HTML
The only problems I really had with making my page were:
• I haven’t touched html since I had to make my homepage for a previous internet course back in 2001 so I’d forgotten some of what I had to do,
• Remembering to close tags, and
• Remembering to spell in “American”.
Do I feel a sense of achievement? Not sure if it’s achievement, but I love making things change. Unfortunately I’m never satisfied with the changes and end up in changing things a million times over. I also find that it’s all too easy for me to get too caught up in “playing” in html – time just runs away from me. Even making this simple page, I have been sitting here making changes and exploring how things work for over 3hrs now. This should have taken me around an hour, but when something doesn’t work the way I want it to, I go in and keep changing things until they do.
Html and blogging are two totally different animals. If you were designing your blog from scratch, you would be using html to actually set up your page and make it look the way you want. By using Blogspot etc, all the html coding has already been done, so there is no need to even really think about it.
I prefer coding the html, but unfortunately unless I was good enough at it to make web pages for other people, anything I’d code would probably never see the light of day because I still don’t feel comfortable with writing the blog.
Wednesday, February 25, 2009
Tuesday, February 24, 2009
Module 2 - Emailing, Mailing Lists, Discussions
Email Tutorial Questions
Which of the following elements must be included in an email address?
Both are correct. E-mail addresses always include the username (or account) as well as the domain name of the computer(s) that provide mail services.
To check for new e-mail, you must
You must provide your password at some point to check e-mail. Your e-mail address is not needed for this task. The POP mail server address is only entered when you configure your e-mail program.
If you don't know what kind of computer or software your recipient has, send a document attachment as a:
A plain text (ASCII) file can be read by anyone, regardless of what type of computer (PC or Macintosh) or software they have.
You can transfer messages to another mailbox by
Both are correct. Use the program's menu to move and file messages as you read them, or set up a filter to place certain messages into a special mailbox automatically.
"Flames" are:
Flames are remarks that provoke arguments or anger. They can be avoided by taking a careful look at your message before it is sent.
Module 2 Tasks
1. What information about a user's email, the origin of a message, and the path it took, can you glean from an email message?
Surface Metadata will tell you who the email is to, who it is from, what the subject is, who the other addressees are (as long as they are visible), the urgency with which it is sent, and the time sent. Once the email has been received by you, it will also tell you if it has been read and if it has been replied to or forwarded. If the email is simply forwarded to you from other people, you will sometimes be able to see who else has received the email, depending on whether the last sender removed all the “forwarding addresses” inside the email.
Extra information can be retrieved from the metaheader. In Outlook 2003, right click on an email, click on “options” and the internet header data is shown as such:
Received: (qmail 81706 invoked from network); 23 Feb 2009 00:23:35 +1030
Received: from smx2.mail.adnap.net.au (219.90.133.168)
by hurricane.mail.adnap.net.au with SMTP; 23 Feb 2009 00:23:35 +1030
Received: from blu0-omc2-s6.blu0.hotmail.com ([65.55.111.81])
by smx2.mail.adnap.net.au with esmtp (Exim 4.63)
(envelope-from)
id 1LbEly-0002bg-Rb
for XXXXXXX@XXXX.com.au; Mon, 23 Feb 2009 00:23:35 +1030
Received: from BLU137-W51 ([65.55.111.71]) by blu0-omc2-s6.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 22 Feb 2009 05:53:32 -0800
Message-ID:
Content-Type: multipart/alternative;
boundary="_4d8f2996-a1bc-4872-bd64-ee11ba54e5e4_"
X-Originating-IP: [219.90.227.18]
From: Judi Z
To:
Subject: just testing this
Date: Mon, 23 Feb 2009 00:23:32 +1030
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 22 Feb 2009 13:53:32.0799 (UTC) FILETIME=[F315C0F0:01C994F4]
X-XXXX-Whitelist-Server: Yes
This shows further information regarding where the email has come from and where it has come through before being directed into your inbox.
By following the instructions in Outlook Tips you can have the whole message displayed in the internet header box instead of just the header.
According to what I can find around, yahoo doesn’t allow you to see the metaheaders, and hotmail has changed its format so you can no longer see the metaheaders in there either.
2. In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all’ functions of email?
The first two terms initially came from the days when typists typed up all correspondence on manual typewriters – the days before electric typewriters (though it was still done then) and photocopiers. CC is “carbon copy”, BCC is “blind carbon copy”, a carbon copy that no-one else gets to know was sent. This was done using pieces of paper in between the carbons, to ensure that the original letter was the only one that had all the addresses or names on it. Now CC is used to include other people in who are not the major addressees but who the information would be useful to. BCC is used to include people who would find the information useful but who are to be kept “invisible” and Reply All is to answer every person who is included in the original address.
Reply All can be a very dangerous function to use, because sometimes the replies to the email aren’t meant to be seen by everyone. Sometimes the reply is only meant to be seen by the last person who forwarded the email, not everyone else on their list. By using “reply all”, everyone on the addressee list of the email will get a copy.
Much damage has been done through some very large companies, where information has been passed around, and instead of using “reply” the last person to receive the email has hit “reply all” and sent inappropriate comments through to people who weren’t meant to get them.
3. In what ways can you ensure that an attachment you send will be easily opened by the receiver?
By using a plain text (ASCII) file or by verifying with the recipient that they have a program that will read the attachment file that you are sending them.
4. What sorts of filters or rules do you have set up, and for what purpose?
I don’t have any filters or rules set up in either my home Outlook account, or my work one. I don’t have any in my home account, because that is my very private account, and very few places have that address. I have never received any spam or junkmail in there, and have no need for filters or rules.
I don’t have any filters or rules in my work Outlook account, because we aren’t allowed to. Every time we turn our computers off, the accounts revert to a specific layout and formula, so I would be having to reset rules and filters every day.
5. How have you organised the folder structure of your email and why?
I have no folders in my home Outlook account because I have very few emails go into that account, and all the emails that go in are dealt with immediately.
I have folders in my work account so I can keep track of various work topics as they come in. I have the folders set up under “Inbox”, and if a topic has been completed and the emails are no longer needed, I delete the folder. Besides the signature block, this is about the only “personalisation” that will be accepted by Outlook in my work environment. If the emails are needed for further information, I save them to our records management system.
Email Lists
What are the pros and cons of email lists versus discussion boards?
A mailing list is a list of e-mail addresses of people interested in the same topic. This is usually a “one way” discussion with information coming from a specific site and being sent onto addressees who have registered an interest in receiving the emails. Brochures and newsletters usually fall into this category. People sign up to receive specific brochures and newsletters because they are interested in the topic or goods, and while they receive the information regularly there is limited ability to be able to reply to them.
A discussion board usually consists of a number of posts made by people either on the same subject or following a particular theme. Within the discussion board posts are often broken up into “threads” which mean that particular subjects within the theme are more easily traced.
Mailing lists
Pros
• Regular updating of requested information
• The information is held on your personal computer – don’t have to be online to access it
Cons
• Can quickly fill your email inbox
• Limited ability to be able to reply to information received
• Must “unsubscribe” to stop the emails coming
Discussion boards
Pros
• Information on a particular subject is all in one area
• New threads can be started by participants discussing linked subjects or adding further information
• Opinions can be left by anyone who is registered at any time
• The information is not held on your personal computer – able to access it from any computer
Cons
• Have to access another site to get the information
• Have to be registered at the site to be able to participate in the discussion & often to read the info
• If participants don’t adhere to threads, the information can become very unwieldy
• Some participants take comments personally, or make personal comments at other participants, thereby hijacking threads and making it awkward for others to read the information
Are there certain kinds of communication or purposes more suited to one than the other?
