Friday, 29 December 2006
Wednesday, 27 December 2006
Below is the screen shot of my blog (Learning Log)
It is suggested that if we wish to continue with our blog we should consider the sorts of ‘bloggiquette’ that are emerging.
"Rebecca Blood has written about the ethics of blogging in her The Weblog Handbook, which suggests a list of standards to which bloggers should adhere."In your learning log, record your ‘top five tips for new bloggers’
Taken from Rebecca Blood's blog rebecca's pocket
- Publish as fact only that which you believe to be true.
- If material exists online, link to it when you reference it.
- Publicly correct any misinformation.
- Write each entry as if it could not be changed; add to, but do not rewrite or delete, any entry.
- Disclose any conflict of interest. plus
- Note questionable and biased sources.
A Bloggers Code of Ethics. Cyberjournaslist.net
Code of Blogging Ethics Debated at AEJMC Convention. Blogging Ethics
Code of Blogging Ethics at Desirable Roasted Coffee. Allan Jenkins
The blogging ethics and disclosure debate, the dark undercurrent among the bloggerati. A view from the Isle.
Bloggin and ethic. Miles Burke
Blogs and your business.Open all hours. SMH.
I've implemented several css style sheets and have updated my page for Student Presentations.
Next I will upload via FTP so that Module 3 is totally complete. I hope I don't have the same or similiar problems that some students have had regarding FTP and OASIS.
Next, go to the Curtin home page and find the policy documents that relate to copyright and IP in IT use.
Drawing on these sources, consider these questions:
* have you used images or words on your web page or website that contravene copyright laws?
No. I create all my own images, usually.
In a previous post on Newsgroups & Chat I found information supporting my stance regarding issues of security about MSN. I have sourced and linked where I found that quote text.
* Would you be in breach of copyright if you put the Curtin logo at the top of your web page for an assignment?
The Curtin logo is the Intellectual Property of Curtin University. I am unsure if I would legally be able to use the logo on a site (for assignment) within the Curtin Intranet. I most assuredly would not be able to use it outside of the Curtin space, without written authorisation from Curtin Corporate Services.
In Nielsen's paper one of the first things he mentions is scanning. In all my Interface design for sites I alway keep this in mind.
While Nielson's ideas are relevant, they are insufficient if you wish to design an easily readable page. For him text is king and without any design I feel he throws out the baby with the bath water. The computer screen is not a paper page with text on it and you cannot design a page as if it is.
Nielson has some strange ideas, and I feel he refuses to budge, the result being I don't use his site as his pages are too hard to read. I find his pages to be one of the worst offends of visual presentation, making it harder to read. Reading a 17" screen which is approximately 30 to 33 cm wide is tiring. see below
If you have alot of text it is important to have a decent left & right margin. No more than 20 cm wide.
Optional Task 1
Make a summary of what you believe are the 5 most important ‘rules’ for writing online.
The list below comes from: Dennis G Jerz of Seton Hill University
- Have your most important material first
- Have clear, relevant and meaningful links
- Consistent navigation
- Consistent interface design
- Scannable text
This list below is from MaxDesign and is what I tend to follow:
- Is there a clear visual hierarchy?
- Are heading levels easy to distinguish?
- Does the site have easy to understand navigation?
- Does the site use consistent navigation?
- Are links underlined?
- Does the site use consistent and appropriate language?
- Do you have a sitemap page and contact page? Are they easy to find?
- For large sites, is there a search tool?
- Is there a link to the home page on every page in the site?
- Are visited links clearly defined with a unique colour?
Optional Task 2
Test your web page according to the W3C standards by going to their ‘validator’ page. If your page does not conform (it probably won’t!) record in your learning log why you think this is: try and identify the particular tags or code that are causing trouble. Are the problems related mostly to display, usability, or accessibility?
My webpage in the Student Presentation area passed XHTML 1.0 Strict validation. Yeh me! see below
Since we are valid xhtml we are proudly displaying the fact.
