VIDYA

VIDYA
pradamika hakku

Thursday, February 25, 2010

thenth class maths


collected by:BANDI BHANU PRAKASH

Virus


Virus (computer)
self-duplicating computer program that interferes with a computer's hardware or operating system (the basic software that runs the computer). Viruses are designed to duplicate or replicate themselves and to avoid detection. Like any other computer program, a virus must be executed for it to function—that is, it must be located in the computer's memory, and the computer must then follow the virus's instructions. These instructions are called the payload of the virus. The payload may disrupt or change data files, display an irrelevant or unwanted message, or cause the operating system to malfunction.

HOW INFECTIONS OCCURComputer viruses activate when the instructions—or executable code—that run programs are opened. Once a virus is active, it may replicate by various means and tries to infect the computer’s files or the operating system. For example, it may copy parts of itself to floppy disks, to the computer’s hard drive, into legitimate computer programs, or it may attach itself to e-mail messages and spread across computer networks by infecting other shared drives. Infection is much more frequent in PCs than in professional mainframe systems because programs on PCs are exchanged primarily by means of floppy disks, e-mail, or over unregulated computer networks.

Viruses operate, replicate, and deliver their payloads only when they are run. Therefore, if a computer is simply attached to an infected computer network or downloading an infected program, it will not necessarily become infected. Typically a computer user is not likely to knowingly run potentially harmful computer code. However, viruses often trick the computer's operating system or the computer user into running the viral program.

Some viruses have the ability to attach themselves to otherwise legitimate programs. This attachment may occur when the legitimate program is created, opened, or modified. When that program is run, so is the virus. Viruses can also reside on portions of the hard disk or floppy disk that load and run the operating system when the computer is started, and such viruses thereby are run automatically. In computer networks, some viruses hide in the software that allows the user to log on (gain access to) the system.

With the widespread use of e-mail and the Internet, viruses can spread quickly. Viruses attached to e-mail messages can infect an entire local network in minutes.
TYPES OF VIRUSESThere are five categories of viruses: parasitic or file viruses, bootstrap sector, multi-partite, macro, and script viruses.

Parasitic or file viruses infect executable files or programs in the computer. These files are often identified by the extension .exe in the name of the computer file. File viruses leave the contents of the host program unchanged but attach to the host in such a way that the virus code is run first. These viruses can be either direct-action or resident. A direct-action virus selects one or more programs to infect each time it is executed. A resident virus hides in the computer's memory and infects a particular program when that program is executed.

Bootstrap-sector viruses reside on the first portion of the hard disk or floppy disk, known as the boot sector. These viruses replace either the programs that store information about the disk's contents or the programs that start the computer. Typically, these viruses spread by means of the physical exchange of floppy disks.

Multi-partite viruses combine the abilities of the parasitic and the bootstrap-sector viruses, and so are able to infect either files or boot sectors. These types of viruses can spread if a computer user boots from an infected diskette or accesses infected files.

Other viruses infect programs that contain powerful macro languages (programming languages that let the user create new features and utilities). These viruses, called macro viruses, are written in macro languages and automatically execute when the legitimate program is opened.
Script viruses are written in script programming languages, such as VBScript (Visual Basic Script) and JavaScript. These script languages can be seen as a special kind of macro language and are even more powerful because most are closely related to the operating system environment. The "ILOVEYOU" virus, which appeared in 2000 and infected an estimated 1 in 5 personal computers, is a famous example of a script virus.

Broadband Definition


Definition of Broadband:
Nowadays internet plays vital roll for all kind of aspects, Broadband, as a word, is becoming slipperier and perhaps less meaningful every day.
Increasingly over the next few years, the term is likely to refer to such a diverse range of offerings that any two people with “broadband” could have vastly different experiences.
As network technology evolves, broadband users will be divided not just by different tiers of speed and disparate media -- the haves and have nots segmenting into those with fiber, souped-up DSL, cable modem, WiMAX, etc. -- but by service quality features specific to each individual’s preferences.

The latest version of Alcatel-Lucent’s triple-play platform, which will be on display at NXTcomm08, includes more granular subscriber management and service quality features to allow consumers to, as the vendor put it, “choose the quality of experience they want, for the content they care about and at a price they are prepared to pay.”

Not only can discerning broadband users opt for a higher tier of speed, they can pay more for a higher quality of experience -- if they’re gamers, for example, or if they want to watch a lot of high-quality video over the Internet. The system allows not only users to pay for better service quality but content owners as well. And it is granular enough to be applied to a single piece of content.

A new equipment vendor and NXTcomm08 exhibitor, Zeugma Systems, is targeting similar capabilities.
Meanwhile, the line between telco and cable broadband is even blurring, as some providers combine the two to raise bandwidth speeds for business customers. Out in the Pacific Northwest, a small handful of ISPs have begun to sell telco DSL lines bonded with cable modem lines. One provider is even offering VoIP over the bonded lines, to ensure reliability (if one line goes down, the service doesn’t).

Over time, broadband pricing will be based more on consumption, putting further distance between different user types. In that environment, “broadband” providers will do whatever they can to loosen bottlenecks in the last mile. And users with vastly different speeds will have such widely differing experiences that it will no doubt seem odd in some cases to use the same word to describe them.

The FCC has been taken to task a lot over the years, and rightly so, for defining broadband as 200 kilobits per second or faster. And that embarrassment has often been cited amid calls for a nationwide broadband policy. But going forward, broadband is going to become harder to define. And with an increasing array of diversity under the umbrella that is broadband, anyone hoping to author a federal policy to dramatically increase broadband’s availability is going to have a heck of a time establishing just what it is they want to be available.

The bridged-T topology is also used to build sections intended to produce a signal delay. In the case of delay sections, there are no resistive components used in the design, broadband is essential thing for our speed life.

Satellite Internet


Information of Satellite Internet
We using the internet with help of Satellite, This employs a satellite in geostationary orbit to relay data from the satellite company to each customer.
Satellite Internet is usually among the most expensive ways of gaining broadband Internet access, but in rural areas it may only compete with cellular broadband. However, costs have been coming down in recent years to the point that it is becoming more competitive with other broadband options. German ISP, Filiago, offers the ASTRA2Connect satellite Internet system for €320 (equipment) plus €100 (registration) and a flat rate monthly fee dependent on bandwidth - from €20 for 256Kbit/s download, 64Kbits/s upload, to €80 for 2048Kbit/s download, 128Kbits/s upload.[6]

Satellite Internet also has a high latency problem caused by the signal having to travel 35,000 km (22,000 miles) out into space to the satellite and back to Earth again. The signal delay can be as much as 500 milliseconds to 900 milliseconds, which makes this service unsuitable for applications requiring real-time user input such as certain multiplayer Internet games and first-person shooters played over the connection. Despite this, it is still possible for many games to be played, but the scope is limited to real-time strategy or turn-based games. The functionality of live interactive access to a distant computer can also be subject to the problems caused by high latency. These problems are more than tolerable for just basic email access and web browsing and in most cases are barely noticeable.

There is no simple way to get around this problem. The delay is primarily due to the speed of light being 300,000 km/second (186,000 miles per second). Even if all other signaling delays could be eliminated it still takes the electromagnetic wave 233 milliseconds to travel from ground to the satellite and back to the ground, a total of 70,000 km (44,000 miles) to travel from the user to the satellite company.

Since the satellite is usually being used for two-way communications, the total distance increases to 140,000 km (88,000 miles), which takes a radio wave 466 ms to travel. Factoring in normal delays from other network sources gives a typical connection latency of 500-700 ms. This is far worse latency than even most dial-up modem users' experience, at typically only 150-200 ms total latency.

