1. BOROUGH OF WEST CHESTER
Information Technology Training
Session 8 – February 21, 2013
• THE LONG HISTORY OF EMAIL
• EMAIL ETIQUETTE
• EMAIL – ARCHIVING, DISCOVERY &
OWNERSHIP
• SMARTPHONES SECURITY
• F I L E & F O L D E R O R G A N I Z AT I O N
• W I N D O W S U P D AT E
• GETTING TO KNOW PDF DOCUMENTS
• W H AT S U P W I T H J AVA A N Y W AY ?
• W H AT ’ S N E W I N T E C H ?
• QUESTIONS AND ANSWERS
William Mann, Chief Information Officer
2. EMAIL has become a very important part of the way we all communicate, both
at work and home. I think this cartoon sums it up accurately… with humor.
For those under 20, it is probably very hard to remember a time
when email was not there for communication.
3. What came first, email or the internet?
You may be surprised to learn that EMAIL is much older then the internet. In
fact Ray Tomlinson is credited for inventing email way back in 1972. That’s
right, 1972. That makes email 41 years old.
Tomlinson worked for Bolt Beranek and Newman as a contractor. He picked
the @ symbol from the computer keyboard to denote sending messages from
one computer to another.
By 1974 there were hundreds of military users of email.
Meanwhile it took until 1992 when the “world wide web” grew to 26 sites. Yes
26 sites. 1993 brought the internet that we know of today although it was much
smaller, slower and no graphics (GUI) to speak of. Between 1994 and 2000
the internet grew by leaps and bounds. Search engines like Google made their
first appearance in the mid 1990’s.
The internet continues to grow and in fact the original internet protocol (IPv4)
is rapidly running out of space and new IP addresses are now being assigned
to a new protocol (IPv6). We will lean more about this during our next training
class.
4. But why, in 1974 did Ray Tomlison take the time to invent
Email?
I love this. Tomlinson was inspired to invent EMAIL
because he was tired of colleagues who did not answer their
phone!
5. EMAIL ETIQUETTE
Here are some detailed suggestions for professional email
etiquette.
• Be informal, not sloppy. Your colleagues may use commonly accepted
abbreviations in e-mail, but when communicating with external
contacts, everyone should follow standard writing protocol. Your e-mail
message reflects you and the borough. Traditional spelling, grammar, and
punctuation rules should be applied.
• Keep messages brief and to the point.
• Use sentence case. USING ALL CAPITAL LETTERS LOOKS AS IF YOU'RE
SHOUTING. Using all lowercase letters looks lazy.
6. EMAIL ETIQUETTE
• Use the blind copy and courtesy copy appropriately. Don't use BCC to keep
others from seeing who you copied; it shows confidence when you directly CC
anyone receiving a copy. Do use BCC, however, when sending to a large
distribution list, so recipients won't have to see a huge list of names. Copy
only people who are directly involved.
• Don't use e-mail as an excuse to avoid personal contact. Don't forget the
value of face-to-face or even voice-to-voice communication. Don't use e-mail
to avoid an uncomfortable situation.
7. EMAIL ETIQUETTE
• Remember that e-mail isn't private. E-mail is considered borough property
and can be retrieved, examined, and used in a court of law. Also remember
that e-mail can be forwarded, so unintended audiences may see what you've
written. You might also inadvertently send something to the wrong party, so
always keep the content professional to avoid embarrassment.
• Be sparing with group e-mail. Send group e-mail only when it's useful to
every recipient. Use the "reply all" button only when compiling results
requiring collective input and only if you have something to add.
8. EMAIL ETIQUETTE
• Use the subject field to indicate content and purpose. Don't just say, "Hi!" or "From
Bill."
• Don't send chain letters, virus warnings, or junk mail. Always check a reputable
antivirus website or your CIO before sending out an alarm. If a constant stream of
jokes from a friend annoys you, be honest and ask to be removed from the list.
• Direct personal e-mail to your home e-mail account.
