Using Social Media

| 0

Social media platforms are great tools for keeping up with family and friends, making new friends across the world, creating entertaining and informative content, generating business, and exchanging ideas on subjects that are of interest to you. 

These platforms have also become trickier to navigate in today’s world of misinformation, scams, and those who want to shout down or belittle opposing points of view instead of discussing and learning from others.

To navigate any social media platform, you must create an account for the app and be sure to use two-factor authentication to login to the platform.  You’ll also want to create multiple ways to recover your account in the event you forget your password or your account becomes compromised.  Each platform will have a way for you to set up multiple options not only for authentication, but recovery.  You will also want to set your personal information to be private and/or only shared with certain groups.

Let’s talk about some of the more popular social media applications and tips to help you be successful on each of them. 

Facebook is a social media platform allowing users to create profiles, share updates, photos, videos, and connect with friends and family. The platform also offers a variety of features such as groups, pages (for communities of interest, companies, or organizations), and marketplace, making it a hub for personal, professional, and community engagement. With over 2.8 billion monthly active users, Facebook has become one of the most influential social networks globally.

Facebook posts have a maximum character limit of 63,206 characters. This allows for quite a bit of content if you need it! However, keep in mind that shorter posts often perform better in terms of engagement, as they are quicker and easier for followers to read and interact with.

Instagram is a popular social media platform primarily focused on photo and video sharing. Launched in 2010 and later acquired by Facebook, it allows users to post images and short videos; follow friends, celebrities, and brands; and discover content through hashtags and the Explore feature. Instagram also offers features like Stories, Reels, and IGTV (Instagram TV) for more dynamic content creation and consumption. With its visually driven interface, Instagram has become a key platform for self-expression, marketing, and social interaction.

X, previously known as Twitter, is a social media platform where users share short messages called “tweets.” X allows for quick, real-time updates, news, and conversations. Users can follow others, like and retweet posts, and engage with content through hashtags. Known for its 280-character limit, X emphasizes concise communication. It’s widely used by individuals, celebrities, businesses, and news outlets for sharing information and engaging with audiences. Some features for X are only available through the premium subscription which starts at $11/month.

BlueSky is a decentralized social media platform that is a potential alternative to X.  It is gaining popularity and allows the users to create their own communities and rules.  This ability to customize gives you more control over your online experience in BlueSky.  It does focus on free speech for users.  The application is new and has a small user base.

Snapchat allows users to send photos, videos, and messages that disappear after being viewed. With features like Stories, which let users share moments that last 24 hours, and filters, which add creative effects to photos and videos, Snapchat has become popular for its playful and ephemeral approach to communication. It also includes Snap Map for location sharing and Discover for exploring content from publishers and creators. Snapchat is known for its focus on privacy and fun, interactive experiences.

TikTok is a social media platform known for its short-form video content. Users can create and share videos ranging from 15 seconds to 3 minutes, often set to music, featuring various trends, challenges, and creative expressions. The platform offers a range of editing tools and effects, making it easy for users to produce engaging content. TikTok’s algorithm recommends videos based on user interests, creating a personalized and highly addictive experience. It has become immensely popular, especially among younger audiences, for its entertaining and viral nature. 

You’ve certainly read or seen in the media about the potential security concerns over the ownership of TikTok and the law in place that the application needs to be sold to an American company or be banned in the United States.  The ban was upheld by the Supreme Court; however, the incoming presidential administration has signed an executive order halting the ban for 75 days to work through options including a potential deal with 50% American ownership of the platform.  You can keep up to date by visiting the Tik Tok newsroom at https://newsroom.tiktok.com/en-us/.

While there are tips for each social media application that can help make your post more engaging, here are some tips that apply to any post on any social media application:

  • Be Respectful –
    • Treat others online as you would in person.
    • Avoid heated arguments and be considerate of different viewpoints.
  • Think Before You Post –
    • Once something is online, it’s there forever.
    • Make sure your posts reflect how you want to be perceived.
  • Verify Information –
    • With the amount of misinformation out there, always double-check facts before sharing.
  • Protect Your Privacy –
    • Be mindful of what personal information you share.
    • Adjust your privacy settings to control who sees your posts. 
    • Don’t post when you’ll be away from home or vacation photos until after you return home.  Thieves can watch social media to see when people are away.
  • Engage Positively –
    • Supportive and encouraging comments go a long way.
    • Spread positivity!
  • Avoid Oversharing –
    • While it’s great to share highlights of your life, balance it with some offline moments for yourself.
  • Be Authentic –
    • Be true to yourself rather than trying to portray a perfect image. People appreciate authenticity.
  • Keep It Short and Sweet –
    • Most people scroll quickly, so make your point clear and concise.
  • Use Visuals –
    • Photos and videos catch the eye and are more likely to be shared and liked.
  • Ask Questions –
    • Encourage interaction by asking questions or requesting opinions.
  • Tell a Story –
    • Share personal experiences or stories that resonate with your audience.
  • Be Positive –
    • Uplifting and positive content generally gets more engagement and spreads good vibes.
  • Tag Friends –
    • When relevant, tag friends to increase the post’s visibility and engagement.
  • Use Hashtags –
    • Relevant hashtags can help your post reach a broader audience.
  • Timing Matters –
    • Post when your audience is most active, typically mornings, evenings, or weekends.
  • Engage with Comments –
    • Respond to comments on your posts to foster a sense of community.

There are many social media platforms available to share your content with friends, family, and customers.  We’ve shared a few of the most popular ones with you and some tips that can help you be successful with these platforms.  Below are links that will also help you get started.

Facebook:

Instagram:

X:

BlueSky:

Snapchat:

TikTok:

Evaluating Information Online

| 0

Everyone has heard the funny saying, “If it’s on the Internet, it must be true!”  We all laugh when we hear this, but do we take that into account when we are looking at information online? The Internet delivers us the world of information and news at our fingertips. How can we know the information we see is factual? Just like purchasing products, we need to be good shoppers of information and research what we see to make sure the information is factual before we share with others.

