Tag: Business

Digital Minimalism

Minimalism is big these days. In particular, there’s a version of Minimalism called Digital Minimalism that’s quickly rising to prominence as our lives become increasingly tech-centric.

Personal technology like smartphones and tablets are enabling us to spend more and more time online. And as we do, many of us are starting to feel uneasy about this persistent ‘digital creep’—that steady march of gadgets and tech into every aspect of our lives.


Before we get to Digital Minimalism specifically, it’s helpful to first understand Minimalism in general.

Josh Millburn & Ryan Nicodemus, two bloggers largely credited with kickstarting the current Minimalist movement, define it like this:

Minimalism is a lifestyle that helps people question what things add value to their lives. By clearing the clutter from life’s path, we can all make room for the most important aspects of life: health, relationships, passion, growth, and contribution.

What is Digital Minimalism?

Digital Minimalism is a specific application of the general minimalist
philosophy to the role of technology in our lives.

Cal Newport has the best definition of Digital Minimalism I’ve seen:

Digital minimalism is a philosophy that helps you question what digital communication tools (and behaviors surrounding these tools) add the most value to your life. It is motivated by the belief that intentionally and aggressively clearing away low-value digital noise, and optimizing your use of the tools that really matter, can significantly improve your life.

“Digital minimalism” is the concept and strategy of how to embrace and enjoy the benefits that the internet, email, the web, smartphones, tablets, and other technology bring us, without becoming overwhelmed by the fire hose. It is about how to cope with email overload and information overload, how to reduce email volume or manage it more effectively and how to not just survive, but how to thrive in the age of distraction.

If the problem is “Too Much”, then the solution to the problem will always be “Less”. Digital Minimalism is the practice of learning how to achieve that balance without losing the benefits that technology brings us.

DIGITAL USAGE BY THE NUMBERS: According to the latest research from comScore’s 2017 U.S. Cross-Platform Future in Focus study:

  • Total digital media usage is up 40% since 2013
  • Smartphone usage has doubled in the last 3 years
  • 1 of every 2 minutes spent online is on “leisure activities” including social media, video viewing, entertainment/music, and games
  • 1 of every 5 minutes spent online is on social media
  • At the end of 2016, the average person spent 2 hours 51 minutes per day on mobile

If those stats aren’t shocking enough:

  • Last year, Apple apparently acknowledged that its device users unlock their phones 80 times every day.
  • Another piece of research from dscout claims the average person touches their phone 2,617 times per day (tapping, swiping, typing, etc.) — some people are even over 5,400 touches per day.

We have been interacting with devices long enough to know, fairly scientifically, that too much screen time is a health risk:

  • Basing our measures of success and well-being on social media negatively affect our happiness, stress levels, and feelings of self-worth.
  • From a physical standpoint, over-indulging on devices can cause ailments like eye strain, text neck, insomnia, and cybersickness or “digital motion sickness.
  • Increased use of chat and text to communicate is reducing our ability to read emotions and interact empathetically with each other.
  • Fear Of Missing Out (FOMO) is a feeling of anxiety over the possibility of missing out on something, which many people experience when they discover that other people have had fun together, especially caused by things you see on social media.
  • The Fear of Being Offline (FOBO) is the lesser-known cousin of The Fear of Missing Out (FOMO). FOBO includes the fear of not being able to get online and check what is going on in your social media feed.
  • Nomophobia is the irrational fear of being without your mobile phone or being unable to use your phone for some reason, such as the absence of a signal or running out of minutes or battery power.

Tech is for making stuff, not feeling better. Use technology as a tool to accomplish your goals and aspirations. Don’t lean on it as a crutch for cheap emotional satisfaction or distraction.


