Archive for the ‘mail’ Category
Using GMail daily I hadn’t noticed the item Create a document in the menu before yesterday, I decided to try it out and I really like it. The function allow you to turn an entire conversation into a document which is stored into Google Docs with the push of a button.
The quoted text contains all the included markup, altough it doesn’t include the sender details, it removes all the quoted text it recognizes. What it doesn’t do is truncate the text below the “sig dashes” (“signature cut line”, “sig-marker”, or “sig separator”), which is what I expected.
I create many post based on conversations I see on mailing lists, or other place. This feature makes it easier to collect all the text of the conversation, as the sender is not included it is necessary to through source text to attribute the quotes to the correct person.
Image source: VentureBeat, me
Recently on NANOG I saw the item below, I was thinking about what this actually means. A computer would – similar to DynDNS – register itself and it’s hostname to a DNS server using some kind of authentication. Naturally I immediately thought this was a brilliant plan, and didn’t understand why nobody, with the exception of DynDNS, had thought of this before. The immediate afterthought was that this would be easy to implement with a soft-token, which is the software equivalent of a physical token like RSA’s SecureID, or complicated to implement with PKI infrastructure.
From: Mark Andrews <[email protected]>
Re: mailing list bounces
It will be much better when the OS’s just register themselves in
the DNS. Humans shouldn’t have to do this when a machine renumbers.
Named can already authenticate PTR updates based on using TCP and
the source address of the update. For A/AAAA records you setup a
cryptographically strong authentication first.
DynDNS uses username password, which is less secure than the cryptographically strong solution that Mark Andrews mentions below.
Image source: Bill McCurdy
I was reading a Mashable item on productivity which contained some interesting things that I will turn into a slideshow on this week.
Do NOT check your e-mail for the first 45 minutes that you are in the office in the morning. […] There are never meetings at that time and most people are settling in and reading their e-mails, […] — Amanda Feifer O’Brien, Marketing Manager at Firmenich Inc.
Take the first 30 minutes to plan the rest of your day. By plan, I mean make a list of the important tasks that you need to have done today and stay focused on these items. […] Make a list of the things that you want to achieve that day and work from that list until it’s completed. — Rohan Hall, Founder and CEO of rSitez, Inc
This is an excellent way to start the day, I have been using the 43 Folders system to unplan the year, this is my scheduled backlog, and take the day folder out and add this to my daily TODO list – which I write on Post-its. While creating the initial Post-its I like to create Post-its which contain:
- Coffee Break (x4)
- Snack Break (x2)
- Mail Break (x2)
And interspace these in the timeline of the day.
On my whiteboard I arrange the Post-its in the following grid:
First I take the Not Urgent and Not Important and bin them, obviously there is no reason to do them or they would have been graded differently.
Next I estimate the time and importance needed for the Urgent and Important tasks, and split the longer items into shorter tasks. Then I start the tasks by solving some of the important short tasks first to set the tone of the day to task completion, then I process the remaining tasks in order of importance. I like to use timeboxes for each of the tasks based on my estimates.
Next I estimate and complete the Not Urgent and Important items and don’t move on to estimating and completing the Urgent and Not Important until I’m finished.
Image source: Dennis Hamilton
UPDATE: GMail has introduced my number 3. YEAH! (Gmail introduces Priority Inbox: The importance filter for your email.)
With the exception of my happiness at some of the new features implemented by a few services – that are solutions to requirements I had in the past, and which are now integrated into my whole internet experience – there is seldom a week that goes by that I do not lament the limits of email.
Let me send customized mail to groups of people all at once.
Some time ago I wrote a tool which does this, it allows you to draft a mail and add on different messages/attachments for different people. And I don’t mean something as cumbersome as a Mail-Merge, I mean something that can be used for every message I send. People are already getting enough information they don’t need, with a little care from the sender a recipient’s load is minimized. Naturally you can still continue to work the way you did before, but for the people who want to lighten the mail burden they place on people it’s a handy tool. This includes the ability to send encrypted/signed messages to all the recipients based on the requirements of the sender and/or the recipient.
