Browse Category


approximately 50,000 books existed in Europe

A historical perspective on content.
A historical perspective on content.
In Europe before the 1450s, books were precious, rare objects and were usually copied by hand over a period of months or years.
Johannes Gutenberg and his printing press changed the economics of information distribution.
The result of this change was less expensive books, greater literacy, and a challenge to those in power, who benefited from restricting information .
Today, the rise of the Internet has eliminated distribution costs as a barrier to entering the publishing market.
With minimal equipment, anyone can publish in a blog or book, record and distribute a podcast, or deliver video content.
What do these changes mean for technical communication .
And what lesson can we learn from the changes that took place over 400 years ago.
In the last 20 years, the economics of information have shifted toward the author and away from the publishers (or gatekeepers): It’s possible to record high-quality audio and video with inexpensive equipment.

The Internet provides numerous publishing platforms (Blogger

WordPress, YouTube, Lulu, Amazon, iTunes, and so on).
The possibilities are endless: books, ebooks, PDF files, web content , screencasts, podcasts, digital videos, wikis, and more.
But which of these platforms will succeed.
The text cycle.
To understand the implications of digital publishing, it’s helpful to break down the process of information development.

Terje Hillesund developed a text cycle1 with the following phases: Writing (authoring)

Re presentation .
Reading (consumption).
Traditional storytelling combines all of these phases into a single event: one person at the campfire telling a story while the audience listens.
The written language separates distribution and consumption.
Instead of needing an author to deliver the story in person, written content can be moved from one location to another.
The printing press introduces further separation of the phases by disconnecting production (formerly hand-copying) from distribution.
It becomes possible to produce a page once and create many, many copies of that page.
Digital content allows further separation.
Physical distribution is no longer required, and the representation (formatting) of the text is separated from the production (markup) and potentially from the storing (content management system).
Quality versus cost.
The printing press, which made inexpensive books possible, did require a compromise in quality.
Hand-crafted, hand-copied books, with their carpet pages, intricate capital letters, and unique illustrations (often customized for the person who commissioned the book) were works of art.
The earliest printed books were hand-illuminated after the printing process, but this added effort gave way quickly to mass-produced books.
The ability to produce books faster and cheaper was more compelling than the increased quality resulting from extra manual work.
Before the printing press, the act of copying the book also created the formatting.
With the printing press, the formatting was done in a separate typesetting step, and it was then possible to create a large number of copies from a single formatting effort.
Today, the publishing world sits at a very similar inflection point.
The rise of electronic publishing along with the ability to separate authoring from formatting is analogous to the rise of printing and the ability to separate formatting from distribution.
Just before the printing press (1450), approximately 50,000 books existed in Europe.
Within 50 years, that number rose to 12 million.2 The rise of books in Europe after the printing press What are the implications for technical content?.
The rules of publishing, which were relatively static for hundreds of years, are now changing by the day.
Consider that iPad tablet publishing did not exist until 2010.

The Kindle reader (2008) drives a brand new ebook business

We can expect to see increases in publishing velocity, volume, and versioning requirements.
And based on the way that printing evolved, we can expect that economic considerations will determine which innovations succeed.
With this in mind, expect the following developments: Streamlined publishing workflows Given the proliferation of output formats, the publishing workflow must be automated.
Labor-intensive final production work will likely disappear.
Like hand-illumination, these tasks add quality, but they obstruct efficiency.
For technical content, efficiency will outweigh perfect kerning, copy-fitting, and other design niceties.
Data-driven, user-customizable graphics Highly designed infographics and other complex images will remain the domain of the professional author for now.
To reduce the cost of maintaining (and especially translating) these graphics, authors must use layers and carefully separate the core graphic elements from the labels that require translation.
There is room, however, for growth in graphics that readers can manipulate or create.
If we make the data available to our readers, they can choose how to display the information (bar graph or pie chart?), filter the information displayed on the chart, and control the colors and the fonts used in the chart.
Google Analytics and many web-based application dashboards provide users with ways to manipulate data.
Technical communication needs to make better use of these types of technologies and provide flexible ways to render information.
Instead of focusing on controlling the presentation of graphical information, we can build information applications that the reader can control.

