Discussion Board 7

Global warming; it’s a very hot topic. (Pun half-intended.)

Personally, I buy it.

Though there are those that say we are merely repeating old weather patterns that haven’t been seen in some time and theories that it’s simply our movement in space–theories that do make sense, as well–I believe in the theories and evidence of our roles in the climatic changes. Unfortunetly, I am not capable of saying much more than that, as it isn’t a topic that I’ve read much on.

Whether or not global warming is real, and whether or not the effects can be reversed, I do believe that we should act as if it is a real threat. Making efforts for conservation, clean energy, reducing “carbon footprints”, etc., is not only good for the environment, but good for the person as well.

Mirrored from Being Jeremiah Palmer.

Aviation Incident

On the evening of August 11, 2010, the Cynthiana E-911 Dispatch Center received a call at 19:31 from the Cynthiana-Harrison County Airport of a downed aircraft. According to the contact person at the airport, the pilot of a 2003 Cirrus SR22, #N160EU, left the airfield radar approximately one mile northwest of the field after having made radio contact regarding the need of an emergency landing. The pilot reported that while at an altitude of 8,000 feet the “engine started to sputter and oil leaked” from the engine compartment onto the windshield (HCEMA, 2010). The pilot managed to blindly find and make a landing on the runway, finally coming to rest off the end of the runway in a neighboring crop of soybeans.

Cynthiana Police Department (CPD) unit 33 arrived on scene at 19:36. Shortly after 33′s arrival, Cynthiana Fire Department (CFD) and Brown’s Ambulance Service were dispatched to the scene. Deputies from the Harrison County Sheriff’s Office (SO) also announced that they were en route. At 19:44 Brown’s EC-5 arrived on scene, and Harrison County Emergency Management Agency (EMA) unit 806 advised he was en route. Shortly thereafter CFD Engine 2 and Unit 4 arrived on scene with 274 declaring Officer in Charge (OIC) for CFD. SO units 370 and 383 arrived at 19:46. CFD, after investigating the scene, left at 20:00. EC-5 left the scene as well, after making sure the pilot was fine at 20:03, three minute before 806′s arrival. The final units to leave the scene were 370 and 383 at 20:19, 379 and 33 at 20:35 and 806 at 20:39. (HCEMA, 2010)

During the event, members from many of Cynthiana and Harrison County’s emergency services were activated. Initially, CPD unit 33 was dispatched to investigate the call; an EC unit, CFD, SO and EMA units were later dispatched for additional support and management of the incident. Within their separate agencies elements of ICS were present. Overall, a variation of ICS was also present. As with most traditional interpretations of ICS the first to the scene was placed as the incident command until a more qualified representative arrived. In this incident, 33 was the first to arrive, giving an idea of direction to other agencies upon arrival. Overall, 33 remained in an IC capacity until the arrival of 806, at which time 33 resumed his primary role of law enforcement. During 33′s role as IC, he coordinated with dispatch the relay of information to 806, who then relayed the necessary and available information to the Commonwealth Emergency Operations Center’s (CEOC) duty officer. As this was a fairly large incident involving multiple agencies involving an aircraft, the CEOC had to be made aware in order for the FAA and NTSB to be notified. Upon notification of the incident, the CEOC contacted the Area EM Manager – EM-47—as well as the FAA, Kentucky State Police, and Air Force Rescue Coordination Center (HCEMA, 2010).

Where the incident did not involve any larger damage to life or property, the response to the incident was allowed to de-escalate. Agencies involved were also allowed to follow their normal lower-scaled operations and leave the scene when their services were no longer needed. The remainder of the operations were closed by the local EMA and the scene was left for an FAA representative to investigate the following day (HCEMA, 2010).

Communications and general Operations for the event were initially handled by the E-911 Dispatch Center and unit 33. Overall, these communications and handling of information went well, with the exception of dispatch taking time to notify unit 806. Unit 806 should have been notified of the incident almost immediately after the call was received, as the situation required notification of agencies outside of the area and there was the potential of a “hazmat” and ecological situation with the release of any fluids from the craft. The delay in notifying 806 may have been related to an influx of calls in the dispatch center—this is merely speculation based upon other inconsistencies in the E-911 Computer Aided Dispatch Incident Report. Fortunately, 806 is also a member of the city and county fire departments and was already aware and en route prior to being notified. While en route, 806 handled the remainder of the communications with outside agencies by notifying the CEOC.

