Mark Twain Say: What We Know

Photo of Mark Twain circa 1871

Mark Twain, circa 1871

Mark Twain Say:

What We Know…

☞ “It’s not what we don’t know that gets us into trouble.”

☞ “It’s what we do know for sure, that just ain’t so!”

~ Mark Twain, circa 1871

Photo Source: Wikipedia

Posted in Mark Twain | Tagged , , , , | Leave a comment

Barack Hussein Obama | 1st Inaugural Address | A Patchwork Heritage

Barack Hussein O'bama

Barack Hussein O’bama

“For we know that our patchwork heritage is a strength, not a weakness.”

~ Barack Hussein O’bama, 1st Inaugural Address, January 20th, 2009


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , | Leave a comment

John F Kennedy | 1st Inaugural Address | Cooperative Ventures

John F Kennedy, circa 1963

John F Kennedy, circa 1963

“To those old allies whose cultural and spiritual origins we share, we pledge the loyalty of faithful friends.”

“United, there is little we cannot do in a host of co-operative ventures.”

“Divided, there is little we can do…”

“For we dare not meet a powerful challenge at odds and split asunder.” ~ John F. Kennedy, 1st Inaugural Address, January 20th, 1961

#PresidentsUSA #WashingtonDC #1961


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , , , , | Leave a comment

Grover Cleveland | 2nd Inaugural Address | Inordinate and Unequal Advantages

Grover Cleveland

Grover Cleveland

R ye an enemy ‘inimicalis‘ to our plight?

“If in lifting burdens from the daily life of our people we reduce inordinate and unequal advantages too long enjoyed, this is but a necessary incident of our return to right and justice.” ~ Grover Cleveland, 2nd Inaugural Address, March 4th, 1893

#PresidentsUSA #WashingtonDC #1893


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , , , , | Leave a comment

Abraham Lincoln | 1st Inaugural Address, 1861 | Service or Labor Due

Abraham Lincoln

Abraham Lincoln

Abraham Lincoln, 1st Inaugural Address, March 4, 1861

“No person held to service or labor in one State, under the laws thereof, escaping into another, shall in consequence of any law or regulation therein be discharged from such service or labor, but shall be delivered up on claim of the party to whom such service or labor may be due.” ~ Abraham Lincoln, 1861

#PresidentsUSA #WashingtonDC #1861


Quote | Posted on by | Tagged , , , | Leave a comment

James Knox Polk, 1st Inaugural Address | Doubtful and Unauthorized Implied Powers


James Knox Polk

“…(we must) abstain from the exercise of doubtful or unauthorized implied powers.” ~ James Knox Polk, 1845

#PresidentsUSA #WashingtonDC #1845


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , , | Leave a comment

Drafting the Articles of Confederation of the USA

Drafting the Articles of Confederation, Continental Congress, 1781

Drafting the Articles of Confederation, Continental Congress, 1781

“The free inhabitants of each state…paupers, vagabonds, and fugitives from justice excepted…shall be entitled to all of the privileges and immunities of free citizens in the several States.” ~ Articles of Confederation of the USA

#Philadelphia #1781 #PresidentsUSA


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , , , , , , , , , | Leave a comment

General George Washington, 1st Inaugural Address | The Invisible Hand


General George Washington

“No people can be bound to acknowledge + adore the ‘Invisible Hand’ which conducts the affairs of men more than those of the United States.” ~ George Washington, #NewYorkCity #1789 #PresidentsUSA


via Twitter

Follow me on Twitter @rwebaz

Quote | Posted on by | Tagged , , , , , | Leave a comment

How To Master The Design Of Creating Compelling Twitter ‘Calls To Action’ CTAs

How To Master The Design Of Creating Compelling Twitter ‘Calls To Action’ CTAs

When you have found yourself Twitter ‘tweeting’ in the past, have you ever asked yourself…

What ‘option for engagement’ have I included in my Twitter ‘tweet’?

Per Maggie Georgieva of Hubspot (n.d.), learning how to incorporate a ‘Call-To-Action’ (CTA) within your Twitter ‘tweet’ is of great importance when evaluating your primary marketing campaign metrics, especially the gross number of visitors generated by your ‘Primary Engagement Link’ (PEL).

