IT Job Titles – What Do They Mean?

Although only a few decades old, the information technology or IT field is as broad and deep as industries that have been around for centuries. IT job categories, titles and specialties abound – so many that anyone investigating IT as a career is likely to be very, very confused. What’s the difference between a Network Engineer and a Network Support Analyst? Between a Web Developer, a Web Designer and a Web Technology Specialist? Just what does a Database Administrator do?Although labels and responsibilities tend to vary from employer to employer, here are some common IT job titles and their descriptions. Consider these when looking for an IT career that best suits your interests, talents and temperament:Database Administrator – A database is any collection of information that a company or organization keeps on file (e.g. customer names, addresses, inventory, etc.) The Database Administrator (DBA) is in charge of organizing, maintaining and updating this database and creating systems so that people authorized to view, add or remove information are able to do so as quickly and as easily as possible.Internet Solutions Developer – This is a “catch-all” description for a person responsible for devising and executing Internet-based projects. The job usually involves working with programs that allow the public to view and interact with a company, organization or agency’s Website.IT Project Program Manager – This is a managerial position requiring some years of experience in the IT field. The IT Project Program Manager is responsible for finding solutions to IT-related problems and then implementing those solutions, often with the help of a team.Network Administrator – A “network” is any collection of computers that are linked either to each other or to a central server so that information can be created, shared and updated. The Network Administrator is generally responsible for making sure than an existing network runs smoothly and for adding or removing hardware (computers, printers, etc.) and software (programs, applications) from the system.Network and Security Specialist – The Network and Internet Security Specialist is the person responsible for making sure people who use a computer network only get access to that information they are allowed to see, that information in the network database’s is protected and properly preserved, and that the network cannot be accessed (or “hacked”) by unauthorized individuals, wherever they may be.Network Engineer – The network engineer is usually responsible for 1) Designing new computer networks, 2) Actually creating these networks, 3) Installing the computers and software that connect to the networks and, 4) Ensuring the network is able to grow and function as needed.Network Support Analyst – A Network Support Analyst is much like a Network Administrator in that he/she is responsible for keeping an existing network operating as needed, but has fewer managerial responsibilities. The Network Support Analyst may also be responsible for monitoring how people actually use the network, identifying problem areas and then recommending and implementing solutions.Software Developer/Engineer – “Software” is the set of instructions that make a computer do what you want it to do. The Software Developer/Engineer is the person who writes the instructions, also known as “code,” for these computer programs/applications. Software Developer/Engineers may work “in-house” developing customized programs for a specific employer or client, or may work on programs that are then sold commercially.Technical Support Specialist – Computers and networks invariably have problems, and it’s the Technical Support Specialist’s job to identify these problems and find a way to correct them. Technical Support Specialists often work at “help desks” where they communicate with company employees or customers by phone, IM or email.Web Developer – Web Developers create, maintain and update the functional aspects of Websites, be they on the Internet or on a company’s internal Intranet. When designing a new site, they’re usually responsible for creating its architecture, navigation and interactive functions. They may also be responsible for creating programs or applications designed specifically for the Web.Web Designer – While the Web Developer is concerned with the technical aspects of a Website or Web-based application, the Web Designer is responsible for how such a site or application actually looks. This is an artistic position that requires training and experience in graphic design and layout – and perhaps even animation — as well as the technical aspects of Web operations.Web Technology Specialist – This position combines the responsibilities of the Web Developer and Web Designer. The Web Technology Specialist needs to not only the technical aspects of Websites and applications, but also needs to frequently handle the design and graphic aspects as well.If you are considering career training in Information Technology, you need to understand these (and other) job descriptions so you can pursue the education and training that will qualify you for the kind of IT job that fits your talent and personality.

Source by Allen B. Ury

How to Track a Cell Phone?

