Reach out and touch someone -- Coupons and promotions on your cell phone
by James Wong
It's lunchtime, and you can't decide what to have today. So you take a stroll outside, just to see what looks good at the various restaurants in the neighborhood. As you're walking along, browsing at the different menus displayed in the front of each restaurant, you get a notification signal on your mobile phone. It's the newly opened bistro on the corner, asking you if you want to receive a coupon and a menu. You respond with a Yes, and the files are sent straight to your phone. There's a full menu and a coupon for a free appetizer with your entree. Lunch sounds good -- let's give it a try. You've just taken part in a Bluetooth Marketing campaign.
So, aside from the funny name, what exactly is Bluetooth Marketing? How does it work? And what does this mean for the average consumer?
Most mobile phone shoppers have probably heard of Bluetooth by now. It's a standard feature on almost every new cell phone sold today, as well as many laptops and desktop computers. One of the more common uses for Bluetooth is to connect to a hands-free headset, but it can actually do a whole lot more. Bluetooth is really just a way for various devices to connect to each other and share information without the need for wires. So, with Bluetooth, your cell phone could also connect to your computer to synchronize your contacts list, transfer songs and ringtones, even upload those pictures you just took with your camera phone. What's more, if your friend also has a Bluetooth phone, you could easily send them your pictures, songs, videos, games, or other files stored in your phone, all without having to worry about having the right cables to connect.
So, what does this have to do with marketing? Well, through some clever use of technology, companies are now using Bluetooth to send their latest promotions to the mobile phone -- that ubiquitous device that almost everyone uses and carries with them at all times. How does it work?
A small, Bluetooth enabled file server, specially configured for this purpose, is mounted in a busy location. The server will continuously scan the area for Bluetooth enabled devices as they come within range (up to 100 meters). When found, it sends the user a message asking if they wish to receive the advertiser's content. This could be a coupon, a video, Java game or any other multimedia file. If the user responds with a Yes, the file is sent automatically. If they respond with a No, the server logs this decision, and will not ask the same user again the next time they come within range. This so called "blacklisting" feature ensures that users are not continuously bothered with requests to download things they don't want.
And, in contrast to SMS or text messaging, there is never a charge to send or receive files via Bluetooth. What's more, since files don't pass through any cellular carriers, Bluetooth Marketing works even where there is no cell signal, such as subway stations or other "dead" zones.
So what are the benefits and pitfalls, both for prospective businesses looking for a new and unique way to connect with their customers, and for consumers, who may view advertising on their cell phones as a sort of invasion of privacy?
For advertisers, Bluetooth Marketing allows them to send their promotions to people for very little cost. Aside from the initial purchase of the equipment, Bluetooth Marketing campaigns are essentially free to run. Because files sent by Bluetooth are free, it would not matter if a company sent 10 promotions or 10,000. More importantly, users who choose to accept the message inevitably take the time to look at it. This differentiates Bluetooth marketing from other types of advertising, which goes largely ignored by the target group. Advertisers also have the opportunity to market their products and services based on the proximity of the consumer. For example, restaurants can send coupons to people as they walk by; movie theaters can send video trailers of new releases to people standing in line, etc. What better time to send promotions to customers than when they are physically close?
Of course, from the point of view of the consumer, there may be fears that this technology may raise some privacy issues. Would people be spammed with ads they don't want as they're walking down the street? Will advertisers be able to record their cell phone numbers and use it for marketing purposes? And what if someone doesn't want to receive this kind of marketing -- ever?
In fact, the technology does incorporate ways to resolve these issues. Again, Bluetooth servers must always get permission first from users before any content is sent. And if the user refuses, the software remembers this, and will not ask again in the future. This ensures that only people wishing to receive content will get it -- a benefit to both advertiser and consumer. Also, personally identifiable information is never collected by the system. The server only detects each phone's MAC address, a unique hardware ID, but nothing else. It cannot collect phone numbers or any personal information from any user. People needn't be afraid that their private information is being compromised in any way. And, of course, users can always choose to never participate in any Bluetooth campaign by simply setting their Bluetooth to "invisible", so they won't be found in the first place.
