Tag Archives: Keep

Why Every Entrepreneur Should Keep a Sleep Diary (And How to Do It Right)
March 17, 2018 6:02 pm|Comments (0)

As any entrepreneur should know, good sleep is essential to good business.

High-quality sleep sustains the energy levels you need to grow a company. It enhances cognitive function so your brain operates at its best. It helps you recover from grueling days so you don’t burn out . And it’s consistently linked to improved performance and productivity in the workplace.

On the other hand, chronic sleep deprivation degrades your ability to think clearly, make sound decisions, perform at your best, avoid illness, and get things done without running yourself into the ground. Nevertheless, too many entrepreneurs sacrifice sleep in the name of productivity.

So what’s the antidote to this productivity-killing sleep deprivation? One of the best strategies for ensuring you consistently get a good night’s sleep is to create a sleep log. While that might sound like one more thing to add to your already-overwhelming to-do list, the effort pays for itself. Here’s why every entrepreneur should keep a sleep diary–plus how to do it right.

The Benefits of Keeping a Sleep Diary

It holds you accountable to getting enough sleep

If you don’t track how many hours you’ve slept each night, then it’s easy to start cutting back on sleep without even realizing it. Before you know it, you’re catching only four or five hours of shut eye in the pursuit of more working hours. You may be vaguely aware of the fact that you’re feeling awfully tired lately, but you won’t realize the full scope of your sleep deprivation unless you actually count how much time you spend sleeping.

Bottom line? Tracking your sleep lets you quickly identify when you’re not getting enough of it. This gives you the opportunity to course correct before things get dire.

It helps you identify obstacles to quality sleep

Speaking of course correction: Keeping a detailed sleep log enables you to identify the behavioral or environmental patterns that might be interfering with your ability to sleep well each night.

For instance, if you keep track of your caffeine consumption habits along with your sleep quality, you might notice that consuming caffeine after 6 pm consistently disrupts your sleep, while consuming caffeine earlier in the day keeps you in the clear. This allows you to curate your daily habits so they serve your nighttime sleep quality.

It provides valuable info to your doctor (if necessary)

If you tweak your habits to facilitate high-quality sleep but still struggle to fall and stay asleep each night, there’s a chance you’re dealing with a sleep disorder. In that event, having a written record of your sleep habits will be enormously helpful to a medical professional.

Handing over this written log not only saves your doctor time; it may also save you money that would otherwise be spent on diagnostic questions that were already answered by your diary. And if you do start treatment for a sleep disorder, the sleep log will let you keep track of whether the treatment is working.

All told, keeping a sleep diary can help you improve your sleep quality in a number of ways. And that has major ramifications for your cognitive function, learning capacities, energy levels, and productivity.

How to Keep a Sleep Diary

Ready to create a sleep diary? Keep the following guidelines in mind:

  • Track how much you slept each night. Write down when you got in bed, how long it took you to fall asleep, when you woke up to start your day, and whether (and why) you woke up at all during the night.
  • Track quality in addition to quality. Each morning, rate how well you slept the night before. You can use a simple scale of 1 to 5, with 1 representing poor quality sleep and 5 representing very good quality sleep.
  • Track lifestyle factors. What you do during your day can have a major impact on the sleep you get at night. Jot down how much caffeine and alcohol you consumed (and when you consumed it), what and when you ate, if and when you exercised, whether you’re experiencing any emotional stressors, if and when you napped, your daily activities, and any drugs or medication you may have taken.
  • Track environmental factors. Note the temperature of your bedroom, the bedding you used, whether the room was dark or light, whether the room was quiet or loud, and so on.

If all that sounds daunting, don’t worry. There are plenty of sleep diary templates available, and they make it easy to track these factors in one place. (Not sure where to start? Give this template from the American Academy of Sleep Medicine a try.)

Keeping a sleep diary is one of the best ways to ensure you’re consistently getting high-quality sleep. And that is one of the best things you can do for yourself when you’re trying to make it big.


Posted in: Cloud Computing|Tags: , , , , , ,
Exclusive: Uber paid 20-year-old Florida man to keep data breach secret – sources
December 7, 2017 12:29 am|Comments (0)

SAN FRANCISCO/WASHINGTON (Reuters) – A 20-year-old Florida man was responsible for the large data breach at Uber Technologies Inc last year and was paid by Uber to destroy the data through a so-called “bug bounty” program normally used to identify small code vulnerabilities, three people familiar with the events have told Reuters.

