Mind Strengthening: How to keep your head above the waves!

posted in: General 0

How do you remain positive during unstable economic times and a global pandemic?
How do you stay sane during trying times?
How do you make your mind obedient?
How do you make your mind, mind?
By Taking Every Thought Captive!

I write this blog coming from a place where I have personally seen the face of mental illness and the battle for the mind. I battled with severe depression and anxiety for a number of years. Fortunately somewhere along the line, I found healing and in the process, I learned a few things about the mind and its power but moreover, I learned that all things were permissible in my mind but not everything was beneficial to me and I was determined to never be mastered by anything my mind willed.

In winning the battle for my mind. I went through vicious cycles that came in the form of meltdowns, relapses, and mistakes that happened after I had been momentarily volatile in stressful situations. I am aware that there is much material out there on this topic, but all I wish to do for this blog is give 3 principles that I used over the years and more frequently during the trial period of 2020 and 2021. I hope it helps someone as much as it has me.

1. Do not believe everything that you think

Sometimes what we think is far from true, the thoughts that appear in our minds do not always reflect or support the condition of reality and because of this, we should not assume that what we think is true regardless that it comes from within us. The world puts suggestions in our minds that are inaccurate, and we are flooded with those false ideas all the time and this results in corrupted minds that we should not always trust.

We tell ourselves things like ‘things aren’t as bad, things are better than they really are,we’re doing okay/I am fine’ we tell ourselves ‘it’s no big deal,’ when it really is. I often advise against not allowing your emotions to feel what they need to. This is our body’s way of re-setting when it is overwhelmed. When you try to bypass that natural process, you cause worse damage. You would not continue driving an overheating car because the radiator can explode and the engine could catch fire, why would you do that to your body and mind!?

2. Guard your mind for it is the wellspring of life

The wise are always hungry for knowledge and the foolish feed on trash’

Just like there are three kinds of food for your physical body; food that makes you smart, junk food (simple calories), and toxic food (which is poisonous) the same is true in what you feed your mind. What you graze on [even in your spare time] all diligently develop and shape your thought processes and if it is garbage that you’re taking in, garbage will come manifest as involuntary actions. My advice would be to start filling your mind with things that develop your emotional intelligence. When confronted by difficulties, do not be anxious, but approach every situation with thanksgiving and try to find things you can be grateful for within the trouble. Try to learn not to resist against tough times, but rather re-channel towards gratefulness, this will turn your mind away from the things that could potentially crush your mind. It’s all about finding a positive perspective!

3. Stretch Your Mind

If we are going to fight the battle of the mind we need to learn how to stretch it – this is a crucial part of the battle.

The act of stretching the mind begins when we teach our minds to think BIGGER. Think beyond the current circumstances: Be a person with vision!

People with goals hardly perish because they have an overarching vision for their lives that serve as GPS coordinates that keep them in control even when skies are grey and overcast. Have goals, without them it is impossible to stay grounded when this world shakes you with uncertainty.

 

Concluding, I learned it was not enough just not to believe everything I thought. It was not enough just to guard my mind against the junk. I figured I needed to stretch my mind and imagination because I saw that I was faced with the constant need to outthink, out-dream, and outsmart this world and all its troubles.

I would say this to you as a reader, learn to push against internal and external resistance. Learn to endure the discomfort. Persevere through any current limitation until the discomfort decreases and the capacities to move forward increase. Do not give in to the part of you that offers all kinds of reasons for why you should give up. Strive, run the good race until it is finished.

Hold the vision and trust the process, this will give you hope. Hope will fuel your Heart. The Heart and all its good affections will overpower the mind. And in this peculiar coming together of the heart and mind, engaging your physical body you will find that you start receiving outward fuel that helps you get through each day.

Take it one step at a time, tomorrow will worry about its own problems.

 

Book Sources:
Not by Sight: A Fresh Look at Old Stories of Walking by Faith, Jon Bloom
Don’t Follow Your Heart: God’s Ways Are Not Your Ways, Jon Bloom
Think, John Piper
Craig Groeschel, Winning the War in Your Mind – Change Your Thinking, Change Your Life


To view more Articles, please visit our Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.

About Minnie Zondi

I am an insanely optimistic ambivert that does everything from the heart instead of the mind. Deeply interested in people and matters that pertain to mankind.