Planning for the incident was initially handle by 33 and then handed to 806 upon his arrival. During the event, planning elements such as gathering information was handled by 33, with more being gathered and reported back from units 274, 370, 383 and EC-5.
Logistics were initially handled by the dispatch center, through the activation of the various local agencies per standard operating procedures. Once the respective agencies were notified, unit 806 planned and prepared for the possibility of further needs by contacting the CEOC. Fortunately, there weren’t any other needs to be met in this incident.

In general, this incident was handled well. All agencies were notified and responded in a relatively timely manner. Coordination of efforts went fairly smoothly; however, as seems to be the case, the local agencies were not able to fully respond and fill “all” of the functions of the ICS model as a larger group where the incident was still relatively small.

It is my opinion that the incident received better handling than the search and rescue (SAR) incident presented from the same community which utilized some of the same agencies. A possible reason for the better handling of the incident could be related to the differences in the individual responding units. In this situation, as opposed to the former units that responded to the scene were more “seasoned” and had also gone through more training than those who had responded to the SAR event. One other possible reason for the better handling of the incident could also be related to the larger number of units responding—organization and assignment of duties seems to come easier when there are more people available to handle the tasks.

References
Harrison County Emergency Management Agency. (2010, August 11). 2010 Situation Report File. Incident # 2010-00014115. Cynthiana, KY

Mirrored from Being Jeremiah Palmer.

Military Incident

There are a number of military incidents which occur daily which the public may not be made aware of. Reasons for keeping these events quiet may be related to worries of national security, or the simple fact that the incident was small and there was no need to report to the public. These reasons can make it difficult for anyone without a good connection or knowledge of how to conduct research into military incidents.

In an attempt to locate an incident, preferably with an officially approved and publicly released report or case study, I found instead one of the types of incidents which had been unknown to the public at one time. Unfortunately, while some of the story is known, there are many details which still remain unclear—an issue which may, in fact, show how strongly the military can abide by a form of ICS. It is also possible that these unknown elements may remain unknown simply to hide the fact that the incident was not handled properly. We may never know.

On November 7, 2003, a ladder was mistakenly left in USS Georgia’s # 16 tube after a sailor had climbed down to attach the necessary cabling to hoist the nuclear missile out. As the weapon was being lifted out of the tube it’s nose struck the bottom of the ladder. Hoisting operations were quickly halted when the err was discovered; by that time a large gash was in the nose of the weapon and the foot of the ladder was a few inches from the detonation device. (Fitzpatrick, 2004)

It is unclear as to what actions took place next, however it can be assumed that higher ranking officers took charge of the event and reports eventually made their way back to D.C. In December of 2003, Capt. Lyles, commander of the Navy Strategic Weapons Facility, Pacific—the Bangor, WA location where the incident occurred—was relieved of duty and transferred to another base. While word of Lyles’ removal was made public, details other than there being a “lack of confidence” in his command were not available.(Barber, 2003) At the time, the public was still unaware of the November incident; details of the damaged nuclear missile were not released until March 7, when published by a former Navy officer (unrelated to the incident). Walter Fitzpatrick broke the story on a blog.

Fitzpatrick’s story eventually gained the attention of area news organizations, two Washington US Representatives, and a Canadian member of parliament.(Associated Press, March 12, 2004) Inquiry was made by the news outlets and the Representatives. Navy officials declined comment to the media. Media outlets reported that the offices for the Sheriff and Emergency Management for the county were never notified of the incident (Bryant, 2004).

US Representatives Inslee and Dicks were eventually briefed on the situation, and released a statement to what they learned on March 19. Rep. Inslee stated that the Navy had a dire need to find better ways of communicating with the public. He went on to say that the Navy appeared to take the event seriously and had kept things fairly quiet and internal in order to conduct a thorough investigation and review of policies and practices. (Associated Press, March 19, 2004)

Approximately one month later, it was announced that the facility in question and the base which Capt. Lyles was transferred to were merging. This merger was approved after a six-month review of the merger proposal. (Associated Press, April 27, 2004)

Command over the incident was assumedly under the direction of Capt. Lyles at some point, as well as anyone else further up the chain, depending upon how you choose to view the incident. There was also NCIS involvement at some point (Barber, 2003), though it has not been published which of the persons involved at the base or scene were investigated.

