7 TIPS TO BECOME MORE PRODUCTIVE

The online dictionary defines productivity as: “the effectiveness of productive effort, especially in industry, as measured in terms of the rate of output per unit of input.”  Yeah right!?  The kids are creating abstract art by painting the walls with ketchup and mustard… Your sister is distressed and is looking to you for support (or just a reassuring ear) because mom keeps calling her shallow because she is always posting selfies… The family rallies together to demand a meal better than “ramen noodles with your choice of toppings”… You have already flipped your socks inside out – laundry must be done … and still you need five more pages to submit an assignment which is due in 83 minutes.  There is no energy drink that can help you now!!!!  How do an individual become productive?  If you read between the lines, the person I just described is productive.. Or is she?  If your answer is “she is not productive,” then you are correct!  In the above scenario, there is nothing getting done, she is skating by on activities and duties which needs her attention.  And, more than likely, she will have an ulcer due to stress in little or no time.  Productivity is a broad term.  You can be productive at school, or home, or work.  But, how does an individual obtain a holistic realm of productivity.  Below are 7 tips to help you become more productive: Make a to-do list (tackle to tough items on your agenda first) Decide how much time you need or want to spend on each goal (time management) Avoid addictive time wasting activities...

HOW TO SETUP AND CONFIGURE WIRELESS NETWORK IN SECURE MANNER

Wireless networks are setup based on the administrator or end user’s goals, which includes:  speed, range, and security.  Deploying secure wireless networking is an ongoing practice.  Employing encryption to protect wireless network is one of the best manner to protect your wireless network from attacks and interceptions.  Encryption is the process of preventing unauthorize access by changing information or data into a code.  Wireless network users have an option of choosing between three common forms of secure encryption.  These options are: WEP, WPA. And WPA2.  Details regarding these protocols can be accessed through Wireless Encryption Basics.  Passwords are simply one level of security.  Encryption and selecting the right wireless broadband router are also essential when setting up your wireless network.  Another facet of setup of routers that should be considered is location.  Placement of the wireless router near a window means that your wireless signal range reach too far outside the house where it can be easily interception by cybercriminals.  Place your router in the middle of you house so all rooms have the same internet access.  When you leave on vacation, make sure to disable your wireless network, prevent an opportunity for malicious hackers to attempt to gain unauthorized access to your network. Here are great points about securing your wireless network: New technology on routers has wi-fi protected setup which has a WPS button to lock the device during setup. As with any software, check the manufacturer’s website for updates to your firmware. Disable SSID in your wireless setting which will prevent your device showing up is a list of nearby network. Each device on the network...

Best free online training courses for IT Computer Support Professional

While in the process of finding out if wanted to go to school in any field of IT I looked into Coursera.  Coursera is a online certification website that offer classes in various parts of technology. They have classes that range from hours to week long that is taught by known professionals in the field. They also have other students that will attend the class online with you to allow a more interactive learning experience. Some courses also offer certificates that are acknowledged in the technology industry and beneficial to enhancing your career. Most courses are free and open to the public from beginners in the industry to expert professionals. Once you begin your first class, you have the option to sign up for the signature track that allows to take courses and receive a grade to track your process as you take learn more skills . Another free online training class for IT professionals is the Introduction to Linux website. This class is about a week long and includes the course and course materials for free. Once you finish the entire course you will receive a certificate of completion similar to the one offered at Coursera. The class is taught to engage IT professionals and administrators and gives resources and tools that will benefit them throughout their career. MIT has a program called edX that gives users free access to actual courses taught at MIT and Harvard University. It engages the user with self paced learning and online discussion groups. Upon completion of the program they also give out certificates to the student but it will not be...