Bluetooth Marketing has been popular in Europe for several years now, and is only now beginning to catch on in the United States. Besides just coupons and promotions, stores can get creative and offer free games or songs to reward customers, companies could use this technology to distribute bulletins to employees, or professionals can use Bluetooth to send business cards to potential clients, ensuring that they always have their correct contact details handy. The possibilities are vast. So the next time you're walking down the street and you get an unexpected message on your phone asking if you want a free cappuccino, just say Yes, and look around you. You may not have noticed the cafe on the corner, but they noticed you!
About The Author
If you would like more information about Bluetooth Marketing, you may contact ZipZone Media, a New York based company specializing in this technology.
Their phone number is 1-718-969-2436
Website: http://www.zipzonemedia.com
Barbacoa � Grilled Sheep From Mexico
Barbacoa � Grilled Sheep From Mexico
by Chris McCarthy
Barbacoa � the name itself sounds as if it is time to celebrate. It is an open fire grilling process where a whole sheep is made to roast slowly so that each fleshy part acquires that flabbergasting taste of barbeque bonfire. However, the sheep can also be grilled traditionally in a pit covered with leaves. This barbeque specialty was developed in Mexico just after the Spanish conquest and it was referred to as Barbacoa de cabeza.
Regional discrimination in the art of cooking
In U.S, some portions of the head of the cow become the item to be grilled. In Northern Mexico, again it is the head of the cow, though goat meat or Cabrito is more preferred here. Lamb is the choice of the Central Mexicans and it is Cochinita Pibil (pit-style pork) in traditional Yucatan gastronomy dictionary.
Barbacoa and Barbeque
The word barbeque is an adoption from the word barbacoa. In both cases, meats are cooked following a proper grilling or roasting process. The flesh is allowed to roll well over the grilling equipment to allow the heat touch every part of the fleshy item. This helps to build that simmering and spicy experience which often makes you feel as if there is no end to an appetite.
South Texas Style Beef Barbacoa
Five brothers together make one palatable dish. Yes that�s the way it�s done. Garlic powder, black pepper, dried oregano, chili powder and salt � all mixed well and rubbed thoroughly and evenly on all sides of the meat. Your requirement is three quarts boiling water in a water pan, which allows the beef to be exposed to smoke at least for four hours and at a temperature between 225 to 275 degrees. Once you are to change the boiling water of the pan. After this is over, keep watch that the internal temperature of the beef does not exceed 160 � 170 degrees.
The next step would be to lay the beef in a foil-baking pan, seal it well with heavy-duty aluminum cover, and carefully place it in a preheated oven at a temperature of 325 degrees. The baking should continue for one hour and forty-five minutes. After everything is done just test the meat. You will see that the flesh tends to fall apart from the bone - yes, proper broiling method can really make the meat soft.
Now, it is the time to serve. The meat is chopped and shred into small pieces and then dished up with guacamole, salsa, and hot tortillas.
The queen of the Mexican bistro
Outside Mexico City, there are several places serving palatable barbacoa de borrego (lamb barbeque) and other provincial cooking varieties in a dozen of unbounded restaurants. Arroyo, one of Mexico�s famous restaurants is noted for its supply of pit-roasted barbacoa de borrego and consomme de Borrego. Such dishes are well complimented by soup made from the drippings of the roasting lamb and sheep.
Mexican barbacoa � a Mexico magnificence that can make the heat of an occasion rise to an extent when the rest of the party dance wildly with the pulsating music. When hot barbeque accompanies the heat of an occasion, nothing else is required to make the party more enjoying.
About The Author
How You Can Help Your Child With Aspergers To Cope With Mainstream School
How You Can Help Your Child With Aspergers To Cope With Mainstream School
by Dave Angel
In this article I want to give some basic and easy to follow tips to help parents when their child is starting at school. As with so much in life preparation is the key and so you want to be taking action long before the first bell on the first day. Before the school year starts, you should take your child to the school for a trial run. Just so he or she can meet their teacher and learn what their day may look like.
