<?xml version="1.0" encoding="ISO-8859-1"?>
<!-- generator="FeedCreator 1.7.2" -->
<rss version="2.0">
    <channel>
        <title>Blog</title>
        <description>Blog</description>
        <link>http://w99.suretech.com/5925</link>
        <lastBuildDate>Mon, 20 Apr 2026 12:34:49 -0400</lastBuildDate>
        <generator>FeedCreator 1.7.2</generator>
        <item>
            <title>8 Tips for a Healthier Laptop</title>
            <link>http://w99.suretech.com/16825/8_Tips_for_a_Healthier_Laptop</link>
            <description><![CDATA[<p><font size="3" face="Calibri"><img alt="" src="http://imgdr.massmind.com/uploads/suretech/images/LaptopLoveImage1(1).jpg" width="150" height="102" align="left" /><a href="http://mashable.com/2012/02/14/tips-for-healthy-laptop/">Mashable</a>, in conjunction with </font><a href="http://www.geeksugar.com/How-Care-Your-Laptop-21749247"><font size="3" face="Calibri">GeekSugar.com</font></a><font size="3" face="Calibri">, unveiled 8 tips for keeping your laptop computer in tip-top shape. Show your&nbsp;computer some love this Valentine&rsquo;s Day with these simple fixes! </font></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 14 Feb 2012 12:24:42 -0400</pubDate>
            <guid>http://w99.suretech.com/16825/8_Tips_for_a_Healthier_Laptop</guid>
        </item>
        <item>
            <title>Your LinkedIn or eHarmony Passwords May Be Hacked!</title>
            <link>http://w99.suretech.com/17294/Your_LinkedIn_or_eHarmony_Passwords_May_Be_Hacked</link>
            <description><![CDATA[<p><img align="left" width="125" vspace="5" hspace="5" height="124" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/LinkedIn%20Password%20Hack(3).jpg" />A Russian hacker has recently stolen up to 8 Million passwords from the popular LinkedIn and eHarmony websites. Was your password one of them? Find out here.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 07 Jun 2012 12:27:19 -0400</pubDate>
            <guid>http://w99.suretech.com/17294/Your_LinkedIn_or_eHarmony_Passwords_May_Be_Hacked</guid>
        </item>
        <item>
            <title>Datacenter Highlights</title>
            <link>http://w99.suretech.com/12766/Datacenter_Highlights</link>
            <description><![CDATA[<p>SureTech.com partners exclusively with US Based Tier 4 datacenters. </p>
<p> </p>
<p>Minimum requirements for any customer data location are listed below - most of our services currently run exclusively in Azure or AWS east.</p>
<p><b> </b></p>
<p><b></b></p>
<h3><b>Reliable</b></h3>
<p><b></b></p>
<b></b>Seven dedicated electrical feeds
    Powered by five different substations
    Connected to multiple transfer switches
    1,500 kVA of uninterruptible power supply
    
    <p><b></b></p>
    <h3><b>Secure</b></h3>
    <p><b></b></p>
    <b></b>24x7 live closed circuit TV monitoring
        Biometric access control
        Redundant power supplies
        Multiple HVAC systems
        Disaster recovery and geographic load balancing
        
        <p><b></b> 
        </p>
        <p> </p>
        <p> </p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 08 Jul 2009 06:58:16 -0400</pubDate>
            <guid>http://w99.suretech.com/12766/Datacenter_Highlights</guid>
        </item>
        <item>
            <title>Is My Email Hacked or Is it &amp;quot;Phishing&amp;quot;?</title>
            <link>http://w99.suretech.com/20061/Is_My_Email_Hacked_or_Is_it_quot_Phishing_quot</link>
            <description><![CDATA[<div class="SCX111140228">
<div class="OutlineElement Ltr SCX111140228">
<p style="text-align:center;padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;" class="Paragraph SCX111140228"><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:28px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:18pt;font-weight:bold;" class="TextRun SCX111140228" lang="en-us">Email Hacking</span><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:12px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:8pt;" class="TextRun SCX111140228" lang="en-us"> </span><span style="line-height:12px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:8pt;" class="EOP SCX111140228"> </span></p>
</div>
<div class="OutlineElement Ltr SCX111140228">
<p style="text-align:center;padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;" class="Paragraph SCX111140228"><span style="line-height:18px;font-family:Calibri, 'Sans-Serif';font-size:11pt;" class="EOP SCX111140228"> </span></p>
</div>
<div class="OutlineElement Ltr SCX111140228">
<p style="padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;" class="Paragraph SCX111140228"><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" class="TextRun SCX111140228" lang="en-us">W</span><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" class="TextRun SCX111140228" lang="en-us">e are seeing</span><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" class="TextRun SCX111140228" lang="en-us"> an increasein the number of incidents where criminals are specifically targetting the Finance or HR departments at companies to gain funds or personal data.  What to look out for:</span><span style="line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" class="EOP SCX111140228"> </span><span style="font-family:Calibri, sans-serif;font-size:11pt;line-height:18px;"> </span></p>
</div>
<ul class="BulletListStyle1 SCX111140228">
    <li style="color:rgb(31,78,121);font-family:'Times New Roman\'', sans-serif;font-size:12pt;margin-left:48px;vertical-align:baseline;" class="OutlineElement Ltr SCX111140228">
    <p style="padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;" class="Paragraph SCX111140228"><span xml:lang="en-us" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" class="TextRun SCX111140228" lang="en-us">You receive an email that appears to be from ...</span></p></li></ul></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 09 Dec 2015 17:15:20 -0400</pubDate>
            <guid>http://w99.suretech.com/20061/Is_My_Email_Hacked_or_Is_it_quot_Phishing_quot</guid>
        </item>
        <item>
            <title>How do I Protect from Ransomware</title>
            <link>http://w99.suretech.com/20100/How_do_I_Protect_from_Ransomware</link>
            <description><![CDATA[<p></p>
<p></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 24 Mar 2016 18:00:53 -0400</pubDate>
            <guid>http://w99.suretech.com/20100/How_do_I_Protect_from_Ransomware</guid>
        </item>
        <item>
            <title>Why Centralized Management of AntiVirus</title>
            <link>http://w99.suretech.com/20074/Why_Centralized_Management_of_AntiVirus</link>
            <description><![CDATA[<div class="SCX111140228">
<div class="OutlineElement Ltr SCX111140228">
<p class="Paragraph SCX111140228" style="text-align:center;padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;"><span class="TextRun SCX111140228" style="color:rgb(31,78,121);line-height:28px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:18pt;font-weight:bold;" xml:lang="en-us" lang="en-us">Is Your Anti Virus Protecting You?</span><span class="TextRun SCX111140228" style="color:rgb(31,78,121);line-height:12px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:8pt;" xml:lang="en-us" lang="en-us"> </span><span class="EOP SCX111140228" style="line-height:12px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:8pt;"> <br />
</span></p>
</div>
<div class="OutlineElement Ltr SCX111140228">
<p class="Paragraph SCX111140228" style="text-align:center;padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;"><span class="EOP SCX111140228" style="line-height:18px;font-family:Calibri, 'Sans-Serif';font-size:11pt;"> </span></p>
</div>
<div class="OutlineElement Ltr SCX111140228">
<p class="Paragraph SCX111140228" style="padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;"><span class="TextRun SCX111140228" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" xml:lang="en-us" lang="en-us">Data security, access and redundancy are our number one priroty for our customers.  No AntiVirus is full proof, but having SureTech centrally manage the antivirus for our customers adds a layer of protection that truly pays off.</span></p>
<p class="Paragraph SCX111140228" style="padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;"> </p>
<p class="Paragraph SCX111140228" style="padding-right:0px;padding-left:0px;font-family:'Segoe UI', Tahoma, Verdana, 'Sans-Serif';font-size:6pt;vertical-align:baseline;"><span class="TextRun SCX111140228" style="color:rgb(31,78,121);line-height:19px;font-family:'Trebuchet MS', 'Sans-Serif';font-size:12pt;" xml:lang="en-us" lang="en-us">For example, in a standard popular consumer antivirus, a <a href="http://www.wired.co.uk/news/archive/2016-01/12/antivirus-software-made-windows-more-vulnerable">security hole in Trend Micro AntiVirus</a> software shows how easily computers can be hijacked by security holes in tools we trust.  While Trend Micro has since come up with a patch fix, ensuring the ...</span></p></div></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 12 Jan 2016 13:29:05 -0400</pubDate>
            <guid>http://w99.suretech.com/20074/Why_Centralized_Management_of_AntiVirus</guid>
        </item>
        <item>
            <title>Happy Holidays 2015 from SureTech</title>
            <link>http://w99.suretech.com/20064/Happy_Holidays_2015_from_SureTech</link>
            <description><![CDATA[<p><a href="http://www.suretech.com/20064"><img width="250" height="188" src="http://imgdr.massmind.com/uploads/suretech/images/Holiday 2015.PNG" alt="" /></a></p>]]></description>
            <author>Mike Pomeroy</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 17 Dec 2015 17:04:31 -0400</pubDate>
            <guid>http://w99.suretech.com/20064/Happy_Holidays_2015_from_SureTech</guid>
        </item>
        <item>
            <title>Windows 10 is Here..What Should I Do?</title>
            <link>http://w99.suretech.com/20009/Windows_10_is_Here_What_Should_I_Do</link>
            <description><![CDATA[
<p style="margin:0in;">  <strong><span style="font-size:19.5pt;font-family:'Trebuchet MS', sans-serif;color:#000000;"><img width="570" height="65" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/toot.banner.6.jpg" /></span></strong></p>
<p style="margin:0in 0in .0001pt;text-align:center;"><strong><span style="font-size:19.5pt;font-family:'Trebuchet MS', sans-serif;color:#000000;">Windows 10 is Here</span></strong><span style="font-family:'Trebuchet MS', sans-serif;font-size:8.5pt;">  <br />
</span></p>
<p style="margin:0in;"><span style="font-size:13.5pt;font-family:'Trebuchet MS', sans-serif;color:#666666;">You've probably heard about the new version of Windows about to be released by Microsoft, Windows 10.  And you may have even seen a little icon displayed at the bottom right of your screen which allows you to Get Windows 10. </span><span style="font-family:'Trebuchet MS', sans-serif;font-size:8.5pt;"> </span></p>
<p style="margin:0in;"><span style="font-size:13.5pt;font-family:'Trebuchet MS', sans-serif;color:#666666;">SureTech wants to be sure you are fully informed about this valuable upgrade BEFORE you consider installing it.</span><span style="font-family:'Trebuchet MS', sans-serif;font-size:8.5pt;"> </span></p>
<p style="margin:0in;"><span style="font-size:13.5pt;font-family:'Trebuchet MS', sans-serif;color:#666666;">Microsoft is listing Windows 10 as a free upgrade but this is true only if your computer can support it. </span><span style="font-family:'Trebuchet MS', sans-serif;font-size:8.5pt;"> </span></p>
<ul>
    <li style="margin-top:0in;margin-right:0in;margin-bottom:0in;margin-left:30pt;"><span style="font-size:13.5pt;font-family:'Trebuchet MS', sans-serif;color:#666666;">If you are still using <strong><span style="font-family:'Trebuchet MS', sans-serif;">Windows XP </span></strong>or <strong><span style="font-family:'Trebuchet MS', sans-serif;">Windows Vista </span></strong>you cannot upgrade directly and you may need additional hardware. </span><span style="color:#000000;font-family:'Trebuchet MS', sans-serif;font-size:8.5pt;line-height:normal;"> </span></li>
    <li></li></ul>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 23 Jul 2015 19:06:54 -0400</pubDate>
            <guid>http://w99.suretech.com/20009/Windows_10_is_Here_What_Should_I_Do</guid>
        </item>
        <item>
            <title>Meme Musings</title>
            <link>http://w99.suretech.com/19970/Meme_Musings</link>
            <description><![CDATA[<p><img width="512" height="324" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/mayazac-1024x647sml.png" /></p>
<p>Evidence from the U. S. Post Office that even one of the literary greats know how important our dispatcher Zac is to Suretech.</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 17 Apr 2015 15:04:00 -0400</pubDate>
            <guid>http://w99.suretech.com/19970/Meme_Musings</guid>
        </item>
        <item>
            <title>Fragmented vs Unified Communications Channels and Data Buckets</title>
            <link>http://w99.suretech.com/19944/Fragmented_vs_Unified_Communications_Channels_and_Data_Buckets</link>
            <description><![CDATA[<p><img src="http://imgdr.massmind.com/uploads/suretech/images/Communications_men.jpg" alt="Tangled Telegram Communications Channels" width="150" height="206" hspace="18" border="1" align="left" />Thanks to SNL's <a href="http://mmm.ms/1LbqDw7">Norm McDonald's Twitter stream</a> and dozen's of our customers use cases I've given up on a unified platform for messaging and for file storage.</p>
<p>Theoretically this is both annoying and heartbreaking becuase the ideal of all your messages and all your data in once place is not just appealing, it actually feels necessary for any sense of sanity.</p>
<p>How in Dickens can you keep track of 5 or more inboxes and looking for your digital data in 5 or more different places? It sounds like insanity and like no one should ever do it.  That's certainly how I felt about it years ago and when we started SureTech.</p>
<p>And if you're a lucky person that does one thing with one set of people, it's a terrific neat and clean model.</p>
<p>But if you interract with different groups and work on more than one project, I've realized, most people probably need to reconcile using fragmented channels and buckets.</p>
<p>Think of it this way perhaps - would you have all your associates come to your living room and put all of your work on your fireplace mantle?  If the answer is yes, then God Bless You especially if you don't even need a computer.  I would love to imagine myself with a world lived simply in one place with only people that can visit me in that place.  In the world of ideas, collaboration and innovation, however, that simple model might be too limiting from a standoint of quality and diversity of inputs.  Maybe I'll come around to understand how to do it more simply one day - but for now I don't see how to accomplish it.</p>
...]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sat, 14 Mar 2015 12:10:42 -0400</pubDate>
            <guid>http://w99.suretech.com/19944/Fragmented_vs_Unified_Communications_Channels_and_Data_Buckets</guid>
        </item>
        <item>
            <title>Sending Big Files - Best Practice Tips</title>
            <link>http://w99.suretech.com/12428/Sending_Big_Files_Best_Practice_Tips</link>
            <description><![CDATA[<p><img alt="" src="http://imgdr.massmind.com/uploads/suretech/images/computer2.png" /> <span style="font-size:x-large;"><a href="http://suretech.com/19314/SureMail_User_Guide_Exchange_2013">SureMail User Guide</a></span></p>
<center>
<p><strong>SureMail Tips and Tricks</strong><br />
<a href="http://www.suretech.com/14864/Avoid_Worms_-_Best_Practice_Tips.html">Worms</a> - Big Files - <a href="http://suretech.com/15827/Email_Chain_Viruses_-_Best_Practice_Tips.html">Email Chains</a> - <a href="http://suretech.com/14365/SPAM_-_Best_Practice_Tips.html">SPAM Tips</a> - <a href="http://www.suretech.com/14359/Using_Outlook_Best_Practice_Tips">Using Outlook</a></p>
</center>
<h1 style="text-align:center;"> </h1>
<h1 style="text-align:center;"><b>Safe Internet Use Tips</b></h1>
<p style="text-align:center;"> </p>
<p><img width="250" hspace="15" height="250" border="4" align="right" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/email image.jpg" /></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">A client recently went to a meeting where he assumed an email he sent had arrived at his client's inbox. When he learned it did not, he became alarmed and called us.</span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">We investigated and found the email in his outbox, but because it was over 4MB, the end recipient's email box would not accept it.</span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">I thought it important to highlight some key email tips in the current world of spam blocking email inbox overload: We offer best in class email solutions for you. Its simply the nature of email now (versus 5 years ago) that with so much spam and in turn spam software email is not as reliable as it once was. The vast majority of all email sent every day is actually spam, if you can believe it! A few good measures to follow to ensure your message gets across are:</span></p>
<ul>
    <li><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">Never send large files through email. Always transfer them with a DropBox type service or a Thumb Drive</span></li>
    <li><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">If you send a mission critical message, be sure to call to follow up that it has ...</span></li></ul>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 30 Mar 2009 20:51:24 -0400</pubDate>
            <guid>http://w99.suretech.com/12428/Sending_Big_Files_Best_Practice_Tips</guid>
        </item>
        <item>
            <title>Email Chain Viruses - Best Practice Tips</title>
            <link>http://w99.suretech.com/15827/Email_Chain_Viruses_Best_Practice_Tips</link>
            <description><![CDATA[<p><img alt="" src="http://imgdr.massmind.com/uploads/suretech/images/computer2.png" /> <span style="font-size:x-large;"><a href="http://suretech.com/19314/SureMail_User_Guide_Exchange_2013">SureMail User Guide</a></span></p>
<center>
<p><strong>SureMail Tips and Tricks</strong><br />
<a href="http://www.suretech.com/14864/Avoid_Worms_-_Best_Practice_Tips.html">Worms</a> - <a href="http://suretech.com/12428/Sending_Big_Files_-_Best_Practice_Tips.html">Big Files</a> - Email Chains - <a href="http://suretech.com/14365/SPAM_-_Best_Practice_Tips.html">SPAM Tips</a> - <a href="http://www.suretech.com/14359/Using_Outlook_Best_Practice_Tips">Using Outlook</a></p>
<p> </p>
</center>
<h1 style="text-align:center;"><span style="color:rgb(0,102,153);"><b>Warning Chain Mails</b></span></h1>
<p style="text-align:center;"> </p>
<p><img width="86" hspace="15" height="67" border="1" align="right" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/Picture 6(2).png" /></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">A client recently sent us a copy of an email that warned her in capital letters of a terrible virus that is going around the internet and steps to take to protect herself from getting this virus.</span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">It recommened the kind of files not to open, what titled emails to be wary of, and even cited the validity of these threats by referencing sites like truth or fiction.  It ended by encouraing her to send the email on to everyone shes knows.</span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">These kinds of emails themselves are in effect a spam virus.  The intent is to clog the internet with people sending the message itself around.</span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">If the threat were as real and urgent as noted, the main newswires and newspapers would report it.  </span></p>
<p><span style="font-family:Calibri, sans-serif;color:rgb(49,51,47);font-size:16pt;">So if you get an urgent warning like this, avoid spam and do not pass it on.</span></p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 15 Mar 2011 23:20:38 -0400</pubDate>
            <guid>http://w99.suretech.com/15827/Email_Chain_Viruses_Best_Practice_Tips</guid>
        </item>
        <item>
            <title>Don't let your email let your business down</title>
            <link>http://w99.suretech.com/19893/Don_t_let_your_email_let_your_business_down</link>
            <description><![CDATA[<p>With all of the work you do to establish your company and attract new customers, don't let a little thing like an email address distract your potential customers.</p>
<p>Here are a few reasons why an email address with your domain name is important and what you should expect from your email.</p>
<p><b>Professionalism</b>: Putting your business name in an email profoundly shifts the relationship you have with your customer. It states that you are a professional and reputable and it builds trust. Plus, your email address is constantly building your brand identity, putting your companies name in front of customers, suppliers, vendors, prospects and partners. Ask yourself, which email would you be most likely to respond to when hiring a business professional john@yourbusinessname.com or john1256@yahoo.com?</p>
<p><b>Security</b>: Paid email typically has anti-virus and spam filters to keep your inbox clean and secure from dangerous spam. It also has email encryption capabilities with password protection, so the information you send and receive stays private. Are you a doctors office emailing client records? A real-estate agent emailing back and forth contracts? Do you send information of any kind about your clients? If you are not on a secure email exchange that information is ripe for the picking. Dont allow yourself to be attacked and open up a world of misfortune to yourself or your clients.</p>
<p><b>Privacy</b>: Free email services scan all of your in and outgoing email to get as much information about you and your clients that they can. Your information is a free for all; it is used for advertising purposes and to build an email data base and is sometimes sold. They collect as much information as possible about you as a user. That free email is actually a contractual agreement between you and the ...</p>]]></description>
            <author>Amanda Nicol</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 08 Jan 2015 16:40:14 -0400</pubDate>
            <guid>http://w99.suretech.com/19893/Don_t_let_your_email_let_your_business_down</guid>
        </item>
        <item>
            <title>Happy Holidays 2014</title>
            <link>http://w99.suretech.com/19882/Happy_Holidays_2014</link>
            <description><![CDATA[<center> 
<div align="center" style="text-align:center;margin:0in 0in 0pt;"><b><span style="color:rgb(149,55,53);font-size:20pt;">May you have a wonderful holiday season and a prosperous 2015!</span></b></div>

