People Companies Advertise Archives Contact Us Jason Dowdell

Wednesday, March 17, 2010

Appbackr A Finalist in PaypalX Developer Challenge

Appbackr LogoiPhone App Funder, appbackr, Revolutionary Approach to Immediate Funding for Apple iPhone and iPad Developers Leads in PayPal Challenge by Bringing Immediate Funding to independant iPhone Developers via microfinancing.

PayPalX announced that appbackr was selected by community voting to become one of 11 finalists in the PayPalX Developer Challenge. Marketing Shift had helped appbackr get a last surge of support from the app developer community.

Appbackr provides a simple and revolutionary approach to Immediate Funding for Apple iPhone and iPad Developers selling apps in the iTunes store. Application developers sell wholesale units of their apps on appbackr. App developers get funds right away. Buyers profit when the apps sell on the iTunes store. appbackr is a wholesale digital marketplace for Apple iPhone and iPad developers. The PayPalX Developer challenge is intended to reward creativity, innovation and viability. This model supports iPhone developers by allowing them to pull value out of their idea, rather than having to go through the long mating process of trying to get the app in front of the right developer.

The finalists will now go on to be judged by a panel of distinguished judges including chairman of eBay Inc., Pierre Omidyar; PayPal president Scott Thompson; general partner of Andreessen/Horowitz, Marc Andreessen; Sequoia Capital's Roelof Botha, and Intuit’s Scott Cook, who will choose the top two prize winners. Winners will be announced at DEMO Spring 2010 in March.

New business models can take months and years to get off the ground. If appbackr wins the contest they will get a lot of exposure and have the chance to shake up how apps get funded. appbackr made it through the support of app developers around the world. Now they need people who support appbackr to tweet with #appbackr #paypalx and become a fan at the Appbackr facebook page. Developers are revolutionizing the manufacturing and distribution of the apps we rely on. appbackr provides a compelling way to bring Immediate Fund micro-financing to entrepreneurs, developers and creatives. Let's encourage PayPal to appreciate how big the demand is for Immediate Funding for app developers. appbackr is the next generation of micro-finance and opens up a whole new category of opportunity for PayPal. Developers benefit. Consumers benefit. Your support can help people to see the potential that appbackr represents. Remember that Appbackr is by invitation only until launch (ping me if you need an invite).

Appbackr A Finalist in PaypalX Developer Challenge By Jason Dowdell at 04:10 PM
Comments (1)

Friday, March 05, 2010

Vote Now! AppBackr Peer to Peer Developer Funding Program

Imagine an idea that you feel passionately about.  Turn away from your computer and imagine your idea coming to life.  Think first about how you would do it.  Who would you hire?  Where would your office be?  Think about the article about your idea in the newspaper or a magazine or this blog.  If your idea did maintain your passion, the rest of this post won't matter much to you.  But if you could imagine your idea taking life, think then about how to fund your idea.  For most of us this is where a long pause comes.  And it is usually the pause that moves the idea to hiatus to stall out.

Ideas aren't a dime a dozen.  Ideas are powerful.  They change the world--and can certainly change yours.  What are a dime a dozen are ideas that never get started.  Why?  Because you either have to take a huge risk yourself--living off savings or credit cards and paying the costs of the people that you have to hire or you wait to find the person who will back your idea.

Most people can afford to take the plunge but are always at risk of swimming out too far and then being unable to swim back to shore.  If you try to raise money from someone, get ready for a long wait.  Even if you know someone and they love your idea it will take 2 months.  Getting introduced to someone new will take time for the introduction--and the inevitable meeting of the (fill in the blank, son-in-law who knows your business, golfing buddy, out of work friend who could be a great marketing guy) who need to bless your idea before it will get funded.

AppBackr HomepageAnd you do all of this for ideas that often take less than a month's salary at a good paying job to get off the ground.

What is the alternative?  Peer financing.  We have created a new way to fund creative works, like iPhone apps, by allowing developers to sell wholesale units of the application.  The buyers get paid when the units sell at the iTunes store.  Developers get money right away.  Our idea is called appbackr.

Here's how it works:  when an iPhone app gets created, a developer gets $.69 for a $.99 app.  From the time an app is first considered to the time until it sells, it is typically about 6 months until the developer gets paid.  By selling wholesale units, you are getting a buyer to make a wholesale purchase of, say, 1000 apps.  Each unit generates $.25 for the developer, so $1000 units =$250.  When that unit sells, the wholesaler gets $.50.  The developer gets an additional $.15 (for a total of $.40).  A developer can pre-sell up to 50,000 units at $.25--that's $12,500, enough to code, build the UI and market a good app.

The developer is "giving up" $.29 a unit as a profit to the wholesale buyer.  That is about 1/3 of the net retail value from a sale on iTunes.  What the developer is getting is immediate funds; a relationship that lasts only until that unit gets sold (each unit has a queue number, so if a purchaser buys units 1-100, when units 100 sells, if no other units are sold, the developer goes back to keeping 100% of the amount due to her for each app); and distribution channels--each buyer has an incentive to help you sell more apps.

It is a new model and one that we will be beta testing at our launch which starts March 19.  In the meantime, the site is by invitation only.  We invite you to sign up at appbackr.com.  We'll add more "verticals" as we go along and refine the process.

If you like the idea, we could use your support because our app is entered in a competition sponsored by PayPalX, the developer site at PayPal.  Each vote for us means a lot.  Voting ends on Friday March 5.  It takes a few minutes to do but we have created a page which explains the process at www.appbackr.com/challenge.html  If you can support us with your vote, we'd be grateful.  If you do vote, drop us a note at ivoted@appbackr.com so that we can let you know the results of the competition.

This is the first of our new experiments in peer financing.  Keep an eye on our progress.  We are trying to change the world so that ideas can come to life with the support of each of us, not just a few of us.

iPhone developer extraordinaire Dave Mark thinks there's something to it as well, maybe this thing will actually take off, I recommend voting so they have a fighting chance.