This is also an excellent opportunity for you to "scout" around the school and look for potential challenges and positives. Pay attention to things like physical room sizes, the number of pupils per class, color and light issues around the school. You know best your child's issues and mannerisms so bear them in mind when you walk around the school. But don't overwhelm yourself trying to look out for EVERYTHING on the first visit. Just think about 1 or 2 particularly important issues for your child and keep an eye out for things related to them (e.g. if your child hates crowds look at the classroom and break time set-up if you can). If you aren't sure then ask your child before you go "what are the 2 most annoying things about school? or "is there anything you are afraid about the new school?"
When you visit it is a good time for you to introduce yourself to the teacher and let them know that you are there to help; providing just a basic overview of your child and what works best for them, as far as you know. Recognize that the teacher will have a number of children to deal with and that they want to help your child, but they may need to do things differently than you have at home. Let the teacher know that you are willing to support your child with homework assignments or any other projects that may come up. Be an advocate for your child but don't overwhelm the school or make demands on them that make it impossible for them to care for other children as well.
Also try to set up a practical means of communication with the teacher for when your child starts. For younger children this can be a "communication book" going back and forth between home and school. For older children it may mean swapping email addresses or mobile phone numbers with the various teachers that your child may be taught by. In my experience email is the best way as it's instant and does not rely on people remembering to pass phone messages to teachers � or teachers remembering to read and act on those messages!
Simple and effective communication systems are essential particularly at High School age. If you don't do this you can spend days trying to get hold of the teacher by leaving phone messages at the school. In the mean time behaviors may have got worse and also it becomes more difficult to understand and resolve problems the longer they are left for.
If your child is to be mainstreamed, they are likely going to need an aid with them throughout most of their mainstreamed classes. This person will be there to help them with difficult work and also monitor your child for overload; allowing them the opportunity to remove your child from the classroom prior to them displaying inappropriate behavior. Inappropriate behavior in the classroom is only going to make them a target for other children and it will serve them well to avoid that possibility.
So to summarize this article you should arrange to visit the school in plenty of time before the school year starts. When you visit remember to look for potential issues for your child and communicate with the teacher your willingness to work with them (and exchange contact details).
About The Author
The Iron Chef
The Iron Chef
by Kadence Buchanan
Do you remember that old television series about cooking called �Iron Chef� which ran from 1993 to 2002? Since over 300 episodes of that show have been aired (and are still actually in syndication today), I�m pretty sure that anyone remotely interested in the culinary arts will remember that show. So, who was your favorite chef on that landmark cooking program? Chances are, you will select Chen Kenichi, better known as Iron Chef Chinese. Kenichi was the only Iron Chef to be on the show from start to finish. In addition, Chen won the Iron Chef competition 67 times and is now widely regarded as one of the great chefs of the world.
Born on January 5, 1956, Chen is actually the son of another great chef, Chen Kenmin, who is known in Japan as the father of Sichuan cuisine.
You can tell his father�s influence on Chen by his choice of his special dish, �Prawns in Chili Sauce,� which was inspired by a similar dish introduced by his father in Japan. Naturally, where several generations of excellence are involved in the same area of endeavor, comparisons between father and son are inevitable. The same applied to the Chen father-and-son combo as well. But the spectacular success of the younger Chen on the Iron Chef series has established in many minds that he is the superior chef between the two.
Since leaving the show, Chen has continued to be a successful chef. He currently runs the restaurant chain Shisen Hanten in Japan, which is a huge commercial success, with outlets in Akasaka, Ikebukuro, Roppongi, Tokushima, Kure (Hiroshima Prefecture), Matsuyama and Hakata
Ironically, it was the success of Chen�s restaurant chain that almost prompted him to leave the show. Ironically, and this is a little known story, it was Chen�s rival on the show, the so-called Iron Chef French Hiroyuki Sakai, who prevailed up Chen to stay, smartly pointing out that the show would not be the same without Chen aboard, which was probably true. The two rivals shook hands and agreed as gentlemen that if either one of them left the show, so would the other. Both great chefs honored the gentleman�s agreement until the very last episode of the show�s decade-long run.