I would suggest that information that needs to be disseminated but doesn’t need to have the ability to reply would be more suited to email lists. This would include information like newsletters, offers and brochures.
Discussion boards are more suited to a number of people sharing ideas. They give the opportunity to not only put forward your own views or information you have researched, but also to see views or information from others, and to discuss the various differences or similarities.
Which of the following elements must be included in an email address?
Both are correct. E-mail addresses always include the username (or account) as well as the domain name of the computer(s) that provide mail services.
To check for new e-mail, you must
You must provide your password at some point to check e-mail. Your e-mail address is not needed for this task. The POP mail server address is only entered when you configure your e-mail program.
If you don't know what kind of computer or software your recipient has, send a document attachment as a:
A plain text (ASCII) file can be read by anyone, regardless of what type of computer (PC or Macintosh) or software they have.
You can transfer messages to another mailbox by
Both are correct. Use the program's menu to move and file messages as you read them, or set up a filter to place certain messages into a special mailbox automatically.
"Flames" are:
Flames are remarks that provoke arguments or anger. They can be avoided by taking a careful look at your message before it is sent.
Module 2 Tasks
1. What information about a user's email, the origin of a message, and the path it took, can you glean from an email message?
Surface Metadata will tell you who the email is to, who it is from, what the subject is, who the other addressees are (as long as they are visible), the urgency with which it is sent, and the time sent. Once the email has been received by you, it will also tell you if it has been read and if it has been replied to or forwarded. If the email is simply forwarded to you from other people, you will sometimes be able to see who else has received the email, depending on whether the last sender removed all the “forwarding addresses” inside the email.
Extra information can be retrieved from the metaheader. In Outlook 2003, right click on an email, click on “options” and the internet header data is shown as such:
Received: (qmail 81706 invoked from network); 23 Feb 2009 00:23:35 +1030
Received: from smx2.mail.adnap.net.au (219.90.133.168)
by hurricane.mail.adnap.net.au with SMTP; 23 Feb 2009 00:23:35 +1030
Received: from blu0-omc2-s6.blu0.hotmail.com ([65.55.111.81])
by smx2.mail.adnap.net.au with esmtp (Exim 4.63)
(envelope-from
id 1LbEly-0002bg-Rb
for XXXXXXX@XXXX.com.au; Mon, 23 Feb 2009 00:23:35 +1030
Received: from BLU137-W51 ([65.55.111.71]) by blu0-omc2-s6.blu0.hotmail.com with Microsoft SMTPSVC(6.0.3790.3959);
Sun, 22 Feb 2009 05:53:32 -0800
Message-ID:
Content-Type: multipart/alternative;
boundary="_4d8f2996-a1bc-4872-bd64-ee11ba54e5e4_"
X-Originating-IP: [219.90.227.18]
From: Judi Z
To:
Subject: just testing this
Date: Mon, 23 Feb 2009 00:23:32 +1030
Importance: Normal
MIME-Version: 1.0
X-OriginalArrivalTime: 22 Feb 2009 13:53:32.0799 (UTC) FILETIME=[F315C0F0:01C994F4]
X-XXXX-Whitelist-Server: Yes
This shows further information regarding where the email has come from and where it has come through before being directed into your inbox.
By following the instructions in Outlook Tips you can have the whole message displayed in the internet header box instead of just the header.
According to what I can find around, yahoo doesn’t allow you to see the metaheaders, and hotmail has changed its format so you can no longer see the metaheaders in there either.
2. In what cases would you find it useful to use the 'cc', 'bcc' and 'reply all’ functions of email?
The first two terms initially came from the days when typists typed up all correspondence on manual typewriters – the days before electric typewriters (though it was still done then) and photocopiers. CC is “carbon copy”, BCC is “blind carbon copy”, a carbon copy that no-one else gets to know was sent. This was done using pieces of paper in between the carbons, to ensure that the original letter was the only one that had all the addresses or names on it. Now CC is used to include other people in who are not the major addressees but who the information would be useful to. BCC is used to include people who would find the information useful but who are to be kept “invisible” and Reply All is to answer every person who is included in the original address.
Reply All can be a very dangerous function to use, because sometimes the replies to the email aren’t meant to be seen by everyone. Sometimes the reply is only meant to be seen by the last person who forwarded the email, not everyone else on their list. By using “reply all”, everyone on the addressee list of the email will get a copy.
Much damage has been done through some very large companies, where information has been passed around, and instead of using “reply” the last person to receive the email has hit “reply all” and sent inappropriate comments through to people who weren’t meant to get them.
3. In what ways can you ensure that an attachment you send will be easily opened by the receiver?
By using a plain text (ASCII) file or by verifying with the recipient that they have a program that will read the attachment file that you are sending them.
4. What sorts of filters or rules do you have set up, and for what purpose?
I don’t have any filters or rules set up in either my home Outlook account, or my work one. I don’t have any in my home account, because that is my very private account, and very few places have that address. I have never received any spam or junkmail in there, and have no need for filters or rules.
I don’t have any filters or rules in my work Outlook account, because we aren’t allowed to. Every time we turn our computers off, the accounts revert to a specific layout and formula, so I would be having to reset rules and filters every day.
5. How have you organised the folder structure of your email and why?
I have no folders in my home Outlook account because I have very few emails go into that account, and all the emails that go in are dealt with immediately.
I have folders in my work account so I can keep track of various work topics as they come in. I have the folders set up under “Inbox”, and if a topic has been completed and the emails are no longer needed, I delete the folder. Besides the signature block, this is about the only “personalisation” that will be accepted by Outlook in my work environment. If the emails are needed for further information, I save them to our records management system.
Email Lists
What are the pros and cons of email lists versus discussion boards?
A mailing list is a list of e-mail addresses of people interested in the same topic. This is usually a “one way” discussion with information coming from a specific site and being sent onto addressees who have registered an interest in receiving the emails. Brochures and newsletters usually fall into this category. People sign up to receive specific brochures and newsletters because they are interested in the topic or goods, and while they receive the information regularly there is limited ability to be able to reply to them.
A discussion board usually consists of a number of posts made by people either on the same subject or following a particular theme. Within the discussion board posts are often broken up into “threads” which mean that particular subjects within the theme are more easily traced.
Mailing lists
Pros
• Regular updating of requested information
• The information is held on your personal computer – don’t have to be online to access it
Cons
• Can quickly fill your email inbox
• Limited ability to be able to reply to information received
• Must “unsubscribe” to stop the emails coming
Discussion boards
Pros
• Information on a particular subject is all in one area
• New threads can be started by participants discussing linked subjects or adding further information
• Opinions can be left by anyone who is registered at any time
• The information is not held on your personal computer – able to access it from any computer
Cons
• Have to access another site to get the information
• Have to be registered at the site to be able to participate in the discussion & often to read the info
• If participants don’t adhere to threads, the information can become very unwieldy
• Some participants take comments personally, or make personal comments at other participants, thereby hijacking threads and making it awkward for others to read the information
Are there certain kinds of communication or purposes more suited to one than the other?
I would suggest that information that needs to be disseminated but doesn’t need to have the ability to reply would be more suited to email lists. This would include information like newsletters, offers and brochures.
