Positively Pittsburgh Live Magazine : Technology category syndication feed
Subscribe to this Page's Posts:
| via RSS
Syndication feed contains latest items of all channels which are assigned to Technology category of Positively Pittsburgh Live Magazine
Publish Date: 08-07-2014 16:36:02
27 years as US Air Force, fighter pilot, all active duty gave Ric Hunter a rich arsenal of experience and stories to tell. Why 27 years in active military? Well Ric says he was just having too much fun with amazing assignments. But one assignment that would not be considered "fun" was his time as a fighter pilot at the end of the Viet Nam Conflict. |As a freelance writer his myriad experience became articles on aviation and the Viet Nam War and some of these became part of his historical fiction novel, FIREHAMMER.|
FIREHAMMER is based on a true story of two high school best friends who parted ways on graduation. Tim joined the Marines in the height of the Vietnam War. Randy went to college and later became a fighter pilot. When Tim is killed at nineteen by a Vietnamese sniper, Randy vows to even the score. Firehammer is the nick-name of Tims Zippo lighter that Randy carries during several combat engagements, including the last battle of the war when his flight of four Phantoms helps rescue Marines trapped on bloody Koh Tang Island. Spoiler Alert: At the end of the novel, Randy places the Zippo at panel 9E of the Vietnam Veterans Memorial. What happens between Randy's first combat flight and his visit to the Memorial is mesmerizing enough to have earned, the author, Ric, a Pulitzer Entry. | Listen is as this Pulitzer Prize Entrant for FIREHAMMER tells his backstory and gives you a behind the scense tour on Author, Author, Shine Out Loud.
Publish Date: 08-07-2014 14:37:00
Exclusive New Way to Create Interesting, Dynamic
Content for Your Website or Blog
Title: Techno Granny, Exclusive New Way to Have Conversations, NOT by Email
Episode Notes: This may just be creative self destruction for #podcasting and email but TechnoGranny prefers to think of it as an amazing extension to give us great alternatives.|
ReplyAll is a the easiest way to create conversations between your writers or interviews with interesting guests that will develop live on your site. But instead of, time consuming audio/video, ReplyAll allows you to make great conversations in PRINT. It's easier on the content creators because it doesn't require schedule coordination or production value. It's easier on the reader because it doesn't require downloads, ear phones or clicking on a video at the workplace.| And it can be used for email streams that include many people.|
And because the conversations develop live on your site, ReplyAll content gets higher time on page and return visitors coming back to the conversation to see what they've missed. Over 100 sites including the Houston Chronicle, AbovetheLaw.com and SB Nation have already begun using ReplyAll.| This could work for your organization, your blog, content creation. Nearly endless opportunities!|
Guest today: Zach Abramowitz is CEO and co-founder of ReplyAll, a platform that makes it easy to create great conversations between your writers or with interesting guests. Prior to ReplyAll, Zach was a corporate lawyer, a graduate from NYU Law School, radio show producer and a standup comedian. In addition to ReplyAll, Zach currently writes for AbovetheLaw.com and runs his own LSAT tutoring business. | Find out today if ReplyAll is a great alternative to creating blog content or group email streams.
At ReplyAll we constantly strive to give you the best, easiest experience for creating dynamic conversations on your site. We aim to update our tool to meet the needs of all writers, and we're excited to announce that we heard your call!
Now take even more control of your interviews, round-tables, debates and more by adding multimedia to your replies. Jump back to ReplyAll.me, start a new conversation, and join the over 50 sites that have used the ReplyAll tool to drive massive user engagement (Over 7 minutes in most cases).
Check out these great uses of ReplyAll!
Now Embed Videos and Images! ReplyAll allows you to create dynamic conversational content, e.g. interviews, roundtables, stories and debates, that you can embed on your site as stand alone content. The conversations develop live on the page keeping your audience engaged, but the invited participants reply on their schedule and at their convenience so there's no need for your writers to synchronize schedules (and everyone has plenty of time to craft a witty reply). Why should you use ReplyAll? High Rate of Return Visitors - Readers keep coming back to see what they've missed. Avg. Visit is 13+ Minutes - The ReplyAll interface is easy to skim and browse plus the back-and-forth dynamic keeps your readers engaged. Save Yourself Time & Work - Never transcribe another phone interview or copy, paste and format long e-mail chains Start a conversation and invite your writers to join the Cast or fly solo and invite guests for an interview. To embed a conversation on your page, simply drop the "embed link" into a new post on your site. The content will update automatically as the conversation continues.
Publish Date: 08-05-2014 14:26:00
Remember when? And you still got busted for it?
Great blog to get you through a humorless, crazy day,
subscribe to get your daily funny.
Publish Date: 08-04-2014 03:57:00
TechnoGranny Show, 7/22/13 Twenty Things You Should Know Before Downloading Free Software.
Is downloading free software safe? You get a pop up on your computer that says, "Safe Software to Store Your Passwords, " No, you idiot, it's probably not. Beware before you click, you may just be inviting a wolf into your home, computer, records. ..........Answers to questions like What is freeware?........Where can I find freeware?.........Suggestions for safe places and curated lists to find and review software that can be helpful and tips for safe downloading. How easy is it to fall victim to a scam on the internet? The correct response is, too easy. Most of us are probably aware of the hazards which could accompany opening a suspicious email. Now we need to be mindful of downloading software that could potentially damage our computer, sabotage personal files or rob us of our identity. This segment's subject delves into the lure of free software, or freeware, as it is often called. What is freeware and how can you avoid putting your computer into harm's way? Techno Granny will guide you through the topic of free software and unveil the truth behind downloading programs that are often promoted to help when in reality they perform the exact opposite. Hopefully, with the research and advice of Techno Granny, we all will be more thoughtful before falling prey to the lure of ˜free' software. Is Downloading Free Software Safe? published on How Stuff Works, Kate Kershner simplifies the matter of using free software; if it comes from a reputable source, such as Microsoft, and your are searching for the programs on their direct site it is probably safe. Downloading a pop-up or an advertisement from a little known company with an unfamiliar program may not be a wise choice. No matter how alluring the ˜free' portion of the deal may sound, Kershner advises doing an internet search of the company offering the system before downloading or installing any software. You can read the full article here http://computer.howstuffworks.com/downloading-free-computer-software-safe.htm Why Free Software Downloads Aren't Always Safe. Norton is a company whose name is synonymous with privacy, anti- theft and antivirus. They span a significant corner of the internet security market for PC's, MACs and mobile devices. The official Norton site, offers consumers insight into managing the market of freeware. On the Your Security Resource page, general questions about freeware are answered by expert Elizabeth Wasserman. The first question:
What is freeware?
The answer, freeware is software that you install on your computer knowingly or not . One popular example of freeware is games and may also be referred to by the phrase widget. Freeware can come from
a cd or directly from a website download. It's important to note, not all freeware is dangerous to your computer. It depends on the source of the program.
The second question: Where can I find freeware? Wasserman's answer encompasses safe downloads as well as those we should be guarded against. Well-known companies, shareware makers and widgets alike all offer freeware, therefore weeding out trustworthy and verifiable sources may seem like a daunting task. Rest assured, there are some simple tactics which can be applied to your investigation before downloading iffy applications. Most notably, well- known companies will often require consumers agree to a licensing agreement upon installation. Corporations such as Microsoft and Adobe Acrobat are household names in this arena. In addition, searching for a company through the Association of Software Professionals is another good source for gauging the legitimacy of a company. http://asp-software.org/www/ The third question what are the risks of freeware? The response is severe. Some free software can have spyware or malicious adware attached to the code. If this is the case, viruses, worms and other detrimental file management systems can become inserted into your computer wreaking havoc on your files, and putting you at risk of identity theft. The last and most important question, how can I protect myself from risky freeware? The answer outlines 4 essential steps anyone can easily take to ensure their computers protection. 1. Step one, do your homework. In other words, before downloading take a few extra minutes to do a Google search of the program. Alternatively, visit a software site like CNET or ZDNET to read freeware reviews. 2. Step two; look for a seal of approval. A TRUSTe logo signals a secure site. 3. Step three, always keep security programs up to date. This may seems like a no brainer but complementary to running an antivirus program is the recommendation to patch any holes in current software. Malicious software may make use of outdated programs, so keeping abreast to any updates and new versions as they are released is helpful.
4. Step four, be wary of social network freeware. Many social media sites offer applications, free from cost, downloadable directly from the site onto a computer or other device. Despite the popularity of these widgets, they cannot always be verified. Furthermore, social networks are quick to renounce any responsibility related to the security and safety of these applications. Knowing this alone should be a red flag.