Limited use of audio and video If we apply Hillesund’s text cycle to audio and video

we can see why audio and video are not (yet) going to take over from text.
The components of the audio and video development cycles are not yet separated as clearly as the text development components.
In particular, when audio or video is recorded, the content storage and representation are tied together.
These two facets need to be separated to provide for really inexpensive (and therefore widespread) usage.
A basic example where storage and representation are separated is text-to-speech functionality, which has the ability to render audio in a voice chosen by the end user, rather than in the audio track laid down by the author.
But the vast majority of audio files use sound recordings, where the content is inextricably tied together with the delivery.
There are similar issues with video.
Exceptions are screencasts and digital animation, where the source files have layers and timelines, which content creators can manipulate as needed.
But today, we do not have the same degree of separation of content and formatting for audio and video as we do in text and graphics.
We can’t slice apart audio and video the same way that we manipulate text.
Velocity, volume, and versioning.
Velocity, volume, and versioning are the three Vs that drive the economics of information: Velocity: the speed at which new information is created and delivered.
Volume: the amount of content that needs to be created and delivered.
Versioning: the content variations that need to be supported for end users.
The requirements for the three Vs are pushing organizations to fully automate their workflows to eliminate delays in information delivery.
Velocity and volume are also implicated in the rise of topic-based authoring.
When authors work at the topic level, it’s easier to move authors from project to project and therefore put additional people to work on high-priority projects.
This is much more difficult in narrative or book-based content.
Like velocity and volume, versioning requirements are increasing.
Instead of creating a few manageable versions of content, technical communicators are being asked to support products that have dozens or hundreds of variations.
The only reasonable solution with the higher number of versions is to deliver all of the content, and then filter it based on a user’s profile.
This requires an excellent understanding of the product and (again) complete automation of the rendering process.
High-end versioning probably means that the content objects need traceability—they need to be connected to the corresponding product functions, so that the system can include the appropriate information for each user.
It’s worth noting (again) that the three Vs apply mainly to text and somewhat for graphics.
Search and navigation.
Information is valuable only if users can access it.
For books, we have standard conventions: a table of contents at the beginning of the book, an index at the end, and page numbers for navigation.

We also know that a book in English is read from left to right

Chapter title pages, headings, and caption for figures and tables are all instantly recognizable because we have been exposed to them since primary school.
For newer electronic information products, search and navigation are even more critical—“flipping through the book” is really not viable online—but the user experience is not yet unified.
The behavior of an EPUB file depends on the capabilities of the reader in which it is being displayed.
Content displayed in the iBooks app on an iPad tablet The same EPUB file renders differently on a NOOK reader.
Content displayed on a NOOK reader Adobe Digital Editions provides yet another variation.

Content displayed in Adobe Digital Editions For content creators

this introduces a lot of headaches.
For example, consider an interactive, multimedia-rich ebook.
In this context, what is the equivalent of a page number.
What if the rendering and the page numbers are different on different devices.
In addition to navigational issues, there are search challenges.
How will users find the information that they need.
Search provides a partial answer, but even the most carefully crafted search string may result in an overwhelming list of results.
Search with filters (faceted search) and social search (results that are influenced by the searcher’s social network) can make results more manageable.
Faceted search (left) and social search (right) 1 In this context, “text” includes graphics and other content types.
2 « PreviousNext » 1 comment.
Cancel reply.

Name Email This site uses Akismet to reduce spam

Perils of DITA publishing, part 7: the displeasures of distributing ebooks « Content Curated By Darin R.
McClure & a few photos says: October 15, 2012 at 7:47 pm […] devices and apps can be staggering.
Check out these two samples Sarah O’Keefe and I put in Content Strategy 101 to illustrate this issue: EPUB in iBooks app on iPad EPUB on NOOK […] Reply.
A historical perspective on content.

Through the IoT device communicating with the service desk

Tag Archive | ioe January 23, 2017 by Computacenter.
Leave a comment.