You are the product when you are using the Internet. You are data that is then sold to advertisers — that they then use to sell you even more stuff you don’t really need. Don’t fall victim to lifestyle inflation.

image (1)


Simplify your digital life:

  • Remove social media apps from your phone.
  • Unsubscribe from email newsletters that aren’t bringing you value
  • Turn off notifications from smartphone apps that are constantly distracting you
  • Go for a lunch break without your phone or tablet.
  • Practice mindfulness meditation.
  • Bring back the Sabbath. Use your day of rest as a day without tech.
  • Small Moves. Practice periodically leaving your phone at home, in the car, when you are on a walk, meeting for lunch, taking your kids to the park. People did these things just fine for generations. You can too.
  • Don’t keep your phone by your bed. Use an “old school” alarm clock.
  • Practice healthy sleep hygiene.
  • Go outside. Spend time in nature. Go for a walk after dinner.
  • Do it with your kids, friends, and family. Make a pact.
  • Track your progress. Make a chart, set goals. Use a pen and paper.
  • Keep a Journal. Note how do you feel. How does this change over time? What do you notice about your thoughts, feelings, moods, and interactions with others? Does it feel liberating? Empowering? Are you getting more done?
  • Build/Create something. Re-engage in an old hobby.
  • Plant a garden.
  • Read an actual book.
  • Go Analog. Start using pen and paper again for things like “to do” or grocery lists.
  • Incorporate into a dietary cleanse, fast, or other practice of food as medicine.
  • Stop taking pictures of everything and enjoy the moment for what it is.


Join the movement. Take Part in the National Day of Unplugging 2019. The second Friday in March is National Day of Unplugging. This holiday consists of a 24-hour period from sundown to sundown, to unplug, unwind, relax and do things other than using today’s technology, electronics, and social media.

image (2)


The History of the Day of Unplugging:

The National Day of Unplugging was created by Reboot, a nonprofit Jewish community that was originally established in 2003. However, you do not need to be Jewish, or even religious at all to participate. The idea behind the day was to challenge people to keep their electronic devices unplugged and unused for 24 hours in order to give themselves the chance to take a break and spend time relaxing with family, friends, or alone. This is definitely something that would be useful to everyone, regardless of religion or lack of it.

Reboot believes that such time taken to “reboot” or systems will make us happier, more content with our lives, and more aware of the things that matter.

Credits: nickwignallsloww.co,faceyourfobodaysoftheyeardigitalminimalism,nationaldayofunpluggingfullformsblog.trellohealthyhildegardperthnow@marny_lishmanCal Newport 

McAfee ePO Admin password lost

McAfee ePO Admin password lost:  

Some time ago I started attending trainings and discussions with industry experts, on McAfee ePO and started learning many things from them. During these sessions I came across some issues with McAfee 4.x and 5.x installation. I have uploaded solutions to some of these issues on my blog, please refer the following link:


          One fine morning all of sudden I got a doubt, what if I lost McAfee ePO admin password and there were no additional accounts configured. I opened my laptop and started Googling for the solution. There were more blogs describing this issue, but none had a satisfied solution. After a rigorous search on the Internet, I found two good and easy solutions.


We believe that only one account, i.e. Admin account, is configured in McAfee ePO. But by default one more account exists in the McAfee ePO User Management, named system. This account is disabled by default. User ‘system’ account has administrative rights (see the Image-1).

Image- 1
Image- 1

This user (system) is by default non-editable through the web console (see the Image2)

Image- 2
Image- 2

We have to enable the user ‘system’ through MS SQL.

Go to start –> All Programs –> MS SQL Server 2008R2 –> click on SQL Server Management Studio, expand Databases -> expand ePO Database –> expand Tables –>go to dbo.OrionUsers –> right click on dbo.OrionUsers –>click on Edit Top 200 Rows.One window will open on the right side (see the Image-3)

Image- 3
Image- 3

Under the OrionUsers Table –>following changes will need to be done for the user ‘System’

Under Disabled –> default setting will be True, change it to False  (click enter)

Under Interactive –>default setting will be False, change it to True  (click enter)

Minimize the SQL window and Open the McAfee ePO web console and type username: system, Password:system

It will allow you to login. Click on MenuàUnder User Management –>click on Users –>Admin –>Rightside down click on Actions –>click on Edit (see the Image-4& Image -5)

Image- 4
Image- 4
Image- 5
Image- 5

Click on Change Authentication or Credential

Type Password and confirm Password and save (see the Image-6)

Image- 6
Image- 6

Log off and Login with Admin credentials. That’s it.

Now Open SQL and make the same changes in OrionUsers Table (Exactly as shown in the Image-7)

Image- 7
Image- 7

Under Disabled –>change it to True  (click enter)

Under Interactive –> change it to False  (click enter)


In solution 1, enabling of the user system’ account through MS SQL resets Admin the Password.

