Visite Us

Saturday, October 08, 2011

Facebook Shares

Facebook Shares Its Cloud Designs

Cloud hardware could get cheaper because of the social network's self-interested altruism.
The machinery: A Facebook employee shows one of the servers 
that the company’s engineers designed from scratch
for its massive data center in Oregon. 
Jason Madara

If you invented something cheaper, more efficient, and more powerful than what came before, you might want to keep the recipe a closely guarded secret. Yet Facebook took the opposite approach after opening a 147,000-square-foot computing center in rural Oregon this April. It published blueprints for everything from the power supplies of its computers to the super-efficient cooling system of the building. Other companies are now cherry-picking ideas from those designs to cut the costs of building similar facilities for cloud computing.

The Open Compute Project, as the effort to open-source the technology in Facebook's vast data center is known, may sound altruistic. But it is an attempt to manipulate the market for large-scale computing infrastructure in Facebook's favor. The company hopes to encourage hardware suppliers to adopt its designs widely, which could in turn drive down the cost of the sever computers that deal with the growing mountain of photos and messages posted by its 750 million users. Just six months after the project's debut, there are signs that the strategy is working and that it will lower the costs of building—and hence using—cloud computing infrastructure for other businesses, too.

Facebook's peers, such as Google and Amazon, maintain a tight silence about how they built the cloud infrastructure that underpins their businesses. But that stifles the flow of ideas needed to make cloud technology better, says Frank Frankovsky, Facebook's director of technical operations and one of the founding members of the Open Compute Project. He's working to encourage other companies to contribute improvements to Facebook's designs.

Among the partners: chip makers Intel and AMD, which helped Facebook's engineers tweak the design of the custom motherboards in its servers to get the best computing performance for the least electrical power use. Chinese Web giants Tencent and Baidu are also involved; after touring Facebook's Oregon facility, Tencent's engineers shared ideas about how to distribute power inside a data center more efficiently. Even Apple, which recently launched its iCloud service, is testing servers based on Facebook's designs. Eventually the Open Compute Project could exist independently of the company that started it, as a shared resource for the industry.

Facebook's project may be gaining traction because companies that manufacture servers, such as Hewlett-Packard and Dell, face a threat as business customers stop buying their own servers and instead turn to enormous third-party cloud operations like those offered by Amazon. "IT purchasing power is being consolidated into a smaller number of very large data centers," Frankovsky says. "The product plans and road maps of suppliers haven't been aligned with that." Being able to study the designs of one of the biggest cloud operators around can help suppliers reshape their product lines for the cloud era.

However, not everyone wants servers to run just like Facebook's, which are designed specifically for the demands of a giant online social network. That's why Nebula, which offers a cloud computing platform derived from one originally developed at NASA, is tweaking Facebook's designs and contributing them back to the Open Compute project. Nebula CEO Chris Kemp says this work will help companies that need greater memory and computing resources, such as biotech companies running simulations of drug mechanisms.

Larry Augustin, CEO of SugarCRM, which sells open-source cloud software to help businesses manage customer relations, sees challenges for Facebook's project. "There have always been efforts on open hardware, but it is much harder to collaborate and share ideas than with open software," he says. Nevertheless, Augustin expects the era of super-secret data center technology to eventually fade, simply because the secrecy is a distraction for businesses. "Many Internet companies today think that the way they run a data center is what differentiates them, but it is not," he says. "Facebook has realized that opening up will drive down data centers' costs so they can focus on their product, which is what really sets them apart."
»»  Continue Reading...
Published by Gusti Putra at: 4:13 AM
Lets READ GUsTi