When we see information that is obviously fake, we just say that’s fake news. Some information is false but designed and written so that it can seem true on the surface. False or misleading information can be broken down into three distinct categories:

Disinformation – false information deliberately and often covertly spread (as by the planting of rumors or social media) in order to influence public opinion or obscure the truth. (Miriam Webster – https://www.merriam-webster.com/dictionary/disinformation)

Misinformation – incorrect or misleading information inadvertently spread. No malicious intent is involved in the sharing of this false or incomplete information. (Britannica – https://www.britannica.com/topic/misinformation-and-disinformation)

Malinformation – information that is based on truth (though it may be exaggerated or presented out of context) but is shared with the intent to attack an idea, individual, organization, group, country, or other entity. The dates, locations, circumstances, and outcomes of the content may be altered to fit a certain narrative or prove a false point. (Princeton Library – https://princetonlibrary.org/guides/misinformation-disinformation-malinformation-a-guide/)

Why do people post this false or misleading information?

This content is shared via social media and websites via ads or under the guise of news content. People or organizations may promote unverified stories and advertise information via social media and the web to make money. Views and clicks can lead to revenue. For example, you may see content (sometimes marked as paid content) with a misleading or false headline about a celebrity or organization, which ends up being an advertisement for a product.

Some websites post information and stories to increase views and clicks to help generate ad sales. Some sites and posts are designed to influence people into believing certain points of view and creating a call to action to vote a certain way or feel a certain way about people or countries. These sites and posts are paid for by organizations, and even countries to influence people around the world.

Why do I keep seeing false or misleading information?

You may be asking, if I’ve never clicked on this type of content, then why do I see this on my social media and news feeds? You may be seeing it because friends have shared the information and you haven’t reported or asked to block this type of information from your feed. You will see this information based on sites you’ve visited and other posts you have liked. Social media uses a program or algorithm to determine what information you may like to see based on previous posts, websites, and news stories you’ve viewed.

Another factor is called “confirmation bias.” We click on stories and posts that align with our point of view and the algorithm uses that information to make sure that you see information that aligns with your point of view. This algorithm, in some instances, keeps you from seeing posts that share opposing sides of a topic or news story.

We also have a built-in tendency to believe something when it goes viral and is posted by several people or sites. These can be posts by actual people but can also be done by bots through multiple accounts to push a story or information to influence people’s decisions or to increase revenue.

How do I evaluate the information I’m seeing?

First, consider the source of the information. If posted from an organization or news site, look over their website for information on their mission. What are the goals or objectives the organization is trying to achieve? Is it just to inform or are they trying to influence people about certain beliefs or events? Look for contact information. Are reporters and other staff listed and ways to contact the individuals or organization? Lack of contact information could be a red flag that the site is not legitimate. In the case of news organizations look to see if there is a corrections or retractions section on the site. Legitimate news sites will have a section where they post corrections and retractions to stories. If an individual reporter, look for biographical information about the reporter and other stories they have written as well as any reviews of materials the author or reporter has written.

Look at other stories the individual or organization has written or posted. Do they all have the same slant, or do they cover both sides of a story? Look for articles from other sources on the same story and compare the information provided. Is the information the same for all the articles? Do other sources have additional information or report the events differently than the article you first read?  Look at the Media Bias chart (https://app.adfontesmedia.com/chart/interactive) to see how news organizations might lean when reporting news. This chart is constantly updated.

Look at the stories to see if they are factual stories, opinions, or satire or humor. Some stories go viral and are shared/posted as fact when the author’s objective was merely to entertain.

Second, check the author of the information. Look for an online resume or biographical information on the author. Is this an area they have expertise in or a field they write about regularly? Do previous articles written by this person have the same style of writing and provide balanced information about the topic? Who have they worked for and has their employer influenced how they have written previous stories? Does the author of the story provide supporting research information or additional articles on the topic with links so the reader can dive deeper into the topic? Do they reference interviews with experts on the topic or witnesses to the event being reported.

Third, check the date. Many articles are posted as current events, but actually happened in the past. This is done to emphasize a certain point of view, create a false call for action on a topic, or create a sense of excitement or fear. Conduct a search for the same article or event and look at the dates of the posts or articles online to see if the dates match.

If pictures are a part of the article, you can do a reverse image search (https://lifehacker.com/tech/how-to-run-a-reverse-image-search) to determine if the picture is a part of the actual event or item being reported or if it was from another event at another time and even in a different location.

The last step in evaluating information online is to check your biases. Does this article align with what you believe about the subject or event being posted or reported? As we talked about earlier, our biases in what we click on help populate our feed and can eliminate articles that may report another point of view. Discussing events with friends via chat, text, web call or face-to-face helps us look at events and information from different points of view. Be sure to discuss information with friends and colleagues that have a different perspective than yourself.

If you are still unsure look to fact checking sites such as Snopes, FactCheck, PolitiFact, and many others.

We should not have to research the information we see online, but it is essential to make sure that not only are we getting all the facts about current events, but that the information being presented is true and not just a way to influence us or sell ads or products.

By being a good consumer of information online, we can make good decisions that will improve our lives.

Helpful links:

Evaluating Internet Resources – Georgetown University – https://library.georgetown.edu/tutorials/research-guides/evaluating-internet-content

Evaluating Digital Sources – Purdue Online Writing Lab – https://owl.purdue.edu/owl/research_and_citation/conducting_research/evaluating_sources_of_information/evaluating_digital_sources.html

How to Run a Reverse Image Search – Lifehacker – https://lifehacker.com/tech/how-to-run-a-reverse-image-search

How to Do a Reverse Image Search From Your Phone – PCMag – https://www.pcmag.com/how-to/how-to-do-a-reverse-image-search-from-your-phone 

You Tube Data Viewer – https://citizenevidence.amnestyusa.org/

Snopes – https://www.snopes.com/

PolitiFact – https://www.politifact.com/

FactCheck – https://www.factcheck.org/

Reuters Fact Check – https://www.reuters.com/fact-check/

Associated Press Fact Check – https://www.reuters.com/fact-check/

Media Bias Chart – https://app.adfontesmedia.com/chart/interactive

Using Video Calls to Stay Connected

| 0

As our families grow, change, and move and our circle of friends and family extends beyond our local community, staying connected can be challenging. Video calls can offer a personal touch that traditional phone calls and text messages lack. Our experiences during COVID have shown us face-to-face connection is a critical component to our personal well-being.