Have you ever wondered how to track a cell phone? Perhaps you worry that someone may be tracking your mobile. With the advancements and large strides in cellular technology, we already know we are being tracked. Obviously a mobile phone company knows exactly where you are at all times. Well, at least they know where your cellphone is. Apple, Inc was scrutinized by the media for tracking and keeping a record of all iPhone users. Many people feared they were being followed on their phone due to that privacy breach by Apple.Tracking a mobile device is accomplished via the use of a global positioning system, or better known as GPS.A GPS or GPRS can easily track any mobile. Phone applications have reached the technological point where GPS tracks your every move. Your phone connects directly to the satellite and beams back to you your location. If you want to track a cellular device, simply install the software. The software is meant to track a cell phone that has been lost or stolen. If you track someone else’s mobile, it may be illegal. At the very least, most would call it unethical. (But law enforcers do that, sometimes even crossing the lines.)If you want to track a cellular phone, first of all you will need to buy one with GPS tracker enabled. About 80% of phones on the market are enabled. You will need to find a cellphone service provider that allows for tracking. Specific GPS tracking plans exist, primarily intended for parents and employers that can help you easily learn how to track a cell phone location from your own wireless phone or PC.You can also track cells online. These cell phone tracker programs are Sprint/Nextel’s Mobile Locator, Verizon’s Family Locator and AT&T’s Family Map. Cell tracker services generally cost about $10-$15 per month, nothing to sneeze at when it’s added to all the other costs of a mobile phone plan. Using a tracker program to track a mobile can provide peace of mind in the form of interactive, real-time location maps on your phone or online.The program Google Latitude uses a tracker mapping program that uses cellphone towers to locate users who have approved that you can trace them. Other similar map-based mobile phone locator apps (most of which rely on GPS cell phone tracking) include Mologogo, Buddyway and Instamapper.Before you start tracking a cellphone with GPS or a software program, you should consider the consequences. Whether you learn how to track your cellphone, or someone else’s phone, by accessing your phone’s location, you’re allowing others to access your phone’s whereabouts, too. You should therefore practice caution when using any type of cell phone tracker. Here’s what to look out for when tracking a phone.Be aware of the risks of trying to track a mobile phone. As Jeschke of EFF points out: “Location data from cell phone tracking does not disappear when you’re done with it.” In fact, she says mobile device location tracking can even be subpoenaed and used in divorce or custody hearings. She adds that it’s not hard to imagine that cell phone locator services like GPS tracking and other tracking programs could be misused. For example, an abusive spouse may try to find out what domestic violence shelter his partner is in by tracking her phone. To protect against unwanted invasions of privacy, and prevent people from tracking your cellphone, Jeschke advises turning off the location services on your phone unless you absolutely need them.To track a cell phone means to invade privacy. There are bootleg programs and illegal software that give you the full benefit of a cellphone being traced. These programs may have viruses or spyware. Just like a computer can be tracked, so can a cell phone. If you are worried someone may try to track your cell phone, you can turn off the GPS which is usually located in system options. If you are trying to track a cell phone illegally, then the consequences are possible prosecution for hacking. It Is recommended you stay in the legal realm, such as online services to try and track a cellphone.

Source by Dan Crane

Caller ID and Blocking Calls With MagicJack – Yes, There Are Some Easy and Free Solutions

When I look over the statistics and see the Google search terms for my blog, one of the larger keyword phrases I see is “how to use MagicJack with call blocking or caller ID.” And I’ve good news and bad news. Officially, MagicJack does have caller ID and doesn’t have call blocking. But there are a few nifty free tricks you can easily do to have those functions.Since caller ID is the easiest let’s do that first. MagicJack essentially keeps a log of all incoming (and outgoing) calls. And basically you just need to label the numbers. Once the numbers are labeled whenever you get a call from the number again you’ll be able to identify the caller. So there you go “caller ID.” It’s easy, but a little bit of a speed bump. I think the real thing people want is the ability to identify “unknown callers.” Guess what though? If the person calling you has chosen to hide their number you wouldn’t be able to see it anyway. So back to square one no matter what phone service you use.But I understand where all this leads; getting calls from unknown callers makes you want something to block them. And again, “regular” phone companies aren’t really furnishing this service as much as they used to. I remember in the 90’s being able to get call blocking and then the phone companies seemed to have stopped offering it and started giving out a “if the caller is harassing you fill out a police report, send that to us and we’ll block the number” solution. I don’t know why but the phone companies just wouldn’t do it, or if they did not without a substantial fee. Internet based phone companies like MagicJack and Vonage aren’t offering the service either. I was with Vonage for five solid years and no matter how much we complained they just wouldn’t do it.To the rescue comes a couple of internet solutions. The best solution to block calls is and (at the same time) isn’t available. It used to be called Grand Central. They issue you a phone number and you link it up to all your personal phone numbers. The phone number they give you acts as a first line of defense; you can then block incoming calls, reroute them to your a number of choice, or send them to voicemail. Again, it’s free. But currently it’s being rebuilt as “Google Voice.” I strongly urge MagicJack users, and really everybody, to sign up for a Google Alert to let you know when the service goes live again. In March of 2009 they announced they were nearly ready. And coupled with a service like MagicJack which is only 20 dollars a year (or a dollar a month if you use it the way I do) it’s the most powerful and inexpensive phone/voicemail/texting combination you can get.Until Google Voice is available I recommend that you get a free piece of software called “PhoneTray.” It will work with your computer’s modem to act as a first line defense with incoming calls. Among the many features it can do for free is it can also block calls. So in just a few minutes you can have a system that will give you a lot of peace.

