Category Archives: SMS Gateways

Why Do More and More People Choose Online Payments?

Consumers are used to having instant connections with information, entertainment, other users through text message, social media and products they want to purchase. Since people expect that almost all their needs can immediately be addressed with the help of technology, it is not surprising that they would rather go for online payments and the businesses that accept them.

The top reasons why people choose online payments are as follows:

They get rid of geographical limits.

A person who travels to another country/continent has to adapt to the place and make do with what they have inside their wallet. This may mean exchanging foreign currency or using another credit card than what they would commonly use. Online payments get rid of the problems that keep them from joining in an international marketplace.

A lot of payment processors supply businesses so they can accept a wide range of currencies, automatically compute the current exchange rate based on the currency, and also adjust to the language and info provided in checkout forms to take in the different languages spoken by buyers, depending on the currency used.

They are more convenient than ever.

Payment technology is so advanced to the extent that consumers are able to make an online payment even though they did not bring their card or wallet with them. Besides the growing popularity of mobile wallets, studies reveal that online consumers continue to go for other simpler forms of funding. As a matter of fact, above 80% of respondents said that they made use of a card-free payment tool last year for online payment.

They let consumers save on time.

Aside from being convenient in terms of transaction speed, online payments get rid of the need for consumers to go to a physical store, spend their precious time, and wait for their turn to pay. Studies regarding the psychological effect of waiting in line show how time is precious to consumers. They have the tendency to exaggerate how much waiting consumes their time by almost 40%. Even if the length of time lost by a customer from waiting in line is true or just imagined, the perception is real. Online payments give a clear advantage just by providing the buyer with a choice of how to spend time.

They give more buyer protection.

When customers buy from a small business – whether online or from a physical store – they need to establish a certain amount of trust with the seller, since this is their first time to buy from this merchant. No matter how clear a business explains its policies on return, exchange, as well as customer satisfaction, consumers may still be a bit hesitant. Online payments can address this problem. When they use a credit card for online payment that gives a guarantee of the lowest price for a declared number of days, an extension of manufacture warranties and the right to dispute a purchase, they can have the peace of mind that they will be given protection, whatever the merchant’s policy is.

They duplicate their present financial habits.

More than 50% of Americans depend on the online banking tool to pay bills, transfer funds and track their money. Online payments duplicate the financial habits that have been adapted by a lot of consumers.



Source by Karina Popa

Importance of Supply Chain Management in Modern Businesses

Supply Chain Management (SCM) as defined by Tom McGuffog is “Maximising added value and reducing total cost across the entire trading process through focusing on speed and certainty of response to the market.” Due to globalization and ICT, SCM has become a tool for companies to compete effectively either at a local level or at a global scale. SCM has become a necessity especially for manufacturing industry when it comes to deliver products at a competitive cost and at a higher quality than their competitors. Here are some of the reason SCM has become important to today’s manufacturing industry:-

Competitive Edge through Core Competencies

Today’s business climate has rapidly changed and has become more competitive as ever in nature. Businesses now not only need to operate at a lower cost to compete, it must also develop its own core competencies to distinguish itself from competitors and stand out in the market. In creating the competitive edge, companies need to divert its resources to focus on what they do best and outsource the process and task that is not important to the overall objective of the company. SCM has allowed company to rethink their entire operation and restructure it so that they can focus on its core competencies and outsource processes that are not within the core competencies of the company. Due to the current competitive market, it is the only way for a company to survive. The strategy on applying SCM will not only impact their market positioning but also strategic decision on choosing the right partners, resources and manpower. By focusing on core competencies also will allow the company to create niches and specialization of core areas. As stated in the Blue Ocean Strategy outlined by Chan Kim, in order to create a niche for competitive advantage, companies must look at the big picture of the whole process, and figuring out which process can be reduce, eliminate, raise and create.

As an example stated by Chan Kim, the Japanese automotive industries capitalise on its resources to build small and efficient cars. The Japanese automotive industries gain competitive edge by utilising their supply chain to maximise their core competencies and position itself in a niche market. The strategy works and now Toyota Motor Corporation, a Japanese company, is considered to be the number one auto car maker in the world beating Ford and General Motors of the United States.

Value Advantage

SCM has allowed business nowadays to not just have productivity advantage alone but also on value advantage. As Martin Christopher in his book, Logistics and Supply Chain Management: Strategies for Reducing Cost and Improving Service’ states, ‘Productivity advantage gives a lower cost profile and the value advantage gives the product or offering a differential ‘plus’ over competitive offerings.’ Through maximizing added value and also reduce the cost in the same time, more innovation can be added to the product and process. Mass manufacturing offers productivity advantage but through effective supply chain management, mass customization can be achieved. With mass customization, customers are given the value advantage through flexible manufacturing and customized adaptation. Product life cycles also can be improved through effective use of SCM. Value advantage also changes the norm of traditional offerings that is ‘one-size-fits-all.’ Through SCM, the more accepted offerings by the industry to the consumers would be a variety of products catered to different market segments and customers preferences.

As an example, the Toyota Production System practiced in Toyota, evaluates its supply chain and determines what is value added activities and what is not value added activities. Non added value activities are considered to be ‘Muda’ or waste and therefore must be eliminated. Such non added value activities are overproduction, waiting, unnecessary transport, over processing, excess inventory, unnecessary movement, defects and unused employee creativity. The steps taken to eliminate waste are through Kaizen, Kanban, Just-in-time and also push-pull production to meet actual customer’s demands. The Toyota Production System revolutionise the Supply Chain Management towards becoming a leaner supply chain system that is more agile and flexible towards meeting the end users demands.



Source by Razamith Sovereign

How to Implement a Contingency Plan

A contingency plan is developed to prepare a business to face abnormal situations and mitigate the impact of sudden disasters. The plan outlines the procedure to be followed in the event of failure of one or more critical systems.

The implementation of a contingency plan depends upon the size of the organization and the resources available during the crisis. The plan should be designed, reviewed and accepted by the management. The plan should be shared with the key members of the organization. Companies should periodically execute the steps outlined in the plan as an exercise, to be prepared when the need arises.

The business should have a contingency team that takes over the operations and implements the plan for every type of risk identified. Equipment failure due to natural disasters and sabotage may be covered by insurance. The personnel implementing the contingency plan should be aware of the contact details of people or service providers to be reached during the emergency situation, to get assistance in fixing the issue and bringing the business operations back to normal.

Communication and notification is an important part of implementing a contingency plan. If a primary business location is affected by fire or flood, the plan might be to move the employees and equipment to another location. To implement this plan of shifting operations to a new location, there should be a good communication plan in place. If the problem arises during working hours, the evacuation procedure should be followed and emergency help lines should be used to secure help. The persons responsible for implementation of the contingency plan should be able to contact all employees by a previously agreed upon mode (telephone / e-mail / SMS) and inform them to report for work at the new location until the old one can be made functional again. External suppliers, distributors and customers should also be notified of change in location, and whom to get in touch with to resume operations and contact details.

Contingency planning is important while executing a project. If a key team member is rendered out of action, there should be another team member capable of stepping in to perform important tasks. If the project follows good knowledge sharing practices and has good documentation, it will facilitate induction of new support staff (developers / testers) for assistance. It is important to communicate to the client that the absence of the regular person will not affect the project delivery schedule. If the project runs into issues which are likely to affect budget or deadlines, the person(s) implementing the contingency plan should know what needs to be communicated to client. The person should also know how and when the information should be sent to convince the client that measures have been taken to mitigate the risks and bring the situation under control. The implementer should perform follow-ups and send status updates to keep the management and client informed during a problem situation.

Early warning systems should be in place to notify / escalate issues to the relevant person(s) in-charge. Analysis, assessment, co-ordination, prioritization and preparedness are the key elements for implementing a plan. Contingency plans should be periodically updated and the lessons learnt from every incident should be incorporated into the plan.



Source by N Gabb

An Introduction to Forensics Data Acquisition From Android Mobile Devices

The role that a Digital Forensics Investigator (DFI) is rife with continuous learning opportunities, especially as technology expands and proliferates into every corner of communications, entertainment and business. As a DFI, we deal with a daily onslaught of new devices. Many of these devices, like the cell phone or tablet, use common operating systems that we need to be familiar with. Certainly, the Android OS is predominant in the tablet and cell phone industry. Given the predominance of the Android OS in the mobile device market, DFIs will run into Android devices in the course of many investigations. While there are several models that suggest approaches to acquiring data from Android devices, this article introduces four viable methods that the DFI should consider when evidence gathering from Android devices.

A Bit of History of the Android OS

Android’s first commercial release was in September, 2008 with version 1.0. Android is the open source and ‘free to use’ operating system for mobile devices developed by Google. Importantly, early on, Google and other hardware companies formed the “Open Handset Alliance” (OHA) in 2007 to foster and support the growth of the Android in the marketplace. The OHA now consists of 84 hardware companies including giants like Samsung, HTC, and Motorola (to name a few). This alliance was established to compete with companies who had their own market offerings, such as competitive devices offered by Apple, Microsoft (Windows Phone 10 – which is now reportedly dead to the market), and Blackberry (which has ceased making hardware). Regardless if an OS is defunct or not, the DFI must know about the various versions of multiple operating system platforms, especially if their forensics focus is in a particular realm, such as mobile devices.

