Round 2 BEAD Application Opens August 13, 2025

| 0

Round 2 of the Office of Broadband Development’s (OBD) Broadband Equity, Access and Deployment (BEAD) program application will open August 13, 2025. Round 2 will remain open for applications until 5 p.m. CST on August 20, 2025. Pre-qualification for Round 2 will remain open until August 8, 2025, at 5 p.m.

The basic requirements for Round 1 remain in place for Round 2. However, in Round 2, applicants may define their own project areas as sets of a BEAD-eligible location. Please refer to the Notice of Program Changes due to Federally Restructuring Policy Notice and the Restructuring Application Guide for Round 2 application guidance.

In Round 1, OBD received 563 applications to serve nearly every application area and eligible location in the state, totaling over $3 billion in requested grant funds.

Updated BEAD Timeline

  • Round 2 applications: August 13 – August 20, 5 p.m. CST
  • OBD releases the Draft Final Proposal for public comment: TBD, following NTIA approval
  • OBD deadline to submit Final Proposal to NTIA: September 4

Learn more here: https://ded.mo.gov/programs/community/broadband-equity-access-and-deployment-bead-program

Roles, Goals, and Limitations – Prompting Your Large Language Model Leads to Better Responses

| 0

By Marc McCarty (assisted by several LLMs)

Ever since OpenAI burst on the scene in late 2022 with its free version of ChatGPT many of us have had a love-hate relationship with large language models (LLMs). On the one hand we have been blown away by the capabilities of these chatty, helpful, bots, but on the other we find they sometimes wildly misinterpret what we are asking, or produce results that, while they appear to be accurate and useful, bear no relationship to reality!

In an earlier post I explained how LLMs differ from traditional search engines like Google or Bing, and why this happens.

In this post, I’ll discuss an important tool you can use to improve your interactions with LLMs, and increase the likelihood they will provide relevant, accurate responses. You can do this by developing thoughtful habits that govern how you ask the LLM for assistance. This is called “prompting.”  

What Do We Mean by Prompting?

“Prompting” is just the term used to describe the instructions we provide to an LLM when we initiate an interaction.  Understanding the anatomy of a good prompt can appreciably increase your chance of getting an accurate and relevant information from the LLM.

I believe the three core characteristics of a good prompt can be summarized in three words —Roles, Goals, and Limitations.

Roles: Defining Who’s Who in the Conversation

Assigning clear roles in your prompt guides the LLM to adopt the right tone, expertise, and style when responding, and it can also help the model search out the best training data to use when formulating its response. Defining the roles involves two perspectives:

  • The LLM’s Role: Specify what persona or expertise you want the model to embody. For example, “Act as a financial advisor,” or “You are a high school science teacher.” This helps the model tailor its language, depth, and focus, producing responses that are contextually appropriate and that are aligned with your expectations.
  • The User’s Role: Describe your own background or needs. For example, if you are looking for ideas to plan a vacation, what are the ages and interests of the folks who will be making the trip? This information can help guide the LLM to areas of training more closely aligned to your objectives.

Goals: Clarifying the Desired Outcome

Every effective prompt is anchored in a clear goal. Before you ask, consider:

  • What do you want to achieve? Are you seeking a summary, a detailed explanation, a list of pros and cons, a creative story, or something else? Articulate your objectives explicitly.
  • What does success look like? Describe the ideal output format—should it be a bulleted list, a step-by-step guide, or a concise paragraph? Do you want the response to include specific hyperlinks to websites supporting the response? – Ask for it! Remember, the more specific you are, the more likely the LLM will align its response to fit your needs.

Limitations: Setting the Rules and Boundaries

Outlining the acceptable limits you want to impose on the LLM is important as well, and it can help control the quality and reliability of the output. Think in terms of how you would advise a “human” assistant who was doing research to provide your desired response (your “goals”).

For example, maybe it is very important that the LLM seek out the most current information available. If the model (like most do today) can perform an internet search to update its response, be sure to reinforce the need for it to do that when crafting an answer for you. If you want each assertion provided in the response to contain links to reliable internet-based source material; you can instruct the model to provide those.

It’s also a good idea to ask your LLM not to hallucinate responses. That might sound a bit odd, after if you are asking for advice on the best restaurant for Indian food in Little Rock, why would the LLM ever think you wanted it to make up a dining location to provide that experience? 

The answer is that sometimes users want a creative response, not necessarily an accurate “real world” example. Sometimes users want the LLM to hallucinate – to be “creative” and take existing data and extrapolate and arrange it in new format.  Asking the LLM not to do this (assuming you need factual responses), apparently does reduce the tendency the model has to guess or make up a source information source. Positive requests such as “provide sources for any conclusion that does not involve common knowledge” or “if you have inadequate data to state a conclusion, say so — do not speculate” can help.

You might also insist that the LLM take on your task one step at a time, proceeding to the next step after it has displayed results and received your permission to continue.  This can be particularly useful in helping to direct the model, so it doesn’t waste time and energy going down a path that isn’t relevant or useful.          

A Practical Example: Putting It All Together

Here’s an example of how you might structure a prompt using these three characteristics outlined above:

“You are an AI language model acting as a career counselor. I am a college student with no prior work experience, seeking advice on entering the tech industry. Please provide a step-by-step guide detailing how I can determine what options are available and how I can determine if it would be a good “fit” for me.  Consider what are the most relevant interests, character traits, course selection and life goals. Your response should include major bullet points and subcategories. It should be written in a conversational tone. You should include reputable sources for each step and avoid speculation—stick to verifiable information only.” Limit your response to approximately 750 words.”

