Archive for June 30, 2018

Cisco 2960-S vs Cisco 2960-X vs Cisco 2960-XR

June 30, 2018

As the New flagship Cisco 2960 series switch, the new widely successful Catalyst 2K switches with stackable Gigabit Ethernet access switches. So what’s the difference between the Cisco 2960-S, Cisco 2960-XR and Cisco 2960-X Series Switches.

Best Way to compare Cisco 2960-S vs Cisco 2960-X

Cisco Catalyst 2960S series switch is very common switch in any environment that has Cisco devices. It also got the ability to do static routers which was a nice feature. While Cisco Catalyst 2960-X switches are the next generation of the world’s most widely deployed access switches. The 2960-X provides up to 80 Gbps of stack bandwidth which is 2x more compared to the 2960-S. It is now also possible to stack up to 8 switches compared to the earlier maximum of 4. They are scalable, smart, simple, and secure and at the same time provide investment protection. These switches also provide Layer 3 routing capability, application-aware intelligence, and double the scale.

Cisco 2960-X vs Cisco 2960-XR
Dual-FRU power supply with integrated fan
Layer 3 features with IP Lite feature set
Configurable 8 queues per port (standalone)
48 Ether channel groups

The Cisco Catalyst 2960-XR Switch is a fixed-configuration, stackable (with module, not included) Gigabit Ethernet switch that provides enterprise-class features for high bandwidth applications and is designed for operational simplicity to lower total cost of ownership.

Key feature of Cisco 2960-XR:
1.The Cisco hardware routing architecture delivers extremely high-performance IP routing in the Cisco Catalyst 2960-XR IP-Lite Switches
2.It offers a number of redundancy and resiliency features to prevent outages and help ensure that the network remains available
3.Cisco Catalyst 2960-XR Switch offers intelligent traffic management that keeps everything flowing smoothly.
4.The Cisco Catalyst 2960-XR Switch offer a superior CLI for detailed configuration and administration.

Here are some notable differences between 2960-X and -XR compared to 2960-S.
Dual core CPU @ 600 MHz. 2960-S has single core
2960-XR has support for dual power supplies
256 MB of flash for -XR, 128 MB for -X. The S model has 64 MB
512 MB of DRAM compared to 256 for 2960-S
1k active VLANs compared to 255 for 2960-S
48 Etherchannel groups for -XR, 24 for -X and 6 for -S
4 MB of egress buffers instead of 2 MB
4 SPAN sessions instead of 2
32k MACs for -XR, 16k for -X and 8k for -S
24k unicast routes for -XR, 16 static routes for -X and -S

How to secure your Android phone

June 30, 2018

Although Android covers more than 75% of the smartphone market it doesn’t mean that it is the most secure operating system in the planet for mobile phones, In reality the fact that Android is the most scaleable operating system of smart phone devices makes it more vulnerable to security threats and malware.

While Android is a terrific operating system in many ways, it does pose some real risks for IT departments. Last week’s revelation that Google had to remove around 50 malware-infected applications from its Android Market and had activated an Android app kill switch highlighted the downside of the company’s “free love” approach to publishing applications where it will let anyone put their app on the market and will only take it down if alerted by a third-party user. The upside of this, of course, is that the market also offers a wide variety of quality security applications that can protect you from malicious apps.

Below are mentioned the best anti-malware and security apps on Android on the basis of ratings submitted by user’s online:

1)McAfee WaveSecure

McAfee’s WaveSecure app doesn’t have any of the virus scans or firewall protection that the company is famous for, but it does have some important features such as the ability to remotely lock your phone and to wipe key data from it, the ability to back up and restore wiped data after a device has been secured, and the ability to track and map your device using GPS.

2)Lookout Security & Antivirus

As one of the earliest entries into the Android security field Lookout has an impressive user base. There is a completely free version which offers antivirus and scheduled scanning. There is also a locate function for lost or stolen devices, the ability to activate an alarm, and the option to track your phone online via the Lookout website.

