Having Fun Networking

Networking can be quite tricky. You need to have the time and knowledge of the Internet. If you use Twitter and let’s say YouTube, you must connect them. I am an author and have my own author page on Amazon. My Facebook remarks are tweeted automatically and they show up on my author page.

When I upload a YouTube video it goes on Facebook automatically because I have connected the two sites by allowing them to do this. The YouTube video also gets ‘tweeted.’ Every time I reply to a comment made on my videos or others videos on YouTube, they get put on my Facebook page automatically as well as getting ‘tweeted.’

When I post on my blog, it gets tweeted because I have allowed the connection by clicking on allow. Now Twitter will ‘tweet’ my blog to wherever I have allowed Twitter to do so.

My articles here on Ezine have the URL posted on Facebook and Twitter as well as my blog. They now expand those posts. In doing this you have increased your audience.

It does not hurt that I own an interactive poetry site where I have a forum for ‘Articles and Press Releases.’ That means I can post the URL to this article there as well. Now all the members have the option to click on the URL and read this article.

I know all this sounds hard to do for some people. There are those who pay others to ‘network’ for them. ‘Networking’ gets your name and the things that you do out on the Internet and makes it available on a search.

For instance, I can do a Google search on my name and all my Internet connections are working for me. I just did a search on my name just an hour ago. At page forty-six I stopped looking. With that many pages coming up on just my name, I consider myself a professional ‘networker.’ I have fulfilled my expectations.

There were things from my life and the people I do business with as well as my videos, my publishing and poetry sites, articles and of course my books being advertised free for me.

Every person who had put my name in print comes up with what they said about me. It gives them some promotion to be ‘tagged’ under my name and in general people tend to say nice things about me and my work so this is good promotion for me.

A tag can be a review that someone gave me on a site which sells my books or a poem someone wrote about me on Facebook or an interview with me.

There is one thing that pops up, which says I am dead. Normally that might bother someone. Dead writers sell, right? So, even negative things can prove to be useful.

My sister was murdered many years ago and her body was never found. The police found a way to contact me through the Internet to ask me more questions so they could expand their search and keep the ‘cold case’ open. To me, that is important. (Could that be another article, another time maybe?)

If you are going to ‘network’ don’t go gang-ho into it. Take your time and pick your sites that will promote what you are selling. Even someone like me, who has been ‘networking’ for years, signs up on a site where I have been invited and can get annoying emails. You see, the more you ‘network’ the more sites want you to be on them.

Some sites use your profile and stick it into a dating site that is affiliated with them. I am married and do not want to date. I state that, but still get those annoying emails. That means deleting a lot of junk every day. Setting certain emails as ‘junk’ generally works, but many do sneak in. You have to be on top of things all the time.

In summarizing, you can connect all the dots; for example connect all the sites you are on to give you interaction, if you want to promote yourself. It is important to know that once you are a public name and get some expose, once hidden information, can come out as well. Also, if you are not well liked, people may put out some false information. Generally the good over rides the bad. If doing all this seems a bit time-consuming and you are not ready for this, you can hire someone to do it for you.

I enjoy ‘networking’ and generally have a lot of fun with it. After a while, it can be profitable and rewarding. You have to enjoy what you are doing to be content; happy ‘networking’ everyone!

Source by Daveda Gruber

No Comments DIVORCE

How to Perform an FTP Test

Today we are going to talk about how to get your FTP, or functional threshold power, and there are at least 5 ways that you can estimate your FTP, a 20 minute test, 2 – 8 minute tests, the ramp test, or 2 – 6 minute tests. The last and more optimal way to do this test is very hard as it would be your output over the course of an hour. Because that would take an enormous amount of preparation, most athletes use one of these other four methods and not very many people use the hour method. Functional Threshold Power is really how many watts you can sustain over the course of an hour. Think of it as an hour Time trial. A time trial is all out, giving everything you have to put down the fastest time.

Now before we dig into how to do these, let’s talk about why you need to do these tests and what you should be measuring during the test.

In order to train properly, as in being in the correct zones, you need to have a baseline in order to figure out these zones. Zones are different based on intensity, from a recovery zone all the way up to what I call, the synapse interval zone. By doing an FTP test you will be able to use a little math to figure out what your zone ranges are.

