right to be skeptical. Password managers like LastPass have themselves been compromised in a breach. It’s important to do some diligence to understand which Password Managers have the best reputations. I am also a skeptic and keep my most sensitive passwords (for banking and email) off the web completely. S Susan Reader, Dallas, TX 2:53 PM ET I, too, have had a Yahoo email account for a long time. I see above that you said people might consider switching, which I want to do. What type of email do you use personally and/or what would you recommend? Runa Sandvik Director of Information Security, The New York Times 2:53 PM ET Susan - I personally use Google for email and that’s the provider we use here at The New York Times too. I can’t speak to other providers, but I would encourage you to choose a provider that allows you to do things like: set a good password, turn on two-factor authentication and review active sessions and devices (this comes in useful if you need to review where your account was last accessed from, for example). Some providers have better terms of service agreements and privacy policies than others, so you may want to review those as well to better understand when/how your information is collected, stored and used. P Priya Reader, Glen Ellyn, IL 2:59 PM ET I was talking to my colleagues today about protecting data online and trying to articulate why its important. They think I am paranoid and a conspiracy theorist. Am I? Can governments, businesses and individuals really use your information against you? Emails, google searches, photos, etc? Nicole Perlroth Reporter, The New York Times 2:59 PM ET Priya, That is a great question. You are paranoid and these days, that’s a wonderful thing. Government hackers have routinely scoured LinkedIn and Facebook to send tailored emails to targets they want to hack. There was even one case of an oil company that state hackers could not breach head on, so they researched which restaurants employees preferred by looking at their Facebook Likes and infected the PDF take out menu of a Chinese restaurant employees ordered from. I would recommend sharing that story with any colleagues that consider you a paranoid, conspiracy theorist. It’s sure to be a wake up call. Photo Hackers Lurking in Vents and Soda Machines Companies are finding that their greatest cybersecurity threats can hide in third-party systems, like networked air-conditioning equipment. The New York Times Runa Sandvik Director of Information Security, The New York Times 2:59 PM ET Priya - that happens to me all the time! I find that it’s easier to argue for why it’s important if you can find a hook that helps them understand why it’s important to them. One example is use of the Signal messaging app; not everyone will care about the fact that it encrypts all calls and messages and retains little data. For some, the fact that it allows calling and messaging for free is a better selling point (and gifs, everyone loves gifs). Nicole Perlroth Reporter, The New York Times 3:00 PM ET Thanks so much for your (very thoughtful) questions, today, everyone. It’s been a pleasure. I hope we didn’t scare you off the digital universe completely! Runa Sandvik Director of Information Security, The New York Times 3:01 PM ET Thanks everyone! This has been great and I hope our answers were helpful. new post

We want to be the best content marketing agency on the planet.

GROW To accelerate our growth through the aggressive demonstration of long-term results to our clients. STRENGTHEN To strengthen our hold on the content marketing landscape and further raise awareness of Brafton’s premium offerings. DEVELOP To develop long-term partnerships with our client base through great products and best-in-class service.

infowars @infowars You have found the tip of the spear in alternative media - Circumventing the dying dinosaur media systems of information suppression Austin, Texas infowars.com Joined April 2008

BREAKING NEWS

Brafton provides custom content marketing strategies and the writing, graphics and videos to fuel your business online. www.brafton.com

BUSINESS INFO Founded in 2008 Mission Providing custom content marketing solutions leveraging the power of breaking industry news ADDITIONAL CONTACT INFO info@brafton.com http://www.brafton.com/ MORE INFO About Brafton provides custom content marketing strategies and the writing, graphics and videos to fuel your business online. www.brafton.com Company Overview Content Marketing from Brafton At Brafton, we provide custom marketing strategies and the content to fuel them. We give you videos, graphics and writing for se... See More Awards Inc. 5000 2014 Inc. 500 2013 Inc. 500 2012 Products News Content Marketing, Custom Web Content, Social Media Management, SEO Strategy and Implementation, RSS Marketing

