Tuesday, 7 October 2014

Apple seeing huge demand for iPhone 6 and 6 Plus models

Apple seeing huge demand for iPhone 6 and 6 Plus models

Both carriers and Apple reported tremendous demand for iPhone 6 preorders over the weekend with new orders expected to take weeks to fill.
Apple iPhone 6
 Image: MacRumors
On Friday, Apple -- plus its carrier and retail partners -- began accepting pre-orders for the iPhone 6 and 6 Plus. The orders were record breaking for several companies.
Apple issued a press release, claiming 4 million pre-orders in the first 24 hours of availability, breaking the previously announced record of 2 million pre-orders for the iPhone 5 two years ago.
AT&T said it was that company's biggest pre-order ever, without releasing specifics. By all accounts, the iPhone 6 will be very, very popular.
If you didn't get your iPhone 6 pre-order in on Friday, bad news: you could be waiting a while. Apple's own online store is quoting 3-4 week ship times for all iPhone 6 and 6 Plus models across most countries. Verizon and AT&T are quoting similarly delayed shipping times, with the iPhone 6 Plus pushed to mid-November in some cases.
SEE: CNET's review of the iPhone 6 Plus
UBS analyst Steven Milunovich believes Apple could sell as many as 100 million iPhones in the second half of calendar 2014, reflecting 18% unit growth over last year's 85 million iPhones sold.
For consumers looking to pick up an iPhone 6 sooner, their best bet is to head to an Apple Retail or carrier store on Friday morning. It's likely that Apple Retail Stores will see long lines, perhaps running overnight at larger locations, and it's unknown what stock levels will be like -- however, Apple is almost certain to sell out of initial iPhone 6 stocks at some point on Friday.
Other stores, like Best Buy and Walmart, may have stocks as well, with Walmart looking to push sales thanks to modest $20 discounts on purchases.
Apple, for its part, is shipping millions of iPhones from its partner assembly facilities in China to the United States and the other 8 launch countries of Australia, Canada, France, Germany, Hong Kong, Japan, Singapore and the United Kingdom.
Images shared by a MacRumors reader who is also a pilot for a cargo shipping company show 195,000 iPhones packed onto pallets. He claims the phones were flown from China to Anchorage, Alaska, and then on to Chicago's O'Hare airport, consistent with shipments from prior iPhone launches.

Thursday, 11 September 2014

How To Install Kali Linux In VMware

Complete Guide On How To Install Kali Linux In VMware

This tutorial will walk you through the difficult process of installing Kali Linux in VMware Player, a free virtual machine manager that can be downloaded from www.vmware.com.
This tutorial assumes that you have some basic knowledge of your computer (amount of RAM number of processors, etc.) This tutorial is also intended for beginners who haven’t worked with VMware or Kali Linux before.


Step One:

First we need to download Kali from http://kali.org/downloads/. If you have a 64-bit capable computer (like me), then you probably will want the 64-bit version of Kali for performance reasons.
Expand the drop down menu’s to find the version you need. Select the 64-bit version ONLY if you have a 64-bit computer.

step 1
Step Two:
If you don’t have a torrent program, then click the link highlighted above and select “Save” when the download notification appears. Make sure you know where you saved it.
step 2

If you have a torrent program, then I highly recommend using the torrent option. Click on the Torrent link, it will open the torrent file in your browser. Just copy the URL of it and enter it in your torrent program.

step 2.1
step 2.2

Now wait for Kali to download, this might take several hours, depending on your internet speed.
Step Three:
When Kali has finished downloading, open VMware Player and click Create a new virtual machine.

step 3

Step Four:

In the window that opens, select Installer disc image file (iso) and browse to the location of and select the Kali Linux ISO file that you just downloaded.

step 4
step 4.1
Once you have selected the file, click Next.

step 4.2

Step Five:

In the next step, select a name for the virtual machine. I’m going to name it Tutorial Kali for this tutorial. You also need to select a location for it, I recommend creating a folder called “Virtual machines” in My Documents. Then click Next.
step 5

Step Six:

Next step, you need to select a maximum size for Kali. I recommend doing at least 30 GB’s as Kali tends to expand over time. After you’ve entered your desired value (no less than 20 GB) change the next option to Store virtual disk as a single file and click Next.
step 6

Step Seven:

In the next window, we need to customize some hardware settings, so click on the Customize Hardware… button.
step 7

Step Eight:

You will now be presented with a Hardware window. In the left pane select Memory in the left pane of the window, and slide the slider on the right side to at least 512 MB*. This is for performance. Since I have 8 GB of RAM on my computer, I’m going to put it at 2 GB’s (2000 Mb’s).*Note, you should give a virtual machine a maximum of half the RAM installed on your computer. If your computer has 4 GB of RAM, then the max you want to slide it to is 2 GB. If your computer has 8 GB, then you can go to a max of 4 GB etc..

step 8

Now highlight Processors in the left pane. This option really depends on your computer, if you have multiple processors, then you can select two or more. If you have a regular computer, with two or less, then I suggest leaving this number at one.
step 8.1

Moving on, click on Network Adapter in the left pane. On the right side, move the dot to the Bridged (top) option. Now click on the Configure Adapters button.
8.2

In the small window that pops up, uncheck all the boxes except for the one next to your regular network adapter and hit OK.

