What is your main interest in the Internet?

Saturday, December 7, 2013

Our Personal Soundcloud



                So I’ve tapped into audio platform known as Soundcloud. And admittedly it still seems a bit odd to me.  Perhaps I need to identify some sort of categorical arrangement.  It seems somewhat random in a definitive search. But I have immediately recognized the platforms usefulness.
                Clips from the Soundcloud platform could be used within a site as references. They seem to bring an intimacy or personal point of view to the subject matter.  They can illustrate or emphasis through audio tracks, to give the reader a clearer sense of your intention.  It can also be utilized highlight collaboration efforts.

                Overall, I find it to be a small, but advantageous tool.

Friday, November 29, 2013

Short Ends of Social Networking

 

             The frenzy of Social Networking is all about us. Through media websites like Facebook, Google +, and Twitter, people are connecting both personally and professionally. Armed with an interactive arsenal of tools like e-mail, blogs, and message boards, individuals are reaching out to convey their interests and concerns. The technology is being professional utilized by businesses to create career contacts, to educate, and to conduct commerce. Social media increasingly become more subjective.
                Even in connection with businesses, blogging has emerged as a staple. In fact, today a business is neglecting their potential reach if they do “...not have a blog (or “learning center”) that is actively updated on a regular basis.”(Beachum) Whether its conventional blogging or Microblogging, the broadcasting of up-to-date activities can help to keep interest in your ideas, and the incorporation of hashtags will indicate a trending topic.
                Other services, such as Short Message Service (SMS) and Multimedia Messaging Service (MMS) enable messaging by way of cell phones. Though this facilitates a mere 160 characters on average, it also allows the transfer of audio and video files via text messaging.
                The ability to Chat is facilitated through a web interface or special client. Within a chat room, people are able to converse in real time, on usually a particular designated topic. However, there are chat sites more tailored toward conventional discussions, such as the ever popular Skype or web-based chats that allow participants to explore a variety of ongoing discussion threads. As always though, caution must be taken to insure the security of personal information over such sites. Not all users of social media are as friendly as the sites they may prey upon.

Beachum, Nicole. “Blogging is More Important Today than Ever Before.” Social Media Today.  6 April, 2013. Web. 26 Nov. 2013. http://socialmediatoday.com/nicolebeachum/1338806/blogging-more-important-today-ever
Mccabe, Laurie. “What is Social Networking, and Why Should You Care?” Small Business Computing. Quinstreet Enterprising.  7 April, 2009. Web. 26 Nov. 2013. http://www.smallbusinesscomputing.com/biztools/article.php/3813971/What-is-Social-Networking-and-Why-Should-You-Care.htm
Shelly, Gary B., and Jennifer T. Campbell, Discovering the Internet: Complete, Fourth Edition.  Boston: Cengage Learning, 2012. Print.

Thursday, November 28, 2013

Efficacy of E-Mail

             When considering the statistic that “more than 94%of Internet-connected American adults use e-mail,” it is safe to assume that most people are fluent with e-mail transactions. Perhaps it’s because of this fact that marketers intend to increase their email advertising budgets over the next year. The immediate advantages of e-mail, including that of speed, affordability, and accessibility are obvious and beneficial to both individuals and businesses. But the actual components of the system may not be so familiar.
www.business2community.com
                Beginning with an e-mail client, such as Microsoft Outlook, an account is set up to support the creation and transference of various e-mail communications. Once synced to a particular e-mail address, the messages are transferred via TCP/IP suites and packet switching. A DNS server determines the path of the messages and directs them through several alternate routers until arriving at a designated mail server.
                Depending upon the e-mail client, messages may be handled in different ways. Through a POP server, all messages are downloaded and stored onto the customer’s computer. Though all mail is managed by the server, all messages must be managed from the customer’s computer. An IMAP mail server, however, stores and maintains all messages on the server, allowing the customer more flexibility in their e-mail management. IMAP also allows synchronizing accessibility from differing computers.
       An e-mail could be as simple as plain text message addressed to a single recipient, or an elaborate formal communication to several addressees. It could include a lengthy message, graphics, attached files, and links to pertinent web pages. A customer can receive, compose, and send messages instantly anywhere at any time. But always keep in mind that e-mails are also very impersonal and, because they lack tone or expression, can be misconstrued.  