It can't be said enough, if it sounds too good to be true, it probably is. Some software companies test their software for bugs while others are simply trying to trick you into allowing them to place a virus or spyware on your device. Read the complete Norton article Here
For your protection and the defense of your computer and your files stored on it, please take advantage of ZDNet, the web's largest library of software downloads. This site has complied lists of software for Windows, Mac, and mobile systems. Searches can be conducted by price, category or most popular downloads. ZDNet offers a basic description of the program such as Avast Free Antivirus 2014, AVG Antivirus Free 2014, Java Runtime Environment and also provides a link viewers can use to access the program right from their site. ZDNet is a strong safety net for consumers. View their home page here
Cnet.comis another reliable site which offers freeware resources such as software and app reviews, news, how to's and downloads for Windows, Mac, iOS and Android. Covering a vast array of electronic and computerized devices any person would find helpful, including but not limited to appliances, car tech and cameras in addition to the expected laptops, mobile devices and PC's. This site is an invaluable resource for today's consumer. You can access their site here http://www.cnet.com/. Windows users may find http://www.filehippo.com/helpful. Filehippo contains a directory of downloads including freeware, shareware and software. Aside from software downloads from trusted sites, Filehippo offers their own software called FileHippo Update Checker. This is a cost- free program that scans your computer then generates a report listing any out of date software. The report suggests the installation of the most current versions, including links to the appropriate sites. Commonly available on Filehippo are browser and plugin software, anti- malware, audio and video, file sharing, firewall and security, messaging and chat and system tuning programs. Connect with the valuable resources available through Filehippo here http://www.filehippo.com/. If you are feeling concerned about how to safely navigate the freeware circuit, Chris Hoffman offers some good advice in his article, How To Do Your Research Before You Download Free Software. In a nutshell, research first, download later. The type of device you have will also dictate where you seek out security information needed for reassurance purposes. Hoffman offers 7 tips for guiding Windows users toward a safe download experience. · Find a curated list of the best free software available for download. Hoffman directs consumers to his site, http://www.makeuseof.com/pages/the-best-of. Here individuals can take advantage of research that has already been gathered. ·Make sure you trust the developer. A company like Microsoft or Google is well known and safe but if the company is lesser known, it would be best to visit a site like http://www.Cnet.com/ and research the program and company before putting your computer at risk for a potentially harmful download. · Only download from a trusted site. Many third- party sites like Cnet give consumers an opportunity to download directly from their page. These sites are typically safer to use because they are monitored for security flaws. Try to steer clear from downloading from someone's personal site because there are no telltale signs they are safe. · Read reviews. To increase your chances of finding an unbiased review begin with a Google search using the program name. Social networks are another good source for reviews. · Use an antivirus. It doesn't matter how careful you are, an antivirus will offer your computer another layer of protection. Many of the antivirus programs available can be downloaded for free. This is a prime example of freeware. There are many well-known corporations that offer free, or free on trial basis, antivirus software. Just be sure the name is one you can trust or that you have researched the company before downloading or installing software. · Install an app in a sandbox. This is typically something more experienced tech users are accustomed to. The process would require Sandboxie to run a questionable program in a sandbox. This would allow the program to be tried in an isolated area of your computer where it cannot do damage to the rest of your system. A knowledgeable computer user may also be acquainted with virtual machines which would allow you to test the program in the same manner. · Pay attention during the installation process. Despite the legitimacy of many freeware programs, even the trusted sites will include software you do not want, such as adware or default search engine changes. Java and Adobe are notorious for this, so it is critical that you pay attention during the install so you can decline any unwanted additions to the software as they occur.
You can read the complete article here
What are some of the ways you research freeware? What do you look for to ensure it won't mess up your computer? We are always looking for comments and tips to share. Imperatives for safe download. 1. Use common sense. Be suspicious of flashy ad or popup windows that contain unsolicited invitations to download, or that stress an urgent need for you to download immediately. 2. Never download a file unless you know and trust the source. 3. Do not download a file from BitTorrent or any other file sharing program; ever. 4. Google the product you are considering downloading. 5. Always read the program description before installing. This will allow you to verify its' compatibility with your computer. 6. Always backup your files before you install any new software. 7. Although scanning programs for viruses, worms, malware and the like is never a guarantee, it can't hurt. Any extra steps applied to ensure the safety of your files and hardware is a good idea. Safe places to download software from. Further Research has led us to uncoverSite Advisor,a service browser plug- in from one of the most trusted names in online security, McAfee. This free software adds safety ratings to web sites and offers a secure search box. In addition, I have prepared an inventory of major download sources which have received the Techno Granny ˜seal of approval'. Often their ratings are provided by the supplier so comparing a few different sites is advised. The list includes Tucows, MajorGeeks.com, WebAttack, NoNags, Pricelessware, WinPlanet, ZDNetDownloadsand CNET. Also I will offer a plug for our very own community based Gizmo. Gizmo selects the best of the best freeware options and displays them for your use. I have taken the liberty of generating some special search engines available. Please take advantage of the work I have done to find the specific type of programs you are seeking. Techno Granny Show Hosted By:Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOGThis blog post can be reproduced in its entirety with the following information:© Joanne Quinn-Smith, Techno Granny Show„c 2014 All rights reserved.Dreamweaver Marketing Associates | (412) 444-5197Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemagAdditional blog posts at: http://technogrannyshow.com
Publish Date: 07-28-2014 14:04:17
This may just be creative self destruction for #podcasting and email but TechnoGranny prefers to think of it as an amazing extension to give us great alernatives.| ReplyAll is a the easiest way to create conversations between your writers or interviews with interesting guests that will develop live on your site. But instead of, time consuming audio/video, ReplyAll allows you to make great conversations in PRINT. It's easier on the content creators because it doesn't require schedule coordination or production value. It's easier on the reader because it doesn't require downloads, ear phones or clicking on a video at the workplace.| And it can be used for email streams that include many people.|
And because the conversations develop live on your site, ReplyAll content gets higher time on page and return visitors coming back to the conversation to see what they've missed. Over 100 sites including the Houston Chronicle, AbovetheLaw.com and SB Nation have already begun using ReplyAll.| This could work for your organization, your blog, content creation. Nearly endless opportunities!| Guest today: Zach Abramowitz is CEO and co-founder of ReplyAll, a platform that makes it easy to create great conversations between your writers or with interesting guests. Prior to ReplyAll, Zach was a corporate lawyer, a graduate from NYU Law School, radio show producer and a standup comedian. In addition to ReplyAll, Zach currently writes for AbovetheLaw.com and runs his own LSAT tutoring business. | Find out today if ReplyAll is a great alternative to creating blog content or group email streams.
Publish Date: 07-21-2014 18:07:00
Title: Techno Granny, Attention Parents, Risks and Fixes for Teens on Facebook. In October 2013 Facebook announced teenagers ages 13-17 will be permitted to post publicly. This means anyone on the social networking site could have access to information provided by your child. Learning to navigate the world of social networking is not easy, compounding the learning curve are conventional parental responsibilities. This raises a novel host of questions and concerns for parents, guardians and caregivers of teens and tweens. In todays show Joanne Quinn- Smith, Techno Granny, investigates several risks related to Facebook and social media. She introduces her listeners to multiple studies conducted by leading experts in the field of technology which address not just the problems surrounding teens and social media, but fixes; ways to avoid or solve the troubles teens experience in cyberspace. Help Your Teens Play it Safe.
|They love the computer but how safe are they?|Accessibility to technology has changed aspects of everyone's life. Today's youth have grown up immersed in a cyber-culture. For most, computers allow near instantaneous communication and are usually packaged small enough to fit into the palm of our hand. This type of high tech telecommunication is all youth know. On the same hand, parents have striven to teach and guide their children through life's most difficult moments; this includes the trials and errors of learning to become independent and productive adults. The basic instructions parents need to instill upon their children have not changed because technology has changed. If anything, the influx of new communication devices requires parents to become more diligent than ever in monitoring and understanding how kids manage their participation on social media sites. Teens use Facebook for the same purpose as adults; they
· connect with friends,
· share photos and videos and It all seems harmless until you stop to think about who your children are associating with on social networking sites. Who are your teen's friends on Facebook? Now that Facebook enables individuals to manage their own audience, the Activity Log is a means for users to review and watch over what has been posted. The Activity Log is private to everyone but the user. From here, users can manage who is capable of seeing their content. A Simple inquiry such as, why is Facebook important to you?' opens a window into more in depth conversation about appropriate online behaviors. reviewing your child's privacy settings with them is a good way to set social media ground rules as well as enforce them.
