April 20, 2009

Twitter Windows Command Line Client


  1. Extract the contents of the Twitter CLI.zip file into your Windows folder, which is located at:
  2. Open the Twitter.bat file in Notepad (right-click, then choose Edit) and enter your Twitter user name and password in the appropriate fields:
    set username=YourTwitterUserName
    set password=YourTwitterPassword
  3. Save the file and close Notepad.

Update Twitter Via Command Line

Now you are able to Tweet via your Windows Command Line:

  1. Hit the Windows Key+R
  2. Type in the following:
    twitter ""
    Enter your status between the quotes.
  3. Hit OK or the Enter on your keyboard.

December 19, 2007

Unified Communications

Unified communications encompasses all forms of call and multimedia/cross-media message-management functions controlled by an individual user for both business and social purposes. This includes any enterprise informational or transactional application process that emulates a human user and uses a single, content-independent personal messaging channel (mailbox) for contact access.


Unified communications has repeatedly been the center of many discussions involving the future of communications. Unified communications encompasses a broad range of technologies and many potential applications. It is important to note that it is still in its infancy and many definitions have been used by the messaging industry. This tutorial will present one view of unified communications and present its appeal as a powerful mode of communication. The benefits to subscribers will be discussed along with considerations for service providers and the ways in which they will benefit from unified communications.


1. The Concept of Unified Communications


The essence of communication is breaking down barriers. In its simplest form, the telephone breaks distance and time barriers so that people can communicate in real time or near real time when they are not together. There are now many other barriers to be overcome. For example, people use many different devices to communicate (wireless phones, personal digital assistants [PDA], personal computers [PC], thin clients, etc.), and there are now new forms of communication as well, such as instant messaging. The unified communications concept involves breaking down these barriers so that people using different modes of communication, different media, and different devices can still communicate to anyone, anywhere, at any time.


Unified communications encompasses several communication systems or models including unified messaging, collaboration, and interaction systems; real-time and near real-time communications; and transactional applications. Unified messaging focuses on allowing users to access voice, e-mail, fax and other mixed media from a single mailbox independent of the access device. Multimedia services include messages of mixed media types such as video, sound clips, and pictures, and include communication via short message services (SMS). Collaboration and interaction systems focus on applications such as calendaring, scheduling, workflow, integrated voice response (IVR), and other enterprise applications that help individuals and workgroups communicate efficiently. Real-time and near real-time communications systems focus on fundamental communication between individuals using applications or systems such as conferencing, instant messaging, traditional and next-generation private branch exchanges (PBX), and paging. Transactional and informational systems focus on providing access to m-commerce, e-commerce, voice Web-browsing, weather, stock-information, and other enterprise applications.

2. Benefits to Subscribers



Today's subscribers live in multiple networks (see Figure 2). More and more subscribers belong to numerous electronic communities and have an ever increasing number of innovative communications devices to choose from, whether it is a mobile phone, PDA, pager, hand-held computer, or a wireless application protocol (WAP)–enabled device. With a wide range of services and devices at their disposal, greater demands are being placed on the subscriber in they way they manage their communications. Today's busy consumers want an intuitive, easy-to-use method for unifying their communications.


Unified communications provides control for the individual user. It can help to send and receive messages, whether they are voice, e-mail, or fax. It also will notify the user whenever mail arrives. The concept of notification is becoming a large part of messaging. Some people want to be reached at all costs, anywhere, at any time. Whether they are at home or on vacation, they want to be notified of messages. Others are more protective about their privacy. They do not want to be reached, for example, when they are sleeping or having dinner. Unified communications technology provides the power to reach people almost anywhere, at any time, and provides the flexibility to allow people to control when they can be reached. Subscribers can interface with messages how and when they want.


With unified communications, subscribers reduce the number of places they must check for incoming voice, fax, e-mail messages, and other media types. From a single interface, they can check for all messages.


Evolution to Unified Communications
A natural evolution in application value, which has built upon available technologies, has occurred in messaging (see Figure 3). Technologies exist that enhance the integration of voice mail and e-mail, such as text-to-speech software that converts e-mail into spoken words. For example, at the airport, a user could call in on a phone and hear e-mail messages, making it easy to reach important decisions without delay. Other enabling technologies, such as speech recognition, are becoming more reliable and cost-effective. For example, people who drive frequently will find speech recognition a particularly convenient interface, especially if it is used to dial numbers or navigate menu options.


