I’ve long been a fan of Tim Ferriss and his incredible ‘Four Hour Work Week‘ (4HWW) and whilst re-reading it recently I came across a flowchart diagram that neatly captures his approach to ‘activities’. The image was originally created by a reader Jed Wood.
I’ve recreated the flowchart and supplied it below as an image. I assume Tim and Jed will be ok with this, if not it can be easily removed 🙂
The reason I have done this is that the 4HWW is an incredible work, yet its not the easiest to get into in the first place. If the image below interests you in any way you will do well to check out the book and the associated website.
Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications.Contact Me
Since the dawn of time I have been using one of the more traditional types of version numbering systems for all my software developments. Recently however I have ‘enhanced’ my methodology and now use something slightly different.
To the outside world not a lot will appear to have changed, the N.N.N methodology will still be used, albeit with a slightly different interpretation. Internally however I will be using the full version numbering system shown below:
Aside from building the release date and time into the version number and swapping out Revision Number for Restricted Release Number, the main benefits to me are building an ascending Feature Number and Fix Number into the version number.
These numbers will only ever increase, regardless of the program status changing from (for example) Version 1 to Version 2. This means that at a glance I can see how features and fixes have been applied to this particular program since day one, without having to go to Version Control for this information.
Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications.Contact Us
Bill and Ted are ready to start making plans for their next Excellent Adventure. Knowing that their email discussions could be intercepted and easily read, they use the Magic Cipher Shared Secret Generator with it’s Strength Meter to create a Shared Secret they can use together.
They type their discussions into Magic Cipher and email the contents as encrypted text directly from within Magic Cipher. They are now secure in the knowledge that no-one can obtain access to their plans and attempt to put a spanner in the works!
Example 2: One to Many Private Communications
Bill and Ted decide they want to involve the Historical Babes in some of their plans, but not all. The four of them agree a Shared Secret and now Bill and Ted can communicate between themselves using their own Shared Secret and if they wish to include the Historical Babes they use the second Shared Secret previously agreed between the four of them.
Example 3: One to Many Private Communications over a Public Medium
Frodo is setting off on his next adventure and as is the fashion nowadays he wants to update the world with his travels via an online blog. With his new Macbook Pro this will be easy enough, however there is certain information he wishes only to be read and understood by Merry and Pippin who are holding the fort for him back in Hobbiton.
Before he sets off the three of them agree on a Shared Secret and as Frodo updates the world via his blog he uses Magic Cipher to append an encrypted entry on the end of his posts, in a separate paragraph, knowing that the world can see but not read or understand his instructions, which are only for the eyes of Merry and Pippin. Frodo uses the built in Virtual Keyboard to add a little bit of extra security to his posts.
Example 4: The Benefits of Cross Platform
Unfortunately, small, slim and gorgeous though it is, the Macbook Pro is just a little bit too big and let’s face it, expensive to take across Middle Earth, what with the danger from the Orcs and other dark forces.
At the last minute Frodo decides to switch to a small Linux notebook which he obtained free of charge with his mobile broadband card. Luckily Magic Cipher works as well on Linux as it does on macOS or Windows, so Frodo has no need to change his plans, or his choice of encryption software.
Example 5: Magic Cipher, Not Just for Men
While Frodo is off on his travels his wife, feeling lonely, takes a lover. Knowing that the local Hobbiton ISP takes quite an interest in emails to and from the villagers, they both use Magic Cipher to arrange their rendezvous. Even hobbits need loving.
Besides it was rather selfish of Frodo to disappear like that for months at a time and who knows what he got up to with Sam on that epic journey?
Example 6: A Picture is Worth a Thousand Words …
Sat on his sofa safe back at home several months after his epic journey to Mordor, Frodo dreams of his next challenge. With Sam on board, who now lives several miles away in Bree, Frodo and Sam use the Steganography features of Magic Cipher to enable them to swap ideas and plans which they have hidden in pictures which they upload to their Facebook pages.
With no evidence that their pictures are anything more than rather boring pictures of Sams garden or Frodos wine collection, nobody has any clue that there is another adventure being planned. In fact nobody has any reason to suspect Sam and Frodo are even in communication regularly. Problem Solved!