Sincerely,

Jason Dowdell

Vote Now! AppBackr Peer to Peer Developer Funding Program By Jason Dowdell at 04:18 PM
Comments (0)

Friday, February 19, 2010

1974 BMW 2002 For Sale & Care List

BMW 2002 List

My brother-in-law Sean is way too nice, today he's letting me drive his baby indefinitely while I transition out of my current vehicle. Sean has a 1974 BMW 2002 1974 BMW 2002 that's in amazing condition. I currently have a 2008 bmw m3 but will turning it back in when the lease is up in April. In order to make the transition as smooth as possible, Sean gave me a list of things I need to be mindful of while driving his 36 year old bimmer (ironic that the car and I are the same age). I thought this list was pretty awesome so I decided to share it with all of you, enjoy!

  • Lowering the driver's side window involves cranking it down half way and then popping it back on its track and then you can finish rolling it down.
  • Don't fill it all the way up and then park it on a really hot day. If so, we will have to pay a visit to Andy again. from jason: Andy is the body shop guy that repainted the section just below the gas cap when the gas leaked and pealed a nice section of paint off the rear quarter panel, we don't like going to see Andy unless its on our terms.
  • It wakes up slowly and complains for the first few minutes of driving. Just give it lots of gas and it will smooth out and get a much better attitude.
  • Every now and then when warm it will chatter in first or second. Don't know why, but more gas or less clutch makes it go away.
  • If you ever hit the gas and nothing happens, the gas pedal has popped out of its fitting. It is a good idea to check this from time to time. If this happens while you're driving, pull over to the side of the road and pop it back into place.
  • On a hot day, the temperature will get past halfway. I do have an electric fan that cuts on automatically. If it gets to say 80%, something is probably wrong and it should be shut down. That said, the gauge is jumpy, and if the reading seems wrong, tap the gauge and it will be more accurate.
  • I do not lock the gas cap. To remove it, just keep turning to the left until it comes off.
  • Feel free to enjoy the 5 yr old chewing tobacco in the glove compartment.
  • The windows tend to fall down over time, so make sure they are cranked up every so often.
  • The gas gauge doesn't work. For city driving, I would usually set the trip meter to 0 at a fill up and get gas when it got to around 200. No worries if you run out. It has been done many times. There is a gas can in the trunk. The low fuel indicator is hesitation followed by a stall about 40 seconds later.
  • The car has an electric choke so don't pump the pedal over and over in the morning when you're starting her up or she'll get flooded.
  • The driver side door of ye olde 74 2002 can only be locked from the outside. So put the key in the lock after exiting the vehicle and rotate it counter-clockwise to lock the door.

2002 Bimmer Update

So I have some good news for anyone in the market to buy a 1974 BMW 2002 or anyone wondering which BMW 2002 you should buy... This 2002 is for sale! Sean has not set is asking price but anyone interested should use the contact form on mshift and we'll forward your questions on to my brother-in-law Sean. After driving this particular 2002 for nearly a full week now, I can tell you that the car runs like a champ. The handling and acceleration are superb and I get more looks in this car than I do in my 2008 BMW M3, no joke.

1974 BMW 2002 For Sale & Care List By Jason Dowdell at 08:49 AM
Comments (12)

Wednesday, August 19, 2009

Bill Liao Setting a Philanthropic Example via The Hunger Project

A couple of days ago I was contacted by Bill Liao because he was interested in purchasing a domain name that I owned. After a couple back and forth emails negotiating the price he made an offer I couldn't refuse. He jokingly asked me if I'd be willing to donate the entire purchase price of the domain to The Hunger Project. I told him I'd be more than happy to donate 50% of the purchase price to THP.org and he replied with "Deal!". Not knowing whether or not we actually had a deal, since I had not seen any money in my bank account, I had some doubt that he would follow through with his verbal (email) commitment. Then later this afternoon I received a PayPal notice saying funds were in my account and shortly after that I received an email from him with the confirmation that he had donated the other half of the purchase price to The Hunger Project. Needless to say I was quite excited. Not only was I able to sell a valuable domain to a good home and reduce my domain portfolio by a name, but a well-deserving non-profit got a nice donation. I'm not at liberty, nor do I think it makes much sense, to disclose how much was donated but I can tell you that it was a nice $x,xxx donation. Bill impressed me with his willingness to trust someone he'd never met that lives on the other side of the world and that he wired money to my account without as much as a written contract. I've had my fair share of legal dealings, I've won some suits and lost some suits, but every attorney I've ever met says that the best contracts are the ones that sit in a desk droor collecting dust. However, I think the best contract is the one that exists verbally and is acted on by both parties. I'm sure I have over 100 pounds of contracts in filing cabinets that cost several hundred thousand dollars to put together but none of them has the spirit of the deal between Bill and I. Because of his willingness to risk losing some money to someone he'd never met, I was all the more eager to make sure he got the name as quickly as possible because someone that acts on faith inspires others to do the same. I guess its a little bit of a Pay It Forward mentality but it just makes sense. I wish all of you who have been burned in the past (we've all been on both sides of that regrettably) don't miss an opportunity to act on faith every once in a while, cause like Piper says... "You never know daddy!" And she's right. Don't get me wrong, handshakes can only go so far and are not appropriate in the majority of business deals, but when you can take a risk without it causing permanent damage then I highly recommend taking that chance. It's well worth it.

Bill Liao Setting a Philanthropic Example via The Hunger Project By Admin at 09:22 PM
Comments (0)

Tuesday, August 18, 2009

Apple iPhone Legal Notice and Privacy Policies

I have always enjoyed reading through privacy policies, terms of service and general legal docs web sites use to tell you what they're going to do with your data. When the iPhone came out, one of the first things I did was go into settings > general > about > legal and read through all of the fine print. The information in there is quite amazing. I mean, they tell you who's software they're licensing for the iPhone, what companies they have partnered with, which fonts they are using (Helvetica anyone?), the terms offer us a plethora of insight that any reverse engineering biz dev guy would love. Today's terms of service and privacy policy docs read like a playbook for creating competing products and web sites. They tell you who to partner with, show you which partnerships have a stranglehold on your competitor and so much more.

