Friday, August 7, 2009

SELAMAT ........!

Seluruh civitas akademik Jurusan Teknik Elektro Fakultas Teknik Universitas Khairun, Ternate mengucapkan selamat kepada:

Bpk. Ramli Rasyid, ST., MT.

Atas terpilihnya sebagai Dekan Fakultas Teknik, Universitas Khairun masa bakti 2009-2014.
Semoga mampu membawa Fakultas Teknik menjadi lebih visioner dan lebih maju ke depan.


Ternate, 6 Agustus 2009

Civitas Akademika Jurusan Teknik Elektro
Fakultas Teknik
Universitas Khairun

Pemilihan Dekan Fakultas Teknik Universitas Khairun, Ternate

Pada hari Kamis, tanggal 6 Agustus 2009 melalui Rapat Senat Fakultas Teknik, telah terpilih Bpk. Ramli Rasyid, ST., MT., sebagai dekan baru Fakultas Teknik Universitas Khairun.
Pemilihan dekan ini, diikuti oleh 3 orang kandidat, masing-masing Ibu Lita Asyriati Latif, (Jurusan Teknik Mesin), Bpk Ahmad Seng (Jurusan Teknik Mesin), dan Bpk Ramli Rasyid (Jurusan Teknik Elektro).
Bpk Ramli Rasyid pada pemilihan dekan ini memperoleh 9 suara dari 15 anggota Senat Fakultas Teknik (3 dari Teknik Sipil, 4 dari Teknik Arsitektur, 4 dari Teknik Mesin, dan 4 dari Teknik Elektro).
Diharapkan dengan terpilihnya Dekan baru ini, mampu mempercepat perkembangan Fakultas untuk mengejar ketertinggalan yang ada sekarang. Perlu diketahui bahwa, Fakultas Teknik merupakan fakultas paling "bungsu" di lingkungan Universitas Khairun.
Sebelumnya, fakultas ini dipimpin oleh Bpk. Ir. Yunarko Triwinarno, M.T. yang merupakan "pinjaman" dari ITS, karena pada saat pertama kali Fakultas Teknik berdiri, belum ada SDM yang memenuhi kriteria untuk memangku jabatan tersebut.

Thursday, September 25, 2008

Wahai Dosen, Berbicaralah dengan Bahasa Manusia

Penulis: Romi Satria Wahono - detikinet
Jakarta - Itulah teriakan para mahasiswa kepada dosennya, yang mungkin nggak pernah tersampaikan, dan saya yakin akan jadi blunder kalau diungkapkan. Kecuali bagi para mahasiswa yang memiliki kebebasan nilai IPK, kebebasan pola pikir, kebebasan penelitian, kebebasan finansial dan kebebasan ketergantungan serta ketaatan kecuali kepada satu yang DI ATAS.

Mahasiswa pedjoeang yang tetap mau mengatakan kebenaran meskipun itu sangat sulit, pahit dan sakit. Tidak saya rekomendasikan, karena ungkapan semacam "Sensei no jugyo wa sonna naiyo deshitara, i-me-ru de okutta hou ga yoi dewanai deshouka?" (kalau isi kuliahnya kayak gitu, lebih baik kalau Anda kirimkan ke saya lewat email saja prof) :), saya jamin akan membuat nilai kita jadi Fuka alias tidak lulus.

Jangan dilakukan, cukup saya yang jadi korban harus mengambil mata kuliah yang sama selama tiga tahun berturut-turut, sampai akhirnya harus puas mendapatkan nilai Ka alias C dari sang Professor. Professorku yang akhirnya jadi sahabatku dan membimbing penelitianku, meskipun tetap tidak bisa menghilangkan cacat nilaiku :D

Mungkin itu salah satu tema diskusi ketika bertemu dengan teman-teman dosen di Puskom UNS Solo. Workshop, meskipun dengan undangan mendadak, tapi bak wangsit yang memberi tanda ke insting saya bahwa acara ini wajib saya datangi. Bukan hanya karena telepon mbak Jatu yang merdu yang meminta saya untuk sekalian mabid sambil ngisi liqo di UNS Solo hehehe, atau karena kesabaran mas Kurnia yang ngejar kereta saya dari Boyolali dengan motor bututnya, dan akhirnya berhasil menjemput saya jam dua pagi di Stasiun Balapan Solo, dan juga bukan karena sodoran kertas untuk tanda tangan dari mbak Asih :)