Source by David Rosenthal

Mattel cancels Cortana-powered Aristotle smart speaker over privacy

Mattel disclosed Thursday that it has cancelled its Mattel Aristotle, a Microsoft-powered smart speaker that was designed as a sort of digital nanny.In the end, the fact that the Aristotle could stand in for a normal, flesh-and-blood parent led government officials to ask Mattel to not bring the toy to market, according to a report by The Washington Post. Sen. Edward J. Markey (D-Mass.) and Rep. Joe Barton (R-Tex.) were concerned about the toy’s effect on privacy, specifically the children in its care.For its part, Mattel told the Post that it had decided to cancel the toy in July, after its new chief technology officer had canned plans for the product “as part of an ongoing effort to deliver the best possible connected-product experience to the consumer.”According to a demonstration at the Consumer Electronics Show this past January, Aristotle consisted of two components: a webcam/baby monitor, and a cylindrical speaker that chatted back and forth with kids. Evoking the design of Google Home, the speaker also had colored LEDs embedded deep within. These lights could perform night-light duties as well as change colors in response to questions, or as parts of games. Perhaps more importantly, the Aristotle used Microsoft’s Cognitive Services, an AI technology that Mattel said would eventually be replaced with its Cortana digital assistant. It was a fairly high-profile win for Microsoft, which has said that it is trying to build Cortana into a range of products and services. So far, though, its only Cortana-powered product appears to be the Harman Kardon Invoke, a smart speaker due this fall. Meanwhile, Google and Amazon have announced several products powered by the Google Assistant and Amazon Alexa Voice service respectively, including smart speakers such as the new Google Home Mini. Amazon has partnered with a range of other manufacturers to embed Alexa into their products as well, including, most recently, Sonos and its new Sonos One speaker.Why this matters: Amazon, Apple, Google, and Microsoft would have you believe that smart speakers are increasingly necessary as digital assistants around the home. But where kids are concerned, legislators and parents alike are increasingly suspicious of toys that interact and learn from children. The Post story notes that Mattel cancelled Hello Barbie, an interactive Barbie doll that listened to and learned from its owners. And, of course, there’s the perpetual concerns about webcam hacking and other ways of monitoring your children that can be twisted for other purposes. 

To comment on this article and other TechHive content, visit our Facebook page or our Twitter feed.