<div style="text-align:center;margin-top:6px;"> </div>
</center>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 12 Dec 2014 13:57:52 -0400</pubDate>
            <guid>http://w99.suretech.com/19882/Happy_Holidays_2014</guid>
        </item>
        <item>
            <title>I.T. Guideposts for 2015</title>
            <link>http://w99.suretech.com/19877/I_T_Guideposts_for_2015</link>
            <description><![CDATA[<h2><img src="http://imgdr.massmind.com/uploads/suretech/images/cloud solutions.jpg" width="225" height="153" hspace="10" border="2" align="right" alt="" />I.T. GUIDEPOSTS FOR 2015 </h2>
<ol>
    <li>The Cloud is here to stay. <br />
     If a single combine to harvest Corn now costs $500k with satellite linked thermal and moisture sensors  you can bet that technology and automation are changing your industry. <br />
     Your question is not if you will need the cloud, but when, and not only when, but: <br />
     how will you adapt your business focus and technology stack to focus on the key value drivers you offer your customers.</li>
    <li>The largest IT costs are episodic not chronic. |<br />
     Its the one event out of the blue that is 90% of your actual IT cost, not the day to day upkeep.  <br />
     Risk management is the biggest cost driver over capital or maintenance spend.</li>
    <li>Chronic IT Performance Drags are a far greater costs than all combined IT maintenance and Capex costs.  <br />
     For example: calculate the number of minutes per day you wait for your computer to respond.  (hourglass time) and multiply those minutes times the salaries of every staff member in your company. <br />
     Productivity drag cost dwarfs any other IT cost except out of the blue episodic catastrophes like flood, fire or other physical calamity.</li>
    <li>When it comes to back office or infrastructure, standardization rules, and variables and complexity will sink you.</li>
    <li>Innovation and change cycles are accelerating each year.  <br />
     You can win if you focus, focus, focus on your key value drivers and leave back office execution to specialists with deep technical expertise and implementation scale.</li>
</ol>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 05 Dec 2014 19:06:14 -0400</pubDate>
            <guid>http://w99.suretech.com/19877/I_T_Guideposts_for_2015</guid>
        </item>
        <item>
            <title>VOIP Protections in Lieu of Hacking</title>
            <link>http://w99.suretech.com/19853/VOIP_Protections_in_Lieu_of_Hacking</link>
            <description><![CDATA[<p>Voice Over IP (aka VOIP) is a great way to run phone systems.  There are some security needs to be aware of in using these sytems - VOIP Phone system hacking concerns hit the front page of the <a href="http://www.nytimes.com/2014/10/20/technology/dial-and-redial-phone-hackers-stealing-billions-.html?module=Search&amp;mabReward=relbias%3Ar%2C%7B%222%22%3A%22RI%3A18%22%7D&amp;_r=0">NY Times</a>.  </p>
<p>To ensure your company is protected, SureTech recommends several key things to keep in mind:</p>
<p>- Change the password for your VOIP account regularly</p>
<p>- Be aware of who has access to this password and how they are storing it</p>
<p>- Know how your VOIP data plan is set up and what alerts you will receive if you exceed your regular minutes. </p>
<p>- Set the credit card you use to cover your VOIP plan with a maximum charge allowance in any single month.</p>
<p>- SureTech can help make sure that customers using our recommended VOIP sytems are protected.</p>
<p><br />
If we can be of assistance on this or any other HelpDesk request, contact us at <a href="mailto:solutions@suretech.com">solutions@suretech.com</a> or 800-882-8701. <br />
Your SureTech Solutions Team</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 20 Oct 2014 17:17:15 -0400</pubDate>
            <guid>http://w99.suretech.com/19853/VOIP_Protections_in_Lieu_of_Hacking</guid>
        </item>
        <item>
            <title>Apple iOS 8 Upgrade issues with MS Exchange</title>
            <link>http://w99.suretech.com/19849/Apple_iOS_8_Upgrade_issues_with_MS_Exchange</link>
            <description><![CDATA[<p>There has been a lot of buzz (mostly great) about Apples latest upgrades.  Unfortunately it also appears that the new iOS 8 upgrade has certain connectivity problems that could cause MS Exchange email to not function correctly on upgraded iPhones or iPads.  The latest iOS 8.2 update still seems to present issues for some Exchange users.  You can see a sample report <a href="https://discussions.apple.com/thread/6541881">here</a>.  Please note this issue does not appear to affect new iPhone 6 or 6 plus phones.<br />
<br />
We suggest you not upgrade to iOS 8 until this issue is resolved with a new update.<br />
<br />
In fact, we always suggest waiting a reasonable period before applying new updates on any technology as a rule to avoid any unexpected performance issues.<br />
<br />
If you have already upgraded to iOS 8 AND you are having problems connecting to your email and other services with your iPhone 5 or earlier, here are some suggestions on <a href="http://www.macworld.co.uk/how-to/iosapps/how-downgrade-from-ios-8-ios-7-reinstall-ios-8-3522302/">rolling back</a> if you feel comfortable trying this yourself. We are happy to assist if you need our HelpDesk support. Alternatively we recommend an Apple store visit to help resolve this issue with their devices.</p>
<p><br />
If we can be of further assistance on this or any other HelpDesk request, contact us at <a href="mailto:solutions@suretech.com">solutions@suretech.com</a> or 800-882-8701. <br />
Your SureTech Solutions Team</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 29 Sep 2014 22:13:52 -0400</pubDate>
            <guid>http://w99.suretech.com/19849/Apple_iOS_8_Upgrade_issues_with_MS_Exchange</guid>
        </item>
        <item>
            <title>Internet Explorer Flaw - Latest Web Browser Security Hole</title>
            <link>http://w99.suretech.com/19462/Internet_Explorer_Flaw_Latest_Web_Browser_Security_Hole</link>
            <description><![CDATA[<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">INTERNET EXPLORER FLAW - LATEST WEB BROWSER SECURITY HOLE</span></b></p>
<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;"> </span></b></p>
<p class="MsoNormal"><b><i><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">IF YOU HAVE TO EXPLORE, ALWAYS USE PROTECTION </span></i></b></p>
<p class="MsoNormal"><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;"> </span></p>
<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">Background</span></b></p>
<p class="MsoNormal"><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F497D;">Microsofts Internet Explorer browser has been exploited by the Operation Clandestine Fox attack starting on </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#333F50;"><a href="https://technet.microsoft.com/en-US/library/security/2963983"><span style="color:#0000BF;">April 26, 2014</span></a></span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F497D;"> - </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#333F50;"><a href="http://www.businessweek.com/articles/2014-04-28/the-first-windows-xp-security-problem-microsoft-wont-fix?campaign_id=DN042814"><span style="color:#0000BF;">See Business Week article for more details.</span></a></span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#993366;"></span></p>
<p class="MsoNormal"><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#993366;"> </span></p>
<p class="MsoNormal"><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">This is just the latest security hole to create headlines  helped by no less than the <b>Department of Homeland Security</b>, which </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F497D;">advises that you <span style="background:#FFFF00;">not use any version of IE until further notice</span>. </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">Wow!</span></p>
<p class="MsoNormal"><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;"> </span></p>
<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">The Official advice</span></b></p>
<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">According to DHS</span></b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">, <strong><span style="font-weight:normal;">if your business uses custom applications that require Internet Explorer, avoid visiting any public sites with the browser outside of the application.  Make a direct link to the site from your desktop to avoid going to any other sites but the application site.</span></strong></span><strong></strong></p>
<p class="MsoNormal"> </p>
<p class="MsoNormal"><b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">According to Microsoft</span></b><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">, you should pay your IT company  thats us, folks </span><span style="font-size:14pt;font-family:Wingdings;color:#1F4E79;">J</span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;"> - between $1,000 and $10,000 per office to implement </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#993366;"><a href="https://technet.microsoft.com/library/security/2963983">this temporary work around</a>.  </span><span style="font-size:14pt;font-family:Calibri, 'sans-serif';color:#1F4E79;">And once we do all that work you will:</span></p>
<p class="MsoListParagraph"></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 01 May 2014 18:14:48 -0400</pubDate>
            <guid>http://w99.suretech.com/19462/Internet_Explorer_Flaw_Latest_Web_Browser_Security_Hole</guid>
        </item>
        <item>
            <title>Tombola 2014</title>
            <link>http://w99.suretech.com/19445/Tombola_2014</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-family: &quot;Trebuchet MS&quot;, Helvetica, Arial, Tahoma, Verdana, sans-serif; font-size: 12px;">&nbsp;</span></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 29 Apr 2014 10:02:53 -0400</pubDate>
            <guid>http://w99.suretech.com/19445/Tombola_2014</guid>
        </item>
        <item>
            <title>Happy Holidays 2013</title>
            <link>http://w99.suretech.com/19170/Happy_Holidays_2013</link>
            <description><![CDATA[<p><img src="http://imgdr.massmind.com/uploads/suretech/images/holiday2013(1).png" alt="" /></p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 20 Dec 2013 14:32:22 -0400</pubDate>
            <guid>http://w99.suretech.com/19170/Happy_Holidays_2013</guid>
        </item>
        <item>
            <title>Happy Holidays 2008 from TopazGroup</title>
            <link>http://w99.suretech.com/9451/Happy_Holidays_2008_from_TopazGroup</link>
            <description><![CDATA[<p><img height="107" width="190" border="1" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/holiday2008static(1).png" />Love, Peace, Joy and all best wishes to you from Topaz Group.</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Sun, 14 Dec 2008 09:37:33 -0400</pubDate>
            <guid>http://w99.suretech.com/9451/Happy_Holidays_2008_from_TopazGroup</guid>
        </item>
        <item>
            <title>Happy Holidays 2010 from SureTech.com</title>
            <link>http://w99.suretech.com/15130/Happy_Holidays_2010_from_SureTech_com</link>
            <description><![CDATA[<p><img height="153" width="225" alt="2010 Happy Holidays" src="http://imgdr.massmind.com/uploads/massmind/images/Screen Shot 2013-06-12 at 12_44_30 AM.png" />&nbsp;Happy Holidays from SureTech!</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 14 Dec 2010 21:11:17 -0400</pubDate>
            <guid>http://w99.suretech.com/15130/Happy_Holidays_2010_from_SureTech_com</guid>
        </item>
        <item>
            <title>Happy Holidays 2011</title>
            <link>http://w99.suretech.com/16674/Happy_Holidays_2011</link>
            <description><![CDATA[<p><a href="http://www.suretech.com/16674/Happy_Holidays_2011_from_SureTech_com"><img height="231" width="231" src="http://imgdr.massmind.com/uploads/suretech/images/happyholidays2.png" alt="" /></a></p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 19 Dec 2011 13:09:44 -0400</pubDate>
            <guid>http://w99.suretech.com/16674/Happy_Holidays_2011</guid>
        </item>
        <item>
            <title>Happy Holidays 2009 from SureTech.com and Topaz Group</title>
            <link>http://w99.suretech.com/13325/Happy_Holidays_2009_from_SureTech_com_and_Topaz_Group</link>
            <description><![CDATA[<p><a href="http://suretech.com/13325/happy2009"><img hspace="15" height="115" width="275" border="1" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/holidaycard2009.jpg" alt="" /></a>Love, Peace, Joy and all best wishes to you from SureTech.com and Topaz.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 21 Dec 2009 14:38:35 -0400</pubDate>
            <guid>http://w99.suretech.com/13325/Happy_Holidays_2009_from_SureTech_com_and_Topaz_Group</guid>
        </item>
        <item>
            <title>Happy Holidays 2012</title>
            <link>http://w99.suretech.com/18005/Happy_Holidays_2012</link>
            <description><![CDATA[<p><a href="http://suretech.com/18005/Happy_Holidays_2012"><img height="420" width="420" src="http://imgdr.massmind.com/uploads/suretech/images/SureTech Christmas Buttonsml.jpg" alt="" /></a></p>
<p>May you have a wonderful holiday season and a prosperous 2013!</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 17 Dec 2012 14:24:42 -0400</pubDate>
            <guid>http://w99.suretech.com/18005/Happy_Holidays_2012</guid>
        </item>
        <item>
            <title>Happy Holidays 2011 from Topaz</title>
            <link>http://w99.suretech.com/16678/Happy_Holidays_2011_from_Topaz</link>
            <description><![CDATA[<center>
<div style="background-color:#e9e9e9;width:567px;"><object data="http://aka.zero.jibjab.com/client/zero/ClientZero_EmbedViewer.swf?external_make_id=dGNzshDQtIBXflw5&amp;service=sendables.jibjab.com&amp;partnerID=holidays" type="application/x-shockwave-flash" height="319" width="567"><param name="wmode" value="transparent" /><param name="movie" value="http://aka.zero.jibjab.com/client/zero/ClientZero_EmbedViewer.swf?external_make_id=dGNzshDQtIBXflw5&amp;service=sendables.jibjab.com&amp;partnerID=holidays" /><param name="scaleMode" value="showAll" /><param name="quality" value="high" /><param name="allowNetworking" value="all" /><param name="allowFullScreen" value="true" /><param name="FlashVars" value="cornerRadius=10&amp;external_make_id=dGNzshDQtIBXflw5&amp;service=sendables.jibjab.com&amp;partnerID=holidays" /><param name="allowScriptAccess" value="always" /></object></div>
<div align="center" style="text-align:center;margin:0in 0in 0pt;"><b><span style="color:#953735;font-size:20pt;">May you have a wonderful holiday season and a prosperous 2012!</span></b></div>
<div align="center" style="text-align:center;margin:0in 0in 0pt;"> </div>
<div align="center" style="text-align:center;text-indent:-.25in;margin:0in 0in 0pt .5in;"><span style="color:#1f497d;">-<span style="font:7pt 'Times New Roman';">          </span></span><span style="color:#1f497d;">Your </span><a href="http://www.suretech.com/">SureTech.com</a><span style="color:#1f497d;"> Solutions Team</span></div>
</center>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 21 Dec 2011 12:20:48 -0400</pubDate>
            <guid>http://w99.suretech.com/16678/Happy_Holidays_2011_from_Topaz</guid>
        </item>
        <item>
            <title>Happy Holidays 2010 From Massmind Studio</title>
            <link>http://w99.suretech.com/15175/Happy_Holidays_2010_From_Massmind_Studio</link>
            <description><![CDATA[<div style="background-color:#e9e9e9;width:425px;"><object data="http://aka.zero.jibjab.com/client/zero/ClientZero_EmbedViewer.swf?external_make_id=VdU7GSumM8BUDRjO&amp;service=sendables.jibjab.com&amp;partnerID=JibJab" type="application/x-shockwave-flash" height="319" width="425"><param name="wmode" value="transparent" /><param name="movie" value="http://aka.zero.jibjab.com/client/zero/ClientZero_EmbedViewer.swf?external_make_id=VdU7GSumM8BUDRjO&amp;service=sendables.jibjab.com&amp;partnerID=JibJab" /><param name="scaleMode" value="showAll" /><param name="quality" value="high" /><param name="allowNetworking" value="all" /><param name="allowFullScreen" value="true" /><param name="FlashVars" value="external_make_id=VdU7GSumM8BUDRjO&amp;service=sendables.jibjab.com&amp;partnerID=JibJab" /><param name="allowScriptAccess" value="always" /></object>
<div style="text-align:center;margin-top:6px;width:435px;">Personalize funny videos and birthday <a href="http://sendables.jibjab.com/ecards">eCards</a> at JibJab!</div>
</div>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 22 Dec 2010 12:03:59 -0400</pubDate>
            <guid>http://w99.suretech.com/15175/Happy_Holidays_2010_From_Massmind_Studio</guid>
        </item>
        <item>
            <title>SureTech sponsors ArtJam</title>
            <link>http://w99.suretech.com/19141/SureTech_sponsors_ArtJam</link>
            <description><![CDATA[<p><img width="319" hspace="12" height="448" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/artjam.jpg" alt="" />SureTech is proud to support ArtJam 2013.  A fun pop up art gallery for the holidays with proceeds supporting HomeFront.  The pop up gallery is happening in the soon to be new head quarters of SureTech at 190 Witherspoon Street in Princeton.  ArtJam opening is on November 15 from 6 pm to 9 pm.  The gallery will be open from November 14 through November 24.  <a href="http://www.artspacenj.org/artjam-2013.html">&gt;For more information.</a></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 14 Nov 2013 02:13:04 -0400</pubDate>
            <guid>http://w99.suretech.com/19141/SureTech_sponsors_ArtJam</guid>
        </item>
        <item>
            <title>Mac Flashback Virus - What To Do if You're Infected</title>
            <link>http://w99.suretech.com/17077/Mac_Flashback_Virus_What_To_Do_if_You_re_Infected</link>
            <description><![CDATA[<p><img width="125" hspace="6" height="139" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/appleflashbackSmall.jpg" alt="" />Russian antivirus company Dr. Web recently reported that 600,000 Mac's are now infected with the &quot;Flashback&quot; trojan virus. Read on to see if your machine is infected and what you can do to remove&nbsp;the virus and make sure it doesn't come back.</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 10 Apr 2012 11:20:09 -0400</pubDate>
            <guid>http://w99.suretech.com/17077/Mac_Flashback_Virus_What_To_Do_if_You_re_Infected</guid>
        </item>
        <item>
            <title>IT Department As A Service</title>
            <link>http://w99.suretech.com/18875/IT_Department_As_A_Service</link>
            <description><![CDATA[<p><img src="http://imgdr.massmind.com/uploads/suretech/images/ITDaaS.jpg" width="250" height="167" hspace="12" align="right" alt="" />Here's the big idea: You don't care about the technology ingredients - you want your business to function.  We work with you to identify the results you want, and we are accountable for delivering those results with the full range of technologies and resources available to a $1mm IT shop.</p>
<p>We are your mobile IT department as a service (ITDaas)</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 25 Jun 2013 09:53:11 -0400</pubDate>
            <guid>http://w99.suretech.com/18875/IT_Department_As_A_Service</guid>
        </item>
        <item>
            <title>Planning for Windows XP End of Life April 2014</title>
            <link>http://w99.suretech.com/18592/Planning_for_Windows_XP_End_of_Life_April_2014</link>
            <description><![CDATA[<div class="blogpostheader">Microsoft has finally confirmed the official end of life for Windows XP.  They will no longer be putting out any security patch updates as of April 2014 which means that any XP machines will not be security protected.  Any support needed for XP machines will no longer be offered by Microsoft.</div>
<div class="blogpostheader"> </div>
<div class="blogpostheader">As part of our SNAP process, SureTech will be working with our customers to plan for the roadmap to replace XP machines in order to have optimum uptime for their network and to ensure that their overall networks are secure.</div>
<div class="blogpostheader"> </div>
<div class="blogpostheader">For more information from Microsoft, please see below article direct from the <a href="http://blogs.windows.com/windows/b/springboard/archive/2011/07/11/with-only-1000-days-left-of-extended-support-don-t-you-think-it-s-time-to-retire-windows-xp.aspx">Windows blog </a><br />
<h3 class="post-name"> </h3>
<h3 class="post-name">With only 1000 days left of extended support, dont you think its time to retire Windows XP?</h3>
<div class="wtb-post-body">
<div class="twitter">
<div class="post-date">Posted on: Jul 11, 2011</div>
<div class="username"> by                        <a class="internal-link view-user-profile" href="http://blogs.windows.com/members/stephenlrose/default.aspx">             Stephen L Rose             </a></div>
 </div>
</div>
</div>
<div class="content-fragment raw-html no-wrapper">
<div class="content-fragment-inner fiji-content-fragment-inner">
<div class="content-fragment-content">
<div class="user-defined-markup">
<div class="post-social"> </div>
</div>
</div>
</div>
</div>
<p>Wouldnt it be great  if the glory days lasted forever? But reality is trophies get dusty,  records are broken, and what it took to be the best ten years ago, just  isnt enough for todays standards. Things get better, faster. And  eventually, its time to move from good enough to something much better.</p>
<p>Windows XP had an amazing run and millions of PC users are  grateful for it. But its time to move on. Two reasons: 1) Extended  support for Windows XP is running out in less than 1000 days, and 2)  theres an OS out there thats much better than Windows XP.</p>
<p>On  April 8, 2014, security patches and ...</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 02 Apr 2013 14:59:09 -0400</pubDate>
            <guid>http://w99.suretech.com/18592/Planning_for_Windows_XP_End_of_Life_April_2014</guid>
        </item>
        <item>
            <title>Tombola 2013</title>
            <link>http://w99.suretech.com/18591/Tombola_2013</link>
            <description><![CDATA[<p><span style="font-family: 'Trebuchet MS', Helvetica, Arial, Tahoma, Verdana, sans-serif; font-size: 12px" class="Apple-style-span">&nbsp;</span></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 02 Apr 2013 13:13:19 -0400</pubDate>
            <guid>http://w99.suretech.com/18591/Tombola_2013</guid>
        </item>
        <item>
            <title>Tips and Tricks to Keep your Password Strong, Memorable, and Safe</title>
