Monday, June 30, 2008

Module 2 Tasks – Email Tasks

Press the send button!

I signed up for a yahoo email and set up some filters and folders. My email address is lulu.hunter@yahoo.com.au - I also took the email tutorial.

Here are my answers:

1. What information about a user's email, the origin of a message, and the path it took, can you glean from an email message?

From an email message, you can tell:

  • the senders' email address which is usually composed of the user's name and the domain of the user eg (lulu.hunter@yahoo.com.au)

  • the time the email was sent

  • the subject of the email

  • who else the email was sent directly to

  • who else is going to receive a carbon copy of the email

  • if it has any attachments.

You can also tell if it is:

  • a reply to another email

  • if it has been forwarded

  • the path that it has taken, the return path and authentication details.

On Yahoo mail you can select a compact, standard or a full message header (pictured).




The body of the email will give you the message itself and may contain a signature and may also have other information – eg consider the environment before printing this email or a disclaimer.

A user needs to be aware that their original message may be forwarded because data is so easily transmitted and highly mobile. Because of the "tendency of the 'mobility of data' has become a cultural given" (concept 5), there are some issues such as lack of attention to the content, information overload and decreased ‘share of voice’ (eg there are so many other types of information messages vying for someone’s attention) can occur.


Information can be shared in more meaningful ways - (concept 5) eg a url with a brief description about what the user will discover if they select the link, more background as to why the info is being given (eg This will assist you with preparation of the monthly report) or actions required by your recipient.

2. In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all functions of email?




Use To: to send the email directly to a persons’ email address. This is useful if you want to have a direct conversation with a person or set of people and assign any actions to them.


Use CC: (Carbon Copy) if you want to send a copy of your message to an email address. This is useful if you want to include more people in the message and it just for their information only – ie a manager may have asked you to send an email to a set of colleagues to update them about a particular project – CCing the manager in the email lets the manager know that you have completed the task.


It also lets all the recipients know who has been sent this information. CC’s are usually for information only (and not to assign actions).


Use BCC: (Blind Carbon Copy) if you want to send a copy of your message to a particular email address, without any of the other recipients knowing that this email address has been included on the list. Recipients of the blind CC, may also receive any ‘reply all’ emails.


As it is so very easy to forward emails, (unless the original sender has used a function to prevent forwarding) people tend to give little thought or credence to the ‘value ‘of email. How many emails have you received that have been forwarded through several sets of people?


An email sender needs to include direct and clear instruction about the action or response that is either desired or required by the recipient. Some email programs (eg GroupWise) allow you to graphically represent some of these eg response required but you as the sender also need to make it very clear by your choice of words what your expectations are.



Empathise and make it easy for your users of email messages – eg by clever use of email subject headers. I have been practising this at work for the past week or so – indicting in the subject is action or just response is required. If I need something I have been including REQUEST in the title. I have had good response to this technique.


Effective emailing (and communications practise) needs an understanding of how an audience will use the information/ messages you send them. As there are different types of email – eg email marketing, social information or business correspondence, they all have having subtly different applications and intent.


A good communicator should also ask themselves (of sending an email) is this the most appropriate way to send this particular message?


Being aware and practising good netiquette ...”good or bad behaviour online” (concept 7) these are ‘agreed' behaviours will help your messages Becoming accultured to the internet and using email, learning its rules and expected behaviours is an important part of netiquette that will help you to communicate effectively. Empathy by users will ensure good communications practise.

3. In what ways can you ensure that an attachment you send will be easily opened by the receiver?

You can
  • Make sure that the file can be read by the recipient - you can confirm which systems they use or send in plan text if this is not possible.

  • Compress or reduce the file size to as small as possible so the attachment is not blocked.
Make sure to mention that you have sent an attachment with the email – perhaps a short prĂ©cis about it to encourage them to open it. If they have requested information from you eg a report of further information, make reference to this in the text of your email. As you have requested, here is the monthly report (see Attached).


If they are not expecting it, a short description on what is contained in the attachment and why it is being sent is useful. (everyone is busy so they need to be convinced of the value of opening it)
With communications over the internet where people assume that everyone is the same (Concept 8).

Not everyone has the same level of expertise or experience with technology (eg novice or older users who may find adapting to technology challenging) as you. It is arrogant to assume this. People forget that there are differences in competence levels and so do not compensate for them.


