Tips how to prepare resume in proper manner

Posted by Unknown Jumat, 30 November 2012 0 komentar


A resume is a document used by individuals to present their background and skill sets.Resumes can be used for a variety of reasons but most often to secure new employment.A typical resume contains a summary of relevant job experience and education. The resume is usually one of the first items, along with a cover letter and sometimes job application packet, that a potential employer encounters regarding the job seeker and is
typically used to screen applicants, often followed by an interview, when seeking employment.

Here is the some tips for those we are applying for or looking at to prepare a resume.


1.Always use pdf form to send the copy of your resume as this makes maximize the impact. Many of them sends the copy in doc format but it is not compatible with different operating systems. So prefer PDF format to sends the copy

2. Use numbers to showcase your contribution's rather than it showing in compressed manner

3. Use Top-bottom approach, in that we have highlight our main outstanding achievements on the top right after your educational background information, because placing our outstanding achievements on bottom might not get the desired attention

4. Synchronize the resume according to the positions applied for and addressing it to the respective person gets you bonus points

5. Avoid the usage of different fancy and complicated fonts. Prefer ordinary fonts and also checks the font size

6. Don't Copy/Paste, this is very common many people just copy and paste the career objectives, hobbies,strengths e.t.c. Avoid that type of activities as Employers looks for initiators and innovators

7. Page limit is also an important factor in preparing a resume, according to traditional advice this has to be stick in one page resume, and squeeze everything in it.

Baca Selengkapnya ....

Build your stamina: foods that helps to build your stamina

Posted by Unknown 0 komentar
Hi friends here we suggest some foods that helps to build your stamina. So try to include these foods in your diet.

1. Beans: beans are good sources of Minerals and Iron. So it helps to increase the red blood cells. as we know Red blood cells helps us to carry the oxygen to heart and muscles.


2 Coffee: coffee gives instant energy and makes our body active quickly.

3 Green Leafy Vegetables: Green leafy vegetables provides good amount of proteins to our body and also it increases the red blood cells count. As they are rich in fiber it boosts the digestive system and helps to increase the glucose levels in the blood.

4. Banana: bananas are rich in potassium , we have to include the foods in our diet the which are high in potassium because it provides the sufficient minerals required for the body and also increases our concentration power on work.

5. Peanut (Ground Nut): peanuts are rich in omega fatty acids that helps our body to bear and minimize any pains. Bananas boosts the brain active and monetize the heart health.

6 Meat : Meat likes fishes, chicken are the rich sources of proteins as it helps to strengthen the muscles, so it is important include meat in our diet.

7. Red Grapes : Red grapes have resverotal that helps us to get energy instantly and also it have the less amount of sugar that boost the energy to our body


8. Beet root juice : Beet root have rich sources of vitamin A and Vitamin C. It actives the body and gives maximum amount of energy to the body from being tired.

9. Quinoa grain crop: It contains good amount of Magnesium, potassium, amino acids, minerals, vitamins and fiber that helps to get instant energy and makes the body active.




Baca Selengkapnya ....

AP inter first and second year march time tables 2013 Bieap.gov.in

Posted by Unknown 0 komentar
Andhra Pradesh junior and senior intermediate public examinations time tables 2013 were announced recently by the Board of Intermediate Education Andhra Pradesh (BIEAP) bieap.gov.in

First year AP intermediate exams held from 06-03-2013 to 22-03-2103 and second year AP intermediate exams held from 07-03-2013 to 23-03-2013. Then comes to practical examinations, from this year practical examinations are to be held in jumbling system from 06-02-2013 to 23-06-2013. There are 9,83,418 students are going to appear for intermediate first year examinations and 9,94,001 students are going to appear for intermediate second year examinations. Here is the time table for both junior and senior inter examinations 2013.Click on the image below to see in bigger size



Baca Selengkapnya ....

Make attractive Flowers by Tissue Paper

Posted by Unknown Kamis, 29 November 2012 0 komentar
Hi friends you are well known about the Crafty work.It is good to learn and it is fun too.

Let see the whole procedure in step by step for making an paper to an Beautiful Flower. . . . .


Step 1


  • Use Eight or Twelve Sheets of Tissue Paper
  • Fold them into a Concertina.
Note-We Recommend the 200mm Square of Tissue Paper, because it is fully meet when assembled

The folds should be about 15-20 mm wide


Step 2 - Wrap a green pipe cleaner around the centre of the concertina and twist it tight - not too tight though as it will rip the paper..




Step 3 - If you shape both ends of the concertina with scissors, you will get a different shaped flower - it's nice if you round the end off or snip into the end, which will give you the finishes shown at the top of this page.

Then start opening up the tissue paper - spreading it out as much as possible to make a full flower.







Step 4 - A bit of teasing should give a full flower effect.




Hope you like my post.........


Baca Selengkapnya ....

Common Core: Sound Education Practice or Bad Gamble?

Posted by Unknown 0 komentar
Now that 45 states (and 3 territories) have adopted the Common Core Standards, edu-preneurs and opportunists have gone into overdrive, churning out tons of materials, programs, and trainings to help schools and school districts implement these standards. Not a day goes by that I don't receive 15 or so emails from companies and individuals offering their wares and promising successful and complete implementation of the Common Core Standards.

 By all this hype, one would be tempted to think that the whole idea of having national standards was more about providing enterprising individuals and other entrepreneurs another opportunity to make millions from the public coffers.  Is the Common Core just another opportunity for making money, or is it a 21st century policy decision? Or, is it a continuation of a outdated education paradigm that refuses to die? Could it be that the Common Core adoption is nothing more than a "wrong bet" as education researcher and author Yong Zhao calls it?

In his latest book, World Class Learners: Educating Creative and Entrepreneurial Students, Zhao writes:

"The traditional education paradigm may have worked before but it is no longer adequate for the changed world. The efforts to develop a common curriculum, nationally and internationally, are simply working to perfect an outdated paradigm. The outcomes are precisely the opposite of the talents we need for the new era. It is the wrong bet for our children's future."

The thought that "If we just have the right standards, the right tests, then our students will achieve still blindly sees students as products to be developed. As long as we continue to view education as a process by which we bring students up to "standard" and not to their true potential, we are doomed to remain in the same cycle of education reform we've been in since the 1950s. Over and over, the political mantra has been, "We've got to raise educational standards!" Yet, little really every changes in our American education system. We are, in a word, hung up on a core assumption that education is something done to students rather than something they engage in.