About The Author
Tuesday, May 13, 2008
Looking Within To Learn How To Make Money
Looking Within To Learn How To Make Money
by Mario Churchill
Learning how to make money always starts with yourself; if you want to learn how to make money and become wealthy, you need to take a good look at your reflection first and honestly ask yourself what you can do to improve and enhance your strengths while reducing your weaknesses.
10 Tips for Learning How to Make Money by Looking Within
Know your interests. This will let you know what kind of your job you�ll be happiest of. Don�t think about its profit potential first. What you should really be concerned about is to search for any interest that will make you enjoy work and get paid for something you love and don�t mind to do!
Know your strengths and weaknesses in relation to your chosen field of profession. When you�ve identified your key interests, this will lead you to your chosen profession. And when that happens, it�s time to take a good look at your reflection and know what makes you strong and weak. Afterwards, we do things to improve our strengths and reduce or eliminate our weaknesses.
Invest effort in learning and gaining experience. Don�t stop learning new things. It doesn�t have to be directly connected with your chosen field all the time. Any educational opportunity is ultimately beneficial because it exercises your mind. And of course, you�ve heard about how experience is the best teacher, and it�s still true. That�s why you should do your best to gain as much experience in your preferred job.
Be ethical. Contrary to popular opinion, good guys don�t finish last often nowadays. In fact, it�s the big guys who are now leading the pack. You only have to look at Bill Gates and Warren Buffett to understand this.
Being ethical pays, but don�t do this just for the sake of higher returns. Do this because you know it�s right. Be fair to your clients, employees, employers, superiors, distributors, retailers, suppliers, and all other people who are working with you. Do unto them what you want them to do unto you in short.
Set standards for your company. Having standards is a way of motivating the people in your company or business to aim higher and do better. It also lets you know whether you�re making money or not, and if you are � whether you�re making as much as you should or not. If you aren�t, it lets you know what you�re doing right and what you�re doing wrong.
Think of your work or business as a plant. You need to nourish it if you want it to grow, blossom, and bear fruit. It will not survive solely on financial investment. For anything to become truly profitable, you first need to involve your body and soul into it.
Rule by example. Your employees play a key part in turning your company around, and if you want them to perform well, you need to show them that you can and will always do what you�re asking them to do.
And most importantly of all � don�t be afraid to take risks. If you focus too much on what you could lose, you might lose track completely of what you could gain if you take the risk. Instead of being impulsive, weigh your options carefully to ascertain which risks are foolish�and which ones aren�t. Use your heart to know which risks have great potential, but use your head to decide which is right.
About The Author
Enjoy A Cold Glass of White Wine In the Sun Without The Red Cheeks!.. No More Wine Allergies
Enjoy A Cold Glass of White Wine In the Sun Without The Red Cheeks!.. No More Wine Allergies
by Lucy Ross
The Red face, The itchy Skin, The almost hangover like symptoms coming on while you are still drinking, headaches, sneezing, irritation! Sound like you... or someone you know? Unlike Santa Clause... a flushed faces at a dinner party, or picnic is not so appealing, when it comes to drinking wine, some people are allergic... but you can still have your wine and drink it too!
So What Causes the Irritation.
Well the Majority of people have a reaction to white wine, this is due to the high levels of sulphides within white wine, ( or Preservative 220) this can cause a number of side effects, as mentioned above. One of the sure fire ways to combat feeling under the weather when drinking is firstly, not to over indulge, and secondly to keep your fluids up, And i mean water not more wine, simply by having a glass of wine between drinks, you help your body to keep its fluids up, and may reduce that dehydrated, hungover feeling.
How Sever Are Wine Allergies
Well wine allergies can have a range of reactions, depending on the severity of allergy a person has. Sulphur dioxide has had minor reactions, and in its pure form, deadly reactions, but you can avoid high levels of it when drinking wine.
For the average person reactions such as, flushing, wheezing, nausea, headaches, stomach pain, congestion, There are a few ways to combat certain symptoms, some may result in drinking certain types of wine, and some just thinking about what you drink.
Well it is known that high levels of sulfur dioxide can cause asthma attacks, and tightness of the chest and even anaphylactic shock, these is in extreme cases thou, but for those with sensitivity even minor exposure can cause some nasty side affects.