Linux and Android

The current iteration of the Android OS is based on Linux. Keep in mind that “based on Linux” does not mean the usual Linux apps will always run on an Android and, conversely, the Android apps that you might enjoy (or are familiar with) will not necessarily run on your Linux desktop. But Linux is not Android. To clarify the point, please note that Google selected the Linux kernel, the essential part of the Linux operating system, to manage the hardware chipset processing so that Google’s developers wouldn’t have to be concerned with the specifics of how processing occurs on a given set of hardware. This allows their developers to focus on the broader operating system layer and the user interface features of the Android OS.

A Large Market Share

The Android OS has a substantial market share of the mobile device market, primarily due to its open-source nature. An excess of 328 million Android devices were shipped as of the third quarter in 2016. And, according to netwmarketshare.com, the Android operating system had the bulk of installations in 2017 — nearly 67% — as of this writing.

As a DFI, we can expect to encounter Android-based hardware in the course of a typical investigation. Due to the open source nature of the Android OS in conjunction with the varied hardware platforms from Samsung, Motorola, HTC, etc., the variety of combinations between hardware type and OS implementation presents an additional challenge. Consider that Android is currently at version 7.1.1, yet each phone manufacturer and mobile device supplier will typically modify the OS for the specific hardware and service offerings, giving an additional layer of complexity for the DFI, since the approach to data acquisition may vary.

Before we dig deeper into additional attributes of the Android OS that complicate the approach to data acquisition, let’s look at the concept of a ROM version that will be applied to an Android device. As an overview, a ROM (Read Only Memory) program is low-level programming that is close to the kernel level, and the unique ROM program is often called firmware. If you think in terms of a tablet in contrast to a cell phone, the tablet will have different ROM programming as contrasted to a cell phone, since hardware features between the tablet and cell phone will be different, even if both hardware devices are from the same hardware manufacturer. Complicating the need for more specifics in the ROM program, add in the specific requirements of cell service carriers (Verizon, AT&T, etc.).

While there are commonalities of acquiring data from a cell phone, not all Android devices are equal, especially in light that there are fourteen major Android OS releases on the market (from versions 1.0 to 7.1.1), multiple carriers with model-specific ROMs, and additional countless custom user-complied editions (customer ROMs). The ‘customer compiled editions’ are also model-specific ROMs. In general, the ROM-level updates applied to each wireless device will contain operating and system basic applications that works for a particular hardware device, for a given vendor (for example your Samsung S7 from Verizon), and for a particular implementation.

Even though there is no ‘silver bullet’ solution to investigating any Android device, the forensics investigation of an Android device should follow the same general process for the collection of evidence, requiring a structured process and approach that address the investigation, seizure, isolation, acquisition, examination and analysis, and reporting for any digital evidence. When a request to examine a device is received, the DFI starts with planning and preparation to include the requisite method of acquiring devices, the necessary paperwork to support and document the chain of custody, the development of a purpose statement for the examination, the detailing of the device model (and other specific attributes of the acquired hardware), and a list or description of the information the requestor is seeking to acquire.

Unique Challenges of Acquisition

Mobile devices, including cell phones, tablets, etc., face unique challenges during evidence seizure. Since battery life is limited on mobile devices and it is not typically recommended that a charger be inserted into a device, the isolation stage of evidence gathering can be a critical state in acquiring the device. Confounding proper acquisition, the cellular data, WiFi connectivity, and Bluetooth connectivity should also be included in the investigator’s focus during acquisition. Android has many security features built into the phone. The lock-screen feature can be set as PIN, password, drawing a pattern, facial recognition, location recognition, trusted-device recognition, and biometrics such as finger prints. An estimated 70% of users do use some type of security protection on their phone. Critically, there is available software that the user may have downloaded, which can give them the ability to wipe the phone remotely, complicating acquisition.

It is unlikely during the seizure of the mobile device that the screen will be unlocked. If the device is not locked, the DFI’s examination will be easier because the DFI can change the settings in the phone promptly. If access is allowed to the cell phone, disable the lock-screen and change the screen timeout to its maximum value (which can be up to 30 minutes for some devices). Keep in mind that of key importance is to isolate the phone from any Internet connections to prevent remote wiping of the device. Place the phone in Airplane mode. Attach an external power supply to the phone after it has been placed in a static-free bag designed to block radiofrequency signals. Once secure, you should later be able to enable USB debugging, which will allow the Android Debug Bridge (ADB) that can provide good data capture. While it may be important to examine the artifacts of RAM on a mobile device, this is unlikely to happen.

Acquiring the Android Data

Copying a hard-drive from a desktop or laptop computer in a forensically-sound manner is trivial as compared to the data extraction methods needed for mobile device data acquisition. Generally, DFIs have ready physical access to a hard-drive with no barriers, allowing for a hardware copy or software bit stream image to be created. Mobile devices have their data stored inside of the phone in difficult-to-reach places. Extraction of data through the USB port can be a challenge, but can be accomplished with care and luck on Android devices.

After the Android device has been seized and is secure, it is time to examine the phone. There are several data acquisition methods available for Android and they differ drastically. This article introduces and discusses four of the primary ways to approach data acquisition. These five methods are noted and summarized below:

1. Send the device to the manufacturer: You can send the device to the manufacturer for data extraction, which will cost extra time and money, but may be necessary if you do not have the particular skill set for a given device nor the time to learn. In particular, as noted earlier, Android has a plethora of OS versions based on the manufacturer and ROM version, adding to the complexity of acquisition. Manufacturer’s generally make this service available to government agencies and law enforcement for most domestic devices, so if you’re an independent contractor, you will need to check with the manufacturer or gain support from the organization that you are working with. Also, the manufacturer investigation option may not be available for several international models (like the many no-name Chinese phones that proliferate the market – think of the ‘disposable phone’).

2. Direct physical acquisition of the data. One of rules of a DFI investigation is to never to alter the data. The physical acquisition of data from a cell phone must take into account the same strict processes of verifying and documenting that the physical method used will not alter any data on the device. Further, once the device is connected, the running of hash totals is necessary. Physical acquisition allows the DFI to obtain a full image of the device using a USB cord and forensic software (at this point, you should be thinking of write blocks to prevent any altering of the data). Connecting to a cell phone and grabbing an image just isn’t as clean and clear as pulling data from a hard drive on a desktop computer. The problem is that depending on your selected forensic acquisition tool, the particular make and model of the phone, the carrier, the Android OS version, the user’s settings on the phone, the root status of the device, the lock status, if the PIN code is known, and if the USB debugging option is enabled on the device, you may not be able to acquire the data from the device under investigation. Simply put, physical acquisition ends up in the realm of ‘just trying it’ to see what you get and may appear to the court (or opposing side) as an unstructured way to gather data, which can place the data acquisition at risk.

3. JTAG forensics (a variation of physical acquisition noted above). As a definition, JTAG (Joint Test Action Group) forensics is a more advanced way of data acquisition. It is essentially a physical method that involves cabling and connecting to Test Access Ports (TAPs) on the device and using processing instructions to invoke a transfer of the raw data stored in memory. Raw data is pulled directly from the connected device using a special JTAG cable. This is considered to be low-level data acquisition since there is no conversion or interpretation and is similar to a bit-copy that is done when acquiring evidence from a desktop or laptop computer hard drive. JTAG acquisition can often be done for locked, damaged and inaccessible (locked) devices. Since it is a low-level copy, if the device was encrypted (whether by the user or by the particular manufacturer, such as Samsung and some Nexus devices), the acquired data will still need to be decrypted. But since Google decided to do away with whole-device encryption with the Android OS 5.0 release, the whole-device encryption limitation is a bit narrowed, unless the user has determined to encrypt their device. After JTAG data is acquired from an Android device, the acquired data can be further inspected and analyzed with tools such as 3zx (link: http://z3x-team.com/ ) or Belkasoft (link: https://belkasoft.com/ ). Using JTAG tools will automatically extract key digital forensic artifacts including call logs, contacts, location data, browsing history and a lot more.

4. Chip-off acquisition. This acquisition technique requires the removal of memory chips from the device. Produces raw binary dumps. Again, this is considered an advanced, low-level acquisition and will require de-soldering of memory chips using highly specialized tools to remove the chips and other specialized devices to read the chips. Like the JTAG forensics noted above, the DFI risks that the chip contents are encrypted. But if the information is not encrypted, a bit copy can be extracted as a raw image. The DFI will need to contend with block address remapping, fragmentation and, if present, encryption. Also, several Android device manufacturers, like Samsung, enforce encryption which cannot be bypassed during or after chip-off acquisition has been completed, even if the correct passcode is known. Due to the access issues with encrypted devices, chip off is limited to unencrypted devices.

5. Over-the-air Data Acquisition. We are each aware that Google has mastered data collection. Google is known for maintaining massive amounts from cell phones, tablets, laptops, computers and other devices from various operating system types. If the user has a Google account, the DFI can access, download, and analyze all information for the given user under their Google user account, with proper permission from Google. This involves downloading information from the user’s Google Account. Currently, there are no full cloud backups available to Android users. Data that can be examined include Gmail, contact information, Google Drive data (which can be very revealing), synced Chrome tabs, browser bookmarks, passwords, a list of registered Android devices, (where location history for each device can be reviewed), and much more.

The five methods noted above is not a comprehensive list. An often-repeated note surfaces about data acquisition – when working on a mobile device, proper and accurate documentation is essential. Further, documentation of the processes and procedures used as well as adhering to the chain of custody processes that you’ve established will ensure that evidence collected will be ‘forensically sound.’

