Razzle Dazzle Them

Once upon a time not so long ago, there was a little boy who went to the market to try to sell his wares. He wasn't having any luck. "Who will buy my sweet red roses? Two blooms for a penny," he sang out hauntingly.

A young man came along, full of soft-spoken enthusiasm. "I can give you a great tool that will help you sell your roses. I can design this fabulous new application to help you get your message across. I can give you templates, hundreds of pretty clipart. You can create your presentations in blazingly brilliant colours with glorious animation. I can?"

"But, sir (kind knighted sir), they're only roses?"

"Ah, don't you see. What you need are pretty pictures, snappy words. Then, you can sell anything." The young man started singing, "If you give them a bit of the razzle dazzle. Razzle dazzle them. You've got to razzle dazzle them. Today the roses, tomorrow the world!"

And so marked the birth of slide show presentation software. (Sorry, guys. That was just a bit of unconfirmed rumour).

What is true, however, is how much slide show presentation software such as PowerPoint has revolutionised the business world. Company forecasts are now disseminated in presentations (complete with video clip, animation and sound). Staff meetings are run in slide shows. Project status meetings are driven by presentation slides. Even courtesy signs are printed using presentation software. You know the ones I mean: "Please Ensure You Have Flushed Before You Leave!" on the toilet doors and "Please clean up after yourself. Your mother does NOT work here!" over the kitchen sinks.

I confess. I have cultivated a doomed PowerPoint dependency over time. I've spent countless hours tinkering with the graphics, experimenting with 100 shades of blue and resizing 500 different tiny icons until they were the identical size. More tragically, I've worked into the dead of the night typing, deleting and retyping to come up with just the right word ? one that's concise, punchy and easy on the eye. Commenced?no. On track?oooh. Ahead of schedule?hmm. Completed? YES! After all, "Preliminary high-level design specifications ? Completed" is easier on the eye than "Design Specification ? Commenced".

One of my corporate-ignoramis friends was not so convinced. According to her, if presentation software really was the greatest thing since sliced bread, then one must be able to do a lot more with the application. It must become an indispensable part of modern civilisation. She set me a challenge, which I accepted (all too hastily). It meant that last weekend, armed with my laptop and my all-in-one scanner-printer-copier, I made the following five things for home:

  • I-made-it-myself I-love-you Valentines card

  • A well-done-for-coming-second-last certificate of achievement for niece

  • 20 copies of my-own-original-recipes booklet for Christmas presents

  • My whole-life mission statement

  • 10 inspirational posters to stick on the bathroom mirror, kitchen wall, toilet door?

    The same day I presented my 9-year-old niece with her "certificate of achievement", she thanked me with her own presentation for me (and a very pretty and professional looking one at that). The feature slide looked like this:

    Why I deserve a NEW PC:

  • Everyone else has a newer PC

  • Kerry's parents have just bought her a new PC

  • Even Kerry's little brother has a better PC

  • I'll do my homework on it

  • I'll really use it?I'll even make slide shows with it!!

    It got me thinking. Somewhere along the line, we have turned everything into presentations and slides shows as though every piece of communication is a sales pitch. I suppose I'm not intrinsically against the presentation software. After all, it is just a tool ? not the Devil incarnate. It is us, the intelligent users, who control the quality of our communication (with or without the aid of the presentation software). Quality comes from following the fundamentals like: keep the presentation points to the point, don't bore the audience, don't read from the slide, avoid excessive jargon, don't dumb down the actual speech and, most of all, content matters.

    The folly lies in the well-intentioned experimenters who insist on cramming the page with either whiz-bang animations or smearing the page with linguistic tripe. Whoosh, another bullet point shoots across the page. Whoosh, I've forgotten what the presenter just said.

    So, let's make a pact that we shall never bore each other with show-and-tell-a-thons. We shall never try to bamboozle each other with impressive looking slides. We shall never swamp presentations with meaningless graphics or management-speak jargons. We cannot let a piece of software get the better of us.

    In the mean time, I can't wait for the introduction of the 'Resume Template'. Perhaps it will come in Productivity Service Pack 143.

    About The Author

    Nancy Huang works as a business consultant and project manager. She enjoys writing in her spare time and is keen to be write on demand and be more widely published.

    tidy up service Glenview ..
    In The News:

    Learn what background permissions, push notifications, security updates, auto-join networks and app refresh mean to better manage your phone's privacy settings.
    Criminals test stolen data by applying for deposit accounts in victims' names to prepare bigger attacks. Learn why banks won't share fraud details.
    New study of 10,500+ kids reveals early smartphone ownership linked to depression, obesity, and poor sleep by age 12. Earlier phones mean higher risks.
    A phone phishing attack compromised Harvard's alumni and donor database, marking the second security incident at the university in recent months.
    AutoFlight's zero-carbon floating vertiport uses solar power to charge eVTOL aircraft while supporting emergency response, tourism, and marine energy maintenance.
    A new phone return scam targets recent buyers with fake carrier calls. Learn how criminals steal devices and steps to protect yourself from this fraud.
    New Anthropic research reveals how AI reward hacking leads to dangerous behaviors, including models giving harmful advice like drinking bleach to users seeking help.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Holiday email scams, including non-delivery fraud and gift card schemes, spike in November and December, costing victims hundreds of millions, the FBI says.
    Holiday visits offer the perfect opportunity to help older parents with technology updates, scam protection and basic troubleshooting skills for safer digital experiences.
    Swiss scientists create grain-sized robot that surgeons control with magnets to deliver medicine precisely through blood vessels in medical breakthrough.
    Researchers exploited WhatsApp's API vulnerability to scrape 3.5 billion phone numbers. Learn how this massive data breach happened and protect yourself.
    Travel companies share passenger data with third parties during holidays, but travelers can protect themselves by removing data from broker sites and using aliases.
    Xpeng's humanoid robot moves so realistically that crowds believed it was fake, marking a major advancement in robotics technology ahead of 2026 commercial launch.
    Researchers discover phishing scam using invisible characters to evade email security, with protection tips including password managers and two-factor authentication.
    iPhone and Android users can reduce battery drain and data usage by restricting Background App Refresh to Wi-Fi connections instead of mobile networks.
    Scammers nearly stole an Apple account by exploiting the support system with authentic-looking tickets and phone calls, users can protect themselves with safety steps.
    FoloToy restored sales of its AI teddy bear Kumma after a weeklong suspension following safety group findings of risky and inappropriate responses to children.
    Threat intelligence firm Synthient uncovers one of the largest password exposures ever, prompting immediate security recommendations.
    Viral video shared by Elon Musk shows Tesla's Optimus humanoid robots performing tasks from cooking to construction, garnering over 58.5 million views on social media.
    Chinese hackers used Anthropic's Claude AI to launch autonomous cyberattacks on 30 organizations worldwide, marking a major shift in cybersecurity threats.
    Apple's new Sleep Score feature gives you a rating for your nightly rest quality. Learn how to set it up on your Apple Watch and iPhone today.
    Essential phone settings to enable before losing your device, including Find My network, location services and security features for iPhone and Android.
    The Fox News AI Newsletter gives readers the latest AI technology advancements, covering the challenges and opportunities AI presents.
    Cybersecurity research shows weak passwords remain a major threat, with simple patterns and number sequences putting millions of accounts at risk.
  • Business Plan Software Review: Ultimate Business Planner?

    One of the main reasons business owners and entrepreneurs use... Read More

    These Items Are A Must Before Making The Decision To Purchase Any Off-The-Shelf Software

    1. What determines the software price? Is it Per Seat... Read More

    Basic Steps To Optimize Your Internet Security

    After seeing many people complain about their weak Internet security... Read More

    Microsoft Small Business Manager eCommerce ? Overview

    Microsoft Business Solutions Small Business Manager is scaled down Great... Read More

    Programming Language Migration Path

    While I was preparing some personal background information for a... Read More

    Document Templates Give You The Perfect Framework For Your Documents

    When it comes to running an office, the SOHO entrepreneur... Read More

    Internet Faxing Service Review

    The Internet is reshaping every form of communications medium, and... Read More

    Microsoft Great Plains Chemicals & Paint Industry Implementation & Customization Notes

    Microsoft Great Plains fits to majority of industries, in the... Read More

    Microsoft C# vs. VB.Net

    Hi, Guys,I believe a lot of programmers are trying to... Read More

    The Software 2005 Conference - A Review

    The Software 2005 conference is now a wrap. This conference,... Read More

    XML Parser and Their Types

    XML parser is a software module to read documents and... Read More

    S is for Spying, Surveillance -- and for Software as Well

    Words we choose to describe things and phenomena often show... Read More

    Anti-Spyware Protection ? Holes in the Shining Armor

    Looking at all the ads which promise to get rid... Read More

    Hear It in Digits

    Music downloads are off the charts! We're listening to digital... Read More

    Dreamweaver vs FrontPage

    There are two major WYSIWYG(What You See Is What You... Read More

    Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

    Microsoft bought Navision, Denmark based software development company, along with... Read More

    Imagine if Everyone Working In Your Office Was In Synch?

    Microsoft-Outlook is a pretty amazing program. So much more than... Read More

    Microsoft Great Plains: Annual Enhancement Program ? How To Be Re-Enrolled

    Microsoft Business Solutions Great Plains is mid and even corporate... Read More

    How To Avoid Getting Hooked By Pfishing

    "Pfishing", sometimes spelled "Phishing", is a word that's used to... Read More

    History of Java

    The java programming language is becoming more and more popular... Read More

    Will Adobe Manage to Replace Industry Work Horse Quark Express by Giving Adobe InDesign for Free?

    And kill the best layout software in the process of... Read More

    How to Evaluate Staffing Software

    If you are in the market for new staffing software,... Read More

    Separate Anti-Keylogging Protection: Who Needs it Most?

    If there still are few unprotected computers left, I haven't... Read More

    How To Create A Data Capture Procedure Checklist For Your Small Business CRM Software

    Fortunately one of the most common reasons cited for the... Read More

    Who Is Minding Your Sensitive Data?

    Stealing company information used to be the specialty of spies... Read More

    maid service near Winnetka ..