Operations took place over an unknown period of time, as the full details of the incident were not released to the public. As the incident was relatively small in nature, one can imagine that operations did not go much farther than examining the area for possible radiation leaks, carefully extracting the ladder, removing the missile from the tube, and either sending it off for repair or destruction. It would be possible for some conspiracy-theorist to look at all of the information that has been provided and assume that there was actually something slightly larger than what was described, and that the true incident/action/operation took place over a six month period or greater. [The “incident” took place in November, CO transferred to another base as reprimand, and six months later the two bases merge. Coincidence? Likely, but still an entertaining thought.]

Planning had assumedly started some-time beforehand and following the incident. The Navy would have had some sorts of plans in place for an accident similar to what had happened. The degree to which these plans were enacted is unclear, however we can assume that the incident was determined to be fairly insignificant where no action was taken in notifying the public.

Financial aspects of the incident are not mentioned in any of the articles found about the event, and are likely negligible.

Overall, the incident was likely handled properly. While I agree with the concerns of the Representatives and believe that the public should have been made aware at some point sooner than four-five months after it occurred, keeping it quiet was likely a good thing. Had there been an announcement of an accident on the base, the public could have gotten unnecessarily frightened by the news. Still, had it not been for the leak of information, would we have known at all?

…then again, how can I say that the incident was handled properly when I know none of the details? It is possible that the unknown points of the incident are being kept quiet because there was a failure somewhere else in the handling of the incident.


References

Associated Press. (2004, March 12). Canadian lawmaker upset over missile accident. [Online] Retrieved May 24, 2011 from LexisNexis Academic.

Associated Press. (2004, March 19). STATEMENT ON BRIEFING BY NAVY ABOUT BANGOR MISSILE ACCIDENT. [Online] Retrieved May 24, 2011 from LexisNexis Academic.

Associated Press. (2004, April 27). Navy will merge bases at Bangor, Bremerton. [Online] Retrieved May 24, 2011 from LexisNexis Academic.

Barber, M. (2003, December 24). Bangor officer in charge of key missile systems loses his command. Seattle Post-Intelligencer. Retrieved May 10, 2011 from: http://www.seattlepi.com/local/article/Bangor-officer-in-charge-of-key-missile-systems-1133028.php

Bryant, M. (2004, March 12). Missile reportedly damaged at Bangor sub base. Associated Press. [Online] Retrieved May 24, 2011 from LexisNexis Academic.

Fitzpatrick, W. (2004, March 7). BROKEN ARROW: Hood Canal, WA. The JAG Hunter [blog]. Retrieved May 24, 2011 from: http://jaghunters.blogspot.com/2004/03/broken-arrow-hood-canal-wa.html

Mirrored from Being Jeremiah Palmer.

Dogwood Fire

On a Monday evening, Fairfax County School Security received an alarm at Dogwood Elementary School for a possible intrusion. As this was a regular occurance related to a sensitive system being triggered by the rattling or shaking of an entrance by normal weather phenomena, the alarm was reset without any further investigation. Nine minutes later, the alarm was tripped again—this time a security officer and police officer were dispatched to the scene to investigate. Eight minutes following the dispatch of security and police, an officer arrived on scene to find that the building was on fire. During the time between the dispatch and arrival more alarms, intrusion and fault alarms for the fire alarm systems alerted.

The first officer to the scene notified his dispatcher that there was an active fire at the school. Fire units arrived to the scene at 22:40, twenty-three minutes after the initial intrusion alarm which sounded at 22:17. Additional support was called for, and arrived in a timely fashion. Police, fire, and medic units were at the incident, as well as additional support for the fire units including a canteen and gasoline truck for refueling of the engines. The fire department was also in contact with the public works department for controlling and regulation of the water needed in the area for suppression operations.

Communication and organization for the incident, as reported by the investigative report moved quickly and ran smoothly. All necessary supportive units and equipment were made available to the incident. From a management standpoint, it would seem that the incident was handled very effectively with regard to the various public services entities involved. Only one issue (other than structural concerns, which did meet requirements for the time-period in which the building was built) stands out for criticism—the disregard of the initial intrusion alarm.

The school had apparently made it a policy to disregard the first of a possible series of intrusion alarms sent from that building due to the nuisance associated with dispatching security and police to investigate for an alarm which could have been triggered by a strong wind. This policy contributed to the delay in response and could have played a key role in the spread of the fire throughout the structure.

Mirrored from Being Jeremiah Palmer.