I wanted to post the entire contents of the Apple iPhone terms document back when they released the 1st iPhone but they didn't have a way to email or copy the entire agreement to get it off of my iPhone. Well, thanks to the new cut-n-paste feature in iPhone 3.x OS, we can now do just that. So for those of you who want to know who Apple went to bed with, here are the entire contents of the iPhone, enjoy. P.S. I have bolded all company names, registered trademarks (except for those owned by Apple) and copyrights so you can see who Apple partnered with and why.

Legal Notices:
Copyright © 1983-2009 Apple Inc. All rights reserved.

Apple, the Apple logo and iPod are trademarks of Apple Inc., registered in the U.S. and other countries. iPhone is a trademark of Apple Inc.

For Apple and third party software license agreements presented at activation or included with the product and presented with any software updates, see www.apple.com/legal/sla/

ACELP is either registered trademark or trademark of VoiceAge Corporation in the United State and or other countries and used under license from VoiceAge Corporation. The ACELP®.net codec in this product is used under license from VoiceAge Corporation. Copyright © 2002-2005 VoiceAge Corporation. All rights reserved.

The Audible software in this product is used under license from Audible. Copyright © 2002 by Audible, Inc. All rights reserved.

This product contains the BLUEmagic software Bluetooth® protocol stack. BLUEmagic is a trademark of Open Interface North America, Inc. registered in the US. Bluetooth® is a registered trademark owned by Bluetooth SIG, Inc. used under license.

Portions of this Product are copyrighted by Dainippon Screen Mfg. Co., Ltd. All Rights Reserved. "Hiragino" is a trademark of Dainippon Screen Mfg. Co., Ltd. registered in Japan.

Copyright © 1981 Linotype AG and/or its subsidiaries. All Rights Reserved. This Record Material And The Data Recorded Thereon Are Licensed From and Are The Property Of Linotype Or Its Licensors And May Not Be Reproduced, Used, Displayed, Modified, Disclosed Or Transferred In Any Manner Without The Express Written Approval Of Linotype.

Copyright © 1999-2002, Linotype Library GmbH & affiliates. All rights reserved. Linotype HelveticaNeue and Zapfino are Trademarks of Heidelberger Druckmaschinen AG, which may be registered in certain jurisdictions, exclusively licensed through Linotype Library GmbH, a wholly owned subsidiary of Heidelberger Druckmaschinen AG.

Marker Felt typeface designs created by Snyder Fonts.

MPEG Layer-3 audio coding technology licensed from Fraunhofer IIS and THOMSON multimedia.

Source of North American and Canadian area code data: http://www.nanpa.com/ and http://www.cnac.ca/

Features the QDesign Music Codec.

Features the Sorensen Video Codec.

Vantage Research (successor to Lernout & Hauspie) , et al. (ProofReader)

IntelliWriter ProofReader text proofing software © 2002 by Vantage Research. All rights reserved.

IntelliWriter ProofReader Catalan text proofing software © 2002 by Vantage Research. All rights reserved. Adapted from Catalan word list © 1992 Universitat de Barcelona. Reproduction or disassembly of embodied algorithms or database prohibited.

IntelliWriter ProofReader Czech text proofing software © 2002 by Vantage Research. All rights reserved. Spelling database adapted from word list supplied by Jan Hajic. Reproduction or disassembly of embodied algorithms or database prohibited.

IntelliWriter ProofReader Dutch text proofing software © 2002 by Vantage Research. All rights reserved.
IntelliWriter ProofReader English text proofing software © 2002 by Vantage Research. All rights reserved.
IntelliWriter ProofReader French text proofing software © 2002 by Vantage Research. All rights reserved.
IntelliWriter ProofReader German text proofing software © 2002 by Vantage Research. All rights reserved. Spelling database adapted from word list supplied by Langenscheidt K.G. Reproduction or disassembly of embodied algorithms or database prohibited.
IntelliWriter ProofReader Hungarian text proofing software © 2002 by Vantage Research. All rights reserved. Portions of technology and word list supplied by Morphologic. Reproduction or disassembly of embodied algorithms or database prohibited.
IntelliWriter ProofReader Italian text proofing software © 2002 by Vantage Research. All rights reserved. Spelling database adapted from word list supplied by Zanichelli S.p.A. Reproduction or disassembly of embodied algorithms or database prohibited.
IntelliWriter ProofReader Polish text proofing software © 2002 by Vantage Research. All rights reserved. Portions of technology and word list supplied by Morphologic. Reproduction or disassembly of embodied algorithms or database prohibited.
IntelliWriter ProofReader Portuguese text proofing software © 2002 by Vantage Research. All rights reserved. Portions adapted from the Dicionario Academico da Lingua Portuguesa © 1992 by Porto Editora. Reproduction or disassembly of embodied algorithms or database prohibited.
IntelliWriter ProofReader Russian text proofing software © 2002 by Vantage Research. All rights reserved.
IntelliWriter ProofReader Spanish text proofing software © 2002 by Vantage Research. All rights reserved.
IntelliWriter ProofReader Swedish text proofing software © 2002 by Vantage Research. All rights reserved.

Privacy Policies:
Apple's Privacy Policy can be found at: http://www.apple.com/legal/privacy/
YouTube's Privacy Notice can be found at: http://www.youtube.com/t/privacy
Google Maps Privacy Notice

November 1, 2006
The Google Privacy Policy and our various product-specific privacy notices describe how we treat personal information when you use Google's products and services, including any of Google's mobile products and services. In addition, the following describes our mobile privacy practices. For a web version of this and other Google privacy policies, please go to www.google.com/privacy.html.

Mobile-specific information we collect
* Most of the personally identifying information we collect is what you tell us about yourself. For example, certain of our products and services allow you to interact and share personal information and data with others. You choose what you want to share and how you want to share it.

* Sometimes, we record your phone number. We record your phone number when you send it to us; ask us to remember it; or make a call or send a text message or SMS to or from Google. If you ask us to remember your phone number, we will associate your phone number with your Google Account, or, if you do not have a Google Account, with some other similar account ID. We often generate this account ID based on your device and hardware IDs, so if you change your device or hardware, you will have to re-associate this new device or hardware with your account before we can authenticate you.