8.4

You can now click on Close at the bottom of the Hardware window and then click on Finish in the Wizard.
step 8.5

Step Nine:

After you click Finish the window will close and the new virtual machine file will be added to the VM library. Now all we have to do is start Kali and install it! To do this, highlight the name of the newly created virtual machine by clicking on it, and click Play virtual machine in the right pane.
step 9

This will start Kali for the first time.

Step 10:

At the boot menu, use the arrow keys to scroll down to Graphical install and hit enter.
step 10

Step 11:

The next screen will ask you to select your preferred language, you can use the mouse to select this, then click Continue.
step 11

Step 12:

On the next screen, select your location and hit Continue.
step 12

It’ll now ask you for your standard keymap. If you use the standard American English keyboard, then just click Continue.
step 13

Step 14:

Wait until Kali finishes detecting the hardware on your computer. During this, you might be presented with this screen:

step 14

Just hit Continue and select Do not configure the network at this time on the next screen.
step 14.5

Step 15:

You will now be asked to supply a hostname, which is kind of like a computer name. You can enter anything you want, or you can just leave it as kali. When you’re done, hit Continue.

step 15

Step 16:

Kali will now ask you to enter a password for the root (main) account. Make sure you can easily remember this password, if you forget it, you’ll have to reinstall Kali. Hit Continue after you’ve enter and re-entered the password of your choice.
step 16

Step 17:

The next step will ask you for your time zone, select it and click Continue.
step 17

Step 18:

Wait until Kali detects the disk partitions. When you are presented with the next step, select Guided – use entire disk. (this is usually the top option) then click Continue.
step 18

The installer will now confirm that you want to use this partition. Hit Continue.
step 18.5

One more question about the partition will appear. Select the option that says All files in one partition and hit Continue.
step 18.9

Step 19:

Confirm that you want to make these changes by selecting Finish partitioning and write changes to disk. Then hit Continue.
step 19

Step 20:

The last question! Confirm that you really want to make these changes by moving the dot to Yes and hitting Continue for the last time.

step 20

Kali will now start installing! Wait until it has completed, this might take upwards of 30 minutes.

Step 21:

Alright, Kali has finished installing and now you are presented with a window that asks you about a network mirror. You can just select No and hit Continue.
step 21

Step 22:

After a few minutes, the installer will ask you if you want to install GRUB boot loader. Click Yes and Continue.
step 22

Step 23:

The installation should now complete, and you’ll be shown with the following notification message:

step 23
Click Continue.

Step 24:

After it restarts, login to it with the user name root and the password that you created earlier.


You’ve successfully installed Kali Linux in VMware.

Friday, 8 August 2014

Ebola Hemorrhagic Fever

Ebola Hemorrhagic Fever

Prevention

The prevention of Ebola HF presents many challenges. Because it is still unknown how exactly people are infected with Ebola HF, there are few established primary prevention measures.
When cases of the disease do appear, there is increased risk of transmission within health care settings. Therefore, health care workers must be able to recognize a case of Ebola HF and be ready to employ practical viral hemorrhagic fever isolation precautions or barrier nursing techniques. They should also have the capability to request diagnostic tests or prepare samples for shipping and testing elsewhere.
Health staff dressed in protective clothing constructing a perimeter for the isolation ward.
MSF (Médecins Sans Frontières) health staff in protective clothing constructing perimeter for isolation ward.
Barrier nursing techniques include:
  • wearing of protective clothing (such as masks, gloves, gowns, and goggles)
  • the use of infection-control measures (such as complete equipment sterilization and routine use of disinfectant)
  • isolation of Ebola HF patients from contact with unprotected persons.
The aim of all of these techniques is to avoid contact with the blood or secretions of an infected patient. If a patient with Ebola HF dies, it is equally important that direct contact with the body of the deceased patient be prevented.
CDC, in conjunction with the World Health Organization, has developed a set of guidelines to help prevent and control the spread of Ebola HF. Entitled Infection Control for Viral Hemorrhagic Fevers In the African Health Care Setting, the manual describes how to:
  • recognize cases of viral hemorrhagic fever (such as Ebola HF)
  • prevent further transmission in health care setting by using locally available materials and minimal financial resources.