I would like to hope that somehow the Common Core is an answer to our educational problems, but my own experience and knowledge tells me that it very well could be the "wrong bet" as Zhao calls it. Here's where some of my own skepticism lies:

  • There is no research that says having common standards is going to somehow better meet the needs of 21st century students.Some will say "Common sense tells you that having common standards will raise the achievement of all," but then again, "It was common sense that told us the world was flat too."
  • Common standards by its very nature assumes students have common capabilities, abilities and talents to some degree. Reality tells us something much different. Students have all manner of abilities and talents, and being able capitalize on individual talents and abilities rather than trying to standardize each child is what education should be about which is not what the Common Standards movement is about.
  • The Common Core Standards movement is at its core more about having "standards for comparison purposes" than it is about truly meeting the individual needs of students. When politicians, policy-makers, and education leaders are more interested in developing a system that allows them to say "Our education system is better than yours," the needs of individual students suffer. The assumption that "we need to be able to compare students" is perhaps faulty to begin with. Students, and human beings, are different, and can't be considered cogs in a system.
  • We are truly deceived if we think having the bragging rights of saying "US students lead the world in test scores" is going cause companies to suddenly relocate jobs and businesses in the states. Businesses move to other countries for economic reasons: they move to where labor is cheapest, period. To argue that "test-score bragging rights" will suddenly turn around our economy ignores the reality that businesses want cheaper employees, not necessarily more educated ones.
I know those who developed and have been trying to sell the Common Core mean well. Educators in the US have meant well all the way back to Sputnik and beyond. Still, I think it is important for us to remain skeptical as well, especially of initiatives like the Common Core implementation. A great deal of money and effort is being put into this education reform, and I can only hope it is more about the kids we teach every day, than business opportunity and professional advancement and political bragging rights. I just hope we haven't made the wrong bet.

Baca Selengkapnya ....

5 Principles That Make Outdated Educational Practice Impossible

Posted by Unknown Rabu, 28 November 2012 0 komentar
Last night, the #edchat topic was, "How should teachers deal with colleagues who are comfortable with 19th century and punitive measures for non-compliant students?" Judging by the responses, many teachers either felt they could gently prod this colleague to changing his or her practice. Others did not see this their responsibility at all. They saw it as the responsibility of the administrator.

At first glance, I would agree that the administrator does have the responsibility to address the issue of teachers using outdated practices. However, I think the real solution is a bit more complicated and can be captured with another question: How can a teacher engaged in outdated pedagogy and practice possibly exist in a true 21st century school? Should the school environment not be so innovative and challenging that such teaching is impossible? Perhaps the real problem is that we have been fooling ourselves into thinking our school is a "21st Century School" when it's not. Just maybe our school systemically allows teachers to continue do what they've always done and avoid growing personally and professionally

As long as you have a school, school district, and school system that allows people to use "outdated methodology in instruction and educational practice" such practices are going to exist. In other fields such as medicine, obsolete practice is rooted out by a culture that values innovation and pushes out obsolescence. Why can't schools foster that same kind of culture?

What would a school or school district that has a culture that makes obsolete educational practice impossible look like? What are the operating principles? Here are some ideas to start with.

1. A strong expectation of personal and professional growth permeates the school and school district environment. Everyone, beginning with leadership, are lifelong learners, and their every action is focused to that end. There's an attitude of perpetual learning and professional development surrounding everything that is done.

2. The school and school district culture values risk-taking more than playing it safe. Valuing risk-taking takes courage from leadership and everyone else. It means accepting failure as part of learning. Leadership that values risk-taking can't ask others to take risks if they themselves aren't willing to do so.

3. Leadership in the school includes more than the principal. When the leadership includes strong teacher leadership, it is difficult for those not growing professionally to exist. Teacher leadership means there are peers pushing those teachers to develop professionally.

4. Collaboration among staff is the norm. When issues and problems and challenges are viewed as "our issues/problems/challenges" then everyone is expected to be a part of the solution. This means those who are hanging on to outdated practice find it more difficult to do so. Their colleagues are pushing them to take ownership of the school's future and they can't continue to exist in their tiny isolated compartment within the school.

5. There's a strong sense of entrepreneurship among staff regarding the school. They feel that it is "their school." Staff who feel this aren't just provided a token opportunity to give feedback on School Improvement Plans. They have a say in the direction and focus of the school because it is genuinely their school too. Teachers engaged in obsolete practice can't continue to operate in an obsolete manner because colleagues push them to do better.

So, in answer to last night's #edchat question, "How should teachers deal with colleagues who are comfortable with 19th century methods and punitive measures for non-compliant students?" I submit that the answer isn't just a question of what the teacher should do or what the principal should do. It is a systemic problem that can only be addressed by creating places that make obsolete educational practices impossible. It's a question addressed by creating a school or school district culture that will not tolerate obsolete educational practice.

Baca Selengkapnya ....

Tips to instantly build your self confidence

Posted by Unknown 0 komentar


How to Build Self Confidence



boost your Confidence










1. Dress Sharp

Although clothes don’t make the man, they certainly affect the way he feels about himself. No one is more conscious of your physical appearance than you are. When you don’t look good, it changes the way you carry yourself and interact with other people. Use this to your advantage by taking care of your personal appearance. In most cases, significant improvements can be made by bathing and shaving frequently, wearing clean clothes, and being cognizant of the latest styles.
This doesn’t mean you need to spend a lot on clothes. One great rule to follow is “spend twice as much, buy half as much”. Rather than buying a bunch of cheap clothes, buy half as many select, high quality items. In long run this decreases spending because expensive clothes wear out less easily and stay in style longer than cheap clothes. Buying less also helps reduce the clutter in your closet.

2. Walk Faster
One of the easiest ways to tell how a person feels about herself is to examine her walk. Is it slow? tired? painful? Or is it energetic and purposeful? People with confidence walk quickly. They have places to go, people to see, and important work to do. Even if you aren’t in a hurry, you can increase your self confidence by putting some pep in your step. Walking 25% faster will make to you look and feel more important.

3. Good Posture
Similarly, the way a person carries herself tells a story. People with slumped shoulders and lethargic movements display a lack of self confidence. They aren’t enthusiastic about what they’re doing and they don’t consider themselves important. By practicing good posture, you’ll automatically feel more confident. Stand up straight, keep your head up, and make eye contact. You’ll make a positive impression on others and instantly feel more alert and empowered.

4. Personal Commercial
One of the best ways to build confidence is listening to a motivational speech. Unfortunately, opportunities to listen to a great speaker are few and far between. You can fill this need by creating a personal commercial. Write a 30-60 second speech that highlights your strengths and goals. Then recite it in front of the mirror aloud (or inside your head if you prefer) whenever you need a confidence boost.