My web page is already up on the presentations area, and I am using this blog as my learning log.
For the web page component I have not done the html tutorial as that would be a regressive step for me. My page is written in xhtml with presentation controlled by css, all in notepad.
When I have completed / updated the page to how I want it to appear, I will ftp it to the OASIS area required. I certainly don't exprect any problems in this module.
Web Standards are of particular interest to me in light of the redesign, and before that. Because there were many pages that were created in FrontPage by library staff with little idea of Web Standards, coding, colour or design and unfortunately a love of massive, intricate image-maps it made for a lot of work. Even then, it was hard going to implement standards, as some of those involved in the project didn't understand the importance of standards and so felt that they weren't important.
Ironically, that Intranet has been shown and demonstrated for the last 18 months, with much praise and admiration at several international conferences. While the PDF doesn't actually show the Intranet it does show all original images & design by yours truly. On slides 7 & 12 it shows a design I created to decorate a space 1m high by 11m long approx. on a wall in the library.
On actual writing as opposed to coding and designing, I am hoping to participate in a writing course to improve my writing, in the new year. My main writing experience has been abstracts and procedures manuals in the past.
Until now I have never had an interest or a need to have a blog. That doesn't mean I don't regularly read them. There are many excellent blogs on many different subjects areas that I read regularly.
After I finish this unit, I will be looking at various blogging tools that can be hosted on a server as part of the website rather than the blogger.com type of blogging tool.
I have organised a ICQ no. and looked at Trillian, but ultimately have real issues having any of these on my computer. All of these utilities install on your system and are quite invasive. I point blank refuse to have MSN function on my computers. I looked at yahoo and installed that. Now I have to uninstall Firefox and update to get rid of the bloody thing. I'm that annoyed I've barely done any study for the last two weeks. Most of these types of utilities have vulnerabilities that allow code to execute on your machine. i.e.
"The susceptibility comes from an unchecked buffer in the code that handles the input of a parameter in the MSN Chat control. By invoking this parameter in a specific manner, an attacker could overflow the buffer and gain the ability to run code in the user's security context."
If you have broadband, you have serious vulnerabilities. I don't want to spend all my time acting as a system admin for my home network.
I do have skype on my machine, which has a chat function. I have used this to chat & speak with at least 2 other NET11'ers. As an optional task in the future it would be good to have those students with broadband experience skype (IP telephony). You can chat & talk, see & be seen, bringing the online student community closer.
That would be Nikki.
Sunday, 24 December 2006
Attempt: 1 / Unlimited
Started: 08:00 24/12/06
Finished: 08:11 24/12/06
Time spent: 11 min. 12 sec.
Total score: 13 / 20 = 65.0%
True or False?
Student Response: True
Q9 When you use a mail client such as Pegasus, your incoming messages are downloaded through the SMTP server. True or False?
Student Response: True
Q14 The Usenet is a distributed system of messages and is divided into ...?
Student Response: groups
Q15 When using ICQ, apart from nickname, first name, last name and ICQ number, what other parameter can you use to search for existing members?
Student Response: Not answered
Q17 WS-FTP, Bulletproof FTP and Fetch enable the transferring of files between computers and are examples of separate stand alone programs otherwise known collectively as ...?
Student Response: ftps
After checking the module 2 discussion board, Kerri Bennet in #952 said FTP Client, which suggest that I should use proper terminology, and not be lazy. She also suggested looking at the following site:
Q18 If I don't have an account on an FTP server, I would need to logon as an anonymous user. To do this I would use [Answer1] for the username and my [Answer2] as the password. (The answer to this question needs to be in the following format: Answer1, Answer2)
Student Response: Not answered
Q19 I am interested in finding out the time it takes to send and receive a small text packet to a server. What command would I use?
Student Response: traceroute
So, I'm off to go do some more reading. But hey its christmas eve, I've done all my shopping and maybe i'll go and have a coffee instead.
