An improved way of learning has come to take place the old and boring traditional learning. IPods are not just for music and games anymore. Educational applications have been making students go haywire. I always wondered when a new type of learning was going to come in par. I was always bored with the old type of learning and traditional classes. Spicing it up with iPod learning applications is a great idea. The students at Somerset Elementary School in Minnesota have become very interested in Apple touch-screen media and handheld computers. IPods are starting to get more popular in U.S. schools for learning. For kids tapping, scrolling and swiping are more fun on a device rather than activities for math and spelling that are “boring”. Students show to be more engaged in learning suddenly when it is not paper and pencil. At the school the teacher passes around a laptop to have students download educational apps. The teacher one or more times during the week passes out the charged iPods and the students are excited because to them it is like playtime. Some people argue and are not convinced that students will not have a lasting educational value. Alex Silverman, a man who has thought high school students, is now an app developer has created a new app called eClicker. It allows the teachers and students to communicate with each other through the classrooms Wi-Fi network. This may also create a more interaction through class participation. The app only cost $25 for the teacher and its free for the students. "His students have a variety of learning disabilities that often cannot be overcome with regular teaching methods. But something as simple as a flash-card slide show on touch-screen iPods, with finger swipes for moving from one digital photo to the next, tends to electrify the kids." Suddenly a class of boring students turns into an interested and eager class to learn.
I am glad a new way of learning has finally come. I am already getting some of this new learning in my school now. A program called ISP. I hope we can integrate iPods in our class to.
I will just blog about random things and what is on my mind. Mostly about fashion, makeup, photography, Information Technology and more!
Welcome To Fressshhh Nesss's Blog
I will share many things with you guys!
About Me
Saturday, June 12, 2010
Friday, June 11, 2010
No Cash, That’s Ok!

Now carrying cash is just like another heavy, bulky thing that you have to lug around. Well not anymore. A lot of people don’t bring cash because of this reason. These days’ people only carry plastic on them because it is an easy form of payment and is smaller than a big roll of green paper taking up room in your pocket. People with small business may lose customers this way. Not anymore! If you have an iPhone then you no longer have to decline a person with a credit card every again. The “Square” new mobile payment solution is just what you are looking for. Square was developed from Twitter founder Jack Dorsey. The Square is a very small plastic cube. It is about the size of two Chiclets. On the bottom it has an audio connector that plugs into the headphone port. There is a small slot in the cube that lets you pass the credit card through. After sliding, the reader on the Square converts that data from the magnetic strip into an audio signal (cool huh!) and passes it on to software on the phone. The square is still in early beta mode, but Wired was able to get it and put it to the test! Even though the pricing, software and sign up process are not final, they look at it as a great option to let anyone with something to sell be able to accept those impossible credit card payments. It is able to accept the general credit card like Visa, American Express and MasterCard. There also trying to have it work for Discover and also Diner’s Club. So far the hardware and required account are free. But the sale systems will charge merchants variable fees based on the card used. And the square will charge a flat rate for all cards. The software for this advanced peace of technology is well-designed. It is required to have an internet connection to run it, but it will work using Wi-Fi. When the credit card number is entered, the transaction is authorized, and a new screen lets the purchaser sign their name using the touchscreen. There is also an option for a transaction receipt to be emailed and emailed to the vendor as well. For the vendor it is a quick an easy process. It takes less than a minute. Money will show up in the vendor’s bank account one to two days after the transaction. There are so many options, you can refund transactions, create accounts tied to peoples credit card, and upload a head shot. A merchant can swipe a card that’s associated with a Square payers account; the head shot will appear and ask for verification that it’s the person making the transaction. So far the square has an app for the iPhone, iPod touch, and the iPad. They are working on an Android version of its software is currently being worked on. But in the future they hope to have it work for any device that contains a audio port, like laptops.
Disk Cloning
What is Disk Cloning?
Many people wonder, what is disk cloning. It is not a very hard concept to understand but people may get it confused with “regular” cloning with humans and animals. It is two totally different things. Disk cloning is the process of copying the contents of one computers hard disk to another disk or to an “image” file. Usually the first part of the disk is copied as an image file and then the second disk is loaded with the contents of the image. This is also a useful procedure when you move a larger capacity disk or to restore to a virgin installation.