Gretna, Lousiana

It can be difficult to attempt to find a police incident which follows the principles of ICS. This difficulty can come from some of the mentality of police organizations, the scale of incidents, or some combination of the two. Many police incidents act on a small scale, where an officer or a pair of officers respond to a scene as the only agency involved. Larger scaled inidents where more than a small number of police units arrive occur somewhat regularly across the nation, yet in these instances, organization is still fairly limited, with all of the junior officers simply reporting to whomever has assumed the role of Incident Commander (IC) or Officer in Charge (OIC). With this mentality, many of the functions within an ICS fall back to one officer.

For a period of time, the Police Department of Gretna, LA gained notoriaty for turning away victims of Hurricane Katrina. Most of the reports available freely on the Internet from varied media outlets point back to the entire incident being handled by the Gretna Police Chief, Arthur Lawson. In an interview with 60 Minutes’ Ed Bradley, even the mayor for Gretna, Ronnie Harris, stated that the decision to close a bridge crossing the Mississippi was that of the police chief. Further details are unclear, however it can be easily imagined that in some meeting with other officials, likely in an equivilent to an EOC, discussion was made on how to handle evacuees fleeing New Orleans. Somewhere during the discussion, Lawson likely made the suggestion of closing the bridge and turning people away. From that point forward, Lawson was given command of that particular incident. Following older models of being an OIC, rather than an IC, Lawson would have developed further plans of preparing, commanding and managing the incident. Obviously, communication between other law enforcement agencies took place, as agents from Gretna Police, the Jefferson Parish Sherrif’s Office and Crescent City Connection Police were on scene; Jefferson being the parish in which Gretna lies, and Crescent City Connection being the authority for the Crescent City Bridge. Resources were managed between the policing agencies most likely via a Memorandum of Agreement which would have been called into action by Lawson.

Communications for the event would have taken place at the bridge as the officers on scene repeated the message that they had been briefed to give earlier from higher ranks, likely Lawson via subordinates, that the bridge and city was closed to outside parties for the duration. Ongoing management of the incident would, again, have come from the top and trickled down the chain of command.

So, can this incident truly be broken down and a diagram be drawn? Not really. To draw a diagram of the police actions in this event would be to lay out one big box with the Gretna Police Chief placed in the middle, even though it is evident that all the stages/core components were present.

Was this incident handled properly? That question is up for debate. In my opinion, no. The mayor allowing the police chief to close an entrance to the city and order, using forceful maneuvers, the nomadic victims to return whence they came was wrong. Granted, the police department had arranged for busing of the victims prior to the escalation which made the media frenzy, but once their services were seemingly exhausted they should have acted more appropriately. Furthermore, I am curious as to why the incident was handled by the police. Why were the police charged with gathering the resources necessary to divert refugees? Yes, the police should have been there to enforce the event; they should not have been handling the event as it was of such a large scale.

Mirrored from Being Jeremiah Palmer.

Discussion Board 2

Without using the text, one should be able to guess that a “normal” temperature would refer to an average temperature. The text, tells us that normal temperatures are in fact an average—an average mean temperature based on thirty years worth of recorded temperature data (Ahrens, 2008, p.69). In the example provided in the text, we are shown a table displaying the recorded data from 1970-2000 (Ahrens, p.69, figure 2). Averaging that dataset reveals a “normal” or mean average temperature of 68°F for the community. A more common, or mode, temperature for the dataset is 60°F. Though, as explained in the text, it could be possible to call a temperature falling within the temperature range given from the lowest to the highest record within that thirty years worth of data “normal”, though it would be even more misleading as it would be taking the definition very loosely.

Frequently, especially after the viewers have expressed negative opinions on the television meteorologists giving misleading information, I have seen the “weatherman” go back and explain that the “normal” temps are averages over a period of time, and that what the more common temperature lies elsewhere. On rare occasions I have seen the weatherman go so far as to explain how an odd event in our history affected the dataset by either raising or lowering the “normal” by a degree or two.


References

Ahrens, C. Donald (2008). Essentials of Meteorology, An Invitation to the Atmosphere, Fifth Edition. Belmont, CA. Brooks/Cole, Thomson Learning, Inc.

Mirrored from Being Jeremiah Palmer.