Conclusion

As discussed in this article, mobile device forensics, and in particular the Android OS, is different from the traditional digital forensic processes used for laptop and desktop computers. While the personal computer is easily secured, storage can be readily copied, and the device can be stored, safe acquisition of mobile devices and data can be and often is problematic. A structured approach to acquiring the mobile device and a planned approach for data acquisition is necessary. As noted above, the five methods introduced will allow the DFI to gain access to the device. However, there are several additional methods not discussed in this article. Additional research and tool use by the DFI will be necessary.



Source by Ron McFarland

Get Back a Lover – Brainwashing Your Ex and Getting Him Back Through These 3 Dirty Little Tricks!

The break up is the worse part of being in relationship. It’s safe to assume that you’ve opened up this page because your boyfriend just dumped you out. Quite simply, you’re now backed to the single world – the boring single world! Perhaps, it’s time to start all over again. Perhaps, this is the time to find a new partner. But it’s not that easy. The feeling is still there. You still love your ex boyfriend and want him to get back. Is there any magic spell to do such thing? What if I tell you, there’s a right logic to get him back? Read and learn dirty little tricks to get back a lover. Here they are.

Before we start, let me remind you that these tricks if done well can bring quick results. And take note that even a single mistake can push your ex away from you. Be warned!

Also, you need to put some effort in doing the tricks. Don’t just sit on the corner and wait until someone runs after your ex boyfriend. Take action fast! You should be aware that once he falls in love again, you’re automatically dead in his heck heart. You don’t want that thing to happen right? Then, here are the strategies that you should consider.

Trick#1: Give what your ex wants

The very first thing that you should do is to relax. Stop acting so needy. Otherwise, your ex will be pushed away. If he wants a break up, then what should you do? Would you rather fight and act desperately just to get him back? If your answer is yes then that is definitely a wrong move. Acting so childish and desperate could not bring any good to get your ex boyfriend back. It will only appear that you’re so hungry for love which is not good. If that is the case, your ex will realize he made the right decision of leaving you. He may think you can’t leave without him.

Needless to say, you have to agree with the break up even if it hurts. Just wait and he will soon be right back. One day he will hug you so tight and you will feel so special once again. But before you celebrate, let me remind that you should avoid contacting your ex after the break up. This time, you need to follow the no contact rule. This is the most important part of the trick. Trash all his contacts and avoid sending him a bulk of text messages. He might get irritated for that. The break up is still fresh. That is why you need to give your ex a time to think. So stop asking “why he’s not asking to beg me back?” and stop asking “why he’s not calling me up?”

Trick#2: Giving Your Sincere Apology

After a few weeks, you can call him up and make an apology just in case you did mistake to him. But make sure you are sincere. If he accepts your apology, you should be glad because your chance of getting him back is higher.

Trick#3 Befriending Your Ex

But don’t worry if he did not accept it because you still have a plan B. That is to become his friend. I know you’ve heard this many times but that is true. But make sure, he will not just stick to your friendship. Take care of your appearance and attract him when possible.

What if your ex is back? What now? Would you rather celebrate for good? Well, the best thing to do is to train him to treat you like a queen. In other words let his love rise for the second time around. You can use your history for him to reminisce your sweetest moments together.

That’s all I can help. But don’t underestimate these get back a lover tricks as these will give you an almost unfair advantage. Wish you the best of luck and I hope to see you in some websites sharing your own success story.



Source by Russ D. Edwards

EDGE: A Stepping-stone Toward 3G Technologies in Pakistan

ABSTRACT

The business of wireless data is expected to grow in the region of 100-200% per annual and the mobile communication industry agreements that wireless data services will form the foundation for future business. The intense success of short messaging in many countries proves that people accept the benefits of non-voice services.

Enhanced Data Rate for Global Evolution (EDGE) is a technology that gives Global Systems for Mobile Communications (GSM) the capacity to handle services for the third generation of mobile telephony. It provides three times the data capacity of the General packet Radio Service (GPRS). Using EDGE, operators can handle three times more subscribers than GPRS; triple their data rate per subscriber, or add extra capacity to their voice communications.

This article provides an overview of EDGE technology. In particular, starting from the introduction of this 2.5G technology I describe the core technical aspects and distinct features. I will provide a comparison with GPRS for data services and then a survey of the current state of this technology in Pakistan. I have also covered some benefits for operators and customers.

1. Introduction

The importance of wireless data and multimedia services both for business and end customers are increasing on an unparallel scale. Enhanced Data Rates for GSM Evolution (EDGE) is a new radio interface solution and is based on an enhanced modulation. EDGE offers GSM network operators an evolution path to mobile data and multimedia services with a three fold increase of data throughput in the existing GSM spectrum. EDGE therefore provides an alternative for operators who do not have a Universal Mobile Telecommunication System (UMTS) license. Moreover it also represents a complement to UMTS for operators intending to first deploy UMTS only in densely populated areas, but who can also use EDGE to provide wide area coverage of future oriented 3G services. In the US market operators have chosen EDGE as the 3G solutions. [8].

We are currently experiencing the Wireless Application Protocol (WAP) as well as the higher transmission speeds of High Speed ​​Circuit Switched Data (HSCSD), joined by the convenience of "always on-line" direct Internet connections with GPRS. [1]

EDGE, new radios interface technology with enhanced modulation, increases the HSCSD and GPRS data rates by up to three fold. EDGE modulation is going to increase the data throughput provided by the packet switched service even over 400 kbps per carrier. Similarly, the data rates of circuit switched data can be increased, or existing data rates can be realized using fewer timeslots, saving capacity. Accordingly, these higher speed data services are referred to as EGPRS (Enhanced GPRS) and ECSD (Enhanced Circuit Switched Data).

EDGE, is a major improvement in GSM phase 2+. As a modification to existing GSM networks, EDGE does not require new network elements. [1]

In the US, for instance, EDGE is part of the IS-136 High Speed ​​concept, which is one of the third generation Radio Transmission Technology (RTT) proposals from TR.45. EDGE is historically going to be standardized which makes possible to achieve a global mobile radio system with many services characteristic to third generation systems.

2. Overview

The increased bit rates of EDGE put requirements on the GSM / GPRS network architecture. Figure. 1 illustrates the GSM / GPRS architecture, the shaded parts of which are discussed in this section. Other nodes and interfaces are not affected at all by EDGE introduction. An identical bottleneck is the A-bis interface, which today supports up to 16 kb / s per traffic channel. With EDGE, the bit rate per traffic channel will approach 64 kb / s, which makes allocation of multiple A-bis slots to one traffic channel necessary. Alternative asynchronous transfer mode (ATM) or IP-based solutions to this problem can also be discussed.

One important fact is, however, that the 16 kb / s limit will be exceeded already by the introduction of two coding schemes (CS3 and CS4) in GPRS, which have a maximum bit rate per traffic channel of 22.8 kb / s. Consequently, the A-bis limitation problem is being solved outside the EDGE standardization, and it is there a GPRS related, not EDGE-related, modification. For GPRS-based packet data services, other nodes and interfaces are already capable of handling higher bit rates, and are not affected. For circuit-switched services, the A interface can handle 64 kb / s per user, which is not exceeded by EDGE circuit-switched bearers. [9]

2.1. Impact on GSM Network Planning

An important prerequisite, which to a large extent will determine the success of EDGE in GSM, is that a network operator be able to introduce EDGE gradually. For initial deployment, EDGE-capable transceivers will supplement standard GSM / GPRS transceivers in a subset of the existing cells where EDGE coverage is desired. Here, an integrated mix of GSM, GPRS, and EDGE users will coexist in the same frequency band. To minimize effort and cost for the network operator, radio network planning (including cell planning, frequency setting of power and other cell parameters) must not require extensive modification.

2.1.1. Coverage Planning

One characteristic of non-transparent radio link protocols that include automatic repeat request (ARQ), is that low radio link quality only results in a lower bit rate for the user. Here, low SIR for a user does not result in a dropped call, as for speech, but in a temporary decrease of user bit rate. For transparent bearers, which typically offer a constant bit rate, link quality control must be extended to incorporate resource allocation, in the sense that the number of dynamically allocated time slots sets the bit rate and bit error rate (BER) retirements. Transparent bearers, will so be available in the GSM GSM cell, but require fewer time slots in the center of the cell (where 8-PSK coding schemes can be used).

2.1.2. Frequency Planning

Most mature GSM networks of today have an average frequency reuse factor of around 9 (meaning that available frequencies are divided into nine frequency groups). However, there is also a trend towards tighter reuse factors. With the use of frequency hopping, multiple reuse patterns (MRP), and discontinuous transmission (DTX), reuse factors as low as 3 become feasible. EDGE supports a variety of reuse patterns. In fact, by its use of link quality control, EDGE can be introduced in an arbitrary frequency plan, and benefit from high SIR closer to the base stations. EDGE can be introduced in an existing GSM frequency plan, and that it also supports future high-capacity solutions based on tighter frequency reuse.

2.1.3. Radio Network Planning

An important prerequisite (and to a large extent, one that will determine the success of Edge) is that network operators should be able to introduce Edge gradually. The initial deployment of Edge-capable transceivers will supplement standard GSM transceivers in a subset of cells where Edge coverage is desired. An integrated mixture of circuit-switched, GPRS and Edge users will thus coexist in the same frequency band. To minimize operator efforts and costs, Edge-related implementation must not require extensive modification of the radio network plan (including cell planning, frequency planning, the setting of power levels and other cell parameters).