Why use Dick Cloning?
There are many reasons for using disk cloning. They include:
• Reboot and restore – this is a technique used in which the disk of the computer is automatically wiped and restored from a “clean”, master image, which should be in full working order and should have been swept for viruses. This is used in cybercafés and also in some training and educational institutes. This is just a safety precaution they use so that the user doesn’t misconfigure something, downloads something inappropriate content or programs, or puts a virus on a computer. If any of this happens it can be restored to a clean and working state. This reboot and restore process can either take place irregularly when a computer shows signs of malfunctioning, on a regular basis or sometimes every time a user logs off. The reboot and restore process is the safest approach and does involve some downtime.
• Provisioning new computers – When you need to download a lot of programs for a new user you can download a complete application suite and not have to waste time installing individual applications. Sometimes this is often used by original equipment manufacturers and larger companies.
• Hard drive upgrade – Sometimes an individual user may want to upgrade to a new or lager hard disk, so disk cloning may be easier than copying everything over and installing previous software.
• Full system backup – Backing up your operating system and installed software are very important because of all of the information people store on their computer and count on it to be there every time they start up their computer.
• System recovery – An OEM can provide media that can restore a computer to its original factory software configuration.
• Transfer to another user – A system that gets moved to another user may be reset by reloading a known, previous-saved image that will not contain and personal files, information, or bought programs.
How Does Disk Cloning Work?
To provision the hard disk of a computer without using disk cloning software, the following steps are generally required for each computer:
1. Create one or more partitions on the disk
2. Format each partition to create a file system on it
3. Install the operating system
4. Install device drivers for the particular hardware
5. Install application software
With disk cloning, this can be simplified to:
1. Install the first computer, as above.
2. Create an image of the hard disk (optional)
3. Clone the first disk, or its image, to the remaining computers
Many people wonder, what is disk cloning. It is not a very hard concept to understand but people may get it confused with “regular” cloning with humans and animals. It is two totally different things. Disk cloning is the process of copying the contents of one computers hard disk to another disk or to an “image” file. Usually the first part of the disk is copied as an image file and then the second disk is loaded with the contents of the image. This is also a useful procedure when you move a larger capacity disk or to restore to a virgin installation.
Why use Dick Cloning?
There are many reasons for using disk cloning. They include:
• Reboot and restore – this is a technique used in which the disk of the computer is automatically wiped and restored from a “clean”, master image, which should be in full working order and should have been swept for viruses. This is used in cybercafés and also in some training and educational institutes. This is just a safety precaution they use so that the user doesn’t misconfigure something, downloads something inappropriate content or programs, or puts a virus on a computer. If any of this happens it can be restored to a clean and working state. This reboot and restore process can either take place irregularly when a computer shows signs of malfunctioning, on a regular basis or sometimes every time a user logs off. The reboot and restore process is the safest approach and does involve some downtime.
• Provisioning new computers – When you need to download a lot of programs for a new user you can download a complete application suite and not have to waste time installing individual applications. Sometimes this is often used by original equipment manufacturers and larger companies.
• Hard drive upgrade – Sometimes an individual user may want to upgrade to a new or lager hard disk, so disk cloning may be easier than copying everything over and installing previous software.
• Full system backup – Backing up your operating system and installed software are very important because of all of the information people store on their computer and count on it to be there every time they start up their computer.
• System recovery – An OEM can provide media that can restore a computer to its original factory software configuration.
• Transfer to another user – A system that gets moved to another user may be reset by reloading a known, previous-saved image that will not contain and personal files, information, or bought programs.
How Does Disk Cloning Work?
To provision the hard disk of a computer without using disk cloning software, the following steps are generally required for each computer:
1. Create one or more partitions on the disk
2. Format each partition to create a file system on it
3. Install the operating system
4. Install device drivers for the particular hardware
5. Install application software
With disk cloning, this can be simplified to:
1. Install the first computer, as above.
2. Create an image of the hard disk (optional)
3. Clone the first disk, or its image, to the remaining computers
Tuesday, June 8, 2010
Servers
Proxy Servers
What are they?
