Sunday, April 26, 2009

Module 3 - Web 2.0

FURL vs html list.

I haven't bookmarked a page in my browser since I discovered del.ic.ous. There is no comparison between the FURL list and html. FURL allows tagging and sorting. This user added metadata makes the data relevant to the user and their tasks. The added benefit of allowing others access to your list gives FURL the social networking advantage as well.

I see the differences between them as the same websites and blogging, hard vs easy. For beginners, it's a no brainer, once an expert you may need more control. As I am no expert the choice is easy.

Module 3 - Blogs

"In your learning log, record your thoughts. Consider various uses for blogs such as citizen journalism and personal blogging. Have you seen in your net travels any interesting uses for blogs? This blog entry is an opportunity to tell us what you really think of blogging!"

On Blogcatalog alone there are 60 categories for Blogs! In each category there is a plethora of blogs under that general heading, most with their own specialist approach. For instance in the Computer category there is a blog specialising in netbooks, while another is a take on computing from a female oriented point of view. So this question may have been easier if it was "what uses can't you put a blog to?".

After all this blogging and reading of blogs, I view them now as template driven web 2.0 sites, rather than personal diaries. I was never interested in blogs because of all the "noise" out there, but have changed my mind after due consideration. I know see them as a great access point for writers and readers alike. For the writers no need to get your head around html and css, for the readers clean and consisten navigation and familiar format ( even across different blog platforms).

My blog standout for this week would be Dennis Jerz, this blog/site (and the distinction is really getting blurred) has plenty of resources and helped me a lot.

Module 3 - Standards

Optional 'standards' task 1

"Make a summary of what you believe are the 5 most important rules for writing online."

You know you content is good, no great, right? So the most important thing is to capture a user and hold them. So with that in mind this is my top 5 in order.

  1. Relevant. In the first second, as your visitor's eyes flick over your page and their brain looks for metadata matches, they better see information, or links to information that is relevant to why they navigated to your page in the first place, or they are gone.
  2. Best and latest content at the top. Make them scroll and you increase the percentage of users that depart before they see you great work.
  3. Concise. Get to the point! Then provide links to more detailed information. Annotated links are a great way to do this.
  4. Scannable. Smart use of headings, lists, meaningful and annotated links, will engae the user and build trust.
  5. Well laid out. To some, conventions are boring, but in the case of layout, colour and font usage, there is a lot of time money and effort put into establishing the most efficient way to present information to people. Experiment by all means, but ignore conventions at your peril. Jakob Nielsen's eye scanning research is one good example to bear in mind when laying out your page.


Optional 'standards' task 2

Validate your page:

In this task we have to validate our code at the W3C html validator service. Then record our thoughts on the results. Page passed, first time!



Examine copyright issues:

All of the content on my page is mine including the image of the printed circuit board. If I had put the Curtin logo at the top of my page without permission I would have been in breach of copyright as the logo belongs to the university. If I used it as part of a task I would have acknowledged the source and sought permission to use it.


ftp:

I uploaded my page and the image associated with it to the server that my business website resides on. I used the browser based file management software, but could have done the same thing with filezilla.

The url of my webpage is http://www.pennanthillsframing.com.au/net11page.html

Module 3 - HTML tags

For this task we had to do a tutorial on html and then make a single page incorporating the skills taught in the tutorial. As a Dreamweaver user, I have not done much hand coding, but I always looked at my source code and tweaked the inevitable layout problems. So this task was not at all foreign to me as I understood all the concepts and had some previous practice.

However I did get a kick out of handcoding from start to finish, although it did seem very time consuming. With practice and some tools, I am sure this will become easier and more natural. Everyone I know who went from WYSIWYG editors to handcoding have said they would never go back. I trust them :)

In comparison to blogging, well it's the same thing really, just different interface. Really experienced bloggers would have no problem handcoding a site, but blogging is easier, with a shallower learning curve vs html. Plus no ftp and a stable platform for archiving. Handcoding does give flexibility and greater control and knowledge though. For me in context of keeping this journal, I prefer blogging for speed and ease over html. For my business site I wouldn't consider blogging.


Here is the link!



Didn't have any real problems with this task except for getting the list centred while keeping the bullets aligned. Had to go with a table.

Monday, April 20, 2009

Module 2 Chat

Chat task is to choose a method, then arrange to meet with other students in the unit and have a chat.

