Check out why PTP is significant for financial trading, control systems and telecommunications

There are several PTP (Precision Time Protocol) protocols, also known as IEEE 1588. The most commonly used are:

  1. PTPv1: The original version of the Precision Time Protocol specified in IEEE 1588-2002.
  2. PTPv2: The updated version of PTP that is widely used today, specified in IEEE 1588-2008. It introduced several new features and improvements over the original version.
  3. PTPv2.1: An extension to PTPv2 that provides more reliable and secure time synchronization, specified in IEEE 1588-2019.
  4. PTPv3: A revision of PTP that is currently under development by the IEEE. It aims to further improve the protocol’s accuracy, reliability, and security.

The main differences between these protocols lie in their features and capabilities, such as the accuracy and precision of the time synchronization they provide, the types of hardware they can support, and the security mechanisms they include.

PTP can be used to distribute precise time from a GPS (Global Positioning System) satellite receiver that has a PTP-enabled network interface. This allows for accurate time synchronization across distributed systems.

GPS satellites provide accurate time information through atomic clocks that are synchronized to GPS time, which is based on International Atomic Time (TAI). The GPS receiver on the ground uses this information to determine its location, velocity, and precise timing information.

PTP-compatible GPS receivers can output PTP timestamps by converting the GPS time information into PTP format through a specialized PTP adapter or GPS receiver module that has been designed to support this function. The GPS receiver provides the PTP grandmaster clock with its original GPS time and this clock can then synchronize other PTP-compatible devices on a network.

Since GPS signals travel at the speed of light, the propagation delay between the satellites and the GPS receiver can be accurately measured and accounted for by the GPS receiver. This allows PTP-compatible GPS receivers to provide accurate timestamps that can be used for time synchronization across a network.

PTP can be used in conjunction with GPS receivers to provide accurate time synchronization, enabling organizations such as telecommunications providers and financial traders to synchronize their operations and services across distributed systems.

The Leader clock is a clock that is responsible for generating and distributing time to follower and boundary clocks in the network, while a Follower clock is a clock that is synchronized to the Leader clock.

The Leader clock sends periodic synchronization messages called Sync messages to the Follower clocks in the network, which allows the Follower clocks to establish their own clocks and set their own internal time to match that of the Leader clock. The Follower clocks periodically send messages to the Leader to estimate network delay and adjust their own clocks’ rate accordingly.

The goal of PTP is to achieve sub-microsecond accuracy in network clock synchronization, which is critical for time-sensitive applications such as financial trading, industrial control systems, and telecommunications. Leader and Follower clocks are an essential part of PTP implementation, enabling precise time synchronization across multiple edge devices in a network.

The hardware supported by each version of PTP can vary depending on the implementation, but in general:

  1. PTPv1: This version of PTP supports Ethernet networks and devices with hardware timestamps, which were implemented in some network interface cards (NICs) and switches.
  2. PTPv2: This version of PTP is widely used and supports Ethernet networks and devices with hardware timestamps, which are now more commonly available in NICs and switches. It also extends support to Wi-Fi networks and wireless devices.
  3. PTPv2.1: This version of PTP builds on PTPv2 and adds new features to improve security, resiliency, and scalability. It supports the same hardware as PTPv2.
  4. PTPv3: This version of PTP is still under development, but it aims to extend the protocol’s support to new hardware, such as low-power devices and embedded systems. It also aims to add support for more advanced timing functions, including time-sensitive networking (TSN) and coexistence with existing synchronization protocols.

I hope this helps you under PTP on a basic level. Reach out if you have any questions.

You can leave comments too!

RFID Basics: How it Works and How it’s Used in Everyday Life.

There are many different types of RFID tags, but here are some of the most common categories:

1. Passive RFID tags: These tags do not have their own power source and rely on the energy transmitted by the RFID reader to function.

2. Active RFID tags: These tags have their own power source and can transmit signals over longer ranges than passive tags.

3. Semi-passive RFID tags: These tags have a battery that powers onboard sensors, but they still rely on the energy transmitted by the RFID reader to communicate.