Key benefits of incorporating video calls into your personal life are:

Face-to-Face Interaction

  • Seeing facial expressions and body language help convey emotions more effectively, fostering a deeper connection.
  • Understanding non-verbal cues can enhance communication and reduce misunderstandings.

Bridging Distance

  • Video calls allow you to stay in touch with friends and family across the globe, making the world feel smaller.
  • Celebrate birthdays, holidays, and special occasions with loved ones, even when you can’t be physically present.

Convenience and Flexibility

  • You can connect with others anywhere and at any time, without the need for travel.
  • Coordinate calls when it is convenient for everyone, accommodating busy schedules and different time zones.

Enhanced Communication

  • Visual cues can help clarify conversations, making it easier to understand and be understood.
  • Video calls tend to be more engaging than voice calls. This is important when connecting with friends and family so everyone feels more connected and willing to engage in conversation.

Strengthening Relationships

  • Frequent video calls can help maintain and strengthen relationships, ensuring you stay updated and an important part of each other’s lives.
  • Video calls can help you provide and receive emotional support during challenging times, offering a comforting presence even from afar.

Learning and Sharing

  • Video calls can allow you to teach and learn new skills, such as cooking or crafting, through interactive video sessions.
  • You can also pass on and receive important skills and family history with others in your family.

Health and Well-being

  • Regular face-to-face interactions can reduce feelings of loneliness and isolation, promoting better mental health.
  • Video calls can be used to encourage each other to stay active and healthy by participating in virtual workouts or wellness activities together.

With the importance of staying connected to our wellbeing, what applications are available to connect us to our family and friends? You may already have these applications on your phone, tablet, or computer, and you will be surprised how many applications are free for personal use.

Below are a few of the advantages and disadvantages of some of the more popular video call applications.

Zoomhttps://www.zoom.com/:

  • Advantages:
    • Very user friendly and easy to set up and use. Can be used either via an app or through a web browser.
    • Supports up to 100 participants in the free version.
    • Features include screen sharing, virtual backgrounds, and breakout rooms.
  • Disadvantages:
    • Security Concerns. When calls are not password protected and\or limited to invitees, the application has faced issues with people joining meetings to disrupt them (Zoom-bombing) and there have been some issues regarding privacy.
    • The free version has a time limit of 40 minutes per video call.
    • Can use lots of resources, like battery, memory, and network connection, from your system.
    • Requires signing up for an account.

Google Meethttps://workspace.google.com/products/meet/:

  • Advantages:
    • Integration: Seamlessly integrates with Google Workspace.
    • Accessibility: Easy to join meetings via a web browser without additional software.
    • Security: Strong security features, including encryption.
    • The free version supports up to 100 people per video call.
  • Disadvantages:
    • Fewer features compared to Zoom, such as no breakout rooms.
    • A Google account is required to host meetings. A Google account gives you access to Google, Mail, and other Google Drive applications (Docs, Sheets, Slides)

Microsoft Teamshttps://www.microsoft.com/en-us/microsoft-teams/teams-for-home :

  • Advantages:
    • Excellent for collaboration with integrated chat, file sharing, and apps.
    • Strong security and compliance features.
    • Integrates well with Microsoft Office apps (Word, Excel, Outlook).
  • Disadvantages:
    • Complexity: Can be overwhelming for new users due to its many features.
    • Resource Usage: Can be heavy on system resources.
    • Learning Curve: Steeper learning curve compared to simpler tools.
    • Requires a Microsoft Outlook Account (https://outlook.com). The free Outlook account gives you access to other Office applications (Word, Excel, Outlook) via web browser or mobile app.

Skypehttps://www.skype.com/en/:

  • Advantages:
    • Skype has been available for several years and is widely recognized.
    • Supports group calls, screen sharing, and file sharing.
    • Available on multiple platforms.
    • Already installed on Windows computers.
  • Disadvantages:
    • Interface has not been updated and most of Skypes features are now part of Microsoft Teams.
    • Can be less reliable with occasional call quality issues.
    • Less robust security features compared to newer platforms.
    • Requires a Microsoft Account.

FaceTime – https://apps.apple.com/us/app/facetime/id1110145091:

  • Advantages:
    • High-quality video and audio calls.
    • Come Installed on Apple devices and integrates well with other Apple applications.
    • Simple and intuitive interface.
  • Disadvantages:
    • Only available on Apple devices. Non-Apple devices can only join FaceTime calls via web browser.
    • Limited to 32 participants in group calls.
    • Fewer features compared to other platforms.

There are also several chat applications that will allow you to make video calls. The two most common are available from Meta, Facebook Messenger, and WhatsApp. Let’s take a look at the advantages and disadvantages of these popular applications.

Facebook Messengerhttps://www.messenger.com/?_rdr%2F:

  • Advantages:
    • Easy to connect with Facebook friends.
    • Supports text, voice, video calls, and games.
    • Available to download on all computers, tablets, and phones.
  • Disadvantages:
    • Concerns over data privacy and security.
    • The presence of ads can be intrusive.
    • Can be heavy on system resources.

WhatsApphttps://www.whatsapp.com/

  • Advantages:
    • The application is widely used and familiar to many.
    • Supports text, voice, video calls, and group chats.
    • Highly secure using end-to-end encryption for security.
  • Disadvantages:
    • Because the application is owned by Meta, who also owns Facebook, there are concerns about possible privacy issues via information sharing between applications.
    • Can consume a lot of data for video calls which may be of concern for those with data caps on their phone data subscriptions or home internet.
    • Fewer customization options compared to other apps.

Video calls are an essential tool for maintaining personal connections in our increasingly digital world. By using one of the many video call or video chat applications, you can enhance your relationships, stay connected with loved ones, and enjoy the many benefits of face-to-face communication, no matter the distance. Choose the application that best suits your needs. Below are links that can help in making your decision. Happy video calling!

Helpful Links:

Preparing for a Successful Online Interview

| 0

Preparing for a Successful Online Interview

In our last blog, “Successfully Searching for a Job Online,” we discussed how to get noticed and land a job that fits in your career path. In this article we will discuss how to clinch the deal with an online interview.