2.1.4. Channel Management

After Edge has been introduced, a cell will typically include two types of transceiver: standard GSM transceivers and Edge transceivers. Each physical channel (time slot) in the cell can be viewed as being one of at least four channel types:

1. GSM speech and GSM circuit-switched data (CSD);

2. GPRS packet data;

3. Circuit-switched data, enhanced circuits witched data (ECSD), and GSM speech;

4. Edge packet data (EGPRS), which allows a mix of GPRS and EGPRS users simultaneously.

While standard GSM transceivers only support channel types 1 and 2, Edge transceivers support all four channel types. Physical channels are dynamically defined according to terminal capabilities and needs in the cell. For example, if multiple speech users are active, the number of type-1 channels is increased, at the expense of GPRS and Edge channels. Obviously, channel management must be automated, to avoid the splitting of channels into static groups. Otherwise, trunking efficiency would diminish.

3. Interleaving

To increase the performance of the higher coding schemes in EGPRS (MCS7 to MCS9) even at low C / I, the interleaving procedure has been changed within the EGPRS standard. When frequency hopping is used, the radio environment is changing on a per-burst level. Because a radio block is interleaved and transmitted over four bursts for GPRS, each burst may experience a completely different interference environment. [7]

If only one of the four bursts is not properly received, the entire radio block will not be properly decoded and will have to be retransmitted. In the case of CS4 for GPRS, severely any error protection is used at all. With EGPRS, the standard handles the higher coding scheme differently than GPRS to combat this problem. MCS7, MCS8 and MCS9 actually transmit two radio blocks over the four bursts, and the interleaving occur over two bursts instead of four. This reduces the number of bursts that must be retransmitted should errors occur. The likelihood of receiving two consecutive error free bursts is higher than receiving four consecutive error free bursts. This means that the higher coding schemes
for EDGE have a better robustness with regard to frequency hopping.

4. EDGE & GPRS

EDGE, or the Enhanced Data Rate for Global Evolution, is the new mantra in the Global Internet Connectivity scene. EDGE is the new name for GSM 384. The technology was named GSM 384 because of the fact that it provided Data Transmission at a rate of 384 Kbps. It consist of the 8 pattern time slot, and the speed could be achieved when all the 8 time slots were used. The idea behind EDGE is to obtain even higher data rates on the current 200 KHz GSM carrier, by changing the type of the modulation used.

Now, this is the most striking feature. EDGE, as being once a GSM technology, works on the existing GSM or the TDMA carriers, and enables them to many of the 3G services. Although EDGE will have a little technical impact, since its fully based on GSM or the TDMA carriers, but it might just get an EDGE over the up coming technologies, and of course, the GPRS. With EDGE, the operators and service providers can offer more wireless data application, including wireless multimedia, e-mail (Web Based), Web Infotainment, and above all, the technology of Video Conferencing.

Now all these technologies that were named earlier, were the clauses of the IMT-UMTS 3G Package. But, with EDGE, we can get all these 3G services on our existing GSM phones, which might just prove to be a boon to the user.
The current scenario clearly states that EDGE will definitely score higher than GPRS. The former allows its users to increase the data speed and throughput capacity, to around 3-4 times higher than GPRS.

Secondly, it allows the existing GSM or the TDMA carriers to give the sophisticated 3G services. And with 1600 Million subscribers of GSM in over 170 countries, offer the full Global Roaming, anywhere between India to Japan and to San Francisco. Based on an 8 PSK modulation, it allows higher bit rate across the air interface. There is one symbol for every 3 bits. Thus, EDGE Rate is equal to 3x GPRS Rate.

5. Future Evolution Towards WCDMA

The next evolutionary step for the GSM / EDGE cellular system includes enhancements of service provisioning for the packet-switched domain with the service provisioning in UMTS / UTRAN (UMTS terrestrial radio access network). GERAN will provide improved support for all quality of service (QoS) classes defined for UMTS: interactive, background, streaming and conversational. By doing so, a new range of applications, including IP multimedia applications, will be exceptionally supported. This part of the GSM / EDGE evolution focuses on support for the conversational and streaming service classes, because adequate support for interactive and background services already exists. Additionally, parallel simultaneous bearers will support multimedia applications with different QoS characteristics towards the same MS, such as multiple media streams handled through IMS domain. A driver for such evolution on the packet-switched side is the paradigm shift within the communications world from circuit to packet-switched communications.

Both the core network defined for GPRS and the current GSM / EDGE radio access network require configurations to support enhanced packet services. The GPRS / EGPRS networks can quickly and cost effectively evolve with market needs, and align with services provided by WCDMA networks. The current evolution of GSM / EDGE, which covers all of the above aspects, is being standardized in 3GPP TSG GERAN. [4]

6. EDGE in Pakistan

Pakistan has the sixth largest population in the world – approximately 150 million. There are currently four mobile operators in the country. Mobile penetration at the end of 2003 was just 2.3% with a subscriber base of 3.4 million, while fixed line penetration was approximately 2.4%. Many geographic areas in Pakistan are without telephone coverage. To accompany recent positive economic development in Pakistan and the inherently low mobile penetration, high growth within the mobile segment is expected. At the moment the people in Pakistan are more concerned with the text-enabled facility like SMS. Although the introduction of GPRS has a new concept and new boost in Cellular network but still, people are not that much concerned using Internet by their terminal. Few think that it still more expensive and few believe that GPRS did not develop the interest for using Internet if we compared it by computer.

In April 2004 Norwegian mobile telecom operator, Telenor, bid for and absolutely won a license to operate a cellular network in Pakistan. The license covers the operation of Global System for Mobile Communications (GSM), General Packet Radio Service (GPRS) and Enhanced Data Rates for Global Evolution (EDGE) technology for the network. [14]

Telenor Pakistan has signed two deals with mobile infrastructure contractors for different areas of the network:

Nokia has signed a three-year deal to build and operate a GSM / GPRS / EDGE network to cover the central and Northern Punjab region (phase one), centered around Lahore.

Siemens have signed a deal to build a GSM / GPRS / EDGE network to cover the southern areas of Pakistan, centered around Islamabad.

Further enhancements in data capacity over the core GPRS / GSM network will be provided in both networks with the installation of Enhanced Data for Global (GSM) Evolution technology. This component of the two systems will be installed after the initial roll-outs and will allow the subscribers to have the use of advanced mobile services such as downloading video and music clips, full multimedia messaging, high-speed color Internet access and email on the move.

Nortel Networks will upgrade Ufone's existing wireless systems and supply new GSM / GPRS core network and radio access equipment, including Mobile Switching Center, Home Location Register (HLR) and advanced Base Transceiver Stations (BTS).

A key component of the Ufone expansion will be Nortel Networks BTS 12000, designed to deliver additional capacity within a GSM / GPRS network while positioning operators to drive lower costs and to offer advanced wireless services based on third generation (3G) EDGE (Enhanced Data for GSM Evolution) technology. The expansion will also include Nortel Networks Passport Packet Voice Gateway (PVG) for migration of TDM voice trunking to a packet-based infrastructure.

7. Benefits

As highlighted previously the need to reduce business risk and make the best use of existing resources is of paramount importance within today's business environment.

7.1. Financial

GSM based networks have become the standard within the cellular landscape. As EDGE is a GSM based technology and provides an enhancement for GPRS at a little additional cost it is considered the best way in which to capitalize on existing resources. [1]

7.1.1. Radio Access Network

In most cases GPRS enabled base stations and BSC's can be simply upgraded to EDGE by way of relatively low-cost software and hardware upgrades, which will pro-long the life cycle of the deployed RAN elements.

7.1.2. Core Network

For GPRS enhancement, there is very little modification to be completed within a GPRS enabled core network, thus enhancing the sunk core network investment.

7.1.3. Antenna Sites

There is no requirement for additional antenna sites when deploying EDGE. Assuming high quality linear amplifiers with high RF output power are used within the BTS, the coverage pattern will be the same as the existing GPRS deployment, so protecting existing site investment.

7.1.4. Spectrum Utilization

EDGE triples the GPRS data capacity whilst using the existing GSM spectrum and offers up to three times the GPRS data rate to the end user. EDGE is spectrally the most efficient radio technology for data applications requiring up to 100Kb / s throughput (compared to CDMA and WCDMA), and only WCDMA is spectrally better for higher throughputs.

7.1.5. Applications

GPRS enabled applications and services will generally not require any additional investment to become EDGE compatible. This is also valid for known WCDMA applications.
Although the financial benefits of EDGE can be attributed to individual network elements as outlined above, one of the main business drivers is that EDGE forms an essential part of the overall GSM evolution towards a seamless multi-radio GSM / GPRS / EDGE / WCDMA network. As mentioned previously GSM is the main standard for cellular communications worldwide and the business benefits of deploying an industry standard technology can be seen in almost every aspect of a network deployment, from end-user devices, to applications to hardware.

7.2. For Operator

Operators can also experience the advantages of EDGE in following ways.

7.2.1. Migration to wireless multimedia services

The operator can increase data revenues by offering attractive new types applications to end-users.

7.2.2. Improved customer satisfaction

Increased data capacity and higher data throughput will decrease response times for all data services, thus keeping end users satisfied and connected.

7.2.3. Early deployment of 3G type applications

EDGE networks are expected to emerge in year 2001, when mature markets are likely to start demanding multimedia applications.

7.2.4. Quick network implementation

EDGE will not require new network elements and EDGE capability can be introduced gradually to the network.

