Translate

Monday, April 30, 2012

5 Simple Ways to Open Your Blog Post With a Bang


5 Simple Ways to Open Your
Blog Post With a Bang

image of the number
What’s the second most important part of your blog post after the title?
Master copywriter Eugene Schwartz often spent an entire week on the first 50 words of a sales piece — the headline and the opening paragraph.
Just imagine how disappointed you’d be aftercrafting a killer headline for your post, only to lose readers with an opening that failed to carry the momentum. A great headline mixed with a lame opening is like inviting someone into your house, only to slam the door in their face as they approach.
So, here are 5 ways to open your post that will capture the reader’s imagination and pull them deeper into your content.

1. Ask a Question

Opening your post with a question is a rhetorical device (hence, the “rhetorical question”) that creates curiosity and gets the reader thinking. Thinking equals active engagement with your writing, and that’s a very good thing.

2. Share an Anecdote or Quote

Anecdotes are quick stories that can make people laugh or immediately establish the main point of your post. A nice quote from a recognizable authority or famous person can also work wonders when holding attention in those crucial opening seconds.

3. Invoke the Mind’s Eye

Producing a mental image in a reader’s mind is one of the most powerful things you can ever do as a writer, so expressly engaging the imagination is a powerful opening technique. Activate the mind’s eye of the reader by using words like “imagine,” “picture this,” “do you remember when,” etc.

4. Use an Analogy, Metaphor or Simile

Analogies, metaphors and similes are some of the most powerful devices available when it comes to telling a story in a single sentence. This is a great way to capture a reader’s attention and also acts to provoke mental imagery that allows readers to tell a story to themselves.

5. Cite a Shocking Statistic

Starting off with an interesting factoid is also a great technique. People love being provided with interesting data, but only if it is unique, startling, or even shocking. The statistic should also be directly relevant to the point of your post as well.
Bonus Tip: The third most important part of your blog post is the closing. A great way to close is to tie back into your opening.
So, which of the 5 techniques did I NOT use in the opening to this post?

How the Genesis Design Framework Makes
Your WordPress Site Way Better


If you’re building a website these days, you’re in luck.
WordPress has revolutionized the ease and power of what a website (or blog) can do and be. Now, with the emergence of theme frameworks, you can take WordPress even further.
As you’ll see in a moment, the Genesis Theme Framework for WordPress is much more than a mere WordPress theme. It’s an underlying framework of immaculate code that’s been built to achieve three important objectives.
Let’s take a look at each of these objectives,
and why they matter to what you’re doing online…

Wednesday, April 18, 2012

Facts

Fact :doing chores helps you being responsible and helps kick the habit of your addiction.

Wednesday, April 4, 2012

Q&A 7

1. Which of the Luddite criticisms of computers listed in Section 7.4.1 do you consider 
the most valid and significant? Why? 

Of the Luddite’s criticisms on the significant effect of computers, I believe that the most significant is that computers cause social isolation. I know in my lifetime I have seen the effect of computers, and have seen how they can create false reality, as well as social isolation. When I grew up as a child, when I wanted to play and have fun, I would run across the street and see if neighbor’s kids were home. I’m not completely sure how kids do it now-adays, but I do know that all of my little cousins, even at 10 years old, spend a lot of time on facebook. It’s just a different social world that people live in, when it comes to the internet and computers.
 

2. Some people lament the fact that children currently in elementary school will never 
read a printed newspaper. 

(a) What will they miss? 

They will miss the news stands and smelling the fresh ink on the newly pressed paper. They will miss the paper cuts and ink smearing on their fingers. They will miss the hype of current events. Newspapers even promoted well-roundedness by providing a large amount of information. Now, kids can easily avoid anything that doesn’t interest them, and go for the meaty, funny parts.

(b) Is anything of significant personal or social value being lost? 

Perhaps some social value is being lost, because there is less of a sense of community. When people used to read the newspaper, they had a common connection and link to societal events. Now, people can easily surf straight to the information that interests them most, and completely avoid other information. Unless it is a viral hit, chances are that your neighbor is not reading anything similar to you on the web. 

