Monthly Archives: March 2016

Blab – Lets Have Anyone Have Their Own Show

March 28, 2016

Blab – Lets Have Anyone Have Their Own Show
https://blab.im/

Blab enables real-time video conversations from multiple locations. Nonprofits can use Blab for interviews, discussions, and live workshops and then share replays after the live event is over. This will be added to Entrepreneurial Resources Subject Tracer™.

331 views

Open Tourism

March 28, 2016

Open Tourism
http://tourism.openknowledge.be/

This working group supports digital creativity concerning tourism and hosts an “Open Standard for Tourism” Vocabulary, which is a reusable Ontology for describing tourism data. Tools and Resources include: a) Open Tourism developer community on Github. Everything we do is Open Source, and for that reason we use Github to share our data and projects to the world so others can contribute too; b) The Open Standard for Tourism Ecosystems Data Specification describes which vocabularies can be applied to describe tourism data, to accelerate digital creativity concerning tourism. This will be added to Entrepreneurial Resources Subject Tracer™.

309 views

Awareness Watch Newsletter V14N4 April 2016

March 26, 2016

Awareness Watch Newsletter V14N4 April 2016
http://AwarenessWatch.VirtualPrivateLibrary.net/V14N4.pdf
Awareness Watch™ Newsletter Blog and Archives
http://www.AwarenessWatch.com/

The April 2016 V14N4 Awareness Watch Newsletter is a freely available 61 page .pdf document (450KB) from the above URL. This month’s featured report covers Guide to Privacy Resources 2016 and represents the latest World Wide Web resources for discovering new knowledge and understanding the latest happenings with regards to the rapidly changing and absolutely amazing area of Internet privacy and security. The world is rapidly changing as transparency, big data and the ability to access data from new and now accessible databases becomes a reality! These privacy resources are constantly updated by Subject Tracer™ Information Bots and the latest resources for privacy and security are available from the following URL: http://www.StealthMode.info/. This is one of the fastest growing and changing areas for personal and business use and these resources will help to keep you current and up to date on Internet privacy and security. These resources will also help you to discover the many pathways available to you through the Internet to find the latest online privacy and security resources and sites. The Awareness Watch Spotters cover many excellent and newly released annotated current awareness research sources and tools as well as the latest identified Internet happenings and resources including a number of neat and must-have tools! The Awareness Watch Article Review covers I See You, You See Me: Mobile Advertisements and Privacy by Theodore Book and Chris Bronk.

Subscribe to the monthly free Awareness Watch Newsletter by clicking here.

1186 views

Awareness Watch Talk Show for Saturday March 26, 2016 at 2:00pm EDST – Financial Sources 2016

March 26, 2016

Awareness Watch Talk Show for Saturday March 26, 2016 at 2:00pm EDST – Financial Sources 2016
http://www.BlogTalkRadio.com/AwarenessWatch/

This program will be featuring my white paper Financial Sources 2016. We will be highlighting the latest and greatest resources and sources for financial sources covering search engines, subject directories, articles, guides and tracers….literally everything for FINANCIAL SOURCES!!!! We will also discussing my latest freely available Awareness Watch Newsletter V14N3 March 2016 featuring Business Intelligence Online Resources 2016 and my freely available March 2016 Zillman Column high lighting Internet Demographic Resources 2016. You may call in to ask your questions at (718)508-9839. The show is live and thirty minutes in length starting at 2:00pm EDST on Saturday, March 26, 2016 and then archived for easy review and access. Listen, Call and Enjoy!!

596 views

TigerText – Securely Text Your Co-Workers

March 26, 2016

TigerText – Securely Text Your Co-Workers
http://www.tigertext.com/

Features include: a) Text With Control – TigerText puts you in the driver’s seat by allowing you to restrict message copying and forwarding outside of the enterprise. With the ability to control message lifespans, you can ensure maximum corporate data security; b) Communicate Safely – TigerText messages are encrypted and will self-destruct after a preset period of time. Know when your message is read, or recall your message at anytime. Comply with HIPAA, SOX, and other regulations. TigerText is widely used as a secure healthcare messaging app; c) Message Colleagues In Real-Time – Easily register your work email, or instantly add your company to TigerText. Reach co-workers without knowing their mobile number, and know with confidence they read your message. When you need work answers quick – TigerText it; and d) Message Anyone .. Message Anywhere – TigerText communicates across devices and platforms. Use your mobile phone, tablet, or laptop to send secure messages to any email or mobile number. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