            <link>http://w99.suretech.com/17807/Tips_and_Tricks_to_Keep_your_Password_Strong_Memorable_and_Safe</link>
            <description><![CDATA[<p><img width="125" hspace="7" height="113" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/passwordpost.JPG" />Creating a strong password is one of the most important (and overlooked)  security measures you can take to ensure cyber security. Luckily there are easy ways to generate passwords that are  strong AND easy to remember. Read on for useful password creation tips,  what to avoid when crafting a password, and helpful alternatives for  password storage.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 16 Oct 2012 14:55:56 -0400</pubDate>
            <guid>http://w99.suretech.com/17807/Tips_and_Tricks_to_Keep_your_Password_Strong_Memorable_and_Safe</guid>
        </item>
        <item>
            <title>Are You Really Prepared</title>
            <link>http://w99.suretech.com/18042/Are_You_Really_Prepared</link>
            <description><![CDATA[<p><img width="148" height="111" align="left" style="margin:10px;" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/hurricane.png" /></p>
<p>Super Storm Sandy, which hit our area pretty hard about the end of October, gave a lot of people a wake-up call on their preparedness. I know of at least two businesses we work with who had issues with their systems because of the extended power outages and flooding and one organization that we do business with that was extensively flooded and lost their email system for almost a week because of the storm. Im sure there are many other companies that had issues because of the storm, but even if you didnt this time, you should think about the lessons learned and get prepared.<br />
Unfortunately some of these companies lost their email systems at precisely the time they needed them most. One organization had its basement flooded and its power and mechanical systems destroyed so it was going to be closed for several weeks. But because it hosted its email system in the building instead of in a secure data center, the leaders of the organization could not access their email lists to contact volunteers and athletic team members to let them know what was happening and what the alternative plans were.<br />
Another company we work with lost power to their building for a week which meant their website which both supports their existing customers and sells new subscriptions was shut down for that time because the servers that run their website are located in their building rather than in a secure data center.</p>
<p>For one company with a local exchange server, the sudden power shutdown corrupted the server so they could not send, receive or access mai. We migrated them to our secure data center and had them up and running ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 27 Dec 2012 06:44:54 -0400</pubDate>
            <guid>http://w99.suretech.com/18042/Are_You_Really_Prepared</guid>
        </item>
        <item>
            <title>OneNote and SkyDrive Fail</title>
            <link>http://w99.suretech.com/18308/OneNote_and_SkyDrive_Fail</link>
            <description><![CDATA[<p><img width="285" height="177" style="float:right;" src="http://imgdr.massmind.com/uploads/suretech/images/onenotecrash.jpg" alt="" /></p>
<p>As amazing as software power and features have become, we  are sometimes amazed in the wrong way.</p>
<p> </p>
<p>We recently spent more than 20 hours troubleshooting OneNote  on our SureDesk in an attempt to address crashes and notebook corruptions. We used  several different repositories for the OneNote files including, SkyDrive free,  SkyDrive business, our own SharePoint, and saving files locally; and this is what  I have concluded;</p>
<ul>
    <li>OneNote is buggy and prone to corrupting notebooks that have  images in them.</li>
    <li>SkyDrive has terrible outbound throughout and is both  miserably slow when loading OneNote and also causes OneNote.exe to crash. The  only way I found to use SkyDrive reliably was to use OneNote online on  SkyDrive.</li>
</ul>
<p>In  the end (hit the cymbals) we gave up and moved our notes to Evernote for  anywhere access capability and no crashes.</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 07 Mar 2013 15:17:36 -0400</pubDate>
            <guid>http://w99.suretech.com/18308/OneNote_and_SkyDrive_Fail</guid>
        </item>
        <item>
            <title>How to Become an Outlook Power User</title>
            <link>http://w99.suretech.com/16821/How_to_Become_an_Outlook_Power_User</link>
            <description><![CDATA[<p><img width="100" hspace="5" height="100" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/Outlook-Logo_small.jpg" alt="" /></p>
<p>Some people are fine with simply receiving and sending e-mail through Microsoft Outlook, however these tips are for the ones who like to customize, dig deep, and get their hands dirty. If you're the type who wants to streamline their Outlook experience, you'll find more than enough info here.&nbsp;</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 14 Feb 2012 11:21:11 -0400</pubDate>
            <guid>http://w99.suretech.com/16821/How_to_Become_an_Outlook_Power_User</guid>
        </item>
        <item>
            <title>Top 8 iPad Productivity Apps </title>
            <link>http://w99.suretech.com/17044/Top_8_iPad_Productivity_Apps</link>
            <description><![CDATA[<p><img width="132" hspace="6" height="100" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/ipadproductivityimage1.jpg" />If you're looking to boost your productivity, there's no better device than the iPad. It's portable, powerful, and extremely easy to use. These 8 apps were designed to help you work smarter on the iPad, not harder.&nbsp;</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 03 Apr 2012 14:35:29 -0400</pubDate>
            <guid>http://w99.suretech.com/17044/Top_8_iPad_Productivity_Apps</guid>
        </item>
        <item>
            <title>Cybercriminals Now Making House Calls</title>
            <link>http://w99.suretech.com/17181/Cybercriminals_Now_Making_House_Calls</link>
            <description><![CDATA[<p><img width="125" height="108" align="left" alt="" hspace="6" src="http://imgdr.massmind.com/uploads/suretech/images/microsoft phone scam small.jpg" />The old &quot;phony call from Microsoft&quot; scam is back, reports Daniel Wesemann of Internet Storm Center. By impersonating Windows Tech Department, cybercrooks are gaining access to unsuspecting computers and causing boatloads of no-goodness. Read on for more info on their tactics and how to report them.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 02 May 2012 13:47:29 -0400</pubDate>
            <guid>http://w99.suretech.com/17181/Cybercriminals_Now_Making_House_Calls</guid>
        </item>
        <item>
            <title>Business Continuity</title>
            <link>http://w99.suretech.com/17901/Business_Continuity</link>
            <description><![CDATA[<p><img width="590" height="100" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/toot.banner.6.jpg" /></p>
<p>With the increasing frequency of heavy storms in the Northeast, we want to ensure our customers have some good steps for Business Continuity in face of storms.  </p>
<h2> </h2>
<h3>In preparation for power loss we recommend that you:</h3>
<p>- Power down all workstations, printers, scanners, etc.</p>
<p>- Unplug any equipment if not plugged into a surge protector</p>
<p>- If flooding is a possibility, take all electronics off of the floor</p>
<p>- Perform or enforce an offsite backup to ensure your data exists outside your place of business.</p>
<p>- Move essential services away from windows.</p>
<p>- If you have a UPS unit or generator, test these units before the end  of today. If units fail, take appropriate actions to eliminate load.</p>
<p>- Check the fuel level of your generator.</p>
<h4>SureOffice Products including <a href="http://suretech.com/view/16131/hosted_microsoft_exchange.html">SureMail</a>, <a href="http://suretech.com/13016/SureDesk_Cloud_Hosted_Virtual_Desktop">SureDesks</a> and <a href="http://suretech.com/16130/SureBack_Online_Backup">SureBack</a> should not be impacted by storms in our secure data centers. </h4>
<h3> </h3>
<h3>As always, we appreciate any introductions to businesses we might help <b>Kick IT to the Cloud</b> anytime.</h3>
<p>The <a href="https://www.nyredcross.org/?nd=hurricane_safety_guide">American Red Cross</a> offers great overal tips for Storm Preparedness.</p>
<p>And <a href="http://www.csoonline.com/article/204450/business-continuity-and-disaster-recovery-planning-the-basics">CSO Magazine</a> has a thorough discussion of all Business Continuity planning you should think about.</p>
<p>We are proud that all of our SNAP Certified Clients had minimal downtime during the latest storm and more importantly came back online without a hitch when power was restored!</p>
<p> </p>
<p> </p>
<p> </p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 07 Nov 2012 18:10:43 -0400</pubDate>
            <guid>http://w99.suretech.com/17901/Business_Continuity</guid>
        </item>
        <item>
            <title>No Power? No Problem!</title>
            <link>http://w99.suretech.com/17361/No_Power_No_Problem</link>
            <description><![CDATA[<p><img width="125" height="85" align="left" alt="" vspace="5" hspace="5" src="http://imgdr.massmind.com/uploads/suretech/images/workfromhome(1).jpg" />A customer recently experienced a power outage. While this may send some businesses running for the hills, they welcomed this disruption with open arms. Allow me to explain&hellip;</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 18 Jul 2012 09:21:57 -0400</pubDate>
            <guid>http://w99.suretech.com/17361/No_Power_No_Problem</guid>
        </item>
        <item>
            <title>Email for Kids</title>
            <link>http://w99.suretech.com/16847/Email_for_Kids</link>
            <description><![CDATA[<p><img width="98" height="120" align="right" src="http://imgdr.massmind.com/uploads/suretech/images/email-picture.png" alt="" />Kids are using email at an earlier age than ever before. And it can be a really useful thing to let them communicate with grandparents and other relatives that are spread around the world. But, how do we keep kids safe when using email. There are a number of ways to do this, and weve used a combined approach over the years with our daughter.</p>
<h2>Using a Parents Account</h2>
<p>This is the simplest way to get a kid started using email. It gives you complete control over what is sent and received (just be careful what windows are open and dont leave them alone on your email account in case you have a surprise Christmas gift ordered on Amazon). You can create a personalized email address through your Gmail account using plus addressing (one method of doing that is outlined here http://flagrantdisregard.com/how-to-give-your-young-children-a-personalized-managed-email-address/).</p>
<p>We let our daughter use my wifes account for a while before she got her own account. It worked out reasonably well while she was in elementary school. There were just a few emails a week. We could filter what she saw and what she sent.</p>
<h2>Special Kids Email Accounts</h2>
<p>Once our daughter turned eleven, it seemed like she had enough friends with email accounts of their own that we should get her one. We decided to get her an account specifically targeted towards kid users. There are a number of services out there, but we went with Zoobuh (www.ZooBuh.com). It gives you a lot of parental control which you can turn on and off depending on your kid and how involved you feel you need to be. The features in particular that we like are:</p>
<ul class="normal_p">
    <li>Controlling who your child can ...</li></ul>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Sat, 18 Feb 2012 16:21:12 -0400</pubDate>
            <guid>http://w99.suretech.com/16847/Email_for_Kids</guid>
        </item>
        <item>
            <title>Simple Email Advice</title>
            <link>http://w99.suretech.com/16946/Simple_Email_Advice</link>
            <description><![CDATA[<div><img width="166" height="193" src="http://imgdr.massmind.com/uploads/suretech/images/email-picture2.png" alt="" style="float:right;" />
<p>A few recent email messages that came to my inbox made me think that we could all use some reminders to help us avoid simple (but potentially embarrassing) mistakes.</p>
</div>
<p><b>Pause for a moment before sharing the email addresses of friends.</b> Every few weeks I get an email from someone with seemingly their entire contact list To: line that would have been more appropriately sent by using BCC. Before you send out such an email, think for a moment and decide Does everyone you are sending to want everyone else in the thread to know their email addresses? For example, when I email the volunteers I work with in my sons elementary school I put everyone on the To line. Someone may need to get a sub and we distribute and email list to the volunteers anyway, so that data isnt secret. On the other hand, if you are emailing most of your address book to say Hey, were having a house party this weekend! or Who wants to buy Girl Scout cookies? Id suggest using BCC. Some people you email to may feel a bit odd about having their email address given out to total strangers. Using the BCC line also avoids issues with people using Reply All (to say Yes, well come) when they should use Reply.</p>
<p><b>In particularly sensitive emails, double check your recipients</b>. A parent on my sons swimming team accidentally hit Reply All on a message from the swim coach to a large number of people and sent a very critical message which everyone saw rather than just his intended recipient. Whether or not such criticism is warranted sharing such an email outside of the people it was intended ...</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 19 Mar 2012 14:08:24 -0400</pubDate>
            <guid>http://w99.suretech.com/16946/Simple_Email_Advice</guid>
        </item>
        <item>
            <title>Help! My Laptop Crashed</title>
            <link>http://w99.suretech.com/17391/Help_My_Laptop_Crashed</link>
            <description><![CDATA[<p>Ok, not really, but I had to send my laptop off for a repair recently and so I used the opportunity to test my disaster preparedness. Backups don't count if you haven't tested them, so I did a separate full backup of my laptop (just in case my regular backup failed and sent my laptop off).</p>
<p><br />
My work email and work documents were easy because I have those on my SureDesk. I just logged in from my extra desktop machine and was able to use email and have access to my documents instantly. If I didn't want to use my SureDesk I could have used Outlook Web Access (OWA) instead to access my email. One of the advantages of a SureDesk is the safety and security of being able to access it from anywhere and knowing it's backed up.</p>
<p><br />
Unfortunately we don't have the development environment I use on a SureDesk yet, so I needed to set that up on my temporary machine. I use a wamp stack for my development and I had prepared for this by installing the necessary tools on my machine, however the source files I needed were not in my normal backup. That would have been a small problem if my laptop had really crashed. I don't backup all of my source code because I'm only working on a small number of projects at a time and backing up my entire source directory would be too much. Still, I should be backing up the projects I'm actively working on and this exercise showed where I was missing some crucial files.</p>
<p><br />
<i>Key Takeaway</i>: It's important to try to retrieve key files from your backup from time-to-time to ensure that your backups are working and are backing up ...</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 24 Jul 2012 21:25:47 -0400</pubDate>
            <guid>http://w99.suretech.com/17391/Help_My_Laptop_Crashed</guid>
        </item>
        <item>
            <title>Beef Up Your Facebook Business Page in 7 Easy Steps</title>
            <link>http://w99.suretech.com/17491/Beef_Up_Your_Facebook_Business_Page_in_7_Easy_Steps</link>
            <description><![CDATA[<p><img width="125" height="94" align="left" alt="" hspace="7" src="http://imgdr.massmind.com/uploads/suretech/images/website-displayed-facebook-computer_n.jpg" />There's no doubt that Facebook has become a cultural phenomenon; spawning movies, custom apps, books, and even a phone with a built-in Facebook share button. While there have been plenty of blog posts written about how and why people use Facebook, I&rsquo;m more interested in how businesses &ndash; especially those on a shoestring budget - can use the service.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 16 Aug 2012 16:56:49 -0400</pubDate>
            <guid>http://w99.suretech.com/17491/Beef_Up_Your_Facebook_Business_Page_in_7_Easy_Steps</guid>
        </item>
        <item>
            <title>Domain Names, Name Servers, and DNS Records Explained</title>
            <link>http://w99.suretech.com/17255/Domain_Names_Name_Servers_and_DNS_Records_Explained</link>
            <description><![CDATA[<p><img width="125" vspace="5" hspace="5" height="103" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/DNS Domain Names.jpg" />You would think something as critical as finding which server your website is located on or where to deliver email for your domain would be well understood and straight forward. Well, like a lot of things it is and it isn&rsquo;t. When you set it up the first time, everything...</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 24 May 2012 21:37:01 -0400</pubDate>
            <guid>http://w99.suretech.com/17255/Domain_Names_Name_Servers_and_DNS_Records_Explained</guid>
        </item>
        <item>
            <title>10 Ways to Embrace Flexible Work</title>
            <link>http://w99.suretech.com/17532/10_Ways_to_Embrace_Flexible_Work</link>
            <description><![CDATA[<p><img width="130" height="150" align="left" alt="" hspace="7" src="http://imgdr.massmind.com/uploads/suretech/images/Working-in-coffee-shop2.jpg" /></p>
<p>By 2013, an overwhelming 93% of organizations will offer a flexible work policy. Help your organization adapt to the modern flexible work environment by checking out the Citrix Brief found below.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 29 Aug 2012 11:11:03 -0400</pubDate>
            <guid>http://w99.suretech.com/17532/10_Ways_to_Embrace_Flexible_Work</guid>
        </item>
        <item>
            <title>Windows 8 Install Chart</title>
            <link>http://w99.suretech.com/17489/Windows_8_Install_Chart</link>
            <description><![CDATA[<p><img hspace="8" alt="" align="left" width="125" height="115" src="http://imgdr.massmind.com/uploads/suretech/images/win8.jpg" /></p>
<p>Windows 8, the tablet-based operating system from Microsoft, is currently available for demo. &quot;This flowchart details the biggest changes and new features in Windows 8, alerts you to potential problems, and guides you through the array of critical decisions you'll need to make for a successful installation and deployment.&quot;</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 14 Aug 2012 17:28:04 -0400</pubDate>
            <guid>http://w99.suretech.com/17489/Windows_8_Install_Chart</guid>
        </item>
        <item>
            <title>SureTech near top in $3M Chase Grants</title>
            <link>http://w99.suretech.com/17322/SureTech_near_top_in_3M_Chase_Grants</link>
            <description><![CDATA[<p><img width="180" hspace="16" height="125" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/Mission-Small-Business-logo.png" alt="" />Hello friends - thanks to you we're nearly winning Chase's &quot;Mission Small Business&quot; and are currently #171 nationwide out of 45,000+ applicants.  Your support could bring us a $250,000 grant to turn our Private Cloud SureOffice&trade; into a self service website that would revolutionize IT for small businesses everywhere.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 25 Jun 2012 17:01:22 -0400</pubDate>
            <guid>http://w99.suretech.com/17322/SureTech_near_top_in_3M_Chase_Grants</guid>
        </item>
        <item>
            <title>6 Ways to Boost Sales With Tech</title>
            <link>http://w99.suretech.com/16858/6_Ways_to_Boost_Sales_With_Tech</link>
            <description><![CDATA[<p><span style="font-family: Arial"><span style="font-size: 10pt"><img hspace="5" alt="" vspace="5" align="left" width="110" height="82" src="http://imgdr.massmind.com/uploads/suretech/images/Tech-Money-200x149.jpg" /></span></span>Small businesses that are smart about leveraging technology can start to see impressive sales improvements and achieve great things. Check out this article for some easy ways to make tech work for you.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 22 Feb 2012 16:03:55 -0400</pubDate>
            <guid>http://w99.suretech.com/16858/6_Ways_to_Boost_Sales_With_Tech</guid>
        </item>
        <item>
            <title>FBI Won't Save Hacked PCs After July 9, 2012</title>
            <link>http://w99.suretech.com/17157/FBI_Won_t_Save_Hacked_PCs_After_July_9_2012</link>
            <description><![CDATA[<p><img hspace="4" alt="" vspace="4" align="left" width="125" height="94" src="http://imgdr.massmind.com/uploads/suretech/images/FBI-Malware.jpg" />Some of you may have heard about &quot;Malware Monday&quot; in the news, but what does it mean? Well, if you're computer is one of the infected, it could&nbsp;mean the end of the internet. <a href="http://dns-ok.us">When you follow this link</a>, the DNS Changer tool will scan your machine and see if you are infected. If it shows green you are all set. If red, the DNS Changer site also offers a tool to disinfect and fix the problem&nbsp;for you. We are here to help,&nbsp;so if you have any questions please feel free to reply to this e-mail.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 24 Apr 2012 11:53:47 -0400</pubDate>
            <guid>http://w99.suretech.com/17157/FBI_Won_t_Save_Hacked_PCs_After_July_9_2012</guid>
        </item>
        <item>
            <title>Chase Small Business Challenge</title>
            <link>http://w99.suretech.com/17273/Chase_Small_Business_Challenge</link>
            <description><![CDATA[<p><img hspace="4" alt="" vspace="4" align="left" width="125" height="88" src="http://imgdr.massmind.com/uploads/suretech/images/mission small business logo.jpg" />SureTech is proud to support local small business and to be in the running for a $250k grant to help us Kick IT to the Cloud. Show your support for us and for local business by visiting <a href="http://mmm.ms/Vote4Suretech">MissionSmallBusiness.com</a>, searching for &quot;suretech&quot; (leaving city and state blank), and clicking vote!</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 30 May 2012 16:10:24 -0400</pubDate>