Content that connects: Interactive media successes interactive media is the future of content marketing

interactive media is the future of content marketing Bookmark this link to get instant access to our 12 days of content as we upload them. Content that connects: Interactive media successes in 2016 DECEMBER 13, 2016sep 3 MIN. TO READsep GRAPHICS Not sold on the idea of interactive media? Video game developers might beg to differ to the tune of $99.6 billion in revenue during 2016 alone. Content marketing certainly isn’t the same as the latest Triple-A first-person shooter, but the factors that drive video game success are equally applicable to interactive content. In short, being able to interact with media inherently boosts audience engagement, as individuals become participants instead of passive consumers. Brafton has seen firsthand how an interactive approach to content marketing can provide huge return on investment. Meanwhile, data shows interactive content is increasingly in demand. That’s why your brand should take a closer look at this emergent form of content marketing. Deryk King, Director of Technical Services at Brafton, has spotlighted four prime examples of interactive media done right during 2016. Keep these top of mind heading into the new year. Cross Me When it comes to dating, “interactive” is the name of the game. So it makes sense that Japanese dating application Cross Me would double down on user engagement. The app’s highly interactive official website was even awarded “Website of the Day” by CSS Design Awards. “During loading, the merging of the two sides and the count up of percentages is engaging and different,” King said. “Each panel is short and succinct, with items being interactive to at least provide a level of feedback (bubbles grow and even the background is draggable a few pixels), and even something as mundane as the cursor has been transformed to provide a unique browsing experience.” Mondial de l’Automobile The Paris Motor Show has been attracting millions of automobile fanatics for more than 100 years. Now, thanks to its interactive website, those who may not be able to board a jet to the City of Lights can still get a feel for the excitement. “[The website] provides a great use of a 360-degree imagery to get you to interact with different aspects of the image and provide you with further info on the cars,” King said. Cartoon Network Studios Children and adults alike have helped make Cartoon Network a success. The cable and satellite television channel has made headlines in the past for unique, in-your-face marketing campaigns that appealed to both demographics. On the official Cartoon Network Studios website, the organization continues to think outside the box by integrating site navigation with interactive capabilities. “[The website] takes their logo and transforms each letter into something interactive with animation,” King said. “Not all items are clickable, making the user search for the menu items (they are also all at the top in traditional style), but since each one provides some entertainment value, it represents a unique and fun interactive navigation.” Android Proving that pretty much any form of online content can be interactive, Android has transformed the dreaded 404 screen into a game. Not being able to find what you’re looking for is usually cause for internet-user frustration. However, Android has turned this scenario into something users may even seek out. “[This isn’t media so much as] an interactive 404 page that is a fun game to play as a result of a website error,” King said. There’s a strong case to be made that interactive media is the future of content marketing. The question for businesses is what form this media will take for their brands. While many associate interactive media with online quizzes and the like, the above examples show there’s no end to creative ways to align content with audience engagement. Bookmark this link to get instant access to our 12 days of content as we upload them. Eric Wendt Eric Wendt is a writer and editor at Brafton. He discovered his love of words after realizing he was terrible at math. If he's not updating his Tumblr with poetry he's too embarrassed to share, there's a good chance he's out in search of the perfect pale ale.

Suggest Edits CONTACT INFO @MyWordpressHosting Message Now http://mywordpress.hosting/ MORE INFO About Why bother w/ conventional hosting, setting WordPress, buying themes, buying plugins and tons of other stuff when you can have all that and more for FREE

HERE FOR YOU, LADIES AND GENTS We listen and we learn. We make it simple and affordable. We do what we love, and what better way to show it then to provide the best possible experience for you. Keeping you happy keeps us happy, law of the universe really. No matter if you just want to try out blogging, or looking to create your own network, you have come to the right place. VIEW PLANS

https://www.facebook.com/presidentialcom/

"Presidential Communications (Government of the Philippines)"About Suggest Edits BUSINESS INFO Created on July 30, 2010 CONTACT INFO @presidentialcom Message Now presidentialcommoffice@gmail.com http://president.gov.ph/ MORE INFO About Communications Office of the President of the Philippines STORY Communications Office of the President of the Philippines Milestones 2016 100th Day in Office of President Rodrigo Roa Duterte The Official Visit of President Rodrigo Roa Duterte to the Socialist Republic of Viet Nam The Working Visit of President Rodrigo Roa Duterte to the Republic of Indonesia The Participation of President Rodrigo Roa Duterte to the 28th and 29th ASEAN Summits and Related Meetings 50th Day in Office of President Rodrigo Roa Duterte 2010 Posted on July 30, 2010

