Saturday, August 24, 2019

Tabula Rosa Blog Of 8/24/2019 - Quotes Of Famous Artists





Updated April 03, 2019

For an artist, the canvas is a mouthpiece. The artist speaks with vibrant colors, bold strokes, and fine lines. She whispers her secrets, shares her passion, expresses her anguish, and taunts your sensibilities. Are you ready to hear the language of art?

Art inspires people. Consider the works of Michelangelo, Picasso, or Leonardo da Vinci. People throng to museums to admire their work. Their paintings, murals, and sculptures are subjects of deep academic interest. These great artists lived several centuries ago, yet their work continues to inspire new generations of artists.

Famous Artists and What They Say About Art

These quotes from 12 famous artists provide insight into the art world. Their words infuse a new surge of creativity. They urge you to get inspired to pick up your paintbrush and palette.
Brett Whiteley
Australian avant-garde artist Brett Whiteley continues to spur the creativity of artists, and common people, across the world. He won Australia’s most respected award, Archibald, the Wynne, and Sulman, twice. Whiteley created his art in Italy, England, Fiji, and the U.S.

"Art should astonish, transmute, transfix. One must work at the tissue between truth and paranoia."
Edward Hopper
American realist painter and printmaker Edward Hopper was famous for oil paintings, but he also made his mark as a watercolorist and etchings. Regular American life and the people were two of Hopper’s muses. 

"If I could say it in words, there would be no reason to paint."
Francis Bacon
Irish-British figurative painter Francis Bacon is best known for the boldness of his art. The imagery that he used was raw and evocative. He is best known for his works, "Three Studies for Figures at the Base of a Crucifixion" (1944), "Study for Self-Portrait" (1982), and "Study for a Self Portrait — Triptych" (1985-86).

"The job of the artist is always to deepen the mystery."
"Picasso is the reason why I paint. He is the father figure who gave me the wish to paint."
Michelangelo
One of the best-known painters and artists from the Renaissance age, Michelangelo and his works have shaped western art. The Italian sculptor, painter, poet, architect, and engineer is famous for painting the scenes from Genesis on the ceiling and depicting "The Last Judgment" on the wall of the Sistine Chapel in Rome. He was also the architect of St. Peter’s Basilica.

"If people knew how hard I worked to get my mastery, it wouldn't seem so wonderful at all."
Pablo Picasso
Spanish artist Pablo Picasso has been one of the most powerful artists of the 20th century. He co-pioneered the Cubist movement and is most well-known for works such as proto-Cubist "Les Demoiselles d’Avignon" (1907) and "Guernica" (1937). 

"As a child, I drew like Raphael but it has taken me a lifetime to draw like a child."
"Art washes away from the soul the dust of everyday life."
"Every child is an artist. The problem is how to remain an artist once he grows up."
Paul Gardner
Scottish painter Paul Gardner espouses European and Scottish artistic conventions through this art. Buddhism and Eastern philosophy have been his major influences.

"A painting is never finished — it simply stops in interesting places."
Paul Gauguin
French post-Impressionist artist Paul Gauguin received true recognition only posthumously. His style of experimenting with colors made him stand apart from Impressionists. Gauguin was an important member of the Symbolist movement, and it led to the creation of the Synthetist style, Primitivism, and return to pastoral styles. 

"I shut my eyes in order to see."
Rachel Wolf
Rachel Wolf is an American artist and freelance editor. She has edited numerous books on painting such as "Keys to Painting: Fur and Feathers," "Watercolor Secrets," "Strokes of Genius: The Best of Drawing," among others.

"Color is fun, color is just plain gorgeous, a gourmet meal for the eye, the window of the soul."
Frank Zappa
American musician Frank Zappa made music for over three decades. He played rock, jazz, and other kinds of music while also directing films and music videos. Zappa was feted with the Grammy Lifetime Achievement Award in 1997. 

"Art is making something out of nothing and selling it."
Lucian Freud
German-born British painter Lucian Freud was celebrated for his impasto portrait and figure paintings. His art has a psychological angle and often explores the uncomfortable connection between the artist and the model.

"The longer you look at an object, the more abstract it becomes, and, ironically, the more real."
Paul Cezanne
Paul Cezanne was a French artist and post-Impressionist painter. Paul Cezanne is responsible for providing a link between the 19th century Impressionism and 20th century Cubism. Cezanne’s charm lay in the fact that even though critics trashed him, younger artists revered him during his lifetime.

"There is a logic of colors, and it is with this alone, and not with the logic of the brain, that the painter should conform."
Robert Delaunay
French artist Robert Delaunay started the Orphism art movement along with his wife, Sonia. His art used symmetrical shapes, and in later life became more abstract.

"Painting is by nature a luminous language."



           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.