Sunday, 17 December 2006
I belong to a few email lists/groups on yahoo.
The benefit of yahoo groups is that you can choose whether or not to receive emails, an individual email, a daily digest, or to just have web access only. see image below
This is an image of a group (Southern Cross Quilters) I belong to click on image to see details
A discussion board/forum is usually web-based. It can have several different areas. Usually you need to be a member to post, but can often view boards/threads without being a member or logging in.
Are there certain kinds of communication or purposes more suited to one than the other?
I feel discussion boards are best suited to technical interests, web design etc. where you need a dynamic interaction. Or if you are actively looking for information.
My email folder structure is based on sender, content & recipient.
Some senders have their own folder so that any emails from them are immediately apparent.
Depending on the content, some email will go into an appropriate folder.
Depending on the recipient ie. my children receive email which comes into my inbox. Their emails go into their folder, alerting us that they have an email.
Most of my filters are based on recipients or content. see below
see the filter for curtin as below
any emails from curtin go directly to the curtin folder, and at a glance I know if I have any new, unread emails regarding my studies.
This is the same for any emails that have filters.
This first of all depends on the situation.
Is it business, what type of document are you trying to send? To what purpose will the document be put?
If sending to a collegue in the same company, they will have the same programmes you have.
If it is an external business contact, you would communicate with them on the format they require.
If it is a personal contact you would still check to see what ability they have to receive any sort of document. What is their level of IT skill.
If the recipient has a modern machine, it will most likely have the basic free utilities, such as Adobe Reader for PDF's, WinZip for unzipping large files, some type of Office software, and a browser of some type.
If your recipient has Microsoft Works, save & send your documents as .rtf or .txt for word documents, or Text (Tab delimited) for spreadsheets & databases.
Jpegs and Gifs will open in any browser, presuming your recipient is sighted.
Wednesday, 13 December 2006
cc 'carbon copy' - usually a 'fyi' courtesy email is useful if:
- if you are indirectly addressing someone
- you intend the recipient to be aware of those in the cc field
- to keep someone informed regarding a particular matter
- those cc'd don't have to directly reply or respond, usually
- all recipients may have need of all other recipients email addresses
- if you wish to keep a recipient 'confidential'
- if you wish to keep a recipient's email address 'confidential'
- if you do not wish to let the intended recipient be aware of a confidential recipient
- to protect all recipients agains spam
- if you do not wish to make the to & cc fields overly large ie. bulk email
reply all - 'I have never used reply all' could be useful if
- you would only use reply all if you required all the recipients of the original email to see your email reply.
- everyone receiving the original email is required to give feedback of some type
Tuesday, 12 December 2006
A1. The most basic information available (I use Mozilla Thunderbird) will be:
- To: The recipient
- CC: Any cc recipients
- From: The sender
- Subject: The subject line choosen by the sender
- Date: The date created/sent
- Attachments: any attachments if sent
For more detailed information I would choose View > Headers > All
the following information was available after choosing this setting:
Sunday, 3 December 2006
Pinging webct got no response so I used main curtin.edu.au [184.108.40.206]
Amount: 10 Time: 243.1 ms
Amount: 5 Time: 82 ms
Windows flashed by so fast this is what is managed to capture.
I'm finished for the day. I'm going to go a make my birthday cheesecake. Only 2 days late.
No. stops: 23
Tracing route from http://network-tool.com/ [220.127.116.11] to curtin.edu.au 18.104.22.168 [22.214.171.124]...
No. stops: 18
Curtin IP Number: 126.96.36.199
Saturday, 2 December 2006
Although I don't have an email yet. Ah, yes I do.
Having given myself a weeks holiday from study I'm now madly trying to catch up!
They're a lot signed on to do this unit, but I'll be surprised if we all turn up if NED11 is anything to go by. It seemed like there was only about a dozen who actually did the subject.
NED11, by the way was a great subject if you haven't done it.