Dress for Success: The 5 Shoes Every Woman Should Own by Lauren Roso was posted at Lawyerist.com on February 3, 2012 Lauren discusses shoes that are wardrobe staples every woman should own. While I mostly stick with black, Lauren has inspired me to branch out a bit. Follow this link to learn more.
Fix Formatting Fast: Five Microsoft Word Tricks by Deborah Savadra was posted on Lawyerist.com on February 14, 2012 When you’re under the gun with a brief or something else that’s due ASAP, the last thing you need is Microsoft Word creating some formatting snafu that defies logic. You need to fix that formatting fast and get back to the business of legal writing. Follow this link to read about all the quick tricks Deborah suggests you try.
Seduction in the Office Vivia Chen posted this article on February 13, 2012 at Careerist.com. As she says, “You know the rules: Do not fool around in the office. It’s risky. Unprofessional. Riddled with conflicts. And so Newtonian. But dating in the office is rampant, says Career Builder. Almost 40 percent of workers say they’ve dated people from their office. And almost one in five say they’ve dated their boss. Sadly, however, firms and companies—scared of potential conflicts and harassment claims—have all sorts of rules about romance in the office. ” Vivia believes that true lust will provail. Follow this link to head her advice to help you snag that object of desire at work while enhancing your career.
Traveling Light in a Time of Digital Thievery This article by Nicole Perlroth appeared at NYTimes.com on February 10, 2012 and provides information about digital espionage as a real and growing threat — whether in pursuit of confidential government information or corporate trade secrets. “When Kenneth G. Lieberthal, a China expert at the Brookings Institution, travels to that country, he follows a routine that seems straight from a spy film. He leaves his cellphone and laptop at home and instead brings “loaner” devices, which he erases before he leaves the United States and wipes clean the minute he returns. In China, he disables Bluetooth and Wi-Fi, never lets his phone out of his sight and, in meetings, not only turns off his phone but also removes the battery, for fear his microphone could be turned on remotely. He connects to the Internet only through an encrypted, password-protected channel, and copies and pastes his password from a USB thumb drive. He never types in a password directly, because, he said, “the Chinese are very good at installing key-logging software on your laptop.” To read the full article, follow this link.