We are giving away a <$random-product> for our followers. Please RT to have a chance. Winner by 5 pm #hastag_of_company @profile_of_company

Thnx for your message @Ceeke, we’ll provide the necessary information asap.

Looks familiar ?

A company nowadays is looking for new ways to attract costumers or to promote their products. With the use of social media like Twitter, Facebook, Myspace, Friendster etc they can reach a greater public than ever imagined, with less costs for themselves.

After all, if one user does a re-tweet it has an exponential change to reach thousands of people, only with the power of a 140-character message, creating a micro business model.

This model has a few advantages compared to the “early days” like:

  1. fewer costs
  2. direct contact with your costumers
  3. create a “we are here” feeling

However advertising alone won’t do the trick.

Promoted tweets, as they are called, are no silver bullet. Tweeting in such matter needs to be with a certain coordination and sustained, value-driven engagement so that the message will be amplified, otherwise it is bound to fail.

Also creating value-driven twitter adds is something corporate marketeers need to take  upon themselves.
Advertisers need to sit down and think about how content is used, shared on Twitter and, importantly, what makes a Tweet successful.

But does Twitter advertisement really work ? It sure did for Dell.

In 2007 Dell launched the @DellOutlet account using it to sell refurbished systems. As of today it has more than 1.500.000 followers and sales where surpassed by $3 million. More than $2 million came from sales directly attributed to Twitter and another $1 million from people who start at Twitter and then move on to buy a new computer somewhere else on the Dell Web site.

But not only companies can profit from this piece of technology, people like you and me can do likewise .  Take for example (starting) bands who give away free tickets, creating sympathy by the Twitter users.

Oh and yes, if you like this article, please RT 😉


Recently Google has changed it’s layout: bigger font and buttons, but also a “handy” toolbar which allows you to switch between the different Google options.

A few ways to hide this toolbar are:

Quote from: http://userscripts.org/scripts/show/76243

Creates a button below Google search bar to make possible show and hide this annoying left sidebar in Google search results. Script tested with Firefox 3.6, Google Chrome 5.0.396.0 dev and Opera 10.53. It remembers last user’s choice.


Firefox: just click Install (need Greasemonkey extension installed https://addons.mozilla.org/ru/firefox/addon/748)

Chrome: just click Install

1. Download script to a directory of your choice, i.e. C:\Program Files\Opera\Scripts.
2. Open Opera, and go to Tools->Preferences.
3. Click on the “Advanced” tab and select “Content”.
4. Now click “JavaScript Options…” and set “User JavaScript files” to the directory you chose before.
5. Restart browser


Whoozy Search Engine


Whoozy is a search engine for people. It searches the web for information about a particular person and uses search engines, social networks and picture/video/audio sites to gather relevant info.

Also a number of tools which help to use Whoozy even better are developed. You can add Whoozy for example to your favorite startpage (like iGoogle) or use it as a search plugin in your favorite browser.

What goes on the net, stays on the net 🙂


The internet is full of pages who made you laugh, make you go O M G, do a facepalm or worse. A snippet of the finest links available:

  1. Lolcats ‘n’ Funny Pictures of Cats – I Can Has Cheezburger?
  2. Needles to say: pictures of cats in all sort of funny events.

  3. FAIL Blog: Epic Fail Pictures and Videos of Owned, Pwnd and Fail
  4. Collection of  “fails”

  5. FML: Your everyday life stories
  6. Today, I was outside, peeing on a cactus. Then all of a sudden my dog jumped on my back, knocking me into the cactus. FML

    Fmylife.com is a weird and wonderful addition to the web. It’s a collection of everyday anecdotes and stories likely to happen to anyone and everyone, sent to us exclusively by our users, which we then publish on the site. This is a space where you can let it all out and unwind by sharing the little things that screw with your day, and maybe realize that you are not alone in experiencing day to day crap. Posts start with ‘Today’ and end with ‘FML’. The site is meant to be fun to read and can be enjoyed on a daily basis.

  7. People of Wallmart
  8. A collection of all the creatures that grace us with their presence at Walmart, America’s favorite store.

  9. There I Fixed it
  10. There are as many sources for the word Kludge as there are jury-rigged mailboxes in the mobile home parks of America. Whether the source of the word is Gaelic, German, or Naval Acronym, we know them when we see them, and on this web site, we celebrate these iconic images of mankind’s eternal struggle to hammer square pegs into round holes (with duct tape.)


A handy site to calculate which subnet mask your ip has.


Quote from webtools.live2support.com:

Subnet mask: A subnet mask is a mechanism used to split a network into subnetworks; it can be used to reduce the traffic on each subnetwork by confining traffic to only the subnetwork(s) for which it is intended, thereby eliminating issues of associated congestion on other subnetwork(s) and reducing congestion in the network as a whole. Each subnet functions as though it were independent, keeping traffic local and forwarding traffic to another subnetwork only if the address of the data is external to the subnetwork.