Discussion boards are more suited to a number of people sharing ideas. They give the opportunity to not only put forward your own views or information you have researched, but also to see views or information from others, and to discuss the various differences or similarities.
Thursday, February 5, 2009
OK, That's Done!!
Ok, my concepts assignment is now submitted. I am going to breathe now. Yes, I still have more work to be done (& more studying for the other subject, but THAT one has been submitted too), but the work to be done isn't "scaring" me as much as trying to get these two assignments in that were both due on the same day!!
Now I'll be walking around with my fingers crossed - I just need to PASS!
Now I'll be walking around with my fingers crossed - I just need to PASS!
Conceptual Research & Reflection Project
Concept #23. HUMAN-COMPUTER INTERFACES
“The internet lessens the recognition of difference between humans and computers because, at a distance, it often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or machine.” (Allen, n.d.)
Years before computers became common household items and the internet became reality, man envisioned a time when everyone would communicate with mechanical beings on an easy, individual basis. Most sci-fi movies had a “friendly robot” or computer which would do the verbal bidding of its master, understanding almost everything that was said to it.
However, the scientists and computer programmers knew that reality wouldn’t be so easy and rosy.
In 1950 Alan Turing posed a question “Can machines think?” (as cited abelard 1999). He went on to develop a game called “The Imitation Game”, where the aim was for an interrogator to pose questions to an unseen answerer, with the goal of determining if the participant was a human or a machine at the end of 5 minutes of questioning. The final decision was to be based on whether or not the participant could form answers that were not merely imitations or paraphrasing of the questions, but give a cognitive answer, even using different concepts and ideas. This became known as “The Turing Test” and is one of the benchmarks used to determine if a computer program has intelligence. When talking about the test today, if after 5 minutes you cannot decide if you are talking to a person or a computer when having a text based conversation, then the program is said to have “passed the Turing Test”.
Since I’ve been online (Feb 1999) a number of chatsites have tried “chatbots” (chatting robots, or bots) in their sites to encourage visitors. The aim was for it to look like at least one “person” was always in the site to greet visitors and hopefully encourage them to stay and induce others to enter and chat. As far as I’m aware most of these failed, and they didn’t pass the Turing Test. They could be easily programmed to greet an incoming chatter by name, and provide some details about “themselves” (as human chatter might), but after a couple of exchanges, it became obvious it was a bot when the only conversation it could have was to either repeat set phrases or to paraphrase the incoming chatter’s own words. Obviously some bots are more sophisticated than others, and depending on the previous chatting experiences of the human, some chatbots could seem real.
In some respects I disagree with Allen’s (n.d.) statement at the beginning of this concept because, at our current state of development, I feel while it may be harder to discern the difference between chatting with humans and bots online, it is not impossible because Artificial Intelligence machines have not yet reached the capability of being able to hold random conversations with humans. Logical “brains” have not yet been able to replicate the thought processes of “messy” biological brains.
Whether this is a good thing or bad at the moment, I don’t know – many people worry about “robots taking over”, while others pray for the day of 100% unemployment because robots look after everything. However, reading Asimov may give mankind some tips!
Reference:
abelard, (1999) Computing machinery and intelligence – a.m. turing, 1950, Retrieved January19 2009 from http://www.abelard.org/turpap/turpap.php
Allen, M., (n.d.) Concept #23. Human-computer interfaces, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
In 1990, Loebner underwrote a contest designed to implement the Turing Test. He pledged a number of prizes and medals to developers and programmers to develop a machine that could be said “to think”. The 2008 winner produced their creation Elbot. So far, the major prize remains unclaimed.
While the yearly winner may in fact spend a lot more than their winnings in developing their machine, I feel that this is an incentive to developers and programmers to try to advance computing to where we may no longer know if we are conversing with another human or a computer.
Reference:
Loebner, H., (2007) The Loebner Prize in Artificial Intelligence, Retrieved January19 2009 from http://www.loebner.net/Prizef/loebner-prize.html
________________________________________
Turing (1950) believed that within 50 years computers would have a program storage capacity of 109 which would enable them to play the game so well that an average person would only have a 70% chance of success. Current computers have a storage capacity far exceeding this size, and yet are unable to carry on a human-like conversation.
I feel part of the problem is that while computers can be taught to mimic a certain amount of human speech (hands free programs, chatbots), they are still unable to actually undertake Natural Language Processing, and therefore can’t “chat” – in any language.
Reference:
Turing, A.M., (1950) Contrary views on the main question, Computing machinery and intelligence, (Ch6, para2) Retrieved January19 2009 from http://loebner.net/Prizef/TuringArticle.html
________________________________________
Concept 17. THE IMPACT OF TEXT-BASED REAL-TIME CHAT
“Real-time internet-based text chat is a significant part of contemporary internet use.” (Allen n.d.)
Think about the shift worker, coming home at 3am, tired but too wired to sleep, can’t call anyone to talk to, nothing’s open, can’t visit anyone. Sleep isn’t beckoning, but they’ve got to get out of their dirty clothes, so they shower and start their computer, open their instant messaging program or favourite chat-room and there are a multitude of people who are willing to “talk” to them.
No-one needs to see what they are wearing, no prying eyes can “inspect” the room behind them and scrutinise their belongings, they can choose to participate in multiple conversations without having to worry about having missed something that was said by a quiet voice or having a loud voice overshadowing everything. Having private conversations and public conversations all at once, allowing their eyes and brain to transmit information to their fingers to reply to the chatters they choose to respond to.
In text, no-one needs to see the things a chatter doesn’t want them to see. Disabilities, advantages and disadvantages – can all be ironed out in text. While body language may no longer be available for non-verbal communication, a lot of chatters take that into consideration and give clues into hidden meanings behind their words, or even use more detailed descriptions in the first place. Chatters who wish to be obstructive can cause problems by not using clues to their meanings, but they soon discover that if they wish to find people to “talk” with, they need to give clues.
If a chatter is involved in an important conversation, there is always the ability of being able to save relevant pieces of text. Put that phone number or link to a site somewhere “safe”, recall the details of a previous conversation or save your own copy of that baby picture in the family album.
In chat with multiple people, think of being at a party. Only a couple of conversations at a time can generally be pursued, and if one is a private conversation it generally means no other conversations can be entered into at the same time. With text-based real-time chat, public and private conversations can be undertaken simultaneously, each without disturbing the other. Obviously the speed of typing will dictate the number of conversations that can be entered into at any one time, but it isn’t necessary to only concentrate on one conversation unless that is what is desired.
Is text-based real-time chat a significant part of internet use? I think so, after all, it offers most of the speed of a telephone call; the ability of a letter to be able to show words and pictures; the privacy of not having someone watching your surroundings; the luxury of time to “think out” your replies; the ability to track a number of conversations at once, both private and public; the flexibility of different time-zones, allowing chatters to converse at their convenience; the discretion to be able to multi-task without causing offence to others; and the quietness of keyboard to be able to chat with multiple people without disturbing anyone else in the household.
Reference:
Allen, M., (n.d.) Concept #17. The impact of text-based real-time chat, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
If there is one group of people who have grasped the concept of text-based real-time chat, it’s teenagers. Barker (2006) finds that this isn’t just online, but on their phones as well. Who needs to talk on their phone anymore – just text! Instead of using the phone all night, a large number of teens now prefer to spend their time texting online or on the phone, interacting with their peers, passing information, broadening their networks and playing games all via the written word and their keyboards. Are teenagers losing the power of speech, or just using an alternate method of communication?
