TJ's Blog
Search:

Posted by TJ on Friday August 24, 2007 @ 01:28 PM
[Tags: rant, definitions, personal]

I am sick of hearing this phrase. Although the phrase is nothing new, for some reason I have been hearing this phrase way too much lately too keep my sanity. I first noted hearing it when the Alex Rodriguez of the Yankees used it to describe his relationship to Derrick Jeter during the 2007 off season and then from there it seems I have been hearing the phrase at least once a day in my office.

I think the phrase is perfect for those times when you need to say something but have nothing to say. But really people stop using it for your answer to everything.

Athlete's have been using this phrase for years in an attempt to sum up their troubles. Infact USA Today awarded the phrase the #1 Cliche of 2004. (USA Today)

The many meanings of "it is what it is":

  • A phrase that seems to simply state the obvious but actually implies helplessness.
  • Meanings it is not going to change, so deal with it or don't.
  • Do not over think the situation. a reminder to keep things simple, dont over analyze things, or a way to put a definition on something thats hard to explain.
  • Normally used to describe something of irrelevance or an acceptance of the situation.
  • Used primarily to cause confusion to the listener.

--Compiled from UrbanDictionary.com




Posted by TJ on Wednesday August 22, 2007 @ 01:10 PM
[Tags: news, rant]

The reason scientist have yet to find the cure for cancer is they are too busy doing studies on preposterous points. Take this article for example:


Study: T-rex could outrun David Beckham
CNN.com


LONDON, England (Reuters) -- The smallest dinosaur could reach speeds of nearly 40 miles per hour and even the lumbering Tyrannosaurus rex would have been able to outrun most modern-day sportsmen, according to research published on Wednesday.


Even T-rex, who wasn't incredibly fast, could chase down footballer David Beckham.

Scientists using computer models calculated the top speeds for five meat-eating dinosaurs in a study they say can also illustrate how animals cope with climate change and extinction.

The velociraptor, whose speed and ferocity was highlighted in the film "Jurassic Park", reached 24 miles per hour while the T-rex could muster speeds of up to 18 miles per hour, the study published in the Royal Society's Biological Sciences showed.

"Our research, which used the minimum leg-muscle mass T-rex required for movement, suggests that while not incredibly fast, this carnivore was certainly capable of running and would have little difficulty in chasing down footballer David Beckham, for instance," said Phil Manning, a paleontologist at the University of Manchester, who worked on the study.

The smallest dinosaur -- the Compsognathus -- could run nearly 40 miles per hour, about 5 miles per hour faster than the computer's estimate for the fastest living animal on two legs, the ostrich.

A top human sprinter can reach a speed of about 25 miles per hour.

The researchers used a computer model to calculate the running speeds of the five dinosaurs that varied in size from the 6.6 pound Compsognathus to a six-ton Tyrannosaurus.

They fed information about the skeletal and muscular structure of the dinosaurs into the computer and ran a simulation tens of millions of times to see how fast the animals moved, said William Sellers, a zoologist at the University of Manchester, who led the study.

They checked their method by inputting data of a human with the muscle and bone structure of a professional sportsman and found the computer accurately spat out a top running speed just behind T-rex's pace.


"People have estimated speeds before but they have always been indirect estimates and hard to verify," Sellers said. "What we found is they were all perfectly capable of running."

Looking at how these ancient animals lived and died out is also important in trying to predict how modern day species may cope with future climate change, Sellers added.

This study helps to build a biological picture that scientists can use to better understand how dinosaurs adapted to changes in the weather just before they went extinct some 65 million years ago, he said.

"Knowing how these animals coped over the past millions of years will give us clues to what is going to happen over the next thousand years," he said. "That is why there has been more recent interest in biology of these animals." E-mail to a friend


Okay so maybe the point of the study was not to determine if the T-rex could outrun the popular soccer star David Beckham. But why did they put that in the title? To get people like me to read it, and I felt for it and now you did to





Posted by TJ on Monday August 20, 2007 @ 01:03 PM
[Tags: hints, software]

You can save trees and printing cost by simply changing your settings in adobe acrobat and Microsoft Word to print pages side by side. What will happen is the pages will print two pages per page instead of one. Of course, this hint is not for everyone, especially those with bad eyes.