Saya merasa perlu mengajak bapak ibu dosen untuk kembali memperhatikan mahasiswa kita. Saya sebenarnya dalam keadaan kepenatan yang luar biasa pada waktu itu. Dua hari di Jogjakarta, hari Selasa (19 Agustus 2008) di STMIK Amikom untuk memberi materi tentang kesiapan kerja wisudawan dan Rabu (20 Agustus 2008) ke Universitas Atmajaya mbantu pak Irya ngompori dosen-dosen untuk membuat e-Learning content.

Hari ketiga, perjalanan darat selama 5 jam antara Jogja-Purwokerto meluluhlantakkan kekuatan saya, memporakporandakan kemampuan otak kiri saya, membenamkan senyum saya sampai ke titik nadir (halah! ;)). Mandi, sholat, sarungan, datangnya pesan perdjoeangan sang istri dan diskusi dengan para prajurit saya, garda depan Romi Satria Wahono's Army alhamdulillah membangkitkan kekuatan saya.

Revolusi belum selesai bung, perdjoeangan harus tetap dilakukan! :) Alhamdulillah setelah acara seminar grand opening prodi Teknik Informatika di Unsoed selesai, saya bergegas, meninggalkan kopi ginseng saya ke mas Adnan (thanks om), meloncat ke kereta Bima yang merayap senyap menuju kota Solo.

Kembali ke tema bahasan, saya mengajak bapak ibu dosen di UNS Solo untuk mencoba memikirkan kembali hakekat kita ngajar. Ngajar mahasiswa mengandung makna besar mendidik dan membina generasi muda kita. Dalam sejarah kebangkitan bangsa-bangsa, peran mahasiswa selalu tercatat, menjadi garda depan perubahan, kontribusinya sangat besar dan dominan.

Mahasiswa adalah agen perubahan yang akan mewarnai masa depan dan membentuk karakter suatu bangsa. Bayangkan, pendidikan dan pembinaan orang-orang seperti itu diserahkan ke kita, para dosen dan pendidik. Beban berat yang harus kita pikul dan perlu perdjoeangan untuk melaksanakannya dengan sungguh-sungguh.

Saya sempat melakukan studi kecil-kecilan, tentang harapan mahasiswa kepada dosennya. Dosen seperti apa yang sebenarnya mereka harapkan. Cukup menakjubkan, bahwa mahasiswa sangat jujur menilai kita. Kalau kita simpulkan ada empat karakteristik dosen yang diharapkan mahasiswa, dan jujur saja akan mereformasi dan mengantarkan kita menjadi sosok Dosen 2.0 :)

1. Memiliki Kemampuan Verbal
Pintar jangan untuk diri sendiri, tapi juga untuk orang lain. Bahasa gampangnya, permintaan mahasiswa kepada kita supaya belajar untuk mengajar, dan bukan hanya belajar untuk diri kita sendiri. Dosen diharapkan punya keseimbangan dalam pengetahuan taksit (know-how dan pengalaman lapangan) dan pengetahuan eksplisit (tertulis di textbook dengan berbagai teoritikalnya). Beri mahasiswa lebih banyak pengetahuan taksit karena know-how dan pengalaman lapangan yang kita miliki akan membuka wawasan mereka lebih luas.