Tuesday, 15 July 2014

How businesses are getting creative with the Raspberry Pi

How businesses are getting creative with the Raspberry Pi

How the $35 Linux board is being used to rapidly piece together custom appliances to solve specific business problems.
The $35 Raspberry Pi Linux computer may have been launched to teach kids to code but the credit-card sized board is increasingly being used by businesses to build custom appliances.
Companies as diverse as IBM and the Financial Times, have used the Pi to power ad-hoc systems aimed at solving specific business challenges.
At the FT the DevOps team were drowning in information sent by its automated infrastructure monitoring software. The Nagios software running on its servers monitors variables ranging from disk and CPU usage to HTTP traffic and emails the team every time the state of one of these variables changes.
Unfortunately these variables change so often the team were getting swamped by emails and were starting to ignore messages from Nagios.
In need of a clearer way to spot when things were going wrong the team turned to the Raspberry Pi. They used a Pi to power a system that changes the colour of a strip of LEDs depending on the state of each server. Green, orange, yellow, red and flashing red represent OK, Unknown, Warning, Critical or Critical for more than 30 minutes respectively. The system was made using a flexible strip of 60 RGB LEDs with an embedded microcontroller wired to a Pi, which runs various Python scripts monitoring notifications from Nagios. More information on how they put the system together is available here.
saws-1-500x103.jpg
The monitoring system made by the FT.
 The Financial Times
Meanwhile IBM is using the boards to glue together proof of concept systems for customers, for example building a system to monitor a factory production line. The demonstration system was built using Raspberry Pi boards, running the Node-RED internet of things event processing engine, to connect Arduino boards to webcams and temperature, pressure and humidity sensors.
"Particularly over the past year we've seen people starting to use the Raspberry Pi board as a sub-component in what we call an industrial or embedded application - using a Raspberry Pi as part of another product," said Eben Upton, one of the founders of the Raspberry Pi Foundation.
"We think embedded engineers are using the Raspberry Pi for a combination of reasons - it's low cost, it's high performance and the fact it has an incredibly stable board support package."
To help others use the Pi to create custom appliances in this way the Foundation is releasing a new compute-on-module (COM) version of the board. The COM board packs the processor and memory of the Pi onto a slim board the size of a memory module. The idea of the compute board is to make it easier to bolt together a custom appliance using a Pi, as the compute module can be plugged into a base board with all of the necessary peripheral circuitry. The new board's smaller, slimmer form factor will also make it easier to build products with an embedded Pi.
The compute board has the same ARM-based Broadcom 2835 processor as the original Pi and 512MB of SDRAM, together with 4GB of eMMC flash storage. The module is a 200-pin board based on the Jedec SODIMM form factor.
cm-devkit-boards-500x287.jpg
The Raspberry Pi Compute Module Development kit
 The Raspberry Pi Foundation
Ahead of making the standalone compute board available the Foundation is selling it as part of a package. The compute module development kit consists of one compute module, compute module I/O board to plug the module into and a couple of adapter boards that convert between the ribbon cable format used on compute module and the ribbon cable format used on the Raspberry Pi Camera, and that will be used on the official display when it launches later this year. It also includes a 5V power supply and micro USB cable for flashing the eMMC from a host PC.
The compute module development kit is available for $230 and the compute module board is expected to be available individually by October this year.

Friday, 27 June 2014

10 key facts about microservers

10 key facts about microservers

 By Odubanjo Bolarinwa

Microservers may not make sense in every environment, but they're playing a role in providing space/cost savings and handling customized workloads for certain business needs. Here's a look at where the technology is now and where it's headed.
Hero
(Image: SeaMicro)
Microservers offer benefits such as low power and space consumption, and have a number of potential roles in the data center -- generally 'scale out' workloads that can use large numbers of relatively lightweight server nodes. But they have their limitations, including moderate computing capabilities, the potential need for software rewrites to handle clustered configurations, a lack of standards, and ambiguity about workload capacity and management. They also face competition from virtualization and cloud services (although it should be noted that multiple physical microservers can have advantages over a collection of virtual servers running on a single full-size server).
Limitations notwithstanding, microservers have made significant inroads in certain fields as their advantages have solidified. Here are 10 key facts about microserver technology.

1: Microservers can be hard to define

For the purposes of this article, a "microserver" isn't the handsome little box pictured below, even though HP calls its entry-level (Celeron- or Pentium-powered) ProLiant systems "MicroServers."
hero
(Image: HP)
What we're referring to is a considerably larger and more expensive beast -- "any server with a large number of nodes, usually with a single socket or multiple low-power processors and shared infrastructure," as Kevin Huiskes, director of cloud computing at Intel, puts it. So be aware that the definition of a microserver can vary.