Featured Company: RMS (Reinforcing & Mesh Solutions)

 

Read about who’s who in the Industry:

This week we are featuring Reinforcing & Mesh Solutions, based in Germiston, Gauteng. RMS supply their products nationally and were founded in 2002 with the goal of becoming South Africa’s leading supplier of reinforcing steel bars (rebar) and welded mesh.

RMS 2

If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Featured Companies, please visit our Leads 2 Business Blog.

About Candice Erasmus

I have been working at Leads 2 Business for 10 years of which 8 have been as the Sales Manager. I enjoy every aspect of my job and strive to hold the L2B flag high in all I do.

Staff Spotlight: Candice Erasmus

CE STAFF SPOTLIGHT - doc (1)

To view more Articles, please visit our Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.

About Candice Erasmus

I have been working at Leads 2 Business for 10 years of which 8 have been as the Sales Manager. I enjoy every aspect of my job and strive to hold the L2B flag high in all I do.

Reasons to Feature your Company with L2B

Why should you Feature your Company with Leads 2 Business?

Well, why not?

It is a free service we offer our clients to be noticed!

As a supplement to our blog, we have the Featured Company slot which introduces you, an L2B subscriber – who you are and what you do. Featured Company slots are s a great opportunity for you to promote your company while informing readers which industry you operate in, what your core services or products are, etc.

Your Featured Company can be shared on your social media profiles and work circles – resulting in more views with the added bonus that others in similar industries will be alerted to these offerings too.

Don’t wait, contact us now to Feature your Company so that others can get to know you too.

What we need from you:

The required information can be completed telephonically or face-to-face during a CRM call, or via email. It is all up to you. Questions can also be adapted to your unique profile.

Firstly some basics:

  1. Full Company Name (as you wish it to be displayed)
  2. Company Logo (large & on a transparent background is preferred)
  3. Picture of Person/Contact (large, clear & professional)

Secondly more in-depth:

  1. Contacts Name & Designation
  2. A little about Yourself
  3. Company description and job description: what your work entails and what you offer(product/service)
  4. When you joined L2B and why joined – i.e. what prompted it/what service you use/a feature you may like
  5. How you use L2B for your business – i.e. find Projects in Africa/Key Contacts/Market Intelligence
  6. Recent awards/projects you were involved with.
  7. Favourite thing about the construction industry or Life philosophy
  8. Something light-hearted: Have you ever driven a TLB? / Are you afraid of heights? / How many hard hats do you own / etc.
  9. Contact Details (Tel numbers, website, Address/Branch locations, and serviceable regions)


Once the necessary is supplied, we will send the article to you to proof prior to publishing.

View our previous Featured Companies here.


To view more Articles, please visit our Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.

About Christine Smith

My journey started in 2015 with Leads 2 Business, as an Account Executive, and gradually grown to take the role of being the Client Liaison Office (CLO) since 2018. Assisting in the delivery of our services and insuring our clients expectations and requirements are exceeded.

Featured Project: YUCO Your Urban – Infrastructure

Western Cape

Description
Earthworks and infrastructure for the YUCO, Your Urban residential development situated near Carl Cronje Drive in Tygervalley, Bellville, Western Cape . The GPS co-ordinates are: -33.885749, 18.634819

 

Status Region
Procedural Bellville, Western Cape
Category Value
Infrastructure R 31 Million – R 60 Million
Industry Timing
Residential 2021 onwards.
Sector Class
Private Invited


If you are a valued Projects subscriber, you can find more details about this Featured Project here.
If you are interested in becoming one of our subscribers, please visit our website.
To view notes with screenshots on how to use our website, please visit our Wiki site.
To view more articles, please visit our blog.

About Sonet van Wygaard

I started working at Leads 2 Business in 2014. I was part of the Tenders Africa team and have now recently moved to Private Projects. I love every second of it!

How To: View Sent Advisories

View this quick video tutorial from The How-To Series – How To: View Sent Advisories History.

(Duration 59 seconds)

Sent Advisories is a copy of Advisory Emails verbatim at the time they are generated/sent and is available via the Sent Advisories link on your Subscriber profile

Do you have a ‘How To’ you’d like us to cover? Leave a comment and let us know.