Lorette, Kristie. “The Use of Email in Business Communication.” CHRON Small Business. Demand Media, 2013. 26 Nov. 2013. http://smallbusiness.chron.com/use-email-business-communication-118.html
Shelly, Gary B., and Jennifer T. Campbell, Discovering the Internet: Complete, Fourth Edition.  Boston: Cengage Learning, 2012. Print.
Smith, Lauren. “Email Preferred Communication Channel; Commands More Clicks & ROI.” Litmus. 20 Febuary, 2013. 26 Nov. 2013. https://litmus.com/blog/email-preferred-more-clicks-conversions-roi

Tuesday, November 19, 2013

The Remedy of Google Docs

           
www.sparticle.com
   My initial reaction to Google Docs was one of pessimism. I am an avid fan of Microsoft Word, and there was no way something else could produce at such a universal level. But I soon realized that it is in fact a whole new level of document crafting.  The program excels in both capabilities and usability.
                After familiarizing myself with a few Google Docs forms, I recognized several potential applications for it as a writer. Beyond the fundamental use of word document creation, the spreadsheet and presentations formats of Google Docs will enable me to address the business aspects of professional writing.  I can now easily articulate myself through both literary and visual expression within the same document. It serves as almost a self-publishing program.


                Whether my future pursuits take me into public relations, marketing, or any media field, I can create rich supportive documentations to convey my creative ideas. That fact that it is located in one place helps to insure originality and authorship. Yet I am still able to allow my writing to be edited by selected individuals. 

Thursday, November 14, 2013

Privacy vs Professionalism

nsslabs.com
               Over the last month, I've been linked with others through the highly praised social connection of LinkedIN. The initial establishing of an account and discovering compatible contacts was relatively easy. I even received several requests from other professionals within the writing arena.

                My opinion of this endeavor thus far is still divided. For the reason that I look at it as yet another collection of my personal life left at the curb for all to rummage through. I’m beginning to believe there is no privacy left within our everyday lives. Plus, it seems be another facet to constantly be checking in on.
                Yet on the supportive side, we have the professional aspects of it. After all, I’m not simply connected to professionals; I am connected to authorities within my area of interest. Much like Twitter, I have daily interaction with literary agents, publishing firms, or simply other writers. And those are things I could definitely utilize...

                So I think I will need to see which way the scales tip as I continue to pursue my career as a writer.
www.matthewferrara.com

Wednesday, October 30, 2013

Being Mobile in Business

www.sodahead.com
               Gone are the days of being shackled to desktop computers, as businesses turn to mobile devices in an effort to be more productive and efficient. Any basic search of Yahoo will produce countless articles and blogs pertaining to the future of mobile technology. But in looking deeper into first hand authoritative sites, we find the essential need for untethered commerce has gone to lofty extents.
www.3seventy.com
                Private devices within the workplace were once highly frowned upon. But now businesses want their employees to be “connected.”  They want to broaden their products and ideas far beyond the company structure.  Mobile devices enable this by keeping task lists for employee, scheduling projects and updating statuses. Accessibility to company information while on the job site has helped to reduce travel and energy costs. Apps give the ability to track expenses, customer relations through social networking, or communication with clients. Additionally, there is the benefit of mass storage within these devices; “Up to 4 gigabytes (GB) of data (equating to approximately 80,000 boxes of paper) can be stored in a device as small as a pen.”(Milligan)
                Yet, every improvement has its drawbacks. Foremost, the substantial cost to large companies in providing their employees with current technology in an ever advancing age; yet another reason why many companies encourage the private devices. Having differing Android and iPhone operating systems can produce great problems for IT managers. There are multiple security and management issues when utilized for a business, from viruses to the theft of company information.  

                A possible option for companies is the development of Cloud Computing. 



Marsh, Jaymes. “How do Businesses Envisage Managing their Mobile Devices?”. Mobile Device Manager. 24 Feb. 2012. http://www.mobiledevicemanager.com/mobile-device-management/managing-mobile-devices/

Milligan, Patricia Mayer Ph.D and Donna Hutcheson.” Business Risks and Security Assessment for Mobile Devices.” Isaca’ Elearning Campus. 2008. Volume 1. http://www.isaca.org/Journal/Past-Issues/2008/Volume-1/Pages/Business-Risks-and-Security-Assessment-for-Mobile-Devices1.aspx


“Mobile Technology for Increased Productivity & Profitability.” Strategic Growth Concepts. 2013. http://www.strategicgrowthconcepts.com/growth/increase-productivity--profitability.html

Monday, October 28, 2013

Carbon Digital Footprint

I have now obtained a LinkedIn account and increased the size of my digital footprint exponentially.  Being quite conservative socially, it all gives me this sensation of standing at the edge of a great chasm, in about 50 mph winds. I realize that it a progressive step in life, even as it goes against most of my reasoning.
                Right out of the gate I can see the benefits of having such a connection; professionalism. It will allow me to connect and engage with specialized contacts that will inevitably further my professional career. Through it I can keep current with other writers and publishers, be alerted to prospective job opportunities, and create a somewhat social resume for others to view.
                My concern, aside from immediate consumption of even more of my limited time, is the incursion upon my privacy. Unlike many, I do not like to openly share. My closest friends do not ever know what I will get them for Christmas or when I might stop in. I want my words, not my everyday life to be known. I like to be enigmatic, which to me is intriguing. I don’t need to know people that well; and well, I probably wouldn’t want to anyway.