4. Low-frequency (LF) RFID tags: These tags operate at a frequency range of 30 kHz to 300 kHz, are low cost, have a short reading range, and are commonly used for access control and animal identification.

5. High-frequency (HF) RFID tags: These tags operate at a frequency range of 3 MHz to 30 MHz, can be read from a distance of up to 1 meter, and are commonly used for payment systems and smart cards.

6. Ultra-high-frequency (UHF) RFID tags: These tags operate at a frequency range of 300 MHz to 3 GHz, can be read from a distance of hundreds of feet, and are commonly used for inventory management and supply chain management.

7. Near-field communication (NFC) tags: These are a type of HF RFID tag that can be read by smartphones and other mobile devices and are commonly used for contactless payments and authentication. 

There are many other types of RFID tags as well, including passive and active tags that operate at super high-frequency (SHF) and extremely high-frequency (EHF) and specialized tags for specific applications.

There are different methods to encode an RFID tag depending on the type of tag and the reader used, but generally, you will need an RFID reader and encoding software to write data to the tag.

Here are the general steps to encode an RFID tag:

1. Choose the type of RFID tag and the data format you want to encode on the tag.

2. Connect the RFID reader to your computer and ensure it is properly configured.

3. Install and open an encoding software that supports your type of tag and reader.

4. Place the RFID tag onto the reader and ensure it is detected.

5. Enter the data you want to encode into the software.

6. Click the “Write” or “Encode” button to write the data to the tag.

7. Verify that the data has been successfully encoded on the tag by reading it with the RFID reader.

Note that some tags may have specific requirements or limitations for encoding, so it’s always best to refer to the tag and reader specifications or the manufacturer’s guidelines.

The type of encoder used to encode data onto an RFID tag depends on the specific tag and the requirements of the application. Here are some examples of encoders and the types of RFID tags they are commonly used with:

1. Low-frequency (LF) RFID tags are typically encoded using LF RFID encoders, which can write data to the tag at a frequency range of 125 kHz to 134 kHz.

2. High-frequency (HF) RFID tags are commonly encoded using HF RFID encoders, which can write data to the tag at a frequency range of 13.56 MHz.

3. Ultra-high-frequency (UHF) RFID tags are often encoded using UHF RFID encoders, which can write data to the tag at a frequency range of 860 MHz to 960 MHz.

4. Near-field communication (NFC) tags are typically encoded using NFC encoders or specialized mobile devices with NFC capabilities.

These are just general examples, and specific encoders may be able to encode different types of tags depending on their capabilities. It’s always best to refer to the tag and encoder specifications or the manufacturer’s guidelines for the best encoder to use with a specific tag.

The specific software used for encoding RFID tags varies depending on the type of tag, the application, and the encoding equipment being used. Here are some examples of software commonly used for encoding RFID tags:

1. For low-frequency (LF) RFID tags, software such as “RFID Encoder” or “ZebraDesigner” can be used with compatible encoding equipment.

2. For high-frequency (HF) RFID tags, software such as “TagXplorer” or “AWID ProxEncoder” can be used with compatible encoding equipment.

3. For ultra-high-frequency (UHF) RFID tags, software such as “Impinj Speedway Connect” or “Alien Technologies ALR-H450” can be used with compatible encoding equipment.

4. For Near Field Communication (NFC) tags, software such as “NFC TagWriter” or “NFC Tools” can be used with compatible encoding equipment or with smartphones and other mobile devices that have NFC capabilities.

It’s important to note that the specific software used for encoding RFID tags will depend on the equipment being used and the requirements of the application. It’s always best to refer to the equipment and software specifications or the manufacturer’s guidelines for the best software to use with a specific tag and equipment.

Any Questions? Please feel free to ask!

Pathways to Innovation: Innovative Video Technology with FFMpeg & Frameworks

FFmpeg is a command-line based open-source multimedia framework that includes a set of tools to process, convert, combine and stream audio and video files. FFmpeg works by taking input from a file or a capture device (such as a webcam), then applying filters and encoding the data to a new format as output.

