Blog Contest 11.11 Rules and Prizes Revealed!

AndrewSmither

Editors Note: Rules updated 11/03/2011 12:52pm; rules were edited and prizes were added; changes will not effect standings or posts prior to this change.

The Great Tech Blog Off is back!  This time we’re pulling out all the stops!  That’s right, we’re having more prizes than ever before as well as more ways to earn entries.  We’ve even created 2 Tiers to make sure you get a fair chance at the prize you want.

So, here’s the rules…

Basic Rules – Bloggers :

1. Blog:   All entries must be ORIGINAL CONTENT.

2.  Submissions must relate to something Eberly Systems is involved with (i.e. Computers, Networking, Phones, Electronics, Power, Security).

3.  Submissions must be at least several paragraphs in length, and must say something worth reading!

4.  You may enter as many times as you like.

5.  Submissions will receive a varying number of “entries” (i.e. tickets in the hat), based on length and quality – varying from 1 entry (a very short “snippet” of an article) to 10 entries (a top quality, page or greater article or review).

6.  Submissions can be made via email to contest@eberlysystems.com, or via the blog directly at www.eberlysystems.com/blog (for this method, create a user and then email contest@eberlysystems.com with your username to request permission to post).

Basic Rules – Promoters :

1. Comment: Don’t have anything to write about? Well, then READ – and leave a few thoughts or observations about someone else’s article on the blog! For the second time, Commenters (who leave QUALITY comments, not just spam) will be given 1 to 3 tickets per comment, based on (you guessed it) the quality and length of their comment!

2. Share: Don’t feel like reading or commenting?  Then you’ll like our newest edition to earning entries – share via Facebook.  Every blog entry we receive that is posted to our website will be posted to our Facebook page.  Once it’s posted to our Facebook page, share it on your wall.  You may share each article that is posted ONCE to your wall, for a Single entry (ticket) each.

3. Recruit: Another new edition to the blog contest is recruiting fans to our Facebook page.  How do you do that?  Simply share our page on your wall, and ask others to ‘like’ our page.  After your friends like our page, they need to comment on our wall, tag you and state that you referred them.  That’s

1. Share page

2. Your friends like page

3. Friends tag you in a comment on our wall, saying they were referred by you

All three must be done to receive an additional entry per recruit.

We are guaranteeing the top 3 people who earn the most entries in each tier a prize.   The top 3 contestant in the Bloggers group and the top 3 in the Promoters group will earn a gift card whether their name is pulled out of the “hat” or not.

Drawings will be done in the following manner…

– First drawn gets first choice of available prizes

– Second drawn gets second choice of available prizes – etc, etc…

Frequently Asked Questions:

Q. Can I be entered into both Authors AND Supporters?  :
A. No, good question though.  Those who write blogs are automatically entered into the “Authors” group.  They CAN earn entries through all means (i.e. Comments, shares, referring “likes”) but all entries earned will go towards the Authors prizes.

Q. What Prizes are offered to Authors?  To Supporters?
A. Authors: Apple iTouch 8gb, Dell Netbook, Gift Cards, random gadgetry, and MORE.
Supporters: Gift cards, stocking stuffers, and a Dell Netbook

Q. Why would I bother writing an article when I can win by easier means?:
A. Another good question. Well, several reasons.
1. There are MORE, “better” (i.e. higher dollar value”), and MORE BETTER prizes in the Authors prize stash.
2. There will likely be FEWER entrants in the Authors group, i.e. less competition, i.e. better chance of WINNING!

IMPORTANT! Your article may NOT be posted immediately! Our goal this contest is to offer a steady stream of articles throughout the month – so to start, we will post every few days – if we have a high volume of submissions, we may post 1 per day – but it all depends on how many we receive, so SUBMIT!

Blog Contest 11.11 has begun!

January 20, 2026
Modern construction and manufacturing sites are no longer just about heavy machinery; they’re digital ecosystems. Tablets, laptops, IoT sensors, and mobile apps are now essential for everything from blueprint access to production monitoring. These tools enable real-time collaboration, safety compliance, and operational efficiency. But when your workforce is spread across remote job sites or large facilities, keeping these systems connected and secure becomes a challenge. Construction Blueprint & Plan Access: Crews use tablets to view updated plans on-site, reducing errors and rework. Safety & Compliance Reporting: Mobile apps allow instant incident reporting and safety checks. Equipment Tracking: IoT sensors monitor heavy machinery usage and maintenance needs. Manufacturing Production Line Monitoring: Tablets and IoT devices track throughput and detect anomalies. Quality Control: Mobile devices capture and share inspection data in real time. Inventory Management: Connected devices streamline material tracking and reduce downtime. These tools keep projects moving, but only if they’re secure, updated, and accessible anywhere. Why Remote Access Is Critical Construction sites and manufacturing plants often operate in remote or rugged environments. Workers need secure, reliable access to company systems, whether they’re in the field, on the shop floor, or traveling between sites. Without proper management, connectivity issues and security gaps can lead to delays, data breaches, and compliance failures. How a Managed IT Services Partner Helps You Win Partnering with a Managed IT Services provider lik e Eberly Systems ensures: Centralized Device Management: Configure, update, and secure all devices remotely using Microsoft Intune. Enterprise-Grade Security: Microsoft Defender protects against threats across IT and OT environments. Identity & Access Control: Microsoft Entra ID enables MFA and conditional access for subcontractors and BYOD scenarios. 24/7 Monitoring & Support: Proactive threat detection and performance monitoring keep operations running smoothly. Scalable Solutions: Whether you have 50 devices or 500, policies and updates roll out automatically. This means your teams can access critical tools and data securely anytime, anywhere, without worrying about downtime or cyber risks. Construction and manufacturing thrive on precision and speed. Technology makes that possible, but only when it’s managed effectively. A trusted Managed IT Services partner doesn’t just keep devices secure, it keeps your business moving, your workforce connected, and your data protected. Ready to empower your teams and safeguard your operations? Contact Eberly Systems today for a free consultation.
By Guest Blogger December 9, 2025
Why Device Management Is Critical
November 4, 2025
Why Cybersecurity Hygiene Matters for SMBs
October 28, 2025
Why Leading with AI Matters for Small and Medium-Sized Businesses
October 10, 2025
Fake CAPTCHA Sites Hijack Clipboard to Install Malware
October 10, 2025
Understanding Business Email Compromise (BEC)
By Kordel Eberly August 17, 2025
Welcome to the Cyber Cold War
fish hook
By Eberly Systems September 20, 2024
We're all in the same boat trying to avoid cybercrime! Here's our top ways to identify a potential phishing attempt.
By Eberly Systems September 10, 2024
Focus on integrating with new team members and new customers