http://www.willierevillame.com/

Nobody Nobody but Juan (2009; cameo appearance) Pera o bayong (Not da TV) (2000) Matalino man ang matsing na-iisahan din! (2000) Alyas Boy Tigas: Ang probinsyanong wais (1998) Kasangga kahit kailan (1998) Bobby Barbers, Parak (1997) Go Johnny Go (1997) Kung kaya mo, kaya ko rin (1996) Sa kamay ng batas (1995) Ikaw Pa Eh Love Kita! (1995) Omar Abdullah: Pulis Probinsya 2, Tapusin Na Natin Ang Laban (1995) Hector (1994) The Eddie Fernandez Story (1994) Abrakadabra (1994) Ako (1993) Pat. Omar Abdullah: Pulis Probinsiya (1992) Contreras Gang (1991) Sagad Hanggang Buto (1991) Joey Boy Munti, 15 anyos ka sa Muntilupa (1991) Sam & Miguel (Your basura, no problema) (1991) Barbi for President (1991) Joe Pring 2: Kidlat Ng Maynila (1990)

Transform Your Phone Into A Professional Quality Camera! https://www.youtube.com/watch?v=mJLjsRL91aw

Today HD360X has announced the release of a super-premium auxiliary smartphone zoom that will bring professional image magnification to today’s Smartphone Cameras. https://www.youtube.com/watch?v=mJLjsRL91aw Are you a social media aficionado who likes to post pictures of everything you do? How about someone who likes to take pictures of outdoor objects, but doesn’t want to spend money on a big camera with a quality zoom? If you’ve ever been jealous at the quality of some of the photos that you see, you may be surprised to learn than they didn’t spend hundreds or thousands of dollars on a standard DSLR camera. Those impressive photos could very well have been taken with the HD360X Zoom lens that attaches to your smartphone! I know what you’re thinking…there’s no way that a smartphone can take high quality photos like that. But I’ll tell you that you are in for a pleasant surprise when you see what this little lens can do. And when I say little; I mean it. The HD360X Zoom is less than 3” long and weighs less than 2-ounces, so it’s extremely easy to carry around with you. And the fully universal clip technology allows you to use the lens on any smartphone, so you won’t have to buy a new one! The HD360X Zoom was developed for the recreational photographer who wants to take professional quality photos, but can’t afford a professional camera. The price is affordable for almost any budget and it’s easy enough for anyone to use. If you’ve ever had a dream about taking high quality photos from your smartphone, then your time has arrived! Check Availability Cory Brown, lead technologist from Stuttgart, said this on the record: “Our design goals were specifically set to make this lens the absolute best in the world. We combined the highest quality optics with rugged materials that will make the HD360X Zoom withstand a variety of environments. People no longer have to buy an expensive camera. They already have an expensive smartphone that they carry with them all the time, so our idea was to give consumers a small zoom lens that will provide the sharpest focus and produce a sparkling image quality without putting a big hole in their budget.” - Cory Brown With the HD360X Zoom, you will experience 8x magnification that will allow you to take pictures and videos of objects that are far away. Whether you are at a sporting event or just out in the city or country, there won’t be many things that are too far away for you to get a quality photo with this lens. But if you don’t want to use the lens to take a picture for some reason, then you can remove it and use it as a monocular as well! So what does all this mean for you? It means that you will be able to take high quality photos wherever you go. And if you are big on posting your photos on social media, prepare to get even more likes, comments and followers on all of your platforms. Once your friends see the high quality images that you can take with your phone, they will be impressed and share your photos with their friends to make you a hot commodity! It is designed to ensure that you never miss a moment, whether you want to take a flawless selfie, a long-distance shot or even a panorama of a beautiful horizon. The adjustable zoom for taking photos or videos ensures that you can capture exactly what you want at the exact time that you want. View Far Away Objects As If They Are Inches Away! The HD360X Zoom is a durable lens, but you still need to take extra care of it. That’s why we include rubber lens caps for the front and back, as well as a microfiber cleaning cloth to delicately wipe off your lens without scratching it. You’ll never have to worry about overpaying for a big and bulky DSLR camera again. Instead, spend your money wisely on the new HD360X Zoom lens and enjoy the same quality photos at a cheaper price and with less hassle! This Zoom Lens is selling for 75% off it's normal price! So make sure you hurry and grab yours now at the discounted price before supplies run out. You save OVER $160.00 by paying $56 instead of the original price of $224.45!