            <guid>http://w99.suretech.com/17273/Chase_Small_Business_Challenge</guid>
        </item>
        <item>
            <title>Vote to bring $250K for Small Biz to Princeton</title>
            <link>http://w99.suretech.com/17302/Vote_to_bring_250K_for_Small_Biz_to_Princeton</link>
            <description><![CDATA[<p><img width="210" height="210" hspace="15" align="right" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/MissionSmallBusiness-250.jpg" />There are currently eight Princeton businesses competing for the Chase Bank Mission Small Business $250,000 grant and we want someone in Princeton to win!</p>
<p>To support Princeton small business and our vibrant local community please take a few minutes to read about each company and cast your vote for one, a few, or all of the companies that you want to win.</p>
<p>Voting takes just 60 seconds with your facebook account. To vote you can read detailed instructions <a href="http://mmm.ms/MSBchallenge">HERE</a> or you can just:</p>
<ol>
    <li><span style="font-size:large;"><b>Visit www.MissionSmallBusiness.com and click login and support (requires facebook) </b></span></li>
    <li><span style="font-size:large;"><b>Search for businesses in Princeton, New Jersey </b></span></li>
    <li><span style="font-size:large;"><b>Click vote and share</b></span><b></b></li>
</ol>
<p>Chase Bank and Living Social have teamed up to give out 12 small business grants of $250,000 each. In order for small businesses to qualify, they need to receive 250 votes by the end of June.</p>
<p>You can vote for as many businesses as youd like, so please take a minute and help out some of our hometown heroes!</p>
<p> </p>
<h2>Local Princeton Businesses Competing:</h2>
<p><a href="https://www.facebook.com/pages/Nancy-Troske-Contemporary-Jewelry/139481314602"><b>Nancy Troske Contemporary Jewelry</b></a> - <i>Ancient techniques with a contemporary twist.</i></p>
<p><a href="http://www.facebook.com/RedcordUSA"><b>Neurac Institute</b></a> - <i>Restore Health. Release Your Potential. </i></p>
<p><a href="http://www.facebook.com/pages/Princeton-Dance-Theater-Studio/326197558263"><b>Princeton Dance and Theater Studio</b></a></p>
<p><a href="http://www.tigerhallkids.com/"><b>Tiger Hall Play Zone and Activity Center</b></a> - <i>A spunky learning, play and party space for young tykes and the young-at-heart who love them! </i></p>
<p><b>Ron Gordon Communications</b></p>
<p><a href="http://www.facebook.com/KickITtotheCloud"><b>SureTech.com</b></a> - <i>We provide big business tech solutions for small businesses and local communities. Help us Kick IT to the Cloud! </i></p>
<p><a href="http://www.ateamconsulting.com/adamas/"><b>Adamas Concierge</b></a> - <i>Our owners ...</i></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 15 Jun 2012 09:38:56 -0400</pubDate>
            <guid>http://w99.suretech.com/17302/Vote_to_bring_250K_for_Small_Biz_to_Princeton</guid>
        </item>
        <item>
            <title>5 Gadgets We've Loved and Lost</title>
            <link>http://w99.suretech.com/16837/5_Gadgets_We_ve_Loved_and_Lost</link>
            <description><![CDATA[<p><font size="2" face="Trebuchet MS"><img hspace="6" alt="" vspace="6" align="left" width="103" height="100" src="http://imgdr.massmind.com/uploads/suretech/images/computer_in_trash_can_small.jpg" /></font>After Kodak's untimely tap-out, C-Net decided take a look at other products and brands that went from being the &ldquo;biggest thing&rdquo; to almost obsolete in the age of digital media. Check out some of our favorite gadgets throughout the years and see what&rsquo;s made them extinct. Here&rsquo;s a hint &ndash; it&rsquo;s probably a smart phone.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 17 Feb 2012 12:47:02 -0400</pubDate>
            <guid>http://w99.suretech.com/16837/5_Gadgets_We_ve_Loved_and_Lost</guid>
        </item>
        <item>
            <title>Even Faster Web Sites by Steve Souders</title>
            <link>http://w99.suretech.com/16884/Even_Faster_Web_Sites_by_Steve_Souders</link>
            <description><![CDATA[<p><img align="left" width="115" height="150" alt="" src="http://ecx.images-amazon.com/images/I/51CPtMMdpAL.SL200.jpg" />This is a really nice book outlining some important Web performance keys. The only downside is that by being almost three years old, it&rsquo;s already dated. But some of the core concepts are not going to change because they are key to having a web page display and work properly.<br />
&nbsp;</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 28 Feb 2012 15:55:40 -0400</pubDate>
            <guid>http://w99.suretech.com/16884/Even_Faster_Web_Sites_by_Steve_Souders</guid>
        </item>
        <item>
            <title>Ad-Supported Apps Suck Major Battery Power</title>
            <link>http://w99.suretech.com/16978/Ad_Supported_Apps_Suck_Major_Battery_Power</link>
            <description><![CDATA[<p><span style="font-family: 'Times New Roman'; font-size: 16px; "><img width="125" hspace="7" height="103" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/ad-free%20android.jpg" /></span>       <!--[if gte mso 9]><xml>
<o:OfficeDocumentSettings>
<o:AllowPNG />
</o:OfficeDocumentSettings>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:WordDocument>
<w:Zoom>0</w:Zoom>
<w:TrackMoves>false</w:TrackMoves>
<w:TrackFormatting />
<w:PunctuationKerning />
<w:DrawingGridHorizontalSpacing>18 pt</w:DrawingGridHorizontalSpacing>
<w:DrawingGridVerticalSpacing>18 pt</w:DrawingGridVerticalSpacing>
<w:DisplayHorizontalDrawingGridEvery>0</w:DisplayHorizontalDrawingGridEvery>
<w:DisplayVerticalDrawingGridEvery>0</w:DisplayVerticalDrawingGridEvery>
<w:ValidateAgainstSchemas />
<w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid>
<w:IgnoreMixedContent>false</w:IgnoreMixedContent>
<w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText>
<w:Compatibility>
<w:BreakWrappedTables />
<w:DontGrowAutofit />
<w:DontAutofitConstrainedTables />
<w:DontVertAlignInTxbx />
</w:Compatibility>
</w:WordDocument>
</xml><![endif]--><!--[if gte mso 9]><xml>
<w:LatentStyles DefLockedState="false" LatentStyleCount="276">
</w:LatentStyles>
</xml><![endif]-->  <!--[if gte mso 10]>
<style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:12.0pt;
font-family:"Times New Roman";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;}
</style>
<![endif]-->    <!--StartFragment--></p>
<p class="MsoNormal">I'm willing to bet that every smartphone user has at least one ad-run application on their phone. A new study now suggests that those addicting game and news apps end up hitting you where it hurts - your battery.</p>
<!--EndFragment-->
<p>&nbsp;</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 21 Mar 2012 19:44:41 -0400</pubDate>
            <guid>http://w99.suretech.com/16978/Ad_Supported_Apps_Suck_Major_Battery_Power</guid>
        </item>
        <item>
            <title>New Mac Trojan Swipes Usernames and Passwords</title>
            <link>http://w99.suretech.com/16887/New_Mac_Trojan_Swipes_Usernames_and_Passwords</link>
            <description><![CDATA[<p><img hspace="7" vspace="4" align="left" width="100" height="88" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/trojan_horse.png" />The latest version of an infamous Mac virus has reared its ugly head once again. Known as &lsquo;Flashback&rsquo;, this Trojan injects malicious code into web browsers while scanning for usernames and password information. &nbsp;Find out how SureTech can protect you from this &quot;particularly insidious&quot; virus here.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 29 Feb 2012 23:26:07 -0400</pubDate>
            <guid>http://w99.suretech.com/16887/New_Mac_Trojan_Swipes_Usernames_and_Passwords</guid>
        </item>
        <item>
            <title>Hey Google, Get Your Hands Off My Data!</title>
            <link>http://w99.suretech.com/16886/Hey_Google_Get_Your_Hands_Off_My_Data</link>
            <description><![CDATA[<p><img width="150" height="96" align="left" vspace="5" hspace="7" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/Google-Privacy1.jpg" />March 1st ushers in a new Google privacy policy. What this means is that all of your prior search data will be used by the company to gather even more information from you without your knowledge. Check out these links for step-by-step instructions on how to clear your history fast.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 29 Feb 2012 14:16:51 -0400</pubDate>
            <guid>http://w99.suretech.com/16886/Hey_Google_Get_Your_Hands_Off_My_Data</guid>
        </item>
        <item>
            <title>Steve Jobs Remembered in Cartoons</title>
            <link>http://w99.suretech.com/16846/Steve_Jobs_Remembered_in_Cartoons</link>
            <description><![CDATA[<p><img width="122" height="100" vspace="6" hspace="8" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/jayvee_fernandez_steve_jobs.jpg" />Steve Jobs may have left us a while ago, but little reminders of his legacy can be seen everyday. &nbsp;Check out these cartoons celebrating his life, work ethic, and quirks that made him so unique.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sat, 18 Feb 2012 13:37:23 -0400</pubDate>
            <guid>http://w99.suretech.com/16846/Steve_Jobs_Remembered_in_Cartoons</guid>
        </item>
        <item>
            <title>Kids and Computers - Introduction</title>
            <link>http://w99.suretech.com/16758/Kids_and_Computers_Introduction</link>
            <description><![CDATA[<p><img style="float:left;" alt="" width="144" height="65" src="http://imgdr.massmind.com/uploads/suretech/images/kids-computers.png" />A few weeks ago at a Boxing Day party, I was asked for the second time in as many months about protecting kids using computers. I shouldnt find this surprising since my daughter and her friends are tweens and starting to use computers and other devices that connect to the internet. It can be a scary time to be a parent with all thats out there on the internet. Ive decided to write a series of posts on various ways we can protect our kids on-line. Some of this will be my personal opinions and sometimes Ill show you how to do things that I wouldnt necessarily recommend (but that I know some people might want to do). And I welcome any comments or feedback you have on my suggestions, Im sure we can learn a lot from each other.<br />
For my first post, Id like to talk about basic computer setup. Whether or not you have kids, its important to protect your computer from attack and make sure any critical data is backed up. To protect your computer I suggest the following steps. These make sense for both Mac and PC based computers.<br />
 </p>
<p>1. The account you use day-to-day should be a non-administrator account. There is little reason today to be running an account that has full administrative privileges, and it allows malware writers to access your entire computer if they manage to trick you into running their application. If you have kids, their account should be a different one from yours and they never should have access to an administrator account. Yes, it is a pain-in-the-neck to have them come to you to install software, but the point is to exercise some control ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 19 Jan 2012 21:55:46 -0400</pubDate>
            <guid>http://w99.suretech.com/16758/Kids_and_Computers_Introduction</guid>
        </item>
        <item>
            <title>Give Your Excel Knowledge a Kick in the Pants</title>
            <link>http://w99.suretech.com/16798/Give_Your_Excel_Knowledge_a_Kick_in_the_Pants</link>
            <description><![CDATA[<p><img width="100" height="100" hspace="6" align="left" alt="" src="http://blog.toggle.com/wp-content/uploads/2010/12/excel_logo.png" />Everyone uses Excel, but not everyone uses it to its fullest capacity. These Microsoft videos will have you spreading like a pro in no time. Learn formulas to make your life easier and graphs to make your ideas come to life. Read more here.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 07 Feb 2012 13:01:41 -0400</pubDate>
            <guid>http://w99.suretech.com/16798/Give_Your_Excel_Knowledge_a_Kick_in_the_Pants</guid>
        </item>
        <item>
            <title>Zend and the Art of WebApp Development</title>
            <link>http://w99.suretech.com/16788/Zend_and_the_Art_of_WebApp_Development</link>
            <description><![CDATA[<p>Ive worked on several web applications recently and Ive been using pieces of the <a href="http://framework.zend.com/">Zend Framework</a> for them. A while back I reviewed a number of PHP libraries and decided that for our needs, the Zend Framework was ideal. Now that Ive used it for a few applications, Im convinced that it has what we need and Ive been pleased with how well its worked for us.<br />
<img style="padding-right:10px;float:left;" alt="" width="192" height="125" src="http://imgdr.massmind.com/uploads/suretech/images/construction-site.png" />When I initially was looking for a PHP framework, it was to enhance our internal Content Management System  TopazPort. When TopazPort was initially designed over six years ago, there wasnt a good set of libraries to build it on, so the original architect wrote everything from the ground up. But things have changed since then, and specifically it is time to update our database layer to take advantage of new features in PHP. Rather than redoing our database layer, I was certain there was an Open Source library out there that we could use. So I reviewed several frameworks, including CakePHP and CodeIgniter, and decided that Zend Framework would work nicely for us. One thing I really like about Zend is that you can take as much or as little as you want. We dont have the resources to completely re-write our CMS to use a framework. But we do have the time to take bits and pieces over time. <br />
But shortly after I picked Zend we put the project to update our CMS on the back burner for a while because we had some more pressing client work to do. I saw this as a perfect opportunity to get some experience with Zend on some smaller projects. So weve ended up ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 03 Feb 2012 18:00:23 -0400</pubDate>
            <guid>http://w99.suretech.com/16788/Zend_and_the_Art_of_WebApp_Development</guid>
        </item>
        <item>
            <title>New Year's Resolutions - Take Back Your Workday Tips</title>
            <link>http://w99.suretech.com/16675/New_Year_s_Resolutions_Take_Back_Your_Workday_Tips</link>
            <description><![CDATA[<p><img alt="" align="left" width="124" height="127" src="http://imgdr.massmind.com/uploads/suretech/images/productivitysmall.jpg" />Still struggling to stay productive in the age of distraction? Tony Wong recently sat down and discussed the top 7 ways in which your organization can keep productivity and focus while still staying connected.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 19 Dec 2011 16:03:54 -0400</pubDate>
            <guid>http://w99.suretech.com/16675/New_Year_s_Resolutions_Take_Back_Your_Workday_Tips</guid>
        </item>
        <item>
            <title>Dining by Design a Hit!</title>
            <link>http://w99.suretech.com/16652/Dining_by_Design_a_Hit</link>
            <description><![CDATA[<p><img width="130" hspace="4" height="75" border="2" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/09building.jpg" alt="" />On November 5th, SureTech took part in the Princeton Arts Councils Dining by Deisgn event.&nbsp; Check out some highlights from the night, including a slideshow video of the amazing art created by many of the programs participants.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Sun, 11 Dec 2011 17:06:56 -0400</pubDate>
            <guid>http://w99.suretech.com/16652/Dining_by_Design_a_Hit</guid>
        </item>
        <item>
            <title></title>
            <link>http://w99.suretech.com/16251</link>
            <description><![CDATA[<p>There is a lot of buzz around <a href="http://nyti.ms/ihVOpE">DropBox and box.net</a> - both area great services for sharing files with another person.</p>
<p><img width="150" height="240" vspace="5" hspace="5" align="left" alt="" src="images/suretech/surefile_icon.jpg" />This buzz is a boon to our business too since our <a href="/16132">SureFiles</a> offers a better business solution than DropBox and Box.net because it is integrated with Active Directory and standard business network security architecture (Microsoft).  It is also a better price point when you go over 2 users accessing the same data.</p>
<p><font class="Apple-style-span" color="#1F497D" face="Calibri" size="4"><span class="Apple-style-span" style="font-size:14px;"><br />
</span></font></p>
<div><span class="Apple-style-span" style="font-size:14px;color:rgb(31,73,125);font-family:Calibri;"><br />
</span></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 06 Jun 2011 11:43:45 -0400</pubDate>
            <guid>http://w99.suretech.com/16251</guid>
        </item>
        <item>
            <title></title>
            <link>http://w99.suretech.com/16620</link>
            <description><![CDATA[<p><img alt="" align="left" width="108" height="100" src="http://www.smartmoviemaking.com/wp-content/uploads/2011/11/iphone_battery_red.jpg" />If you just bought the new iPhone 4s, Apple's latest update to iOS 5 may fix your battery-draining problems - or it may make them worse.&nbsp; iPhone users across the country are split down the middle; some claiming &quot;my battery life is awesome!&quot; and some, well, aren't so lucky.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 17 Nov 2011 19:55:28 -0400</pubDate>
            <guid>http://w99.suretech.com/16620</guid>
        </item>
        <item>
            <title>Google Android Almost Always Out of Date</title>
            <link>http://w99.suretech.com/16594/Google_Android_Almost_Always_Out_of_Date</link>
            <description><![CDATA[<p><img width="113" height="117" align="left" alt="" src="http://i.bnet.com/blogs/google-android-fragmentation.jpg" />With a multitude of developers and smart phone manufacturers pumping out newer phones, it is becoming harder to update older versions. We explore the wonderful world of Android Fragmentation.&nbsp; Myth? Legend? Horror story told to junior software developers? Check out our post and see how these smartphones match up to one another, and more importantly with Apple's iPhone.</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 08 Nov 2011 18:08:31 -0400</pubDate>
            <guid>http://w99.suretech.com/16594/Google_Android_Almost_Always_Out_of_Date</guid>
        </item>
        <item>
            <title>Smartphone Apps - Like Dates, Good to Know Where They've Been</title>
            <link>http://w99.suretech.com/16558/Smartphone_Apps_Like_Dates_Good_to_Know_Where_They_ve_Been</link>
            <description><![CDATA[<p><img width="111" height="128" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/madsickdroidyo(1).png" />The new HTC Droid security flaw proves that when you download an  open-source app, you're inviting the developers into your home, taking  off their shoes, and giving them a foot massage (so to speak.)&nbsp; <br />
&nbsp;</p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 21 Oct 2011 20:03:48 -0400</pubDate>
            <guid>http://w99.suretech.com/16558/Smartphone_Apps_Like_Dates_Good_to_Know_Where_They_ve_Been</guid>
        </item>
        <item>
            <title>10 Immutable Laws of Mistakes</title>
            <link>http://w99.suretech.com/16406/10_Immutable_Laws_of_Mistakes</link>
            <description><![CDATA[<p><font color="#000000"><img width="157" height="120" align="left" src="http://static.howstuffworks.com/gif/5-diy-mistakes-1.jpg" alt="" />Mist</font>akes are inevitable but we strive to learn from them, making them a point of growth and not a set-back.&nbsp; Below is an article illustrating principles and an attitude we at SureTech.com&nbsp;stand behind and work to emmulate.</p>
<p><a href="http://www.techrepublic.com/blog/10things/10-immutable-laws-of-mistakes/2633?tag=nl.e099">http://www.techrepublic.com/blog/10things/10-immutable-laws-of-mistakes/2633?tag=nl.e099</a></p>]]></description>
            <author>Corey Meyers</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 15 Aug 2011 17:09:12 -0400</pubDate>
            <guid>http://w99.suretech.com/16406/10_Immutable_Laws_of_Mistakes</guid>
        </item>
        <item>
            <title>Defense in Depth</title>
            <link>http://w99.suretech.com/12843/Defense_in_Depth</link>
            <description><![CDATA[<p>Today I want to talk about the benefits of <a href="http://en.wikipedia.org/wiki/Defense_in_Depth_(computing)">defense</a> in <a href="http://blogs.msdn.com/oldnewthing/archive/2009/03/19/9488508.aspx">depth</a>. The term defense in depth is used in a variety of ways. I like to think of it as a general term to describe any system where you have multiple layers of protection. If one layer fails, another layer is there to provide a backup.</p>
<p>As I wrote about <a href="http://www.suretech.com/12453">a while back</a>, we were subjected to a <a href="http://en.wikipedia.org/wiki/Script_kiddie">script kiddie</a> attack. Fortunately they were not successful in breaking in to our systems, but, due to some bugs in how we handled some of the requests, they did end up causing a denial-of-service attack on our database server. Normally, this would just mean the website was down for a while, but, due to several other bugs we ended up showing a screen that should only be shown to developers that included our database password and other information needed to connect to our database. Oh #@$%^ is really the only thing to say then (particularly because when we first realized this, we had no idea how long this problem existed). After having visions of user email addresses suddenly ending up in the hands of spammers, we realized we were much better off than we thought. Our database is set to be accessible only from our web server. So, unless someone could break into our web server, they still couldnt access our database (and if they can break into our web server, we have bigger problems).</p>
<p>Thankfully for us, even though several layers of protection failed  we had bugs in our search mechanism, we had bugs in our debugging code and some secret information was revealed  our database was still protected.</p>
<p>Another ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 18 Aug 2009 23:12:45 -0400</pubDate>
            <guid>http://w99.suretech.com/12843/Defense_in_Depth</guid>
        </item>
        <item>
            <title>Jim Farrell made new Director of Solutions Operations</title>
            <link>http://w99.suretech.com/16343/Jim_Farrell_made_new_Director_of_Solutions_Operations</link>