7.3. For User

7.3.1. Improved quality of service

Increased data capacity and higher data throughput will always satisfy the customers' need for QoS.

7.3.2. Personal multimedia services

Attractive new types of applications and terminals will become available.

7.3.3. Potentially lower price per bit

Lower cost of data capacity for high-speed data applications gives the operator flexibility in pricing.

8. Conclusion

While the tug of war between access technologies – CDMA vs. UMTS vs. GSM – continues to be debated globally, EDGE provides an ideal solution for GSM carriers to add data capacity using limited spectrum. Keeping in view the fact that GSM supports more subscribers today than any other access technology (roughly 65 to 70% of the global subscriber market), and that GSM / GPRS operators are scrambling to add capacity to support user growth and launch next generation data services , the increased capacity and throughput offered by EDGE becomes very compelling. And, in a market where wireless carriers must squeeze the most out of capital outlays – past and future, it is no real surprise that we are going to see a renewed wave of interest in EDGE from our GSM customers.

Today the position of EDGE as a technology evolution of GSM is clear. Initially promoted as an alternative to WCDMA and generally a niche technology, EDGE is now regarded as a key enabler for GSM / EDGE and WCDMA operators alike. Being able to drive business value from existing GSM infrastructure and spectrum is one of the main advantages, and along with the ability of EDGE to reduce CAPEX, time-to-market and time-to-revenue, with regards to delivery of global high -speed data services, EDGE is a must technology.

The cellular companies working in Pakistan did not have the license for the EDGE. Now as the introduction of some new companies like Telenor and WARID, it is possible that in near future Pakistan will also be able to use this facility. Then GPRS can become a real important factor in cellular network, as the people in Pakistan will use the Internet not only for downloading ring tones but also can enjoy the streaming videos by their cell phone and so many other facilities.



Source by Faheem Rehman

Reasons Why the Philippines is the Text Capital of the World

Network Providers of text messages in the Philippines offer lower rates. For as low as Php20.00 or $0.50, you can already send a hundred text messages and that’s approximately P0.20 per message. Networks also offer other services such as unlimited texts that would last within 24 hours as long as the sender and the receiver belonged to the same networks. To avail these services, the subscribers would register by keying a command and sending it to the assigned number of the network. Upon confirmation of the registration, one can already enjoy the services it brings.

Lower rates influence people to subscribe on one or two different networks so as to avail of both services. It is the provider’s strategy to keep their subscribers continuously avail of their services. Networks also have a variety of load denomination that is very affordable to Filipinos. As Filipinos prefer to buy on retail basis, even prepaid cards or loads are being retailed. One can buy prepaid loads for as low as P5.00 or $0.125.

Communication

Communication is already included in the budget of every Filipino family. At the average, every family would spend at least P40 or a dollar a day for constant communication with family and friends far from them. It is a way of keeping in touch and a “virtual bond” among them. The need to be connected with their families also makes it difficult for Filipinos to limit sending text messages.

Filipino families are close-knit. It is important for them to know the whereabouts of their family members. From time to time, they would exchange text messages just to check how they do. Sometimes they would text even the smallest details of what is happening in their lives. And it will turn into an endless chained text messages.

Sharing inspirational quotes, sweet messages and jokes are the usual forwarded messages sent to two or more persons listed on their phonebooks. For some people, text messages are an expression of their emotions and become a significant part of courting process. It alters the sending of love notes and poems. And, because of immediate response of the recipient, the courtship process quickens.

Text Voting

Text is also used to vote and gives the subscriber the opportunity to choose a candidate they wish to support. This refers to text voting. The subscribers would text in keywords to particular numbers. The number of text votes corresponds to the number of votes given to a particular candidate. Usually the organizer of said contests gives out prices through raffle draw in order to encourage subscribers to vote-in.

Networking

By nature, Filipinos are friendly and are fond of affiliations with different groups and individuals. Networking helps people to meet and broaden their contacts. Typically, it is business related. It can be an exchange of services or products, as well. Through text messages, people were able to maintain friendly affiliations with other people.

Information Dissimulation

Using mobile phones for text messages to dissimulate information is widespread. This is proven when former President Joseph Estrada was ousted due to mass action. This mass action was a result of text messages influencing everyone to act on the impeachment trial of the former president. The people felt that the senate is concealing a possible fraud for not opening the brown envelop and this triggered anger among people.

At present, text messaging is one of the most convenient means of communication. It makes people understand and communicate more on a timely manner. It is the basic reason why Filipinos continually use text messages. It is already part of the daily expressions of themselves.



Source by David Urmann

The 9 Key Texting Tips – Discover How to Become Successful at Texting

“Texting” also known as “text messaging” has became a modern-day phenomenon in communication. It quickly went from a once-in-a-while enjoyment to a day-to-day necessity. Very few people that have cell phones with texting capabilities will go through a day without sending or receiving a text message. Some countries have adopted texting faster than others. For example: in England, a study was done on text messaging. One of the questions asked was, “have you sent a text message in the last two minutes?” A shocking 75% of the women and 25% of the men had sent a text message in the last two minutes. I think it is fair to say that texting is a large part of today’s society.

So why not be successful at texting?

I’ve been studying and utilizing text messaging for years now, and I have discovered and developed the nine most important texting tips to becoming successful at text messaging.

Tip #1 – Abbreviate – Texting uses a different form of communication. Since you only have so many characters you can send (usually 160 characters), you need to abbreviate common phrases. Remember, don’t overdo it and don’t abbreviate uncommon phrases. It’s really annoying when you get a text message that looks like this, “Hey you HRU IHA IDGI TAS LOL.” Use abbreviations that both parties understand.

Tip #2 – Use T9 (predictive text input) – If you look on your cell phone you’re going to see, “abc” on #2, “def” on #3 and so on. If you were to try to type a word without the help of T9, you are going to have to go through all the irrelevant letters to get to the letters you want. Don’t do that, it’s a waste of time. T9 (or whatever your predictive text input is called) will take the buttons you push and give you the most common words relevant to the buttons you push. For example, take the word “CONTROL”, without T9 it would take you pushing your phone pad 18 times and with T9 it would only take you 5 times.

Tip #3 – Don’t send short worthless messages – One of the more worthless text messages are messages that don’t get anywhere and just waste time and rack up the phone bill for someone. For instance, here is a conversation illustrating the difference between a poor texter and a good texter:

Poor Texter

Sent: “Hey” – Reply: “hey” – Sent: “what’s up” – Reply: “not much” – Sent: “what are doing” – Reply: “hanging out” – Sent: “what are you doing tonight” – Reply: “not sure” – Sent: “lets hangout tonight” Reply: ” OK”…..

Good Texter

Sent: Hey, what’s up. Lets hang out tonight.” Reply: “OK”

The Poor Texter sent 5 times more messages then the Good texter. In the poor example, If they didn’t have unlimited text messaging, the sender and the person replying are going to end up paying quite a bit for a bunch of meaningless texts. It’s definintely in your best interest to send text messages with purpose. Over all, you save time, money and you don’t come across looking like an idiot.

Tip #4 – Never send valuable information – When you text message, your true identity becomes masked. No one can see, hear or confirm that the person sending the message is the correct person. This is the perfect circumstance for theft and fraud. Popping up everywhere are people stealing phones and texting numbers in the phone to get valuable information. Don’t become a victim of this. If someone you know wants information, call them and make sure it’s the right person.

Tip #5 – Never text while talking to someone – Texting has become a massive form or communication in today’s society (especially for teenagers). The controversy is that texting and talking are two forms of communication that fight for your attention at the same time. More and more people are trying to text and talk at the same time or worse, choose texting over talking. Remember, if at all possible, real interactions are always better than text interactions. Prioritize and text between real conversations.

Tip #6 – Utilize text messaging to simplify your life – A simple text message can now do anything that a phone call, computer, Internet or planner can do. Now there are tons of web sites and programs specifically built to make your life easier through texting… so why not utilize them? You can find directions, weather, games, news, count calories, keep tabs on flights / friends, transfer files, archive messages, get updates on your daily schedule, and much more. Not to mention, most of these capabilities are free. If you want to learn more about how to utilize texting to simplify your life find another one of my articles with the title “10 Amazing Texting Secrets and Tricks to Simplify Your Life.”

Tip #7 – Be aware of your phone bill and downloads – I just had a friend that paid a $214 phone bill. This was because he didn’t have an unlimited texting plan. He also downloaded a few ring tones and programs. An outrageous bill like this is completely unnecessary and a lot of people fork over this kind of money because they’re not aware about what’s going on and their available cell phone plan options.

The other subject you need to be aware of is the random monthly charges that texting companies try to suck you into. Many companies use Myspace and Facebook to get your number or they get your number from some other way and try to hook you into confirming a monthly charge for their service. Don’t give your number over the web to random websites and never text “Y” to any random number (that usually mean yes to charge a fee). Rule of thumb: Don’t download anything onto your phone that your computer can do, get a texting plan for your needs, and make sure you don’t get caught up into any unwanted monthly fees.

Tip #8 – Don’t become a slave to your phone – One definition of a slave is: a person excessively dependent upon or controlled by another person. Most of us thrive off the feeling of receiving a text message (it’s becoming one of our most common daily feelings). This can become very unbalanced if you’re not aware of it. The question I have is, what is success? Some would call it accomplishments or achievements. Really, it’s basically whatever makes you feel like this day was worth living. The concerning fact is, there’s a growing number of people that are starting to associate a five-hour texting conversation to a successful and fulfilling day.