The frequently evolving realm of social media is a lot for adults to keep tabs on, but for youth who have
grown up with social media as an integral part of their lives, there is a good chance they know more than you. A straightforward way to learn the basics is to ask your child to teach you.
Conversations with your child about online predators and privacy are no brainers, but equally important are chats about the Golden Rule. A gentle reminder that anything posted online can be misconstrued or taken out of context can be of great consequence. Online communication lacks additional clues (tone of voice, body language) therefore; comments and posts are not always interpreted in the way the sender intends. The Golden Rule states ˜treat others as you would want to be treated'. Practicing self-respect and respect for others when communicating, specifically online, is one way teens can safely connect with friends and peers on social media. In other words, think before you post. This idea applies to parents as well. If you have friended your child on Facebook it is recommended that you apply the same boundaries you have offline to your online relationship. Parents need to create a healthy balance between their teens developing independence and any safety concerns that may arise due to the use of social networking. It is equally important for adults to learn the language of social networking. These sites often have their own set of acronyms and terms which describe various online activities and characteristics. Familiarizing yourself with the correct terminology may take away your suspicions of social media. How Can I Help My Teen Use Facebook Wisely? Parents can always opt to assist their tween or teen in setting and managing their Facebook page's
security and privacy. Ongoing conversations regarding Facebook usage and responsible online behavior are a parent's obligation. Beginning basic education at a young age will help ensure your child grasps the concepts of internet safety. Some fundamental online safety rules to instill in children include never share a password, think before you post, accept friend requests only from people you know offline and report anything that appears suspicious.
|Learn as much as you can about Facebook.|7 Facebook Risks You Should Discuss With Your Teen. According to Victoria Kempf, blogger for Teenlife.com, many parents worry about what their teens are doing on Facebook. There are many documented benefits to participating in social networking, but there are risks that accompany the advantages. Parents must be aware of these risks in order to keep their children safe. The 7 risks parents should be prepared to address with their tweens and teens as they cultivate a digitally social life are as follows: 1) Facebook Postings Are Not Private. 2) Facebook Postings Can Impact Your Teen's Future. 3) Friending On Facebook Equates To a Badge of Popularity. 4) Online predators are Real. 5) Cyberbullying Is Real. 6) Poking is Sharing. It Can Also Be Sexting. 7) Identity Theft Can Happen To Teens Too. Each of these risks has the potential to lead to harm of child. Luckily there is a fix to accompany each risk. Posts are not private. In a nut shell, anything posted on line has the capability of being copy and pasted elsewhere by anyone with access to your child's Facebook account. This includes videos and photos. In order to render this problem parents should assist their children with programming their Facebook privacy settings. Related to privacy is the trend of Tagging. Tagging can create a lot of issues regarding privacy, or lack thereof. When someone is tagged in a Facebook photo, their identity is publicized and linked to their Facebook Timeline. When looking over your child's settings consider applying review tags, so that your teen must approve any photos before they are displayed for the world to view. When someone posts on a social media site they are in an essence creating their own brand. This is also referred to as a digital footprint. Many teens still view social networking as an anonymous way to explore certain topics and socialize with people they wouldn't necessarily mingle with offline. As people increase their cyber citizenship many colleges, scholarship providers and employers view the Facebook profiles of potential candidates before making a selection. This process is done to verify any students or employees chosen to represent an organization are the type of individual who will have a positive reflection upon the association. The best way to combat this problem is to have on going conversations with your children concerning appropriate behavior. On or offline, tweens and teens need to consider what the consequences of their actions may be. Many children assume more friends on Facebook mean they are popular. Often kids accept a ˜friend' request from anyone, even if they do not know the person offline. How does a parent manage their child's friends? If your child agrees to ˜friend' you on Facebook, you will then have access to their personal friend list. From this vantage point you can monitor the exchanges that go on between your child and their ˜friends'. Sometimes children post messages and status updates that unintentionally attract online predators. Just as teens have become tech savvy, so have predators. To avoid this potentially dangerous situation parents should present their teen with a list of things that should never be posted on Facebook or anywhere on line. For example, birthdays, phone numbers, addresses or any other identifying location, school name, parents first and last names should never be made public on line. Cyberbullying is real. This is a behavior which tends to intensify on line behind a shield of presumed anonymity. As stated earlier, nothing is truly private on line; this includes mean or degrading and harassing comments. Socializing on line is not all that different from life offline. Teaching your child to respect themselves as well as the opinions and differences of others will help minimize the risk factors of cyberbullying. Furthermore, having access to your teens Activity Log will let you monitor their behavior on Facebook. For those familiar with Facebook, you have probably been poked or have poked someone. The new App Facebook Poke automatically destructs photos and videos posted to the site within a few seconds. This activity leads children to believe their posts are completely erased. These presumptions often lead to risky behaviors that child would otherwise not conduct if they felt the consequences to their actions would be noticed. According to Facebook a loop hole was recently discovered and the photos and videos on Facebook Poke are not as private as teens thought. Apparently Facebook is working to repair this problem but ultimately parents need to reiterate to their children the idea of not putting anything on line that they would be embarrassed by or later regret. Identity theft can happen to children. If details are posted on line that contains identifying information cybercriminals will try and find a way to access it. It is easy to click on a link or download an attachment that appears to be harmless only to realize you have jeopardized your computer with malware. As part of a child's technology education, instruction on identifying phishing scams should be taught. Teens and tweens should be told to never click on unusual or unfamiliar links even if they come from someone they know. In addition, teens should be told to never reveal personal information over the computer. In summary, to help ensure your child is safe while navigating the social side of the cyber world make sure they understand each of the risks addressed above and the various ways to avoid them. Tell your teens how in appropriate behavior on social network sites can affect their future. Lastly, teach your children internet safety, from a young age. Review the codes of conduct. Don't just assume children know what is appropriate and what isn't. Remember the goal is to teach our children to be good cyber citizens. Aside from any legal risks associated with social media use, a child's emotional state could be at risks as well. According to Everydayhealth.com, Facebook depression is a newly debated phenomenon. Experts report that teens who spend a great deal of time on Facebook reading status updates may feel their social lives are unfulfilled and fall into a depression. Symptoms of Facebook depression mirror classic depression symptoms; skipping meals or activities, weight loss or gain, drop in grades. Parents should be aware that this condition exists and know when to seek help for their child. Cyberbullying is another topic which receives a lot of attention from the media. Cyberbullying is bullying through electronic devices and can include texting, emails, instant messaging, unapproved posting of videos, photos or links and general harassment through an electronic communication device. Often cyberbullying leads to depression, anxiety, severe isolation and sometimes even suicide. Parents should make themselves aware of the warning signs of bullying, including depression, avoiding school and peers, spending excessive time online. Sexting is another online specific behavior that has the potential to ruin your child's reputation and devastate their emotional health. Sexting is the act of sending, receiving or forwarding sexually explicit messages, photographs or images on electronic devices. Although the American Academy of Pediatrics reports most sexts are not shared beyond a small group of friends, the potential for these images to be shared with hundreds if not thousands of people does exist. Furthermore, the possibility of teens being charged with felony child pornography and various misdemeanors exists depending on the circumstances and the state where the sexting occurred. In order to help your teen maintain an unpolluted digital footprint parents and kids must understand what a digital footprint actually is.
This phrase is used to describe the trail of online activity that develops as a person uses electronic media. Parents can help their children by monitoring their privacy settings and reinforcing the idea that anything posted online is there- someplace, forever.
Parents have a duty to help their children safely participate in social media. The American Academy of Pediatrics suggests, chatting about Facebook and how your child is using it. Also, consider ˜friending' your child. If your child does not want you as a friend on their Facebook page parents should automatically consider this a red flag. Be aware of news headlines depicting the good and bad aspects of Facebook and other social media sites. Share these with your teen. Finally, make the computer accessible in a central location of the home; this will give parents a clearer sense of who is on line and how often.
Techno Granny Show Hosted By:
Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOGThis blog post can be reproduced in its entirety with the following information:© Joanne Quinn-Smith, Techno Granny Show„c 2014 All rights reserved.Dreamweaver Marketing Associates | (412) 444-5197Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemagAdditional blog posts at: http://technogrannyshow.com
Publish Date: 07-14-2014 17:00:00
They say a picture is worth a thousand words.