How to train users after new system was implemented at work

The most difficult part of implementing a new software is employee participation. Many employees will not want to get used to the change of workflow caused by the new software. It’s best to make a plan to determine if you will introduce the software to the entire organization as a whole or if you will break it down by department. I recommend introducing it to the organization then engaging with the software by department to tailor it to the needs of the staff. Once you develop an approach to implement the new software, you will need to set training goals. The training goals should include a deadline to prevent loss in productivity and work flow processes. During the planning process you should also complete a needs assessment to avoid training on parts of the software that are not relevant to your company or team. Overloading the trainees with information they won’t use for work can cause confusion and slow down productivity during the transition. Implementing the New Software Once you have a solid plan that includes training, realistic time frames and deadlines and training goals you can begin to implement the new software to staff. You will first want to remind them why the need for new software because most of the staff will be resistant to the change. Many people usually fine with the way things are at work and don’t want to feel like they have more work to do. Once you give them the why you will need to explain the what. What part of my job will this new software affect? They will need an...

How to protect data on Mobile devices?

  Here are useful security features for your mobile device. Use whichever feature your device offers that provide the best security for your needs: 1.  Password, pass code, or Pin: If you set a password, pass code, or Pin to access your device is simple and effective. Try using a code that is four digits or longer so that you can keep it a secret, like you do for any of your other passwords. 2. Unlock pattern:  Many mobile devices let you set unlock patterns that function like passwords in a way. Use a pattern that is complex and keep it a secret to protect it from observers. Also be careful of smudges on the front of your device may reveal your pattern to unauthorized users. 3. Device lockout: Most mobile devices provide a lockout option that locks the device if someone makes several unsuccessful attempts to enter the password, Pin, or pattern. If you set the lockout setting to a limit of 10 attempts is usually enough....

How to find disassembly and reassembly instructions for laptop, Ultrabook and mobile device repair?

I hate to make a long story short so lets expand on this a little. I grew up with highly pixelated images, The Number Munchers game, and well before Google. If you need answers you went to go get them. As in physically leaving the house to go get them.  Number Munchers circa 1991 ish Since we have all of resources at our fingertips i’ll highlight some of the best sources that may come up during your google search. The best way to find disassembly and reassembly instructions are to first search by the model and brand of mobile device, laptop or ultrabook that you own. If you have a Dell Ultrabook it’s best to do a search using both dell and ultrabook disassembly and reassembly as keywords. This will give you a more narrowed down search that is specific to your kind of device.  If you do a generic search it will give you instructions for their device which may not apply to yours. If you are a visual person you can even watch YouTube tutorials to see how others have disassembled and reassembled thier device or even follow along with them. Here’s a screenshot of a video on YouTube that shows the disassembly of a Dell Ultrabook: To complete the process with less errors, I recommend using YouTube because it is easier to follow the instructions.   https://www.ifixit.com/Teardown/Dell+XPS+13+Teardown/36157 Ifixit gives detailed step by step instructions on disassembling a Dell Ultrabook along with pictures like the one seen above from their website. Ifixit and other similar websites are excellent ways to find disassembly and reassembly instructions for laptop, Ultrabook and...

How to Train Users After New System Was Implemented At Work

For many users, new technology is exciting and inviting.  When a new is implemented at work the result is productivity – getting more things done … and things done much faster than the old system allowed.  However, other users are skeptical about digital transformation.  For these employees, the old system worked well, and the new system brings confusion, anxiety, and frustration.  The rate of a person’s or group’s progress in gaining experience or new skills is usually slow.  Training seminars, flowcharts, organizational charts, implementation charts, manuals, memorandums, etc. seems endless and time-consuming.  All employees need to understand how new systems will benefit them and their respective jobs. The pace of technological advances in the workplace is often slow because of several factors, including budget and many people do not want to have their routines disrupted.   Managers and training personnel need to get employees comfortable crossing the bridge to technological improvement.  It is important to understand how to implement a new system in the workplace. COMMUNICATIONS Keep employees updated on possible technological changes – this means from the exploratory point up to the final launch date.  Outline the benefits and how the implementation of a new system will impact each employee and the overall productivity of the business. CUSTOMIZE TRAINING The rate of familiarity and interest in technology varies greatly.  Whether an individual is an auditory, visual, or a kinesthetic learner, we all absorb information differently. Modify training sessions to accommodate different types of learners by providing a range of learning styles and materials.  Present options such as documents, live training, interactive social media tools, and videos that will be...

