tech training - session 8

21
BOROUGH OF WEST CHESTER THE LONG HISTORY OF EMAIL EMAIL ETIQUETTE EMAIL ARCHIVING, DISCOVERY & OWNERSHIP SMARTPHONES SECURITY FILE & FOLDER ORGANIZATION WINDOWS UPDATE GETTING TO KNOW PDF DOCUMENTS WHATS UP WITH JAVA ANYWAY? WHAT’S NEW IN TECH? QUESTIONS AND ANSWERS Information Technology Training Session 8 – February 21, 2013 William Mann, Chief Information Officer

Upload: william-mann

Post on 01-Nov-2014

1.510 views

Category:

Documents


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Tech Training - Session 8

BOROUGH OF WEST CHESTER

• T H E L O N G H I S T O RY O F E M A I L

• E M A I L E T I Q U E T T E

• E M A I L – A R C H I V I N G , D I S C O V E R Y & O W N E R S H I P

• S M A R T P H O N E S S E C U R I T Y

• F I L E & F O L D E R O R G A N I Z AT I O N

• W I N D O W S U P D AT E

• G E T T I N G T O K N O W P D F D O C U M E N T S

• W H AT S U P W I T H J AVA A N Y W AY ?

• W H AT ’ S N E W I N T E C H ?

• Q U E S T I O N S A N D A N S W E R S

Information Technology Training Session 8 – February 21, 2013

William Mann, Chief Information Officer

Page 2: Tech Training - Session 8

EMAIL has become a very important part of the way we all communicate, both at work and home. I think this cartoon sums it up accurately… with humor.

For those under 20, it is probably very hard to remember a time when email was not there for communication.

Page 3: Tech Training - Session 8

What came first, email or the internet?

You may be surprised to learn that EMAIL is much older then the internet. In fact Ray Tomlinson is credited for inventing email way back in 1972. That’s right, 1972. That makes email 41 years old.

Tomlinson worked for Bolt Beranek and Newman as a contractor. He

picked the @ symbol from the computer keyboard to denote sending messages from one computer to another.

By 1974 there were hundreds of military users of email.

Meanwhile it took until 1992 when the “world wide web” grew to 26 sites. Yes 26 sites. 1993 brought the internet that we know of today although it was much smaller, slower and no graphics (GUI) to speak of. Between 1994 and 2000 the internet grew by leaps and bounds. Search engines like Google made their first appearance in the mid 1990’s.

The internet continues to grow and in fact the original internet protocol (IPv4) is rapidly running out of space and new IP addresses are now being assigned to a new protocol (IPv6). We will lean more about this during our next training class.

Page 4: Tech Training - Session 8

But why, in 1974 did Ray Tomlison take the time to invent Email?

I love this. Tomlinson was inspired to invent EMAIL because he was tired of colleagues who did not answer their phone!

Page 5: Tech Training - Session 8

EMAIL ETIQUETTE

• Be informal, not sloppy. Your colleagues may use commonly accepted abbreviations in e-mail, but when communicating with external contacts, everyone should follow standard writing protocol. Your e-mail message reflects you and the borough. Traditional spelling, grammar, and punctuation rules should be applied.

• Keep messages brief and to the point.

• Use sentence case. USING ALL CAPITAL LETTERS LOOKS AS IF YOU'RE SHOUTING. Using all lowercase letters looks lazy.

Here are some detailed suggestions for professional email etiquette.

Etiquet

te

Page 6: Tech Training - Session 8

EMAIL ETIQUETTE

• Use the blind copy and courtesy copy appropriately. Don't use BCC to keep others from seeing who you copied; it shows confidence when you directly CC anyone receiving a copy. Do use BCC, however, when sending to a large distribution list, so recipients won't have to see a huge list of names. Copy only people who are directly involved.

• Don't use e-mail as an excuse to avoid personal contact. Don't forget the value of face-to-face or even voice-to-voice communication. Don't use e-mail to avoid an uncomfortable situation.

Etiquet

te

Page 7: Tech Training - Session 8

EMAIL ETIQUETTE

• Remember that e-mail isn't private. E-mail is considered borough property and can be retrieved, examined, and used in a court of law. Also remember that e-mail can be forwarded, so unintended audiences may see what you've written. You might also inadvertently send something to the wrong party, so always keep the content professional to avoid embarrassment.

