Category Archives

5 Articles

25 years ago, today …

by emedlin 0 Comments

I made a decision that would change my life in ways I could never have dreamed.  Really the decision was already made.  This date was well planned.  I was participating in the ceremony that would make this decision a public promise with friends, family, God and most importantly to my new wife.  Lisa and I were finally married.

 

March 16th, 1991 was written on invitations weeks ago.  But the heart felt commitment between Lisa and I had been there for years.  We started dating in the fall of 1987.  By winter we were in the “I LOVE YOU” stage and by the following year we were already talking marriage.  Not long after we started dating we just knew we would always be together.  It was like we had always been together.

 

There is something special about Lisa, that to this day, I still can’t quite put my finger on.  It is like she has always been the love of my life even before we met.  It just took meeting her and several dates for me to discover this.  We share a special bond that no one else shares.  Even most couples I see don’t seem to have that something special we have.  I guess one reason that special quality is so hard to describe is because it is nothing specific about either one of us.  I truly believe it is our destine, chosen by God.  Everyday we are together is us honoring God’s plan for our lives.

 

Every day I get to spend with Lisa is a true blessing.  When we’re apart (even different aisles of Walmart) I yearn to be close to her again.  Over the past couple decades we have rarely been apart for longer than several hours.  When we have, it feels tragic.  When we get to spend days at a time never leaving each other’s presence, it is like a small taste of heaven.  We have that non-vocal communication, that secret language only we share.  We can spend hours together, never saying a word but having filled volumes in our hearts.

 

It is sad to say when we often hear from others we know that they “need a break” from their spouse.  Spending long periods of time with their lifelong partner seems like an ironic chore.  When Lisa and I are together, the unpleasant burdens of the day are suddenly lightened.  The stresses of life are calmed.  A euphoric sense of security enwraps us both like a warm blanket.

 

The 25 years we’ve been together may seem to some like a long time.  But too me it seems too short.  This milestone comes with a realization that we are probably halfway there.  Seldom do people live much past their golden wedding anniversary.  It brings me to tears thinking that may be all we have left, if God continues to provide us with life and health.

 

Let’s make the most of it!  We have a lot of experience behind us.  Some of it was tragic; some of it was joyous; but all of it was a blessing.  I pray the next 25 years will be an even greater blessing as we watch or children grow and experience their own lives.  We have so many plans for us and our children; I’m sure we’ll never finish them all.  But I’m sure we’ll enjoy trying.

 

Lisa, I love you more today than I ever thought possible.   I get tears in my eyes just watching you do the simple things — cleaning the house, packing Emma’s lunch; just preparing us for the day ahead.  You are the love of my life, my best friend and my constant companion as we travel through this life God has given.  I pray for you everyday and I pray we get to experience at least another 25 years together before either of us are called home for eternity.

Trying to blog again ….

by emedlin 0 Comments

Several years ago I started a few blogs then did nothing with them.

 

I had motivation when I started them.  At the time, I had just been laid off from my previous employer and was looking for a way to keep positive.  I took enough time to write one post each about what is important in my life, about job searching and my technical passion — fighting malware.

 

Unfortunately, I allowed the pressures of finding a job to consume more time than it probably should have.  I could have carved out enough time to write a little something daily, but didn’t.  Writing has never been my thing, so it wasn’t a difficult decision to not do it.   However, I’ve learned the value of writing; more about that later.

 

With new-found motivation, I plan to write a little each day.  Maybe only a few words.  Maybe a few pages.  But always something.  This doesn’t always mean a post every day.  I can choose to let something simmer for a while in draft before posting it.  Actually, that is probably a good idea.  Not being an English major, I find stepping away from I stream of consciousness and revisiting days later creates one of those “what was I thinking moments.”

 

This is my (new) start for now.

 

Hope to be posting more soon.