I saw a woman the other day with her friends that held the phone right in front of her face for the whole time I was around her. It was one of the more worthless lives I saw lived that day. Key point: Get real with yourself and put a little texting in your living instead of a little living in your texting.

Tip #9 – Flirt, Flirt, Flirt – Text messaging is one of the most influential tools to increasing your success in dating and creating attraction. Here’s why: when you’re talking or interacting with someone you have to account for the many attraction triggers that play with or against you. Those triggers are your hair, eyes, clothes, timing, words, tone, voice, energy etc. You mess up on a few of those attraction triggers, and your chances with that person go down the drain. Well, texting eliminates all of that uncertainty so the only attraction triggers you have to deal with is timing and words.

If you send the right words at the right time, you can expect to double or triple your success in dating and make anyone more attracted to you. I have had models and beautiful women dying to meet me just because I sent them the right text messages. Text messaging is a ton of fun and you can become extremely successful with it, if you know what you’re doing.



Source by Tyler Tray

The Difference Between Being Smart, Educated, and Intelligent

I’ve always been intrigued by the subject of intelligence. As a child my mother would refer to me as “smart,” but I quickly noticed that all parents refer to their children as smart. In time I would discover that all children are not smart, just as all babies are not cute. If that were the case, we’d have a world full of beautiful, smart people – which we don’t.

Some of us are smart; but not as smart as we think, and others are smarter than they seem, which makes me wonder, how do we define smart? What makes one person smarter than another? When do “street smarts” matter more than “book smarts”? Can you be both smart and stupid? Is being smart more of a direct influence of genetics, or one’s environment?

Then there are the issues of education, intelligence and wisdom.

What does it mean to be highly educated? What’s the difference between being highly educated and highly intelligent? Does being highly educated automatically make you highly intelligent? Can one be highly intelligent without being highly educated? Do IQs really mean anything? What makes a person wise? Why is wisdom typically associated with old age?

My desire to seek answers to these questions inspired many hours of intense research which included the reading of 6 books, hundreds of research documents, and countless hours on the Internet; which pales in comparison to the lifetime of studies and research that pioneers in the fields of intelligence and education like Howard Gardner, Richard Sternberg, Linda S. Gottfredson, Thomas Sowell, Alfie Kohn, and Diane F. Halpern whose work is cited in this article.

My goal was simple: Amass, synthesize, and present data on what it means to be smart, educated and intelligent so that it can be understood and used by anyone for their benefit.

PRENATAL CARE

With this in mind, there was not a better (or more appropriate) place to start than at the very beginning of our existence: as a fetus in the womb.

There is mounting evidence that the consumption of food that’s high in iron both before and during pregnancy is critical to building the prenatal brain. Researchers have found a strong association between low iron levels during pregnancy and diminished IQ. Foods rich in iron include lima beans, kidney beans, pinto beans, spinach, asparagus, broccoli, seafoods, nuts, dried fruits, oatmeal, and fortified cereals.

Children with low iron status in utero (in the uterus) scored lower on every test and had significantly lower language ability, fine-motor skills, and tractability than children with higher prenatal iron levels. In essence, proper prenatal care is critical to the development of cognitive skills.

COGNITIVE SKILLS

Cognitive skills are the basic mental abilities we use to think, study, and learn. They include a wide variety of mental processes used to analyze sounds and images, recall information from memory, make associations between different pieces of information, and maintain concentration on particular tasks. They can be individually identified and measured. Cognitive skill strength and efficiency correlates directly with students’ ease of learning.

DRINKING, PREGNANCY, AND ITS INTELLECTUAL IMPACT

Drinking while pregnant is not smart. In fact, it’s downright stupid.

A study in Alcoholism: Clinical & Experimental Research has found that even light to moderate drinking – especially during the second trimester – is associated with lower IQs in offspring at 10 years of age. This result was especially pronounced among African-American rather than Caucasian offspring.

“IQ is a measure of the child’s ability to learn and to survive in his or her environment. It predicts the potential for success in school and in everyday life. Although a small but significant percentage of children are diagnosed with Fetal Alcohol Syndrome (FAS) each year, many more children are exposed to alcohol during pregnancy who do not meet criteria for FAS yet experience deficits in growth and cognitive function,” said Jennifer A. Willford, assistant professor of psychiatry at the University of Pittsburgh School of Medicine.

Paul D. Connor, clinical director of the Fetal Alcohol and Drug Unit and assistant professor in the department of psychiatry and behavioral sciences at the University of Washington has this to say about the subject:

“There are a number of domains of cognitive functioning that can be impaired even in the face of a relatively normal IQ, including academic achievement (especially arithmetic), adaptive functioning, and executive functions (the ability to problem solve and learn from experiences). Deficits in intellectual, achievement, adaptive, and executive functioning could make it difficult to appropriately manage finances, function independently without assistance, and understand the consequences of – or react appropriately to – mistakes.”

This is a key finding which speaks directly to the (psychological) definition of intelligence which is addressed later in this article.

ULTRA SOUNDS

Studies have shown that the frequent exposure of the human fetus to ultrasound waves is associated with a decrease in newborn body weight, an increase in the frequency of left-handedness, and delayed speech.

Because ultrasound energy is a high-frequency mechanical vibration, researchers hypothesized that it might influence the migration of neurons in a developing fetus. Neurons in mammals multiply early in fetal development and then migrate to their final destinations. Any interference or disruption in the process could result in abnormal brain function.

Commercial companies (which do ultrasounds for “keepsake” purposes) are now creating more powerful ultrasound machines capable of providing popular 3D and 4D images. The procedure, however, lasts longer as they try to make 30-minute videos of the fetus in the uterus.

The main stream magazine New Scientist reported the following: Ultrasound scans can stop cells from dividing and make them commit suicide. Routine scans, which have let doctors peek at fetuses and internal organs for the past 40 years, affect the normal cell cycle.

On the FDA website this information is posted about ultrasounds:

While ultrasound has been around for many years, expectant women and their families need to know that the long-term effects of repeated ultrasound exposures on the fetus are not fully known. In light of all that remains unknown, having a prenatal ultrasound for non-medical reasons is not a good idea.

NATURE VERSUS NURTURE…THE DEBATE CONTINUES

Now that you are aware of some of the known factors which determine, improve, and impact the intellectual development of a fetus, it’s time for conception. Once that baby is born, which will be more crucial in the development of its intellect: nature (genetics) or nurture (the environment)?

Apparently for centuries, scientists and psychologists have gone back and forth on this. I read many comprehensive studies and reports on this subject during the research phase of this article, and I believe that it’s time to put this debate to rest. Both nature and nurture are equally as important and must be fully observed in the intellectual development of all children. This shouldn’t be an either/or proposition.

A recent study shows that early intervention in the home and in the classroom can make a big difference for a child born into extreme poverty, according to Eric Turkheimer, a psychologist at the University of Virginia in Charlottesville. The study concludes that while genetic makeup explains most of the differences in IQ for children in wealthier families, environment – and not genes – makes a bigger difference for minority children in low-income homes.

Specifically, what researchers call “heritability”- the degree to which genes influence IQ – was significantly lower for poor families. “Once you’re put into an adequate environment, your genes start to take over,” Mr. Turkheimer said, “but in poor environments genes don’t have that ability.”

But there are reports that contradict these findings…sort of.

Linda S. Gottfredson, a professor of educational studies at the University of Delaware, wrote in her article, The General Intelligence Factor that environments shared by siblings have little to do with IQ. Many people still mistakenly believe that social, psychological and economic differences among families create lasting and marked differences in IQ.

She found that behavioral geneticists refer to such environmental effects as “shared” because they are common to siblings who grow up together. Her reports states that the heritability of IQ rises with age; that is to say, the extent to which genetics accounts for differences in IQ among individuals increases as people get older.

In her article she also refers to studies comparing identical and fraternal twins, published in the past decade by a group led by Thomas J. Bouchard, Jr., of the University of Minnesota and other scholars, show that about 40 percent of IQ differences among preschoolers stems from genetic differences, but that heritability rises to 60 percent by adolescence and to 80 percent by late adulthood.

And this is perhaps the most interesting bit of information, and relevant to this section of my article:

With age, differences among individuals in their developed intelligence come to mirror more closely their genetic differences. It appears that the effects of environment on intelligence fade rather than grow with time.

Bouchard concludes that young children have the circumstances of their lives imposed on them by parents, schools and other agents of society, but as people get older they become more independent and tend to seek out the life niches that are most congenial to their genetic proclivities.

BREAST-FEEDING INCREASES INTELLIGENCE

Researchers from Christchurch School of Medicine in New Zealand studied over 1,000 children born between April and August 1977. During the period from birth to one year, they gathered information on how these children were fed.

The infants were then followed to age 18. Over the years, the researchers collected a range of cognitive and academic information on the children, including IQ, teacher ratings of school performance in reading and math, and results of standardized tests of reading comprehension, mathematics, and scholastic ability. The researchers also looked at the number of passing grades achieved in national School Certificate examinations taken at the end of the third year of high school.

The results indicated that the longer children had been breast-fed, the higher they scored on such tests.

TALKING TO YOUR CHILDREN MAKES A DIFFERENCE

Thomas Sowell, author of Race, IQ, Black Crime, and facts Liberals Ignore uncovered some fascinating information that every parent should take note of. He writes:

There is a strong case that black Americans suffer from a series of disadvantageous environments. Studies show time and again that before they go to school, black children are on average exposed to a smaller vocabulary than white children, in part due to socioeconomic factors.