Harrison County SAR Search for Possible Drowning Victim

Incident of Choice:

Harrison County SAR Search for Possible Drowning Victim

Jeremiah Palmer (4145412)

American Public University

EDMG230 – Spring 2011

George J. Munkenbeck

05/04/2011


On May 12, 2010, a person on Snakelick Road in Harrison county dialed 911 to report a possible drowning. The person reported that they had seen what appeared to be a body with black hair lashing about in the swollen Richland Creek. Harrison County 911 dispatchers notified the local fire, emergency management, and police agencies of the incident. Harrison County Fire unit 403 arrived on scene first and established Incident Command (HCEMA, 2010). Shortly thereafter, other units en route responded.

Once on scene, SAR coordinator, unit 807 took IC and dispatched responding SAR & Fire units to the last point where the unknown body was seen and a bridge downstream. SO unit 374 took report from the witness for submission to the Sherriff’s Office records, and to brief the IC. (M. Palmer, personal communication, May 13, 2010). Search efforts continued for approximately two hours until a decision was made that the area was unsafe due to the continuing rain and ever-rising waters (HCEMA, 2010). EMA unit 806 and SAR unit 807 requested that 374 and dispatch keep them notified of any further related reports and possible missing persons reports. All units left the scene to report back the following morning.

On May 13, 2010, SAR teams arrived back to the scene and continued search efforts. Approximately two and a half hours into the continued search a witness came forward to say that they had seen the remains of a cow floating downstream matching the vague description given by the initial witness. As no reports of a missing person had been filed, decision was made by 807 to discontinue the search and close the incident. (HCSAR, 2010)

Throughout the search operations, an Incident Command System had been in place. Beginning with arrival of 403, a point of operations and central command was established. Upon arrival of senior/more qualified units IC was turned over. Unit 807 acted as incident command at the top of the chain, EMA unit 806 as logistics. Units 403 and 374 acted as liaisons for their respective agencies; additionally, EMA/SAR unit 812 assumed the role of PIO liaison. All other units were general staff performing the necessary footwork on scene.

This incident was small and did not require all of the possible functions mapped out in larger ICS structures. Though it may seem that in smaller incidents like this there is some ease in operations, there can be found even more confusion. Who, exactly, would a straggling SAR/Fire unit report to upon arrival to the scene? In Harrison County, many of our SAR members are volunteer fireman, understandably. Our EMA director and SAR coordinator are also volunteer fireman. Our SAR coordinator is also an EMA deputy (this stems from local SARs being under guidance of EM). A green fireman could easily become lost in trying to find where they should report.

Naturally, law enforcement on scene took report from the initial witness, so it would be safe to assume that he would fill a role in gathering information on the incident. But who, then, is to continue gathering information? Units 806, 807, and 403 continued to gather information, which is beneficial in the respect to having multiple accounts being taken; however having multiple accounts being gathered from such a small number of involved individuals is seemingly wasteful.

Assigning the role of PIO/liaison to unit 812 is a smart move in many situations as she is more comfortable with the public and fills the administrative positions for the SAR most of the time. In this incident she could have easily been assigned the duties of gathering information as well since the incident was small. Doing so could have enabled her to give a quicker report of the situation to the public.

In this instance, ICS failed overall due to the small scale of the incident. The incident, however, was still managed well and as quickly as possible without any grand complications. To improve this situation, more meetings and table-top exercise need to be conducted in order to iron out these wrinkles and emphasize who acts in which capacity when they are members of multiple agencies.


References

Harrison County Emergency Management Agency. (2010, May 13). 2010 Situation Report File. Incident # 2010-00007809. Cynthiana, KY

Harrison County Search & Rescue. (2010, May 12). SAR team was called.. [Online Forum Comment]. Retrieved from http://www.facebook.com/hcsar/posts/121758231182521

Mirrored from Being Jeremiah Palmer.

Discussion Board

This writing was originally submitted as an assignment for one of my classes.

In the foyer of Eastside Elementary in Cynthiana, KY, above the trophy/presentation cases hung a black & white photograph of a tornado in the sky, overlooking the Harrison County Bus Garage. I noticed this picture when I was in the first or second grade, and it has held a special place in my mind for some time.