Easy-to-use user interfaces are essential to accessing the unified mailbox. Whether from the phone or from any Internet-enabled device, the subscriber can navigate through a unified mailbox with ease and full control at all times (see Figure 4). Checking e-mail from the phone becomes intuitive, and, likewise, hearing voice messages from a PC becomes second nature.

Unified communications can be used as a business tool as well. It can provide efficient business communication or act as an interface to a 24-hour storefront. People can use the phone to get information or to make transactions. They can purchase merchandise or trade stock without talking to a live person. With the emergence of new technology, especially the Internet, the 24-hour storefront has flourished. More information can be accessed and more shopping can be done than ever before.


Understanding the needs of the diverse market segments is essential to the success of deploying unified communications to a market. By mixing and matching various unified communications applications, service providers can increase market penetration, maximize revenues, and stimulate interest for more unified communications functionality.


The Messaging-Savvy Subscriber
The premium-class subscriber will be one of the first to adopt fully enhanced unified communications. Whether these subscribers are heavy corporate messaging users or small office/home office (SOHO) business entrepreneurs, with unified communications they have a means of saving time and increasing productivity. With text-to-speech and automatic speech-recognition technology, subscribers are able to navigate through voice portals and to access a variety of information and message content from any phone. Using standard voice protocols, they are able to hear their voice messages on a PC or other devices. Future services can tie even more applications into the unified mailbox. Consumers can have their unified mailbox become a personal agent, sending personalized information and notification preset by the subscriber. Other capabilities include the ability to look up contact information in a wide variety of contexts, whether the information may be located in personal, corporate, or worldwide directories. For example, the traveling salesperson who may be delayed at an airport is still able to stay in touch and conduct business with the office and clients. With unified communications, the salesperson is able to check voice messages, e-mail, and faxes, conduct transactions with corporate enterprise servers, have access to calendars and scheduling, all from the convenience of a wireless phone, Web portal, or PDA.

July 28, 2007

System Administrator Appreciation Day

July 27th, 2007 (Last Friday Of July)
th Annual
System Administrator Appreciation Day

If you can read this, thank your sysadmin

A sysadmin unpacked the server for this website from its box, installed an operating system, patched it for security, made sure the power and air conditioning was working in the server room, monitored it for stability, set up the software, and kept backups in case anything went wrong. All to serve this webpage.

A sysadmin installed the routers, laid the cables, configured the networks, set up the firewalls, and watched and guided the traffic for each hop of the network that runs over copper, fiber optic glass, and even the air itself to bring the Internet to your computer. All to make sure the webpage found its way from the server to your computer.

A sysadmin makes sure your network connection is safe, secure, open, and working. A sysadmin makes sure your computer is working in a healthy way on a healthy network. A sysadmin takes backups to guard against disaster both human and otherwise, holds the gates against security threats and crackers, and keeps the printers going no matter how many copies of the tax code someone from Accounting prints out.


A sysadmin worries about spam, viruses, spyware, but also power outages, fires and floods.

When the email server goes down at 2 AM on a Sunday, your sysadmin is paged, wakes up, and goes to work.

A sysadmin is a professional, who plans, worries, hacks, fixes, pushes, advocates, protects and creates good computer networks, to get you your data, to help you do work -- to bring the potential of computing ever closer to reality.

So if you can read this, thank your sysadmin -- and know he or she is only one of dozens or possibly hundreds whose work brings you the email from your aunt on the West Coast, the instant message from your son at college, the free phone call from the friend in Australia, and this webpage.

Show your appreciation

Friday, July 27th, 2007, is the 8th annual System Administrator Appreciation Day. On this special international day, give your System Administrator something that shows that you truly appreciate their hard work and dedication.

Let's face it, System Administrators get no respect 364 days a year. This is the day that all fellow System Administrators across the globe, will be showered with expensive sports cars and large piles of cash in appreciation of their diligent work. But seriously, we are asking for a nice token gift and some public acknowledgement. It's the least you could do.

