How Digital Applications Can Help Prepare for Emergencies

| 0

Emergencies are unpredictable, often striking when least expected and turning ordinary life upside down in an instant. From natural disasters like tornadoes, floods, earthquakes, and wildfires to unexpected personal crises such as medical emergencies or power outages, every family benefits from being prepared.

Technology can provide invaluable tools to ensure you are ready for whatever comes their way. Today’s digital applications go far beyond simple weather updates; they enable real-time communication, store vital information, and connect people to resources faster than ever before.

Here are ways and tools you can harness the power of digital applications to be better prepared in any emergency:

Creating an Emergency Plan with Digital Tools

Before an emergency strikes, every individual and family should have a plan in place.  Ready.gov offers a fillable form to help you create a personalized emergency management plan that covers communication strategies, evacuation routes, shelter plans and any special needs you may need such as pets or medical equipment. FEMA’s Family Safety Guide includes the ready.gov planning form as well as tips for building emergency kits, and financial preparedness advice.

You should print the plan out and make sure everyone in your home has a copy. You can also use digital applications to make the planning process more dynamic, accessible, and collaborative.  We recommend testing out the following digital tools:

  • Shared note and document apps: Applications like Google Keep, Evernote, or Microsoft OneNote allow you to create and share your emergency plan, contacts, evacuation routes, and checklists with others. Because these notes are stored in the cloud, everyone with access can view the most up-to-date information from any internet-connected device.
  • Calendar and scheduling apps: Using calendar apps from Google, Microsoft, or Apple, you can schedule emergency drills and set reminders to update supplies or review plans together. Shared calendars ensure that everyone is on the same page.
  • Secure storage for vital documents: Digital vaults such as Dropbox, Google Drive, and OneDrive, can store copies of IDs, insurance papers, medication lists, and other essential documents. In an evacuation, having digital access to these records can be invaluable.
  • Password managers can store passwords to your financial data as well as other online information that may be helpful in an emergency.

Staying Informed with Emergency Alert Apps

Even with a plan in place, keeping informed of emergencies and locating help after the emergency has passed should be an essential component of your plan. Staying ahead of rapidly changing conditions lets families respond quickly and avoid danger. Many digital applications provide real-time alerts, guidance, and news tailored to your location.

  • National and local alert systems: Throughout the US, apps from the Federal Emergency Management Agency (FEMA) and the Red Cross,  provide helpful real time information. For Missourians, the Missouri State Emergency Management website, their social media pages (Facebook and X), and local county emergency management social media feeds are great places to consult for information.  These apps and sites keep you up to date on official warnings for severe weather, natural disasters, and safety threats. The apps also allow you to customize alerts for areas where you or family members live or travel.
  • Weather apps: The Weather Channel, AccuWeather, and NOAA Weather apps, and their websites give real-time updates, radar maps, and forecasts to help families anticipate storms and plan accordingly.  Your local radio or TV stations may also have weather apps with notification services
  • Social media and community networks: Community groups on platforms like Facebook, Nextdoor, and X often share local updates faster than official sources, especially during evolving events. Many law enforcement agencies and emergency services post regular updates on their social media accounts.  When using these community platforms be sure to verify reports with official sources.

Communication in Times of Crisis

When emergencies strike, communication can be challenging; networks may be overloaded, or traditional phone lines disabled. Digital applications may provide resilient methods for staying connected. Some examples include:

  • Messaging apps: WhatsApp, Signal, and Telegram use data networks, allowing families to communicate if cell towers are down but Wi-Fi is available. Group chats can quickly update everyone on safety status and plans.
  • Location Sharing Apps: Life360, Find My on Apple Devices, and Google Maps location sharing let family members monitor each other’s whereabouts in real time, crucial during evacuation or search situations.

Organizing Supplies and Resources

Being prepared means having the right supplies available. Digital applications help families track inventory, set reminders for replacements, and create shopping lists. Try:

  • Inventory and checklist apps: Apps like PackPoint and simple note apps help track what’s in your emergency kit, such as flashlights, batteries, water, non-perishable food, medicines and can prompt you to replace expired items.
  • Shopping list apps: Grocery apps like AnyList or OurGroceries can maintain lists of needed supplies and share them with all family members. This is helpful for restocking before a predicted event.

Medical Preparedness with Health Apps

Emergencies often include medical challenges. Digital health apps make vital information accessible, coordinate care, and help family members manage medications.  You may want to explore:

  • Medical ID apps: The built-in Medical ID feature on smartphones (iOS Health, Android Emergency Information) lets you list allergies, medical conditions, and emergency contacts. First responders can access this information even if your phone is locked.
  • Medication tracking apps: MyTherapy, Medisafe, or CareZone remind users to take medications and help families monitor treatment regimens.  If your Primary Care Physician or hospital uses a healthcare portal, you can likely track medications and healthcare needs with these apps as well.

Practicing Drills and Building Knowledge

Knowledge is just as important as supplies. Digital applications offer interactive guides, video tutorials, and simulations to help families practice emergency procedures.  Some educational materials to consider:

  • Educational apps: The Red Cross Emergency app and Ready.gov’s resources include step-by-step guides for fire, earthquake, and flood preparedness, plus quizzes and interactive checklists.
  • Video and simulation platforms: YouTube and other video platforms offer demonstrations of CPR, first aid, and evacuation techniques. Watching or practicing these skills together can make a world of difference when minutes count.

Final Thoughts: Technology as a Lifeline

Emergencies will always carry uncertainty, but digital applications offer families tools to turn confusion into clarity, isolation into connectivity, and fear into readiness. By integrating these apps into your daily routine, storing emergency plans in the cloud, setting up notification alerts, tracking supplies, coordinating communication, and practicing drills, your family can face any challenge with confidence.

Start building your plan online and on paper: choose one or two apps from each category and make preparedness a family project. Review resources together, test your plans, and ensure everyone knows how to access critical information. Technology can’t prevent emergencies, but it can empower families to prepare, respond, and recover with resilience.