To change your settings:

Adobe: File -> Print... -> Page Handling ->
Select "Multiple Pages Per Sheet" and Number of Sheets "2"

Office: File > Page Setup -> Options : Select pages per Sheet "2"

Internet Explorer: Same as for Office

(Unfortunately, the settings in office and IE do not save so you need set these each time you print.)

Another solution to greener printing is use software (for a fee) developed by Greenprint Technologies which automatically analyzes every print job and highlights unnecessary pages for deletion by you. Product Link.




Posted by TJ on Tuesday August 14, 2007 @ 12:35 PM
[Tags: internet, eBay]

I happen to own the domain name www.thesitename.com . I picked it up on eBay a couple years ago for $10. I think the domain name is actually pretty clever since you often get extra hits from tutorial websites that have the text "thesitename.com" any where on it. I figured this extra incentive will raise the asking price so I have have listed my domain name for $25,000. Am I crazy for asking that much? Probably, however, less popular domains have gone on ebay for much higher and crazier domains are listed on ebay for millions more. I figured why not give it a shot. Next I try selling it on Sedo the premier domain auction site.

Some newsworthy domain sales:

Business.com (news article) sold for $350 million

GayCalifornia.com (news article) Sold for $250,000

Travel.info (news article) sold for $117,000 - Wow I didn't know .info domain's were worth anything.

Comfirmed: Sex does sell:
- Sex.com sold for a rumored $12M in cash and stock last year.
- Sex.net sold for $450,000 last year.
- Porn.com sold for 9.5 million in 2007 (news article)

thesitename.com On ebay now for a starting price of only $25,000. Bid and make history!





Posted by TJ on Thursday August 9, 2007 @ 02:06 AM
[Tags: work, accounting]

My timesheet is what I use at work
My timesheet is the toughest part of my job
My timesheet needs to have at least 7.5 hours of work on it a day
My timesheet tells my boss what i did that day
My timesheet has my favorite code which is holiday
My timesheet has to be done on monday of everyweek
My timesheet is an excel spreadsheet
My timesheet has macro's
My timesheet has formulas
My timesheet rollforwards by itself

yeah... thats my timesheet. I perfected the timesheet over the course of my employement so now when I hit a button it saves the current week, ads the current week to a log of all time, clears all data, updates the dates for the new week and saves the new week file with the date in the filename. Yup that is my timesheet. Why are you interested in my timesheet anyway? Why did you read this whole thing?



Posted by TJ on Tuesday August 7, 2007 @ 11:25 AM
[Tags: news, opinion, internet]

The Wallstreet Journal is trying to get into the technology market...

...and they failed.

Below is an article from the Wallstreet Journal<(WSJ.com)


Office Technology
Ten Things Your IT Department Won't Tell You
By VAUHINI VARA
July 30, 2007; Page R1

Admit it: For many of us, our work computer is a home away from home.

It seems only fair, since our home computer is typically an office away from the office. So in between typing up reports and poring over spreadsheets, we use our office PCs to keep up with our lives. We do birthday shopping, check out funny clips on YouTube and catch up with friends by email or instant message.

And often it's just easier to accomplish certain tasks using consumer technology than using the sometimes clunky office technology our company gives us -- compare Gmail with a corporate email account.


Security expert Mark Lobel of PricewaterhouseCoopers describes the most common things employees do on the internet to jeopardize company security.
There's only one problem with what we're doing: Our employers sometimes don't like it. Partly, they want us to work while we're at work. And partly, they're afraid that what we're doing compromises the company's computer network -- putting the company at risk in a host of ways. So they've asked their information-technology departments to block us from bringing our home to work.