                Perhaps I am being too vigilant. All things considered, we live in a world where all is accessible and little is wondrous any more. Unwittingly we follow, to be like all others, to be the carbon copy, to leave our carbon digital  footprint.  
kurtishewson.wordpress.com

Friday, October 25, 2013

Our Train of Thinking

             
http://www.internetworldstats.com
 We as Americans aren't the world’s largest benefactor of the internet; standing at a mere 22% last year. Yet the majority of us still log on daily. Nine out of every ten Americans are searching for something, even if it’s nothing more than to explore a word. It can begin with entering a query search in address or search bar. Your default search engine will then find possible results for you.
                A way to help expand upon your search resources is to integrate additional search engines.  This can be done by adding supplementary search name within the drop-down menu of your address bar. In addition to giving you more search options, it can be customized to recommend certain sites based upon your specific preferences.


                Not only are alternative search engines expedient, they are essential. In today congested media highway, it’s difficult to get where you want to go. Google is great for the proficiency of common everyday use. But if you are looking for detailed information on specialized subjects, you don’t want suggestions to blog posts, you want definitive facts. To achieve this, you need a specialized search engine.
                Services such as LexisNexis or Dialog specialize in the attaining of scholarly information. They assemble articles such as business, law, and medical from centralized databases to provide a comprehensive source for researchers. A service like Wolfram Alpha procures, analyzes, and provides statistic information to the user, that no average search engine could possible deliver.


 “Usage and Population Statistics.” Internet World Stats. Miniwatts Marketing Group. 10 Sept. 2013.

Purdy, Kevin. “When Not to Google: Searches You're Better Off Making Elsewhere.” Lifehacker.  4 May 2011. Web. 22 Oct. 2013. http://lifehacker.com/5788772/when-not-to-google-searches-youre-better-off-making-elsewhere


Shelly, Gary B., and Jennifer T. Campbell, Discovering the Internet: Complete, Fourth Edition.  Boston: Cengage Learning, 2012. Print.

Thursday, October 24, 2013

Searching for the Web Answers

               
www.pingwest.com

Searching for a specific topic on the web can be achieved in several ways; both directly and circuitously. If the exact web page (URL) is known, it can simply be entered into the browser’s address box. If that isn't known, a search query can be performed by entering key specific words into the brower’s search text box.
                The more explicit words utilized, or the use of quotations to join words, the closer the web results will be. A targeted search with distinct key words will provide more focused results, whereas an open-ended search with general wording will provide a broad scope of web results. The best thing to do is to definitively target the desired information.
www.virtualsalt.com
                Beyond the initial appearance, there are things to consider when choosing your web sources to insure finding the best possible information. According to Dr. Robert Harris, retired professor of the University of California, the first step in obtaining reliable information is to determine "What source or what kind of source would be the most credible for providing information in this particular case?"(Harris) The credibility of a website must be determined before accepting its information. Can its material be authorized? What is the quality of its content, and does it seem to cover the material completely, and impartially?
                The utilization of search tools such as Directories and Search Engines can help to hone in on the precise subject you wish to view. Directories gather relevant information and organize it in an assentative fashion. In this method, there is a visible trail to follow as you make your way through varies subcategories.
                A search engine works in relatively the same way. Engines like Google search the internet and index key words to web pages. They amass this index so that as similar key words are sought by users, the search engine can refer the web pages they were found upon.
www.link2city.com


                For the purpose of searching several search engines at once, a Megasearch Engine can be used. At present,Search Engine Watch deems the most popular to be Dogpile.  These specialized search engines examine several engines, directories and specialty search sites to provide an accumulated list for the user based upon the requested information.  However, many of these metasearch engines are heavily influenced with sponsorship, and thus will not always recommend the best site first.

Harris, Robert. "Evaluating Internet Research Sources." VirtualSalt. 15 June 2008.  Web.  22 Oct. 2013. <http://www.virtualsalt.com/evalu8it.htm>.

Sherman, Chris.  “Metacrawlers and Metasearch Engines.” Search Engine Watch. 22 March 2005. Web. 22 Oct. 2013. http://searchenginewatch.com/article/2066974/Metacrawlers-and-Metasearch-Engines


Shelly, Gary B., and Jennifer T. Campbell, Discovering the Internet: Complete, Fourth Edition.  Boston: Cengage Learning, 2012. Print.

Thursday, October 10, 2013

Browsing the Web

              IP (Internet Protocol) address is requested from a web server. Based upon the explicit numbered address, the server connects with the location of the web page.  To facilitate users, a domain name, which is broken down into four designating components, is given to correspond with the sites IP address.
  Web sites can vary in their content and purpose. Principally, they are designed to accommodate specific users for a specific goal. In gaining access to the information they provide, a process of client/server computing is utilized, whereas a web page’s

                Much of chapter two within Discovering the Internet illustrated the locations and usage of tools to utilize the Web. It demonstrated the method of navigating over home pages and their features, such as display area, tabs and access tools, to opening web pages for applied use. I was familiar with much of its initial recommendations. Even so, I did learn the simple process to activate pop-up blocking.