For further reading and resources, consider exploring:

How AI Can Help with Your Online Job Search

| 0

In a previous blog we discussed fundamental steps to successfully search for a job online.  To take your online job search to the next level, artificial intelligence (AI) may be the key. In this blog, we will explore AI tools to help with your job search, interview preparation, career planning, and more.

AI can help match you with the jobs that fit your skills, experiences, and preferences for location, salary, and other factors. There are several AI tools that can be helpful in matching you to positions. Two such tools are Jobright and Sonara.  Jobright scans resumes and job descriptions to calculate matches and suggest insider connections for referrals. Sonara automates the application process, submitting applications on your behalf, while continuously searching for new openings.

AI tools can also help get noticed by crafting the perfect resume and cover letter that are application tracking system friendly. Tools like Enhancv, KickResume, and Resume.io offer real-time feedback and improvement suggestions to help tailor resume and cover letters so your materials stand out.

AI tools can also help with interview preparation. FinalRound and Boterview simulate interviews by asking industry or profession-specific questions and providing feedback on your responses. Interview preparation AI tools can help you refine your communication and help build confidence for your interview.

Some of these tools go beyond helping you find your next job by helping you develop a personalized career path, identify long-term goals, and pin down steps needed to achieve them. Tools like Wobo and JobCopilot help identify skill gaps and suggest learning recommendations, and provide ongoing support through AI-powered coaching.

It is important to recognize that most of these services have a fee associated with them based on the level of service you wish to receive. To get a full breakdown of AI tools to help with job searching, resume and cover letter creation, interview preparation, and career coaching, check out JobCopilot’s blog post covering 12 AI tools.

Remember, these AI tools are to assist you in crafting your application and landing the perfect job for you. You still need to make sure you use these tools wisely in your search.

Here are a few things from ChiefJobs blog on the 7 Best Practices for Using AI When Applying for Jobs Online to keep in mind while using AI tools in your quest for your first or your next step in your career journey:

  1. Tailor your resume with AI but keep it real. It’s always important to review and edit anything created by AI. Make sure the tool doesn’t embellish your resume or overstate your career goals and accomplishments. Ensure the resume sounds like you.
  2. Craft personalized cover letters. Let AI help you structure your letter, but make sure you inject your own motivations and stories into it. Be sure to mention specific achievements. Use the tools to give you the first draft, but don’t rely on them for the final letter.
  3. Use the AI tools for job matching and make sure to set up alerts to notify you when jobs are found. Use filters and searches for job classifications, locations, and other preferences within the tools.
  4. Make use of the AI tools for interview preparation and practice. Use feedback on tone, filler words and delivery to improve your clarity and confidence. Make sure the AI tool is using industry specific questions to help refine your responses.
  5. Stay authentic and ethical. AI is a tool, not a substitute for your personality and experience. Use AI to augment your voice, not replace it. Recruiters value authenticity.

For more information about using AI in your job search:

Roles, Goals, and Limitations – Prompting Your Large Language Model Leads to Better Responses

| 0

By Marc McCarty (assisted by several LLMs)

Ever since OpenAI burst on the scene in late 2022 with its free version of ChatGPT many of us have had a love-hate relationship with large language models (LLMs). On the one hand we have been blown away by the capabilities of these chatty, helpful, bots, but on the other we find they sometimes wildly misinterpret what we are asking, or produce results that, while they appear to be accurate and useful, bear no relationship to reality!

In an earlier post I explained how LLMs differ from traditional search engines like Google or Bing, and why this happens.

In this post, I’ll discuss an important tool you can use to improve your interactions with LLMs, and increase the likelihood they will provide relevant, accurate responses. You can do this by developing thoughtful habits that govern how you ask the LLM for assistance. This is called “prompting.”  

What Do We Mean by Prompting?

“Prompting” is just the term used to describe the instructions we provide to an LLM when we initiate an interaction.  Understanding the anatomy of a good prompt can appreciably increase your chance of getting an accurate and relevant information from the LLM.

I believe the three core characteristics of a good prompt can be summarized in three words —Roles, Goals, and Limitations.

Roles: Defining Who’s Who in the Conversation

Assigning clear roles in your prompt guides the LLM to adopt the right tone, expertise, and style when responding, and it can also help the model search out the best training data to use when formulating its response. Defining the roles involves two perspectives:

  • The LLM’s Role: Specify what persona or expertise you want the model to embody. For example, “Act as a financial advisor,” or “You are a high school science teacher.” This helps the model tailor its language, depth, and focus, producing responses that are contextually appropriate and that are aligned with your expectations.
  • The User’s Role: Describe your own background or needs. For example, if you are looking for ideas to plan a vacation, what are the ages and interests of the folks who will be making the trip? This information can help guide the LLM to areas of training more closely aligned to your objectives.

Goals: Clarifying the Desired Outcome

Every effective prompt is anchored in a clear goal. Before you ask, consider:

  • What do you want to achieve? Are you seeking a summary, a detailed explanation, a list of pros and cons, a creative story, or something else? Articulate your objectives explicitly.
  • What does success look like? Describe the ideal output format—should it be a bulleted list, a step-by-step guide, or a concise paragraph? Do you want the response to include specific hyperlinks to websites supporting the response? – Ask for it! Remember, the more specific you are, the more likely the LLM will align its response to fit your needs.

Limitations: Setting the Rules and Boundaries

Outlining the acceptable limits you want to impose on the LLM is important as well, and it can help control the quality and reliability of the output. Think in terms of how you would advise a “human” assistant who was doing research to provide your desired response (your “goals”).

For example, maybe it is very important that the LLM seek out the most current information available. If the model (like most do today) can perform an internet search to update its response, be sure to reinforce the need for it to do that when crafting an answer for you. If you want each assertion provided in the response to contain links to reliable internet-based source material; you can instruct the model to provide those.

It’s also a good idea to ask your LLM not to hallucinate responses. That might sound a bit odd, after if you are asking for advice on the best restaurant for Indian food in Little Rock, why would the LLM ever think you wanted it to make up a dining location to provide that experience? 

