The world of digital technology can be confusing. Many organizations fail to understand the clear distinction between various platforms within the digital technology. Do you need an IT specialist, a web developer, or a website designer? And who does what exactly? Digital service providers have a different set of skills and areas of expertise.
This is how it works: you don’t take your car to a collision shop when you want it detailed, or to a tire store when you want the oil changed. The same thing applies to information technology and web development. We are going to dissect the distinction between web development and information technology to help clear confusion and help you better communicate about the different roles.
What is Information Technology?
Information Technology (IT) has to do with the implementation and maintenance of your organization’s computer network. An IT specialist is the person handles the company’s software, hardware, email systems and security systems.
In the Web Industry scope, IT encompasses storage, transfer, reception and manipulation of data using computer networks. It may not be clear at a first glance, but IT represents the technology behind the standardization and coordination of the organization’s information.
What is Web Development?
Web development refers to the creation and development of websites and hosting them on the internet or intranet. This should never be confused with web design, which typically focuses on the aesthetics of websites. To draw a clear distinction, web designers create designs for a website before it comes alive, while a web developer will utilize the design to carry out the actual coding of the website, bringing the ideas to life.
Web developers work on anything as simple as plain text pages, to more complex social networking sites like Twitter or Facebook. During the development, the web developer engages the web designer and the client through critical thinking, planning, and discussion.
The Comparison Between IT Administrator and Web Developer
You can now see that these two fields are totally different, but the case may not be immediately clear when you first walk into a web company’s office. Here’s an analysis of the job description for an IT Administrator and a Web Developer:
An IT Administrator’s roles and duties include:
- Configuring computer networks in the organization for easy communication among the coworkers.
- Setting up and managing existing network infrastructures in the organization and ensuring a seamless flow of data and consistent internet connection.
- Managing all software and hardware used by the organization and keeping all the software licenses up to date.
- Managing software and hardware purchasing.
- Proper keeping of organizations data and information with backups.
- Troubleshooting any computer hardware failures of the organization.
The Web Developer’s duties and responsibilities include:
- Developing websites using the most prominent coding languages and technologies.
- Fixing bugs on the existing websites.
- Interacting with clients to clearly understand their goals and needs.
- Maintaining websites.
- Collaborating with web designers to bring their concepts into reality.
- Handling domain names and hosting configurations.
- Creating technical documentations that accompany websites.
It’s pretty clear now that the two jobs have very little similarities. Training in each area is needed to be successful in either role and being able to explain the difference to companies will make sure you exceed employer expectations in a more defined success plan.
The Newport News campus of Centura College will be hosting its 5th annual Fall Festival on the 21st of October. Event will feature a variety of seasonal activities for the whole family, including a trunk or treat.
By Brian Stauss
Centura College will be holding its 5th annual Fall Festival on Saturday, October 21, at its campus located at 616 Denbigh Blvd., Newport News, VA. The festivities begin at 10 a.m. and will continue until 2 p.m.
This family-friendly event will feature music, refreshments, games for all ages, seasonal arts and crafts, a haunted house, as well as a trunk or treat for children. Complementary chair massages and medical vital checks will also be available for attendees.
“The local community is the lifeblood of Centura College,” says Greg Daniel, Campus Executive Director at Centura College’s Newport News campus. “Our Fall Festival is an opportunity for us to open our doors to the community and have folks come see what Centura has to offer, all in a relaxed, fun, and family-friendly atmosphere.”
This event is free and open to the public. For more information, contact Centura College’s Newport News campus at (757) 874-2121 or go to the event page on Facebook at https://www.facebook.com/events/120668051926682.
About Centura College
Centura College has been part of an organization dedicated to helping men and women develop careers since 1969. By training working adults in healthcare, technology, business, legal studies and trades, they connect communities with some of the fastest growing career fields in today’s marketplace. The school offers professional facilities, knowledgeable instructors, day or evening classes, job placement assistance and is accredited by the Accrediting Commission of Career Schools and Colleges (ACCSC). To learn more, visit www.CenturaCollege.edu or like them on Facebook at https://www.facebook.com/centura.edu.
Health Information Technologists are part of a healthcare interdisciplinary team and an integral part of the healthcare profession. As a student in Centura College’s Health Information Technology training, students will obtain a vast array of knowledge about the information technology field in preparation for entry into the workforce.
The Goal of Health Information Technology
A health information technician is entrusted with the application of IT resources on health care operations. This objective can be accomplished through use of technology in the management of health care information.
Defined by the Bureau of Labor Statistics, health information technician:
Medical records and health information technicians, commonly referred to as health information technicians, organize and manage health information data. They ensure that the information maintains its quality, accuracy, accessibility, and security in both paper files and electronic systems. They use various classification systems to code and categorize patient information for insurance reimbursement purposes, for databases and registries, and to maintain patients’ medical and treatment histories. (1)
The employment for health information technology is projected to continue growing in the future. According to the Bureau of Labor Statistics, the growth rate is set to be about 15% faster than the average for other jobs. This improvement can be attributed to the increased need for medical by the older generations. There will be a higher demand for health insurance information management because more individuals are benefiting from the reforms on the federal insurance. In addition, more hospitals and clinics are embracing electronic health records, providing extensive opportunities for HIT experts.
