Thursday, October 29, 2015

Wealthfront vs. Hedgeable: YTD Performance

We have been comparing Wealthfront to Hedgeable: for a hypothetical deposit of $5000 at the beginning of this year (2015), the performance of both portfolios were observed from month to month: thus far Hedgeable seems to be outperforming Wealthfront--here are the end of month balances for the most aggressive investment profile available on both platforms:

Jan/2015Feb/2015Mar/2015Apr/2015May/2015Jun/2015Jul/2015Aug/2015Sep/2015Oct/2015
Wealthfront$5,000$5,148$5,097$5,256$5,181$5,031$5,038$4,729$4,570$4,926
Hedgeable$5,000$5,322$5,202$5,255$5,300$5,261$5,655$5,274$5,223$5,566

Note that during the July to August drop, Hedgeable may drop a little bit more, but due to their active (or reactive) rebalance into bonds, the subsequent drop in September was much less than that of Wealthfront.

Sunday, January 4, 2015

Show Your Support: United In Orange Shirts

Let's support the United In Orange campaign with these shirts:

http://teespring.com/united-in-orange-now

http://teespring.com/football-is-like-life

Saturday, January 3, 2015

Package Delivery Security Tips (FedEx/UPS)



Fedex Package Security Tips:

http://blog.van.fedex.com/blog/keep-holidays-happy-and-bright-%E2%80%94-tips-keeping-packages-safe
  • FedEx delivers joy with each package, connecting customers to loved ones around the world every day. But while FedEx team members do their utmost to ensure the safety and security of every package they deliver, there are steps all our customers can take for added peace of mind.
  • Customize your deliveries. Use FedEx Delivery Manager® to customize your residential deliveries. You can change the time and location of delivery, request a signature upon delivery and even ask FedEx to hold your package if you know you’ll be out of the house when we try to deliver. Sign up for free online and avoid the risk of unattended packages sitting out on your doorstep.
  • Consider an alternate destination. When you order something online, consider sending the package to your workplace or to a family member, friend or neighbor who is home during the day to accept delivery. When you know someone will be available to receive your delivery, you eliminate the possibility of your specially ordered gift being left unattended.
  • Send it to your nearest FedEx Office location. You can have your deliveries sent to the nearest FedEx Office location and we’ll hold it for you for up to five business days. FedEx provides this service at no added cost. If it’s a FedEx Express® package, you can also send have your package sent to one of our FedEx Express stations. Find the location nearest you at fedex.com/locate.
  • Request a signature. Many packages today are sent without requiring a signature for delivery. If you’re shipping something of high value — or you just want to be sure items aren’t left unattended — you can require a signature for packages to be released. Either the shipper or the recipient can make this request.
  • Request a vacation hold. Taking a holiday trip to visit family or friends? You can request a vacation hold on all shipments for up to 14 days.
  • Redirect your packages even when they’re already on the way. With FedEx Delivery Manager, you’ll be alerted to every FedEx® package headed to your home, even if you don’t have the tracking number. If you know you won’t be home and want to send the delivery somewhere else, just redirect it to where you’ll be, or another secure location.
  • Ask for a ring. Use FedEx Delivery Manager to let your driver know you want a ring—or a knock. You can leave instructions for drivers to always ring your doorbell or knock on your door when a package is being left. Do you like your packages left behind the big planter, or tucked behind the grill beside the back door? Use FedEx Delivery Manager to leave one-time-only or standing instructions for where you want FedEx to leave your deliveries. You can also let your driver know your instructions by calling 1.800.GoFedEx (1.800.463.3339).
UPS Package Security Tips:
 
If customers have concerns about the security of their deliveries they have options:
  • They can have the shipment sent to where they are – not where they aren’t. In other words, if they are at work during the day they can have packages delivered to where they work. They can also choose to have things sent to a relative or neighbor who is home during the day.
  • They can tell our driver where they would like packages left, for example, in the shed in the back yard, or behind the garage, etc. Our drivers can enter that information into their handheld computers for future deliveries.
  • They can sign up for a free service called UPS My Choice, which sends a proactive email alert to the customer letting them know when their package is going to be delivered.
  • As far as what to do if a shipment is stolen, UPS will instruct the individual to file a police report. The customer may also wish to call the shipper to get a replacement item shipped.


