Author Archives: glyncc

Houston, we don’t have a problem – Soft drink found on the moon

Getting a man on the Moon was one of the 20th century’s crowning achievements and a feat that hasn’t been matched by any government, let alone a private company.

But now one Japanese firm is taking a giant leap for advertising by launching the world’s first privately funded lunar mission

So what sort of heroes are going to show us they’ve got the right stuff this time?

 

Well, none at all. The unmanned craft will simply deliver powdered pop for future human space visitors to drink… along with a little extra – a huge container of children’s dreams.

 

Shaped like a drinks can, the “Lunar Dream Capsule” is the brainchild of a Japanese drinks firm called Pocari Sweat.

 

The firm visited high schools to collect the kids’ dreams, which isn’t quite as creepy as it sounds. These are sketched on a bit of paper and loaded into a huge titanium Pocari Sweat drinks can, along with a packet of the powder used to make the popular beverage.

 

According to the information, this is meant to symbolise “our precious water” and prove that “dream [sic] is always close to our hands”.

 

The marketeers said they hope that one day “youths interested in space will live out their dreams” and mix the powder with lunar water to create Pocari Sweat itself.

 

During October next year, the huge drinks can will begin its 380,000km journey to the moon.

 

In a statement, Otsuka Pharmaceutical Co, Ltd, owner of the sweaty brand, said: “When the Lunar Project succeeds, Pocari Sweat becomes the first ever beverage to arrive at the surface of the moon. Move forward with dreams: Pocari Sweat will always support your dreams as a beverage close to you.

Are you doing the same as Lloyds Bank and RBS?

Royal Bank of Scotland boss Ross McEwan  admitted that it had failed to invest properly in systems for decades as he apologised for an embarrassing IT failure on the busiest online shopping day of the year in 2013.

This breakdown may come as a shock to RBS customers and instil a sense of smugness elsewhere but be very, very, careful, ask any IT consultant if this is surprising news and not only will they not be surprised they will be shocked it doesn’t happen more often.

We are seeing plenty of bank and big business breakdown and it’s all because of undespending. There used to be an adage that “no-one ever got fired for buying IBM”. They were known for quality of products and service and you paid what they asked, without query. Now its a case of here is your budget, now get the best you can, and off the uninformed employee sets off on the impossible quest.

He went on “We need to put our customers’ needs at the centre of all we do. It will take time,  but we are investing heavily in building IT systems our customers can rely on”

I would take a bet that 99.9% of IT spend is done like this, we are always having to backtrack our proposals to a lower cost, and usually the more expensive the cars outside the lower the IT spend in proportion to the turnover of the company.

The major interest of anyone spending anything on IT is not “will it do the job now and in five years?” but how much can we trim down the price to get it something more reasonable?

When was the last time a Director thought “I want that MERC outside my office but I will go for a lower model because I don’t need everything that it offers and I will save money, I will go for Ford Focus Cmax instead?

There seems to be two misconceptions. 1. It is always more expensive than it should be and 2. They are trying to make as much out of me as they can. Let me blow the myths away for us, and our fellow consultants (the good ones not the ones who are guessing). It will be the price it is, you get what you pay for, Everyone is trying to make as much as they can to survive and thrive, but not at your expense. If the Answer is £5000 why should I say £7000? I am less likely to get the business. However if I say £3000 then that, in your mind will be too much.

Imagine you have had a heart attack and the Consultant tells you its going to cost £5000 to make you better, would you say “You’re wrong, I only want to spend £3,000, give me a cheaper part and operation” . Of course you would, you don’t value yourself do you? Wrong, you’d soon find the extra.

So why jeopardise your business health? Find someone you can trust and take their advice, that’s the hard part isn’t it – trust? Do your clients trust you? or will they be like RBS customers and go elsewhere when the service drops because the IT breaks, never mind you did buy the MERC because you needed it didn’t you?

I dont want to pay Microsoft an extra £8,000 for a server – but what is UNIX?

Every one assumes that everything computing is either Apple or Microsoft and if it’s a server then it’s got to be Microsoft, well sorry to disappoint you but the big computer systems run on a product called UNIX, of which variants can also be used on other systems too, such as a server, a television, the Android phone in your pocket and all Apple products.

Just some of the 300 flavours of UNIX

Just some of the 300 flavours of UNIX

This blog is to explain why UNIX might be a better solution for you than having a Microsoft server, because it’s cheaper, its more reliable and much more efficient at networking.

Why isn’t everyone selling it? Well that’s simple it takes a special technical IT person to install and configure it, an IT technician who actually understands computing as opposed to someone who has been on a one day course or read “Networking for dummies”.

If you want to want to know it’s history and why it’s sometimes the best choice for smaller companies then read on, otherwise just re-read the second paragraph.

What is UNIX?

UNIX is an operating system like Windows and Windows server. It easily predates Microsoft by decades and comes with a totally different history. Microsoft was designed as a single computer operating system and then added networking later, whereas UNIX was designed from the beginning as a multi-user, shared, networked operating environment.

There are many variants of UNIX such as AIX, Solaris, Xenix, Posix, Linux, Os X, Chrome and Android but they all started from the same source and we use the UNIX as a generic explanation.

In the early ’60’s AT&T and Bell labs developed the original UNIX. AT&T tried to commercialise it by licensing UNIX to third-party vendors, leading to a variety of both academic and commercial variants. Eventually the product became an open source product and the Open Group decides who can call their system UNIX. There are many UNIX-like systems but the group disapproves of the term being used by them.

There are many versions now available but we have chosen to use the BSD distribution which originated in the University of California, Berkeley and which is now the most widely used derivation.

Why UNIX?

As mentioned earlier UNIX was developed as a multi-user networking product. Because the typical computer in the 1960’s was less powerful than a modern digital watch it had to be small to run. Now computers are more powerful it is ultra efficient in what it does. Windows was designed to run on bigger systems and networking was added making it large and cumbersome in comparison. UNIX does it in a small space but Windows needs massive computing power and RAM to do the same task.

Why UNIX for Small Business?

UNIX needs less to do more. So if you need raw networking power such as running a Sage system then UNIX will give it to you on a smaller machine. No matter how large and powerful your system is Windows will always work slower in supplying data down a network. It means that a simple data server can cost £££’s less than a Windows server.

Why supply Windows Server then?

Microsoft has several server packages apart from just a file server such as SQL, Exchange and other more specialised packages. This makes it an easy recommendation, sell, buy and install but it might be the easiest but not necessarily the right choice. There are other programs that the vendor says will only work with Microsoft because they don’t want to try it on other platforms, after all they are selling software and not buying hardware. So sometimes Microsoft is the only choice. The difference is we sell both Microsoft and UNIX , we know the difference and we know which is the right solution for you, After all we will be the ones looking after it and how many sales people can say that?