Reference:
Barker, O., (2006, 29May). Technology leaves teens speechless. USA Today. Retrieved from http://www.usatoday.com/tech/news/techinnovations/2006-05-29-teen-texting_x.htm?POE=TECISVA
________________________________________
In 1991, a coup d'état attempt was staged on the capitol of the Soviet Union. A group of Communist Party Leaders prevented journalists from reporting events by enforcing a media blackout. Journalists turned to internet-based real-time text chat (IRC) to garner information on the offensive from colleagues and eyewitnesses. The application was also used by journalists to share news during the Gulf War. (De Hoyos, n.d.)
These are two examples where text-based real-time chat has proven to have been significant part of contemporary internet use. Without it, information may never have been fully disseminated about these world-changing situations until it was completely rewritten.
Reference:
De Hoyos, B., (n.d.) The world’s first IMs - Peer-to-Peer Protocol, Talkers and IRCs, IM History – the early IMs, Referenced January20, 2009, from http://im.about.com/od/imbasics/a/imhistory_2.htm
________________________________________
Concept 18. Non-speech communication through text: audience and authors’ responsibilities
“The responsibility for effective chatting lies not merely with the author of a particular comment, but with its audience…if IRC is to be rich and valuable as a form of communication (and it can be), then both those saying things and those reading them must share the tasks of making it so.” Allen (n.d.)
Imagine every emotion and feeling people go through when talking with someone, all the common expressions they use regularly to describe certain things and all the “hidden” non-verbal clues everyone gives out during the course of a simple conversation. Now think about how to convey all this information to someone through words alone.
Imagine receiving a message from someone whose idiosyncrasies of speech are entirely different to yours, and you’re left confused as to how you are meant to interpret the message. They don’t even have to be from another country or culture, you can be left in the dark by simply receiving a message from a friend if it doesn’t have any hint as to whether they are being serious or sarcastic or silly.
In text-based chat, it falls to both the author and the audience to have some way to communicating feelings and non-verbal body language during the course of a conversation. Without any of these clues, conversation can become dry and humourless, simple situations could escalate into arguments or degenerate into confusion if there is no form of body language. And just because you don’t have a body in text-based chat, doesn’t mean you can’t have body language!
Most people are now aware of the simple smiley face :) that means someone is smiling at you, and anyone who regularly sends or receives text messages will have received a number of them. This is a simple form of body language, and is usually understood by both the sender and receiver of a message. Depending on the words it accompanies, it generally means the message is happy, or the sender is sending “good feelings” to the receiver. People are also used to reading about body language in books, but in text-based chat, there usually isn’t the time or the space to write a novel.
A lot of text-based chat rooms not only use the various “web-wide accepted” forms of written body language, but also have other actions that might be common in their rooms. One form is to use asterisks or brackets around actions. This separates the actions from spoken words, and allows another form of body language. If a person enters the chat room and posts a message like {“hi” *walks across the room and sits on the couch*}, it is generally taken that the person is saying hello and imitating the action (at least mentally) of walking across the room and sitting on the couch – usually a fairly relaxed and open action. Whereas if someone types a message and then uses the term *frown* they may be annoyed or confused about something.
Just as you might learn to decipher the tone of a conversation in real life, by watching carefully and asking questions in text-based chat rooms, most people gradually learn the more accepted forms of expression that would normally make up the non-verbal body language they use during a conversation. Once both the author and audience are using very much the same terms, misunderstandings are a lot less likely to occur, and text-based chat becomes a rich and valuable form of communication.
Reference:
Allen, M., (n.d.) Concept #18. Non-speech communication through text: audience and authors’ responsibilities, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
There are a number of ways to express non-verbal language in text-based chat. It’s common to use a number of different acronyms to show different feelings or expressions. One very common thread throughout most text-based chat is the idea that typing in all capital letters is shouting, and is generally classed as being rude. (TeleComputer Services 2009) Acronyms are also very handy for slow or disabled typists and can be a quick and easy way to type an expression or feeling, or even post an entire sentence. (Disabled-World.com, 2008) Chat rooms often have their own ways to display body language, which quickly becomes clear to newcomers.
TeleComputer Services (2009) Acronyms Online, Retrieved January20, 2009, from http://acronymsonline.com/lists/chat_acronyms.asp
Disabled-World.com (October9, 2008) Text shortcuts for chat rooms messenger programs and SMS texting. Retrieved January20, 2009 from http://www.disabled-world.com/chat/text-shortcuts.shtml
________________________________________
In the early days of college bulletin boards in the US, a problem was noted amongst the participants in being able to decipher the meaning of another person’s message. Was it serious or in jest? If a joke was posted, and the message misunderstood, a lengthy diatribe could follow (Fahlman, n.d.). So in 1982, Scott Fahlman suggested the use of the characters :-) to show when a message was meant to be lighthearted. From this simple start we now have a spin off of multiple text based characters all meant to show various forms of emotions and make reading text more personal.
Reference:
Fahlman, S.E., (n.d.), Smiley Lore :-), Retrieved January21 2009, from http://www.cs.cmu.edu/~sef/sefSmiley.htm
________________________________________
Concept #26. Privacy and Security
“The internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form.” (Allen, n.d.)
Before people ever start to use the internet, one thing they should think about is to be very careful about whom they give their personal details to. Just like in real life, not everyone is friendly and helpful online, and while the people or even the websites that are visited may seem friendly and helpful, there may be a hidden agenda to their assistance.
The agenda could be something as innocuous as gathering information about your computer to allow you to open the website easily the next time you visit, it could be information about your browsing and shopping habits to offer you “targeted advertising”, it could be gathering information to send “spam” (unwanted correspondence) to your email address, or it could be as harsh as someone wanting access to your computer to use it for things like Denial of Service attacks on other computers or someone gathering information for the purpose of stalking you (cyber-stalking) or stealing your identity.
Cyber-stalking and identity theft, while becoming more prevalent, seem to not be as commonplace as gathering information regarding browsing and shopping habits, but all involve a certain degree of invasion of privacy. Just because someone visits a particular website or buys something (either online, or increasingly, in shops that are asking for personal details from their customers), doesn’t mean they wish to have more advertising supposedly specifically aimed at them.
There are a number of ways that someone can keep their “online profile” and details as low as possible and try to protect their privacy. Being aware of what personal details are given to various websites or people you chat with is one way. If a website requests email details for registration or for receiving something like a newsletter, one of the easiest ways to keep most personal details private is to set up a free website like hotmail or yahoo, with limited personal details in it and use that. This often also tends to keep your “main” email site fairly free of spam.
Some sites, particularly those offering free downloads may also be loaded with spyware, malware, adware and various viruses, trojans and worms.
Generally adware is simply a pain. It is software that periodically causes targeted advertisements to show up on a user’s computer (PCMag n.d.). If it is installed on a user’s computer without their knowledge, it is generally classed as spyware, and often collects further information on a users browsing and shopping habits to report to a third party (PCMag n.d ). Malware however is designed to cause major problems in computers (PCMag n.d.), along with viruses, worms, trojans and a number of other “nasties”.
Having a good firewall and virus protection is important too. If the firewall and virus protection are up to date, and people are aware and careful about the information they release on the internet, then most people have no problems with the various “net nasties” that can infect their computers or impinge on their lives.