Tuesday, October 04, 2011

Computerization


English Articles Computerization



‘‘Computerization’’ refers to worldwide technology integration and adoption of computers and other electronic IT devices, along with the Internet, to support the activities that people do in the course of their daily lives. A person who uses a computer online exemplifies computerization, as do millions of other people who use any type f IT device. Thus, computerization generally has to do with the integration of IT evices and computerized systems into communications, transportation, manufacturing, ilitary weaponry, entertainment systems, and virtually all other technological reas of modern life. The process of computerization began in the late 1940s with he invention of modern computers to provide munitions guidance systems for the .S. military. However, it was not until 1969 with the invention of the Advanced esearch Project Agency Network (ARPANET) that computerization as we now nderstand it really began to expand. This is because ARPANET pioneered packet witching technology, which began the basis for the Internet in 1983, its commercialization n 1988, and finally the World Wide Web in 1991. Over this period of time, xtending half a century, what began as a small number of mainframe computers volved into personal computers (PCs) that have been widely adopted for academic, overnment, business, nonprofit organization, and individual user purposes.

Today over 1 billion computers exist on the Earth, with approximately 1.5 billion ndividual users of the Internet. The adoption of computers and other IT devices nhances Internet usage, and vice versa. High-speed (broadband) Internet connectivity expansion also drives computer, IT, and Internet technology adoption and utilization by individuals and organizations throughout the world. Utilization of the Internet expanded nearly 275 percent from 2000 to 2008. In North America alone approximately 72 percent of the domestic population (244 million out of 337 million people) now use the Internet regularly. North America represents approximately 18 percent of worldwide Internet users. And there are currently over 100 million Web sites existing on the World Wide Web, with thousands of new Web sites created everyday.

Growth of computer and IT device users and the Internet also stems from how much easier these technologies are to use. Long gone are the days in which a user needed to understand programming in order to use computers. Originally, computers were built with bulky vacuum tubes and comparatively crude electronic components by today’s standards. Consequently, these ‘‘mainframe’’ machines with their computer punch-card readers and their printing components would literally take up very large or several rooms within a building. Each mainframe computer cost millions of dollars.

Today digital computers, IT devices, and plug-in media/components are increasingly smaller, portable, and much more affordable. They have faster processing speeds, greater memory, and increasingly more built-in functions. For example, Apple’s iPhone and iPod touch devices are media players that also have Internet browsing and communication abilities. Several manufacturers are integrating personal digital assistant (PDA) and cellular phone capabilities, and it is difficult to purchase a cell phone without a built-in digital camera.
»»  Continue Reading...
Published by Gusti Putra at: 3:17 AM
Lets READ GUsTi

Monday, October 03, 2011

Gold Standard


Gold Standard



A standard defining a national currency in terms of a fixed weight of gold, and allowing a free exchange and trade of gold. Until the nineteenth century, most of the countries maintained a bimetallic monetary system, in which national monetary units were valued against a certain weight of either gold or silver. The widespread adoption of the gold standard during the second half of the nineteenth century was largely due to the Industrial Revolution that brought a tremendous increase in the production of goods and widened the basis of world trade. During its existence, the classical gold standard is widely seen to have contributed to equilibrium of balances of payments worldwide. The same institutions that lent support to a period of remarkable globalization and economic modernization later contributed to interwar instability and the depth and length of the Great Depression of the 1930s. By the late 1930s, the gold standard as a species of monetary policy was mostly extinct.

The countries that accepted the gold standard had three principal objectives: to facilitate the settlement of international commercial and fi nancial transactions, to establish stability in foreign exchange rates, and to maintain domestic monetary stability.