What is the difference to me then?

 UNIX servers don’t get viruses or hang like Windows.

UNIX servers usually cost 50-70% less than Microsoft servers for the same performance.

Larger files are delivered 300% faster on a network with UNIX as opposed to Microsoft Server 2012

Microsoft Server can be installed badly by anyone

 Who uses UNIX ? –

Apple, Amazon, IBM, Google, Android, Panasonic and virtually all of the Internet and big businesses who use IBM, Sun, HPUX, the list is endless really.

Anything it doesn’t do?

Apart from the washing up, its not very good at GUI’s, that’s graphiocal interfaces such as the desktop screen you see when you use icons, there are versions of it but it uses a large amount of processing power, Aple have the best implementation but you can get at the nuts and bolts behind Apple to run your own programs.

If its so good why isn’t everybody selling it instead of Microsoft Server?

Lets say you want to find a file, in Windows you enter it into the search bar, in MSDOS the command you enter is C:> DIR myfile* /s. This will search everywhere in C: and display all files that start myfile. In UNIX you would type in ROOT:> find / -name ‘myfile*’

So its too technical for most computer companies to install and setup. Once its done though, it just works, like an Apple product or Panasonic TV. The hard / clever bit is installing it and setting it up. It takes years of experience, training and knowledge, we have loads of that but most companies want a quick easy install using cheap labour. We want a reliable, value for money install instead.

I was talking to a computer company who is bigger than us, we have 7 staff and they have 17. They target companies with 100 + users whereas we target SME 1 to 60 users. Different market and Microsoft is an easier sell and install for them. They will never invest in UNIX expertise. I suspect if their target market was 1000+ users then they would.

Microsoft’s greed & IT “experts” ignorance is why small business is being ripped off.

Microsoft have really annoyed us, that’s no mean feat as we are loyal fans. You might not like them for lots of reasons but you have to admit that Microsoft rule the business roost, they have a wide range of products and when it goes wrong its usually predictable, common and easy to fix.

So why are we upset? – Microsoft greed, quite simple and that is driving them to fool the end user into shelling out more hard earned money than they have to. They are also pandering to the greed of ignorant IT advisers who are attracted to quick profit’s and easy sales without a care for their clients long term  benefits. Just like endowment mortgages, extended warranties, PPI and any “cheap” scheme! 

I am going to ignore the cost of hardware, that’s the bits you kick and forget to dust, at least for this part, I’ll get round to it later, in another blog.

Lets assume you are an ordinary business user, in this example you work on your own. You buy a computer and install Microsoft Office Home & Business which gives you Word, Excel, One-Note, Outlook and PowerPoint. That will cost you £200 -ish. Now if there are more of you then will need a server which we will discuss later.

Now the ignorant or unscrupulous IT person will tempt you with Office 365, everything in the cloud for £10 a month and it never goes out of date, so you either dump or don’t use your Home & Business version or maybe you chose not to buy it as Microsoft will always push you to 365.

Lets do two things, look at the cost of ownership, Internet availability and versions as 365 is always up to date isn’t it?

If you buy the version for your computer it will cost £200 and you will keep it for about five years. Office 365 will cost you £10 a month and over five years that’s £720 including VAT. So you have paid 3.6 times more than you needed but of course its always up to date, isn’t it?

Office comes out every few years; 2003, 2007, 2010, 2013. So you will only ever be one version behind, and when was the last time people queued overnight to get the latest features for Office? – Never, they aren’t Apple you know.

Just to annoy you there is a free version of Office online, its not a clone, its from Microsoft and its free to use on the Internet, funny that no-one told you that till now isn’t it? https://www.office.com/start/default.aspx

Now lets look at Servers and this gets complicated so I’ll make it simple. A year ago you could buy a Microsoft server for a small business that did most things for up to 25 users. Try and buy it today and it will cost you at least £8,000 more for exactly the same thing.

Its all down to licence changes, I can do the maths here but we will both fall asleep, so take my word for it, if you don’t want to, then e-mail me and I will send you the detailed licensing costs.

Reasons why they are taking more ?

Greed, pure and simple, Microsoft revenues are being attacked on all sides with probably the only exception being the Xbox. Microsoft don’t answer to their users like you and me, we are the cash-cows. No, they answer to their shareholders who want more revenue and more dividends.

The only options for Microsoft, like any business, are sell more, cut costs or increase margin.

WOW! they have done all three. Its easy, just make it hard or impossible for users to buy cheaper stuff, charge them more monthly so they don’t notice and sack a few staff.

How short sighted, but for us it’s great, we know what they are up to but the smaller IT company can’t see further than next weeks cash flow so they talk the same language to the cash strapped, cost conscious, small business, who, not knowing any better, signs up.

Remember my earlier comment? Sound like endowment mortgages, PPI, extended warranty sales? – that’s because its all based on the same ponzi scheme, the clever making the stupid sell to the under informed.

So what’s the solution.

If you need to use your software on the Internet using your phone, tablet, laptop etc. then use the free office. You get online storage with it too. Microsoft offered this to counter Google software but you cant be the slave of several masters so they kept quiet and hid it.

Install Microsoft Office Home and business Office on decent PC’s and laptops that will last five years – tip a cheap one wont last that long.

Install a server which isn’t Microsoft based, It doesn’t matter what its running as long as it holds data, works Microsoft Outlook, drives you mobile phones and backs up. There is only one answer here and that’s a system which ends in x. If you want to know more then that’s another article but it drives your TV, most of the Internet, every Apple device, all NAS’s, routers and every large computer system in the world and its been about since 1964. Good enough for you?

Don’t bother asking the guy who recommended Office 365 to you, he’s obviously too technically inept to know how to install a proper Linux server and besides, he will want to sell you cloud services which will improve his cash flow for this week and dent yours for the next five years but you wont notice will you, after all you will be getting the latest version for nearly four times the price?

CYBER ATTACK – 87% of small businesses are being targetted from the Internet

He is after you too and you are an easier target.

Everyone thinks it’s only the big businesses that are attacked on the Internet. In fact earlier this year, the Department for Business, Innovation and Skills (BIS) reported that 93% of large businesses fell prey to a cyberattack in 2012.

The successful attacks hit the headlines but what about small businesses, thats those from 200 employees down to the self-employed?

Before we do that, re the last sentence again. The successful attacks are unseen until the details are posted on the Internet, Most breaches aren’t detected until its too late, so bear that in mind while you have the complacent smile. Have you checked you PayPal account and credit card statements because everything under £100 is not covered by card insurance, and most people don’t check the small amounts, Now you are thinking read on…………

Well, small and medium-size businesses (SMBs) also suffered, with 87% being targeted – up 10% from the previous year.

Now, the reasons why SMBs are at risk has been examined in detail in a recent Sophos-sponsored report by the Ponemon Institute.