Another handy feature that Lookout provides is the ability to backup contacts online and restore them to your existing device or a new one.

3)GadgetTrak

This smart app offers several anti-theft features, like location detection, remote alarm activation and file protection. It has extensive versions for Android devices (as well as safety products for computers and cameras). New devices get an extra awesome feature – GadgetTrak snaps photos with your stolen mobile camera and collects evidence that can help you locate your phone and catch the unfortunate thief.

4)NQ Mobile Security

This app blocks viruses, malware, spyware and Trojans, and blocks access to phishing sites. Privacy protection monitors apps that access your private data without permission, and system optimization closes apps that run in the background without your knowledge. Traffic monitoring functionality ensures that you don’t go over your plan’s limits, and allows you to rank apps by data consumption. Contacts and messages can be backed up for free, and the app can also be used to locate a lost or stolen phone.The app also has the ability to lock and wipe a lost or stolen phone, and to activate an alarm

5)AVG Antivirus (Free)

Another big name in computer security, AVG Antivirus Free scans your apps, settings, media, and phone contents in search of suspicious files. Have a text message with a shady-looking link attached? Run the scanner to see if it’s a possible threat to your phone’s security. Features that the creators will add in the future include the ability to lock apps and back up data. As the utility stands now, if you seek only to keep your phone malware-free and you don’t really care for the extras, AVG Antivirus will fit your needs.

In this article I only choose apps of Android devices because Android’s maker follow open source rules which means anyone can view the source code of any app on android and can provide thier personnel updates for that app which no other mobile operating system company provides.

For updating Android mobile apps you will have to learn a little bit of Android App programming, but not to worry there are many online sites that can help you learn Android app development.The best part of learning online is that you can study from anywhere you are comfortable and you don’t have to travel other places for learning plus you can record the lectures and view them on your device for future revision or study.

One of the online site where you can learn Android App Development is WIZiQ.com. You can refer to the link:Learn Android Online

So after buying your phone install these apps as soon as possible

The Key of iPhone 5 Accessories Sales is to Grasp the Time

June 29, 2018

The cNN article says that the key ofmobile phone accessories wholesaleis appearing in the right place at the right time.

When a new mobile phone was launched, the majority of consumers tended to buy corresponding accessories while they choose the mobile phone. At least they will buy them within 3 months after they buy the new phone. Foriphone accessories china wholesalemarket, the current problem is: Apple won’t advance released its mobile phone equipment. Therefore accessories manufacturers have to wait for mobile phone manufacturers announcing production. Then they will miss the best sales opportunity.

iPhone 5 is longer and lighter than iPhone 4s.The charging attachment; loudspeaker and other specific equipment also were changed. For consumers who want to change iPhone, this means that they have to spend more money to replace its corresponding accessories. For the accessories market, this means more sales business opportunities.

Intelligent mobile phone accessories are a profitable business. Consumer’s intake capacity towholesale iPhone 5 accessoriesis very big. iPhone takes $6 billion in global $20.8 billion Smartphone total share, and the intelligent mobile phone consumers’ average expenditure is $56 for accessories.

Some companies are lucky enough, and they can directly understand the details before Apple company launch the products.
Details include the various specifications of products, so that the company can produce parts in advance. Apple company even has a special project called “MFi” which allowing designers and manufacturers get related components.

For example, Apple Company cooperated with the United States speaker manufacturers Bose Company. And other accessories manufacturers have to wait for product launching.

Full phone specification of Apple iPhone 4S0

June 29, 2018

Apple iPhone 4S is the most interesting smart phone one has ever seen. Even though Apply iPhone 5 has been launched, the response of iPhone 4S is still very high in the market. People are crazy about this smartphone. Even though it is quite identical to the older version of Apple smartphones, but it has some great features that you will come to know when you switch on the phone. One of the most common feature of this smartphone is iCloud, which allows the user to restore the backup easily. Also, it offers you the opportunity to push or store apps, photos, calendar as well.