References:
PCMag.com (n.d.), Adware, Encyclopedia, Retrieved 22January 2009, from
http://www.pcmag.com/encyclopedia_term/0,2542,t=adware&i=37577,00.asp
PCMag.com (n.d.), Malware, Encyclopedia, Retrieved 22January 2009, from http://www.pcmag.com/encyclopedia_term/0%2C2542%2Ct%3Dmalware&i%3D46552%2C00.asp
PCMag.com (n.d.), Spyware, Encyclopedia, Retrieved 22January 2009, from
http://www.pcmag.com/encyclopedia_term/0%2C2542%2Ct%3Dspyware&i%3D51898%2C00.asp
________________________________________
The weakest link in any security system is the human element. Ledford (n.d.) defines social engineering as “the practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional.” A lot of people are wary of giving out information online, but will gladly hand it out over the phone or throw out paperwork with names, addresses and banking or billing details. Granger (2001) shows instances where social engineering has resulted in theft and fraud on a large scale, which can also relate on the smaller scale to the individual.
Reference:
Ledford, J., (n.d.), Social Engineering, About.com: Identity Theft, Retrieved January22 2009 from http://idtheft.about.com/od/glossary/g/Social_Engineer.htm
Granger, S., (2001) Social Engineering Fundamentals, Part I: Hacker Tactics, Retrieved January 22 2009 from http://www.securityfocus.com/infocus/1527
________________________________________
Identity theft is one of the fastest growing types of consumer frauds (Federal Deposit Insurance Corporation 2004), and a lot of governments around the world are looking into more sophisticated ways of stopping identity theft. Some of the various methods being considered are biometrics, scanning software, two or three factor user authentication and tokens. These methods are available for general use in one form or another, but are generally considered too expensive for the home user. Most users find that a good firewall and virus protection are sufficient for their home computers, but more visibility needs to be cast on the privacy and security problem of social engineering.
Reference:
Federal Deposit Insurance Corporation (2004), Putting an end to account hi-jacking identity theft, Retrieved January22 2009 from http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf
“The internet lessens the recognition of difference between humans and computers because, at a distance, it often feels similar to communicate and act on the Internet regardless of whether one is speaking with a human or machine.” (Allen, n.d.)
Years before computers became common household items and the internet became reality, man envisioned a time when everyone would communicate with mechanical beings on an easy, individual basis. Most sci-fi movies had a “friendly robot” or computer which would do the verbal bidding of its master, understanding almost everything that was said to it.
However, the scientists and computer programmers knew that reality wouldn’t be so easy and rosy.
In 1950 Alan Turing posed a question “Can machines think?” (as cited abelard 1999). He went on to develop a game called “The Imitation Game”, where the aim was for an interrogator to pose questions to an unseen answerer, with the goal of determining if the participant was a human or a machine at the end of 5 minutes of questioning. The final decision was to be based on whether or not the participant could form answers that were not merely imitations or paraphrasing of the questions, but give a cognitive answer, even using different concepts and ideas. This became known as “The Turing Test” and is one of the benchmarks used to determine if a computer program has intelligence. When talking about the test today, if after 5 minutes you cannot decide if you are talking to a person or a computer when having a text based conversation, then the program is said to have “passed the Turing Test”.
Since I’ve been online (Feb 1999) a number of chatsites have tried “chatbots” (chatting robots, or bots) in their sites to encourage visitors. The aim was for it to look like at least one “person” was always in the site to greet visitors and hopefully encourage them to stay and induce others to enter and chat. As far as I’m aware most of these failed, and they didn’t pass the Turing Test. They could be easily programmed to greet an incoming chatter by name, and provide some details about “themselves” (as human chatter might), but after a couple of exchanges, it became obvious it was a bot when the only conversation it could have was to either repeat set phrases or to paraphrase the incoming chatter’s own words. Obviously some bots are more sophisticated than others, and depending on the previous chatting experiences of the human, some chatbots could seem real.
In some respects I disagree with Allen’s (n.d.) statement at the beginning of this concept because, at our current state of development, I feel while it may be harder to discern the difference between chatting with humans and bots online, it is not impossible because Artificial Intelligence machines have not yet reached the capability of being able to hold random conversations with humans. Logical “brains” have not yet been able to replicate the thought processes of “messy” biological brains.
Whether this is a good thing or bad at the moment, I don’t know – many people worry about “robots taking over”, while others pray for the day of 100% unemployment because robots look after everything. However, reading Asimov may give mankind some tips!
Reference:
abelard, (1999) Computing machinery and intelligence – a.m. turing, 1950, Retrieved January19 2009 from http://www.abelard.org/turpap/turpap.php
Allen, M., (n.d.) Concept #23. Human-computer interfaces, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
In 1990, Loebner underwrote a contest designed to implement the Turing Test. He pledged a number of prizes and medals to developers and programmers to develop a machine that could be said “to think”. The 2008 winner produced their creation Elbot. So far, the major prize remains unclaimed.
While the yearly winner may in fact spend a lot more than their winnings in developing their machine, I feel that this is an incentive to developers and programmers to try to advance computing to where we may no longer know if we are conversing with another human or a computer.
Reference:
Loebner, H., (2007) The Loebner Prize in Artificial Intelligence, Retrieved January19 2009 from http://www.loebner.net/Prizef/loebner-prize.html
________________________________________
Turing (1950) believed that within 50 years computers would have a program storage capacity of 109 which would enable them to play the game so well that an average person would only have a 70% chance of success. Current computers have a storage capacity far exceeding this size, and yet are unable to carry on a human-like conversation.
I feel part of the problem is that while computers can be taught to mimic a certain amount of human speech (hands free programs, chatbots), they are still unable to actually undertake Natural Language Processing, and therefore can’t “chat” – in any language.
Reference:
Turing, A.M., (1950) Contrary views on the main question, Computing machinery and intelligence, (Ch6, para2) Retrieved January19 2009 from http://loebner.net/Prizef/TuringArticle.html
________________________________________
Concept 17. THE IMPACT OF TEXT-BASED REAL-TIME CHAT
“Real-time internet-based text chat is a significant part of contemporary internet use.” (Allen n.d.)
Think about the shift worker, coming home at 3am, tired but too wired to sleep, can’t call anyone to talk to, nothing’s open, can’t visit anyone. Sleep isn’t beckoning, but they’ve got to get out of their dirty clothes, so they shower and start their computer, open their instant messaging program or favourite chat-room and there are a multitude of people who are willing to “talk” to them.
No-one needs to see what they are wearing, no prying eyes can “inspect” the room behind them and scrutinise their belongings, they can choose to participate in multiple conversations without having to worry about having missed something that was said by a quiet voice or having a loud voice overshadowing everything. Having private conversations and public conversations all at once, allowing their eyes and brain to transmit information to their fingers to reply to the chatters they choose to respond to.
In text, no-one needs to see the things a chatter doesn’t want them to see. Disabilities, advantages and disadvantages – can all be ironed out in text. While body language may no longer be available for non-verbal communication, a lot of chatters take that into consideration and give clues into hidden meanings behind their words, or even use more detailed descriptions in the first place. Chatters who wish to be obstructive can cause problems by not using clues to their meanings, but they soon discover that if they wish to find people to “talk” with, they need to give clues.
If a chatter is involved in an important conversation, there is always the ability of being able to save relevant pieces of text. Put that phone number or link to a site somewhere “safe”, recall the details of a previous conversation or save your own copy of that baby picture in the family album.
