Saturday, August 22, 2015

Netiquette IQ Special Blog - Paul Babicki's New Book For Job Seekers Is Now On Sale

Special Bulletin - My just released book, "You're Hired. Super Charge Your Email Skills in 60 Minutes! (And Get That Job...) is now on sales at Amazon.com 

Landing your next job has as much to do with getting your email opened and read as it does with your qualifications.  Job searches don’t work the way they used to. Employers use email to weed out job candidates as they search for the perfect match.  Crafting effective, professional messages could make all the difference in securing your next position.
It’s all about the email.  If your email is not opened and read, you can’t get to the next phase of getting your dream job!  Read this book and in just 60 minutes you’ll know how to write better email. Learn to compose emails effectively and soon you’ll hear those magic words:  “You’re Hired!”
“Being able to provide candidates with tips for using email more effectively in their job search, is something our MRINetwork recruiters truly value. This edition of Netiquette IQ provides a self-evaluative approach to improving email communication at every level… It offers recruiters a reference guide for ensuring candidates present themselves in the best manner when communicating with clients. The power of these best practices is measurable, especially when top clients land Impact Players.” Scott Bass, Director of Marketing and Communications, MRINetwork® EXPERTS IN GLOBAL SEARCH

Paul Babicki is the founder and president of Tabula Rosa Systems (www.tabularosa.net), a company that sells network, security, email filtering as well as email grammar, tone and content software. Paul’s first book is “Netiquette IQ A Comprehensive Guide to Improve, Enhance and Add Power to Your Email.” Check out his popular blog at (http://NetiquetteIQ.blogspot.com)

=========================================

  Great Netiquette To All!


===========================================================


For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
============================================== 
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". . You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Friday, August 21, 2015

Tabula Rosa Systems From US-CERT- Microsoft Releases Critical Security Update for Internet Explorer

National Cyber Awareness System:
08/19/2015 06:51 AM EDT

Original release date: August 19, 2015
Microsoft has released a critical security update to address a vulnerability in Internet Explorer. Exploitation of this vulnerability could allow a remote attacker to take control of an affected system if the user views a specially crafted webpage.
Users and administrators are encouraged to review Microsoft Bulletin MS15-093 for details and apply the necessary update.






================================================================
Good Netiquette to all!
================================================================

For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Thursday, August 20, 2015

Tabula Rosa Systems Blog Of 8/20/2015 - Network Functions Virtualization (NFV)

Special Bulletin - My just released book, "You're Hired. Super Charge Your Email Skills in 60 Minutes! (And Get That Job...) is now on sales at Amazon.com 

  network functions virtualization (NFV)
Network functions virtualization (NFV) is an initiative to virtualize the network services that are now being carried out by proprietary, dedicated hardware. If successful, NFV will decrease the amount of proprietary hardware that's needed to launch and operate network services.

The goal of NFV is to decouple network functions from dedicated hardware devices and allow network services that are now being carried out by routers, firewalls, load balancers and other dedicated hardware devices to be hosted on virtual machines (VMs). Once the network functions are under the control of a hypervisor, the services that used to require dedicated hardware can be performed on standard x86 servers. 

This is important because it means that network administrators will no longer need to purchase dedicated hardware devices in order to build a service chain. Because server capacity will be able to be added through software, there will be no need for network administrators to overprovision their data centers which will reduce both capital expenses (CAPex) and operating expenses (OPex). If an application running on a VM required more bandwidth, for example, the administrator could move the VM to another physical server or provision another virtual machine on the original server to take part of the load. Having this flexibility will allow an IT department to respond in a more agile manner to changing business goals and network service demands.

The NFV concept, which was presented by a group of network service providers at the SDN and OpenFlow World Congress in October 2012, is being developed by the ETSI Industry Specification Group (ISG) for Network Functions Virtualization.

Great Netiquette To All!

===========================================================


For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
============================================== 
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Wednesday, August 19, 2015

Tabula Rosa Systems Technical Term Of The Day Industrial Internet of Things



Industrial Internet of Things from whatis.com
The Industrial Internet of Things (IIoT) is the part of the Internet of Things (IoT) that focuses on how smart machines, networked sensors and sensor analytics can help improve business-to-business (B2B) initiatives across a wide variety of industries, especially manufacturing.
Also known as the Industrial Internet, IIoT seeks to make better use of the sensor data, machine-to-machine (M2M) communication, machine learning and automation technologies that have existed in industrial settings for years. The driving philosophy behind the IIoT is that smart machines are better than humans at accurately, consistently capturing and communicating data. The data that sensors and smart machines generate can be analyzed to pick up on inefficiencies and problems sooner, saving time and money and supporting business intelligence efforts. In manufacturing specifically, IIoT holds great potential for quality control, sustainable and green practices, supply chain traceability and overall supply chain efficiency.
Major concerns surrounding the IIoT include the current lack of interoperability between manufacturing systems and support for the robust infrastructure requirements that are needed to support big data and big data analytics. To that end, the nonprofit Industrial Internet Consortium, which was founded in 2014, is focusing on creating open standards, communication protocols and architectures that will help businesses use the data that networked sensors and smar machinery generates to become more efficient, productive and profitable.






================================================================
Good Netiquette to all!
================================================================

For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================

Tuesday, August 18, 2015

Netiquette Email Tone Basics - ViaTabula RosaSystems

==============================================



Tone is not the only item you can find "in between the lines" in an email. The article below references some of these things. These are all noteworthy since so many people that you communicate with are ones you you have never met or are likely to meet. Just as with tone, a single nuance can destroy the entire content of of an email.
------------------------------------------------------------------------------------------
Work Smart 

What Your Email Style Reveals About Your Personality

You think about how you're perceived in every other social setting--why not email? Get your point across while staying true to yourself before hitting send.