The best thing about this smartphone is a powerful processor. It has an A5 processor which makes the device work work very smooth and fast. This processor also helps in faster loading of application as well as internet pages. The antenna of the phone can transmit as well as receive the data. The downloading speed of this Apple iPhone 4S is around 14.4 Mbps which is almost twice as fast as of the previous version. The main change that you will find in this phone is 8Mp camera. For the first time the apple company has incorporated this feature.

This stylish smartphone looks like an iPhone 4. The design has changed just a bit to now. It is the first phone by Apple that has a retina display which helps to deliver extremely sharp graphics and texts. This retina display also helps in brilliant display of colors. This will make both photos as well as videos looks awesome.

Key specifications of iPhone 4S:

Display: Retina display and 3.5 inch wide screen multi touch display Siri Languages: English (UK, US and Australian), French and German Height: 4.5 inches Width: 2.31 inches Depth: 0.37 inch weight: 4.9 ounces Talktime: up to 8 hours on 3G and up to 14 hours on 2G Standby time: up to 200 hours

If you are looking forward to buy Apple iPhone is UAE then internet is a perfect place to buy it. There you will be able to get a great deal on this smartphone. There are many stores that offer discounts and deals on smart phones. Thus, by choosing to shop there you can make huge savings. In fact, there you can get this phone for AED 2299. So do check the prices of iPhone 4S on the internet before traveling to a brick and mortar store.

Zahra Hassan is a famous writer in UAE. She has been written many articles on most popular laptos like as Apple iPhone 4S, iPhone 5, Apple iPhone, Samsung Galaxy S3, latest mobile phones and telecommunication for a few years. Here you can get the details about the smart mobile phones , Tablets, laptops,Mobile Price in UAE and other information you may be looking for when shopping for unique electronic items.

AVS Technology Breaks Iron Triangle of Good Fast and Cheap

June 28, 2018

by Anthony W. Hawks, Chief Legal Officer, e-LYNXX Corporation

AVS Technology is the basic procedural component of any automated solution for buying custom goods and services that must be defined by production or performance specifications at the time of purchase. It includes the following steps:
ENTER vendor attributes
ENTER project specifications
MATCH vendor attributes to project specifications to determine sub-set of qualified vendors
SEND project specifications to sub-set of qualified vendors
RECEIVE a bid response from at least one vendor

When these steps are applied using a computer-operated system, a unique competitive bidding environment can be established where vendors of custom goods and services are now willing to offer their lowest prices to fill idle production capacity. This strategy is called “contribution pricing”. When vendors bid work (even when bidding well below normal rates), any income obtained above out-of-pocket costs “contributes” to fixed costs and overhead and, when absorbed, to their bottom lines.

Prior to AVS Technology, buyers of custom goods and services were faced with the “iron triangle” of quality, timeliness, and cost. Regardless of the industry involved, every procurement or supply chain solution seeks to attract business customers that want to achieve the purchasing trifecta of “good, fast, and cheap.” Before AVS Technology, however, a buyer could only achieve two of these three goals at any one time, not all three simultaneously.

AVS Technology breaks the “iron triangle” because it allows pre-qualified vendors with excess idle capacity to provide an extraordinary low price without risk of establishing future buyer price expectations. In other words, price is no longer tied to quality and timeliness of delivery. This is what makes AVS Technology integral to all current and future e-commerce methods and systems for buying custom goods and services including ERP systems, general supply chain management systems, specialized product or service procurement systems, and even older legacy systems. One such system for organizations with significant buying needs in direct mail, marketing, publications, packaging, labeling and other types of print is currently being offered by American Print Management. Regardless of the industry or buying need, however, all users and providers of such e-commerce methods or systems are required to license AVS Technology if they wish to benefit from this revolutionary innovation.