• Be sparing with group e-mail. Send group e-mail only when it's useful to every recipient. Use the "reply all" button only when compiling results requiring collective input and only if you have something to add.

Etiquet

te

Page 8: Tech Training - Session 8

EMAIL ETIQUETTE

• Use the subject field to indicate content and purpose. Don't just say, "Hi!" or "From Bill."

• Don't send chain letters, virus warnings, or junk mail. Always check a reputable antivirus website or your CIO before sending out an alarm. If a constant stream of jokes from a friend annoys you, be honest and ask to be removed from the list.

• Direct personal e-mail to your home e-mail account.

• Remember that your tone can't be heard in e-mail. Have you ever been misunderstood in an email message?

Etiquet

te

Page 9: Tech Training - Session 8

EMAIL ETIQUETTE

• Use a signature that includes contact information. To ensure that people know who you are, include a signature that has your contact information, including your mailing address and phone numbers.

• Summarize long discussions. Scrolling through pages of replies to understand a discussion is annoying. Instead of continuing to forward a message string, take a minute to summarize it for your reader. You could even highlight or quote the relevant passage, then include your response.

Etiquet

te

Page 10: Tech Training - Session 8

EMAIL ETIQUETTE – MY VERY OWN BASIC RULES

1. Would you actually say what is contained in your email “face to face” with the recipient?

2. Would you be embarrassed if a third party read your email?

Ask yourself these 2 questions before sending an email.

If you answer “no” to #1 or “yes” to #2, re-evaluate the email message.

Never send email when you are feeling negative or angry emotions!

Once you hit send – there is no going back.

Page 11: Tech Training - Session 8

EMAIL – ARCHIVING, DISCOVERY & OWNERSHIPIt is important for all employees to be aware of these rules and regulations governing email.

1. The Borough of West Chester owns all email using the west-chester.com domain.

2. All Borough of West Chester email is archived by Microsoft and stored at several locations offsite.

3. All Borough of West Chester email is discoverable. This means that all email that is sent and received is discoverable and may be accessed by management or third parties requesting email as part of an investigation or litigation.

4. If you use borough owned equipment to send and receive personal email this may be discoverable as well.

IT Memo - 2012-16 (Corporate Email Compliance)IT Memo - 2012-18 (File Ownership)

Page 12: Tech Training - Session 8

SMARTPHONE SECURITY

Smartphones today are really small powerful computers that happen to able to make phone calls. Smartphones can access documents and sensitive files.

These facts should never be forgotten.

One of the best ways to protect yourself (and your data) from falling into the wrong hands is to apply a PIN # to your phone. All smartphones come with this ability. Sadly many of us do not take advantage of this simply because it takes “too much time” to enter the PIN #.

You can usually enable your PIN # in the settings area of your phone and even set the “time out” policy.

Believe me. If you ever lose your phone this security setting will help you sleep!

You can usually set the lock screen time frame from immediate to about 15 minutes.

Page 13: Tech Training - Session 8

GETTING YOUR FILES & FOLDERS ORGANIZEDThere are several ways in which you can get your digital life organized. One of the best ways to do this is to organize your documents into folders, just like you do with physical documents.

If you are starting from scratch…..

First take a look at your files and try to write down (on paper) some groups in which you would like to separate the files.

Once this is done, simply create folders for each of these groups.

Then, drag & drop the files into the new folders you created.

Now start thinking about what you are going to do with all the time you are going to save because you will be able to find your documents so much faster!

You can also organize your email in the very same manner as your computer files.

Page 14: Tech Training - Session 8

GET TO KNOW WINDOWS UPDATE

Security is really important these days. This concern should not only be at work, but at home as well. In addition to having an updated anti-virus solution you need to make sure your computer’s operating system and it’s applications are “up to date” as well. Microsoft updates their software regularly in order to deal with security threats & performance enhancements.

The easiest way to check your computer is to:

1. Open Microsoft Internet Explorer.

2. Open Tools and select

3. Windows Update. (From here you can check for & install updates).

I recommend doing this at least once a month!

You can also check for Windows updates from your control panel.