Wednesday, December 24, 2014

TeeSpring Alternatives

Everyone knows about TeeSpring, but there are alternatives.  Here are some of them--check them out:

TeeZily
Fabrily (based in UK)
TFund (based off CafePress)
PrintAura
SpreadShirt
Zazzle
TeeChip
TeeLeap

Sunday, December 21, 2014

Typical Eye Exam Charts

Some common eye exam charts--notice the patterns:
-----------------------------------
ZFTPE     TPECL     CFEFD
FTPEO     OZFTF     ZFTPE
ZBDEF     CPEFD     TPEOL
DZFTP     ZFTPE     FTPEO    
TPEOL     FTPEO     DZFTP
-----------------------------------
COFEP     OBPTL     FDOBC
ZFPDE     ZBDEF     ZBEFD
OBPTL     PTFLE     COFEP
PTFLE     ECPFD     ZBDEF
ZBDEF     ZBEFD     OPFED
-----------------------------------
PTFLE     EPTFL     FLEPT
EPTFL     FLEPT     LEPTF
LEPTF     TFLEP     PTFLE
FLEPT     PTFLE     TFLEP
TFLEP     LEPTF     PTFLE
-----------------------------------


Saturday, December 20, 2014

Sony Hack Isn't Really About "The Interview" Movie At All--Or Is It?

There is more to just a hack into Sony: the latest PR fiasco involves various inconsistencies between what Sony and the White House are saying from their respective points of view--something that has become quite ridiculous and absurd:

http://www.nbcnews.com/storyline/sony-hack/white-house-sony-never-told-us-it-planned-pull-interview-n272381

First of all, clearly there is a lack of communication between Sony and the US government (i.e., did CEO Michael Lynton even talk to the FBI or President Obama at all after discussing with the theaters and making the decision about whether to proceed with the movie showing?).  If anything, this not only exposes Sony's lack of judgement and poor decision making, but also erodes the company's credibility as to whether this whole thing is really about "The Interview" movie and North Korea, or there is something else dark and sinister that the company is trying to hide?  The fact that the company is hiring David Bois to deal with the media seems to show that there is more to it than meets the eye:

http://www.nytimes.com/2014/12/15/business/sony-pictures-demands-that-news-organizations-delete-stolen-data.html

Let's be clear: Sony as a company is the victim here.  However, the way the executives, board, and PR are handling this case only makes matters worse and calls attention as to whether the executive team is really honest or they are more worry about protecting their personal interests and jobs.

Secondly, all signs seem to point to the fact that this is an inside job: clearly there is a mole (or ex-mole) in the company for this to even happen.  How else can that much data leak without IT noticing?  Either IT team is clearly incompetent, or they don't care--in either case, it points to poor judgement on the executive team's part: didn't they learn from the previous Sony hack?  What investments have the company made to protect their IT infrastructure and secure the company's data?  What on earth were the company's priorities to start with?

The person (or persons) who did the hack is clearly targeting Sony--not the movie itself (nor the moviegoers for that matter).  "The Interview" is simply an opportunistic excuse that plays into the timing of it all.  The hacker's motivation here is not about money, but ideology.  But why?  To answer that the investigation should focus on the question of who might Sony have offended in the past--perhaps a disgruntled (former) employee, contractor, or otherwise person of interest who might want to see Sony destroyed--whether North Korea is involved or not is really a side question at this point:

http://www.latimes.com/business/hiltzik/la-fi-mh-these-experts-still-dont-buy-20141221-column.html

http://www.latimes.com/entertainment/envelope/cotown/la-et-ct-sony-hack-inside-job-not-north-korea-20141231-story.html

The best thing that Sony can do now at this point is not to play the PR game and confuse the matter further, but to come clean and face the matter with courage and honor: the company owes its employees--and the rest of the world--at least that much.  As to whether the executive team can truly put their personal interests aside and face the truth, only time will tell.