Most satellite Internet providers also have a FAP (Fair Access Policy). Perhaps one of the largest disadvantages of satellite Internet, these FAPs usually throttle a user's throughput to dial-up data rates after a certain "invisible wall" is hit (usually around 200 MB a day). This FAP usually lasts for 24 hours after the wall is hit, and a user's throughput is restored to whatever tier they paid for. This makes bandwidth-intensive activities nearly impossible to complete in a reasonable amount of time (examples include P2P and newsgroup binary downloading).
The European ASTRA2Connect system has a FAP based on a monthly limit of 2Gbyte of data downloaded, with download data rates reduced for the remainder of the month if the limit is exceeded.

Internet Power line

Internet-Power line
Power line communication also calling Power line, This is a new service still in its infancy that may eventually permit broadband Internet data to travel down standard high-voltage power lines. However, the system has a number of complex issues, the primary one being that power lines are inherently a very noisy environment. Every time a device turns on or off, it introduces a pop or click into the line. Energy-saving devices often introduce noisy harmonics into the line. The system must be designed to deal with these natural signaling disruptions and work around them.

Broadband over power lines (BPL), also known as Power line communication, has developed faster in Europe than in the US due to a historical difference in power system design philosophies. Nearly all large power grids transmit power at high voltages in order to reduce transmission losses, then near the customer use step-down transformers to reduce the voltage.
Since BPL signals cannot readily pass through transformers, repeaters must be attached to the transformers. In the US, it is common for a small transformer hung from a utility pole to service a single house. In Europe, it is more common for a somewhat larger transformer to service 10 or 100 houses. For delivering power to customers, this difference in design makes little difference, but it means delivering BPL over the power grid of a typical US city will require an order of magnitude more repeaters than would be required in a comparable European city.

The second major issue is signal strength and operating frequency. The system is expected to use frequencies in the 10 to 30 MHz range, which has been used for decades by licensed amateur radio operators, as well as international shortwave broadcasters and a variety of communications systems (military, aeronautical, etc.). Power lines are unshielded and will act as transmitters for the signals they carry, and have the potential to completely wipe out the usefulness of the 10 to 30 MHz range for shortwave communications purposes, these are information of Power line.

Latest Processor

Latest Processor
Good Processor makes our computer speed, Based on Intel Core micro architecture, the Intel Core 2 Duo processor family is designed to provide powerful energy-efficient performance so you can do more at once without slowing down.Intel® Core 2 Duo desktop processors,With Intel Core 2 Duo desktop processor, you'll experience revolutionary performance, unbelievable system responsiveness, and energy-efficiency second to none.

Big, big performance. More energy efficient.¹ Now available in smaller packages. The Intel Core 2 Duo processor-based desktop PC was designed from the ground up for energy efficiency, letting you enjoy higher performing, ultra-quiet, sleek, and low power desktop PC designs.
Multitask with reckless abandon. Do more at the same time, like playing your favorite music, running virus scan in the background, and all while you edit video or pictures. The powerful Intel Core 2 Duo desktop processor provides you with the speed you need to perform any and all tasks imaginable.

Love your PC again. Don’t settle for anything less than the very best. Find your perfect desktop powered by the Intel Core 2 Duo processor and get the best processing technology money can buy. Only from Intel.• Up to 6MB L2 cache.• Up to 1333 MHz front side busThese are the information about intel core processor and day by day advance processor are making by leading companies for our computers.

Advantages


Advantages:
1. True global broadband Internet access availability
2. Mobile connection to the Internet (with some providers)

Disadvantages:
1. High latency compared to other broadband services, especially 2-way satellite service
2. Unreliable: drop-outs are common during travel, inclement weather, and during sunspot activity
3. The narrow-beam highly directional antenna must be accurately pointed to the satellite orbiting overhead
4. The Fair Access Policy limits heavy usage, if applied by the service provider
5. VPN use is discouraged, problematic, and/or restricted with satellite broadband, although available at a price
6. One-way satellite service requires the use of a modem or other data uplink connection
7. Satellite dishes are very large. Although most of them employ plastic to reduce weight, they are typically between 80 and 120 cm (30 to 48 inches) in diameter.,
These are information of satellite internet advantage and disadvantage.

Multilinking Modems


Modems for Multilinking
Herewith given some information about multilinking,It is possible to roughly double dial-up capability with multilinking technology. What is required are two modems, two phone lines, two dial-up accounts, and ISP support for multilinking, or special software at the user end. This option was popular with some high-end users before ISDN, DSL and other technologies became available.

Diamond and other vendors had created dual phone line modems with bonding capability. The data rate of dual line modems is faster than 90 kbit/s. The Internet and phone charge will be twice the ordinary dial-up charge.

Load balancing takes two internet connections and feeds them into your network as one double data rate, more resilient internet connection. By choosing two independent internet providers the load balancing hardware will automatically use the line with least load which means should one line fail, the second one automatically takes up the slack, it's all the information of multilinking.

Modem Usage


Modem Usage
Modems are divided into two types, they are modulator and demodulator. Modem (from modulator-demodulator) is a device that modulates an analog carrier signal to encode digital information, and also demodulates such a carrier signal to decode the transmitted information. The goal is to produce a signal that can be transmitted easily and decoded to reproduce the original digital data. Modems can be used over any means of transmitting analog signals, from driven diodes to radio.

The most familiar example is a voiceband modem that turns the digital 1s and 0s of a personal computer into sounds that can be transmitted over the telephone lines of Plain Old Telephone Systems (POTS), and once received on the other side, converts those 1s and 0s back into a form used by a USB, Ethernet, serial, or network connection. Modems are generally classified by the amount of data they can send in a given time, normally measured in bits per second, or "bps". They can also be classified by Baud, the number of times the modem changes its signal state per second.

Baud is not the modem's speed in bit/s, but in symbols/s. The baud rate varies, depending on the modulation technique used. Original Bell 103 modems used a modulation technique that saw a change in state 300 times per second. They transmitted 1 bit for every baud, and so a 300 bit/s modem was also a 300-baud modem. However, casual computerists confused the two. A 300 bit/s modem is the only modem whose bit rate matches the baud rate. A 2400 bit/s modem changes state 600 times per second, but due to the fact that it transmits 4 bits for each baud, 2400 bits are transmitted by 600 baud, or changes in states.

Faster modems are used by Internet users every day, notably cable modems and ADSL modems. In telecommunications, "radio modems" transmit repeating frames of data at very high data rates over microwave radio links. Some microwave modems transmit more than a hundred million bits per second. Optical modems transmit data over optical fibers. Most intercontinental data links now use optical modems transmitting over undersea optical fibers.
Optical modems routinely have data rates in excess of a billion (1x109) bits per second. One kilobit per second (kbit/s or kb/s or kbps) as used in this article means 1000 bits per second and not 1024 bits per second. For example, a 56k modem can transfer data at up to 56,000 bits (7kB) per second over the phone line, these are information about various types of modems.

Web hosting




Web hosting Price or quality?
Finding a good host is not an easy task. There are different types of web hosting, and the quality is very different. We choose a web hosting at low prices, so you can earn money or just go for the highest quality? Here's a question of a balance between price and quality available.
To resolve this problem, we must not forget that this style of building your site. People will find a place to build a blog requires less disk space, not to pay these hosting sites have a large space. To save money, you buy expensive web hosting, but finding a stable OK.

But the situation is different for people to e-commerce site or other major key to building sites. It requires large disk space, bandwidth, and a good customer. This makes him choose a more expensive web hosting.
So for the web hosting market to determine what factors will provide greater value or quality. It is useful to look at the quality of accommodation that a large area. This quality of time should the priority be regarded as free web hosting cheap web, hosting, or have certain limitations. So you 5 GB of flat space and bandwidth. Your website will have left a nightmare for the visitors when they visit your site.

Some hosting site free or cheap host will be chosen if no requirement is too high. Why not make money by choosing the right one for you?
Therefore, in the "web space, bandwidth hosting, support system are three major factors for the top web hosting" prices. Therefore the user is aware that the objective in choosing web hosting.