End of story? Not so fast. To find out whether it's possible to get around the IT departments, we asked Web experts for some advice. Specifically, we asked them to find the top 10 secrets our IT departments don't want us to know. How to surf to blocked sites without leaving any traces, for instance, or carry on instant-message chats without having to download software.

But, to keep everybody honest, we also turned to security pros to learn just what chances we take by doing an end run around the IT department.

For hacking advice, we asked Gina Trapani, editor of Lifehacker.com, an online guide to being more productive on the Web; Leon Ho, editor of Lifehack.org, a blog with a similar mission; and Mark Frauenfelder, founder of the wide-ranging blog BoingBoing.net and editor of the do-it-yourself technology magazine Make.

To find out the risks, we talked to three experts who make a living helping IT departments make the rules and track down the rogue employees who break them. They are: John Pironti, chief information risk strategist at Amsterdam-based IT-consulting firm Getronics NV; Mark Lobel, a security expert in PricewaterhouseCoopers's advisory practice; and Craig Schmugar, a threat researcher at security-software maker McAfee Inc.

* * *
1. HOW TO SEND GIANT FILES

The Problem: Everybody needs to email big files from time to time, everything from big marketing presentations to vacation photos. But if you send anything larger than a few megabytes, chances are you'll get an email saying you've hit the company's limit.

Companies cap the amount of data employees can send and store in email for a very simple reason: They want to avoid filling up their servers, and thus slowing them down, says messaging-research firm Osterman Research Inc., of Black Diamond, Wash. And getting your company to increase your email limit can be a convoluted process.

The Trick: Use online services such as YouSendIt Inc., SendThisFile Inc. and Carson Systems Ltd.'s DropSend, which let you send large files -- sometimes up to a few gigabytes in size -- free of charge. To use the services, you typically have to register, supplying personal information such as name and email address. You can then enter the recipient's email address and a message to him or her, and the site will give you instructions for uploading the file. In most cases, the site will send the recipient a link that he or she can click to download the file.


Because these services send your files over the Web, they're outside of your company's control. That makes it easier for a wily hacker to intercept files during their travels.

How to Stay Safe: Some of the services are more reputable than others. YouSendIt, for instance, is a start-up run by a former Adobe Systems Inc. executive and funded by well-known venture-capital firms. Others offer little information on their sites about themselves and could be more susceptible to security holes that could let a hacker steal your information.

If the site's backers aren't immediately apparent, there are other clues that can help. Look for a "secure" icon -- in Internet Explorer, it's a little lock on the bottom of the screen -- which signifies that the site is using encryption to protect its visitors' confidential information. A logo from a security company such as VeriSign Inc., meanwhile, means VeriSign has confirmed the identity of the site's owner.

* * *
2. HOW TO USE SOFTWARE THAT YOUR COMPANY WON'T LET YOU DOWNLOAD

The Problem: Many companies require that employees get permission from the IT department to download software. But that can be problematic if you're trying to download software that your IT department has blacklisted.

The Trick: There are two easy ways around this: finding Web-based alternatives or bringing in the software on an outside device.

The first is easier. Say your company won't let you download the popular AOL Instant Messenger program, from Time Warner Inc.'s AOL unit. You can still instant-message with colleagues and friends using a Web-based version of the service called AIM Express (AIM.com/aimexpress.adp). There's also Google Inc.'s instant-messaging service, Google Talk, accessible at Google.com/talk. There are Web-based equivalents of software such as music players and videogames, too -- typically, skimpier versions with fewer features than the regular programs.

The other approach to this problem is more involved but gives you access to actual software programs on your computer. All three of our experts pointed to a company called Rare Ideas LLC (RareIdeas.com), which offers free versions of popular programs such as Firefox and OpenOffice. You can download the software onto a portable device like an iPod or a USB stick, through a service called Portable Apps (PortableApps.com). Then hook the device up to your work computer, and you're ready to go. (But if your company blocks you from using external devices, you're out of luck.)