You can also do directly to www.update.microsoft.com/microsoftupdate

Page 15: Tech Training - Session 8

GETTING TO KNOW PDF DOCUMENTS

Everyone has heard of and has used PDF documents. But do you know what PDF documents are and when they should be used?

PDF is short for “Portable Document Format”. Adobe Systems is the creator of the PDF format. Adobe made the PDF format available free of charge in 1993. Adobe continued to control the PDF format as a proprietary format until 2008 when it was released as an open standard.

You can create PDF documents directly from Microsoft Word, Excel and PowerPoint, as well as many other applications. You can do this by simply selecting “Save As” and choosing “PDF” from the “Save as Type” option.

PDF documents cannot be easily modified or changed. It’s because of this that I recommend sending PDF documents as opposed to their original format (Word, Excel etc). Especially in cases where you want to maintain an unchanged document.

Another great reason to send documents in the PDF format is that anyone can download the free Adobe Acrobat Reader,preventing compatibility issues .

Page 16: Tech Training - Session 8

WHAT’S UP WITH JAVA ANYWAY?

I am sure that recently many of you have heard about the JAVA security scares. In fact I have written about this ongoing problem more then once on our technology blog.

First things First. What is JAVA anyway?

Java has become a very popular programming language for computer programmers. Programmers like java because it is designed to require as few implantation dependencies as possible. The less dependencies required, the happier the computer programmer is.

Java is also very old, at least in computer years. Java was originally developed by Sun MicroSystems in 1991 and released to the public in 1995.

Fast forward to today where we find Oracle Corporation the current owner. Therefore you will often hear Oracle mentioned in the news when problems with Java are reported.

Many stand alone applications rely on Java, not just websites. The recent security concerns revolve around how Java is running in the internet browser.

Page 17: Tech Training - Session 8

WHAT’S UP WITH JAVA ANYWAY?

So What’s The Big Deal?

The security issues with Java have been due to flaws in many recent versions. The application has become one of the most unsecure applications in use today.

There have been 11 security patches issued during the past 18 months.

These security issues can allow hackers and other computer creeps to access your computer and any valuable data in it. Or these security flaws can be used to turn your computer into a “spamming server”.

Sadly solving the problem is not as simple as just deleting Java. Many popular websites as well as many stand alone applications that may be installed on your computer rely on Java.

So what to do…..

Many applications rely on Java, not just websites.The recent security concerns revolve around how Java is running in your internet browser.

Page 18: Tech Training - Session 8

WHAT’S UP WITH JAVA ANYWAY?

There a 3 ways to tackle this.

1. Hope for the best and keep Java updated whenever prompted. The problem here is that updates are made available after a security flaw has been found. This leaves you vulnerable until the security patch has been, written, made available, downloaded and applied. That’s a bit risky if you ask me.

2. Remove Java altogether. The problem here is that many reputable web pages rely on Java, as well as many computer applications.

The #3 option is my recommended solution so it get’s an entire slide all to itself!

Many applications rely on Java, not just websites.The recent security concerns revolve around how Java is running in your internet browser.

Page 19: Tech Training - Session 8

WHAT’S UP WITH JAVA ANYWAY?

3. Disable Java from running in your internet browser (only). Remember that Java’s security flaws [when they appear] involve how it is interacting with the internet browser. Stand alone programs running Java are unaffected by the recent security flaws.

This can be easily done from the Control Panel where you can open the Java application directly.

Unchecking this box will prevent Java from running in your internet browser while leaving it active for any stand alone application installed on the computer.

Page 20: Tech Training - Session 8

WHAT’S NEW IN TECH?There is a lot to be excited about in 2013, especially if you are a tech enthusiast. Here are some of my predictions for the year:

1. Move over IPAD here comes the Microsoft Surface Pro.

2. Touch Screens. With Windows 8 our new computer screens will become input tools just as important as our mouse and keyboard.

3. The differences between tablets and smartphones will start to get a little fuzzy starting in 2013. As smartphones continue to grow in size and some tablets shrink (IPAD Mini) it will eventually become harder to know which is which.

4. Windows 8 Phones will continue to improve and by the end of 2013 these will become a real alternative for the professional on the move. With Microsoft Office, SharePoint, Lync and SkyDrive built in it will be hard for Microsoft to mess this one up.

5. Cloud Services will continue to find success as consumers, businesses and governments continue moving to the sky.