Best Cold Sore Treatment – What is A Successful Cold Sore Cure

In this article we will look at a few different types of medicinal remedies that are available and are considered to be the best cold sore treatment that is available today to achieve a cold sore cure.

1. Viroxyn

This is a new approach in helping to treat herpes and does not rely on the patient taking the medicine internally. It has been designed to specifically attack and disrupt the lipid coat of virus and is best described as being a germicide rather than the normal anti-viral treatment. Many say this is the top approach on the market.

As it is a virucide you apply it directly to the lesion and this will then kill the virus. This type of treatment works faster than many of the other types of drugs available which have to work their way through your stomach into the bloodstream and which are then able to deal with the sores and will only interefere with the viruses reproduction which has caused the eruptions in the first place. This is why some call it an effective remedy.

Unlike the other treatments that are available which will interrupt the genetic code of herpes and eventually stop the virus from growing, Viroxyn strips the lipid coating off the virus and then kills it when it comes into contact with an affected area.

2. Zovirax or Acyclovir

This is taken as an episodic treatment and can reduce the severity of the outbreak, as well as shorten its duration and also shorten the time during which the herpes virus is detected on the skin’s surface in a similar way to Viroxyn.

Because it is an episodic treatment it should be taken 5 times a day and can also be used as a suppressive treatment which will help to reduce the number of cold sore outbreaks a person has. If you wish to use it as a suppressive treatment you will need to take 2 tablets 3 or 4 times a day but it is best to speak to your doctor to get the specific dosage in order to treat the cold sores correctly. This medication has it’s own defenders as the best fever blister treatment on the market.

However with Zovirax there are a couple of common side effects which you may suffer from and these are nausea and diarrhea. When you consider a cold sore cure, you must keep in mind the side effects in making an evaluation.

We have provided details on a couple of the best cold sore treatments that available, but it is up to you to research both natural and prescription treatments and use a plan that you feel comfortable with in your search for a herpes cure.

Auto Mechanics Curriculum – Preparing for the Job of the Future

While taking driver’s education class in high school, for part of the curriculum, a man insisted his daughter take a basic auto mechanics class. They fought for weeks about this class. It was unnecessary. It was ridiculous. After all, she was a girl. After much verbal sparring, she took the class and enjoyed it, using her knowledge many times.

Years later, it became clear why the man wanted his daughter to take this class. Someday, her car would break down. The auto club would not always be able to come to her aid. Roadside assistance is not always available. Especially when the breakdown occurs in the middle of the desert. A person could wait hours for help. That could be dangerous. It was important to know how to fix the basics on her own.

When she became a parent, and her teenage daughter was ready to learn to drive, it was their turn to fight about taking the class. The mother insisted and her daughter relented. As it turns out, after much arguing, the student really enjoyed it. Since she did not have a “head” for business, or fashion, or mathematics, or English, or any other subject for that matter, it seems the one thing she excelled at was fixing cars.

After taking all of the basic classes the school had to offer, the student’s instructor suggested a transfer to the local high school that offered full vocational technical programs. The transfer took place, and for the next two years she took a number of classes like basic tune-ups and trouble-shooting, tire rotation and balancing, transmission repair, engine repair, fluid transfers for oil changes and transmission fluid, and air conditioning, among others. Upon graduation from high school, the student became a licensed auto mechanic.

For this young lady, that was not enough. She wanted to specialize in foreign cars. That required a whole new set of classes. Thus began her enrollment in the local college vo-tech. Another two years and she earned her A.S. Degree in Auto Mechanics. She was able to fix anything on wheels. However, as with any industry, evolution takes place. The new hybrid vehicles are already on the market, and the electric car is just around the corner. She continues with her education to maintain the high level of expertise necessary for the cars of the future.

Auto mechanic classes can help a student with their future. To become a mechanic, one must learn problem-solving skills. Mechanics is a process. So is life. One cannot put gas in a car that has no engine. Such is the same with life. One step at a time.

For students that struggle in school, vo-tech classes and auto mechanic classes have historically been extremely challenging. Their opportunities for success were once unlike the mother and daughter that both took auto mechanics classes and flourished.

Gamble Or Abstain!

ABSTINENCE [The sure way]

There has been great awareness campaign about HIV/AIDS for the past decades and It is believed that there is nothing really new about this particular ailment, the general Public is not aware of. Part of this awareness campaign is the preventive aspect of acquiring the Virus. Though this article is centered on abstinence, it is in no way in disagreement with the other ways of protection against   transmission  of the virus.

“Abstinence, being faithful, correct and consistent condom use are the only ways to successfully reach everyone when discussing HIV prevention. I believe that the abstinence message alone does not solve the AIDS epidemic”- a quote from the American actress, Ashley Judd. This true statement of fact is in total agreement to the former first lady to the United states and as well the 2008 Democratic party presidential aspirant, Hilary Clinton who said “there is a great deal of political pressure to only talk about abstinence and to deny support for condoms and education for using them. This policy will lead to the unnecessary deaths of many people”. This is also correct. You cannot live the lives of others or monitor their activities and actions. Preaching abstinence alone and preventing the other means of protection is far from the solution. But in as much as the use of condoms and other safe practices are not condemned, total abstinence is worth the greatest attention because it is a 100% sure way of prevention, therefore preaching it is aimed at encouraging those who are doing their best possible to abstain, and as well put more light on reasons to abstain for those who believe in it, but do not practice it.. Before we hit the nail on the head, let’s go through the ways of  transmission  of the virus from an infected person to one that is not infected.

