Blog of Tips, Tricks & Resources from New Horizons Central

Becoming proficient with Connection tools in Microsoft Visio 2016

Connecting the shapes in organization charts and workflow diagrams

Nicole Winn 0 32

For 23 years, I have trained hundreds of students in Visio and OneNote, which are 2 of my favorite programs to work within. I have found over the years some students mainly have questions about performing faster and or quicker in each program. Let me begin with Visio and a quick tip to assist with connecting the shapes in organization charts and workflow diagrams.

CLD Corner: Being Your Own Hype-Person

Even after nearly a decade and a half of teaching, training, and leading, I still get nervous on new encounters. Crazy right? The fact is this: It happens to the best of us.

Nicole Winn 0 306

The best trick I have ever learned is to Be Your Own Hype-Person.

This revolves around having positive self-talk and finding the strengths in the way you deliver. It seems simple, but when fear comes our way, we begin to protect ourselves and find any negative out there. Positive self-talk allows you to be assertive with the person who needs it the most in those tough situations: You.

Visual Studio Code | Expert Resources & Extensions

Charles Watkins gives you the run-down and excellent summary of Visual Studio, with direct resources. Microsoft got it right.

Nicole Winn 0 373

 

Visual Studio Code (VS Code), by Microsoft, is a FREE small lightweight code editor that can be installed on Windows, MacOS, and Linux.  VS Code is not an Integrated Development Environment (IDE) like Visual Studio but it has many IDE-like features.

Microsoft Azure Employment Outlook

Organizations are focused on hiring workers who can help build out their online operations—on platforms like Microsoft Azure—and keep their organization running smoothly.

Nicole Winn 0 233

 

A recent IT spending survey conducted by Goldman Sachs showed that, while Amazon is still the largest of the cloud service providers, Microsoft Azure is the most popular provider and is quickly gaining market share. Organizations prefer Azure because of its flexibility, security features, and ability to scale, and employers across the country are currently looking for skilled Azure workers to help build out their online operations.

Numbering Systems & Conversions

Converting from one numbering system to another as a basic skill to other skills...

Nicole Winn 0 206

 

With anything related to IT someone needs to understand numbering systems and converting from one numbering system to another as a basic skill to other skills. This piece is related to that requirement which is a basic skill in the following CompTIA courses: A+, Network+, Server+, Security+, CASP, Cloud+, and CySA+ as well as Cisco and Microsoft certifications.

Anyone with questions is invited to communicate with me at drussell@nhnashville.com and I will be glad to communicate with them. 

Social Engineering and Cybercrime – ACE In The Hole

The data is indisputable.  Of all the cyber-attacks reported over the past decade, those that started with social engineering dwarf all the other types of attacks by unheard-of percentages. 

Nicole Winn 0 243

 

Let’s look at it from the cybercriminals point of view;  you can either attempt to write the most awesome, complex, greatest password-cracker program in the history of password-cracker programs, or you could develop a confidence game directed at an employee who might be having a bad day, or at a group of employees who have not had proper cyber-security awareness training in order to steal credentials. 

Penetration Testing vs. Vulnerability Assessment

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration. 

Nicole Winn 0 182

 

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration.  

When VLookup doesn’t cut: Try Index/Match

The Index Function is a function that finds a value in a dataset, but it doesn’t care about Unique Identifiers.

Nicole Winn 0 240

 

If you know the row, it’s a go. If you know the Column, no problem. The Match Function finds Rows and Finds Columns. So, when their powers combine…we find values. Remember the VLookup is a function within Excel that finds a value in a Dataset by looking at a Unique Identifier and then finding the appropriate value in adjacent columns to the right.

In a FLASH!

Watch Excel magic happen with the Flash Fill Data Separation Tool

Nicole Winn 0 124

 

Flash Fill is a data separation tool that has been packaged with every version of Excel since 2013!  However, it is often overlooked and underutilized.

RSS

Theme picker

Loader