Gearing up your Organisation for the Internet of Things

Picture this – your alarm clock goes off, you reach across the bed and take a look at your phone; it’s woken you up 30 minutes early – why.
Well you have a meeting at 9:30am, but your car is running low on fuel so filling up will take 15 minutes, and traffic is a little worse than normal, so it will take an extra 15 minutes to get to the meeting.
Welcome to the Internet of Things (IoT) a world where your phone can play your day ahead and your fridge knows when it’s running dry and orders the groceries itself.
IoT has captured the imagination of industry visionaries and the public for some time now; devices sending and receiving data, opening the door to a futuristic world previously the stuff of science fiction.
As the cities we live in grow into digital ecosystems, the networks around us will connect every individual device, enabling billions of new data exchanges.
Industries will enter a new era, from medical devices that talk directly to medical professionals, to the emergence of smart homes that manage themselves efficiently, ensuring energy usage is checked and bills paid on time.
In the workplace it’s equally easy to see the potential advantages of the connections between devices, from intelligent service desk support through to printers, computers and other devices interacting with each other to deliver tangible user and business benefits.
The service desk is a key component for businesses in the digital age, acting as a communication hub for IT issues, a reference point for technology requirements and a tool for asset visibility.
Organisations must ask themselves if their current service desk has the technological capacity and capability to manage the multitude of device and operational data in an efficient manner.
An intelligent service desk can be the lifeblood of IoT implementation within businesses and enable automation to be realised.
A connected printer in a business ecosystem, for example, could effectively self-serve its own peripheral needs and order its own supplies when needed.
However, the management of that data, effective registration and logging of the incident, as well as notification to the financial and technical teams would not be possible without an intelligent service desk – especially when you elevate this to an enterprise scale, with possibly hundreds of connected printers or devices.
When discussing the “connected office”, IT managers will understandably raise concerns around security.
The more devices that are connected, the further the periphery is pushed, increasing potential entry points there are into a network.
An intelligent service desk will enable whitelisting to be integrated into communication protocols.
This is a process which gathers and groups trusted individuals and their devices into a known category.
This will enable any unusual requests from either IoT enabled devices or employee requests to be automatically flagged and questioned before action or access is given.

It is in this scenario that IT managers can reap the benefits of IoT

service desk and employee synchronisation.
Through the IoT device communicating with the service desk, the service desk effectively managing all end points and the employee working in tandem with the service desk software, the minimisation of internal security risks can be achieved.
While much of this sounds quite out of reach.

The benefits of IoT and service desk communication are already evident today

through use cases that are currently very fluid, personalised and often driven by an imaginative use of existing and sometimes emerging technology.
Peripheral IT product vending machines holding keyboards and mice, for example, allow the realisation of this relationship to be seen.

With so much data being transferred and the IoT still very ‘new’

there are a number of challenges, the most critical being visibility of assets connected and operating under the network.
Communication between all end points and visibility should be fundamental considerations when planning for an IoT based implementation.
Intelligent service desks, that can enrich the IT support experience as well as integrate and communicate with the business ecosystem, can host the technology capability to have oversight, communication and visibility of device end points communicating with a network.
While this may appear to be a straightforward concept, often enthusiasm to implement and complexity of service desk and technology transformation has a tendency to drown out and bypass the fundamentals – leaving potential backdoors open.

To ensure that there is a holistic approach toward securing connections with the IoT

organisations must challenge all stakeholders (vendors, integrators and consultants) to apply secure IoT principles to the service desk solution and IT operational unit, right from the “drawing board” phase.
January 7, .

2016 by Colin Williams

Leave a comment.
2016 – Time to act as the stage is set – but tackle the “elephants” first.
Happy New Year and may 2016 be your most successful and effective yet.
It’s the time of year where every analyst, strategist and technologist delivers a number of market or technology based predictions for the year.
In reality they are educated guesses because no one really knows what will happen, but the activity is essential (and one you should personally undertake) because it ensures you have an outward focus (external focus) that is as fundamental to your business success (or at least viable) as your internal view.