 Transmission  occurs when secretions of affected persons come in contact with tissues such as those lining the vagina, anal area, mouth or eyes ( the mucus membranes) or with a break in the skin as such for a cut or puncture by a needles. These ways are possible via sexual contact, sharing of needles, and  transmission  from infected mothers to their new born during pregnancy, labor or breastfeeding. It could also be transmitted via blood transfusion. These following ways could be classified into two major classes. The controllable or avoidable ways of  transmission  and the Uncontrollable means of  transmission . The controllable or avoidable means are these methods of contacting the virus which can be controlled or totally avoided by the person involved. Note that this definition is specific to the person who is at risk. The uncontrollable means are the ones which cannot be controlled by the affected persons. Infected new born fall into the uncontrollable means as they cannot do anything about the situation. They fall out to be unfortunate victims and to a large extent, blood transfusion can be in this category. For this category or class of  transmission , abstinence cannot be preached since it was not the fault or carelessness of the affected persons.

In the controllable category, using of new needles each time you want to take drugs and dumping the old ones after using them; is a direct formula to preventing HIV infection via injection of needles. This reduces the risk to about 99.99%. If a person not only shares needles but uses them just once, he stands a great chance to be risk free, giving the control method a good efficacy. Nevertheless, 0.0001% is still a probability and we will see how probability counts in reality. Therefore, in order to really understand what abstinence is, focus would be placed on the two major controllable means (injection and sex), especially on sex.

In sexual means of  transmission , the break in condom cannot be totally avoided in a given formula. No matter the quality of condom, there are still chances it could break during sex. Some arguments stress out that the virus is smaller than the fiber of the condom and it can still get through, especially when the male genital is very huge, stretching the condom extremely well. Therefore, it gives the probability of 85%- 95% of HIV prevention for the males and 95%- 99% for the females if used correctly.

On the contrary, Abstinence is a straight 100% preventive measure; absolutely efficient and no slight chance no matter how negligible it may be. It is safer and easier to adopt. Remember that abstinence does not mean been a virgin forever but avoidance of more than one partner, and more concretely avoidance of pre- marital and extra- marital sex. Probability is the chance of an event to occur and no matter how insignificant the value is; it does not prevent the situation involved from existing. It is believed that the cru de chat syndrome (sterile females with immature sex organs resulting from the loss or deletion of a significant portion of the genetic material) occurs once in 5000 births. This does not mean cru de chat syndrome does not exist and you can understand that, a parent who has a sick child with such a syndrome would not be ready to listen to statistics from any doctor, because the reality still remains; his/her child is suffering from it irrespective of the slim chance of occurrence.

On a general note, abstinence is the sure way to avoid the controllable means of acquiring the virus. And from the following illustration below, we can justify this simple fact. The table below shows the estimated number of cases of AIDS amongst people by  transmission  category in the 50 states of the United States of America as of 2007.

Male- to- male sexual contact — 487,695

Injection drug use — 255,859

Male- to male sexual contact with injection – 71,242

High risk heterosexual contact – 176,157

Others (Hemophilia, blood transfusion, prenatal exposure and risk not reported or Identified) – 18,266.

[taken from http://www.cdc.gov/hiv/topics/surveillance/basic.htm ].

The first four ways are controllable means in which aside drug use, the rest are by sexual contact. These four means account for 990,953 cases out of 1,009,219, which is about 98.2% of all cases. Meanwhile 735,094 out of 1,009,219 cases are due to sexual  transmission  alone; accounting for 72.8% of all cases. Only about 1.8% of the total incidences are due to uncontrollable  transmission .

On normal grounds, occurrence of a situation caused by uncontrollable factors should be more, when compared to the same situation caused by the controllable ones. Another insight we can get from this statistic which is an extension of the first statement is; despite the control measures and protective means available, the controlled means are still far greater in occurrence than the uncontrolled ones. This justifies the fact that the only way this can be drastically reduced is through abstinence.

A teenage girl once said, “I have created an appetite for sex and I do not think I can stop it now”. The Human nature is such that, if you allow it take part in a pleasurable event more than once and continuously, it begins to yearn after that event due to its increased appetite. Charles DIkkens, a popular English Novelist of the Victoria era quotes “subdue your appetite, my dears and you’ve conquered human nature”. Human natured is meant to be conquered and in this way we can control ourselves- hence show great abstaining ability. If we do not conquer our human nature and allow our various tastes or appetite to explode, I think mutualism would not be a reality and a ‘jungle Life” scenario would be the possible resultant situation. If we can control our appetite or taste to any or all of the following; fashion, food, clothes, fame, drinks, sports est. why not sex? Is it normal to randomly have sex with different partners? As long as the Human nature could be stretched, it could also be tamed and the only way to do this is by abstinence.

Mr Anton Zakovich, a Russian economic lecturer said “Pre- marital sex is just like tasting soup while still cooking it. You taste the soup to know how spicy it is before it is finally cooked”. What if peradventure it burnt your tongue or distorts your taste buds? Would you be able to enjoy the soup later. Sex before marriage should not be compared to tasting soup, you taste the soup to know the quality for improvements by adding more ingredients if need be. But what sort of improvement do you need in pre- marital sex that you would not still accomplish when married. Marriage is a Life time commitment and the more the improvement in all factors at stake, the better the intimacy and possibility of becoming one. As for extra marital relationships, they are not only medically wrong, but as well morally and socially bad. If you think this Idea is too conservative, then think and take a look at the exposed extra-marital affairs of some celebrities such as Tiger Woods and John Terry, in relation to the general public and their fans. Then statistics will make you understand the ‘social- contempt’, extramarital affairs can stimulate.