  • Roles: AI as career counselor; user as college student.
  • Goals: Step-by-step guide, bullet points, reputable sources.
  • Limitations: No speculation, only verifiable information, citations required, limit length

Experiment, Practice, and Don’t Expect Perfection

We tend to forget that we are at the very earliest stages of learning how best to interact with LLMs. There are many experts out there with ideas about how to work with these cheerful bots. At the same time programmers at each of the companies that created LLMs are constantly working to improve them, to make them more intuitive, responsive and less prone to hallucination. 

For now the best strategy seems to be err on the side of providing LLMs too much, rather than too little, guidance and at least from my experience focusing on the three  characteristics of a good prompting: “roles, goals and limitations” is a simple, yet effective way to produce better, more accurate results from your interactions with LLMs.

However, “better” is not “perfect.” Even if you tell prompt an LLM not to hallucinate a response, it will still do so from time to time. Even if you ask it to provide you with authoritative references, you’ll from time to find it provides you broken website links, or a citation to a source that does not exist. For now, this is an issue we will have to accept. When accuracy is important – as it often is – you simply must check and in some cases double check an LLM’s response to make sure it isn’t “making stuff up.”

Yet, even with these trade-offs, I found that I use a LLMs more each day. While no LLM wrote this Post for me, it did shorten the time needed to spend working on it, and it offered several suggestions to improve on what I wrote. The net result, at least I believe, is a better product, produced in less time.

For me, that is not a bad trade off.

Happy Prompting!

Trust But Verify — How LLMs Differ from Search Engines—and Why They Sometimes Hallucinate

| 0

Large Language Models (LLMs) like ChatGPT and traditional search engines such as Google may both help you find information, but they work in fundamentally different ways. Understanding these differences is key to using LLMs effectively—and to recognizing why LLMs sometimes “hallucinate,” or make up information.

How a Search Engine Works

A traditional search engine such as Google or Microsoft Edge is essentially a giant, constantly updated database of web pages. When you enter a query, the search engine:

  • Scans its index of the web for pages containing your keywords.
  • Ranks those pages by relevance, popularity, and other factors.
  • Shows you a list of links to real, existing web pages for you to explore.

Search engines don’t generate new information—they retrieve what already exists, helping you find the most relevant sources for your query. It’s possible, of course that the information retrieved may be inaccurate, or that your search request may have been incomplete and missed some important information, but a “search engine” is just that, an engine designed to seek out and retrieve information contained somewhere on the internet.

How an LLM Works

An LLM, by contrast, is trained on huge amounts of text data (books, articles, websites) to learn the patterns and relationships between words and ideas. When you ask it a question or request (this is called a “prompt”), an LLM:

  • Analyzes your prompt to understand context and intent.
  • Predicts and generates a sequence of words that best fits your request, based on its training data and learned patterns.

Initially LLMs did not look up answers live on the web (although many now use your prompt to generate an internet search and adds that information to its database). But even in this case the response is generated by “guessing” the most likely next word in a sentence, drawing on what the model was exposed to during training.

Why LLMs Hallucinate

Because LLMs generate text based on statistical patterns—not by checking facts—they can sometimes produce information that sounds plausible, but isn’t true. This is called “hallucination.” For example, if asked about a recent event that happened after its last training update, the LLM might invent details, unless it is able to access real-time data.

Hallucinations can also happen if:

  • The model’s training data was incomplete or contained errors.
  • The prompt is unclear or ambiguous.
  • The model tries to fill in gaps with its best “guess,” even if there’s no factual basis.

Remember, LLMs have no concept of facts/knowledge and just learn statistical patterns of how likely it is one word follows another (given a context).

LLMs with Web Search: A Step Forward (But Not Perfect)

Newer LLMs can now perform real-time web searches to supplement their responses. When you ask a question, these LLMs:

  • Runs an internet search to find relevant, up-to-date information.
  • Incorporates this information into its answer, often providing citations or links.

This hybrid approach—sometimes called Retrieval-Augmented Generation (RAG)—helps the LLM provide more accurate and current answers, especially for recent events or facts outside its training data.

However, even with web search capabilities, LLMs can still hallucinate:

  • They might misinterpret search results or combine information incorrectly.
  • They can still generate plausible sounding but false statements if the search doesn’t return clear or accurate data.
  • The process of merging search results with generated text can introduce new errors or fabrications.

Key Takeaways for Users

  • Search engines retrieve: They show you real, existing web pages that match your keywords.
  • LLMs generate: They create new text based on patterns in their training data, not by looking up facts in real time.
  • LLMs can hallucinate: Because they generate responses, they sometimes make up information that sounds real but isn’t.
  • Web search integration helps: LLMs that use live web search can provide more current, accurate information—but they’re still not perfect and can hallucinate.

Understanding these differences will help you use both tools wisely—and always double-check important facts, especially when using LLMs for critical information.