AVS Technology is unique in creating a controlled bidding environment in which repetitive purchasers of custom goods and services can leverage the open production capacity of their preferred vendors in a way that virtually guarantees “contribution pricing” that is, below normal pricing that seeks primarily to absorb out-of-pocket costs and some level of fixed costs and overhead. This is accomplished by allowing qualified vendors to bid high, low, or not at all (1) without having to consider buyer pricing expectations; (2) without fear of setting either high or low precedent for future bid prices; and (3) without worrying about being denied future bid opportunities for which the vendor is qualified. Freed from these concerns, bidders offer pricing based on their open production capacity at the time each job is bid, knowing that if they bid low this week when they are hungry for work, they are not bound to offer the same low price next week when they are busy with other orders.

The technology is based on a series of patents that the U.S. Patent Office awarded to e-LYNXX Corporation, including Patent No. 6,397,197, Patent No. 7,451,106, post-Bilski Patent No. 7,788,143, and Continuing Application 12/8885,423 (collectively, the “AVS Technology”). This thicket of patents covers all custom goods and services, not just print.

Licensing AVS Technology should be viewed as both a strategic benefit and a legal requirement. Any organization with a computer-operated system that procures custom goods and services, by following the steps outlined in AVS Technology, is required to obtain a license to use (or continue using) the patented procedure protected by AVS Technology. This applies to systems that are developed internally as well as those used through third-party brokers, procurement services and system providers. Organizations should check with their system or service providers to ensure that the system being used is in compliance with AVS Technology licensing requirements.

About e-LYNXX Corporation
e-LYNXX Corporation patented the technology integral to e-commerce. Endorsed by Educational & Institutional Cooperative Purchasing (E&I) and Printing Industries of America (PIA), e-LYNXX drives results through its three divisions. AVS TechnologyTM licenses the patented* automated vendor selection procedure used in e-commerce and procurement systems. American Print Management provides web-based system, services and patented AVS TechnologyTM to reduce substantially the procured costs of direct mail, marketing, publications, packaging, labels and other procured print. Government Print Management offers effective U.S. GPO bid services and strategies. www.e-LYNXX.com 888-876-5432

What Is Collocation Is The Colocation Technology Is Best For Web Hosting

June 27, 2018

If you want that your server should be safe and secure. The major aspects of the web hosting technology are the security most of the hosting planes offer a hosting services along with security. We are not sure about that we have a hosting plan which is securing us we can only assume that the plan which we have is secure. One of the latest and popular terms which use now days is the collocation.The Colocation means you store your own server at a facility of a colocation provider. A colocation provider provides an internet connection to your server and allows you physical access to your own server when you need it and fulfill all your business needs. Colocation is a hosting option for small businesses who want the features of a large IT department without the costs. Colocation server hosting offers its clients the advantages of security and facility of dedicated server. It also allows user to have full control over the scalability and over their hardware in their own controls

The web server which is usually located at a dedicated facility designed with resources which include a secured cage or rack, regulated power, dedicated internet connection, security and support. As per colocation facilities offer high-security which mainly including cameras, fire detection devices with extinguishing devices, multiple connection feeds, filtered power options, backup power generators which is very important and other items to ensure high-availability which is mandatory for all Web-based and virtual businesses and also the web hosting services Colocation sites are being erected at various points around the world to provide services to the rapidly expanding the scope of Web hosting and e-commerce marketplace in global market. Many large corporations and business entities have the Internet infrastructure to host their own web servers and have a team of IT professionals to manage and design the site, individuals and small companies do not. There is a wide range of options available from

simple hosting up to running your own Web servers off of a dedicated Internet connection. One such option is colocation.

