Monday, December 30, 2013

More than 4% of elementary schools do not meet basic Math and English levels

More than 4% of the approximately 17,000 primary schools in England failed to meet the new, stricter government regulations on the basics of math and English , according to the new school league tables published on Thursday

Some 767 schools failed to government mandated floor of at least 60 % of students achieving "side - ready " levels in reading, writing and mathematics , and were below the measures of progress in the three subjects.

Tests conducted by students at the end of the academic year 2012-13 were more challenging after the government raised the ground level. Using the new measure, 834 primaries have failed to comply with the highest standards in its results 2011-12 .

A spokesman for the Department for Education (DfE ) said: "This government brought higher goals Floor primary school with one goal in mind - to improve standards with immediate effect to end years of failure rooted .

Schools respond to this challenge . Standards floor presented were tougher and performance is improving. Heads , teachers and students deserve recognition for meeting the challenge head on. "

It was hoped that the slight improvement after the 2013 results of the key stage two ( KS2 ) tests 11 years old - in which the parent tables are based - showed better performance at national level.

Overall, the proportion of pupils reaching level four in reading , writing and mathematics at KS2 rose to 76 % this year from 75 % in 2012.

One of the best performing schools in the leaderboards primary Litton was a small Church of England school - volunteer assisted with only two classrooms and 45 students in total, in a village near Buxton, Derbyshire.

Litton - which was rated outstanding by Ofsted inspectors last year - was one of eight elementary schools in the country to reach the average levels of 5A for their students. Average score was marginally surpassed by Litton Primary School St Oswald Chester .

The Catholic elementary school San José , another small school near Clitheroe in Lancashire, was close behind .

There are 94 primary schools in which all children had at least secondary levels " ready " in reading and math tests , and evaluations of teachers of writing, as well as making expected progress in the three subjects .

The worst performing local authorities include Poole in Dorset , where five of 15 primary schools in the authority did not comply with the ground. Norfolk had 25 primary that missed the mark, Bradford had 22 and 21 Suffolk.

The DfE said sponsored schools improved their performance in the key three percentage points as compared to 2012 , while local authority mainstream schools increased by one percentage point.

"Some of the improvements seen in new primary schools are sponsored notables - ending years of chronic under- performance," said spokesman DfE .

"The experience and the strong leadership of the sponsors is the best way to turn around failing schools and give students the best opportunity there a first-class education . "

Friday, December 27, 2013

This is what happens on the Internet for 60 seconds

The information flows in cyberspace is no longer undeniable speed. A site called Qmee revealed that every single minute, there are 216 thousand photos uploaded, 278 thousand Tweets, and 1.8 million Like on Facebook.

Let's say that it takes you exactly one minute to read through this post. In that time, over 6,600 photos will be uploaded to Flickr, about 70 new domains will be registered, over 1,200 new ads will be created on Craigslist, and more. Here's what happens on the Internet every 60 seconds.



That disclaimer aside and without further ado, here's what's happening each minute : 


  • Search engine Google serves more that 694,445 queries
  • 6,600+ pictures are uploaded to Flickr
  • 600 videos are uploaded to YouTube, amounting to 25+ hours of content
  • 695,000 status updates, 79,364 wall posts and 510,040 comments are published on social networking site Facebook
  • 70 new domains are registered
  • 168,000,000+ emails are sent
  •  320 new accounts and 98,000 tweets are generated on social networking site Twitter
  •  iPhone applications are downloaded more than 13,000 times
  •  20,000 new posts are published on micro-blogging platform Tumblr
  •  Popular web browser FireFox is downloaded more than 1,700 times
  • Popular blogging platform Word Press is downloaded more than 50 times
  • Word Press Plugins are downloaded more than 125 times
  •  100 accounts are created on professional networking site LinkedIn
  • 40 new questions are asked on YahooAnswers.com
  • 100+ questions are asked on Answers.com
  • 1 new article is published on Associated Content, the world’s largest source of community-created content
  • 1 new definition is added on UrbanDictionary.com
  • 1,200+ new ads are created on Craigslist
  • 370,000+ minutes of voice calls done by Skype users
  • 13,000+ hours of music streaming is done by personalized Internet radio provider Pandora
  • 1,600+ reads are made on Scribd, the largest social reading publishing company
Impressive? Scary? Overwhelming? We're not sure. But we do know that a lot happened in the few moments it took to look at this blog post — so you better rush to catch up.

Wednesday, December 25, 2013

Facts about Education in Indonesia

Indonesia as a developing country that in fact require human resources, actually collapsed in education

Uneven spread of education between urban and rural, became one obvious example

Every Minute, Four Children Out of School
Based on the report Education for All Global Monitoring Report, released UNESCO 2011, high dropout rates lead to lower development index ranking. Indonesia ranks 69 out of 127 countries in the Education Development Index. Meanwhile, reports Ministry of Education and Culture, every minute there are four children who drop out of school.

Many factors affect the high dropout rates in Indonesia. But the most common factor encountered is the high cost of education that makes students can not continue their basic education.

Education data in 2010 said 1.3 million children aged 7-15 years drop out of school.