Source link

SurfEasy review: A zippy VPN from north of the border

SurfEasy in brief:P2P allowed: Yes—Ultra customers onlyBusiness location: CanadaNumber of servers: 1,000+Number of country locations: 16 (Total) / 28 (Ultra)Cost: $48 billed annually (Total) / $77.88 billed annually (Ultra)Most people never heard of Toronto-based SurfEasy until it was snapped up in early 2015 by browser maker Opera. Even if you’re still unfamiliar with this VPN, you might have used it: SurfEasy powers Opera’s free VPN built into its browser, as well as the free VPN apps for Android and iOS.On top of all that free stuff, SurfEasy has its own paid VPN service separate from Opera’s free offering—according to a company rep, there’s no overlap between the two.Ian Paul/IDG SurfEasy with an active VPN connection.
SurfEasy’s Windows desktop could use a little design work. The Windows desktop app exists only in your system tray. To open SurfEasy you click on the icon and the interface pops up in the lower-right corner of the taskbar. When disconnected, SurfEasy shows your location based on your IP address, and when you are connected it shows your apparent location based on your VPN IP.To change your VPN location click the flag icon in the upper-right corner. This reveals a list of all the various country locations you can choose from. SurfEasy offers two different paid services: Total and Ultra, which determines the The number of countries you get—16 and 28, respectively.It’s frustrating that the SurfEasy Windows app can’t be moved from the lower-right corner, which is already a hub of activity on Windows 10 PCs thanks to incoming notifications.Note: This review is part of our best VPNs of 2017 roundup. Go there for details about competing products and how we tested them.Features and servicesOne of SurfEasy’s top features it that it works with U.S. Netflix, and reliably so. During my time with the VPN I never had a problem using an American server and watching video on the premium service.The company seems to be focused on improving its country connections and server count rather than offering a bunch of added features and services. SurfEasy automatically blocks ad tracking, and it offers a feature that automatically connects to the VPN when on Wi-Fi—not uncommon among VPN providers. SurfEasy’s automated connection feature is fairly indiscriminate. It automatically connects to the VPN over any Wi-Fi connection versus only over open networks where no encryption or significant protection exists.SurfEasy permits torrents but only as part of the Ultra package.The only critical setting that SurfEasy’s app offers is whether to activate the VPN app on startup.SurfEasy allows you to use up to five devices simultaneously, and there are apps for Windows, Mac, Android, iOS, as well as proxy extensions for Chrome and Opera.SurfEasy costs $48 or $88 per year depending on the plan you choose and offers a 7-day money back guarantee.PerformanceIan Paul/IDG SurfEasy’s country choices.
SurfEasy is now the fastest VPN service we’ve tested displacing former speed champ Mullvad. In our tests, SurfEasy was fast across all the connections we tried—U.S., UK, Germany, Japan, and Australia—dropping to just 55.28 percent of the base speed. That is a tiny drop when most services are dropping down to about 33-35 percent overall.Keep in mind, however, that your experience with SurfEasy—or any other VPN—may vary depending on your ISP, router, device, and connection type.The one quibble I have with SurfEasy’s performance is that at times the connection stalled for a few seconds after the app connected to a new region. Privacy, anonymity, and trustTo sign-up for SurfEasy requires an email address, and those who wish to could use a pseudonymous email address. That won’t get you very far in terms of anonymity, however, as SurfEasy does not offer any significant way to pay anonymously or semi-anonymously. All payments are handled via a credit card or PayPal. There are no options for paying in cash or with cryptocurrencies like Bitcoin.SurfEasy said it offered Bitcoin at one time, but usage was too low and at the time Bitcoin was inconvenient since you couldn’t charge customers monthly. The company says it might think about re-introducing Bitcoin in the future.SurfEasy’s business address is 488 Wellington St. W., Toronto, ON, Canada, which is listed on the company’s website. The company’s leaders are listed on the site as co-founder and CEO Chris Houston, and co-founder and CTO Athir Nuaimi. There are also 41 SurfEasy employees listed on LinkedIn, most of whom are in Toronto or the surrounding areas, suggesting that the bulk of SurfEasy’s workforce is centrally located in a single office.As for SurfEasy’s privacy policy it’s okay and fairly detailed, but probably won’t appeal to the hyper-privacy conscious. SurfEasy says it does not log your browsing and internet activity. It also won’t store your originating IP address.SurfEasy does aggregate bandwidth usage for various purposes including billing, network operations, and support. In fact, the company may suspend your account for using an unusually high amount of bandwidth. It may also have to look at your activity during a customer support call, but that data is logged long term.SurfEasy says it also uses an automated network traffic management system that requires “real-time analysis” of traffic that includes destination websites and originating IPs. No logs are maintained of this activity, however.SurfEasy says it also uses Google Analytics in its apps to monitor the app’s design and service. I asked SurfEasy about this and a company representative said, “The analytics are in place to aid in our product development…For example, do customers (in aggregate) understand / can they find the freemium option…It’s 100% restricted to in-app behavior and is in no way associated to the VPN tunnel.”ConclusionSurfEasy is not the VPN you want to use if you’re are interested in being as anonymous as possible. Primarily because when it comes time to pay you can only use standard forms of electronic payment, which are easily traceable.If all you’re looking for is a good connection to watch Netflix or carry out other high-bandwidth activities on a solid VPN connection then SurfEasy comes highly recommended.

