Saturday, May 6, 2017

Netiquette Core Phrases To Avoid - Personal, Informal Or Business - Via Netiquette IQ



9 phrases smart people never use in conversation
By Travis Bradberry May 5, 2017 www.theladders.com
We’ve all said things that people interpreted much differently than we thought they would. These seemingly benign comments lead to the awful feeling that only comes when you’ve planted your foot firmly into your mouth.
Verbal slip-ups often occur because we say things without knowledge of the subtle implications they carry. Understanding these implications requires social awareness — the ability to pick up on the emotions and experiences of other people.
TalentSmart has tested the emotional intelligence (EQ) of more than a million people and discovered that social awareness is a skill in which many of us are lacking.
We lack social awareness because we’re so focused on what we’re going to say next — and how what other people are saying affects us — that we completely lose sight of other people.
This is a problem because people are complicated. You can’t hope to understand someone until you focus all of your attention in his or her direction.
The beauty of social awareness is that a few simple adjustments to what you say can vastly improve your relationships with other people.
To that end, there are some phrases that emotionally intelligent people are careful to avoid in casual conversation. The following phrases are nine of the worst offenders. You should avoid them at all costs.
1. “You look tired”
Tired people are incredibly unappealing — they have droopy eyes and messy hair, they have trouble concentrating, and they’re as grouchy as they come. Telling someone he looks tired implies all of the above and then some.
Instead say: “Is everything okay?”
Most people ask if someone is tired because they’re intending to be helpful (they want to know if the other person is okay). Instead of assuming someone’s disposition, just ask. This way, he can open up and share. More importantly, he will see you as concerned instead of rude.
2. “Wow, you’ve lost a ton of weight!”
Once again, a well-meaning comment—in this case a compliment—creates the impression that you’re being critical. Telling someone that she has lost a lot of weight suggests that she used to look fat or unattractive.
Instead say: “You look fantastic.”
This one is an easy fix. Instead of comparing how she looks now to how she used to look, just compliment her for looking great. It takes the past right out of the picture.
3. “You were too good for her anyway”
When someone severs ties with a relationship of any type, personal or professional, this comment implies he has bad taste and made a poor choice in the first place.
Instead say: “Her loss!”
This provides the same enthusiastic support and optimism without any implied criticism.
4. “You always . . .” or “You never . . .”
No one always or never does anything. People don’t see themselves as one-dimensional, so you shouldn’t attempt to define them as such. These phrases make people defensive and closed off to your message, which is a really bad thing because you likely use these phrases when you have something important to discuss.
Instead say: Simply point out what the other person did that’s a problem for you. Stick to the facts. If the frequency of the behavior is an issue, you can always say, “It seems like you do this often.” or “You do this often enough for me to notice.”
5. “You look great for your age”
Using “for your” as a qualifier always comes across as condescending and rude. No one wants to be smart for an athlete or in good shape relative to other people who are also knocking on death’s door. People simply want to be smart and fit.
Instead say: “You look great.”
This one is another easy fix. Genuine compliments don’t need qualifiers.
6. “As I said before . . .”
We all forget things from time to time. This phrase makes it sound as if you’re insulted at having to repeat yourself, which is hard on the recipient (someone who is genuinely interested in hearing your perspective).
Getting insulted over having to repeat yourself suggests that either you’re insecure or you think you’re better than everyone else (or both!). Few people who use this phrase actually feel this way.
Instead say: When you say it again, see what you can do to convey the message in a clearer and more interesting manner. This way they’ll remember what you said.
7. “Good luck”
This is a subtle one. It certainly isn’t the end of the world if you wish someone good luck, but you can do better because this phrase implies that they need luck to succeed.
Instead say: “I know you have what it takes.”
This is better than wishing her luck because suggesting that she has the skills needed to succeed provides a huge boost of confidence. You’ll stand out from everyone else who simply wishes her luck.
8. “It’s up to you” or “Whatever you want”
While you may be indifferent to the question, your opinion is important to the person asking (or else he wouldn’t have asked you in the first place).
Instead say:I don’t have a strong opinion either way, but a couple things to consider are . . .”
When you offer an opinion (even without choosing a side), it shows that you care about the person asking.
9. “Well at least I’ve never ___”
This phrase is an aggressive way to shift attention away from your mistake by pointing out an old, likely irrelevant mistake the other person made (and one you should have forgiven her for by now).
Instead say: “I’m sorry.”
Owning up to your mistake is the best way to bring the discussion to a more rational, calm place so that you can work things out. Admitting guilt is an amazing way to prevent escalation.