Check out more content here


To view more from our How To Series, please visit Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view our Wiki Help with screenshots and video tutorials, please visit Leads 2 Business Wiki.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

Featured Company: Safety Cart

 

Read about who’s who in the Industry:

This week we are featuring Safety Cart, based in Krugersdorp, Gauteng. They specialise in the manufacturing of road signage and the supply of road safety products as well as various commercial and private signage solutions on many different types of media.

Safety Cart

If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.
To view more Featured Companies, please visit our Leads 2 Business Blog.

About Elaine Cockcroft

I started working at Leads 2 Business in January 2016 and form part of the sales team as Account Executive based in Gauteng.

What happens when Your Computer connects to the Internet?

posted in: General 0

What happens Your Computer connects to the Internet?

Your PC needs to be connected to an AP via WIFI, CAT, or UTP cable to the WLAN or LAN.

DHCP will assign an IP to the PC using the MAC of the NIC which allows access to the LAN and, using NAT via the CGI, to the WAN.

TCP or UDP are core protocols of the Internet protocol suite. However, UDP does not provide the reliability and ordering guarantees that TCP does

For IP resolution; WWW, VPN, MX, AAAA, FTP, and HTTP/S also require a TXT entry in the DNS which is a requirement of the IETF and ISOC.

This is referred to as a DNS-SD unless a No TXT record has been specified then it is known as an NXDOMAIN.

Connecting to the WWW the DNS will resolve the IP using a TXT looking for an A record using HTTP or SSL enabled HTTPS.

When searching the WWW the website with the best SEO will display at the top of the SERP.

A website may be HTML or PHP or a standard WP, which may use JS, CSS, or JSON. Some even display CCTV.

A SQL or MySQL server will store the data usually hosted on a DMZ.

What happens when I send an email?

When you send an email, which may contain ASCII, DNS checks the NS and resolves using the MX record which looks for a PTR and will validate using SSL and TLS

which both require a valid DKIM in order for the DMARC to verify. Once verified, SMTP, POP, APOP, or IMAP protocols will retrieve or send your email where they are stored in a PST file on your local PC.

What happens when I make an internet telephone call?

This type of call is known as VOIP.

VOIP requires DNS SRV which specifies a unique host and port when signaling SIP or IAX protocols. The SRV record is named in the PTR.

This is important when using NAT from within a corporate LAN which forwards to the WAN using a public IP. QoS along with either a G729,

uLAW or aLaw codec is used to avoid JITTER. Remote extensions should connect using PPTP over VPN.

 

Essential IT Acronyms

AP – Access Point

CAT – Computer-aided translation

UTP – Unshielded Twisted Pair

MAC – Media Access Control

NAT – Network Address Translation

CGI – Computer-generated Imagery

UDP – User Datagram Protocol

AAAA – Authentication, Authorization, Accounting, and Address (Internet infrastructure)