Communications can lose much of their original content or impact when they are ’translated’ into other (different) formats. We should seek to communicate by ways that can be accessed for everyone (lowest common denominator) to make your message as readable and effective as possible for all users – eg the use of a text only message.


4. What sorts of filters or rules do you have set up, and for what purpose?


I have social email, work email and now educational email inboxes. In each I have different set ups as they are used for different purposes. Eg I have an automatic junk filter for social and educational (this is not something I have at work).


Automation of information processing allows time efficiency but may leave the user with the impression that the results may not be as reliable as possible (Concept 10).


I will experiment more with the filters concept as (apart from junk mail) is something I have really yet to explore.


5. How have you organised the folder structure of your email and why?


Many people now have at least 2 email addresses (social and corporate) and use them in very different ways. In my uni play email (a clean slate!) I have an admin folder for passwords, welcome messages etc. I also have a references folder. This is to store emails so I can reference info confined within them more effectively using metadata. I can be more efficient in handling info this way and may reuse data for actions not originally intended, eg as a template for future uses.


In my personal email I have wedding, uni, bookclub, baby, career, reference ( eg passwords welcome messages) folders.


My corporate email is the most complex of my email folder systems. Each current or work stream has its own folder, each year has a folder for all projects and I have an archive for each year, there are other administration type folders eg 'important/ keep for items such as managers emails, welcome messages from subscriptions.




To keep sets of information separate to able to search or organise more efficiently to be able to retrieve the info I need quickly.


The ability to store and re-use data means that is mostly saved without valuing it. Automation can assist with the by presetting or determining a future value of the info ( concept 12) eg all emails from Mr X can go straight to the to delete folder. Another way of coping with information overload.


Be conscientious about your email use while expecting little of others (concept 13) and you may find that people respond back to your emails. This also relates back to netiquette.


Sunday, June 22, 2008

Thoughts on Module 1

Or ... climbing up the learning curve.

Some of the tasks and concepts have been very easy for me and others quite frustrating. Perhaps this makes it easy to empathise with those who used and developed previous systems. I am thankful to them for their efforts and relate this back to concept #27 the persistence of history– by relating where we have come from we can see future possibilities and that by understanding older technologies can help to develop new technologies.

Concurrently, I am also learning to blog (with varying rates ofsuccess). Scanning our NET11 discussions reassures me that I am not alone here.

With current technology and the emphasis of usability, more people are able to perform more tasks more effectively…barriers to success are lowered - especially now that access the internet and information is so (relatively) easy compared with the last decades of the 20th century which is where much of the technology explored in Module 1 originated.

Will this development of technology be exponential as Gen Y (and beyond) who have grown up with computers, mobile phones and other communications technology as common place in their lives explore and develop ways of communicating? Or - if we explore the paradox of the World Wide Web in Concept # 28 where individuals are empowered but also demands that users cope with increasing complexity (Exon, M. 1998) - will this complexity fail to be managed by these generations because of their familiarity and ease of accessing internet which is second nature?

‘Supercomplexity’ (where the frameworks of how we understand the world are multiplying and in conflict... the multiplication of these frameworks is termed supercomplexity) (Barnett, R. 2000) is an increasing aspect of a 21st century life, even outside of the internet.

How will we interact even in 5 years from now?

Lessons from the past can help us with the future. Technological developments parallel the ability of people to express themselves (or created selves eg in MUDs (multi user domains), other personalities or their Second lives and this will affect a culture’s perceptions of the self.”...culture of simulation is affecting our ideas about mind, body, self, machine”. (Turkel, S. 1995).


As technology develops and becomes more entrenched in our developed, first world lives (and also more introduced into developing countries),how will this affect our perceptions of our selves as humans and our abilities to interact with each other and machines?

References
Barnett, R.(2000). Realizing the University in an Age of Supercomplexity. A supercomplex world (p 6-7). Philadelphia:SRHE and Open University.


Exon, M (1998) cited in Concept# 28 from Internet Communications
Concepts Document, Curtin University.


Turkle, S. (1995) In Introduction: Identity in the information age, Life on the Screen (p10). New York: Simon and Schuster.

Wednesday, June 18, 2008

Module 1 Tasks – Further exploration

Boldly going where I haven't gone before...