The ‘Primary Engagement Link’ or PEL

Step One: Engage The Premise and Reference Your Source

For example, per the late, great Steve Jobs (1997) of Apple Computer fame, ‘Who Apple Is’ and ‘What Apple Brings To The Table’, and How that ‘What Apple Brings To The Table’ matters to the end-user (customers) of Apple is of paramount importance.


Apple dot com (1997). Marketing The Apple Brand by Steve Jobs [Video File]. Retrieved from

Step Two: Your ‘Primary Engagement Link’ and Add Your PEL to A Corresponding Bundle (BB)

In the above example, the full URL to the targeted content can be customized via

Set up a account for this purpose at

An additional benefit of establishing a account is free tracking of your customized links.

You may also add your new customized link to a corresponding BB, and copy your newly crafted ‘tweet’ as a note attached to your PEL, as follows:

NOTE: Steve Jobs Say: People, Passion, Change C=> #GotSteve?

Step Three: Craft Your Tweet, Add a #Hashtag and Send Via Tweetdeck

Tweet via Tweetdeck: The note you have attached to your PEL becomes the Tweet you transmit to the Twittersphere via your Tweetdeck account and program, as follows:

Steve Jobs Say: People, Passion, Change C=> #GotSteve?

Now, the prompt for your PEL ‘C=>’ starts approximately 25% to 50% of the way through the ‘tweet’ with keywords from the content ‘people’ ‘passion’ and ‘change’ comprising the first 25% of the ‘tweet’.

This tactic assures the end-user (reader) of the ‘tweet’ will be compelled by the keywords or text to ‘click through’ the PEL and get to the content.

In this example, visiting the landing page of the PEL, the surfer is greeted by a You Tube video.

Step Four: Monitor The Results of Your PEL Via Topsy and

In order to review the activity generated by your ‘tweet’ use the ‘#hashtag’ you have selected at the tail end of your tweet to query Topsy’s data base across several social platforms.

You may also review the count generated by your PEL via, as well.

Notice at Topsy there are options to search either the Twitter network or the Google + network for your subject ‘#hashtag’, in this case ‘#GotSteve’.

You can even set up a future alert for the hashtag ‘#GotSteve’ via your email address by logging into Topsy via your Twitter account or via your Facebook account.

Step Five: Market Your New BB

When you have amassed a few articles of ‘like minded’ publication, go ahead and use the same tactic as shown in this tutorial to market your new BB.

This will show yourself to be an expert in the field that you are promoting.

Finally, if you have room, add the secondary #hashtags of ‘#Please‘ and ‘#ReTweet to the tail end of your tweet after your primary ‘#hashtag’.

Dan Zarrella of Hubspot says his research shows a four-fold increase in Twitter RTs if those two words of ‘Please’ and ‘ReTweet’ have been add’d to your tweet, as follows:

Steve Jobs Say: People, Passion, Change C=> #GotSteve? #Please #ReTweet

For additional tips and insights into Internet Marketing, visit my profile page at Linked In or like me on Facebook.

Robert Weber MBA
Scottsdale Arizona USA

Follow me on Twitter @rwebaz


Georgieva, M. (n.d.). The Step-By-Step Guide To Mastering The Design and Copy of Calls-To-Action | Hubspot dot com [Web log post]. Retrieved from

Posted in Internet Marketing | Tagged , , , , , , , , , | Leave a comment

Dynamic Advanced Persistent Cyber Threats (DAPCT)

$20B annually is currently being spent on traditional signature-based defensive tactics against malicious, next-generation Dynamic Advanced Persistent Cyber Threats (DAPCT).

What are corporations getting for their money?

What is their ‘bang-for-the’buck’ from all of their efforts to shore up their data against traditional signature-based cyber threats?

Answer: Not much, according to FireEye, Inc.

“Against dynamic threats, traditional defenses like firewalls, IPS, anti-virus, anti-spam, and security gateways collapse, leaving a wide-open hole for cyber criminals to exploit.”

“Today’s ‘zero-day’ attacks utilize advanced tactics, such as blending polymorphism and personalization, to appear unknown to signature-based tools and yet authentic enough to bypass spam filters and even fool targeted victims.”

Sound familiar? To learn more, visit the FireEye Info Center.

Please participate in our following poll designed to gauge public awareness.


Fire Eye dot com (2012, January 1). Advanced Targeted Attacks: How to Protect Against the Next Generation of Cyber Attacks. FireEye. Retrieved September 9, 2012, from

Posted in Cyber Attacks | Tagged , , , , , , , , , , , , , , , | Leave a comment