Friday, May 25, 2007

Please explain why the Jeopardy Style of e-mail composition is a "good thing"

I don't understand this, please help me out.  To me, the Jeopardy Style of e-mail composition, made popular by Microsoft, is a mess.  Imagine trying to tell a new user how to read an e-mail.  I envision it would go something like this:

  1. Go to the bottom of the e-mail.
  2. Find the beginning of the first e-mail.
  3. Read the first e-mail.
  4. Working your way back up, find the beginning of the first reply.
  5. Read the reply.
  6. Continue the process of moving up and down throughout the e-mail and it's replies until you have read everything in the order that it was originally written.

Replying to an e-mail would go something like this:
  1. Try to remember everything you had read before (see previous steps).
  2. Try to compose your reply in such a fashion that it might be understood without the context added by all of the previous content.
  3. Of course, all of the previous content, including signatures and disclaimers from previous senders, is included below your message, in reverse chronological order.

Please, please help me understand why this is a "good thing"?  Or, is virtually everyone just a Lemming that is following the other Lemmings, not knowing why?

-Bob

MORE THAN I EVER WANTED TO KNOW ABOUT CHROOT JAILS

"The idea is that the customers need to upload content to our content
server, but we want to do it in a secure and private way. Customer One
should not be able to see Customer Two, for example. And neither
customer should be able to do anything that might damage the server in
any way."

COMPLETE STORY:

http://nl.internet.com/ct.html?rtr=on&s=1,37f1,1,4j30,gy0r,ct5s,55dr

-Bob

RT SCRATCHES A TROUBLE-TICKETING ITCH

"Much available help desk software is quite bland, with two exceptions:
open source RT and the more corporate Remedy Help Desk. The two have
quite different goals, but they both do one common thing: track trouble
tickets. The question is, which one will meet your needs?"

COMPLETE STORY:

http://nl.internet.com/ct.html?rtr=on&s=1,37f1,1,6dr4,1ox6,ct5s,55dr

-Bob

HOW TO SECURE VNC REMOTE ACCESS WITH TWO-FACTOR AUTHENTICATION

"VNC is the most popular remote access solution today. However, it was
developed to provide remote access, not to provide secure remote access."

COMPLETE STORY:

http://nl.internet.com/ct.html?rtr=on&s=1,37f1,1,4nw,34ga,ct5s,55dr

-Bob