Here are some key components of how FFmpeg works:

1. Input: FFmpeg can take input from a variety of sources: video files, audio files, image sequences, capture devices, etc.

2. Decoding: Once the input source is defined, FFmpeg decodes the data from its original format (e.g., H.264 video codec) into an uncompressed, linear format, which is easier to process and manipulate.

3. Filters: FFmpeg has a vast set of filters that can be applied to the data, including scaling, cropping, color correction, noise removal, and more.

4. Encoding: After filtering, FFmpeg compresses the data back into a new format (e.g., MPEG4 video codec), using one of many built-in or external codecs. FFmpeg has support for dozens of codecs, containers, and formats.

5. Output: Finally, FFmpeg saves the newly encoded data to a file, streaming server, or other output device, typically in a format such as MP4, AVI, or FLV.

FFmpeg provides a flexible and powerful way to manipulate multimedia content on a wide range of platforms and operating systems. Its command-line interface allows for fine-grained control over every aspect of the processing pipeline, making it a popular choice for integrating into larger workflows and pipelines.

Buckle up, we’re about to dive into the world of frameworks.

In computer programming, a framework is a pre-existing software infrastructure that provides a set of guidelines, pre-made code libraries, and tools to help developers build and deploy applications more efficiently. 

A framework generally consists of a collection of libraries, modules, functions, and other pre-written code that serves as a foundation upon which developers can build their applications. A framework often includes a set of conventions and best practices for developing applications in a specific programming language or domain.

The goal of a framework is to provide a standardized approach to building applications that reduces development time and minimizes the possibility of errors. Frameworks can help developers implement common features like authentication, routing, and database access more easily, allowing them to focus on the unique aspects of their application.

Different types of frameworks are available for different purposes, such as web application frameworks, mobile application frameworks, software testing frameworks, and more. Some popular examples of frameworks include Ruby on Rails, Django, Laravel, React, and Angular.

Please feel free and add to this article.

HLS STREAM Tips: Formats, Encoding, Creation, Software, & Syntax Mastery for Broadcasting

HTTP Live Streaming (HLS) is an adaptive streaming protocol developed by Apple for delivering media content over the internet. To create an HLS stream, certain audio and video formats are required for compatibility with the protocol. Here are the audio and video formats required for HLS:

1. Audio Formats: HLS requires audio to be encoded in either AAC-LC (Advanced Audio Coding Low Complexity) or MP3 (MPEG-1 Audio Layer III) format. However, AAC-LC is recommended because it provides better audio quality at lower bitrates.

2. Video Formats: HLS requires video to be encoded in either H.264 (also known as AVC, Advanced Video Coding) or HEVC (also known as H.265, High-Efficiency Video Coding) format. H.264 is the most widely used video codec for HLS, but HEVC provides better video quality at lower bitrates and is recommended for higher resolution and frame rate streams.

In addition to these audio and video formats, HLS also requires that the media files be segmented into small chunks of equal duration, typically between 2 and 10 seconds. These segments are then delivered to the client using a manifest file (usually an m3u8 file) that contains information about the segments and their URLs.

Overall, HLS is compatible with a wide range of devices and platforms, including iOS and Android devices, web browsers, and streaming media players. By following the recommended audio and video formats, it ensures that the media streams can be played seamlessly across all these platforms.

ENCODING HLS STREAMS

To encode an HLS stream, you need to follow these general steps:

1. Prepare your source media: Before encoding, you need to have your source media in a compatible format (see previous answer for required formats), and you need to segment it into small chunks of equal duration.

2. Choose an encoding software: There are several encoding software tools available such as FFmpeg, Elemental Live, Wowza Streaming Engine, and more. Choose one that fits your needs and supports HLS output.

3. Configure the encoding software: Configure the encoding software by specifying the input format, segment duration, output format (HLS), and other settings.

4. Set up a web server: Set up a web server for hosting your HLS manifest file and media segments. You can use a dedicated web server or a cloud-based one.

