If you’ve read Scott Adams’ financial advice and my financial tips in case you win a startup lottery, then you might be interested in a few more pointers to good resources. Some web pages and books: – Don’t Play the Losers’ Game, by Henry Blodget. This is a short, accessible piece that explains why picking […]

Click to continue reading “An investment reading list”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8f329d5131075d33a8627fb061c29a153b67628e63209d9cebc111a81624d782c1e553518c1167a23658f9eda2c4316354e0954d023cb512a7d04c923865a6472a2eb6ca1c8495fdca5d82518de2680c8db0024b83bc338115f3b31874860c040bb53dd3fad3e6ea4ae3c0ad54401e8aa297b9cbff5d5205af0ece60fd6e7ed9f9682f19f9c8695c4bfe2081fb4051fbae114a3debb8bb72114c91ab4c57324933920974a8bb42f1722670a7c97d5c537d360a1039d829d426d74876f32419cd94f479384eb85f676757a383927ad2f793c41ccbbbc1e10edc3761c0b1e8030e5282fc6be20553f4adc91165da768420825ff5a7b1db697a5231024a16b33eb95fd36c3668cb6596b6c54c5d190eb7ab26f4c96aadbad26338a176fba08cf21c20d10af76a90aada53e7911c5364dab787ab89d413a396c2ccdfb5d8c5983d9dac816dacd1721e31118b1ee3d97f4930ee4002dd34acb6b72d1e5989f8572ee39da3fe01a2a17ddb71030ab9bd9db350aa4f9df206b375dcc652c82522a912a15e5c8b0a13b8657f915cc29ff311f92eca8a29cf000b83f183d745835a3654765d66c0e43acf9393944d44aeda3028e7aee2f82f2f1a6b521f8713549fabf1122c796eb6f37fcc8fa32c20b1b2209a457ed26ad012644b5d6c17139a6c171246[[T_F]]

I’ve been spending more time surfing the web on my laptop than I’d like to. I’ve also noticed more emails that lure me into short tasks, but eventually eat up a large chunk of my day. I’d prefer to be spending more time working on projects, reading, and unplugging. So my new 30 day challenge […]

Click to continue reading “New 30 day challenge: “hermit mode””



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8f329d5131075d33a8627fb061c29a153b67628e63209d9cebc111a81624d782c1e553518c1167a23658f9eda2c4316354e0954d023cb512a7d04c923865a6472a2eb6ca1c8495fdca5d82518de2680c8db0024b83bc338115f3b31874860c040bb53dd3fad3e6ea4ae3c0ad54401e8aa297b9cbff5d5205af0ece60fd6e7ed9f9682f19f9c8695c4bfe2081fb4051fbae114a3debb8bb72114c91ab4c57324933920974a8bb42f1722670a7c97d5c537d360a1039d829d426d74876f32419cd94f479384eb85f676757a383927ad2f793c41ccbbbc1e10edc3761c0b1e8030e5282fc6be20553f4adc91165da768420825ff5a7b1db697a5231024a16b33eb95fd36c3668cb6596b6c54c5d190eb7ab26f4c96aadbad26338a176fba08cf21c20d10af76a90aada53e7911c5364dab787ab89d413a396c2ccdfb5d8c5983d9dac816dacd1721e31118b1ee3d97f4930ee4002dd34acb6b72d1e5989f8572ee39da3fe01a2a17ddb71030ab9bd9db350aa4f9df206b375dcc652c82522a912a15e5c8b0a13b8657f915cc29ff311f92eca8a29cf000b83f183d745835a3654765d66c0e43acf9393944d44aeda3028e7aee2f82f2f1a6b521f8713549fabf1122c796eb6f37fcc8fa32c20b1b2209a457ed26ad012644b5d6c17139a6c171246[[T_F]]

So how did I do on my 30 day writing challenge? Well, the picture tells the story: Not too bad! I did miss one day, but here’s a secret about 30 day challenges: if you miss a day or two, you can just keep doing the challenge for another day or so at the end. […]

Click to continue reading “30 day challenge wrap-up: writing”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Working in webspam, we sometimes use the phrase “buy Viagra online” as an example of a search query that might be spammy. That’s why I noticed and remembered the 2013 announcement that you can officially buy Viagra online. As this Time article points out, you’ve actually been able to buy Viagra online through legitimate pharmacy […]

Click to continue reading “Buy Viagra online?”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=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[[T_F]]

Because not every blog post has to be serious:

Special thanks to my friend Amy who crocheted this masterpiece! Amy also works with an awesome group of volunteers that crochets dolls for kids fighting cancer and other illnesses.

Click to continue reading “Thanksgiving turkey hat”



[[T_F]]Data Leak Prevention – Data Security Solutions – Information Theft Protection, Detection and Prevention Software Productstracefusion_signature=8f329d5131075d33a8627fb061c29a153b67628e63209d9cebc111a81624d782c1e553518c1167a23658f9eda2c4316354e0954d023cb512a7d04c923865a6472a2eb6ca1c8495fdca5d82518de2680c8db0024b83bc338115f3b31874860c040bb53dd3fad3e6ea4ae3c0ad54401e8aa297b9cbff5d5205af0ece60fd6e7ed9f9682f19f9c8695c4bfe2081fb4051fbae114a3debb8bb72114c91ab4c57324933920974a8bb42f1722670a7c97d5c537d360a1039d829d426d74876f32419cd94f479384eb85f676757a383927ad2f793c41ccbbbc1e10edc3761c0b1e8030e5282fc6be20553f4adc91165da768420825ff5a7b1db697a5231024a16b33eb95fd36c3668cb6596b6c54c5d190eb7ab26f4c96aadbad26338a176fba08cf21c20d10af76a90aada53e7911c5364dab787ab89d413a396c2ccdfb5d8c5983d9dac816dacd1721e31118b1ee3d97f4930ee4002dd34acb6b72d1e5989f8572ee39da3fe01a2a17ddb71030ab9bd9db350aa4f9df206b375dcc652c82522a912a15e5c8b0a13b8657f915cc29ff311f92eca8a29cf000b83f183d745835a3654765d66c0e43acf9393944d44aeda3028e7aee2f82f2f1a6b521f8713549fabf1122c796eb6f37fcc8fa32c20b1b2209a457ed26ad012644b5d6c17139a6c171246[[T_F]]