The answer is that sometimes users want a creative response, not necessarily an accurate “real world” example. Sometimes users want the LLM to hallucinate – to be “creative” and take existing data and extrapolate and arrange it in new format.  Asking the LLM not to do this (assuming you need factual responses), apparently does reduce the tendency the model has to guess or make up a source information source. Positive requests such as “provide sources for any conclusion that does not involve common knowledge” or “if you have inadequate data to state a conclusion, say so — do not speculate” can help.

You might also insist that the LLM take on your task one step at a time, proceeding to the next step after it has displayed results and received your permission to continue.  This can be particularly useful in helping to direct the model, so it doesn’t waste time and energy going down a path that isn’t relevant or useful.          

A Practical Example: Putting It All Together

Here’s an example of how you might structure a prompt using these three characteristics outlined above:

“You are an AI language model acting as a career counselor. I am a college student with no prior work experience, seeking advice on entering the tech industry. Please provide a step-by-step guide detailing how I can determine what options are available and how I can determine if it would be a good “fit” for me.  Consider what are the most relevant interests, character traits, course selection and life goals. Your response should include major bullet points and subcategories. It should be written in a conversational tone. You should include reputable sources for each step and avoid speculation—stick to verifiable information only.” Limit your response to approximately 750 words.”

  • Roles: AI as career counselor; user as college student.
  • Goals: Step-by-step guide, bullet points, reputable sources.
  • Limitations: No speculation, only verifiable information, citations required, limit length

Experiment, Practice, and Don’t Expect Perfection

We tend to forget that we are at the very earliest stages of learning how best to interact with LLMs. There are many experts out there with ideas about how to work with these cheerful bots. At the same time programmers at each of the companies that created LLMs are constantly working to improve them, to make them more intuitive, responsive and less prone to hallucination. 

For now the best strategy seems to be err on the side of providing LLMs too much, rather than too little, guidance and at least from my experience focusing on the three  characteristics of a good prompting: “roles, goals and limitations” is a simple, yet effective way to produce better, more accurate results from your interactions with LLMs.

However, “better” is not “perfect.” Even if you tell prompt an LLM not to hallucinate a response, it will still do so from time to time. Even if you ask it to provide you with authoritative references, you’ll from time to find it provides you broken website links, or a citation to a source that does not exist. For now, this is an issue we will have to accept. When accuracy is important – as it often is – you simply must check and in some cases double check an LLM’s response to make sure it isn’t “making stuff up.”

Yet, even with these trade-offs, I found that I use a LLMs more each day. While no LLM wrote this Post for me, it did shorten the time needed to spend working on it, and it offered several suggestions to improve on what I wrote. The net result, at least I believe, is a better product, produced in less time.

For me, that is not a bad trade off.

Happy Prompting!

Trust But Verify — How LLMs Differ from Search Engines—and Why They Sometimes Hallucinate

| 0

Large Language Models (LLMs) like ChatGPT and traditional search engines such as Google may both help you find information, but they work in fundamentally different ways. Understanding these differences is key to using LLMs effectively—and to recognizing why LLMs sometimes “hallucinate,” or make up information.

How a Search Engine Works

A traditional search engine such as Google or Microsoft Edge is essentially a giant, constantly updated database of web pages. When you enter a query, the search engine:

  • Scans its index of the web for pages containing your keywords.
  • Ranks those pages by relevance, popularity, and other factors.
  • Shows you a list of links to real, existing web pages for you to explore.

Search engines don’t generate new information—they retrieve what already exists, helping you find the most relevant sources for your query. It’s possible, of course that the information retrieved may be inaccurate, or that your search request may have been incomplete and missed some important information, but a “search engine” is just that, an engine designed to seek out and retrieve information contained somewhere on the internet.

How an LLM Works

An LLM, by contrast, is trained on huge amounts of text data (books, articles, websites) to learn the patterns and relationships between words and ideas. When you ask it a question or request (this is called a “prompt”), an LLM:

  • Analyzes your prompt to understand context and intent.
  • Predicts and generates a sequence of words that best fits your request, based on its training data and learned patterns.

Initially LLMs did not look up answers live on the web (although many now use your prompt to generate an internet search and adds that information to its database). But even in this case the response is generated by “guessing” the most likely next word in a sentence, drawing on what the model was exposed to during training.

Why LLMs Hallucinate

Because LLMs generate text based on statistical patterns—not by checking facts—they can sometimes produce information that sounds plausible, but isn’t true. This is called “hallucination.” For example, if asked about a recent event that happened after its last training update, the LLM might invent details, unless it is able to access real-time data.

Hallucinations can also happen if:

  • The model’s training data was incomplete or contained errors.
  • The prompt is unclear or ambiguous.
  • The model tries to fill in gaps with its best “guess,” even if there’s no factual basis.

Remember, LLMs have no concept of facts/knowledge and just learn statistical patterns of how likely it is one word follows another (given a context).

LLMs with Web Search: A Step Forward (But Not Perfect)

Newer LLMs can now perform real-time web searches to supplement their responses. When you ask a question, these LLMs:

  • Runs an internet search to find relevant, up-to-date information.
  • Incorporates this information into its answer, often providing citations or links.

This hybrid approach—sometimes called Retrieval-Augmented Generation (RAG)—helps the LLM provide more accurate and current answers, especially for recent events or facts outside its training data.

However, even with web search capabilities, LLMs can still hallucinate:

  • They might misinterpret search results or combine information incorrectly.
  • They can still generate plausible sounding but false statements if the search doesn’t return clear or accurate data.
  • The process of merging search results with generated text can introduce new errors or fabrications.

Key Takeaways for Users

  • Search engines retrieve: They show you real, existing web pages that match your keywords.
  • LLMs generate: They create new text based on patterns in their training data, not by looking up facts in real time.
  • LLMs can hallucinate: Because they generate responses, they sometimes make up information that sounds real but isn’t.
  • Web search integration helps: LLMs that use live web search can provide more current, accurate information—but they’re still not perfect and can hallucinate.

Understanding these differences will help you use both tools wisely—and always double-check important facts, especially when using LLMs for critical information.

Biometrics as part of Secure Logins

| 0

We’ve recently discussed the future of secure online logins and moving toward methods that eliminate passwords.  One of the methods discussed was the use of biometrics. Let’s take a look at how biometrics work and the advantages and issues to be aware of when using them to secure your accounts.