Chose ICQ because it was first on the list and I figured most students would go for it. However as I was one of the last to finish this task it wouldn't have mattered which method I chose. I have IRC'ed before and found it clunky (although less intrusive on my pc system.) I play Entropia regularly and have dabbled in Second Life, but thought it was unrealistic to expect people to download and install either of these large and graphics intensive programs to chat with.

After installing ICQ, I was able to meet up with Amanda for a quick one on one chat and then with Jessica for a group chat. One on one was ok although not very efficient, waiting for responses. Group was laggy with one persons response overlapping with anothers question. Overall I woulde rate chat as recreational communication.

Friday, April 17, 2009

Module 2 Newsgroups

Newsgroups task. Get a reader working, choose a group, post a message, record to journal.

After reading through the task information, I tried web based services first...and they sucked. Outlook was already installed and ready to go from the email task so off we go.

First stop ISP for some info, for once Telstra's part of the deal went smoothly. Opened Outlook started newsreader, entered the news reader server name and dowloaded newsgroup list. Pretty quick, couple of minutes, but we are on dsl2.0.
In my business we use Photoshop heavily so it was the obvious choice as a group topic to choose.



After subscribing I downloaded all the most recent (300) messages and started to have a read.



Well flame on! I thought that teenage gamer sites inhabited by crusty, old school, text based, adults had the worst flamers, but ouch. The first thread made me wince. Get past that and there is some good content but wow people are narky when they aren't held to account.

I found a thread about graphics tablets, which are devices for drawing digitally and posted a reply. Here is a screen shot, and cut and paste.





ahall@no-spam-panix.com

Re: Tablet recommendations

wrote in message news:...
>
> I think I will finally get a tablet (mainly for photoshop,
> but I might use it in AE and Illustrator too).
>
> I really do not know how to size it. Would 6x8 be big enough
> for non-pro use? That should fit nicely on my desk.
>
> How about the 6D pen? Is that a worthy upgrade?
>
> Thanks in advance,
>
>
> --
> Andrew Hall
> (Now reading Usenet in comp.graphics.apps.photoshop...)

Hi Andrew,

I have a Wacom 6x8 which I use professionally in my wide format printing business.
I use it mainly for selecting in Photoshop. I think it is a good size for this
purpose. I would recommend that you consider a wireless keyboard and mouse so that
you can put them to one side when you want to use the tablet. Can't help you with
the stylus question as I have only used the one that came with it. To get a more
realistic feel when drawing, I place a sheet of paper on the tablet for friction.

Jason Radich.



Thursday, April 16, 2009

Module 2 Lists

"What are the pros and cons of email list vs discussion boards?"

Email lists

Pros
  • If a user is interested in multiple groups/interests/hobbies, email list will deliver all of this information to one place. Making this an efficient way to keep up to date.
  • Low bandwidth. If users are on a slow, expensive (rural, developing economies, mobile devices) or shared connection this will be important.
  • Being text based with attachments frowned upon or banned, lists are good for access by mobile devices.
Cons
  • Volume can be cumbersome.
  • Spam
  • No attachments
  • Off topic frowned upon or banned.
  • Less interactive than boards. This is not true for all lists as a lot of online communities have boards as well.
Discussion boards

Pros
  • Provides a sense of home or identity via a central location.
  • Contains many areas of discussion so users can go off topic.
  • Attachments and HTML.
Cons
  • High bandwidth.
  • More casual users means a generally lower quality of posts and lots of post that don't add anything to the discussion.
  • More anonymity for users can mean more flaming and offensive posting.
  • Requires users with multiple interests to visit many places, frequently to keep up to date.

Wednesday, April 15, 2009

Module 2 Email Tasks - 5

"How have you organised the folder structure of your email and why?"

Aside from my Inbox the two root folders are Business and Personal. Then the next layer is by organisation/sender, with some generic folders like Newsletters. Once agin due to the low volume of email that I receive, this is all the folder management I need.
Deleted, sent and draft are obviously the system folders I use as well.

Monday, April 6, 2009

Module 2 Email Tasks - 4

"What sort of filters do you have set up and for what purposes?"

Incoming mail passes through a spam filter first for obvious reasons, although like everyone I occasionally have to trawl through the spam folder to find legitimate mail. This is better than being confronted every log in by hundreds of annoying and offensive messages.
What few messages make it through the spam filter are then sorted by priority and sender. I only average 10-20 messages per day so these two filters are sufficient to prioritise and sort my mail.