            <description><![CDATA[<p>We are pleased to announce that we have officially promoted Jim Farrell to Director of Solutions Operations.</p>
<p>We are proud to have him in this important role and privileged to have his leadership as we continue to grow our operations.  </p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 15 Jul 2011 18:47:08 -0400</pubDate>
            <guid>http://w99.suretech.com/16343/Jim_Farrell_made_new_Director_of_Solutions_Operations</guid>
        </item>
        <item>
            <title>Beware Hack Attack in Disguise as Payment Processing</title>
            <link>http://w99.suretech.com/16299/Beware_Hack_Attack_in_Disguise_as_Payment_Processing</link>
            <description><![CDATA[<p>The latest hack attacks we are seeing are links within a payment style email.  Always check the from address on any email that asks you to click on a link.  You can see here the from is not at all the same. </p>
<p style="margin:0in 0in 0pt;" class="MsoNormal"><span style="font-family:Calibri, 'sans-serif';color:#1f497d;font-size:14pt;"> </span></p>
<p style="margin:0in 0in 0pt;" class="MsoNormal"><b><span style="font-family:Tahoma, 'sans-serif';font-size:10pt;">From:</span></b><span style="font-family:Tahoma, 'sans-serif';font-size:10pt;"> seybert4456eric888@hotmail.com [mailto:seybert4456eric888@hotmail.com] <b>On Behalf Of </b>InterspirePayment.net<br />
<b>Sent:</b> Tuesday, June 28, 2011 11:22 AM<br />
<b>To:</b> John Dow</span></p>
<p style="margin:0in 0in 0pt;" class="MsoNormal"><span style="font-family:Tahoma, 'sans-serif';font-size:10pt;"><b>Subject:</b> 1309274543 Alberto Molinaorder bil</span></p>
<p style="margin:0in 0in 0pt;" class="MsoNormal"><font size="3" face="Times New Roman"> </font></p>
<div align="center">
<table style="width:6.25in;border-collapse:collapse;" class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="600">
    <tbody>
        <tr>
            <td style="border-bottom:#f0f0f0;border-left:#f0f0f0;padding-bottom:0in;background-color:transparent;padding-left:0in;width:100%;padding-right:0in;border-top:#f0f0f0;border-right:#f0f0f0;padding-top:0in;" valign="top" width="100%">
            <div align="center">
            <table style="width:6.25in;border-collapse:collapse;" class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="600">
                <tbody>
                    <tr>
                        <td style="border-bottom:#f0f0f0;border-left:#f0f0f0;padding-bottom:0in;background-color:transparent;padding-left:0in;padding-right:0in;border-top:#f0f0f0;border-right:#f0f0f0;padding-top:0in;">
                        <p style="text-align:right;line-height:14.4pt;margin:0in 0in 0pt;" class="MsoNormal" align="right"><span style="font-family:Arial, 'sans-serif';font-size:8.5pt;">ID:<span class="apple-converted-space"> </span>6NVP12730EM463690H</span></p>
                        </td>
                    </tr>
                </tbody>
            </table>
            </div>
            <p style="line-height:14.4pt;margin:0in 0in 0pt;" class="MsoNormal"><b><span style="font-family:Arial, 'sans-serif';font-size:9pt;">Hello John Dow,</span></b></p>
            <p style="line-height:14.4pt;margin:0in 0in 0pt;" class="MsoNormal"><b><span style="font-family:Arial, 'sans-serif';font-size:10.5pt;">Order 1309274543 will be proccesed within 24 hours.Your credit card will be debited of $457.00 USD </span></b><span style="font-family:Arial, 'sans-serif';font-size:9pt;"><br />
            To see ...</span></p></td></tr></tbody></table></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 01 Jul 2011 13:02:56 -0400</pubDate>
            <guid>http://w99.suretech.com/16299/Beware_Hack_Attack_in_Disguise_as_Payment_Processing</guid>
        </item>
        <item>
            <title>Performance</title>
            <link>http://w99.suretech.com/14931/Performance</link>
            <description><![CDATA[<p>I am giving a talk in about a week at Pace University on improving performance of applications (where Im using the term application to mean anything that interacts with a user  a program running on an iPhone or Windows computer, a web site, etc.). To help prepare for that talk, I thought I would write some of my thoughts on performance in this blog as a way to crystalize my thinking and organize my thoughts.</p>
<h1>Why is performance important and why is it so hard</h1>
<p>I think we all understand inherently why performance is important. We always want the program were using to run faster or get annoyed when the web page we are loading takes too long to come up.</p>
<p>Performance is hard because it takes time just like any other feature (one of my former managers would say Performance is a feature). I love this quote from Blaise Pascal because I think it applies to lots of things, but its particularly relevant to performance  I would have written a shorter letter, but I did not have the time. Developers could say I would have written a faster application, but I did not have the time. Speedy code is also hard because anyone whos not working on making a faster application is, almost by definition, working on slowing the application down. They are writing more code and adding more features, which will take more CPU cycles. That slows things down. If you add a video to your websites front page, you will slow down the loading of that page.</p>
<h1>Tracking Performance</h1>
<p>Since, in general, we all have limited time and resources for our projects, we must decide what areas of our program need to be worked on. The best way to ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 30 Nov 2010 23:42:35 -0400</pubDate>
            <guid>http://w99.suretech.com/14931/Performance</guid>
        </item>
        <item>
            <title>Armstrong Industrial Hose Launches New Garden Hose Line</title>
            <link>http://w99.suretech.com/16173/Armstrong_Industrial_Hose_Launches_New_Garden_Hose_Line</link>
            <description><![CDATA[<p><a target="_blank" href="http://www.gardenhoseusa.com"><img hspace="5" align="left" width="80" height="80" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/gardenhosethumb.png" /></a>We&nbsp;created an ecommerce website for&nbsp;<a target="_blank" href="http://www.gardenhoseusa.com">Amstrong Industrial Hose's</a> new <a target="_blank" href="http://www.gardenhoseusa.com">garden hose line</a>.&nbsp; Fun colors of hose and great durable product.&nbsp;&nbsp;&nbsp;&nbsp;</p>
<p>&nbsp;</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 16 May 2011 15:42:10 -0400</pubDate>
            <guid>http://w99.suretech.com/16173/Armstrong_Industrial_Hose_Launches_New_Garden_Hose_Line</guid>
        </item>
        <item>
            <title>Tombola 2011</title>
            <link>http://w99.suretech.com/16242/Tombola_2011</link>
            <description><![CDATA[<p><span style="font-family: 'Trebuchet MS', Helvetica, Arial, Tahoma, Verdana, sans-serif; font-size: 12px" class="Apple-style-span">&nbsp;</span></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 01 Jun 2011 12:03:29 -0400</pubDate>
            <guid>http://w99.suretech.com/16242/Tombola_2011</guid>
        </item>
        <item>
            <title>This is Success?!  New Viruses on Macs</title>
            <link>http://w99.suretech.com/16166/This_is_Success_New_Viruses_on_Macs</link>
            <description><![CDATA[<p>The days where Macs are the one impenetrable place for viruses unfortunately seem to be over.  New malware attacks are popping up more frequently on Macs these days.  We now recommend AntiVirus for your Mac as well.</p>
<p> </p>
<p>via <a href="http://www.zdnet.com/blog/bott/what-a-mac-malware-attack-looks-like/3269">ZDnet.com</a></p>
<h1 class="h s-1" style="margin-top:0px;margin-right:0px;margin-bottom:8px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;font-weight:normal;font-style:inherit;font-size:3.33em;font-family:Georgia, serif;vertical-align:baseline;line-height:1.08em;">What a Mac malware attack looks like</h1>
<p> </p>
<p><span class="Apple-style-span" style="font-size:12px;color:rgb(37,37,37);font-family:Verdana, sans-serif;line-height:18px;"><span class="Apple-style-span" style="line-height:normal;"><span class="Apple-style-span" style="color:rgb(149,149,149);font-size:11px;">By Ed Bott | May 6, 2011, 1:09pm PDT</span></span></span></p>
<p><span class="Apple-style-span" style="font-size:12px;color:rgb(37,37,37);font-family:Verdana, sans-serif;line-height:18px;"><span class="Apple-style-span" style="line-height:normal;">Well, that didnt take long.</span></span></p>
<p><span class="Apple-style-span" style="font-size:12px;color:rgb(37,37,37);font-family:Verdana, sans-serif;line-height:18px;"></span></p>
<div class="content-1 entry space-1 clear" style="margin-top:0px;margin-right:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;font-weight:inherit;font-style:inherit;font-size:12px;font-family:inherit;vertical-align:baseline;">
<p style="margin-top:0px;margin-right:0px;margin-bottom:15px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;font-weight:inherit;font-style:inherit;font-size:12px;font-family:inherit;vertical-align:baseline;">After I posted my analysis of <a style="margin-top:0px;margin-right:0px;margin-bottom:0px;margin-left:0px;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;border-top-width:0px;border-right-width:0px;border-bottom-width:0px;border-left-width:0px;font-weight:inherit;"></a></p></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 12 May 2011 10:40:59 -0400</pubDate>
            <guid>http://w99.suretech.com/16166/This_is_Success_New_Viruses_on_Macs</guid>
        </item>
        <item>
            <title>Don't Ever Do A Startup - Gospel</title>
            <link>http://w99.suretech.com/16129/Don_t_Ever_Do_A_Startup_Gospel</link>
            <description><![CDATA[<div style="width:425px;"><strong style="margin:12px 0 4px;"><a title="Why NOT To Do a Startup." href="http://www.slideshare.net/dmc500hats/why-not-to-do-a-startup">Why NOT To Do a Startup. </a></strong> 
<div style="padding:5px 0 12px;">View more presentations from <a href="http://www.slideshare.net/dmc500hats">Dave McClure</a></div>
</div>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 04 May 2011 15:30:29 -0400</pubDate>
            <guid>http://w99.suretech.com/16129/Don_t_Ever_Do_A_Startup_Gospel</guid>
        </item>
        <item>
            <title>Hack Attacks Through Osama Photos</title>
            <link>http://w99.suretech.com/16127/Hack_Attacks_Through_Osama_Photos</link>
            <description><![CDATA[<p>Hackers love to take advantage of big news sensations to introduce new viruses.  Stay away from any Osama photo links or video links.  There are major hack attacks happening particularly through facebook.com posts right now encouraging friends to click on death videos!  Read more below via http://wnyt.com</p>
<p><span class="Apple-style-span" style="font-size:13px;font-family:Verdana, Arial, Helvetica, sans-serif;"></span>Beware of email, websites with 'bin Laden's death video'
</p><p style="margin-left:0px;margin-top:10px;margin-right:0px;margin-bottom:0px;"><img alt="" src="http://wnyt.com/wnytimages/repository/2011-05/bin-laden-video.jpg" style="width:156px;height:120px;margin-top:2px;margin-right:2px;margin-bottom:2px;margin-left:2px;float:left;" />SCHENECTADY - A quick Google search about Osama bin Laden leads to pictures of what appears to be a dead bin Laden. Law enforcement officials say those websites could introduce viruses into your computer system.</p>
<p style="margin-left:0px;margin-top:10px;margin-right:0px;margin-bottom:0px;">The FBI is also warning computer users about unsolicited emails reportedly showing photos and videos of bin Laden's killing. Plus, questionable links started showing up on Facebook and other social networking sites.</p>
<p style="margin-left:0px;margin-top:10px;margin-right:0px;margin-bottom:0px;">Officials say cyber criminals have been luring computer users with promises of bin Laden's death photos in an effort to spread viruses.</p>
<p style="margin-left:0px;margin-top:10px;margin-right:0px;margin-bottom:0px;">Computer expert Tush Nikollaj from Logical Net in Schenectady said he's not surprised hackers are taking advantage of one the world's biggest news events.<br />
<br />
&quot;It really stirs up a lot of activity among hackers out there to create websites that say hey come to my site we've got real life photos of what happened,&quot; said Nikollaj.<br />
<br />
What's ...</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 04 May 2011 14:18:32 -0400</pubDate>
            <guid>http://w99.suretech.com/16127/Hack_Attacks_Through_Osama_Photos</guid>
        </item>
        <item>
            <title>Bin Laden Facebook Hack Attack</title>
            <link>http://w99.suretech.com/16126/Bin_Laden_Facebook_Hack_Attack</link>
            <description><![CDATA[<h1>Beware Criminals Using Bin Laden for Email, Facebook Hack Attack</h1>
<p>For getting attention, the only thing more reliable than a train reck is a historic international train wreck like the killing of Osama Bin Laden.</p>
<p>Looking at the bloody pictures is so natural, impuslive and reliable that criminals have a perfect opportunity to capitalize on it before the real pictures are shown.</p>
<p> </p>
<h2>BEWARE OF BIN LADEN IS DEAD PICS</h2>
<p>The email below from facebook is almost impossible to ignore, but it is a <a href="http://en.wikipedia.org/wiki/Trojan_horse_(computing)">TROJAN HORSE</a> designed to download a malicious program to your computer or facebook account.  My friend below clicked on a similar link which then took over her Facebook address book and sent out the email below to her friends.  Also the <a href="http://www.euronews.net/2011/05/02/dead-bin-laden-photo-is-a-fake/">pics it's refering to are FAKE</a>.</p>
<p> </p>
<h2>TO SEE THE REAL PICS</h2>
<p>You are connected to the internet, trust me, you will know as soon as the real pictures are released.  you won't have to click on a special link, accept a download or agree to any terms.  The pictures will be on the new york times, cnn and major newspapers easily and publicly.  If someone sends you a special attachment in email you can safely ignore it, but you cannot safely open it.</p>
<p> </p>
<p> </p>
<p></p><table style="width:100%;border-collapse:collapse;" border="0" cellspacing="0" cellpadding="0" width="100%">
    <tbody>
        <tr>
            <td style="border-bottom:#f0f0f0;border-left:#f0f0f0;padding-bottom:3pt;padding-left:6pt;padding-right:6pt;background:#3b5998;border-top:#f0f0f0;border-right:#f0f0f0;padding-top:3pt;">
            <div style="margin:0in 0in 0pt;"><b><span style="font-family:Tahoma, 'sans-serif';letter-spacing:-.35pt;color:#FFFFFF;">facebook </span></b></div>
            </td>
        </tr>
    </tbody>
</table>

<div style="margin:0in 0in 0pt;"> </div>
<p></p><table style="width:100%;border-collapse:collapse;" border="0" cellspacing="0" cellpadding="0" width="100%">
    <tbody>
        <tr>
            <td style="border-bottom:#f0f0f0;border-left:#f0f0f0;padding-bottom:3.75pt;padding-left:7.5pt;"></td></tr></tbody></table>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 04 May 2011 13:36:16 -0400</pubDate>
            <guid>http://w99.suretech.com/16126/Bin_Laden_Facebook_Hack_Attack</guid>
        </item>
        <item>
            <title>First Introduction of the Book</title>
            <link>http://w99.suretech.com/15705/First_Introduction_of_the_Book</link>
            <description><![CDATA[<p>New systems can frustrate any user.</p>
<p>We like to think no user question is too small for a quality and calm answer from our HelpDesk!</p>
<p><iframe title="YouTube video player" width="480" height="390" src="http://www.youtube.com/embed/KQfmYBIYfi0" frameborder="0" allowfullscreen=""></iframe></p>
]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 01 Mar 2011 15:10:00 -0400</pubDate>
            <guid>http://w99.suretech.com/15705/First_Introduction_of_the_Book</guid>
        </item>
        <item>
            <title>Virtual Office can Save Time even in Customs Checks</title>
            <link>http://w99.suretech.com/15598/Virtual_Office_can_Save_Time_even_in_Customs_Checks</link>
            <description><![CDATA[<p> I read with interest the NY Times article <a href="http://www.nytimes.com/2011/02/20/weekinreview/20laptop.html?sq=computer%20search%20february%2020,%202011&amp;st=cse&amp;scp=1&amp;pagewanted=all">&quot;Can You Frisk a Hard Drive&quot;</a> (The New York Times, by David Shipler, February 19, 2011) about how actual computers are subject to searches when traveling now.  This is yet another way our SureDesk service and having a virtual office can help speed up travel.  I'm not sure where I come down on the 4th amendment debate about whether searches of computers should be allowed or not as part of inspectors trying to weed out potential terrorists.  I do know that with all files on the SureDesk the computer itself is not so important and certainly doesn't have many files to look through on the machine itself.  Business travelers concerned about sensitive files being viewed would certainly be protected.  </p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 22 Feb 2011 11:55:06 -0400</pubDate>
            <guid>http://w99.suretech.com/15598/Virtual_Office_can_Save_Time_even_in_Customs_Checks</guid>
        </item>
        <item>
            <title>Pinning Down the Cloud</title>
            <link>http://w99.suretech.com/15546/Pinning_Down_the_Cloud</link>
            <description><![CDATA[<div class="article story">
<div class="articlePage">
<h3 class="byline"> </h3>
<p><a><font color="#333333"><img border="1" hspace="10" alt="PINNING" vspace="5" align="left" width="262" height="174" src="http://si.wsj.net/public/resources/images/TE-AA958_PINNIN_D_20110214112710.jpg" /></font></a>Potential customers say to us all the time as we describe our services &quot;So THAT'S what cloud computing means.&quot;  Cloud computing can really mean lots of different things to people, but most basically it is a hosted solution to a technology need that traditinally resided on a local pysical computer or server.  Our <a href="http://www.suretech.com/suredesk">SureDesk</a> solutions take the meaning of &quot;cloud computing&quot; to the fullest for small businesses.  Here's more about the WSJ's take on where cloud computing stands today.</p>
<p><i>&quot;Pinning Down the Cloud&quot; </i></p>
<p><span style="font-size:x-small;"><i>by </i></span><span style="font-size:x-small;"><a href="http://suretech.com/search/term.html?KEYWORDS=MICHELLE+PRICE&amp;bylinesearch=true"><i><font color="#093d72">MICHELLE PRICE</font></i></a><i> published Feb. 15, 2011 via the </i></span><i><a href="http://online.wsj.com/article_email/SB10001424052748704739504576067461795827534-lMyQjAxMTAxMDEwNDExNDQyWj.html"><span style="font-size:x-small;">Wall Street Journal</span></a></i><span style="font-size:x-small;"><i>.</i></span></p>
<p>The world of information technology is stuffed with bewildering acronyms and new-fangled fads, but cloud computing is one technology phenomenon not to be dismissed.</p>
<div class="insetCol3wide">
<div class="insetContent">
<p>Read the complete <strong><a href="http://online.wsj.com/public/page/technology-02152011.html"><font color="#093d72">Technology report</font></a> </strong>.</p>
</div>
</div>
<p>Likened by some technophiles to the Industrial Revolution, cloud computing is already transforming the world around us and it promises to shape our future world too. Despite its growing importance, however, many companies are struggling to pin down exactly how this technological miracle can truly benefit their balance sheets.</p>
<p>The practice of cloud computing is something with which consumers all over the world are already relatively familiar, even if the term itself leaves the lay technophobe scratching their head. Sending an email using a third-party Web-based email service provider, such as Google Mail, for example, is a basic form of cloud computing.</p>
<div class="insetContent insetCol3wide embedType-image imageFormat-DV">
<div class="insetTree">
<div class="insettipUnit insetZoomTarget">
<div class="insetZoomTargetBox">
...</div></div></div></div></div></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 15 Feb 2011 11:48:22 -0400</pubDate>
            <guid>http://w99.suretech.com/15546/Pinning_Down_the_Cloud</guid>
        </item>
        <item>
            <title>Digital Nativity</title>
            <link>http://w99.suretech.com/15186/Digital_Nativity</link>
            <description><![CDATA[<p><img border="1" hspace="15" alt="Digital Annunciation" align="left" width="125" height="76" src="http://imgdr.massmind.com/uploads/suretech/images/digital annunciation.jpg" />The tools don't make the soul. Merry Christmas :)</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 24 Dec 2010 11:20:32 -0400</pubDate>
            <guid>http://w99.suretech.com/15186/Digital_Nativity</guid>
        </item>
        <item>
            <title>The Future Is Here</title>
            <link>http://w99.suretech.com/14886/The_Future_Is_Here</link>
            <description><![CDATA[<p><img style="width: 126px; height: 102px" hspace="14" alt="" vspace="14" align="left" width="170" height="153" src="http://imgdr.massmind.com/uploads/suretech/images/Minority Report UI.png" />One of these days I'd love someone to tell me the story of how <a href="http://en.wikipedia.org/wiki/Minority_Report_(film)">Minority Report</a> got ahold of the UI for the <a href="http://en.wikipedia.org/wiki/IPhone">iPhone 5 years before</a> the iPhone was released...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 22 Nov 2010 20:35:22 -0400</pubDate>
            <guid>http://w99.suretech.com/14886/The_Future_Is_Here</guid>
        </item>
        <item>
            <title>Embedding CSS in a Post</title>
            <link>http://w99.suretech.com/6239/Embedding_CSS_in_a_Post</link>
            <description><![CDATA[<h3>Add CSS inline html:</h3>
<p><br />
&lt;style type='text/css'&gt;<br />
sytle from .css<br />
<br />
&lt;/style&gt;</p>
<h3><br />
Or like this within a div:</h3>
<p><br />
style=&quot;border: 1px; &quot;</p>
<h3><br />
An example:</h3>
<p><br />
class .intro</p>
<p><font style="margin:0px 0px 9px;padding:0px;font-size:16px;color:rgb(153,0,0);font-weight:normal;line-height:23px;">Rather than a mass customer base, advertising on these blogs gives lobbyists unbridled access to an extremely valuable audience: Britains political elite</font></p>
<p>&lt;font style=&quot;margin:0px; margin-bottom: 9px; padding:0px; font-size:16px; color: #990000; font-weight:normal; line-height: 23px;&quot;&gt;&amp;lsquo;Rather than a mass customer base, advertising on these blogs gives lobbyists unbridled access to an extremely valuable audience: Britain&amp;rsquo;s political elite&amp;rsquo;&lt;/font&gt;</p>]]></description>
            <author>Josh Little</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 07 Feb 2008 15:25:19 -0400</pubDate>