Proxy server is a server that is usually used on a private network that will allow access to external network resources. In typical network configurations, the computers on a company network care separated from the internet by a firewall (for security reasons). The computers on the network are not able to access the internet directly to browse for web pages, so therefore the browser must be configured to use a proxy server. The proxy server is allowed to access the internet to service requests for web pages from the internet. All common browsers can support this configuration, usually titled, “Use a Proxy Server”.
How they do they Work?
Proxies are store-and-forward caches. You can configure your web browser to use a proxy; this will make it so that it never connects to the URL. It is cool because instead it will always connect to the proxy server, and asks to get the URL for you. Proxies can and sometimes used for some sort of firewall, because it isolates you from connecting to the Internet.
A Proxy server receives a request for an Internet Service from a user. Then if it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. But if the page is not in the cache, then the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, it then relates it to the original request and forwards in on to the user. The proxy is invisible to the user; any of the Internet requests and returned responses appears to be directly with the addresses Internet server.
What are their advantages?
A proxy server’s cache can serve all users. Also to improve user response time, if one or more internet sites are frequently requested then they are likely to be in the proxy’s cache. There are also different types of proxy servers with different features, some are anonymous proxies so that it can hide your real IP address and some are used to filter sites, for example sites that have things that may be unsuitable for people to view. With a proxy server you are not completely anonymous because when you connect to a web site, your true IP address will not be shown, but the proxy servers IP will and therefore the proxy server will have logs of IP’s that used the proxy server and the times.
What are some possible uses?
Some possible uses can be if you have a child and you want to restrict sites that they are viewing, you can do that with the right type of proxy because not all of them filter sites. It is also used for protection, so if a hacker hacks you, your IP address will be hidden and they can’t get info about you when using it. They will only be able to get the servers IP. Also they are not hard to set up, there is no hardware or software needed, all you have to do is configure your browser to connect through it. ______________________________________________________________________________
File Server
What are they?
A file server is a computer attached to a network that has the primary purpose of providing a location for a shared disk access. The file server is a shared storage of computer files. It contains documents, sound files, photographs, movies, images, databases and more. These certain files can be accessed be the workstations that are attached to the computer network. The file server does not usually perform any calculations, and does not run any programs on behalf of the clients. It is basically designed to enable the rapid storage and retrieval of data where the heavy computation is provided by the workstations.
How they do they Work?
File servers can either be dedicated or non-dedicated. Dedicated servers are basically designed specifically used for a file server, with workstations attached for reading and writing files and databases. File servers can also be categorizes by the method of access. For example Internet file servers are frequently accessed by File Transfer Protocol (FTP) or by HTTP.
What are their advantages?
File servers are good to use because they will save space on each individual client computer. They help with storage space, access speed, recoverability, ease of administration, security, and budget. File servers basically offer some form of system security to limit access to files to specific users or groups.
What are some possible uses?
File servers are sometimes used in offices, schools, businesses, and sometimes even houses.
______________________________________________________________________________
Print Server
What are they?
A print server is basically a device that allows computer workstations to interact with one or more printers that are shared on the network. They are mainly used in offices but can also be used for personal use. In an office, a printer service would be used to connect all the office computers to one printer. The print server can either be in the form of a small server that acts with the main office servers to allow printing capability. In many situations, one of the computers in the network group is designated as the print server. The software needed to allow for this function is loaded onto the hard drive of the computer that will be used as the print server.
Once the hardware is loaded and installed, the software can be configured to recognize all the printers in the office, as well as all the workstations that are allowed access to server functions. Once the credentials are established on the print server, each work station can be configured to connect with the server for printing capabilities. These printing capabilities include granting or restricting rights to any one of the printers that are recognized by the print server.
What this arrangement does is ensures that there is always a printer available to any member of the office. If one printer is temporarily out of service, it is a simple task to send the print job to a different printer on the network. Having a print server that allows access to multiple printers saves a lot of time and money.
What are they?
Proxy server is a server that is usually used on a private network that will allow access to external network resources. In typical network configurations, the computers on a company network care separated from the internet by a firewall (for security reasons). The computers on the network are not able to access the internet directly to browse for web pages, so therefore the browser must be configured to use a proxy server. The proxy server is allowed to access the internet to service requests for web pages from the internet. All common browsers can support this configuration, usually titled, “Use a Proxy Server”.
How they do they Work?