Wednesday, December 17, 2014

Sunday, December 14, 2014

SAT Redesigned for 2016

According to the College Board, the SAT will be redesigned for 2016:

 https://www.collegeboard.org/delivering-opportunity/sat/redesign

It will be going back to two sections instead of the current three, and the essay will be optional. There will be 8 key changes:

  1. Relevant Words in Context - no more memorizing esoteric SAT word lists
  2. Command of Evidence - a common theme across reading, writing, and essay
  3. Essay Analyzing a Source - read a passage, analyze  and explain how the author builds an argument (similar/along the line of essays in AP English)
  4. Focus on Math that Matters Most - focus on 3 areas: problem solving/data analysis, linear algebra, and advanced math
  5. Problems Grounded in Real-World Contexts - more real world based questions
  6. Analysis in Science and in History/Social Studies - applying reading, writing, language, and math skills to answer questions in science, history, and social studies
  7. Founding Documents and Great Global Conversation - more reading passages from US founding documents (such as Declaration of Independence, Constitution, Bill of Rights, Federalist Papers, etc.) as well as texts from so-called Great Global Conversations (words from the likes of Edmund Burke, Henry David Thoreau, Gandhi, Elizabeth Cady Stanton, Barbara Jordan, and Martin Luther King Jr)
  8. No Penalty for Wrong Answers - guessing is OK

Sunday, April 27, 2014

Stock Market Trends

*January Effect: 1/2 - 2/3  up
                           3/10 - 3/31 up or down
*                         4/10 - 4/15 down
                           4/15 - 4/21 up
                           5/15 - 6/15 up
*                         6/21 - 7/21 drift down
                           8/1 - 9/15 side-way then up
*                         9/15 - 10/21 drift down
*Santa Claus      11/1 - 12/20 up
  Tax /Dressing   12/26 - 12/30

Sunday, April 13, 2014

Spend Your Tax Refund on Google Glass

Looks like Google is encouraging you to spend your tax refund on a pair of Google Glass--
the company is opening up the Glass Explorer Program on April 15th:

http://glassmorgasbord.blogspot.com/2014/04/google-glass-explorer-program-limited.html?view=classic

Thursday, April 10, 2014

Saving For Kid's College Tuition

Nice article on saving for kid's college:

http://www.marketwatch.com/story/parents-youre-saving-for-college-all-wrong-2014-04-10?siteid=yhoof2

Some tips:
1) When a kid is born, estimate college cost by multiplying current cost by a factor of 3., then shoot to save 1/3 of that (currently that amounts to about $250-$500 per month).
2) Use 529s, state prepaid tuition plans, and Upromise.

Also tone town expectations about where your kid might attend college (most likely your kid will not make it into a top college):

http://finance.yahoo.com/blogs/the-exchange/parents-and-their-kids-need-to-chill-out-about-college-174506880.html

Sunday, May 12, 2013

7-step extreme sea survival guide


http://www.cnn.com/2013/04/11/sport/ultimate-survival-guide/index.html?hpt=hp_c3

Below is an extract from the newly released Ultimate Survival Manual. Rich Johnson is a former paratrooper and demolition officer, who once survived in the desert wilderness for a year, living in a cave and eating insects. 


Find drinking water at sea
Water, water, everywhere -- and not a drop to drink? Not if you're prepared, resourceful, and willing to put effort into collecting drinkable water. And you should be: It will save your life.

Trap moisture
Outfit your vessel with a plastic tarpaulin to catch rainwater and drain it into containers, allowing the first drops of rain to wash the salt off the tarpaulin. If you don't have a tarpaulin, use fabric to absorb moisture, then wring it out into containers. Never drink saltwater—it will make you ill and speed dehydration and death.
Pull a "MacGyver"
When you've been adrift at sea for a period of time, all your clothes end up encrusted with salt crystals. At the first sign of rain, give all your clothes and other fabric a seawater bath. Yes, it's salty, but not as salty as the salt residue, which will make any water it contacts undrinkable.
If you have sails, make a bowl out of them to capture the water. Tarps, shirts, plastic sheets, and even the raft itself can all collect water. Any can, bottle, or other container can store it. The first water you collect will have a high salt content, so store it separately, and use it to clean wounds or to wash food before eating.
Orient yourself by the stars
Seek the North Pole
 To find Polaris, the prominent star that's close to the north celestial pole, look for the famous pattern of stars called the Big Dipper or the Plough in the constellation Ursa Major. Mentally draw a line connecting the stars at the end of the Big Dipper's "bowl," then extend that line out five times its length to arrive at Polaris. It's hard to miss, since it's the brightest star in Ursa Minor, or the Little Dipper.
Seek the South Pole
Traveling below the equator? Find the Southern Cross's long axis and extend a line down four and a half times the axis length. Then locate the bright stars Rigil Kent and Hadar to the left of the Southern Cross. Figure the midpoint between these two stars, then imagine a perpendicular line from that point to the end of the line drawn from the Southern Cross. That intersection marks the South Pole.