(c) Overall, is the change away from printed newspapers good or bad? Why? 

I think progression is a positive thing. Not only does it allow for much quicker transition of information, it saves paper, which in turn saves trees. It’s hard to argue about jobs lost because, just as some jobs are lost, many more are created. As technology evolves, I am curious to see what the next form of information sharing system is adopted next. 

3. Suppose a computer program uses the following data to determine the number of years 
remaining of a natural resource (e.g., copper) 

•p the number of tons of the known reserves of the resource 
•p the average amount of the resource used per person (worldwide) per year 
•p the population of the world 
•p an estimate of the rate of growth of the world’s population 

List all the reasons you can think of why this program would not be a good predictor 
of when we will run out of the resource.

There are many reasons why this program would not be a good predictor of when we will run out of a resource. Technology evolves each day, and as technology evolves, we learn more efficient ways to “use” resources wisely. As technology evolves, there is always a possibility that we can discover ways to synthesize more resources. There is even a possibility that unknown resources could be discovered. There are just too many factors that could easily throw numbers off when they are so generalized. Even a few natural disasters around the world, or a medical epidemic, could throw the numbers off greatly. The guidelines for a program to determine the number of years remaining for a natural resource would have to incorporate much more specific numbers that can be accurately followed and transcribed. Even then, I don’t believe that using a computer program to determine such a thing would be feasible, because of all of the factors that could change the outcome.

Q&A 6

1. In face-to-face interviews, interviewers are trained not ask applicants for certain types 
of information irrelevant to the job (for example, age, marital status, disabilities) to 
avoid charges of discrimination. An increasing number of companies are searching the 
web (e.g., blogs, Facebook, MySpace) for information about job applicants. 

(a) Give arguments in favor of such searches 

I'm such a favor of the searches, if someone wants to be found on screen they will put themselves in a profile on twitter, facebook and myspace. It's up to the person making their profile(s) what and who they want the world to see them as, they can sensor and make their profile mature or they can be immature and reckless ( which may jeopardize their character). It's a good, public way  for the job agency or company to find out who this applicant is. The applicant has all the control in the world to show what they want in the western colors they want the world seems so if the company comes across something negative it's the applicants fault. Plus, if customers of a company see an employee’s web page and it is out of control, it could damage a company’s reputation.

(b) Give argument against 

It is kind of a violation of privacy. If interviewers don’t ask certain questions to avoid discrimination, can’t you go as far as to say it is discriminatory to investigate someone’s web profile? For example, if a girl is a lesbian, and nobody knows it, but searches the web and finds out, and then she is discriminated against … it is NOT right.  

(c) If legislation were introduced making such searches unlawful, would you support 
it? Why or why not? 

I would not be unhappy either way, however I lean towards keeping the searches legal. We have power over our own profiles on the web. However we choose to represent ourselves publicly, also represents our company. 

2. Why is it difficulty to determine the number of jobs (a) eliminated and (b) created by 
computers? 

It is very difficult to determine the number of jobs eliminated and created by computers because the stats fluctuate. There are jobs launching on everyday faces through computers that entails other employment and jobs. Where as other jobs are being lost on a daily basis, which causes unemployment, and a ripple effect that can cause other jobs to be lost. A lot of jobs in agriculture and factory work have been eliminated by moving towards a more technological, automated way of doing things. As technology advances and new jobs are created, many jobs become obsolete. 

3. Using the Freedom of Information Act and similar state laws, some people have 
requested the e-mail of governors, legislators and past and current presidents. These 
requests raise the issue of whether the e-mail of government employees is personal 
conversation or official government documents. What do you think? Why? 

It is a very controversial subject. However, because of the status and power involved in political affairs, I believe that under certain circumstances, e-mails should be provided. Although it is somewhat a breach of privacy, it should be understood that it is for the greater good of our nation. Our representatives, be them governors or presidents, shouldn’t be hiding information from the public. It just seems as though it would take a corrupt official to question why people need access to any of their emails. With great power, comes great responsibility.