The report – The Risk of an Uncertain Security Strategy – surveyed over 2,000 IT security managers within organisations employing up to 5,000 people.

Given the job roles of the respondents, some of the findings are quite staggering:

44% of said that a strong security policy is not a priority

58% claim management do not see cyber attacks as a significant threat.

Other barriers to implementing an effective IT security strategy were also identified with 42%, unsurprisingly perhaps, citing a lack of budget as a large factor. Another major issue identified by the survey was a lack of skilled personnel.

Other findings in the Ponemon report are even more concerning.

Considering the fact that respondents in the survey are all responsible for managing the security function, I find it quite alarming that 1 in 3 admitted that they did not know whether their organisation had been subjected to a cyber attack in the last twelve months. Such a lack of knowledge would seem to suggest a deficiency either in the monitoring and reporting of incidents or with the IT management itself.

Also, the Ponemon Institute discovered that those in more senior positions seemed to have the least knowledge of the threats posed to their business, which is again a concern as they are likely to be the decision makers who would deem whether a particular threat should be a priority or not.

Interestingly, 31% of the individuals surveyed said that there was no particular person within their company with responsibility for making security decisions. You wonder who has the job of issuing keys or turning the alarm on and off.

Another discovery was that SMBs struggle to assign a monetary value to information assets. If an organisation does not apply a cost to its assets then how can it determine their value and, hence, the appropriate level of security protection to apply to it?

The topic of mobile devices were of concern to the individuals surveyed, especially given the widespread adoption of BYOD which they reported. Many respondents said that their organisations are planning to invest in technologies to reduce BYOD risks as a result.

51% of respondents did not equate regulatory compliance with a strong security position, given that remaining compliant shouldn’t be the goal and rather should be a by-product of good security.

So what can SMBs do to improve their knowledge of cyber threats?

  1. Proactive monitoring, detection and reporting on threats to enable quick and incisive decision making.
  2. The establishment of mobile and BYOD policies
  3. Where in-house security resources are limited, better planning  consultants and easily managed resources can help to free up the organisation’s information professionals.
  4. Costing of information assets and downtime so that senior management can invest in cost effective solutions to protect them.
  5. Working with the higher echelons of management within the business in such a way that they place a higher priority on cyber security.

 

 

 

 

4 password mistakes small companies make and how to avoid them

Urgh!When it comes to IT security, small businesses is in a tight spot.

They’re almost always heavily dependent on computers but they are not large enough to have dedicated IT staff; everyone is busy doing their day job (and probably a few other jobs as well) and the responsibility is simply handed to the least non-technical person.
In those circumstances, knowing what to do, what’s important and where to start with computer security can be very difficult and the first casualty is usually the company’s passwords.
Despite the rise of biometrics and two-factor authentication, almost everything we do on our computers is still secured using passwords, so getting them right is vitally important.

I’ve compiled a list of four common password mistakes that I see when working with small companies. If you can avoid them then you’ll have put your security on a stronger footing.

Anti-virus – you need it but it’s not enough
OK, I just said this article is about passwords but I think it’s important to start with a word about anti-virus.

Whatever the state of security awareness in a very small business the chances are that there’s one thing everybody will agree on; that they need to run anti-virus. That consensus can have a chilling effect on other aspects of computer security, because to a lot of people anti-virus is computer security and once it’s installed, security is complete..

Unfortunately installing anti-virus is the second step, not the last.

The first step is which anti-virus. There are many on the market but there are probably only three or four worth having, ESET, Kaspersky, Trend and Sophos, if you want to know why, then search our blog for “I know I am safe, because I haven’t been told I’m not”

You need to ensure that all of your devices; PCs, Macs, tablets, Microsoft Servers, Linux servers and phones are using anti-virus and that they are updating successfully.

And then you need to read on…
Fear of forgetting leads to awful passwords
One of the reasons people use weak passwords, and then weaken them further by sharing them and using them over and over, is because they’re afraid of forgetting them. (I once had a customer who wrote his Windows password on his computer monitor because he was afraid he’d forget it. His password consisted of two letters; his initials).

To overcome the fear of forgetting your passwords you’ll need a place you can keep them safe and always find them.  It doesn’t matter much where it is – it might be an application on your computer such as keypass, a website like LastPass, a leather bound book or even your own memory – what matters is:

  1. You know where it is
  2. You can control who has access to it
  3. It is the only place your passwords are kept
  4. It can store hundreds of unique, strong passwords

Once you have decided how you are going to store your passwords put the ones you can remember into your safe place. Gather up any notes, files and post-its where you’ve written your passwords down and copy them over too.

When all of your passwords have been transferred to your safe place remove all traces of them from anywhere other than your secure location. Clean your passwords off whiteboards (or computer monitors), delete them from computer files and shred or burn any pages or post-its where you wrote them down.

By creating a safe place to store your passwords you’ll free yourself to choose complex passwords that you couldn’t otherwise remember.
Which is what we’ll do next…

Passwords are easier to crack than you think
When we talk about strong passwords we mean passwords that a powerful computer will have difficulty guessing. This isn’t the movies and we’re not defending ourselves against elite hackers whose second guess is always supernaturally lucky. Your passwords are at risk from computer programs that can guess thousands of passwords a second and are able to understand some of the tricks you use to make passwords more obscure.

A short while ago we were given some old computers by a small business. As an experiment, and with the previous owner’s permission, we booted one of the computers using a password auditing tool. Running on the defunct company’s own old hardware, the software guessed the admin password for the first machine in under ten seconds.
The password was an eight letter word (the company name) with a zero in place of an ‘o’ to make it difficult to crack.
The computer, it turns out, was the machine holding the company accounts. Using dictionary words and paying lip service to security with a few numbers or odd characters where there should be letters simply isn’t enough.

Use 14 characters or more and switch as arbitrarily as you can between UPPER, lower, d1g1t5 and //@ckies.

If you’re wondering how you’d ever create a password like that I suggest you use a random password generator. Now you control access to your passwords and you’ve made sure they’re all good and strong it’s time to stop sharing them.

Your password isn’t secure if you give it away
When I work with a small business they have to give me access to one or more of their systems.
I am staggered at how often I’m simply handed a long list of admin passwords (often for systems I don’t even need access to) that are shared by everyone at the company.

Account sharing like this is a really bad idea, not least because:

  1. If something bad happens you can’t tell who did it.
  2. It makes your more vulnerable to social engineering.
  3. It makes changing passwords too painful to bother with.
  4. Everyone with a password can cause maximum damage.
  5. You don’t know who else has your passwords.

One of the reasons that people in organisations share passwords amongst themselves and with outsiders is because it’s incredibly convenient.  Keeping usernames and passwords secret is a bit like taking daily backups – it’s a small inconvenience that will save you a big inconvenience some time in the future.

