Content Marketing on a Low Budget

Friday, 25 September 2020
Bob Leggitt
"Before you start waving wads of notes at anyone, it might be worth running a DIY trial... You may be able to take care of the whole thing without outsourcing at all."
Laptop computer
Photo by Josh Anderson on Unsplash

Content marketing has become an incredibly popular way for businesses to make promotional matter widely visible in the long term, without any display fees. It can comprise text and/or rich media, but it most typically harnesses the medium of a blog to build an ever-increasing library of useful and engaging reading, which will serve as a series of potential responses to Web-surfers' queries. When interested parties search Google and other search engines, they find the content, and then visit the source business's site. That's the goal.

Whilst the function of content marketing is promotional, its format is editorial. If it looks or reads like an advert, it's an amateur job, and it almost certainly won't work. Professional content marketing fulfils four roles…

Tutanota DDoS: Should We Keep Faith With The Privacy-Protected Email Concept?

Monday, 21 September 2020
Bob Leggitt
"I think we should expect true privacy resources to encounter problems, and to encompass some inconvenience - because that's how real privacy commitment rolls."
Photo by Michael Dziedzic on Unsplash

After a sustained bout of disruptive DDoS (Distributed Denial of Service) attacks on the encrypted email provider Tutanota last week, questions are being asked about the reliability of such services. Although there's little doubt about the trust factor of the privacy-committed email services themselves, any interruption to access is a concern. So even if the access interruptions are the doing of malicious third parties, they can still damage a service's aura of reliability, and thus its trustworthiness.

WHY DO PRIVACY-PROTECTING EMAIL SERVICES SUFFER DDOS ATTACKS?

Tutanota is not the only private email service to have suffered persistent DDoS attacks. ProtonMail has also been subjected to two such successful assault campaigns, dating back to 2015, and 2018.

So why are these services targeted? Are the authorities trying to take them down in order to stop secret, subversive messaging? Is Silicon Valley organising against them because it fears losing its grip on the data-mining gravy train?

The Jimi Hendrix Concerts - Audio Cassette

Saturday, 19 September 2020
Bob Leggitt
"Hendrix amusingly introduces it in a posh English accent as "a blarst from the parst"
Jimi Hendrix Concerts audio cassette

Artists who have the power to make you wish you'd been born into a different era are very few and far between. But I find it almost impossible to listen to a really well-mastered Hendrix live recording without wishing I'd been among the flare-clad, flyaway-collared assemblage flicking a peace sign in the general direction of the stage.

And the audio cassette version of The Jimi Hendrix Concerts is as well-mastered as they come. As the title suggests, the programme is not a single gig. The tape compiles highlights from performances in New York, San Francisco, San Diego, Berkeley and good old Londinium.

How To Create Twitter Follow Feeds Without Logging In

Saturday, 19 September 2020
Bob Leggitt
"This is the option that's a bit like reading the contents of people's notifications inbox."
Magnifying glass
Photo by Markus Winkler on Unsplash
Just below, there's a Feed-Builder app, which enables you to create Twitter feeds without logging in or having an account.

So that the app is easily accessible near the top of the page, I've placed the full details beneath it. Here's the quick guide. Please see below the app for more...

TWITTER FEED BUILDER

To compile a feed, enter a username of your choice. Hit "Add Another" each time you want to enter an additional account. You can enter up to 12 usernames. Once you have your username list, move down to the "FEED TYPE" section, and hit the button of your choice. You can then bookmark the feed to see updates anytime you wish.