5. Gratitude
When you focus too much on what you want, the mind creates reasons why you can’t have it. This leads you to dwell on your weaknesses. The best way to avoid this is consciously focusing on gratitude. Set aside time each day to mentally list everything you have to be grateful for. Recall your past successes, unique skills, loving relationships, and positive momentum. You’ll be amazed how much you have going for you and motivated to take that next step towards success.

6. Compliment other people
When we think negatively about ourselves, we often project that feeling on to others in the form of insults and gossip. To break this cycle of negativity, get in the habit of praising other people. Refuse to engage in backstabbing gossip and make an effort to compliment those around you. In the process, you’ll become well liked and build self confidence. By looking for the best in others, you indirectly bring out the best in yourself.

7. Sit in the front row
In schools, offices, and public assemblies around the world, people constantly strive to sit at the back of the room. Most people prefer the back because they’re afraid of being noticed. This reflects a lack of self confidence. By deciding to sit in the front row, you can get over this irrational fear and build your self confidence. You’ll also be more visible to the important people talking from the front of the room.

8. Speak up
During group discussions many people never speak up because they’re afraid that people will judge them for saying something stupid. This fear isn’t really justified. Generally, people are much more accepting than we imagine. In fact most people are dealing with the exact same fears. By making an effort to speak up at least once in every group discussion, you’ll become a better public speaker, more confident in your own thoughts, and recognized as a leader by your peers.

9. Work out
Along the same lines as personal appearance, physical fitness has a huge effect on self confidence. If you’re out of shape, you’ll feel insecure, unattractive, and less energetic. By working out, you improve your physical appearance, energize yourself, and accomplish something positive. Having the discipline to work out not only makes you feel better, it creates positive momentum that you can build on the rest of the day.

10. Focus on contribution
Too often we get caught up in our own desires. We focus too much on ourselves and not enough on the needs of other people. If you stop thinking about yourself and concentrate on the contribution you’re making to the rest of the world, you won’t worry as much about you own flaws. This will increase self confidence and allow you to contribute with maximum efficiency. The more you contribute to the world the more you’ll be rewarded with personal success and recognition.

Baca Selengkapnya ....

PAN Card : Basic knowledge about PAN Card

Posted by Unknown 0 komentar

Hi Friends today I am going to explain about PAN (Permanent Account Number) card

what is Pan card

PAN is a 10 digit alpha numeric number, where the first 5 characters are letters, the next 4 numbers and the last one a letter again. These 10 characters can be divided in five parts as can be seen below. The meaning of each number has been explained further.
1. First three characters are alphabetic series running from AAA to ZZZ
2. Fourth character of PAN represents the status of the PAN holder.

• C — Company
• P — Person
• H — HUF (Hindu Undivided Family)
• F — Firm
• A — Association of Persons (AOP)
• T — AOP (Trust)
• B — Body of Individuals (BOI)
• L — Local Authority
• J — Artificial Juridical Person
• G — Government

3. Fifth character represents first character of the PAN holder’s last name/surname.
4. Next four characters are sequential number running from 0001 to 9999.
5. Last character in the PAN is an alphabetic check digit.
Nowadays, the DOI (Date of Issue) of PAN card is mentioned at the right (vertical) hand side of the photo on the PAN card. .........!

If you like my post, show your appreciation with your comments....

Baca Selengkapnya ....

Amazing Venus the Two-Faced Cat a Mystery

Posted by Unknown 0 komentar

Venus the two-faced cat is currently the most famous feline on the planet. Famous feline may have different DNA on each side of her body.

The three-year-old tortoiseshell has her own Facebook page and a YouTube video that's been viewed over a million times, and appeared on the Today Show last week. (Watch National Geographic cat videos.)



Two faced cat mystery

One look at this cat and you can understand why: One half is solid black with a green eye—the other half has typical orange tabby stripes and a blue eye.

How does a cat end up looking like that? Leslie Lyons, a professor at the University of California, Davis, who studies the genetics of domestic cats said she's never seen a cat exactly like Venus.

"She is extremely, extremely rare," Lyons said. "But you can explain it and you can understand it."

Baca Selengkapnya ....

Heart touching Story: Dedicated to all the women

Posted by Unknown 0 komentar


A little boy asked his mother, "Why are you crying?" "Because I'm a woman," she told him.
"I don't understand," he said. His Mom just hugged him and said, "And you never will."

Later the little boy asked his father, "Why does mother seem to cry for no reason?"

"All women cry for no reason," was all his dad could say.

The little boy grew up and became a man, still wondering why women cry.

Finally he put in a call to God. When God got on the phone, he asked, "God, why do women cry so easily?"

God said, "When I made the woman she had to be special.

I made her shoulders strong enough to carry the weight of the world,

yet gentle enough to give comfort.

I gave her an inner strength to endure childbirth and the rejection that many times comes from her children.

I gave her a hardness that allows her to keep going when everyone else gives up, and take care of her family through sickness and fatigue without complaining.

I gave her the sensitivity to love her children under any and all circumstances, even when her child has hurt her very badly.

I gave her strength to carry her husband through his faults and fashioned her from his rib to protect his heart.

I gave her wisdom to know that a good husband never hurts his wife, but sometimes tests her strengths and her resolve to stand beside him unfalteringly.

And finally, I gave her a tear to shed. This is hers exclusively to use whenever it is needed."

"You see my son," said God, "the beauty of a woman is not in the clothes she wears, the figure that she carries, or the way she combs her hair.

The beauty of a woman must be seen in her eyes, because that is the doorway to her heart - the place where love resides."

You now have two choices. Like this photo and move on with your life
OR
Share this photo on your wall as a tribute to all the women in your life

Baca Selengkapnya ....

3 Reasons to Purchase a Kindle Tablet Rather than a Nook Tablet

Posted by Unknown Selasa, 27 November 2012 0 komentar
Now that I have had the opportunity to test drive a Nook Tablet, I can say, without a doubt, if you’re looking for an e-reader, you may want to consider purchasing a Kindle, rather than a Nook.

First, not all the books I purchase through Barnes and Noble are available across all my devices. For example, I purchased a special edition of a book entitled Crucial Conversations, and I am unable to access that book on my iPad. There are also at least two other titles I am unable to access either on my iPad or through using the Nook desktop app. For someone like myself, who is an avid reader, being able to access books on all my devices is vital. Unlike the Nook and Barnes & Noble e-books, every title I have purchased through Amazon has been available across every device. In the age of e-books and those of us who are avid e-readers, having anytime-anywhere access is key and the Nook fails on that count.