New! Internet Download Manager v6.27. Added Windows 10 compatibility. Fixed compatibility problems with different browsers including Internet Explorer 11, all Mozilla Firefox versions up to Mozilla Firefox Aurora, Google Chrome. Improved FLV grabber to save videos from web players on web pages, Google Video, MySpace TV, and other popular sites

New! New discounts. Get Internet Download Manager for a low price now! Internet Download Manager (IDM) is a tool to increase download speeds by up to 5 times, resume and schedule downloads. Comprehensive error recovery and resume capability will restart broken or interrupted downloads due to lost connections, network problems, computer shutdowns, or unexpected power outages. Simple graphic user interface makes IDM user friendly and easy to use.Internet Download Manager has a smart download logic accelerator that features intelligent dynamic file segmentation and safe multipart downloading technology to accelerate your downloads. Unlike other download managers and accelerators Internet Download Manager segments downloaded files dynamically during download process and reuses available connections without additional connect and login stages to achieve best acceleration performance. Internet Download Manager supports proxy servers, ftp and http protocols, firewalls, redirects, cookies, authorization, MP3 audio and MPEG video content processing. IDM integrates seamlessly into Microsoft Internet Explorer, Netscape, MSN Explorer, AOL, Opera, Mozilla, Mozilla Firefox, Mozilla Firebird, Avant Browser, MyIE2, and all other popular browsers to automatically handle your downloads. You can also drag and drop files, or use Internet Download Manager from command line. Internet Download Manager can dial your modem at the set time, download the files you want, then hang up or even shut down your computer when it's done. Other features include multilingual support, zip preview, download categories, scheduler pro, sounds on different events, HTTPS support, queue processor, html help and tutorial, enhanced virus protection on download completion, progressive downloading with quotas (useful for connections that use some kind of fair access policy or FAP like Direcway, Direct PC, Hughes, etc.), built-in download accelerator, and many others. Version 6.27 adds Windows 10 compatibility, adds IDM download panel for web-players that can be used to download flash videos from sites like MySpaceTV, and others. It also features complete Windows 8.1 (Windows 8, Windows 7 and Vista) support, video page grabber, redeveloped scheduler, and MMS protocol support. The new version also adds improved integration for IE 11 and IE based browsers, redesigned and enhanced download engine, the unique advanced integration into all latest browsers, improved toolbar, and a wealth of other improvements and new features.

https://twitter.com/VisitSuzhou Visit Suzhou,China @VisitSuzhou Official twitter account for Suzhou Tourism. #TravelSuzhou Suzhou,China traveltosuzhou.com/index Joined January 2015

Suzhou is a major city located along the southeastern edge of Jiangsu Province in eastern China. Bordered by the Yangtze River in the north, Shanghai in the east, Zhejiang Province in the south and Lake Taihu in the west, Suzhou is a beautiful city that’s easy to get to and — once you’re here — hard to leave. Visit Suzhou,China @VisitSuzhou Official twitter account for Suzhou Tourism. #TravelSuzhou Suzhou,China traveltosuzhou.com/index Joined January 2015