Network Backup


Enterprise Network Backup:
Enterprise network backup, it is very important to the processes of small and medium enterprises, let alone the larger companies to back-up systems for farm use, according to official regulations. Despite the fact that this process is still unknown to the outside world, and most had not noticed within a corporate network backup significant impact on corporate welfare. SMB is the least understood, and use the back of their commercial policy, the backup solution of choice in any case easily adjustable, and also independent of the hardware. This argument is still relevant, if the global economic crisis. They must understand that it is to use the backup solution to backup a lot deeper than sufficient back-up to the end user.
Enterprise backup is always a range of Enterprise Server backup feature. Information is stored on the server (or servers) is more than important for the functioning of companies and employees an effective backup solution is an RTO (Recovery Time Objective). RTO problem is another issue that must be treated with SMB backup, and it is growing amounts of data. This in turn is subject to the conditions and the retention time. Company policy, the backup software, the company has introduced an independent system, these problems are solved quickly. The company provides navigation information.
It is certainly different databases, in the first place: We are one years and postgres SQL. For this, the company is free to move from one system to another system that does not necessarily work in the exchange of commercial backup solutions. It is clear that this progress in the package to support MS Exchange, Lotus Notes databases and other ODBC-based database. It is clear that companies are reluctant to return to many of the experts to hire, and it is not a rare event that the director is back, 50, or less than the company.
It is therefore a challenge to back up all of the business processes and automate the employee understand the problem exists. As a result, companies are willing to client-server-type backpacks standalone server automated backup for all workstations in the rear windows. It is important to back up ping backup solution provides not only information about computers in the network, but back to the Windows Server and data use.
For this purpose, back-up package to support distributed within a corporate network, the construction of storage, backup, where information is presented in various storage capacities. It is not surprising, given that surprising that these problems are common to the SMB enterprise backup operations can be trained to a separate back-up is designed to solve business.

Connected Home


Connected Home:
Home linked to various network devices connected to each other. These devices connect via the media or the same and have different abilities. Attached devices can share the media to move data around the use and capacity.

For example, a typical household has one or more televisions, cable or satellite set-top box, gaming machines (Xbox, PS3, etc.), portable game consoles (PSP, GameCube, etc), desktop computers , laptops, mobile phones, etc. Many households have access to the network storage and network printers.

Additional devices connected by different means. Some devices connect over a wired (Ethernet), connect through a wireless medium (WiFi).
Each device has a main feature of the network at home. Gadgets supporting role. For example, XBOX, PS3 is essentially gambling machines, but can also store the media and act as a client of Media Player with remote servers. Television is the first imaging device and provides a rich visual experience, but can also act as a client and can play media streamed through other connected devices.

Home Connected devices can share data with other instruments. Get their individual abilities. Connected Home also provides Internet access is available to any device at home.
For example, it is best to watch HD video stored on a computer or NAS in a small screen. His beautiful obtaining data files from your office and you can take with your iPhone or laptop.
There are other reasons why 100S package Connected Home Networks.
Perhaps you have created different devices, but after connecting the basic infrastructure that is, you can add multiple devices, wired or wireless. For the full story with pictures.

Wreless network secure

Secure your wireless network:
Wireless modem takes your house, it has advantages. Check e-mails, play PSP, Mobile OS applications, surf the Internet from your lounge suite or bed everything to gain. The sad thing about this technology, almost 30% of the users get the installation is repaired or uncertainty Free wireless broadband for the rest of us. As I write, there are currently 3 users unlimited use of the wireless network around me.

This article teaches you the basics of Wireless Broadband securing your home. After a wireless telephone, mobile phone and wireless-enabled applications work on the principle that the lower band, the better your experience. Wireless networking is easy to use, but they can also easily cut when you configure security settings or software in the background doing. By default, most wireless networks out of the box indefinite. You must learn to read, you need the manual for the various settings for your wireless network secure. The list below are the basics, is limited to your network problems.

Step 1: You must know your current network setup? Wireless technology that transmits data via radio waves from one application to another. The signs of the performance of your data collected over a long distance often miles. There are simple safety measures, someone with the right tools and coding, break in and steal your data. Unstable Wireless is the most common form of interference in the private network.

Step 2: Change your SSID SSID and password to the service set identifier represented. Each wireless network, from large companies in the simple system set-up at home, contains an SSID. SSID is your network of digital name. First, change the SSID number and password from the default settings something private and strong. They do not actively keep the default SSID. If the SSID and your network password, launch the software for your wireless hardware. You need your SSID in the Control Panel program. Overriding the default SSID is not much, as the name of your network is broadcast to all users in your area. You can change your personal information for all users around your environment using the SSID broadcast. It is as simple as marking a box on your modem control panel.

Step 3: Set MAC-Media Access Control or MAC filtering - A 12-character address in the network device. PSP Pocket PC, laptop, desktop, etc. all have MAC addresses. It can be difficult to find the MAC address, depending on the hardware. But the time the security of the section is to prevent hackers from running directly into your network and data theft. For users of Windows desktop, click Start, click Run, type cmd in the text box. The types of ipconfig / all in the DOS window. 12-digit MAC address is the Physical Address. Joint MAC filtering devices to access your wireless modem. In determining who your wireless modem access adds an additional security for your network. To ensure, MAC filtering, disable the wireless modem software and enter the MAC address of the hardware you access. Often found under Security Settings of your modem control panel.

Step 4: Encrypt your data and two common encryption protocols WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access). Both protocols to encrypt your data and block unwanted visitors from entering your network. WPA is considered to see how much more secure than WEP because of the ever-changing pass key. But WPA is not known by all devices and depends on the actual hardware and configuration. EPA is integrated into the rule in most routers with WEP encryption. It is very important to make sure your device supports WPA encryption are made. If you have WEP and MAC filtering can prevent most interference and hackers.

Step 5: Education and Software Keep up to date - more information about wireless security. Some great items to keep for the future of online Internet. Check each month for updates for your wireless modem. Keep your computer up to date with the latest updates from Microsoft or Linux. Download third party software such as Zone Alarm help intrusion detection, and monitor your wireless transmissions at all times. More third party software option will soon be added to an article on wardriving.

Office Network


Efficient Office Network:
Whether you're building an office for the first time or trying to get the amount of cabling in the workplace to reduce to a wireless office network, you can save time and money. Therefore it is important to the benefits of a network of Wireless Office can provide understanding.
As such, a wireless network connection to a network like the Internet without wires. While it is true to an extent that wireless technology in May initially more expensive than conventional cables, the long-term benefits it cheaper to operate, both economically and perhaps more importantly in terms of efficiency and productivity.

Moreover, a wireless network means that there is no need for ReWire your desktop, you decide that change is needed for the layout. New employees also have direct access to the network, making the need for a cable to be installed on their computer, compared to a wired network.
Another advantage of a wireless network can provide is that it eliminates any problems that may arise when employees or external customers come to your office visit. A wireless network allows customers and remote employees easy access to the network, improving efficiency by taking unnecessary stress and workload of your IT department.

If he goes, one of the most overlooked benefits of wireless technology is the safety aspect. Office of the fall will be one of the main causes of accidents at work and many of the cable in the office will not help. But simply switching to a wireless network, this can save you from unnecessary stress that may occur, any claim for you and your business.

In determining how internet and intranet in providing the office, it may be too easy for the traditional wired solution for its initial economic benefits to choose. Although initially expensive, this method can be costly in the long term. In addition, the easy to the time factor involved in the wiring of the entire desktop, or perhaps more importantly, how this method unadaptable forgotten a changing work environment.