Baby boomers will remember and those under 30 will never know this absolute unmitigated final word of a phone argument.
Now that was the final word in an argument!!!!!!
Techno Granny Show Hosted By:Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOGThis blog post can be reproduced in its entirety with the following information:© Joanne Quinn-Smith, Techno Granny Show„c 2014 All rights reserved.Dreamweaver Marketing Associates | (412) 444-5197Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemagAdditional blog posts at: http://technogrannyshow.com
Publish Date: 07-14-2014 14:15:57
There are many concerns for teens and tweens using Facebook. Facebook only recently allowed those under 18 to post so that the public can see their posts and not just their friends. | MAJOR CONCERNS: Who can see my kid's posts? | Who are my teen's friends on Facebook and how did they find them?| Cyberbullying?| Sexting? |Your child's digital footprint and how it will affect his/her academic and professional career later in life?| Reported Facebook Depression| Online Predators| Lack of Privacy of Facebook| Today, TechnoGranny, Joanne Quinn-Smith discusses in her #podcast what online experts on teen use of Facebook are saying? She's opening up the conversation in hopes that you will continue it. Used to be you only had to worry about where your kids were outside your home, now there are concerns when they are inside your home and you may be sitting in the next room.| Let's discuss the risks and fixes of your children using Facebook.
Publish Date: 07-14-2014 03:50:00
TechnoGrannyShow: The 8 Most Commonly Asked Facts -Dental Implants
Missing Teeth? Don't know what to do about It? Are you a Candidate for dental implants? How painful are they? What if you have a dentistry phobia? How long does it take to complete dental implants? Do you need one for each tooth or are there other ways to have dental implants? How long do dental implants last? Are you too old for dental implants? What is the cost of Implant Treatment? Find out if dental implant surgery is for you?
Our guest today, Dr Carl Medgaus: Dr. Medgaus has treated more than 300,000 patients since 1973. He
has also successfully placed over 2,564 dental implants (and counting!) ” without a 99.3% success ratio.
|Dr Carl Medgaus|Since 1973, Dr. Carl Medgaus has been committed 100% to his patients and their results. To give his patients exceptional, honestly, second-to-none great dentistry, Dr. Medgaus has invested 318% more of his time to his education than 98.7% of all other dentists. He has invested more than $350,000 in direct out-of-pocket costs attending continuing education seminars all over the country (Dallas, San Diego, Tulsa, Tampa, Dearborn, Baltimore, Philadelphia and more.). All this attention to education guarantees you will receive only the best methods and technologies available. Dentistry is quickly evolving and Dr. Medgaus has remained ahead of the curve to pioneer a better dental experience for you. Dr. Medgaus has treated more than 300,000 patients since 1973. He has also successfully placed over 2,564 dental implants (and counting!) ” without a 99.3% success ratio. Dr. Medgaus' continuing education is impressive! Along with being the ONLY Certified dentist in Hybridge Dental Implant Technology in Pennsylvania (and the surrounding states) he continues to hone his skills by personally attending ongoing educational seminars. This keeps him, as you would imagine, at the cutting-edge of the most modern dental implant dentistry. The 8 Most Commonly Asked Facts About Dental Implants Q: How Do I Know If I Am A Candidate For Dental Treatment?
A: Almost everyone who is missing one or more teeth and in general good health is a candidate for dental implant treatment. There are few medical conditions that can undermine the success of implant treatment, such as uncontrolled diabetes. However, there are few conditions that would keep someone from having
implant treatment altogether.
Quality and quantity of available bone for implant placement is more often a factor in qualifying for dental implants than medical conditions. However, even people who have lost significant amount of bone can qualify for dental implant treatment with additional procedures to add bone or create new bone. Advances in this type of treatment have made it possible for thousands of patients who would not previously have been considered candidates to have successful implant procedures.
Q: How Painful Is Getting Dental Implants?
A: All of our patients report that they feel no pain during the procedure. In fact, many patients do not have to use any pain pills following the procedure. Your decision to use implants will help you to avoid much pain and discomfort in the long term.
Besides, given the overall health care benefits, you should not deny yourself proper treatment out of fear of pain. As with any medical or dental procedure, your attending doctor, the dentist, is equipped to provide you with appropriate treatment, including any pain medicines you need.
Also, if you're especially fearful, phobic, or pain sensitive, you have the option of doing the procedures with sedation dentistry.
How this works:You take a small pill before you come into the office and you rest peacefully as we do our work. With this option you barely remember the procedure the next day, but get a ton of dental work done in just 1 visit.
Finally, to make sure you are comfortable when you leave our office, you'll receive the necessary prescriptions to keep you very comfortable. Plus we will call to make sure that you are not in any abnormal amounts of discomfort. Our goal is to give you stronger, more comfortable teeth, without experience pain or discomfort!
Q: How Long Will It Take To Complete The Treatment?
A: You will notice a difference almost immediately. However, the entire process can take anywhere between
3 weeks - 9 months to complete. This depends on the type, and quantity of implants you need, along with the quality of bone in which the implants are placed.
There are treatment options that are faster, such as dentures; however, none of these traditional methods prevent bone loss, are as stable, or give the type of natural look and feel like implants do.
Q: Will I Need To Have One Implant Placed For Each Tooth That Is Missing?
A: No. In fact it is possible to replace all of the lower teeth with an over denture that is supported by only 2-4 implants. On the other hand, sometimes it might work in your advantage to replace your back teeth with an implant for each tooth to provide additional strength.
Q: How Do I Know If I'm Too Old For Implants?
A: Great question. Your overall health and your desire to improve the quality of life are much more important things to look at, than your age. We currently have patients from 40 years old to 90+ years old, and all of these are with great success.
Q: How Long Do Implants Last?
A: Most research has shown that implants have been successful for over 30 years. However, our goal is to make them so they last a lifetime. This is much improved from dentures, which are 5 years, and/or bridges where the expected time of use is between 2-10 years.
Q: Do You Offer Any Warranty?
A: Yes. Even though dental implants have over a 95% success rate, there is still a very small chance that they won't completely bond. When this occurs, new implants are placed and the success rates for the replacement implants are even higher.
When we replace the implants, we keep working for FREE until we get it right. The only thing you need to do is make sure you come in for your regular scheduled visits so that we can keep your gums and teeth healthy, which will prevent most possible problems.
Q: What is the Cost Of Implant Treatment?
A: Many people call and ask us, How much is one implant going to cost?' While I wish it was that simple. The only way to determine actual cost is by coming in for a consultation and examination to find out if you have bone loss, if you'll need one, two, or more implants.
Obviously, costs vary greatly depending on your needs and desires. If you read all the letters we get from patients you will find a couple who chose implants, instead of a cruise as an anniversary present to each other.
So yes, yours will need to look at implants as an investment, because it really is a significant decision. It is that: an investment. A cruise or other trip ends after 5-7days. Or you can purchase more stuff' for the house, however that is really as important as the very best appearance possible and the best possible health?
A healthy mouth or magnificent dazzling smile pays dividends in many ways for your entire life.
Anyway, dental Implants are admittedly not the least expensive option. If your primary concern is lowest possible investment, than dental implants are not for you.
If on the other hand, a reasonable investment and a fair price is important to you, but far more important is the best possible outcome, the least pain and discomfort, the most gentle care and highest degree of expertise and professionalism are even more important to you, then implants are for you.
(Incidentally, a variety of payments plans are available. Of course, all major credit cards are accepted, so you can get your airline miles or reward points. Some patients report getting 5 days in a top resort with the reward points on their credit card. Expert assistance in obtaining reimbursements from your insurance provided free of charge.)
Publish Date: 07-14-2014 01:33:32
Fran Hawthorne has spent more than 25 years covering health care, politics, finance, and the nexus of business and social activism, as an editor and writer at Fortune, BusinessWeek, the Bergen Record, and Institutional Investor (where she is now a senior contributing writer). Her award-winning fifth book, Ethical Chic: The Inside Story of the Companies We Think We Love, was named one of the best books of 2012 by Library Journal. Among her other books are the award-winning Pension Dumping (Bloomberg Press) and Inside the FDA: The Business and Politics Behind the Drugs We Take and the Food We Eat (John Wiley & Sons). In addition, Hawthorne writes regularly for The New York Times, Newsday,The Scientist, Chief Executive magazine, Crain's. New York Business, and other publications.