* Most of the other information we collect for mobile, such as your device and hardware IDs and device type, the request type, your carrier, your carrier user ID, and the content of your request, does not by itself identify you to Google, though it may be unique or consist of or contain information that you consider personal.

* If you use location-based products and services, such as Google Maps for mobile, you may be sending us location information. This information may reveal your actual location, such as GPS data, or it may not, such as when you submit a partial address to look at a map of the area.

* Certain of our products and services allow you to personalize the content you receive from us. For these products and services, we will record your preferences and any information you provide about yourself or your interests (such as a list of your stocks to personalize your stock listings).

* If you use Google to transcode, or format, non-mobile pages to display properly on your device, we need to send your request to Google's servers for formatting. That means that we will record these requests, which are generally for material beyond Google's sites.

Uses (aka: how Google uses the information they glean from you)
* We use your information to process and personalize your requests. We also use the information for support, to develop new features, and to improve the overall quality of Google's products and services.

* We may also use the information to show you a history of your activity, to provide you with statistics about you or your use of our product or service, or to provide you with a better user experience.

* If you purchase something through Google, we may also use your information to bill you and to handle billing disputes.

Information sharing and onward transfer
* All requests must be sent through your mobile carrier's network and your carrier may have access to it. For information regarding your carrier's treatment of your information, please consult your carrier's privacy policies.

* We may share your information with certain third parties we use to perform certain functions, such as billing and text message or SMS delivery. These third parties will be contractually bound to treat your information in accordance with the applicable Google privacy policies.

* Certain of our products and services allow you to interact and share your information with others. Please consider carefully before disclosing any personal information or data that might be accessible to others.

Your choices (do we really have a choice Google?)
* Certain of our products and services allow you to opt-out of certain information gathering and sharing or to opt-out of certain products, services, or features. Each product has a help page which describes these and other options.

More information
Google adheres to the US Safe Harbor privacy principles. For more information about the Safe Harbor framework or our registration, see the Department of Commerce's web site. Further information about Google's various mobile products and services is available at mobile.google.com. For more information about our privacy practices, go to the full privacy policy. If you have additional questions, please contact us any time at:

Privacy Matters
c/o Google Inc.
1600 Amphitheatre Parkway
Mountain View CA 94043 (USA)

Acknowledgments:
Portions of this Apple Software may utilize the following copyrighted material, the use of which is hereby acknowledged.

Alice Group (BSD kernel)

Copyright © 1993 Allen K. Briggs, Chris P. Caputo, Michael L. Finch, Bradley A. Grantham, and Lawrence A. Kesteloot. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. All advertising materials mentioning features or use of this software must display the following acknowledgement: This product includes software developed by the Alice Group. 4. The names of the Alice Group or any of its members may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE ALICE GROUP AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE ALICE GROUP BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

AT&T (C Library)
The author of this software is David M. Gay. Copyright © 1991 by AT&T.
Permission to use, copy, modify, and distribute this software for any purpose without fee is hereby granted, provided that this entire notice is included in all copies of any software which is or includes a copy or modification of this software and in all copies of the supporting documentation for such software.

THIS SOFTWARE IS BEING PROVIDED AS IS, WITHOUT ANY EXPRESS OR IMPLIED WARRANTY. IN PARTICULAR, NEITHER THE AUTHOR NOR AT&T MAKES ANY REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR PURPOSE.

Stig Brautaset (json-framework)
Copyright © 2008 Stig Brautaset. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer.

Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

Neither the name of the author nor the names of its contributors may be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Carnegie Mellon University (Mach Operating System)
Copyright © 1991 Carnegie Mellon University. All rights reserved.
Permission to use, copy, modify and distribute this software and its documentation is hereby granted, provided that both the copyright notice and this permission notice appear in all copies of the software, derivative works or modified versions, and any portions thereof, and that both notices appear in supporting documentation.

CARNEGIE MELLON ALLOWS FREE USE OF THIS SOFTWARE IN ITS AS IS CONDITION. CARNEGIE MELLON DISCLAIMS ANY LIABILITY OF ANY KIND FOR ANY DAMAGES WHATSOEVER RESULTING FROM THE USE OF THIS SOFTWARE.

Carnegie Mellon requests users of this software to return to Software.Distribution@CS.CMU.EDU; or Software Distribution Coordinator, School of Computer Science, Carnegie Mellon University, Pittsburgh PA 15213-3890; any improvements or extensions that they make and grant Carnegie Mellon the rights to redistribute these changes.

Carnegie Mellon University; Paul Mackerras (pppd)
Copyright © 1993-2002 Paul Mackerras. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name(s) of the authors of this software must not be used to endorse or promote products derived from this software without prior written permission. 4. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by Paul Mackerras.

THE AUTHORS OF THIS SOFTWARE DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Derived from main.c, which is:
Copyright © 1984-2000 Carnegie Mellon University. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The name Carnegie Mellon University must not be used to endorse or promote products derived from this software without prior written permission. For permission or any other legal details, please contact: Office of Technology Transfer, Carnegie Mellon University, 5000 Forbes Avenue, Pittsburgh, PA 15213-3890. (412) 268-4387, fax: (412) 268-7395, tech-transfer@andrew.cmu.edu. 4. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by Computing Services at Carnegie Mellon University (http://www.cmu.edu/computing/).

CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Brian M. Clapper (poll)
Copyright © 1995-2002 Brian M. Clapper. All rights reserved.
Redistribution and use in source and binary forms are permitted provided that: (1) source distributions retain this entire copyright notice and comment; (2) modifications made to the software are prominently mentioned, and a copy of the original software (or a pointer to its location) are included; and (3) distributions including binaries display the following acknowledgement: This product includes software developed by Brian M Clapper, in the documentation or other materials provided with the distribution. The name of the author may not be used to endorse or promote products derived from this software without specific prior written permission.

THIS SOFTWARE IS PROVIDED AS IS AND WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.