Is the Colocation technology is best for web hosting

The technology called as Colocation hosting has numerous advantageous. The most important advantages of colocation server is the higher security of your equipment and devices because the data center is in charge for the security of your server and all the sensitive data contained in it. These data centers have the best security measures and are monitored 24/7, thus it is the safest place for your server.Another major aspect is the cost efficiency, because you are required to have a building for your computers. The hosting companies have their own advantages as well, as they simply offer some rack space in their building, receiving rent for their services.The other main advantage of colocation hosting is the fact that you receive your own bandwidth, RAM and other major hardware facilities just for yourself without having to share them with anyone else. This is a question that is difficult to answer. For individuals who run small sites for personal use or blogs probably do not need the level of service provided

By colocation and are better off with Web hosting. If however, the server is needed to be more robust than what is provided by standard Web hosting, colocation is often times the best next option. It is also a very good option for small businesses that want to have a fairly large Web presence but don’t want to have to deal with a large amount items such as network connections.

Action To Take When Computer Freezes

June 26, 2018

Computer freezes when there is a broken windows registry.It is no ordinary job fixing it alright. Experts opine that it is best fixed by the hands of a Microsoft Certified Registry Repair Program like Registry Booster 2010, more easily. Such computer freezing problems arise when there is no proper knowledge of windows registry, and its importance.

Can anyone detect easily that his computer freezes??As one connects the machine, the screen becomes blue with long stop errors; and then he should know he is in trouble.The Windows XP does not boot. Initially it appears that the computer has been hit by a virus, and so there is computer freezing.The real problem lies elsewhere, and not that. Because the windows registry is corrupt, the computer freezes. Such errors need to be diagnosed at the earliest Fixing this problem is a specialized job, and it needs a technical person to do the windows registry alright.

The computer tech, who is well versed in computer freezes, restores a fresh install copy of the windows XP registry. The problem proved that the programs installed in the computer had no registry entries, and hence they were unusable. There may be other reasons why a computer freezes. When there is the problem of computer freezing or locking, it is not that easy to detect the causes behind it. There may be a number of reasons that cause computer freezing. It may be that the hard drive is going bad and it is slowing down the machineIt may be the source of a very persistent problem.Hence if one’s computer freezes randomly, he should follow certain rules to keep it safe

The position of the computer should be such that it is dust free and care should be taken about the working of the fans. This is the first step.
While installing a new hardware check that the required specification for the specific computer is present or not, for safety and to stay away from computer freezing.
One should keep a Driver Scanner program ready at hand.
Why a computer freezes must be known by all. It is mainly because we are not careful about the safety of our computers. One gets frustrated when the computer freezes and that too when you are doing something important But how does it happen?

If we use the computer for surfing the internet, for creating documents or for playing games without doing some regular maintenance, we obviously have to face computer freezing problems. Running too many programs at the same time, is another reason of such problems.
To avoid computer freezing, always use a good Registry cleaner.

Best iPhone 3Gs apps for the workplace and business professionals

June 25, 2018

Don’t be fooled by its fun nature and stylish looks the iPhone 3Gs is more than capable of holding its own in the workplace, from tracking parcels to making spreadsheets to even organising your time there is an app for just about everything. So here’s a quick rundown of apps that can make your life more easier and fun at work.

1, Pcalc RPN Calculator

First of all let’s start with the basics and it doesn’t get more basic than the need to crunch numbers and this is where Pcalc RPN Calculator comes in. Now I know the iPhone comes with a calculator but when it comes to a hard-core scientific calculator they don’t get much better than this with its multiple undo and redo and unit conversion this bad boy will even give you a two line display if you need it. So when it comes to crunching the big numbers you are ready to go.

2, Things

Now we all have a to-do list at work and at home, and the thing with to-do lists is you really need to have them with you for them to work and this is where your shiny little iPhone comes in handy with the things app. From its ease-of-use and its stylish interface this organising system is very easy to personalise and will adapt to the way you do things rather than the other way round. With a simple checklist or a multitude of projects this app can help, so no matter how complicated work life may be the things app will help you keep everybody and everything in their place.