And best of all with market predictions

they are not guarantees of change as they are based on all of the indicators, assumptions, dependencies or guesses remaining consistent.
Over the coming months I will share three 2016 perspectives for the Security, Networking and Digital collaboration (UC in old school terms) marketplaces.
The views are my own but leverage extensive market and customer research most notably based on real world customer dialogue and challenges through 2015.
The Security challenge in 2016 could be the back breaker the industry is currently dreading.
There are numerous forces and events that will ensure 2016 requires so much business change (positive change) that the door will be widened to any party focused on attacks and breaching defences.  There are numerous (too many to actually affect or process) security related impacts that any forward thinking enterprise must consider through 2016 – many are documented heavily within industry white papers and vendor solutions updates.
However I will concentrate on six, a few common, others not that are currently giving me most food for thought as I work on strategies for 2016.
The relentless rise of the mobile enterprise (Mobility):  Mobility delivers one of the most acute security challenges today.
The mobile worker, enterprise, user is no longer a fad or a secondary persona – it is the norm for many enterprises and will ultimately become the norm for all.
Driven via the smart device (most commonly a phone) bonded permanently to the hand of many a user and an almost infinite pool of “relevant” applications, the need (not desire) for every digital activity to be available, everywhere, all of the time will deliver a security challenge second to none.
The connectivity issue that previously stalled the mobility drive is somewhat alleviated with fast wireless connectivity available in the home and enterprise and pretty fast connectively (sometimes) outside and on the move.
That has moved any business obstacles to launch a mobility drive away from networking and connectivity and pushed it straight into the hands of the security team to ensure where a connection is made it is sure, and where data is accessed it is controlled.
Some say it is an impossible task but that is conceding defeat too easily.
It is a challenging but not an impossible task and an enterprise serious about affecting security change could start with: A top down perspective on the attitude towards risk for the enterprise (what really are “business breaking events”).
A rigorous understanding of the regulatory framework that governs the enterprise (compliance).
Comprehensive visibility of data assets within (where are they, what are they, how important are they, do they need to be protected, and to what level).
Full understanding of how can someone get to them (connectivity and access).
A real time, dynamic view of the secure persona or posture of the users.
I have simplified the workflow and challenge greatly (and many other perspectives must be considered and the order could change) but tools, processes, services and systems exist today that will really make a dent in the “secure mobile enterprise” challenge.
It’s too easy to blend a “mobile enterprise” persona into existing and potentially legacy approaches to mobilising users and delivering business services – resist the temptation and use the time for change to undertake a “back to basics” information security review.
Do nothing or do slowly because only a small group are mobile is a flawed theory – now is the time to act.
The next big thing – IOT:   The Internet of Things (and or the internet of everything) has captured the imagination of analysts and marketers alike.
The connected world of “things” sending and receiving data, commonly over IP protocols but others are emerging, opens the door to a 21st century world previously impossible to imagine.
Picture the world of connected cites, healthcare devices talking directly to medical professionals, smart homes exchanging data with utility companies – in fact forget the picture those services, solutions and “outcomes” are already here today.
And there lies the problem.

The IOT use cases are currently very fluid

personalised and often driven by imaginative use of existing and sometimes emerging technology.

With IOT implementations and ideas so cutting edge

the challenge of securing the outcome becomes even greater.
At the risk of becoming an innovation “kill joy” only one recommendation exists of real validity, design any IOT / IOE solution with security acting as the core design frame to minimise the unthinkable challenge of a security retro fit to a solution beyond go live.
This sounds like a simple and obvious recommendation (obvious yes, simple no) but is often bypassed due to the enthusiasm, complexity and excitement surrounding the implementation or benefit of the “things” solution.
It is fundamental to success to challenge all vendors, integrators and consultancies on secure IOT principles as soon as the “drawing board” solution development phase begins.
I fear the IOT security challenge with so many current and future unknowns will be one of the ticking time bombs of the greatest impact over the coming years.
It’s too early in the year for extra long blogs (you have barely cleared your Christmas inbox) so part two of this blog will be next week.
I hope the richness of the outline above adds colour to your strategy and planning activities through Q1 to allow you to identify security topics that really require top priority focus through 2016.
Two more topics next week and before January concludes the complete story will be told.
Until next week Happy New Year Colin W Twitter @colinwccuk Chief Technologist Computacenter UK, Networking, Security and Digital Collaboration (UC).
December 23, .

2015 by Colin Williams

1 Comment.
Revealed: Do we now have available the most valuable currency “ever” (potentially).
The title of this blog may seem somewhat sensationalist (probably).
It was driven by my recent retail consumer navigation (“last minute present time”), .