Effectively, this means you can do what you want with the software except remove this notice or take advantage of the author's name. If you modify the software and redistribute your modified version, you must indicate that your version is a modification of the original, and you must provide either a pointer to or a copy of the original.

Digital Equipment Corporation (BSD kernel)
Portions Copyright © 1993 by Digital Equipment Corporation.
Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies, and that the name of Digital Equipment Corporation not be used in advertising or publicity pertaining to distribution of the document or software without specific, written prior permission.

THE SOFTWARE IS PROVIDED AS IS AND DIGITAL EQUIPMENT CORP. DISCLAIMS ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL DIGITAL EQUIPMENT CORPORATION BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.

Hiroaki Etoh, Federico G. Schwindt, and Miodrag Vallat (stack_protector.c)
Copyright © 2002 Hiroaki Etoh, Federico G. Schwindt, and Miodrag Vallat. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:

1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE AUTHORS ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

Michael Everson (Unicode Mapping Tables)
Used with permission from the author.

FreeBSD, Inc. (BSD Operating System)
This product contains software provided by FreeBSD, Inc. and its contributors.
Copyright © 1994-2007 FreeBSD, Inc. All rights reserved.

Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.

THIS SOFTWARE IS PROVIDED BY THE FREEBSD PROJECT AS IS AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FREEBSD PROJECT OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.

The views and conclusions contained in the software and documentation are those of the authors and should not be interpreted as representing official policies, either expressed or implied, of the FreeBSD Project or FreeBSD, Inc.

Free Software Foundation (libgcc, libstdc++)
Copyright © 1988-2007 Free Software Foundation, Inc. (FSF).

Parts of this software include the libgcc and libstdc++ libraries owned by the FSF. You may obtain a complete machine-readable copy of the source code for the FSF software under the terms of GNU General Public License (GPL) with libgcc exception and GPL plus libstdc++ exception, without charge except for the cost of media, shipping, and handling, upon written request to Apple. The FSF software is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GPL for more details; a copy of the GPL is included below.

GNU GENERAL PUBLIC LICENSE
Version 2, June 1991
Copyright (C) 1989, 1991 Free Software Foundation, Inc.
59 Temple Place - Suite 330, Boston, MA 02111-1307, USA
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.

Preamble
The licenses for most software are designed to take away your freedom to share and change it. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change free software--to make sure the software is free for all its users. This General Public License applies to most of the Free Software Foundation's software and to any other program whose authors commit to using it. (Some other Free Software Foundation software is covered by the GNU Library General Public License instead.) You can apply it to your programs, too.

When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for this service if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs; and that you know you can do these things.

To protect your rights, we need to make restrictions that forbid anyone to deny you these rights or to ask you to surrender the rights. These restrictions translate to certain responsibilities for you if you distribute copies of the software, or if you modify it.

For example, if you distribute copies of such a program, whether gratis or for a fee, you must give the recipients all the rights that you have. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.

We protect your rights with two steps: (1) copyright the software, and (2) offer you this license which gives you legal permission to copy, distribute and/or modify the software.

Also, for each author's protection and ours, we want to make certain that everyone understands that there is no warranty for this free software. If the software is modified by someone else and passed on, we want its recipients to know that what they have is not the original, so that any problems introduced by others will not reflect on the original authors' reputations.

Finally, any free program is threatened constantly by software patents. We wish to avoid the danger that redistributors of a free program will individually obtain patent licenses, in effect making the program proprietary. To prevent this, we have made it clear that any patent must be licensed for everyone's free use or not licensed at all.

The precise terms and conditions for copying, distribution and modification follow.

TERMS AND CONDITIONS FOR COPYING, DISTRIBUTION AND MODIFICATION
0. This License applies to any program or other work which contains a notice placed by the copyright holder saying it may be distributed under the terms of this General Public License. The Program, below, refers to any such program or work, and a work based on the Program means either the Program or any derivative work under copyright law: that is to say, a work containing the Program or a portion of it, either verbatim or with modifications and/or translated into another language. (Hereinafter, translation is included without limitation in the term modification.) Each licensee is addressed as you.

Activities other than copying, distribution and modification are not covered by this License; they are outside its scope. The act of running the Program is not restricted, and the output from the Program is covered only if its contents constitute a work based on the Program (independent of having been made by running the Program). Whether that is true depends on what the Program does.

1. You may copy and distribute verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice and disclaimer of warranty; keep intact all the notices that refer to this License and to the absence of any warranty; and give any other recipients of the Program a copy of this License along with the Program.

You may charge a fee for the physical act of transferring a copy, and you may at your option offer warranty protection in exchange for a fee.

2. You may modify your copy or copies of the Program or any portion of it, thus forming a work based on the Program, and copy and distribute such modifications or work under the terms of Section 1 above, provided that you also meet all of these conditions:

a) You must cause the modified files to carry prominent notices stating that you changed the files and the date of any change.

b) You must cause any work that you distribute or publish, that in whole or in part contains or is derived from the Program or any

Apple iPhone Legal Notice and Privacy Policies By Admin at 12:05 PM
Comments (2)

Wednesday, July 15, 2009

GoDaddy Pushing Twitter & Small Business Reputation Management

Since most of you know I suffer from Compulsive Domainer Syndrome (rarely see a domain name I can't pass up) it will come as no surprise that I had to renew some domains via Godaddy recently. When I logged into my account and clicked on the domains I wanted to renew I was greeted with a popup message encouraging me to go to Twitter and register each of the domain names I already owned as user names on Twitter before someone else beats me to it.GoDaddy helping users snag Twitter usernames for their domain names
When I saw the Twitter Username Popup I Immediately Thought...
  • My first reaction was, "I can't believe GoDaddy is actually recommending that I go to any site besides theirs since they are infamous for their horrible UI and love of making simple domain & website related tasks more complicated than necessary".
  • After the shock wore off I was impressed that Godaddy actually offered some advice, in their checkout process mind you, that was quite helpful for the masses. You know, those that have a domain name or two but that probably don't know anything about HTML or software but want to build a web site for their hobby or business.
I've been a Godaddy customer for several years now and I honestly can't think of a single time, even when they were a tiny little company, where they willingly sent their customers to another site and didn't get some form of compensation. Now I certaily could be misreading this seemingly altruistic move on Bob Parsons' part for something its not but then again, I haven't seen their name in the hacked Twitter docs as partners so I'm pretty sure Bob is looking out for his customers. Honestly I think this is pretty cool and something that will definitely get them more street cred with small businesses because its a move in the right direction. It is a sign that they're going to keep you in the loop on the important marketing technology advancements and make sure you're not left in the dark. I think the greatest marketing fear of the average small business owner today is that they're missing out on something online but they don't have time to figure out what that might be. With a marketing partner like Godaddy, they may not have to worry any more.

