Marketing at its Best

Marketing at its Best.
Special Weekend Shared April 2021.

You have to give serious thought to advertise your work and Product without having to buy a lot of stats and other information.

You want it to be or feel natural, then it is my view to allow this to happen organically.

Categories
Technology

SendGrid and Exchange E-mail Administration

From the pocbooks.com archives Aug 14, 2017 SendGrid by Eli and James on Exchange E-mail Administration.

In the link below is a review by Eli the Computer Guy on the benefits of using Send Grid.
Eli tells us within ten minutes why he uses this service for Geek Brain Dump.
SendGrid for SMTP Relay
Since Eli the Computer Guy is “smart on” in the application of technology, I will be applying this piece of advice in the near future to some of my solutions. The video is worth your time to watch it.

Eli the Computer Guy Advice Angle
Viewers of Eli the Computer Guy, appreciate that he addresses the “real business world of technology” from an angle of how quickly he can get you up to speed, and making money to support yourself. So if the world of technology is a maze filled with many rooms, his advice helps you to take the quickest route to the room where you belong. This is why IMHO in times past he has recommended instead of learning C, Java, etc.… He may recommend learning PHP instead. The logic is this. If the determined and self-disciplined person really wants to be up and (making money) running in less than 6 months to a year, then PHP would be a smart move for this time frame in Information Technology history. Eli was providing good advice in this area and others. Always keep in mind, a lot of his advice IMHO is a means to an end. Namely, How quickly you can  accomplish the goal of making a living in the technology field, all the while doing a job you love to do

E-mail Administration by Exchange or Linux
Over the past year, Eli intimated more than once (I’m paraphrasing) ‘Why anyone would still learn how to setup and administer an e-mail server whether it is by Microsoft Exchange server or Linux?’ He brings out the nominal cost to purchase the service without the headache of administering an (viewed as a complex beast by a lot of people) Exchange server. He makes valid observations.
Questions deserve appropriate answers. First, allow me to make clear this is not to disagree with Eli on his assessment in general why people and some businesses would pay for hosted services like e-mail. No, Eli once again, is “smart on” in the practicality of a solution that would fit a large number of people and organizations. (SEE first subheading) This heading is to be a complement in the choice of e-mail administration. Inasmuch, why you may still learn to configure e-mail servers and\or do it yourself.
This section will elaborate further on the very people Eli referenced you would pay to receive services like e-mail from them. The multi-leveled Internet, webhosting, e-mail, and service providing companies still need people who can work for them who are proficient with exchange servers and Linux administration.
Therefore, if you desire to be a systems administrator, security advisor or consultant working with not only local but international businesses, you will find out the following:
A) You can be charged with setting up remote offices (around the world) that in general need interoffice communications and other services that will allow productivity to continue even if persons are cut off from the “cloud”, so to speak; for a period of time.
B) The more you know how things work, the more you can be assured the service is being implemented correctly.
Imagine having a person contact you. He\She feels the SLA (Service Level Agreement) is not being fulfilled from their “cloud service” provider with bandwidth issues, vpn, e-mail and you can probably name more services. But the individual who contacted you is unable to even get past tier 1 of their service provider. Because the customer (he\she) is being blamed for whatever the problem happens to be.
You sympathize with the one that contacts you and express further, “Don’t worry, I will take care of it.” What do you think will be the end result? Once you contact the company, Tier 2 or 3 engineers see it in their best interest to address what is happening on their servers.
Things like the (QOS) Quality of Service rules decided to turn off and\or change ports (yes, even on e-mail servers), along with other services, like VPN(Virtual Private Networks), because of the location of the person, company or business. Has a recipient policy become corrupted somehow? All the while it may look like the servers are humming along. You may even find the upper tier levels are aware of the situation.
Maybe, after their conversation with you, they will make improvements with questions like these:

  • Did anyone think to notify the customer?
  • At the very least, shouldn’t tier 1 have been made aware of the changes?

In the end, thankfully, you are able to help the “cloud service” provider to take a look at early on some things that could have been on the “list of things” to do on the weekend.

C) Again, it boils down to what you desire to do. As a technologist and consultant, you will run into clients who do not like to put all their “eggs into one basket.” In other words, keeping mission critical data for local access. It can be replicated\backed up\imaged to the cloud from there. SIDE NOTE: When it comes to cloud services, I recommend a “hybrid” form instead of the whole business being on the Internet. Even if your high-speed fiber channels go down, you still have access you your local data. Keep this in mind about POTS (Plain Old Telephone Service). When the physical structures\connections are in place, they often have the ability to work (dial tone) when Ethernet\fiber channels are down. Breakout a working 56k modem, from the 19 hundreds, and send plain text emails without attachments. You can research the companies that provide dial-up service. Depending on the applicable scenario, think of it as a contingency plan.