IETF – Internet Engineering Task Force

ISOC – Information Security Operations Center

DNS-SD – DNS-Based Service Discovery

NXDOMAIN – Non-Existent Domain

DMZ – Demilitarized Zone

PTR – Public Test Realm

SRV – Service Record

AWS – Amazon Web Services

GCP – Google Cloud Platform

IG – Internet Gateway

SEO – Search Engine Optimization

SCM – Search Content Marketing

SEM – Search Engine Marketing

WP – WordPress

PPC – Pay Per Click

CPC – Cost Per Click

SERP – Search Engine Results Page

CTS – Click-Through Rate

CR – Conversion Rate

CPM – Cost Per Thousand Impressions

SVG – Scalable Vector Graphics

DMCA – Digital Millennium Copyright Act

CMS – Content Management System

CRO – Conversion Rate Optimization

CTA – Call to Action

CTR – Click Through Rate

PR – PageRank

ROI – Return on Investment

UI/UX – User Interface/User Experience

SEA – Search Engine Advertising

SMO – Social Media Optimization

SMM – Social Media Marketing

SERM – Search Engine Reputation Management

AMA – Ask Me Anything

B2B – Business to Business

B2C – Business to Consumer

CX – Customer Experience

GA – Google Analytics

SMP – Social Media Platform

ToS – Terms of Service

UA – Universal Analytics

CPL – Cost Per Lead

NPS – Net Promoter Score

QDD – Query Deserves Diversity

QDF – Query Deserves Freshness

HITS – Hyperlink-Induced Topic Search

LSI – Latent Semantic Indexing

PBN – Private Blog Network

AI – Artificial Intelligence

IMS – Intelligent Maintenance Systems

ML – Machine Learning

NI – Natural Intelligence

MI – Machine Intelligence

SR – Speech Recognition

M2M – Machine to Machine

SQL – Structured Query Language

DQL – Data Query Language

DDL – Data Definition Language

DML – Data Manipulation Language

PHP – Hypertext Preprocessor

HTML – Hypertext Markup Language

JS – JavaScript

CSS – Cascading Style Sheets

API – Application Programming Interface

XML – Extensible Markup Language

XHTML – Extensible Hypertext Markup Language

JSON – JavaScript Object Notation

EOF – End Of File

ASCII – American Standard Code for Information Interchange

I/0 – Input & Output

IPSec – Internet Protocol Security

SSE – Server-Side Encryption

SSL – Secure Socket Layer

WAF – Web Application Firewall

DMARC – Domain-based Message Authentication Reporting and Conformance

OSS – Open Source Software

SSD – Solid-state Drive

RAM – Random-access Memory

SLA – Service Level Agreement

OLA – Operational-level Agreement

SSO – Single Sign-On

UPS – Uninterruptible Power Supply

DC – Data Center

GUI – Graphical User Interface

BI – Business Intelligence

IT – Information Technology

DW – Data Warehouse

DNS – Domain Name System

HTTP – HyperText Transport Protocol

HTTPS – HyperText Transport Protocol Secure

LAN – Local Area Network

WAN – Wide Area Network

DHCP – Dynamic Host Configuration Protocol

TCP – Transmission Control Protocol

IP – Internet Protocol

WWW – World Wide Web

IoT – Internet Of Things

D2D – Device to Device

VPN – Virtual Private Network

BGP – Border Gateway Protocol

VLAN – Virtual Local Area Network

ICMP – Internet Control Message Protocol

LB – Load Balancer

SMTP – Simple Mail Transfer Protocol

FTP – File Transfer Protocol

RDP – Remote Desktop Protocol

NIC – Network Interface Card

ISP – Internet Service Provider

URL – Uniform Resource Locator

PDF – Portable Document Format

IE – Internet Explorer

DM – Direct Message

FB – Facebook

PM – Private Message

QoS – Quality of Service

MIME – Multipurpose Internet Mail Extensions

POP – Post Office Protocol

IMAP – Internet Message Access Protocol

MX – Mail Exchange

PPTP – Point-to-Point Tunneling Protocol

WPAN – Wireless Personal Area Network

WLAN – Wireless Local Area Network


To view more Articles, please visit our Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.

About Mark Meyer

I joined Leads 2 Business in February 2009 and serve as IT Director.

Featured Tender: Upgrade of R310 between Lynedoch (KM 5.9) to Stellenbosch Arterial (KM 10.62)

Western Cape – DTA 883961

Contract Number:

S048/21 – Department of Transport and Public Works

Description:

Tenders are invited for: Contract No:914: Upgrade of R310 (Baden Powell Drive) between Lynedoch (KM 5.9) to Stellenbosch Arterial (KM 10.62).

Category Industry
Infrastructure Road, Institutional
Region Site Inspection
Western Cape 14 September 2021 at 10:00
Closing Date Contract Period
28 September 2021 at 11:00 No Details

Please visit Leads 2 Business for more information on this Tender Notice.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
For assistance on how to use our website, please visit Leads 2 Business Wiki.
To view more Featured Tenders, please visit our Leads 2 Business Blog.

About Caroline Clark

When I am not at work you will find me spending quality time with my family. You will always find a smile on my face and a snack in my bag.

Infographic: How to make the most of our Tenders?

posted in: Infographic 0

Get tender opportunities for your business through our extensive resource of online tender notices.

Leads 2 Business provides a cost-effective and time-saving solution that is available to you without the overhead of a research team or subscriptions to multiple tender resources. Our scalable subscription packages mean that whether you are starting out small or an industry giant, we have a solution that suits the scope of your business needs.
View our infographic on How to make the most of our Tenders and Subscribe today to take advantage of all the benefits.

 


To view more Articles, please visit our Leads 2 Business Blog.
If you are interested in becoming one of our subscribers, please visit Leads 2 Business.
To view notes with screenshots on how to use our website, please visit Leads 2 Business Wiki.

About Sasha Anderson

Millennial Mom + wife living the hash-tag life. Remember: If You Fail - Fail Forward

1 2 3 4 88