Common to many through the Christmas season to date

And the aforementioned “valuable currency”, first off to avoid the numerous cries of foul,  I will eliminate the obvious and fundamental elements for life (air, food, etc) from the rather grand boast of the title.
But I hope on conclusion of this brief scribble its clear why I hold this special “currency” in such high regard.
From the dawn of not just modern society, but any society, humans traded in some way, shape or form.
Sellers sought to seller their wares to buyers keen to buy (and sometimes not so keen) with the optimum marriage, a product available for sale at the perfect time (and price) to a surplus number of buyers.
The final element has remained the sales Holy Grail and to realise that seller buyer perfect relationship the profession of marketing rose from the ashes with the impossible task of stargazing the wants needs and desires of all.
That truly impossible task became probable as marketers leveraged science and human psychology to bind products to potential target customers and often with amazing degrees of effectiveness and accuracy.
But still when questioned industry leaders continued to question marketing effectiveness often citing return on investment and other metric driven formulae for less than perfect results.
Until now….
Through the advent of a perfect storm of IT systems at the right price / performance levels, secure enterprise grade connectivity “everywhere”, advanced analytical algorithms / models with near human insight, data structures / repositories capable of previously unimagined data storage / manipulation and finally digital data generated by “things” we now have realised our own “digital alchemy” use to create the most valuable currency ever – “big data”.
At this point after such a monumental build up, the temptation for you to yawn and hit delete may appear (suppress it), but that is somewhat premature with more of the story to unfold.
My Christmas social and retail journey is a current storyboard of the stealth like use of big data today that helps to optimise many of my interactions with people and systems.
Websites that know who I am and offer me gift ideas aligned with the season for friends and family based on my past purchases and an awareness of their demographic.
Retail stores track my in store movement as a mobile user and leverage my location and browsing habits to make products for sale more attractive to me (via price or enhanced visibility).
Payment systems utilise my smart watch which in turn leverages multiple data driven security authorisation/authentication and financial information stores to validate me based on behaviour, location and activity to confirm that I have indeed attempted a financial transaction.
I could continue and include my previously low tech bank debit card that has now unleashed via contactless transactions has the potential to be much much more in future.
And the unifying factors behind it all, secure network connectivity of people to things to allow them to do previously unimagined “things” but with real-time availability / accessibility to a bordering on human store of digital data insight we now called “big data”.
The highly pervasive, always on, now always everywhere, NETWORK is making big data – bigger.
Big data is no longer a “fad” or something leveraged by others – it is fast becoming “the” most “valuable currency” ever.
It has the potential to digitally stargaze via advanced data analysis & data joins and deliver a result at an accuracy level and a speed impossible for a human (or banks of humans) to achieve (have a quick look at IBM Watson).
Now is the time to make big data less of a conversation for technologists and instead the heartbeat of business.
At Computacenter we are not waiting, we deem it so paramount we have our own data analytics Chief Technologist (welcome Aleem Cummings, look out for his blog).
The importance enterprises are now placing on the need to leverage and maximise big data to propel business forward makes it a top “C suite” priority.
The network provides the secure connectivity layer to allow “things” to interact with other “things” and for humans to personally.

Socially and emotionally benefit from that interaction (I promise no mention of IOT