543 views

CORE Data Dumps

March 25, 2016

CORE Data Dumps
https://core.ac.uk/intro/data_dumps

The data aggregated from repositories by the CORE system can be accessed in two ways, through the CORE API or by downloading the data to your computer. The former option is practical if you want to build a service on top of CORE while the latter is something they recommend to those who would like to analyse the CORE dataset and possibly apply some computationally intensive batch processes. This will be added to Statistics Resources and Big Data Subject Tracer™.

565 views

FoxyProxy – Set of Proxy and VPN Management Tools

March 25, 2016

FoxyProxy – Set of Proxy and VPN Management Tools
https://getfoxyproxy.org/

FoxyProxy has been downloaded over 18 million times and translated into 34 languages. FoxyProxy is a set of proxy and VPN management tools for OS/X, Windows, iOS, Android, Chrome, Firefox, and Linux. They also offer reliable, high-bandwidth VPN and proxy servers in 60 different countries. The proxy/VPN industry is rampant with shady companies, fly-by-night operations, and dubious characters. But since 2006, FoxyProxy has been a legitimate American corporation providing proxy-related software and enterprise-grade proxy services to reputable organizations. They understand proxy and VPN services have real business value and sell only to companies with respectable business intentions. This will be added to Privacy Resources Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

632 views

360CouponsCodes.com – Coupons Galore

March 25, 2016

360CouponsCodes.com – Coupons Galore
https://www.360couponcodes.com/

If there’s a coupon for your favorite store in 2016, they probably have it! US shoppers are continously searching for online coupon codes to save dollars off their orders, thankfully they have thousands of coupons codes and promos to use for over 10,000 online stores. Their coupons are updated all day every day, even throughout the night! Their team of coupon hunters are always updating the site to feature the greatest and latest discounts to help you save a bunch off your next online purchase. As their site is constantly updating, make sure you check back regularly before placing an order with a store to save a few dollars or even free shipping. This will be added to ShoppingBots and Online Shopping 2016

437 views

Free Robots.txt Generator and Validator

March 24, 2016

Free Robots.txt Generator and Validator
http://www.toolsiseek.com/robots-txt-generator-validator

Create a robots.txt file for your website with their best robots.txt generator tool. This robots.txt validator also gives you the ability to validate generated robots.txt code or URL. The tool is divided into two sections: a) Generate robots file and validate; and b) Fetch robots.txt by URL and validate. The robots exclusion protocol (robots.txt) is used by web robots to communicate with a website. The file tells a robot which section of a website to crawl or which section not. Every crawler or robot who is involved in spamming doesn’t respect robots.txt file. A file uses a protocol named Robots Exclusion Standard. The protocol follows a set of commands that are readable by the bots visiting your website. This will be added to Bot Research Subject Tracer™. This will be added to Entrepreneurial Resources Subject Tracer™.

716 views

Jigsaw – Finding the Missing Pieces

March 24, 2016

Jigsaw – Finding the Missing Pieces
https://jigsaw.google.com/vision/

They build technology to protect vulnerable populations and defend against the world’s most challenging security threats. Jigsaw is a technology incubator that aims to tackle the toughest geopolitical issues. Their teams of engineers, research scientists, product managers, and issue experts are devoted to countering violent extremism, thwarting online censorship, and defending against the threats associated with digital attacks. The name Jigsaw acknowledges that the world is a complex puzzle of physical and digital challenges. It also reflects our belief in collaborative problem solving and that any puzzle is best solved with many different people and groups looking for the missing pieces. Their team was created by Eric Schmidt and Jared Cohen in 2010, when we were known as Google Ideas, a think tank within Google that researched issues at the intersection of technology and international security. In February 2016, we expanded our mission to become a technology incubator. This will be added to Privacy Resources Subject Tracer™.

538 views