The Latest Scams and How to Protect Yourself

| 0

If you’re like me, you’ve seen more scams in your email and texts lately. Scammers are constantly evolving their tactics, using new technologies and psychological tricks to deceive people. Fraudsters are leveraging artificial intelligence, impersonation techniques, and digital platforms, such as social media, to target unsuspecting victims. Here’s a breakdown of the latest scams and how you can stay safe.

AI-Powered Scams

Artificial intelligence has revolutionized fraud, making scams more convincing than ever. Criminals use AI-generated voices, deepfake videos, and realistic phishing emails to trick victims into handing over personal information or money.

Deepfake is defined by the Merriam Webster dictionary as an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

How to Protect Yourself:

  • Be skeptical of unexpected messages, even if they appear to be from someone you know.
  • Verify requests for money or sensitive information by contacting the person or organization directly. Do not use the phone numbers in suspicious emails, texts, or phone calls. Use verified numbers the person or company has provided you or you find through an online search.
  • Use multi-factor authentication to secure your accounts. This includes passcodes and passwordless accounts where available.

Imposter Scams

Scammers pose as government officials, bank representatives, or even family members in distress to manipulate victims into sending money or revealing personal details.

How to Protect Yourself:

  • Never trust unsolicited calls or messages requesting money or sensitive information.
  • Verify the identity of the caller by contacting the person or organization directly.
  • Be cautious of urgent requests that pressure you to act quickly.

QR Code Scams

QR codes are being exploited by fraudsters to direct users to malicious websites or install malware on their devices without their knowledge.

How to Protect Yourself:

  • Only scan QR codes from trusted sources.
  • Avoid scanning codes found in unsolicited emails, text messages, or social media posts.
  • Use a QR code scanner that previews the URL before opening it, especially if you weren’t expecting it.

Learn more about QR code scams from the Federal Trade Commission (FTC).

Toll Road Scams

Scammers send fake text messages claiming unpaid toll fees, tricking victims into providing payment details.

How to Protect Yourself:

  • Verify toll payments through official websites rather than clicking on links in text messages.
  • Be cautious of messages threatening immediate penalties or license suspension.

You can find out more about toll road scams from the FTC.

Job Scams

Fraudsters target job seekers with fake employment offers, often requiring upfront payments or personal information.

How to Protect Yourself:

  • Research companies before applying for jobs.
  • Avoid job offers that require payment for training or equipment.
  • Never share sensitive information like your social security number with unverified employers.

Find out more about job scams from Indeed and the FTC websites

Stay Vigilant

Scammers prey on trust and urgency, making it crucial to stay informed and cautious. Always verify unexpected requests, use strong security measures, and report suspicious activity to authorities.

For more details on the latest scams, check out these blogs from AARP, Experian, and Norton.

Breaking Barriers: The Availability of Accessibility Tools

| 0

In a world increasingly reliant on technology, accessibility is no longer an option, it’s a necessity. Built-in tools on major platforms like iOS, macOS, Windows, and Android are transforming the way people with disabilities interact with their devices. These features are not just about usability; they embody empowerment, inclusivity, and independence. Let’s dive deeper into the accessibility options available across these platforms, technologies that work across platforms, and why they matter.

What are Accessibility tools?

Accessibility tools are technologies or features designed to assist people with disabilities or unique needs to interact with and navigate the world more easily. These tools can be physical devices, software, or built-in features within existing technology. Some examples include:

  • Screen readers for individuals with visual impairments, which read text aloud or convert it into braille.
  • Speech-to-text software, which helps those with mobility or hearing challenges by converting spoken words into written text.
  • Closed captioning for videos to assist people who are deaf or hard of hearing.
  • Alternative input devices, like eye-tracking systems or adaptive keyboards, for people with limited motor control.
  • Color contrast options and magnifiers, aiding individuals with low vision.

Why are they important?

Accessibility tools level the playing field by empowering individuals with disabilities to work, communicate, and participate fully in society. They ensure inclusivity, enhance independence, and foster equality by reducing barriers, whether in education, workspaces, entertainment, or daily life.

Let’s take a look at the various tools available in Apple iOS, MacOS, Microsoft, and Android operating systems and applications. These tools are built into the operating system in most cases and have to be activated to be used.

Accessibility tools in iOS and macOS

  • VoiceOver: This tool supports gestures, voice commands, and even Braille displays, allowing users with visual impairments to navigate their devices. VoiceOver also reads contextual information, giving users a more nuanced understanding of their interactions. To learn more about using VoiceOver on iOS and mac OS, check out these articles for the iPhone and Mac computer.
  • Magnifier and Display Accommodations: Whether it’s zooming in on fine print or adjusting colors to cater to light sensitivity, these tools provide more control over how materials are viewed on the screen
  • Sound Recognition: For individuals who are hard of hearing, iOS can listen for specific sounds, like a doorbell or fire alarm, and send alerts.
  • AssistiveTouch: This feature enables on-screen gestures, custom actions, and device control without requiring traditional physical input.

Accessibility tools in Windows

  • Narrator: Narrator is a screen reader tool that continues to evolve with natural-sounding voices, support for new languages, and integration with apps like Microsoft Office.
  • Windows Voice Access: For those who cannot use a keyboard, Windows allows control of the entire device through voice commands. It’s beneficial for users with mobility challenges.
  • Live Captions: Catch every word from any audio in Windows 11. Live Captions automatically transcribes spoken content from any audio, even the microphone. Captioning can be provided for apps and even an in-person conversation.
  • Eye Control: Navigate your PC and apps with your eyes, using Windows 11 eye control and eye-tracking-enabled cameras and a simple launch pad.
  • Focus Assistance: Beyond traditional accessibility, Windows addresses modern challenges like digital distractions. This tool allows users to customize notification settings for better focus.
  • Immersive Reader: Built into Microsoft Edge, reading aids like text spacing, syllable splitting, and line focus are available to support users with dyslexia or ADHD.