2: Blade servers are in the cross-hairs

The system shown in Figure B may look like a chassis loaded with blade servers, but those are actually microserver "sleds" (in Dell's parlance). It's important to note that these two types of servers are different -- and that the microserver is trying to eat the blade server's lunch. A blade server has more horsepower, but it's larger, consuming more energy and requiring more cooling. A microserver, by contrast, is smaller and less resource-hungry but has less computing firepower. It might seem like the weaker candidate would be overlooked, but as companies become greener, the notion of higher density and reduced cost becomes increasingly attractive.

3: Microservers can pool their resources

You might argue that blade (or full-size rack-mount) servers are still a better bet because they can handle more demanding workloads. However, microservers can work together to pool their limited individual resources via clustering or shared processing. This is why microservers are prospering in the data analytics space, where shared resources can play a key role. Microservers can also boost uptime thanks to increased redundancy.

4: The balance between microservers and servers can be tricky

YourPCUniverse says that microservers cost 63% less for the setup and use 85% less energy compared to traditional servers. This sounds appealing, but it's important to keep in mind that companies have to find the right balance between microservers and traditional servers. It does no good to replace full-size servers with too few -- or too many -- microservers. Cost savings can be attractive, but performance issues can be much less so, not to mention the danger of finding that your cost savings merely represented cost shifting.
Before replacing a fleet of workhorses with shiny new microservers, get professional guidance from the vendor, IT staff, and/or outside consultants to ensure that you're not just trading one set of problems for another, unable to leverage the benefits. Resist the urge to go all-in until every avenue is explored, including application, network, storage, database, and processor/memory usage.

5: Microservers are expensive

Microservers may fit into relatively small spaces in the data center, but they're not exactly "affordable." For example, in 2011 the list price for a "base configuration" of SeaMicro's Atom N570-based SM10000-64 microserver was $148,000.

6: Additional storage may be required

Most microservers offer internal storage, either on the server sleds themselves or in separate storage slots on the shared-infrastructure chassis. HP's Atom-based Proliant m300 Server Cartridge, for example, accepts one 2.5-inch hard drive (500GB or 1TB) or SSD (240GB). With the Moonshot 1500 chassis accommodating up to 45 cartridges, that gives a maximum of 45TB of internal storage per chassis. SeaMicro's latest SM15000 chassis has eight storage slots, each of which can hold eight drives, for a total of 64. If more storage is required, SeaMicro's separate Freedom Fabric Storage system accommodates up to 1,344 2.5-inch or 3.5-inch drives (HDD or SSD) for up to a massive five petabytes all told.

7: Microservers are making it big in the media storage space

Global Industry Analysts says that "media storage is currently the leading application area" for microservers, which are providing access to photos, audio, and video files over the network or internet -- a relatively simple yet significant process for consumers and businesses alike.
8: The use of microservers for cloud computing is expected grow (a lot)
RnRMarketResearch.com reports that cloud computing application among microservers "will grow at a phenomenal CAGR of 62.3% from 2013 to 2018." In an article last year, TechRepublic's Nick Heath said, "As use of public cloud services grow, the demand for microservers suited to handling the lighter cloud service workloads is also likely to grow." It appears he was right, as cloud companies are seeing the fulfillment of a clear need by microservers.

9: Microservers may represent a billion-dollar market in three years

According to Silicon Semiconductor, IC Insights said that "between 2012 and 2017, microserver sales are projected to rise by a CAGR of nearly 72 percent, totaling $1.2 billion." Meanwhile, Markets and Markets expects sales to exceed three billion in 2020. In other words, it's possible this market segment could almost triple between 2017 and 2020 if the predictions are accurate.

10: Large-scale deployments may require data center reassessment/revision

Depending on the data center environment (racks in use, power distribution, heating/cooling), a microserver rollout might involve changing the layout and resource usage. For instance, traditional racks might have to be removed in favor of alternatives geared to hold microservers. Cooling may have to be adjusted to ensure that it remains appropriate for the needs of the systems. Power distribution units might have to be revamped to accommodate the changes. This can translate to greater costs to include in any provisioning project.

What lies ahead?