In Solution -2, we will create a new account with Administrative rights using MS SQL and through new account  will reset the Admin password.

Go to start –> All Programs –> MS SQL Server 2008R2 –>click on SQL Server Management Studio, expand Databases –> Click on ePO Database –> open a New Query, run the following query and execute

INSERT INTO [dbo].[OrionUsers]

(Name, AuthURI, Admin, Disabled, Visible, Interactive, Removable, Editable)
VALUES (‘epoadmin‘,’auth:pwd?pwd=7LTSeirrzM8EjqttaozV4cSiPGQWi8w3′,1,0,1,1,1,1)

It will create a new user epoadmin, with the password: epoadmin

Open the McAfee ePO web console with username and password epoadmin

It will allow you to login.Click on Menu –>Under User Management –>click on Users –> Admin –> Rightside down click on Actions –> click on Edit and reset the Admin Password

Log off and Login with Admin credentials. That’s it.

NOTE: Use the above solutions when you don’t have any other option. Be sure you have got the required skills to modify SQL serverYou can break your ePO server if you don’t know what you are doing. Don’t   hold me responsible for your actions; think before you act and always make sure you have a backup 🙂

IMPORTANT: McAfee recommends that you implement account and password management policies such as:

  • Maintaining a backup administrator account
  • Creating individual accounts for each administrator
  • Adhering to corporate requirements for accounts and passwords

Happy computing!!

Source: thegid, cupfighter, McAfee

CYOD – Choose Your Own Device:

CYOD – Choose Your Own Device:

The organisation offers employees a choice of devices (which are likely to be from multiple manufacturers on multiple operating systems), with the organisation retaining ownership of the SIM/contract. The device can then be used by the employee for both business and personal use, with policies set centrally to manage usage.

CYOD is less about devices and more about people.

CYOD is a flexible policy where:

  • The business can expand the range of ‘company approved’ devices offered to the employee
  • Or alternatively the business can make a contribution to the employee’s own choice of device
  • Ultimately there is one dual purpose device for personal and business usage
  • Crucially the businesses own the SIM and contract for greater visibility, control and potentially lower costs.

CYOD - 1

Choose-Your-Own-Device (CYOD) overcomes the limitations of BYOD and builds upon its advantages

A CYOD policy allows IT managers to provide their employees with a menu of devices, all of which the organization will support. CYOD, therefore, gives employees a real choice in their preferred computing or mobile device, while still limiting the variety of devices that the IT department needs to work with.

 In this way, CYOD bridges the gap between the unregulated device choice and the IT department’s need to manage and secure the organization’s IT assets.

 CYOD standardizes security and management over a range of IT-approved devices. It can help businesses manage the deployment of multiple device options with the right configurations easily. 


The CYOD phenomenon also provides a credible alternative to Bring Your Own Device (BYOD) concept.

 CYOD not only overcomes the limitations of BYOD, but it further builds upon the latter’s advantages. When organizations choose CYOD, they ensure that only the most up to date and secure versions of operating systems and apps are accessed by all employees. It is a win-win situation for employees – who get to choose a device of their preference – and the IT manager.

cyod survey

CYOD – Choose Your Own Device

DBYOD – Don’t Bring Your Own Device

BYOD – Bring Your Own Device

The key benefits of CYOD over BYOD:

  • Centralised estate management – centralised billing from a primary network provider enables a single source of billing and interrogation, greater visibility of tariff costs, personal usage and operating efficiency.
  • Reduced mobile call costs – users will benefit from reduced rates for International/roamed calls compared to standard call rates on a (BYOD) consumer tariff.
  •  Increased productivity – employees are able to select the device that they want to use which offers the user experience and functionality that suits them.
  • Clearer liability – as the company owns the SIM and associated tariff it can ensure that its usage policy and limits can be applied for personal usage and also capped for international or roaming charges. Retaining control of the SIM eliminates several grey areas around the disclosure of usage information.
  • Enterprise retains control – by owning the SIM, IT can exert much greater control over expenditure, contract negotiation, compliance, security requirements and costs.