3 Delivery status touch

When it comes to tracking parcels things have got a little bit more professional. Whether you’re tracking an item that’s coming into the country for work or just want to know if that CD you bought from Amazon is arriving soon this app can help. It will track deliveries from over 40 stores and delivery services and will tell you roughly where your package is at the time of your search. Set up a free account at the app store to add your tracking info, once done you can paste tracking numbers from your computer instead of tapping them into your iPhone. So it’s quite a handy little app.

4 Business Card Reader

Are you tired of tapping away at your iPhone 3Gs like you’re some crazy old lady using Chip and pin in the supermarket! just trying to put in business contacts then this is the app you.If you live an active business and social life, contact partners, conduct negotiations and make business deals, you usually exchange business cards. Eventually you get tons of business cards and they become difficult to store, search and remember important contacts. Now you can scan them into your iPhone, just take a look at one of the best iPhone business card scanner apps! Business Card Reader scans and “reads” the picture using ABBYY’s text recognition technology and enters the data into appropriate fields of the iPhone address book. No more tapping away like a crazy old lady manually inputing the names, phone numbers, emails and other information from business cards! This technology allows you to capture contact information from business cards and save it to the iPhone address book. Business Card Reader creates complete and accurate contact information on your iPhone in a few seconds and it recognises a whole host of languages like English, French, Italian, German and Spanish business cards.This app is ideal for anyone who communicates with many people in work or personal life. I t’s an excellent tool for business professionals, exhibitors at trade shows, exhibitions attendees and sales personnel.

Build Versus Buy – A Merger And Acquisition Strategy For Information Technology Companies

June 25, 2018

As a Merger and Acquisition advisor, we regularly dialogue with the top executives in the information technology industry. We have to chuckle when we reach a decision maker with a large IT company and he says, “We have a corporate policy that we do not buy companies.” Does this guy read the industry publications? Is his company’s development group that good? Does he understand the first mover advantage or window of opportunity?

We have gotten past the dizzying array of Internet product introductions, but the pace of technology introduction has again returned to robust levels. Any large company that feels it can keep pace with this force through internal development efforts alone is headed down the path of extinction.

Almost everyone will agree that information technology will be a primary driver of controlling costs in U.S. industry. Technology is our answer to remaining competitive in this world economy. A great deal of the technology development is coming from small, entrepreneurial, nimble, low overhead companies.

There is, however, a huge paradox in the market. The institutional buyers of technology are relatively conservative late adapters. This prevents the expected innovation and commercial success that should naturally follow the innovation and passion of these small technology innovators.

These entrepreneurs respond to a market need and achieve encouraging initial success from the early adopters. They soon hit the wall and are not able to “cross the chasm” from a small group of early adaptors to general market acceptance from the conservative majority. There is little economic value created when good technology is in the control or a failing company and the technology never reaches broad acceptance.

Most of the blockbuster new products are the result of an entrepreneurial effort from an early stage company bootstrapping its growth in a very cost conscious lean environment. Think of some of the new developments from companies like Google. The big companies, with all their seeming advantages have a very high internal cost structure for new product introductions and the losses resulting from those failures are substantial.

Don’t get me wrong, there were hundreds of failures from the start-ups as well. However, the failure for the edgy little start-up resulted in losses in the $1 – $5 million range. The same result from an industry giant were often in the $100 million to $250 million range.

For every Yahoo or Ebay there are literally hundreds of companies that either flame out or never reach a critical mass beyond a loyal early adapter market. It seems like the mentality of these smaller business owners is, using the example of the popular TV show, Deal or No Deal, to hold out for the $1 million briefcase. What about that logical contestant that objectively weighs the facts and the odds and cashes out for $280,000?