D) There is always a need for experienced individuals who can not only understand these tools, but can teach and implement such tools, if necessary, services that branch out from the spine of the Internet.

Hence, to recap the points. Eli, who has high value to his opinion in the technology field, has provided good advice in this area of using SMTP relay services.

As an informational note, it was shared if you are planning to work in some of these “cloud service” providers or being an enterprise level systems administrator, it is more than helpful to have such knowledge of Linux administration of e-mail and exchange server’s experience.

FYI, Exchange server administrators still make an average salary of 25-40 dollars an hour; or 50k and above a year.

(Humor) Even though most Exchange administrators (Early 2,000) are no longer able to exercise a secondary skill with crossword puzzles at their desk for half a work day until called upon, if this is still something you find of interests, it is helpful to learn the ins and outs by having at the very least a lab environment with an Exchange or Linux e-mail server present. – (Smile) You Exchange administrators. We know you work hard. (You can go back to sleep now)

IHMO-As always, the Internet is ever evolving, these are just points of observation up this point of 2014. You have to decide what works best for your life.

Categories
Technology

Systems Administration Skills and Judgment Calls

From the pocbooks.com archives (October 2014): Systems Administration Skills and Judgment Calls Notebook of IT

The purpose for this series of articles is to help with making good judgments in deciding what software and tools to use on your home and business network.

The situations Systems and Network administrators are encountering today is more complicated than what the general public believes.

“What do you mean? They teach students in school today how to setup a home network.”

Yes, in many schools, the curriculum includes using a computer, connecting to wireless networks and how to download apps. Hmm, well the students have already taught and graduated themselves in how to download apps.

All the same, this is not what I mean by complicated. The search engine definition for complicated is “consisting of many interconnecting parts or elements; intricate.”

There happen to be so many “interconnecting parts” (software) on the internet that the younger generation is viewing everything as safe.

“Hey, turn on this.” “Download that.” “Give access to what? OK, I will.”

The BYOD (Bring\Buy your own devices) can crash a network to a slow crawl or standstill and if you don’t have tools to track it down… let’s just say the network is no longer yours.

Will you face this Scenario?

Back in the days when the command line of choice was called DOS (Disk Operating System) for Windows computers, if you just purchased a 100 to 300 page manual on DOS you could track down and resolve problems on a LAN (Local Area Network). Back then, it was common for bots\hackers to scan websites, much like today, to find vulnerabilities. Once they found an open FTP (File Transfer Protocol) port they would break in and upload\store pirated movies on the server’s hard drives. Oooh wee! Your 100 gig hard drive storage that would take a life time to fill up was now loaded and part of a Darknet type of system.

Oh, the phones would ring off the hook. Why is the website slow? I can’t use the network! I bet your mother no longer wants you over for dinner!

So, you sit back and wonder how you are going to fix this problem? Oh, I forgot to add one more thing. Even though your webserver is hijacked, you don’t know at the time if this is really the problem. You don’t even know that the hard drive is filled up with movies because the hackers created an invisible directory.

What? How can an invisible directory be created and store more than 50 gigs of short movies on it without you knowing it? If the directory was invisible, how did you find it?

All good questions… And it will be shared with you what I, *cough*, I mean how a scenario like this can be solved.

In this “Notebook of IT” series, we will talk about the following topics noted below here at Geek Brain Dump. As I share some of these tidbits with you, it will also help US to remember and make good decisions when it comes to Systems administration. At times, I will make short videos to show you why a tool or choice is valuable. By no means do I know everything, but what I do know is that if you are managing a network, you should know what is going on with the software and traffic. This doesn’t mean you work 24 hours a day. It means, that if a severe threat comes along to your systems; and it will at least once in your IT career, you will have a step-by-step method to lock down your network, solve the problem(s), reestablish a baseline and get back up and running within hours if not less. CAVEAT: If the threat is that severe, you will be happy to resolve it by the COB (Close of Business)

These are some of the topics we will address:

 Firewalls
 Security
 Websites
 Virtualization
 Documentation
Tools
Disaster Recovery
Caution-What to watch out for
Until next week, have a good one; and for others, a cold one.

Categories
Technology

Linux and the Internet

From the archives of pocbooks.com August 3, 2014 Linux the Unrecognized Backbone of the Internet

Linux is the unseen backbone of the Internet

This is one of those posts to inform the younger generation that Linux really does run everything. I was actually thinking the other day about the differences between Windows and Linux. The RAM\Memory differences are a point of note for one. Linux runs Supercomputers, social networking sites, TVs, and phones all with a smaller percentage of RAM it takes for a full equipped Windows Server. This post is not to bash Microsoft Windows at all, I’m far too grateful for one of their server capabilities over the years to do that.