BYOD Matrix

Also, by overcoming the unique set of challenges that BYOD comes with, CYOD is definitely the next step in procuring client PCs for any progressive organization.


Source: azzurricommunicationschooseyourowndeviceinsightciol,

Cloud computing:

Cloud computing:

Everywhere you look people are talking about cloud computing, but what is it and why do we need it?

One of the most irritating pieces of jargon to emerge in the last couple of years is ‘the cloud’: it seems almost everyone is talking about cloud products and services in TV adverts. But what precisely is the cloud and how can computer users benefit from it?

 The cloud is nothing new or extraordinary, but many companies have sensed money-spinning opportunities, so the concept is being hyped in adverts. Though there’s little mystery about it, many people are confused about ‘the cloud’.


What is the cloud?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a metered service over a network (typically the Internet).

Cloud computing provides computation, software, data access, and storage resources without requiring cloud users to know the location and other details of the computing infrastructure.

End users access cloud based applications through a web browser or a light weight desktop or mobile app while the business software and data are stored on servers at a remote location. Cloud application providers strive to give the same or better service and performance as if the software programs were installed locally on end-user computers.

 If you access email online through web mail services such as Hotmail or G mail, then you use cloud-based email. Online storage services such as Drop box and Windows Live SkyDrive exist in the cloud, while Google Docs is a cloud-based office suite.

The key difference is that, in most cases, the code that runs the software is stored on a web server and does not run from your PC’s hard disk. You interact with the application over the internet connection, usually over a web browser.

Cloud services are often free, supported by advertising or the lure of improved, premium packages. A good example of this is online storage. Drop box, for instance, provides a free version of its cloud-storage service that includes 2GB of space for user files, with paid-for options for those needing more online storage.

Rather than keeping files solely on a PC, a cloud-storage service like Dropbox also puts copies online. Files held in cloud-storage services are accessed using a username and password.

Even though you’re accessing them via ‘the cloud’, such files do have a physical existence – on a server computer. It doesn’t matter where this server computer is: files stored in the cloud can be accessed anywhere, as long as there’s an internet connection.

Why is cloud talk so popular?

So why have so many companies chosen now to promote online applications? The reasons are availability and cost.

 Widespread access to affordable broadband with reliable mobile internet on 3G networks and the proliferation of Wi-Fi hotspots means people can get online almost anywhere and everywhere.

 As for cost, the economics of running web applications improve with rising use. With online storage, for example, as more people subscribe to services, economies of scale kick in and the cost per gigabyte falls.

 The growing popularity of online applications has led to more companies taking an interest. Apple, has recently launched iCloud, its attempt to get people to connect together all their (Apple) devices.

The idea is that you can create a document or snap a photo on an iPad, view them on an iPhone and edit them later on an iMac desktop computer. All the versions are synchronised automatically, without the user having to think too much about how it all happens: no matter which device you’re on, the stuff you need will be there.

Big cloud ideas

There are many other cloud-based tools and services that you can access right now, and many of them are free. Projects can be easily shared with friends and colleagues and cloud tools remove the frustration of not being able to access something because it is on another computer.

Cloud-based office suites, for instance, work just like Microsoft Office but exist entirely online, meaning they’re accessed and operated from inside a web browser, already mentioned Google Docs , but there are numerous alternatives, including Zoho and Microsoft’s own Office 365.

There are disadvantages – most features can be used only when online, as the software behind tools for text creation and editing are on the server, not your PC. Both Google Docs and Zoho offer some way to work offline using plug-ins for Microsoft Office.  Indeed, for the truly cloud-committed there are even operating systems and computers that are wholly reliant on the cloud. Google is leading the way with Chrome OS (which is distinct from Chrome, the web browser with which you may already be familiar).

Chrome OS is based on existing Google software, such as the Chrome web browser and Google Docs. Switch on a Chromebook and you will see various web-based apps, such as Gmail, Google Calendar and so on. Much like with smartphones and tablet computers, additional apps can be installed from the Chrome Web Store.

A big advantage of Chromebooks is that they run very quickly, as little computing work is performed on the device itself. However, the downside is that if you happen to be in a location where internet access is unavailable then a Chromebook is useless.

Another option, which isn’t tied into Google’s own cloud services, is Joli OS. It works in a similar way to Chrome OS, but can be installed on almost any computer (and even alongside Windows).