Of course, in a busy office mobility as a major problem and it is often necessary to have flexibility for the office. This is especially important if you are training new employees, or regularly travel between the rooms in the office for meetings and presentations. However, a network of Wireless Office provides lightness and mobility within the office, This is especially important if you are training new employees, or regularly moving between rooms in the office for meetings and presentations. However, a wireless network in the office offers convenience and mobility within the office, allowing you to focus on things that matter most.

In general, many advantages in switching from one wireless network in the office. In fact, there is an improvement in the office of safety, higher productivity and prove financially viable to run a wireless network can be very attractive advantages to offer to each company.

Internet Culture


The Culture of the Internet:
Internet is the main culture habbits of our indian people. The Internet is also having a profound impact on knowledge and worldviews. Through keyword Internet research, using search engines, like ours, millions worldwide have easy, instant access to a vast amount and diversity of online information. Compared to encyclopedias and traditional libraries, the Internet represents a sudden and extreme decentralization of information and data.

The main used language for communications on the Internet is English, due to the Internet's origins, to its use commonly in software programming, and to the poor capability of early computers to handle characters other than western alphabets.

The features of net has grown enough in recent years, though, that sufficient native-language content for a worthwhile experience is available in most developed countries. However, some glitches such as mojibake still remain.

The internet helps many groups of people to unite and find each other, including people with very rare diseases, scientific, cultural, political and other interests, sexual fetishes, etc.This is the main features of the internets culture.

This isn't the Cosmo magazine kind of hotspot; it's the other kind you may be hearing about: the Broadband hotspot. They seem to be everywhere, you can sip a latte in Starbucks while browsing the net, or have a pint at the pub while you delete annoying emails from your mother But these little hotspots, once just covering a pub or a café here or there, are growing bigger.
Just last year the River Thames in London was made into a gigantic broadband hotspot that stretches for 22km from the Millennium dome to the Houses of Parliament. Anyone on the river or its banks can now whip out a laptop and start browsing. Bored of the view from the millennium wheel? Watch that hilarious video of a woman falling over on Youtube instead. The River Thames hotspot works by mesh networking 100 access points, allowing users to connect to the net without interruption as they travel down the river.
It comes at a cost, even if fairly inexpensive, and anyone with a wireless enabled device can connect for £2.95 for an hour, £5.95 for a day or just get a whole month for £9.95. This gigantic hotspot seems insignificant however in comparison with the one being developed in Taipei, capital of Taiwan. Taipei has been engaged in a huge infrastructure upgrade that will be the foundation of a city wide broadband hotspot that will literally turn the city into one great bit hotspot. However the best laid plans for this city wide project have not gone as well as hoped, with only 30,000 or so subscribers to the service, far less than anticipated.
This is partly due to a perceived unreliability in the network as well as abundantly available free hotspots in cafes and other such places within the city. However while it may take a while for the city wide hotspot to catch on, it does seem like these gigantic wireless projects will be the way of the future. The growing integration of high speed internet into every aspect of our lives makes it inevitable that the infrastructure will be utilised - if not now then soon.
Like many new technologies the factor seems to be cost- how many people will really want to pay to use the internet for a hour while they travel between a work and home where it is already paid for. How many people are really that anxious to be online at all times? When the costs match the needs is when we will start to see the full potential of such grand schemes.

Internet Features


Features:
This is the content of broad community for your kindly notice. This growth was complemented by a major expansion in the community. No longer was DARPA the only major player in the funding of the Internet. In addition to NSFNet and the various US and international government-funded activities, interest in the commercial sector was beginning to grow. Also in 1985, both Kahn and Lerner left DARPA and there was a significant decrease in Internet activity at DARPA. As a result, the IAB was left without a primary sponsor and increasingly assumed the mantle of leadership.The growth continued, resulting in even further substructure within both the IAB and IETF. The IETF combined Working Groups into Areas, and designated Area Directors.

An Internet Engineering Steering Group (IESG) was formed of the Area Directors. The IAB recognized the increasing importance of the IETF, and restructured the standards process to explicitly recognize the IESG as the major review body for standards. The IAB also restructured so that the rest of the Task Forces (other than the IETF) were combined into an Internet Research Task Force (IRTF) chaired by Postel, with the old task forces renamed as research groups.

The growth in the commercial sector brought with it increased concern regarding the standards process itself. Starting in the early 1980's and continuing to this day, the Internet grew beyond its primarily research roots to include both a broad user community and increased commercial activity. Increased attention was paid to making the process open and fair. This coupled with a recognized need for community support of the Internet eventually led to the formation of the Internet Society in 1991, under the auspices of Kahn's Corporation for National Research Initiatives (CNRI) and the leadership of Cerf, then with CNRI.In 1992, yet another reorganization took place.

In 1992, the Internet Activities Board was re-organized and re-named the Internet Architecture Board operating under the auspices of the Internet Society. A more "peer" relationship was defined between the new IAB and IESG, with the IETF and IESG taking a larger responsibility for the approval of standards. Ultimately, a cooperative and mutually supportive relationship was formed between the IAB, IETF, and Internet Society, with the Internet Society taking on as a goal the provision of service and other measures which would facilitate the work of the IETF.These are all the main features of broad communities for ur daily used by the internet.

History of Internet


History of Internet:
The history regarding internet is described below for your kindly notice.The Internet started in Sept. 1981 when a new set of protocols - rules for who talks when and how - began being used, called "TCP/IP". They were used on a network that had already been running since 1969, using an older protocol called "NCP".

Current network addresses look like "128.9.176.20", which is ISI' s web server (http://www.isi.edu/). The first network addresses all started with "10.", i.e., "10.0.0.1", and described everyone on the first ARPAnet (the precursor to the Internet). Those addresses aren't in use any more; they're reserved for 'tests' (RFC1918 describes this).

The problem with picking a 'first' is that everyone who ran on the old NCP ARPAnet had an address that was converted to a 10.x.x.x address when TCP/IP was adopted in Sept. 1981. So technically everyone who had an NCP address in August 1981 had an equivalent IP address in Sept. 1981.

The list you probably want is in RFC832, and lists a large number of 'first network addresses' that were used by Dec. 1982. Note that ISI is listed there, and at that time we used the old 10.x.x.x address, not the current 128.9.x.x set. PS - you can find the "RFCs" above using a search engine. RFCs, and their precursors called IENs are a great source for such history, but they can be a bit hard to read.

Concepts of Internet


Concepts of Internet Initally:
These are the main features of internet that are initially used by the peoples around the world. The original WARPLANE grew into the Internet. Internet was based on the idea that there would be multiple independent networks of rather arbitrary design, beginning with the WARPAINT as the pioneering packet switching network, but soon to include packet satellite networks, ground-based packet radio networks and other networks.
The Internet as we now know it embodies a key underlying technical idea, namely that of open architecture networking. In this approach, the choice of any individual network technology was not dictated by a particular network architecture but rather could be selected freely by a provider and made to interwove with the other networks through a meta-level "Internet working Architecture".

Up until that time there was only one general method for federating networks. This was the traditional circuit switching method where networks would interconnect at the circuit level, passing individual bits on a synchronous basis along a portion of an end-to-end circuit between a pair of end locations. Recall that Klein rock had shown in 1961 that packet switching was a more efficient switching method. Along with packet switching, special purpose interconnection arrangements between networks were another possibility.

While there were other limited ways to interconnect different networks, they required that one be used as a component of the other, rather than acting as a peer of the other in offering end-to-end service.In an open-architecture network, the individual networks may be separately designed and developed and each may have its own unique interface which it may offer to users and/or other providers. including other Internet providers. Each network can be designed in accordance with the specific environment and user requirements of that network.
There are generally no constraints on the types of network that can be included or on their geographic scope, although certain pragmatic considerations will dictate what makes sense to offer.The idea of open-architecture networking was first introduced by Kahn shortly after having arrived at DARPA in 1972. This work was originally part of the packet radio program, but subsequently became a separate program in its own right. At the time, the program was called "Internetting".