This post is just to show the necessity of being familiar with Linux all the same. You see, Linux is the factory of the Internet, while Windows allows us to look inside and make requests of the factory, so to speak. Just kidding, you are aware Windows does more than that. However, in the instance of phones, the number of Linux type OS phones will exponentially approach a billion. By the end of this post, they probably have.

Either way, here is a list of terms you want to become familiar with as you seek out to learn Linux.

Kernel | Command line

X Windows system | Desktop environment

Distribution

As you go through the steps to learn what each component is for, it gives you the ability to configure and create a Linux stable environment.

If you are one the individuals that started with Linux first, you know these things, but have you ever viewed the operating system in these components above. Experienced Linux user, most likely; younger ones, maybe not.

As you gathered from the title, Linux the Unrecognized Backbone of the Internet; it is titled as such because often people do not know just how many systems Linux is powering on the Internet.  The OS is free, it’s quiet, but make no mistake about it, it is powerful tool.

Hope this helps in some way.

Categories
Journal

Best Ways to use Twitter

Best ways to use Twitter From the Archives
Created on: November 29, 2010 Last Updated: November 30, 2010

What should you look for in your first 100 Twitter people to follow?

This may sound strange to reverse the normal view of Twitter that promotes saying: “Get as many followers as you can at all cost.”  Yet, if you are meticulous in your efforts to find people to follow and hopefully for them to follow you for some of the reasons below, your Twitter experience can be positive for the most part.

  • A)    Are you using Twitter to market a product? Then you will want to follow a percentage of persons who have tried and proven experience in marketing whatever product you are pleased to offer the public for their benefit.
  • B)  Are you using Twitter to get news from around the world on different subjects?  Then you will most likely search out creditable agencies that will provide you the facts in a timely and accurate fashion.

  Now, there are other ways Twitter is being used today.  It is a social networking tool just as much as it is a marketing tool.  There are pros and cons with such a setup.  This is why the first 25 to 100 Twitter people you may desire to follow is being underscored. 

If you possess a certain etiquette or ethic of the way you correspond and communicate with people, wouldn’t you want it to be reciprocated in your feeds or direct messages?

For example, in your field or personal life you interact with people of all ages, backgrounds, and cultures. When running the ever-constant TweetDeck of feeds it is hoped that ones who follow you would find something useful or produce a simple acknowledgment of a decent comment. If there is no interest in the feeds at the time, then this is okay.  However, would not you desire that no individual, including yourself, turn his or her head away due to being offended?

Twitter works like Branding.  What type of  Brand are you developing?

At the time of reading this article, you may have only a few people you follow.  If you take some of the suggestions mentioned into consideration, this will help you to still have the quality content and collaborators you desire. Working with such individuals will still bring you followers to your Twitter account at different rates of time, as long as you are actively promoting your brand, while helping others to promote theirs through retweets and other means like blogs.

In closing, your first 25-100 people you follow should be thought out if you are branding your company or yourself.  Yes, anyone may follow you on Twitter; however, can you really just follow anyone to help in mutual endeavors?

Commentary Shout Outs Needed

Just how important are commentaries and shout-outs today? Have you benefited from them?

Outrageous Meeting Of The Minds

The Perceptive Readers Podcast Here is a discussion on just how outrageous you or someone else may feel at times and just how is the best way to resolve it

Considering Whatever It Takes Part 3

This is Part 3; in this 4 part series we talk about success. What meaning does success have for you? How does it affect your daily view and outlook? In this brain storming discussion, it is to have you think about how people view success and what routines their daily take in life. Considering Whatever It Takes and are there exceptions to this view?

Considering Whatever It Takes Part 2

This is Part 2; in this 4 part series we talk about success. What meaning does success have for you? How does it affect your daily view and outlook? In this brain storming discussion, it is to have you think about how people view success and what routines their daily take in life. Considering Whatever It Takes and are there exceptions to this view?

Categories
Journal

Considering Whatever It Takes Part 1 Video

https://rumble.com/ve5bqh-considering-whatever-it-takes-part-1.html?mref=gvqhn&mc=vtbd9

Privacy Policy

Minds.com http://www.Minds.com/POCJL

Tumblr https://lets-poetryvideos-me.tumblr.com

Pocbooks.com does not track or sell any users subscriptions to third parties. The author and owner of this website will also keep contact information for his sole purpose of feedback to make the website better. Personal contact information is not sold or given out without your permission or is already for public record; which you have approved or placed on the web.

When you need verification and elaboration for this policy feel free to contact me in these locations or via e-mail. – James Lynch Jr Owner and writer of pocbooks.com

( NEW) Telegram for the articles and podcasts updates notifications and more https://t.me/perceptivereaders