Monetary authorities in different countries believed these aims could best be accomplished by having a single standard of universal validity and relative stability. In the early part of the nineteenth century, virtually no country had a gold-based currency. The gold standard was introduced by Great Britain in 1821 and adopted by Australia and Canada in 1852 and 1853, respectively. Between 1870 and 1910, however, Gold Standard 281 most nations came to adopt it. The far-reaching changes of 1871 led Germany, Scandinavia, Holland, Belgium, Switzerland, France, Finland, and the United States to adopt gold standards by 1879. In the 1880s, Argentina, Chile, Greece, and Italy chose gold-based regimes, but these experiments did not last. Many of the countries soon reverted to fi at currency regimes where it became impossible to trade a fi xed number of domestic notes for gold specie at the legally mandated quantity. By the first decade of the twentieth century, most of these nations nonetheless adopted the gold standard again. In the 20 years after 1890, Asian nations also linked up to the gold standard. With some exceptions, the prevalence of the gold standard lasted until the economic crisis of 1929 and the ensuing depression.
»»  Continue Reading...
Published by Gusti Putra at: 4:35 PM
Lets READ GUsTi

Sunday, October 02, 2011

Breast Cancer photographer makes women feel beautiful


Breast cancer photographer makes women feel beautiful



(CNN) -- Nearly every day, Terri Shaver comes face to face with cancer and can't help but think about her life and how short it could be.

For more than four years, the 56-year-old photographer from Laingsburg, Michigan, has taken free portraits of people with terminal and life-threatening illnesses as part of the Oldham Project, the nonprofit she founded in 2008 after her husband's two sisters-in-law died from breast cancer.

Although the Oldham Project, named for the two sisters, provided photos for families and children, Shaver started Be Bold, Feel Beautiful, a campaign specifically aimed at women with cancer, in summer 2010.
"I'll never be the same," she said. "These women are already dealing with the choices of the things they want to accomplish or need to accomplish before their time here is over. They really see the things that are important."

The campaign began as a way to provide the women who lost their hair from cancer treatments photos in which they felt beautiful. Although she had already been taking photos of people with cancer, Shaver wanted to raise awareness, and from her extended family, knew what a powerful effect going bald had on women in particular.

"When they lose their hair, 99.9% of these women have said that they lose themselves," she said. "They lose their identity."

Shaver remembers one woman telling her that when her eyelashes and eyebrows fell out, she looked in the mirror and saw an alien. But when the women see their photos -- some somber and some lighthearted, posing with something significant to them -- they regain their self-image. Shaver said some have even told her that they stopped wearing their wigs after the session.

Since the campaign started in July 2010, Shaver has photographed about 100 women -- ages 20 to 82 -- who have had cancer, as well as partnering with a local spa to pamper them and try to make them feel gorgeous for a day. Although it began as a campaign planned to run until October, which is Breast Cancer Awareness Month, Shaver said the feedback from the women was overwhelming and she extended the campaign to be a permanent fixture of the Oldham Project.

"Your will has a lot to do with progress that you make when you're sick," Shaver said. "I firmly believe that if I can make women feel better about themselves, while they're undergoing this treatment and have no hair, their treatment will be much more successful."

Before starting a session, Shaver turns up the music in her studio and strives for an optimistic perspective, determined to make the day an uplifting experience for the woman, even though she knows this particular visit is likely a trip woven into a schedule of radiation treatments and countless doctor visits.
"You can't help putting yourself in these women's shoes as I talk to each and every one of them, thinking, 'What if that was me?'" Shaver said. "How would I react? How would I deal with that? Many times, I don't even have words."

If she didn't consciously take a more analytical approach to each woman's cancer, Shaver said, the project would be awful. It doesn't mean the emotions are absent, but Shaver, who used to be a nurse, knows she can't take on every burden she witnesses.

Toward the end of last fall when Be Bold, Feel Beautiful was in full swing, Shaver was scheduling sessions with up to 10 women a week and began to become physically and emotionally drained.

"I was sleeping three hours a night because I was thinking about the person I photographed yesterday or the woman I was going to," she said. "When you hear these people's stories, you spend a couple hours with them -- photographing them, interviewing them -- you become part of their lives."

She stepped back from updating the campaign's blog -- which was as often as she had a session -- and to her husband's relief, scheduled the portraits at a slower pace to give herself time.