While children from professional households typically exposed to a total of 2,150 different words each day, children from working class households are exposed to 1,250, and children from households on welfare a mere 620.

Yes, smart sounding children tend to come from educated, professional, two-parent environments where they pick-up valuable language skills and vocabulary from its smart sounding inhabitants.

Mr. Sowell continues: Black children are obviously not to blame for their poor socioeconomic status, but something beyond economic status is at work in black homes. Black people have not signed up for the “great mission” of the white middle class – the constant quest to stimulate intellectual growth and get their child into Harvard or Oxbridge.

Elsie Moore of Arizona State University, Phoenix, studied black children adopted by either black or white parents, all of whom were middle-class professionals. By the age of 7.5 years, those in black homes were 13 IQ points behind those being raised in the white homes.

ACCUMULATED ADVANTAGES

At this juncture in my research it dawned on me, and should be fairly obvious to you, that many children are predisposed to being smart, educated, and intelligent, simply by their exposure to the influential factors which determine them long before they start school.

An informed mother, proper prenatal care, educated, communicative parents, and a nurturing environment in which to live, all add up to accumulated advantages that formulate intellectual abilities. As you can see, some children have unfair advantages from the very beginning.

Malcolm Gladwell, author of top-selling book Outliers, wrote that “accumulated advantages” are made possible by arbitrary rules…and such unfair advantages are everywhere. “It is those who are successful who are most likely to be given the kinds of social opportunities that lead to further success,” he writes. “It’s the rich who get the biggest tax breaks. It’s the best students who get the best teaching and most attention.”

With that in mind, we turn our attention to education and intelligence.

WHAT DOES IT MEAN TO BE WELL EDUCATED?

Alfie Kohn, author of the book What Does It Mean To Be Well Educated? poses the question, does the phrase well educated refer to a quality of schooling you received, or something about you? Does it denote what you were taught? Or what you remember?

I contend that to be well educated is all in the application; the application and use of information. Information has to be used in order to become knowledge, and as we all have heard, knowledge is power.

Most people are aware of the floundering state of education in this country on some level. We tell our children that nothing is more important than getting a “good” education, and every year, due to government budget shortfalls, teachers are laid off, classes are condensed, schools are closed, and many educational programs – especially those which help the underprivileged – are cut.

The reality is, we don’t really value education. We value it as a business, an industry, political ammunition, and as an accepted form of discrimination, but not for what it was intended: a means of enriching one’s character and life through learning.

What we value as a society, are athletes and the entertainment they offer. The fact that a professional athlete makes more money in one season, than most teachers in any region will make in their careers, is abominable. There’s always money to build new sports stadiums, but not enough to give teachers a decent (and well-deserved) raise.

Ironically, the best teachers don’t go into the profession for money. They teach because it’s a calling. Most of them were influenced by a really good teacher as a student. With the mass exodus of teachers, many students are not able to cultivate the mentoring relationships that they once were able to because so many are leaving the profession – voluntarily and involuntarily – within an average of three years.

At the high school level, where I got my start, the emphasis is not on how to educate the students to prepare them for life, or even college (all high schools should be college-prep schools, right?), it was about preparing them to excel on their standardized tests. Then the controversial “exit” exams were implemented and literally, many high schools were transformed into testing centers. Learning has almost become secondary.

This mentality carries over into college, which of course there’s a test one must take in order to enroll (the SAT or ACT). This explains why so many college students are more concerned with completing a course, than learning from it. They are focused on getting “A’s” and degrees, instead of becoming degreed thinkers. The latter of which are in greater demand by employers and comprise the bulk of the self-employed. The “get-the-good-grade” mindset is directly attributable to the relentless and often unnecessary testing that our students are subjected to in schools.

Alfie Kohn advocates the “exhibition” of learning, in which students reveal their understanding by means of in-depth projects, portfolios of assignments, and other demonstrations.

He cites a model pioneered by Ted Sizer and Deborah Meier. Meier has emphasized the importance of students having five “habits of mind,” which are: the value of raising questions about evidence (“How do we know what we know?”), point of view, (“Whose perspective does this represent?”), connections (“How is this related to that?”), supposition (“How might things have been otherwise?”), and relevance (“Why is this important?”).

Kohn writes: It’s only the ability to raise and answer those questions that matters, though, but also the disposition to do so. For that matter, any set of intellectual objectives, any description of what it means to think deeply and critically, should be accompanied by a reference to one’s interest or intrinsic motivation to do such thinking…to be well-educated then, is to have the desire as well as the means to make sure that learning never ends…

HISTORY AND PURPOSE OF IQ

We’ve always wanted to measure intelligence. Ironically, when you look at some the first methods used to evaluate it in the 1800s, they were not, well, very intelligent. Tactics such as subjecting people to various forms of torture to see what their threshold for pain was (the longer you could withstand wincing, the more intelligent you were believed to be), or testing your ability to detect a high pitch sound that others could not hear.

Things have changed…or have they?

No discussion of intelligence or IQ can be complete without mention of Alfred Binet, a French psychologist who was responsible for laying the groundwork for IQ testing in 1904. His original intention was to devise a test that would diagnose learning disabilities of students in France. The test results were then used to prepare special programs to help students overcome their educational difficulties.

It was never intended to be used as an absolute measure of one’s intellectual capabilities.

According to Binet, intelligence could not be described as a single score. He said that the use of the Intelligence Quotient (IQ) as a definite statement of a child’s intellectual capability would be a serious mistake. In addition, Binet feared that IQ measurement would be used to condemn a child to a permanent “condition” of stupidity, thereby negatively affecting his or her education and livelihood.

The original interest was in the assessment of ‘mental age’ — the average level of intelligence for a person of a given age. His creation, the Binet-Simon test (originally called a “scale”), formed the archetype for future tests of intelligence.

H. H. Goddard, director of research at Vineland Training School in New Jersey, translated Binet’s work into English and advocated a more general application of the Simon-Binet test. Unlike Binet, Goddard considered intelligence a solitary, fixed and inborn entity that could be measured. With help of Lewis Terman of Stanford University, his final product, published in 1916 as the Stanford Revision of the Binet-Simon Scale of Intelligence (also known as the Stanford-Binet), became the standard intelligence test in the United States.

It’s important to note that the fallacy about IQ is that it is fixed and can not be changed. The fact is that IQ scores are known to fluctuate – both up and down during the course of one’s lifetime. It does not mean that you become more, or less intelligent, it merely means that you tested better on one day than another.

One more thing to know about IQ tests: They have been used for racist purposes since their importation into the U.S. Many of those who were involved in the importation and refinement of these tests believed that IQ was hereditary and are responsible for feeding the fallacy that it is a “fixed” trait.

Many immigrants were tested in the 1920s and failed these IQ tests miserably. As a result, many of them were denied entry into the U.S., or were forced to undergo sterilization for fear of populating America with “dumb” and “inferior” babies. If you recall, the tests were designed for white, middle class Americans. Who do you think would have the most difficulty passing them?

Lewis Terman developed the original notion of IQ and proposed this scale for classifying IQ scores:

000 – 070: Definite feeble-mindedness

070 – 079: Borderline deficiency

080 – 089: Dullness

090 – 109: Normal or average intelligence

110 – 119: Superior intelligence

115 – 124: Above average (e.g., university students)

125 – 134: Gifted (e.g., post-graduate students)

135 – 144: Highly gifted (e.g., intellectuals)

145 – 154: Genius (e.g., professors)

155 – 164: Genius (e.g., Nobel Prize winners)

165 – 179: High genius

180 – 200: Highest genius

200 – higher ?: Immeasurable genius

*Genius IQ is generally considered to begin around 140 to 145, representing only 25% of the population (1 in 400).

*Einstein was considered to “only” have an IQ of about 160.

DEFINING INTELLIGENCE

Diane F. Halpern, a psychologist and past-president of the American Psychological Association (APA), wrote in her essay contribution to Why Smart People Can Be So Stupid that in general, we recognize people as intelligent if they have some combination of these achievements (1) good grades in school; (2) a high level of education; (3) a responsible, complex job; (4) some other recognition of being intelligent, such as winning prestigious awards or earning a large salary; (5) the ability to read complex text with good comprehension; (6) solve difficult and novel problems.

Throughout my research and in the early phases of this article, I came across many definitions of the word intelligence. Some were long, some were short. Some I couldn’t even understand. The definition that is most prevalent is the one created by the APA which is: the ability to adapt to one’s environment, and learn from one’s mistakes.

How about that? There’s the word environment again. We just can’t seem to escape it. This adds deeper meaning to the saying, “When in Rome, do as the Romans do.” It means recognizing what’s going on in your environment, and having the intelligence adapt to it – and the people who occupy it – in order to survive and succeed within it.

There are also many different forms of intelligence. Most notably those created by Dr. Howard Gardner, professor of education at Harvard University.

Dr. Gardner believes (and I agree) that our schools and culture focus most of their attention on linguistic and logical-mathematical intelligence. We esteem the highly articulate or logical people of our culture. However, Dr. Gardner says that we should also place equal attention on individuals who show gifts in the other intelligences: the artists, architects, musicians, naturalists, designers, dancers, therapists, entrepreneurs, and others who enrich the world in which we live.

He felt that the traditional notion of intelligence, based on IQ testing, was far too limited and created the Theories Of Multiple Intelligences in 1983 to account for a broader range of human potential in children and adults.