Catch fish in open waters
If you're in a life raft, small fish often gather beneath the raft, either out of curiosity or because they feel sheltered there. Who knows? But catching those fish might satisfy your need for nourishment. Troll a hand-line with a hook and anything flashy to serve as a lure. Jig the lure up and down a few meters below the surface, being careful not to snag the life raft with the hook. After catching a fish, use the guts as bait to catch more.

Avoid shark bites
Sharks don't usually hunt people as a food source, which is why most shark bites stop there: Once the shark realizes you're not a nice blubbery seal, it leaves you alone. Unfortunately, that little "mistake" isn't all that little for the human on the receiving end of those chompers. Here's how to avoid those nasty bites:
Cede the sea
While there certainly are open-ocean predators, most shark threats are in the shallows and near food sources. Coral reefs are popular hangouts -- and happen to be the most desirable dive sites. If you're diving in these areas, be aware of the shark risk before you enter the water, and dive with at least one partner, as sharks are less likely to mess with a group.
Get away
If you do suddenly find yourself in close quarters with one of these beasts, your best bet is to get out of the water, swimming away with smooth, even strokes that won't attract its attention.
Face your foe
When a shark wants to eat you, you'll know in advance: It will hunch its back, lower its fins, and rush at you in a zigzag. Thrust your spear gun, camera housing, knife, or whatever else you're packing to discourage it. If you can, punch its super-sensitive nose or stab at its eyes or gills.
Submerge
Divers report successful evasion by descending to the seafloor and waiting for the sharks to leave. But that only works if you've got an air tank.

Right a capsized boat
Small sailboats capsize easily, but luckily, they're easy to right. Crawl up onto the overturned hull, grab the centerboard (keel), and lean back, using your weight against the centerboard as a lever to flip the boat over.
When it's upright, crawl aboard and bail out the water. If your capsized boat is a motorboat without a centerboard, righting it will take a bit more doing. Tie one end of a rope to something secure in the middle of the boat, like an oarlock. Toss the free end of the rope up onto the hull.
Crawl onto the hull to grab the free end of the rope, facing the side where the rope is tied. Back up toward the water and lean back, using your weight against the rope to pull the boat over. Once it's upright, scramble on and start bailing.

Put out a boat fire
A fire on a boat is a life-threatening catastrophe, so it's wise to have a plan in place before you leave shore.
Step one: Store fresh fire extinguishers in locations near the galley and the engine compartment, the two most likely locations for fire.
Step two: If fire breaks out, move everyone out of the cabin and get them into life vests. Call VHF channel 16 to report the emergency. Prepare to abandon ship.
Step three: Fight the fire with extinguishers, keeping a clear escape route behind you at all times. Always extinguish fires from the bottom up.

Plug a leak
Water is supposed to stay on the outside of a boat, but inevitably some gets inside due to rain or waves coming over the bow. That's not a big problem. However, when water invades because of a leak, the problem becomes quite real.
Find the trouble spot
Your top priority is to locate the leak. If you can't find it, head for dry land fast. Check to see that the boat's drain plug is closed -- if it's open, that's your culprit.
Heal your hull
If the leak is caused by a failed through-hull fitting, stop it with a conical soft-wood plug that should be tethered to the hull.
Protect with plastic
If the hull is fractured due to impact, place a large plastic sheet across the leak on the outside of the hull. Secure the plastic with ropes. Water pressure will help hold it in place as you carefully head for land.
Use old faithful
If all else fails, you can repair small cracks with duct tape.