With the rise of remote work and global teams, online job interviews have become a staple in the hiring process. Preparing for an online interview requires attention to detail not only in your responses but also in the technical and environmental aspects of your setup. Let’s take a look at how to prepare before, the day of, and after the online interview.

Before the interview

Technical Setup and Environment

  1. Test Your Technology
  2. Before the day of the interview, ensure that your computer, webcam, microphone, and internet connection are working properly. Conduct a trial run with a friend or family member to troubleshoot any issues that may arise. Make sure you are using the same video conferencing software you will use during the interview to become familiar with the system.
  3. Use earbuds or a good speaker and microphone setup. Avoid using a bulky headset. A headset with microphone will distract the interviewer and they will not easily see your facial expressions. Earbuds help you to look more professional.
  4. Make sure your laptop camera or external camera is at a height that allows you to look straight into the camera and not down at the camera. Consider purchasing a laptop stand if using the built-in camera.
  5. Consider a LED light used for video and social media if lighting is an issue. This will allow you to adjust lighting to give you the best appearance during the interview.
  6. Run operating system updates and application updates the day before the interview to avoid the system asking for a restart or automatically restarting during your interview.
  7. Choose the Right Location
  8. Find a quiet, well-lit space where you won’t be interrupted. The background should be neutral and professional; avoid clutter and distracting elements.
  9. If you have pets, plan to put them in a carrier or kennel for the duration of the interview or ask a friend to watch them.
  10. Consider using a virtual background. If you can’t find a space that looks professional, but is quiet and well lit, an appropriate virtual background can be useful.


Preparation and Practice

  1. Research the Company
  2. Understanding the company’s culture, mission, and recent news can provide valuable context for your interview responses and questions. You did this research during the job search and reviewing it before the interview will help you develop questions to ask as part of your interview.
  3. Review the Job Description
  4. As you did during your job search, match your skills and experiences with the requirements and responsibilities listed in the job description. Be prepared to discuss how you’re a good fit for the role. You may also have questions you’ll want to ask about the position.
  5. Practice Common Interview Questions
  6. As you practice with your friend or colleague to test the video conference software, have them ask some of the typical questions you might be asked during an interview. Prepare answers for these questions and practice delivering them. This will help you speak confidently and concisely during the interview.
  7. Dress for Success
  8. Even though you’re not meeting in person, it’s important to dress professionally from head to toe. This not only affects how you’re perceived but also how you feel and perform during the interview. You will be surprised at the difference it will make.

Day of the Interview

  1. Be Early
  2. Log in to the interview platform a few minutes early to address any last-minute technical issues and to show punctuality. Rember the adage (paraphrased), “If you’re early, you’re on-time, if you’re on time, you’re late, and if you’re late, you won’t get the job.”
  3. Communicate Effectively
  4. Maintain eye contact by looking at the webcam, listen actively, and ensure your body language is open and professional.
  5. Paraphrase and repeat information back to the interviewers when asking questions, so they know you are listening.
  6. Take Notes
  7. Keep a pen and paper handy to jot down notes or questions that come to mind during the conversation.
  8. Keep a copy of your resume and cover letter available.
  9. You can refer to it as necessary during your interview.  This can be particularly helpful when asked about specific details that you highlighted when applying for the position.
  •  Ask Relevant Questions
  • Asking questions about the company and the position beyond salary and benefits to let the interviewers know your interest is not only about the position, but how you can be a member of their team.  Ask questions about on the job training, advancement opportunities, support for continuing education outside of work, or questions related to the work culture.  Ask if there are ways to share leave with coworkers or if there are certain charities or events the company sponsors that employees can volunteer to work with.

Post-Interview

  1. Follow Up
  2. Send a thank you email to the interviewer, reiterating your interest in the position and reflecting on any key points discussed during the interview.
  3. Send the thank you on the same day but take time to reflect on the interview to make sure that you emphasize how you fit in the position and with the company.

By following these steps to prepare the technology and yourself ahead of your interview, you will help to guarantee yourself a successful interview. Remember, preparation is key to success, and in the virtual world, the details can make all the difference. Good luck!

For more information:

16 Tips for Successful Online Video Interviews | Indeed.com

5 Video Interview Mistakes to Avoid (aarp.org)

How To Conquer Interview Anxiety (Plus 12 Techniques) | Indeed.com

Successfully Searching for a Job Online

| 0

Successfully Searching for a Job Online

As students look to their graduation day, they will also be looking for that job fits in with their career path. Others will be looking for a new job to move forward in their current careers or to start a new career journey. In all these cases, most jobs are listed online. The entire application process for most jobs is handled online including interviews. This is not only for jobs in large corporations. Companies of all sizes are using personnel recruiting sites such as Indeed, ZipRecruiter, Glassdoor, Monster, LinkedIn, and others to find new employees. To help you navigate the online process, let’s discuss several steps in a successful in your job search.

Step 1: Self-Assessment

Before diving into the job search, take a moment to reflect on your career goals, skills, and preferences. Consider what types of roles you’re interested in, the industries that appeal to you, and your desired salary range. This self-assessment will serve as a foundation for your job search strategy. Your self-assessment will help you look for and apply for the jobs that fit your goals while avoiding jobs that may look great, but in the long run don’t meet your career goals.

Step 2: Research Potential Employers

With your self-assessment complete, identify companies you’re interested in working for and research their culture, values, and recent news. Understand their products/services and how you can contribute. This information will be essential in the next steps of your successful job search.

Step 3: Resume and Cover Letter

Update your resume to reflect your most current experiences and skills. Tailor it to highlight the qualifications most relevant to the job you’re applying for. Many companies are using Applicant Tracking Systems, and now AI, to search through resumes, and highlight candidates before people within the company evaluate the applications. Make sure your relevant educations, skills, and experiences are easily identified.

Similarly, craft personalized cover letters that convey your interest and fit for each position. Do not use a blanket cover letter and just change the names of recruiters or companies. Highlight how your skills, background, and goals fit specifically into the position listed and how your values align with that of the company. Keep the letter to one page.