Wednesday, August 21, 2019

Tabula Rosa Blog 8/21/2019 - Basic Comma Rules


From wordgenius.com


Do commas even have rules?
April 08, 2019 | 3 min read
Commas are one of the most commonly used punctuation tools. Sadly, they are also one of the most misused. You may come across writing littered with stray commas or you may encounter writers who who simply omit the punctuation, creating wildly confusing sentences that have no breaks in sight.
You may have been taught to use a comma when the reader would naturally pause or need to take a breath. Unfortunately, in the rules of grammar it's not quite that simple.
There is in fact an explicit set of grammar rules that governs the use of commas. But those rules can vary from style guide to style guide, creating an even more confusing mess for many writers. So we're here to break down some of the more useful rules in an attempt to end the plight of the comma.
Rule number 1: Lists.
Let’s start with an easy one. Commas are used when writing lists of three or more items.
Example 1: I’m going to the store to buy flour, sugar, eggs, and jellybeans so I can make a jellybean cake.
Sound simple? Well, it's a bit more complicated than that. That last comma in the series (the one after the word "eggs") is called the Oxford, or serial, comma, and it's optional depending on who you ask.
Some style guides, like Chicago, include the comma. But you'll find other style guides like AP Style (used primarily in journalism) eschew this rule, leaving out that final comma and writing the sentence as such: I’m going to the store to buy flour, sugar, eggs and jellybeans so I can make a jellybean cake.
If you're just typing an email to a colleague or posting on a personal blog, you can decide for yourself whether you want to include the comma or not. But if you're publishing in a professional setting, do a little research on which style guide fits your audience.
Rule number 2: Linking independent clauses.
Independent clauses are fully-formed ideas that could stand alone as sentences. When they are joined together with a conjunction (and, or, but, etc.), they need a comma.
Example 2 (the two independent clauses are bolded): I baked a jellybean cake, and it tasted better than I could have imagined.
In this case, the two independent clauses could each be its own sentence. But because they are combined, and linked by the word "and", they need a comma to separate them.
Rule number 3: Dependent clauses.
Dependent clauses feature a subject and a verb, but aren’t complete sentences on their own. They tend to add a little contextual spice to an otherwise bland statement. If your sentence attaches a dependent clause to its independent counterpart, the two are joined with a comma.
Example 3 (the dependent clause is bolded): When I have a bad day, I comfort myself with a slice of jellybean cake.
Rule number 4: Non-essential descriptions.
Captivating writing often adds further details to bring a sentence to life. But if you can remove the phrase without it changing the sentence, it's considered non-essential. No matter where they appear in the sentence, these descriptive, words or phrases need to be shielded with commas.
Example 4 (the non-essential phrase is bolded): The jellybean cake, sweet and chewy, was the perfect dessert.
Rule number 5: Quotations.
When someone is speaking or being quoted, a comma needs to precede or follow the speech. Depending on the order of the sentence, the comma can be inside or outside of the quotation marks.
Example 5: “This jellybean cake is simply sublime,” gushed the Michelin-starred chef.
The waitress said, "I agree, it was truly delicious."
Rule number 6: Introductory elements.
Introducing a sentence with an adverb (ex. unfortunately, interestingly), or joining words and phrases (ex. on the other hand, furthermore), require a comma.
Example 6: Unsurprisingly, jellybean cake is about to take the world by storm.
Rule number 7: Addresses
Streets, cities, states, and countries need to be separated with commas when writing addresses.
Example 7: The Jellybean Cake Corporation international headquarters are located at 123 Cake St, Candyland, FL, USA.
Rule number 8: Dates
Like addresses, the day, month and year in a date need to be punctuated with commas.
Example 8: Legend has it, the concept of the jellybean cake was conceived on Thursday, April 20, 1574, by Spanish explorers.


+++++++++++++++++++++++++++++++++++++++++++++++++++


           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.


Monday, August 19, 2019

Tabula Roysa System Secuirty Bulltin - Vulnerability Summary for the Week of August 12, 2019





08/19/2019 06:21 AM EDT

Original release date: August 19, 2019

The CISA Weekly Vulnerability Summary Bulletin is created using information from the NIST NVD. In some cases, the vulnerabilities in the Bulletin may not yet have assigned CVSS scores. Please visit NVD for updated vulnerability entries, which include CVSS scores once they are available

RFID (radio frequency identification)
 FROM WHATIS.COM
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. Use cases for RFID technology include healthcare, manufacturing, inventory management, shipping, retail sales and home use.
Every RFID system consists of three components: a scanning antenna, a transceiver and a transponder. When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or interrogator. The transponder is located in the RFID tag itself.
The read range for RFID tags varies based on factors including the type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. Generally speaking, tags that have a stronger power source also have a longer read range.

RFID and bar code technology are used in similar ways to track inventory, but three important differences make each one a better choice in certain situations:
  • RFID tags do not require a direct line of sight to be read.
  • Data stored in an RFID tag can be updated in real-time. In contrast, bar code data is read-only and cannot be changed.
  • RFID tags require a power source. In contrast, bar codes only require the technology reading the bar code to have a power source.

How RFID tags work

An RFID tag consists of a microchip, memory and antenna. The antenna uses radio frequency waves to transmit a signal that activates the tag's transponder. Once activated, the transponder reads or writes data and transmits it back to the antenna for wireless transmission to the reader. The data is used to notify a programmable logic controller in the reader that an action should occur. The action could be as simple as raising an access gate or as complicated as interfacing with a database to carry out a monetary transaction.