54% in Indonesian Teachers Do not Have Enough Qualifications for Teaching
Teachers are at the forefront of improving the quality of education, where teachers will conduct landsung interaction with learners in the learning in the classroom. Through this process of learning and teaching and it starts to quality education. That is, the overall quality of education begins with quality learning undertaken by teachers in the classroom.

In absolute terms, the number of teachers in Indonesia is quite adequate. However, in the distribution and quality, are generally still low. This can be evidenced by the number of teachers who have not still an undergraduate, but taught in high school / vocational school, and the number of teachers who do not teach according to their disciplines. This situation is quite alarming, with a percentage of more than 50% in Indonesia.

According to data from Ministry of Education in 2010 access to education in Indonesia still needs attention, more than 1.5 million children each year can not continue school. In terms of the quality of teachers and teaching commitments contained more than 54% of teachers have a qualification standard that needs to be improved and 13.19% in the condition of school buildings need to be repaired.

It is supposed to be one heavy point improvement in the Indonesian education system, given its more advanced a country stems from quality education, quality education leads of quality learning, quality learning starts from a qualified instructor as well.

According to the Education Development Index (EDI) Indonesia is in 69th position
Based on the data, the development of education in Indonesia is still lagging behind compared to other developing countries. According to the Education For All Global Monitoring Report 2011 issued by UNESCO every year and contains the results of monitoring the education world, from 127 countries, the Education Development Index (EDI) Indonesia is ranked 69th, compared to Malaysia (65) and Brunei (34).

34% in Indonesian School Teacher Shortage
Teachers distribution is uneven. 21% of schools in urban teacher shortage. 37% of schools in the rural teacher shortage. 66% of schools in remote areas of teacher shortage and 34% in Indonesian schools that lack teachers. While in many areas there is excess Teacher.

Source: Teacher Employment and Deployment, World Bank 2007

Distribution of teacher quality index in Indonesian half maximum index value
Distribution of teacher quality index in Indonesian half maximum index value where the maximum value is 11.

Source: Analysis of Data Master 2009, DG PMPTK 2009

Eight National Education Standards are expected to raise the quality of education in Indonesia
Law No. 20 of 2003 on National Education System described them in Government Regulation No. 19 of 2005 regarding the Eight National Education Standards are expected to raise the quality of education in Indonesia.

Monday, December 23, 2013

Database Security Testing

The database is the main source of all the data and company information and can be called the heart of a concern because of the important role it plays for the company. It supplies the required data to the user at any point of time. Therefore, it is also very important that the database is properly secured to prevent access by attackers with malicious intent. To secure your database and sustainable means of examination is essential

Database security testing can be done in a way such as vulnerability assessment, user audit rights, architectural review, inspection database and frequent review of the security code. Testing, if done regularly, know the loopholes in the system and also the same plugs to prevent unauthorized users from accessing the data.



Base Vulnerability assessment : This is part of a systematic examination conducted to database security and is very useful in reducing the risks involved in both the database and website attacks . It is also useful in meeting certain standards and rules relating to the security of the database . This will include utilizing tools that are intended to determine security vulnerabilities at the database level . It will also submit a report on the various processes involved , analysis , and findings are also separated from the roots , the practice to be adopted and the technical details of the same . The advantage of this assessment is that the user can easily identify errors in the settings , coding , and other problems . This assessment can be done on a regular basis to manage vulnerability and also to focus on the cause of local concern . It is the most inexpensive method of both knowing the risks and also the solution for it. Users can focus on testing or code that may cause such risks.

Audit user rights : The main challenge of a network administrator located in maintaining a strict vigil over the various types of users , roles , and other options available with the database . To maintain a tight control on the rules and regulations , it is necessary to examine the requirements of user tasks and how they are applied . This feature will help in identifying the different users that will have access to the system , and the data they may require access to , and the level at which they can access from the database . It also will assist in assessing whether they can be allowed to access the data so far also . Administrators will be able to understand all of the rights granted to users and groups . Any deviation from the rules of the user can be known . It also will assist in preparing a report on the process , findings , and practices that must be followed in addition to the technical summary . By using this , the user will not have unauthorized access to the data and they can not go beyond their permitted levels . Legal compliance , vulnerability management tactics and inspection on the areas that cause concern will be reported to the administrator

Architecture review : This helps in getting a detailed analysis of the requirements of the appropriate database, how they function, how they keep the stored data, and security objectives. This will help in understanding the possible areas of attack so that proper inspection can be applied there. Database management and development team will be able to understand the various control measures in order to maintain data confidentiality, availability, and the authenticity of the same. A full control over the data, database structure, the technology involved, and all the processes for controlling the data will be explained to the authorities. Better control over the security with the same look comprehensively, find out the steps to ensure the same thing, and meet the shortage of low cost is another advantage of this size. It has the best effect when used on the stage of development of the database.