The Risk: Using Web-based services can be a strain on your company's resources. And bringing in software on outside devices can present a security problem. IT departments like to keep track of all the software used by employees, so that if a bug or other security problem arises, they can easily put fixes in place. That's not the case if you've brought the program in on your own.

Another thing to keep in mind: Some less reputable software programs, especially underground file-sharing programs, could come loaded with spyware and make it possible for your own files to leak onto the Web.

How to Stay Safe: If you bring in software on an outside device, says Mr. Lobel, make sure you at least tweak the security settings on your computer's antivirus software so that it scans the device for potential threats. That's easy to do, usually through an Options or Settings menu. Likewise, if you use a file-sharing service, set it up so that others can't access your own files, also through an Options or Settings area.

* * *
3. HOW TO VISIT THE WEB SITES YOUR COMPANY BLOCKS

The Problem: Companies often block employees from visiting certain sites -- ranging from the really nefarious (porn) to probably bad (gambling) to mostly innocuous (Web-based email services).

The Trick: Even if your company won't let you visit those sites by typing their Web addresses into your browser, you can still sometimes sneak your way onto them. You travel to a third-party site, called a proxy, and type the Web address you want into a search box. Then the proxy site travels to the site you want and displays it for you -- so you can see the site without actually visiting it. Proxy.org, for one, features a list of more than 4,000 proxies.

Another way to accomplish the same thing, from Mr. Frauenfelder and Ms. Trapani: Use Google's translation service, asking it to do an English-to-English translation. Just enter this -- Google.com/translate?langpair=en|en&u=www.blockedsite.com -- replacing "blockedsite.com" with the Web address of the site you want to visit. Google effectively acts as a proxy, calling up the site for you.

The Risk: If you use a proxy to, say, catch up on email or watch a YouTube video, the main risk is getting caught by your boss. But there are scarier security risks: Online bad guys sometimes buy Web addresses that are misspellings of popular sites, then use them to infect visitors' computers, warns Mr. Lobel. Companies often block those sites, too -- but you won't be protected from them if you use a proxy.

How to Stay Safe: Don't make a habit of using proxies for all your Web surfing. Use them only to visit specific sites that your company blocks for productivity-related reasons -- say, YouTube. And watch your spelling.

* * *
4. HOW TO CLEAR YOUR TRACKS ON YOUR WORK LAPTOP

The Problem: If you use a company-owned laptop at home, chances are you use it for personal tasks: planning family vacations, shopping for beach books, organizing online photo albums and so on. Many companies reserve the right to monitor all that activity, because the laptops are technically their property. So what happens if your -- ahem -- friend accidentally surfs onto a porn site or does a Web search for some embarrassing ailment?

The Trick: The latest versions of the Internet Explorer and Firefox browsers both make it easy to clear your tracks. In IE7, click on Tools, then Delete Browsing History. From there, you can either delete all your history by clicking Delete All or choose one or a few kinds of data to delete. In Firefox, just hit Ctrl-Shift-Del -- or click Clear Private Data under the Tools menu.

The Risk: Even if you clear your tracks, you still face risks from roaming all over the Web. You could unintentionally install spyware on your computer from visiting a sketchy site or get your boss involved in legal problems for your behavior. If you're caught, it could mean (at best) embarrassment or (at worst) joblessness.

How to Stay Safe: Clear your private data as often as possible. Better yet, don't use your work computer to do anything you wouldn't want your boss to know about.

* * *
5. HOW TO SEARCH FOR YOUR WORK DOCUMENTS FROM HOME

The Problem: You're catching up on work late at night or over the weekend -- but the documents you need to search through are stuck on your office PC.

The Trick: Google, Microsoft, Yahoo and IAC/InterActiveCorp's Ask unit have all released software that lets you quickly search your desktop documents. On top of that, some will let you search through documents saved on one computer from another one. How does it work? The search company keeps a copy of your documents on its own server. So it can scan those copies when you do a search remotely.