What are we measuring? Ideally you want to measure heart rate and power, power being the more important measurement for training. Power is measured in Watts and gives you an instant readout on where you are during all of your rides. Heart Rate can be used but it lags and will more than likely have you starting out way too hard in order to get your heart rate where it should be and then backing off when it goes too high. Heart Rate can also be affected by training load, and sometimes can hang out too low or high, which could also have you in the wrong training zone. Heart rate is good to have so that when you are training with power, you can look at your baseline FTP heart Rate and see or possibly predict when you may need to take a little more rest off the bike so your body can recover. Bottom line is that it is important to measure both power and heart rate during your FTP test.

Let’s now talk about a few of the different test options mentioned earlier. The first is the most common is the 20 minute test. I would recommend this test for the expert and elite cyclist. More specifically the road and gravel racers as they keep the power down constantly during their events.

The two 8 minute effort test would be suited for athletes that may be more explosive like cyclocross and/or mountain bikers. This test would be a better representation of what is happening in their race and for how they will be training.

The ramp test is just as is sounds, after a warm up the power increases every minute until failure, this may be the least painful test of the group since it is only hard for the last few minutes, but still effective.

We also can do two 6 minute efforts. I use this test with my beginner and sport athletes in all disciplines of cycling. I can still get a good all out effort number with this type of test and not scare the athletes away. I have seen great improvement with this level of athletes using this form of testing for all the skeptics.

Again, the hour test will give you a very accurate number, but pushing yourself for an hour around threshold can definitely take its toll, and just the thought of it can make you skip it.

What should you do before you test? The first thing you should plan on before testing is having a 2-3 days off, or very low intensity rides before the test in order to get a good result. You also should not be on the bike for a ton of hours prior to the test. You want your body to be rested and ready just as you would for a big race. You also don’t want to take too much time off before as you start de-conditioning. Make sure you hydrate and eat properly the day before and the day of the test. Again treat this test like an ‘A’ race.

Test day has arrived, hopefully you have prepared for it like you would a race. You are going to have to give everything you have, leave your body with nothing left!

Before you start the test I would recommend doing some dynamic movements. Once you jump on the bike you will need to do around a 20 minute warm up to get more muscle fibers recruited and blood moving further throughout the body to help prevent injury. During that warm up you will want to include 2 to 3 above threshold efforts for 30 to 90 seconds. This will ensure that more muscle fibers are recruited and ready for that hard effort. I usually will do a 30 to 45 second effort first around 7 minutes, a 45 to 60 second effort around 10 minutes, and a final effort around 13 minutes. After that, I pedal and make sure the legs are ready to go, giving them a little shake out here and there.

Once it’s go time, it’s time to give it everything you have. If this is your first time testing you want to push, but not all out to start. If you feel alright a couple minutes in, then start to push harder and harder. You will want to think of this test as one of the hardest things you will do. If you do it properly you will completely bury yourself. As a side note, make sure that you are recording your power and heart rate, you don’t want to put yourself through the pain only to realize you didn’t record anything!

After you finish the FTP test, you should pedal for recovery for 15 to 30 minutes, get a recovery shake in, roll and massage out your legs, and then get a good stretch in.

Once you have your tests results, use the average of your power output and heart rate to insert in the math equations. This will map out your ranges for each particular zone. If you don’t know where to go from here, In a future article I will go over how to do this and look at a common zone line up as well as the line up that I use. Now get ready to do your own FTP test!

Source by Robert J Martin

No Comments DIVORCE

How Your Antagonist Can Antagonize Your Protagonist

Computer Technology in Romantic Fiction:

What does computer technology have to do with romance novels?

“You mean besides using them to write up your story?”

“Better than a typewriter,” one heckler yelled out. Laughter goes up across the room.

“Yes,” I answer.

Someone shouted, “You can use computers to find romance.”

“Ah, good. Now you are thinking. How many of you have done this?”

A few hands rise above the crowd.

“Oh, come on. There has to be more than a handful.”

More arms creep up and lift higher than the heads.

“Okay. Let’s keep with that theme, Social Networking with a Sociopath.”

Imagine if you will, that you have a heroine who just wants to find romance. After dating the losers of the century, she decides there has to be a better way. Unable and unwilling to try shooting for Mr. Right based on her own judgments, she turns to an online dating service. After all, they guarantee a ‘happily ever after’ or your money back.

After signing up for the service, our heroine, let’s call her Jane, sits at home, boots up her computer, and logs onto the dating website. Once there, she reviews the recommended matches. Finally, she picks a couple out and contacts them. Two days later, Jane has her first date.