Assessment Database : Only when a thorough analysis of the various stages of database operations performed, one can be assured of data security, integrity and availability of the same the same. To achieve this, the operational audit or assessment is really important. The main purpose of this function is to assess activities that may prove crucial to the confidentiality of the data, to conduct a review of security measures from the data, and to submit a report of findings, analysis, and a summary of the technical side. When this process is strictly followed, ensuring that the security of the database in order to plan for security and guarantees granted an extension until more time. The best results of the operational audit can be achieved when done to ensure compliance with laws and regulations and provide greater security for database security.

Security code review : This is a review done manually by database developers to find out any problems that would facilitate an attacker to gain access to the database . The main focus of this function is to determine which areas are particularly at risk from the database and coding as the whole process is quite expensive but thorough . Each threat assessment against the code , security systems , and vulnerability databases were analyzed to determine which areas will be focused on this code . The source code of the procedures to be reviewed and the importance given to the development of logic and the same code . It also gave a report on the process , findings , analysis , and technical summaries for this issue . Basically the error was detected and the same coding techniques improved . The developers of this program are educated about the techniques and practices are free from errors , and coding issues resolved even at the level of development when combined into the Software Development Life Cycle . The highest benefits of this system are reaped for procedures that are absolutely necessary for safety purposes and also when used as part of the certification training to a higher level of database security.

So, when a very prone area risk is detected and the solution is applied using a variety of techniques, database security is assured, many development companies.



Saturday, December 21, 2013

Installing Wine in Ubuntu

Perform installation into linux need additional software required. However, especially beginners who are accustomed to using windows and recently tried migrating to ubuntu would be difficult to install. Well one could use the MetaTrader installation process wine. Wine is a software that helps bridge the gap between software windows to linux.

Because metatrader is a windows-based software, it automatically bridge ya need to get into linux. How to install wine. Wine software can be downloaded on the website at WineHQ so you can take the software for free.

But there are problems when software has been downloaded. Ubuntu linux GUI will need to be able to do the installation. What if can not install? Or even hassles? Well time to try another way to take advantage of the command line in linux.

You can use the command line (the so-called "terminal" in Ubuntu) to install Ubuntu using Wine without a GUI. Run the following command to add the WineHQ PPA repository:

sudo add-apt-repository ppa: ubuntu-wine/ppa



After you do the above instructions, it is time to do the updating of data using the APT package by using the following command:

sudo apt-get update

Finished typing the code, you can begin the installation of Wine.
Run the following command:

sudo apt-get install wine1.5

Now Wine v 1.5 will be installed. When the installation is complete, the wine is ready to be used in the installation of the windows software like this metatrader. good luck ...

Note:
Using the command line on linux will be easier for you to perform calculations and faster data input without using additional software. Given the results of the command is quite complicate the beginner, you should use a guide in understanding the performance of the linux command line. Once the process is complete the command, you can use wine in metatrader installation.

Friday, December 20, 2013

How to create a bootable USB Flash Drive Recovery in Windows 8

Windows 8 has the ability to create a bootable recovery USB flash drive that can be used to troubleshoot your Windows 8, for example, a computer that can not start. A recovery is the same drive as the startup disk repair, but instead is in the CD / DVD, but the USB drive bootable. Once you boot up a Windows 8 computer with Drive Recovery you will have access to a wide range of diagnostic and troubleshooting utilities that can help resolve any problems you may be having.



It should be noted that the recovery is not the same drive as the Windows 8 DVD and you can not use it to install Windows 8. It is also important to create a recovery USB drive on a machine with the same bit-kind of like you need to fix. If you make the drive on a 32-bit machine you will only be able to fix the 32-bit version of Windows 8. The same goes for the 64-bit version of the drive recovery. Last, but not least, Windows 8 will format the USB flash drive that you use to create a recovery drive. Therefore, make sure you backup all your data before starting this process.

To make Drive Recovery, type Drive Recovery in Windows 8 Start Screen. When the search results appear, click on the Settings category and then click on the Create a recovery drive option. This will display the User Account Control prompt, you should click Yes to continue. This will open the Recovery Drive program.

Make sure you have a USB flash drive with at least 256MB entered into the computer and then click the Next button. Now you will be presented with a screen where you will be asked to select the USB flash drive that you want to use to drive the recovery.

Select the USB flash drive you want to use and then click on the Next button. Now you will be shown a warning stating that the USB flash drive will be erased.

If you are ready, click on the Create button and Windows will transform the USB flash drive into a bootable recovery drive.

When finished you will be shown a screen that states that drive the recovery has been made​​.

You can now remove the flash drive and store it in a safe place.

In the future if you need to use the recovery drive to start Windows, you can put it into a Windows 8 machine and boot from it. If you can not boot from a USB drive then you will need to go into your BIOS and enable as the first boot device. Once your computer starts to boot up from a USB Drive Recovery, you will be presented with a screen asking what keyboard layout you want to use

Select the keyboard layout you want to use by clicking on the left once. You will now be at a screen where you can select the option to perform.

You can choose to Continue to boot Windows 8, Turn off your PC, or use a variety of tools to Issue 8 of your Windows installation. As you are most likely using a recovery drive for Windows 8 does not start correctly, click on the choice issue. This will open a screen problem which contains various tools that you can use to fix Windows 8.

If you click on the Advanced Options option opens a new screen that contains other tools that you can use to troubleshoot Windows 8.