Unfortunately you’ll just have to bite the bullet, there is no real alternative. Yes, it’s a little bit more inconvenient to make sure everyone has their own username but it’s no different than limiting access to your front door keys. Every person who needs access to a particular system should have their own account with a unique password and the lowest workable access level.

Whats the risk?

How do you feel when you are told that the bank, credit card or online retailer has given away your details? Now these guys spend £millions making sure they are secure but people cleverer than them break their systems. Now you are smaller, probably have no real security. Now it may be that you will only have a few credit card details unknowingly held on your computers so the reward is much lower but breaking in is so much easier. JUST THINK ABOUT IT, AS THE BIG COMPANIES GET HARDER THEN YOU WILL BE THE NEXT EASY TARGET. It’s time to get smarter before you become poorer as the card companies are already refusing to pay when the password was easy.

Tablet v Laptop which one is best for you?

Tablets have been out a while now and there have been many claims they will kill the laptop, well it hasn’t happened. Although tablets have become quite popular thanks to their extreme portability, easy to use interfaces and the wide range of ways they can be used. In many ways, they can almost replace a laptop for someone on the go. But is a tablet really a better choice for someone over a more traditional laptop? After all, laptops can also be extremely portable and have a much wider range of tasks they can be used for.

In this article, I’m going to take a look at the various differences between tablets and laptops to see how they compare to one another and which of the two may be better. By examining these in more detail, one can then have a clearer understanding of which of these two types of mobile computing platforms would serve them better.

Input Method

The most obvious difference between a tablet and a laptop is the lack of a keyboard. Tablet’s rely solely on a touch interface on the screen for all input. This is fine when it involves mainly pointing, dragging or tapping to navigate around a program. The problems come in when you have to input text into a program when such as an email or document. Since they have no keyboard, users are required to type on virtual keyboards that have varying layouts and designs. Most people cannot type type as quickly or as accurately on a virtual keyboard. Users do have the option of adding an external Bluetooth keyboard to most tablets to make this more like a laptop but it adds costs and peripherals that must be taken with the tablet.
Result: Laptops for those that write a lot, tablets for those that do more point interaction.

Size

This is probably the biggest reason to go with a tablet compared to a laptop. Tablets have the size roughly of a small pad of paper and a weight that is under two pounds. Most laptops are far larger and heavier. Even one of the smallest ultraportables, the Apple MacBook Air 11 weighs just over two pounds and has a profile that is larger than an iPad 2. The main reason for this is the keyboard and trackpad which require it to be larger. Add in more powerful components that require additional cooling and power and they get even larger. Because of this, it is much easier to carry around a tablet than a laptop especially if you happen to be traveling.
Result: Tablets

Battery Life

Tablets are design for efficiency because of the low power requirements of their hardware components. In fact, the majority of the interior of a tablet is taken up by the battery. In comparison, laptops use more powerful hardware. The battery component of the laptop is a far smaller percentage of the laptops internal components. Thus, even with the higher capacity battery of laptops, they do not run as long as a tablet. Many of the tablets right now can run up to ten hours of web usage before require a charge. The average laptop would only run for roughly three to four hours with a few systems able to stretch it out to eight hours but that still less than a tablet. This means that tablets can achieve all day usage which few laptops can achieve.
Result: Tablets

Storage Capacity

In order to keep their size and costs down, tablets have had to rely on new solid state storage memory as a means to store programs and data. While these have the potential for faster access and low power usage, they have one major disadvantage in the amount of files they can store. Most tablets come with configurations that allow between 16 and 64 gigabytes of storage. By comparison, most laptops still use traditional hard drives that hold far much more. Extremely affordable netbooks still have 160 gigabytes of storage which allows for ten times the amount of data as the most affordable tablets. This won’t always be the case though as some laptops have moved to solid state drives as well and may have as little as 64GB of space.
Result: Laptops

Performance

Since most tablets are based on extremely low powered processors, they will generally fall behind a laptop when it comes to computing tasks. Of course, a lot of this will depend on how the tablet or laptop is being used. For tasks like email, web browsing, playing video or audio, both platforms will typically work just as well as neither requires much performance. Things get more complicated once you start doing more demanding tasks. For the most part, multitasking or graphics performance it typically better suited with a laptop but not always. Take for instance video editing. One would assume that this would always be in the laptops favor but a recent test of video editing on the iPad 2 with iMovie found its specialized video hardware actually provided higher performance than doing the same task with iMovie on a MacBook Pro. The difference is the laptop version has more capabilities which brings us to the next item to consider…
Result: Laptops

Software

The software that runs on a laptop or tablet can be vastly different in terms of capabilities. Now if the tablet PC is running Windows 7 such as the HP Slate or ASUS Eee Slate it can theoretically run the same software as a laptop but will likely be slower. This can make it easy to use it as a primary laptop using the same software used in a work environment. The two other major tablet platforms right now are Android and iOS. Both of these require applications specific to their operating systems. There are tons of programs available for each of these and many will do most of the basic tasks that a laptop can do. The problem is the lack of the input devices and hardware performance limitations mean that some more advanced features supplied by corresponding laptop class programs may have to be dropped in order to fit into the tablet environment.
Result: Laptops

Cost

Tablets are relatively new to the market and as a result, they tend to carry a fairly high price premium for the new technologies they have installed in them. The average starting price for a tablet seems to have settled around £400. By comparison, there are laptop computers that can be found for as little as £300 to £400. Of course, most people are probably not going to be looking at the least expensive laptop. The average price of the laptop is more around £650 which is slightly more expensive than the mid range tablet cost. Laptops still have the advantage over tablets though if you look at equivalent performance and features. After all, netbooks start below £300 but can generally handle all the same tasks as a tablet, just in a not as easy to carry or use format.
Result: Tie

Stand Alone Device

This category is describing a situation where a tablet would be your only computer system. It isn’t something that many people would necessarily think about when looking at the devices but it is pretty critical. A laptop is a fully self contained system that one can use fully as a computer system in terms of loading data and programs onto and backing up. Many tablets actually require an additional computer system beyond the tablet for backing up the device or even activating it. The iPad 2 is a good example of this as the first thing a user is required to do is hook it up to a PC to activate it. Now, one could do this on another person’s computer but you still have the problem of backing up data especially if you want to temporarily remove an application if you have limited space.
Result: Laptop

Conclusion

As it stands, laptops still offer a greater level of flexibility when it comes to mobile computing. They may not have the same level of portability, running times or ease of use of a tablet but there are still a number of issues that tablets need to resolve before they become the main means of mobile computing. Over time, many of these issues will likely be resolved. If you already have a desktop computer, than a tablet may be an option if you use it mainly for entertainment and web usage. If it is going to be your primary computer, than a laptop is definitely the way to go. The other observation is that the tablet has replaced other forms of computing when the only task that is needed is internet browsing, however, we have seen the smartphone take a slice of that market too.