The couple of dates with the prospective Mr. Right are okay, but when they kiss, her toes don’t curl so she decides to pass on Mr. Wrong. Unfortunately, Mr. Wrong refuses to give up on her. It turns out that the guy Jane picked out was not only Mr. Wrong, but he is also a stalker. Because Jane let him pick her up for one of their dates, the “nutso” now knows where she lives and chooses to follow her everywhere she goes, even when she is on other dates.

“What do you think so far?”

“The guy is a real whack job!”

“Yeah, but it happens,” someone else shouted.

“True. Now, let’s take this a step further.”

Our nutso, AKA Bob, has had a couple of dates with Jane so he obviously knows something about her likes and dislikes. Unless, of course, he is one of those guys who only talks about himself.

Low chuckles rumble through the room.

Let’s say that he knows Jane has been searching Craigslist.com and eBay.com to buy a Denon dual tape deck. This is something she wants desperately and searches for on a regular basis. Now, Bob has an idea. Bob puts an ad on both Craigslist and eBay for the exact tape deck he knows Jane wants and of course, Jane sees it and replies.

Jane is so excited she finally located what she hunted for that she doesn’t waste time on a bid, she just offers the full amount. The seller accepts her money and Jane cannot wait to go pick it up. She has goose bumps just thinking about her new electronic gadget. After arranging a time to retrieve her purchase, she uses the directions emailed to her and drives to the address.

Imagine Jane’s face, the look of utter shock and the lump in her throat when Bob opens the door. Not only does the surprise of seeing Bob upset her, there is no tape deck. Jane does an about face and bolts out of there. That, my dear friends is fraud.

“Are you seeing where I am going here? So far, our antagonist has used computer technology to defraud and to stalk our protagonist.”

“Do people really do that?”

“Duh!” One man hollered from the back of the room.

Waving my hands, I announce, “We’re not done yet. What else can this lone antagonist do with the use of computer technology to wreak havoc on our lovely protagonist?”


My turn to laugh. “Very good. Bob has already been identified as a stalker so why not cyber-stalk.”

“What exactly does that mean?” Several voices yelled at once.

Cyber-stalking occurs when someone uses the Internet or other electronic means to stalk another person. Tools like email, Instant Messanger, and websites are great for harassing and threatening someone. The social networking site can be a breeding ground for this kind of antisocial behavior. Sites like MySpace, Facebook, and Twitter allow others to follow you and leave comments for you and others to see. You can try to block them, but there are ways around that as simple as creating another account and starting over.

“Besides, the scary, it makes you shiver at the kind of creepiness factor of in cyber-stalking. There is way more that Bob, our villain, can do.”

“Such as?”

Big grin on my face. “I’m so glad you asked. Have you ever heard of Phishing?”

“You mean like fishing for trout?”

Roar of laughter erupts. I clear my throat. “Not quite.”

Phishing is typically carried out through an email or website meant to portray an actual company, but is not. For example, Phishing is used in those fake emails you receive from your bank stating, “We need you to confirm your account.” Jane, our unsuspecting victim, clicks the link in the message and is redirected to a fake website. She does as instructed and fills in her personal information, including her credit card or bank account numbers. Bob, who was a stalker and did small time fraud has now committed another act of fraud as well as stolen financial information that he could use and probably did, to get himself another credit card with her account number and/or buy something. Knowing this sicko, he purchased a negligee and sent it to Jane as a gift.

“Remember the movie, ‘The Net’?”

The crowd shrieks, “Yeah.”

That movie was based on the use of software to steal another person’s identity. Essentially, Bob has everything he needs from Jane to steal her identity thanks to his Phishing. But, he could have gotten the information another way. Let’s say Bob is a real computer hacker.

“This guy keeps getting worse and worse!”

“No doubt, but to continue.”

Bob is a software guru and knows how to hack systems. He can, based on the little information he has already received unwittingly from Jane, can use a sniffer to get her passwords. With passwords, Bob now has the ability to break into other websites that Jane uses or her email or anything else she believes is secure. He could break into her email and send it elsewhere or shut it down. He could log into her bank and transfer all her funds.

Holding up an index finger, I take a drink of water, and start again.

Bob is even worse than you imagined. You see, Bob wanted to date Jane to get inside information on his business competitor. Through those passwords he managed to acquire from Jane’s computer, Bob commits industrial espionage. He can get information about the company’s finances, their research and development, marketing, even personnel records. The really terrible part of this is that he used Jane’s login credentials so when the intrusion and theft is discovered, it will appear as if Jane did it or was involved.