Abstinence is not practiced, it is perfected. As we all have the ability to abstain. Dennis Wolfberg, the late American stand up comedian and actor, once quoted to confirm this statement. “I didn’t practice abstinence, I perfected it”. The major reason why abstinence becomes a difficulty is the fact that we kill this potential ability in us. And in some cases, it goes so bad to the extreme- addiction. The only way to sexual addiction is sexual exposure from an early age leading to continuous sexual activities as the child grows to his or her late teens and even older. This is also applicable to drug addiction.

According to SADD’s MISSION statistics of the year 2005, taken from around the entire states of the United States of America, 46.8% of all high school students report that they have sexual intercourse and 6.2% of high school students have had sexual intercourse for the first time before the age 13. Not only that, 14.3% of high school students nationwide have had sexual intercourse with four or more persons during their lives.

Talking about drugs, 9.9% of youth ages 12- 17 were illicit drug users; 6.8% use marijuana, 3.3% used prescription drugs for non medical uses, 1.2% used inhalants, 0.8% used hallucinogens and 0.6% used cocaine. Also, half of teens (50%) have tried an illicit drug by the time they finished high school. Though these statistics may have been taken years back, but surely it is appalling information and most probably parents and all stake holders involved (especially the school guidance and other parties) should put more careful attention to their children.

The best part of this statistics is the fact that youths ages 12- 17 who believed their parents would strongly disapprove of their using a particular substance were less likely to use that substance than were youths who believed their parents would somewhat disapprove of neither approve nor disapprove. SO, this have to do with home/ parental training which would not be discussed as it is outside the scope of the subject matter.

The point is, children of this present generation are sexually very active even from a very early age. And for this reason, they need adequate sex education with the sermon preached, not from a formal approach but rather done in adequate love, care and full attention. Taking advantage of the relationship to a great deal of understanding between the parent and the child would serve as the tool to achieving it. If this system is practiced there would definitely be an increase in the percentage of children who would adopt abstinence.

Now in general, consider this scenario. You want to go to the shopping mall by foot which is 5km from your home but there are 3 short routes about 2.5km each in which there is the probability of coming across wild dogs in one, been attacked by hoodlums in the other and as for the last- been hit by a car due to its busy nature (though, these incidences occur once in 2 months, but they continuously happen in that rate of occurrence). Would you still take the risk to follow one of the short routes? Some of us, knowing fully well the nature of events still follow one of these short routes and if unfortunate, get bitten by a dog (or some dogs) or been attacked or hit by a car. That is what majority of us do. The shorter time of going to the mall and back home should not be more of a priority to your Life and health. This is exactly the circumstance we face in Abstinence. It is a 100% route of safety but we prefer short- lived pleasure, which we would still enjoy later in Life or are enjoying with a legal partner.

All said and done, other preventive measures are never absolute and still give room or chances for the spread of the Virus to occur. If we can abstain why not give ourselves the 100% chance to be risk free from contracting the virus? There is great gain and full advantage when you abstain be it moral, mental, religious, and of course social. It also adds fun and spice to your marriage Life in the nearest future if you are single. Usually, you enjoy to the fullest, what you have been anticipating for a long time. Some people taste the soup two, three, four times and end up decreasing or even losing their appetite, therefore not enjoying the soup later when it is done. But when the soup is tabled for you to eat- fresh and new, you take it as though you could finish a drum of it and still ask for more.

On a final note, in as much as awareness on all the protective systems of avoiding the virus  transmission  is important; it is very necessary to stress the fact that Abstinence is the best and sure way and hence treat the best as the best. Do not gamble; abstain to sustain your Life.

Wide Area Network (WAN)

Types and Characteristics of WANs

What is a WAN?

There are two prevailing definitions of a Wide Area Network (WAN). The book definition of a WAN is a network that spans large geographical locations, usually to interconnect multiple Local Area Networks (LANs). The practical definition of a WAN is a network that traverses a public network or commercial carrier, using one of several WAN technologies

What are its Main Components?

The main components for a WAN are routers, switches and modems. These components are described below in the hardware section.

CPE – Devices on the subscriber premises are called customer premises equipment (CPE).

The subscriber owns the CPE or leases the CPE from the service provider. A copper or fiber cable connects the CPE to the service provider’s nearest exchange or central office. This cabling is often called the local loop, or “last-mile”.

DTE/DCE – Devices that put data on the local loop are called data circuit-terminating equipment, or data communications equipment (DCE). The customer devices that pass the data to the DCE are called data terminal equipment (DTE). The DCE primarily provides an interface for the DTE into the communication link on the WAN cloud.

Hardware

In a WAN you will need various types of hardware components for it to function. The typical items of hardware that you will need in a WAN are:

Router – An electronic device that connects a local area network (LAN) to a wide area network (WAN) and handles the task of routing messages between the two networks. Operates at layer 3, and makes decisions using IP addresses.

Switch – A switch is a network device that selects a path or circuit for sending a unit of data to its next destination. Operates at layer 2, and uses MAC addresses to send data to correct destination.

