My take on SSD’s



I’ve been getting asked a lot of questions about SSD’s lately so i figured i would post about my experiences with them: About 4 months ago i put a 60GB OCZ Agility ($110) SSD in my desktop and have absolutely loved it. I put my operating system (Win 7 Pro x64) and programs on this drive and still have 20GB left over. The biggest performance increases are faster boot times (around 20 seconds), programs startup as if they are minimized, and installations are very quick.

After the hard drive failed in my Dell notebook i decided to upgrade to a Corsair SSD based on my experience with the one in my desktop. I use my notebook mainly to take notes in class, browse the web, and check emails so i opted for a small 30GB SSD (Also, because i couldn’t afford a larger capacity). I store all of my data online (mainly dropbox and google docs) so this justified my reasoning behind this decision as well. In the future i plan to replace my optical drive (CD/DVD) with a high capacity hard drive, for a total of two hard drives.

Now, for my recommendation: If you have a machine that you would like to upgrade and have the money, go SSD. The cost of SSD’s is slowly coming down so if you can’t afford it, wait. If you can decrease your dependency on local storage (your hard drive) then you can sacrifice capacity for a cheaper priced SSD. A great program to figure out how much space you are using on your current machine is Treesize free. This will display how much space you are using and where the utilized space is located.


A Little Project Failure, Anyone?

This is a story of a small project that went nowhere and ended by slinking off with a whimper to the land of wasted time.

I was working for a small internet marketing start-up, performing the role of website developer and search engine optimization (SEO) specialist. Our standard package involved tweaks to a client’s existing website meta-data, a series of marketing videos linked to the website, implementation of a mailing list system for subscriber capture and newsletter broadcast, and creating a linked blog site for the client to draw Google search-engine interest through regular addition of new content. The typical project was un-complicated and small in scope.

We were contacted by a local business to increase their website traffic with the goal of increasing their business volume. The client asked if some modifications could be made to the site to “punch it up a bit”. To close the deal, I agreed to some aesthetic improvements in addition to performing the typical SEO work. As part of the project, the client was given a training course in the use of their blog, and the value of this blog was explained in depth. It was shortly after this point that the project began to degrade.

As part of the website aesthetics sub-project I met with the client to discuss the particulars. I proposed a list of  modifications (background color, a simple cascading style sheet (CSS) to get away from obsolete table formatting, a change to the images in the existing slideshow) and noted the client preferences for layout and color scheme in a text document on my laptop. At meeting end, I assured the client that the changes would be done in a week and that I would schedule a meeting at that time to close the project. That scenario played out, but not as I expected.

At the next meeting I was presented with a new list of vague changes by a client that was very unsatisfied. Their complaints ran the gamut of the site “just not looking right” to disappointment in the number of “hits” the site received. Taken aback, I once again explained what our marking processes did, the time that it took for the SEO modifications to “mature”, and the large part that their contribution to their blog would make (I had been checking their blog since installation and they had not made one entry). Being one who does not like to say “No”, I reviewed their list with them, culled some things that were too impractical to work on, and promised that I would work on the rest. This had not been a good day, and I resolved to redouble my efforts to satisfy this client.

Sadly, this was not to be. On subsequent meetings and visits for video shoots I was met with more verbal change requests and comments of disappointment with the site. Clearly, this project had stopped being about SEO and had become a full-blown website design and development project, without any budget increase, defined schedule, or discernable goal. If you are shaking your head then you’ve probably been there.

Businesses exist to generate cash flow and make a profit. Any activity conducted by a business must have some tie to this rule, even those that are tangential (i.e.: the company picnic, which is part of team building and morale boosting to spur employee retention and production). In the project world, where large expenditures of time, effort, and money are consumed, it would be wise to know that the expenditures would have a return on investment (ROI). There are some simple guiding categories that can be used to determine if an ROI is in the offing:

  • Cost reduction – The elimination of hardware, software or “wetware” (people) expenses that can be attributed to the proposed project.
  • Cost avoidance – The avoided cost of additional resources for a specific job function because of an increased capacity to perform that job function in the future.
  • Increased revenue – The increased dollar amount of sales attributed to the project.
  • Retained revenue – The dollar amount of sales that will be lost if the project is not pursued.     (Monteforte, 2005)

The returns may not be all about the money. In a closing address to the PMI global congress in North America Dr. Harold Kerzner put it like this: Time and cost used to drive all decisions. Now we’re saying, ‘Wait a minute, are we providing value?’ (Miller, 2009). Kerzner suggests that the issue goes beyond purely monetary consideration to include goodwill or reputation (Miller, 2009). As the old Canon ads used to say, “Image is everything”.