• Remember that your tone can't be heard in e-mail. Have you ever been
misunderstood in an email message?
9. EMAIL ETIQUETTE
• Use a signature that includes contact information. To ensure that people know
who you are, include a signature that has your contact information, including
your mailing address and phone numbers.
• Summarize long discussions. Scrolling through pages of replies to understand
a discussion is annoying. Instead of continuing to forward a message string,
take a minute to summarize it for your reader. You could even highlight or
quote the relevant passage, then include your response.
10. EMAIL ETIQUETTE – MY VERY OWN BASIC RULES
Ask yourself these 2 questions before sending an email.
1. Would you actually say what is contained in your
email “face to face” with the recipient?
2. Would you be embarrassed if a third party read
your email?
If you answer “no” to #1 or “yes” to #2, re-evaluate the email message.
Never send email when you
are feeling negative or angry
emotions!
Once you hit send – there is
no going back.
11. EMAIL – ARCHIVING, DISCOVERY & OWNERSHIP
It is important for all employees to be aware of these rules and regulations
governing email.
1. The Borough of West Chester owns all email using the west-chester.com
domain.
2. All Borough of West Chester email is archived by Microsoft and stored at
several locations offsite.
3. All Borough of West Chester email is discoverable. This means that all email
that is sent and received is discoverable and may be accessed by
management or third parties requesting email as part of an investigation or
litigation.
4. If you use borough owned equipment to send and receive personal email this
may be discoverable as well.
IT Memo - 2012-16 (Corporate Email
Compliance)
IT Memo - 2012-18 (File Ownership)
12. SMARTPHONE SECURITY
Smartphones today are really small powerful computers
that happen to able to make phone calls. Smartphones
can access documents and sensitive files.
These facts should never be forgotten.
One of the best ways to protect yourself (and your data)
from falling into the wrong hands is to apply a PIN # to
your phone. All smartphones come with this ability.
Sadly many of us do not take advantage of this simply
because it takes “too much time” to enter the PIN #.
You can usually enable your PIN # in the settings area
of your phone and even set the “time out” policy.
Believe me. If you ever lose your phone this security
setting will help you sleep!
You can usually set the lock
screen time frame from immediate
to about 15 minutes.
13. GETTING YOUR FILES & FOLDERS ORGANIZED
There are several ways in which you can get your digital life organized. One
of the best ways to do this is to organize your documents into folders, just
like you do with physical documents.
If you are starting from scratch…..
First take a look at your files and try to write down (on paper) some groups
in which you would like to separate the files.
Once this is done, simply create folders for each of these groups.
Then, drag & drop the files into the new folders you created.
Now start thinking about what you are going to do with all the time you are
going to save because you will be able to find your documents so much
faster!
You can also organize your email
in the very same manner as your
computer files.
14. GET TO KNOW WINDOWS UPDATE
Security is really important these days. This concern should not only be at
work, but at home as well. In addition to having an updated anti-virus
solution you need to make sure your computer’s operating system and it’s
applications are “up to date” as well. Microsoft updates their software
regularly in order to deal with security threats & performance enhancements.
The easiest way to check your computer is to:
1. Open Microsoft Internet Explorer.
2. Open Tools and select
3. Windows Update. (From here you can check for & install updates).
I recommend doing this at least once a month!
You can also check for Windows
updates from your control panel.
You can also do directly to
www.update.microsoft.com/microsoftupdate
15. GETTING TO KNOW PDF DOCUMENTS
Everyone has heard of and has used PDF documents. But do you know what PDF
documents are and when they should be used?
PDF is short for “Portable Document Format”. Adobe Systems is the creator of
the PDF format. Adobe made the PDF format available free of charge in 1993.
Adobe continued to control the PDF format as a proprietary format until 2008 when
it was released as an open standard.
You can create PDF documents directly from Microsoft Word, Excel and
PowerPoint, as well as many other applications. You can do this by simply selecting
“Save As” and choosing “PDF” from the “Save as Type” option.