FILE PHOTO – The logo of Uber is seen on an iPad, during a news conference to announce Uber resumes ride-hailing service, in Taipei, Taiwan April 13, 2017. REUTERS/Tyrone Siu

Uber announced on Nov. 21 that the personal data of 57 million passengers and 600,000 drivers were stolen in a breach that occurred in October 2016, and that it paid the hacker $ 100,000 to destroy the information. But the company did not reveal any information about the hacker or how it paid him the money.

Uber made the payment last year through a program designed to reward security researchers who report flaws in a company’s software, these people said. Uber’s bug bounty service – as such a program is known in the industry – is hosted by a company called HackerOne, which offers its platform to a number of tech companies.

Reuters was unable to establish the identity of the hacker or another person who sources said helped him. Uber spokesman Matt Kallman declined to comment on the matter.

Newly appointed Uber Chief Executive Dara Khosrowshahi fired two of Uber’s top security officials when he announced the breach last month, saying the incident should have been disclosed to regulators at the time it was discovered, about a year before.

It remains unclear who made the final decision to authorize the payment to the hacker and to keep the breach secret, though the sources said then-CEO Travis Kalanick was aware of the breach and bug bounty payment in November of last year.

Kalanick, who stepped down as Uber CEO in June, declined to comment on the matter, according to his spokesman.

A payment of $ 100,000 through a bug bounty program would be extremely unusual, with one former HackerOne executive saying it would represent an “all-time record.” Security professionals said rewarding a hacker who had stolen data also would be well outside the normal rules of a bounty program, where payments are typically in the $ 5,000 to $ 10,000 range.

HackerOne hosts Uber’s bug bounty program but does not manage it, and plays no role in deciding whether payouts are appropriate or how large they should be.

HackerOne CEO Marten Mickos said he could not discuss an individual customer’s programs. “In all cases when a bug bounty award is processed through HackerOne, we receive identifying information of the recipient in the form of an IRS W-9 or W-8BEN form before payment of the award can be made,” he said, referring to U.S. Internal Revenue Service forms.

According to two of the sources, Uber made the payment to confirm the hacker’s identity and have him sign a nondisclosure agreement to deter further wrongdoing. Uber also conducted a forensic analysis of the hacker’s machine to make sure the data had been purged, the sources said.

One source described the hacker as “living with his mom in a small home trying to help pay the bills,” adding that members of Uber’s security team did not want to pursue prosecution of an individual who did not appear to pose a further threat.

The Florida hacker paid a second person for services that involved accessing GitHub, a site widely used by programmers to store their code, to obtain credentials for access to Uber data stored elsewhere, one of the sources said.

GitHub said the attack did not involve a failure of its security systems. “Our recommendation is to never store access tokens, passwords, or other authentication or encryption keys in the code,” that company said in a statement.


Uber received an email last year from an anonymous person demanding money in exchange for user data, and the message was forwarded to the company’s bug bounty team in what was described as Uber’s routine practice for such solicitations, according to three sources familiar with the matter.

Bug bounty programs are designed mainly to give security researchers an incentive to report weaknesses they uncover in a company’s software. But complicated scenarios can emerge when dealing with hackers who obtain information illegally or seek a ransom.

Some companies choose not to report more aggressive intrusions to authorities on the grounds that it can be easier and more effective to negotiate directly with hackers in order to limit any harm to customers.

Uber’s $ 100,000 payout and silence on the matter at the time was extraordinary under such a program, according to Luta Security founder Katie Moussouris, a former HackerOne executive.

“If it had been a legitimate bug bounty, it would have been ideal for everyone involved to shout it from the rooftops,” Moussouris said.

Uber’s failure to report the breach to regulators, even though it may have felt it had dealt with the problem, was an error, according to people inside and outside the company who spoke to Reuters.

“The creation of a bug bounty program doesn’t allow Uber, their bounty service provider, or any other company the ability to decide that breach notification laws don’t apply to them,” Moussouris said.

Uber fired its chief security officer, Joe Sullivan, and a deputy, attorney Craig Clark, over their roles in the incident.

“None of this should have happened, and I will not make excuses for it,” Khosrowshahi, said in a blog post announcing the hack last month.