The marketing project my company proposed had a defined business objective that was aligned with the business strategy: Improve the Google search-engine ranking for the client’s website, based on a variety of commonly used search keywords, to place them in the top ten of page-one search results. So, how did that work out? The project was hijacked by the client’s wish to redesign their website, a task that would do very little to help their business. Oddly enough, while pulling the alignment from the business goal made the project futile, it did not stop the project from continuing. I believe the project continues in other hands, probably with the same results.

There were plenty of mistakes made in this fiasco, not least of which was in my neglect in setting the scope of the additional website development (a lesson well learned!). But the largest error was the client’s focus on a task with minimal value to the business. Even admitting that the website is an extension of their “image”, and that a minor update in aesthetics could provide a little intangible ROI, the goal of the project we were selling was an increase in revenue through increased visibility and awareness of their business, something that they agreed to but never followed through on. In retrospect, changing the website was probably a pet project that had been simmering for some time, a sticky trap for an eager sap that became “the job that never ends”.

Learn from my unfortunate experience. When you get a client that wants a “little favor” on top of what you are offering, find out exactly what it is, clarify the scope with them (in writing is best. Just bang out the document right there on your laptop), and make sure they understand what to expect. You may even be able to negotiate the price up. Most of all, have a definite measurement for completion of the work, or you may be caught in an endless loop.

References

Miller, C. (2009, October 15). Harold Kerzner: Project Managers Must Understand Business. Retrieved January 28, 2011, from Voices on Project Management: http://blogs.pmi.org/blog/voices_on_project_management/2009/10/harold-kerzner-project-manager.html

Monteforte, J. (2005, November 15). Five Steps to Business/IT Project Alignment. Retrieved January 29, 2011, from CIO Update: http://www.cioupdate.com/budgets/article.php/3564406/Five-Steps-to-BusinessIT-Project-Alignment.htm

Removing Malware (PC)

    The number one computer repair i perform is malware (malicious software) removal. It comes in many forms: virus, trojan, worm, spyware, scareware, rootkits… the list goes on. My last post on this topic was a little outdated and unclear so i figured i would start from scratch on the steps i take to perform this chore. These methods are by no means full proof and the only guaranteed method is replacing your machine with a new one.

-Machine is still operating but appears to be infected:


 1: Less severe infections like adware and scareware (ads or a program that try to convince you to purchase their product) can be removed by doing a system restore and performing scans. This is not always the case because the system restore files can also be infected, cross your fingers. On Vista and Windows 7: Click the start button and type “System Restore” in the search box and click enter. Choose an earlier date before the infection occurred and let the program do its work. On XP: Click on the start button->Help and Support->Type “System Restore” in the search box. 


2: Next we will perform scans to make sure the malware is gone. Using another computer, download (free) scanning tools to a USB drive or CD. Download the program (do not install), go to your downloads folder, and click and drag the program (.exe file) to your removable device (USB stick, CD, etc.) I recommend SuperAntiSpyware, SpyBot, and Malwarebytes

*Optional: Run CCleaner beforehand to speed up scans 


3: Before we run the scans we must boot into Safe Mode. To do this: restart the machine, tap f8 when it is starting back up (this works on most computers, if not Google your model along with “how to safe mode”), and select “Safe Mode”. The resolution will look odd but stick with me. Plug in the USB stick/ put the CD in the tray and run the installation of the scanning programs. The rest is pretty self explanatory; run the scanners, wait until they are finished, and remove any malicious items that are found.


-Machine freezes or does not boot into Windows


1: Using another computer, download (free) scanning tools to a USB drive or CD. Download the program (do not install), go to your downloads folder, and click and drag the program (.exe file) to your removable device (USB stick, CD, etc.) I recommend SuperAntiSpyware, SpyBot, Malwarebytes, AVG, and Avast.




2: Before we run the scans we must boot into Safe Mode. To do this: restart the machine, tap f8 when it is starting back up (this works on most computers, if not Google your model along with “how to safe mode”), and select “Safe Mode”. The resolution will look odd but stick with me. Plug in the USB stick or put the CD in the tray and run the installation of the scanning programs. The rest is pretty self explanatory; run the scanners, wait until they are finished, and remove any malicious items that are found.