                In my particular field of Communications, the use of RSS (Really Simple Syndication) has been emphasized as a vital tool. These feeds will allow me to actively keep abreast of media news and updates. The step by step illustration enabled me to understand how to successfully find and subscribe to various feeds. There was still a need to effectively create RSS feeds that the chapter did not elaborate upon, so I am seeking information through sites such as http://codex.wordpress.org/Customizing_Feeds.


                Another area of unfamiliarity to me was the subjects of Cookies. I have been advised on the deletion of cookies periodically, but never informed on their use. I now know that they are small files of personal information that are intended for expedient accessibility and efficiency. However, the information may also be used maliciously. It must be monitor similar to any threat of spyware. 
www.tecs-onsite.com

Wednesday, September 25, 2013

Leveling of Net Neutrality

It affects all of us whether we like it or not, the idea of Net Neutrality. In today society, the Internet has become an essential part of everyday
life. So when we attempt to access the information we’re seeking, we expect to obtain specifically what we want from where we would like it.
Basically, Net Neutrality is the supposition that broadband network providers be completely impartial to what is sent over the networks. There should be no limit to the amount or control over the source of information provided to the public. This method is ideal to insure the greatest transference of information to the majority of users.

In its absence, providers would have the capability to control aspects of information to the public for their own financial gain. They could redirect or block specific data at their own discretion. Communications companies such as Verizon are against any proposal for Net Neutrality regulations, citing that such “requirements are unconstitutional, and their elimination will create more business opportunities.”  (1)- They seek to solicit a “tier” (2) - network where consumers pay more for a higher and more liberally accessibility.
                The general public and Federal Communications Commission are in support of the regulations.  However, any amendment for the FCC to enforce the Act has been voted against by both Congress and the Senate. (3)- Some lawmakers believe there isn't enough of a problem to justify action. Nonetheless this perspective comes in the wake of telecom advocates insistence that they need addition revenues to cover costs to upgrade heavy data traffic on their networks.
http://www.plumbersurplus.com

                I have no doubt that we, as the consumers,  must take affirmative action before we find ourselves being taxed based upon which website we wish to access.


(2) http://www.savetheinternet.com/net-neutrality-101
(3) http://www.pbs.org/moyers/moyersonamerica/net/neutrality.html

Thursday, September 12, 2013

Genesis of the Internet

The Internet is a global structure of unified computer network that facilitates the exchange of information. It serves as an electronic communications link connecting users, networks, and computer facilities worldwide.  By using the standard Internet protocol suite (TCP/IP) it allows various operating systems to interconnect, enabling synchronized communication of differing devices.
Developing from a 1969 U.S. Defense Department program called ARPANET (Advanced Research Projects Agency Network); its first purpose was to provide a secure communications system counter to war. It was primarily utilized by only a few specialized universities. But through numerous advancements in technology, other researchers advanced on its early capabilities. This expanded the use and number of ARPANET affiliates. By 1991 the public gained access to the World Wide Web. With the creation of the Gopher system and Mosaic Browser, the Internet’s desirability led to the explosion of World Wide Web sites and users. From there, the Web has been utilized in every facet imaginable, by companies and individuals. Access to the Internet can now be achieved by a variety of methods, from radio signals to fibre-optic connections.

                                     http://withfriendship.com/user/pintu/history-of-the-internet.php

Though the internet’s initial purpose was for academic and government research, it is now utilized by billions to conduct business and share information.  Companies use it to analyze sales or to promote products. Individuals may use it to shop or communicate with others. Schools, hospitals, and other government organizations utilize it for research and information exchange. Its advancements have incorporated media firms with an alternative method to reach the public, via blogs and RSS feeds. A trove of information is available at one’s fingertips.
The connection of the Internet to businesses and individuals begins with a request to your Internet service provider (ISP) for certain information. That request is routed until it reaches a domain name server (DNS) which locates the domain name and connects to the server's IP address. Once it reaches the web server, it will return the information to you in the form of packets. The packets will then be organized by your device thru rules of set protocols. Data is retrieved within seconds.


The entire creation and organization of the Internet is an incredible achievement, with profound impact upon humanity, presently and in the future.  The infinite drive to reach further with its technology is both a value and a peril. As we create this super expressway through life, each generation become increasing reliant on its use. Information is everywhere, perhaps before we are ready to ever know it.

Shelly, Gary B., Jennifer T. Campbell. Discovering the Internet: Complete Forth Edition. Cengage Learning. January 2012.