To use Google's software -- among the most popular -- follow these steps on both your work and home PC. First, you'll need to set up a Google account on both machines by visiting Google.com/accounts. (Be sure to use the same account on both computers.) Then go to Desktop.Google.com to download the search software. When it's up and running -- again, do this on both machines -- click on Desktop Preferences, then Google Account Features. From there, check the box next to Search Across Computers. After that point, any document you open on either machine will be copied to Google's servers -- and will be searchable from either machine.

The Risk: Corporate technology managers offer this nightmare scenario: You've saved top-secret financial information on your work PC. You set up desktop-search software so that you can access those files when working from home on your laptop. Then you lose your laptop. Uh-oh.

Getting hold of your company's internal documents could give others insight into your plans, and losing certain information could have legal repercussions. In particular, myriad state laws regulate how a company has to react when it loses private information about customers or employees; most require notifying those people about the breach in writing. Sending those notifications can be costly for your company -- not to mention damaging to its reputation.

On top of that threat, researchers have found vulnerabilities in Google's desktop-search software that could let a hacker trick a user into giving up access to files, says Mr. Schmugar of McAfee. (Those vulnerabilities have since been fixed, but more could crop up, he says.)

Matt Glotzbach, product management director for Google Enterprise, says there are bound to be vulnerabilities in any software and that, to the best of his knowledge, none of the Google Desktop vulnerabilities were exploited by hackers. He adds that when Google finds out about a vulnerability, it quickly fixes it and notifies users.

How to Stay Safe: If you have any files on your work PC that shouldn't be made public, ask your IT administrator to help you set up Google Desktop to avoid accidental leaks.

* * *
6. HOW TO STORE WORK FILES ONLINE

The Problem: Desktop search aside, most people who often work away from the office have come up with their own solution to getting access to work files. They save them on a disk or a portable device and then plug it into a home computer. Or they store the files on the company network, then access the network remotely. But portable devices can be cumbersome, and company-network connections can be slow and unreliable.

The Trick: Use an online-storage service from the likes of Box.net Inc., Streamload Inc. or AOL-owned Xdrive. (Box.net also offers its service inside the social-networking site Facebook.) Most offer some free storage, from one to five gigabytes, and charge a few dollars a month for premium packages with extra space. Another guerrilla storage solution is to email files to your private, Web-based email account, such as Gmail or Hotmail.

The Risk: A bad guy could steal your password for one of these sites and quickly grab copies of your company's sensitive files.

How to Stay Safe: When you're thinking about storing a file online, ask yourself if it would be OK for that file to be splashed all over the Internet or sent to the CEO of your company's top rival. If so, go for it. If not, don't.

* * *
7. HOW TO KEEP YOUR PRIVACY WHEN USING WEB EMAIL

The Problem: Many companies now have the ability to track employees' emails, both on work email accounts and personal Web-based accounts, as well as IM conversations.

The Trick: When you send emails -- using either your work or personal email address -- you can encrypt them, so that only you and the recipient can read them. In Microsoft Outlook, click on Tools, then Options and choose the Security tab. There, you can enter a password -- and nobody can open a note from you without supplying it. (Of course, you'll have to tell people the code beforehand.)

For Web-based personal email, try this trick from Mr. Frauenfelder: When checking email, add an "s" to the end of the "http" in front of your email provider's Web address -- for instance, https://www.Gmail.com. This throws you into a secure session, so that nobody can track your email. Not all Web services may support this, however.

To encrypt IM conversations, meanwhile, try the IM service Trillian from Cerulean Studios LLC, which lets you connect to AOL Instant Messenger, Yahoo Messenger and others -- and lets you encrypt your IM conversations so that they can't be read.

The Risk: The main reason companies monitor email is to catch employees who are leaking confidential information. By using these tricks, you may set off false alarms and make it harder for the IT crew to manage real threats.

