Blog of Tips, Tricks & Resources from New Horizons Central

Critical Thinkers are ‘COACHES’! Seven Characteristics of the Strongest Critical Thinkers | CLD Corner with Jason Pugh

What if I told you that there are seven characteristics that the strongest critical thinkers possess? Let me introduce you to COACHES.

Nicole Winn 0 900

Each of these characteristics allows us to stay calm and apply various strategies when making important decisions.

Making More Meaningful Meetings | CLD Corner with Jason Pugh

One big question I have received since the online transition has been “How can I make my meetings more purposeful?”

Nicole Winn 0 549

One big question I have received since the online transition has been “How can I make my meetings more purposeful?” I get statements like “I can’t get my team to engage” and “I can’t seem to demonstrate meaning behind the meeting.” I would be happy to help! There are two strategies I use to better engage participants in my meetings: IEEI and The 6 P’s.

Becoming proficient with Connection tools in Microsoft Visio 2016

Connecting the shapes in organization charts and workflow diagrams

Nicole Winn 0 679

For 23 years, I have trained hundreds of students in Visio and OneNote, which are 2 of my favorite programs to work within. I have found over the years some students mainly have questions about performing faster and or quicker in each program. Let me begin with Visio and a quick tip to assist with connecting the shapes in organization charts and workflow diagrams.

Penetration Testing vs. Vulnerability Assessment

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration. 

Nicole Winn 0 410

 

Penetration testing, ethical hacking, or pen-testing as it is often called, is a much more active approach to identifying and even attempting to exploit vulnerabilities in a particular system, while a Vulnerability Assessment is an exercise in checking the security state of a system at a particular point in time or under a specific configuration.  

Power BI - Ways to Drill Down Into Your Data

Power BI has become an integral part of a lot of companies trying to find out not only what their information says, but what it means, especially in relation to predicting what comes next.

Nicole Winn 0 246

 

Let’s face it: these days, people need to get their information quickly, and they need to have it summarized so that people can easily read and interpret it. Charts allow users to summarize data very quickly and efficiently. And Power BI does a fantastic job of giving users plenty of options to organize your data.

CLD Corner: Developing a Better Online Presence

Virtual Remote Environments: Tips, Tricks & Signals

Nicole Winn 0 381

 

With the recent transitions in shifting to a more virtual work environment, it is imperative to show that you have as strong of an online presence as you do a face-to-face presence. All too often, we run into issues with our “home office setup,” and we need to better understand what signals we are providing the people we are conversing with. 

The Case FOR Dual-Axis Charts in Power BI

The ultimate goal of many reports is to help someone make a decision.

Nicole Winn 0 409

 

An easy way to get that information across is in a graphical representation (a fancy term for a chart). With Microsoft's Power BI, you can easily take all kinds of data and create many different types of charts and display them in an easy-to-understand report to tell a story about it. One quick and easy way to do this is by using a dual-axis chart.

RSS

Theme picker

Loader