These intelligences are:

Linguistic intelligence (“word smart”)

Logical-mathematical intelligence (“number/reasoning smart”)

Spatial intelligence (“picture smart”)

Bodily-Kinesthetic intelligence (“body smart”)

Musical intelligence (“music smart”)

Interpersonal intelligence (“people smart”)

Intrapersonal intelligence (“self smart”)

Naturalist intelligence (“nature smart”)

Not associated with Dr. Gardner, but equally respected are:

FLUID & CRYSTALLIZED INTELLIGENCE

According to About.com, Psychologist Raymond Cattell first proposed the concepts of fluid and crystallized intelligence and further developed the theory with John Horn. The Cattell-Horn theory of fluid and crystallized intelligence suggests that intelligence is composed of a number of different abilities that interact and work together to produce overall individual intelligence.

Cattell defined fluid intelligence as “…the ability to perceive relationships independent of previous specific practice or instruction concerning those relationships.” Fluid intelligence is the ability to think and reason abstractly and solve problems. This ability is considered independent of learning, experience, and education. Examples of the use of fluid intelligence include solving puzzles and coming up with problem solving strategies.

Crystallized intelligence is learning from past experiences and learning. Situations that require crystallized intelligence include reading comprehension and vocabulary exams. This type of intelligence is based upon facts and rooted in experiences. This type of intelligence becomes stronger as we age and accumulate new knowledge and understanding.

Both types of intelligence increase throughout childhood and adolescence. Fluid intelligence peaks in adolescence and begins to decline progressively beginning around age 30 or 40. Crystallized intelligence continues to grow throughout adulthood.

SUCCESSFUL INTELLIGENCE

Then there’s Successful Intelligence, which is authored by intelligence psychologist and Yale professor, Robert J. Sternberg, who believes that the whole concept of relating IQ to life achievement is misguided, because he believes that IQ is a pretty miserable predictor of life achievement.

His Successful Intelligence theory focuses on 3 types of intelligence which are combined to contribute to one’s overall success: Analytical Intelligence; mental steps or components used to solve problems; Creative Intelligence: the use of experience in ways that foster insight (creativity/divergent thinking); and Practical Intelligence: the ability to read and adapt to the contexts of everyday life.

With regard to environment, Mr. Sternberg writes in his book Successful Intelligence: Successfully intelligent people realize that the environment in which they find themselves may or may not be able to make the most of their talents. They actively seek an environment where they can not only do successful work, but make a difference. They create opportunities rather than let opportunities be limited by circumstances in which they happen to find themselves.

As an educator, I subscribe to Mr. Sternberg’s Successful Intelligence approach to teaching. It has proven to be a highly effective tool and mindset for my college students. Using Successful Intelligence as the backbone of my context-driven curriculum really inspires students to see how education makes their life goals more attainable, and motivates them to further develop their expertise. Mr. Sternberg believes that the major factor in achieving expertise is purposeful engagement.

EMOTIONAL INTELLIGENCE

In his best-selling 1995 book, Emotional Intelligence, Daniel Goleman reported that research shows that conventional measures of intelligence – IQ – only account for 20% of a person’s success in life. For example, research on IQ and education shows that high IQ predicts 10 to 25% of grades in college. The percentage will vary depending on how we define success. Nonetheless, Goleman’s assertion begs the question: What accounts for the other 80%?

You guessed it…Emotional Intelligence. What exactly is emotional intelligence? Emotional intelligence (also called EQ or EI) refers to the ability to perceive, control, and evaluate emotions. Many corporations now have mandatory EQ training for their managers in an effort to improve employee

relations and increase productivity.

TACIT KNOWLEDGE aka “STREET SMARTS”

You’ve heard the phrase, “Experience is the greatest teacher…”

In psychology circles knowledge gained from everyday experience is called tacit knowledge. The colloquial term is “street smarts,” which implies that formal, classroom instruction (aka “book smarts”) has nothing to do with it. The individual is not directly instructed as to what he or she should learn, but rather must extract the important lesson from the experience even when learning is not the primary objective.

Tacit knowledge is closely related to common sense, which is sound and prudent judgment based on a simple perception of the situation or facts. As you know, common sense is not all that common.

Tacit knowledge, or the lessons obtained from it, seems to “stick” both faster and better when the lessons have direct relevance to the individual’s goals. Knowledge that is based on one’s own practical experience will likely be more instrumental to achieving one’s goals than will be knowledge that is based on someone else’s experience, or that is overly generic and abstract.

BEING BOTH SMART AND STUPID

Yes, it’s possible to be both smart and stupid. I’m sure someone you know comes to mind at this precise moment. But the goal here is not to ridicule, but to understand how some seemingly highly intelligent, or highly educated individuals can be so smart in one way, and incredibly stupid in others.

The woman who is a respected, well paid, dynamic executive who consistently chooses men who don’t appear to be worthy of her, or the man who appears to be a pillar of the community, with a loving wife and happy kids, ends up being arrested on rape charges.

It happens, but why? I found the answer in Why Smart People Can Be So Stupid. Essentially, intellect is domain specific. In other words, being smart (knowledgeable) in one area of your life, and stupid (ignorant) in another is natural. Turning off one’s brain is quite common especially when it comes to what we desire. A shared characteristic among those who are smart and stupid, is the difficulty in delaying gratification.

Olem Ayduk & Walter Mischel who wrote the chapter summarized: Sometimes stupid behavior in smart people may arise from faulty expectations, erroneous beliefs, or merely a lack of motivation to enact control strategies even when one has them. But sometimes it is an inability to regulate one’s affective states and the behavioral tendencies associated with them that leads to stupid and self-defeating behavior.

The central character in this book who many of these lessons regarding being smart and stupid revolve around is Bill Clinton and his affair with Monica Lewinksky.

WISDOM & CONCLUSION

My great grandmother, Leola Cecil, maybe had an 8th grade education at the most. By no stretch of the imagination was she highly educated, but she had what seemed like infinite wisdom. She was very observant and could “read” people with startling accuracy. Till the very end of her life she shared her “crystallized intelligence” with whomever was receptive to it.

She died at the age of 94. I often use many of her sayings as a public speaker, but most importantly, I use her philosophies to make sure that I’m being guided spiritually and not just intellectually. Many of us who are lucky enough to have a great grandparent can testify that there is something special about their knowledge. They seem to have life figured out, and a knack for helping those of us who are smart, educated and intelligent see things more clearly when we are too busy thinking.

What they have is what we should all aspire to end up with if we are lucky: wisdom.

Wisdom is the ability to look through a person, when others can only look at them. Wisdom slows down the thinking process and makes it more organic; synchronizing it with intuition. Wisdom helps you make better judgments regarding decisions, and makes you less judgmental. Wisdom is understanding without knowing, and accepting without understanding. Wisdom is recognizing what’s important to other people, and knowing that other people are of the utmost importance to you. Wisdom is both a starting point, and a final conclusion.



Source by Gian Fiero

Silver Anniversary Invitations For the 25th Corporate Anniversary Party

Anniversaries commemorate a relationship’s longevity and celebrate the idea of many more years to come. Corporate anniversaries should not be overlooked, as it is a respectable achievement to have kept a business running – similar to keeping a marriage together for so many years.

Significance of 25 Years

If you are able to successfully stay in business for a quarter of a century, then you should celebrate! Enduring 25 years of stress during hard times and joy during periods of prosperity shows a business stamina that should be recognized. You might even choose to present original employees with a commemorative plaque and gift at the party.

Celebrate 25 Years of Business with a Silver Anniversary Party

Wedding anniversaries are not the only occasions that get to apply special meanings. Traditionally, a silver wedding anniversary signifies 25 years together, but there is no reason why your business can’t celebrate its 25th anniversary with a silver theme.

Silver is strong, durable, and powerful, just like your business has to be to last this long. Silver can denote a formal evening or work for a casual party as well. Whether you choose formal or casual, day or evening, get guests prepared with silver anniversary invitations.

Silver Anniversary Party Tips and Ideas

When planning your silver anniversary, you will need to choose anniversary invitations. What better way to highlight your accomplishment than by selecting silver anniversary invitations? You could choose elegant pocket silver anniversary invitations, incorporating your corporate colors, with silver as an accent. For example, if your logo is navy blue, you might choose a navy blue pocket folder with your logo embossed in silver on the pocket and the words “25 Years” in silver. The silver anniversary invitation itself could be navy blue with raised silver lettering in silver envelopes with a navy blue lining.

If you are planning a more casual party, you might choose silver anniversary invitations with a less formal look and feel. For instance, you might choose a light blue with a swirled silver border inviting guests to a silver anniversary beach picnic, which could take place at a nearby lake if you live in a landlocked state.

If you are planning a semi-formal party but still want a beautiful silver anniversary invitation, you might choose silver paper as your invitation inspiration. You could choose a square shaped silver paper with a satin bow centered at the top with black lettering. You might also choose a single pane silver anniversary invitation on shimmering silver paper with an embossed border and black lettering. If you really want guests to prepare for a celebration, you might consider a tea length silver anniversary invitation in a tri-fold design with a pair of die cut champagne glasses across the tri-fold opening. Guests will be impressed and won’t be able to miss the reason for the party.

Sending dazzling silver anniversary invitations will not only get guests in the mood to celebrate your 25th corporate anniversary, but will provide the perfect keepsake to last the next 25 years.



Source by Grace W Chen