Let me initiate conversations with groups of people with just one tag.
Grouped mail exists already – it’s reasonably easily done with most mail clients, but what about tagged mailing. Three people in your addressbook are Java programmers, it would be handy to be able to mail only them your cool new code snippet rather than needing to go through the marketeers, managers and Perl programmers in your addressbook to find them. And without the need to update this list when a new contact is added, or an old one is removed.
GMail has the ability to recognize that certain contacts are often contacted at the same time as others, although this is meant more to protect you from contacting the wrong Bob. From experience I know that having multiple mail addresses for the same Bob screws with the algorithm. And this is based on the virtual grouping of mail history, rather than the taxonomy of the contact.
Let me queue up people who want to interact with me and work my way through the list in a way that works for both of us.
This is similar to an inbox for mail, although it is more efficiently ordered, perhaps implemented as a reversed spam filter, using either Bayesian or Markov filtering techniques to weight a message based on the inferred importance. The client allows you to assign weight to an email and you can ask the client to order all the messages by the weight you assigned to that email and similar messages, and all the previous messages you have weighted. It can also do this based on client side rules, and business rules and requirements. Interactions or interaction sessions could also be Timeboxed for greater efficiency.
What are your thoughts?
Adapted from post originally posted here.
Over 2887.350465 megabytes (and counting) of free storage so you’ll never need to delete another message.
On that day I was surprises when people trying to mail me suddenly started getting:
Remote host said: 552 5.2.2 User over quota m24si4251221waf [RCPT_TO]
It naturally annoyed me that I was not warned that I was outgrowing my mailbox.
Today I’m absolutely and unequivocally over the quota once allocated to me:
And it doubt that I shall reaching that limit any time soon, although I am still unwilling to subscribe to high volume the current count reads:
Over 7460.019087 megabytes (and counting) of free storage.[*]
I’m also glad to see that they removed the obvious lie:
“[...] so you’ll never need to delete another message.“
- GMail frontpage (only visible when logged out)
- This is obviously an average, or so I assume.
We are sending you this information with a link to our website, but we won’t allow you to send us mail.
This mail was generated.
I get mails like this all the time, a nice little form letter telling me that if I want to communicate with the company I must conform to their methods of communication. This is much like the companies which force me to call an expensive number to air one’s grievances, they have email yet they won’t allow me to use that method to initiate contact.
Why do they do it?
Obviously not just to irritate me, they have a procedure that allows them to track issues and have a customer support representative to handle the complaint. As soon as it’s in their CRM they suddenly can use mail, when it suits them, and these can be processed by their CRM.
What many companies forget is that when I am contacting them I am doing them a service, I am helping them to make their product better. So when they make it difficult for me to help them, they are making their product less valuable. There are many companies out their who perform their task cheaper and as badly as they do, where they can make the difference is to add value to their product that exceeds the value of just the product. It’s natural that this is paid for, and this cost should be included in the cost of doing business. The customer service lines that charge me 50 cents for every minute are saying:
“You call is not important to us! To get the service you are entitled too under our agreement and are paying for we will charge you more.”
Not as bad are the no-reply mails, although they are saying:
“We this what you have to say is important, but not so important that we should be inconvenienced.”
And as sheep we accept this rather than voting with our wallets.
I had a discussion this afternoon with a friend, she said that it would probably take a week to explore all of the googleverse. I obviously disagreed and said it would probably take closer to a month.
I was having trouble with synchronizing my CrackBerry and my calendar, and wanted to use some application to sync it, and I found Google Sync for your BlackBerry phone. Somehow it seems that Google uses something different for connecting to the Internet over all their applications. Both the GMail and the Google Calendar applications give me network not available, I have a similar problem with Opera Mini and FaceBook. Yet my GTalk works. AFAIK it’s something with http(s) connections.
I decided against reverse engineering.
- Google Sync for your BlackBerry phone
- Google Maps for your phone
- Gmail for your mobile browser
- Other Google Mobile Apps.