            <guid>http://w99.suretech.com/6239/Embedding_CSS_in_a_Post</guid>
        </item>
        <item>
            <title>Performance Talk Slides</title>
            <link>http://w99.suretech.com/15048/Performance_Talk_Slides</link>
            <description><![CDATA[<p>The slides for my talk on Performance at Pace can be found here -</p>
<p><a href="http://imgdr.massmind.com/uploads/suretech/file/Pace%20Performance%20talk.pdf">http://imgdr.massmind.com/uploads/suretech/file/Pace Performance talk.pdf</a></p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 06 Dec 2010 13:49:31 -0400</pubDate>
            <guid>http://w99.suretech.com/15048/Performance_Talk_Slides</guid>
        </item>
        <item>
            <title>AdKeeper Duh - Of course I needed that</title>
            <link>http://w99.suretech.com/14880/AdKeeper_Duh_Of_course_I_needed_that</link>
            <description><![CDATA[<p>Where was that ad again?</p>
<p>I always hate ads that distract from good content - except when it's that one thing I'm interested in.  But that's not when I want to look at it!</p>
<p>In the old days when we only had to keep track of 7 things a week, we clipped the ad and put it on the fridge.  But now it's <a href="http://video.nytimes.com/video/2010/11/20/technology/1248069313108/fast-times-at-woodside-high.html">900 things </a>and never in paper of course?  Finally we can clip for later:  </p>
<p style="text-align:center;"><object width="480" height="270" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=9,0,47,0"><param name="movie" value="http://c.brightcove.com/services/viewer/federated_f9?isVid=1&amp;isUI=1" /><param name="bgcolor" value="#FFFFFF" /><param name="flashVars" value="videoId=621760694001&amp;playerID=619573469001&amp;playerKey=AQ~~,AAAAkAlgeQE~,yTHc0Foxpit17CqlZTRdcJPiR39AZ-vN&amp;domain=embed&amp;dynamicStreaming=true" /><param name="base" value="http://admin.brightcove.com" /><param name="seamlesstabbing" value="false" /><param name="allowFullScreen" value="true" /><param name="swLiveConnect" value="true" /><param name="allowScriptAccess" value="always" /></object></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 22 Nov 2010 13:41:29 -0400</pubDate>
            <guid>http://w99.suretech.com/14880/AdKeeper_Duh_Of_course_I_needed_that</guid>
        </item>
        <item>
            <title>Avoiding Great Service but Bad Value</title>
            <link>http://w99.suretech.com/12331/Avoiding_Great_Service_but_Bad_Value</link>
            <description><![CDATA[<p><img alt="Fall Down 7 times get up 8" width="250" height="160" hspace="12" border="4" align="right" src="http://imgdr.massmind.com/uploads/suretech/images/At-At_Fail.png" />13 Hours and $1,400.00 To upgrade my Hard Drive?!?</p>
<p> </p>
<p>Weve always said that Managed Services for IT is usually a flawed business model.  Pretty much the better job you do the less you make.  Kinda like lawyers, I guess, except at least we talk about it!</p>
<p> </p>
<p>13 hours to reformat and upgrade a client laptop is the perfect example of providing GREAT service at a TERRIBLE value.  I worked over a long day and night replacing the hard drive of this particular laptop.  Theres no question the client got a lot of benefit.   3.5x more storage space, 3x improvement in speed.  And almost no worries  he handed me the laptop in the morning and came back for it the next day fully upgraded.  I couldnt save him from a couple headaches, though  he had to hunt down passwords that needed to be reached in his browser .... and he had to see my 13 hour bill!  Which points to the value problem  the work took 13 hours, but no one wants to pay labor of 13 hours for 3.5x space and  3x speed.  Think of it this way  the 320GB drive cost less than $100 and the 3x speed was just getting the computer back to the speed it was the day he bought it.  Who wants to pay almost the cost of the computer to simply set (or in this case reset) it up?</p>
<p> </p>
<p>Ill tell you: nobody.  But whats the alternative?  It takes hours and hours to set these things up  so we as a ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 19 Mar 2009 08:56:22 -0400</pubDate>
            <guid>http://w99.suretech.com/12331/Avoiding_Great_Service_but_Bad_Value</guid>
        </item>
        <item>
            <title>Introducing iAgents</title>
            <link>http://w99.suretech.com/14794/Introducing_iAgents</link>
            <description><![CDATA[<p>The iAgent SureSolution is a collection of SOPs, Monitoring, Maintenance and intelligent proactive systems design set to to tolerate less than 8 hours downtime per year!<br />
<br />
The iAgent SureSolution is designed so you don't have to worry <span style="color:rgb(255,102,0);"><b>and never have to call</b></span>!</p>
<p> </p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 12 Nov 2010 10:58:13 -0400</pubDate>
            <guid>http://w99.suretech.com/14794/Introducing_iAgents</guid>
        </item>
        <item>
            <title>What is the True Cost of my IT?</title>
            <link>http://w99.suretech.com/14164/What_is_the_True_Cost_of_my_IT</link>
            <description><![CDATA[<h1>Our goal is to eliminate break/fix to the greatest extent possible.</h1>
<h1>Complexity and Onsite Maintenance are EXPENSIVE</h1>
<p>The vast majority of IT costs for the typical organization are related to emergency repairs and the labor, equipment and primarily, lost productiviyt costs associated with a system not functioning optimially.</p>
<p>Proper maintenance to try to minimize repair costs is the next greates IT expense.</p>
<p>The equipment that most companies associate with IT costs is actually the smallest component of an overal IT cost.</p>
<p><a href="http://imgdr.massmind.com/uploads/suretech/images/IT Costs.png"><img border="1" hspace="12" alt="IT Costs - A look below the water line" vspace="12" align="middle" width="450" height="287" src="http://imgdr.massmind.com/uploads/suretech/images/IT Costs.png" /></a></p>
<p>The first place to focus therefore is on the biggest cost - inefficiency or instability in your systems.</p>
<h1>Simplify and Outsource</h1>
<p><a href="http://suretech.com/14167/What_do_I_get_for_my_IT_Budget.html">The absolutely biggest cost factor, and source of instability, is simply in maintaining networks and equipment communications</a>.</p>
<p>These days a CPU or most individual computer components are pretty simple.  They are designed to do the same thing over and over with extremely low failure rates.</p>
<p>The source of 90% of failure points is in the connection between components or the configuration of components.</p>
<p>90% of these connections and configurations are standard infrastructure that not only has to be set up UNDERNEATH most business services, but they need CONSTANT MAINTENANCE and updates as different components are continually upgraded and as technology evolves.</p>
<p>What your business actually uses, in other words, is the last 10% of the cost which is the applications and data with which your company interacts.</p>
<p>So why would you figure out how to mine coal, store it, burn ...</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 13 May 2010 11:57:24 -0400</pubDate>
            <guid>http://w99.suretech.com/14164/What_is_the_True_Cost_of_my_IT</guid>
        </item>
        <item>
            <title>Antoine Amrani Chocolates Launches New Shopping Cart</title>
            <link>http://w99.suretech.com/14552/Antoine_Amrani_Chocolates_Launches_New_Shopping_Cart</link>
            <description><![CDATA[<p><a href="http://aachocolates.com"><img width="120" height="98" hspace="5" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/Amrani-logo1.jpg" /></a>We just helped <a href="http://aachocolates.com">Antoine Amrani Chocolate</a>s launch a new shopping cart so check it out and enjoy! &nbsp;</p>
<p>As chocolate lovers, we could not be happier to support a client that makes the most exquisite and delectable chocolate we've ever had.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 29 Sep 2010 22:43:41 -0400</pubDate>
            <guid>http://w99.suretech.com/14552/Antoine_Amrani_Chocolates_Launches_New_Shopping_Cart</guid>
        </item>
        <item>
            <title>Doing What You Can to Finish</title>
            <link>http://w99.suretech.com/14182/Doing_What_You_Can_to_Finish</link>
            <description><![CDATA[<p style="margin:0in 0in 10pt;">Tuesday of last week I spent much of my day painting walls for a house that our local <a href="http://www.bridgeporthabitat.org">Habitat for Humanity chapter</a>. It was a lot different than my usual work and it gave me time to think about the parallels between working on the house and shipping software.</p>
<p style="margin:0in 0in 10pt;">First, you could see your progress and your teams progress building a house just as you can see your progress creating a software program. While I was painting, others were doing other finishing work like installing trim. When I entered the house to start painting, I went up some temporary stairs in the front and when I had to leave, the front porch was about half-way done. That visual progress is great for morale and important to let everyone see that things are happening.</p>
<p style="margin:0in 0in 10pt;">Another similarity is the jobs we did. <a href="http://news.pba.com/post/2003/7/7/Chris-Peters-Chairman-of-the-Board.aspx">Chris Peters</a> made a point during the Word for Windows 6.0 project that we should not see ourselves as developers who write code, testers who test code and program managers who work on specifications. Instead each day we should think about what we could do to help ship a great product. Now obviously as a developer that often means writing code or debugging existing code, but sometimes that means sitting down with testers and helping them map out their test plan. Sometimes that means sitting down with documentation writers and explaining how the product works. And sometimes it means suggesting that a feature get cut or scaled back because it wont be ready on time (which would lead to removing code). All of those things help a project along towards its ultimate goal - getting into ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 18 May 2010 14:46:42 -0400</pubDate>
            <guid>http://w99.suretech.com/14182/Doing_What_You_Can_to_Finish</guid>
        </item>
        <item>
            <title>Hiding .svn Folders through .htaccess</title>
            <link>http://w99.suretech.com/14316/Hiding_svn_Folders_through_htaccess</link>
            <description><![CDATA[<p>One way many people use to keep their website updated is through a source control tool such as SVN. We've found it a useful tool to keep track of changes, allow developers or designers to work on files and to make sure the right files end up on the web server (and we can test the file set on a similar machine prior to making the changes live). We use it even for our HTML-only websites because it allows us to keep track of changes and provides a handy backup tool.</p>
<p>One downside of using SVN is that it creates .svn sub-directories in all the directories that are enlisted in the project. These directories can have information useful to a website hacker (database passwords, for example). So, we need to make sure that people cannot access these sub-directories through HTTP/HTTPS. You could place a .htaccess file in each of the .svn directories, but that is tedious and you have to remember to do it each time you add a new directories. If you have access to your configuration file for your web server, you can make the directories inaccessible there.</p>
<p>But if you don't have access at that level (and many of us don't) the easiest place to make the change is in the .htaccess file at the root of your website.</p>
<p>The following code does just that, assuming you have mod_rewrite in your Apache installation.</p>
<pre>

  RewriteEngine on
  RewriteRule ^((.*)/)?\.svn/(.*) http://www.example.com [R,L]

</pre>
<p>This code checks to see if you have /.svn/ somewhere in the request, and, if it finds it, redirects the request to the root of your website (replace www.example.com with your website root). You could bring up ...</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 13 Jul 2010 15:43:11 -0400</pubDate>
            <guid>http://w99.suretech.com/14316/Hiding_svn_Folders_through_htaccess</guid>
        </item>
        <item>
            <title>Great Leadership</title>
            <link>http://w99.suretech.com/14258/Great_Leadership</link>
            <description><![CDATA[<p>I try to keep my non-business interests (such as college basketball and my <a href="http://dukebasketballreport.com">favorite team</a> winning a <a href="http://www.goduke.com/ViewArticle.dbml?SPSID=22724&amp;SPID=1845&amp;DB_OEM_ID=4200&amp;ATCLID=204951808">national championship</a>) out of this blog but the passing of John Wooden last weekend is something I think trancends sports.</p>
<p>John Wooden was not just an amazing college basketball coach (having won twice as many men's national championships as the next closest coach) but he was also an amazing teacher and leader.  His &quot;<a href="http://www.coachwooden.com/pyramidpdf.pdf">Pyramid of Success</a>&quot; succinctly lays out his basic principles for being successful. Traits such as Cooperation, Initiative and Poise. He has written a number of books on leadership and the lessons he teaches are applicable to the business world.</p>
<p>Even <a href="http://latimesblogs.latimes.com/sports_blog/2010/06/john-wooden-ucla-coach-dies-basketball-titles-legend.html">his quotes</a> (Woodenisms) are applicable to business. Things like:</p>
<blockquote>
<p>&quot;Things turn out best for the people who make the best of the way things turn out.&quot;</p>
</blockquote>
<p> Or</p>
<blockquote>
<p>&quot;If you're not making mistakes, then you're not doing anything. I'm positive that a doer makes mistakes.&quot;</p>
</blockquote>
<p>That last one is particularly applicable to business. If we are doing anything important, we are most likely making mistakes. The key is how we learn from those and move forward.</p>
<p>When you have the chance, look up some of the wisdom of <a href="http://www.coachjohnwooden.com">Coach Wooden</a>, he is a remarkable person.</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 11 Jun 2010 16:26:04 -0400</pubDate>
            <guid>http://w99.suretech.com/14258/Great_Leadership</guid>
        </item>
        <item>
            <title>Data is Infinite</title>
            <link>http://w99.suretech.com/14166/Data_is_Infinite</link>
            <description><![CDATA[<h1>Do You feel Overwhelmed by Data, Information and Emails?</h1>
<p>You're right, you are overwhelmed.</p>
<p>Essentially infinitely overwhelmed, in fact.</p>
<p><img border="1" hspace="12" vspace="10" align="left" width="230" height="230" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/drowningindata.jpg" />The cost of diseminating information is nearly zero, so information you could never have imagined 20 years ago now finds its way to you.  Storing information is very cheap, so information you would have physically HAD to throw away 20 years ago, now stays with you.</p>
<p>Overwhelmed doesn't even capture the extent of the imbalance between you and the information coming your way, anihalated would be more accurate if it were a battle.</p>
<p>Your only option is not to give up, but fighting is futile.</p>
<p>Even organizing the data is impossible, managing the data flow is impossible.</p>
<p>Here's a graph to show you the futility of managing data:</p>
<p><img border="1" hspace="15" alt="" vspace="15" align="middle" width="380" height="214" src="http://imgdr.massmind.com/uploads/suretech/images/zetbytes.jpg" /></p>
<p> A <a href="http://en.wikipedia.org/wiki/Zettabyte">zettabyte is sextillion bytes</a>. That's 21 zeros, kids. Add one zero to get the number of actual information bits.  </p>
<p>For comparison your brain (if you just said no in high school) has about 100 billion cells (11 zeros).  If each cell tried to keep just one bit of data, and that's all your brain did, and didnt' keep track of who you loved, what you wanted to do or take space to admire a sunset, you'd be 11 zeros short of keeping track of the data out there today, and you'd be FALLING FURTHER BEHIND EVERY MINUTE.</p>
<p>Give up trying to store it, don't track it, enjoy ignrorance of 20 zeros and leave space for what you love.</p>
<p>How can yo do this?  How can you let go of information coming at you?  Well for one, ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 13 May 2010 13:15:56 -0400</pubDate>
            <guid>http://w99.suretech.com/14166/Data_is_Infinite</guid>
        </item>
        <item>
            <title>Apple Aluminum Wireless Keyboard 2.0</title>
            <link>http://w99.suretech.com/13241/Apple_Aluminum_Wireless_Keyboard_2_0</link>
            <description><![CDATA[<p style="line-height: 18pt; margin: 0in 0in 0pt; font-family: Calibri,sans-serif; color: #365f91; font-size: 16pt">Small Is Beautiful</p>
<p style="line-height: 15pt; font-family: Calibri,sans-serif; color: #31332f; font-size: 11pt"><img alt="" align="left" width="120" height="56" src="http://imgdr.massmind.com/uploads/suretech/images/hero_3_20091020.jpg" />I tend to like to write on my keyboard on my lap or on a lap bench...&nbsp;</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 20 Nov 2009 20:08:39 -0400</pubDate>
            <guid>http://w99.suretech.com/13241/Apple_Aluminum_Wireless_Keyboard_2_0</guid>
        </item>
        <item>
            <title>What do I get for my IT Budget?</title>
            <link>http://w99.suretech.com/14167/What_do_I_get_for_my_IT_Budget</link>
            <description><![CDATA[<h1>Most IT Budgets just maintain your status quo</h1>
<p>In this age of constant change why do most budgets contain very little room for improving efficiency and communications?</p>
<p>Because most IT budgets are maintaining <a href="http://suretech.com/14164/What_does_my_IT_Cost.html">90% of what they don't need</a> to get the 10% the actually use.</p>
<p><img border="1" hspace="15" alt="Where your IT Budget gets wasted" vspace="15" align="middle" width="480" height="270" src="http://imgdr.massmind.com/uploads/suretech/images/70-30-split.jpg" /></p>
<p>SureTech.com's mission is to allow you to share the basic infrastructure that doesn't provide core value to your business, and allow you to focus your budet on the innovation and efficiency that let's you be the best in the world at what you do, instead needing each of our customers to also be best in the world at managing equipment and networks.</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 13 May 2010 13:24:40 -0400</pubDate>
            <guid>http://w99.suretech.com/14167/What_do_I_get_for_my_IT_Budget</guid>
        </item>
        <item>
            <title>Running To Fight River Blindness</title>
            <link>http://w99.suretech.com/14132/Running_To_Fight_River_Blindness</link>
            <description><![CDATA[<p>May 1st was the May Day 5K Race to support the United Front Against River Blindness.  This is a mosquito born blinding disease affecting millions in the Congo and at the same time easy to cure.  One pill every year for 10 years stops the disease.  Each runner funded treatment for 5 people!  Thanks <a href="http://princetoncomment.blogspot.com/2010_04_25_archive.html">Barbara Fox</a> for telling us about the race.  We also got to see another client and friend at the event, Michele Tuck-Ponder of the <a href="http://www.wfnj.org/">Women's Fund of New Jersey</a>, who was one of the organizers and soon off to the Congo herself to help with this cause.  For more information about how to help, visit <a href="http://riverblindness.org/">UFAR</a>.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 06 May 2010 09:48:23 -0400</pubDate>
            <guid>http://w99.suretech.com/14132/Running_To_Fight_River_Blindness</guid>
        </item>
        <item>
            <title>Tombola 2010</title>
            <link>http://w99.suretech.com/14128/Tombola_2010</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-size: 12px; font-family: 'Trebuchet MS', Helvetica, Arial, Tahoma, Verdana, sans-serif; ">We were delighted to be part of the&nbsp;<a target="_blank" style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-decoration: none; color: rgb(90, 54, 150); background-image: none; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: initial initial; " href="http://www.artscouncilofprinceton.org/">Arts Council of Princeton's</a>&nbsp;<a style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; text-decoration: none; color: rgb(90, 54, 150); background-image: none; background-repeat: initial; background-attachment: initial; -webkit-background-clip: initial; -webkit-background-origin: initial; background-color: initial; background-position: initial initial; " href="http://artscouncilofprinceton.org/HTML/DEVELOPMENT/Pinot%202010/pinottopicasso2010.html">Pinot to Picasso - Vintage 2010</a>&nbsp;fund-raiser this year.&nbsp;</span></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 05 May 2010 11:39:20 -0400</pubDate>
            <guid>http://w99.suretech.com/14128/Tombola_2010</guid>
        </item>
        <item>
            <title>Experts predict 65% of financial organizations will be using cloud financials by year-end. </title>
            <link>http://w99.suretech.com/13889/Experts_predict_65_of_financial_organizations_will_be_using_cloud_financials_by_year_end</link>
            <description><![CDATA[<div align="center">
<table style="width:487.5pt;" class="MsoNormalTable" border="0" cellspacing="0" cellpadding="0" width="650">
    <tbody>
        <tr>
            <td style="border-bottom:#ece9d8;border-left:#ece9d8;padding-bottom:0in;background-color:transparent;padding-left:0in;padding-right:0in;border-top:#ece9d8;border-right:#ece9d8;padding-top:0in;">
            <p style="margin:0in 0in 0pt;" class="MsoNormal"><a href="http://email.cpa2biz.com/cgi-bin15/DM/y/hfkT0GNKzz0Hxq0bcG0Ej"><span><img border="0" alt="AICPA" src="http://media.cpa2biz.com/Publication/Creative/C2B/imgs/paychex/paychex_header.gif" width="650" height="38" /></span></a></p>
            </td>
        </tr>
        <tr style="height:19.5pt;">
            <td style="border-bottom:#ece9d8;border-left:#ece9d8;padding-bottom:0in;padding-left:0in;padding-right:0in;background:#e6e6e6;height:19.5pt;border-top:#ece9d8;border-right:#ece9d8;padding-top:0in;">
            <div align="center">
            <table style="width:476.25pt;" class="MsoNormalTable" border="0" cellspacing="4" cellpadding="0" width="635">
                <tbody>
                    <tr>
                        <td style="border-bottom:#ffffff;border-left:#ffffff;padding-bottom:0in;background-color:transparent;padding-left:0in;padding-right:0in;border-top:#ffffff;border-right:#ffffff;padding-top:0in;" valign="top">
