Archives for September 2014

Dulce de Leche Cream Custard Recipe

Disclosure: This is a sponsored post in partnership with Coffee-mate.  However, all opinions are my own.

One of my favorite recipes to make during the Fall  is Dulce de Leche Cream Custard.  I serve it as a light dessert  after a meal, as an afternoon with tea or as a delicacy with warm milk in the evening.     It brings welcoming  aromas of a bakery into our home and reminds me of  my mothers baking.  It is also the perfect multi-purpose recipe that can be used to make pastries.   It’s one of my go to recipes because the possibilities with Dulce de Leche Cream Custard are endless.

Coffee-mate recently introduced new flavors that capture the natural flavors of Dulce de Leche and Chocolate Abuelita and are a wonderful way to make traditional recipes with ease.   In addition to using it to add delicious flavors to my coffee, I also use it to make my favorite Holiday recipes.

Dulce_De_Leche_Cream_Custard_03

 

I used Coffee-mate’s Dulce de Leche creamer to make Cream Custard and it is amazing!   I have developed several recipes, but this by far is one of my favorites.   It’s is my favorite ingredient for mult-purpose recipes. To make sure I have enough for the entire family I made 3 batches of Dulce de Leche Cream Custard and stored a batch in a container for future use during the week.

Dulce_De_Leche_Cream_Custard

 

Recipe

Ingredients

1 cup Nestle La Lechera Dulce de Leche Coffee-mate
1 cup milk
2 egg whites
1 egg
1/4 cup cornstarch (maizena)
1/3 cup caster sugar
1 teaspoon vanilla

Directions *

1. In saucepan stir in Coffee-mate La Lechera Dulce de Leche Creamer, milk and egg whites. Bring to boil over medium heat.

2. In a medium bowl, whisk together egg whites and egg. Stir remaining sugar and cornstarch; then stir the mix into egg until smooth. When milk comes to boil, pour it into bowl while mixing. Return mixture to the saucepan and slowly boil, stir constantly to prevent so curdle or scorch on the bottom.

3. Remove from heat and pour into container(s). Refrigerate until chilled before using.

*To make the perfect custard you need to stir continuously.

Giveaway

To celebrate the special occassion, Cofee-mate has offerred to give one of my readers 2 coffee-mate full value vouchers, $25 VISA, Coffee-mate Coasters, Coffee sleeve and a beautiful custom-made mug from Crafty Chica!

The Giveaway prize is valued at $60.  You have the opportunity to win by participating in the giveaway below:

winner_dulce_de_leche_giveaway

Latinas Think Big Innovation Summit

The Latina Think Big Summit was founded by Angelica Perez, PhD to showcases the innovative ideas and talents of Latinas, in a series of short talks. These talks bring successful leaders, tech entrepreneurs, and influencers together in an environment that encourages connection and education.

Latinas_Think_Big_Summit_2014

The conversations surrounding change may begin at the Latina Think Big Innovation Summit but they do not end here. Join us in the movement.   Read the rest at Linkedin – Latinas Think Big Innovation Summit

Wearable Tech | Top 5 Wearable Tech Gadgets

I really love Wearable Technology gadgets.   They are innovative tools that are getting smarter, smaller and connect to your smartphone.   I recently started connecting my Smartphone to wearable tech gadgets to improve my outdoor experience and started using the Fitbit to increase my fitness goals.  Whether you are staying fit, hiking or walking, wearable technology will enable you to stay connected and have quick access to your tech tools. 

These are my top 5 Wearable Devices for a FUNtastic outdoor experience:

fitbit_flex

 

FitBit Flex

The FitBit Flex is a wristband that connects to your smartphone  and captures your daily steps, distance, calories burned, stairs climbed, active minutes and sleep.  It also lets you set health and fitness goals.The best features is the wireless data sync ups to smartphone.
Read the rest at eBay.
eBay_866x250_Guide

Upgrading Your Smartphone

If your looking for an opportunity to flip your smartphone to upgrade to an iPhone 6 consider using eBayForTheWin.  eBay offers the best rates for your old phones and is so sure your phone will sell, if it doesn’t sell, you will receive a $100 eBay coupon for phones listed on eBay between September 1 and October 24.* [restrictions apply].

 

We’re Social! Spread the news!

 

 

Smart Tech Tips | 3 Ways To Avoid Being Hacked

Did the recent celebrity hack occur due to a security vulnerability with iCloud?  We still don’t know the full extent of the compromise.  However, what we do know is that the majority of hacks typically occur with the unknowing assistance of the account owner.  In fact,  most account hacks take place when someone gains access to your username and password via phishing, social engineering or weak passwords.

 

Security Computer Key In Blue Showing Privacy And Safety

Here are 3 smart tech tips to proactively protect yourself from being hacked:

 

Phishing Schemes Protection

Phishing occurs when someone tries to acquire your username, password, credit card numbers or personal information via electronic methods by masquerading as a trustworthy source.  The phishing attack can be as simple as an unsolicited email with a link from  your bank, your internet service provider, retail company or social media account.  However, when you click on the link it redirects you to another link that looks like a clone of the providers website.  The links typically contains malware, viruses or record username and passwords with failed attempts to login into your account.

To protect yourself from Phishing schemes do not click on unrecognizable links or sites from unsolicited sources.  The companies you do business with will NEVER send you unsolicited emails to change your username and account password. Also, make sure to report unsolicited emails to the company to engage IT Security teams.

 

Social Engineering Precautions

Have you ever received an unsolicited phone call or face to face request asking for personal, credit card or user account information about you, your family or coworkers?  This type of hacking technique is referred to as Social Engineering and is also a form of phishing.  The hacker(s) will use human interaction to gain your trust to access to your accounts, company secrets, company assets or strategy.  The sensitive information you unknowingly share is collected and will eventually be used against you to help the hacker bypass security safeguards and make you or your company a victim of fraud or computer access.    The interaction or phone call also leaves a weird feeling in your stomach.

To protect yourself from Social Engineering become aware of the security threat and do not share any personal information.   Minimize the amount of information you share via the phone.  Also, record the full name, phone number, company name of the offender and specific details about the interaction and report it to the affected company to engage IT Security teams.  Also,

Password Computer Key In Green Showing Permission And Security

User Names and Passwords

With the recent hacks it’s critical for online users to take an inventory and record all digital accounts: Facebook, Twitter, Email, iCloud, Instagram, Retail accounts, etc… and periodically change your passwords. Also, make note of accounts you are no longer using and consider deleting the account(s).

The most common way that hackers access user accounts is via weak passwords, such as no passwords required to access accounts, the password simply set as the word, “password” or one of your kids’ names.

To ensure the security of your user accounts:

  1. Set passwords that are 5-7 characters long and include capital letters & special characters.
  2. Change your password periodically by changing 2-3 times per year.
  3. Answer the Security Questions. The questions are put in place by the company for additional security and to protect you. Answer the questions and do not share the information with anyone.
  4. When selecting a new password consider using a paraphrase to create your new password. A paraphrase is a catchy phrase or sentence you can translate to a password.

Example of a password using a paraphrase:

I always ride the teacups at Disneyland
Password example: I@rtt@D

 

To stay informed on the recent Apple iCloud hack, check the Apple Media Advisory – Update to Celebrity Photo Investigation for up to date information.  To protect yourself from similar hacks, proactively take an inventory of your user accounts and start changing those passwords!

Follow

Get every new post delivered to your Inbox

Join other followers: