Electronics Recycling

Electronics RecyclingInside your average laptop, mobile gadget and other electronics devices, contain various material such as polyvinyl chloride plastic (PVC), brominated flame retardants (BFRs) and lead. Unfortunately these material and chemicals cannot be absorbed directly by the nature. Therefore just tossing away your old or broken electronics will jeopardize your living environment.

Exposure to these chemicals can cause many health issues such as reproductive problems, central nervous system damage, cancer and many other ailments and sicknesses. When you throw your electronic devices in the garbage they end up in a landfill which is the perfect environment for these chemicals to leak into the ground and get into the water you drink.

The environment also takes a hit when it is exposed to these chemicals. They can kill plants, animals and ruin a beautiful ecosystem that relies on each part to function properly.

Where to recycle properly

In the US and Canada there are many local companies, programs and centers that will take your broken/old/unwanted electronics for free and some may even give you money for your electronics if they are newer models. These companies are very prominent these days so a quick look in your yellow pages and you should be able to find somewhere to recycle them properly.

Many provinces and states have government programs that offer these services and there may be a drop off location closer than you think.

Beyond recycling

Don’t get me wrong, recycling is important, but wouldn’t it be more environmentally friendly and save energy if we were to reuse and/or reduce our electronics? Most definitely.

If you find yourself needing a new phone or laptop maybe think about buying a used one from your local classifieds or other used electronics dealers online or offline. You can usually find devices that are in new condition and work great but are cheaper because the package has been opened. Some of these devices may even still have warranties or a warranty may even be provided by the dealer.

On the other hand if you’re trying to get rid of your old phone or laptop think about reselling it, giving it to a friend or family member or donating it to a charity that will put it to good use. As mentioned before there are also many companies that will give you money for your electronics.

These actions will keep your device in use and save the energy it would have taken to recycle it. Plus it will give someone the opportunity to buy a cheaper used device instead of a new one.

Doing these small things can have more of an impact than you think. If you follow these guidelines you will be sure to make a difference on the environment and feel good about it at the same time.

Make Use of Your Old Computer

Old ComputerWith the rapid change of technology nowadays, computers become obsolete very fast. The latest versions of Windows and Mac are now incompatible with outdated computers.

But with Linux, which is well known for running very well on old hardware, you still can utilize your outdated computer for many things. Here are some tips to keep your old PC useful with the help of Linux.

Torrent downloading tool

If you use your new computer mainly for work and entertainment, you will probably have no time to manage all your torrent downloads. Fortunately, many Linux distributions come with a torrent client pre-installed by default.

Therefore you just need to install a Linux distribution to your old computer and run it as a full time torrent downloading box. Since all the torrent clients consume very little hardware resource, your old computer will perform this task very well.

Print server

If you have a printer at home or office, it is not a bad idea to turn your old PC into a print server. In the past, Linux used to have many problems with printers but nowadays, everything works nicely out of the box.

You can then use the Linux computer to handle all your printing jobs regardless of the fact that other computers in your house might be running other operating system like Windows or Mac.

Media server

If you have a huge collection of music, videos and TV shows stored in one of your computer and you want to share them with the rest of the family. You can install a Linux distribution on your old computer and store all the media files in there then you can share those files with the rest of the devices in your house using a simple Linux setup. Although your computer may be very old, it is not that bad to give it a large capacity hard disk to store files as a server.

Use it as a firewall

Network security is a very important issue nowadays. If there is more than one computer in your house, it is always a good idea to build up a firewall. A firewall is like the security guard at your gate by keeping a watch on everyone who goes in and out.

Linux can be used in this case to turn your old machine into a watchful firewall device. All you need to do is to install a firewall Linux distribution then set up the firewall. All the firewalls need very little resource so they will run smoothly on your old computer.

Career in Technology Fields

Career in TechnologyTechnology makes the world go ’round, and the more sophisticated our world becomes, the more we can’t live without it. But technology in the wrong hands can crash the entire system. That’s why there’s a need for qualified professionals behind the scenes in technology management. And, to sweeten the deal, with this great responsibility comes great financial rewards.

Opportunities Abound

The expansion of e-commerce and Wi-Fi has created excellent job opportunities for those who can manage business and technology effectively. That’s where you’ll find technology management at the place where business and technology intersect.

As a trained professional in this up-and-coming field, you’re responsible for determining technical and business goals and making detailed plans for the accomplishment of these goals within your organization. Your job description might encompass everything from constructing a business plan to overseeing network security to directing Internet operations.

Training Is Available

Clearly, you’ll need to be skilled in the latest technology to ensure your organization stays ahead of the competition. That’s where a technology management degree comes in. With that kind of technical education, you’ll gain core business, technology, and leadership skills that will prepare you to manage and deliver successful information systems and solutions.

A bachelor’s degree is a typical prerequisite for a career in technology management, and a technology-specific MBA can give you the edge you’ll need to succeed. Unlike a traditional MBA, a technology management degree emphasizes information technology in addition to standard business curriculum.

The Work Is Worth It

According to the U.S. Bureau of Labor Statistics (BLS), professionals in technology management held about 280,000 jobs in 2004. And employment is expected to grow faster than the average for all occupations through the year 2014.

If you have a technology management degree, job opportunities are plentiful, and the salary is sweet, too. According to Robert Half International, a professional staffing and consulting services firm, average starting salaries for high-level information technology managers in 2005 ranged from $80,250 to $112,250.

With that kind of incentive, how can you refuse a technology career?