Shaver said the only thing more difficult than a session is hearing the news that one of her photo subjects has died. The first was Denise Acker, 55, who died in August 2010 after fighting lung cancer, and was also the very first person to be photographed with Be Bold, Feel Beautiful. Shaver said five women have died since she began and it is devastating every time.

Dealing with the grief and looking mortality in the face has made Shaver live differently. She said she doesn't stress out about as many things because she has realized they simply don't matter. What gets her out of bed in the morning when she knows that the day's session will be tough is imagining that she has the ability to watch a woman overcome her insecurities and find peace in how she looks.

"It doesn't matter how bad my day is, I'll bet you their day is worse," Shaver said. "And I'm going to do all I can to make them look as good as I possibly can."
A little more than a year later, Shaver knows it sounds like an extraordinary statement, but she believes the ongoing campaign has the potential to save lives.

"If other women who are just newly diagnosed or haven't even been diagnosed yet see women like this who are strong, powerful, bold and feel good about themselves, they, too, will know that I can do this," she said. "They won't panic when they find a lump, they won't just stick their heads in the sand and hope it'll go away."
»»  Continue Reading...
Published by Gusti Putra at: 4:02 AM
Lets READ GUsTi

Advertising on the Internet

English Articles Advertising on the Internet




Like broadcast or print, the Internet is an advertising medium. Companies and organizations working to promote their products and services must consider this medium as they would television, magazines, outdoor, and so on. Advertising on the Internet employs a variety of forms.

Banners

The most common form of advertising on the Web is banner ads. Banner ads may be used for creating awareness or recognition or for direct-marketing objectives. Banner ads may take on a variety of forms as well as a number of names such as side panels, skyscrapers, or verticals. Initially banner ads constituted the vast majority of advertising on the Net, but studies indicating their questionable effectiveness have led to a decline in usage. Reports on click-through rates vary, but most studies indicate a less than 1 percent response rate. Afew studies have shown an increase in response rates in recent years. These findings may lead to increased use of this method of advertising in the future.

Sponsorships

Another common form of advertising is sponsorships. There are two types of sponsorships. Regular sponsorships occur when a company pays to sponsor a section of a site, for example, Clairol’s sponsorship of a page on GirlsOn.com and Intuit’s Turbo Tax sponsorship of a page on Netscape’s financial section. A more involved agreement is the content sponsorship, in which the sponsor not only provides dollars in return for name association but participates in providing the content itself. In some cases, the site is responsible for providing content and having it approved by the sponsor; in other instances, the sponsor may contribute all or part of the content. Due in part to the lack of effectiveness of banner ads, sponsorships have been increasing in popularity. Notice the number of partners on the iVillage site in each of which provides content.

Pop-Ups/Pop-Unders

When you access the Internet, have you ever seen a small window appear on Netscape advertising AOL’s “Instant Messenger”? Such Windows are known as pop-ups, and they often appear when you access a certain site. Pop-ups are usually larger than a banner ad but smaller than a full screen.

Pop-unders are ads that appear underneath the web page and become visible only when the user leaves the site. For example, if you ever visited a travel website, you probably were hit with a pop-under ad for Orbitz—one of the heaviest users of this form of web advertising. Go to the Los Angeles Times website, and when you leave, you will almost certainly see an example of this form of advertising.

While some companies like Orbitz believe that pop-ups and pop-unders are effective forms of advertising, others disagree. Consumer complaints have led Google.com, iVillage.com, and Earthlink (among others) to no longer accept these advertising forms. (According to iVillage, its research indicates that as many as 90 percent of its users dislike such ads.) Nevertheless, indications are that despite the annoying qualities of popups and pop-unders, more and more websites are offering this type of advertising. Interstitials Interstitials are ads that appear on your screen while you are waiting for a site’s content to download. Although some advertisers believe that interstitials are irritating and more of a nuisance than a benefit, a study conducted by Grey Advertising found that only 15 percent of those surveyed felt that the ads were irritating (versus 9 percent for banner ads) and that 47 percent liked the ads (versus 38 percent for banners). Perhaps more importantly, while ad recall of banner ads was approximately 51 percent, recall of interstitials was much higher, at 76 percent. Recently, Acura introduced its Integra Type R model using an interstitial. Coca-Cola, TriStar, and Macy’s commonly employ this ad form.