In chat with multiple people, think of being at a party. Only a couple of conversations at a time can generally be pursued, and if one is a private conversation it generally means no other conversations can be entered into at the same time. With text-based real-time chat, public and private conversations can be undertaken simultaneously, each without disturbing the other. Obviously the speed of typing will dictate the number of conversations that can be entered into at any one time, but it isn’t necessary to only concentrate on one conversation unless that is what is desired.
Is text-based real-time chat a significant part of internet use? I think so, after all, it offers most of the speed of a telephone call; the ability of a letter to be able to show words and pictures; the privacy of not having someone watching your surroundings; the luxury of time to “think out” your replies; the ability to track a number of conversations at once, both private and public; the flexibility of different time-zones, allowing chatters to converse at their convenience; the discretion to be able to multi-task without causing offence to others; and the quietness of keyboard to be able to chat with multiple people without disturbing anyone else in the household.
Reference:
Allen, M., (n.d.) Concept #17. The impact of text-based real-time chat, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
If there is one group of people who have grasped the concept of text-based real-time chat, it’s teenagers. Barker (2006) finds that this isn’t just online, but on their phones as well. Who needs to talk on their phone anymore – just text! Instead of using the phone all night, a large number of teens now prefer to spend their time texting online or on the phone, interacting with their peers, passing information, broadening their networks and playing games all via the written word and their keyboards. Are teenagers losing the power of speech, or just using an alternate method of communication?
Reference:
Barker, O., (2006, 29May). Technology leaves teens speechless. USA Today. Retrieved from http://www.usatoday.com/tech/news/techinnovations/2006-05-29-teen-texting_x.htm?POE=TECISVA
________________________________________
In 1991, a coup d'état attempt was staged on the capitol of the Soviet Union. A group of Communist Party Leaders prevented journalists from reporting events by enforcing a media blackout. Journalists turned to internet-based real-time text chat (IRC) to garner information on the offensive from colleagues and eyewitnesses. The application was also used by journalists to share news during the Gulf War. (De Hoyos, n.d.)
These are two examples where text-based real-time chat has proven to have been significant part of contemporary internet use. Without it, information may never have been fully disseminated about these world-changing situations until it was completely rewritten.
Reference:
De Hoyos, B., (n.d.) The world’s first IMs - Peer-to-Peer Protocol, Talkers and IRCs, IM History – the early IMs, Referenced January20, 2009, from http://im.about.com/od/imbasics/a/imhistory_2.htm
________________________________________
Concept 18. Non-speech communication through text: audience and authors’ responsibilities
“The responsibility for effective chatting lies not merely with the author of a particular comment, but with its audience…if IRC is to be rich and valuable as a form of communication (and it can be), then both those saying things and those reading them must share the tasks of making it so.” Allen (n.d.)
Imagine every emotion and feeling people go through when talking with someone, all the common expressions they use regularly to describe certain things and all the “hidden” non-verbal clues everyone gives out during the course of a simple conversation. Now think about how to convey all this information to someone through words alone.
Imagine receiving a message from someone whose idiosyncrasies of speech are entirely different to yours, and you’re left confused as to how you are meant to interpret the message. They don’t even have to be from another country or culture, you can be left in the dark by simply receiving a message from a friend if it doesn’t have any hint as to whether they are being serious or sarcastic or silly.
In text-based chat, it falls to both the author and the audience to have some way to communicating feelings and non-verbal body language during the course of a conversation. Without any of these clues, conversation can become dry and humourless, simple situations could escalate into arguments or degenerate into confusion if there is no form of body language. And just because you don’t have a body in text-based chat, doesn’t mean you can’t have body language!
Most people are now aware of the simple smiley face :) that means someone is smiling at you, and anyone who regularly sends or receives text messages will have received a number of them. This is a simple form of body language, and is usually understood by both the sender and receiver of a message. Depending on the words it accompanies, it generally means the message is happy, or the sender is sending “good feelings” to the receiver. People are also used to reading about body language in books, but in text-based chat, there usually isn’t the time or the space to write a novel.
A lot of text-based chat rooms not only use the various “web-wide accepted” forms of written body language, but also have other actions that might be common in their rooms. One form is to use asterisks or brackets around actions. This separates the actions from spoken words, and allows another form of body language. If a person enters the chat room and posts a message like {“hi” *walks across the room and sits on the couch*}, it is generally taken that the person is saying hello and imitating the action (at least mentally) of walking across the room and sitting on the couch – usually a fairly relaxed and open action. Whereas if someone types a message and then uses the term *frown* they may be annoyed or confused about something.
Just as you might learn to decipher the tone of a conversation in real life, by watching carefully and asking questions in text-based chat rooms, most people gradually learn the more accepted forms of expression that would normally make up the non-verbal body language they use during a conversation. Once both the author and audience are using very much the same terms, misunderstandings are a lot less likely to occur, and text-based chat becomes a rich and valuable form of communication.
Reference:
Allen, M., (n.d.) Concept #18. Non-speech communication through text: audience and authors’ responsibilities, Curtin University of Technology, WA, Retrieved from http://webct.curtin.edu.au/SCRIPT/305033_b/scripts/serve_home
________________________________________
There are a number of ways to express non-verbal language in text-based chat. It’s common to use a number of different acronyms to show different feelings or expressions. One very common thread throughout most text-based chat is the idea that typing in all capital letters is shouting, and is generally classed as being rude. (TeleComputer Services 2009) Acronyms are also very handy for slow or disabled typists and can be a quick and easy way to type an expression or feeling, or even post an entire sentence. (Disabled-World.com, 2008) Chat rooms often have their own ways to display body language, which quickly becomes clear to newcomers.
TeleComputer Services (2009) Acronyms Online, Retrieved January20, 2009, from http://acronymsonline.com/lists/chat_acronyms.asp
Disabled-World.com (October9, 2008) Text shortcuts for chat rooms messenger programs and SMS texting. Retrieved January20, 2009 from http://www.disabled-world.com/chat/text-shortcuts.shtml
________________________________________
In the early days of college bulletin boards in the US, a problem was noted amongst the participants in being able to decipher the meaning of another person’s message. Was it serious or in jest? If a joke was posted, and the message misunderstood, a lengthy diatribe could follow (Fahlman, n.d.). So in 1982, Scott Fahlman suggested the use of the characters :-) to show when a message was meant to be lighthearted. From this simple start we now have a spin off of multiple text based characters all meant to show various forms of emotions and make reading text more personal.
Reference:
Fahlman, S.E., (n.d.), Smiley Lore :-), Retrieved January21 2009, from http://www.cs.cmu.edu/~sef/sefSmiley.htm
________________________________________
Concept #26. Privacy and Security
“The internet is a profoundly ‘open’ system and advanced Internet users are cautious about either accepting or sending material from and to unknown sources and are careful in releasing information about themselves in any form.” (Allen, n.d.)
Before people ever start to use the internet, one thing they should think about is to be very careful about whom they give their personal details to. Just like in real life, not everyone is friendly and helpful online, and while the people or even the websites that are visited may seem friendly and helpful, there may be a hidden agenda to their assistance.
The agenda could be something as innocuous as gathering information about your computer to allow you to open the website easily the next time you visit, it could be information about your browsing and shopping habits to offer you “targeted advertising”, it could be gathering information to send “spam” (unwanted correspondence) to your email address, or it could be as harsh as someone wanting access to your computer to use it for things like Denial of Service attacks on other computers or someone gathering information for the purpose of stalking you (cyber-stalking) or stealing your identity.