Step 4: Your Online Presence

Ensure your online presence is professional and up to date. This includes your LinkedIn profile, personal website, or portfolio. Consider setting your online profiles to private or at least limit what is shown to the public. Your online profiles should align with your resume and highlight your professional brand. Make sure that your personal social media helps to highlight your values, hobbies, and any service work within your community. Just remember that what gets shared on the Internet stays on there forever, even if you delete it from your sites.

Step 5: Job Search Engines and Company Websites

Utilize job search engines to find open positions. Diversify your search by visiting company career pages, industry-specific job boards, and professional association websites. Bookmark these sites and set a schedule for regular check-ins. Where possible, configure alerts on job boards and company websites based on your work preferences and criteria. This ensures you’ll receive notifications for relevant openings.

Step 6: Networking

Leverage your professional network by reaching out to contacts who might provide insights or referrals. Attend virtual networking events and webinars to connect with industry professionals and learn about job openings. Leverage LinkedIn to connect with professionals in your field of interest. Engage in discussions, join groups, and follow influencers.

Step 7: Application Process

When applying for jobs online, follow the application instructions carefully. Use keywords from the job description in your resume and cover letter to pass through Applicant Tracking Systems (ATS). Keep track of your applications and follow up as appropriate.

Step 8: Interview Preparation

Prepare for interviews by researching the company and practicing your responses to common interview questions. Consider setting up mock interviews with friends or mentors to refine your delivery and get feedback. Most of your interviews will be online and we will discuss how to prepare for those in our next blog posting.

Step 9: Stay Organized

Keep your job search organized by maintaining a spreadsheet or document where you track the positions you’ve applied for, the dates of application, and any follow-up actions. This will help you manage your applications and stay on top of opportunities. Make sure you follow up with potential employers as appropriate to indicate continued interest in the position and other potential opportunities with the company in the future.

Step 10: Continuous Learning

As you search for jobs, take the opportunity to enhance your skills through online courses, workshops, or certifications. This not only makes you a more attractive candidate but also keeps you engaged and motivated during your job search. Look to improve your digital skills as well as your skills in your chosen field. Improving your skills by learning new applications and improving your skills with application you are already familiar with can improve your application.

Finally, maintain a positive mindset throughout your job search. It can be a lengthy process, so resilience and persistence are key. Celebrate small victories and stay focused on your end goal. By following these steps, you’ll be well-prepared to tackle the online job market and increase your chances of finding a job that aligns with your career aspirations and personal values. Remember, preparation and persistence are the keys to a successful job search. Good luck!

For more information:

11 Tips for an Effective Job Searching Process | Indeed.com  – https://www.indeed.com/career-advice/finding-a-job/job-searching-process

10 Keys To A Successful Job Search (forbes.com)  – https://www.forbes.com/sites/carolinecastrillon/2021/07/25/10-keys-to-a-successful-job-search/

Your Step-By-Step Guide to the Job Search (aarp.org)https://tinyurl.com/AARPJobSearchToolkit

Decoding Computer Jargon: A Guide for Buyers

| 0

Purchasing a computer can be a daunting task, especially when you’re bombarded with the technical jargon in computer ads and the information at the store. This blog will help to demystify the common terms you’ll encounter and help you make an informed decision.

Let’s dig into the most common terms you’ll see in computer ads and what they mean.

Processor or central processing unit (CPU):

The CPU is the primary component of a computer that processes instructions. It runs the operating system and applications, constantly receiving input from the user or active software programs. The CPU processes the data and produces outputs, which may be stored by an application or displayed on the screen. Depending on what you plan to do with the computer will determine how powerful a processor you need. Gaming, video editing, and serious data processing will require more powerful processors.

When purchasing a computer, you’ll see the following information about the CPU:

  • GHz (Gigahertz): This measures the clock speed of the CPU. The higher the GHz means faster processing of data even with multiple applications running.
  • Cores: Modern CPUs have multiple cores, allowing them to process more tasks simultaneously. Common configurations include dual-core, quad-core, and octa-core.
  • Threads: Threads are virtual cores that help in multitasking. More threads can improve performance in multi-threaded applications.

Memory (RAM):

  • GB (Gigabytes): The amount of RAM, which affects how many tasks your computer can process at once. More RAM is better for multitasking. Most computers for home and business use will have between 8 to 16 GB of RAM. For most home and business uses, 8 to 16 GB of RAM is sufficient.
  • DDR4/DDR5: Types of RAM. DDR5 is the latest and fastest, but DDR4 is still widely used and sufficient for most users. When looking at computers for home and small office uses (web browsing, accounting, and streaming), DDR4 will be the most common memory in those machines. Gaming computers and computers used for graphics, video and music editing, and intensive data processing should have DDR5 memory.

Storage:

  • HDD (Hard Disk Drive): Traditional storage with moving parts. It’s cheaper but slower. Not as common now as it has been. But may still be a component in lower cost computers.
  • SSD (Solid State Drive): Faster and more reliable storage with no moving parts. More expensive but significantly improves performance.
  • TB (Terabytes) and GB (Gigabytes): Measures of storage capacity. 1 TB = 1000 GB. Common drive capacities in mid-range computers will be 256 or 512 GB.

Graphics Card (GPU):

  • Integrated Graphics: Built into the CPU, suitable for basic tasks and light gaming. This type of graphics card shares the RAM used for processing which can affect performance but is not an issue for basic applications.
  • Dedicated Graphics: Separate GPU with its own memory (VRAM), essential for gaming, video editing, and 3D rendering.
  • VRAM (Video RAM): Memory used by the Dedicated Graphics Card or GPU. More VRAM is better for handling high-resolution textures and complex graphics.

Display:

  • Resolution: The number of pixels on the screen. Resolution expressed as the number of horizontal and vertical pixels on a display screen. Higher resolutions mean more pixels and greater clarity. Common resolutions include Full HD (1920×1080), 4K (3840×2160).
  • Refresh Rate: Measured in Hz (Hertz), it indicates how many times the screen refreshes per second. Higher refresh rates (120Hz, 144Hz) are better for gaming and streaming of video.