“Oh, no!”

“Oh, yes. But I’m not finished.”

Bob is a career criminal. With access to the network at Jane’s company, Bob has installed software that gives him access to funds in their financial accounts. He can siphon off and move the money to various accounts of his own, concealing the source of his new found wealth. He is laundering money in the digital age.

Someone like Bob could be in it for himself, or he could be in it with a partner. Bob’s partner in crime is a terrorist.

Loud gasps explode throughout the space of a packed room.

Bob is laundering money for his unfriendly terrorist who needs him to hack into and bring down government organization’s websites. Cyber-terrorism. An example of this occurred last year when someone hacked into the Republic of Georgia’s website during the Georgia-Ossetia war. This kind of terrorism is small potatoes compared to the underlying reason a terrorist would pay Bob untraceable money. Usually, there are illegal weapons, drugs, people transportation, and any number of other unlawful activities.

“What does all that have to do with Jane?” A lone woman called out from her seat.

“Ah. It all started with Jane.”

Jane was the conduit to make all of these bad things occur. If it were not for Jane’s lack of computer security and knowledge, Bob would never have been able to dupe her as badly as he did. In addition, remember, to the naked, untrained eye, Jane will appear to be the criminal.

Our antagonist did a terrific job of antagonizing our kind-hearted protagonist who was only looking for romance.

Source by Denise Robbins

No Comments DIVORCE

Are You Ready to Work Full Time from Home?

It’s now almost two years since I started dabbling on the internet, trying to make money online. At that time it was a bit of an experiment, kind of like a hobby – something that I did partly for the enjoyment and partly in the hope that I would make enough money to leave my day job.

Now, 20 months later my hobby has turned in to a business and it is generating enough income from for me to happily go part time at work.

Should I decide to do this I’ll be taking the huge step from working on my business in my spare time to earn some extra money, to working half the week for myself. I will then be depending on the money from my own business to pay my mortgage and bills.

If I manage to achieve the same success working from home during the day as I have over the last year working a few hours here and there in my spare time I’ll be well on my way to becoming a full time home business entrepreneur.

I know this sounds fantastic, but what if something goes wrong? If I eventually work full time for myself I’ll be giving up a regular full time salary, not to mention company pension, sick pay and bonuses. For this reason I decided to ask myself a few questions. I’ve put together a list of 5 questions that you need to ask yourself before you leave your day job

1. Do you have a financial cushion? Before you give up your full time or part time job, make sure you have some money in the bank in case something goes wrong. Preferably you should make sure that you have no credit card debts or loans and have at least 3 months salary in the bank just to allow you to get back on your feet if the worst happens.

2. Are you making enough money? Sounds obvious, but remember to add up your current outgoings to see if your online income will cover everything. Remember to take into account tax payments and allow for the fact that you’ll no longer receive paid holidays, health insurance, sick pay and a company pension. If you have a big purchase coming up in the near future, such as a new house, you may want to postpone your full time online career until you’ve secured your mortgage.

3. Are your income streams diverse enough? Are you making all your money from one source? If you’re currently making all your money selling similar items on eBay or earning an income from a small number of affiliate programs or making money from a single program such as Google Adsense, you could be putting yourself at risk. What if the market for the products you are selling disappears? The affiliate programs you are promoting shuts down? You need to take a close look at the sources of your income. Ideally your income should be coming from numerous sources e.g. selling your own products, promoting different affiliate programs, using multiple websites in different niches.

4. Do you have a business plan? Since you are considering taking such a big step you need to have a business plan. This should include a description of your company and the products and services you provide, the analysis of your market, strategy and implementation along with a financial plan.

5. How will you cope with working alone? If you enjoy working with other people every day, it’s likely that you may find the transition to working alone quite difficult. You should consider possible strategies to cope with this change. For example you may want to make sure that part of your business involves working with other people – perhaps providing a service locally or consulting. Or you could fill the vacuum of not meeting people at work by joining a club or taking a part time training course. Making an effort to stay in touch and meet up with friends and former colleagues regularly will also help.

If you consider all these factors before quitting your day job, this should give you the best chance possible of becoming a successful full time internet marketer.

Source by Suzanne Morrison

No Comments DIVORCE
Skip to content