How to Stay Safe: Use these tricks only occasionally, instead of as a default.

* * *
8. HOW TO ACCESS YOUR WORK EMAIL REMOTELY WHEN YOUR COMPANY WON'T SPRING FOR A BLACKBERRY

The Problem: Anyone without a BlackBerry knows the feeling: There's a lull in the conversation when you're out to dinner or an after-work beer, and everyone reaches for their pocket to grab their BlackBerry, leaving you alone to stir your drink.

The Trick: You, too, can stay up to date on work email, using any number of consumer-oriented hand-held devices. Just set up your work email so that all your emails get forwarded to your personal email account.

In Microsoft Outlook, you can do this by right-clicking on any email, choosing Create Rule, and asking that all your email be forwarded to another address. Then, set up your hand-held to receive your personal email, by following instructions from the service provider for your hand-held. (That's the company that sends you your bill.)

The Risk: Now, not only can hackers break into your personal account by going online on a computer, they can also break into it by exploiting security vulnerabilities on your mobile device.

How to Stay Safe: There's a kosher way to access work email on some devices, by getting passwords and other information from your IT department.

* * *
9. HOW TO ACCESS YOUR PERSONAL EMAIL ON YOUR BLACKBERRY

The Problem: If you do have a BlackBerry, you've probably got a different problem: You want to get your personal email just as easily as work email.

The Trick: Look at the Settings area of your personal email account, and make sure you've enabled POP -- Post Office Protocol -- a method used to retrieve email from elsewhere. Then log in to the Web site for your BlackBerry service provider. Click on the Profile button, look for the Email Accounts section and click on Other Email Accounts. Then click Add Account and enter the information for your Web-based email account. Now your personal emails will pop up on the same screen as your company email.

The Risk: Your company probably uses a whole bunch of security technology to keep viruses and spies out of your files. When you receive personal email on your BlackBerry, it's coming to you without passing through your company's firewall. That means viruses or spyware could sneak onto your BlackBerry via a personal email, says Mr. Schmugar of McAfee. Worse yet, he says, when you plug your BlackBerry into your work computer, there's a chance that the malicious software could jump onto your hard drive.

How to Stay Safe: Cross your fingers and hope that your personal email provider is doing a decent job weeding out viruses, spyware and other intruders. (Chances are, it is.)

* * *
10. HOW TO LOOK LIKE YOU'RE WORKING

The Problem: You're doing some vital Web surfing and your boss turns the corner. What do you do?

The Trick: Hit Alt-Tab to quickly minimize one window (say, the one where you're browsing ESPN.com) and maximize another (like that presentation that's due today).

The Risk: The good news is that there are no known security risks.

How to Stay Safe: Get back to work.

http://online.wsj.com/article/SB118539543272477927.html?mod=todays_us_the_journal_report
    There are several problems with this article
  • Wallstreet Journal is for wallstreet not h4ck3rs 4 dummies.
  • The wallstreet articles should be professional and not a guide how to circumvent your companies internal security measures.
  • It is not good advice to put confindential files up on a website for download.
  • A person who wants to keep their job should not upload their companies files to a third party website for searching while they are at home with out permission by their employers.
  • Some of these "hints" could lead to violations of the Sarbanes Oxley act. Sections 302(a)(4) and 404 require a public company to make disclosures and certifications to the Securities and Exchange Commission regarding the company's system of internal controls.

I think WSJ should stick with Wallstreet.