Many of us are familiar with facial recognition on our smartphones and tablets. This is one method of biometric authentication. Fingerprints, iris or retinal scans, voice pattern recognition, and even your typing rhythm can be used to authenticate you. Biometrics are something you are, like your fingerprint, versus something you know, like a password or something you have, like an authentication app or hardware token.

Biometrics can’t easily be replicated or shared. The biometric information you use is encrypted, making it hard to steal. Sites and applications also use methods called liveness detection to make sure it’s you trying to login and not a picture, deepfake video, or copy of your fingerprint.

To enhance security even more, artificial intelligence (AI) is increasingly used alongside biometrics to help decipher between human and fraudulent login attempts. Applications used by Uber and JPMorgan are already using AI powered biometrics for login and fraud prevention.

Biometric information can be used as part of a multi-factor authentication scheme when passwords are used removing the need for SMS texts or an authentication app. You may have read news articles related to how SMS-text authentication has been compromised and the recommendation from security experts is to move to passkeys, passwordless logins or another form of secondary authentication. Biometric information may be one solution to more secure authentication.

While biometrics can offer freedom from passwords and the potential for greater account security, there are some things to consider.

Your biometric data (face, fingerprint voice) are permanent. If your biometric information is compromised, such as through a security breach, you can’t change it. Make sure you check how the company or application stores your biometric information and that it’s encrypted and not shared with third parties. Also check to make sure that the systems the applications use to authenticate through biometrics are designed to detect attempts to login in using photos, videos, or copies of you fingerprint.

While there are no federal regulations regarding the use and protection of biometrics. Several states have enacted regulations regarding their use.

For more information on the subject of biometrics and secure logins, check out these sites:

Which Operating System Should I Choose?

| 0

To help you purchase a new computer or tablet, we’ve discussed important jargon and what to consider when choosing a new or refurbished device. But we haven’t yet fully discussed different computer operating systems and choosing the right one for you.

The major operating systems (OSs) for computers are Windows, MacOS, and ChromeOS. The available operating systems for tablets include Android, iPadOS from Apple, Windows, and ChromeOS.

There are other OSs available for computers and tablets. Most are based on Linux, which is an open-source operating system. Open-source software or OSs are defined by the source code of the program being available to programmers to customize and provide security updates and new features to the software. These programmers form communities and share updates and information as well as provide support to users of the software via online documentation and videos. These OSs are free to download and use in most situations and can help extend the life of a computer that is not capable of being updated to the latest versions of Windows, Android, or the Apple operating systems (MacOS or iPadOS). Open-source operating systems might be a good choice for those that have more experience with computers and want to learn something new. Examples of Linux based operating systems are Ubuntu, Debian, and Kubuntu.

When looking at computers or tablets and the various OSs you’ll need to decide what the primary use of your device will be. Will you be using it to access information via the web and email, using productivity apps for home or business use, or doing design work such as creating graphics, designs, or audio, and video? The applications you will use can help decide which operating system and even which computer or tablet you decide to purchase.

Let’s go over the advantages and disadvantages of each of the operating systems for desktop and laptop computers.

Windows:

  • Advantages:
    • Versatility: Works on a wide range of devices, from budget to high-end.
    • Software compatibility: Supports a variety of applications, including gaming and professional software.
    • Customization: Allows users to tweak settings and personalize their experience.
  • Disadvantages:
    • Security risks: Because it is widely used, more malware and viruses are written to try and take advantage of the Windows operating system.
    • Frequent updates: Some users find Windows updates disruptive. Frequent updates are also an advantage for the operating system as upgrades include security updates and new features.
    • Performance variability: Runs on many different hardware configurations, leading to inconsistent performance.

MacOS:

  • Advantages:
    • Optimized performance: Works seamlessly with Apple hardware.
    • Security: Because the operating system is not as widely used as Windows, fewer malware and viruses are written for the operating system.
    • User-friendly interface: Intuitive design, great for creatives and professionals in visual design, architecture, engineering, audio, and video development.
  • Disadvantages:
    • Limited hardware choices: Only available on Apple devices.
    • Higher cost: Apple computers tend to be more expensive.
    • Software restrictions: Some applications, especially games, may not be available.

ChromeOS:

  • Advantages:
    • Affordability: Generally, the most budget-friendly option.
    • Simplicity: Designed for web-based tasks, making it easy to use.
    • Security: Automatic updates and built-in virus protection.
  • Disadvantages:
    • Limited offline functionality: Heavily reliant on internet access.
    • Software limitations: Cannot run traditional desktop applications like Windows or MacOS because it must be connected to the Internet.
    • Hardware constraints: Less powerful than Windows or MacOS devices.

Linux based Operating Systems:

  • Advantages:
    • Open-source and free: Several versions available for download.
    • Highly customizable: Allows you to choose how you work with the operating system.
    • Secure and stable: Updates are available, and the operating systems are updated based on community efforts.
    • Large community support: The communities for these operating systems not only provide updates, but support users on issues and how-to’s for using the operating systems.
  • Disadvantages:
    • Steeper learning curve for beginners: No manuals for the OS. You have to rely on community forums and online help for support and the how-to’s on using the OS.
    • Some software may not be compatible: You have to check if a Linux alternative exists or if you have to use a web version of the application.
    • Hardware support varies by distribution: Online research is needed to determine if OS is compatible with your hardware.

Each tablet OS caters to different needs just like the computer OSs. Let’s look at the unique advantages and disadvantages for each:

iPadOS (Apple):

  • Advantages:
    • Optimized Performance: Available only on Apple hardware, ensuring smooth performance.
    • Security: Strong security and privacy features.
    • Extensive app ecosystem: The Apple app store has a variety of productivity applications, games, and other services.
    • Work and communicate between devices: Seamless integration with other Apple devices.
  • Disadvantages:
    • Limited hardware choices: Limited to Apple tablets (iPads).
    • hardware costs: Expensive compared to other tablet options.
    • Less customization: Not as customizable compared to Android.