The tools on this screen allows you to perform various diagnostic and repair process on your computer. These options are described below.

System Restore
This option allows you to use System Restore to restore your computer back to the state when it was working fine.

System Image Recovery
This option allows you to restore the system image that you may have made in the past.

Auto Repair
Auto repair tries to automatically detect and fix problems that may cause Windows 8 does not start.

Command Prompt
Recovery Command Prompt is a very powerful tool that provides access to your file system and various repair tools.

When you are finished using one of these tools, you will automatically be returned to the Select screen option where you can continue to use these tools or continue to boot into Windows 8.

Wednesday, December 18, 2013

Facts About Calories

Calories are the basic unit that has a unique concept. Read the suggestions in this article and your body will start to lose a few pounds.



Really calorie fuel the body? Actually not. The body is not a steam engine. It does not rely on heat, but the chemical energy, is driven by the oxidation of carbohydrates, fats, and proteins that occur in the cell mitochondria. "Mitochondria is like a little powerhouse," said Maciej Buchowski, Ph.D., research professor at the medical center at Vanderbilt University. "But, the body does not have only one center of power, but a few trillion, which is more efficient." Our advice "Know also the amount of carbohydrates, fats, and protein-calorie apart-when you evaluate the food you eat.

Are all calories equal ? Not really. Fuel for the body consists of three sources : protein , carbohydrates , and fats . " Each one is processed by the body in different ways , " says Alan Aragon , MS , a nutrition consultant Men's Health magazine . So, the old idea that " calories in equals calories out " is a bit misleading . Because of carbohydrates , proteins , and fats have different effects . Example : For every 100 calories of carbohydrates you eat , the body uses calories to digest 5-10 . With fats , you use a little less than that amount . Who won in burning calories is protein : For every 100 calories of protein you consume , the body requires 20-30 calories for digestion , Buchowski said .Carbohydrate and fat calories with easy release . They supply the energy needed for fast ( instant ) . Thus , carbohydrate and fat can bring the energy used by the body than protein . Our advice if you want to lose weight , prioritize protein in any diet that you consume.

Is every calorie that goes to be digested? Not as simple as that. He passed through the stomach and up into the small intestine, which absorbs all the nutrients as possible through the porous walls of the intestine. However, 5-10% of calories can get away with not absorbed. Fat digestion is more efficient because it went into the intestinal wall with ease. While animal protein will be digested than vegetable. Various carbohydrate processed at different speeds. Glucose and starch rapidly absorbed, while fiber is somewhat more difficult. And, kind of 'insoluble fiber' in some complex carbohydrates, such as from vegetables and grains, tends to block the absorption of other calories. "With a high fiber diet, such as 60 grams per day, you may lose up to 20% of the calories you consume," said Wanda Howellm Ph.D., professor of nutritional sciences at the University of Arizona. Our suggestion consumption of at least 35-40 grams of fiber each day.

Is it true that exercise burns calories as our large ? Absolutely not . Most of the calories you burn in a slow time , thus providing fuel for your body's basic metabolism , says Warren Willey , DO , author of Better Than Steroids . If you want to use more fuel , step on the gas pedal in your daily activities . " Approximately 60-70 % of the number of calories you use is used to enable the normal functioning of your body , " said Howell . This includes replacing the tissue cells , transporting oxygen , repair minor injuries and others. Then , there is also the calories lost because N.E.A.T. ( nonexercise activity thermogenesis - combustion of non - exercise activity ) . NEAT consists of movements that you do outside the gym - the calories you burn while making breakfast , playing games on the office computer , or to catch a bus on the way home . Our advice Take some rest breaks from your desk ( and couch ) to move your body and burn calories ' bonus . '

Really low calorie foods to help lose weight? not always
Low calorie processed foods can be weak allies in your fight to lose weight. For example, sugar-free foods. Avoiding sugar may be the easiest way to reduce calories. However, food manufacturers usually replace sugar with sugar-free sweeteners. And, artificial sweeteners can backfire. The theory is, the promise of sugar that offer fewer calories can actually cause excessive eating habits (than usual). "Most people count calories, when what needs to be done is to focus on the content and composition of food," said Alderman. Our advice rather than thinking of sugar or artificial sweeteners, better fill your plate with low-calorie foods-high-quality: Fruits and vegetables.

Monday, December 16, 2013

Know More Human Nervous System

The human nervous system is an organ system containing a network of specialized cells that coordinate actions and transmit signals to various parts of his body.

The human nervous system consists of nerve cells called Neuron.Neuron combine to form a network to deliver impulses (stimuli). A nerve cell is composed of a cell body, dendrites, and axons.

The function of the nervous system:
  • As a recipient of information in the form of stimulation
  • Process the information received
  • Giving response / reaction to the stimulation.

Neurons (Nerve Cells)


Neurons or nerve cells are part of the human nervous system. A collection of nerve cells is the one that forms the nervous system.

Neurons consist of three main parts:
  1. Dendrites
  2. Nerve cell bodies
  3. Axons (neurites)
Dendrites, function sends impulses from receptors to the neuronal cell bodies.