Microservers are well positioned across an array of business sizes as well as data centers and cloud companies -- at least for those with specific application or functional requirements. Most interesting is their potential to rekindle the physical vs. virtual server debate, which many considered closed once the advantages of virtualization became well known. Many prominent server manufacturers, such as Dell, HP, and IBM, are in the game, and their efforts are helping drive advances in microserver technology. At present, North America is the largest market for this industry.
Jim O'Reilly of DatacenterAcceleration recently shared some interesting insights about microservers: "Microservers are in the embryonic stage of growth. The next few years will see ARM 64 multicore processors and much beefier Atoms replace the 32-bit processors. DRAM will grow, and SSD will speed the IO side no end. We can expect 10GbE or better Ethernet as standard in 2014, which will give us enough bandwidth for networked storage connection." He added, "The current trend towards software-defined datacenters opens an opportunity for low-powered simple servers in large quantities." Furthermore, a key point in the microserver future may be "the conjoining of GPU [graphics processing unit] and CPU that some microserver players are involved in."
If your company is considering microservers, it seems a safe bet that the field will continue to bring new developments in the areas of distributed resources, space/cost savings, and customized workloads for certain business needs. It's an equally safe bet that as with any new technology, a careful assessment of the proper strategies and best practices to meet those business needs will be essential before embarking upon a deployment.

Friday, 20 June 2014

21 Bad Tech Habbits And Fix

                       TAKE   YOUR TIME   AND GET YOUR COMPUTER PROBLEM SOLVED

By  Odubanjo Bolarinwa  +2348094994773

 1. Leaving equipment in plain sight
Someone can easily take your gear if you leave it sitting unattended.

The typical gadget isn't stolen by thieves who've done lots of planning. No, most gadget heists are conceived and executed in seconds, and probably be­­cause you left the item unattended. That cozy window corner at the café is great until you need to run back to the counter for a refill. A thief can pop in, grab your device, and be gone. Gadgetry is also commonly snapped up from airport security conveyers (sadly, sometimes by TSA agents themselves) while you’re waiting for your body scan. Your locked car isn’t safe, either. An eager crook will happily smash your window and grab the laptop bag from the passenger seat, even in broad daylight.

Fix: Don’t leave laptops and other gadgets unattended. Yes, that means you must either take them to the bathroom or leave them with someone you trust. At a café, it doesn’t hurt to ask the staff if you can leave something behind the counter for a minute. In any case, skip asking, “Can you watch this for me?” and pointing at your PC across the room.

2. Oblivious gadget usage

Here’s how street hoods steal your phone. They lurk at the top of the stairs as you emerge from the subway, or sneak up behind you while you’re lounging at an outdoor café. Either way, you have no idea they’re there, because your nose is buried in your smartphone’s Facebook feed. Next thing you know, you’ve been punched in the face, and the thieves are dashing off to a getaway car. Can you identify the suspects? No, because the last thing you saw before it happened was a picture of a puppy.

Fix: Everyone uses phones everywhere, so it doesn’t feel risky to break one out on the train or while walking home in the dark. But electronics remain some of the most easily fenced items on the black market, and it pays to keep your wits about you when using them in an unknown situation. Make it a policy to limit mobile device usage to areas where you’re completely certain you won’t be the victim of a smash-and-grab attack. That goes double for using your phone while you’re driving. Don’t become another statistic!

3. Using your devices with dirty hands

Anyone who has ever handed a cell phone to a child knows that the device will come back covered in a crust of dirt, crumbs, chocolate, and sneeze spray.

But you aren’t much better. Playing Bejeweled while downing a burrito won’t leave your phone looking fresh, and holding your phone against your face to talk may leave an oily shadow behind.

This isn’t just gross, but brings health risks, too: The old adage that your keyboard is dirtier than your toilet applies to your phone, as well. One report last year claimed that a Ugandan thief contracted Ebola from a stolen phone.

Fix: Keep an electronics-cleaning vial on your desk in plain view. Clean your phone, tablet, and other touchscreen devices daily. Add a quick wipe-down any time you see visible grime.

4. Not cleaning your equipment

We covered the problem of filthy touchscreens (increasingly problematic in the Windows 8 era) in the #3 item, above. But what about everything else?

Literally everything in your high-tech arsenal is vulnerable to damage from dust and dirt. Grime seeps in through any crack and crevice, but machines such as desktops, laptops, and even printers, which have air-intake vents for cooling, are the most affected. Dust generally won’t damage electronics, but it can clog fans, optical-drive mechanisms, and other moving parts, which can lead to component failures and overheating if the fans stop working properly. Dust in scanners and printers can affect the quality of your printouts, too.

Fix: Cleaning your equipment isn’t hard, but it’s important to do so regularly before things build up too much. Once or twice a year should do it. Can’t remember? Try cleaning out your PC at the same time you replace the filter on your furnace or air conditioner, or whenever you get the oil on your car changed. A calendar reminder on your PC can help, too.