5 of the best free USB encryption software packages that secure USB drives by encrypting the data that is stored on them.

USB drives or flash drives are easy to carry. But handling sensitive data through USB drive is always a risk. If you are a part of large organization then losing sensitive data can have severe consequences and hence data security is of utmost importance.
Here I present you with five free software to encrypt data on USB drives.

1. Comodo Disk Encryption

Comodo Disk Encryption is a wonderful free USB encryption software for windows users which comes with an easy to use user interface.
Install Comodo Encryption tool and a small icon will get added to your system tray. Double click it and you will get to the main menu of Comodo Encryption tool. Plug in your USB drive for the system to recognize it and it will be shown in the main interface.
The panel in the interface allows you to encrypt or decrypt a USB drive just through a right click over it. The Comodo encryption wizard is shown in the picture below. Once you encrypt it you will have to remember the password to access your data in future. Find Comodo free encryption tool through the link.

2. Rohos Mini Drive

Rohos Mini Drive is a free software to password protect USB drive. It creates an encrypted partition for your sensitive data in the flash drive.
Download and install Rohos Mini Drive software. Plug in your flash drive and execute the software. You will get three options as shown in the picture below. As you select Setup USB key option and enter a password, it will create an encrypted partition on your USB device.

Rohos Mini encryption disc size limit is 2GB and the default file system is NTFS. But you can also customize the partition settings.  You will be able to access your encrypted data from any guest PC through the password provided by you and your data can be securely accessed. One can even open the protected drive on the systems even if the user doesn’t have administrator rights. Find Rohos Mini Drive through the link.

3. USB Safeguard

Just as the name says USB safeguard safeguards the sensitive data in your USB drive. It uses AES encryption algorithm and password protects the data in your USB device. Also you can make selected encryptions possible by choosing one or more folders to be encrypted.
The main advantage of this free USB Encryption Software is that it doesn’t run from your system. Instead, you download the program and transfer it to your USB device and run the .exe file from the USB drive.
You can immediately start encrypting your files on USB device just after setting a password access. Drag and drop your files from your USB device into the tool window and encrypt or decrypt the file. If the encryption was successful then a small dsk file will be created in your USB which cannot be opened.

This free USB encryption software is very simple to use and manage. It also has an option for ‘Safe Browsing’. By activating this feature, you can have safe browsing which deletes all traces of internet browsing. In short USB Safeguard is a great piece of free portable USB data encryption tool. Reach USB Safeguard through the link.

4. DiskCryptor

DiskCryptor is a free open source encryption software that encrypts all disk partitions, external USB storage devices or CD-ROM drives. It provides you with the choice of using multiple algorithms such as AES, Twofish or Serpent.
Download and follow the instructions to install the software. Connect your USB device and execute DiskCryptor. The DiskCryptor window will show your USB device drive. Just select it and encrypt data on your USB device. DiskCryptor supports FAT, NTFS file systems.

DiskCryptor is a completely free easily usable open source. You can download the tool directly by following the link.

5. TrueCrypt

TrueCrypt is another powerful open source freeware for protecting data on USB drive. It works on Windows, Mac and Linux platforms. It supports full encryption of system hard drives and USB devices.
The tool comes in a very easy to use package. Plug in your USB drive and open true crypt executable. Create volume for your USB drive and follow the instructions. You provide a password to protect the data and that’s it! You can view the encryption progress in the pool content. The picture below shows an example of how it would look like.

You can select AES, Serpent or Twofish encryption algorithm. To access the data back you just need to enter the password. Find TrueCrypt free download by following the link.

Conclusion:
Data thefts are everyday news now! All these tools are freely available and you can download it anywhere anytime. Ensure your sensitive data is always secure.

“Only a fool will trust their data to someone else” – I wrote this a while ago and although it still applies, it doesn’t, all at the same time.

What is the “cloud”?
Lets get some definitions out the way, using the cloud is different to cloud computing which is different to cloud computing. Confused? Yes! So is every body but here is a simple guide.

This all relates to doing things on the internet on a remote computer. When you fill in your tax return then that is cloud computing but so is using online word to edit a document which is stored on the cloud, or just making a backup. That didn’t help really did it? So here is a definitive guide. Anything on a remote computer which you don’t own or control is the “cloud”. You connect using the internet to a remote computer.

If You store data on this remote computer you are using cloud storage, if you use a cloud computer to so some work such as Word, then this is cloud computing. If you fill in a tax form then you are doing it on the cloud. A internet connect to a computer you don’t own or control is using the cloud.

So we have cloud storage, cloud programs and cloud forms, Cloud can be also replaced with the word remote or even better; “I have access to internet” as in I have access to internet storage, I have access to internet programs and I have access to internet forms.

Your bank is responsible but the cloud isn’t
That’s great, we all now understand each other on what the “cloud” is, but you don’t own it or control it, you give that away in much the same way as you put money in the bank but you don’t own or control the bank. However the bank take responsibility for your money, that’s not the same with the cloud.

The bank use your money and they are responsible for handling it, the cloud does not take any responsibility and in fact I would go as far as to say that they don’t even care about your data which may not be true of all of them but you are a small dot in their business plan and model.

And that’s why its so damn confusing.

I believe that I am personally responsible for my data 100%. If I loose it for any reason and can’t get it back because of a failure to backup then its my fault. This is also the view of the law when it comes to company directors too. You are responsible, whether you like it or not so unlike the banks who take responsibility when you give them your money it isn’t the same when you give someone your data.
Storing stuff.
The advantage of storing things on the cloud only applies in three cases. The home worker, the archive and sharing data. The rest of the time you cant beat having it under your control.

The home worker
The home worker like everyone needs to store a backup somewhere, yes they can give it to a relative but normally these people are busy and low priorities are forgotten. Backups are a low priority and making sure there is a copy elsewhere rarely comes into the equation. They may make a backup on a pend drive but that’s useless when the drive is in the burnt out shed with all the paperwork and the computer from which t was meant to be a backup.

The home worker can have files backed up regularly and there is a copy off site. The only downside is that it is usually just single copy but when the shed is a blackened ruin it’s a god send.

The archive
The cloud archive is useful, its a cheap storage that’s quick to retrieve. The alternative is storing all the information and backups. This slows backups down and also day to day running. Have a backup, archive the old data to the cloud and put away the backup. The advantage is the backup media is being renewed regularly, the data in house is fresh and compact but access is available for the occasional archive retrieval.

The downside is compliance, you need to make sure that the data stored is accessible for you and you alone, apart from the various data acts, the professional bodies have quite a lot to say how data is stored.