Q&A 5

1. A credit union monitors on-line activity and alerts a customer if there is unusual 
activity on his or her account. But in order to recognize unusual activity, the bank 
software must keep a record of the “usual” behavior for the customer.  
Does keeping such data violate the privacy principles of Figure 2.1? Explain your 
answer. 

I don’t think think it violates any kind of right as long as the documentation is not misused. If for any reason the customer needs a copy of her bank statements and banking history then the bank can pull it up for her. These are confidential documents and you never know if it is safe in a remote place ... it could one day get tampered with! But for legal purposes I think it is smart of the bank to have that access to watch and keep record of all clientele and accounts. I know that personally, I have been alerted of fraudulent or unusual behavior … and it turns out that someone stole my credit card and was trying to swipe it for 500 dollars in San Diego, but the credit union stopped him. 

2. Suppose that a denial-of-service attack shuts down a dozen high-profile web sites 
including CNN, Bank of America, IRS, ESPN and Wal-Mart. The attack lasts for 
several hours.  The attack is traced back to one of the four perpetrators listed below. 
Should different penalties be imposed depending on which it is? Give reasons for your 
answer. 

a. A foreign terrorist who launched the attack to cause significant damage to the 
US economy 

There should definitely have significant consequences, at the least imprisonment of all of those accountable. I don’t think we should start a war over it, but we should show an example that this kind of thing won't be tolerated anymore. It could be considered a threat to our national safety.

b. A US-based organization who launched the attack to protest commercialization 
of the web and corporate manipulation of consumers. 

Just because it is a US based organization, it doesn’t make it any more right. It is still, in fact, an act of terrorism. It’s not as if the organization is just protesting, they are actually launching an attack on other US based organizations. 

c. A US-based hacking group who launched the attack to demonstrate their skills 
to fellow hackers. 

This sounds like an act of power and intimidation. It still seems as if it’s an act of terror. It’s not as if the only thing that happens is other hackers being impressed. It seems like it wouldn’t be long before the hackers would be threatening companies to do their bidding, or they face internet annihilation and mayhem. They should be imprisoned and or stopped. 

d. A US teenager playing around with hacking tools he found on the web. 

This is kind of a hard one to decide. Because it is a minor, they most likely had no idea what they were really doing, and had no evil intent. It would be important to educate the person, without encouraging such actions in the future. That and perhaps find ways to prohibit access to such strong hacking tools to minors. 

3. Given that an infected PC can be used as part of a botnet in denial-of-service-attacks, 
and that an unprotected PC (running Windows XP) is likely to be infected within 10 
minutes of connecting to the Internet 

(a) is there an ethical obligation for a PC user to install and maintain up-to-date 
antivirus and other security software?  

I think that it should be an obligation because when your computer is infected, it can easily effect others, for example sending out an infected email to all of your contacts, and infecting some of their computers with a virus. However, because antivirus and security software costs money, it can not be made mandatory. 

(b) Should it be a legal requirement? Consider analogies from other areas

I believe that when computers and antivirus programs are separate, it can not be legally required to purchase the software. However, if the United States were to adopt some type of policy to mandate antivirus programs, I believe the only way that it can efficiently be done is if manufacturing and distribution companies actually sell computers with antivirus programs already installed. It would be very hard to change the entire industry though.

Q&A 4


1. A software consulting company provides assistance to users of a large, complex, expensive, engineering-design software package. In order to provide the best service they made s copy of the program that was installed on the system of one of their customers. They had no intention of re-selling the software but needed a copy in order to provide better customer assistance. The vendor of the package sues; the consulting company argues that it was fair-use. You are the judge.

How do you rule?

I would rule in favor of the Vendor. The software consulting company should have discussed with the vendor before installing the program on the system of one of their customers. Although they may have good intentions, there are far too many things that can go wrong. Somebody can access the program and steal innovative ideas. It just is not right.

Why?

The Software consulting company should have discussed it with the vendor before they installed the program on the system of one of their customers. It is a frustrating situation, because of the possibility of theft of knowledge. The program was only for the consulting company’s use, not to be installed on a customer’s computer. Although their intention was to provide better customer service, they overstepped their boundaries.