Publish Date: 07-07-2014 14:03:29
Podcasts have become quite the rage finally after 7YEARS of Joanne Quinn-Smith doing TheTechnoGrannyShow. Next year 2015 you will even be able to listen to them through your car radio device. But in the meantime how do you listen to and enjoy your favorite podcasts and in fact participate if you would like to. Today TechnoGranny will tell you how to listen on Itunes, TalkShoe, FM Player and how to listen and participate live on TalkShoe. So listen in, get the info and how to do it and start clicking in on your favorite apps to listen to your favorite talkcasts, including The TechnoGranny Show.
Publish Date: 07-03-2014 01:24:00
|06/25/2014 10:00 AM EDT|
Episode Notes: Even microenterprises can get interest free loans from KIVA, a non-profit which bases its lending on character and not credit reports. Listen in as local representative, Emily Keebler explains about KIVA. Emily Keebler works to inform entrepreneurs and their supporters in the Pittsburgh area about Kiva's 0% interest, crowdfunded micro-loans as the Kiva City Pittsburgh Lead. Kiva, the world's first micro-lending website, empowers small businesses in Pittsburgh and around the world by connecting them to lenders who collectively fund loans and provide a network of support for each business. KIVA has micro loans available for businesses and the criteria is character, not credit history or lack of it.
Emily Keebler works to inform entrepreneurs and their supporters in the Pittsburgh area about Kiva Zip
's 0% interest, crowdfunded micro-loans as the Kiva City Pittsburgh Lead. Kiva, the world's first microlending website, empowers small businesses in Pittsburgh and around the world by connecting them to
|Emily Keebler, Pittsburgh, Pa. KivaZip Lead|
lenders who collectively fund loans and provide a network of support for each business.
1. Small businesses create 2 out of every 3 new jobs in the United States. They serve as a vital part of our economy because local entrepreneurs are more likely to hire and source their products locally, keeping their earnings in the communities that support them.
2. Small business owners cite ˜access to capital' as one of their top three constraints. And the numbers back this up 8,000 business loan applications are turned down every day in the United States.
3. Kiva Zip provides a platform for new and small businesses that might otherwise face this constraint to receive a small loan to help them start or expand their business. Kiva Zip gives people around the world an opportunity to support one another and improve lives and local economies.
4. Because Kiva Zip loans are crowd-funded by individuals who believe in a small business owner's character and reliability as endorsed by a trusted member of their community, lenders do not ask for a borrower's credit score, cash flow, or collateral. By removing those criteria, Kiva Zip is able to help new and innovative businesses that might not otherwise qualify for a traditional loan.
Kiva Zip uses social underwriting to evaluate loans. The primary requirement of this system is that every borrower must be endorsed by a trustee who is willing to vouch for the borrower's character and business sense.
6. Kiva Zip loans are all offered at 0% interest and without any fees, giving an advantage to small businesses that could use a hand.
7. First-time borrowers on the Kiva Zip website may borrow up to $5,000 and may choose a repayment term of up to 24 months. Once this amount is repaid, there is an opportunity to borrow progressively larger amounts.
8. Kiva recently increased the amount that first-time borrowers in the agriculture industry can crowdfund via Kiva Zip. Because of the speed with which these particular loans have funded in the past and the 100% repayment rate among farmers, Kiva has raised the terms to a maximum loan of $10,000 over 36 months.
9. Kiva Zip is a program of Kiva, an international nonprofit organization that was founded in 2005. Kiva aims to reduce poverty and increase economic development by connecting people through lending. Kiva Is funded by individual donations and grants from corporations and foundations.
10. Websites for more information:
b. Kiva Zip (general) - zip.kiva.org
Lend $5 to a Pittsburgh entrepreneur today via Kiva Zip! Emily Keebler | Kiva Zip, Pittsburgh | Follow Kiva Zip on Twitter!Why not make a $5 loan to an entrepreneur here?
Techno Granny Show Hosted By:Joanne Quinn-Smith is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at:http://www.amazon.com/dp/B00DHKVJOGThis blog post can be reproduced in its entirety with the following information:© Joanne Quinn-Smith, Techno Granny Show„c 2014 All rights reserved.Dreamweaver Marketing Associates | (412) 444-5197Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemagAdditional blog posts at: http://technogrannyshow.com
Publish Date: 06-28-2014 20:38:22
Jeanette Vaughan is an award winning writer and story teller. Not only is she published in the periodicals and professional journals of nursing, but also in the genre of fiction. Out on her sheep farm, she has written several novels and scripts. Her screenplay "Angel of Mercy" won the outstanding nursing research award from Texas Tech University Health Science Center. In addition, she was named Distinguished Alumni for the school of nursing in 2001 for her written work and volunteerism for the Sydney Olympic Games. Her debut novel FLYING SOLO won fourth place in the 2013 Reader's Favorite International Book Awards for southern fiction. FLYING SOLO also was a finalist in the Beverly Hills Book Awards. Her second novel, SOLO VIETNAM was just awarded the silver medal for historical fiction by the Military Writer's Society. She is the author of the "Flying Solo" Trilogy Series about modern women in aviation.
Publish Date: 06-25-2014 14:11:35
Even microenterprises can get interest free loans from KIVA, a non-profit which bases its lending on character and not credit reports. Listen in as local representative, Emily Keebler explains about KIVA. Emily Keebler works to inform entrepreneurs and their supporters in the Pittsburgh area about Kiva's 0% interest, crowdfunded micro-loans as the Kiva City Pittsburgh Lead. Kiva, the world's first micro-lending website, empowers small businesses in Pittsburgh and around the world by connecting them to lenders who collectively fund loans and provide a network of support for each business. KIVA has micro loans available for businesses and the criteria is character, not credit history or lack of it.
Publish Date: 06-15-2014 14:00:00
Pittsburgh Dentistry Specialist, Dr. Carl Megdaus, DMD, Dental Implant Specialist Answers the 8 Most Pressing Questions of Dental Implant Candidates: Missing Teeth? Don't know what to do about It? Are you a Candidate for dental implants? How painful are they? What if you have a dentistry phobia? How long does it take to complete dental implants? Do you need one for each tooth or are there other ways to have dental implants? How long do dental implants last? Are you too old for dental implants? What is the cost of Implant Treatment? Find out if dental implant surgery is for you?
Publish Date: 06-10-2014 14:01:26
Is it Peter Sellers Pink Panther type paranoia or do we really have reason to believe our privacy is being invaded by tiny spy cameras? Yes some of that stuff you see on major crime shows is real or soon will be. Just a friendly discussion to let you know that it's like your grandma used to say when we still had "party" line telephones. "If you don't want anyone to know your secret, don't tell it over the phone." Well now as it turns out, if you are going to misbehave or even do something silly in public, DON"T. Because now not just everyone's cell camera might be running but also some unassuming, undetectable mini spy cams may be running also. Should we paranoid? Should you worry the next time your boyfriend sets his ballpoint pen on the night stand? You decide!
Publish Date: 05-30-2014 09:11:00
Techno Granny Talks 05-27-2014
Preview EGC Workshop Website Attraction and Conversion
Featured Guest: Dan Droz
is President of Droz Marketing, a firm that helps companies grow with creative solutions for branding, websites, social media advertising and collateral materials. Dan is also a former professor at Carnegie Mellon. In the last two years, Droz Marketing has won 11 "Marketer of the Year Awards," over 50% of all the awards granted by the American Marketing Association, including 'Grand Marketer of the Year,' unprecedented by any marketing firm in America.
Dan has spoken previously at the Duquesne entrepreneurs conference on topics ranging from how to develop the perfect marketing plan to strategies for branding, PR, website design and social media. In this years presentation, Dan is talking about how to attract and convert more customers through your website.Questions We Asked Dan:
Answers Dan Gave Us:
- Could you tell us a bit about the "Online Cruise Control, Attracting and Converting Customers to your Website" seminar and why people should be looking out for it at the conference?
- Since there are so many different kinds of businesses, Is there just one set of strategies or tactics that work for all businesses?
- How do you figure out what the right methods are for a particular business or site?
- What do you think is the primary reason businesses aren't successful with their websites?
- What one thing do you feel is important to making website a more important part of the marketing mix?
Growing your Online Business Although there are many ways that websites can help promote a bricks and mortar business, more and more companies are turning to online business opportunities. Here are some strategies to monetize traffic on your site:
- Advertising. There are generally two variation of the advertising model: Pay Per Click and Pay Per View. Pay Per Click (PPC) advertising generates revenue whenever someone clicks on an ad on your website, while Pay Per View pays based on the number of views (or impressions). Both rely heavily on traffic volume and targeted content, and although this may seem like an easy way to make money, don't expect to retire anytime soon unless you have a huge site with lots of highly targeted articles. Google AdSense is one of the most widely used Pay Per Click engines.