The data sharer
The reason for data sharing can be quite simple, no matter where you are and what you have you can access your data or the data can be shared with a team, no matter where they are or what they have. By what they have I mean smartphone, tablet, laptop or public computer. They don’t even have to have a wireless link, they can download the data to their device but watch security as a lost tablet with data is, well I don’t have to explain do I?

Using Stuff
I find it quite funny that anyone with a smartphone soon starts downloading apps but anyone with a computer or tablet is pushed into not downloading apps but using the cloud. That alone would make me suspicious.

This is becoming the most widely oversold area and this is why I come across as anti cloud. Let me explain. You pay to have Software as a Service or SaaS. then wherever you are you have access to the programs you want on anything you want. I think this is a rip off along the lines of PPI, Endowments and extended warranties and anyone selling this is either uninformed or short sighted and certainly not thinking clearly of their client over their commission.

Let imagine you want the usual mix of Outlook, Word, Excel and possibly PowerPoint. If you buy this for your computer you will pay about £200, you will probably stick with that for around five years. If you buy it on the cloud it will cost you £10.10 a month plus VAT. For the small non VATable business the choice is simple £220 or £727.20 for five years usage and the cloud software isn’t as good anyway.

The main argument for cloud Office is that you always use the modern versions. Firstly they are not the same as the full blown copies and Microsoft issue full version updates occasionally anyway. In the last 11 years there were only four versions, there were no Office versions 2004,2005,2006,2008,2009,2011,2012 and that didn’t bother anyone did it?

The real killer is that there is a free version of Office in the cloud anyway! – That’s a well kept secret too!

Now there are other cloud programs CRM, ERP and the downside of these is that they are expensive over a five year period and if you want to bring the data down to your own machines then you can’t.

Except…..
The big exception to all of this would be our friends at Junari. They offer an excellent CRM package which is affordable and when the alternative is in house special software then a cloud offering makes sense.

The other downside
In the last year we have seen data lost by banks, shops and IT companies. This was due to security breaches and its the same risk you take with putting your data on someone else’s computer. Its worse as if they are a big company like Microsoft, then it will be a target. If it’s a small company then what’s their security like?

Both Azure and Exchange in the cloud have been inaccessible and that’s with massive server farm’s, so how reliable is your access? Can you suffer an outage of a few hours to several days as there wont be anything you can do in the meantime.

If your online storage only has a single centre then the snip of a single fibre optic cable will cause an outage. Its better to have several locations and several portals. Last time Microsoft cloud storage went don the revealed that there was one access point and they hoped no one noticed the three day outage, yeah right!

The alternatives
There are always alternatives, even if the answer is to do nothing its an alternative! Here is the “cloud” checklist:

Q. Is my backup in the same location as my data?
A.  Use the cloud.

Q. Do I need to share data with my devices or colleagues?
A. The answer may or may not be the cloud

Q. I like paying monthly instead of in one go
A. The answer is a credit card and not the cloud, you will save money

Q. I want to be able to access  Microsoft Office whatever I have and wherever I am
A. Don’t pay for it, use the free Office

Q  We want special software to use in the company
A. The answer may or may not be the cloud.

Q. I want six email addresses and I cant afford an email server
A. You may not need to, you can run an Exchange type program with everything on a PC

Q. My broadband is slow
A. Forget the cloud, if its slow coming down it will be dreadful sending stuff to the Cloud

Q. OK I get it, the answer is “it depends” but who can I ask
A. Anyone who isn’t trying to sell you the cloud without looking at your needs and doing a five year plan first. That definitely means avoid cloud sales people. Remember PPI, Endowments, Extended warranty. They were not in most of the clients best interest either but some people needed them all the same, it just depends.

Conclusion
I once wrote an internal memo ” Anyone who trusts their data to someone else is a fool and they probably don’t or can’t count the true cost for any business decisions”  It’s harsh but its still true and I wrote that in 1995.

Its become nearly impossible to find anyone both unbiased and fully informed. Funnily enough it’s down to trust and suspicion. Always be suspicious when buying anything remember “Caveat emptor” is such an old principle that its in Latin and deal with people you trust.
 
I have to say we do sell cloud storage and we also sell cloud archive but only the right product to the right people under the right circumstances.  

As you can see its a case of “prove the need” a principle that I applied when I became technical director of the predecessor of cmx and Its something I still firmly believe in today. 

10 tips every outlook user should know

 

We have highlighted the ten most useful extras that you can add to your computer system.

We all become slaves to our PC but sometimes we can make its rigid rules work for us. There are many times when we get interrupted by a trivial email which we cant help but answer because it just takes a few seconds but that interruption can take minutes before your thoughts are back on track. Here is our collection of 10 tricks to make life easier

Use scheduled tasks to automatically launch Outlook at a preferred time.
1. How to start Outlook using scheduled tasks

If you are a slave to email messages you can always dedictae a time slot to deal with emails. Using scheduler allows them to be openend, dealt with and closed until the next scheduled time.

Microsoft Outlook lets you check your email, schedule appointments, view calendars and manage contacts. If you don’t want to manually open the program, Windows has a task scheduling feature that automatically opens Outlook based on a configuration you select. In addition to having the program open when you log on to Windows or start your computer, you may configure Outlook to start daily, weekly or monthly at a specific time.

Step 1
Click the “Start” button. Type “Schedule Tasks” in the search box and press “Enter.” This doesn’t work for Windows8 so contact us and we will send you the necessary steps
Step 2Click “Create Basic Task” under “Actions” in the far-right pane. Select a name for your task next to “Name” and a description for your task next to “Description” on the wizard’s first screen. Click “Next” to proceed.

Step 3Select the time you want Outlook to start under “When Do You Want the Task to Start?” Select “Daily,” “Weekly,” “Monthly” or “One Time” to select a specific time frequency. Select “When the Computer Starts” or “When I Log On” to open Outlook when one of these events occurs. Click “Next” after selecting your option.
Step 4
Use the drop-down lists to select a date and time if you chose to start Outlook daily, weekly, monthly or one time. If you selected to start Outlook weekly, click the box next to the day of the week you want the program to open. If you selected to start it monthly, select the exact day of the month you want it to run. Click “Next” to continue.
Step 5
Click “Start a Program” on the “What Action Do You Want the Task to Perform?” step and click “Next.” Click the “Browse” button next to “Program/Script.” Locate Microsoft Outlook in the dialog box, then press “Enter.” For Microsoft Office 2010 users, “C:Program FilesMicrosoft OfficeOffice14Outlook.exe” is typically the default location.
Step 6
Click “Next” and “Finish” to save your scheduled task for Outlook. The program will start at the time of the scheduled task.
2. Create a Custom View

 

You’ll spend hours tweaking your system’s settings in the BIOS, even if you spend most of your time surfing the web. And the same holds true when it comes to finding the best overclocking settings for your GPU, even if the end result only nets you a few extra frames per second in your favorite shooter. So why not spend a little time customizing Outlook? After all, assuming you keep the client running all day, you’ll log a considerable amount of time staring at its unwieldy interface during any given work week.