By Tomas Chamorro-Premuzic From fastcompany.com

Most of your work communications are probably over email. You likely email your colleagues and clients more frequently than you speak to them on the phone or meet with them in person.

Unlike face-to-face communication, it can be more difficult to effectively convey important aspects of your personality, attitudes, and style in email.

Is there a connection between our email persona and our real-life persona? How competently can the average person infer our personality from our emails? The answer comes in four points:


People use language in different ways, and those differences are a function of their personality. Our choices are spontaneous and unconscious but they do reflect who we are. Text mining studies have found associations between key words and major aspects of personality. The more frequently people use those words, the more likely it is that they display certain personality traits.

For example, extraverts talk about fun-related stuff: bars, Miami, music, party, and drinks. People with lower EQ are more likely to use emotional and negative words: stress, depressed, angry, and unfortunate. Narcissists talk about themselves--the number of self-referential words (e.g., “I,” “me,” “mine,” “myself,” etc.) is indicative of someone’s self-love and entitlement. Artistic and intellectual individuals use highbrow words, such as narrative, rhetoric, and leitmotiv.


There is also huge variability in people’s communicational style, even when the words may not differ that much. For instance, absence of typos is a sign of conscientiousness, perfectionism, and obsessionality. Poor grammar reflects lower levels of IQ and academic intelligence. Emoticons are a sign of friendliness (if the email is informal) or immaturity (in work-related emails).

Long emails reflect energy and thoroughness, but also some degree of neediness and disorganization. Chaotic emails are a sign of creativity or psychopathic tendencies. Instant responses reflect impulsivity and low self-control. Late responses are a sign of disinterest, and no responses signal passive-aggressive disdain.


Even when emails do reflect our personality, human observers may fail to interpret the cues. This tends to occur for two main reasons: they are either not paying sufficient attention (focusing instead on what they want to say), or over-interpreting things.
Importantly, correct interpretations require paying attention to contextual factors, such as awareness of the sender’s main motivation, and distilling the signal from the noise. It is also important to determine whether cues are truly related to senders’ personality or transient mood and behaviors.

The bottom line is that even the most intuitive observer of email behaviors may fail to perform as well as a computer-generated algorithm, especially if they have never had physical interactions with the sender or lack any background information on them. Of course, this does not stop people from making inferences. Human beings are prewired to make instant and unconscious evaluations of people, and we tend to disregard information that is not congruent with our initial prejudices--this is why stereotypes are so pervasive, and that goes for the email world, too.

Trust needs chemistry, which happens in person

Online trust is the backbone of a huge economy: we wouldn’t have eBay, Uber, Tinder, or Airbnb unless we were open to the idea of trusting strangers simply based on their digital footprint or crowdsourced reputation. Yet going beyond superficial relations with others still requires face-to-face interactions--and it probably always will. This is why our impressions of others are rarely the same in the digital as in the physical world: even phone conversations omit key information about individuals’ personalities.

Ultimately, chemistry cannot be translated into data. And unlike computers, humans are more trusting when they can make decisions on the basis of their intuition, rather than pure data. Perhaps this is the main explanation for the fact that face-to-face meetings are far from extinction. Video technology is popular, but only because it has replaced phone conversations, rather than physical meetings.
=================================================
In addition to this blog, I have authored the premiere book on Netiquette, "Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". You can view my profile, reviews of the book and content excerpts at:

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ Rider University and  PSG of Mercer County New Jersey.
==========================================

Tabula Rosa Systems Technical Term Of The Day - Kerckhoff's Principle

Kerckhoff's principle


Kerckhoff's principle is the concept that a cryptographic system should be designed to be secure, even if all its details, except for the key, are publicly known. 
The principle, sometimes referred to as Kerckhoff's axiom or law, forms the basis of open security and security by design and contrasts directly with the deprecated security through obscurity model. 
After a message has been subjected to a cryptographic algorithm, it is expected to remain secure even if an intruder has or gains full access to the encrypted message and has knowledge of what algorithm was used. The point is that, even if a system's design and details are not made open to begin with, they may be detected by an unauthorized party and, as such, should be inherently secure. 
Auguste Kerckhoff, a Dutch linguist and cryptographer, published the principle in an 1883 article, La Cryptographie Militaire (Military Cryptography). The mathematician Claude Shannon further refined Kerckhoff’s principle. According to Shannon’s maxim, "one ought to design systems under the assumption that the enemy will immediately gain full familiarity with them."






================================================================
Good Netiquette to all!
================================================================

For a great email parody, view the following link:

https://www.youtube.com/watch?v=HTgYHHKs0Zw&__scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================
**Important note** - contact our company for very powerful solutions for IP management (IPv4 and IPv6, security, firewall and APT solutions:

www.tabularosa.net

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon follow by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

 If you would like to listen to experts in all aspects of Netiquette and communication, try my radio show on BlogtalkRadio  Additionally, I provide content for an online newsletter via paper.li. I have also established Netiquette discussion groups with Linkedin and Yahoo.  I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. Further, I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and have been a contributor to numerous blogs and publications. 

Lastly, I am the founder and president of Tabula Rosa Systems, a company that provides “best of breed” products for network, security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT product information for virtually anyone.
==============================================