I believe that I had asked my mother one afternoon if she had ever noticed it, and knew when the picture was taken. She proceeded to tell me of a day in when she was eleven, going on twelve, back in 1974 that seemed to be fairly uneventful. She had noticed what time it was getting to be—that her favorite show was about to come on the air—so she dashed to the kitchen, grabbed and empty Pepsi bottle, ran out the front door and around the corner to the neighboring convenient store. Like a whirlwind she ran into the store, placing her bottle on the counter, ran to the back to retrieve a new one, ran back to the counter, dropping some change on it as she flew past. Exiting the door, rounding the corner back to her home, she was stopped by a gust of wind carrying dirt and leaves into her face. Shaking her head, and brushing her hair from her brow, she looked up and saw a huge black cloud in the distance. Puzzled, confused and scared, she was frozen. Her jaw dropped, and her hand lost it’s grip on her soft drink. She could hear police sirens wailing and the civil defense siren begin to spin up. Her mother bolted out the door of their apartment, scooped her up off the sidewalk, ran inside with her and took her to the bedroom to hurdle on the floor with her siblings under the mattress.

Mom then began to tell me that from what she had heard from my father and what she had read in the paper, that roughly the same time, just a few miles away near the community of Connersville, my dad was hiding in the basement with his parents and sister, listening to the wind screaming outside before it ripped the roof off their home.

She then went on to tell me how there had been an outbreak of tornadic storms that day, and that several cities and towns were hit pretty hard. She told me of a small place called Xenia, OH, over 100 miles away that was destroyed, and how those of us here, in Cynthiana and other places in Kentucky and other states faired better.

It was then that I began to have an interest in weather.

I’ve not experienced an event in my lifetime that sticks out as well as the one that I was told. I’ve experienced some nice flooding, snow, and ice events. I’ve had my home become surrounded by water up to four feet deep in the front lawn from rains that flooded area streams. I’ve dug my way through three feet snows, slid around on inches of ice, even helped clean up buildings that were completely filled with water in 1997. None of these have compared to hearing about the Super Outbreak.

I hope to learn as much as I can from this class, particularly what goes on there in Norman and how the SPC comes to figuring out probabilities for phenomena. I want to know more about the GFS, NAM, etc. I want to know everything! (I probably want to know more than what this course was designed to handle!)

NOTE: I am not affiliated with or responsible for any of the images linked within this message. Images were obtained via an Internet search and were included for educational purposes. Click images to enlarge–you will be leaving the APU/AMU servers. Yes, I did embed a Wikipedia link, and we all know that the educational system “hates” Wikipedia; but you can use Wikipedia as a good springboard to further develop your research–that’s what the referenced footnotes in the Wikipedia article are for! 😉

Mirrored from Being Jeremiah Palmer.

Jeremiah Hall Palmer

This writing was originally submitted as an assignment in one of my classes.

Good [INSERT APPROPRIATE TIME OF DAY] everyone.

As you can see by the message details above (and subject line), my name is Jeremiah. I hail from a small town named Cynthiana in central Kentucky. I’m currently unemployed (and have been for some time–for the most-part I am a homemaker). I volunteer a great deal of my spare time to the local emergency management agency, performing random tasks as needed; primarily, I maintain the agency’s site and social networking profiles.

I’m a husband to one–I don’t think I could handle more even if it were legal ;)–and father of three.

I can’t really think of much more to say about myself, so feel free to google me:

Mirrored from Being Jeremiah Palmer.

Blogging: A History and How-to

Okay, so here’s what I am going to call the final draft of my blogging paper… This is the text as I will hand it in tonight…
————————————————————————–

Blogging:

A History and How-to

Jeremiah Hall Palmer

ENG101

Sullivan University


Everyone is getting connected these days. What used to be available to a few is now being brought to the masses; the digital divide is shrinking. As these new users to the Internet hop onto the web, they start discovering the world around them, and start discovering the electronic world that they never knew existed. In these trips into the unknown, they may discover a variety of social and networking websites, where they will sign up, and meet friends and even make a few new acquaintances. Many, flock to social networking sites such as MySpace. It is here that many of these new users discover a word that they have never seen or heard before – blog.


A recent newcomer to MySpace had found this portion of their Internet profile, and wondered what a blog was:


I wonder who thought up the word blog and what exactly is it? It sounds more like a creature from the Black Lagoon than a cute little message written on a personal internet space. (McClain, 2007)


As one can see, they unwittingly answered their own question through questioning the origin and definition as they posted their first entry. A blog is simply a place where a person can write, and share a multitude of ideas so that world may see and even comment on what one has to say. A blog is nothing more than an Internet journal.