 

To begin molding Outlook’s UI to better suit your style, click on View>Current View>Define Views. In the pop-up that appears, press New to create a new view and give it a name. This is also where you’ll choose your template (Table, Timeline, Card, Business Card, Day/Week/Month, Icon) depending on what you’re trying to customize. You can use any template you want, but if you’re customizing your mail window, you’ll probably want to stick with the Table template unless you’re shooting for a funky layout.

 

The next order of business is to arrange the layout by different categories. These are pretty self-explanatory. In the Fields section, for example, you’ll see a list of available fields you can add to your view (as well as remove them) with the click of a button. You can also arrange in what order these fields are shown.

 

One particularly interesting section is the Filter field. This can come in especially handy if, say, you’re on vacation and want to avoid the temptation to check work emails and be reminded of everything that awaits you after you return from the Bahamas. You can setup filters so that only email sent to your personal address shows up in the inbox, while email to your work addy stays hidden.
Another field you may want to pay attention to is Automatic Formatting. It’s in here where you can customize the appearance of certain messages where you’re listed as a recipient, but in the CC or BCC fields. If you tend to be copied on a lot of emal that’s usually of low interest to you, use this field to divert your attention to emails that are more likely in need of your attention.

 

You won’t find the option by default, so press the Add button, which brings up an untitled check box. Give it a name, such as ‘To Me’ or ‘Not Copied.’ To make these emails stand out from the rest, click the Font button and change the color.

 

Next, click the Condition button, which brings up another pop-up window. Check the ‘Where I am’ check box and choose ‘the only person on the To line’ in the accompanying pull-down menu


3. Add a Digital ID to give your recipeints piece of mind

Sign Your Emails with a Digital ID
It’s not at all difficult for hackers to impersonate you by spoofing your email address and sending out emails that appear to come from you. Luckily, there’s something you can do about it to give your recipients some peace of mind that, hey, this email is the real deal. To do that, you need a Digital ID.
You can think of a Digital ID as sort of an electronic driver’s license. The digital certificate, which is verified by a trusted third party, tells the recipient that you are who you claim to be. Anyone can get one, and to get yours, navigate to Tools>Trust Center. Highlight Email Security in the left-hand column and then click the ‘Get a Digital ID’ button.
This brings up the Digital ID page on Microsoft’s Office Marketplace website, which can be a little overwhelming. You can research the available options on your own, or follow our lead and head straight over to InstantSSL by Comodo. It’s free, while most of the alternatives are not.
After filling out the online form, you’ll receive a verification email (ours showed up almost instantly) alerting you that your digital signature is ready for collection. Click the included hyperlink to download and install the certificate.
Now we need to import the certificate into Outlook, but the steps will be slightly different depending on which browser you used to retrieve it. Firefox users will navigate to Tools>Options>Advanced and bring up the Encryption tab. Click on the View Certificates button, highlight your certificate, and click the Backup button to save it to your hard drive. If you’re an IE user, click on Tools>Internet Options and bring up the Content tab. Click on the Certificates button, then press Export and follow the prompts.
To import your certificate into Outlook, fire up your email client and navigate back to Tools>Trust Center>Email Security. Click the Import/Export button, then punch the Browse button to locate the certificate on your hard drive. Fill in the appropriate fields and you’ll all finished!
If you want Outlook to use your digital ID every time you send out an email, navigate once again to Tools>Trust Center>Email Security and click the ‘Add digital signature to outgoing messages’ check box. This can slow things down, so you may opt to only digitally sign emails when the need arises, such as firing off an important email to your boss or co-conspirator for world domination. To manually add a digital ID on an as-needed basis, click on Options in the email you’re composing. Expand the More Options section on the right-hand side, mash the Security Settings button, then check the ‘Add digital signature to this message.’ When you fire off the email, the recipient can check the digital ID and verify that it really came from you!
 
4. Configure Sent Messages to Automatically ‘Reply to All’
Maybe you’re coaching junior’s basketball team and you’re trying to organize a fundraiser with all the parents. Or perhaps you’re attempting to carry on a group conversation with your co-workers on an important project. These are just a couple of scenarios in which it’s helpful if the recipients remember to hit ‘Reply to All’ when responding to emails, but there’s always one knucklehead who doesn’t follow protocol. It’s not that he’s trying to be difficult, he just hit the wrong button.
You can prevent this from happening by forcing all replies to reach every recipient. Here’s what you need to do. Compose a new email message, but before sending it on its way, click the Options button. In the toolbar, you’ll see a button that says ‘Direct Replies To’ (Outlook 2007). Click on it.
Check the ‘Have replies sent to’ check box and then mash the Select Names button. Select the names from your Address book, or enter them in manually in the Reply To field at the bottom.
As a point of good etiquette, you should let the recipients know that you’ve configured email replies be sent to the entire group, even though this should be obvious when they click the Reply button. This will prevent Bob from revealing potentially embarrassing tidbits about his date with Sally to the entire group when he thinks he’s only communicating with you!
5. Backup, Transfer, and Manage Your AutoComplete List

 

 

Over time, Outlook becomes pretty adept at predicting who it is you’re trying to email and can usually accurately guess the recipient based on a single keystroke. This saves a ton of time, particularly if one of your frequent contacts has a long and convoluted email addy and you’d rather not poke around your address book. But there’s a problem. As power users, we frequently find ourselves upgrading hardware and reinstalling Windows, which means the entire learning process starts anew. Or does it?

 