Push Technologies

Push technologies, or webcasting technologies, allow companies to “push” a message to consumers rather than waiting for them to find it. Push technologies dispatch web pages and news updates and may have sound and video geared to specific audiences and even individuals. For example, a manager whose job responsibilities involve corporate finance might log on to his or her computer and find new stories are automatically there on the economy, stock updates, or a summary of a speech by Alan Greenspan. Companies provide screen savers that automatically “hook” the viewer to their sites for sports, news, weather reports, and/or other information that the viewer has specified. Users can use personalization—that is, they can personalize their sites to request the kinds of specific information they are most interested in viewing. For example, if you are into college sports, you can have updates sent to you through sites providing college sports information. The service is paid for by advertisers who flash their messages on the screen.

Links

While considered by some as not a type of advertising, links serve many of the same purposes as are served by the types discussed above. For example, a visitor to one site may click on a link that provides additional information and/or related materials at another site. At the bottom of the homepage at women.com are a number of links to magazines, including Cosmopolitan and Good Housekeeping among others. Clicking on one of these takes you to the magazine’s site and usually a pop-up for a subscription to the magazine appears. Other forms of advertising, such as ads placed in chat rooms, are also available. Given the limited use of many of these alternatives, we suggest the reader consult additional resources for more information.
»»  Continue Reading...
Published by Gusti Putra at: 3:26 AM
Lets READ GUsTi

Computer Ethics

English Articles of Computer Ethics


The ethical use of computers and other types of electronic information technology (IT) devices is known as ‘‘computer ethics’’ or ‘‘cyber ethics.’’ These concepts informally emerged beginning in the 1950s with the invention of mainframe computers initially used by U.S. government agencies, followed by colleges and universities. However, the term ‘‘computer ethics’’ was not articulated until Walter Maner did so in the mid-1970s. The ideas behind computer ethics involve complex considerations about how to behave properly—i.e., according to the laws, social customs, and moral standards of society—when using IT devices and information systems including the Internet. All forms of technology, including IT, used by people that allow people to access and use public and privately owned networks along with information should involve responsible use of computers, cell phones, PDAs, and other devices. For example, if a person uses a computer to access and share information over the Internet, he should do so in ways that comply with applicable civil and criminal laws and/or in ways that do not violate the rights of or harm other people. This, the essence of cyber ethics, can be difficult to achieve in certain instances. Today the ability to access information quickly online has created an ‘‘on-demand society’’ consisting of many people who frequently do not consider the possible harm they may be causing to other people.


The first users of computers faced many unprecedented challenges having to do with network access along with the use and exchange of data. As computer use and complexity increased, opportunities arose that allowed even more and comparatively unrestricted access to information via the Internet. Over time users were empowered with newer technologies and also were conditioned to access and respond to information in a variety of ways, according to their own interests, often with little adult or managerial oversight. Consider the modern practice of ‘‘flaming’’ that occurs when people disrespectfully interact with each other online. Frequently this happens when a person comments or posts something in a defamatory, insulting, or hostile manner about another person or organization only to have it negatively reacted to. Such online ‘‘shouting’’ can disrupt chat forums, blogs, and other online community exchanges, causing emotional harm or worse to people or organizations involved or named.

Computer/cyber ethics is a critical issue in modern societies in which millions of people now use many types of IT devices in their everyday lives. Cybercrime statistics along with an increasing number of research studies indicate that young people as well as adults do not behave ethically online, and that, beginning with a person’s earliest exposure to computers, he can easily become a victim and victimizer of other people.