5. Sitting with bad posture at the computer

The posture lessons, cautionary tales, and ergonomic gadgets of the past 30 years have apparently taught us nothing, and as a result, carpal tunnel syndrome is the most common form of neurological syndrome called entrapment neuropathy, affecting 5.8 percent of the population. The typical treatment, even for moderate cases, is surgery. And all be­­cause you were too lazy to sit up straight.

Fix: Fixing this problem requires a proper work environment. Keep your chair at a height so that your knees bend at a 90-degree angle; also keep your feet flat on the floor, your monitor directly in front with the top of the screen at eye level, and your keyboard placed so your wrists are parallel with the floor.

This is easier said than done if, as it is for many, your office is now a Starbucks. But Imak Computer Gloves can keep your wrist at the correct typing angle and cushion your hand—an easy solution that you can drop into your gadget bag.

6. Not taking breaks

Most parents have no trouble limiting their children’s screen time, but they find it harder to put down their laptops or smartphones when work demands action (or Angry Birds chirps).

Breaks are essential to good health. Your joints, muscular system, circulatory system, and eyes all benefit from a change of scenery once in a while. Remaining in a seated position for extended periods of time can cause blood clots (sometimes even fatal ones). And staring at a screen for hours on end can cause eyestrain that may affect your vision afterward and make it dangerous to drive home.

Fix: Fortunately, programs such as Scirocco Take a Break, mobile apps, and Web browser plug-ins can remind you to step away from your gadgets, stretch your legs, get a drink of water, or call it a day on your computer time.

Another easy way to remedy the problem is to keep, at all times, a very large glass of water at your desk (the solution for another bad habit: failure to hydrate). Sipping a gulp from that glass of water regularly will force you to take an occasional break to the bathroom.

7. Working with your laptop on your lap
Worst Tech Habit
Photograph by Robert CardinA laptop on your lap can mean bad posture and problems from its heat.

Yes, they call it a laptop, but you weren’t supposed to take that literally. Using your laptop on your lap can lead to a whole host of problems, many caused by the heat that most laptops spew from their undersides. The maladies can range from simple skin dryness and discoloration to reduced sperm count to—the jury’s still out on this one—cancer.

Heat isn’t the only problem. Placing a heavy object across your thighs for hours on end can cause neurological damage, particularly when coupled with the typical laptop-on-lap posture: hunched over, legs outstretched, neck craned. Arthritis can also develop over time.

Fix: Fixes aren’t easy unless you want to move your desk into the living room so you can watch Game of Thrones while you work. Instead, start with a lap desk that shields your thighs from heat, and follow the break-taking tips outlined in item #6. Periodically shifting your laptop from one leg to the other can help. Avoid working on your laptop with your legs outstretched on the coffee table, too. Your nervous and muscular systems will be in better alignment if you keep your knees bent and your feet on the floor.

8. Failing to back up data

Stop me if you’ve heard this one before. Everything is zipping along just swimmingly until one day it suddenly isn’t. Maybe it’s a hard-drive crash, maybe it’s a malware infestation, maybe it’s a stolen laptop. One way or another, your data has abruptly vanished, and you’re left crying that you should have been backing up your data.

The excuses for not backing up your data are becoming increasingly thin. Any number of online backup services will sync your files automatically with a cloud-storage system, whether you use a PC, a tablet, or a phone. Don’t be lulled into thinking that you have nothing important on that device. Whether it’s a forgotten baby picture or a game save on the verge of hitting 100 percent completion, you’ll feel differently once it’s gone.

Fix: With most backup systems now, you don’t need to do anything except install an app and set it up. If that’s too much effort, well, perhaps it’s time to go back to pen and paper.
9. Reusing passwords over and over

We are all guilty when it comes to this bad habit. How are you supposed to remember your 100th different password for the latest social network you’ve joined? You take the easy way out and reuse a password that has worked for you time and time again.

Password “strength” is a bit illusory. All it takes is one website that doesn’t store passwords securely and gets hacked, or one old and unencrypted hard drive that’s sloppily disposed of, to bring the whole house of cards tumbling down, no matter how many numbers, uppercase letters, and special characters you use.

Fix: The solution involves coming up with a system to build a unique password based on each website where you use it. Build from a base phrase and, for each site, add something unique to it. Take, say, Flurpb&rgl3r as a base and add fb8 to the end for Facebook, or tw7 for Twitter. (In this example, the numerical component of the end tag is the number of characters that the site name has.)

Presto: a password that you won’t forget but is virtually impossible to crack.

10. One account, multiple users

A parent’s typical move, when giving a child his or her first computer, is to hand it over and hope for the best. Mom then wonders where her address book went, and her boss wonders why she sent him 20 email messages full of gibberish.