Saturday, May 11, 2013

Startups founded by moms/women


http://www.latimes.com/business/la-fi-silicon-beach-women-20130512,0,6956094.story?page=2

Technology investors say they have seen a sharp jump in the number of Los Angeles-area start-ups founded by women. Here are a few:

Big Frame: Digital media company that helps grow YouTube audiences and connect them with advertisers. Co-founder: Sarah Penna. Culver City; 30 employees.
DogVacay: Online community where members post openings in their homes for pet-sitting and book pet-sitters. Co-founder: Karine Nissim Hirschhorn. Santa Monica; 33 employees.
Maker Studios: Digital media company and multi-channel network of online content. Co-founder: Lisa Donovan. Culver City; more than 300 employees.
Moonfrye: Online community for families; developing a do-it-yourself parenting app. Co-founders: Soleil Moon Frye and Kara Nortman. Looking for L.A. office space; eight employees.
Nasty Gal: Online retailer of edgy clothing for young women. Founder: Sophia Amoruso. Downtown Los Angeles; 300 employees.
NuOrder: Online wholesale platform for the fashion industry that streamlines the buying process. Co-founder: Olivia Skuza. West Hollywood; 40 employees.
Pose: Mobile app that enables users to browse and shop for the latest fashion and beauty trends. Co-founder: Alisa Gould-Simon. Santa Monica; 13 employees.
PromoJam: Social marketing platform that helps users create customized online promotions. Co-founder: Amanda MacNaughton. Venice; 10 employees.
Shop Hers: Online marketplace where users can sell and buy pre-owned luxury items. Co-founders: Jaclyn Shanfeld and Jenna Stahl. Santa Monica; five employees.
Tradesy: Fashion resale website and app to sell and buy pre-owned women's clothing. Founder: Tracy DiNunzio. Santa Monica; 22 employees.

http://finance.yahoo.com/news/leaning-10-fastest-growing-women-220000832.html

Here's a snapshot of the top 10 fastest-growing businesses and their leaders from the list:

No. 1: Shazi Visram, Happy Family in New York, N.Y.
Launched in 2006, Happy Family makes packaged organic meals and snacks for all age groups. It reported gross revenues of $63 million last year.
No. 2: Kathy Mills, Strategic Communications in Louisville, Ky.
Strategic Communications provides communication and IT services to business and government clients. Between 2010 and 2012, its gross revenues grew 80 percent to $42 million.
No. 3: Shelly Sun, BrightStar Franchising LLC in Gurnee, Ill.
The health-care staffing franchisor was founded in 2002 and now counts over 250 locations across the U.S. and $212 million in gross revenues.
Related: How to Find Funds to Launch a Franchise
No. 4: Tiffany Crenshaw, Intellect Resources in Greensboro, N.C.
Intellect Resources provides consulting, recruiting and hiring solutions for businesses in the health-care IT market. Its gross revenues climbed from $1.5 million in 2010 to $30 million last year.
No. 5: June Ressler, Cenergy International Services LLC in Houston, Texas
Founded by Ressler in 1996, Cenergy provides workforce solutions such as consulting and logistics management to clients in the oil and gas industry. It reported nearly $250 million in gross revenues in 2012.
No. 6: Sue Bhatia, Rose International Inc. in Chesterfield, Mo.
Rose International, an IT professional services and consulting firm, was founded in 1993. Between 2010 and 2012, its gross revenues grew more than 50 percent to $360 million.
No. 7: Anita Emoff, Boost Technologies in Dayton, Ohio
Specializing in employee wellness, recognition and awards, Boost Technologies reported $17 million in gross revenues last year, up from less than $1 million in 2008.
No. 8: Kathleen Croddick, Suite K of South Brunswick, N.J.
Founded and run by Croddick, Suite K Value Added Services LLC manufactures beauty products such as fragrances, creams and lotions. Its gross revenues grew more than 150 percent between 2010 and 2012 to $13 million.
No. 9: Lani Hay, Lanmark Technology in Vienna, Va.
Lanmark Technology provides professional services such as IT and administrative support to clients in the government and commercial sectors. It reported gross revenues of $35 million in 2012.
No. 10: Ranjini Poddar, Artech Information Systems LLC in Cedar Knolls, N.J.
With gross revenues of nearly $350 million, Artech is the largest women-owned IT staffing company in the U.S., according to WPO.