I downloaded the A-Tool bar and used it to ping the webct site. The average time in ms was 252.
Pinging webct.curtin.edu.au [134.7.180.156] with 32 bytes of data...

I then compared this with the time it took to ping from the network tools site the average here was 277ms.

Ping 134.7.180.156
[webct.curtin.edu.au]
Round trip time to 134.7.180.156: 272 ms
Round trip time to 134.7.180.156: 277 ms
Round trip time to 134.7.180.156: 293 ms
Round trip time to 134.7.180.156: 280 ms
Round trip time to 134.7.180.156: 268 ms
Round trip time to 134.7.180.156: 270 ms
Round trip time to 134.7.180.156: 277 ms
Round trip time to 134.7.180.156: 299 ms
Round trip time to 134.7.180.156: 267 ms
Round trip time to 134.7.180.156: 270 ms
Average time over 10 pings: 277.3 ms

The ping from the A-Tools was marginally quicker (we are talking in milliseconds here). I had no expectation that this would be quicker than traceroute for example but it’s interesting to note that the same task over similar tools at a similar time (eg within the same minute or so) yield different results.


The intrepid explorer I am, I then used traceroute (can you say tracerouted??) from my pc to webct1.curtin.edu.au there was one less hop (19 in total) than the earlier traceroute (performed on Sunday).

The first series of hops were different via servers in the US, then via several states of Australia, but the last hops were the same.

I Googled the name of the first server to see where it was located...

The planet.com is a US company. When I arrived at their website, I was offered the opportunity to chat to a sales rep:

Curious to explore more about 'identity and location', I had a quick chat. Here is the transcript (although I removed the sales rep's actual name as I did not ask their permission to publish in my blog.I have called her Sales Rep.

Please wait while we find an agent to assist you...

You have been connected to [Sales Rep].

Sales Rep: Hello, my name is Sales Rep, I will be your Sales Representative. How may I assist you today? (If you currently have an account with us, please provide your Orbit/ServerCommand login.)

Customer [that's me]: Hello Sales, I dont have an account with your company.
Sales Rep: ok - how may i ehlp (sic) you?

Customer: I was interested to know what your company did ( I had looked up the planet and saw this opportunity to chat. Are you are real person?

[Pause of about 10 seconds]

Sales Rep: yes - i am a real person Sales Rep: we offer self-managed dedicated server hosting

Customer: Yes I am learning about servers and hosting in my course... I really dont need to buy anything today Sales but I appreciate your time. Have a good day.

Sales Rep: thank you!

Customer: Good bye
Thank you for using InstantService. You may now close this window. Your session has ended. You may now close this window.

End of transcript and end of post.

I blog therefore I am (with humble apologies to Descartes)

Thoughts on blogging

So far…well...so good? Have been able to navigate through a pretty user-friendly blogging interface and am the proud owner of a blog. I do want to explore and customise my blog more - and these things take time.

I am trying to incorporate usability elements here from existing knowledge (gathered at work) including:

  • high contrast between background and text

  • using verdana font

  • spacing of text

to make my posts easier to scan or read.

Hey if you are reading this let me know if this blog is easy to read or not. Please post a comment! I’d love to know what you think.

I am finding the process of blogging easy and as I become more used to it will possibly become more adventurous with my posts. I have been thinking about including links to websites that I have found useful so far eg How Stuff Works and also a glossary of words that I have been unfamiliar with so far…

Back to the tasks at hand… more soon.

Sunday, June 15, 2008

Module 1 Tasks – Internet tools - traceroute

Bunnies or brewing? How many hops?

Traceroute


I visited the site How stuff works for a lesson on traceroute. It describes traceroute as “it traces the route that a packet of information takes to get from your computer to another computer connected to the Internet”. Straightforward.

Then off to centralops.net/co/ ( I hadn't seen this type of protocol eg /co/ before) to use the traceroute tool.
Here are the hops:


(I copied and pasted these into a word doc without issue - BUT attempting to paste them directly into my blog as requested has resulted in much frustration and a very long post so my friends, you will have to be satisfied with a screenshot).

There were 19 hops to the Curtin server which was number 20 in sequence and the average time in milliseconds was 123 (one way).