Memanjang-lebarkan penjelasan ke bahasan yang sudah jelas bin cetho tertulis di buku akan membuat kuliah kita jadi kering, garing dan membosankan. Kebiasaan kita dalam menggunakan bahasa sulit dalam menjelaskan suatu hal juga dikritik, ditambah dengan nafsu untuk memasukkan semua materi kuliah ke slide presentasi. Jangan buat kacamata kita semakin tebal, itu harapan para mahasiswa :) Mari kita gunakan bahasa manusia yang baik dan benar, dosen datang untuk memahamkan ke mahasiswa, bukan untuk menambah pusing mahasiswa yang sudah pusing dengan tugas mandiri, uts dan uas :)

2. Memiliki Kemampuan Tulis
Kritikan paling tajam adalah kebiasaan kita menggunakan bahasa tulis ala paper yang dingin dan formal. Ngeblog adalah terapi yang sangat efektif mengatasi kelemahan kita yang tidak terbiasa menggunakan bahasa manusia dalam menulis. Posting artikel populer dalam bentuk journal pribadi yang banyak menggunakan ungkapan hati ala blog, akan mereformasi gaya tulisan kita. Menulislah dengan hati, karena kekuatan kata-kata kita akan memberikan motivasi tinggi kepada para mahasiswa dan mahasiswi.

Jangan pernah nyontek tulisan orang lain karena itu akan blunder, membuat generalisasi negative image ke semua perilaku kita. Apalagi kalau menerapkan standard ganda dengan membuat tidak lulus mahasiswa yang melakukan copy-paste pada laporan tugas mandirinya. Kegiatan copy-paste mahasiswa kadang harus disikapi dengan bijak, mungkin mereka belum kita ajarkan tentang peraturan APA masalah pengambilan referensi dan pembuatan kutipan. Justru copy-paste yang dilakukan dosen dan pendidik adalah penghianatan besar, membuat damage yang sangat luas ke lingkungan dan kegiatan hina yang tidak termaafkan.

3. Open Mind dan Karakter Berbagi
Terbuka, jujur dan mau menerima kritik adalah sifat penting yang diharapkan mahasiswa ke dosennya. Karakter ringan tangan, senang berbagi ilmu dan project ;), mau bergaul dengan mahasiswa dan bahkan mendekati mereka dengan "bahasa mereka" adalah sifat yang menentramkan mahasiswa. Mahasiswa, selain sebagai murid, juga adalah teman, partner dan customer dari sang dosen.

Janganlah dosen bersifat terlalu jaim, jayus apalagi jablai, karena itu akan membuat mahasiswa makin tidak simpatik. Kalau sudah nggak simpatik, sebaik apapun ilmu pengetahuan dan nasehat yang kita berikan akan hancur, musnah dan mahasiswa akan main hati (romi and the backbone) :) Mari kita menjaga hati mereka dan memberikan janji suci (romi and nuno) kepada para mahasiswa, "wahai para mahasiswaku, senyummu juga sedihmu, adalah hidupku".

Kalau perlu sebutkan dengan ikhlas, "akulah penjagamu, akulah pelindungmu, akulah pendampingmu, di setiap langkah-langkahmu (romi maulana, gigi)". Dijamin mahasiswa kita pasti klepek-klepek dan mengatakan "everything i do, i do it for you sir ..." :D Kadang mengikuti behavior mereka dengan membuat account friendster dan facebook juga bukan pilihan buruk. Meminta mereka membuat laporan dalam bentuk tulisan lewat fitur blog di friendster kadang saya lakukan untuk men-terapi mahasiswa-mahasiswa saya yang sudah sulit dikendalikan lewat cara konvensional :)

4. Memiliki Kemampuan Teknis
Cukup mengejutkan bahwa technical skill ternyata bukan hal utama yang diharapkan oleh mahasiswa ke dosennya. Sudah menjadi hal yang jamak bahwa kemampuan teknis khususnya yang berhubungan dengan pengetahuan eksplisit, sebenarnya bisa didapat dari berbagai literatur, buku dan ebook yang didapat dengan mudah oleh mahasiswa lewat internet.

Dosen diharapkan oleh mahasiswa untuk jujur, kalau memang nggak ngerti ya bilang saja nggak ngerti, jangan malah muter-muter dan bikin pusing mahasiswa :) Perlu saya beri catatan khusus, pada jurusan computing, mahasiwa kita kadang punya technical skill yang lebih tinggi daripada kita, misalnya berhubungan dengan programming, troubleshoting, dan tren teknologi.