Useful cloud ideas

Fortunately, many cloud services have immediate and obvious benefits. Consider the music service Spotify, for instance. While an application must be downloaded to your local computer in order to use the service, the audio files and your playlists exist on Spotify’s server.

As well as saving on hard disk storage, this allows you to download the Spotify software to any other computer, log into your account and instantly access your music library.

Spotify does allow Premium subscribers to download tunes locally (so they can be played when internet access isn’t available) but the service embodies the cloud concept.

Remember, too, that cloud computing isn’t all about storing things online: as we’ve seen, it is as much about keeping devices synchronised. As more people switch between tablets, smartphones, laptops and desktop PCs, there is a need for files available on one to be available on the other.

Traditional synchronisation methods, such as emailing files to yourself or putting them on a USB memory key, are clunky and unreliable – but cloud services can do away with such inconvenience.

Indeed, this is the key function of Apple’s iCloud service: total synchronisation of files between multiple Apple devices. 

A service called Dropbox works in a similar fashion is free to use and can be up and running in moments. It stores files online but also keeps synchronised local copies on any computer with Dropbox installed, so your files are always accessible and up-to-date.

Office in the cloud

While Dropbox is a formidable file-synchronisation tool it doesn’t provide any of the tools needed to work with documents (though some smartphone versions of the Dropbox app do have built-in file viewers).

Even though you can access files from almost any internet-connected device, editing them still requires the relevant software (such as Microsoft Word) to be installed.

As a complement, or alternative, consider making use of a cloud-based office suite. We’ve mentioned Google Docs, which is a popular example. It’s free to use, though does require a Google account.

To try it, launch a web browser and visit the Google Docs page and either log in or click the ‘Sign up for a new Google Account’ and follow the prompts.

Once signed in a menu bar will appear at the top of the browser window – click Documents to view the Google Docs home page. Now click the Create new button and choose the type of document you’d like to create.

Choosing Document, for example, will open a blank word-processor document. It can be named by clicking the ‘Untitled document’ label at the top of the page, while the document itself is fairly self-explanatory (it works just like Word).

 Changes are saved automatically and when you next log in to your Google Docs account – from any web browser – your documents will be available to be worked on right away.

 Get creative

As well as practical uses, the cloud can also be a useful creative tool. The YouTube video editor can make simple changes to videos without needing additional software.

Go to YouTube’s editor page and any clips you’ve uploaded to YouTube can be edited by adding text and transitions, cutting clips, or changing the brightness and contrast. There is also a large selection of Creative Commons video clips and sounds, too.

Windows Live, available on Windows 7, includes Windows Live Photo Gallery and Movie Maker, both of which are cloud-based.

 Pixlr is an online photo editor that runs entirely from your web browser. Go to the Pixlr website and either click Open photo editor or Retro vintage effects. The former is a standard photo-editing suite with plenty of easy-to-use tools for improving photos, while the Retro vintage effects tool is a nice way to add interesting effects.

Security in the cloud :

Clearly, the cloud has many benefits but it also brings security and privacy concerns. Cloud data is stored on server computers in unknown locations around the world.

 So long as a user of a cloud service can access their data, this hardly matters – but what happens when things go wrong? If there’s a fire in the cloud company’s server room or the firm goes bust, where is your data?

 These aren’t fantasy concerns. In April 2011, Amazon’s web-services business – known as AWS – became unavailable for several days following problems at a data center in Northern Virginia in the US.

Amazon runs a vast number of web servers and allows other companies to rent space on them, so the websites of dozens of big-name firms went offline with AWS.

This highlights a problem with relying entirely on cloud-based tools and services: you have little control over what happens to data stored elsewhere. Obviously Amazon is a big, well-resourced company and it sorted the problem – but many of its customers were inconvenienced for days.

And don’t forget privacy. While any trustworthy company offering cloud-based services will abide by a privacy policy, leaks can happen. Recently, Dropbox had to admit that for a period of hours, an error left all accounts exposed and at risk of being compromised.

Every cloud…

The cloud is really just a bunch of server computers on the internet and if something goes wrong, your data could be stolen or even lost forever – so it’s a good idea to back up stuff stored in the cloud.