The median pay in 2016 for health information technicians was $18.29 per hour or $38,040 per year. The number of HIT jobs in 2014 is estimated at 188,600 and the field has continued to expand. Those who hold a health information technology diploma are eligible for employment as a coder, biller, medical record specialist or health information technician.
1. “What Medical Records and Health Information Technicians Do.” U.S. Bureau of Labor Statistics. U.S. Bureau of Labor Statistics, n.d. Web. 26 July 2017. < https://www.bls.gov/ooh/healthcare/medical-records-and-health-information-technicians.htm#tab-2>Source
By Robb Rajnys and Jul DeGeus
With great technological advances, comes great technological responsibilities; like protecting your personal information.
Thanks to the progress of technology, we are living in an age where you can accomplish almost anything with a swipe of a finger. Track your fitness, manage your bank account or even supervise your lights and lock systems at your home remotely; that is, as long as you have a Wi-Fi connection and a charged smart phone. But like all great things, technology comes with a downfall: cyberattacks.
There severity of a cyberattack is only limited to the imagination of the person who creates the virus. Familiarize yourself with common terms and proactive prevention to ensure the safety of your personal information:
Malware: In Latin, “mal” means “bad,” it’s no surprise that malware is the general term for malicious threats, like Trojans or worms, that try to steal and destroy data.
Malvertising: Keeping in mind that the Latin root of “malware”, malvertising is an ad that has been infected with malware. When you click on the ad, whatever was effect the cyberattacker loaded in the coding of the ad is downloaded on your computer.
Password Attacks: Probably the most obviously attack term, password attacks occur when a hacker tries to steal your password for information. Cyber thieves can use a program to access your passwords, or even resort to old fashioned ways: peering over your shoulder to see your smart phone screen as you type in the pin to your debit card.
Phishing: Another term many people are familiar with is “phishing.” This attack targets your email accounts. The attacker sets up a company and requests personal information or provides a link to click on. The website’s information you’re directed to aligns with the information you received in the email, sometimes creating a false sense of security and legitimacy. As soon as you input your information, the hackers can use it as they see fit.
Ransomware: In a nut shell, Ransomware is a virus that will lock you out of all your data- documents, photos, contacts, etc. – until you pay a fee. If you chose not to pay the fee, you’ll have to wipe your whole computer in order to use it, losing all of your data anyway.
Thwarting the Attacks
Never fear, prevention is out there! To counter the above hazards, ensure you install and adhere to the following:
Firewalls: This is a virtual gate, if you will, that can prevent or allow certain traffic from leaving or gaining access to your PC. To increase effectiveness, the firewall should stay turned on, especially if you are connected to the internet.
Antivirus Software with Ransomware Protection: Invest in a good antivirus software that includes a ransomware protection plan; good meaning that you should pay for it. Most free antivirus protection software only monitors issues and then alert you, not take care of the problem. Purchasing antivirus software provides monitoring and proactive protection.
Keep Your PC Up to Date: Most users do not maintain their updates. Updates are important because they’re purpose is to help keep your computer safe. Every time a new malware is developed or and old one is updated, programmers hastily work to develop and push out an update to their consumers to counteract its effects, keeping your information all the more protected.
Email: Everyone on the planet has an email now a days. 91% of cyberattacks stem from email. Be wary of emails you receive that:
- Request passwords
- Request your Social Security Number
- Offer anything “free”
- Alert you with an “urgent” warning or threat of an expiration of an account
- Request credit card information
Everywhere you go on the internet leaves “footprints;” where you shop, where you bank, what you may want to buy, etc. Malware picks up on your “footprints” and tries to trick you by creating emails and pop-up advertisements that are catered to your internet browsing, searching and buying habits. If something look suspect, treat it as such. However, if you land on a website you’re not so sure about or regret downloading a file, there are handy websites to scan files or sites in question.
File Storage: Backup your computer and all data regularly to ensure its safety. Use a secure file housing website, software, or simply copy important folders and files to a USB disk regularly. This minimizes the impact, headaches and helps to avoid having pay a ransomware to get your vital documents.
By Shawnte’ Peterson, Massage Therapist Coordinator at Centura College’s Chesapeake Campus
Edited by Jul DeGeus & Esperanza Poquiz
A massage therapist’s work often involves lifting clients’ body parts, repetitive postures and forceful pressure that could lead to injury or ailments. To help prevent damage, massage therapists should remember to care for their body, as it is the main tool of their trade. Here at Centura College, we encourage our students and staff to care for themselves and listen to the advice we give clientele. This self-care means nurturing your body by fueling it with nutrients to keep it energized and carefully listening to our body when it establishes its limits.