                        <p style="text-align:center;margin:0in 0in 0pt;" class="MsoNormal" align="center"><b><span style="font-family:Arial, 'sans-serif';color:#333333;font-size:9pt;"><img border="0" src="http://media.cpa2biz.com/Publication/Creative/C2B/imgs/arrow_top_blue.gif" width="11" height="11" alt="" /></span></b><span style="font-family:Arial, 'sans-serif';font-size:10pt;"><a href="http://email.cpa2biz.com/cgi-bin15/DM/y/hfkT0GNKzz0Hxq0bcE0Eh"><strong><span style="font-family:Arial, 'sans-serif';color:#0e4d86;">CPE</span></strong></a> </span></p>
                        </td>
                        <td style="border-bottom:#ffffff;border-left:#ffffff;padding-bottom:0in;background-color:transparent;padding-left:0in;padding-right:0in;border-top:#ffffff;border-right:#ffffff;padding-top:0in;" valign="top">
                        <p style="text-align:center;margin:0in 0in 0pt;" class="MsoNormal" align="center"><b><span style="font-family:Arial, 'sans-serif';color:#333333;font-size:9pt;"><img border="0" src="http://media.cpa2biz.com/Publication/Creative/C2B/imgs/arrow_top_blue.gif" width="11" height="11" alt="" /></span></b><span style="font-family:Arial, 'sans-serif';font-size:10pt;"><a href="http://email.cpa2biz.com/cgi-bin15/DM/y/hfkT0GNKzz0Hxq0bcH0Ek"><strong><span style="font-family:Arial, 'sans-serif';color:#0e4d86;">Conferences</span></strong></a></span></p>
                        </td>
                        <td style="border-bottom:#ffffff;border-left:#ffffff;padding-bottom:0in;background-color:transparent;padding-left:0in;padding-right:0in;border-top:#ffffff;border-right:#ffffff;padding-top:0in;" valign="top">
                        <p style="text-align:center;margin:0in 0in 0pt;" class="MsoNormal" align="center"><b><span style="font-family:Arial, 'sans-serif';color:#333333;"></span></b></p></td></tr></tbody></table></div></td></tr></tbody></table></div>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 30 Mar 2010 21:48:25 -0400</pubDate>
            <guid>http://w99.suretech.com/13889/Experts_predict_65_of_financial_organizations_will_be_using_cloud_financials_by_year_end</guid>
        </item>
        <item>
            <title>Seven Deadly Sins</title>
            <link>http://w99.suretech.com/13769/Seven_Deadly_Sins</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-size: 11px; font-family: Calibri, Helvetica, Arial, Tahoma, Verdana, sans-serif; ">Operating a successful business in todays economic times is difficult, even for a well-managed company.&nbsp; Now, add the complexity of the worst recession since the Great Depression.&nbsp; It is no surprise that commercial bankruptcies, among the nation's more than 25 million small businesses, have increased by approximately 44% from the third quarter of 2008 to the third quarter of 2009, according to Equifax Inc.&nbsp; So what is a business owner to do?&nbsp; Avoid these&nbsp;<b><i>SEVEN DEADLY SINS</i></b>!</span></p>]]></description>
            <author>Stu Lipkin</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 11 Mar 2010 11:22:12 -0400</pubDate>
            <guid>http://w99.suretech.com/13769/Seven_Deadly_Sins</guid>
        </item>
        <item>
            <title>Sum Ergo Sum</title>
            <link>http://w99.suretech.com/8699/Sum_Ergo_Sum</link>
            <description><![CDATA[<p><img width="144" height="208" hspace="12" border="1" align="right" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/LoveIsKiller.png" />I just picked up <a href="http://www.amazon.com/Love-Killer-App-Business-Influence/dp/060960922X&amp;tag=mnov-20">Love is the Killer App</a> at a café wherein Tim Sanders describes love as the ultimate competitive weapon in business.  I have a friend whos making a go for the fourth year working at home with her husband so they can be close to the kids.  And now a claim for change to equality and justice has won our presidential election.  Has the world gone sugary sweet on us?</p>
<p>I have nothing against corporations or even republican conservatism.   But neither the means nor the end ever seemed as important to me as the manner of the journey; and love, equality and justice have always felt like better principles for a manner than achievement, winning and owning for their sake alone.   These fundamentals that ring so true in every heart seemed absent often from the rhetoric of success Id often hear.</p>
<p>But sometimes getting out into the sun reveals more scenery than you guess.  I met two brothers yesterday, who described themselves as the original LinkedIn.    Though they sold insurance, most of their day was connecting people and businesses to each other and to funding. Their courting of VCs and VC target companies was strategic, to be sure, but a complete indirection to selling insurance.  The direction was to expand their network, to participate in community and thereby simply by being known, succeed at insurance.</p>
<p>Almost be existing they are flourishing, Sum Ergo Sum.  This strikes me as a lot more productive than fighting to convince a client of my value.  By sharing it is easier to receive, and we get to more malt syrup  or is it?  Its easier to believe in love and sharing when everybody with ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sun, 09 Nov 2008 11:56:08 -0400</pubDate>
            <guid>http://w99.suretech.com/8699/Sum_Ergo_Sum</guid>
        </item>
        <item>
            <title>SureMail Outage -  12-28-09</title>
            <link>http://w99.suretech.com/13337/SureMail_Outage_12_28_09</link>
            <description><![CDATA[<div style="margin:0in 0in 0pt;"><b><i><span style="font-size:9pt;"> Don't worry when you are not recognized, but strive to be worthy of recognition.</span></i></b><span style="font-size:9pt;"><br />
      -<a href="http://www.great-quotes.com/cgi-bin/viewquotes.cgi?action=search&amp;Author_First_Name=Abraham&amp;Author_Last_Name=Lincoln&amp;Movie="><span style="color:#0066cc;">Abraham Lincoln </span></a></span></div>
<div style="line-height:18pt;margin:6pt 0in;"><span style="font-size:10pt;">What a bright guy, that honest Abe...  Sadly, sometimes here at SureTech.com we get the most recognition when a system has trouble.  Especially business critical system, like email.  So, when we do get mass recognition because of a technical failure, we prove our worthiness by identifying the problem, fixing  the issue and implementing improvements to ensure the issue does not happen again.  All of the previous is done as fast as humanly possible no matter what time of day or night.  </span></div>
<div style="line-height:18pt;margin:6pt 0in;"><span style="font-size:10pt;">However, no matter how redundant a system is, there is always a chance for &quot;glitches&quot;.   Be assured, we literally monitor our systems 24/7 and are constantly adjusting, patching, upgrading and improving our systems with the best technology by some of the brightest implementation teams available.</span></div>
<div style="line-height:18pt;margin:6pt 0in;"><b><span style="font-size:medium;">Please read on for the play by play of yesterday's outage:</span></b></div>
<div style="line-height:18pt;margin:6pt 0in;"><span style="font-size:10pt;">At approximately 8:58 AM EST on 12/28/09, we experienced an issue in the Storage Area Network (SAN) supporting mailboxes hosted on the MAIL34 server.  This issue removed client access to the mailboxes at this time. We troubleshooted the issue and were able to bring the SAN and server back online at 9:47 AM EST, with all mailboxes accessible by 9:57 AM EST.  </span></div>
<div style="line-height:normal;margin:0in 0in 0pt;"><span style="font-size:10pt;">We have implemented additional monitoring of the SAN in order to be quickly informed of this specific condition, so that if this issue occurs again, ...</span></div>]]></description>
            <author>Seth Spanogle</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 29 Dec 2009 10:19:53 -0400</pubDate>
            <guid>http://w99.suretech.com/13337/SureMail_Outage_12_28_09</guid>
        </item>
        <item>
            <title>Some Attention to The Infrastructure</title>
            <link>http://w99.suretech.com/12664/Some_Attention_to_The_Infrastructure</link>
            <description><![CDATA[<p>The NY Times magazine&nbsp;goes so far as to call datacenters, the cloud, which is a slightly different focus than the napkin network diagram I like to draw...&nbsp;&nbsp;</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sun, 14 Jun 2009 15:12:04 -0400</pubDate>
            <guid>http://w99.suretech.com/12664/Some_Attention_to_The_Infrastructure</guid>
        </item>
        <item>
            <title>What is the Cloud Anyway?</title>
            <link>http://w99.suretech.com/12886/What_is_the_Cloud_Anyway</link>
            <description><![CDATA[<p style="line-height: 22pt; margin: 0in 0in 0pt"><span style="font-family: Calibri,sans-serif; color: #31332f; font-size: 18pt">Cloud Buzz</span></p>
<p style="line-height: 18pt"><span style="font-family: Calibri,sans-serif; color: #31332f; font-size: 13pt"><span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Times; font-size: 15px; line-height: normal; "><img height="173" alt="WhatIsCloud" hspace="12" width="219" border="1" align="left" src="http://imgdr.massmind.com/uploads/suretech/images/WhatIsCloud.png" /></span>Everybody's heard the buzz, but most people I talk to are confused about how to understand &quot;The Cloud.&quot;  Even for many that understand the buzz or work with Cloud computers, explaining The Cloud can be daunting.</span></p>
<center><br />
</center>
<p style="line-height: 22pt; margin: 0in 0in 0pt"><span style="font-family: Calibri,sans-serif; color: #31332f; font-size: 18pt">Cloud Explanations and Illustrations</span></p>
<p style="line-height: 18pt"><span style="font-family: Calibri,sans-serif; color: #31332f; font-size: 13pt">I usually explain it using a napkin network diagram of the internet which is ...</span></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 08 Sep 2009 20:02:43 -0400</pubDate>
            <guid>http://w99.suretech.com/12886/What_is_the_Cloud_Anyway</guid>
        </item>
        <item>
            <title>Tombola 2009</title>
            <link>http://w99.suretech.com/12916/Tombola_2009</link>
            <description><![CDATA[<p>In April we helped with the <a href="http://www.artscouncilofprinceton.org/">Arts Council of Princeton's</a> <a href="http://www.artscouncilofprinceton.org/Pinot2009/pinot2thumbs2009.htm">Tombola 2009</a> fund-raiser. We had a fun time creating a rotating display using Flash of all the art work that played while the attendees were milling around and a Tombola countdown for the auction portion of the event to show which pieces had been selected.  It was a wonderful event with great food and art and we had a great time supporting the Arts Council. </p>
<p>If you are interested in our Flash code, we'd be happy to share it with you. Just contact us or email <a href="mailto:davidmck@suretech.com?subject=Tombola%20Code">David</a>.</p>
<script type="text/javascript" src="http://www.suretech.com/tombola2009/swfobject.js"></script><script type="text/javascript"><!--//--><![CDATA[//><!--
var stBase = "http://www.suretech.com/tombola2009/"
		swfobject.embedSWF(stBase + "tombola.swf", "myContent", "500", "375", "10.0.0", "expressInstall.swf", {stUrlBase:stBase}, {stUrlBase:stBase});
//--><!]]]]><![CDATA[></script>
<div>
<p>To view the Arts Council of Princeton - Pinot to Picasso art work, please install Adobe's Flash Player now using the link below.</p>
<p><a href="http://www.adobe.com/go/getflashplayer"><img alt="Get Adobe Flash player" src="http://www.adobe.com/images/shared/download_buttons/get_flash_player.gif" /></a></p>
</div>
<p>To see a full screen version, click <a href="http://www.suretech.com/tombola2009/tombola.swf">here</a>. </p>
<p>To view the Tombola part of the aplication, click on the program and press the space bar.</p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 15 Sep 2009 13:30:11 -0400</pubDate>
            <guid>http://w99.suretech.com/12916/Tombola_2009</guid>
        </item>
        <item>
            <title>We're Popular, I guess</title>
            <link>http://w99.suretech.com/12453/We_re_Popular_I_guess</link>
            <description><![CDATA[<p>We had a problem Saturday morning (4/4/09) with all of our websites that use any of our databases. It appears that someone attempted to hack into our site by trying various standard attacks and while, to the best of our knowledge, none of those attacks worked, the number of requests overwhelmed our server. I'll write a technical post about this soon when we've had a chance to more fully understand what happened. But I did want to let people know that we are back up and monitoring the situation. We apologize for any inconvenience. If you have any questions about the outage, please feel free to contact us.</p>
<p>I'm told by my friends at some more popular sites that this type of thing is standard for them. I guess that means we've become popular.</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Sun, 05 Apr 2009 21:37:30 -0400</pubDate>
            <guid>http://w99.suretech.com/12453/We_re_Popular_I_guess</guid>
        </item>
        <item>
            <title></title>
            <link>http://w99.suretech.com/12783</link>
            <description><![CDATA[<p style="text-align: center"><object width="170" height="138"><param name="movie" value="http://www.youtube.com/v/ASMXn8z48pM&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><embed src="http://www.youtube.com/v/ASMXn8z48pM&hl=en&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="170" height="138"></embed></object></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 21 Jul 2009 11:41:10 -0400</pubDate>
            <guid>http://w99.suretech.com/12783</guid>
        </item>
        <item>
            <title>Why Too Many Choices Can Be Bad</title>
            <link>http://w99.suretech.com/12776/Why_Too_Many_Choices_Can_Be_Bad</link>
            <description><![CDATA[<p>My cell phone provider lost a sale yesterday because they gave me too many choices (and not enough information at their store). Luckily for them, Im not about to switch cell phone providers, but it is an example of how providing your customers choices without information about why theyd choose one over the other can be a problem. In my case, Id come in to the store sure that I wanted one particular cell phone. Id done the research and knew the one I wanted. But when I got there, a new model had just come out that I didnt know about. Unfortunately the salesman didnt really know the difference between the two models either, so I was confused about which to pick. I decided I should delay my purchase and do some research on my own. <br />
As it turns out, theres really not enough compelling about the new model to spend the significantly higher price for it in my mind. So, Ill be going back to the store later this week to get the model Id originally planned to get. But sometimes, as a business, were not lucky enough to get that customer to come back. They may see a better deal somewhere else, or realize they dont need the item they were going to purchase.</p>
<p> </p>
<p> </p>

<a href="http://www.addthis.com/bookmark.php?v=250&amp;pub=massmind"><img src="http://s7.addthis.com/static/btn/lg-share-en.gif" width="125" height="16" alt="Bookmark and Share" style="border:0;" /></a><script type="text/javascript" src="http://s7.addthis.com/js/250/addthis_widget.js?pub=massmind"></script>

]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 13 Jul 2009 12:26:27 -0400</pubDate>
            <guid>http://w99.suretech.com/12776/Why_Too_Many_Choices_Can_Be_Bad</guid>
        </item>
        <item>
            <title>What is &amp;quot;Cloud&amp;quot; Computing Anyway?</title>
            <link>http://w99.suretech.com/12723/What_is_quot_Cloud_quot_Computing_Anyway</link>
            <description><![CDATA[<p style="text-align: center;"><object width="170" height="138"><param name="movie" value="http://www.youtube.com/v/eRqUE6IHTEA&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><embed src="http://www.youtube.com/v/eRqUE6IHTEA&hl=en&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="170" height="138"></embed></object></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 24 Jun 2009 21:16:21 -0400</pubDate>
            <guid>http://w99.suretech.com/12723/What_is_quot_Cloud_quot_Computing_Anyway</guid>
        </item>
        <item>
            <title>Einstein Imagined SureTech.com</title>
            <link>http://w99.suretech.com/11002/Einstein_Imagined_SureTech_com</link>
            <description><![CDATA[<p><img width="85" height="64" hspace="5" border="1" align="left" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/einsteinshow.jpeg" />Who are we to argue with Genius? &nbsp;Einstein was ahead of us on the internet AND SureTech.com! - <a href="http://suretech.com/11002/Einstein_was_Presient#disqus_thread">View Comments</a></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 20 Jan 2009 00:46:46 -0400</pubDate>
            <guid>http://w99.suretech.com/11002/Einstein_Imagined_SureTech_com</guid>
        </item>
        <item>
            <title>Backups, Backups, Backups</title>
            <link>http://w99.suretech.com/12305/Backups_Backups_Backups</link>
            <description><![CDATA[<p><span style="font-family:'Times New Roman';"> </span></p>
<p><span style="font-family:'Times New Roman';">Ive been thinking a lot about backups recently for a variety of reasons.</span></p>
<p><span style="font-family:'Times New Roman';">First, Ive been involved in setting up a fund to honor the high school teacher who first taught me the importance of good backups. He hired me to help with the high school mini-computers and one of my major jobs was to backup the system every day to magnetic tape. When we lost a hard disk (lighting and computers just dont mix well) we always could recover with a recent tape. I learned a lot of lessons from that first job and one that particularly stuck in my mind was the importance of regular backups and taking backups off-site. Because of that job, I can be a bit maniacal about backups and archives.</span></p>
<p><span style="font-family:'Times New Roman';">Second, I had to recreate a website we worked on a couple of years ago. We had archived the source when we decommissioned our source control server just a few months ago. But when we shut down the website, wed not remembered to download a copy of the database. In my development work, however, I knew Id had at least one copy of the database on my development machine while we were working on it, but Id deleted it a year or two ago. However, I make it a practice to burn an archive DVD of my work at the end of each year before I clean off files that are no longer needed so I had a good feeling that I had some reasonable version of the database archived. I pulled out my archive from a couple of years ago and found the database pretty easily. With that and the source code, we were ...</span></p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 10 Mar 2009 21:30:23 -0400</pubDate>
            <guid>http://w99.suretech.com/12305/Backups_Backups_Backups</guid>
        </item>
        <item>
            <title>Running Windows Update on Windows Server Core</title>
            <link>http://w99.suretech.com/11044/Running_Windows_Update_on_Windows_Server_Core</link>
            <description><![CDATA[<p>We're running Windows Server 2008 core on our backup domain controller. I'm not completely convinced this is a good idea yet (even though I'm the one who suggested it). The lack of a UI seems to really hobble some functionality. Today I wanted to run windows update on that machine and had a difficult time figuring out how to do it. I would have thought there was an MMC plug-in to do it, but I couldn't find one. I searched using Google and found this <a href="http://msdn.microsoft.com/en-us/library/aa387102(VS.85).aspx">interesting VBS script</a>. Which did the trick.</p>
<p>For SureTech employees, the script is saved away in my user directory on the backup domain controller. You'd want to run this by typing: </p>
<p><span style="font-family:'Courier New';">cscript wupdate.vbs</span></p>
<p> </p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 22 Jan 2009 13:28:53 -0400</pubDate>
            <guid>http://w99.suretech.com/11044/Running_Windows_Update_on_Windows_Server_Core</guid>
        </item>
        <item>
            <title>What's your job?</title>
            <link>http://w99.suretech.com/7396/What_s_your_job</link>
            <description><![CDATA[<p>This may seem like a silly question to some, but I think it's often easy for us to forget what our job really is. I'm going to write this from the perspective of a Software Developer, but it applies equally well to all job functions.</p>
<p>As programmers, we have often been tricked into thinking that we should be writing code all the time and anything less and were not being productive enough. I know I often struggle between writing code  which I enjoy, have some skill in, and can easily see my results  and doing other important project tasks.</p>
<p>When I was working on <a href="http://en.wikipedia.org/wiki/Microsoft_word">Word for Windows 6.0</a> (and there's a whole 'nother story about why it was numbered 6.0 rather than 3.0, since it followed Word for Windows 2.0  the short quote is 6 is larger than 3) Chris Peters (who has since left Microsoft and brought the <a href="http://en.wikipedia.org/wiki/Professional_Bowlers_Association">PBA</a> back into prominence) at one of our team meetings made it clear to us that, in order to ship Word 6.0 we needed to remember that our job wasnt to write code or test code or any of those things. Our job was to ship Word 6.0. Now often that would mean, as developers, we should write some code (or fix some bugs) but we needed to think each day about what we could do that day to help ship Word 6.0. Some days that would mean not writing new code (and new code is the worst  it has to be tested, localized, documented, etc.). Sometimes, the best way to finish the project would be to talk with our program manager and see about cutting a ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 01 Aug 2008 15:45:57 -0400</pubDate>
            <guid>http://w99.suretech.com/7396/What_s_your_job</guid>
        </item>
        <item>
            <title>Windows Authentication and IIS - Seems Counterintuitive to Me</title>
            <link>http://w99.suretech.com/11013/Windows_Authentication_and_IIS_Seems_Counterintuitive_to_Me</link>