Android:

  • Advantages:
    • Hardware choice: Available on a wide range of tablets from different manufacturers.
    • Customization: Highly customizable with widgets and third-party apps.
    • Application Availability: Large app ecosystem via Google Play Store.
    • Multiple users: Supports multiple user profiles.
  • Disadvantages:
    • Manufacturer added programs: Some tablets come with added and often unwanted software from the manufacturer or vendor (bloatware).
    • Update Variability: Software updates can be inconsistent with different manufacturers.
    • Security issues: Security risks due to open-source nature.

Windows:

  • Advantages:
    • Desktop\laptop experience: Menu, applications, and other features are the same as the desktop.
    • Windows Software: Great for productivity with support for the computer versions of Microsoft Office and other professional software available for use and not just tablet versions.
    • Familiar accessories: Tablets can be compatible with external desktop accessories like keyboards and mice.
  • Disadvantages:
    • Not as touch screen friendly: Less optimized for touch-based interactions compared to iPadOS and Android.
    • Fewer apps: Limited tablet-specific apps.
    • Hardware costs: Can be more expensive and heavier than other tablets.

ChromeOS:

  • Advantages:
    • Performance: Lightweight and fast, ideal for web-based tasks.
    • Security: Secure with automatic updates.
    • Hardware cost: Affordable compared to Windows and iPadOS tablets.
  • Disadvantages:
    • Needs to be connected: Limited offline functionality when not connected to the Internet.
    • Software Compatibility: Cannot run traditional desktop applications.
    • Hardware performance: Less powerful hardware compared to Windows tablets.
    • Optimized for hardware:  ChromeOS can be run on other devices but is optimized for Chomebooks and tablets.

Choosing the right computer or tablet depends on what you want to do with the device, and which applications you need to accomplish those tasks. That will drive your decision on which operating system to choose.

For more information on operating systems, check out these articles:

Open Box and Refurbished Computers or Tablets – What to Consider

| 0

In previous blogs we’ve discussed the need for more than a smartphone and  what to look for when buying a new tablet or computer.  As you shop for a new device, you may want to consider saving money by purchasing an open-box or refurbished computer or tablet.

Open-box devices are usually returns that have been opened and either not used or started to be used and then reset and returned. Often, they come in almost pristine condition and may have minor cosmetic blemishes. They’re typically priced lower than brand-new items.

Refurbished devices are products that have undergone testing, repair, and cleaning, restoring them to a condition that meets quality standards. They can be factory-refurbished (by the original manufacturer) or restored by a third-party specialist.

When shopping for either an open-box or refurbished device, here are some things to consider:

  • Certification and Testing: Look for devices that are manufacturer-certified or have been through a thorough, accredited refurbishment process. Manufacturer-refurbished products, for example, typically endured rigorous testing and meet strict quality standards. They often include original parts and have been restored to nearly new performance levels. Third-party refurbishment can also be reliable but read the fine print to know exactly what testing has been done.

  • Warranty and Return Policy: A solid warranty can be your safety net if the device develops unexpected issues. Most refurbished and open-box devices come with a limited warranty, ranging from 30 days to a full year. Check the vendor return policy. A return policy allows you to try the device risk-free, ensuring that if it doesn’t meet your expectations, you have options.

  • Physical Condition: Ensure the description outlines the cosmetic and functional condition. Minor cosmetic imperfections might be acceptable, but make sure they don’t affect usability.

  • Accessories: Verify whether the device includes key accessories, such as chargers, cables, and sometimes original packaging. Missing accessories could mean additional out-of-pocket expenses. The original packaging can also help with resale value should you decide to sell the device later.

  • Updates: Confirm that the device is compatible with current or upcoming software updates. This is especially important for security patches and smooth, ongoing performance. Older devices can be left out of future security patches and operating system updates. This should be evaluated when deciding on your purchase.

  • Clean installations: Look for a system that’s been recently reset or preloaded with a clean version of the operating system. Avoid buying a system that was just updated but may have software and applications installed by the previous owner or vendor.

  • Battery Condition: Check on the condition of the battery in the device. Ask for the battery’s health status or cycle count. Batteries naturally wear down over time, and a refurbished device might have older battery cells. If possible, choose a device where the battery has been replaced or tested to perform near new standards.

  • Vendor Reputation: Check the seller’s reputation and customer reviews. Purchase your open-box or refurbished device from a reputable vendor known for their quality refurbishment processes and excellent customer service. Read the customer reviews and check out vendor ratings on platforms like Amazon Renewed, Best Buy Outlet, or eBay’s certified refurbishers. Positive reviews from other buyers provide extra assurance about the quality and reliability of both the product and the vendor

  • Price versus Risk: Balance your savings with the potential risks to purchasing an open-box or refurbished device. Look beyond just the reduced price; consider the potential trade-offs. A steep discount might be enticing, but if the device lacks a warranty or has known battery issues, the risk might outweigh the savings. Weigh any potential future costs (like battery replacements or additional accessories) against the initial savings to get a true picture of the deal.

Purchasing an open-box or refurbished device is a terrific way to save money if you know what to look for when making your decision. Purchasing a device that is certified and has a good warranty from a trusted vendor with a good return policy helps to make the decision easier. Doing the research and taking your time can ensure you purchase a device that meets your needs and delivers the performance you need.

For more information:

Accessing Books Online: A Guide to Free and Paid Options

| 0

In recent posts we’ve talked about video streaming services, music services, and online gaming.  An additional form of entertainment we haven’t covered is books. While many of us still like the feel of a book in our hands, having access to books online gives us convenience and options to access books we might not be able find locally. Whether you’re looking to read fiction, academic texts, or even audiobooks, there are a wide variety of platforms offering both free and paid options. Let’s take a look at some of the ways to access books online.

Free Online Book Resources

If you’re looking for free options to access books online, there are several platforms that offer vast libraries of free, downloadable, or borrowable books.