ooops too late).
And the information created with that data whether small or big will be the “digital currency” that delivers evidence based proof of value.
Big data doesnt just help to create / find answers its so valuable it can be extracted and traded in its own right.
And if this digital, big data is such a value personal and business asset, validated security and secure interaction becomes a precursor to future success.
“but is it?”.
One for another day I think.
Until next time Merry Christmas and a prosperous 2016 Colin W @colinccuk – Chief Technologist, Networking, Security and UC.
November 24, 2015 by Colin Williams.
Leave a comment.
Why wait until the year 2020 when “2020 IT” is needed now – “time to hurry up”.
A few months ago I scribbled about the need to develop and deploy Information Technology systems (“IT”) now with 2020 in mind.
In “Arthur C Clark” style I discussed the need for a change of thinking and the importance of considering all of the interconnected elements (many quite embryonic), due to the astonishing level of business change currently affecting us all.
Through 2015 it has become apparent that the year 2020 shouldn’t be deemed a distant milestone, we need whatever we envisage “IT” will deliver in 2020 – today.
Data isn’t exploding, it has already exploded and will do every second, minute, hour of every day.
We may never successfully control it but many will harness it to unlock unimaginable personal and business value.
The connected society will continue to be the heartbeat of everything we do (and I do mean everything) and both personal & business expectations will increase every time benefits are realised.
Whether it’s the relentless march of smart devices (even I have an Apple watch), the rise and rise of the “app for everything” culture (ok, nearly everything), the Internet of things optimising our everyday existence or always available (but not always effective) Internet / device connectivity – we are now a “connected device” dependent society.
Our imagination is the catalyst for digital entrepreneurship energised by the view IT “can”, but the gloss is not without a little “matt”.
If digital business gain must be balanced or is tempered by digital data loss is it really at gain at all.
Maybe agile security is the new must have security persona as systems that learn and evolve as threats and attacks evolve must be the only effective way forward And that means the personal and business outcomes previously considered “too radical” or “far out there” are many of the outcomes EXPECTED today.
We have been here before and dare I say it, many times through previous IT revolutions or business evolutions.
Each time the step change was delivered in somewhat controlled proportions and allowed the essential but at times loose coupling of IT and business to be maintained.
But it feels different now, very different.
The expectations of enterprises today buoyed by the belief that software can achieve “anything” and the connected enterprise can stitch together the business fabric required, is straining traditional IT operational models, architectural frameworks and delivery outcomes.
The people change impact is underplayed, often overlooked but key to the successful and long lasting evolution to a truly digital enabled enterprise.
The fallacy that IT and business can run as separate entities is misguided.
IT & the business must be interlocked to such an intimate and fundamental degree that even non IT bound businesses may fail to be effective without IT in the midst of the current “digital economy”.
The expectation of “IT 2020” realizable today is effecting application development and release to a profound degree.
The change can no longer be avoided and even for the more traditional enterprises, accelerated/iterative development (“agile like”) and operational styles are no longer activities undertaken by “others” but essential modes required to keep up (forget about even moving ahead) with a business landscape changing at warp speed.  And as the power of “IT 2020” really accelerates with the IOT/IOE quasi social experience becoming the norm, we will start to experience today the benefits of people and systems intimacy that will underpin our societal existence in 2020.
Things really are different now and for me different is good unlocking possibilities and opportunities for all.
With the market change agents continuing to blaze the trail with everything from healthcare via video or personal payment systems on a watch to home energy management via a Smartphone, the IT systems of today must change to ENABLE or they will hinder change.
That’s why 2020 is too late for 2020 IT – that time is now.
Until next time.
Colin W Twitter @colinwccuk Chief Technologist, Computacenter UK – Networking, Security, UC.
Follow September 2020 M T W T F S S  123456 78910111213 14151617181920 21222324252627 282930   « Aug   Send to Email Address Your Name Your Email Address.

]Continue Lendo » 28/06/2020 PowerShell – O que é

Você vai aprender tudo sobre Tecnologia Microsoft

Neste site você encontrar diversos artigos e vídeos para te ajudar na sua carreira de TI

infraestrutura 10/07/2020 O que é uma nuvem privada?.
O que é uma nuvem privada.
A nuvem privada é definida como serviços de computação oferecidos pela Internet ou por uma rede interna privada e apenas para selecionar usuários em vez do público em geral. Também chamada de nuvem interna ou corporativa, a computação em nuvem privada oferece às empresas muitos dos benefícios de uma nuvem pública– [.

]Continue Lendo » infraestrutura 04/07/2020 O que é uma rede DMZ

Qual seu objetivo?.
O que é uma rede DMZ.
Nas redes de computadores, uma DMZ (zona desmilitarizada), também conhecida como  rede de perímetro  ou  sub-rede rastreada , é uma sub-rede física ou lógica que separa uma rede  local (LAN) interna  de outras redes não confiáveis ??- geralmente a Internet pública. Servidores.

Recursos e serviços externos estão localizados na DMZ. Portanto

eles são acessíveis pela Internet, mas o restante da LAN interna [.
]Continue Lendo » 30/06/2020 Get-Process – Como obter informações detalhadas sobre os processos.
Embora muitos saibam que o comando Get-Process no PowerShell pode fornecer informações básicas do processo, ele também pode exibir detalhes específicos com alguns pequenos ajustes.

Se você usa o Windows PowerShell há algum tempo

provavelmente está familiarizado com o cmdlet Get-Process. Esse cmdlet, que você pode ver na Figura 1 , retorna uma lista dos vários processos em [.