Cyber-stalking and identity theft, while becoming more prevalent, seem to not be as commonplace as gathering information regarding browsing and shopping habits, but all involve a certain degree of invasion of privacy. Just because someone visits a particular website or buys something (either online, or increasingly, in shops that are asking for personal details from their customers), doesn’t mean they wish to have more advertising supposedly specifically aimed at them.
There are a number of ways that someone can keep their “online profile” and details as low as possible and try to protect their privacy. Being aware of what personal details are given to various websites or people you chat with is one way. If a website requests email details for registration or for receiving something like a newsletter, one of the easiest ways to keep most personal details private is to set up a free website like hotmail or yahoo, with limited personal details in it and use that. This often also tends to keep your “main” email site fairly free of spam.
Some sites, particularly those offering free downloads may also be loaded with spyware, malware, adware and various viruses, trojans and worms.
Generally adware is simply a pain. It is software that periodically causes targeted advertisements to show up on a user’s computer (PCMag n.d.). If it is installed on a user’s computer without their knowledge, it is generally classed as spyware, and often collects further information on a users browsing and shopping habits to report to a third party (PCMag n.d ). Malware however is designed to cause major problems in computers (PCMag n.d.), along with viruses, worms, trojans and a number of other “nasties”.
Having a good firewall and virus protection is important too. If the firewall and virus protection are up to date, and people are aware and careful about the information they release on the internet, then most people have no problems with the various “net nasties” that can infect their computers or impinge on their lives.
References:
PCMag.com (n.d.), Adware, Encyclopedia, Retrieved 22January 2009, from
http://www.pcmag.com/encyclopedia_term/0,2542,t=adware&i=37577,00.asp
PCMag.com (n.d.), Malware, Encyclopedia, Retrieved 22January 2009, from http://www.pcmag.com/encyclopedia_term/0%2C2542%2Ct%3Dmalware&i%3D46552%2C00.asp
PCMag.com (n.d.), Spyware, Encyclopedia, Retrieved 22January 2009, from
http://www.pcmag.com/encyclopedia_term/0%2C2542%2Ct%3Dspyware&i%3D51898%2C00.asp
________________________________________
The weakest link in any security system is the human element. Ledford (n.d.) defines social engineering as “the practice of deceiving someone, either in person, over the phone, or using a computer, with the express intent of breaching some level of security either personal or professional.” A lot of people are wary of giving out information online, but will gladly hand it out over the phone or throw out paperwork with names, addresses and banking or billing details. Granger (2001) shows instances where social engineering has resulted in theft and fraud on a large scale, which can also relate on the smaller scale to the individual.
Reference:
Ledford, J., (n.d.), Social Engineering, About.com: Identity Theft, Retrieved January22 2009 from http://idtheft.about.com/od/glossary/g/Social_Engineer.htm
Granger, S., (2001) Social Engineering Fundamentals, Part I: Hacker Tactics, Retrieved January 22 2009 from http://www.securityfocus.com/infocus/1527
________________________________________
Identity theft is one of the fastest growing types of consumer frauds (Federal Deposit Insurance Corporation 2004), and a lot of governments around the world are looking into more sophisticated ways of stopping identity theft. Some of the various methods being considered are biometrics, scanning software, two or three factor user authentication and tokens. These methods are available for general use in one form or another, but are generally considered too expensive for the home user. Most users find that a good firewall and virus protection are sufficient for their home computers, but more visibility needs to be cast on the privacy and security problem of social engineering.
Reference:
Federal Deposit Insurance Corporation (2004), Putting an end to account hi-jacking identity theft, Retrieved January22 2009 from http://www.fdic.gov/consumers/consumer/idtheftstudy/identity_theft.pdf
Sunday, January 18, 2009
I MADE IT!!
Ok, I made it to the ICQ chat again tonight. And found out I'm not the only one struggling with more than 1 subject (I knew I wasn't, just feels that way at times).
I'm not apologising for the previous post. I am having some problems coping - some of the reasons are actually my fault, others are because I don't want to turn my family away. I have to spend too much time away from them all as it is for work (due to be away from home for up to 21wks this yr), so when I'm home if they need me I'll do what I can.
Anyway, tonight may get some more stuff done, but tomorrow is another day and I'll be at home on my own. Hubby will be at work, & so will the rest of the family, so I shouldn't get any more "help me mummy" calls between about 7am & 4pm - plenty of time to get some of those concepts chased up and some of the other stuff completed (but how do I read the text for my other subject without falling asleep???).
I'm not apologising for the previous post. I am having some problems coping - some of the reasons are actually my fault, others are because I don't want to turn my family away. I have to spend too much time away from them all as it is for work (due to be away from home for up to 21wks this yr), so when I'm home if they need me I'll do what I can.
Anyway, tonight may get some more stuff done, but tomorrow is another day and I'll be at home on my own. Hubby will be at work, & so will the rest of the family, so I shouldn't get any more "help me mummy" calls between about 7am & 4pm - plenty of time to get some of those concepts chased up and some of the other stuff completed (but how do I read the text for my other subject without falling asleep???).
RANT
Ok, I'm going to have a rant/vent/whatever you want to call it. I REALLY regret allowing myself to be talked into studying 2 subjects this study period! Yes, by rights, I should have been able to handle it, having 6wks off work, but that was without the fact that I seem to be the only one that most of my family will call on to do things. But then, I suppose, I should have looked a little deeper into those 6wks - the week before Xmas, a write-off trying to get everything sorted for Xmas; we went away for a week & I had no computer access (though I did take some readings from the other subject & TRY to get into them); about a week lost in being admitted to hospital - so that removed 3 of those 6wks. Then we'll add certain members of my family into things!
To those of you who don't have children yet - DON'T!! To those who have young children, be thankful that when you put them to bed & they go off to sleep, they'll usually stay asleep all night, & it's not all that late when they go. To those with teenagers, be thankful in some respects that they've decided that they don't want much to do with mum & dad (oh, how embarrassing!!), and that they know everything. When they become adults and move out of home & realise that you DID know what you were talking about, you suddenly become the expert again (just like when they were little, only more helpless it seems!), and you start getting the phone calls where everything is an emergency and you have to drop everything NOW and help them.
I thought my children were fairly independent. It seems that was a facade they were carefully nurturing until it seemed that mum was "otherwise occupied". My own fault, I suppose, I showed them I could do almost everything I needed to.
Anyway, in the meantime, I haven't been seen on the discussion boards because it's often been quite late at night when I've gotten in there, & I've answered a few posts. Unfortunately, they've been long answers, written off the cuff, & just before I've gone to publish them, I've decided to just check something else - and three times now I've managed to delete the whole post just before I published it. IDIOT!! Then I can't remember exactly what point I was making a comment/answer to, tiredness has suddenly smacked me in the face to the degree of not being able to type without multiple corrections and I've decided to try to do it in the morning, only to not be able to work out which posts I was looking at in the first place.
I am still here! I am still reading posts and getting information etc together. And this week, I will try to remember the ICQ hookup at 7pm AEST tonight (if it's still on). Yes, I know everyone has other bits of life to contend with, I'm not the only one with "problems", but this blog was not to only be about our thoughts and how we coped with various exercises within the course, but our thoughts and how we were coping with the course in general. I'M NOT COPING!