Ports and Connectivity:

  • USB (Universal Serial Bus): Common interface for connecting peripherals. USB 3.0 and USB-C are faster than the older versions. Look for computers that have both types of USB ports.
  • HDMI (High-Definition Multimedia Interface): Used for transmitting video and audio to monitors and TVs.
  • Display Port: A newer digital audio and video interface for connecting to monitors and projectors.
  • Ethernet: Wired network connection, faster and more stable than Wi-Fi.

Operating System (OS):

  • Windows: Versatile and widely used, compatible with most software.
  • macOS: Exclusive to Apple computers, known for its sleek design and integration with other Apple products.
  • Chrome OS: Lightweight and web-focused, found on Chromebooks.

Battery Life (for Laptops):

  • mAh (Milliamp Hours): Measures battery capacity. Higher mAh means longer battery life.
  • Hours of Usage: Estimated battery life based on typical usage.

Wireless Networking:

  • Wi-Fi: Wireless networking technology. Wi-Fi 6 is the latest standard, offering faster speeds and better performance in crowded areas.
  • Bluetooth: Wireless technology for connecting peripherals like keyboards, mice, and headphones.

Understanding the terms in computer ads or listed by computers in the store will allow you to make a more informed decision when purchasing a computer. Whether you’re a casual user, a gamer, or a professional, knowing what to look for can help you find the perfect machine for your needs.

Helpful Links:

Laptop Buying Guide (2024):https://www.wired.com/story/how-to-buy-the-right-laptop-for-you/

Best Desktop Computer Buying Guidehttps://www.consumerreports.org/electronics-computers/computers/buying-guide/

Here’s everything to consider when buying a CPU in 2024https://www.digitaltrends.com/computing/cpu-buying-guide/

Dedicated Graphics Card vs. Integrated Graphics: Which is Better?https://techguided.com/dedicated-graphics-card-vs-integrated-graphics/

Beyond the Smartphone:

| 0

Why Accessing Online Applications and Information requires more than a phone!

Our smartphones have become our gateway to a vast world of online applications and information from any location, at any time. Whether it’s social media, news updates, or business tools, these devices have transformed the way we interact with the world. However, relying solely on a smartphone for accessing online applications and information comes with inherent limitations. Let’s discuss why you need more than a phone to access the services and information available on the internet today.

Smartphones come in various screen sizes, ranging from compact to large displays. While they offer portability, reading lengthy documents, editing spreadsheets, or designing presentations may be cumbersome on smaller screens. Larger screens, like tablets or desktop monitors provide better readability, space for multitasking, and ergonomic advantages for prolonged use.

Typing extensively on a smartphone’s touchscreen keyboard can be slower and less accurate compared to physical keyboards or styluses available with tablets or laptops. Devices with dedicated keyboards facilitate faster typing, enhancing productivity for tasks like drafting emails, writing reports, or coding.

Web applications can vary in their design and functionality. While mobile apps are built specifically for the smartphone format, web apps need to be responsive and adaptable to different screen sizes and systems. Responsive Design means that web apps are not confined to a single device type and can be accessed through various devices, including tablets, laptops, and desktops, providing users with a seamless experience regardless of the device used. Even if a web application has a responsive design, some functions do not work as well and some not at all on a smartphone.

Certain tasks are accomplished more efficiently on devices other than smartphones. Typing long documents, creating complex spreadsheets, or designing intricate presentations are more comfortably and effectively done on a device with a full-sized keyboard and larger display area. The nature of some applications can demand more robust computing power or a larger screen size than what smartphones offer.

Accessing online applications and information often necessitates reliable and high-speed internet connectivity. While smartphones offer mobile data and Wi-Fi capabilities, network coverage can be inconsistent in certain areas. Devices like laptops or tablets can connect to wired networks or offer stronger Wi-Fi antennas for more stable internet access, crucial for uninterrupted work or streaming.

Multitasking capabilities are essential for professionals juggling multiple applications simultaneously. Smartphones, while capable of multitasking to a certain extent, may not provide the same efficiency as larger devices with split-screen capabilities or multiple windows. Moreover, prolonged use of smartphones may strain eyesight and posture compared to larger screens with adjustable setups.

Security concerns are paramount when accessing sensitive information or using online applications for financial transactions. Devices like laptops or desktops offer more robust security features such as encryption, firewalls, and secure boot options. They also provide better control over data privacy settings and compliance with regulatory requirements.

Tablets, laptops, or Chromebooks do not have to be expensive to provide the size and functionality you need to fully access services and information on the Internet. Take a look at some of these articles that discuss low-cost options for tablets and laptops:

The best cheap tablets of 2024: Expert tested and reviewed | ZDNET

https://www.zdnet.com/article/best-cheap-tablet/

The best cheap tablets in 2024 – our top picks | Tom’s Guide (tomsguide.com)

https://www.tomsguide.com/best-picks/best-cheap-tablets

The Best Cheap Tablets for 2024 | PCMag

https://www.pcmag.com/picks/the-best-cheap-tablets

If you are having trouble affording a tablet, Chromebook, or laptop, PCs for People (https://www.pcsforpeople.org/) may be able to help.  You can also check with local organizations such as the community action agencies that provide community support to see if they provide help in acquiring a tablet or laptop. Local libraries may have computers available to use for services that might be better accessed on a larger screen and with the functionality of a browser on a tablet or computer.

To fully utilize the power and functionality of the applications available online, more than a phone is needed. The cost of the additional tools does not have to break the bank for you to be able to take advantage of all the Internet has to offer.

Dispelling Common VPN Myths

| 0

Virtual Private Networks (VPNs) have become essential tools for enhancing online privacy and security. However, with their increasing popularity, several misconceptions have arisen about what VPNs can and cannot do. Understanding these misconceptions is crucial for users to make informed decisions about using VPNs effectively.

Here are some of the most common myths debunked:

Myth 1: VPNs Provide Complete Anonymity – One of the biggest misconceptions is that VPNs offer complete anonymity online. While VPNs do an excellent job of hiding your IP address and encrypting your data, they are not foolproof. Other methods of tracking, such as browser fingerprinting or cookies, can still identify users. VPNs are one part of a larger privacy toolkit and should be used in conjunction with other privacy measures for better anonymity.