Public Domain & Open Access Platforms

  • Project Gutenberg
    If you’re a fan of classic literature, Project Gutenberg is a treasure trove. It provides over 60,000 free eBooks, including works from authors like Shakespeare, Jane Austen, and Mark Twain. These books are in the public domain, meaning they are free to download and read. You can download the books in various formats, including ePub, Kindle, and plain text.
  • LibriVox
    For audiobook lovers, LibriVox offers free audiobooks of public domain works, read by volunteers from all over the world. It’s the perfect solution if you prefer listening over reading, and you’ll find a huge range of classic novels and literary works available.
  • Internet Archive & Open Library
    The Internet Archive is an ambitious project to digitize books, movies, and other media. It houses millions of free texts, from historical documents to modern-day books. The Open Library, a subsidiary of the Internet Archive, is a global initiative aiming to create a web page for every book ever published. While the books are often available for borrowing digitally, some can be downloaded for free.
  • Google Books
    Google Books provides access to millions of books, many of which are fully available in the public domain or with a preview option. Although not all books are free, Google Books often allows you to view a significant portion of a book before deciding whether to buy or search for a free version elsewhere.
  • Directory of Open Access Books (DOAB)
    DOAB provides access to academic books that are published under an open-access license, meaning they are free to read, share, and download. If you’re in need of scholarly resources, DOAB is an invaluable tool. This can be a great way for students in college to save funds on textbooks where the courses use open access license materials.

Library Services: Borrowing Books Online

Public libraries have gone digital too! Many libraries now offer online borrowing services for ebooks and audiobooks.

Digital Library Platforms

  • OverDrive & Libby
    If you have a library card, you can access OverDrive’s website to borrow ebooks and audiobooks. OverDrive’s app, Libby, is user-friendly and compatible with most devices, making it a go-to service for library patrons. The platform boasts millions of titles across various genres and is available to users worldwide, depending on their library’s licensing agreements.
  • Hoopla Digital
    Hoopla is another great option linked to many public libraries. It offers not only ebooks and audiobooks but also movies, music, comics, and TV shows. Depending on your library’s partnership with Hoopla, you can borrow content for free using your library card.

Paid Book Platforms

While free resources are abundant, paid services often provide access to a wider range of titles, including the latest releases, exclusive content, and bestsellers.

Subscription-Based Services

  • Amazon Kindle Unlimited
    Amazon’s Kindle Unlimited program offers an all-you-can-read subscription service, providing access to over 4 million ebooks and audiobooks. With a monthly subscription fee, you can read as many books as you want from the Kindle Unlimited catalog. The service works with any Kindle device or the free Kindle app available on smartphones, tablets, and PCs.
  • Scribd
    Scribd is another subscription-based service offering unlimited access to a large library of ebooks, audiobooks, and even documents. With a monthly subscription, you can access books across genres, as well as magazines, sheet music, and more. Scribd is popular among readers who like to explore a wide variety of content.
  • Audible
    Owned by Amazon, Audible is the world’s largest provider of audiobooks. With a subscription, you get one credit per month, which can be exchanged for any audiobook, plus discounts on additional purchases. Audible is particularly popular among audiobook listeners, offering a massive catalog that spans genres from fiction to self-help.

Ebook Purchases and Rentals

  • Amazon Kindle Store
    For those who prefer buying their books outright, the Amazon Kindle Store is a top destination for ebooks. You can purchase Kindle books directly or rent textbooks for a limited time.
  • Apple Books & Google Play Books
    Both Apple and Google offer ebook stores where you can purchase and download books to read on your devices. These platforms also offer audiobooks, providing flexibility for your reading preferences.
  • Kobo
    Kobo is another ebook platform that competes with Amazon’s Kindle. It offers both individual purchases and a subscription service. You can read Kobo Ebooks on Kobo e-readers or through the Kobo app on various devices.
  • Chegg & VitalSource
    If you’re a student, Chegg and VitalSource offer academic textbooks for purchase or rent. These platforms are known for their affordable textbook rentals, making them a go-to for students looking to save money.

Conclusion

Being connected provides opportunities for accessing books online whether for entertainment, study, or research. With options ranging from free public domain sites like Project Gutenberg to subscription services like Kindle Unlimited and Scribd, there’s something for every type of reader. Libraries, too, have adapted, offering online borrowing services like OverDrive and Hoopla, ensuring that books remain accessible to everyone. Whether you are unable to travel to your local library or your community does not have a library, having access to books online gives you and others in your community the opportunity to be entertained and to continue to learn.

The New 2025 BEAD Restructuring Policy Notice: What Missouri Community Stakeholders Need to Know

| 0

The long-delayed effort to begin spending nearly $42.5 billion in broadband infrastructure funding authorized by Congress nearly four years ago is still unfolding. This blog is intended to help community stakeholders—including local government officials, chambers of commerce, nonprofits, and engaged citizens—understand the current situation and work productively to ensure the best possible broadband service is deployed as quickly as possible in their community.

The latest chapter in the BEAD funding saga is the release of a newly revised set of requirements that states must follow to access their share of available BEAD funds. This policy—titled the “Broadband Equity, Access, and Deployment (BEAD) Program: BEAD Restructuring Policy Notice”(the “Policy Notice”) was released June 6, 2025, and it represents a significant shift in federal broadband funding priorities, eliminating or revising many of the earlier requirements imposed by the Biden administration in the original BEAD NOFO, published three years ago, and supplemented with various updates that states had been working to fulfill up until a few weeks ago.

The new Policy Notice emphasizes swift action and sets an aggressive timeline for implementation. Much of the work previously completed by Missouri’s Office of Broadband Development (OBD), including the state’s Initial Proposal and the implementation efforts described in an earlier blog, will now need to be revised to comply with the new requirements outlined in the Policy Notice.

The number of Broadband Serviceable Locations (BSLs) that remain eligible for BEAD funding also may be reduced, because the Policy Notice now permits Unlicensed Fixed Wireless (ULFW) providers to assert they are now providing the broadband service at the level required by the BEAD Act. A new challenge process enabling ULFW providers to provide evidence to OBD is now underway and it should be completed within a few weeks.