Body found inside the cytoplasm of cells and cell nuclei. neurites from the cell body and dendrites exit. The function of the cell body to control nerve cells work.

Axons (neurites) function sends impulses from the nerve cell body to other tissues or effectors such as muscles and glands.

Various Cells Based on Neural Functions:
  • Sensory nerve, sensory nerve cell function is deliver impulses from receptors to the central nervous system, ie brain (ensefalon) and spinal cord (spinal cord).
  • Motor nerve, the motor nerve cell function is to send impulses from the central nervous system to muscles or glands which results in the body's response to stimuli. The motor nerve cell bodies located in the central nervous system.
  • Intermediate nerve cell / neuron connectors, intermediates nerve cells called neurons also associations. These cells can be found in the central nervous system and the function of motor nerve cells connect with sensory nerve cells or associated with other nerve cells in the central nervous system. Intermediate nerve cell receives impulses from sensory receptors or nerve cells other associations.
Structure of the Nervous System
There are two kinds of nervous systems, namely:
  1. The central nervous system includes: Brain and Spinal Marrow
  2. System sraf edge (peripheral) include: autonomic nervous system (sympathetic and parasympathetic) and somatic nervous system (cranial and spinal nerves)
Central Nervous System
The central nervous system is the central coordinating body. The central nervous system includes the brain (ensefalon) and spinal cord (spinal cord). Both are very soft organ, with a very important function.

Brain

The brain is a soft sticky objects, bermi lot, and chewy. In it there are millions and even billions of cells safar.
The brain has five main sections, namely:
  • Large brain (cerebrum): The big brain has a function in the regulation of all mental activity, which is associated with intelligence (intelligence), memory (memory), awareness, and consideration.
  • Midbrain (mesensefalon)
  • Small brain (cerebellum)
  • Connecting cord (medulla oblongata), and
  • Varol bridge (pons Varoli)
Big brain (cerebrum)
Big brain has a function in the regulation of all mental activity, which is related to intelligence, memory, awareness, and consideration.

The cerebrum ...
  • The largest part of the human brain.
  • There are 2 hemispheres that looks symmetrical but different structure and function. Right hemisphere: left-hand controls, introduction to musical and artistic, space and pattern perception, sight and imagination. Left hemisphere: right hand control, spoken and written language, numerical skills, scientific, and reasoning.
  • Hemispheric surface was shaped protrusions (gyrus) and grooves (sulcus); indentation that the so-called fissure.
  • Each hemisphere is divided into four lobes: the frontal lobe, parietal lobe, occipital lobe, and temporal lobe
Frontal lobe function as the center thinking; temporal lobes as auditory and language centers.
Occipital lobe as the center of vision.
The parietal lobe as the center of the touch and movement.

Forebrain also include other parts, such as the thalamus, hypothalamus, pituitary gland, and pineal gland. Before the accepted area of ​​sensory cerebrum, all stimuli would be processed first by the thalamus. Only olfactory stimuli are not received by the thalamus. While the function of the thalamus is another example regulate the temperature and water content in the blood, and also coordinate activities related emotions. The hypothalamus is the part that serves to regulate body temperature, appetite, and behavior. In addition, the hypothalamus also controls the pituitary gland, the gland hormone that plays a role in controlling homon other glands, like the thyroid gland, adrenal gland, and pancreas.

Central Brain (mesensefalon)
Located in front of the midbrain and cerebellum Varol bridge. In front of the thalamus and midbrain are the pituitary gland which regulates the endocrine glands work. The top (dorsal) of the optic lobe of the brain is the central governing such eye reflex constriction of pupils, and also the auditory center.

Small brain (Serebellum)
The cerebellum has a primary function in the coordination of muscle movements that occur consciously, balance, and body position. If there are adverse or harmful stimuli then normal voluntary movement impossible.

Varol bridge (pons Varoli)
Varol bridge contains nerve fibers that connect the cerebellum it left and right, also Menghu bungkan big brain and spinal cord.

Connecting cord (medulla oblongata)
Connecting marrow function leads impulses coming from the spinal cord to the brain. Connecting cord also affects the bridge, reflex physiology such as heart rate, blood pressure, volume and speed of respiration, digestion tool motion, and the secretion of digestive glands.

Sunday, December 15, 2013

Disease Transmission Method in Dental Medicine

Pathogenic microorganisms found in blood, saliva, and dental plaque can contaminate the hands of the people who work in the field of dentistry. These microorganisms can contaminate instruments, dental appliances and surfaces of other equipment in the practice room. Preventive action includes all actions necessary to protect dentists, employees, and patients from the spread of infectious disease through dental treatment. Procedure infection prevention measures should be directed towards all patients and dental care to all of the action. All instruments used in the oral cavity should be sterilized. All surfaces and tools are touched by hands contaminated saliva or blood that can not be sterilized must be thoroughly cleaned and disinfected with effective materials, with alternative ingredients just covered with waterproof cover.

Contamination of the oral cavity and open sores can be spread by air, water, dust, aerosols, splashes or droplets, respiratory tract secretions, plaque, calculus, dental filling materials and debris. Pathogenic oral flora of patients can be transmitted to the tissue or organ (autogenous infection) such as heart valves, artificial joints and surrounding soft tissue, and bone.