Berkata tidak tahu, adalah suatu hal yang biasa dalam iklim pendidikan di kampus. Mengungkapkan akan mencoba mempelajari masalah itu dan dijadikan bahan diskusi pertemuan pekan depan, adalah jawaban dosen pedjoeang yang jujur dan bertanggung jawab. Sekali lagi, dosen nggak perlu keminter atau merasa lebih pinter daripada mahasiswanya untuk urusan skill teknis. Karakter dosen yang merasa menjadi newbieforever, selalu perlu belajar dan belajar lagi, selalu berdjoeang untuk mendapatkan ilmu pengetahuan, dan berusaha keras menyelesaikan masalah mahasiswanya, adalah karakter wajib, dan sifatnya tidak hanya wajib kifayah, tapi wajib ain :)

Untuk para dosen, sekali lagi, anak-anak muda, para pembaharu dan penentu masa depan bangsa ada di depan kita. Kitalah yang menentukan apakah mereka akan menjadi seorang pemimpin besar, mujaddid besar, dan ilmuwan besar, yang akan memperbaiki republik ini. Dan jangan lupa, bahwa bahwa kita jugalah yang akan membuat mereka menjadi penjahat dan koruptor besar yang akan memporak porandakan republik ini.

Untuk para mahasiswa, beri kami kesempatan untuk berbenah dan memperbaiki diri. Insya Allah kami akan berusaha menjadi pembimbing dan pendidik yang baik untuk anda sekalian. Kami tidak menginginkan apapun dari kalian semua, para mahasiswa, selain harapan supaya mahasiswa tetap komitmen untuk belajar dan berdjoeang keras, serta pantang menyerah. Hentikanlah sikap main-main, serius dan profesional dalam melakukan kegiatan berhubungan dengan tugas belajas. Bersikaplah seperti layaknya seorang ksatria dan agen perubahan, yang akan mengantarkan republik ini ke jalan yang lebih baik.

Tetap dalam perdjoeangan!


*) Keterangan: Penulis, Romi Satria Wahono, adalah Koordinator IlmuKomputer.Com dan Peneliti LIPI. Blog: http://romisatriawahono.net, e-mail: romi[at]romisatriawahono.net
( dwn / dwn )
sumber: www.detik.com

Wednesday, July 30, 2008

With Security at Risk, a Push to Patch the Web

Published: July 30, 2008

Since a secret emergency meeting of computer security experts at Microsoft’s headquarters in March, Dan Kaminsky has been urging companies around the world to fix a potentially dangerous flaw in the basic plumbing of the Internet

Dan Kaminsky, a Web security specialist, showing a list of servers and whether they are patched.

While Internet service providers are racing to fix the problem, which makes it possible for criminals to divert users to fake Web sites where personal and financial information can be stolen, Mr. Kaminsky worries that they have not moved quickly enough.

By his estimate, roughly 41 percent of the Internet is still vulnerable. Now Mr. Kaminsky, a technical consultant who first discovered the problem, has been ramping up the pressure on companies and organizations to make the necessary software changes before criminal hackers take advantage of the flaw.

Next week, he will take another step by publicly laying out the details of the flaw at a security conference in Las Vegas. That should force computer network administrators to fix millions of affected systems.

But his explanation of the flaw will also make it easier for criminals to exploit it, and steal passwords and other personal information.

Mr. Kaminsky walks a fine line between protecting millions of computer users and eroding consumer confidence in Internet banking and shopping. But he is among those experts who think that full disclosure of security threats can push network administrators to take action. “We need to have disaster planning, and we need to worry,” he said.

The flaw that Mr. Kaminsky discovered is in the Domain Name System, a kind of automated phone book that converts human-friendly addresses like google.com into machine-friendly numeric counterparts.

The potential consequences of the flaw are significant. It could allow a criminal to redirect Web traffic secretly, so that a person typing a bank’s actual Web address would be sent to an impostor site set up to steal the user’s name and password. The user might have no clue about the misdirection, and unconfirmed reports in the Web community indicate that attempted attacks are already under way.