Myth 2: All VPNs Are the Same – Not all VPNs are created equal. There are significant differences in the levels of security, privacy policies, and features offered by various providers. Some may keep logs, offer different encryption standards, or have more robust server networks than others. It’s important to research and compare VPN providers before choosing one.

Myth 3: VPNs Can Make Your Internet Faster – Another common myth is that VPNs can increase internet speed. In reality, the encryption process and rerouting of traffic through VPN servers can sometimes slow down your connection. The impact on speed can vary based on the quality of the VPN service and the distance to the server.

Myth 4: VPNs Are Only for Tech-Savvy Users – VPNs are often thought to be complex and only suitable for advanced users. However, many VPN providers have made significant efforts to create user-friendly interfaces that make it easy for anyone to use their services, regardless of technical expertise.

Myth 5: Free VPNs Are Just as Good as Paid Ones – While free VPNs can be appealing, they often come with limitations such as data caps, slower speeds, and fewer servers. Moreover, some free VPNs may compromise your privacy by tracking your activities or displaying ads. Paid VPNs offer better security and features.

Myth 6: VPNs Are Only for Questionable Activities – There’s a misconception that VPNs are only used for hiding illegal activities. This is far from the truth. Many people use VPNs for legitimate reasons, such as protecting their privacy, securing their data on public Wi-Fi, for work, or accessing content restricted in their region.

Myth 7: VPNs Protect Against All Online Threats – VPNs are excellent for securing your data in transit, but they do not protect against all types of online threats. For instance, they cannot prevent phishing attacks or malware. It’s essential to use VPNs alongside other security measures like antivirus software and safe browsing practices.

Myth 8: VPNs Are Illegal – The legality of VPNs varies by country. In most places, using a VPN is perfectly legal, especially for protecting personal privacy and security. However, some countries have restrictions on VPN use, so it’s important to be aware of the laws in your location.

By understanding these common misconceptions, users can set realistic expectations and use VPNs more effectively as part of their online security strategy. Remember, a VPN is a valuable tool, but not a silver bullet for online privacy and security. It’s one component of a comprehensive approach to safeguarding your digital life.

12 common VPN myths bustedhttps://nordvpn.com/blog/myths-about-vpn/

Common VPN Myths Debunkedhttps://www.bitdefender.com/blog/hotforsecurity/common-vpn-myths-debunked/

Choosing a VPN Service that Works for You

| 0

As you become more engaged online through social media, shopping, education, finance, healthcare, and other applications, and you are following the best practices we discussed in a prior blog to protect your information online, you may be considering using a Virtual Private Network (VPN).  A VPN helps encrypt your data, whether on your home network or using a public Wi-Fi connection, to keep your data safe. VPN products can offer a variety of services beyond encryption that may be helpful to you.

Some of the benefits of using a VPN when accessing online services and information are:

  • Enhanced Privacy and Security – VPNs encrypt your internet connection, making it difficult for hackers, ISPs, and even governments to track your online activities.
  • Remote Access – VPNs allow employees to access their company’s network remotely, enabling them to work from anywhere with an internet connection.
  • Safe Online Transactions – VPNs provide a secure environment for conducting sensitive transactions, such as online banking or shopping.
  • Anonymity – While not completely anonymous, VPNs can significantly reduce your digital footprint by hiding your IP address.

Although there are many benefits to using a VPN, there are some challenges and potential issues:

  • Potential Speed Reduction – The encryption process and server distance can sometimes slow down internet speeds, particularly with low-tier VPN services.
  • Legal and Regulatory Issues – VPNs are restricted or banned in some countries and using them could lead to legal consequences.
  • Compatibility and Complexity – Setting up a VPN can be complex for non-technical users, and compatibility issues may arise with certain devices or networks.
  • Reliability Concerns – Some VPNs may suffer from connection drops, which can interrupt services and cause frustration.
  • Trustworthiness of VPN Providers – Not all VPN services are created equal. Some may log and sell user data, negating the privacy benefits of using a VPN.

Now that you know the potential benefits and issues to using a VPN, here are things to consider when shopping for a VPN service:

  • Understand Your Needs – Before diving into the features of various VPN providers, it’s essential to understand what you need from a VPN. Are you looking to enhance your privacy, hide your location, or secure your data on public Wi-Fi? Your priorities will influence which features are most important to you.
  • Check the Provider’s Logging Policy – One of the most crucial aspects of a VPN is its logging policy. A reliable VPN provider should have a strict no-logs policy, ensuring that your online activities are not recorded or stored.
  • Assess the Level of Encryption – Encryption is what keeps your data secure as it travels over the internet. Look for providers that offer robust encryption standards, such as AES-256, to protect your information from prying eyes.
  • Evaluate Server Networks – The size and distribution of a VPN provider’s server network can affect your internet speed and the ability to bypass geo-restrictions. A larger network means more options and better chances of finding a fast, nearby server.
  • Consider Speed and Performance – VPN services can vary in speed and performance. While some reduction in speed is expected due to encryption, a good VPN provider should offer a service that minimizes this impact. Check independent reviews for speed test results.
  • Investigate Optional Features – Some VPNs come with additional features such as ad-blocking, malware protection, or multi-hop connections. Decide which, if any, of these features are important to you and choose a provider that offers them.
  • Research the Provider’s Reputation – The reputation of a VPN provider is telling of their reliability. Look for providers with a history of protecting user privacy and read reviews from trusted sources.
  • Examine the Pricing and Value – Compare the pricing of different VPN services. While free VPNs may be tempting, they often come with limitations and security risks. A paid service offers better security and features.
  • Check for a User-Friendly Interface – A user-friendly interface can make setting up and using a VPN much easier, especially if you’re new to the process. Look for services that offer intuitive apps for various devices.
  • Review the Customer Support – Reliable customer support is vital, especially if you encounter issues. Check if the provider offers 24/7 support through multiple channels, such as live chat or email. For more detailed reviews and comparisons, consider exploring resources such as PCMag, Wired, and Cybernews.
  • Read the Fine Print – Before committing to a VPN service, read the terms of service and privacy policy carefully. This will help you understand the provider’s commitments to user privacy and any potential red flags.
  • Test the Service – Many reputable VPN providers offer a trial period or money-back guarantee. Use this opportunity to evaluate the service’s performance and ensure it meets your expectations before making a long-term commitment.