All this comes against the backdrop of OBD’s highly successful first round of funding under the prior BEAD NOFO guidance. While specific winners of round one and its sub rounds were not announced, approximately 90% of the eligible locations received proposals and OBD did release information identifying the BSLs where a proposal had been preliminarily accepted. All those results will have to be thrown out. OBD and the ISPs that decide they still want to participate in the BEAD funding program will need to quickly adjust to a new set of rules and priorities and resubmit under a new set of scoring criteria. All this must happen in time for OBD to include the results in its revised final proposal to NTIA in early September.

The new required “Benefit of the Bargain” funding round (described below) is necessary because the Policy Notice, eliminates or substantially modifies criteria for awarding BEAD funding, and it opens up the process to a wider group of internet providers.

Here are some of the most significant changes:

New Definition of a “Priority Broadband Project.” The BEAD statute allowed states to prioritize certain projects over other types of technologies. These are referred to as “Priority Broadband Projects.” The Biden administration’s BEAD NOFO limited this definition to end to end fiber internet (fiber to the premises or FTTP). FTTP was favored over lower cost technologies so long as the amount of BEAD funding requested did not exceed the state’s Extreme High Cost Per Location Target (EHCPLT) for the location. The EHCPLT limit was imposed to make sure that all locations that were not adequately served could receive BEAD funding.

The Policy Notice broadens Priority Broadband Project definition to include any technology that the state (OBD in Missouri) determines can provide broadband service at speeds of no less than 100/20 Mbps with latency less than or equal to 100 ms., and that can easily scale speeds over time to meet the evolving connectivity needs of households and businesses and support the deployment of 5G, successor wireless technologies, and other advanced services.

This definition is important, because all Priority Broadband Projects will compete for BEAD funding using the same scoring matrix in the Benefit of the Bargain funding described below. (Policy Notice §3.1; pp.8-9).

ULFW Potentially Qualifies as a “Priority Project. To qualify as a Priority Broadband Project, unlicensed fixed wireless (ULFW) must deliver reliable internet to all covered BSLs at speeds at 100/20 Mbps with latency under 100 ms. The BEAD Policy states that a ULFW provider’s network will be considered capable of reliably delivering service at the minimum levels required by the statute if it can demonstrate the ability to deliver download speeds of at least 5 Mbps assuming simultaneous connection at all locations. The BEAD Policy leaves the requirements and standards necessary for a ULFW provider to show its project is easily scalable over time to meet future needs to the discretion of each state. However, NTIA does reserve to itself the right to overrule the state’s determination in cases where it disagrees. (Policy Notice § 3.2; p.10; Appendix A)

LEO Satellite Potentially Qualifies as a “Priority Project.”  Low earth orbit satellite internet providers (LEO Satellite), such as Starlink, also could qualify as a Priority Broadband Project as well, if the provider commits to make sufficient bandwidth available on the network to serve all locations for a period of at least 10 years. States may adopt enforcement mechanisms—such as claw backs of BEAD grants—to ensure compliance; however, they may not take any ownership or security interest in the provider’s network equipment. (Policy Notice § 3.2; p.10; Appendix B)

New “Lowest Cost to the Government” Scoring Matrix Required. Generally, OBD is required to use a scoring matrix for all Priority Broadband Projects that favors the proposal or combination of proposals resulting in the lowest dollar outlay of BEAD funding.

However, so long as the EHCPLT is not exceeded, a higher-cost Priority Broadband Project proposal may be selected if it is within 15% of the amount requested by the lowest Priority Broadband Project  proposal.

In this case OBD may select among the Priority Broadband Project proposals based on a scoring matrix that takes only the following criteria into account:

  • The speed at which the project will be completed (with preference for faster deployment)
  • The technical capabilities and scalability of the proposed technology (for example, fiber’s ability to easily upgrade speeds in the future)
  • The reliability of the service, especially in challenging environments
  • Whether the applicant was previously a provisional subgrantee under the old rules (though this is only a minor consideration)

If all Priority Broadband Projects exceed the EHCPLT, OBD may accept a lower cost non-priority option if it meets the 100/20 Mbps and 100 ms. service level, even though it is not able to easily scale to meet future needs.(Policy Notice §§ 3.3–3.4; pp.10-13 )

NTIA Specific Oversight on Project Selection. While states retain broad authority over project selection, the BEAD Policy cautions states against setting EHCPLT at an unrealistically high level to preserve the possibility of fiber deployment. NTIA also reserves the right to disapprove project selections that it believes are inconsistent with BEAD program goals.
(Policy Notice p.9 and §3.4; pp.9 and 11-13)

Project Area Proposals Can Exclude BSLs. OBD must accept proposals that exclude one or more BSLs or provides for different delivery technologies where the provider determines the cost of deployment for a specific technology is too high. In such cases, OBD may solicit alternative solutions from other providers or consider a provider’s proposal to use different technologies for those BSLs.(Policy Notice §3.3; p.11)

Affordability Rules. OBD can no longer impose a specific Low-Cost Service Option (LCSO) that BEAD-funded projects must offer. Instead, providers must propose their own affordable plans, which must be made available to households eligible under the FCC’s Lifeline Program, rather than the broader criteria previously allowed under the Affordable Connectivity Program.
(Policy Notice §§ 2.6; 2.7; pp.6-9)

Open Access/Net Neutrality. Prohibitions on data caps and requirements to provide wholesale or open-access connections to BEAD-funded networks have been abolished. NTIA concluded these mandates discouraged participation and increased project costs.
(Policy Notice §2.3; p.5)

DEI, Workforce and Labor Requirements. Prior BEAD NOFO mandates concerning diversity, equity, and inclusion (DEI), fair labor practices, and related reporting have been eliminated. Instead, subgrantees are only required to certify compliance with applicable federal labor laws.(Policy Notice § 2.1; p.4)

Climate Resilience Factors.  The requirement that BEAD proposals be scored based on their contribution to climate resilience has been eliminated. Project participants will satisfy this statutory requirement by establishing risk management plans that account for technology infrastructure reliability and resilience to natural disasters (e.g., wildfires, flooding, tornadoes, hurricanes, etc.) as well as cybersecurity best practices..
(Policy Notice § 2.2; pp. 4-5)

No Credit for Community Input. OBD may no longer award scoring points or preference based on stakeholder engagement, demographic targeting, or other forms of community input. Public comment is still required for the Final Proposal, but it cannot affect project scoring.(Policy Notice § 2.4; pp. 5-6)

Where Do We Go From Here?