5. Encode the media: Use the encoding software to transcode the media into the required HLS format and segment it into small chunks. The software will create an HLS manifest file (.m3u8) that includes information about the segments and their URLs.

6. Upload the output files to the web server: After encoding, upload the manifest file and media segments to the web server.

7. Test the HLS stream: Test the HLS stream on different devices and streaming players to ensure it’s playable and doesn’t have any issues.

Overall, encoding an HLS stream requires specialized software and knowledge of encoding settings and web servers. It’s recommended to follow best practices and reference the documentation provided by your encoding software and web server provider.

How To Create an HLS Stream

To create an HLS stream, you need specialized software called an encoder, which can take your source media and transcode it into the required HLS format. There are several encoding software options available, offering various features and pricing models. Some of the popular encoding software tools for creating HLS streams include:

HLS SOFTWARE & HARDWARE

1. FFmpeg: FFmpeg is a free open-source software that can convert audio and video files into different formats, including HLS output.

2. Elemental Live: Elemental Live is a hardware and software solution that supports real-time video transcoding and streaming with features like ad insertion, scalable live streaming, and more.

3. Wowza Streaming Engine: Wowza is a software-based media server that provides live and on-demand streaming with features like transcoding, live stream recording, and more.

4. Adobe Media Encoder: Adobe Media Encoder is a media processing software that can ingest and output audio and video files in different formats, including HLS.

5. Telestream Vantage: Telestream Vantage is a transcoding software that provides multiplatform content creation and delivery, including support for HLS output.

These tools can help you transcode and segment your media files into the required HLS format and generate the necessary HLS manifest file (.m3u8) that contains information about the segments and their URLs. However, the specific software you choose may depend on your budget, workflow, and other requirements, so it’s important to research and evaluate your options carefully.

HLS SYNTAX

Here are ten examples of the correct syntax for an HLS stream using M3U8 playlist format:

1. #EXTM3U – declares the file as an M3U8 playlist file.

2. #EXT-X-VERSION:3 – specifies the version of the HLS protocol used.

3. #EXT-X-TARGETDURATION:10 – sets the maximum duration of each segment to 10 seconds.

4. #EXT-X-MEDIA-SEQUENCE:0 – indicates the starting number of media segments.

5. #EXT-X-PLAYLIST-TYPE:VOD – specifies that the playlist represents a video-on-demand stream.

6. #EXT-X-ALLOW-CACHE:YES – allows the client to cache the media segments.

7. #EXT-X-DISCONTINUITY – indicates a discontinuity in the media stream, such as a change from one bitrate to another.

8. #EXT-X-STREAM-INF:BANDWIDTH=2000000 – specifies the bitrate and resolution of the video stream.

9. #EXT-X-ENDLIST – indicates that no more segments will be added to the playlist (for live streams, this should be omitted)

10. #EXT-X-MAP:URI=”init.mp4″ – specifies a separate initialization segment for the media stream.

Note that some of these tags are optional, and the syntax may vary depending on the media server and player used. It’s always a good idea to test your playlist with different players and devices to make sure it works well.

Broadcasting Standards Info Track – SaaS, IaaS, PaaS, & Dev Ops

SaaS (Software as a Service) is a cloud computing model where software is provided as a service over the internet, without the need for the user to install or manage the software themselves. With SaaS, users can access software applications through a web browser or mobile app, and the provider takes care of the infrastructure, maintenance, and security of the software.

When using a SaaS application, the user typically pays a subscription fee on a monthly or annual basis. The provider hosts the software on their servers and manages the infrastructure, storage, and security. The user can access the application from anywhere with an internet connection, and can use the application on a pay-as-you-go basis.

VMware is a company that provides virtualization software and cloud computing services. VMware’s flagship product is vSphere, a virtualization platform that allows businesses to manage their data center infrastructure more efficiently by virtualizing their physical servers and creating virtual machines (VMs). VMware also provides cloud computing services through its VMware Cloud platform, which allows businesses to run their applications in the cloud, either on their own infrastructure or in public clouds like Amazon Web Services (AWS) or Microsoft Azure. VMware’s offerings include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) solutions.