Accessibility tools in Android

  • Live Transcribe and Live Caption:  Provide real-time transcription of conversations and captions for media, to assist individuals with hearing impairments.
  • Select to Speak: With a simple tap, users can hear text from the screen read aloud. This is a great feature for users with vision challenges or literacy difficulties.
  • Action Blocks: A unique tool designed for users with cognitive disabilities, Action Blocks allow the creation of customizable shortcuts for frequent actions like calling a loved one or playing a song.

Beyond What’s Built-in

Aside from those built into phones and computers, there are numerous assistive technologies designed to support individuals with disabilities. Here are some examples:

Vision Assistance

  • Screen Readers: Tools like Job Access With Speech (JAWS) and NonVisual Desktop Access (NVDA) convert on-screen text into speech or Braille.
  • Screen Magnification Software: Programs like ZoomText enlarge text and images for users with low vision.
  • OrCam MyEye: A wearable device that reads text aloud and recognizes faces.

Hearing Assistance

  • Hearing Aids with Bluetooth: Devices that connect to smartphones for streaming audio directly.
  • Speech-to-Text Apps: Apps like Ava and Otter.ai transcribe spoken words in real-time.
  • Vibrating Alert Systems: Devices that vibrate to notify users of alarms, doorbells, or phone calls.

Mobility Assistance

  • Adaptive Switches: Devices that allow users with limited mobility to control technology with simple movements.
  • Foot Mouse: Enables users to control a computer using their feet.
  • Wheelchair-Mounted Devices: Tablets or communication boards attached to wheelchairs for easier access.

Cognitive and Learning Assistance

  • Text-to-Speech Software: Tools like Kurzweil 3000 help users with dyslexia or other learning disabilities by reading text aloud.
  • Graphic Organizers: Apps like Inspiration or MindMeister assist with organizing thoughts visually.
  • Reminder and Scheduling Apps: Tools like Google Keep or Todoist help users with memory challenges stay organized.

These tools, combined with the built-in features of operating systems, create a more inclusive environment for individuals of all abilities.

Why Accessibility Tools Matter

Accessibility shouldn’t be an afterthought; it should be by design. It ensures that people of all abilities can participate fully in our digital world. For users with disabilities, these tools aren’t optional; they’re lifelines, facilitating education, communication, and independence.

Moreover, accessibility features often end up benefiting everyone. Think about closed captions in a noisy café or voice commands while driving. By designing for inclusiveness, we create solutions that enhance usability for all.

Looking Ahead

The future of accessibility is exciting, with emerging technologies like artificial intelligence and augmented reality promising even more groundbreaking innovations. However, there’s still work to be done. Collaboration between tech companies, developers, and users will drive progress, ensuring that no one is left behind in this digital age.

Built-in accessibility tools are proof that technology is at its best when it bridges gaps rather than creating them. By exploring and utilizing these features, we can all play a part in building a more inclusive world.

Using Social Media

| 0

Social media platforms are great tools for keeping up with family and friends, making new friends across the world, creating entertaining and informative content, generating business, and exchanging ideas on subjects that are of interest to you. 

These platforms have also become trickier to navigate in today’s world of misinformation, scams, and those who want to shout down or belittle opposing points of view instead of discussing and learning from others.

To navigate any social media platform, you must create an account for the app and be sure to use two-factor authentication to login to the platform.  You’ll also want to create multiple ways to recover your account in the event you forget your password or your account becomes compromised.  Each platform will have a way for you to set up multiple options not only for authentication, but recovery.  You will also want to set your personal information to be private and/or only shared with certain groups.

Let’s talk about some of the more popular social media applications and tips to help you be successful on each of them. 

Facebook is a social media platform allowing users to create profiles, share updates, photos, videos, and connect with friends and family. The platform also offers a variety of features such as groups, pages (for communities of interest, companies, or organizations), and marketplace, making it a hub for personal, professional, and community engagement. With over 2.8 billion monthly active users, Facebook has become one of the most influential social networks globally.

Facebook posts have a maximum character limit of 63,206 characters. This allows for quite a bit of content if you need it! However, keep in mind that shorter posts often perform better in terms of engagement, as they are quicker and easier for followers to read and interact with.

Instagram is a popular social media platform primarily focused on photo and video sharing. Launched in 2010 and later acquired by Facebook, it allows users to post images and short videos; follow friends, celebrities, and brands; and discover content through hashtags and the Explore feature. Instagram also offers features like Stories, Reels, and IGTV (Instagram TV) for more dynamic content creation and consumption. With its visually driven interface, Instagram has become a key platform for self-expression, marketing, and social interaction.

X, previously known as Twitter, is a social media platform where users share short messages called “tweets.” X allows for quick, real-time updates, news, and conversations. Users can follow others, like and retweet posts, and engage with content through hashtags. Known for its 280-character limit, X emphasizes concise communication. It’s widely used by individuals, celebrities, businesses, and news outlets for sharing information and engaging with audiences. Some features for X are only available through the premium subscription which starts at $11/month.