GoDaddy Pushing Twitter & Small Business Reputation Management By Admin at 03:13 PM
Comments (9)

Friday, July 10, 2009

Shark Week 09 Fishing For Great White Viewers

Shark Week Viral Kit
What social media outlets are they using?
  • Facebook Connect though I'm not sure whether or not it worked for me, not even sure how to tell quite honestly. I don't think the Facebook profile is getting much tractiont but haven't seen any other virus spreaders say anything about it so who knows.
  • Twitter: They created a frenziedwaters profile on Twitter and a lot of tweeps seem to think it's pure genious but I dunno. I also noticed that the term "Discovery Channel" was in Twitter Trends yesterday but it was gone this am.
  • YouTube: They have a user and channel set up with 4 well-produced videos that only lead to more mystery.
  • Blog: As far as I can tell they're only using Twitter and not a full-fledged blog, which makes sense due to the short term nature of the event they're marketing.
  • SEO: All of the bloggers are taking care of the seo for them with backlinks and tweets. I find it interesting that they are directing Google to not cache their homepage and that the homepage is all flash with no on-page seo value. One day an agency will step up that can do viral marketing with all the bells and whistles of streaming multimedia but also include on-page and on-site seo as part of their offerings but to date I have not seen any single firm do that yet, not even Camp Fire Media out of NYC (they did the campaign for Discovery Channel).
The cluing into geocaching, are they clued in or clueless?
I think the only reason I got one of the jars was because of my post on Monday about my recent geocaching experience. I think at the last minute the kind folks at Discovery Channel Shark Week thought it would be good to send me something since they put up all of those coordinates in their flash movie on frenziedwaters.com. The reason I am fairly certain this is the case is because I didn't get one of those fake obituaries like the other bloggers which leads me to believe this was a last minute type of deal but who knows. Regardless, the jar is at home with my daughters and Piper and I tried on the shark attack swim shorts this morning as a joke and surprised Shannon when she came downstairs, it was pretty funny. In fact, I think I might wear the shorts they sent us to the beach this weekend when I go surfing because they actually fit, go figure.
Site construction for the viral campaign
I felt like the "send to friend" link was not visible enough and blended in too easily into the background of the site. It was also bothersome that there was no way for you to cut and paste the coordinates into google maps or copy them to the clipboard to facilitate looking up the locations faster. Like I said before, the site has zero on page seo other than the Title and meta-descriptions being properly constructed. It's built entirely in flash and won't have any lasting value after this year's Shark Week is over. Which is no good for the Discovery Channel since they'll want the sites they constructed for the past years to show up on the first page of Google for the term Shark Week but I don't think that's going to happen with frenziedwaters.com, oh well, live and learn I suppose. I guess it's wait and see time now so let's wait and see what kind of buzz this thing is going to generate.

Shark Week 09 Fishing For Great White Viewers By Jason Dowdell at 08:56 AM
Comments (1)

Wednesday, July 08, 2009

Shark Week Viral Marketing Frenzy Decrypted

Faux sea glass jar from Discovery Channel Sharkweek 2009As I was pulling out of the driveway this morning I nearly hit the FedEx delivery guy because I didn't see him as I was backing up. He certainly saw me and waved me on and pointed to my house, because he had a delivery to make. I thought it was odd since I know we haven't purchased anything online lately since we have started our new budget but I headed down the road anyway. About 2 minutes later I get a call from Shannon telling me that I got a next day air delivery from FedEx. I asked her if it was a book, I get a lot of books sent to me, but she said it wasn't and that it was in a large box. So I told her I'd turn around and be there in two minutes.
I arrived at the house and picked up the box and was surprised at how large it was, 12 inches tall by 12 inches wide. I assumed it was a viral marketing pitch by this agency named "Campfire Media" but I had no idea what it was. The from address on the shipping label was:
FrenziedWaters.com
Campfire Media
62 White Street, 3E
New York, NY 10013

This certainly wasn't an address (physical or website) that I recognized so I was even more intrigued. I was especially intrigued since the package said "fragile, handle with care" which is not the norm for most viral marketing deliveries.
What was in the box?
Interestingly enough there was a note (printed but with a handwriting font) and a sea glass jar (complete with faux rusted lid and glass that had been frosted by months at sea and it contained different items. Unlike some other people, the kind folks at the Discovery Channel responsible for Shark Week, did not send me an obituary like they did JoBlo. But he and I did get all of the other items. Here's an inventory of what the rusted sea glass bottle contained:
  • 1 rusted boat key with a keychain for Discovery Marina SW09 (get it? as in Discovery Channel Shark Week 2009?)
  • One pair of baggies (swim trunks for the non surfers out there) with the left leg tattered and torn and bloodstained (obviously from a shark attack)
  • A faux Great White shark tooth attached to a copper keychain with the www.frenziedwaters.com url stamped into it (I'm not sure where they had these made but this keychain is top notch, the copper is even oxidized (good job folks)
  • A paper warning sign that reads "BEACH CLOSED SWIM AT YOUR OWN RISK, FOR DETAILED CLOSURE INFO, CALL: (386) 675-0342 (the 386 area code includes the location in Florida where we see the largest number of shark attacks in the world, so the use of a 386 area code on this sign was quite nice. If you call this number you'll get a well produced recording about shark attacks, I highly recommend calling 1 (386) 675-0342 and hearing the message.
  • A note on frenziedwaters.com stationery in a hand written font. I included the note on the stationery below.