RFID tags typically hold less than 2,000 KB of data, including a unique identifier/serial number. Tags can be read-only or read-write.
Types of RFID tags
There are two main types of RFID tags: active RFID and passive RFID.
An active RFID tag has its own power source, which is usually a low-power battery. A passive RFID tag, on the other hand, does not require batteries. Instead, it receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna.
Types of RFID systems
There are three main types of RFID systems: low frequency (LF), high frequency (HF) and ultra-high frequency (UHF). Microwave RFID is also available. Frequencies vary greatly by country and region.
  • Low-frequency RFID systems range from 30 kHz to 500 kHz, though the typical frequency is 125 kHz. LF RFID has short transmission ranges, generally anywhere from a few inches to less than six feet.
  • High-frequency RFID systems range from 3 MHz to 30 MHz, with the typical HF frequency being 13.56 MHz. The standard range is anywhere from a few inches to several feet.
  • UHF RFID systems range from 300 MHz to 960 MHz, with the typical frequency of 433 MHz and can generally be read from 25-plus feet away.
  • Microwave RFID systems run at 2.45 GHz and can be read from more than 30-plus feet away. 
+++++++++++++++++++++++++++++++++++++++++++++++++++


           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.


Sunday, August 18, 2019

Tabula Rosa Systems Blog Of 8/18/19 RFID





RFID (radio frequency identification)
 FROM WHATIS.COM
RFID (radio frequency identification) is a form of wireless communication that incorporates the use of electromagnetic or electrostatic coupling in the radio frequency portion of the electromagnetic spectrum to uniquely identify an object, animal or person. Use cases for RFID technology include healthcare, manufacturing, inventory management, shipping, retail sales and home use.
Every RFID system consists of three components: a scanning antenna, a transceiver and a transponder. When the scanning antenna and transceiver are combined, they are referred to as an RFID reader or interrogator. The transponder is located in the RFID tag itself.
The read range for RFID tags varies based on factors including the type of tag, type of reader, RFID frequency and interference in the surrounding environment or from other RFID tags and readers. Generally speaking, tags that have a stronger power source also have a longer read range.

RFID and bar code technology are used in similar ways to track inventory, but three important differences make each one a better choice in certain situations:
  • RFID tags do not require a direct line of sight to be read.
  • Data stored in an RFID tag can be updated in real-time. In contrast, bar code data is read-only and cannot be changed.
  • RFID tags require a power source. In contrast, bar codes only require the technology reading the bar code to have a power source.

How RFID tags work

An RFID tag consists of a microchip, memory and antenna. The antenna uses radio frequency waves to transmit a signal that activates the tag's transponder. Once activated, the transponder reads or writes data and transmits it back to the antenna for wireless transmission to the reader. The data is used to notify a programmable logic controller in the reader that an action should occur. The action could be as simple as raising an access gate or as complicated as interfacing with a database to carry out a monetary transaction.

RFID tags typically hold less than 2,000 KB of data, including a unique identifier/serial number. Tags can be read-only or read-write.
Types of RFID tags
There are two main types of RFID tags: active RFID and passive RFID.
An active RFID tag has its own power source, which is usually a low-power battery. A passive RFID tag, on the other hand, does not require batteries. Instead, it receives its power from the reading antenna, whose electromagnetic wave induces a current in the RFID tag's antenna.
Types of RFID systems
There are three main types of RFID systems: low frequency (LF), high frequency (HF) and ultra-high frequency (UHF). Microwave RFID is also available. Frequencies vary greatly by country and region.
  • Low-frequency RFID systems range from 30 kHz to 500 kHz, though the typical frequency is 125 kHz. LF RFID has short transmission ranges, generally anywhere from a few inches to less than six feet.
  • High-frequency RFID systems range from 3 MHz to 30 MHz, with the typical HF frequency being 13.56 MHz. The standard range is anywhere from a few inches to several feet.
  • UHF RFID systems range from 300 MHz to 960 MHz, with the typical frequency of 433 MHz and can generally be read from 25-plus feet away.
  • Microwave RFID systems run at 2.45 GHz and can be read from more than 30-plus feet away. 
+++++++++++++++++++++++++++++++++++++++++++++++++++


           Let's remove this guy once and for all!
++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Good Netiquette And A Green Internet To All! 
=====================================================================Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting. We can be contacted at:
sales@tabularosa.net  or 609 818 1802.


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================















Catfishing
From Wikipedia, the free encyclopedia
Catfishing is a type of deceptive activity where a person creates a sock puppet social networking presence, or fake identity on a social network account, usually targeting a specific victim for deception.
Catfishing is often employed for romance scams on dating websites. Catfishing may be used for financial gain, to compromise a victim in some way, or simply as a form of trolling or wish fulfillment.
Catfishing media has been produced, often centering around victims who wish to identify their catfisher

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.