Infrastructure as a Service (IaaS) is a cloud computing model where a provider offers virtualized computing resources, such as servers, storage, and networking, over the internet. With IaaS, a user can rent these resources on a pay-per-use basis and can scale up or down as needed without having to manage the underlying infrastructure. Examples of IaaS providers include Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform.

Platform as a Service (PaaS) is a cloud computing model where a provider offers a platform for developing, deploying, and managing applications over the internet. With PaaS, a user can develop and deploy applications without having to manage the underlying infrastructure, which includes servers, storage, and networking. The PaaS provider takes care of these tasks, allowing the user to focus on developing and deploying their application. Examples of PaaS providers include Heroku, Google App Engine, and Microsoft Azure.

Software as a Service (SaaS) is a cloud computing model where an application is provided as a service over the internet. With SaaS, a user can access the application through a web browser or mobile app, without having to install or manage the software themselves. The application is hosted on the provider’s servers, and the provider takes care of maintenance, updates, and security. The user typically pays a subscription fee on a monthly or annual basis. Examples of SaaS applications include Google Workspace, Microsoft Office 365, and Salesforce.

DevOps is a software development approach that emphasizes collaboration, communication, and integration between software developers and operations teams to deliver high-quality software applications. The following is a step-by-step breakdown of the DevOps process:

1. Planning: The first stage of the DevOps process is planning. This involves defining the project requirements, establishing goals, and creating a timeline for the project.

2. Development: In the second stage, the application is developed by a team of software developers using an agile development approach. The code is stored in a version control system and automated builds are triggered when changes are made.

3. Testing: Once the application is developed, it is thoroughly tested to ensure it meets the requirements and is free of bugs. Testing is automated as much as possible, and any issues found are immediately reported to the developers for fixing.

4. Deployment: In the deployment stage, the application is packaged into a container or executable and deployed to the testing and production environments. Deployment is automated to minimize the risk of errors and improve the speed of the release cycle.

5. Monitoring: Once the application is deployed, it is constantly monitored to ensure it is performing optimally and any issues are promptly identified and resolved. This includes monitoring the infrastructure, the application, and customer feedback.

6. Feedback: Finally, feedback is gathered from users and stakeholders, and the results are used to inform future development projects. The feedback is collected continuously throughout the DevOps process, allowing the team to make informed decisions and continuously improve the application.

Info – Overview: Cloud Providers & What They Do

Here are some popular cloud service providers:

1. Amazon Web Services (AWS)

2. Microsoft Azure

3. Google Cloud Platform (GCP)

4. IBM Cloud

5. Oracle Cloud Infrastructure (OCI)

6. Alibaba Cloud

7. DigitalOcean

8. VMware Cloud

9. Rackspace

10. Salesforce Cloud

Here’s a brief explanation of what

each of the cloud providers do:

1. Amazon Web Services (AWS): A comprehensive cloud computing platform that provides Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS) offerings. AWS offers a wide range of services, including computing, storage, database, analytics, machine learning, networking, and security.

2. Microsoft Azure: A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. Azure offers services for computing, storage, database, security, analytics, AI, and IoT. It also provides integration with Microsoft’s other products, such as Office 365 and Dynamics 365.

3. Google Cloud Platform (GCP): A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. GCP offers services for computing, storage, database, analytics, machine learning, networking, and security. It also provides integration with Google’s other products, such as Google Workspace and Android.

4. IBM Cloud: A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. IBM Cloud offers services for computing, storage, database, analytics, AI, and IoT. It also provides integration with IBM’s other products, such as Watson and Red Hat.

5. Oracle Cloud Infrastructure (OCI): A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. OCI offers services for computing, storage, database, analytics, security, and application development. It also provides integration with Oracle’s other products, such as Oracle Database and Oracle Fusion Middleware.

6. Alibaba Cloud: A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. Alibaba Cloud offers services for computing, storage, database, security, networking, and big data analytics. It is mainly focused on serving customers in Asia.