Key to making the packet radio system work was a reliable end-end protocol that could maintain effective communication in the face of jamming and other radio interference, or withstand intermittent blackout such as caused by being in a tunnel or blocked by the local terrain. Kahn first contemplated developing a protocol local only to the packet radio network, since that would avoid having to deal with the multitude of different operating systems, and continuing to use NCP.

However, NCP did not have the ability to address networks (and machines) further downstream than a destination IMP on the ARPANET and thus some change to NCP would also be required. (The assumption was that the ARPANET was not changeable in this regard). NCP relied on ARPANET to provide end-to-end reliability.

If any packets were lost, the protocol (and presumably any applications it supported) would come to a grinding halt. In this model NCP had no end-end host error control, since the ARPANET was to be the only network in existence and it would be so reliable that no error control would be required on the part of the hosts.Thus, Kahn decided to develop a new version of the protocol which could meet the needs of an open-architecture network environment.

This protocol would eventually be called the Transmission Control Protocol/Internet Protocol (TCP/IP). While NCP tended to act like a device driver, the new protocol would be more like a communications protocol.This are all the main details regarding the internet intially used.

Internet


About Internet:
Now-a-days, the internet is essential and its mainly .
The specification for the ARPANET was prepared in 1968, and in January 1969, a Cambridge-based computer company, Bolt, Beranek and Newman (BBN) won the contract to design, implement and deploy the ARPANET. It was their job to take the specification and develop a computer that could act as the switching node for the packet-switched ARPANET. BBN had selected a Honeywell minicomputer as the base on which they would build the switch.Due to Kleinrock's fundamental role in establishing data networking technology over the preceding decade, ARPA decided that UCLA, under Kleinrock's leadership, would become the first node to join the ARPANET.

This meant that the first switch (known as an Interface Message Processor - IMP) would arrive on the Labor Day weekend, 1969, and the UCLA team of 40 people that Kleinrock organized would have to provide the ability to connect the first (host) computer to the IMP. This was a challenging task since no such connection had ever been attempted. (This minicomputer had just been released in 1968 and Honeywell displayed it at the 1968 Fall Joint Computer Conference where Kleinrock saw the machine suspended by its hooks at the conference; while running, there was this brute whacking it with a sledge hammer just to show it was robust. Kleinrock suspects that that particular machine is the one that was delivered by BBN to UCLA.) As it turns out, BBN was running two weeks late (much to Kleinrock's delight, since he and his team badly needed the extra development time); BBN, however, shipped the IMP on an airplane instead of on a truck, and it arrived on time. Aware of the pending arrival date, Kleinrock and his team worked around the clock to meet the schedule.

On the day after the IMP arrived (the Tuesday after Labor Day), the circus began - everyone who had any imaginable excuse to be there, was there. Kleinrock and his team were there; BBN was there; Honeywell was there (the IMP was built out of a Honeywell minicomputer); Scientific Data Systems was there (the UCLA host machine was an SDS machine); AT&T long lines was there (we were attaching to their network); GTE was there (they were the local telephone company); ARPA was there; the UCLA Computer Science Dept. administration was there; the UCLA campus administration was there; plus an army of Computer Science graduate students was there. Expectations and anxieties were high because, everyone was concerned that their piece might fail. Fortunately, the team had done its job well and bits began moving between the UCLA computer and the IMP that same day. By the next day they had messages moving between the machines. THUS WAS BORN THE ARPANET, AND THE COMMUNITY WHICH HAS NOW BECOME THE INTERNET! This are all the main features of internet solution.

Business Banking


Welcome to Business Banking
From managing your cash or trade flows to expanding your business internationally, Our Business Banking has unrivalled capabilities, innovative solutions, a global network and quality local execution to help you do just that. With more than a 150 years and serving more than 3 million customers in Asia, we understand and make Business Banking work for you.
Business Banking Working For You
We believe today's growing enterprises can be tomorrow's multinationals. The on-going globalization of business offers companies like your's opportunities for growth that never existed before.
The Bank boasts of a world-leading infrastructure that provides full business banking capabilities with a personalised feel. We deliver the cutting-edge solutions you need to compete in today's fast-paced business environment, whatever business you're in.
Products And Services That Produce Results
The Bank offers a complete suite of business banking products and services. We understand your desire for a fast turn-around, flexible bank services, and innovative product that drive business growth. Our solutions are designed to enhance security and reduce operating costs by boosting efficiency and cash flow. Utilise our expertise in cross-border trade and supply chain management to help you gain control of your trade, cash and payments processes around the world.
Cash Management
To boost efficiency and facilitate better decisions, businesses today need rapid and reliable information to help them monitor risk and exposure accurately.
Our efficient, multi-currency cash management processes are needed to execute payment, collect receivables and manage liquidity in different markets. The Bank offers a strong and safe cash management tool, essential to execute your company's financial strategy. However big your business, our network of local relationship managers and product experts will work with you to meet your unique business needs and enhance your competitive advantage. We will help you manage your cash flow anytime, anywhere through our secure site - Business Banking Online.
Trade Services and Supply Chain
Our Bank is a leading bank in global trade solutions with a 150-year lineage in intermediating and financing global commerce.
Our Bank is an established, reputable Trade Services bank and a market leader in transaction banking. Our services span over 60 countries in all continents helping you to connect with your clients' markets around the world.
We offer simple end-to-end solutions combined with our award winning online trade portal, MaxTrad™, to help our clients improve business processes so that working capital may be optimised.
Treasury/ Financial Markets
With our wide range of leading financial tools, supported by our team of dedicated Investment Specialists, Treasury Services Officers and Product Managers, we aim to provide the best in-class advisory information and recommendations tailored specifically to your business investment needs. We optimize your business investments by limiting risk and maximizing returns through easy, flexible and tailored investment solutions. Our suite of products includes:
Foreign Currency Deposits Spot & Foreign Exchange Yield Enhancing Investment Products
FX Dual Currency Investments Principal Guaranteed Yield Enhancing Deposits High Yield Equity Link Deposits Asset Based Finance
The Bank understands that asset based finance, especially leasing, is premised on the proposition that profits are earned through the use of assets rather than from their ownership. Business Banking provides cost effective asset based finance solutions that allow businesses to consider an alternative source of financing for capital equipment.
Flexibility, tax benefits, balance sheet optimization and cash flow structuring are some of the key benefits for businesses which opt for lease financing instead of outright purchase.
For many of our clients, our Asset Based Finance solutions are now the preferred alternative source of financing for their businesses.
Important info for US Persons
The offering, sale and/or distribution of many of the products or services described on this website is not intended in any jurisdiction to any person to whom it is unlawful to make such an offer, sale and/or distribution, including the United States. Read more...
To know more about how our bank’ Business Banking in UAE can help your business grow and succeed, please call our Business Banking Centre at +971 4 3570357 or email us at business.banking.uae@rbs.com. Worldwide Presencesource>>> http://www.rbsbank.ae/Business_Banking/business_banking.htm