Hand Written (not really) Note From frenziedwaters.com SW09
This jar holds a story -, the story of a single tragic accident, the details of which need to be unlocked. Dive in, investigate the evidence, and uncover what lies beneath the surface at frenziedwaters.com, part of an online experience leading into Discovery Channel's Shark Week.
Now that we've gotten through all of the tedium of Shark Week 09's viral marketing campaign, I'll put up a follow up entry in an hour or so that breaks down the campaign and what works and doesn't work and how well we should expect this to perform over the next 7 days.

Shark Week Viral Marketing Frenzy Decrypted By Jason Dowdell at 04:01 PM
Comments (1)

Monday, July 06, 2009

Geocaching For Beginners: Tips, Terminology and Personal Examples

Shannon and I have recently implemented a Dave Ramsey-esque budget in our household in an effort to decrease our expenses and get control of our spending. So far it's worked incredibly well, thanks to my amazingly organized and brilliant wife. However, there has been one drawback to the new budget, there simply isn't enough money for us to have our usual date night activities which include going to the movies, dinner and paying a babysitter. So we've been looking for some decent activities that we can do together that won't break our budget. A couple of weeks ago we talked about trying out Geocaching. Geocaching is basically a worldwide scavenger hunt where members of geocaching.com plant "caches" in different locations and supply hints and GPS coordinates to the location where the loot is hidden. It costs nothing to join the site or to play and there are nearly 1,000,000 geocaches hidden worldwide so chances are there is some cache to be found in your area. The only trick is that you need a GPS device, or a phone with GPS or Google Maps on it in order to find the cache. Since Shannon bought me a Garmin etrex Venture HC GPSr (that's GPS Receiver in geocache-ese) for Father's day, I was all set. So yesterday, the Dowdells went out on a geocache mission as a family to try the activity out. Yes, the entire family came along. Here's the breakdown in case you're curious.

Players
  • Jason aka Dad (age 35)
  • Shannon aka Mama (age: younger than Jason)
  • Piper: Age 6
  • Finley: Age 4
  • Jonas: Age 14 mos.
Equipment
  • Vehicle: Land Rover LR3
  • GPS Device: Garmin eTrex Venture HC
  • Writing Instrument: Ink Pen
  • Phone: iPhone 3G (not the 3Gs)

Results of our 1st Geocaching Low Cost Family Activity

Immediately Shannon and I felt like we should've gone on our first geocaching adventure alone (without children) because we felt dumb. The first two places we went just didn't work out, either the cache was no longer there or we just couldn't find it because we'd never done this before. We found that for the best results of a specific hunt we really needed to look up the specific Geocache before we went to the site so we could read the comments by other cachers and see when the cache was last found. On our first mission the cache had just been replaced by the cache creator that morning but we still couldn't find it. It was supposedly hidden on, near or around a swingset that we frequent often because the park is at the end of our neighborhood but still, no luck. Even though we didn't find the first or second geocaches our family was still in high spirits and having a great time. The kids thought it was awesome that we were going on a real live treasure hunt and the only cost was the price of gas.

For our next trek we decided to go to a cache we found on the site that was at a cemetary. The title was "Cache in Peace" and the natural allure of a cemetary and our children meant this was a must do cache. Plus the cache creator said you didn't have to go on private property to get the cache and that meant that we really didn't need to go inside the cemetary (but the kids couldn't resist). So we went to the coordinates and didn't find it but then I thought, hmm, I bet these bricks move... (there was a brick wall that lined the cemetary) and sure enough, there was a tiny little duct tape package with a log (paper with all those that found the cache's signature on it) as well as a folded up crisp $1 bill. We decided to SL TN (sign the log and took nothing) since the cache we had would not fit inside the small container. That was when things really got exciting, we had found our first "treasure" and now the kids were excited.

We made a couple of other treks, one that required the unnecessary use of the 4 wheel drive and height adjustable suspension on our Land Rover and was a great find. I'm sure that I'm not suppose to talk about what objects are in each cache capsule so I'll refrain from being a spoiler. But I can tell you that when Shannon and I go on a date this week we will be geocaching because it's so much fun. If you live in an area with a lot of parks or bike paths then I'm sure you could go to most of the caches without even using a car. Some of the caches around our area are only accessible by water which means I'll have to find a way to get our family of 5 on one of my longboard surfboards to get the cache :)

Biggest Point of Frustration
The only thing that was more frustrating than not being able to find a cache was not understanding the acronyms that commenters put on the geocache descriptions in the log entries. Some were fairly straightforward to understand and others just looked like gobblygook. So between unfamiliar acronyms and words I'd never heard of before I did get a bit frustrated. To keep you from being frustrated like me, I have compiled a list of the most important words and acronymns used in geocaching so you can have the maximum amount of fun.

Acronyms / Short Codes / TXT Codes / Shorthand

TFTH: "Thanks For The Hide:" When a hide was extra special people will leave this in the log book.
TFTC: "Thanks For The Cache" I guess the only difference between this and TFTH is that the cache must be good.
TNLN: "Took Nothing Left Nothing" Usually it seems like noncommital geocachers use this term to prove they found the cache but didn't want to take anything out of it, possibly because they had nothing to replace it with. It is proper geocaching etiquette to always "SL" aka Sign Log so you can show others that you were there.
SL: "Signed Log" Every geocache item should have a paper log near it and geocachers will sign the log to show they found it. They typically sign their geocaching.com username instead of their real name which further frustrates the muggles (see below) ;).
BYOP: "Bring Your Own Pencil" (but if you sign a log you should use a water-insoluble ink pen since it won't be erased as easily - learned that in 10th grade chemistry with Dr. McCord)
CITO: "Cash In Trash Out" (on your way to find the geocache, pick up trash and clean up the area)
DNF: "Did Not Find" Shannon and I did not find 2 of the 5 caches we seeked yesterday.
D/T: "Difficulty and Terrain" Scales of 1 to 5 for each, one being the easiest.
FTF: "First To Find" First geocacher that finds the cache can post this in their log and get special bragging rights, I guess.
GPSr: "Global Position Satellite Receiver" Slang for a GPS device although I think adding the "r" to the end of it was not the best choice since many items ending in r are vowels.
GZ: "Ground Zero" The location where the cache is hidden, does not necessarily mean on the ground since many caches are hidden above or below the ground.
SWAG: "Stuff We All Get" This is not a Silly Wild A$$ Guess but is the cache items at a specific location find.