Admittedly more guidance will be issued in the coming weeks from OBD as it moves forward to implement the Policy Notice, and likely from NTIA as well. There also is the possibility that certain aspects of the Policy Notice will be challenged in court and the process will be further delayed based on a claim that it strays too far from BEAD’s statutory mandates.

However, it seems more likely that OBD will publish a new BSL map reflecting a revised set of BEAD funding eligible sites in a few weeks and a revised invitation for proposals under the Benefit of the Bargain funding round. That invitation also may provide further guidance (consistent with both the statute and the Policy Notice) detailing how ULFW and LEO Satellite proposals can qualify as a Priority Broadband Project.

For community stakeholders, the greatest risk may be that the providers that won preliminary allocations of BEAD funding under the BEAD NOFO process will simply give up, because they believe their FTTP proposal cannot overcome the construction and installation cost advantage of a ULFW solution. Even though many of these ISPs already have spent thousands of dollars on developing their proposals, after years of work, preparation and waiting, they may be at the point where they view further participation in the BEAD program as throwing good money after bad.

Yet the perceived cost advantage of these wireless technologies when compared to FTTP or hybrid fixed wired solutions may be illusory, depending on how OBD (and NTIA) hold UFLW, LEO Satellite or other technologies to the statute’s mandates for service that is easily scalable and future-proof. Much of Missouri’s unserved and underserved locations are in areas where terrain makes deployment of reliable wireless service challenging, and these challenges increase as future needs for higher connection speeds and lower latency require towers to be located closer to the end user and backhaul capacity to increase.

This is illustrated by the independent study commissioned by OBD in 2022. It is worth remembering that this study found that the overall cost of deploying wireless internet statewide was approximately the same as a 100% FTTP solution. While there likely are areas in Missouri, and throughout the United States, where wireless technologies have a substantially lower deployment cost and also can be easily scaled it meet future needs, the 2022 study appears to show that for many Missouri locations, if they are engineered properly to meet specific conditions and terrain challenges, wireless may cost more to deploy than FTTP.

The point here is that community stakeholders who want more than the minimum level of broadband service required by BEAD in their community, need to reach out to the local ISPs that participated in the aborted NOFO BEAD funding round, and urge them to move forward with a new proposal in the Benefit of the Bargain round this summer. They also should be receptive and at least consider joining with a provider in ways that allow them to reduce their  BEAD funding request, so it can fall within the limit of the new 15% rule imposed by the Policy Notice. For example, a local community might agree to fund a fixed a portion of a FTTP network provider’s cost to expand service to a few critical high cost BSLs in exchange for the provider’s agreement to reduce its BEAD funding request by a like amount. Since it is the amount of BEAD funding requested (rather than the cost of the network) that governs, the FTTP bid might be reduced to a point that it did not exceed 15% of a competing ULFW or LEO Satellite Priority Broadband Project proposal.

As the BEAD program enters this critical phase, efforts made by local leaders and  stakeholders still could help determine whether their community secures broadband infrastructure that just meets minimum federal thresholds, or instead infrastructure that is far more durable and future-proof. Now more than ever, communities need to support and encourage ISPs that have already submitted proposals that can meet this long-term vision.

The Latest Scams and How to Protect Yourself

| 0

If you’re like me, you’ve seen more scams in your email and texts lately. Scammers are constantly evolving their tactics, using new technologies and psychological tricks to deceive people. Fraudsters are leveraging artificial intelligence, impersonation techniques, and digital platforms, such as social media, to target unsuspecting victims. Here’s a breakdown of the latest scams and how you can stay safe.

AI-Powered Scams

Artificial intelligence has revolutionized fraud, making scams more convincing than ever. Criminals use AI-generated voices, deepfake videos, and realistic phishing emails to trick victims into handing over personal information or money.

Deepfake is defined by the Merriam Webster dictionary as an image or recording that has been convincingly altered and manipulated to misrepresent someone as doing or saying something that was not actually done or said.

How to Protect Yourself:

  • Be skeptical of unexpected messages, even if they appear to be from someone you know.
  • Verify requests for money or sensitive information by contacting the person or organization directly. Do not use the phone numbers in suspicious emails, texts, or phone calls. Use verified numbers the person or company has provided you or you find through an online search.
  • Use multi-factor authentication to secure your accounts. This includes passcodes and passwordless accounts where available.

Imposter Scams

Scammers pose as government officials, bank representatives, or even family members in distress to manipulate victims into sending money or revealing personal details.

How to Protect Yourself:

  • Never trust unsolicited calls or messages requesting money or sensitive information.
  • Verify the identity of the caller by contacting the person or organization directly.
  • Be cautious of urgent requests that pressure you to act quickly.

QR Code Scams

QR codes are being exploited by fraudsters to direct users to malicious websites or install malware on their devices without their knowledge.

How to Protect Yourself:

  • Only scan QR codes from trusted sources.
  • Avoid scanning codes found in unsolicited emails, text messages, or social media posts.
  • Use a QR code scanner that previews the URL before opening it, especially if you weren’t expecting it.

Learn more about QR code scams from the Federal Trade Commission (FTC).

Toll Road Scams

Scammers send fake text messages claiming unpaid toll fees, tricking victims into providing payment details.

How to Protect Yourself:

  • Verify toll payments through official websites rather than clicking on links in text messages.
  • Be cautious of messages threatening immediate penalties or license suspension.

You can find out more about toll road scams from the FTC.

Job Scams

Fraudsters target job seekers with fake employment offers, often requiring upfront payments or personal information.

How to Protect Yourself:

  • Research companies before applying for jobs.
  • Avoid job offers that require payment for training or equipment.
  • Never share sensitive information like your social security number with unverified employers.

Find out more about job scams from Indeed and the FTC websites

Stay Vigilant

Scammers prey on trust and urgency, making it crucial to stay informed and cautious. Always verify unexpected requests, use strong security measures, and report suspicious activity to authorities.

For more details on the latest scams, check out these blogs from AARP, Experian, and Norton.