Modem – Short for modulator/demodulator, a modem enables a computer to communicate with other computers over telephone lines. Operates at layer 1, where signals are converted from digital to analogue and vice versa for transmission and receiving.

Wan Standards

WANs operate within the OSI model using layer 1 and layer 2 levels. The data link layer and the physical layer. The physical layer protocols describe how to provide electrical, mechanical and functional connections to the services provided by the ISP. The data link layer defines how data is encapsulated for transmission to remote sites.

Encapsulation

Encapsulation is the wrapping of data in a particular protocol header. Remember that WANs operate at the physical layer and the data link layer of the osi model and that higher layer protocols such as IP are encapsulated when sent across the WAN link. Serial interfaces support a wide range of WAN encapsulation types, which must be manually specified. These types include SDLC, PPP, Frame delay etc. Regardless of WAN encapsulation used it must be identical on both sides of the point to point link.

Packet and Circuit Switching

Circuit switching and packet switching are both used in high-capacity networks.

The majority of switched networks today get data across the network

through packet switching.

Circuit-switching is more reliable than packet-switching. Circuit switching is old and expensive, packet switching is more modern.

General Routing Issues

What is a Routing Protocol?

A routing protocol is a protocol that specifies how routers communicate and exchange information on a network. Each router has prior knowledge of its immediate neighbours and knows the structure of the network topology. The routers know this because the routing protocol shares this information.

Protocol

RIP (Routing Information Protocol) was one of the most commonly uses protocols on internal networks. Routers use RIP to dynamically adapt changes to the network connections and communicate information about which networks routers can reach and the distance between them. RIP is sometimes said to stand for Rest in Pieces in reference to the reputation that RIP has for breaking unexpectedly and rendering a network unable to function.

Routing Algorithms

Distance Vector

This type of routing protocol requires that each router simply inform its neighbours of its routing table. The distance vector protocol is also known as the bellman-ford algorithm.

Link State

This type of routing protocol requires that each router maintain a partial map of the network. The link state algorithm is also know as Dijkstra’s algorithm.

IGRP

IGRP is a type of distance vector routing protocol invented by cisco used to exchange routing data in a autonomous system. Distance vector protocols measure distances and compare routes. Routers that use distance vector must send all or a portion of their routing table in a routing update message at regular intervals to each neighbour router.

Addressing and Routing

What does routing mean?

Routing is the process of deciding how to move packets from one network to another.

The directions also known as routes can be learned by a router using a routing protocol then the information is passed from router to router along the route of the destination.

IP Address’s

Every machine connected to the internet is assigned an IP address. An example of an IP address would be 192.168.0.1. IP addresses are displayed in decimal format to make it easier for humans to understand but computers communicate in binary form. The four numbers that separate an IP address are called Octets. Each position consists of eight bits. When added to together you get 32 bit address. The purpose of each octet in an IP address is to create classes of IP addresses that can be assigned within a network. There are three main classes that we deal with Class A, B and C. The octets of an IP address are split into two parts Network and Host. In a class A address the first octet is the network portion, this determines which network the computer belongs to, the last octets of the address are the hosts that belong to the network.

Sub netting

Sub netting allows you to create multiple networks within a class A, B or C address. The subnet address is the address used by your LAN. In a Class C network address you would have a subnet mask of 255.255.255.0. A subnet mask identifies which portion is network and which is host. For example 192.168.6.15 the first octet three octets are the Network address and the last octet being the host(Workstation). It is important to subnet a network because gateways need to forward packets to other LANS. By giving each NIC on the gateway an IP address and a Subnet mask it allows the gateways to route packets from LAN to LAN. Once the packet arrives at its destination, the gateway then uses the bits of the subnet portion of the IP address to decide which LAN to send the packets.

Circuit Switched Leased Lines

A circuit switched network is one that establishes a dedicated circuit (or channel) between nodes and terminals before the users may communicate. Here are some terminologies associated with a Circuit switched network.

Frame relay is a telecommunication service designed for cost-efficient data transmission between local area networks (LANs)

Basic rate interference is a service used by small business for internet connectivity. An ISDN BRI provides two 64 Kbps digital channels to the user.

Primary rate interface (PRI) is a telecommunications standard for carrying voice and data transmissions between two locations

All data and voice channels are ISDN and operate at 64kbit/s

Packet Switching

http://www.raduniversity.com/networks/2004/PacketSwitching/main.htm – _Toc80455261

Packet switching refers to protocols in which messages are broken up into small packets before they are sent. Each packet is then transmitted over the Internet. At the destination the packets are reassembled into the original message. Packet switching main difference from Circuit Switching is that that the communication lines are not dedicated to passing messages from the source to the destination. In Packet Switching, different messages can use the same network resources within the same time period.

http://en.wikipedia.org/wiki/Asynchronous_Transfer_Mode

Asynchronous Transfer Mode (ATM) is a cell relay, packet switching network and protocolwhich encodes data into small fixed-sized cells.

ISDN is used to carry voice, data, video and images across a telephone network. ISDN stands for integrated services Digital Network. Isdn also provides users with a 128kbps bandwidth. This is done through frame relay. Frame relay complements and provides a service between ISDN, which offers bandwidth at 128 Kbps and Asynchronous Transfer Mode which operates in somewhat similar fashion to frame relay but at speeds from 155.520 Mbps or 622.080 Mbps. Frame relay is based on the older X.25 packet switching technology and is used to transmit analogue signals such as telephone conversations.