Academic misconduct, piracy, cyber bullying, and other forms of online abuse and cybercrime cause harm in various ways, but what is considered responsible use of IT devices and information systems varies among people and situations. Not everyone, for example, believes that pirating music is wrong, even though it is illegal: while many young people would never think of stealing a music CD from a store in a shopping mall, they will use peer-to-peer networks to illegally download songs without paying to do so. What do you think about this issue? Can you think of other cybercrime issues or online behaviors that are controversial? Today society debates cyber ethics in areas pertaining to copyright and other intellectual property rights issues, the creation and enforcement of laws, formulation of public policies, professional codes of conduct, information security practices, software license agreements, and hardware reseller’s mandates, among other issues. Technology use struggles against regulation, with consumers, businesses, and governments all seeking to predominate over what constitutes the ethical use of computers. With no uniform standards on computer use, a few employment sectors and professional membership associations are creating their own codes of conduct. At the organizational level these frequently take the form of ‘‘acceptable computer/network use policies’’ and may be complemented with cyber ethics training. Unfortunately, the results amount to a ‘‘wild west approach’’ to cyber ethics, with conflicting interests among different populations and groups of computer users. In cyber ethics, there is no such thing as ‘‘model traffic laws’’ as exist throughout the United States when it comes to operating motor vehicles. All too often ITusers make up their own ‘‘rules’’ when using the Internet, which is the social equivalent of everyone driving any way they desire with little or no regard for other motorists.

The results of this lack of uniformity is that overall guidance on good behavior and best practices tends to be absent from users’ initial computer experiences and in their continued decision-making processes. Thus children, when first taught how to use computers or portable gaming devices, are seldom provided with age-appropriate instruction in cyber ethics. The same is true for millions of youth and young adults who may go through their entire educational preparation in middle school, high school, and college without receiving any cyber ethics training. Since most users of computer technology lack any formalized ethical instruction, it is no surprise that the social and economic impacts and levels of harm caused by cybercrimes are increasing.

As users age, their exposure, experience, and technical capabilities to engage in cybercrime activities increase. Lacking cyber ethics education along with instruction in information security and Internet safety contributes to online  victimization and offenses. In recognizing this, many institutions and organizations are providing guidance, information, and model practices and policies related to sound use of IT devices. I-SAFE, Inc. and the National Center for Missing and Exploited Children (NCMEC) are two nonprofit organizations that develop online instructional resources for teachers, parents, and youth that relate to using computers responsibly. Adults need to review the current information on technology and educate themselves on impact in areas of concern. For example, businesspeople and business owners need to understand their firm’s policies on the use of technology, or, if a person owns a business, he needs to ensure that he has a policy aligned with his corporate goals. Educators and government officials need to create ways to enable parents and members of the community to learn basic computer etiquette, and then provide uniform instruction options for students and others. To stay current on the issue, a person need only search the Internet on the term ‘‘ethical computer use,’’ ‘‘computer ethics,’’ and ‘‘cyber ethics,’’ or, where available, take a course having to do with the philosophy of ethics that emphasizes controversial online behaviors.
»»  Continue Reading...
Published by Gusti Putra at: 3:22 AM
Lets READ GUsTi

Child Labor

English Articles Child Labor

According to the INTERNATIONAL LABOR ORGANIZATION (ILO), some 250 million children between the ages of Bonded labor is otherwise known as debt bondage or peonage. It is outlawed by the 1956 UN Supplementary Convention on the Abolition of SLAVERY, the Slave Trade, and Institutions and Practices Similar to Slavery. Bonded labor involves a business transaction whereby an advance payment is made to a (usually destitute) family, who in exchange hands over their child to an employer. The amount paid may be as little as $15 depending on the type of work and the age and skill of the child. In theory the child can work off his debt, but in practice this almost never occurs; the child is unable to work off the debt, and the family is seldom able to buy the child back. Unscrupulous employers debit a variety of “expenses” or deduct “interest” from their paychecks, effectively keeping them in debt indefinitely. In some cases, bonded labor agreements are multigenerational, meaning that each generation in a family is obliged by the contract to turn over a child to an employer, often for no payment at all. As the child gets older, he or she may be freed but only on condition that another younger child from the family is offered as a replacement.