As we contemplated the dynamics of this market, we were drawn to a merger and acquisition model that is used in the networking technology market by Cisco Systems. We believe that model could also be applied to great advantage in the Information Technology industry. The giant networking company, is a serial acquirer of companies. They do a tremendous amount of R&D and organic product development. They recognize, however, that they cannot possibly capture all the new developments in this rapidly changing field through internal development alone.

Cisco seeks out investments in promising, small, technology companies and this approach has been a key element in their market dominance. They bring what we refer to as smart money to the high tech entrepreneur. They purchase a minority stake in the early stage company with a call option on acquiring the remainder at a later date with an agreed-upon valuation multiple. This structure is a brilliantly elegant method to dramatically enhance the risk reward profile of new product introduction. Here is why:

For the Entrepreneur:

1.The involvement of Large IT Investor – resources, market presence, brand, distribution capability is a self fulfilling prophecy to your product’s success. The halo of the big secure company helps you cross the chasm to the conservative majority institutional customer.

2.For the same level of dilution that an entrepreneur would get from a venture capital, angel investor or private equity group, the entrepreneur gets the performance leverage of “smart money.” See #1.

3.The entrepreneur gets to grow his business with Large IT Investor’s support at a far more rapid pace than he could alone. He is more likely to establish the critical mass needed for market leadership within his industry’s brief window of opportunity.

4.He gets an exit strategy with an established valuation metric while the buyer/investor helps him make his exit much more lucrative.

5.As an old Wharton professor used to ask, “What would you rather have, all of a grape or part of a watermelon?” That sums it up pretty well. The involvement of Large IT Investor gives the product a much better probability of growing significantly. The entrepreneur will own a meaningful portion of a far bigger asset.

For the Large IT Investor:

1.Create access to a large funnel of developing technology and products.

2.Creates a very nimble, market sensitive, product development or R&D arm.

3.Minor resource allocation to the autonomous operator during his “skunk works” market proving development stage.

4.Diversify their product development portfolio – because this approach provides for a relatively small investment in a greater number of opportunities fueled by the entrepreneurial spirit, they greatly improve the probability of creating a winner.

5.By investing early and getting an equity position in a small company and favorable valuation metrics on the call option, they pay a fraction of the market price to what they would have to pay if they acquired the company once the product had proven successful.

How To Add Social Media Icons In Blogger

June 24, 2018

First off let me say that I am not an expert on Blogger. In fact I am quite the opposite – I am new to the blogging scene. For the past month I have been trying to figure out how to add Social Media icons to my blog. I would visit other blogs and be in awe of their cool social media icons. How did they do it?

It finally dawned on me that I could use similar steps that are based off a post I found from @moneysavingmom’s site about creating your own blog header.

Hope this helps any other new bloggers out there!

1.Open a Photobucket account if you don’t already have one. (Make sure your account is set to Public).

2. Download the social media icons you would like on your blog. Here a couple articles with really nice icons/icon packages that you can download for free:

33 Beautiful Social Media Sets for Designers and Bloggers

The Best Social Media Icons All in One Place

3. Upload the icons to your Photobucket account.

4. Open up a blank text file or word document. Note: You don’t have to do this step, but I did it to help me through the process.

5.In Photobutcket, navigate to one of the icons you want to use. Click in the box next to HTML code and paste it into a word or text document. (Image example can be found on Adventures as a Small Town Mom’s blog – just search for this article.)

6. For each HTML code you pasted in your text or word document, update href with your direct url for that respective icon. For example, for the Twitter icon update href with your twitter url (http://www.twitter.com/(insert your twitter @name).

7. Go to Design in Blogger and click Add Gadget.

8. Select the HTML/JAVA SCRIPT gadget.

9. Copy and paste in your HTML code from your word or tect doc of the icon(s) you want to display on your blog in the Content section. For the title, be creative – put ‘Stalk Me’ or ‘Follow Me’ or whatever you want (maybe just leave it blank).

10.Click Save and ta da! You should now have social media icon(s).

For resident experts, did I do it the hard way? Do you have any tips about adding social media icons?