Consider all the daunting tasks and long hours (weekends too.) Let's be honest, sometimes we don't know our System Administrators as well as they know us. Remember this is one day to recognize your System Administrator for their workplace contributions and to promote professional excellence. Thank them for all the things they do for you and your business.

Spread the word

These icons link to social bookmarking sites where readers can share and discover new web pages.


The People



The Hardware



The Horror


July 18, 2007

Laptop Security Basics

There are some rudimentary steps that you can take to prevent your laptop from being stolen.

Use the features of your operating system

If you have chosen an operating system that has in-built security features (Windows 2000 Professional and Windows XP Professional are examples) then do not be afraid to use them. Features may include secure logon, file level security, and the ability to encrypt data.

Use the BIOS password

It would be unwise not to protect the BIOS. Find out whether the BIOS will also protect the hard disk drive to stop it from being used in another machine. Another tip is to find out what the procedure is for resetting the BIOS password. If it has to be sent back to the manufacturer, so much the better, as that will afford some protection, as a thief is unlikely to do that. Some will offer an in-the-field work around, which might make it attractive to a thief.

Your laptop's serial numbers

It is written down, right? And stored in a safe place? Good. That will help the police return it to you should it ever be recovered by them.

Use some form of permanent marking on the laptop

Engraving your company name on the case of the laptop with an address or contact number, or both, may increase the likelihood of getting the laptop returned to you if it is stolen and recovered (or, if by some accident, you forget it). Commercial asset tags are also a great aid to the police to return the laptop to you. It may also serve as a deterrent to the casual thief if the choice is between stealing a marked laptop or an unmarked laptop. Why? They cannot sell it using an online auction so easily. Also, travelling through airport security means that someone is also less likely to pick up your laptop accidentally. Information freely available on the Web suggests that 97% of stolen laptops are never recovered.

Use the manufacturer's registration scheme

Most people ignore registration because they think that it is likely to lead to spam. However, remembering that thieves are usually not smart, one might be unintelligent enough to send it in for service or to reset the BIOS, so having it registered with the manufacturer might prove valuable if you alert them to the fact that it is stolen.

Cable lock

Most laptops have a Universal Security Slot (USS), also known as a Kensington Security Slot (sometimes referred to as a K-slot or Kensington Slot). Will it stop bolt cutters? Unlikely. Will it stop a casual thief that just happened to be walking past your hotel room while room service had propped the door open, and then gone off to get more towels? Probably. And make sure to secure it around a strong, immovable, indestructible object. Also use it in the office. What percentage of laptop thefts occur in the office? (See below for answer).

Docking station

Use a docking station that is securely fastened to your desk. If it also allows you to lock the laptop in place, so much the better. This is especially important if you are leaving the laptop overnight, or longer. Better still, lock it in a strong cabinet if at all possible.

Personal firewall

Use a third-party firewall to prevent hackers from hacking into your laptop, and maybe into the company network. If you do disable it for any reason, do not forget to turn it back on.


If your laptop has this capability, then familiarize yourself with them and then use them. Your fingerprint can be your logon ID in place of a password.

Tracking software

There are companies that offer tracking software, allowing your laptop to regularly ping a tracking center with a signal that allows it to be traced. If the laptop is stolen the company will work with law enforcement to trace your laptop.

Laptop case

It might look chic to have the latest designer laptop case or manufacturers case, but nothing sends out a better signal to a thief than an ostentatious display, which may include your company logo, elite looking luggage tags, your business card embossed in plastic that gives a thief a clue as to the likely worth of the contents. There are nondescript backpacks that have padded sleeves to hold a laptop safely. A backpack is useful for going to the restroom without having to put your case down. For the ultra-security conscious, buy little padlocks to lock the zips so that no-one can get into the backpack quickly, steal the laptop, and then zip it back up again.


Make them a combination of numbers and letters so that they are harder to crack. Do not leave the password on a Post-It on the laptop (it does happen).


Always encrypt sensitive, personal, confidential data and leave the password with a trusted source if you need to. If you do not know how to encrypt files, then learn.

Back up your hard drive

At the very least, back up your hard disk drive before you travel.