Geocaching Words / Terms and Definitions

Muggle: A non-geocacher. Caches are often hidden at public parks and public places so many times there will be people there hanging out or going about their normal business and in Geocaching terminology they are referred to as Muggles. It's a Harry Potter term that means un-magical people.
Spoiler: A hint that tells of the exact location of a cache before someone finds it. Same as a movie spoiler but not the same as a car spoiler which is used to create downforce on the front end or rear end of the car in order to stabilize it at high speeds. Geocaching is so geeky I felt it important to put in some gear head terminology just to preserve my manhood.

You can read all of the terms used in geocaching in their glossary but they're not very well organized and kind of out of context if you've never played the game before.

Geocaching Tips For Newbies

Here are some tips for those of you that have never tried geocaching before, these are a must if you want to have a good time and find the most caches possible.
  1. Do not rely 100% on the coordinates given to you in the cache description. If you get within 2 - 3 feet of the exact coordinates then it is time to start looking around. Many factors could cause the location to be slightly off so just use 0 - 3 feet as an approximation.
  2. Don't expect the cache to be hidden in plain site, expert cachers are known for hiding something using the native camoflage of the environment. Look up, down, below the ground, at eye level. Tip: if there is a tree 2 - 3 ft within the coordinates then chances are the object is tied up in the tree with a rope ;)
  3. If the geocache location is on or near a business or private property then be sure to not let your kids run all around the place because it could be very dangerous.
  4. Read the hints in the description very carefully, often there are clues contained in the description that don't mean anything until you actually get to the location. So read and then reread once you get to the spot.
  5. Take a phone with you that has a browswer in it so you can look up the description of each geocache location before you get to it. Otherwise you won't have all of the hints with you and will get quite frustrated. An alternative to this would be to print out all of the cache spots you want to visit before you leave the house but that requires a printer and paper.
  6. Remember that it's just a game and don't get too annoyed by all of the geek speek of stuff like muggles (can't believe I'm playing a game that uses terminology from Harry Potter, seriously). The game can be incredibly fun so don't let your pride get in the way of having a good time.

Geocaching For Beginners: Tips, Terminology and Personal Examples By Jason Dowdell at 11:11 AM
Comments (5)

Thursday, July 02, 2009

Funniest Jobs on Craigslist

Over the past few weeks Shannon has been perusing the jobs section of Space Coast Craigslist in an effort to help out a family member in need of a full time gig. During the process of finding local jobs she's uncovered some real unique positions. Since it's a holiday weekend I thought I might share some of them to help you get the weekend kicked off right.

Note: The following jobs are actual jobs that were posted on the Space Coast Craigslist jobs board, no joke.

From the "TV Video Radio Jobs" Section
Position: Film Personalities for Social Art Movie
Job Description:
...men and women to participate in a filmed interview regarding pornography and the state of today's society. This is not a porn, there will be absolutely no nudity or otherwise offensive content or behavior. Applicants should watch pornography...

Pay: $150/session
Hmmm, it's not a porno but you're required to watch pornos, interesting.

From the "TV Video Radio Jobs" Section
Position: Female Model
Job Description:
Internationally awarded photographer still needs some female models for artistic nudes. Experience is not necessary but helpful. Nice body and face is an asset. Great body and face is better, but not necessary.
Sounds like a Hooters lawsuit just waiting to happen ;)

From the "Web / Info Design" Section
Position: WEB DEVELOPMENT, DYNAMIC CONTENT, Partnership needed!
Job Description:
...looking for a young, talented, dedicated web programers with big goals...Serious college students and recent grads welcome to apply, but you must have a website displaying your work and skill-sets...

Compensation: Partnership, with goals of becoming a corporation

No joke, this guy (Leo Cortes) is looking for web designers and developers to work for free and maybe he'll incorporate the entity and then he might pay these developers. Where do I sign up?

From the "Web / Info Design" Section
Position: Jr. Web designers
Job Description: Posted in response to a job posting for junior web designers.
What is it with people who think Photoshop MASTERY and HTML/CSS MASTERY equals low pay?.

If you're looking for a student hire or really a junior web designer, which really isn't even a position, then don't ask for mastery of photoshop and html/css. Do you know how long it has taken me and other pros to become photoshop masters? 40-45K isn't bad for a student hire or beginning web person full time, but it doesn't pay for a master. C'mon, stop trying to pay nothing for something, this isn't ebay.

I thought this was a job board, not a job reply board.

Best Craigslist Job Titles
Here are some of the best job titles I came across, seriously, I can't believe people post this stuff.
  • LOW BUDGET, LARGE PROJECT (I'll pay you less than anyone else, guaranteed!)
  • Low Budget Adult websites needed (as opposed to high class adult web sites)
  • Web Log "Blog" - Wordpress Design Project (not to be confused with we blog)
  • Part Time (Seriously this is the title, just Part Time, nothing more.)
  • respond to responds (respond now)
  • Handyman Technician SCAM (scam is an acronym, and a bad one at that)
  • E-Cig Account Executives (virtual non-smokers need not apply)
  • Young, aggressive salespeople needed (the meaner the better)
  • Self-Generating Sales Pro Needed (translation: if you don't make any sales then be your own customer)
  • new company (but same old job)
  • NAIL TECH For a day (as opposed to Doctor for a day)

And the list goes on. No wonder monster.com is still in business. Have a happy 4th of July everyone.

Funniest Jobs on Craigslist By Jason Dowdell at 04:48 PM
Comments (1)


Subscribe to Marketing Shift PostsSubscribe to The MarketingShift Feed