To comment on this article and other PCWorld content, visit our Facebook page or our Twitter feed.

Source link

Communication – Effective and Efficient Ways of Relaying Information

The main objective of any business is to make profits. It is then important for business owners to look for attributes that will ensure their businesses are run efficiently. On this article I will dwell on the importance of relaying information or in other words communication.The communication process is commonly defined as the process by which a person (the sender) transmits information to another (the receiver). It is where one relays information, ideas, understanding or feeling to someone else. The process of communicating involves the sender transmitting information, the receiver then decoding the message and sending feed-back through a communication channel.Sometimes communication faces several challenges such as language barriers, perceptual differences that are brought about by our cultures and backgrounds, pre-conceived ideas where one jumps to conclusions before meditating on the relaying information, premature evaluation and personal insensitivity.However, these barriers can be overcome by striving to be brief and to the point. It is always important to pass on accurate and complete messages and being empathetic to the one receiving the information.Getting the receiver’s attention helps in making sure you pass information and one way of doing this is by using visual devices as they have a greater impact than words. Try also to use a combination of communication media to relay information; these would be like radio, television and internet just to mention few.If you are operating a business, it is important to put more effort into communication. Your customers, suppliers and staff should be kept informed at all times. As a business owner it is advisable to develop an effective feed-back system so as to know where to improve.Follow the links below to learn more in the importance of sound ways of relaying information in a company setup.

Source by Stephen Kavita

3 billion Yahoo accounts hacked: 5 things you should do to stay safe

If you had a Yahoo account in 2013, your name and password were stolen.Yahoo expanded the scope of its massive data breach on Monday. In December, the Internet giant announced a hack that affected over a billion accounts, making it by far the largest data breach in history. Now, the company says that every Yahoo account in existence in 2013—more than 3 billion—was breached. The hackers walked away with password hashes that can be easily cracked.If you’re a Yahoo user you should consider your password compromised and should take all the necessary steps to secure your account. You should follow all of Yahoo’s recommendations, such as changing your password and watching for suspicious account activity, but here are a few more advanced tips that you should have in mind.And if Yahoo’s lack of security has you down, read PCWorld’s guide to replacing five major Yahoo services and deleting your Yahoo account.
Editor’s note: This article was originally published on December 16, 2016 in the wake of initial breach reports, but was updated after Yahoo expanded the breach to 3 billion accounts.
1. Never reuse passwordsThere are many secure password management solutions available today that work across different platforms. There’s really no excuse for not having unique, complex passwords for every single account that you own. If you do want memorable passwords for a few critical accounts use passphrases instead: sentences made up of words, numbers and even punctuation marks.According to Yahoo, this breach happened in August 2013, at a time when the company hadn’t yet switched to the more secure bcrypt password hashing algorithm. As a result, most passwords that were stolen are in the form of MD5 hashes, which are highly vulnerable to cracking.If you made the mistake of using your Yahoo password elsewhere and haven’t changed it yet, you should do so immediately and review the security settings of those accounts too. It’s very likely that hackers have already cracked your password and had three years to abuse it.2. Two-factor authentication everywhereTurn on two-factor authentication—this is sometimes called two-step verification—for any account that supports it, including Yahoo. This will prompt the online service to ask for a one-time-use code sent via text message, phone call, email or generated by a smartphone app when you try to access the account from a new device. This code is required in addition to your regular password, but Yahoo also has a feature called Account Key that does away with regular passwords completely and instead requires sign-in approval via phone notifications.Two-factor authentication is an important security feature that could keep your account secure even if hackers steal your password.3. Don’t save emails you don’t needBecause space is no longer a problem with most email services, users tend to never delete emails. While that’s extremely convenient, it’s not a very good idea, because it allows hackers to easily discover what other online accounts are tied to that address by searching for sign-up or notification emails from various online service providers.Aside from exposing the link between your email address and accounts on other websites, sign-up and notification emails can also expose specific account names that you’ve chosen and are different from the email address.You might want to consider cleaning your mailbox of welcome emails, password reset notifications and other such communications. Sure, there might be other ways for hackers to find out if you have an account on a certain website, or even a number of websites, but why make it easier for them to compile a full list?4. Check your email forwarding and reply-to settingsEmail forwarding is one of those “set it and forget it” features. The option is buried somewhere in the email account settings and if it’s turned on there’s little to no indication that it’s active.Hackers know this. They only need to gain access to your email account once, set up a rule to receive copies of all your emails and never log back in again. This also prevents the service from sending you notifications about repeated suspicious log-ins from unrecognized devices or IP addresses.Another technique that attackers might use to get a copy of your emails is to change the reply-to address in your email settings, although this is noisier and can be spotted more easily than a forwarding rule.The reply-to field is included in every email message that you send and allows the recipient’s email client to automatically populate the To field with an address you chose when they hit reply. If a hacker changes the reply-to value with an address that he controls, he will receive all email replies intended for you and these typically include the original emails that you sent.In order to ensure that you also get those replies, the attacker can set up a forwarding rule in their own email account and automatically forward those replies to your address.5. Phishing follows breachesLarge data breaches are typically followed by email phishing attempts, as cybercriminals try to take advantage of the public interest in such incidents. These emails can masquerade as security notifications, can contain instructions to download malicious programs that are passed as security tools or can direct users to websites that ask for additional information under the guise of “verifying” accounts.Be on the lookout for such emails and make sure that any instructions you decide to follow in response to a security incident came from the affected service provider or a trusted source. Official Yahoo emails are easily recognizable in the Yahoo Mail interface because they are marked with a purple Y icon.In the future, be selective in what personal information you choose to share and which websites you choose to share it with, even when those websites are legitimate. There’s no guarantee that they won’t be hacked in the future and you simply don’t know how securely they store your details.In Yahoo’s case, the compromised account information includes names, email addresses, telephone numbers, dates of birth and, in some cases, unencrypted security questions and answers. These details can be used to impersonate you or to authenticate you on other websites.Don’t provide real answers to security questions, if you can avoid it. Make something up that you can remember and use that as answer. In fact, Yahoo doesn’t even recommend using security questions anymore, so you can go into your account’s security settings and delete them.