Single Sex Education

Considering Single Sex Education?
by: kbradley8
The current educational literature is replete with assertions of the benefits of single sex schooling. Medical doctors, psychologists and educational theorists have come to the conclusion, based on brain research, anecdotal evidence, and limited educational research, that single sex schooling has the potential to offer an optimal educational environment for both sexes. Among the proposed benefits are: increased student achievement, improved self-esteem, a reduction in discipline referrals, an increase in student attendance, an increase in the diversity of selection of courses in high school and in college, and an increase in the diversity of selection of non-traditional gender specific career choices.
Single sex education is not a new concept. The first schools in this country were single sex educational environments. Males and females were educated separately based on traditional gender specific career paths common to American society. Males were usually educated privately and/or worked as apprentices in their future careers. Females were educated at home, learning the skills necessary for life as a successful wife. Eventually, schools became coed to keep up with the changing needs of society and, it was thought, that the female presence in the classroom might aid in calming the rowdy boys.
The emergence of secondary education developed as a result of the need for specialized professional training for males (doctors, lawyers, etc.). In the United States, Harvard was established in 1636, William and Mary in1693, Yale College in 1716, and the College of New Jersey at Princeton in 1746. Virginia Military Institute, the oldest military college in the United States was established in 1839, and the Citadel, the oldest South Carolina military college was established in 1842. All of these institutions were all-male educational institutions and all highly regarded today, though they have not remained single sex environments.
Secondary education for females was unheard of until the early 1800s, but spread rapidly once the concept began. Wesleyan College in Georgia, the first college in the world chartered to grant degrees to women opened its doors in 1836. Mary Sharp College (1853) in Tennessee and Elmira Female College (1855) in New York added to the developing list of all-female institutions of high learning.
Until recently single sex education has been an international, private or parochial educational endeavor. Public school single sex education was, in effect, outlawed by the implementation of title IX in 1972. This law made it illegal for individuals to be denied participation or benefits from any institution receiving federal financial assistance. Hence, single sex schools were given the choice of closing their doors or admitting both sexes.
In October 2006, President Bush signed legislation that made single sex education not only legal, but endorsed by the United States Department of Education as a potential strategy in increasing student achievement. Since that time educational theorists, researchers and educators have been investigating the claims associated with single sex education. Research from international, private and parochial arenas, research from medical experts on gender differences and anecdotal research has provided a knowledge base for the investigation. However, research within a public sector in this country is necessary and is currently underway to substantiate the beneficial claims associated with single sex education.
Dr. Leonard Sax, author of several books on single sex schooling and the president of the National Association for Single Sex Public Education (www.singlesexeducation.org) is spearheading a drive toward the implementation of single sex schooling across the United States. Dr. Sax, along with other prominent experts on the topic of single sex education has provided a substantial research knowledge base for the understanding of single sex schooling.
The state of South Carolina is leading the nation in the implementation of single sex schooling as a viable and effective teaching strategy to increase student achievement. David Chadwell, the head of the South Carolina State Department of Education Single Sex Education implementation effort, has provided resources, professional development and school based guidance for educators and administrator involved in the implementation of single sex schooling.
My research on single sex schooling is on going as I am working on my dissertation on single sex schooling and its impact on student achievement, attendance and discipline referrals. However, my personal experience in single sex education lends support to the theory that single sex schooling can be more beneficial than coeducational schooling to some individuals. I attended a single sex high school in Georgia just prior to the implementation of Title IX. Also, I am a 5th generation graduate of Wesleyan College, the first college established in this country to grant degrees to women.
I can think of no better environment for education than one in which individuals are not distracted by or concerned with the opposite sex, where individuals are encouraged to see no boundaries to what they can accomplish, and are valued equally by peers. Consider all research available—including anecdotal research, read articles available online or in text, visit single sex classes and then decide. Don’t simply dismiss single sex education as discriminatory or old-fashioned. You won’t believe what you’re missing.
About the AuthorKatherine Bradley, A. B.--Wesleyan College, M.ED--University of Georgia, ED.S--Lincoln Memorial University, currently working on a Ph.D. in educational leadership at Mercer University --------------------------------------------------------------------------------Comments Sun, 28 Sep 2008 at 9:41 PM, by Guest this realy helps alot.
Sat, 5 Sep 2009 at 5:50 PM, by Guest I agree!! I went to single-sex schools from pre-k through graduate school, and i would'nt have had it any other way. I absolutely feel that the education i recieved in a single-sex school was top-notch (I even met my life partner at a single-sex school!).