            <description><![CDATA[<p>I'm working on my first ASP.NET application in Visual Studio 2008 running on a 2008 Server. It's a simple thing, just designed to get some information from our users. I did need them to authenticate themselves against Active Directory prior to visiting the webpage. I turned on Windows Authentication and changed the security settings on the folder my application is in to allow only domain users and I removed the IIS_IUSRS user permission from the folder (on the assumption that I didn't want non-authenticated users to have access). Well, turns out I was wrong. That just generated an error on the site. Adding IIS_IUSRS back solved that problem.</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 20 Jan 2009 16:01:30 -0400</pubDate>
            <guid>http://w99.suretech.com/11013/Windows_Authentication_and_IIS_Seems_Counterintuitive_to_Me</guid>
        </item>
        <item>
            <title>Xobni for Outlook is awesome except it doesn't work.</title>
            <link>http://w99.suretech.com/8135/Xobni_for_Outlook_is_awesome_except_it_doesn_t_work</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-family: Calibri; font-size: 14px; font-style: italic; "><img align="left" width="115" height="82" border="1" hspace="8" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/XobniBillEndorse.png" />Xobni which is inbox spelled backwards is an absolutely terrific plug in for Microsoft Outlook except for the small fact that it doesn't work... - <a href="http://suretech.com/8135/Xobni_for_Outlook_is_awesome_except_it_doesn_t_work#disqus_thread">view comments</a></span></p>
<p>&nbsp;</p>
<script type="text/javascript">
//<![CDATA[
(function() {
		var links = document.getElementsByTagName('a');
		var query = '?';
		for(var i = 0; i < links.length; i++) {
			if(links[i].href.indexOf('#disqus_thread') >= 0) {
				query += 'url' + i + '=' + encodeURIComponent(links[i].href) + '&';
			}
		}
		document.write('<script type="text/javascript" src="http://disqus.com/forums/suretech/get_num_replies.js' + query + '"></' + 'script>');
	})();
//]]]]><![CDATA[>
</script>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 03 Oct 2008 07:25:23 -0400</pubDate>
            <guid>http://w99.suretech.com/8135/Xobni_for_Outlook_is_awesome_except_it_doesn_t_work</guid>
        </item>
        <item>
            <title>Apple Scores on Service </title>
            <link>http://w99.suretech.com/11003/Apple_Scores_on_Service</link>
            <description><![CDATA[<p><img width="105" height="127" align="left" hspace="18" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/apple-logo1.jpg" />American based, for american customers - and email.</p>
<p>That's pretty much the price of excellent service these days. &nbsp;If you outsource your service to a place that doesn't care about your customers ... &nbsp;- <a href="http://suretech.com/11003/Apple_Scores_on_Service#disqus_thread">view comments</a></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 20 Jan 2009 01:22:28 -0400</pubDate>
            <guid>http://w99.suretech.com/11003/Apple_Scores_on_Service</guid>
        </item>
        <item>
            <title>How does my web browser connect to a website?</title>
            <link>http://w99.suretech.com/9531/How_does_my_web_browser_connect_to_a_website</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-family: Calibri; font-size: 16px; ">When you type in somedomain.com your internet service sends a message to a machine called a name server owned by your internet service and asks this machine &ldquo;hey, where do I find the website for somedomain.com?&rdquo; - <a href="http://topaz.net/9531/How_does_my_web_browser_connect_to_a_website#disqus_thread">view comments</a></span></p>
<script type="text/javascript">
//<![CDATA[
(function() {
		var links = document.getElementsByTagName('a');
		var query = '?';
		for(var i = 0; i < links.length; i++) {
			if(links[i].href.indexOf('#disqus_thread') >= 0) {
				query += 'url' + i + '=' + encodeURIComponent(links[i].href) + '&';
			}
		}
		document.write('<script type="text/javascript" src="http://disqus.com/forums/topaz/get_num_replies.js' + query + '"></' + 'script>');
	})();
//]]]]><![CDATA[>
</script>
]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Tue, 16 Dec 2008 10:06:27 -0400</pubDate>
            <guid>http://w99.suretech.com/9531/How_does_my_web_browser_connect_to_a_website</guid>
        </item>
        <item>
            <title>That's NOT What I Meant By &amp;quot;Cleaning Up the Audio&amp;quot;</title>
            <link>http://w99.suretech.com/9140/That_s_NOT_What_I_Meant_By_quot_Cleaning_Up_the_Audio_quot</link>
            <description><![CDATA[<p>My church records it's Sunday morning services so we can put the sermon on our website for people to listen to who miss a Sunday. I'm in charge of getting the CompactFlash card out of the recorder, bringing it home, editing the audio down to the sermon, and placing it on the website. Last week I realized I couldn't find the CF card from the previous Sunday. I have three that I rotate through (so I have two at home and one in the recorder) so it wasn't a big deal, except it meant I had missed the service. I kept looking around and I knew it would turn up. And today, it did (exactly where I was afraid it would). When I pulled on my pants I felt something in my pocket - a nicely washed and dried SanDisk CF card.</p>
<p>Thankfully, I do keep the CF cards in their plastic case, but I was dubious about whether the card would make it through. I looked the card over and it didn't look damaged. So, I plugged it in to my card reader thinking that it might actually work and - surprise, surprise - it did. The audio looks just fine and I'll get it edited shortly.</p>
<p>Using Google to search for &quot;Compact Flash cards in water&quot; turned up <a href="http://digitalapplejuice.com/musings-on-washing-machines-and-compactflash-cards/">this story</a> about a much more abused card than mine. Guess I didn't really have any reason to worry about it working.</p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 05 Dec 2008 09:47:30 -0400</pubDate>
            <guid>http://w99.suretech.com/9140/That_s_NOT_What_I_Meant_By_quot_Cleaning_Up_the_Audio_quot</guid>
        </item>
        <item>
            <title>But I am an Administrator</title>
            <link>http://w99.suretech.com/9125/But_I_am_an_Administrator</link>
            <description><![CDATA[<p>It's annoying when the things designed to protect us just get in our way. Today I was doing some work on our file server and wanted to check out some ways to see how much disk space was being used by certain clients without having access to their folders (I'm still not sure if that's possible, but this happened along the way). In searching around I discovered the fsutil tool and wanted to play with it a bit. I used remote desktop to log in to our administrative server, opened a command window, and typed an fsutil command. The error that was returned to me was:</p>
<p><span style="font-family:'Courier New';">The FSUTIL utility requires that you have administrative privileges.</span></p>
<p>At which point I wanted to scream - But I Am an Administrator.</p>
<p>So, I looked around to make sure. Yes, I was in the Domain Admins group which was in the Administrators group. Looked like I was good to go. I had logged in with my admin account rather than my normal user accout. Hmm, what was up?</p>
<p>I searched on Google and thankfully came across a comment in <a href="http://www.realgeek.com/forums/please-help-printer-administrator-problem-370506.html">this post</a> that reminded me that Windows 2008 requires you to explicitly run the command window as an administrator. I right-clicked on the cmd icon, selected Run as Administrator, and voila! the fsutil command ran. Not that it gave me the information I wanted, but it ran.</p>
<p> </p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Thu, 04 Dec 2008 22:20:56 -0400</pubDate>
            <guid>http://w99.suretech.com/9125/But_I_am_an_Administrator</guid>
        </item>
        <item>
            <title>Google Message Filtering and StartLogic</title>
            <link>http://w99.suretech.com/8833/Google_Message_Filtering_and_StartLogic</link>
            <description><![CDATA[<p>One of our consulting clients has a huge problem with spam (mostly because their previous website displayed their email addresses for all to see in plain text which made life easy for <a href="http://en.wikipedia.org/wiki/E-mail_address_harvesting">email harvesters</a>). The other problem is that some of their email addresses are very common and thus also targeted by spammers. But, to some degree, our client doesn't care why they're getting all that spam, just that they are. And it's a lot. After struggling with the tools the web host they are using provided, I decided to look at some additional tools and <a href="http://www.google.com/a/help/intl/en/security/compare.html">Google's Message Filtering</a> came to my attention. If you are only interested in inbound filtering (which we are) you can get it for just $3/account/year. Since our client is highly price sensitive and has a large number of email accounts (they are a volunteer organization and the email addresses can stay the same when the volunteers change) this seems like a great deal.</p>
<p>It's powered by Postini, so the back end looks good. But, I like to try these things out before rolling them out to customers. So, I decided I'd sign up my business domain for the service. I get a little bit of spam, generally it's caught by the filters in Outlook or on my server. I was using StartLogic, which I'd been signed up with for about five years. To make a long story short, after much gnashing of teeth and trying different things, it turns out that StartLogic's mail servers can't handle the Google Message Filtering service. I believe it has to do with the way the MX records are described and how StartLogic figures out which domain the mail belongs to, but I'm not sure.</p>
<p>So, I decided ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 17 Nov 2008 16:42:51 -0400</pubDate>
            <guid>http://w99.suretech.com/8833/Google_Message_Filtering_and_StartLogic</guid>
        </item>
        <item>
            <title>Book Review: Network Warrior</title>
            <link>http://w99.suretech.com/8959/Book_Review_Network_Warrior</link>
            <description><![CDATA[<p>We've been having some interesting network issues that I've been tracking down and we've been trying to figure out how to set up our clients with our datacenter in Miami. I came across a book whose title looked interesting - Network Warrior by Gary A. Donahue. It is an O'Reilly book, so I was pretty confident I'd learn at least something from it (O'Reilly has done a great job building up their brand - goes to show you how powerful a good brand can be). So, I picked it up. I didn't really need everything that was in the 500+ pages (it is very Cisco centric, which I gathered from the subtitle) but it had a lot of useful information about networks in general. I read some parts completely and skimmed others (since we're not using Cisco) and definitely learned a lot.</p>
<div style="float:right;"></div>
<p>While I have over two decades of experience with computers, I am a novice with networks and I appreciated the chapters on switches, VLANs, routing and Quality of Service. It was written well enough that I could understand the basics and the graphics he used helped me understand the concepts.</p>
<p>Donahue has some great comments in the back about how to sell your ideas to management and how to be more professional (instead of just a techie).</p>
<p>Overall it was certainly worth my time reading this. If you are interested in a better understanding of how networks and network transports work, this would be a useful read. If you're a network expert and don't need to deal with Cisco equipment, it's probably a waste of time.</p>
<p> </p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Mon, 24 Nov 2008 11:16:01 -0400</pubDate>
            <guid>http://w99.suretech.com/8959/Book_Review_Network_Warrior</guid>
        </item>
        <item>
            <title>Windows System Restore Saves the Day Again</title>
            <link>http://w99.suretech.com/8909/Windows_System_Restore_Saves_the_Day_Again</link>
            <description><![CDATA[<p>I'm a big fan of Windows System Restore and today reminded me of just how great a feature it is. Hats off to the folks who thought it up and implemented it.</p>
<p>I was installing a new VPN client on my main machine and, foolishly I will add, had two different VPN clients (one using IPSec and one using SSL) connected already. When I installed the new VPN client, about halfway through the install both of my current connections were severed and my machine went into an automatic shutdown. No problem I thought, I'll either uninstall and reinstall the VPN or just continue the VPN install and I'll be fine. Well, this install leaves something around to let it know an install was in process. Perhaps I could have figured out what that was and cleared it, but I figured it was a safer bet just to restore the system to the point before the install. Sure enough, there was the restore point waiting for me. I restored back to that point in time and re-ran the install (not connected through the VPN this time!) and everything worked out nicely.</p>
<p> </p>]]></description>
            <author>David McKinnis</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 21 Nov 2008 16:08:33 -0400</pubDate>
            <guid>http://w99.suretech.com/8909/Windows_System_Restore_Saves_the_Day_Again</guid>
        </item>
        <item>
            <title>Cloud Computing: Is It Safe?</title>
            <link>http://w99.suretech.com/8879/Cloud_Computing_Is_It_Safe</link>
            <description><![CDATA[<p><span class="Apple-style-span" style="font-family:Verdana;font-size:11px;line-height:14px;"><span class="Apple-style-span" style="color:rgb(51,51,51);font-family:arial;font-size:16px;font-weight:bold;line-height:normal;"><a href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202425665205">Cloud Computing: Is It Safe?</a></span> </span></p>
<p class="byline" style="font-size:11px;font-family:Verdana, Arial, sans-serif;font-weight:normal;color:rgb(51,51,51);line-height:13px;text-align:left;"><img width="128" height="128" hspace="15" border="1" align="right" alt="" src="http://www.law.com/images/128_pics/window_shutter_cloud.jpg" />By Alan Cohen from Law.com<br style="font-family:Verdana, Arial, Helvetica, sans-serif;font-size:11px;line-height:14px;" />
<a class="source" style="text-decoration:underline;font-size:11px;font-family:Verdana, Arial, sans-serif;font-weight:normal;color:rgb(51,51,51);line-height:13px;" href="http://www.corpcounsel.com/">Corporate Counsel</a><br style="font-family:Verdana, Arial, Helvetica, sans-serif;font-size:11px;line-height:14px;" />
October 31, 2008</p>
<p style="font-family:Verdana, Arial, Helvetica, sans-serif;font-size:11px;line-height:14px;text-align:left;">If there's one tried-and-true way to tackle a problem, it's to make it someone else's problem. It's the strategy that's given us plumbers, fluff-and-fold laundry and lawn services. Yet for a long time, corporate computing didn't really lend itself to the pass-the-predicament model. Sure, you could hire consultants to troubleshoot your hardware, patch your software and get all the PCs and servers talking to one another. But at the end of the day, it was your system -- and your headache.</p>
<p style="font-family:Verdana, Arial, Helvetica, sans-serif;font-size:11px;line-height:14px;">Delegators take note: The times are changing. An increasingly popular software model tries to make things simple by -- get this -- literally making things simple. Known as Software as a Service or <a class="linelink" style="font-size:11px;line-height:14px;font-family:Verdana, Arial, Helvetica, sans-serif;color:rgb(0,51,102);text-decoration:underline;" href="http://www.law.com/jsp/legaltechnology/pubArticleLT.jsp?id=1202422543832">cloud computing</a>, the idea boils down to this: Instead of running an application yourself, using your own equipment and IT staff (not to mention ...</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 19 Nov 2008 21:57:39 -0400</pubDate>
            <guid>http://w99.suretech.com/8879/Cloud_Computing_Is_It_Safe</guid>
        </item>
        <item>
            <title>IT Trends For 2009</title>
            <link>http://w99.suretech.com/8878/IT_Trends_For_2009</link>
            <description><![CDATA[<p>We are pleased to share these trends via <a href="http://www.baselinemag.com/c/a/Infrastructure/IT-Trends-for-2009/?kc=EWWHNEMNL11132008STR1">Baseline</a>:</p>
<p><span class="Apple-style-span" style="color:rgb(51,51,51);font-family:Verdana;font-size:11px;"></span>     
    Organizations are increasingly looking to next-generation social networking tools to conduct sophisticated business intelligence and analytics. In many cases, they are mining data and looking for trends and patterns, such as which salesperson has the relationships to pull off a deal or which customers seem to have the biggest influence with others online.

</p>
<p> </p>
<p><span class="Apple-style-span" style="color:rgb(51,51,51);font-family:Verdana;font-size:11px;"><img width="250" height="154" align="right" hspace="20" border="1" alt="" src="http://imgdr.massmind.com/uploads/suretech/images/SaaS.png" />
</span><span class="Apple-style-span" style="font-family:'Trebuchet MS';font-size:12px;line-height:normal;"><span class="Apple-style-span" style="font-family:Verdana;font-size:11px;">Cloud computing environments will contribute to the expansion of SaaS into areas beyond ERP, CRM and HR management systems. <span style="background-color:#FFFF00;">Rob DeSisto, analyst for Gartner, says organizations increasingly see the benefits of moving large-scale software expenses from the capital budget to the operating budget</span>.</span></span>
    </p>
    <p><span class="Apple-style-span" style="color:rgb(51,51,51);font-family:Verdana;font-size:11px;"></span><span class="Apple-style-span" style="font-family:'Trebuchet MS';font-size:12px;line-height:normal;"><span class="Apple-style-span" style="font-family:Verdana;font-size:11px;">Saavy IT managers are now looking for ways to automate and embed security and compliance processes across the value chain, including on mobile devices. Surprisingly, a key challenge is one of perception, not technology. Companies must get over the idea that security and compliance systems are simply insurance against problems, and that they dont improve the business in ...</span></span></p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Wed, 19 Nov 2008 21:13:56 -0400</pubDate>
            <guid>http://w99.suretech.com/8878/IT_Trends_For_2009</guid>
        </item>
        <item>
            <title>What do I do with this email warning me of a virus?</title>
            <link>http://w99.suretech.com/8802/What_do_I_do_with_this_email_warning_me_of_a_virus</link>
            <description><![CDATA[<p>Any mail that has obviously been forwarded as a <a href="http://en.wikipedia.org/wiki/Chain_letter">chain letter</a> warning of just about anything, even if the warning is true is almost guaranteed to be some specie of <a href="http://en.wikipedia.org/wiki/Spam_(electronic)">SPAM</a>.  Sometimes messages like this refer to partially true threats, but the goal of the originator of the message is to get many people to forward the message which creates at best a an annoying kind of virus effect.  Sometimes messages like this contain attachments of links that are harmful payloads themselves.<br />
<br />
Basically any time an email says PLEASE FORWARD THIS, it is very likely to be misleading, false or worse.<br />
<br />
The only way for an average user to know of a new severe particular threat is to read it in the mainstream media or from your technology team.  <br />
<br />
In conclusion the message should be ignored, but the general rule that you should never open attachments that you are not very sure about holds true.  Very sure means you know the sender and ALSO recognize BOTH the email message and the attachment as a legitimate communication from the sender.<br />
<br />
If any of the sender, the message or the attachment dont make sense the instructions below apply.  But because of the state of SPAM these days, mass forwarding of email is almost never an effective way of communicating this information or any information unfortunately.</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sat, 15 Nov 2008 14:35:01 -0400</pubDate>
            <guid>http://w99.suretech.com/8802/What_do_I_do_with_this_email_warning_me_of_a_virus</guid>
        </item>
        <item>
            <title>Why you need &amp;quot;The Cloud&amp;quot;</title>
            <link>http://w99.suretech.com/8544/Why_you_need_quot_The_Cloud_quot</link>
            <description><![CDATA[<p style="text-align: center"><object width="170" height="138"><param name="movie" value="http://www.youtube.com/v/eRqUE6IHTEA&hl=en&fs=1"></param><param name="allowFullScreen" value="true"></param><embed src="http://www.youtube.com/v/eRqUE6IHTEA&hl=en&fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="170" height="138"></embed></object></p>]]></description>
            <author>Dana Molina</author>
            <source>SureTech.com</source>
            <pubDate>Sat, 18 Oct 2008 08:48:03 -0400</pubDate>
            <guid>http://w99.suretech.com/8544/Why_you_need_quot_The_Cloud_quot</guid>
        </item>
        <item>
            <title>Startup Business Models: One Chicken vs RocketBoom</title>
            <link>http://w99.suretech.com/8139/Startup_Business_Models_One_Chicken_vs_RocketBoom</link>
            <description><![CDATA[<p> <span class="Apple-style-span" style="font-size:14px;"><span class="Apple-style-span" style="font-family:'Trebuchet MS';font-size:12px;">There are basically two ways to start a business that I'll call the buy a chicken model and the RocketBoom model.</span>
</span>
Rocketboom was the first videoblog to roll out a daily show and build a large audience successfully.  As the first it commands a fairly permanent piece of popular consciousness around video blogs.  The hundreds and thousands of video blogs that came later will grow, prosper and fail in due course, but the first stands singularly and as such keeps a momentum that is incredibly valuable. Another example is Amazon.  Now in 2008, the Amazon business model could be repeated with the application of enough dollars.  They have established the generall model of a find anything online store.  But no one will be able to buy being the first and largest and thereforem most memorable find anything online store no matter how much they pay they'll always be just a copy cat.
</p>]]></description>
            <author>Alberto Molina</author>
            <source>SureTech.com</source>
            <pubDate>Fri, 03 Oct 2008 08:33:50 -0400</pubDate>
            <guid>http://w99.suretech.com/8139/Startup_Business_Models_One_Chicken_vs_RocketBoom</guid>
        </item>
    </channel>
</rss>