Viruses, and Trojans, and Worms! Oh, My!

by emedlin 0 Comments

In the The Wizard of Oz (1939) Dorothy had the wisdom to see danger on the road ahead:


Dorothy: Do you suppose we’ll meet any wild animals? 
Tin Woodsman: Mm, we might.
Scarecrow: Animals that eat… s-traw?
Tin Woodsman: Some, but mostly lions, and tigers, and bears.
Dorothy: Lions?
Scarecrow: And tigers?
Tin Woodsman: And bears.
Dorothy: Lions, and tigers, and bears! Oh, my!


Just like Dorothy was concerned about what she might meet on the yellow brick road, we should be concerned enough to understand what might bite us on the information superhighway. Unfortunately a lot of people I meet traveling this virtual road either have misguided beliefs or are very ignorant of the pitfalls that await them as they use information technology everyday. Overly fearful or blissfully ignorant behavior to information technology can limit its benefits or endanger you and those you know.

Yes, there are real viruses, Trojans, worms and many other forms of malicious software (malware) “out there” ready to attack you at any moment. (If you have no clue what I am talking about. I’ll explain them and many more in later posts.) But I don’t want you to be afraid. You can easily do many things to help protect not only your computer and mobile devices but yourself in general from being prey to these evils. I pray this blog will benefit many with simple to understand information to reasonably protect you and your loved ones from the pitfalls of using information technology (IT). 


What is Personal Information Technology Security?


Everyone I know uses some form of IT. We commonly think of computers and the Internet. We include smartphones with web access. But we must include any technical device that is capable of sharing information. Often this is through a network like the Internet. But this can include such simple devices as a plain old telephone service. Just like our homes, we can not make the information technology we use 100% secure. However there are reasonable steps we can take to drastically reduce the likelihood of a malicious attack (like locking our doors).


I don’t intend this blog to help with corporate or enterprise levels of IT. They have whole departments with very intelligent and dedicated staff to take care of their IT devices. Also their environment is different in a lot of ways from what you use personally. Since you don’t have a team of hired professionals watching out for your security, I’m here to help. 


What I describe in this blog comes from my own experience of over 25 years in using and supporting IT devices for corporations, small businesses, individuals and myself. I want to educate you from that experience so you can apply it as best you see fit in your circumstances.


Most of the experiences I will share here will be related to protecting your home and small business computer(s) with some form of a connection to the Internet. I will also share some advice on securing your mobile devices like cell phones and personal digital assistants (PDAs). Occasionally, I help with other forms of attack that are sometimes purely social and don’t involve anything more complicated on your end than just answering your home phone.


I’ll do my best to keep the blog posts general enough so they can be applied in a variety of situations. For those wanting the more technical details related to particular incidents, I will link to a variety of news and technical sources as reference.


First Pitfall to Avoid — Social Engineered Attacks


I chose this pitfall to describe first because it can be applied across the most forms of interaction; even beyond IT. Also I was able to leap over this pitfall just this past Tuesday (June, 22nd) when I was personally attacked.


My personal attack involved a well know scam using collect calls from prison. Social engineering is all about using you to open the door. This could be the physical door to your home, a method to gain access to your computer or in this case, long distant calls made on your phone.


Social engineering comes in a wide variety of forms. They all contain two elements: gaining your trust in order for you to share information. In my case they wanted to tug at my heart strings to make me believe I had a friend in prison and needed my help. Other forms use information they obtained elsewhere to make you believe they have the right to additional information.


One very popular form of social engineer is phishing (yes, with “ph” and not “f”). It is like fishing as the phisher sends out a lot of bait and hopefully will get a few bites. If you have ever received an email asking to verify information from a trusted source, such as a bank or other online service, then you were being phished. I HOPE YOU DIDN’T CLICK THE LINK IN THE EMAIL!!! If you did, contact me right away and I’ll help you straighten out the potential mess. 