Module 2 Email Tasks - 3

"In what ways can you ensure that an attachment you send will be easily opened by the receiver?"

The foolproof way is to communicate your intentions with the recipient prior to sending the file to ascertain what software they have and supply them a file format that is compatible. If this is not possible, stick to open formats (as opposed to proprietary) or formats that have a free and readily available reader/viewer/player. A link to this software and brief instructions on how to use it would be polite.

Some examples of open file formats are:

Document
  • PDF - Portable Document Format. Formerly proprietary, this format was made 'open' in 2008. It is a container for documents that have text, bitmap and vector graphics.
  • ODF - Open Document Format. Open office format for documents. Made popular by Sun Microsystems Open Office suite.
  • HTML - Hyper Text Markup Language.

Multimedia

  • PNG - Portable Network Graphics. Lossless bitmap image format developed to replace GIF.
  • SVG - Scalable Vector Graphics. XML based file format developed by the W3C.

Module 2 Email Tasks - 2

After yesterday's epic effort, I will try to be succinct on this question, seems straightforward.

"In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all' functions of email?"

'Cc' means carbon copy and is to add secondary addresses to a message. Usually the cc recipients are being kept in the loop with visibility, but are not expected to reply to , or act on the message. An example of this would be a department head sending requests or instructions to managers (who would be in the 'To' field, and also sending the email a managing director(s) who would be in the 'Cc' field.

'Bcc' means blind carbon copy so you can have multiple recipients who aren't aware of each other. For example inviting job candidates to a second interview.
'Reply all' is used instead of 'Reply' to reach all recipients (To/Cc/Bcc). For instance an email is sent out to a sporting organisation regarding an impending event and has a major error regarding the address, you could reply all to makes sure everyone receiving the original email is aware of this.

Phew, that was easy, and not a screenshot in sight.

Sunday, April 5, 2009

Module 2 Email Tasks - 1

In the words of Gloria Gaynor, "I am back, from outer space!". I have baulked at this module because of the email tasks. Web based mail has been my choice after all the pain of maintaining .pst file backups from within Outlook and the hassle of migrating isp's (and therefore email addresses).

Yahoo has been my primary mail account for years. Today I have finally buckled down and set up an additional mail address on my isp's server, set up Outlook and my shiny new Iphone with this new mail account. Of course everything was easy, except the Telstra part.

Now over to the Blackboard to do the "Email Tutorial". Back soon.

Task 1 : What information about a user's email, the origin of the message and the path it took can you glean from an email message?

This task seemed simple on the surface but needed a bit of reading to complete.

http;//www.visualware.com/resources/tutorials/email.html

http://www.sendmail.org/dkim/technicalOverview.html

These are the two sources that quickly and clearly explained the syntax used in the headers, but I also read wiki entries and other pages that gave partial information. The email header convention is like html headers, they are slighlty different btween versions and systems.. Header content depends on application used to create the message (plus deliberate spoofing) and the mailserver systems passed through.

For this task I sent myself a message from Yahoo to my new Bigpond address. Then in Outlook, right click on the message in the Inbox. Select Options from the menu, Internet headers.