Proxies are store-and-forward caches. You can configure your web browser to use a proxy; this will make it so that it never connects to the URL. It is cool because instead it will always connect to the proxy server, and asks to get the URL for you. Proxies can and sometimes used for some sort of firewall, because it isolates you from connecting to the Internet.
A Proxy server receives a request for an Internet Service from a user. Then if it passes filtering requirements, the proxy server, assuming it is also a cache server, looks in its local cache of previously downloaded Web pages. If it finds the page, it returns it to the user without needing to forward the request to the Internet. But if the page is not in the cache, then the proxy server, acting as a client on behalf of the user, uses one of its own IP addresses to request the page from the server out on the Internet. When the page is returned, it then relates it to the original request and forwards in on to the user. The proxy is invisible to the user; any of the Internet requests and returned responses appears to be directly with the addresses Internet server.
What are their advantages?
A proxy server’s cache can serve all users. Also to improve user response time, if one or more internet sites are frequently requested then they are likely to be in the proxy’s cache. There are also different types of proxy servers with different features, some are anonymous proxies so that it can hide your real IP address and some are used to filter sites, for example sites that have things that may be unsuitable for people to view. With a proxy server you are not completely anonymous because when you connect to a web site, your true IP address will not be shown, but the proxy servers IP will and therefore the proxy server will have logs of IP’s that used the proxy server and the times.
What are some possible uses?
Some possible uses can be if you have a child and you want to restrict sites that they are viewing, you can do that with the right type of proxy because not all of them filter sites. It is also used for protection, so if a hacker hacks you, your IP address will be hidden and they can’t get info about you when using it. They will only be able to get the servers IP. Also they are not hard to set up, there is no hardware or software needed, all you have to do is configure your browser to connect through it. ______________________________________________________________________________
File Server
What are they?
A file server is a computer attached to a network that has the primary purpose of providing a location for a shared disk access. The file server is a shared storage of computer files. It contains documents, sound files, photographs, movies, images, databases and more. These certain files can be accessed be the workstations that are attached to the computer network. The file server does not usually perform any calculations, and does not run any programs on behalf of the clients. It is basically designed to enable the rapid storage and retrieval of data where the heavy computation is provided by the workstations.
How they do they Work?
File servers can either be dedicated or non-dedicated. Dedicated servers are basically designed specifically used for a file server, with workstations attached for reading and writing files and databases. File servers can also be categorizes by the method of access. For example Internet file servers are frequently accessed by File Transfer Protocol (FTP) or by HTTP.
What are their advantages?
File servers are good to use because they will save space on each individual client computer. They help with storage space, access speed, recoverability, ease of administration, security, and budget. File servers basically offer some form of system security to limit access to files to specific users or groups.
What are some possible uses?
File servers are sometimes used in offices, schools, businesses, and sometimes even houses.
______________________________________________________________________________
Print Server
What are they?
A print server is basically a device that allows computer workstations to interact with one or more printers that are shared on the network. They are mainly used in offices but can also be used for personal use. In an office, a printer service would be used to connect all the office computers to one printer. The print server can either be in the form of a small server that acts with the main office servers to allow printing capability. In many situations, one of the computers in the network group is designated as the print server. The software needed to allow for this function is loaded onto the hard drive of the computer that will be used as the print server.
Once the hardware is loaded and installed, the software can be configured to recognize all the printers in the office, as well as all the workstations that are allowed access to server functions. Once the credentials are established on the print server, each work station can be configured to connect with the server for printing capabilities. These printing capabilities include granting or restricting rights to any one of the printers that are recognized by the print server.
What this arrangement does is ensures that there is always a printer available to any member of the office. If one printer is temporarily out of service, it is a simple task to send the print job to a different printer on the network. Having a print server that allows access to multiple printers saves a lot of time and money.