Secondly, the Barnes & Noble Nook tablet e-reader software makes for a “buggy” reading experience. On several occasions my reading has been interrupted with a screen inexplicably going blank, and I usually have to back out of the book I’m reading and reload it to get the text back. Also, on several occasions, the text I highlight either does not highlight, or I am unable to select specific words due to software glitches. In addition, on a few occasions, when I have tried to advance a page, the page simply would not advance. There also have been occasions when the “highlight text selection bar” freezes on my screen and I am unable to clear it. When e-reader software has this many bugs, it can make for quite a miserable reading experience. In contrast, with my Kindle Fire, I have never had any of these experiences. Avid e-readers like myself don’t mind a few bugs and quirks in the software, as long as they don’t unduly affect the reading experience. So far. my experience with the Nook e-reader software on the tablet has been borderline miserable.

Finally, the Nook PC Desktop software has many problems too. It suffers from many performance issues. It runs extremely slow in comparison to the Kindle PC software and takes much longer to load. It also suffers from strange, buggy behavior like the Nook tablet software. On several occasions, titles I have purchased, suddenly ask for credit card numbers to verify I have purchased them, even though I have purchased them. This especially happens after you download and install an update. It can be quite frustrating to have to uninstall and redownload purchased books again and again, but that is what I’ve had to do with the Nook desktop software. There are also titles I’ve purchased that I can read on my Nook tablet, but can’t access through my desktop app. Being able to read all of my purchased books on my desktop is important to me. The Nook desktop software is also prone to freezing on occasion as well, and this shouldn’t happen because I have more than enough memory and processing power. In addition to these issues, there are timee when  I highlight text and make notes on my handheld devices. These do not sync with the desktop app. This is important to me because I often highlight, read text, and make notes while using my tablet, then refer to those on my PC, but with the Nook desktop app, this is impossible. In contrast, any notes I take or textual highlights made using the Kindle handhelds appears in the Kindle Desktop app too. Over all, the Nook PC desktop app suffers from performance issues, buggy behavior, and syncing problems.

Overall, Amazon e-books and the Kindle offer readers a much better reading experience than e-books purchased through Barns & Noble and read on Nook devices. Barnes & Noble e-books and the Nook tablet suffer from performance issues that make for one frustrated reading experience.

Baca Selengkapnya ....

21st Principal’s 2012 Edublog Nominations

Posted by Unknown Senin, 26 November 2012 0 komentar
Here’s my 2012 Edublog nominations. While it is difficult to narrow down my choices, these are sites I visit and read just about every single day and important nodes in my own professional learning network. Thanks to all!

Individual Blog
Larry Ferlazzo’s Websites of the Day: Consistently, day-after-day provides links to valuable information for all educators.

New Blog
Diane Ravitch’s Blog: Diane Ravitch’s new blog gives voice to public education advocates everywhere.

Best EdTech/ Resource Sharing Blog
Free Technology for Teachers: Very reliable and consistent resource on web and technology tools for the classroom.

Teacher Blog
The Tempered Radical: An ongoing and constant voice of a classroom teacher and all things teaching.

Library/Librarian Blog
A Media Specialist’s Guide to the Internet: Site with tons of information and resources from the perspective a media specialist.

Administrator Blog
A Principal’s Reflection: Voice of an administrator who advocates for technology and leadership.
Individual Tweeter

Jerry Blumengarten Cybrary1: A trumpet blast in a 140 characters sounding the way in all things ed tech.

Twitter Hashtag
#edchat: The most influential and ongoing conversation about all things education.

Free Web Tool
Edmodo: A total online teaching environment, that I can say I have used as both teacher and administrator.

Social Network
Twitter: Most useful social media tool yet.

Mobile App
Evernote: Evernote continues to evolve and change its mobile apps, always with the end user in mind. They get better and better.

Baca Selengkapnya ....

Benefits of Drinking Warm Lemon water in the morning

Posted by Unknown Sabtu, 24 November 2012 0 komentar


Drinking Lemon water in the morning time have lot of benefits. Generally we had a cup of coffee or tea in the mornings, So why can't we replace it with warm lemon water. Below are the benefits of drinking warm lemon water in the morning.


  • It boosts the immune system because lemons are rich in vitamin C which fights against cold. They stimulates the brain function and stabilize the blood pressure as lemons are rich in potassium.
  • Drinking lemon water daily reduces the body's overall acidity
  • It helps to lose weight faster
  • Lemons increase the rate of urination in the body
  • Lemon water purges toxins from the blood which  helps keep skin clear as well. 
  • Helps to relieve tooth pain and gingivitis
  • Warm lemon water helps get rid of chest infections and halt those pesky coughs
  • lemons are chock full of vitamin C, it helps when you subject your mind and body to stress.
  • Helps kick the coffee habit
The recipe is really simple - a cup of warm water (not hot) and the juice from half of a lemon.

Baca Selengkapnya ....

Bad effects of using earphones

Posted by Unknown 0 komentar

Using Earphones is a beneficial one. You can listen to music while working, journey. However, no matter how awesome or beneficial by using earphones. On the flip side they have its effects which makes impact on the hear loss.

Hearing Loss :One of the most side effects of using earphones listening to loud music is hearing loss. If the music volume we listen exceeds to 90 decibels may face temporary hear loss.

Ear Infections : Regular usage of earphones enhance the growth of bacteria in the ears 10 times more. So limit the usage of earphones.

Decibel Ranges : loudness is measured by decibels. If we are listening to music 8 hours/day with earphones at range of 85 decibels, the you can get permanent hear loss.

Tips and Warnings

  • Limit the usage of earphones
  • Try to give 5 minutes break every hour
  • Don't use the earphones that are directly inserted into your ear canals because it increases the chances of hear loss.

Baca Selengkapnya ....

10 healthy tips to control diabetics ~ Useful info

Posted by Unknown 0 komentar

Here is the 10 Healthy handy tips for diabetics Patients which might help.


1. Take food at fixed hours. but Do not overeat.
2. Do not eat food immediately after a workout.
3. If you are on insulin, make sure you have three proper meals with light snacks in between.
4. Do not eat fast; masticate and munch your food well before you swallow.
5. Drink a lot of water that will help flush the toxins off your system.
6. Make sure the gaps between your meals are short. Avoid fried foods and sweetmeats.
7. Include fresh vegetable salad in every meal.
8. Have at least 20 to 25 grams of raw onion daily.
9. Do atleast 1 hour exercise daily.
10. Add wheat bran to your wheatflour (50% wheatflour + 50% wheat bran). This helps to increase fibre in your diet.

SHARE this post with your friends...

Baca Selengkapnya ....

Stealth Downloading via BitTorrent

Posted by Unknown Minggu, 18 November 2012 0 komentar

How To Anonymize and Encrypt Your BitTorrent Traffic from the HowToGeek

7ahgbsdh

Whether you’re trying to dodge an angry government, a connection throttling ISP, or the watchful gaze of media conglomerates, anonymizing and encrypting your BitTorrent traffic can help. Read on to learn how.
Photo by jin.thai.