]Continue Lendo » 30/06/2020 Cmdlets

aprenda Como Utilizar os Cmdlets no Powershell.
Um cmdlets – pronunciado comando-let – é um comando pequeno e leve que é usado no ambiente Windows PowerShell .
Um cmdlet normalmente existe como um pequeno script que se destina a executar uma única função específica, como lidar com arquivos e alterar diretórios.
Um cmdlet e seus parâmetros relevantes podem ser inseridos em uma linha de [.
]Continue Lendo » 28/06/2020 PowerShell – O que é, O que faz e quais são os recursos?.
O que é PowerShell.
O PowerShell é um mecanismo de automação orientado a objetos e linguagem de script com um shell de linha de comando interativo que a Microsoft desenvolveu para ajudar os profissionais de TI a configurar sistemas e automatizar tarefas administrativas .
O PowerShell, foi construído na estrutura.
NET, funciona com objetos, enquanto a maioria dos shells de linha [.
]Continue Lendo » 1 234567.
35» Próxima Página ».
>> O link será enviado via Whatsapp, Para receber o link do curso preencha o campo ao lado.

Quero receber o curso Fique tranquilo

odiamos SPAM.

Reviews by Cole and Lyrical Musings

> Writing Apr 01

Name Email Message Posted in Tagged

, Jan 30 How to Imitate My Signature.
It has just dawned on me that I put absolutely no effort into my signature.
It doesn’t look like cursive.
I don’t even try, honestly.
It’s been this way for a while, though, so I doubt anything will change.
The plus side.
Anyone who actually forges my signature as a name is going to be painfully obvious.
In case you wanted to try it for yourself, here’s the 411 straight from the horse’s mouth.
Don’t write my name in cursive.
Don’t you dare.
I would never do this.
Try this, instead.
Draw a hump (or two, there’s room for creative license) to create that first N.
Follow it up with some squiggly lines.
Break up the first and last name with a space.
Draw another hump or two for that M.
Finish up with some squigglies that end, more or less, in a straight line.
Pull it all together with a superscript dot somewhere over the first “word.” Alternatively, you can throw a cross (stem) somewhere over one of the squiggles in the second name.
You must never under any circumstance do both.
Got it?!.

Posted in Humour Tagged forgeries

signature, Apr 12 5 Years Self Employed!.
In April 2010, my marriage was falling apart.
I hadn’t worked since we’d returned stateside, and I was terrified of having to work yet another dead-end retail job.
I hated them all, perhaps because I still thought I was better than the job and the people that I worked with and definitely because I am not good working under people who aren’t as smart as I am.
There were many naysayers, including my ex-husband and even good friends, who were sure I wasn’t going to make it.
But I sat at my computer and I typed and typed and typed.
I was making less than I am now per word and the type of work I qualified for was pretty mediocre, so I had to work harder and longer at work that I cared about far less than my current work.
But I guess it paid off.
I moved up in rank.
I was able to work less.
This has led to my amazing schedule, which allows me to spend lots of time with friends and family.
And I’m now working with a client who I really enjoy, about a topic that is right up my alley — sex — for a goodly amount of money.
I am even considering buying a house.
next year.
It’s exciting.
For years, I attributed this success to luck or timing.
It wasn’t determination intelligence or talent on my own part.
But, I think after five years, I should take some of that credit.
I’m not sure this will last forever, but this little era has already been pretty awesome.
Some time this month I hope to celebrate with people.

Posted in Work Tagged anniversary

self employment, Apr 22 On #BloggerExhaustion and Words, Words, Words!.

I’ve stolen this hashtag and image from Nicole who runs BloggerPR

Her vent was a little different than mine will be, but it was a tag that I could immediately relate to.
I run four blogs, three of which you might know about this: Her Realm, Reviews by Cole and Lyrical Musings.
For the most part, my personal blogs are just that: personal.
I write in them when I have time and when I am inspired or impassioned.
This has become less and less common lately.
You see, I write for a living.
Every day, I pump out between 1,000 and 3,000 words depending on the price I’m paying.
Sometimes it’s boring as fuck.
Other times it’s just repetitive.
I deal with unclear clients, finicky editors, slow Internet connections and requirements that are just absurd for how little people want to pay me.
I do this not because I like to but because I need to pay rent.
I really don’t hate it.
In fact, I’ve gotten some compliments lately on my work ethic and my ability to write.
I love this, but I do feel a little jaded about the whole thing because I do it so much.
On top of those thousands of words.