Return-Path:
Received: from nskntingx07p.mx.bigpond.com ([66.163.178.121])
by nskntmtas06p.mx.bigpond.com with ESMTP
id <20090406003140.hnm57.nskntmtas06p.mx.bigpond.com@nskntingx07p.mx.bigpond.com>
for ; Mon, 6 Apr 2009 00:31:40 +0000
Received: from web34206.mail.mud.yahoo.com ([66.163.178.121])
by nskntingx07p.mx.bigpond.com with SMTP
id <20090406003139.dbli17747.nskntingx07p.mx.bigpond.com@web34206.mail.mud.yahoo.com>
for ; Mon, 6 Apr 2009 00:31:39 +0000
Received: (qmail 12471 invoked by uid 60001); 6 Apr 2009 00:31:37 -0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s1024; t=1238977897; bh=WQQeqrN9VMa1DV024/4J/HQCl+gGBcPoUDZpkwg1pWU=; h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type; b=oG+o3CAFfXV46okSpfreGb4h5MBk66iEnxaUhq335YMRcginKddhSlqhbRW/zd64i7e3lG7LXnqKBpto/L02Giqr0PNkkwCKuojpjurvX4LaScaUj/sDGJBWiMzKF3f9K3lc59T0VgO2OXDN1PwQBqZAm0AeBKNyLIFMl6wliTs=
DomainKey-Signature: a=rsa-sha1; q=dns; c=nofws;
s=s1024; d=yahoo.com;
h=Message-ID:X-YMail-OSG:Received:X-Mailer:Date:From:Subject:To:MIME-Version:Content-Type;
b=UsmafdJMrygFdl54dqTYkZvoY4it/VtZW2cXeSsoH9G+AKuI1NBQp3w6bDaINdmU8XscZUs0HX2CT+8L5Tm7tgOj8117JSUFqJ6eTiPmotHA2S9vtyKrIqGcRQr4wKOk598RH81KMNHd/ZsFF8W5/Zj+vvd9HM4Cx+3MBA/9J4E=;
Message-ID: <292351.8925.qm@web34206.mail.mud.yahoo.com>
X-YMail-OSG: InYFs7gVM1l78.2oqOmdVfJXaTNoqcZEI0ysXA4dWbNx7d9z6wlFfSur3GlUkLjfQdJK7ueh3fyLfpziELrSjiHNUXZPKSRB51YXeb_qYPx7OCWhNMSVYZpfBRpBdPg7NgLGilc7hzjnVXF3cwRZKZ56EydeC2uuMRRYoaXaovVXNQW7urEhDR2NXKfgWv4yGt5H9IWh81tq7pLHbxyQMc8fi.Wz.VM.RDK1r0BsYZDkmQVFT5C9uoonvKpg.hSuAcdQFoCDJfrh5Qfj.MlRw.DZQIXODQQO.WzY9k0.evYKPIsKiqXP78e51SMNQDJNIRINQBcp4lNMcNIyO75soZhhPNGreLVmKo7Rpa90h2Y-
Received: from [121.218.223.76] by web34206.mail.mud.yahoo.com via HTTP; Sun, 05 Apr 2009 17:31:37 PDT
X-Mailer: YahooMailWebService/0.7.289.1
Date: Sun, 5 Apr 2009 17:31:37 -0700 (PDT)
From: Jason Radich
Subject: test
To: jason_radich@bigpond.com
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="0-1432617849-1238977897=:8925"
X-RPD-ScanID: Class unknown; VirusThreatLevel unknown, RefID str=0001.0A150202.49D94D6C.0015,ss=1,fgs=0

From top to bottom this header text contains:

  • Return-Path: reply address. Can be spoofed.
  • Received: As messages move through mail servers, a new Received header line is added to the beginning of the headers list. Each of these lines contain tokens, being: (from), (by), (id), (for) and (;)

    So the first received line can be broken down thus:

    from nskntingx07p.mx.bigpond.com ([66.163.178.121])
    by nskntmtas06p.mx.bigpond.com with ESMTP
    id 20090406003140.hnm57.nskntmtas06p.mx.bigpond.com@nskntingx07p.mx.bigpond
    .com>
    for ; Mon, 6 Apr 2009 00:31:40 +0000
This is the information relating to the Bigpond mail server which is the last server in the chain. Note the ip address, there can be multiple Received lines and by checking the dns name in the From and By tokens, against the ip addresses in the chain you can see if someone is spoofing.

  • DKIM-Signature : DomainKeys Identified Mail is a domain level authentication for email using public key cryptography.
  • X-Mailer : sender's mailer software, in this case Yahoo web mail.
Then we have the header lines that are visible in most email messages, being:
  • Date
  • From
  • Subject
Then there are references to the encoding (in this case MIME 1.0) and the content which could be plain/text ascii, but in this case is multipart/alternative, probably due to some coding in the signature as it is from Yahoo.

In summary the information we can glean from this email's header regarding, the user's email, the origin of a message and the path it took is as follows.

The email was written by Jason Radich using Yahoo mail web application. Using Network Tools to check the DNS against the IP address, the origin is confirmed as Yahoo. The message has three Received lines, but only seems to have gone through two mail servers, Yahoo and Bigpond. The first Received line I think is internal at Yahoo, as it doesn't have a full set of Tokens.

Probably went into overkill on this question having been away from my blog for nearly a month, but it seemed to require more investigation than the simplicity of the question implied. Very interesting to look at this metadata.