Posted by TJ on Friday July 27, 2007 @ 12:27 PM
[Tags: amazon, shopping, personal]

I do a lot of shopping online because I hate stores. Today I decided to see exactly how much I spend at my most common online stop... here's the list

2006
KRZR USB Cable22.95
Bluetooth-Headset49.99
Sweater17.89
Sims 2 (gift)25.82
Tommy Hilfiger Belt19.99
Nautica Polo27.89
Ethernet card17.99
Kenneth Kole shirt29.90
Polo16.89
Polo8.89
Geoffrey Beane Dress shirt29.99
Izod Dress shirt9.88
Geoffrey Beane Dress shirt11.25
Geoffrey Beane Dress shirt11.25
Geoffrey Beane Dress shirt11.25
Norelco Elec Shaver30.75
Logitech Mouse12.90
Skagen Watch73.00
MVP Baseball29.99
Tools:Level5.94
Utility Knife9.99
Plier Set13.96
------
Total$488.35

2007 (Through July 27th 2007)
iHome clock Radio99.99
Monitor Cleaning Wipes7.75
Wired Magazine Subscription5.00
Bike Rack99.99
PC TV-Tuner49.99
------
Total262.72


I got some pretty good deals on name brand items. You can too by using the Amazon Deal Finder Here

Amazon Deal Finder




Posted by TJ on Wednesday July 25, 2007 @ 03:11 PM
[Tags: internet, software, guide]

I am going to do a reinstall of my computer and started making a list of all the programs I need to reinstall once I am ready. Not all of these I use as I added some programs I intend to use or other suggestions that may be useful for others but not for me.

Thanks to the SAforums and Steve for letting me know about these programs.

Paint.Net
- a free Adobe Photoshop alternative
Firefox - better alternative to internet explorer
Gmail notifier - for gmail users, alerts you when you have new Gmail messages.
OpenOffice - replaces Miscrosoft Office
PuTTY - SSH and telnet
Rainlendar - a neat little desktop calendar
FileZilla - the full-featured FTP client
Process Explorer - - replacement for windows task manager
Startup Control Panel - Configure which programs run when your computer starts.
Startup Monitor - monitors changes to your startup program list
Thunderbird - email client, to replace outlook
GAIM - AIM without ads
ISORecorder - powertoy to burn CD and DVD images; create an ISO from any folder.
ckrename - batch file renamer
launchy - enter in the name of an application and it finds it.
Weather Watcher - Weather in your system tray - I do not use this program but this may useful for those looking for something like this.. as this one does not contain spyware/adware like most of them do.
Irfanview - Awesome image viewier (crop/resize/rotate)
Webmon - A program that will monitor a webpage and notify you when it changes
Dscaler For those who have a TV tuner installed this is the program to watch it with.

Security/Cleaners
Spybot S&D - Search and destroy adware and spyware from your computer
CCleaner - alternative to Windows Add/Remove, clean logs/cache's and temporary files
CORE FORCE R0.95 - replaces Windows Firewall
Avast! Antivirus - Best antivirus scan
Erasure - Deleting files in windows leaves traces left on your harddrive, this program really deletes those traces


Media Players
Media Classic Player - Light Weight DVD and media player
GOM Player - play media files
VLC Player - http://en.wikipedia.org/wiki/Comparison_of_media_players (same as GOM but not as nice interface)

Firefox Add-Ons
Web Developer Toolbar
FireBug
Adblock
Flashblock
NoScript

Steve, have any to add? (Other than Linux)




Posted by TJ on Monday July 23, 2007 @ 04:04 PM
[Tags: taxes, guide, accounting]

Here is how your Taxes work out in a very summarized manner.


+ Income
Earnings from wages, dividends, interest, capital gains

- Less: The greater of the Standard or Itemized Deductions
Here's where you can deduct Medical, State Income and Property taxes, business expenses, and mortgage interest

- Less Dependency Exemptions (in 2006 this was $3,300 per dependant)

= Adjusted Gross Income (AGI)

X Tax rate

= Tax Liability

- Less Tax Credits (Foreign tax credit, Child and dependant care expenses, education credit, child tax credit)

- Less Withholdings during the year

= Total Due (refund)



This formula should help resolve a couple misconceptions about your income tax including:

Misconception #1 All tax deductions are a direct deduction of my tax liability - This is not the case. Most tax deductions are 'above the line' deductions which means they reduce the amount of income subject to tax. A tax credit only reduces the amount of tax you pay dollar-to-dollar.