Whether dealing with a fresh Windows install or transferring your Outlook DNA to another machine, you can bring your auto-complete info along for the ride, but you won’t find it in your PST file. Instead, this info lays hidden in a separate NK2 file.
To find it, you first need to close Outlook. Once you do that, navigate to C:Users[username]AppDataRoamingOutlook. If you’re having trouble locating the directory, check to see that you’ve allowed Windows to show hidden files and folders (Control Panel>Appearance and Personalization and click on ‘Show hidden files and folders’ under Folder Options). Alternately, bring up the Start menu and type %APPDATA%MicrosoftOutlook (Start>Run if you’re using XP).
Once you’ve located the NK2 file, simply copy it over to a USB key and then transfer it to the same directory on the destination PC or when you reinstall Windows!
Of course, Outlook doesn’t always correctly guess who you’re trying to email, and that can be frustrating when you’re in a hurry. Not only that, but should one of your contacts switch email addresses or drop off the face of the earth, you’ll want to delete their AutoComplete info. Unfortunately, the only way to do that is to begin typing their name and when it appears, press the down arrow to highlight the entry and the DEL key to nuke it. This can be time consuming if you have a lot of contacts to update, and Outlook doesn’t allow you to edit the NK2 file. Luckily, there’s someone who does
Nir Sofer’s lightweight N2KView executable, which you can download here, displays the email records stored in Outlooks AutoComplete file. Just fire up the app, then proceed to delete any AutoComplete entries that are outdated. You can also use this handy utility to add items from your Address Book, and as an alternative way to backup and restore Outlook’s AutoComplete file. You’ll find all these options in the File menu.
6. Stop, delay and intercept sent e-mails!
Image Credit: masternewmedia.org
After composing that long winded email to your boss letting him know exactly where he can stick that Jelly-of-the-Month Club membership you received instead of a Christmas bonus, you probably felt better, right up until you accidentally hit the Send button out of habit. Or maybe you sent sensitive information to the wrong contact and realized it a second too late. There are several scenarios in which you might wish Outlook had an Unsend button — such as noticing a typo after the fact — but that’s just not how the Internet works.
That doesn’t mean you’re completely out of luck, however. You’ve probably heard the saying, ‘An ounce of prevention is worth a pound of cure,’ and in this case, we’re going to show you how to prevent scenarios like the above using Outlook’s Defer rule.
Outlook’s Defer rule places a temporary hold on all outgoing messages, so while you still can’t unsend email that’s already been thrust into the Internet, this will give you a short window to backtrack when you’re not having one of your better days. To get started, click on Tools>Rules and Alerts.
Next, click on New Rule… to bring up the Rules Wizard window and highlight ‘check messages after sending,’ and then click on Next. This will bring up the Conditions window, which is where you’ll indicate when you want this rule to take effect. Ignore all the check boxes and just click on Next if you want to defer all sent messages, otherwise go ahead and specify under what conditions you want your sent mail to have a temporary hold.
You should now be at the ‘Select action’ window, which is pretty self explanatory. Mark the very last check box that reads ‘defer delivery by a number of minutes.’ At the bottom under Step 2, click the hyperlink to bring up the Deferred Delivery window, and then change the number of deferred minutes to however long you want (we recommend anywhere from 3-5 minutes).
Click Next to setup any exceptions, such as when emails are marked as “importance” or several other options. Hit Next one more time, give your rule a name, and press the Finish button. Now the next time you goof up when sending an email, you can nuke the message from your Outbox and pretend the whole thing never happened!
7. Never Forget an Attachment Again!
If you end up using this plug-in only once, it will have been worth the download. What’s it do? Not much – it just slaps you across the face (gently) when it thinks you may have forgotten to include an attachment so you can avoid having to resend a follow-up email.
There’s no voodoo magic going on here, the plug-in simply sifts through your email looking for words that are most often used when an attachment is supposed to be included. If no attachment exists, a pop-up dialog asks if you meant to add one after you’ve already mashed the Send button. If you did, just hit ‘Yes’ and get an instant do-over. And if it ends up being a false positive, click ‘No’ and move one with your day.
On the downside, the developer doesn’t say which words are flagged, nor can you can add words of your own. Nevertheless, it works well out of the box and could potentially save you from a boneheaded moment.
 
8. Supercharge Your Contacts List with Xobni
Xobni is one of those plug-ins where, once you use it, you’ll wonder how you ever got along without it. Once installed, you’ll be able to search through your contacts faster than was otherwise possible, but that’s only the beginning. Xobni maintains a complete profile of everyone you know, including contact info, profile pictures, recent conversations (threaded!), files exchanged, and so much more.
There’s also a strong social networking element to Xobni. Twitter, Facebook, and LinkedIn all come integrated so you can see which sites your contacts participate in. Does Bob use Twitter? Click his name and find out, then check out his latest tweets, all from within Outlook!
We also appreciate the seamless integration into Outlook’s interface. There’s a lot going on, and Xobni organizes it all in a convenient sidebar that wedges right into the email client. Should you decide you don’t want to look at it, just click the arrow to tuck the sidebar away. How considerate!

9. Filter Mail from Specific Senders to Their Own Folder

Work and play rarely mix, but the problem with Outlook is that it meshes everything into one, whether you want it to or not. You may have separate email accounts setup, but all incoming email still gets clumped into the same inbox. If you don’t want your significant other’s emails mingling with your work mail, you can setup a special folder for that special someone.

To do this, right-click an email from whoever it is you want to have their own folder and select ‘Create Rule.’ Check the check box next to the sender’s name as well as the ‘Move the item to folder’ check box, and then click on Select Folder. Pick or create a folder, and if you want, you can even assign a WAV file, just to be sure to check ‘Play a selected sound’ if you do.

 
10. Archive Old Mail on Your Own Terms
Every once in awhile, Outlook will offer to auto-archive your old email items, but if you take the time to do this yourself, you can keep those old files infinitely more organized than Outlook is able to do on its own.
But why even archive email in the first place? If you don’t, Outlook’s Personal Folders (PST) file will continue to expand, kind of like Jabba the Hutt left unattended at an all-you-can-eat buffet. As the PST file grows in size, Outlook may start to feel sluggish. The rate at which this happens depends on your emailing habits, but whether your a light or heavy email user, at some point, Outlook will lose its initial pep.
Your best course of action is to setup an annual or bi-annual archive. Or if you’re a regular chatty Cathy, a monthly archive may better suit you. No matter what the interval, the basic steps will be the same. To get started, click on File and select Data File Management. Next, click on the Add button and choose the desired format (stick with the default if using Outlook 2007). Click OK and give your archive a name, like ‘2008’ or ‘Jan-June _2008.’ For that warm fuzzy feeling, go ahead and password protect your new archive when prompted.
You should now see two entries in the Data File Management window. Go ahead and close the window because we’re now ready to start archiving items to our newly created PST file. One way to do this is by dragging and dropping individual mail items to the newly created entry under Mail Folders. Depending on much email you need to move, this can take a long time.
A better way to move old files is by navigating to File>Archive. Check the ‘Archive this folder and all subfolders’ radio button if it isn’t already. Next, highlight the folder you want to archive (or your entire Inbox), specify the appropriate date in the ‘Archive items older than’ pulldown menu, and click the browse button to select your newly created archive file and punch OK.
Houston, we have a problem! You followed the above steps, but your original PST file (which you can find by navigating to C:Users[username]AppDataLocalMicrosoftOutlook) is just as large now as it was before you archived all your email. What the flip?
This isn’t cause for concern, it just means Outlook’s automatic background compaction hasn’t kicked in yet. Part of what this does is reclaim the empty space in your PST file and give it back to your hard drive. But if you don’t feel like waiting, or if you have waited and there’s still no change, you can tell Outlook to get to work. Just go back in the Data File Management window, double-click the PST file, and select Compact Now. Once again, be patient, because depending on the initial file size, this could take awhile.