 

What Is This and What Do I Need?

BitTorrent is a form of distributed file sharing. Undistributed file sharing is when you connect to a single source and download a file. When you visit a software repository online, for example, and download a new version of some application you’re engaging in an undistributed file transfer—the file went from their server directly to you.
Distributed file sharing changes that model. When you use BitTorrent, a distributed file sharing protocol, you don’t download a file from a single source but instead from any number of sources.

Everyone who is part of the swarm of file sharers using the same tracker and sharing the torrent you’re downloading can potentially send you a piece of that file. Your download is no longer between you and a single source but between everyone in the swarm and you. This means anyone can join the torrent swarm and see what files you are downloading and, in turn, uploading—reciprocating to the swarm is part of the BitTorrent model.
If that person spying in your torrent activity is a hostile government, your ISP seeking to throttle your connection, or an agent hired by a media conglomerate to monitor BitTorrent networks, you can find yourself in unexpected trouble.

How can you circumvent such outcomes? By anonymizing and/or encrypting your BitTorrent traffic.
What are the upsides? Your BitTorrent traffic will be anonymous, the IP the swarm sees will not be your actual IP address. If you choose to encrypt as well as anonymize, even your ISP—the very people with direct access to your bandwidth pipe—won’t be able to see what you’re doing. You’ll be able to use BitTorrent without fear.

What are the downsides? Proxying/tunneling can slow down your connection and encryption can further slow it down. While many people are perfectly comfortable taking a performance hit in order to better secure their BitTorrent connection, it’s something to be aware of.
Ready to get started? To anonymize and encrypt BitTorrent you’ll need the following:
  • For both techniques you’ll need a BitTorrent client with proxy support. We’re going to be using uTorrent on Windows.
  • You’ll need a proxy/SSH provider. For this tutorial we’ll be using the popular Canadian BitTorrent proxy provider BTGuard.
  • To encrypt your BitTorrent session you’ll need an additional layer of security in the form of a local proxy server that connects to your encrypted tunnel. We’ll highlight how to use both the BTGuard supplied application and the free application PuTTY to roll your own proxy server.
Our instructions will help you configure any SOCKS proxy to work with uTorrent (or another proxy-friendly BitTorrent client) but we’re going to be setting it up for BTGuard. If you don’t have an anonymous proxy yet, BTGuard is a solid choice and costs a mere $7 a month. Get your proxy information handy or go sign up for a BTGuard account here. before continuing.

 

Configuring uTorrent for Anonymous Torrent Traffic

 

2011-10-11_145756

Run uTorrent. Navigate to Options –> Preferences (or press CTRL+P) to open up the Preferences panel. From within the Preferences panel, navigate to the Connection sub-menu.
From within the Connection sub-menu, you need to fill out the Proxy Server information. For the Type select SOCKS5, for the Proxy fill in proxy.btguard.com and Port 1025. Check Authentication and fill in your Username and Password (BTGuard users will use the same username and password they created their account with). If you’re using another service besides BTGuard, simply change the previous entries to match your service providers data.

Under Authentication check all the boxes, including “Use proxy for hostname lookups”, “Use proxy for peer-to-peer connections”. Make sure to check all the boxes under Proxy Privacy including “Disable all local DNS lookups”, “Disable features that leak identifying information”, and “Disable connections unsupported by the proxy”. Failure to check these options will compromise your anonymity and defeat the whole purpose of using a proxy server.
Restart uTorrent. If you do not restart uTorrent the Proxy changes will not take effect.

 

Encrypting Your BitTorrent Connection

 

Anonymization will protect your identity but, if your ISP is throttle happy, it won’t stop them from detecting and throttling your BitTorrent traffic. If you want the extra security of encrypted traffic and/or your ISP is shaping your traffic and throttling BitTorrent connections, this is the configuration for you.
BTGuard offers a free encryption proxy that is preconfigured. In order to use the BTGuard encryption tool, first download it from the BTGuard servers here. Install the application to C:\BTGUARD (this step is extremely important, if you install it to another directory the application will not operate properly). Once you’ve installed it, run the application.

Open up your uTorrent application once again and navigate back to the Preferences menu. Within the Preferences menu replace proxy.btguard.com with 127.0.0.1 (the address of the local computer). Leave all the other settings, including your login information, the same. Restart uTorrent for the changes to take effect. You’ll still be connected to the BTGuard servers but the traffic between uTorrent and those servers will be encrypted.

Alternatively, if you wish to use an SSH service to connect to a foreign server and anonymize your traffic that way, you’ll need to use PuTTY to connect to the SSH service and create a local proxy for uTorrent’s traffic to flow through. Note, if you’re already using BTGuard you might as well use their encryption too and skip this step. If you’re using another service and want to use their encrypted SSH tunnel, keep reading.

Putty is a free Telnet/SSH client for Windows and Linux that allows you to easily route your traffic through an encrypted tunnel. Download and install PuTTY. Run the application for the first time. The first screen you’ll see is the Session screen. Here you’ll need to enter the address of your SSH provider. The default SSH port is 22; only change this port # if your SSH provider indicates you should.  Make sure SSH is checked. Go ahead and give your session a name so that you can save it for future use.

2011-10-11_154822

Navigate to Connections –> SSH. In the SSH sub-menu you need to create a new port configuration. Put a port number in the Source box (it can be any number that isn’t in conflict with your computer’s existing port structure, we used 12345) and then check Dynamic and Auto. Press Add to add the port.

2011-10-11_153949

Navigate back to the session menu and click Save to save your configuration. Then click Open to launch the SSH tunnel to your SSH host and login with your login credentials.
Once you’ve logged in via PuTTY with your login credentials you can now use PuTTY as your SOCKS server. Open uTorrent and the Preferences menu. Configure things exactly as you would for BTGuard except for the IP address put in 127.0.0.1 (the proxy server is on your computer), change the port number to 12345, and leave the Authentication section blank.

 

Testing The Anonymity of Your BitTorrent Connection

 

2011-10-11_160143

When you set up your web browser with a proxy server, it’s easy to visit a site like WhatIsMyIP to see if you’re surfing from the new IP address. What about BitTorrent? It’s not quite so easy. Thankfully there’s a service designed to help you check the IP address your Torrent client is broadcasting.
Once you’ve configured uTorrent using the above techniques (either anonymous but not encrypted with BTGuard, anonymous and encrypted with BTGuard, or anonymous and encrypted with your SSH provider of choice), it’s time to visit CheckMyTorrentIP. At CheckMyTorrentIP, click the Generate Torrent tab. Save the resulting torrent file to your computer and load it in uTorrent. It should look like this:

2011-10-11_150452

Click on the torrent and then look down in the information panel at the bottom of the screen. Click on the Trackers tab. In that tab you will get information back from the Tracker (in this case the CheckMyTorrentIP tracker.