Allergies and Treatments
Look out for wines with a higher sulphur level, this is wines found in casks, and sweet white wine. So What is left to drink you ask, well red wine, sparkling wine, and dry white wines like chardonnay, they have lower amounts of these additives in them, you will also find organic wines have lower sulphur dioxide levels.
When it comes to a Blushing face when drinking wine, things get a bit trickier,
When you drink your body produces a number of chemicals, a lot of allergic people lack a chemical called alledalsehyde dehydroenase, which counter acts alcohols presents in the body, and for those people this means symptoms such as drowsiness nausea asthma and facial flushing. There is not really a lot that can be done against this, other then building up an immunity over time, this way symptoms will lessen as your body learns to cope with wine.
The Red Wine Head Ache
If you suffer from head aches when it comes to red wine, you may find the tannins in the red wine are triggering histamine production, the majority of people have no problem with histamine, but it can cause some to suffer from sever headaches.
So how can you counter act the infamous wine head ache your ask, well some suggest popping an aspirin an hour before drinking. And if that does not work, you can try drinking softer reds... and if all else fails try less reactive wines such as champagne and method traditionale sparkling.
So get those wine allergies under control, one you identify what it is in wines that irritates you, then you can drink, and feel good, and avoid those nasty side effects.
About The Author
Protecting Your Computer and Network
Protecting Your Computer and Network
by Aaron Weston
According to the latest research, Microsoft has found that cyber threats are getting more complex and advanced as "hackers" mature. How do you protect yourself against these threats? It's actually easier and cheaper then you think, and the payoff is high. In this article we'll address these challenges.
1. Get an antivirus program. Some worms, such as MyDoom, are capable of bringing entire networks to their knees. Some threats collect your personal information, such as passwords, and transmit them to a remote location. The cost associated with these threats is very high. To address these issues, several companies have released protections that are free for home use. Choose your program carefully as some promise the world, or have a reputation, but don't live up to the hype.
One unbiased test (http://www.techdo.com/?p=62) rated the top 20 virus programs against 175,000 virus definitions. The results may surprise you. Norton from Symantec, often perceived to be the best and requiring an annual fee for updates, is actually at the bottom of the list along with McAfee, easily surpassed by free offerings such as AVG, Avast! and AOL Active Virus Shield, using the top rated Kaspersky engine. In another test (http://www.thepcspy.com/articles/other/what_really_slows_windows_down/5), Norton takes three of the top six spots for programs that consume the most system resources. As you can see, you don't always get what you pay for and you may be leaving your system vulnerable.
At Northern Protocol Inc. we recommend AOL Active Virus Shield for Windows XP home use. Updates are free, response times are faster than Norton or McAfee, and it offers more comprehensive protection against threats. AVTest.org monitors response times of various vendors, and has found that Norton and McAfee are at the bottom of the list for releasing definitions. Your antivirus is only as good as it's definitions, and a slower response time and less effective detection increases the window for possible infection.
2. Get an anti-spyware program. Spyware threats are getting more complex. As browsers improve their security features, devious "script kiddies" have changed their tactics, now using Javascript to install threats, affecting any browser that has it enabled. So-called "free" software, such as screensavers, wallpapers and "smilies", to name a few, install spyware without your knowledge, burying the "agreement" in a lengthy license agreement that no-one ever reads before they click "accept". Some devious websites ask you to install "download managers" to access their files, which often have spyware (so-called "sponsor" software) embedded. Pay close attention to any installer that asks you to install "sponsor" software. Many antispyware programs and security suites are actually frauds, and often install spyware themselves. You can find a complete list at http://spywarewarrior.com/rogue_anti-spyware.htm.
There are several good programs out there, but the one we at Northern Protocol Inc. recommend the most is Prevx2.0. It requires a small annual fee to maintain the active protection component, but we find it extremely effective. Another good protection suite is AVG Anti-Malware which also requires a modest annual fee. Windows Defender is a good free alternative for users of genuine Windows products.