- Sponsorship / Private Ad Sales Similar to the Pay Per View model, this monetization strategy usually involves you going direct to the advertiser instead of dealing with an ad network. This form of advertising model usually involves you doing the leg work to approach potential advertisers. Before you do, make sure your website content is highly targeted and generating a lot of traffic.
- Physical Products The age old model of selling actual physical products. Many large online retailers use this model successfully for example, Amazon or Dell. Selling physical products involves listing one or multiple products for sale on your website, facilitating a secure transaction and shipping the product. Keep in mind there are warehousing and distribution elements to this model unless you use drop shipping, and shipping to overseas destinations can be cost prohibitive.
- Drop Shipping Drop shipping is similar to the physical product model, but with someone else looking after the warehousing and distribution. You establish a relationship with one or more businesses who look after the physical goods you're selling you only have to worry about sales. When a customer purchases a product on your website, you look after the transaction then forward the order through to your drop shipper who packages and distributes the goods.
- Digital Products Anything you can download ebooks, software, music, videos. Digital products are relatively easy, as they have a much lower cost of sale than physical products. With a digital product there's no physical warehousing, shipping or cost to reproduce the product. You can create your own products to sell, pay someone to develop a product for you, or promote other people's products via affiliate networks (see the affiliate products section below).
- Affiliate Products Many website owners make money from promoting other people's products and services. To start promoting, you apply to become affiliated with a merchant, either via one of the many affiliate networks or directly. When you refer a customer to the merchant, you receive a commission on sales. There are affiliate networks for both physical and digital products as well as for lead generation, otherwise know as Cost Per Action (CPA) offers. For physical products Amazon has its own network, while Clickbank is one of the larger digital product networks.
- Membership / Subscription Membership sites make money by charging people a regular fee to have access to a secure Members Only area. This area might contain training material that's updated or added to regularly, or it might be a web based application. If you want customers to stick around and keep paying for the privilege then you need to make sure you provide unique and quality content.
- Marketplace You're in one! Dating sites, freelance marketplaces such as 99designs and auction sites like eBay. Usually marketplaces make money by charging sellers a fee to list items for sale, or from advertising if the site generates enough traffic. One of the biggest challenges with marketplace sites is attracting enough buyers and sellers to interact regularly.
- Services The services model encompasses a huge variety of offerings and usually involves customers paying for someone's time. Selling a service may involve selling day to day tasks such as data entry or professional services such as accounting. Services can prove hard to scale, as usually you need to keep adding work-hours as your clientele grows.
For more information on how to attract and convert more traffic to your site, contact Dan Droz at:
4916 Liberty Avenue | Pittsburgh, PA 15224
P: 412-338-1818 | F: 412-338-9188
www.drozmarketing.com | firstname.lastname@example.org
You can also hear more from Dan in person at the 16th Annual Entrepreneur's Growth Conference.
This premier networking & informational event for Western PA small businesses is hosted by the Small Business Development Center at Duquesne University. In addition to the featured speaker Stan Sheetz, Chairman of Sheetz Convenience Stores, and a CEO Panel Discussion, the conference will feature several great breakout sessions including: Accelerating Sales: A Daily To-Do List, Tales from the Road: Inspiring Stories from Well-Traveled Entrepreneurs, Rules of the Road: Human Resource Update, The Intersection of Concept & Cash: Steering a Great Idea into a Profitable Business, Fueling Up: Find the Cash You Need, The Exit Ramp: Preparing to Sell Your Business, Ending Gridlock: Creative Ways to Improve Cash Flow, The Scenic Route: Videos & Images to Power Your Marketing Motor, Sharp Curves: How to Win with the Power of Persuasion, Opportunities Ahead: Diversity Programs & Government Contracting, Social Media Shortcuts: Shift Your Business into High Gear with LinkedIn, Facebook & Youtube, The Fundraiser Fastlane: Successful Crowdfunding Campaigns, Online Cruise Control: Website Practices for Converting Visitors into Customers, and The Green Belt: How to Run a Sustainable Company.For more information and to register visit www.sbdc.duq.edu.
Techno Granny Show Hosted By:Joanne Quinn-Smith
is the Creative Energy Officer of Dreamweaver Marketing Associates in Pittsburgh, Pennsylvania and an expert on Web 2.0 Branding, 2009 National SBA Small Business Journalist of the Year, Author "Folly of Marketing Plan in Your Head, 101 Compelling Reasons to Write One." Available at: http://www.amazon.com/dp/B00DHKVJOGPosted By: Stephanie CurticeThis blog post can be reproduced in its entirety with the following information:© Joanne Quinn-Smith, Techno Granny Show„c 2014 All rights reserved.Dreamweaver Marketing Associates | (412) 444-5197Listen at: http://tinyurl.com/TechnoGrannyShow OR on its unique radio channel at: http://tinyurl.com/pospittlivemagAdditional blog posts at: http://technogrannyshow.com
Publish Date: 05-27-2014 14:05:03
16th Annual Entrepreneur's Growth Conference is June 5, 2014. Dan Droz, a popular repeat guest on TechnoGrannyShow will be giving a preview this morning of his workshop for the conference entitled, "Online Cruise Control, Attracting and Converting Customers to Your Website." This morning Dan will be revealing, why people should be looking out for this particular workshop at the conference. |
You will find out if there is just one set of strategies or tactics that work for all businesses.| Without revealing the entire workshop Dan will give you hints on how figure out what the right methods are for a particular business or site. | Dan will also be very honest about the primary reason businesses aren't successful with their websites. | Finally he will tell you the one thing that is important to making website a more important part of the marketing mix. Now remember this is only a preview, to get the REAL STUFF you must attend the 16th Annual EGC Conference on June 5, 2014. You can register here: http://www.sbdc.duq.edu/EventDetail?id=564
Publish Date: 05-12-2014 14:12:04
It used to be that you argued with your husband, your
Aunt Ethel and Uncle Mert about your baby's name. But wonder of wonders between the Federal government and someone in geekdom, parents and grandparents can now predict the popularity of a name 25 years or more into the future. So if you are wondering if the name you are giving your son will still give him an edge on individuality thirty years from now, you can check out this system or you could just name him, "Sue." And by the way you can use geekdom in that case also to download a digital copy of "A Boy Named Sue." by Johnny Cash from Itunes so that your son will understand your madness long after you are gone, provided a digital copy still works. And provided ITunes is still around! A must listen for parents and grandparents who don't want to drive themselves crazy choosing an original name but would rather drive themselves crazy figuring out the technology to track its future projections.
Publish Date: 04-28-2014 14:06:55
In this microwave generation, we all want to get our news quickly and efficiently because of our busy schedules. And there are few people as busy as The TechnoGranny. Today she tells you how she keeps up on technology by following five Power Twitter Accounts and going to their website when she needs in depth news. You can follow TechnoGranny on twitter: https://twitter.com/technogrannysho or @technogrannysho
Publish Date: 04-14-2014 14:02:50
You will rarely hear me as the harbinger of Bad News, however, not enough people are talking about the dangers of the Heartbleed Virus which has left much of the information on the internet vulnerable. If you are a casual user of the web or if you own a blog or a website, it's important to take notice. I am not an expert although I will have an expert on NEXT week but we can at least go over the information out there so that you can make some educated decisions. Even if your don't listen, start changing your passcodes NOW. You can listen to a previous show here on passcodes as to why you should change them every six months but please pay attention because now in many cases it is not a suggestion but a necessity.
Publish Date: 04-07-2014 14:04:07
How to know your antioxidant scores and what they mean. Special guest Sunita Pandit, Mrs. Cardiology will talk about the anti-oxidant scanner as seen on the Dr. Oz show. Why you need to know your scores, how it works, and how you can use the information to improve your health, well being and energy. In addition to being the host of the Mrs. Cardiology Show, Sunita is the practice manager for Cardiologist, Dr. Santosh Pandit in the North Hills of Pittsburgh. He is the only medical doctor in the Greater Pittsburgh Area with the ability to perform a non-invasive anti-oxidant scan on the surface of the skin. that will give the patient their results in 90 seconds. Find out how the Antioxidant Scanners reveals your body's ability to absorb nutrients.
