Get your brain in motion

Tag: Guidelines (Page 1 of 2)

5 tips for novice public speakers

Dananjaya Hettiarachchi, the winner of the World Championship of Public Speaking 2014 organized by Toastmaster International, interviewed by Richard Feloni for The Business Insider Australia, suggests 5 tips for novice public speakers.

Tip 1
Always start with a message. A common mistake is to start with a topic, instead a speech should begin with a message, as concise as possible. This message is whatever you want your audience to be thinking about when your presentations concludes.

Tip 2
Be confident enough to yourself. You need to sell yourself before to sell your message, the way to do that is to be genuine. A speech should be conversational, not theatrical. The only way to go in front of an audience and to present in a way that isn’t simply miming is to practice again and again, pretending that you’re talking to your closest friends.

Tip 3
See yourself through your audience’s eyes. Speakers tend to become wrapped up in themselves, maybe because they’re afraid to acknowledge a room full of listeners. But if you’re going to speak, you need to realize that you’re doing it for the benefit of others, not yourself.

Tip 4
Have a forum to practice. 80% of the path to becoming a great speaker is trial and error and the only way to learn is by speaking in front of an audience that will give honest feedback.

Tip 5
Find the right coach or mentor. You should find someone willing to help you grow as a public speaker. This does not need to be someone who can teach you advanced speaking techniques; they just need to be someone who gives you permission to explore possibilities, who gives you permission to fail.

Read here the full article

Speech

Image: flickr – Brian Talbot – (CC BY – NC 2.0)

Eighty/Twenty

80 and 20. For those who are familiar with management consulting techniques, these two figures may say a lot:

  • 80% of a company’s profits come from 20% of its customers;
  • 80% of a company’s complaints come from 20% of its customers;
  • 80% of a company’s profits come from 20% of the time its staff spend;
  • 80% of a company’s sales come from 20% of its products;
  • 80% of a company’s sales are made by 20% of its sales staff.

The 80/20 rule basically states that, in many circumstances, 80% of the effects come from 20% of the causes.

This rule is formally known as the Pareto principle, after the Italian economist who, in the last decade of 19th century, observed that 20% of Italian population owned 80% of the land in the country.

Many business consultants built upon this intuition solid analysis tools in order to improve companies’ results, in terms of revenues, sales, profits.

But some of them, as Richard Koch, went further, trying to convince us that the 80/20 rule, like few more simple principles similar to that, “work extremely well for making money, for your career, and for your happiness and value to others.”

80-20

Image: Flickr – Keith Chu – 80/20: it’s a rule (CC BY-NC-SA 2.0)

Cybersecurity: Trust No One

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of December the attention is drawn on “Trust No One

Diplocalendar2014_Page_26Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Social Media

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of November the attention is drawn on “Social Media

Diplocalendar2014_Page_24Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Encryption

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of October the attention is drawn on “Encryption

Diplocalendar2014_Page_22Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Passwords

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For this month the attention is drawn on “Passwords

Diplocalendar2014_Page_04Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Flash Memory

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of August the attention is drawn on “Flash Memory

Diplocalendar2014_Page_18Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Downloads

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of July the attention is drawn on “Downloads

Diplocalendar2014_Page_16Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Backup

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of June the attention is drawn on “Backup

Diplocalendar2014_Page_14Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

Cybersecurity: Synchronisation

The Diplocalendar 2014 realised by S. Baldi and E. Gelbstein is dedicated to “Cybersecurity: Guidelines for diplomats” and is based on the assumption that “Cyberspace is inherently insecure“.

For the month of May the attention is drawn on “Synchronisation

Diplocalendar2014_Page_12Image: Diplofoundation

The set of images used in the Diplocalendar 2014 can also be consulted on Slideshare

« Older posts