Common route of transmission of microorganisms in dental practice can occur through the following ways:

  • Direct contact with infectious lesions, saliva and blood of infected
  • Indirect contact through an intermediary transfer of microorganisms from contaminated objects
  • Sprays of blood, saliva or secretions from the nasopharynx directly on the skin or mucosal abrasions or intact
  • Aerosols, airborne spread of microorganisms.

The possibility of the spread of infection in dental practice can be through:
  • Of patients to dentists, dental nurses, dental tehniker.
HIV transmission from patient to dentist generally occurs due to maintenance actions that cause injury to the mucosa of the mouth, tongue and blood can get into the wound through / aberration hand dentist.
  • From patients to other patients
Transmission can occur through contaminated dental instruments such as syringes, burs, sonde, etc.
  • From dentist to patient
Infection control in general

Your dentist may not be sure that the patients coming for dental care is a carrier or not infective microorganisms, therefore all patients who come to be considered a carrier of pathogenic microorganisms. All clinical procedures were performed in all patients should be performed using a common infection control.
Many sources of infection transmission in dental practice among other hand, saliva, respiratory secretions, blood, clothes, and hair, as well as dental instruments and other equipment should really be considered to reduce the risk of infection.

Contamination of the oral cavity and open wounds can be caused by air, water, dust, aerosols, splashes, respiratory tract secretions, plaque, tartar, tooth tumpatan materials and debris. Pathogenic oral flora of patients who can enter into other tissues or organs.

Infection by air
Microorganism are transmitted through the air contained in the aerosol inhaled and therefore can cause influenza illness, commond cold, and tuberculosis. In the event of aerosols for example by high-speed instruments, sparks formed with different sizes. Sprinkling diameter larger than 100 nanometers are called splatter will quickly fall by gravity, being a spark is common measuring less than 100 nanometers in diameter. This small spark quickly evaporate and remain in the air for several hours as droplet nuclei containing the secretion of saliva or serum were dried and microorganisms.

The main line of the transmission of infectious diseases in the field of dentistry is through the skin or mucosa injured by sharp objects or needles, including here is the spread of hepatitis B from a patient to a dentist and a proven otherwise.

Transmission of disease through the eyes:
During treating patients, large particles of debris and saliva can be ejected at the dentist's face. These particles can contain high concentrations of bacteria and can physically injure the eye. For these goggles should be worn, not only to prevent injury, but also to prevent the occurrence of infections, therefore the eyes can be a port d'entree for entry of microorganisms into the body.

Abnormalities in the mouth that are on the case consists of several types of abnormalities in the following analysis.

Cutix orificialis
Diagnosis is made ​​based on the clinical picture of the patients in both corners of the mouth are surrounded fissures widespread erythematous areas, prominent, and granular, it is in accordance with the clinical symptoms of this disease is a disease that is usually on the lips or mouth-shaped fringe shallow ulcer granulation (different from lesions due to anemia), which is derived from a small tubercle-tubercle rupture, the presence of pain and erythematous area.

The presence of anemia manifestations in the oral cavity
It is marked with a picture of a pale oral mucosa, both on the cheek, gingiva, and palate. Pale mucous is a result of a decrease in iron levels in the blood that can lead to reduced red blood cell distribution including into the oral cavity.

Gingivitis tuberculosis
Diagnosis is made ​​based on clinical features found in the oral cavity of patients, the presence of inflammation of the gingiva and oral hiegine supported by poor patients who also lead to gingivitis. Tuberculosis usually appear diffuse gingivitis, hyperemia, nodular or papillary proliferation of gingival mucosa

Glossitis tuberculosis
Diagnosis of the disease is well established based on the clinical picture of the patient's oral cavity which in the case stated that the patient's tongue smooth, pale, enlarged (makroglossia), as well as experiencing atrophy of the papillae on the tongue due to accumulation of bacilli which worsened with anemia conditions.

Tlcerative lesions
In the case mentioned that part of the right lateral tongue contrary to the teeth 46 are ulcers with a diameter of 4 mm, yellowish surface and sore it is in accordance with the clinical characteristics of the lesions ulseraif usually sick, grayish yellow, hard, and well defined. The occurrence of ulcerative lesions on the patient's tongue may occur due to two possibilities, first, as a result of trauma, for example as a result of tooth 46 which has a sharp cusp or already live radix. Second, ulcers can occur as a manifestation of tuberculosis disease suffered by patients where TB bacterium is carried through the bloodstream and accumulate in the sub-mucosa, causing mucosal ulceration of the oral cavity. In addition, TB bacteria can also be carried by saliva containing sputum to the mucosal surface of the mouth that does not intact or injured

Friday, December 13, 2013

Science and Technology

Among scientists there is uniformity of opinion, that the "science" is always composed of knowledge on a regular basis, which is obtained in the base of the pedestal (object) specified by a systematic, methodical, rational / logical, empirical, general and accumulative. While in providing the sense of "knowledge", Bacon and David Home, expressed as the knowledge and experience of the inner senses, Immanuel Kant stated that knowledge is a unity between the mind and experience, while Phyrro theory explains that there is no certainty in knowledge.