December 26, 2006

The Year Ahead: Tech Predictions For 2007

What's ahead in the world of technology in 2007? No one can say for sure, but that doesn't make the tradition of making predictions any less enjoyable. More than many other areas, technology is all about transition. And the year ahead promises transitions in tech that are nothing short of dramatic.

-- Windows Vista uptake slow

Microsoft's much-ballyhooed Windows Vista operating system will be available to everyone early in 2007, but don't expect the earth to move when it's released.

People are tired of upgrading - especially when the benefits of doing so are difficult to articulate or uninspiring. That's the problem with Microsoft's Vista operating system in a nutshell.

When you hear talk of Vista, the focus is on a pretty new interface. Is that enough to tempt the masses to disrupt their current setup and face the inevitable incompatibilities and loss of productivity that switching to Vista will entail? It's a tough sell - except to those who enjoy technology for technology's sake. For the rest of the population, though - those who actually use computer to accomplish tasks - Vista is a yawner.

--- Spyware and malware

Forget computer viruses. The real threat to your productivity in 2007 and beyond will be spyware and malware, which will come at you from every corner of the Internet and threaten to slow your work to a halt - not to mention steal your identity and financial account information.

The antivirus software makers, focused as they are on traditional computer viruses, have been slow to respond - and when they have, their solutions have fallen short. So currently users are forced to rely on a smattering of programs like the free Ad-Aware that root out these Internet-borne threats. Expect the spyware problem to get worse before good tools come along to fix the mess.

--- Spam under control

Spam won't be going away in 2007 - far from it. One recent report indicated that spam now accounts for over 90 per cent of all e-mail messages that e-mail users receive.

But because spam catching technologies are becoming close to fool- proof, you'll probably see less spam if you take reasonable measures to circumvent it. And even if you don't, the amount of spam that reaches your inbox should decline in 2007. That's because e-mail authentication technologies used by Internet service providers have changed for the better how spam is identified. And once spammers are identified, the strict policies in place at most service providers can be used to clamp down on spamming activities.

--- User-based content is king

Traditional news media are already reeling, trying to cope with the loss of readership and ad revenue as the sources of news and information proliferate on the Internet. Google's YouTube and the myriad blogging sites around the Internet have put individuals in control of "creating" news and information of interest to the public. You can expect such sites to continue to gain popularity in 2007, further intensifying the competition for readers' time.

--- Wi-fi gets serious

The dream of "Internet everywhere" is going to come a good deal closer to reality in 2007, as the global rollout of wi-fi hotspots picks up steam. Offering wireless Internet connectivity is good for everyone - for municipalities whose citizens benefit from it, for businesses that attract customers and good-will by offering it, and certainly for the roaming masses that use it.

On the home front, wi-fi products that conform to the new, speedy 802.11n wireless transmission standard will hit the market, offering wireless speeds that truly rival today's wired networks.

--- It's all about the Web

As Internet connectivity becomes ubiquitous, the Internet itself will be host to more of the applications we use on a daily basis. 2007 will see the clear emergence of that trend. Web-based word processors, spreadsheets, collaboration tools, wikis, blogs, and user-generated applications will begin to blur the distinction between what's on our PCs and what's on the Web. Already Google has trotted out a host of Web-based office applications. Expect to see other companies follow suit.

--- No clear winner in HD-DVD and Blu-Ray wars

Right now in the world of video and television, it's all about high definition. But whose version? That's the question. Right now when it comes to high-def DVDs, there are two competing standards: HD-DVD, championed by Toshiba and others, and Blu-Ray, championed by Sony and others. Only foolhardy consumers with lots of money are choosing sides at this point - since DVD players that use either standard are expensive and, of course, not compatible with the other standard.

In 2007, expect no clear winner to emerge out of this battle of standards. The reason: the highly available and reasonably-priced "upconverting" DVD players, which take today's DVDs and upsample them for the high-def televisions, are plenty good enough for most people. That leaves the high-def DVD standard bearers fighting it out for a public that is increasingly apathetic about who emerges victorious.

If the battle between HD-DVD and Blu-Ray goes on long enough, another solution or option altogether is likely to emerge to make the standards war meaningless.

By Jay Dougherty, Dpa