Internal and External Strategy for Network Security

Basically, the strategy to secure your business office network can be divided into the internal and external network security strategy.

Internal strategy to secure the network

Implement Backup and Disaster Recovery Procedures: Core business data is the lifeblood of any business. Implementing a multilevel backup procedure; image, file and folder, and offsite, is a simple way to protect critical data. Backup and Disaster Recovery (BDR) appliances take this a step further by helping you quicken server recovery in case of failure. Testing your backups periodically is an important component of any backup strategy.

Implement Desktop and Server Virus Protection: These software solutions have been around for a long time and they continue to evolve as threats evolve. Keep your anti-malware software current and its definitions current.

Patch Desktops and Servers Regularly: Security vulnerabilities in the operating system and in applications are regularly addressed by reputable software vendors. Take advantage of them. Keeping security patches current from your software vendors protects your computer from known attacks and vulnerabilities. Again, there are centralized patch management tools that make the process less time consuming.

Centralize Computer Administration: By implementing a server and applying a group policy across computers, you can standardize the process and save each user the time it takes to implement configurations one computer at a time. There are tools to centrally manage virus updates, security patches, desktop firewall, permission groups, and other security features.

Secure Physical Access: Do not overlook the physical location of your critical network infrastructure. These should be accessible to trained and trusted employees. Keeping this infrastructure secure in a locked room or server closet will reduce inadvertent or fraudulent access or change to network.

Secure WiFi Access: WiFi access to the network enables even mobile employees to be productive. Data, as it travels over the air is typically less secure than when it travels over wired networks. Information traveling over the air is at risk of interception. Use wireless data encryption protocols to ensure that data is encrypted during transit from source to destination to protect against risk or interception. Also, the company need to setup wireless access point for guests on a separate subnet. So they can access the Internet but not your network.

External and perimeter strategy to secure the network

Consider Outsourcing Email Services: Corporate email has become mission critical for businesses of all sizes. If you do not have a mission-critical application support infrastructure internally, consider outsourcing your email infrastructure. The widespread availability of such solutions from key industry vendors makes these affordable. And you can leave the worry of securing and maintaining such infrastructure in the hands of those that do it 24×7.

Secure the Perimeter: Connecting your network to the Internet allows you and your employees to gain access to valuable data and be productive even when on the run, but it also exposes your network to attack from intruders. Most small businesses use consumer grade routers/firewalls to protect the edge of their network that is right behind the broadband modem.

Though these devices have grown in functionality, they aren’t equipped to handle the perimeter security needs of a business. With business grade routers/firewalls/UTM (Universal Threat Management) appliances, you gain a powerful hardware platform that provides ability to filter malicious traffic and spam from the outside, receive regular security updates, provide secure remote access, implement intrusion detection and prevention services, and prevent infectious code from executing from trusted but compromised sites.

Stay Informed and Vigilant: There are numerous industry and government sites dedicated to network security. Stay informed as data and practices continue to evolve. Business-grade UTM appliances are designed to be monitored remotely from security operations centers and to send reports and alerts that may need attention.

User Friendly Technology for Patient

Patient Friendly TechnologyIn this electronically, technologically challenging era, there are some strides being made which actually are helpful and hopeful. New solutions for a better quality and longer life are being developed at the MIT Age Lab in Cambridge, Mass. Founded in 1999; technological advancement is their reason for being.

A recent focus for development has been finding ways to monitor the eating habits of senior citizens, tracking how and when medication and supplements are taken, and fulfilling the need for interaction with other people. NASA had a system for communicating with the astronauts when they were in space. Could this same system be as effective in meeting the needs in question?

A touch-screen videoconferencing computer was installed in a volunteer’s kitchen, sending the pertinent data directly to the family’s waiting computer. Not only could they find out that Grandma actually had eaten, they could discuss what she had eaten in a lively, interactive, after-breakfast chat. So, although Grandma was initially apprehensive about the change, technology proved to be a friend.

Elsewhere in scientific circles, like-minded researchers are engaging in similar experiments and enjoying similar, encouraging results. In Rochester, Minn, the Healthy Aging and Independent Living (HAIL) Lab interacts with a continuing care retirement center called the Charter House. This community is connected to the Mayo Clinic and is where the lab is located.

Once again, the concerns being addressed were tracking medication and interaction with the elderly, in particular those with chronic diseases. Was the person with diabetes or hypertension taking their supplements? If there was a problem, could communication be established between patient and health coach to handle the problem at the time it was happening?

Researchers had tablet computers with video messaging installed in volunteer’s apartments. They were given wireless blood pressure cuffs so their tablets could record their blood pressure information. With an elevated level, a health coach can engage in a live chat with the patient on a remote computer, finding out exactly what is happening, and giving instructions to follow.

At the time of medication for hypertension, the user tells the tablet, and this ingenious device not only displays the blood pressure information, but it shows a picture of the entire circulatory system, and the effect the medication is having on the body.

Another concern researchers had was whether or not patients would object to, or be annoyed by, a cardiac sensor on the chest. This Band-Aid-size transmitter would feed pertinent heart-care information to a healthcare team. In both cases, with the tablet and the sensor, participants not only didn’t mind the equipment, they enjoyed having a part in their health care.

They were able to see for themselves how their medication worked, and what would happen to them if they didn’t take it. Here again, what researchers hoped would happen, did happen. Not only did technology accomplish the intended goals, but the patients accepted the new treatment as a valuable asset.