Monday, May 24, 2010
Sprint Overdrive 3G/4G Mobile Hotspot by Sierra Wireless
Sooner or later internet will be everywhere we walk. No matter where you go there will be internet. But it used to be having Ethernet cables all up and down your house. Sprints new Overdrive gives you internet with a stupendous speed that can be compared to the internet from a cable modem as long as you are in the right city. Some of the U.S. carriers offer reasonably fast #G wireless data. The wireless speeds happen to be about one megabit per second. But surprisingly Sprint is the first American carrier that has came out with a faster 4G connection which will be faster. It is available in about 29 cities which include Austin, Texas where it was being tried out at the SXSW Music, Film and Interactive Festival. It is very similar to the Verizon MiFi which was reviewed last year. The Sprint Overdrive takes a wireless connection where ever you go and is used to create a local Wi-Fi hotspot that you are able to connect your device you. The Sprint Overdrive works similar to a regular Wi-Fi router, with the standard options like security. But with the overdrive you can unplug it and carry it outside and it works just like it did inside. One of the downfalls of the Overdrive is that it can only support up to five devices at a time. So for example that is enough for your laptop, cellphone, iPad, portable gaming device and your digital camera. While they tested the device, they realized that when the Overdrive is in default settings, they were able to squeeze out about three hours of battery life. This was while the device was engaged in typical internet usage (browsing, e-mailing, uploading a video file, streaming music). Usually that would be enough for a morning telecommuting session from a park or coffee shop. It would have been a great add on to have a optional battery pack so you can stay online for longer but when the battery is low or dead you are going to have to retreat to a power outlet. I bet you are wondering how fast the Sprint 4G network is! Well on a Wi-Fi-connected Motorola Droid it was average to be about 1.53 Mbps downstream. On the laptop the connection was 3.16 Mbps downstream and 0.59 Mbps upstream. This is not bad compared to the American broadband speed was 3.9 Mbps in Q3 of 2009. Even Akamai’s most recent report, they believe the Overdrive lives up to its promise of delivering mobile broadband. The Overdrive also has a plausible cellphone alternative, only if you want to take a step on voice over Internet Protocol, but only if you are also able to deal with the short battery life. It is a very small device, in fact small enough to fit in your back pocket or in your bag. It is not very cheap, but it is definitely less expensive than the iPhones 3GS service. You can also add extras. There is a microSD slot for adding up to 16 GB of shared network Storage. Also there is a optional Wi-Fi range reducer to conserve battery life. There is also a browser-based dashboard with GPS with Google Maps, MapQuest, Microsoft Bing or Yahoo. I can’t wait until this is available in more cites. This is something I would love to have.
Sunday, May 23, 2010
New Ways of Learning
A new and improved way of learning has come to take place the old and boring traditional learning. IPods are not just for music and games anymore. Educational applications have been making students go haywire. I always wondered when a new type of learning was going to come in par. I was always bored with the old type of learning and traditional classes. Spicing it up with iPod learning applications is a great idea. The students at Somerset Elementary School in Minnesota have become very interested in Apple touch-screen media and handheld computers. IPods are starting to get more popular in U.S. schools for learning. For kids tapping, scrolling and swiping are more fun on a device rather than activities for math and spelling that are “boring”. Students show to be more engaged in learning suddenly when it is not paper and pencil. At the school the teacher passes around a laptop to have students download educational apps. The teacher one or more times during the week passes out the charged iPods and the students are excited because to them it is like playtime. Some people argue and are not convinced that students will not have a lasting educational value. Alex Silverman, a man who has thought high school students, is now an app developer has created a new app called eClicker. It allows the teachers and students to communicate with each other through the classrooms Wi-Fi network. This may also create a more interaction through class participation. The app only cost $25 for the teacher and its free for the students. "His students have a variety of learning disabilities that often cannot be overcome with regular teaching methods. But something as simple as a flash-card slide show on touch-screen iPods, with finger swipes for moving from one digital photo to the next, tends to electrify the kids." Suddenly a class of boring students turns into an interested and eager class to learn.
I am glad a new way of learning has finally come. I am already getting some of this new learning in my school now. A program called ISP. I hope we can integrate iPods in our class to.
I am glad a new way of learning has finally come. I am already getting some of this new learning in my school now. A program called ISP. I hope we can integrate iPods in our class to.
Monday, May 17, 2010
Gonna Spread my Wings, Sweet 16

So I was bored and I decided to look through my computer for some pictures to blog about and I ran into one of my favorite pictures. It was a picture that was took by my brother but edited by me. It was the day before my sweet 16. I wanted to have a little photo shoot in my dress and I wanted to be able to blow it up really big and have my friends that come into my party sign it. It was a success. That was a really fun night and I am glad I was able to spend it with all of my friends and family I love so much. This is the picture above.
Subscribe to:
Posts (Atom)