To comment on this article and other PCWorld content, visit our Facebook page or our Twitter feed.

Source link

Security Issues With Online Hotel And Ticket Booking Websites

The Internet has quietly revolutionized the world. It has made completion of tasks easy and fast, making us dependent on it heavily for almost every aspect of our life. One of the earliest revolutions took place in the banking industry, followed by the ticket booking services, after the US military made their ARPANET project public and allowed universities and businesses to take advantage of this wonderful technology.Interestingly, computer and programming nerds create primitive web based ticket booking systems with the Java language, which is considered by many as the language of the internet. They do so for their academic projects in their schools and colleges and these applications are insignificant with respect to the commercial versions. However, the case was discussed to make the reader realize the popularity of theses internet based ticket booking applications.Now, coming to the main point, online ticket booking and hotel reservation systems often provide the option of paying the required amount online, which is referred to as wire transfer in common man’s language. These websites use third party plug-ins through APIs, that integrates their website’s database with the bank’s computer systems and servers through a software-defined network device called the Payment Gateway.Generally, these payment gateways are extremely secure environments that employ Secured Socket Layer or SSL algorithms, which can be 64 bit or 128 bit encryption algorithms, based on the requirement. 128 bit SSL algorithms are the most secure algorithms deployed in public domain for the purpose of securing fund transfer environments and encrypt the sensitive information with a highly secure process that is extremely difficult to crack by present standards.The problem, or rather the loopholes lie with the internal data storage mechanisms deployed by the third party ticket booking websites. Sometimes, to reduce the cost associated with maintaining the security standards high, these websites do not take adequate measure to ensure that the payment related information are safe in their servers. It might also be the fact that their server or database administrators are not skilled enough to ensure stringent security measures are deployed.It may happen that while no security breach takes place on part of your bank’s transfer system, security loopholes might exist in the hotel’s or the airline’s own website. If their servers are hacked and the data is appropriately mined by any expert hacker, your entire details regarding the financial transaction, including your credit card details, will be in front of the hacker.The hacker can simply download or copy the information to some other system of his own and use the same to perform unauthorized transactions and fund transfers. Although banks deploy double-layered verification methods to mitigate such frauds, the process is far from being full-proof.Thus, think twice before you trust third party hotel and ticket booking service. Even the best hotel booking service providers are vulnerable to such server attacks by cyber experts and they do very little to plug the loopholes in their systems and servers.