Subnetting Concept

Subnetting an IP network allows for the flow of network traffic to be segregated based on a network configuration. It essentially organizes the hosts into logical groups, and provides for improving network security and performance. The most common reason for subnetting IP networks is to control network traffic. Traditionally, in an Ethernet network, it is very common for all nodes on a segment to see all the packets transmitted by all the other nodes on that segment, which introduces collisions, and the resulting retransmissions under heavy traffic loads. For additional information on subnetting, see RFC 1817, and RFC 1812.

Class Address Ranges

Class A – to
Class B – to
Class C – to

Class D* – to
Class E* – to

Class A, Class B, and Class C are the three classes of addresses used on IP networks in common practice. Class D addresses are reserved for multicast. Class E addresses are simply reserved, meaning they should not be used on IP networks (used on a limited basis by some research organizations for experimental purposes).

Reserved Address Ranges

Address ranges below are reserved by IANA for private intranets, and not routable to the Internet. For additional information, see RFC 1918. – (10/8 prefix) – (172.16/12 prefix) – (192.168/16 prefix)

Other reserved addresses: is reserved for loopback and IPC on the localhost. – is reserved for multicast addresses. is the limited broadcast address (limited to all other nodes on the LAN)

Subnet Calculator Explanation(Example)

This calculator will calculate the subnet mask to use, given a TCP/IP network address and the number of subnets or nodes per subnet required.

To create the subnet mask, first remember that the purpose of the subnet mask is to separate the (32 bit) ip address into the network prefix and the host number. If a bit in the subnet mask is 1, the corresponding bit in the IP address is part of the network address; if the bit in the subnet mask is 0, the corresponding bit in the IP address is part of the host address.

First depict the ip address in binary. Take and convert to binary:

ip address: 00111101.11110110.00010011.00010010
First we determine what class of address it is:

If the first bit is 0 it is a Class A address If the first two bits are 10 it is a Class B address If the first three bits are 110 it is a Class C address If the first four bits are 1110 it is a Class D multicast address If the first four bits are 1111 it is a Class E experimental address

Your example is a Class A address. The default subnet mask for a Class A address is:

subnet mask: 11111111.00000000.00000000.00000000
The formula for figuring out the number of ‘host’ bits in a subnet mask is
2^n=(number of nodes ) (2^n means ‘2’ to the power of ‘n’)
Since you know the number of nodes, you need to find ‘n’.

Because you want 64 node(s), you want to leave 6 – ‘0’ bits in the subnet mask since 64 = 2 ^ 6.
This will give you the following subnet mask:

subnet mask: 11111111.11111111.11111111.11000000
Which is referred to as /26 or in dotted decimal notation as


Communication, a snippet from Wikipedia:

Communication is a process of transferring information from one entity to another. Communication processes are sign-mediated interactions between at least two agents which share a repertoire of signs and semiotic rules. Communication is commonly defined as “the imparting or interchange of thoughts, opinions, or information by speech, writing, or signs”. Although there is such a thing as one-way communication, communication can be perceived better as a two-way process in which there is an exchange and progression of thoughts, feelings or ideas (energy) towards a mutually accepted goal or direction (information).

During our 5th edition of the Storm lanparty, one of our sponsors, dedicatedgamers.eu, decided not to communicate anymore after an agreement was made for the sponsoring of game-servers. (Sorry, the following is in Dutch only).

Verwijderd op aanvraag, hoewel de waarheid !=laster
Uit wikipedia:
Laster is het zwartmaken van een ander door deze in het openbaar van feiten te beschuldigen waarvan men weet dat deze niet waar zijn. Het doel is het ruïneren van de reputatie van het slachtoffer.

Waarheid is een fundamenteel begrip dat min of meer synoniem is met echtheid, geldigheid, juistheid. Als iemand met opzet onwaarheid spreekt liegt hij.

What goes on the internet, stays on the internet.


Ever wondered how much a pint cost in other countries ? Pint price has the answer !

pint prices

Lager in Belgium is €1.81 EUR
Average using prices from 317 user(s).
Popular brands
jupiler,Stella,Stella Artois



Corrupted files.com offers a wide array of corrupted Word, Excel or Power Point files that are guaranteed not to open on a Mac or PC.

their philosophy:

A corrupted file is a file that contains scrambled and unrecoverable data due to hardware or software failure. Files may become corrupted when something goes wrong while a file is being saved e.g. the program saving the file might crash. Files may also become corrupted when being sent via email. The perfect excuse to buy you that extra time!

© 2012 Ceekes boarderline Suffusion theme by Sayontan Sinha