The problem is analogous to the risk of phoning directory assistance at, for example, AT&T, asking for the number for Bank of America and being given an illicit number at which an operator masquerading as a bank employee asks for your account number and password.

The online flaw and the rush to repair it are an urgent reminder that the Internet remains a sometimes anarchic jumble of jurisdictions. No single person or group can step in to protect the online transactions of millions of users. Internet security rests on the shoulders of people like Mr. Kaminsky, a director at IOActive, a computer security firm, who had to persuade other experts that the problem was real.

“This drives home the risk people face, and the consumer should get the message,” said Ken Silva, chief technology officer of VeriSign, which administers Internet addresses ending in .com and .net. “Don’t just take for granted all the things that machines are doing for you.”

When Mr. Kaminsky, 29, announced the flaw on July 8, he said he would wait a month to release details about it, in the hope that he could spur managers of computer systems around the world to fix them with a software patch before attackers could figure out how to exploit it.

Last week, however, accurate details of the flaw were briefly published online by a computer security firm, apparently by accident. Now security experts are holding their breath to see whether the patching of as many as nine million affected computers around the world will happen fast enough.

“People are taking this pretty seriously and patching their servers,” Mr. Silva said.

Major Internet service providers in the United States this week indicated that in most cases, the software patch, which makes the flaw much more difficult to exploit, was already in place or soon would be.

Comcast and Verizon, two of the largest providers, said they had fixed the problem for their customers. AT&T said it was in the process of doing so.

But the problem is a global one, and the length of time required to fix it could leave many Web users vulnerable for weeks or months. And there are millions of places around the world where people might find themselves vulnerable to potential attacks, ranging from their workplaces to an airport lounge or an Internet cafe.

Individuals and small companies with some technical skills can protect themselves by changing the network preferences of their computer settings so that they use the domain name servers of a Web service called OpenDNS (www.opendns.com).

Some computer systems are immune to the flaw. About 15 percent of domain name servers in the United States and 40 percent in Europe, including those at major Internet providers like America Online and Deutsche Telekom, use software from a Dutch company called PowerDNS, which is not vulnerable.

Still, much of the Internet remains vulnerable. “I’m watching people patch, and I realize this is not an easy thing to do,” Mr. Kaminsky said in an interview.

The flaw, which Mr. Kaminsky stumbled across in February, had been overlooked for more than two decades. The eureka moment came when he was idly contemplating a different security threat. He suddenly realized that it would be possible to guess crucial information about the protocol that domain name servers use to convert the numerical Web addresses.

Mr. Kaminsky worried about his discovery for several days and then contacted Paul Vixie, a software engineer who runs the Internet Systems Consortium and is responsible for maintaining a widely used version of software for domain name servers, known as BIND. Almost immediately, software engineers who looked at the vulnerability realized that Mr. Kaminsky had found a significant weakness.

In March, Microsoft held the secret meeting at its headquarters in Redmond, Wash. Sixteen representatives from security organizations and companies, including Cisco, talked about ways to combat the potential threat.

But after several delays while vendors fixed their software, Mr. Kaminsky went public.

For Mr. Kaminsky, the discovery and his subsequent warning to the Internet community were the culmination of an almost decade-long career as a security specialist. He was spotting bugs in software for Cisco and contributing to a book on computer security while still in college.

“I play this game to protect people,” he said.

He thinks that it is necessary to publish information about security threats to motivate system operators to protect themselves. Otherwise, “You don’t get to tell the river you need more time until it floods,” he said.

He said that he had initially hoped to give the Internet community a head start of a full month to fix the problem, but his plan was foiled when technical details were briefly posted online last week. “I would have liked more time, but we got 13 days and I’m proud of that,” he said.

The new flaw has sharpened the debate over how to come up with a long-term solution to the broader problem of the lack of security in the Domain Name System, which was invented in 1983 and was not created with uses like online banking in mind.

While Mr. Kaminsky is being hailed as a latter-day Paul Revere, Internet experts like Bruce Schneier, a member of the insular community that guards online security, said flaws like this were a routine occurrence and no reason to stay off the Internet.