http://www.entrepreneur.com/article/225219

Woman entrepreneurs to watch in 2013:

http://www.mercurynews.com/business/ci_23219120/moms-driving-family-tech-boom

Disney Story App: photo story
UrbanSitter: baby-sitter finder
BabyJunk: used baby goods
ActivityHero: camps, classes, and activities for kids
Timbuktu: iPad magazine for children
TinkerLab: creative projects for kids
KitchenKid: culinary school for children
CitrusLane: care packages
ToyTalk: family entertainment

Sunday, October 7, 2012

Selling eBooks


Selling eBooks:

http://www.websitemagazine.com/content/blogs/posts/pages/selling-ebooks.aspx

http://www.ehow.com/how_8273981_doityourself-publish-religious-book-online.html

Publish your ebook on one of the many ebook platforms available. These include Amazon's Kindle, BN's Nook, Apple's iPad and Sony's Reader. Submit your ebook to each of them yourself. Or use a service that converts your book into the proper format for each reader, and submits them for you. One such service is Smashwords, which takes a percentage of your profit and also allows you to offer your ebook for free. Lulu has a similar service. You have to use a service like Smashwords or Lulu to get into Apple's iBookstore. Sell ebooks as PDFs or Word documents from your own website, or through a third-party site such as Clickbank or Scribd.

POD publishers handle all the details for you such as editing, book cover, ISBN and typesetting, with packages ranging from $500 to more than $5000. You can purchase your own International Standard Book Number, a 13-digit commercial book identifier, for about $125 from R.R. Bowker. Publishers will make your book available at Amazon and other online stores. Such companies include CreateSpace, Lulu, iUniverse, AuthorHouse, Issuu, Yudu.com, and Edocr. Other POD companies aimed at the Christian and religious markets include ACW Press, Bethany Press and Xulon Press. Lulu and CreateSpace allow you to upload your book for no upfront fees. Both take a percentage of each book sold.

Form a publishing company for maximum control, using POD only to print the book. You make more money if you go this route, though it involves more work. Lulu and CreateSpace are printer options. Some self-publishers opt to go directly to Lightning Source. You'll have a learning curve and some upfront fees, including buying your own block of ISBNs. Many authors find that it's worth it. Working directly with Lightning Source results in a lower print price per book. The company also provides ebook formats.



Monday, September 24, 2012

Yet Another 10 Free Tools for System Administrators

[Originally by John Bagley (john_bagley@sbcglobal.net) from March 2010 edition of Redmondmag.com]

Audit Active Directory and file servers, detect inactive users, block USB devices, and more - for free
The following freeware tools by Windows IT Pro Community Choice Awards finalist NetWrix Corporation can save you a lot of time and make your network more efficient - at absolutely no cost. Some of these tools have advanced commercial versions with additional features, but none of them will expire and stop working when you urgently need them.

1. Active Directory Change Reporter (Windows IT Pro Sep'09: InstantDoc ID 102446, Windows IT Pro Jan'09: InstantDoc ID 100593, TechTarget www.tinyurl.com/Kf9kn3s) - This is a simple auditing tool to keep tabs on what's going on inside Active Directory. The tool tracks changes to users, groups, OUs, and other types of AD objects, and sends summary reports with full lists of what was changed and how it was changed. In addition, it has a nice "rollback" feature that helps rollback unwanted changes (including deletions) very quickly. www.tinyurl.com/Ge2gzb5

2. USB Blocker (Windows IT Pro Nov'09: InstantDoc ID 102860) - Users bring tons of consumer devices: flash drives, MP3 players, cell phones, etc., into the office and this aptly-named tool can block them with a couple of mouse clicks to prevent the spread of a virus and to restrict the take-out of confidential information. The product is integrated with Active Directory and is very easy to use. www.tinyurl.com/Zh5a8w8

3. Password Expiration Notifier (Redmond Magazine Feb'09, 4sysops www.tinyurl.com/TYe7ak) - This tool will automatically remind users to change passwords before they expire to keep you safe from password reset calls. It works nicely for users who don't log on interactively and, thus, never receive standard password change reminders at log on time (e.g., VPN and OWA users). www.tinyurl.com/Fk3tqr7

4. Inactive Users Tracker (MS TechNet Magazine May'08 www.tinyurl.com/N56p4n5) - This feature tracks down inactive user accounts (e.g., terminated employees) so you can easily disable them, or even remove them entirely, to eliminate potential security holes. The tool sends reports on a regular schedule, showing what accounts have been inactive for a configurable period of time (e.g., 2 months). www.tinyurl.com/yk5A873