Science has basically three components of the formulation buffer body of knowledge, namely:


  • Merely an epistemological matter how knowledge is acquired and organized into bodies of knowledge.
  • Ontological nature of what can be interpreted as reviewed by knowledge, so it is clear that the scope equivalent examination of an advanced object. Or in other words ontologism a formal object of a science.
  • Axiological science is the principle use or function of science.
Academically it can be said that knowledge (body of knowledge), and technology as an art (state of arts) containing pengetian associated with the production process; regarding how various sources, land, capital, labor and skills are combined to realize the purpose of production. "Conventionally includes mastery of the physical and biological world, but also broadly covers social technology, especially social teknoogi development (the social technology of development) so that it is Merode systematic technology to achieve human goals (Eugene Stanley, 1970).

The technology is growing rapidly covering various fields of human life. The breadth of the field of engineering is described as follows:


  • Techniques meluputi economics, meaning the technique is able to produce industrial goods. With the technique, capable of concentrating capital, causing economic centralization.
  • Techniques include organizational fields such as administration, governance, management, law and the military.
  • Techniques include human field. The technique has been mastered all sectors of human life, people increasingly have to adapt to the world of engineering and there is no element of the human person free from the influence of the technique.

Positive impact of science and technology development

  1. Providing various facilities
  2. Facilitate the spread of a variety of information
  3. Increased knowledge and insight
Negative impact of science and technology development

  1. Affect patterns of thinking
  2. The loss of traditional culture
  3. Many cause a variety of damage

Thursday, December 12, 2013

The Importance of Knowledge Management In a Company


Knowledge management in a company is currently in a very important sense. Why only now? Before we get to know the name of his management technology in a sense more important than anything. Why knowledge management is now more important? Knowledge management here is extensive, which will also covers technology management.


So in that context, now increasingly forced to make a requirement for any organization or company to build what is called knowledge management. A company with the state of today's increasingly fierce competition, where every company not only has the same product. However, it requires an innovation. Innovation here is taken from some of the knowledge, the experiences of history that never existed in the company which would require the development of innovations that make the business better.

Knowledge management itself was born because of the competitiveness and innovation that is being faced by the organization or company that has already passed. Everything in the company's business paradigm shift that has put the knowledge as a central issue of organizational performance. At present, a good competitiveness in the business life when having a good innovation continuously. Where innovation capability is determined by how much the organization has a reserve of knowledge, ability to learn, and how active the new innovation.

The importance of knowledge management, how the company has a good knowledge, own a distinctive knowledge (organization-specific knowledge) into a competition which will then build a brand image of the company. Because it is to achieve the maximum in existing business competition by using continuous knowledge management, which will synthesize new knowledge to create a business that will be used to support existing business in the company.

Another thing that is important in the development of knowledge management, which will feel how important it is, examples of resignation of an employee who holds most of the processes in the company and requires knowledge. this as an example of how important it knowledge management in a company.

3 main stages in the cycle of integrated knowledge management are:

1. Capture / create knowledge.

2. Divide and spread the knowledge.

3. And application of the knowledge acquired.

Capturing knowledge within an organization is not purely about technology.
In fact, many companies find that IT only plays a small part in ensuring that information is available to those who need it. Approaches are required depending on the type of business, culture, and the way in which people solve problems.

Capturing knowledge is not purely mechanistic "add-on" as it related to the organization, discovery, and integration of knowledge into the "factory" of the organization. Knowledge should be captured and codified so that could be part of the organization's existing knowledge base. Every organization has a history, which provides a background to the growth and evolution of the organization.
Each organization also has a memory. Embodiment of organizational memory is the experience of its employees, combined with the data stored tangible and knowledge within the organization (Walsh and Ungson, 1991).

Competitive advantage gained by making individual knowledge available within the organization, turning it into a knowledge organization. Full utilization of the knowledge potential of the organization along with individual skills, competencies, ideas, innovations and ideas will enable the company to compete effectively in the future. Knowledge management is the process of capturing tacit knowledge and expertise of individuals within the organization and make it available to every person who needs it. Capturing explicit knowledge is a systematic approach to capturing, organizing and refining the information makes the information easy to find, facilitate learning and problem solving. Once the knowledge is converted into explicit form, then this needs to be organized in a structured document for multipurpose.

Tuesday, December 10, 2013

Knowing the Wireless Charging Technology

Have you heard about the Wireless Charging Technology? Question may arise in your mind, what kind of technology is this?. Wireless charging is a feature that is now pretty much seen on high-end smartphones and some premium category.

Two large groups of the Power Matters Alliance (PMA) and the Wireless Power Consortium, is making a charging standard that will be widely adopted by the industry. It is closely related to several brands such as HTC, LG, Samsung, Blackberry, ZTE, and Google.



Qi is the global standard for wireless charging. With Qi You no longer have to carry a separate charger for each of your devices. Take a Qi-enabled device you are, and you simply find the nearest charging station when the device is in a weak condition of the battery.