The IP NUMBER of the hostname curtin.edu.au is 134.7.179.53


Because the process of accessing the internet is usually ‘transparent’ to users and so fast, it came as a surprise to me that so many hops were required. Users take so much for granted - a ‘slow’ internet connection is a source of frustration but they really have no idea why. This exercise demonstrates to me the concept (#25) of identity and location in that the ‘fixed’ and ‘known’ points that packets of data are carried through to reach the end user can be identified (and now, right there for you to see on screen ; )


Monday, June 9, 2008

Module 1 Tasks – FTP

Attack of FileZilla

File Transfer Protocol

Like Telnet, I have never used FTP before, but at least I am familiar with the term (being used as a verb).

I ventured to http://filezilla-project.org and downloaded the FileZilla client. This process was easier than the Telnet task for me. I did guess where to enter ‘recall.curtin.edu.au’ and logged in anonymously but it worked first go.

The answer to the burning question... according to the read me file, "CAPITALIZATION MATTERS!".


From reading Concepts 24 (Client-sever two way interactions) I especially like the idea that FTP enables an individual to publish information that can be taken, on demand [or ‘pulled’ ] by the user, rather than information being pushed at the user. Info push/pull are concepts I am familiar with from social media, so it’s gratifying to be able to see another connection.

Module 1 Tasks - Task B

May the Force be with you.

Blinkenlights

Hmmm. A lot of effort went into this. It’s quite slow, but you have to admire the creator’s patience! My second impression was that there is no way that I can control what's going on onscreen. My role is 'passive observer' and there is no interaction possible.Telnet (as a kind of legacy) should serve to remind us how fortunate we are now that we have such difference interfaces now– but I guess ‘we’ had to start somewhere.

So, rather than having to sit and watch the star wars “20th centure text“ version via Telnet, we can watch the clip of ‘star wars kid’ with his broom/light sabre (remember him?) and should we choose to, share it with anyone we want. 21st century users can choose to actively access information.

At the same time, we are constantly being bombarded by it. This is in part, (I think) to the development of interfaces and the sheer volume of people publishing information.

As technology has become part of everyday life (in many places globally) new communication needs arise and technology is being invented to cater for them.

In 10 years will we think youtube is passe?

Module 1 Tasks - Task A

And now for my next trick...

Telnet

Firstly, I had no idea that Telnet existed - until this week. Initially, I had some difficulty accessing Telnet (actually, this is an understatement!). I followed the instructions in Module 1 to the letter but, as nothing appeared like magic (as I am so used this happening when accessing the internet) I quickly went into frustration mode.
So, after trying again, I scrolled through our discussion boards until I found some help – thanks to Gino for being brave enough to post the question in the first place (as I in catch-up mode I have the benefit of others’ experience) and especially Zeak for the excellent Vista/Telnet demo... .The Telnet interface was usable, but from my point of view not particularly intuitive...we are spoilt these days.

The email from Deakin University is now in my inbox (hurrah!) and this task showed me that developments in interface usability and accessibility have come a long way and as current users, we should be grateful.

We can spend more time ‘doing’ than ‘enabling ourselves to do’.

Concept 23 states that the internet “...lessens the recognition of differences between humans and computers...”. In contrast, using Telnet it was very obvious to me I was interacting with a machine, using a tool for a specific use.

The other important lesson learned was don’t be afraid to ask for help – my course-mates are very helpful and this reflects the community nature of the internet generally i.e initially, someone has to figure out how to do things and people are more than willing to share.

More soon ; )

Top 5 tips for new bloggers.

Here are my top 5 tips:


1. Keep it simple
Make sure your blog is both easy to read and easy to understand.

2. Play nicely
Treat others as you would like/expect to be treated and follow appropriate etiquette rules (‘blogiquette’ is a quite a mouthful don’t you think?).

3. Remember your audience
Who only have 24 hours in their day (and, apart from drinking , would probably also like to sleep occasionally). Aim to keep your blogs interesting and relevant.

4. Don’t be shy
Interact! We are all in the same boat as many of us ‘Net 11ers’ have never posted a blog before (me included!) Vote on each other’s quizzes, read profiles and post comments.

5. The Big Bad Wolf?
Remember that (potentially) anyone can read your posts (especially if you become world famous ; ) ...there is a balance between sharing information and retaining a level of privacy you are comfortable with.

Let me know what you think...