Millions of children work as bonded child laborers in countries around the world—15 million in India alone, where the practice has a long tradition. (If all forms of child labor in the country are taken into account, as many as 60–115 million children may be employed, the largest number of working children in the world.) These children, some as young as four or five, are put to work in fields, stone quarries, and mills or sent out into the streets to pick rags. Some work as indentured domestic servants. Their fates are grim: old age by 40, death by 50.

»»  Continue Reading...
Published by Gusti Putra at: 3:20 AM
Lets READ GUsTi

Silent Reading

English Articles Silent Reading



Reading to oneself, without producing any sound or moving the tongue or lips. A relatively new technique of reading, in historic terms, silent reading contrasts with and has different purposes from oral reading, which is concerned with pronunciation, enunciation, voice control and communication. Until the early 20th century, students universally learned to read orally, because reading was the core of family recreation in the home before radio and television. As a result of eye-movement research just before World War I, silent reading was found to increase reading rates, reading comprehension and the ability to infer word meanings from their context. For several decades thereafter, silent reading replaced oral reading as the sole goal of reading instruction. More recently, however, most schools have taught both oral and silent reading, each of which provides students with different sets of essential skills.
»»  Continue Reading...
Published by Gusti Putra at: 3:16 AM
Lets READ GUsTi

Schools Without Walls

English Articles Schools Without Walls



So-called openspace schools, with few interior partitions, allowing groups of students to work in separate areas of a huge, open space. An outgrowth of escalation in school construction costs in the decades following World War II. Especially effective in elementary schools, schools without walls are particularly conducive to team teaching. Seated in different parts of a huge room, on carpeted floors that minimize noise, groups of students and their teachers work on one topic at a time, and, when appropriate, a second teacher specializing in another subject may arrive to introduce applications of the first subject to a second subject. Groups of students will join or separate, according to what they are studying. In simplest terms, a group studying Egyptian history with one teacher would learn the plane and solid geometry of the pyramid from another, the origins of language and hieroglyphics from a third teacher, art from a fourth and geography and political science from a fifth. Various groups might work together or apart, according to a schedule of team teaching determined by the faculty.

From the construction point of view, schools without walls eliminate all costs of partitions and their attendant insulation and wiring. When needed, portable folding partitions, portable chalkboards and other movable equipment can substitute for all materials that conventional walls might support. White-taped “alleyways” solve the problems of student traffic flow during and between classes. OPEN EDUCATION, or open classroom techniques, that developed in preschools of the 1930s and 1940s, schools without walls provided enormous appeal to both progressive educators and to taxpayers and school boards eager to cut the escalation in school construction costs in the decades following World War II. Especially effective in elementary schools, schools without walls are particularly conducive to team teaching. Seated in different parts of a huge room, on carpeted floors that minimize noise, groups of students and their teachers work on one topic at a time, and, when appropriate, a second teacher specializing in another subject may arrive to introduce applications of the first subject to a second subject. Groups of students will join or separate, according to what they are studying. In simplest terms, a group studying Egyptian history with one teacher would learn the plane and solid geometry of the  pyramid from another, the origins of language and hieroglyphics from a third teacher, art from a fourth and geography and political science from a fifth. Various groups might work together or apart, according to a schedule of team teaching determined by the faculty.  From the construction point of view, schools without walls eliminate all costs of partitions and their attendant insulation and wiring. When needed, portable folding partitions, portable chalkboards and other movable equipment can substitute for all materials that conventional walls might support. White-taped “alleyways” solve the problems of student traffic flow during and between classes.
»»  Continue Reading...
Published by Gusti Putra at: 3:11 AM
Lets READ GUsTi