History of Blogging


While there may be several electronic papers and publications on the term, there is no set defining point — no clear history of where blogging began. Sources of information on the topic, such as Wikipedia and the University of Essex, do not have a clue as to a particular point at which blogging came about; nor do they know when blogs developed into what they become today. While most of the history is speculative, it has been widely agreed upon that blogging stems from someone making use of the old Usenet and Bulletin Board Systems of yore, and posting a writing (Brady, 2005; Wikipedia, 2007).


The term blog comes from the word weblog, a word coined by a gentleman named Jorn Barger. Barger created the word to describe how he “logged onto the web” and journalized his trips, findings, and studies – the traditional definition of a weblog. Two years following the creation of weblog, Peter Merholz broke the word into two words on his web site, creating the phrase “we blog.” Soon after, the term blog was taken into its own, and became associated with the writing of online diaries or journals. (Wikipedia, 2007)


Reading (and Understanding) a Blog


            Before one sets out to write a blog, it would make sense for one to read a blog, in order to get a better understanding on how blogs function. John C. Dvorak  – a noted writer for technology magazines, blogger, and podcast host – wrote, in 2004, a primer for the newfound blog reader. An outline/summarization of Dvorak’s primer follows:


Blog Layout – Blogs are written chronologically, however they are typically displayed in reverse chronological order. This format is used so that the blog’s readers have the newest material available first.

 

The Post – The post consists of all the elements described below.

 

The Permalink – The permalink is a link available for the post, which will allow another person to retrieve that particular post, as opposed to returning to the page that the post lies on.

 

The Main Link – Available in the traditional weblog, this is the link to the story the blogger is writing about

Summary/Commentary – This is the section that the blogger actually writes. In the traditional weblog this may be at the top, end, or scattered throughout a quote from the original source. In the diary style blog, this is the main writing.

 

Blockquotes – Indented quotes of the original story being written about.

 

Comments Link – The comments link offers readers the ability to be sent to a form where they may provide their input.

           

Blogging for the Masses

Up until recent history, for anyone to blog, they had to buy and serve up their own sites. This was soon changed with the creation of blog hosts such as Xanga, Open Diary, LiveJournal and Blogger. Nowadays, one can find a blog just about anywhere, and find the resources to blog just as easily. In order to blog all one needs is a computer, access to the Internet, and a place to post. The process can be quite easy and painless, or can take on hours of research and coding; depending upon the type of blog one would want to create. The remainder of this paper will show how to get started in the world of blogging with no cost, and very little effort.


Choosing a Host

First, one must choose a place to blog. For ease of use I would suggest that a newcomer try a simple web-based service (meaning there is no software to download, and all posts are written directly through an Internet browser); such as Yahoo!’s 360°, MSN’s Live Spaces, or MySpace. These sites are social networking sites as well, and chances are great that a few friends or family may already be using these services; plus these sites have easy invitation options if one desires to bring someone else new into this world. Another advantage to starting with either Yahoo! or MSN is that chances are likely that the new user has an email account with one of the respective companies, so basic use will be similar, and usernames & passwords can be the same. An advantage to MySpace may be that the new user is an adult who has a child that uses MySpace – this will help the adult enter into the world that the child is walking in.


After making the choice of one of these services, or any for that matter, there is a process where the user can set-up his or her profile. Information provided by the user is wholly upon his/her discretion or preference. One can have the ability of telling his/her name, age, sex, orientation and so on. One only has to offer as little or as much information as he/she feels comfortable with. Somewhere during this process may also be a point where the user is asked about security permissions – whether the user wants certain aspects about his/her profile to be seen, as well as his/her blog. Typically these security settings are set as defaults, and can be over-ridden during the post of a blog entry; however this is not always the case. The user must make sure to read the security settings before committing if he/she has any fear of letting too much about themselves being shown.


Far more advanced security settings can be taken advantage of with other blog hosting services, such as LiveJournal, which shall be mentioned later. For someone wanting to get more in-depth blog usage, the USC Annenberg School for Communication offers a comparison chart of larger blogging services and software, at . For the time being, however, a complete novice might want to take heed of the recommendation for the simple models of Yahoo!, MSN, and MySpace.


Writing an Entry

After finding a place to write, the user must then decide upon what to write about. This can be anything imaginable. One can write a traditional weblog, and share thoughts or comments on various online materials he or she has encountered that day; or the writer may choose to go with the more common personal diary entry. The only limitations placed on the content of the blog entry would be any by the host (such as possible adult content, threats toward another life, etc.) or the writer. Many write about their day to day life. Others write blogs on a particular subject. At any rate, one may write whatever they would like.