Clark worked directly for Sullivan but also reported to Uber’s legal and privacy team, according to three people familiar with the arrangement. It is unclear whether Clark informed Uber’s legal department, which typically handled disclosure issues.

Sullivan and Clark did not respond to requests for comment.

In an August interview with Reuters, Sullivan, a former prosecutor and Facebook Inc (FB.O) security chief, said he integrated security engineers and developers at Uber “with our lawyers and our public policy team who know what regulators care about.”

Last week, three more top managers in Uber’s security unit resigned. One of them, physical security chief Jeff Jones, later told others he would have left anyway, sources told Reuters. Another of the three, senior security engineer Prithvi Rai, later agreed to stay in a new role.

Reporting by Joseph Menn in San Francisco and Dustin Volz in Washington; Additional reporting by Heather Somerville and Stephen Nellis in San Francisco; Editing by Jonathan Weber and Bill Rigby

Our Standards:The Thomson Reuters Trust Principles.


Posted in: Cloud Computing|Tags: , , , , , , , , ,
Beychok: Always Dreaming will be tough to beat, but keep an eye on Cloud Computing
August 15, 2017 8:55 am|Comments (0)

John Velazquez rides Always Dreaming to victory in the 143rd running of the Kentucky Derby horse race at Churchill Downs Saturday, May 6, 2017, …

Cloud Computing

Posted in: Web Hosting News|Tags: , , , , , , ,
IT leaders say it’s hard to keep the cloud safe
February 16, 2017 2:05 pm|Comments (0)

IT managers are finding it difficult to keep their applications and data safe in the cloud, and many are slowing cloud adoption because of it.

That was one of the findings of an Intel cloud security report that surveyed 2,000 IT professionals in different countries and industries last fall.

The issue isn’t with the cloud itself, since trust outnumbers distrust for public clouds by more than two to one, according to Intel’s survey.

IT professionals told Intel that shadow IT and a shortage of cybersecurity skills are causing the most problems.

To read this article in full or to leave a comment, please click here


Posted in: Web Hosting News|Tags: , , , , ,
New Intel Security Cloud Report Reveals IT Departments Find It Hard to Keep the Cloud Safe
February 13, 2017 6:35 am|Comments (0)

“The desire to move quickly toward cloud computing appears to be on the agenda for most organizations. This year, the average time before …


Posted in: Web Hosting News|Tags: , , , , , , , , ,
LG’s new TVs for India are designed to keep mosquitoes at bay
June 17, 2016 6:35 am|Comments (0)

Last year, India’s capital city of New Delhi recorded nearly 16,000 cases of dengue infections, the highest in recent years. The culprit: mosquitoes, which flourish in areas with uncovered garbage and stagnant water that are common in developing countries, and spread the dreaded virus as they multiply quickly. LG hopes to help its customers fight the airborne menace with a new line of LCD TVs that feature mosquito-repelling technology. And it’s not as kooky an idea as you think. The company explained in a statement, “The LG Mosquito Away TV, developed as per the Indian insights by consumers, is equipped…

This story continues at The Next Web


Posted in: Web Hosting News|Tags: , , , ,
Don’t try to keep up with the ‘In Cloud’
June 13, 2016 11:10 pm|Comments (0)

While the concept of cloud computing is by no means a new thing, it was quite a shock, but perhaps not a surprise to discover just how much hesitation …



Posted in: Web Hosting News|Tags: , ,
Don’t try to keep up with the ‘In Cloud’
June 13, 2016 9:55 am|Comments (0)

While the concept of cloud computing is by no means a new thing, it was quite a shock, but perhaps not a surprise to discover just how much hesitation …



Posted in: Web Hosting News|Tags: , ,
Don’t Try to Keep Up With the ‘in Cloud’
June 12, 2016 8:40 pm|Comments (0)

While the concept of cloud computing is by no means a new thing, it was quite a shock, but perhaps not a surprise to discover just how much hesitation …


All articles

Related Posts:


Posted in: Web Hosting News|Tags: , , ,
Don't try to keep up with the 'In Cloud'
June 12, 2016 7:25 am|Comments (0)

While the concept of cloud computing is by no means a new thing, it was quite a shock, but perhaps not a surprise to discover just how much hesitation …


Posted in: Web Hosting News|Tags: , , ,