BlueSky is a decentralized social media platform that is a potential alternative to X.  It is gaining popularity and allows the users to create their own communities and rules.  This ability to customize gives you more control over your online experience in BlueSky.  It does focus on free speech for users.  The application is new and has a small user base.

Snapchat allows users to send photos, videos, and messages that disappear after being viewed. With features like Stories, which let users share moments that last 24 hours, and filters, which add creative effects to photos and videos, Snapchat has become popular for its playful and ephemeral approach to communication. It also includes Snap Map for location sharing and Discover for exploring content from publishers and creators. Snapchat is known for its focus on privacy and fun, interactive experiences.

TikTok is a social media platform known for its short-form video content. Users can create and share videos ranging from 15 seconds to 3 minutes, often set to music, featuring various trends, challenges, and creative expressions. The platform offers a range of editing tools and effects, making it easy for users to produce engaging content. TikTok’s algorithm recommends videos based on user interests, creating a personalized and highly addictive experience. It has become immensely popular, especially among younger audiences, for its entertaining and viral nature. 

You’ve certainly read or seen in the media about the potential security concerns over the ownership of TikTok and the law in place that the application needs to be sold to an American company or be banned in the United States.  The ban was upheld by the Supreme Court; however, the incoming presidential administration has signed an executive order halting the ban for 75 days to work through options including a potential deal with 50% American ownership of the platform.  You can keep up to date by visiting the Tik Tok newsroom at https://newsroom.tiktok.com/en-us/.

While there are tips for each social media application that can help make your post more engaging, here are some tips that apply to any post on any social media application:

  • Be Respectful –
    • Treat others online as you would in person.
    • Avoid heated arguments and be considerate of different viewpoints.
  • Think Before You Post –
    • Once something is online, it’s there forever.
    • Make sure your posts reflect how you want to be perceived.
  • Verify Information –
    • With the amount of misinformation out there, always double-check facts before sharing.
  • Protect Your Privacy –
    • Be mindful of what personal information you share.
    • Adjust your privacy settings to control who sees your posts. 
    • Don’t post when you’ll be away from home or vacation photos until after you return home.  Thieves can watch social media to see when people are away.
  • Engage Positively –
    • Supportive and encouraging comments go a long way.
    • Spread positivity!
  • Avoid Oversharing –
    • While it’s great to share highlights of your life, balance it with some offline moments for yourself.
  • Be Authentic –
    • Be true to yourself rather than trying to portray a perfect image. People appreciate authenticity.
  • Keep It Short and Sweet –
    • Most people scroll quickly, so make your point clear and concise.
  • Use Visuals –
    • Photos and videos catch the eye and are more likely to be shared and liked.
  • Ask Questions –
    • Encourage interaction by asking questions or requesting opinions.
  • Tell a Story –
    • Share personal experiences or stories that resonate with your audience.
  • Be Positive –
    • Uplifting and positive content generally gets more engagement and spreads good vibes.
  • Tag Friends –
    • When relevant, tag friends to increase the post’s visibility and engagement.
  • Use Hashtags –
    • Relevant hashtags can help your post reach a broader audience.
  • Timing Matters –
    • Post when your audience is most active, typically mornings, evenings, or weekends.
  • Engage with Comments –
    • Respond to comments on your posts to foster a sense of community.

There are many social media platforms available to share your content with friends, family, and customers.  We’ve shared a few of the most popular ones with you and some tips that can help you be successful with these platforms.  Below are links that will also help you get started.

Facebook:

Instagram:

X:

BlueSky:

Snapchat:

TikTok:

Using Video Calls to Stay Connected

| 0

As our families grow, change, and move and our circle of friends and family extends beyond our local community, staying connected can be challenging. Video calls can offer a personal touch that traditional phone calls and text messages lack. Our experiences during COVID have shown us face-to-face connection is a critical component to our personal well-being.

Key benefits of incorporating video calls into your personal life are:

Face-to-Face Interaction

  • Seeing facial expressions and body language help convey emotions more effectively, fostering a deeper connection.
  • Understanding non-verbal cues can enhance communication and reduce misunderstandings.

Bridging Distance

  • Video calls allow you to stay in touch with friends and family across the globe, making the world feel smaller.
  • Celebrate birthdays, holidays, and special occasions with loved ones, even when you can’t be physically present.

Convenience and Flexibility

  • You can connect with others anywhere and at any time, without the need for travel.
  • Coordinate calls when it is convenient for everyone, accommodating busy schedules and different time zones.

Enhanced Communication

  • Visual cues can help clarify conversations, making it easier to understand and be understood.
  • Video calls tend to be more engaging than voice calls. This is important when connecting with friends and family so everyone feels more connected and willing to engage in conversation.

Strengthening Relationships

  • Frequent video calls can help maintain and strengthen relationships, ensuring you stay updated and an important part of each other’s lives.
  • Video calls can help you provide and receive emotional support during challenging times, offering a comforting presence even from afar.

Learning and Sharing

  • Video calls can allow you to teach and learn new skills, such as cooking or crafting, through interactive video sessions.
  • You can also pass on and receive important skills and family history with others in your family.