In the future, there will be a Qi charging stations everywhere as well as Wi-Fi hotspots. current standards and Qi be applied in some Nokia Lumia smartphone. Broadly speaking, Wipower technology from Qualcomm also adopt this technology. You can simultaneously fill a variety of electronic devices just as mobile phones, digital cameras, game controllers, power tools without having to plug in the charger default.

The workings of inductive charging, or more commonly known as the wireless charging is to use an electromagnetic field to transfer energy between two objects. This is usually done with a tool called a charging station. Energy is sent through inductive coupling to an electrical device, which can then use that energy to charge the battery or run a specific device.

Inductive chargers typically use an inductive coil to create an alternating electromagnetic field from the charging base station. And a second inductive coil in the portable device will take power from the electromagnetic field and converts it back into electrical current to charge the battery. The second induction coil within the adjacent merged to form an electrical transformer.

Advantages of Wireless Charging
  • Reduce the risk of electric or kongslet at the time of use. 
  • No corrosion occurs when all covered electronic devices.
  • In terms of comfort of the need to connect the power cord, the device can ditmpatkan on stand / station.      
Disadvantages of Wireless Charging
  • The main drawback is the inductive charging lower afisiensi and improve heating between two devices compared with direct contact.
  • Due to the lower efficiency, the device may take longer to replenish than traditional charging. 
  • When connected to a cable, mobile devices can freely move and dioprasikan while charging. In some implementations of inductive charging (like a standard Qi), a mobile device should be left on the pad, and thus can not easily be moved or dioprasikan while charging.
  

Lack of sleep can lead to hypertension



In general, those who slept only 6 hours, 42 percent more likely to have hypertension, whereas that used to sleep no more than 5 hours a 31 percent higher risk. The study reported in the journal Hypertension.

The new study observed women only, not men. According to study leader, Dr. Francesco P. Cappuccio from Warwick Medical School, Coventry, these findings suggest the possibility of gender-specific relationships, decreased sleep, and blood pressure. Even so, the exact grounds of these findings is unknown.

A number of studies have linked poor sleep quality to increased risk of high blood pressure, diabetes, and heart disease. Many of these studies focused on people with respiratory disorders, sleep apnea (stopping breathing during sleep). However, some evidence suggests, loss of sleep without any obvious interference, also detrimental to health.
For the study, Cappuccio and his colleagues used data from the long-term health study of 10,300 white British civil servants aged 35-55 years. The researchers focused on respondents that are free of high blood pressure in the 1997-1999 phase of the study and were reassessed in 2003-2005.
During the two-phase, 76 and 68 percent, respectively, of the original group were included in the evaluation. At reassessment, 20 percent of respondents recently diagnosed with high blood pressure and the risk is greater among women with short sleep time.
Risk factors for heart disease, such as smoking, being overweight, or sedentary lifestyle, partially contribute to the relationship. Nevertheless, the relationship between sleep and free blood pressure persists.
Experts speculate that the loss of sleep can contribute to high blood pressure. This is because lack of sleep makes the nervous system in a state of hyperactivity, which in turn affects systems throughout the body, including the heart and blood vessels.
According to the team Cappuccio, need more research to confirm that sleep duration affects blood pressure levels, and why these effects may be different in women and men.

 
 

Monday, December 9, 2013

The Influence of Technology in Education

Technology plays a large role in many aspects of day-to-day life, and education is no different. Technology is rapidly changing the way students learn and how instructors teach.
Computers have replaced chalkboards as the go-to tool in classrooms today. And it’s not just happening in higher education; technology is part of education for children of all ages. It’s also a part of their daily lives. According to a research study by Common Sense Media published in October 2011, “computer use is pervasive among very young children, with half (53%) of all 2 to 4 year olds having ever used a computer, and nine out of 10 (90%) 5 to 8 year olds having done so.”

As technology continues to evolve, it brings with it new opportunities and challenges for educators and students. Social networking is a great example of technology that can help — or hinder — education, depending on how it is used and integrated into teaching plans. Privacy and security are two concerns that can come with using social networking in the classroom. It can also become a distraction to students, or even a tool used for bullying. According to a 2011 Pew report, 15% of children surveyed said they had been the victim of mean behavior on social networking sites like Facebook and Twitter.

However, using social networking as part of the learning process can also have benefits. Students who are more introverted may open up and connect more with faculty and other students when they are communicating through social networking. It also affords students the opportunity to collaborate and work together in a whole new way.
There are also social networking sites designed specifically for education. An article on technology in education by Education Week mentions ePals and eChalk as two sites “designed specifically for learning.”

College students can be notoriously connected to technology, including social networking, through their smartphones, laptops, and tablets. Social media in education presents college students with different benefits and detriments compared to their younger counterparts. According to Mashable, “Facebook is the most used social media tool in higher education.” Additionally, Mashable says that colleges can use social media to encourage school spirit, foster the growth of alumni groups, and offer virtual tours to potential students.


So whether it is a college student studying classic literature or a grade school student first learning to read, technology is now an integral part of the education process.
◄ Posting Baru Posting Lama ►
 

Followers

Web Analytics