2011-10-11_150231

See that IP address? That should be the IP address of your new proxy service and not the IP address of your internet connection. If you see the address of your internet connection and not the proxy server you need to go back and double check your configuration.
You can also visit CheckMyTorrentIP and click on the Check IP tab to see all the IP addresses your torrent file has connected from:

2011-10-11_160049

There you have it. If the IP addresses are those provided by your proxy/SSH provider and not your home IP address then you’re in the clear. All your BitTorrent traffic will be routed through that IP address and your private IP address will never be broadcast to the greater internet!

 Source: http://www.howtogeek.com/76801/how-to-anonymize-and-encrypt-your-bittorrent-traffic/?utm_source=newsletter&utm_medium=email&utm_campaign=121011&utm_content=emailsidebar


Baca Selengkapnya ....

The TOR Network

Posted by Unknown Sabtu, 17 November 2012 0 komentar

Inception

Tor was originally designed, implemented, and deployed as a third-generation onion routing project of the U.S. Naval Research Laboratory. It was originally developed with the U.S. Navy in mind, for the primary purpose of protecting government communications. Today, it is used every day for a wide variety of purposes by normal people, the military, journalists, law enforcement officers, activists, and many others.

Overview

Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.
Individuals use Tor to keep websites from tracking them and their family members, or to connect to news sites, instant messaging services, or the like when these are blocked by their local Internet providers. Tor's hidden services let users publish web sites and other services without needing to reveal the location of the site. Individuals also use Tor for socially sensitive communication: chat rooms and web forums for rape and abuse survivors, or people with illnesses.
Journalists use Tor to communicate more safely with whistleblowers and dissidents. Non-governmental organizations (NGOs) use Tor to allow their workers to connect to their home website while they're in a foreign country, without notifying everybody nearby that they're working with that organization.
Groups such as Indymedia recommend Tor for safeguarding their members' online privacy and security. Activist groups like the Electronic Frontier Foundation (EFF) recommend Tor as a mechanism for maintaining civil liberties online. Corporations use Tor as a safe way to conduct competitive analysis, and to protect sensitive procurement patterns from eavesdroppers. They also use it to replace traditional VPNs, which reveal the exact amount and timing of communication. Which locations have employees working late? Which locations have employees consulting job-hunting websites? Which research divisions are communicating with the company's patent lawyers?
A branch of the U.S. Navy uses Tor for open source intelligence gathering, and one of its teams used Tor while deployed in the Middle East recently. Law enforcement uses Tor for visiting or surveilling web sites without leaving government IP addresses in their web logs, and for security during sting operations.
The variety of people who use Tor is actually part of what makes it so secure. Tor hides you among the other users on the network, so the more populous and diverse the user base for Tor is, the more your anonymity will be protected.

Why we need Tor

Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.
How does traffic analysis work? Internet data packets have two parts: a data payload and a header used for routing. The data payload is whatever is being sent, whether that's an email message, a web page, or an audio file. Even if you encrypt the data payload of your communications, traffic analysis still reveals a great deal about what you're doing and, possibly, what you're saying. That's because it focuses on the header, which discloses source, destination, size, timing, and so on.
A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.
But there are also more powerful kinds of traffic analysis. Some attackers spy on multiple parts of the Internet and use sophisticated statistical techniques to track the communications patterns of many different organizations and individuals. Encryption does not help against these attackers, since it only hides the content of Internet traffic, not the headers.

The solution: a distributed, anonymous network

How Tor works

Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.
To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.

Tor circuit step two

Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.
For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.

Tor circuit step three

Hidden services

Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about configuring hidden services and how the hidden service protocol works.

Staying anonymous

Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.
Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.

The future of Tor

Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider running a relay or volunteering as a developer.
Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.

Source: https://www.torproject.org/about/overview.html.en

To download go here: https://www.torproject.org/download/download.html.en

Want Tor to really work?

...then please don't just install it and go on. You need to change some of your habits, and reconfigure your software! Tor by itself is NOT all you need to maintain your anonymity. There are several major pitfalls to watch out for:
  1. Tor only protects Internet applications that are configured to send their traffic through Tor — it doesn't magically anonymize all your traffic just because you install it. We recommend you use Firefox with the Torbutton extension.
  2. Torbutton blocks browser plugins such as Java, Flash, ActiveX, RealPlayer, Quicktime, Adobe's PDF plugin, and others: they can be manipulated into revealing your IP address. For example, that means Youtube is disabled. If you really need your Youtube, you can reconfigure Torbutton to allow it; but be aware that you're opening yourself up to potential attack. Also, extensions like Google toolbar look up more information about the websites you type in: they may bypass Tor and/or broadcast sensitive information. Some people prefer using two browsers (one for Tor, one for non-Tor browsing).
  3. Beware of cookies: if you ever browse without Tor and a site gives you a cookie, that cookie could identify you even when you start using Tor again. Torbutton tries to handle your cookies safely. CookieCuller can help protect any cookies you do not want to lose.
  4. Tor anonymizes the origin of your traffic, and it encrypts everything between you and the Tor network and everything inside the Tor network, but it can't encrypt your traffic between the Tor network and its final destination. If you are communicating sensitive information, you should use as much care as you would on the normal scary Internet — use HTTPS or other end-to-end encryption and authentication. HTTPS Everywhere is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites.
  5. While Tor blocks attackers on your local network from discovering or influencing your destination, it opens new risks: malicious or misconfigured Tor exit nodes can send you the wrong page, or even send you embedded Java applets disguised as domains you trust. Be careful opening documents or applications you download through Tor, unless you've verified their integrity.
  6. Tor tries to prevent attackers from learning what destinations you connect to. It doesn't prevent somebody watching your traffic from learning that you're using Tor. You can mitigate (but not fully resolve) the risk by using a Tor bridge relay rather than connecting directly to the public Tor network, but ultimately the best protection here is a social approach: the more Tor users there are near you and the more diverse their interests, the less dangerous it will be that you are one of them.
  7. Do not use BitTorrent and Tor together.

Be smart and learn more. Understand what Tor does and does not offer. This list of pitfalls isn't complete, and we need your help identifying and documenting all the issues.