The American Massage Therapy Association describes self-care as, “an indication that you recognize the importance of balance in your life. Placing a priority on self-care helps you center yourself and reduce stress.” Practicing self-care can extend the longevity of a massage therapist’s career. By learning techniques to keep hands and wrists healthy, a massage therapist benefits by working smarter and not harder through body awareness. Massage therapist can find tips, such as the ones listed below, useful in everyday life and at work as a means to avoid burning-out and injury:
Centura College Chesapeake Campus’ Massage Therapy students practicing yoga.
Stretching– A massage therapist should know better than anyone that “warming up” before putting your body through intense activity helps prevent strains. Massage therapists can develop the best stretch routine by consulting with their doctor.
Massages– Whether it’s a self-massage or a massage from a coworker, massage therapists should get them often, especially since therapist have a great understanding of massage benefits including stress relief, pain management and improving sleep cycles.
Proper Diet and Nutrition- Regardless of profession, everyone should have a diet tailored to the improvement or balance of their health. By visiting a dietitian or doctor, massage therapist can create a meal plan full of the nutrients they need.
Body Detoxes– Preforming a body detox can boost a healthy mindset. Massage therapists that detox can experience sharpened thoughts, improved breathing and a surge in energy.
Exercising– To preform optimally, massage therapists should exercise regularly. Exercising strengthens therapists’ body, from the hands to the core.
Yoga and Meditation- With similar positive body strengthening effects to exercising and stretching, yoga also includes the revitalizing element of meditation to put the mind in a positive state. Starting the day with a positive energy will allow for therapists to transmit this energy to the people they interact with.
Because massage therapist’s jobs are labor intensive, they need to move to keep their muscles and joints healthy. Keeping this in mind, massage therapist will have a long positive career, which will ensuring the happiness of their clientele and themselves.
By Jul DeGeus
Some might argue that professionalism is one of the keys to success in the business world. Knowing the rules of business etiquette can set you apart from other employees, but one of the most commonly abused etiquette rules is the use of cell phones. While you should refer to your company’s rules and regulations for instruction regarding cell phone usage, these are some best practices:
Cellphone Volume and Ringer/ Ringtone
There’s nothing worse than sitting at your cubicle, working on a report in a silent office and having your phone ring. Anxiously, you bustle around through your personal items, quickly trying to hush it. You apologize for disturbing everyone and, red-faced, you get back to work hoping you won’t be made fun of later for your choice of ringtone. Two main rules of etiquette can be learned in this situation:
- Always remember to silence your phone- Make turning your phone to “silent mode” part of your morning routine to save you some shame. Breakfast, shower, brush your teeth, check your phone, grab coffee and head to work.
- Pick a professional ring/text tone- While you might know all the words to “Baby Got Back,” and even have a choreographed dance paired with it for special occasions, your ringtone reflects your professionalism. Keep it generic to keep it professional.
Also keep in mind that setting your phone to “vibrate” is not the same as “silencing” your phone. While it is harder for some to pick up the sounds, vibrations are audible, especially if sitting on a tabletop surface.
When and Where to Use Your Cell
Lunch time is the perfect time to take or make personal calls. Most lunches are “off the clock” which is the ideal time to make your calls. Just be aware of your surroundings and understand that in a cafeteria or restaurant setting, others have the opportunity to hear part or all of your conversation. A personal or secluded space, such as your car, will allow for more privacy.
Most companies allow you to use your phone on break, but take into consideration how long you use your phone. Generally, breaks are 15 minutes. If you exceed this time, it is likely that your boss will notice and could result in discipline.
It’s not the best idea to use your phone when in your cubicle. A neighbor can pop their head over the separator and gaze your screen or overhear a chat you are having. Additionally, you do not want to interrupt your peers’ concentration by carrying out a loud, disruptive dialogue.
People often use restrooms to have conversation on their phone. While this seems private, voices can carry through the buildings ventilation system. Not to mention, if your office shares a single or limited number of stalls, you could be holding up someone who needs to use the restroom.
There’s always an exception to the rule and when it comes to cell phones, emergencies are the exception. If there is some sort of emergency that causes your phone to ‘blow up,’ communicate this with your boss so they are aware of why you are on your phone.
Say you are in a meeting and someone vaguely refers to information you know you have access to via your cell phone. In situations like this, it’s ok to use your phone to access the information, so long as you announce that that is what you are doing. Something as simple as, “I’ll get those exact numbers for you,” or, “I have that email, let me pull it up,” will let everyone in the meeting know you are using your phone to enhance the meeting, rather than ignore it.
When interacting with people, give them your full attention. Try not to use your phone as a timepiece and avoid your smart watch; if you spend too much time looking at your smart watch, people will assume you are checking a text message and ignoring them. Finally, as sneaky as you may be, don’t read text messages under the table, behind a coffee cup or in back of portfolio or clip board.