Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781475819250

Oppression, Reflection, and Advocacy in the Classroom: One Teacher–Researcher Reflects on Her Research and Practices Involving African American Students

Teacher Education and Practice R&L Education ePub


ABSTRACT: In this article, I—a White, French-immersion teacher–researcher—engage in a reflective examination of my research and teaching practices involving African American students. My critical reflection of my research examines the instruments used in my comparative study of African American students’ experiences in the French-immersion context and the regular education context. My concurrent reflection on myself as an instrument in the study and my own teaching practices revealed to me that despite my own “critical” awareness, I actually shared many of the oppressive practices and beliefs of regular education teachers. I realized, furthermore, that such beliefs were indeed oppressive to our African American students and ourselves, the teachers. The discussion of these findings unearths the complex issues that White teachers–researchers need to examine in working with African American students, and it reveals their implicatedness in the very systems of oppression that they are attempting to deconstruct.

See All Chapters
Medium 9781782201489

Eleven: A Mule's Life

Wendy Hoffman Karnac Books ePub

I sat in a big airplane. I didn't know how I had got here. Panic seized my throat. I receded, and another person came forward. In the time it takes to swallow or less, a person can emerge and recede. This new person was assured. She had instructions. Similar people came out with her, so she was not alone.

I was the one who emerged. I was a courier. We carried drugs and political documents from one continent to another. I walked through customs without expression. The inspectors did not look up my vagina, or into my rectum, or in any of my bras. I went by different names. I had been travelling since my late teens, two trips per year, probably a total of twenty-five.

Paris to Pakistan, 1972

The alarm clock rang at 3:45 a.m. I rolled over, pretending to sleep through the noise. Todd sat up in bed and shut off the alarm.

My clothes for this run were laid out on a chair: black trousers, new underpants, a brassiere slightly small for me, white socks, black loafers, a brown shirt. He must have gathered them after I fell asleep last night. He stored them in the narrow broom closet in the kitchen. The travel clothes would not attract attention. A “run” was when the internal couriers took something illegal from one country to another. I had many couriers in my system, but my other personalities didn't know about them. Todd pulled off my nightgown, and tried to dress me. I tried to bite his hand, but he waved four fingers on his right hand in front of my face. Something clicked in my brain, and I could not bite, kick, fight, or flee. My father had given him my hand signals as part of my dowry.

See All Chapters
Medium 9780596523022

42. Privacy

John Viega O'Reilly Media ePub

By now, people should have a reasonable expectation that there's no privacy on the Internet. If you want privacy, you have to read the fine print carefully to find out exactly what privacy has been promised and under what conditions. Most people don't think about it, and if they do, they don't care very much.

Many geeks, on the other hand, care a whole lot. Few of them know they're a tiny minority, though.

I think I'm pretty typical. I would love to have my privacy, but once you get past my personal finances and such (read: I don't want my money/identity stolen), I really only object at a moral, theoretical level. It's not a major driver for me, and I'm often willing to sacrifice some privacy for more functionality. I generally would not go out of my way to get more privacy unless I explicitly had something to hide. I almost never have anything to hide.

Most other people seem to feel the same way about it: privacy is nice in theory, but if you don't have anything to hide, what's the big deal? Maybe that's a shame, but it's the way the world is.

See All Chapters
Medium 9788324688944

3. Budowanie bloków UDP

Grigorik, Ilya Helion ePub

Protokół UDP, czyli protokół datagramów użytkownika, został dodany do pakietu protokołów sieci rdzeniowej przez Jona Postela w sierpniu 1980 r., więc sporo czasu po wprowadzeniu TCP/IP, ale w momencie, kiedy specyfikacje TCP oraz IP zostały rozdzielone na dwa odrębne dokumenty RFC. Jak zobaczysz, ten moment ma istotne znaczenie, ponieważ podstawowa cecha UDP oraz to, do czego ten protokół się odwołuje, nie leżą w tym, co zostało za jego pomocą wprowadzone, ale w tym, co zdecydowano się pominąć. UDP jest potocznie określany jako protokół zerowy (ang. null protocol), a dokument RFC 768 opisujący jego działanie, mógłby faktycznie zmieścić się na serwetce.

Samodzielna, niezależna encja danych przenosząca wystarczające informacje, które umożliwiają zrutowanie jej z węzła źródłowego do węzłów przeznaczenia bez konieczności polegania na wcześniejszych wymianach danych pomiędzy węzłami a siecią transportową.

Terminy „datagram” i „pakiet” są często używane zamiennie, ale istnieją pomiędzy nimi pewne niuanse. „Pakiet” oznacza sformatowany blok danych, natomiast pojęcie „datagram” jest często zarezerwowane dla pakietów dostarczanych za pomocą zawodnej usługi, w której nie ma gwarancji dostarczenia oraz powiadomień o błędach. Z tego powodu w oryginalnej pełnej nazwie protokołu UDP zamiast oficjalnego członu User (użytkownik) stosowany bywa bardziej opisowy termin Unreliable (zawodny), co daje nam Unreliable Datagram Protocol, czyli zawodny protokół datagramowy. Dlatego też pakiety UDP są zasadniczo i bardziej poprawnie określane jako datagramy.

See All Chapters
Medium 9780596006877

8. Search and Query Bots

Paul Mutton O'Reilly Media ePub

Search and query bots are very common on IRC. You may find that lots of IRC users will use a bot in preference to a web-based search tool, simply because it is less effort than starting up a web browser and typing in a URL.

The first hack shows you how to create a bot that performs Google searches using the Google and PircBot APIs. Conveniently, most IRC clients will highlight the resulting URLs and let you click on them to load the page in your default web browser.

Web Services provide powerful and easy ways to access information over the Internet and present the results in your application. This chapter shows you how to make some Java bots that employ Web Services to see what the weather is like, translate languages, convert currencies, and search for books on Amazon.

Not all searches have to be performed over the Internet. A more local type of search can be used to determine if a certain user is connected to your IRC network, even if she is not in any of your channels. This is useful if you are trying to get a hold of somebody who doesnt use IRC that much and connects only infrequently.

See All Chapters

See All Slices