Disclaimer - All the comments written above have been written because I have received yet another "help me mummy" phone call, my house seems to be falling down around my ears, going back to work is looming and it feels like everything is conspiring against me. Study will recommence (unfortunately the other subject needs precedence because I REALLY don't find it as interesting as this one) as soon as I have put the world to rights again! SUPERMUM TO THE RESCUE!
To those of you who don't have children yet - DON'T!! To those who have young children, be thankful that when you put them to bed & they go off to sleep, they'll usually stay asleep all night, & it's not all that late when they go. To those with teenagers, be thankful in some respects that they've decided that they don't want much to do with mum & dad (oh, how embarrassing!!), and that they know everything. When they become adults and move out of home & realise that you DID know what you were talking about, you suddenly become the expert again (just like when they were little, only more helpless it seems!), and you start getting the phone calls where everything is an emergency and you have to drop everything NOW and help them.
I thought my children were fairly independent. It seems that was a facade they were carefully nurturing until it seemed that mum was "otherwise occupied". My own fault, I suppose, I showed them I could do almost everything I needed to.
Anyway, in the meantime, I haven't been seen on the discussion boards because it's often been quite late at night when I've gotten in there, & I've answered a few posts. Unfortunately, they've been long answers, written off the cuff, & just before I've gone to publish them, I've decided to just check something else - and three times now I've managed to delete the whole post just before I published it. IDIOT!! Then I can't remember exactly what point I was making a comment/answer to, tiredness has suddenly smacked me in the face to the degree of not being able to type without multiple corrections and I've decided to try to do it in the morning, only to not be able to work out which posts I was looking at in the first place.
I am still here! I am still reading posts and getting information etc together. And this week, I will try to remember the ICQ hookup at 7pm AEST tonight (if it's still on). Yes, I know everyone has other bits of life to contend with, I'm not the only one with "problems", but this blog was not to only be about our thoughts and how we coped with various exercises within the course, but our thoughts and how we were coping with the course in general. I'M NOT COPING!
Disclaimer - All the comments written above have been written because I have received yet another "help me mummy" phone call, my house seems to be falling down around my ears, going back to work is looming and it feels like everything is conspiring against me. Study will recommence (unfortunately the other subject needs precedence because I REALLY don't find it as interesting as this one) as soon as I have put the world to rights again! SUPERMUM TO THE RESCUE!
Sunday, January 4, 2009
Module 2 - CHAT
OK, it is Sunday 04Jan and we've just had a chat in ICQ. I don't know how many people were there, but it showed me again why I don't particularly like that form of chatting. While I like being able to speak with a number of people at once at times, I really don't like the screen "moving" by itself. I much prefer to have some form of control over the screen - to have it stay there while I type my answer to a person, and then move on when I hit the send button.
Yes, we know....I'm a control freak. I don't like pop-ups suddenly appearing on my screen (which is why I usually have them blocked), I don't like programs suddenly asking my firewall for permission to enter or exit, and when that email was being sent around years ago telling you that microsoft would give you a free can holder for your computer, I never liked that.....(even though I didn't notice it opening my disk drive to start off with because my tower was under my desk), I don't even like unexpected noise coming from my computer so I keep the sound off all the time. And yeah, I really hate it when the techs remote into my computer and take it over while they fix something for me.
I don't use Skype - when my husband was in the US, we tried using it, but it froze both of our machines, so we didn't use it again. I use MSN & ICQ for one-on-one chat, but I keep myself in "offline" or "invisible" mode. This is because my computer is always turned on when I'm at home, but I'm not always in front of it. That way I don't have people looking for me and getting upset when I don't answer immediately. Also, if I'm busy doing something else, I can let the messages come in without feeling like I have to answer people immediately, and once again, because they don't know if I'm there unless I answer, they don't get upset if I'm not answering their every comment immediately. My friends know I do this, and they know that if I'm available and I'm not busy (schoolwork etc) then I'll answer them immediately.
I use email for a form of chatting with my daughter when I'm at work. Neither of us can access any other programs like webmail or IM sites through work, so if we need to talk we email back & forth. We don't need to phone each other then, other people aren't listening in on our conversation and if we are busy when a message comes through or aren't at our desks, we can answer it a little later. While what may have been a 5min conversation may take all day, we answer each other as we can, and by not trying to rush through a conversation we are each more likely to remember something else in particular that we needed to say.
Other than that, I use chatrooms. I've got two I generally go to, though lately I've been too busy to go to either of them. They are both html chat, but in one you can change things like your font and post any pictures, in the other you have to use their pictures unless you are a paying member, and you can't change the font. With both of the chatrooms the only way the screen changes is when you hit the "send" button. That gives you a chance to read the post, answer the way you want to, and then send the post. Then you read through the other posts that came through while you were typing. They also give you the chance of speaking privately to one or more people while also chatting with a group of people.


I've been involved in this sort of chat since 1999, and have met a number of people in real time as well as through the internet. It was through this chat method that I learnt how to download and use first ICQ, then yahoochat and then msn. This is all still in real-time (though some people don't want to know that it's 11pm on Sunday night for you, while it's 7.30am Sunday morning for them), like MSN & ICQ, just in a different format.
Yes, we know....I'm a control freak. I don't like pop-ups suddenly appearing on my screen (which is why I usually have them blocked), I don't like programs suddenly asking my firewall for permission to enter or exit, and when that email was being sent around years ago telling you that microsoft would give you a free can holder for your computer, I never liked that.....(even though I didn't notice it opening my disk drive to start off with because my tower was under my desk), I don't even like unexpected noise coming from my computer so I keep the sound off all the time. And yeah, I really hate it when the techs remote into my computer and take it over while they fix something for me.
I don't use Skype - when my husband was in the US, we tried using it, but it froze both of our machines, so we didn't use it again. I use MSN & ICQ for one-on-one chat, but I keep myself in "offline" or "invisible" mode. This is because my computer is always turned on when I'm at home, but I'm not always in front of it. That way I don't have people looking for me and getting upset when I don't answer immediately. Also, if I'm busy doing something else, I can let the messages come in without feeling like I have to answer people immediately, and once again, because they don't know if I'm there unless I answer, they don't get upset if I'm not answering their every comment immediately. My friends know I do this, and they know that if I'm available and I'm not busy (schoolwork etc) then I'll answer them immediately.
I use email for a form of chatting with my daughter when I'm at work. Neither of us can access any other programs like webmail or IM sites through work, so if we need to talk we email back & forth. We don't need to phone each other then, other people aren't listening in on our conversation and if we are busy when a message comes through or aren't at our desks, we can answer it a little later. While what may have been a 5min conversation may take all day, we answer each other as we can, and by not trying to rush through a conversation we are each more likely to remember something else in particular that we needed to say.
Other than that, I use chatrooms. I've got two I generally go to, though lately I've been too busy to go to either of them. They are both html chat, but in one you can change things like your font and post any pictures, in the other you have to use their pictures unless you are a paying member, and you can't change the font. With both of the chatrooms the only way the screen changes is when you hit the "send" button. That gives you a chance to read the post, answer the way you want to, and then send the post. Then you read through the other posts that came through while you were typing. They also give you the chance of speaking privately to one or more people while also chatting with a group of people.


I've been involved in this sort of chat since 1999, and have met a number of people in real time as well as through the internet. It was through this chat method that I learnt how to download and use first ICQ, then yahoochat and then msn. This is all still in real-time (though some people don't want to know that it's 11pm on Sunday night for you, while it's 7.30am Sunday morning for them), like MSN & ICQ, just in a different format.
Subscribe to:
Posts (Atom)