PSDN stands for packet switched data network and is a data communication network. Packet switched networks do not establish a physical communication signal like the public telephone does (circuit switched network) Packets are sent on a fixed length basis and assigned with a source and a destination address. The packets then rely on the routers to read the address and route the packets through the network.

Mobile and Broadband Services

Digital Subscriber line(DSL) is mainly used to bring high bandwidth connections to homes and small business’s over a copper wire telephone line. This is can only be achieved if you stay within the range of the telephone exchange. DSL offers download rates of up to 6mbps allowing continuous transmission of video, audio and 3D effects. DSL is set to replace ISDN and compete with the cable modem in providing multimedia to homes. DSL works by connecting your telephone line to the telephone office over copper wires that are twisted together.

Asymmetric Digital Subscribers Line is most commonly used for home users. It provides a high download speed but a lower upload speed. Using ADSL, up to 6.1 megabits per second of data can be sent downstream and up to 640 Kbps upstream.

http://en.wikipedia.org/wiki/Symmetric_Digital_Subscriber_Line

Symmetric Digital Subscriber Line is a digital subcriber line which runs over one pair of copper wires. The main difference between ADSL and SDSL is the difference in upload and download speeds. SDSL allows the same upstream data rate and downstream data rate as ADSL upstream can be very slow.

[http://searchnetworking.techtarget.com/sDefinition/0],,sid7_gci558545,00.html

HDSL High bit-rate Digital Subscriber Line, one of the earliest forms of DSL, is used for wideband digital transmission within a corporate site and between the telephone company and a customer. The main characteristic of HDSL is that provides equal bandwidth in both directions.

IDSL is a system in which data is transmitted at 128 Kbps on a regular copper telephone line from a user to a destination using digital transmission.

The Local Loop enables operators to connect directly to the consumer via copper local loops and then add their own equipment to offer broadband and other services. This process involves operators accessing local exchange buildings to connect to a network of copper lines which connect them to homes and businesses. BT is an Example of a Local Exchange. The local loop connecting the telephone exchange to most subscribers is capable of carrying frequencies well beyond the 3.4 kHz upper limit.

Benefits of using DSL

DSL can provide virtually instantaneous transmission of voice, data and video over ordinary copper phone lines. A DSL connection can eliminate delays when waiting to download information and graphics from the Internet. It provides users with a cost effective high speed Internet connection. Another benefit is that a DSL connection is always on-line (like a LAN connection) with no waiting time for dialling or connecting.

There are now more than 10 million broadband connections in the UK. By December 2005 there were 9.792 million broadband connections in the UK and the average broadband take up rate during the three months to December was more than 70,000 per week.

Flu Prevention and the Gym Member

Health officials’ warning this month of a potentially harsh flu season should be a red flag to avid aerobic-bunnies and gym-jocks alike. The Centers for Disease Control (CDC) warn that the flu is transmitted when flu virus in the air is inhaled after an infected person coughs, sneezes, or speaks. Transmission also occurs when a person touches a surface that has flu virus on it and then touches his or her nose or mouth. Those familiar with the typical health club milieu, then, can easily liken a workout in the gym to sitting in a veritable Petry dish…

Heavy-breathing members on closely-placed cardiovascular machines and in crowded group fitness classes, hundreds of kinds of shared equipment from dumbbells and weight plates to public restrooms and the corner water fountain provide countless opportunities for contact with the flu virus. So, short of ditching our fitness goals until mid-Spring, it would do us well to learn more about the flu, it’s prevention, and what we can do about it.

What is the flu?

The flu, or influenza, is a contagious disease caused by the influenza virus. It attacks the respiratory tract in humans (nose, throat, and lungs). The flu is different from a cold; it usually comes on suddenly and may include these symptoms:

  • Fever
  • Headache
  • Tiredness (can be extreme)
  • Dry cough
  • Sore Throat
  • Nasal congestion
  • Body aches

About 10% to 20% of U.S. residents will get the flu each year. Among these persons infected, an average of 36,000 will die, and 114,000 will be hospitalized. Although the CDC claims it is not possible to accurately predict the severity of the flu season, this year’s early incidence of Type A flu strain is historically associated with a more severe flu season, including higher numbers of related hospitalizations and deaths. To make the outlook more grim, an epidemiological assessment by the Centers for Disease Control (CDC) already reports “widespread” influenza activity in over 10 U.S. states.

Who is at risk?

Although anyone can get the flu, including individuals who are healthy, there are various groups who are at higher risk for complications. These high risk groups include:

  • persons aged > 50 years;
  • residents of nursing homes and other long-term care facilities that house persons of any age who have long-term illnesses;
  • adults and children > 6 months of age who have chronic heart or lung conditions, including asthma;
  • adults and children > 6 months of age who need regular medical care or had to be in a hospital because of metabolic diseases (like diabetes), chronic kidney disease, or weakened immune system (including immune system problems caused by medicine or by infection with human immunodeficiency virus [HIV/AIDS]);
  • children and teenagers (aged 6 months to 18 years) who are on long-term aspirin therapy and therefore could develop Reye Syndrome after the flu; and
  • women who will be more than 3 months pregnant during the flu season.

How to Prevent Getting the Flu

Health officials are encouraging people, particularly those in high-risk groups to obtain a flu shot. The CDC states that an annual flu shot is the best way to reduce the chances that you will get the flu.