Publish Date: 04-05-2014 17:02:37
What happens when four award winning authors get together to write a mystery novel about a small island off the coast of Texas? This is not an anthology but a mystery novel with the same story line throughout and four uniquely distinct authors with their own brand of story telling. |
Well you might think it got a little scrambled but not so, the result is a mesmerizing story filled with some fictional and some real characters, many real spots and businesses on the island and a platform for a fun tourist season treasure hunt.
Guest today are c-authors of "Paragraphs, Mysteries of the Golden Booby" | Hear the story behind the book from the authors themselves.
Pat Mc Grath Avery |
Joyce Faulkner |
David Harry | The story behind "Paragraphs, Mysteries of the Golden Booby" just might be even more interesting than the novel itself.
Publish Date: 03-24-2014 19:43:51
Saroj Gopal Kulkarni came to the United States over 40 years ago with two toddlers and could read but not speak English. In her upcoming book she tells her story to Joanne Quinn-Smith about being a soccer mom who learned to speak English from American soap operas and whose kids often interpreted for her. Expected release date May, 2014
Publish Date: 03-24-2014 14:02:14
When I googled "Popularity of Sexting with Teens" I came up with About 1,930,000 results (0.32 seconds) and the topics ranged from therapy group and research studies to a popular app that Teens are using that facilitates sexting. The disturbing trend involves pictures being exchanged by youngsters, often using mobile phone apps such as Snapchat or social networks such as Facebook, Flickr and Imgur. I even found an article on what are supposed to be "safe sexting" sites where you can't get caught because messages self destruct supposedly after your "timer" goes off. THIS IS NOT A JOKING MATTER.
According to new research published in theArchives of Pediatric & Adolescent Medicine in July 2012, one-fourth of teens admitted to having sent a sext.
The results showed that over one-fourth of the teens admitted to sending a sext, but more girls (68.4 percent) were asked to send a sext more than boys (42.1 percent). Teens between the ages of 16 and 17 were more likely to be propositioned for a sext, and the requests declined in those 18 and older.
Find out about a disturbing article on PAGE 8 of Search Results on the Dangers of Tween Sexting......
Publish Date: 03-17-2014 14:01:36
Most of us are so used to using Wikipedia for answers that we haven't paid attention to its own disclaimers:
"We may be wrong Гc?? Use at your own risk Гc?? We are not doctors Гc?? We can't help with law Гc??
You may disagree with what we include......Wikipedia is an encyclopedia on the Internet that is edited by anyone who wants to help. The way it works means that anyone with who can view the Internet can change what is written. When you read Wikipedia, you should remember that we cannot make sure that our information is checked by people who can make it complete, accurate or reliable......Today Techno Granny Will Give You Twelve Tips that may help you determine the validity of Wikipedia information or that on any other website.
Publish Date: 02-25-2014 14:04:34
HTML or HyperText Markup Language is the main markup language for creating web pages and other information that can be displayed in a web browser.....There are many other markup languages to use so find out from a designer's point of view why html is still so popular..... Susan Newman of Susan Newman Design and Suzy Brandtastic TalkCast answers the big questions of "Why should you choose html for your email marketing rather than plain text?" As an award winning graphic designer she is well qualified to explain why adoption of HTML-capable email clients is now nearly universal, with less than 3% reporting that they use text-only clients.[
Publish Date: 02-23-2014 12:40:00
Developments in technology have altered more than just the way children learn and play, it has also altered the way we need to parent. Raising children in our ever more technolological society can seem overwhelming at times, but navigating the digital world can be made easier via a few simple tips.
One good tip is that if you have iPad or a computer that your child has regular access to, you should turn on parental controls. The parental controls on the Ipad imits the websites that can be accessed and also puts an age restriction onto the apps that can be downloaded or even turn them off completely. When your children are online, ask them to demonstrate what they are doing.
This is a screenshot of a Parental control Page.
How to Turn On Parental Controls for the iPad
The first step is going into the iPad settings by touching the settings icon. It looks like a bunch of gears and is one of the default icons for the iPad.
Once in settings, choose the general settings from the left-hand menu. You should reach a screen like the one shown above.
Next, choose Restrictions to go into the iPad settings for parental control.
The next step for enabling parental controls on the iPad is to turn on the iPad restrictions. Simply touch the top of the screen where it reads Enable Restrictions.
You will be prompted for a four digit passcode. Choose something you will remember, but not something your child can guess like a birthday or the last digits of a driver's license. If there is a significant date your like to remember in your past besides birthdays and anniversaries, that would be perfect.
The passcode for the iPad's restrictions will need to be entered twice to make sure you don't accidentally tap a different number than intended.
Once you have the iPad's parental controls enabled, you will be able to set different restrictions and even restrict some of the default applications that came with the iPad. This includes the Safari browser, YouTube and iTunes, so you can restrict your child's ability to view websites, watch videos and purchase music from their iPad.
You can also turn off the ability to install apps. You can still get apps on the iPad by installing them to iTunes and syncing them to the iPad, which will allow you to have complete control over which apps are on the iPad.However, you also need to be careful not to go overboard when it comes to safety. The internet is a normal part of life in the 21st century and your children should make use of it in a way that is both productive and safe.
For more tips on Online Safety Listen to these TechnoGranny Shows:
(c) Joanne Quinn-Smith 2014
This blog post can be reproduced in its entirety with the following information:
© Joanne Quinn-Smith, Techno Granny Show„c 2013,
Dreamweaver Marketing Associates, Pittsburgh, Pa. 15230, 412-444-5197
Publish Date: 02-17-2014 14:36:13
Yes, you heard me say it. So you had no Valentine or a disappointing one and are ready to see what's out there. You already spend hours bent over your computer and rarely have fun time, mostly it's work or you are addicted to Facebook and need a change? Really hadn't even thought about dating apps, only websites and then Ellen Degeneres cast out her app dating jokes on Valentine's Day and TechnoGranny's inquiring mind wanted to know. So we recently investigated seven dating apps that you can download to your mobile devices and that can help you "prowl" for dates wherever you are. Sound swarmie, maybe not? You decide if the love of your life is waiting in the palm of your hand on your Iphone or if dating apps will become one more time sucking hobby like your Facebook account? Would love to have you all weigh in on this one.
Publish Date: 02-11-2014 17:00:00
Techno Granny Talks 02-10-2014
Secrets Revealed on Winning Awards for You, Business, or Organization
Blue Ribbon Award Winning Writing Tips
By: JoAnn R. Forrester, The Empress of Biz
Awards are an excellent way to position a client, business associate or oneself for recognition and FREE publicity. The publicity received is often worth hundreds of thousands of dollars. The following tips will give you an overview of writing a nomination that will stand out and shout, Pick me. 1.
Preparation: Knowing the RIGHT steps to take, people to nominate and what awards to nominate your nominee for saves time, frustration and losing submission.
2. READ, know and follow the guidelines exactly for the nomination. If you have questions¦ ASK the organization sponsoring the award.
3. Nominee's Permission: It is essential to ask the intended honoree's permission to nominate him or her for an award. Explain the award and let the nominee know up front if financial data is required. Some nominees are uncomfortable with disclosing financial information and will elect not to continue.
4. Supporting material: If there are supporting documents required, start gathering them immediately. The supporting documents and letters can be referenced in the nomination write-up to illustrate strong points of the candidate.
5. Writing: Give yourself plenty of time to write. Figure at least 10 hours for each nomination. This covers research, interviewing, verifying material and writing. List each criteria and answer that only. Use short and brief sentences with strong follow-up points. Long sentences and narratives are boring. The committee soon gets tired of reading and will start to skim over material.
6. Editing: Have the nominee review and verify what you have written. If you are unsure of a fact, do not use it. If it states no more than 5 pages, stick to that!
7. Submission: Make sure All information requested is enclosed. Do not guess on postage if mailing. Get proof of mailing or delivery verification of nomination. Make sure you have the name of the person who received it.
Congratulate Yourself. You did it! Pat yourself on the back! You deserve it and when your nominee wins¦it will be a great time for all.
** Listen to Techno Granny's Interview with more Great Tips from JoAnn Forrester HERE **
Have a Nomination to Write?
JoAnn Forrester, of S. I. Business Associates, is an award winning business consultant, teacher, lecturer and writer. JoAnn has written over 300 award winning profiles for her clients, including the U.S. Small Business Administration National Small Business Journalist of the Year, U.S Small Business Administration National Small Business Person of the Year Award, YWCA Racial Justice Award, YWCA Tribute to Women, SBA Minority Business Advocate, Athena Awards, Stevie Awards and the PA Best 50 Award.
If you do not want to write your nomination she does.
About the Author and Guest:
JoAnn R. Forrester is co-host of the Empress of Biz Talkcast and co-founder, president and partner in S. I. Business Associates, Small Business Solutions, LLC and Celebrate and Share. She is an entrepreneur, writer, business growth specialist, teacher, columnist and award winning writer. JoAnn specializes in helping small businesses grow and prosper. She is the co-developer of the PRICE IT PERFECT„c cost management system for small business, and has secured over 40 million dollars in loans and investment for her clients.
JoAnn is a celebrated business author of two well received business books: "Steps to Owning Your Own Successful Business©", and the "David vs Goliath Marketing Handbook©." Her current project is "52 Dangerous Mistakes Entrepreneurs Make©." JoAnn has been a featured business columnist for the Pittsburgh Business Times writing on Business Finance and for PPLMag.com. In 2008, JoAnn started the Empress of Biz Talkcast Show, Listen, Learn, Prosper!
The goal of the show is to provide inspiration, guidance and practical advice to business owners.
She is co-founder of The Women of Achievement Awards Dinner which has recognized over 250 prominent women in Pittsburgh while raising funds for Cribs for Kids®and other not for profit organizations. JoAnn is also co-founder of the Pennsylvania Women's Hall of Achievement and was elected President in June of 2012.The goal of the PA Women's Hall of Achievement is to honor and highlight the accomplishments and achievements of the women of Pennsylvania.
In recognition of her contributions and championing of small and woman owned businesses, JoAnn has been recognized twice by the U. S. Small Business Administration as the Pennsylvania Women Business Champion (1989 and 2000). In addition she has been recognized as a Pennsylvania Best 50 Women in Business, an Honoree in the Pennsylvania Honor Role of Women, awarded the Greater Pittsburgh Chapter of the National Association of Women Business Owners Founder's Award, and recognized by the National Women's Hall of Fame. In 2010, she was honored by the Greater Pittsburgh YWCA in their Tribute to Women Awards in the entrepreneur category.
© Joanne Quinn-Smith 2014 All rights reserved.
Publish Date: 02-10-2014 13:37:06
Guest, JoAnn R. Forreste of Blue Ribbon Profiles has written over 300 successful award profiles. Awards are an excellent way to position a client, business associate or oneself for recognition and FREE publicity. The publicity received is often worth hundreds of thousands of dollars. The following tips will give you an overview of writing a nomination that will stand out and shout, "Pick me."......Today JoAnn will give you 8 tips on doing awards the right way so that you have a great chance at winning. So Listen in as we explore the Secrets Revealed on Winning Awards for You, Your Business or Organization.
Awards are an excellent way to position a client, business associate or oneself for recognition and FREE publicity. The publicity received is often worth hundreds of thousands of dollars. The following tips will give you an overview of writing a nomination that will stand out and shout, "Pick me!"
Publish Date: 01-27-2014 15:43:23
Some old some new, these are TechnoGranny's website picks for 2014, some also even have apps to go with them.
To decipher med speak--MayoClincHealthSystem.com......For a new twist on internet dating mysinglefriend.com......To keep up with your android phone and apps--Google Play website.....Keep up with technology gadgets and consumer electronics-endgadget.com.... And because inquiring minds want to know and get information.....ted.com...There you have it, TechnoGranny's Five Websites Worth Searching in 2014
Publish Date: 01-20-2014 19:39:00
Techno Granny Talks 01-20-2014
Secrets Revealed! How Hypno Dining Helps Weight LossSanna Carapellotti
Featured Guest: Sanna Carapellotti
is a clinical hypnotherapist with a specialty in the energy approach for helping you change your life. She uses Hypnotherapy, EFT. Hellinger Constellion work and guided imagery. Sanna has been in private practice since 1993 and makes hypnotic audios. Her clients come to her for eating issues, surgery empowerment and stress reduction.1. Eating issues is a specialty of yours. How did this come about? Did you ever have eating issues of your own?
Eating is ultimately within our control when we become more conscious of what we are doing when food is present.
It is also important to know that there are pushes and pulls that reinforce our habits, and we can change them when they no longer serve us.2. Talk about Eating Habits, How are they formed? Reinforced?
Eating habits begin in early infancy, even in utero. And our immediate environment and culture support how we behave around food, until we or someone close to us increases our consciousness.3. How do you help your clients with their eating struggles? You created two techniques to help clients. Please explain them.
I created HypnoDining and The Family Table to help with long standing rhythms and speeds and patterns of how we eat.4. Explain HypnoDining? How did it come about? What is it?
HypnoDining is a structured eating experience designed to connect us with the gifts food offer. It is an actual eating experience.5. HypnoDining has a special NEW YEARS bonus offering. Tell us about that:
Extended small group times with me between 9:30 and 10:00
Personalized half an hour phone consult with Sanna after HypnoDining to help you.
Hypno Dining class is held on every third Wednesday of the month at Orbis Caffe.
M-Powered over Junk Food... is every other month and through private sessions. Bring it on!Sanna Carapellotti's Life Changing HypnotherapyEmotional Freedom Technique | Family Constellations | Quantum Touch
412.344.2272 | email@example.comSanna-Carapellotti.com
| Sanna on PPLmag.com© Joanne Quinn-Smith 2014 All rights reserved.
Publish Date: 01-20-2014 14:05:18
Find out the issues behind your lack of success with weight loss and how hypno-dining can help.......Sanna Carapellotti, MS, CHt is a clinical hypnotherapist with a specialty in the energy approach for helping you change your life. She uses Hypnotherapy, EFT. Hellinger Constellion work and guided imagery. Sanna has been in private practice since 1993 and makes hypnotic audios. Her clients come to her for eating issues, surgery empowerment and stress reduction. .....Today she discusses how her Hypno-Dining Class can help you with eating issues and TechnoGranny will tell you how it has helped her to shed 23 pounds including during the Thanksgiving and Christmas Holidays.....Secrets Revealed TODAY "Why Hypno Dining Helps Weight Loss."
Publish Date: 01-16-2014 16:15:00
Pittsburgh Area Handyman Brian Fallet of "He's Pretty Handy will give you chapter and verse today to keep you from experiencing the damage that can be caused by frozen pipes. .....From deterrents to freezing to things NOT to do to unthaw them whether you are a homeowner or renter you should not miss this on "How to Protect Your Water Pipes in Winter." Build Zoom--He's Pretty Handy is a handymen in Pittsburgh, PA. Rated in the top 30% of 21,136 contractors in Pittsburgh.
Frozen water pipes are a serious risk during extremely cold weather. When water freezes, it expands and can put enough pressure on any pipe to cause it to burst. When a pipe bursts it can spill hundreds of gallons of water per hour and cause thousands of dollars of damage to your home.
To prevent frozen pipes:
Drain and store outdoor hoses. Close the inside valves that supply the outdoor hose bibs. Open the outdoor hose bib to allow water to drain and to allow any remaining water to expand without breaking the pipe.
Keep garage doors closed if there are any water supply lines in the garage.
Open kitchen and bathroom cabinet doors to allow warmer air to circulate around the plumbing.
Leave the faucet open so you get a slow drip. The dripping water will help keep the water in the pipe from freezing.
If you are going away during cold weather keep your thermostat set to a temperature no lower than 55 degrees.
Insulate any exposed pipes.
If you turn on the water and get no water or only a trickle, you can suspect a frozen pipe. Likely areas are any pipes on exterior walls or pipes coming into the house. If you are unable to locate the frozen pipe, contact a plumber or your local handyman.
When working to thaw a pipe, work from the side nearest the faucet and work towards the frozen area, this way any water can flow out and pressure from the water supply can push the ice out as it melts.|
You can uses several methods to unfreeze a pipe,
Wrap the area of the pipe with towels soaked in hot water.
Wrap the area of the pipe with a heating pad.
Use a hair dryer or small portable heater. If the pipe is near a wall, use a cookie sheet behind the pipe to reflect the heat to the back of the pipe.
Do not apply any open flame such as a blow torch to the pipe, this can cause a pipe to explode or worse start a house fire.
Keep the faucet open, as you treat the frozen pipe and the frozen area begins to melt, water will begin to flow through the frozen area. Running water through the pipe will help melt more ice in the frozen area.
Know where your water main is, if the frozen pipe bursts, you will want to shut off the water as soon as you can.