A VPN service is a powerful tool for enhancing online security and privacy, but there are many considerations when selecting a VPN service. Users must carefully weigh the benefits against the potential challenges and choose a reputable VPN provider to ensure the best experience. As with any technology, informed use is the key to maximizing the advantages while minimizing the risks.

If you are interested in more information regarding VPNs, please read these online resources:

Why You Need a VPN, and How to Choose the Right Onehttps://www.pcmag.com/how-to/what-is-a-vpn-and-why-you-need-one

What is a VPN and what does it do?https://us.norton.com/blog/privacy/what-is-a-vpn

What Is a VPN, and Why Would I Need One?https://www.howtogeek.com/133680/htg-explains-what-is-a-vpn/

The 10 Best VPN Services for 2024  – https://www.pcmag.com/picks/the-best-vpn-services

5 Best VPN Services (2024)https://www.wired.com/story/best-vpn/

Best VPN Services of 2024 – tested by cybersecurity expertshttps://cybernews.com/best-vpn/

Protect your information online  – https://mobroadband.org/protecting-your-information-online/

Selecting and Using a Password Manager

| 0

In my blog Protecting Your Information Online, I recommend using unique usernames and passwords for every account you create.  For most of us this creates a unique problem in trying to remember all those usernames and passwords. For most of our accounts, our email is our username, but that still leaves the passwords.

Password managers offer a multitude of benefits. They generate strong, unique passwords for each account, reducing the risk of identity theft and account takeovers. By storing all passwords in a secure vault, they eliminate the need to remember multiple login details, streamlining the authentication process. Additionally, many password managers can fill in personal information on web forms, saving time during account creation or online purchases. Password managers can be used across multiple devices, so you have your passwords on your phone, computer, or tablet. They also alert users to potential security breaches, promoting better password hygiene and overall digital safety.

Here are some factors to consider when selecting a password manager:

Multi-Factor Authentication (MFA) – Look for a password manager that supports MFA. MFA adds an extra layer of security by requiring more than just your username and password for authentication. It might involve a PIN sent via text message or an authentication app.

Password Storage Location – Decide whether you prefer a cloud-based or desktop-based solution. Cloud-based options offer convenience and accessibility, while local storage might be preferred.

Recovery of the Master Password – Although password managers eliminate the need to remember multiple passwords, you still need to recall the master password. Choose a manager that provides a way to recover your master password if forgotten, such as a special key or emergency contact.

Free or Paid – Evaluate the features versus the cost of the password manager. A free version might suffice if you only have a few accounts and do not require storing other personal information. Features such as data encryption and access across multiple devices and security such as multifactor authentication, may only be available in subscription-based password managers.

Additional Features – Explore secondary features like automated device sync, multi-factor authentication, autofill, and multi-platform support. Consider your specific needs when evaluating these features.

User Experience – Opt for a password manager with an intuitive interface. It should generate unique passwords for each account and make it easy to manage your credentials.

Among the most popular password managers, 1Password stands out for its user-friendly interface and robust security features, making it an excellent choice for new users. Bitwarden, praised for its free version, offers a solid range of features without cost, appealing to those seeking a balance between functionality and budget. Dashlane, although on the pricier side, provides a polished experience with premium features.

For those who prioritize financial features and multi-device compatibility, LastPass has been recognized as a strong contender, despite some concerns over its security in the past. Meanwhile, NordPass is noted for its overall performance, making it a top pick for many users.

You will also notice that password manager features are now being integrated into web browsers such as Google Chrome, Microsoft Edge, and Mozilla Firefox. They are designed to store, generate, and autofill your passwords across various websites. Choosing between a browser-based password manager and a third-party service depends on your individual needs and security requirements. If you have a limited number of accounts, the convenience and cost-effectiveness of a browser’s built-in manager might suffice. However, if you have multiple accounts and accounts that you would consider sensitive such as healthcare and financial accounts, investing in a dedicated password manager could provide the enhanced security and features necessary for peace of mind.

When you do decide on a password manager and begin to setup the system, to store, manage and create new passwords for your existing and new accounts, be sure to follow these best practices:

Create Strong and Unique Passwords – A strong password is your first line of defense against unauthorized access. Use a mix of upper- and lower-case letters, numbers, and symbols to create complex passwords. Avoid using easily guessable information such as birthdays or pet names. The auto create feature of most password managers will take care of this for you.

Employ Multi-Factor Authentication – Whenever possible, enable multi-factor authentication (MFA) for an added layer of security. This typically involves a combination of something you know (a password), something you have (a mobile device), and something you are (biometric verification).

Regularly Update Your Passwords – While it’s important not to change passwords too frequently, as it can lead to weaker choices, regular updates are necessary especially if there’s a suspicion of a data breach. Try to change annually and you may want to consider quarterly or every 6 months for sensitive accounts.

Never Reuse Passwords – Each account should have a unique password. Reusing passwords across multiple sites increases the risk that if one account is compromised, others will follow. Most password managers will warn you if you are reusing a password or using it for multiple accounts.

Store Passwords Securely – Ensure that your password manager uses strong encryption to protect your passwords at rest and in transit. This prevents them from being easily deciphered if intercepted.

Monitor Password Strength – Use the password manager’s built-in tools to monitor the strength of your passwords and update any that are weak or compromised.

Selecting and using the password manager that meets your needs will create a more secure and streamlined experience as you use online applications and services.

For more information, please visit the following websites:

Protecting Your Information Online

  • https://mobroadband.org/protecting-your-information-online/

Seven Factors to Consider When Choosing the Right Password Manager – Forbes

How To Choose the Best Password Management Software In 2024

Password security 101: Why you need a password manager- Zoho

Picking the right password for your password manager-Bitwarden    

Browser Password Manager or a Standalone Password Service – Consumer Reports 

Links to password Managers:

1Password – https://1password.com/

Bitwarden – https://bitwarden.com/

Dashlane – https://www.dashlane.com/personal-password-manager

LastPass – https://www.lastpass.com/

NordPass – https://nordpass.com/personal-password-manager/