“If there is a flaw in your car, it will get fixed eventually,” said Mr. Schneier, the chief security technology officer for British Telecom. “Most people keep driving.”

Source: New York Times


Head of Microsoft’s Online Efforts Departs

Kevin Johnson, the executive in charge of Microsoft’s struggling online business, is leaving the company. Microsoft announced Wednesday evening that Mr. Johnson was departing to become chief executive of Juniper Networks.

Mr. Johnson, 47, is leaving as his boss, Steven A. Ballmer, Microsoft’s chief executive, is shaking up the senior management ranks in an effort to improve the fortunes of the company’s Internet search and advertising business. Microsoft is a distant third behind Google, the leader, and Yahoo in this field, having been unable to catch up despite heavy spending.

The change also comes after Microsoft’s failed bid for Yahoo. Mr. Johnson played a central role in negotiations with Yahoo.

Under the new plan, responsibility for the two businesses overseen by Mr. Johnson — online services and the Windows operating system unit — will be separated.

Microsoft, in a statement, acknowledged that it needed new leadership to lift the performance of the online services business. The company said it would “create a new senior lead position and will conduct a search that will span internal and external candidates.”

In Microsoft’s most recent quarter, which ended June 30, revenue from online services increased 24 percent from the year-earlier quarter, to $838 million. But the business’s loss for the quarter more than doubled to $488 million.

Microsoft’s lackluster performance in online services, analysts note, began well before Mr. Johnson took over in September 2005, with the title of president of the platforms and services division.

“But he didn’t turn it around either,” said Charles di Bona, an analyst at Sanford C. Bernstein. “There are a lot of questions to be answered about Microsoft’s online services business, particularly because the company has spent so much there without much to show for it.”

After joining Microsoft in 1992 from
I.B.M., Mr. Johnson rose steadily, serving mainly in sales and marketing positions. He was a member of the 10-person senior leadership team at the company.

A colleague who declined to be named said Mr. Johnson wanted to become a chief executive someday — an unlikely prospect at Microsoft, given that Mr. Ballmer is 52.

Mr. Johnson championed Microsoft’s $44.6 billion bid for Yahoo in February as the best way to gain ground quickly in online services. The offer had the support of the activist investor
Carl C. Icahn, a Yahoo shareholder who threatened a proxy fight to get control of Yahoo.

But the two sides, after a series of talks, failed to reach agreement, though Microsoft has said it remains interested in Yahoo’s search business, if not the entire company. Mr. Icahn is likely to continue agitating for a deal.

Source : New York Times

Monday, July 28, 2008

Teaching Large Groups

By: Peter Cantillon.

Lecturing or large group teaching is one of the oldest forms of teaching. Whatever their reputation, lectures are an efficient means of transferring knowledge and concepts to large groups. They can be used to stimulate interest, explain concepts, provide core knowledge, and direct student learning.
However, they should not be regarded as an effective way of teaching skills, changing attitudes, or encouraging higher order thinking. Large group formats tend to encourage passive learning. Students receive information but have little opportunity to process or critically appraise the new knowledge offered.
How can lectures be used to maximise learning and provide opportunities for student interaction? This article will supply some of the answers and should help you to deliver better, more interactive lectures.

GETTING YOUR BEARINGS

It is important to find out as much as possible about the context of the lecture that is, where it fits into the course of which it is part.
An understanding of the context will allow you to prepare a lecture that is both appropriate and designed to move students on from where they are.

Helping students to learn in lectures

An important question for any lecturer to consider when planning a teaching session is, "how can I help my students to learn during my lecture?" There are several different techniques you can use to aid student learning in a large group setting.

Planning your lecture

It is important to distinguish between the knowledge and concepts that are essential (need to know) and those which, though interesting, are not part of the core message (nice to know).
The aims of the lecture should be clearly defined ("what do I hope to achieve with this lecture?"). These will help to define the teaching methods and the structure. If, for example, the purpose of the lecture is to introduce new knowledge and concepts, then a classic lecture structure might be most appropriate.
On the other hand, if the purpose is to make the students aware of different approaches to a particular clinical problem, a problem oriented design in which alternative approaches are presented and discussed might be a more appropriate format.