5. File Server Change Reporter (4sysops.com www.tinyurl.com/ih55n2d) - This tool enhances the line of auditing tools; this one for file servers. File Server Change Reporter detects changes in files, folders, permissions, tracks deleted, and newly-created files, and sends daily summary reports. This is a very useful tool to detect mistakenly-deleted files and recover from backup or to see if someone changes some important files. www.tinyurl.com/yh9y3e8

6. Active Directory Object Restore Wizard (4sysops.com www.tinyurl.com/BRces62) - This tool can save the day if someone accidentally (or intentionally) deleted a bunch of Active Directory objects. It provides granular object-level and even attribute-level restore capabilities to quickly rollback unwanted changes (e.g., mistakenly deleted users, modified group memberships, etc). www.tinyurl.com/ygjr34b

7. VMware Change Reporter (TechTarget/SearchVirtualDesktop www.tinyurl.com/Kzpc4s3) - If you don't know what is being changed by your colleagues in the VMware infrastructure, it's very easy to get lost and miss changes that can affect the things for which you are responsible. This tool tracks and reports configuration changes in VMware Virtual Center settings and permissions. www.tinyurl.com/yjjh3j3

8. Windows Service Monitor (WindowsReference.com www.tinyurl.com/Qzh9fog) - This very simple monitoring tool alerts you when some Windows service accidentally stops on one of your servers. The tool also detects services that fail to start at boot time, which sometimes happens, for example, with Exchange Server. www.tinyurl.com/yh5gfvs

9. Bulk Password Reset (reviewed by SoftPedia www.tinyurl.com/Lgntax2) - While most companies have strong password policies for their employees, one critical issue is still neglected: local Administrator passwords on all servers are usually managed in a "set and forget" fashion, sometimes using some "well-known" passwords, opening a major surface for security attacks. The Bulk Password Reset tool quickly resets local account passwords on all servers at once, making them more secure. www.tinyurl.com/yhpequw

10. Disk Space Monitor (MS TechNet Magazine Sep'09 www.tinyurl.com/Rzrvm77) - Even with today's terabyte-large hard drives, server disk space tends to run out quickly and unexpectedly. This simple monitoring tool will send you daily reports regarding all servers that are running low on disk space, below the configurable threshold. www.tinyurl.com/y29k38j

(More tools: http://www.windowsitpro.com/article/utilities/yet-another-8-absolutely-cool-totally-free-utilities)

Sunday, August 8, 2010

PHP Scripts With Cron

You will need to find out the answer to the following question, “Is my PHP installed as CGI or as an Apache module?”. To find out do the following: Create a new file, name it info.php (just an example), and put in the following code:
< ? phpinfo(); ? >
Upload to your webserver and go to it with your browser.
Now check for Server API (4th item from the top), if it says “CGI”, you have PHP compiled as CGI, if it reads “Apache”, you have it running as an Apache module.

Compiled CGI

If the answer to the question above is “CGI” then you need to add a line to your PHP script. It has to be the first line of your script and must contain your server’s PHP executable location:
#!/usr/local/bin/php -q
That looks a lot like PERL now, doesn’t it? After that let’s add the necessary command to our crontab. Edit /etc/crontab and add the following line:
* * * * * php /path/to/your/cron.php
Execute the following from the command line:
Shell> crontab crontab
Be sure your “script.php” has the necessary permissions to be executable (“chmod 755 script.php”).
Now you are all set!

Apache module

If your PHP is installed using the Apache module, the approach is a little different. First, you need access to Lynx (Lynx Browser for more information). Lynx is a small web browser, generally available on Unix and Linux.
Running your PHP script will not require you to add any additional lines. You simply have to edit your /etc/crontab file and add the following line:
* * * * * lynx -dump http://www.somedomain.com/cron.php
(or if email notification is not needed:
*/15 * * * * lynx -dump http://www.somedomain.com/cron.php >/dev/null 2>&1 )
Please note that in general, you have to specify the entire URL (with “http://” and so on). But depending on your Lynx’s configuration, the URL might be relative; I suggest always using the absolute reference as in my example above – it always works.
Again execute the following from the command line:
Shell> crontab crontab