Tuesday, June 24, 2008

Time Management Notes/Tips

Time management is a very important when you are studying and working out a time management plan is an essential exercise to be successful at what you are trying to achieve.

Good time management is based on two concepts:

  1. Allocating time where it is needed most – setting priorities including eating and sleeping; and
  2. Using that time productively – having tangible outcomes for your time.

As a part-time student who works fulltime, it is probably best to first find out what time and where the time is available, and the best way to do this is to fill out a weekly planner like the one below. It is important to mark in your work hours and other social commitments but not forgetting family time.

From this position you can see where you may able to slot in some study time.

Once you have your time slots worked out, you need to look for time patterns that suit you – best times during the day for doing the harder/easier tasks, how long is your concentration span during these times. From here you need to be more specific (set goals) about what you want to achieve in those time slots.

Your goals should be revised regularly to ensure that you are staying on track. Keep a diary/planner to write your goals in and make sure your goals are:

  • Specific (know exactly what you are going to tackle in that time slot);
  • Manageable/realistic (eg Telnet task – ½ hour);
  • Measurable (eg read first part of Module Two, answer first two questions);
  • Integrated – clearly linked to the bigger plan (completing the course).

Personally, I get up an hour or so earlier weekdays and Sundays (because it is the quietest time in our house) to do some of the readings (I have it printed out so I can have it with a coffee and make notes on the page) and I schedule time during the evenings after 9.00pm to make entries on blogs and the discussion board and to work on the tasks. I get half an hour for lunch, so I use this time to quickly scan over the discussion board or blogs and make notes on who I want to reply to. As you can see from the table below, I have left Friday, Saturday and Sunday nights as flexible time, this is time that I can use if I feel that I need extra time or if something comes up during the week and I can’t do the study in the allocated time – for example State of Origin night, there is no way that I get any study done that night so I swap the time allocated on Wednesday night for a couple of hours on Saturday or Sunday.


For further information you could check out the following websites:
Open Universities Australia - once you have logged on you have access to the Quick Skills Modules, which has units on Project Managing, plus links to Time Management.
James Cook University - this site has online tutorials which are interactive and very informative.
The Unabridged Student Counseling Virtual Pamphlet Collection - - a collection of websites mainly form USA universities) that cover a lot of topics for uni students but most importantly lots of websites on stress, study skills, test taking and time management.

Thursday, June 19, 2008

Module Two - Email Tasks

What information about a user’s email, origin of a message and the path it took, can you glean from an email message?


Like a URL (or web address) an email address is made up of a number of different segments (username and domain) which give an indication of where the email came from.

From the above information, we could work out the email is from/to a person called Jane Smith who has an account with Hotmail which is a commercial entity. By using my email address at Curtin Universitygaynor.osullivan@student.curtin.edu.au the receiver can see that I am sending an email as a student of Curtin which is an educational institution in Australia. If my email address was gaynor@johnflynn.org, the receiver would be able to see the email is from me and that I work for a non-profit organization called John Flynn.

In what cases would you find it useful to use “cc”, “bcc” and “reply all” functions of email?

“cc” – carbon copy or circulation (notification) copy. Normally this line has the addresses of the people who will receive a copy of the original email for information purposes only, but who is not the recipient of the email.

I would use this function if am concerned about the behaviour or academic performance of a particular student. I would send an email to the student expressing my concerns, but I would also copy our Principal and the Senior Resident of that student’s floor into the email for their information and so that they are aware that we may have a potential problem.

“bcc” – blind copy. Addresses placed in the “bcc” line are undisclosed (blind) to the recipient of the email. Discussions on the “bcc” function so far have revolved around the negative aspects of sending one person’s email to a third person without their knowledge. I agree that this can be seen as being sneaky.

However, I personally use the bcc function daily and usually more than once, but not for the reasons above. I work at a university residential college which accommodates more than 200 students and the best way to get information to the students and staff is via email. We have set-up an email alias (or distribution list) with 200+ students and staff email addresses. If I type the email alias in the “to” or “cc” line and send an email, each recipient receives an email with every email address (approx 225) at the top. This creates two issues, firstly privacy, not every person wants every other person on college knowing their email address and secondly, there is nothing more annoying than printing out (or scrolling down) an email and finding that three quarters of a page is wasted on email addresses. By using the “bcc” line neither of these issues are a problem, because all addresses are blind.

“Reply All” – When an email is sent to a number of people regarding a meeting or a discussion, instead of replying to each person individually, the recipient can select “reply all” and send their response to all of the other recipients and the original sender.

Admittedly this is a function that I have not used before, but would stop short of saying I would never use it. I can see the benefit of being able to reply to a number of people in one email about a meeting time rather than emailing each individual.

In what ways can you ensure that an attachment you send will be easily opened by the receiver?

It would appear that people who are able to access the Internet and email on their computers these days have programs (or at least compatible programs) that would allow for attachments to be opened. However there are a few options of ensuring that the receiver is able to open email attachments.

Communication: Contacting the recipient (by email or phone) prior to sending an attachment to verify that they have the programs necessary to open the attachments.

File format: Send documents as plain text (ASCII) or a rich text file (RTF) that can be read by many applications. Although you may lose special formatting (bold or italic text, underlining, etc.) by using text files, you can be sure your attachment can be read.