 However, used wisely, the cloud can provide easy access to files and applications. Being able to get to what you need, whenever and wherever you are, is how computing should work, and that’s what the cloud does.

The Benefits of Cloud Computing:

There are lots of advantages to using cloud computing for international companies. One of the major ones is the flexibility that it offers. Cloud computing means that staff can access the files and data that they need even when they’re working remotely and/or outside office hours.

Flexibility & Mobility:

  • As long as they can get on the Internet, staff can access information from home, on the road, from clients’ offices or even from a smartphone such as a BlackBerry or iPhone. Staff can also work collaboratively on files and documents, even when they’re not physically together. Documents can simultaneously be viewed and edited from multiple locations.

Highly Automated:

  • Cloud computing can be very quick and easy to get up and running. Consider, for example, how quickly you can set up a Gmail or Hotmail account and start emailing – it takes minutes and all you need is a computer and the Internet. Downloading and installing software, on the other hand, takes much longer.

 Reduced Cost:

  • Cloud computing is often cheaper and less labour-intensive for companies too. There is no need to buy and install expensive software because it’s already installed online remotely and you run it from there, not to mention the fact that many cloud computing applications are offered free of charge. The need to pay for extensive disk space is also removed. With cloud computing, you subscribe to the software, rather than buying it outright. This means that you only need to pay for it when you need it, and it also offers flexibility, in that it can be quickly and easily scaled up and down according to demand. This can be particularly advantageous when there are temporary peaks in demand, such as at Christmas or in summer, for example.

Increased Storage:

  • A major advantage of using cloud computing for many companies is that because it’s online, it offers virtually unlimited storage compared to server and hard drive limits. Needing more storage space does not cause issues with server upgrades and equipment – usually all you need to do is increase your monthly fee slightly for more data storage.

 Gartner: Seven cloud-computing security risks:

1.  Privileged user access. Sensitive data processed outside the enterprise brings with it an inherent level of risk, because outsourced services bypass the “physical, logical and personnel controls” IT shops exert over in-house programs. Get as much information as you can about the people who manage your data. “Ask providers to supply specific information on the hiring and oversight of privileged administrators, and the controls over their access,” Gartner says.

2.  Regulatory compliance. Customers are ultimately responsible for the security and integrity of their own data, even when it is held by a service provider. Traditional service providers are subjected to external audits and security certifications. Cloud computing providers who refuse to undergo this scrutiny are “signalling that customers can only use them for the most trivial functions,” according to Gartner.

3.  Data location. When you use the cloud, you probably won’t know exactly where your data is hosted. In fact, you might not even know what country it will be stored in. Ask providers if they will commit to storing and processing data in specific jurisdictions, and whether they will make a contractual commitment to obey local privacy requirements on behalf of their customers, Gartner advises. 

4.  Data segregation. Data in the cloud is typically in a shared environment alongside data from other customers. Encryption is effective but isn’t a cure-all. “Find out what is done to segregate data at rest,” Gartner advises. The cloud provider should provide evidence that encryption schemes were designed and tested by experienced specialists. “Encryption accidents can make data totally unusable, and even normal encryption can complicate availability,” Gartner says.

5.  Recovery. Even if you don’t know where your data is, a cloud provider should tell you what will happen to your data and service in case of a disaster. “Any offering that does not replicate the data and application infrastructure across multiple sites is vulnerable to a total failure,” Gartner says. Ask your provider if it has “the ability to do a complete restoration, and how long it will take.”

6.  Investigative support. Investigating inappropriate or illegal activity may be impossible in cloud computing, Gartner warns. “Cloud services are especially difficult to investigate, because logging and data for multiple customers may be co-located and may also be spread across an ever-changing set of hosts and data centres. If you cannot get a contractual commitment to support specific forms of investigation, along with evidence that the vendor has already successfully supported such activities, then your only safe assumption is that investigation and discovery requests will be impossible.”

7.  Long-term viability. Ideally, your cloud computing provider will never go broke or get acquired and swallowed up by a larger company. But you must be sure your data will remain available even after such an event. “Ask potential providers how you would get your data back and if it would be in a format that you could import into a replacement application,” Gartner says.

source: infoworld, computeractive,wikipedia