3. Install a firewall. Firewalls block intrusions from the outside, hiding your computer from the internet so that "hackers" don't know it's there. They can also block communications coming from within your network. Again, there are a lot of misconceptions in this realm. Norton and McAfee, while having a reputation, are actually sluggish and poor performers according to this review at http://www.informationweek.com/security/showArticle.jhtml?articleID=192201247&subSection=Security+Reviews. ZoneAlarm, while popular, is buggy and has hang ups of it's own, one being far too demanding of user involvement. One review (http://www.pcmag.com/article2/0,1759,1969207,00.asp), conducted by PC Magazine, rates Comodo Personal Firewall, a free firewall, as one of the best in it's class and is our recommendation as well.
A more effective solution, but more complex in installation, is to install an older computer as a firewall, running Smoothwall from http://www.smoothwall.org/. This solution is highly effective, inexpensive, and the one we use to protect our network.
4. Buy a router. Routers are inexpensive and in many cases offer built in firewalls that work in conjunction with the "NAT" firewall that is standard on all routers. What this does is take your IP address from the internet and translates it into internal addresses for your computer(s). This adds an extra layer of protection for your computer or network, putting one more obstacle in the way of any potential intruder. Northern Protocol Inc. recommends the use of Linksys or D-Link WBR or DIR series routers for the best performance.
5. Set the wireless security on your router. All too often people leave their wireless settings at default, leaving their networks wide open to attack. Log on to your router's control panel from any browser (192.168.1.1 for Linksys and 192.168.0.1 for D-Link) and set your wireless security settings.
First, change the password for the logon. Use a combination of upper and lower case letters and numbers, then test your password at http://www.microsoft.com/protect/yourself/password/checker.mspx for strength.
Second, enable encryption. In order, the preferred methods of encryption in terms of strength are WPA2, WPA and lastly WEP 128 bit. Some older network cards don't support WPA or WPA2, so either replace the card (recommended) or use WEP 128 bit. Create a key using the same guidelines as your administrator password, but make sure it's different.
Third, change the SSID (this is the name the router broadcasts to inquiring wireless devices). Ensure that it does not identify the make or model of your router and that it is not personally identifiable. It is preferable to disable broadcast altogether if you can remember the name and manually enter it into each computer's wireless configuration.
Fourth, if no other computers need to log on but your own, enable the MAC ID filter and enter in the MAC ID to each of your devices. This is a very effective solution, preventing all but your own devices from being able to log on to your router and obtain an address, even if they can figure out or already know the key. Each MAC ID is unique to every network device on the internet and thus no two devices have the same ID.
6. Update to the latest version of your browser. We recommend the use of either Opera or Internet Explorer 7, or both. These programs ensure that you have the latest security protections for your browsing experience, employing advanced techniques to prevent automatic installations of scripts, "phishing" scams, etc.
7. Update your operating system and software to the latest versions. As new threats and security flaws surface, Microsoft scrambles to get new fixes into the hands of it's users, and once a month releases a Malicious Software Removal Tool. Ensure that you have a genuine version of Windows, with Service Pack 2 installed for Windows XP, to be eligible for all the latest software updates. Research is showing that as operating systems become more secure, hackers are looking for alternative "attack vectors", or other software on your computer, as a means of attacking your system's security. Cover all your bases. Make sure that "Automatic Updates" are enabled on your machine(s).
8. Make regular backups. As backup solutions continually drop in price, there are no valid reasons to not perform regular backups. DVD burners, such as Pioneer and LG, are very inexpensive and reliable and can fit a large volume of data on a single CD or DVD. USB memory keys are also inexpensive, as are external hard drives. One folder that is very important to back up is your My Documents folder. Keep your backups away from the computer and in a safe place. Photographs can often never be replaced, so always keep current backups on hand.
Is your system infected? Do you need help employing any of the measures mentioned in this article? Call us at 705.812.2236. We remove the infections and protect you against future infections, without loss of data.
Learn more about security threats at http://www.npinc.ca/virus.htm.
About The Author
This article is © 2007 Aaron Weston and may only be reproduced in it's entirety, without modification, with all links, bio and this text included.