Friday, May 5, 2017

Netiquette IQ Blog Of 5/9/17 - Technical Term - OpenShift


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================





OpenShift
from www.whatis.com

OpenShift is RedHat's cloud development Platform as a Service (PaaS). The free and open source cloud-based platform allows developers to create, test and run their applications and deploy them to the cloud.

OpenShift provides support for Node.js, Ruby, Python, PHP, Perl, and Java and is extensible so that users can add support for other languages. Resources allocated for applications can be automatically or manually scaled so that as demand increases there is no degradation of performance. OpenShift provides portability through the DeltaCloud API so customers can migrate deployments to other cloud computing vendor environments.

Here's how Red Hat describes the process of creating an application through AutoShift:

1.      Create an "Application" in OpenShift (With the command-line or via their IDE)
2.      Code the application (in Vi, TextMate, Eclipse, Visual Studio, or whatever)
3.      Push the application code to OpenShift (again, with the command-line or from their IDE)
++++++++++++++++++++++++++++++++++++
      
Good Netiquette And A Green Internet To All!  ===================================================================== 
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.

Wednesday, May 3, 2017

Netiquette IQ Technical Term Of The Day - Email Spoofing




Email Spoofing
Posted by: Margaret Rouse
Contributor(s): Peter Loshin
Email spoofing is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source. Email spoofing is a tactic used in phishing and spam campaigns because people are more likely to open an email when they think it has been sent by a legitimate source.  The goal of email spoofing is to get recipients to open, and possibly even respond to, a solicitation.
Although most spoofed email falls into the nuisance category and requires little action other than deletion, the more malicious varieties can cause serious problems and pose security risks. For example, a spoofed email may purport to be from a well-known shopping website, asking the recipient to provide sensitive data such as a password or credit card number. Or the spoofed email may ask the recipient to click on a link that installs malware on the recipient's computing device. One type of spear phishing used in business email compromises, involves spoofing emails from the CEO or CFO of a company who works with suppliers in foreign countries, requesting that wire transfers to the supplier be sent to a different payment location.
Email spoofing is possible because the Simple Mail Transfer Protocol (SMTP) does not provide a mechanism for address authentication. Although email address authentication protocols and mechanisms have been specified to battle email spoofing, adoption of those mechanisms has been slow. The SMTP AUTH extension specified in RFC 4954, "SMTP Service Extension for Authentication", defines a way for an SMTP client to negotiate an authentication mechanism with an SMTP server to authenticate the client and, if desired, to set up additional security on the client-server session.
Some other proposed solutions to authenticating email senders include Sender Policy Framework (SPF), a protocol defined in RFC 7208 to allow domain managers to authorize individual hosts to use a domain in email; Domain-based Message Authentication, Reporting and Conformance, defined as an email authentication protocol in RFC 7489; and DomainKeys Identified Mail, which provides a way to validate a domain name identity associated with a message. Sender ID, described in RFC 4407, is an experimental protocol based largely on SPF and promoted by Microsoft, but failed to gain any significant deployment.
To prevent becoming a victim of email spoofing, the FBI and the Federal Trade Commission urge recipients to keep antimalware software up to date, be wary of tactics used in social engineering and contact the sender directly when sharing private or financial information instead of responding through an email. 
============================= 
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
=============================================== 
Good Netiquette And A Green Internet To All! 

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Monday, May 1, 2017

Netiquette IQ Important Security Bulletin - Vulnerabilities For The Week of April 4/24/17


Buy the books at

 www.amazon.com/author/paulbabicki
====================================================




Please click the link below to view the extensive list of vulnerabilities. 
U.S. Department of Homeland Security US-CERT
National Cyber Awareness System:


05/01/2017 06:37 AM EDT

Original release date: May 01, 2017
The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD, which contains historical vulnerability information.
++++++++++++++++++++++++++++++++++++
      
Good Netiquette And A Green Internet To All!  ===================================================================== 
Tabula Rosa Systems - Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value. TRS provides product, design, implementation and support services on all products that we represent. Additionally, TRS provides expertise in Network Analysis, eBusiness Application Profiling, ePolicy and eBusiness Troubleshooting

We can be contacted at:

sales@tabularosa.net  or 609 818 1802.
 ===============================================================
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


Additionally, I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology market.