Fix: Setting up multiple user ac­­counts on Windows isn’t difficult, and it’s an incredibly prudent precaution if more than one person is going to use the machine. Never mind the privacy issues—accidents happen, even among grown-ups sharing a PC. Having two people working on different files called “resume.doc” can only end in heartache.

For children, security and safety are bigger concerns. Setting up kids with Standard User accounts (instead of Administrator) is the wise thing to do to keep unwanted software from being installed, and it’s the key to letting you configure parental controls on the computer, as well. So next time Junior wants to use your PC “real quick, just to look something up,” tell him sure, and give him his own account.

11. Failing to update

Software published today is updated on a near-constant schedule. If you have a few dozen apps on your smartphone or tablet, you’ve probably become accustomed to downloading updates on a daily basis—unless you’re one of those people who never update anything.

Software updates are released for a variety of reasons. The application’s developers add features, fix bugs, and plug security holes. Installing updates upon release—particularly operating system updates and security software updates—is essential to keeping your device stable and secure.

Fix: Every application has to be updated, so it’s forgivable if you don’t want to deal with the constant nagging to install, reboot, and repeat every day. Automatic updates take some of the hassle out of this operation, but most software updates today still have to be manually installed. There’s no easy solution to this. If immediately installing updates when they appear in the system tray or on your handset doesn’t fit with your computing habits, make it a weekly event to update everything all at once—perhaps after you take out the trash.

12. Printing anything
Worst Tech HabitsPhotograph by Robert CardinSave paper and don’t print anything. Your documents are (or can be) archived online.

You’ve seen the request at the bottom of so many email messages: “Please consider the environment before printing this email.” Is that really necessary in 2013? Who is not considering the environment? And more important, who is still printing out their email?

In an age of $75 terabyte hard drives and endless cloud storage, why does anything that starts out in digital format, such as email, ever need to go back to paper? Even utility and bank statements are archived online (often for years), much safer as backups than the ones sitting in file cabinets in your house.

What legitimately needs to be printed? The only thing I can come up with is mailing labels for products that have to be physically shipped somewhere, and maybe the packing slips or receipts that are included with those packages. Also arguably acceptable is the occasional printed photograph that you’d like to frame and put on the wall.

Fix: Unplug your printer and stick it in a closet for a week. See if you can’t go paperless, cold turkey.

13. Faxing, ever

As bad a habit as printing is, faxing is infinitely worse. Here, you have the opportunity to break the paper cycle, but instead you’re continuing it, indeed worsening it by duplicating the paper and possibly racking up long-distance telephone charges in the process.

No disrespect to the fax machine. It was a critical piece of apparatus in American business for years, but now it is an outdated relic on a par with the dial-up modem. Yes, technology has improved—you can even send color faxes now—but quality really has not. Most faxed documents are still difficult to read, still come out askew, and are often incomplete, cut off by a paper jam or a problem with the phone line. Many people resort to faxes when they need to send a signed document to another party, but in many cases a fax with a signature may not even be legally acceptable.

Fix: Fortunately, for most people, faxing is a fairly easy habit to break. Just staring at the pile of junk faxes that most businesses continue to receive is impetus enough. While your fax machine may be attached to an otherwise useful all-in-one printer, you can simply unplug it from the phone line, and save a few bucks a month if you’re paying for a second line for it. Plenty of free or cheap services can let you send a digital fax, should you really need to do so.

14. Throwing computer equipment in the trash

If you’ve been a computer user for any length of time, you’ve probably accumulated dozens of old peripherals, outdated or broken laptops, ancient cell phones, and gobs of cables. What do you do with that mountain of telephone wire that came with every modem you ever bought? What about all those old red-white-and-yellow A/V cables bundled with the VCRs of yesteryear?

Much of this material unfortunately ends up in landfills. Some, like telephone wire, isn’t exactly hazardous, but anything with a battery or a circuit board in it probably is. (Modern electronics typically aren’t as toxic as older stuff, but that isn’t what you’re throwing away, is it?)

Fix: The good news is that you can fairly easily recycle most of this junk, even broken cables and defunct printers. E-waste events are common in many neighborhoods, and both Goodwill and Best Buy will take just about anything off your hands for reuse, resale, or recycling.

Don’t forget to scrub personal data from any hard drive or flash drive you recycle. Use a multipass wiping tool such as BCWipe to make sure that last year’s tax returns don’t end up in someone else’s hands.

15. Not reading the FAQs

When trouble arises online—as it always does—the knee-jerk reaction is to open a support ticket or call the help desk immediately. Then you’ll spend half an hour on hold waiting for someone who probably can’t do much to help you.