The best time to get a flu shot is from October through November, although you can still benefit from getting the vaccine after November, even if the flu is present in your community. Be aware that it takes about two weeks after the vaccination for antibodies to develop in the body to provide protection.

Obtaining the vaccine does not guarantee a flu-free season, however. Influenza viruses are constantly changing, and vaccine effectiveness depends on the match between vaccine strains and circulating viruses and the age and health status of the person getting the shot. Although the strain in this year’s flu vaccine is different from the circulating strain, the CDC states that studies indicate that the vaccine should provide some cross-protection against the circulating A strain.

Some people resist getting the flu shot because of the belief that they will get severe side effects, or even the flu itself, from the vaccine. The viruses in the vaccine are inactivated, so you cannot get the flu from a flu shot. Certain side effects are possible, such as soreness, redness, or swelling where the shot was given, fever (low grade), and aches.

Chances that the shot will cause serious harm, or death, is very small and allergic reactions to the vaccine, though possible, are rare, states the CDC. Most people who get the vaccine have no serious problems with it. However, the following groups should not get a flu shot before talking with their doctor:

  • People with an allergy to hens’ eggs.
  • People who have had a severe reaction to a flu shot in the past.
  • People who have developed Guillian-Barre Syndrome in the 6 weeks following a flu shot.

Since obtaining vaccination doesn’t necessarily guarantee immunity against the flu, it is wise to add common sense to our prevention efforts while we are busy pumping iron at the health club. Old fashioned hand-hygiene can go a long way in helping to prevent flu transmission. Although you don’t want to spend your entire workout running to the restroom to wash your hands after every set, it’s certainly advisable to make sure your hands are clean before and after the workout. Refrain from touching your nose and mouth during the workout to avoid obtaining the virus. Use of hand-antiseptics which include alcohol can also help to prevent transmission of the flu virus.

What to do if you get the flu

So what if you obtain a flu shot, practice stellar hand-hygiene and manage to contract the flu anyway? Since it is impossible to tell if you have the flu based on symptoms alone, visit your doctor. Tests can be performed in the first few days of the illness to determine the diagnosis. Since influenza is caused by a virus, antibiotics won’t work to cure it. You need to rest, drink plenty of fluids, avoid using alcohol and tobacco, and possibly take medication to relieve symptoms.

The CDC warns never to give aspirin to children or teenagers who have flu-like symptoms, particularly fever, without speaking to your doctor. Doing so can cause a rare but serious illness called Reye syndrome.

By all accounts, we may be in store for a particularly harsh flu season this year. Take precaution to reduce the likelihood of getting the flu, particularly if you are an avid gym-goer. Preventative measures may not only help to avoid the flu, but also interrupting hard earned progress on your fitness goals.

For more information about the flu, it’s transmission, prevention and treatment, check out the CDC website at http://www.cdc.gov/ncidod/diseases/flu/

HPV Information

One great thing about the information age is the amount of free information that exists out there. There are a lot of great things to be had out there and if you are a smart person, you can simply find it with ease. For instance, if you are looking online there is a myriad of information regarding diseases that you used to not know about. Of course I’m talking about sexually transmitted diseases, which are interesting to note and are increasing in irregularity. These modern times do not fair well for transmittable disease, because the more we travel and the more we throw caution out the window, the more we raise our chances of getting infected. If you are looking for good HPV Information, you are in luck. There is a long line of websites out there that have information about this.

Rewind time a little bit and you can really figure out that things used to be worse than they are now. You used to have to wait a long time to get any information about your disease. Not only that, before the computer age, you didn’t have early detection for a lot of things, and the death toll for cancer rose to astronomical levels. Not just in America, we’re talking worldwide, and if you wanted to learn more about diseases, including sexually transmitted diseases, you had to venture to school and take a lot of different classes. Now we are lucky and we can find information like HPV Information, with the greatest of ease. There is a lot of ease in gathering information, but it’s not as simple as you’d like to think.

There are a lot of different things that you need to know in life, and one of the must know things has to be HPV Information. Education is key to understanding what is out there and what can harm you. You wouldn’t risk your life by jumping out of a building or a plane, without at least having a parachute, and that is what education gives you in regards to sexually transmitted diseases. Education can lead to protection and if you are going to survive the onslaught of bacteria that is going to hit you while you are partying it up, you are going to need a good head on your shoulders and a smart wit.

HPV Information is readily available if you search for it online. In recent years, there has been a lot of attention in regards to this and many other diseases that you might see out there. You need to protect yourself and your partner. You need to be smart, and you need to protect yourself in any cases. If you have not been careful, then see a doctor fast, and enjoy the greater fruits of love that is available. HPV Information is not hard to find, it is easily found online and in many different areas. Even if you don’t see symptoms, you should at least know what is going on around you, which is the smart thing to do.

What is Bluetooth?

Bluetooth technology specifies a two-way, short-range radio link that enables communication between PCs, mobile phones, PDAs, and other computing, electronic, and home theatre equipment. With Bluetooth, you can easily synchronize contact or calendar data between a PDA and laptop, talk on a hands-free phone, or print without cables. It is a cable replacement technology like infrared, but offers many advantages over infrared.

The Bluetooth specification focuses on keeping costs low, power consumption minimal, and the size small. Its low power consumption means it can be used in battery-powered devices. Bluetooth offers faster data rates and greater   transmission  distances compared with infrared and there are no line-of-site restrictions. It operates at the 2.4 GHz radio frequency, ensuring worldwide operability.