Advanced Blogging

Another common feature among blogs is the ability to embed media – to copy into the post a picture, music, or even a video. With this capability the blog becomes even more of an informal journal or scrapbook. These abilities have also led way to the creation of other blog formats, such as vlogs (video blogs), photo-blogging, and podcasting (term named for “mp3 broadcasts”; where the creator records a talk-show of his/her own with the intent of it being played back on a computer or mp3-player, i.e.: iPod.)


One may go into the arts of vlogging, podcasting, and photo-blogging with little to no expense as well. These methods of blogging, however, are more time-consuming depending upon how in depth the creator of the material wishes to be. These forms thrive primarily using more advanced services that can handle all forms at once; or may require the use of multiple services. Before one dives into these forms, it may be advisable to finely tune the simpler blogging skills, and move up, or graduate from Yahoo, MSN or MySpace. (MySpace may still be used for certain aspects of the advanced, and is very much a good starting point before going farther. MySpace supports a video and photo sharing platform which is easy to use, and is advancing at a fairly rapid rate. MySpace will also continue to serve as a portal for people to find content elsewhere, seeing as the name is well-known.)


As mentioned previously, one blog (written) host available to the masses is LiveJournal. LiveJournal offers heightened security and customizable levels for viewers. One may set several levels of “friends” or readers within categories, and then give permission to only that level to read a particular post. LiveJournal also offers RSS (Real Simple Syndication) features (as do the aforementioned simpler sites – LiveJournal, however has been, in the author’s experience, more reliable than the other sites) where a person can read all public entries via an RSS reader or their email (web-based or client-side; i.e.: Outlook, Netscape, Thunderbird, etc.) LiveJournal also supports client-side applications that allow for a user to run a program locally in which to write a blog, and then posts to the site later, without the need of operating through an Internet browser. Other additional features are available through LiveJournal with purchase of membership. Similar services include DeadJournal, Greatest Journal, and Blurty.


Blogging without Fear

            Security and safety has become a concern for current bloggers and people who are wishing to delve into writing these public journals. Generally, these fears are related to the fact that the blog is personal in nature, and may reflect poorly upon one’s outward image. The Electronic Frontier Foundation states in regards to consequences of blogging;


Family members may be shocked or upset when they read your uncensored thoughts. A potential boss may think twice about hiring you. But these concerns shouldn’t stop you from writing. Instead, they should inspire you to keep your blog private, or accessible only to certain trusted people. (EFF, 2005)

 

The EFF offers a list of solutions to overcome these concerns, including suggestions on using anonymity, creating a “friends-only” blog via LiveJournal, and tools/tricks to use when setting up a personal website. More detailed information on blogging securely, and what laws and regulations may protect the writer are available at the EFF’s website, at: http://www.eff.org/bloggers/lg/.


Conclusion


            Blogs are quickly becoming a large part of an online interactive society that lies all around us. Blogs are easily and readily available for anyone and everyone to read, write, and comment on. Not only is blogging therapeutic, but it is informative. Thoughts, expressions, and links to other resources put a world of information available to many people. Blogging enables “people to engage in the knowledge society,” and can also allow “others to contribute and to develop ideas.” (Brady, 2005)



References


Blog. (2007). Wikipedia. Retrieved August 13, 2007 from http://en.wikipedia.org/wiki/Blog.

Blog software comparison chart. (2006). USC Annenberg School for Communication. Retrieved August 13, 2007 from

Brady, M. (2005) Blogging, personal participation in public knowledge-building on the web. Chimera Working Paper 2005-02. Colchester: University of Essex. Retrieved August 13, 2007, from http://www.essex.ac.uk/chimera/content/pubs/wps/
CWP-2005-02-Blogging-in-the-Knowledge-Society-MB.pdf


Dvorak, J. (2004). Understanding and Reading a Blog (for Newcomers). Retrieved August 13, 2007, from http://www.dvorak.org/blog/primer/blogprimer1.htm

How to Blog Safely (About Work or Anything Else). (2005). Electronic Frontier Foundation. Retrieved August 13, 2007, from http://www.eff.org/Privacy/Anonymity/blog-anonymously.php

McClain, D. (2007) What exactly is a blog? Retrieved August 13, 2007, from http://blog.myspace.com/index.cfm?fuseaction=blog.view&friendID=
96100993&blogID=271669121&Mytoken=A1AC4717-839B-4660-
9F6F96C129E733C162253583
.