PDF documents cannot be easily modified or changed. It’s because of this that I
recommend sending PDF documents as opposed to their original format
(Word, Excel etc). Especially in cases where you want to maintain an unchanged
document.
Another great reason to send documents in the PDF format
is that anyone can download the free Adobe Acrobat
Reader,
preventing compatibility issues .
16. WHAT’S UP WITH JAVA ANYWAY?
I am sure that recently many of you have heard about the JAVA security scares.
In fact I have written about this ongoing problem more then once on our
technology blog.
First things First. What is JAVA anyway?
Java has become a very popular programming language for computer
programmers. Programmers like java because it is designed to require as few
implantation dependencies as possible. The less dependencies required, the
happier the computer programmer is.
Java is also very old, at least in computer years. Java was originally developed
by Sun MicroSystems in 1991 and released to the public in 1995.
Fast forward to today where we find Oracle Corporation the current owner.
Therefore you will often hear Oracle mentioned in the news when problems with
Java are reported.
Many stand alone applications rely on Java, not
just websites. The recent security concerns
revolve around how Java is running in the
internet browser.
17. WHAT’S UP WITH JAVA ANYWAY?
So What’s The Big Deal?
The security issues with Java have been due to flaws in many recent versions.
The application has become one of the most unsecure applications in use today.
There have been 11 security patches issued during the past 18 months.
These security issues can allow hackers and other computer creeps to access
your computer and any valuable data in it. Or these security flaws can be used to
turn your computer into a “spamming server”.
Sadly solving the problem is not as simple as just deleting Java. Many popular
websites as well as many stand alone applications that may be installed on your
computer rely on Java.
So what to do…..
Many applications rely on Java, not just
websites.
The recent security concerns revolve around
how Java is running in your internet browser.
18. WHAT’S UP WITH JAVA ANYWAY?
There a 3 ways to tackle this.
1. Hope for the best and keep Java updated whenever prompted. The problem
here is that updates are made available after a security flaw has been found. This
leaves you vulnerable until the security patch has been, written, made
available, downloaded and applied. That’s a bit risky if you ask me.
2. Remove Java altogether. The problem here is that many reputable web pages
rely on Java, as well as many computer applications.
The #3 option is my recommended solution so it get’s an entire slide all to itself!
Many applications rely on Java, not just
websites.
The recent security concerns revolve around
how Java is running in your internet browser.
19. WHAT’S UP WITH JAVA ANYWAY?
3. Disable Java from running in your internet browser (only). Remember that
Java’s security flaws [when they appear] involve how it is interacting with the internet
browser. Stand alone programs running Java are unaffected by the recent security
flaws.
This can be easily done from the Control Panel where you can open the Java
application directly.
Unchecking this box will prevent Java
from running in your internet browser
while leaving it active for any stand alone
application installed on the computer.
20. WHAT’S NEW IN TECH?
There is a lot to be excited about in 2013, especially if you are a tech enthusiast. Here are some of
my predictions for the year:
1. Move over IPAD here comes the Microsoft Surface Pro.
2. Touch Screens. With Windows 8 our new computer screens will become input tools just as
important as our mouse and keyboard.
3. The differences between tablets and smartphones will start to get a little fuzzy starting in 2013.
As smartphones continue to grow in size and some tablets shrink (IPAD Mini) it will eventually
become harder to know which is which.
4. Windows 8 Phones will continue to improve and by the end of 2013 these will become a real
alternative for the professional on the move. With Microsoft Office, SharePoint, Lync and
SkyDrive built in it will be hard for Microsoft to mess this one up.
5. Cloud Services will continue to find success as consumers, businesses and governments
continue moving to the sky.
21. QUESTIONS & ANSWERS
This is your big chance to ask any tech questions. Don’t be shy.
Be sure to visit the technology
blog at wctech.blogspot.com.
Did you know you can register
online so that new tech articles are
sent to you right away?