Health and Well-being

  • Regular face-to-face interactions can reduce feelings of loneliness and isolation, promoting better mental health.
  • Video calls can be used to encourage each other to stay active and healthy by participating in virtual workouts or wellness activities together.

With the importance of staying connected to our wellbeing, what applications are available to connect us to our family and friends? You may already have these applications on your phone, tablet, or computer, and you will be surprised how many applications are free for personal use.

Below are a few of the advantages and disadvantages of some of the more popular video call applications.

Zoomhttps://www.zoom.com/:

  • Advantages:
    • Very user friendly and easy to set up and use. Can be used either via an app or through a web browser.
    • Supports up to 100 participants in the free version.
    • Features include screen sharing, virtual backgrounds, and breakout rooms.
  • Disadvantages:
    • Security Concerns. When calls are not password protected and\or limited to invitees, the application has faced issues with people joining meetings to disrupt them (Zoom-bombing) and there have been some issues regarding privacy.
    • The free version has a time limit of 40 minutes per video call.
    • Can use lots of resources, like battery, memory, and network connection, from your system.
    • Requires signing up for an account.

Google Meethttps://workspace.google.com/products/meet/:

  • Advantages:
    • Integration: Seamlessly integrates with Google Workspace.
    • Accessibility: Easy to join meetings via a web browser without additional software.
    • Security: Strong security features, including encryption.
    • The free version supports up to 100 people per video call.
  • Disadvantages:
    • Fewer features compared to Zoom, such as no breakout rooms.
    • A Google account is required to host meetings. A Google account gives you access to Google, Mail, and other Google Drive applications (Docs, Sheets, Slides)

Microsoft Teamshttps://www.microsoft.com/en-us/microsoft-teams/teams-for-home :

  • Advantages:
    • Excellent for collaboration with integrated chat, file sharing, and apps.
    • Strong security and compliance features.
    • Integrates well with Microsoft Office apps (Word, Excel, Outlook).
  • Disadvantages:
    • Complexity: Can be overwhelming for new users due to its many features.
    • Resource Usage: Can be heavy on system resources.
    • Learning Curve: Steeper learning curve compared to simpler tools.
    • Requires a Microsoft Outlook Account (https://outlook.com). The free Outlook account gives you access to other Office applications (Word, Excel, Outlook) via web browser or mobile app.

Skypehttps://www.skype.com/en/:

  • Advantages:
    • Skype has been available for several years and is widely recognized.
    • Supports group calls, screen sharing, and file sharing.
    • Available on multiple platforms.
    • Already installed on Windows computers.
  • Disadvantages:
    • Interface has not been updated and most of Skypes features are now part of Microsoft Teams.
    • Can be less reliable with occasional call quality issues.
    • Less robust security features compared to newer platforms.
    • Requires a Microsoft Account.

FaceTime – https://apps.apple.com/us/app/facetime/id1110145091:

  • Advantages:
    • High-quality video and audio calls.
    • Come Installed on Apple devices and integrates well with other Apple applications.
    • Simple and intuitive interface.
  • Disadvantages:
    • Only available on Apple devices. Non-Apple devices can only join FaceTime calls via web browser.
    • Limited to 32 participants in group calls.
    • Fewer features compared to other platforms.

There are also several chat applications that will allow you to make video calls. The two most common are available from Meta, Facebook Messenger, and WhatsApp. Let’s take a look at the advantages and disadvantages of these popular applications.

Facebook Messengerhttps://www.messenger.com/?_rdr%2F:

  • Advantages:
    • Easy to connect with Facebook friends.
    • Supports text, voice, video calls, and games.
    • Available to download on all computers, tablets, and phones.
  • Disadvantages:
    • Concerns over data privacy and security.
    • The presence of ads can be intrusive.
    • Can be heavy on system resources.

WhatsApphttps://www.whatsapp.com/

  • Advantages:
    • The application is widely used and familiar to many.
    • Supports text, voice, video calls, and group chats.
    • Highly secure using end-to-end encryption for security.
  • Disadvantages:
    • Because the application is owned by Meta, who also owns Facebook, there are concerns about possible privacy issues via information sharing between applications.
    • Can consume a lot of data for video calls which may be of concern for those with data caps on their phone data subscriptions or home internet.
    • Fewer customization options compared to other apps.

Video calls are an essential tool for maintaining personal connections in our increasingly digital world. By using one of the many video call or video chat applications, you can enhance your relationships, stay connected with loved ones, and enjoy the many benefits of face-to-face communication, no matter the distance. Choose the application that best suits your needs. Below are links that can help in making your decision. Happy video calling!

Helpful Links:

Successfully Searching for a Job Online

| 0

Successfully Searching for a Job Online

As students look to their graduation day, they will also be looking for that job fits in with their career path. Others will be looking for a new job to move forward in their current careers or to start a new career journey. In all these cases, most jobs are listed online. The entire application process for most jobs is handled online including interviews. This is not only for jobs in large corporations. Companies of all sizes are using personnel recruiting sites such as Indeed, ZipRecruiter, Glassdoor, Monster, LinkedIn, and others to find new employees. To help you navigate the online process, let’s discuss several steps in a successful in your job search.

Step 1: Self-Assessment

Before diving into the job search, take a moment to reflect on your career goals, skills, and preferences. Consider what types of roles you’re interested in, the industries that appeal to you, and your desired salary range. This self-assessment will serve as a foundation for your job search strategy. Your self-assessment will help you look for and apply for the jobs that fit your goals while avoiding jobs that may look great, but in the long run don’t meet your career goals.