How to remember only one password and maintain high levels of security with LastPass?

A long time ago, computer hackers were considered geeks who sat in their basement or garages and became expert programmers… that is the movie’s version.  In real life, hackers have no single descriptive factor.  Today’s hackers are defined as a person or persons who gain unauthorized access to users’ information for the intent of personal gains or malicious activities… it could be a friend next door, a family member in your home, or a complete stranger thousand miles away in a foreign country.  Years ago, hacking required hours of sitting in front of a computer trying various methods to gain unauthorized access through different levels of security on a computer system or network.  Now, is it as simple as running a program or utilizing a hacker tools which exploit weak points and vulnerabilities and penetrate private information.  Sometimes, hackers take only a passive role and observe network activity, while others take on a more active role and simulate attacks and use confidential information for malicious gains.  Whatever the case, it is an invasion of privacy and breach of security … we are now in the new era of cybersecurity.  With all the worms, viruses, malware, spyware, how can users maintain and secure password credentials and personal information? If you are like me, all passwords are conveniently “remembered” on your personal laptop or computer.  But, if you need to logon to a site using a different computer away from home, you either:  a) reset your password after successfully advancing through a two-factor authentication (for example:  email address associated with account or “what was the name of your first pet?”) or b)...

How to setup and configure wireless network in secure manner?

Whether it be for home or business, a secure network connection is very important to protect the information stored on your computer or while using the internet. If you want to set up a secure network you must first determine the type of connection you want- either wireless only or the option to cable (Ethernet). Once you have established the type of connection you want for your home or business you can now protect your network. To protect your network you can begin by changing the SSID of your router. It’s recommended to use a SSID that is not recognizable or can be identified by your business or home name to avoid the attention of hackers or even neighbors that may try to use your connection. Once you have chosen an unidentifiable user name you can disable the routers SSID Broadcast setting to prevent hackers from detecting your wireless network. The next step in securing your wireless network is to set up encryption. A 128-bit encryption is more secure but the process will depend on the software installed on your router.  Using a WPA is most effective, WEP have been known to be insecure. Unfortunately, older computers may not support WPA and you will need to WEP by default. If you are able to use WPA you should set your password as a long alphanumeric combination with more than 10 characters that will be hard to guess by neighbors or hackers. If you have a firewall, which most antivirus software includes.  Another way to set up and configure a secure wireless network is to disable wireless administrating. This disables...

Most important features of Samsung Galaxy Note 4

  1. Link preview enables you to view the URL link received via SMS or messengers in advance using the S pen with opening a web browser. To activate that you will need to go to settings, then to S pen, and last Air view. Then you need to move the S pen close to the URL link and you will now be able to see the major contents provided by the URL in a pop up window. 2. Caller information display features –  When you get a call from someone, sometimes you want to know what the person has been up to lately or about the last conversation was made between you and the person. You can check information about the person when you are receiving a call from, or making a call to. If you want to show caller id you will need to go to the dial app and check to settings, then calls, and last show caller information. It will then show all the person’s activities uploaded to his or her contact history. 3. Wi-Fi Sharing – This feature allows your device to connect to another device that is connected to Wi-Fi without having to type in the password. To get to to this feature you will need to make sure your connect to Wi-Fi. Once that opens go to Quick Connect by swiping down the Notification panel from the top edge of the screen, then finds device that needs to be sharing the Wi-Fi with, and last select Share Wi-Fi to share your Wi-Fi network. 4. One Handed Operation – This feature is awesome out of the...