I try to write at least one post on Reviews by Cole every day; although

it’s often more like 2.
Not all of the content is 100% my words.
However, I do write an extra 500 words or so a day.
Add on taking, editing and uploading pictures, social media promotion, sending pitches, commenting in blogger groups and everything else I do, and this is a hobby that’s a labor of love.
Sure, there’s a little money in it,  but it started because I like to talk basically.
However, to keep up with others, I have to talk more than I’d like.
It’s just how it works.
This leaves little time or inspiration for writing poetry or patience enough to write words to come up with a humorous post about my life or a tutorial about WordPress here.
I don’t want to type words.
I don’t want to see words.
I don’t want to think words.
I pretty much have stopped reading for fun.
I can’t even read blogs anymore.
It’s all words, words, words.
And I can’t do it.
Even on the one day a week I give myself off from work, I have to blog.
That’s where my exhaustion comes in.
It doesn’t end.
Because even if I am not working, there’s something to be blogged.

Even if I am caught up with Reviews by Cole

I have ideas here that I really do want to write, but they all feel like a task.
I guess I need to take a good vacation from it all, but this means I’ll have to write and schedule posts for Reviews by Cole and catch up on work to give me that time off.
If I could do all that, I wouldn’t be feeling this way, now would I.
I suppose this is part of the reason that I never wanted to make hobbies into a career.
I also suppose this is just part of being a working adult.
The working part is exhausting and steals time and energy that we’d like to devote to the things we like to do, instead.
At least I am in good company, then.
Posted in Blogosphere, Tagged blogger exhaustion, blogging, words, work, Jan 23 What I Do.
Most people don’t know what I do for a living.
Many people have a hazy idea, but the idea that someone writes everything that find online is just foreign to people who don’t use the Internet, .

Understand SEO or visit websites other than Facebook

Apparently, nearly everyone I know falls into those categories.
So, yes, I write.
I write content that winds up on websites.
More often than not, .

These are linkbait articles that exist pretty much solely for SEO purposes

If that makes no sense to you, that’s okay. I rarely get a byline and almost never know what sites my written content writes up with.
I don’t follow up after I get paid.
Sometimes, I write product descriptions.
The reviews that I write on Reviews by Cole are a hobby and are in no way related to my job.
I prefer to write about tech topics.
SEO is okay, but it does get old quickly.
I hate having to be repetitive, which is why I feel drained when I have to write 800 words or more about a specific topic.
In the beginning.

I wrote many articles for DMS about smartphones

tablets, iPod and website maintenance.
These are probably among my favorites.
When I enjoy a topic, writing comes so much more easily.
However, I don’t always get the choice.
In the past week, .

I have written about these topics: WordPress and SEO

Kitchen and bathroom remodeling.
Fashion that flatters your figure.
Urgent care facilities.
Used Dell servers.
Online Casinos.
Mobile slot games.
Comic inspired movies.
Interview mistakes.
Day trader computers.
Sex toys.
Dressing in business casual.
Rebuilding a relationship/trust after an affair.
Acid reflux disease.
Pulmonary arterial hypertension.
Jennifer Lawrence’s awards show fashion.
Live music in Torontio.
Legionnaire’s disease.
Maplestory hair styles.
As I finish this post, I will head to work on a program review/description.
So, you know.
I do what they pay for.
It’s at times pretty unglamorous.
The reason why I write articles (people want to manipulate search engines) is sometimes disheartening, and I often fear that this content is just created for robots and not human consumption.
However, I do sometimes have fun and learn something along the way.
Posted in ,.

Work Tagged copywriting

web, Next Page ».

Lavoratori agili? Ecco a voi i consigli per diventare smart workers.

Cosa sono i lavoratori agili? E come fare per diventare lavoratore agile? Vi mostriamo alcuni consigli per chi sceglie questa modalità di lavoro. Non si fa altro che parlare di mondo smart, tecnologia smart, e ora anche lavoro smart: ma cosa significa davvero smart, e come si diventa smart workers? Non si tratta di una […]
L’articolo Lavoratori agili? Ecco a voi i consigli per diventare smart workers. proviene da ASSODIGITALE – News Bitcoin Ethereum ICO Criptovalute Tecnologia.