-Machine will not boot into safe mode/ Infection cannot be removed with previously shown methods.


1: Using another computer, download the Avira Rescue Live CD ISO here: http://www.avira.com/en/support-download-avira-antivir-rescue-system.

  Once the download is finished, take out a blank CD/DVD and put the disc in the tray. In Windows 7: double click the ISO file to burn to disc. For XP and Vista I recommend using ImgBurn. Once the file is burned to the disc: restart your machine and tap F12 (this works on most machines, if not Google your model along with “how to boot to CD/DVD”), select boot from CD/DVD. Once Avira starts up, click on the British flag in the bottom left hand corner to change language. Next we want to make sure configuration is set to remove infected files and check the box that says to change the name of the file if it cannot be removed. Once that is done we can run the scan. The scan will take a long time so let the machine sit and do its job. Once the scan is done feel free to skim through the log and take note of files that were removed or renamed. Reboot the machine and hopefully windows boots up. If not, follow the directions below.


This process can also be done by making a bootable USB device with Avira

*I have left out a very powerful program called ComboFix. In my opinion it is for more advanced users because of the destructive problems it can cause. Here is a guide if you are interested.

-The above directions didn’t work
    
   Malware can do very destructive things to a machine and mess with a ton of settings that are exhaustive to troubleshoot. Instead of wasting a ton of time on this I recommend starting from scratch by reformatting your hard drive and re-installing the operating system (Windows). Hopefully you have all your files backed up, if not try using a Live CD like Ubuntu to recover them. This is a great time to upgrade the operating system if you want to. If not, find the installation disc that came with your machine or purchase one. Restart the machine and tap f12 to boot from the CD/DVD drive and follow the step-by-step installation process.


Feel free to comment below if any of the steps above are not clear.


*Side note: for an always running anti-virus program i recommend Microsoft Security Essentials (FREE). Make sure to uninstall your previous anti-virus program before installing because they can conflict with each other and cause problems. 


Marcus’ Computer Tips 2011-01-30 23:22:00

    Connecting to another computer remotely may seem intimidating to the average PC user but LogMeIn makes this operation effortless. Being able to have access to a remote computer is very handy for situations like accessing files that are not on your local machine or using a powerful machine’s processing power from your laptop. LogMeIn free offers the features of remote sound, file management, printer access, and online chat. It’s as easy as making an account and downloading the client to the machines you wish to have access to.


https://secure.logmein.com/products/free/


PC Decrapifier

    When i get my hands on a new machine i immediately do a clean re-install of the operating system because of all the bloat-ware that comes installed by the manufacturer. This process can be daunting to the average user. The second best method for removing the unwanted, unnecessary, and space hogging software is PC Decrapifier. It does an excellent job of removing these programs with an easy click through menu that is rather speedy compared to manually going to the control panel and uninstalling one-by-one.
http://www.pcdecrapifier.com


Importing Delicious tags into MarsEdit

MarsEdit

For some time I’ve been wanting to move my blogging efforts over a desktop app, to be able to control multiple blogs from one place, and to search through and manage the content more easily.

The 2 main contenders that I could find for the Mac platform were Ecto and MarsEdit.  The latter seems to be considerably more actively maintained, has a slicker interface and was available for download on the Mac AppStore so I went with that.

The main feature I was missing in MarsEdit was the fairly comprehensive tag handling offered by WordPress.  The fact you can type only a few letters of the tag you need and it auto-completes is something you can’t do without once you get used to it.  The Delicious website and similar desktop tools all offer this functionality.

The first challenge was to get my data out of Delicious, not the links/bookmarks that are offered as their only export option but the actual tags.  Not surprisingly there’s a WP plugin for that, enter EG-Delicious Tags.

Once your tags are copied over to your WP installation you can access the data as a serialized array from the WP database, it’s in the options table under the key _transient_egdel_tags.

Then the data needs to be integrated with MarsEdit.  The app’s author, Daniel Jalkut, kindly explained which plist file within the app needs to be updated to enable the search auto-completion feature.

A simple PHP script was sufficient to deserialize the data and wrap it in XML tags:

<?php
$data = <<<DATA
a:773:{s:7:”_blogit”; …
DATA;
$struct = (unserialize($data));
$keys = array_keys($struct);
$out = ”;
$out .=”\n”;
foreach ($keys as $tag) { $out .=”<string>$tag</string>\n”;}
print $out;
?>

Add the XML to the relevant key and save out the DataSources.plist file and you’re done.