The World's 21 Most Important Social Media Sites and Apps in 2015

April 13, 2015 Randy Milanovic The concepts behind “social networking” aren’t anything new – ever since there have been humans, we have been looking for ways to connect, network, and promote with one another – but they’ve taken on an entirely new meaning (and momentum) in the digital age. Where we used to have handshakes, word-of-mouth referrals, and stamped letters, today’s relationships are often begun and developed on LinkedIn, Google +, and Facebook. That means savvy business owners have to know and use a variety of social platforms to stay relevant, not to mention take advantage of emerging opportunities. Below, you’ll find what I consider to be the 21 most important channels and tools you need to be aware of. 1. Twitter. Perhaps the simplest of all social media platforms, Twitter also just happens to be one of the most fun and interesting. Messages are limited to 140 characters or less, but that’s more than enough to post a link, share an image, or even trade thoughts with your favorite celebrity or influencer. Twitter’s interface is easy to learn and use, and setting up a new profile only takes minutes. 2. Facebook. Considered to be synonymous with “social media” by some, Facebook is the one site where you’re likely to find friends, colleagues, and relatives all floating around. Although Facebook is mainly centered around sharing photos, links, and quick thoughts of a personal nature, individuals can also show their support to brands or organizations by becoming fans. 3. LinkedIn. One of the only mainstream social media sites that’s actually geared towards business, LinkedIn is to cyberspace what networking groups once were to local business communities. It’s great for meeting customers, getting in touch with vendors, recruiting new employees, and keeping up with the latest in business or industry news. If it matters to your company or career, you can probably do it on LinkedIn. 4. Xing. Another professional networking and recruitment site, Xing has the global presence and focus that LinkedIn lacks. Although it can be mistaken for a job search portal, the site actually has a number of features and communities that make it easy to develop relationships with suppliers, colleagues and even thought leaders within industry. 5. Renren. Literally translating into “everyone’s website,” Renren is China’s largest social platform. Hugely popular with the younger crowd, it works in a way similar to Facebook, allowing users to share quick thoughts, update their moods, connect with others, and add posts or ideas to a blog-like stream. 6. Google+. Social media’s big up-and-comer has really arrived over the past few years. By combining the best of Facebook and Twitter into one site – and backing it by the power of the world’s largest search engine, Google has given users a social site that has a little something for everyone. You can add new content, highlight topics with hashtags, and even separate contacts into circles. And, a G+ profile only takes a few minutes to get set up. 7. Disqus. Disqus isn’t actually a social media platform so much as a social engagement platform, but it can definitely help you improve your social engagement. As a tool for commenting, managing feedback on your own website (or other Disqus-enabled websites), and managing spam/troll type messages, it’s invaluable. Advanced features allow for social monitoring and upvoting. 8. LinkedIn Pulse. Even though Pulse is technically a part of LinkedIn, it’s big and important enough to deserve its own entry. Serving as something between a blog and “best of” outlet, it’s the perfect medium sharing new ideas and keeping up on the thought leaders in your industry. 9. Snapchat. This surprisingly-addictive app gives you the ability to take a picture, add art and text if you’d like, and then send it to recipients for a set amount of time (after which the photo will delete itself and be removed from the company’s servers). Lots of fun, and potentially a good way to stay in touch with friends. 10. Tumblr. This platform is different form many others in that it essentially hosts microblogs for its users. Individuals and companies, in turn, can fill their blogs with multimedia (like images and short video clips). The fast-paced nature of Tumblr makes it ideal for memes, GIF’s, and other forms of fun or viral content. 11. Pinterest. Serving as a giant virtual idea and inspiration board, Pinterest has made a huge impact on social media in the last few years. Especially popular with women and the do-it-yourself crowd, it lets you share pictures, creative thoughts, or (especially) before-and-after pictures of projects that others can pin, save, or duplicate. 12. Twoo. This Belgian social network site is geared for the 25 and under crowd all over the world. Alongside normal social features like posts, updates, and photo sharing, it also boasts online games and chat features that make it popular with younger users who want to stay entertained while connecting with each other. 13. MyMFB. Created as a Muslim alternative to Facebook (it was previously called MillatFacebook), this site aims to connect the faith’s 1.5+ billion followers into a single social platform. While that might sound ambitious, it’s growing quickly and offers many of the same post, update, and sharing features as the original Facebook, and is already immensely popular in some parts of the world. 