7. DigitalOcean: A cloud computing platform that provides IaaS offerings, particularly for developers and small businesses. It offers services for computing, storage, networking, and security, with a focus on simplicity and affordability.

8. VMware Cloud: A cloud computing platform that provides IaaS, PaaS, and SaaS offerings. VMware Cloud offers services for computing, storage, networking, security, and application development. It is particularly focused on providing hybrid cloud solutions that integrate with on-premises infrastructure.

9. Rackspace: A cloud computing platform that provides managed hosting and cloud services. Rackspace offers services for computing, storage, networking, security, and application support, with a focus on customer support and expertise.

10. Salesforce Cloud: A cloud computing platform that provides SaaS offerings focused on customer relationship management (CRM) and enterprise applications. Salesforce Cloud offers services for sales, marketing, customer service, analytics, and app development, with a focus on helping businesses grow and succeed.

Please reply and add anyone I missed.

Broadcasting Standards a Quick Overview: SMPTE2110 & AES67

SMPTE 2110 is a set of standards developed by the Society of Motion Picture and Television Engineers (SMPTE) for professional video over IP (internet protocol) networks. It comprises three separate parts: SMPTE ST 2110-10 for system timing and synchronization, SMPTE ST 2110-20 for uncompressed video, and SMPTE ST 2110-30 for uncompressed audio.

AES67 is a standard developed by the Audio Engineering Society (AES) for professional audio over IP networks. It defines a common protocol for high-quality, low-latency audio transport between different manufacturers’ products and solutions, allowing interoperability between different audio networking systems.

Both SMPTE 2110 and AES67 are widely used in the broadcast and professional media industries, where they provide a flexible and cost-effective way to transport high-quality video and audio signals over IP networks.

Tips: Breaking into the Broadcasting Field

You will need to gain (over time) extensive knowledge and experience in the field. Here are some steps you can take:

  1. Get a degree: A bachelor’s degree in broadcasting or a related field can provide you with a strong foundation of knowledge and skills required in broadcasting.
  2. Gain hands-on experience: Get involved in student radio, TV stations, or other broadcasting organizations to gain hands-on experience.
  3. Specialize: Choose a niche or specialty field within broadcasting, such as sports, news, entertainment, or production, and become proficient in it.
  4. Stay current: Stay up-to-date with the latest trends, technologies, and developments in broadcasting by attending industry events, webinars, and workshops.
  5. Build a network: Build connections within the broadcasting industry by attending conferences, industry events or joining related groups on social media.
  6. Share your expertise: Share your knowledge by writing articles, giving talks, or teaching others in the broadcasting community.

Remember that becoming an SME takes time and dedication. Continuously developing your skills and expertise will boost your career and improve your chances of becoming an SME in broadcasting.

Rescued Right Back

Peter Parker 12.27.22

I love to help people and animals. One of my rescues is Peter Parker (aka Spidey). He’s a jumper 😊 I adopted him when he was a few weeks old, and now he’s almost 15 years old.

Same day 12.27.22

This year, a few months after moving into a new place he ate something – I still dunno what. But he went from a playful carefree cat to practically not moving in a day.

I brought him to the vet immediately. His kidneys and liver were failing. Overnight, I picked him up gently, but he was inanimate. The vet was grim. “He’s stage 4 and won’t get better”. No more jumping, no more belly rubs, no more knocking everything off my home desk while playing.

That was the prognosis not the reality.

We brought him home with an IV bag that I learned how to administer to him. We were giving him a few days, and processing what was going on. The next day, he was a little better, and every day for weeks we gave him IV, other medication to entice his appetite, and he slowly became his playful self again.

The vet said, “he won’t make it to thanksgiving”, he did – in fact he’s back to stage 2, thriving, playful, flips over for belly rubs, and playing, he runs to eat food without medication or IV, although it’s standing by if need be. So, don’t accept the worst, better can happen.