Baca Selengkapnya ....
Posted by Unknown Jumat, 16 November 2012 0 komentar

Privacy Watch: Free Tool Makes You Anonymous on the Web

Illustration: Mark Matcho

No matter how meticulously you remove cookies and cleanse spyware and adware from your PC, snoops can still track your movements on the Web. The telltale sign is your IP address.
For a Web server to send your browser information, the server needs to know that you're at 192.168.234.10, for instance. Some Web servers can reveal the city you're in, the Internet service provider you use (or the company you work for), and the type of connection you have--in other words, a lot more than a cookie ever could.

Fortunately, a free tool named Tor from Electronic Frontier Foundation can close this privacy loophole. Tor--a World Class Award winner last month, and available at tor.eff.org--strips the identifying IP address from the headers of each data packet that leaves your computer, by bouncing the packet through a special network of computers called "onion routers." The trade-off for this kind of anonymity, of course, is the speed of your Web browsing. Bouncing from server to server takes time. Tor's advantage over previous anonymizing services is that it can anonymize more than browser communications. Tor works with apps like Thunderbird, Outlook, and Eudora--and with IM programs.

Before you can use Tor, you must download a small freeware app called Privoxy). After installing Privoxy, you must alter a line in one of the program's settings files so that Privoxy can talk to Tor (click here for instructions).

Without directions to send their data through Tor, your apps won't know how to transmit packets over the network. In Internet Explorer, click Tools, Internet Options, then the Connections tab, and then the LAN Settings button. Check Use proxy server for your LAN and click Advanced. In the HTTP field, type localhost; and in the Port field, enter 8118. In Firefox, go to Tools and click Options. Click Connection Settings, and in the field labeled 'HTTP Proxy' fill in the same information as outlined above for IE.

You'll have to enter these proxy settings into each app you want to use with Tor, and you'll lose a little extra time to Web browsing each day. But if you want complete privacy, it's a small price to pay.
--Andrew Brandt


Baca Selengkapnya ....

Sim card explained: A basic knowledge about sim card

Posted by Unknown Kamis, 15 November 2012 0 komentar


Friends you are well known about the SIM card.We are Providing a very Basic ,But good Information on it.Just, Because Many of the People still Dont know this.

Basically Sim Cards are Four types
Sim Card Explained

  • H1
  • H2
  • H3
  • H4

Individual info 



  1. H1= You Will Get Normal Network On This Sim card
  2. H2= You  Will Get Better Network On This Sim Card
  3. H3= You Will Get More Better Network On This Sim .It is more than H1, H2.
  4. H4= Normal, Better, More Better Is Nothing In Front OF This Sim



Agar Tum Aise Area Me Ho Jaha Tower Na Ho But Paas Ki Tower Ka Weak Signal Ho Then also you will get some bar of network on H4 sim.

It Means You Will Get The Strongest Network On This Sim

Basically H4 Sim Ginechune LogoKo Milta Hai like Corporate sim, Army Peoples Etc

But Some Company Also Provide This To Normal People Also Why Comapany Doesn't Provide This Sim To all Users

Because This Sim eat More bandwidth................

So How To Know That Wich Type Of Ur Sim is??

Just Check Its Back Side........





I hope u enjoyed my post..............

Baca Selengkapnya ....

7 Kinds of Thinking Keeping Your School or District from Transformation

Posted by Unknown Sabtu, 03 November 2012 0 komentar
Is your school or district “missing the wave of change” that is propelling many other innovative schools and districts forward? What exactly is it within the DNA and thinking of your educational organization that is causing it to resist efforts to reform, transform, or change? We only need to look to business in recent times to learn what the consequences are for “failing to adapt to the enormous wave of change” that is all around us.

In Out of Our Minds: Learning to Be Creative, Ken Robinson writes:

“Organizations that stand still are likely to be swept aside, and corporate history is littered with the wreckage of companies and whole industries, that have been resistant to change. They become stuck in old habits and missed the wave of change that carried more innovative companies forward.”

Many of our schools are “standing still” and stuck in "old habits" and are in danger of being “swept aside.” It is difficult to believe in an era of reform, but there are still educators, policymakers, and politicians who are “stuck in the old habits” of seeing education “as something done to kids,” and who see children’s learning as a “process of adding value.” Those, who hold tight to this conception of education where children are passive participants in learning, will be standing among the “wreckage” of a public education system that stubbornly held on to past era.

Believe or not, I experienced this “wave of change” at an early age. At only seven or eight years old, I experienced firsthand Ken Robinson’s phenomenon of companies “standing still in a wave of change” way back in the 1970s. My father worked for the trucking industry, which at the time was a way to make a good living. Then, deregulation came along, and many of the trucking companies refused to adapt and cope with the new world they faced, and they went under, one by one. My father worked for a series of successive trucking companies, each folding the tent when they could not longer adapt and cope with rapidly changing transportation industry. Instead of adapting to the change, they tried to ride it out, only to ride into nonexistence.

Fast forward to more recent times and we see the same thing happening again and again with businesses. If you glance back four of five years, the names of companies like Circuit City, Blockbuster, and Borders come to mind. Each of these companies stood still in the face of change and it cost them dearly. More recently, news reports speak about the struggles of Best Buy, a major electronics retailer, who is trying to cope with the rapidly changing retail environment, and who seems guilty of the same kinds of thinking these businesses had. Each of these businesses found themselves in a changing environment and made decisions, based on specific and stagnation-generating kinds of thinking. With the exception of Best Buy at this point, that thinking ended in their demise. They could not adapt.

If you examine your school or district closely, you are likely to find this same self-destructive thinking that is causing your educational organization to “stand still in a wave of change.” If it continues, then you could find yourself standing in the wreckage.