14. YouTube. As a video sharing service, YouTube has become so popular that its catalog of billions and billions of videos has become known as “the world’s second-largest search engine” in some circles. The site has everything from first-person product reviews to promotional clips and “how-two” instruction on virtually any topic or discipline. Users have the ability to share, rate, and comment on what they see. 15. Instagram. If you’re looking for a quick, convenient connection between the camera feature on your smart phone and all your social profiles, then Instagram is the answer. Not only will allow you to share via Twitter, Facebook, and the Instagram website, you can choose from a variety of photo filters and invite friends to comment on your photos or ideas. 16. Vine. This site (also available as an app) offers users the chance to share and view brief video clips. While that theoretically offers a virtually endless range of uses, most of Vine’s content is entertainment-focused, with a heavy preference towards “viral” and “meme” clips that are easy to share. 17. WhatsApp. The WhatsApp concept is simple: send text-style messages to anyone else using the platform, but without paying data charges. That straightforward idea has already gathered more than 700 million fans, making the app the world’s most popular messaging platform. 18. vk.com. Promoting itself as Europe’s largest social media site, vk.com is essentially the Russian version of Facebook, with the same kinds of profiles, messaging, and games you would expect. Like Facebook, vk.com allows users to enter both personal and professional information about themselves, and to follow or show support for organizations and businesses. 19. Meetup. Meetup is a perfectly-named platform, because it’s perfect for organizing local groups around specific interests. There are meetups centered on just about everything, from music to hobbies, and get-togethers are almost always open to newcomers. That makes it perfect for exploring an interest and making new friends at the same time. 20. Secret. This might be the best social media app most people haven’t tried. The premise is simple: join into a group of friends (or create your own), and then share an anonymous message. It’s great for fun interactions, idea starters, or just finally getting something off your chest. (Editor's note, 5/13/2015: Secret has folded. Co-founder David Byttow writes: "After a lot of thought and consultation with our board, I’ve decided to shut down Secret. Over time, I plan to publish postmortems so that others can learn from the unique mistakes and challenges we faced and the wisdom gained from such an incredible 16 months.") 21. Medium. If you’ve ever wished that social engagement could come with an ongoing, up-to-date “how to” manual written by the experts, Medium might be just what you’re looking for. With lots of helpful advice, tips, and articles, it can give you everything you need to start connecting like a pro. social networks / shutterstock AUTHOR INFORMATION RANDY MILANOVIC CEO, Author @kayak360 SIGN UP FOR THE SOCIAL MEDIA TODAY NEWSLETTER You'll get a daily email with the latest news, lessons, and insights on: Social Media Marketing Digital Strategy and more Enter your work email address Yes, I'd like to receive Marketing Dive's daily newsletter as well. Preview SUBSCRIBE RELATED ITEMS SMTLIVE ROUNDUP: SOCIAL MEDIA IN 2016 HOW TO ESCAPE AN EVOLVING SOCIAL ECHO CHAMBER 24 PREDICTIONS FOR SOCIAL MEDIA AND SOCIAL MEDIA MARKETING IN 2017 JOIN THE CONVERSATION SIGN IN | REGISTER TO COMMENT Randy Milanovic's picture Apr 15 Posted 1 year ago Randy Milanovic Twitter: Recent improvements to analytics make for some interesting behavioural observations. Don't forget to check out the metrics on your posts. Facebook: Two interesting points: a) you start your experience in FB by connecting to friends & family, and b) FB places considerable barriers to marketers, forcing them to pay to play unless they have content that truly resonates. LinkedIn: For those new-ish to LinkedIn, be aware of SWAM (site wide auto moderation). All it takes is one person to flag you as a spammer and poof, you are moderated across the network. It's a fantastic way to block spammers, while simultaneously placing a dangerous tool in the hands of your competitor. Google+: The big thing that sets GPlus apart from the likes of Facebook is that people go there searching information. And through that info search, end up making friends. My FAV network. Disqus: I'm beginning to look at Disqus as my newest fav stealth app. I've written a bit on this tool lately, describing it as a wonderfully useful influencer stalking tool. Of course, "I'd" never use it so nefariously. Just sayin. ;-) LinkedIn Pulse: When Pulse first launched, it auto-subscribed your existing contacts to post alerts, creating a ready-made subscriber base. SnapChat: (Or post sensitive data, such as a bad selfie or a rant.) Vine: Recent entries into the space include Periscope and Meerkat, streaming longer length video via Twitter feeds. Keep an eye on this trio. No doubt I've just brushed the surface here. There are literally thousands of apps out there that offer social activity in one for or another. Seek and you shall fine. Have fun.