Lola left, and Peter Parker right 12.27.22

But here he and his sister are waiting to be fed 16 & 14 years later. Everyday is a gift. They stay by me when I’m sick, they run to the door to greet me when I come home, they nudge their heads into mine when playing – we are family

I may have gone to the animal rescues to adopt them both, but in turn they have rescued me. All these years later I consider every moment good or bad, a gift from the universe.

As this year is coming to a close, I want to acknowledge how much they mean to me. They are part of my family, and as I’m writing this, the boy (old boy now) has situated himself on my lap.

They rescued me right back.

The One Single Word Everyone Wants to Hear

There are many articles on many subjects about creating connections, friendships, collaborations, instilling trust with colleagues. Are you connecting? If not as much as you’d like, or if you don’t know what missing it could be this one essential thing.

People love many many varied things in their relationships whether in business or personal. Having things in common is a great conversation starter, but halfway in after meeting someone for this first, second, or third time, they and YOU may not even know what’s missing. Have you guessed it yet?

You’ve had a great conversation with your new doorman, store clerk, waiter/waitress, business contact, interviewer, interviewee, video or in-person conference meeting, or a friend of a friend you met at a gathering, now what are they and you subconsciously waiting on?

I can’t believe I don’t remember, they “just said it” you think to yourself. Uhh, thank you……. “Thank you, nice to meet you”, with a node or handshake depending on the situation. That’s nice but that’s not it. Plus, that’s more than one word – just sayin!

What is The Single word everyone wants to hear?

Their Name! It’s the ultimate recognition.

Tips to remember:

1. If on the phone speaking with a customer service person, pharmacist, sales person, anyone who is helping, or trying to help, write down their name right away. Say their name back to them a few times in the conversation if you can.

2. If on a video call or meeting, jot down the person’s name discreetly if it’s not displayed on the screen. If there are many people in the same meeting take a quick screen shot so you can revisit the name with the face. The participant drop-down menu is also usually a good resource to get full names depending on each participant’s input.

3. In-person meetings, if you have a meeting invite, writing down the name of whom you’re meeting with before the meeting can solidify their name. Make sure when you’re first introduced to make eye contact and say their name back. “Nice to meet you, X”. Use their name as much as is comfortable in your conversation.

Pro Tip: If in an interview remember to follow-up with a Thank you email. Get their physical or digital card. Or, their email address should be on the invite. Don’t be shy in asking for their email address in the interview, it shows interest and initiative.

4. Ok. So you met someone you like at a gathering – big or small, but just about everyone is a new face and name (this can also apply to a new work situation). When you first meet people via remote video, or in-person again, say their name back to them as soon as comfortably possible. Again, use it in sentences as much as you can without being creepy.

5. Stop saying you’re “bad with names and faces”. I know this sounds odd, but if you keep saying it, it “becomes” your truth statement. Say to yourself, out loud in the mirror, “I’m great at remembering names and faces, I Rock at remembering names, I own remembering names”, repeat it, believe it. Write it on a post-it notes still. You’ve got this too! You can do this.

It’s not a trick, it’s not creepy, it solidifies to another human that you’re paying attention to them. It shows them you believe they are worth knowing. With a little practice, you’d be amazed at how fast and easy remembering becomes.

I worked at a very large company for 26 years. I knew just about everyone’s name. I made sure I called everyone, yes everyone from the security personnel, cleaning crew to the President of the company by their first names, or the nick name they enjoyed.

I loved making those connections, and it showed them that I respected them, which I do to this day.

Lastly, I want to express my gratitude to everyone else out there – from strangers who have helped me when I needed it, to acquaintances who brightened my day with a smile. Thank you all for being part of my life and helping me become the person I am today

#Offering help: If you need assistance in getting started, I’m open to free consultations. Just contact me via this site, or LinkedIn. You’re not alone in this – I’m here to help every step of the way.

If you would like to converse about my services please reach out as well. I am passionate about helping people reach their goals and turning them into a reality. I know I can help you make the impact you are hoping for, as well as reach your target audience either by writing product information, learn more “call to actions”, newsletter and email writing.