Fix: Make it a habit to remember the FAQs. Companies love to create Frequently Asked Questions pages because they really do answer a lot of common concerns. While some FAQs are more thorough than others, they’re always worth a quick spin to see if you can’t find a quick answer to what you believe is a unique problem. Use the search feature on your browser to scan a large document for your trouble keywords.

16. Oversharing on social media

It’s good news that you finally resolved your bunion problems. We got a kick out of that picture of the syrup puddle on your breakfast waffles. And the story about the squeaky dog toy you bought was also a gem.

Yes, complaining about banal stories, photos, and comments on Facebook and other social media sites has become a First World Problem of the greatest order, but considering how intertwined social media and the business world have become, the person likely to suffer the most is the one who does the blathering.

Fix: If you’re at all concerned about your appearance in the world, try to keep comments unique and unexpected. Dutifully copying the latest “Follow these instructions or else!” post on Facebook is no better than mailing chain letters to all your friends. Restrict social media chatter to a few posts a day. You can post the rest of your conspiracy theories ad nauseam to your blog.

17. Texting at the table
Worst Tech HabitsPhotograph by Robert CardinTexting at the table when someone is talking to you should be a no-no.

Really? It’s that important? We all love our smartphones, but using them in the company of others, particularly at mealtime, is just plain rude. (It’s also gross. See item #3.)

What about the phone-in-the-lap trick? Not kosher. Even Emily Post says so. And that goes for any kind of social situation, whether it’s school, work, or a simple conversation with someone else.

Fix: If you must deal with another conversation, voice- or text-based, take it to another room or outside. And be sure to make the “no phones at the table” rule apply to everyone in your household, including yourself

18. Using your phone or tablet without a case

How will it end? Eventually your phone or tablet will die. The battery may explode. The CPU may melt down. Cosmic rays may fry the RAM. But realistically, you will probably just drop it.

No matter how sure-handed you are, and no matter how carefully you treat your devices, one day they are going to slip out of a pocket, or simply fall to the ground when someone’s elbow bumps against you.

Fix: The only solution is to enshroud your gadgets in cases­­—thick, sturdy ones. The flippy Smart Cover for your iPad is useless when a preteen fumbles it to the tile. Go for a thick rubber or silicone case that covers every corner of the device, such as the Otterbox Defender. A thinner, plastic case may do the job, but replace it when it becomes damaged.

19. Failing to pick up the phone
Worst Tech HabitsPhotographs by Robert CardinA blanket policy of ignoring your incoming calls may not make sense.

The phone rings. You look at the number and don’t recognize it. You let it go to voicemail, and that little red light blinks all day until you finally get around to playing the message.

Technology has given us a half-dozen ways to communicate with one another—virtually all at the ex­­pense of the fastest and most expedient, the telephone. It’s easy to understand why we don’t answer the phone anymore: We likely don’t want to talk to a solicitor, a pitchman, or a robotic telemarketer.

Fix: We’re not talking about breaking the rule against texting at the table (item #17), but a blanket policy against answering the phone may not make sense. Consider how much faster it would be to answer a simple question via voice than to read and respond to a long email message. Imagine that your $500-an-hour attorney is the one who is calling. Do you really want to force him to spend 10 minutes writing an email to you when he could have told you something on the phone in 30 seconds?

20. Failing to silence your phone

These days, just about every public performance begins with an entreaty to the audience to mute or turn off their cell phones. Thirty minutes later, the unmistakable jingle “Marimba” makes its presence, and its clueless owner, known.

Cell phones that erupt at the most inappropriate times are a cultural epidemic, and ironically it’s likely because we have heard so many commands to shut our phones off that we simply don’t hear them at all anymore.

Fix: While you likely can’t fix the behavior of the person sitting next to you, at least you can ensure you aren’t part of the problem. Simply make your default setting “ringer off.” Turn the ringer on only when you know you’re going to need to hear it ring—that is, any time it’s not in a pocket and out of arm’s reach.

21. Never rebooting

For all their advances in reliability, our gadgets remain incredibly susceptible to minor bugs of all kinds. Memory leaks are still rampant in Windows applications, flooding your RAM to make it unusable. Numerous applications still require reboots after they’re installed or updated, and the app will be stuck in limbo until that reboot occurs.

Windows 8 has improved reboot times (and reboot frequency), but every operating system—whether desktop or mobile—benefits from an occasional reboot. Think of it as a good night’s sleep for a device: A reboot lets it start fresh, free of digital baggage. A reboot may improve your device’s battery life.

Fix: Build rebooting into the natural downtime of your day, typically when you go to bed. Reboot your device to give it a refresh. Better yet, turn it off completely and save energy.