Prison Education

A Look at Enriching the Prison Educational Program
By Linda A. Beam
This article stresses the importance of enriching the correctional educational program through achieving an inner motivation in resident students. This inner motivation can be achieved by the resident student’s participation in instructional lessons, unique units-of-fun, that are more than just the basics. These lessons focus on experiences that the resident student may have never undertaken in real life. Studies prove that teaching through the student’s life experiences is the best method. What my article argues is that not all students have abundant life experiences upon which to draw and some have only negative experiences. Therefore, it is up to the correctional teacher to integrate into the curriculum a supplement for missed or lacking life experiences. Enriching the resident students’ minds with these supplemental and needed lessons can only improve their success for reintegration into the community and as a parent. The article gives three examples of how the correctional educator can provide these meaningful lessons. Through describing my personal lessons demonstrated in class, I hope to assist teachers in all institutes with options.
Correctional educators constantly strive to become more effective when teaching students. Seeking new ideas or striving for newer and better retention techniques are constant issues faced by a correctional educator. The basic content of the curriculum for the Adult Basic Education (ABE/GED) student is math, reading, and language. From my point of view, teaching only these ‘basic needs’ and nothing else puts a strain between educators and students. As a correctional educator, I teach the basics but also move my students beyond these. Correctional educators need to ignite their students’ curiosity and encourage motivation. Through thought provoking, instructional but fun-to-do lessons, boredom will lessen or diminish. The outcome will be continuous gains, improvement on tests, and most importantly, a successful reintegration into the community.
A research project did a study on factors in instruction that could possibly lead to increased reading and writing and to doing higher levels of learning outside of the classroom.[i] The article explained that through the use of authentic activities in instruction, which focuses on newspapers, magazines, letters, etc., the students increased the level of reading and writing. The study argues that instruction should be drawn from the actual lives of adult students.
The article also states that drawing on life experiences would be limited in a correctional setting, but teachers can be creative and can produce these ‘authentic activity’ materials. I agree that authentic activities as defined can increase interests. For example, when I use the News for You, a teaching supplement published by New Readers Press, my students really get involved with it.[ii] This is like a petite newspaper with lots of current news. I am in agreement that these so-called ‘authentic materials’ described in the study are limited in a correctional environment. However, I see a more difficult process in asking an inmate to draw upon his life experiences as the study reveals. Trying to teach resident students by drawing upon their life experiences is not easy; it is complicated for these students. Life experiences for most resident students are not bursting with enough variety. Judy Woods (2002) stated that “Teaching is not filling a bucket. It is lighting a fire.”[iii] I feel that in order to light a fire, there must be fuel in the bucket. Most resident students do not have this fuel, because their buckets do not contain enough of life experiences. Definitely, if life experiences for the resident students had been fully rounded, there would be no problem. Besides, the life experiences of most of the resident students are nothing more than street fights, trashy low-income housing, and many times difficult-life experiences. It would be difficult for any student to get enthused over such a past as the one mentioned. If correctional educators want to focus curriculum on real life experiences, then as one, I feel the need to give the resident students a chance to savor and view life in a different way by introducing some rich experiences. Through enriching the curriculum, correctional educators can supplement the resident students’ lives with activities upon which to draw. Ultimately, filling their buckets with fuel.
By enriching the curriculum taught at correctional facilities, lessons can explode into new experiences for many students. Enrichment of the prison educational program can be done through many avenues; however, I will expand upon only three main strategies. Sometimes, educators feel that being inventive or getting access to different instructional materials is not as easy as the click of a button. What I have included in this article are plans that spurred inexpressible interest in my students. Through this article I will assist educators to explore and develop curricula that will stimulate interests in their students. These unique units-of-fun goad the minds of the students and keep them wanting and waiting for more. Ultimately, it will fill their minds with wonderful thought-provoking experiences and enhance life memories.
HOW? Firstly, capitalize on specific hobbies whether it is the teachers’ or the students’. Hobbies are loaded with countless learning potential. Secondly, use multicultural activities so that the students’ minds can incorporate a better understanding of how important it is to learn about cultures. Understanding cultural studies is probably foreign to many resident students. In many instances, the closest some resident students get to know about cultural differences is from eating at Chinese restaurants. Thirdly, produce learning modules that I call ‘conglomerates’ from which to teach by. Conglomerates are, in a geological sense, clusters of different materials such as pebbles and gravel cemented together into a rock. Used in the same way are the educational conglomerates: different materials cemented together into a solid learning module.
The first activity might be a real challenge, taking into consideration the environment. It is mirrored after the show-and-tell technique. I utilize my hobbies. Of course, drawing upon the student’s hobbies also works. Of my show-and-tell schemes, two projects were the more successful. The first was on the subject matter of rocks and minerals. Being a rock hound since youth and after getting permission from security (a must when working in corrections), I loaded up a carrier with many different rocks and brought them into class. The students were greatly impacted and mesmerized by all the different colored rocks and minerals and the diverse shapes. After letting the students view and touch the rocks, I randomly picked up certain rocks and talked about them. Many students knew nothing about rocks and minerals. I asked my students if they were aware that a rock could float or knew that crystals grew inside some rocks called geodes. The knack of the rock and mineral adventure is to cite examples of rocks and minerals that are UNIQUE in nature.
Unique, bizarre rocks act as magnets and draw the students into the learning module. My first choices of rocks to talk about were pyrite (fool’s gold), geode (hidden crystals inside), mica (transparent layers), pumice (a rock that floats), fluorite (a crystal always found growing in a diamond-shape), and others. In addition to the discussion, handouts were used with the lesson. One handout was on mineral uses and another defined the three main groups of rocks. For the last handout, the student was to choose one rock that was interesting to them and describe why it was interesting. After choosing the rock, they were asked to describe the rock on paper. Each student was instructed to do research on his stone. The class enjoyed the final handout the most. In finalizing this activity, the students were given a chance to show their selected rock and to tell the class about its secret. Words cannot describe the curiosity or passion of the students. This activity furthered their knowledge in life's miracles and furthered their experiences.
The second activity I used in my classroom was a mini-cultural event, the culture of the Native American Indian. The outcomes of teaching about cultures lend to the students' recognition of diverse cultural groups and to a better interaction and appreciation for people with different views. I introduced the lesson by using the words of a poet, who stated that “All the colors are tied.” [iv] I explained that given any nationality today, they are one of these four colors: black, brown, white, and yellow. Being born half Native American and being active in the Indian community, I had many things I could bring into the classroom. I packed up an assortment of items: some regalia (outfits), jewelry, pipes, and fans. Again, with working in corrections, permission must be given for many of these things. These items were on display for the students to see as they entered into the classroom.
Because Native American regalia are colorful and very artsy, the students went straight up to the items upon entrance. They were drawn to and excited about the display. Many students had never been exposed to Indian things at such a close proximity. After the students sat down, I discussed the high probability of half the students sitting in the room having some percentage of Indian. I talked about how many Americans stereotype Indians, caused by watching too much television. I related to the students that by knowing about different cultures is to understand about cultures. I spoke on the present life of Native Americans and how they are just like everyone else with the same feelings and the same problems.
Next, I randomly picked different items from the display and discussed the importance or history of them. One item I chose was the Cherokee Tear Dress. I pointed out that it was sewn together from material that was torn into strips to make the dress plus it was called a Tear Dress in reference to the Trail of Tears that Cherokees were made to endure.
In order to make provisions for addressing diversity even more; I talked a little about the history of the Native American people, which is different from what is taught. I stated that according to Kentucky history, no Indians lived here; they only hunted here. However, research had been done on Kentucky Indians and found documented proof that Indians not only hunted in Kentucky but also lived here. Next, I mentioned several books for them to read if interested in knowing more about the Native American culture.
To build more exposure to the Indian culture, I disclosed that some items on display had great significance to the Native American; one such item is the pipe. The pipe is very sacred to the Sioux. It is one of their sacred objects used in their ceremonies. The legend of the White Buffalo Calf Woman is that she gave the Pipe Ceremony to the Sioux. I communicated to the class that this legend is still told; however, all tribes have variations in their beliefs. One variation is that the Cherokee people believe the tobacco is considered sacred. The pipe, to the Cherokee people, is merely a tool for holding the sacred tobacco. I stated that the significance of the pipe is different from tribe to tribe. The students were very surprised to know there are many differences among Native Americans.
To finalize my lesson on Native Americans, I addressed Native American jewelry. I revealed that jewelry is considered just as significant and is one of the most beautiful items of Native Americans. I talked about symbols in the beads on the jewelry and the fans. To give students the idea of the symbols, I showed one item with a seven-sided star. I explained that the Cherokees use the seven-sided star as a motif in much of their jewelry items, and that this star represents the seven clans of the tribe. This little presentation gave them a glimpse into the creativity, the history, and the diversity of the Native people.
Following the lesson plan, the resident students' enthusiasms peaked as they embarked on their assignment. The students were assigned to read a handout on the Treaty of New Echota, 1835, which is a government document. It disclosed information about the Removal Act signed by the president, Andrew Jackson. The handout revealed information about the many Indians who were removed by force and driven to the Indian Territory in Oklahoma. And how that after five years, Cherokee Chiefs signed a treaty in New Echota, the Cherokee capital, giving up claims to their homelands. The students read about the many Cherokee people who died in the journey to the new land. The students learned that this forced walk became known as the Trail of Tears. After reading the handout and discussing it, the students indicated that they were more endeavored to become aware of the different cultures.