So how do you avoid social engineered attacks. First, develop a radar for these things. Study examples of many of these attacks (I’ve only given you a couple examples from the hundreds that are out there). Then trust your instincts. Most often these attacks come unsolicited. If you receive a phone call, an email or knock at the door that you were not expecting, be extra cautious. Sometimes even trusted friends are unaware they are used as part of the attack. I will give more details on this when I discuss how social engineering is combined with malware to infect your computer through instant messages and emails.


Please be aware that malicious attacks are occurring everyday to gain information about you for someone else’s benefit. Be cautious, but don’t run and hide. I little awareness goes a long way to protecting yourself.


Please post a comment below and let me know what you think of this blog. Much of the content will be driven by your comments as I want this to be a help to you. Let me know what you liked and, just as important, what you didn’t like.


Until next time, keep looking out for those PITS!
Relationships replace job search sites

Relationships replace job search sites

by emedlin 0 Comments

What is the most effective way to search for your new job? Two elements are key to a successful job search.  A strong resolution and relationships replace job search sites. 

Resolution

There are several methods out there to find the right jobs.  Some will tell you to canvas like crazy, using the odds to your favor.  Others will be much more selective and target a handful of companies.  Then have you wait for an opportunity to open up or even use certain methods to “make” opportunities.  Regardless of the method used to place the application and resume into the hands of the hiring manager, much effort needs to be spent on organizing and planning the search for the best outcome.  


My project management experience tells me to manage this as I would any other project.  Deadline must be set.  Tasks with dependencies need to be defined. Target dates set for each milestone.  Resources analyzed to assess areas in risk.  Mitigation plans put in place.  Metrics defined and implemented to ensure progress is made and milestones are met.  As needed I will adjust any and all of these to adapt to changing requirements and any potential goals not defined up front.


By setting daily objectives that align with this project’s tasks, I can persistently follow the job search methods I choose.  This will help to keep me on track and not wonder aimlessly around all the possible ways of finding jobs.  I’ll be able to measure methods that are being more effective than others.  Then, I can optimize my plan to get the best results


Networking
It is not so much what you know but who you know.  Time and time, again I have seen by example and heard from many successful job seekers that knowing somebody that knows somebody is what at least got their foot in the door.  Of course you will need to have the qualifying skills, but so do many others that are seeking after the same jobs.  Personal testimonials from trusted individuals go a long way to getting that initial interview and can help persuade hiring managers to lean to one applicant over another.


Over the past 20+ years I have collected over 1000 contacts and growing.  Some come from high school and college classmates.  Many are from work associates that I developed a relationship with during certain job assignments.  Family, church and social group members round out most of the other contacts I know.  These contacts are accessible via regular mail, email, phone and most recently via online social networks of LinkedIn, Facebook and Twitter.


Renewing and strengthening existing relationships as well as making new ones will benefit everyone.  Part of building relationships is giving more than receiving.  By having strong relationships I will gain thousands of sets of eyes.  Each set looking out for that next best career opportunity.  If only a small percentage send me just one lead a day then dozens of potential opportunities will be discovered that I likely would have never seen.


Also, many of these leads will come from unpublished sources.  In 48 Days to the Work You Love, Dan Miller states that only 12% of positions are posted in the paper.  Knowing somebody that knows somebody that has an opportunity is invaluable.  I expect my plan to contain much time dedicated to strengthening relationships that have had little time invested in them recently.  Additional time will likely be dedicated to building many new worthwhile relationships as well.  For more on the value of relationships check out my personal blog about my life.


As I quoted in my “farewell to Nortel” email, Charles “Tremendous” Jones said “You will be the same person in five years as you are today except for the people you meet and the books you read.”  I have met a lot of people and read a lot of books.  I plan to meet more people and in addition to studying Dan Miller’s book there are many other books I plan to dedicate to reading over the coming weeks.  Next on my list will likely be The Quick 30/30 Job Solution: Smart Job Search Tips for Surviving Today’s New Economy by Neil P. Mcnulty & Ronald L. Krannich, Ph.D.


Stay tuned for many other reading suggestions and to see how my job search project progresses.


Thank you for following  and for emailing any leads you may have!