Okay, it’s been a while since I’ve blogged. Let me tell you about the 30 day challenges I’ve been doing and what I learned: – March 2014: I went back to doing no external email, and I learned this one weird, simple trick that helped. In previous “no email” challenges, I relied on sheer force […]

Click to continue reading “30 day challenge for June: treadmill desk!”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

In January 2014, my 30 day challenge was to limit my social media. That was a productive month. In February 2014, my 30 day challenge was to eat more slowly. I did that by counting to ten between chewing bites of my food. I tend to wolf down my food, which doesn’t give my stomach […]

Click to continue reading “30 day challenge for March: no external email”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Okay, I’m calling it: if you’re using guest blogging as a way to gain links in 2014, you should probably stop. Why? Because over time it’s become a more and more spammy practice, and if you’re doing a lot of guest blogging then you’re hanging out with really bad company. Back in the day, guest […]

Click to continue reading “The decay and fall of guest blogging for SEO”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Today I made a Bluetooth garage door opener. Now I can open my garage from my Android phone. There’s a short how-to YouTube video from Lou Prado. Lou also made a website btmate.com that has more information, and you can watch an earlier howto video as well. The project itself was pretty simple: – Acquire […]

Click to continue reading “Bluetooth garage door opener”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

I’ll keep it short: this week when you donate for cancer research, I’ll match your donation (up to a limit of $5000 total for all donations). We’ve already raised almost $8,000 dollars to help stop cancer, but I’d love to get to $10,000 or even higher. If anyone has ever wanted to take money out […]

Click to continue reading “I’m matching funds for cancer research!”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]