The final activity to be used in the classroom is achieved by using a conglomerate. In a conglomerate, you can use many different media to create one teaching module. My choices of media to present my lesson were stamps, posters, and dolls from my hobbies. Most people do not know the wealth of information hidden in hobbies. I chose these because they were different in character than both the rocks and the Indian culture. It could be a new experience for those who had no prior concept about stamps or dolls. I explained that they needed to be aware that stamps are more than mere objects for mailing packages and letters. Plus, they needed to know that dolls are more then mere objects for kids to play with.
As an introduction to my conglomerate, I began revealing the facts about stamps and dolls. I stated that many students, as well as the population in general, have no idea of the historical nature to be learned from dolls. I reported that certain dolls can provide a peek into the past while others can tell us about the historical events happening in the periods when the doll was produced. Additionally, I communicated to the class that dolls were used in advertisements. They advertised for the war (G.I. Joe), for the rise in the motion pictures (character doll such as Shirley Temple), or for promoting a business (Aunt Jemima rag doll). I explained that dolls reflected the history of nations and countries in many ways. This concept of learning about our past through dolls is foreign to most people.
In addition to learning history from dolls, I stated that you could learn about costumes. Many dolls are dressed in national costumes of various countries. Dolls are also dressed in traditional costumes; for example, the Eskimo dolls are made from sealskin and whalebone. Many traditional costumes have symbols painted on them that have meaning for the tribes and tribal families. I explained that doll costumes are shown during special festivals in Japan. These festivals were celebrations as well as a time to display family dolls that had been handed down for generations.[v] Through the dolls, Japanese children learned about their country’s culture and the history of their ancestors. The students listened intently as the meaning of dolls poured forth.
I explained to the students that stamps, like dolls, can also teach about the history of a country or specialize in showing specific things such as birds, dinosaurs, rare ancient cars, and ships to name only a few. Stamps also portray famous men and women such as Benjamin Franklin or the Queen of England. I commented that a stamp could provide us with a look into art and its artists. I revealed that stamps could take us on trips to foreign places. They can tell us about our past events.
My conglomerate was of dolls, posters, and stamps that were symbolic of the effects that World War II had on women. Setting up the conglomerate is fun and important to the lesson. The display sets the mood and lends a peek into the discussion. The posters used in the conglomerate were Rosie the Riveter Poster: World War II and Girl He Left Behind. The stamps used were Japanese stamp of Blue-eyed Dolls, Rosie the Riveter, and Gold Star Mothers. The dolls merged all the items into a single unit. The dolls on display were Madame Alexander’s Rosie the Riveter and Vogue's WAVE-ette. Put together into one unit, this conglomerate was a very powerful resource to teach about how World War II affected American women.
To describe the posters on view, they both displayed a Rosie the Riveter character. The Rosie the Riveter poster displayed Rosie flexing her arm muscle with the words, “We Can Do It!” towards the top. The Girl He Left Behind poster shows Rosie holding a wrench and with a soldier silhouette in the sky. Below Rosie are the words, “The Girl He Left Behind is Still Behind Him. She’s a WOW.” These posters showed American women hard at work in defense of their spouses and their country.
My introduction was a discussion on how wars changed things. I talked about how that before World War II, most women took care of the children and stayed at home. However, this war brought many changes. The American men were leaving and this created many job vacancies. I asked the class if they had heard of Rosie the Riveter. I was surprised that no one knew of or heard of her. I discussed of whom she symbolized and how she became the symbol for the millions of women who worked in America during World War II. I commented that Rosie the Riveter was created as a campaign to employ women in the workforce. Women were needed to fill vacant job positions and to fill jobs created by the demands of wartime. Therefore, Rosie the Riveter was a fictitious person created by the government to help fill these jobs. I commented that in particular, the Rosie the Riveter character was on display just about everywhere and on everything. Rosie had rosy cheeks, wore work clothes, and handled factory machinery.
Another important fact that was discussed was that all nations during wartime, including the United States, used propaganda strategies to promote patriotism. I explained that besides radio broadcasting and motion pictures, posters were used for propaganda purposes. I pointed out that numerous posters for advertising women's roles were created. These posters were utilized to promote the armed forces, the working woman, and the women in support. It was a widespread campaign technique to promote the war. The posters displayed in America at this time were pictures of WAVES, of WACS, of Rosie the Riveter, and many other posters of the WWII women, and they were a big success. I revealed that during WWII, the WAVES (Women Accepted for Volunteer Emergency Service) were established. I talked about the opportunities that opened up for women. The students were enthusiastically scanning all the items on display throughout my discussion.
For more background and history, I discussed that during this time, dolls played a powerful role in shaping America's future. I explained that dolls were used as another advertising technique for WWII efforts. I explained there were many doll icons of WWII that inspired patriotism. The WAVES and WACS directors previewed a doll in its uniform and both directors stated that this doll was “most important” to the war effort. As a motivator, I showed the class an old ad of Vogue's war dolls. In Vogue’s ad which pictured the WAVE and WAC dolls, it reported, “In keeping with the fast-moving American picture of today, Vogue dolls are designed to express America-on-the-March-to-Victory.”[vi] On display coupled with the posters was the Vogue WAVE-ette doll in her replica of the uniforms worn by the women’s branches of the armed services. The WAVE-ette doll wears Navy cotton coat adorned with brass buttons and the WAVE insignia on the cap. This doll symbolized the fact that women could now enlist in the military.
Madame Alexander, I explained, also made dolls that honored these wartime moments. I reported that one of the most important dolls created by Madame Alexander was none other than Rosie the Riveter. On display and included with the doll were a lunch box and a small poster of Rosie with the words “We Can Do It”. Rosie wore a red bandanna around her head and a blue work uniform. These heroic dolls and posters were used to encourage women to leave their domestic life and to go to work outside of the home to show their support to their husbands and to the war efforts. I explained that it was a proud time for women so it is no shock that North America actually prospered during WWII while other nations suffered major hardships and widespread destruction.
The next step was to focus attention on the stamps. As an introduction to one stamp in particular, I discussed the history of the American Blue-eyed dolls. Before WWII there was tension between Japan and the United States, I explained that American children sent dolls to the children in Japan as a sign of goodwill and peace. These dolls were known as the American Blue-eyed dolls. They were welcomed and distributed throughout Japan. Their name was based on a popular song entitled “Blue-eyed Doll” by Ujo Noguchi.[vii] Unfortunately, when the war broke out in 1941, the ill treatment of Japanese enemy aliens (immigrants) here in America and the confinement of them in the relocation camps, resulted in Japanese officials ordering the American Blue-eyed dolls to be destroyed. Japanese women, faced with the torment of taking a doll from their children, were ordered to destroy the doll. I discussed that despite the order, many Japanese women and teachers hid and preserved the dolls and about 300 out of about 12,000 dolls were saved from this terrible destruction.[viii] But, in 1989, Japan issued a stamp to commemorate the Blue-eyed Dolls. This was the stamp on display showing a drawing of the doll that was destroyed. Giving reference to this stamp highlighted an even more extensive background on the effects that wartime had on women across the world.
There were other stamps on display that portrayed the patriotism of women. I pointed to the Gold Star Mothers stamp and explained that it was issued to commemorate mothers who had lost a child in WWII. It was for those mothers who sacrificed their loved ones; it was a commemoration. The other stamp I had on display was the Women Support America in World War II stamp showing Rosie the Riveter. The label read, “Millions of women join war effort, 1942.”[ix] I reported that according to the publication by the U.S. Postal Service, “The women who answered their country’s call …forever changed women’s roles in the American labor market.”[x] Within each discussion, the major concepts were built in a sequential fashion. As one of the follow-up activities used for this conglomerate, I asked the students to write, in their own words, a summary of what they learned new from the lesson.
Using conglomerates like this one helped to teach resident students and to give these students an advantage. It developed curiosity and encouraged motivation through the use of visual aids. The visual aids were plentiful and geared the discussion to the projected outcome. These educational conglomerates and the other educational options were utilized to conclude that correctional educators can, indeed, provide the life experiences in which are lacking in many of the resident students. Again, I argue that as a correctional educator, I feel the need to supplement the basic studies with a thought provoking, instructional fun-to-do lesson such as described above that will enrich minds and improve re-integration back into the community.-------------------------------------->>>>[i] Comings, John. "How Literacy Research Can Help Correctional Educators", Pages 53-56. The Journal of Correctional Education. Correctional Education Association, Volume 52, Issue 2, June 2001.
[ii] News for You, published weekly by New Readers Press, Division of Pro-Literacy Worldwide, Syracuse, NY.
[iii] Wood, J. (2002). “The SAALE Model for Reaching the Hard to Teach”. Midlothian, Virginia.
[iv] De Varona, Frank. Chapter One “Who We Are”. Perspectives: Authenic Voices of Latinos. 1996. Curriculum Associates, Inc. North Billerica, MA 01862
[v] Noble, John. “Doll”. Pages 287-296. World Book of Encyclopedia, 1989, Book D. Vol. 5. World Book, Inc. Chicago, London, Sydney, Toronto.
[vi] “WAVES”. Pg. 1. Microsoft Encarta Encyclopedia 2000. 1993-1999 Microsoft Corp.
[vii] Gordon, G. “American Blue-eyed Dolls History”. 05/26/2006 Website http://wgordon.web.wesleyan.edu/dolls/american/history/index.htm
[viii] Gordon, G. “American Blue-eyed Dolls History”. 05/26/2006 Website http://wgordon.web.wesleyan.edu/dolls/american/history/index.htm
[ix] United States Postal Service, Women on Stamps. Publication 512, April 2003. Page 24. Produced by Diversity Development.
[x] United States Postal Service, Women on Stamps. Publication 512, April 2003. Page 24. Produced by Diversity Development.

About the Author
By Linda A. Beam2928 Hillsboro RoadCampbellsburg, KY 40011(502) 532-6453http://lbeam0001@kctcs.edu Associate Professor KCTCS/LaGrange Education Center,
I am an Associate Professor at the Kentucky Community Technical College System/LaGrange Branch Campus located at the Kentucky State Reformatory (KSR). I teach G.E.D. subjects to resident inmates at this facility. Being of Native American descent, I am a frequent presenter of Native American topics at KSR especially for our EdTV program. I am a graduate of the University of Louisville with a Masters of Art in Teaching degree.