Misconception #2 Tax refunds are a good thing - not necessarily. A tax refund is an interest-free loan to the goverment. A tax refund does not reduce the tax you pay during the year it only effects the time you pay it. If you owe money at the end the year, this means, that you did not withhold enough from your paychex during the year, if you get a refund you withheld too much taxes during the year. If you are good with savings, a refund means that you lost out on the interest that refund would of earned had it been in your bank account the whole year.



Disclaimer: Any tax advice included in this written or electronic communication was not intended or written to be used, and it cannot be used by the taxpayer, for the purpose of avoiding any penalties that may be imposed on the taxpayer by any governmental taxing authority or agency.




Posted by TJ on Wednesday July 18, 2007 @ 02:49 PM
[Tags: tv, opinion, guide]

Here is my take on the various Late Night Talk Shows.
I dedicate this to the late Tom Snyder who died on July 29, 2007 from complication with leukemia. Snyder was one of early pioneers of late night talk shows with "Tomorrow" in the 80's and 90's and was host of the CBS's The Late Late Show in 1990's.

CBS - The Late Show with Dave Letterman
I find Letterman extremely funny. Being from NY definitely makes his show even better to watch as he frequently does local stuff involving the city and surrounding area. Dave has a way of making ordinary people into comic geniuses as he has done with stage manager Biff Henderson, Handyman George Clark and Deli owner Rupert Jee, these sketches are what make the late show original and funny. What I do not like about the show is the numerous pointless unfunny skits that are done from time to time like "will it float?" , stump the band, and "Is this Anything", and most of Alan Kaulter's skits. Dave's show is well known for the Stupid Human Tricks and the Top Ten list.

NBC - The Tonight Show with Jay Leno
This is most watched late show and has surpassed the late show every year since the 90's. I am not sure why as I don't really find Jay funny. He gets old ripping on the band leader Kevin Eubanks. I find that the writers for the show aren't that good as his jokes often get no laughs and Leno is not that great with covering it up. His most popular feature is headlines on Monday and this a rip off of David Letterman's skit "Dumb Ads" that Dave introduced in the 80's. Yes that is right, Leno is actually ripping off Dave, not as you may have thought as Letterman re-introduced this skit under the name "Small Town News" in 2004 to compete with Leno's segment.

CBS - The Late Late Show with Craig Ferguson Craig's Gig is "Let's repeat the same sayings every episode that make people laugh" This is how a normal episode of CBS late late show goes. 1. Craig Ferguson enters saying to the audience "Enjoy the show, sit down , lay down...take off your pants." 2. Craig opens email bag tell audience to email him at "Craig@internet........com" 3. Craig Calls voice mail and pertains to dial 10,000 numbers just to get to his voice mail as if this demands laughter every single time. I do not know how people can watch his show every day with out getting annoyed at the amount of the stuff he repeats each day. I get tired of it after watching twice in a week. This show would be funny if it didn't have the repetitive crap.

NBC - Late Night with Conan O'Brien When I heard that O'brian was replacing Leno on the Late show in 10 years (less now) I was not that excited. Conan to me was the combination of "Let's act stupid and people will laugh" and "Lets make of fun of myself so people laugh". However Conan has some great monologue's and skits and they never get old.

Last Call with Carson Daly, NBC There is nothing much to say about this show. When I watch him he always look as if he doesn't even know why he's there, and with good reason. The show does not have much content and Carson is just so bleh. The only good thing about this show is it pulls in some good music talent.

The Daily Show with Jon Stewart, Comedy Central I think Jon Stewart is great and I'm not sure why but I do not watch his show much. I think a lot has to do with the fact his show is on Comedy central and not a major network. His show is more geared toward turning current news into humor and does a great job at it! I feel Stewart would make a great replacement for Letterman.



< Previous Page | Next Page >