What are these kinds of thinking that are clearly obstacles to adaptation and transformation? Over the years, I have come to see them in very simple terms. Here are the top 7 Kinds of Thinking, or what I might call “Resistors to Change.”
  • “We’ve always done it this way thinking.” In public education, I have found this kind of thinking the most common. You can easily run up against this thinking by simply questioning a policy or procedure, or by suggesting a new way of doing something. Immediate replies by the institutional-preservation police are, “You can’t do it that way. We've always done it this way.” Or, more simply, “I like the way we've always done it.” At the heart of our schools and school districts are thousands of these “ways of doing things” that are protected vehemently by others, not because there is anything special about them. These are valued because they are wrongly seen as  not negotiable for change. The best antidote for this kind of thinking? Asking the simple “Why” question. If the answer is, “Because we’ve always done it this way,” then the underlying rationale might be suspect.
  • “Head in the sand thinking.” I can’t help but wonder if this was the kind of thinking Blockbuster was guilty of. They had to see streaming video services coming, especially if they were reading anything about industry trends. But just as deadly as ignoring the “waves of change” can be, so can the same head-in-the-sand habit of getting so caught up in “the doing” that you don’t see the change coming. In other words, sometimes organizations are so busy caught up in doing what they do, that they don’t pause and connect to the world around them. In that environment, it is extremely easy to miss the “wave of change” right in front of you. Schools are sometimes notorious for adhering steadfastly to motions they've always carried out, and with change roiling all around them. Each of these businesses certainly had to be guilty of some of that. They did not notice the change until it was too late. That can happen to schools too. Antidote for this kind of thinking? Simply being informed. Having the latest information goes a long way helping education organizations avoid being blindsided by change. But there must be a willingness and courage to act on that information.
  • “It’s someone or something else’s fault thinking.” Back in the 1970s, many of those trucking companies complained that is was the government’s fault they had to go out of business, after all politicians brought about deregulation. In more recent times, I am sure there were those at Borders who blamed cheap electronic books and Amazon for their demise, and currently I read  where Best Buy is blaming Amazon for their problem of decreasing sales. Schools, school leaders, and policymakers do the very same thing. It’s the teachers’ unions fault. It’s the politicians’ fault. It’s the parents’ fault. In the interest of honesty and confession, I have been guilty of this thinking myself. Still, there’s no productivity in searching for a boogie man on which to place blame. There’s certainly enough blame to go  around anyway. If you spend all your effort and time trying to find someone or something to blame, you are wasting energy and resources that could be used to adapt and meet solidly the “wave of change” that is upon you. The best antidote for this kind of thinking is perhaps to engage in looking for solutions. That way, there’s no energy to expend on blaming.
  • “You have to do it this way because policy says so thinking.” I honestly find this one of the most ridiculous reasons why we defend so much of what we do in education. Educational institutions are notorious for this kind of thinking, and often they do it much more than businesses. Businesses, to exist for any length of time, are most often forced to question what they do, and when they become too entangled in “policy-think” they lose sight of their reason for existence: making money. Then they simply cease to exist. On the other hand, schools do the same kind of thinking too, and they continue to perpetuate it. They get so caught up in “policy-think” they lose sight of their purpose too. This is most evident when decisions are made, clearly not in the best interest of kids. When adhering to a policy is more important than meeting the needs of kids, the school or district has lost sight of its purpose, and it’s reason for existence, and the world will move on without it. Antidote for “policy-think?” Spending some refocusing on why we do what we do, the kids.
  • “I’m right and everyone else is wrong thinking.” In our polarized society right now, there is a great deal of this kind of thinking, and it can have a detrimental effect on an organization facing a “wave of change.” There was a time when being “open-minded” was a virtue, and compromise was not a dirty word. Tolerance ruled the day. Now, our polarized “”I’m right thinking” has bled over into our schools too. Polarized debates on topics such as school vouchers, sex education, prayer in schools, and teachers’ unions only serve to widen the divide between people. If someone questions the effectiveness or usefulness of these measures, they are immediately attacked.We can’t have an honest look at policy change without one side or the other cooking the data, which in educational research is all too easy to do. An immense amount of effort is going into establishing the “I’m right and you’re wrong” view, and the waves of change meanwhile are slamming hard into our educational institutions. There is greater interest in proving the other side wrong, than learning the truth of what really does work. What is an antidote for “polarized thinking?” Realizing that there is nothing sacred about being right in the debate, especially when it’s more important to do what’s right for the kids.
  • “Protect our turf at all costs thinking.” I have often thought, the only people who have a claim to “turf” in public education should be the kids, and that turf is “What’s in their best interests.” When the “waves of change” started battering the trucking industry in the 1970s, I remember well how trucking company owners held strongly to their turf of wanting wage concessions and benefit reductions to preserve the company. Union trucking company workers held equal ground on these same issues of turf, and in the end, both sides lost. Companies closed, and no one had any turf to battle over any more. Fast forward today, and the recent complaints by Best Buy about Amazon seem to be the same kind of turf battle. Best Buy does not appreciate Amazon’s selling electronics and appliances to undercut their prices, so there was talk about Best Buy refusing to sell Amazon’s Kindle readers. The end result of this turf war would not improve Best Buy’s current situation against the “wave of change” that is upon them. There is just too much money to be made in electronics and appliances. Protect the turf at all costs thinking in both these cases results in both sides losing. Amazon loses satisfying customers who want to go purchase an e-reader locally. Best Buy loses that customer who came to their store to purposefully buy an ereader. In education, protect-our-turf-at-all-costs thinking is happening on multiple levels. It is most insidious at the local level, where individuals fight hard to preserve what exists because it is their turf, and they’re not giving it up. Antidote for “turf-protecting thinking is simple. Keep your eyes focused on the real reason why we do what we do, the kids. Recognize that we share a common purpose.
  • “Change for Change’s Sake thinking.” With everyone yelling about the need to reform our education system, this is perhaps one of the most increasingly common forms of thinking that keeps a school or district from moving forward. This kind of thinking is perhaps best illustrated by the argument many make for certain reforms, by simply stating, “Well, we’ve got to do something.” This kind of thinking is responsible for the endless wheel of reform, education often finds itself on. Educators and policymakers institute change because, in their view, change is called for. Never mind whether the change is sound or really addresses the issues. Many people accuse those who speak out against such reforms or proposals as “defending the status quo” or as “advocating for what is.” But “We’ve just got change this” thinking is just as dangerous to an organization as well. When Borders decided to enter the ebook market, a great deal of blood between Barnes and Noble and Amazon had already been spilt. Their decision was late, and more importantly, it was reactionary thinking. Change for change’s sake thinking is reactionary thinking without deliberation. It is deciding to take a course of action, not because it is the best course of action, but because “We’ve got to do something.” I can’t but wonder whether a great deal of our current national ed policy under Race to the Top is this kind of thinking. There is no research to support that having Common Standards, instituting merit pay for teachers, or using value-added measures is going to raise student achievement. In fact, there is some research to the contrary, yet there’s the push to implement reform, and anyone who questions it is said to be guilty of “supporting the status quo.” Change of change’s sake thinking submits to simply taking a course of action, because there’s a perceived obligation to do so. The antidote for the reactionary thinking of this kind is simply pausing and resisting the urge to do something immediately. By pausing, you buy time for level heads to prevail. 
There are certainly many other kinds of thinking that would cause a district or school to miss that “wave of change” that propels other schools and districts to successful innovation. In my experience, the forces within a school or school district employ any and all of these ways of thinking to preserve things just as they are. Let’s just hope those schools and districts don’t end up like Circuit City, Borders, or Blockbuster.



Baca Selengkapnya ....
Trik SEO Terbaru support Online Shop Baju Wanita - Original design by Bamz | Copyright of apk x8.