Choosing teaching media

When you have selected the content of the lecture and placed it into a working structure, the next consideration is how to deliver the message. Which teaching media should be used (for example, slides, overheads, handouts, quizzes)? The most appropriate media will differ depending on the venue, class size, and topic.

Getting started

In the first moments of a lecture it is important that the students are given some sense of place and direction. Thus a brief summary of the previous lecture and an indication of the major themes and learning objectives for the current session provide both you and the students with a relatively easy start. If you are working with a new group it may be useful to indicate the ground rules for the session-for example, "switch off mobile phones," or "ask questions at any time."

Encouraging students to interact

Students learn well by "doing." Yet there is an understandable tendency for students to regard lectures as an opportunity to sit back, be entertained, and "soak up" the learning. However, you can use various methods to encourage students to take a more active part in the learning process.
Students' attention (and recall) is best at the beginning and end of a lecture. Recall can be improved by changing the format of your lecture part way through. It is also important when planning a lecture to think about activities and exercises that will break up the presentation

Ask questions

It is useful to ask questions of the group at various stages in the lecture, to check comprehension and promote discussion. Many lecturers are intimidated by the silence following a question and fall into the trap of answering it themselves. Wait for the answers to come. It takes time for students to move from listening to thinking mode. A simple tip is to count slowly to 10 in your head-a question is almost certain to arrive.

Get students to ask you questions

An alternative to getting students to answer questions is to ask them to direct questions at you. A good way of overcoming students' normal fear of embarrassment is to ask them to prepare questions in groups of two or three. Questions can then be invited from groups at random. When asked a question, you should repeat it out loud to ensure that the whole group is aware of what was asked. Seeking answers to the question from other students, before adding your own views, can increase the level of interaction further.

Brainstorming

Brainstorming is a technique for activating the students' knowledge or current understanding of an issue or theme. The lecturer invites answers to a question or problem from the audience and writes them, without comment, on a board or overhead. After a short period, usually about two or three minutes, the lecturer reviews the list of "answers" with the class. The answers can be used to provide material for the next part of the lecture or to give students an idea of where they are before they move on. By writing answers in a way that can be seen by everyone in the audience, you allow the students to learn from each other.

Buzz groups

Buzz groups also encourage interaction. They consist of groups of two to five students working for a few minutes on a question, problem, or exercise set by the lecturer. Buzz group activity is a useful means of getting students to process and use new information to solve problems. At the end of the buzz group session, the teacher can either continue with the lecture or check the results of the exercise by asking one or two groups to present their views. Remember that in an amphitheatre lecture hall, students can sit on their own desks to interact with the students behind them.

Mini-assessments

Mini-assessments and exercises are used in lectures to help students to recognise gaps in their learning and to encourage them to use new material in practice. Brief assessments can also allow the lecturer to measure how well the messages are being understood. Students could be asked, for example, to complete a brief, multiple choice questionnaire or a "one-minute" paper. The timing of quizzes and exercises will depend on what is required. An assessment of prior learning would be best at the start of a lecture, whereas an estimate of learning from the current session might be best carried out towards the end of the lecture.

How to end your lecture

At the end of a lecture it is important to summarise the key points and direct students toward further learning. You may present the key points on a slide or overhead. Alternatively, you may go through the main headings on a handout. Students are encouraged to learn more about a subject if they are set tasks or exercises that will require them to look further than the lecture notes for answers and ideas. The end of a lecture is also a common time for questions. Students may find the use of a one-minute paper a useful tool to help them to identify concepts and impressions that need clarification