2. In a letter to Isaac McPherson, Thomas Jefferson wrote He who receives an idea from me, receives instruction himself without lessening mine;as he who lights his taper at mine, receives light without darkening me.

Suppose a group of people go camping. One starts a fire. Others wish to start their own fires from hers. Can you think of any ethical or practical reasons why they should be expected to trade something for the use of the fire?

Well first of all, based on getting something out of nothing which unethical is so many ways. If we all took from eachother without replenishing or trading, everyone would end up losing. A trade, or replenishment, would be good, but ideally, the other campers should learn to start their own fire without utilizing someone else’s fire. What happens when the person who started the fire is not present? Knowledge is power, and rather than asking if they can use her fire to start a fire … perhaps they should ask the person to teach them to create fire.

3. Many textbooks include short quotations from other people’s work at the beginning of chapters. Such quotations are almost always used without explicit permission. Explain why they are fair uses.

The reason why I propose that these famous quotation in the beginning chapter of each page because it’s used for education in a classroom purposes. Also, any publicity is good publicity. When quotes are used, the author is always recognized, and in many cases, the author ends up more popular.

Q&A 3

1. Amateur astronomers, and others, post the orbits of satellites on the Web. See for 
example, http://www.heavens-above.com  Some of the satellites may have military 
uses. There is a viewpoint that publication of these orbits should be banned because 
“ bad guys” can hide when they know the satellites are overhead. 

(a) Give arguments for banning publication of orbit data 

In favor of this ban I propose the argument that such public orbit data may give ‘bad guys’ the heads up. If the public knows the exact orbit of military satellites, they can completely evade detection during certain times, and act covertly even in broad daylight, at other times. 

(b) Give arguments against such a ban 

Satellite locations should be exposed to the public. To serve like a checks and balance, activity should not be completely kept secret from the public. Things may begin with good intentions, but if they get out of hand, it can be kept a secret easily, if orbit is not publicized. Who knows when people will start using satellites to intrude upon our rights as citizens.  

(c) Which arguments do you think are stronger, why? 

I think the argument against the ban would be stronger, based on the majority who would agree with me. I believe there is more people who rather live a civil and private life instead of having other institutions such as the government baby sitting us ( like a Nanny cam, which, is more socially acceptable).

2. The .xxx top-level domain “for sexually explicit material was proposed as one tool for 
dealing with the conflict between those who wish to provide and access such material 
through the Internet, and those who wish to prevent access to it, either by children and 
adolescents or by employees at their workplaces.” (Wikipedia) 

(a) List some benefits of the new domain 

A key benefit for having the new xxx top-level domain is that it would make things much easier to filter and control. It would be easier to track certain sites, by the government, institutions, and even family members. I like how all the sexual explicit content is placed in a categorized domain to separate other domains that want no association to this kind of content, that may damage reputation and business. Also, sometimes when you search something that has nothing to do with sexual content, a lot of sexual content appears, and it is very frustrating.

(b) List some problems caused by the new domain. 

One main problem with the domain, is the transition for large companies. It would also be like advertising sexually explicit material. It would be very hard to mandate the new domain, and make sure that everyone plays by the rules.

3. In 2008, in response to complaints from instructors, the CSUCI Technology Advisory 
Committee was asked to consider blocking access to social networking sites from 
computers in instructional labs. 

(a) Give arguments in favor of such a ban 

Being in favor of such ban, I feel it would help more students concentrate on their homework and studying. I know they allow computer use during class, in which case, such a ban will help students focus on the lecture. I have personally seen students surf the internet during class quite a bit, and is always very distracting.

 (b) Give arguments against 

Such a ban might discourage students from communicating with each other. If the ban happens, classes such as journalism, media arts, or marketing that assigns students to use certain social network sites may be problematic. There is really no point because students can access their social network sites through there own mobile phones. 

(c) If you had been on the committee how would you have voted? Why? 

I would vote ‘no’ because you never know if you can save a life through social networks. I wouldn’t want to get in the way of someone contacting others for help or an emergency. Also, from experience, I’ve seen that any teacher that really has control over the classroom, also can keep students from surfing the web when they should be listening to a lecture.