History

Bluetooth is named after a 10th century Danish king, Harald Blatand (Harld Bluetooth) who was known for uniting warring groups in current-day Norway, Sweden, and Denmark. It was originally developed by Ericsson, but is now managed by the Bluetooth Special Interest Group (SIG).

The Bluetooth SIG is an industry group with members from the telecommunications, computing, and chip manufacturing industries. To date over 2000 companies are members. The Bluetooth SIG oversees a qualification program to ensure compliance with the standard and interoperability with other Bluetooth devices. Any device bearing the Bluetooth logo has successfully completed interoperability testing.

Technical Details

Speed: The gross data rate supported by Bluetooth is 1 Mbps. Actual data rates are 432 kbps for full-duplex and 721 kbps for asymmetric  transmission .

Frequency: Bluetooth uses the unlicensed ISM (Industrial, Scientific, and Medical) band at 2.4 GHz. In most countries, this band is available. In a few countries it is reserved for military use, but even these countries are moving to make the band available for general use. Because Bluetooth shares the same frequency range as 802.11b WLAN products, these two technologies cannot operate in the same space under some conditions.

Security: Bluetooth is designed to be as secure as wire using authentication and 128-bit encryption. Applications can also build their own security on top of the Bluetooth connection.

 Transmission  distance: Bluetooth’s typical range is up to 10m. The range depends on the radio power class used. A class 2 radio has a typical range of 10m. More powerful classes support longer ranges and have higher output powers. Most devices use a class 2 radio and mobile devices, like mobile phones, where low power consumption is crucial, can only use a class 2 radio.

Architecture: With Bluetooth, up to 8 devices can be connected simultaneously. A piconet is the term for a collection of Bluetooth devices connected in an ad hoc fashion. All devices are peer units, but one device acts as a master and the other slaves for the duration of the piconet connection. Each piconet can support up to 3 full-duplex voice devices. Within a 10m area, there can be up to 10 piconets.

Applications

Bluetooth is becoming the preferred wireless technology in the WPAN (Wireless Personal Area Network). Personal applications include:

– Users can connect PCs to transfer files.

– Workers can collaborate on the same document using Microsoft NetMeeting.

– Users can connect to a printer without cables.

– Users can synchronize data between a handheld PDA and laptop.

– Users can listen to music via a wireless headset.

– Users can talk on their mobile phone with a wireless headset.

– Users can connect their laptops to the internet using their mobile phone’s GPRS or UMTS network.

Fax Machines Reviews

In the field of telecommunications, the word fax (facsimile) refers to the act of transmitting copies over a telephone network. This system enjoys a distinct advantage because the transfer is immediate. This machine consists of a modem and an image scanner. Sometimes, the equipment is equipped with printers and photo-copiers. Although these machines have existed since the last century, they began to gain popularity in the last two decades due to their economic affordability.

Digital fax machines gained popularity in Japan. In recent years, the internet has made inroads into the field of telecommunications but the machines have continued to remain a popular choice, even in the corporate world,for the transfer of documents. Fax servers have replaced the old fax machines. These can receive faxes and transmit the information over the internet to the user. There are two kinds of fax machines.

The analog machines used earlier, are no longer in vogue. Digital machines have replaced them. The digital machines have two groups, Group three and group four. The machines are classified on the basis of the time they take to transmit a document. There are also different classes of this machines and different transmission rates. These machines use a variety of modulation methods to transmit data. It use two different methods of compression to reduce the amount of data that needs to be transmitted between two machines. These methods are Modified Huffmann and Modified Read. In the Modified Huffmann method each word is scanned and compressed independently. The amount of white space is also reduced considerably. This helps in minimising the time taken for transmission. The Modified Read Method uses a slightly different method of compression.

The first line is scanned using the MH method. The second line is scanned and the differences are determined. These differences are transmitted after a process of encoding. This method pre-supposes that these differences are minimal. The Matsushita White Line Skip is another method of compression but it can be used only on Panasonic machines.

Most of the machines that are used currently belong to the Group Three. Documents are scanned in black and white. Thermal printers that were hitherto used have given way to a generation of this machines. Thermal transfer printers,laser printers and ink-jet printers are some of these machines. Thermal fax papers, however, do not possess legal validity as the ink used in these papers is not indelible.

Fax machines come now in compact sizes and are very portable. They are also all-in-one machines that lend themselves to official and personal use, that can print, scan and fax. These machines have become versatile and they are invaluable in any corporate setting or a business house.

Understanding the Different Classes of Firewalls

For the enforcement and the tight control of security and the flow of traffic within and given network or between networks, the firewall is one very important piece of software and also hardware that is entrusted with these functions. An understanding of how the firewall is able to achieve its functions through the capabilities a firewall is able to provide. These are the capabilities which determine the type of firewall to be sourced to meet a certain and specific set of security needs.

Most of the firewalls will work through the packet filtering method which is one of the most effective methods of implementing security for the network through validation of data packets. The validation of the data packets is usually based on a number of factors which are the destination and the source internet protocol (IP) addresses, protocol, type of service, the source and the destination ports and port numbers, the differentiate services code point, the time range and a host of other parameters associated with the internet protocol header. These criteria are usually tested and matched for all individual packets so as to guarantee or deny these packets. This packet filtering comes about or rather is implemented through the use access control lists (ACL) which are found on switches and routers. The ACl has the advantage of being very fast when coupled with the application specific integrated circuit. Having seen these features of the packet filtering firewalls, the most obvious strong point for this type of firewall is that it is most common and can be found in about every component of the network. The packet filtering firewall is found in switches and routers as mentioned earlier, the wireless access points, the virtual private network aggregators are other devices on the network which use this type of firewall. The downside with the packet filtering firewall is that it is static and has been exploited by hackers who channel suspicious traffic through the TCP 80 port which grants unobstructed access.