Step 2: Research Potential Employers

With your self-assessment complete, identify companies you’re interested in working for and research their culture, values, and recent news. Understand their products/services and how you can contribute. This information will be essential in the next steps of your successful job search.

Step 3: Resume and Cover Letter

Update your resume to reflect your most current experiences and skills. Tailor it to highlight the qualifications most relevant to the job you’re applying for. Many companies are using Applicant Tracking Systems, and now AI, to search through resumes, and highlight candidates before people within the company evaluate the applications. Make sure your relevant educations, skills, and experiences are easily identified.

Similarly, craft personalized cover letters that convey your interest and fit for each position. Do not use a blanket cover letter and just change the names of recruiters or companies. Highlight how your skills, background, and goals fit specifically into the position listed and how your values align with that of the company. Keep the letter to one page.

Step 4: Your Online Presence

Ensure your online presence is professional and up to date. This includes your LinkedIn profile, personal website, or portfolio. Consider setting your online profiles to private or at least limit what is shown to the public. Your online profiles should align with your resume and highlight your professional brand. Make sure that your personal social media helps to highlight your values, hobbies, and any service work within your community. Just remember that what gets shared on the Internet stays on there forever, even if you delete it from your sites.

Step 5: Job Search Engines and Company Websites

Utilize job search engines to find open positions. Diversify your search by visiting company career pages, industry-specific job boards, and professional association websites. Bookmark these sites and set a schedule for regular check-ins. Where possible, configure alerts on job boards and company websites based on your work preferences and criteria. This ensures you’ll receive notifications for relevant openings.

Step 6: Networking

Leverage your professional network by reaching out to contacts who might provide insights or referrals. Attend virtual networking events and webinars to connect with industry professionals and learn about job openings. Leverage LinkedIn to connect with professionals in your field of interest. Engage in discussions, join groups, and follow influencers.

Step 7: Application Process

When applying for jobs online, follow the application instructions carefully. Use keywords from the job description in your resume and cover letter to pass through Applicant Tracking Systems (ATS). Keep track of your applications and follow up as appropriate.

Step 8: Interview Preparation

Prepare for interviews by researching the company and practicing your responses to common interview questions. Consider setting up mock interviews with friends or mentors to refine your delivery and get feedback. Most of your interviews will be online and we will discuss how to prepare for those in our next blog posting.

Step 9: Stay Organized

Keep your job search organized by maintaining a spreadsheet or document where you track the positions you’ve applied for, the dates of application, and any follow-up actions. This will help you manage your applications and stay on top of opportunities. Make sure you follow up with potential employers as appropriate to indicate continued interest in the position and other potential opportunities with the company in the future.

Step 10: Continuous Learning

As you search for jobs, take the opportunity to enhance your skills through online courses, workshops, or certifications. This not only makes you a more attractive candidate but also keeps you engaged and motivated during your job search. Look to improve your digital skills as well as your skills in your chosen field. Improving your skills by learning new applications and improving your skills with application you are already familiar with can improve your application.

Finally, maintain a positive mindset throughout your job search. It can be a lengthy process, so resilience and persistence are key. Celebrate small victories and stay focused on your end goal. By following these steps, you’ll be well-prepared to tackle the online job market and increase your chances of finding a job that aligns with your career aspirations and personal values. Remember, preparation and persistence are the keys to a successful job search. Good luck!

For more information:

11 Tips for an Effective Job Searching Process | Indeed.com  – https://www.indeed.com/career-advice/finding-a-job/job-searching-process

10 Keys To A Successful Job Search (forbes.com)  – https://www.forbes.com/sites/carolinecastrillon/2021/07/25/10-keys-to-a-successful-job-search/

Your Step-By-Step Guide to the Job Search (aarp.org)https://tinyurl.com/AARPJobSearchToolkit

Beyond the Smartphone:

| 0

Why Accessing Online Applications and Information requires more than a phone!

Our smartphones have become our gateway to a vast world of online applications and information from any location, at any time. Whether it’s social media, news updates, or business tools, these devices have transformed the way we interact with the world. However, relying solely on a smartphone for accessing online applications and information comes with inherent limitations. Let’s discuss why you need more than a phone to access the services and information available on the internet today.

Smartphones come in various screen sizes, ranging from compact to large displays. While they offer portability, reading lengthy documents, editing spreadsheets, or designing presentations may be cumbersome on smaller screens. Larger screens, like tablets or desktop monitors provide better readability, space for multitasking, and ergonomic advantages for prolonged use.

Typing extensively on a smartphone’s touchscreen keyboard can be slower and less accurate compared to physical keyboards or styluses available with tablets or laptops. Devices with dedicated keyboards facilitate faster typing, enhancing productivity for tasks like drafting emails, writing reports, or coding.

Web applications can vary in their design and functionality. While mobile apps are built specifically for the smartphone format, web apps need to be responsive and adaptable to different screen sizes and systems. Responsive Design means that web apps are not confined to a single device type and can be accessed through various devices, including tablets, laptops, and desktops, providing users with a seamless experience regardless of the device used. Even if a web application has a responsive design, some functions do not work as well and some not at all on a smartphone.