Source by Ritam Dalui

Assertive Communication Styles: Important Points To Remember

Assertive communication styles help you clearly and directly state your opinions without violating those of others. They allow you to demand respect without being disrespectful.In contrast to assertive communication styles, aggressive communication violates others’ boundaries. It blames, lies, hurts and judges. Passive communication, on the other hand, avoids expression of feelings and is permissive to abuse.Assertive communication somehow finds a balance between these two as it promotes a healthy relationship through cooperation. Need more reasons to adopt this type of communication? Here are a few pointers for you to think about.1) Assertive communication styles help us feel good about ourselves and others.They put high importance on self-esteem. You strongly advocate for your rights alongside the rights of others. It means that you value your time, your opinion and your needs. It means that you don’t let anyone take advantage of you.You know that your opinion matters, but you also know when to shut up and when to speak up. You know that you are competent and you do not allow others to manipulate you.2) Assertive communication styles create a respectful environment where others can grow and mature in.When you refuse to be taken for granted or disrespected, you set boundaries and standards for yourself and for others around you. You become an example, a role model.This creates an opportunity for an open line where one listens to the other, respects what the other has said, and strives to contribute to the improvement of the idea.After all, communication isn’t just a one way route. Feedback must also be taken into consideration.3) Assertive communication styles lead to the development of mutual respect.They don’t always guarantee that you get what you want, at least in the beginning. This is because high regard is given to the opinion of others, not just yourself.They allow for negotiation and agreeable compromise. They also encourage fairness and objectivity and appeals to the common interest of both sides.The goal of assertive communication is mutuality: to give respect and be respected, to ask for fair play and have room for compromise (should conflict arise).Assertive behaviour aims not to win the situation, but to even out the balance of power. It also paves the way for an honest relationship. Keep in mind, however, that others can respond to your assertiveness with their own opinions and needs – it’s always a two-way process.Assertive communication styles can be challenging to carry out in the beginning, but can be learned and improved over time with practice.

Source by Michael Lee

How to Get an Inexpensive Or Free Computer Monitor That Rocks

A personal computer is no good without a good monitor. Sure, computers are great at number crunching but most of the time we are surfing the net, dealing with email, viewing photos or videos and that requires a decent monitor. Many computers come with a monitor but you may want to upgrade, and very often great deals in computers come monitor free. How can you get a really good monitor for not much money, or better yet for free?Now anyone can plunk down money for a monitor and buy whatever they want, and if you are short o time and long on money this is a reasonable thing to do, but there are plenty of existing monitors out there that won’t cost much.First of all, older monitors use CRT or Cathode Ray Tube technology and are big, bulky, and heavy, but many of them have large screens and absolutely wonderful graphics quality. Once you get the heavy beasts in place they absolutely rock. You can often get these for free! Yes, it’s pretty amazing but people dump perfectly great monitors for the latest and greatest, that might not even be better quality! In my town you actually have to pay the dump ten dollars for them to take your monitor! So, where do you find one of these monitors? Look online locally is the best bet. Try Craigslist and Freecycle.org for example, and you just may find someone giving a great monitor away or selling it dirt cheap. It works; I’ve done it and got a 24″ somewhat heavy monitor with years of life left in it and absolutely wonderful video quality!Modern monitors use LCD or Liquid Crystal Display Technology, and are also call flat screen monitors. Their biggest advantage is not video quality, but size and weight. They are thin and light. They can also cost quite a bit of money, but you can find decent ones online for around $100. Of course you can also look for used ones on Craigslist and eBay, and refurbished models are also a good bet; try some of the major vendor websites like Dell Computer.I like to look on Amazon for LCD monitors that are selling at a very deep discount. You may need to look a few times, but this often means the monitor has been discontinued and they are dumping the very few they have left at a very cheap price.

Source by Harold Baldwin