The proxy firewalls also called the application firewalls work on a more complex model which can be explained by the Open System interconnection (OSI). This model seeks to explain the   transmission  of information from one computer to another application on a second computer. The information is passed through layers to make sure security is not compromised. The information according to the OSI model is passed through seven different layers starting with the application layer (7th layer) which is usually the interface in the form of programs used on the computer. The next layer is the presentation layer which is the translator between systems and converts the application layer information to a format acceptable to various different systems. Encryption is done in this layer.

The session layer is the fifth and manages service requests between computers. The transport layer provides reliable ordering and communication of data by preparing the data for delivery to the network  transmission  control protocol. The third layer is the network layer at which data is referred to as packet and this layer is responsible for routing and IP addressing. The data link layer handles the reliability of data which at this point is referred to as a frame. Finally, the first layer is the physical layer which is now composed of the devices which we can see as well as their electrical characteristics. The application firewalls work at layer seven which is the application layer just as the name suggests and they give a buffer often acting on behalf of a client. It is also patches easily in case vulnerabilities are identified. The only disadvantage is that they are slow in the manner that they handle data and traffic.

The next type of firewall is the reverse proxy firewall which will work in a similar manner to the application firewall. The difference lies in that the reverse proxy firewalls are deployed for the servers and not clients as in the case of application servers. The effectiveness of this firewall lies in the reverse proxy understanding how the application behaves and the intelligence to do away with problems like the buffer overflow.

A last form of firewall is the packet inspection firewall which takes care of session information and is even able to perform deep packet inspection to enforce compliance and scan for viruses all the time making sure that operation speed is superb.

These are the basic types of firewalls and which are chosen dependent on security needs and on to which many features have been added by different security vendors to make them better adapted for use.

Start With a School Radio Station

My 15-year-old nephew asked me, “How and where to practice and develop one of the working skills during school time?” My first thought, at that moment, was “College radio station”.

At 16, I joined my college radio station and began my job as an editor for an online music program. From that day, I have become acquainted with terms such as noise, sound, broadcast, frequency and so on. Luckier than many people, with that job, I could earn money for my living, besides gaining very much experience and building up many good relationships which can support my current and future career. And with such experience, now, I can give advice to my nephew or any youth who wants to start a career and develop their skill, knowledge in working.

Well, let me think about what we need for a college radio station. If just listing out, we might think that it’s too simple and easy: a studio, or source of program, and the   transmission  lines. If you are beginners, don’t think you can do much and all but step by step. It was really difficult at that time when we began with various odd pieces of equipment. We started using the easiest means of  transmission  by broadcasting in the school canteen, in classes. And later, we added more ways to reach the audience. We concentrated on serving our school and at the same time extended to other colleges in the same area. Actually, the running of our school radio station was based on fund-raising and sponsorship money. Besides some necessary equipment such as Mini-discs, computers, recorders, we faced a bigger problem for a long time looking for an old, affordable multi-track mixer. We didn’t have the advanced and efficient equipment to support our work.

The first broadcasting show of ours was a two-hour program divided into 3 smaller sections. The first one was “Hello Morning” with 3 tiny bulletins of 3 to 5 minutes each. In these bulletins, we presented all good and happy news. The second section was “Music Dedication Program”. We compiled a few collections of music and one by one was presented everyday. The third one was “School loud speaker” during which we announced important events of the school for the following week. Day by day, the program was extended and the coverage of the program was enlarged.

We received more orders from many schools for radio storytellers, puppeteers, live music programs, music festivals, and etc. The students who worked in the radio station were really in situation in which we could practice and develop the skills of drawing up plans, solving problems, devising strategies and many more. Two years later, our radio station was presented with a big gift from a local station: a voice changer software and a music editor software. These advanced softwares helped us handle our job properly. Instead of needing many students to join in dubbing for a story or a drama, now, we just need two “technical operators” and two students to make the dubbing. The old weak multi-track mixer was “retired” and the music editor.

We learnt how to apply these efficient tools in work. Of course, we found them very useful and interesting. We could easily record, remix music, add sound and effects, change one voice into many others. These jobs used to require many people and much time . However, applying our computers and these softwares, we could do the job well with just 4 or 5 people.

We spent much time, thought and labor in this extra-curriculum job, but we loved it. We made school lessons more interesting and exciting. We created a different way for children to gain experience and helped them make a presentation in a new way. We made a radio program which was considered the “voice” of students, pupils in the school. We sent meaningful music messages to friends, teachers, and so on.

I join my current company, a provider of voice changer and music editor softwares, because of many reasons. One of these reasons is that I want to support many college radio stations. My friends who used to work with me in our school radio station are all having good jobs in professional.

We are very happy to give advice and guidelines to youth in starting a school radio station or a home music studio.

One of the first advices from me is that “Don’t wait until tomorrow what you can do today”. Seize any chance you have, start with your dream, step by step, and you can see a clearer road for your future.