Cut and Paste: If all else fails copy the information from the document to be attached and paste it into the email. However as the study notes say “This approach is an under-exploitation of the capabilities of the internet…” and should only be used as a last resort.

What sort of filters or rules do you have setup and for what purpose?

Filters – “instructions that you give your email program which it then follows when it downloads a new message” (webnotes).

I have very few filters setup on my email, as most of the emails that I receive need to be acted on or replied to almost immediately. However I do have a few email addresses that are sent directly to a specific folder for viewing at another time, for example the Townsville Court Lists are emailed daily and are sent out of the Inbox to a specific folder for viewing later.

The only other time I use a filter is when I am on leave, at which time I setup an auto-reply specifying details of who to contact while I am away and when I will be returning.

How have you organized the folder structure of your email and why?

Setting up a folder structure helps to keep your inbox uncluttered and your emails organized. Corresponding by email is really no different than corresponding by post - letters, queries etc still need to be filed away for future reference and if you put them in a folder that is relevant to their content you shouldn’t have problems relocating them. Like most mail/paperwork that is not filed, it can be frustrating trying to locate what you are after.

The folder structure of my work computer is setup into the different departments that I am involved with, and as I deal with each query or request I “file” the email for future reference in the appropriate folder. Some of the folders also have sub-folders, for example the “Functions” folder has sub-folders for different major student functions (eg Valedictory Dinner, Semi-Formal, Trivia Night) held throughout the year which take a lot of organization.

At present the Curtin email folder is not set-up into any structure, but I will probably end up organizing it into “administration” and subject codes (eg. NET11).

Friday, June 13, 2008

Module One Tasks:

Telnet:

I was unsure about what to expect of using Telnet and was a little confused about the significance of this program when I did use it.

I completed the task as requested (many thanks to Sarah Boody for her helpful advice in the discussion board) and seemed to get the same result as everyone else. Using Telnet took me back a number of years when you would go down to the local library and look for books using their “new” computerized indexing systems; the black screen with white writing and a blinking cursor waiting for something to look for.

In all honesty, I found Telnet to be antiquated in that 1) I couldn’t use a mouse, Telnet is a keyboard application and 2) you had to know the specific address of the place that you wanted to log into (for example library.deakin.edu.au). I experimented by guessing a couple of addresses of libraries at other universities and found that I could not get onto them, whereas if I went into Google and “searched” for the same universities, I could access their libraries (as well as Deakins) through their home pages.

The graphical user interfaces (GUI) of search engines is definitely much easier to use.

Blinkenlights a blinkenmiracle:

Towel.blinkenlights.nl was a bit of fun and I can’t imagine the amount of time and effort that went into designing the program, but I really think that unless those guys actually did the program as some sort of assignment, they had way too much time on their hands. As Owen McMahon so aptly says on his blog “this guy needed a girlfriend”.

File Transfer Protocol (FTP):

Again thank you to the students who posted instructions and web addresses to help me with this task. I downloaded Filezilla and used www.montgomerycollege.edu/webinfo/filezilla.html to complete this task.

The missing word was “CAPITALIZATION”.

Again I wondered at the significance of this program and the task. The task states that “The main use for FTP these days is when people are maintaining and changing websites, It is important to a least be familiar with this Internet application. For the moment, this task test only your ability to download using ftp.” Hmmm, I have completed the task and again achieved the same results as other students, but I am not sure that I really understood what I did. I am hoping that at some stage the “ah-haa – I seee” will happen.

Internet Tools:

I found this to be an interesting task, if only to see how many hops it was taking to get from one place to another. The IP address of curtin.edu.au was 134.7.179.53.

I tried this experiment a number of times over a couple of days, at different times during the day using both Http://centrlops.net.co/ and http://network-tools.com/ and always seemed to get similar results. It took approximately 20 hops, however it would appear that Centralops.net was the quicker traceroute. Centralops.net averaged 245, whereas network-tools averaged 265.

At the same time that I was trying traceroute to curtin.edu.au, I would try to ping with both Centralops.net and net-work tools.com. Again it would appear the Centralops.net was the quicker option.

Reflecting on this task, I try to re-assure myself that we are learning this for future reference, and that although I am not 100% sure of why I need to know this information at present I believe that in time everything will fall into place.

Thursday, June 12, 2008

Gaynor’s Top Five Tips for New Bloggers

Choose an easy-to-use blog creation service

The thought of setting up a webpage can be overwhelming, so find a blog creation site like http://www.Blogger.com that makes setting up your first webpage quite painless

Be interested and enthusiastic about your topic

Generally, if you are passionate about your topic, your enthusiasm will “suck” other people into your “conversation”. This is a good thing as people will want to return to see what you have to say next.

Update and add frequently

People get hooked on other people’s writing. Most people have a favourite author and get very excited about the release of their next novel. Bloggers are the same; they get hooked on a particular bloggers writing style and topics, and love checking the site regularly to see what is new. If nothing is added for a while they lose interest and stop checking.

Benefit from praise and constructive criticism

Like any writing for an audience, you need to read the comments left by other bloggers: accept praise when it is given and, take constructive criticism on board as a positive means of improving your writing and your blogs.

Possibly the most important tip though is:

Do it because you want to

Blogging is suppose to be fun and interesting, so do it because you want to!!

Although NET11 requires us to do a blog as part of our assessment, we should grab this opportunity with both hands, be positive about our abilities, and use this medium to learn from our peers and to learn about our ability to communicate via the web.