Evaluating your lecture

Practice does make perfect, but the process of developing as a lecturer is greatly helped if some effort is made to evaluate performance. Evaluation involves answering questions such as "how did I do?" or "what did the students learn?"
A lecture can be evaluated in different ways. If the students are to be used as a source of feedback, the following methods are useful:
  • Ask a sample of the students if you can read their lecture notes-this exercise gives some insight into what students have learned and understood
  • Ask for verbal feedback from individual students
  • Ask the students to complete a one-minute paper
  • Ask the students to complete an evaluation questionnaire.
If you want to evaluate your teaching style and delivery, peers can be a useful source of feedback:
  • Ask a colleague to observe part or all of a lecture and provide feedback afterwards. It is important to inform the observer what aspects of the lecturing process you want evaluated-for example, clarity, logical flow, effectiveness of the media used
  • Videotape the lecture for private viewing, and arrange a joint viewing with a colleague later
Lectures are still a common teaching method in both undergraduate and postgraduate medical education. Their continued popularity is due to the fact that they represent an effective and efficient means of teaching new concepts and knowledge. This article has emphasised the importance of good lecture planning and of the inclusion of student interaction to ensure effective learning.


Recommended reading

  • Newble DI, Cannon R. A handbook for medical teachers. 4th ed. Dordrecht, Netherlands: Kluwer Academic, 2001.
  • Gibbs G, Habeshaw T. Preparing to teach. Bristol: Technical and Educational Services, 1989.
  • Bligh DA. What's the use of lectures? San Francisco: Jossey-Bass, 2000.
  • Brown G, Manogue M. AMEE medical education guide No 22: refreshing lecturing: a guide for lecturers. Medical Teacher 2001;23:231-44.

The ABC of learning and teaching in medicine is edited by Peter Cantillon, senior lecturer in medical informatics and medical education, National University of Ireland, Galway, Republic of Ireland; Linda Hutchinson, director of education and workforce development and consultant paediatrician, University Hospital Lewisham; and Diana F Wood, deputy dean for education and consultant endocrinologist, Barts and the London, Queen Mary's School of Medicine and Dentistry, Queen Mary, University of London. The series will be published as a book in late spring

Source: www.bmj.com

Sunday, July 20, 2008

EASY WAY TO SHARE INTERNET CONNECTION

You have two PC, one of them using Windows Vista as its Operating System and connect to the internet, while the other not connected to the internet. You want all the computer connect to the internet. At the moment, You have two choice to connection. First, use new direct connection to her PC. But, of course this choice is not efficient. It will need extra cost.

The second choice is share the internet connection that have been exist the other PC through by using network. Share the existing internet connection can be done by using 2 ways.

First, you can use proxy utility.

You have to install proxy software in the PC that connected to the internet. On the other PC, you have to set up Internet Option (Tools[ Menu]à[Internet Option]à [Tab Connection]à [LAN Setting] if you use Internet Explorer, and Menu [Tools]à[Options]à[Advanced]à[Tab Network] à[Setting] if you are using Mozilla Firefox).

Give checked sign on the “Use proxy server for your L(These will not apply to dial-up or VPN Connection)” Or “Manual proxy configuration” on the Mozilla Firefox. Fill it with your proxy server address and it port.

Second, if you don’t want to install proxy software, you can use Windows Vista facility’s to share the internet access, by using the following step:

1. Click [Start] –[Control Panel] – [Network and Internet] – [Network and Sharing Center]

2. Choose option [Manage Network Connection] on the right of Tasks panel .

3. On the new window that just appear, you will see all of hardware in your PC, right click on the hardware that give internet access, and then choose Properties.

4. At window Properties, choose [Sharing] tab.

5. Give check sign on the [Allow other network users to connect through this computer’s Internet Connection] tab.

6. At Home Networking Connection, choose kind of network connection that you used. Is it a [Local Area Connection] or [Wireless Network Connection]

7. If you will network connection establish automatically every time a new request connection from a client, give a check sign in front of [Establish a dial up connection whenever a computer on my network attempts to access the internet].

8. Click [Setting] button that just active.

9. Give check sign in front of service option that will be shared. If you want share all kind of services on the internet, You can choose all services.

10. Click [OK] to save every change that you have done.

After doing all of step, make sure that your IP of your PC that connected to the internet ended by 1. For example, if you using IP 192.xxx.xxx.xxx, you have to set the PC that connected to the internet use 192.168.0.1. While, the other client, use IP number that same network with the 1st PC, and set it DNS to IP of the 1st PC.

Source: http://zhumphallabbu.blogspot.com