Certain tasks are accomplished more efficiently on devices other than smartphones. Typing long documents, creating complex spreadsheets, or designing intricate presentations are more comfortably and effectively done on a device with a full-sized keyboard and larger display area. The nature of some applications can demand more robust computing power or a larger screen size than what smartphones offer.

Accessing online applications and information often necessitates reliable and high-speed internet connectivity. While smartphones offer mobile data and Wi-Fi capabilities, network coverage can be inconsistent in certain areas. Devices like laptops or tablets can connect to wired networks or offer stronger Wi-Fi antennas for more stable internet access, crucial for uninterrupted work or streaming.

Multitasking capabilities are essential for professionals juggling multiple applications simultaneously. Smartphones, while capable of multitasking to a certain extent, may not provide the same efficiency as larger devices with split-screen capabilities or multiple windows. Moreover, prolonged use of smartphones may strain eyesight and posture compared to larger screens with adjustable setups.

Security concerns are paramount when accessing sensitive information or using online applications for financial transactions. Devices like laptops or desktops offer more robust security features such as encryption, firewalls, and secure boot options. They also provide better control over data privacy settings and compliance with regulatory requirements.

Tablets, laptops, or Chromebooks do not have to be expensive to provide the size and functionality you need to fully access services and information on the Internet. Take a look at some of these articles that discuss low-cost options for tablets and laptops:

The best cheap tablets of 2024: Expert tested and reviewed | ZDNET

https://www.zdnet.com/article/best-cheap-tablet/

The best cheap tablets in 2024 – our top picks | Tom’s Guide (tomsguide.com)

https://www.tomsguide.com/best-picks/best-cheap-tablets

The Best Cheap Tablets for 2024 | PCMag

https://www.pcmag.com/picks/the-best-cheap-tablets

If you are having trouble affording a tablet, Chromebook, or laptop, PCs for People (https://www.pcsforpeople.org/) may be able to help.  You can also check with local organizations such as the community action agencies that provide community support to see if they provide help in acquiring a tablet or laptop. Local libraries may have computers available to use for services that might be better accessed on a larger screen and with the functionality of a browser on a tablet or computer.

To fully utilize the power and functionality of the applications available online, more than a phone is needed. The cost of the additional tools does not have to break the bank for you to be able to take advantage of all the Internet has to offer.

Dispelling Common VPN Myths

| 0

Virtual Private Networks (VPNs) have become essential tools for enhancing online privacy and security. However, with their increasing popularity, several misconceptions have arisen about what VPNs can and cannot do. Understanding these misconceptions is crucial for users to make informed decisions about using VPNs effectively.

Here are some of the most common myths debunked:

Myth 1: VPNs Provide Complete Anonymity – One of the biggest misconceptions is that VPNs offer complete anonymity online. While VPNs do an excellent job of hiding your IP address and encrypting your data, they are not foolproof. Other methods of tracking, such as browser fingerprinting or cookies, can still identify users. VPNs are one part of a larger privacy toolkit and should be used in conjunction with other privacy measures for better anonymity.

Myth 2: All VPNs Are the Same – Not all VPNs are created equal. There are significant differences in the levels of security, privacy policies, and features offered by various providers. Some may keep logs, offer different encryption standards, or have more robust server networks than others. It’s important to research and compare VPN providers before choosing one.

Myth 3: VPNs Can Make Your Internet Faster – Another common myth is that VPNs can increase internet speed. In reality, the encryption process and rerouting of traffic through VPN servers can sometimes slow down your connection. The impact on speed can vary based on the quality of the VPN service and the distance to the server.

Myth 4: VPNs Are Only for Tech-Savvy Users – VPNs are often thought to be complex and only suitable for advanced users. However, many VPN providers have made significant efforts to create user-friendly interfaces that make it easy for anyone to use their services, regardless of technical expertise.

Myth 5: Free VPNs Are Just as Good as Paid Ones – While free VPNs can be appealing, they often come with limitations such as data caps, slower speeds, and fewer servers. Moreover, some free VPNs may compromise your privacy by tracking your activities or displaying ads. Paid VPNs offer better security and features.

Myth 6: VPNs Are Only for Questionable Activities – There’s a misconception that VPNs are only used for hiding illegal activities. This is far from the truth. Many people use VPNs for legitimate reasons, such as protecting their privacy, securing their data on public Wi-Fi, for work, or accessing content restricted in their region.

Myth 7: VPNs Protect Against All Online Threats – VPNs are excellent for securing your data in transit, but they do not protect against all types of online threats. For instance, they cannot prevent phishing attacks or malware. It’s essential to use VPNs alongside other security measures like antivirus software and safe browsing practices.

Myth 8: VPNs Are Illegal – The legality of VPNs varies by country. In most places, using a VPN is perfectly legal, especially for protecting personal privacy and security. However, some countries have restrictions on VPN use, so it’s important to be aware of the laws in your location.

By understanding these common misconceptions, users can set realistic expectations and use VPNs more effectively as part of their online security strategy. Remember, a VPN is a valuable tool, but not a silver bullet for online privacy and security. It’s one component of a comprehensive approach to safeguarding your digital life.

12 common VPN myths bustedhttps://nordvpn.com/blog/myths-about-vpn/

Common VPN Myths Debunkedhttps://www.bitdefender.com/blog/hotforsecurity/common-vpn-myths-debunked/