Wednesday, December 31, 2008

Lohri Invitation Messages

2009: The year by IBM celebrates a lot of anniversaries, and to 100 years in Germany must prepare

2009 is the year in which the IBM Users Association GSE in Germany is 50 years old. 2009 is the year in which IBM contributes in the U.S. for 85 years with IBM. 2009 is the year in which its German subsidiary, the former German Hollerith Maschinen Gesellschaft, rechristened the International Bureau in Germany machines, from IBM Germany.
in all of this is already a curiosity: the IBM Germany is actually older than their American mother. While IBM Corp.. their birth with the arrival of Thomas J. Watson Senior 1 May 1914 indicating celebrates the IBM Germany in 1910 as its founding year. Back then in Berlin, the German Hollerith Maschinen Gesellschaft (Dehomag) out of the baptism. Reason enough, in 2009 already be celebrating in detail the history of IBM - especially as the selling agency in October 2009, 25 years ago that the book "Into the blue - IBM and its competitors" was released. The author Raymond Vollmer. He accompanied the history of IBM since 1975 and has built up to an extensive archive. "Blue Wonder" will be published here as a diary.
addition, the IBM Users Association GUIDE SHARE EUROPE (GSE) in 2009 for half a century old. This is also an important occasion, the history of IBM and its customers in Review.

Startedgetting Pimples On The Inside Of My Nose

3:13 Strategy comparison


These figures evaluate a different strategy to both companies in the market penetrated Remington sought success in the full range of office equipment. A homogeneous distribution organization was thus not possible. This led to considerable friction.
The structured sales organization Watson was the competitor that diversification in product range leads to frustration in the profit sector. The concentration led to the explosion that changed the market landscape for decades in favor of IBM.
In this situation, in which frittered away the only competitor, IBM was able to cultivate a Stratgie that tied her to her customers completely. Punch-card machines were then rented exclusively. This was the constant Connection ensures the customer. This ratio was even deepened by the user to the group forced to use only IBM punch cards. This justification has been advanced that sounded plausible but it was not. The VBs argued, as now, when it comes to mixed hardware goes, "Our extensive demands on the punch card will be determined by the machine, it is feared that enough punch cards that are beyond our quality control, not the performance characteristics of our products this could be.. malfunctions cause for which we can of course take no responsibility. "
1936 forbade the Supreme Court of the United States, this Koppelei and ordered the first unbundling. Consequences: zero. For fleichzeitig IBM was raised to the punch-card MOT: you certain only the quality of the cards could be run with those on their products.
The dominance in the punch-card business remained unaffected. She was then also the prerequisite for success with computers, and the competitors looked back into the tube.

Monday, December 29, 2008

What's The Value Of My Old Soda Bottles

harvest 3:12 46


Powers suffered the fate of many late-IBM competitors. Although this company was in 1921 but again a great technical Gag with the announcement of an alphanumeric accounting machines, the first IBM Ten years later disposal. This showed for the first time that IBM alone sets the time at which the market for a technological innovation is ready. For Powers, it did not get to the production advantage in the market under control. The cost situation in human resources with potential buyers simply have not required the use of modern Raionalisierungsgeräte.
Ten years later the time was ripe, and IBM earned. The proportion of sales of computer equipment jumped to 51 percent.
This trend to product concentration is not understood by the competitors. Powers merged in 1927 with Jim edge to an office machine company, the Remington Rand Corporation.
point of comparison 1930: This year, IBM went a turnover of 20.3 million dollars, Remington Rand scored $ 60 million.
point of comparison, 1946: Remington Rand increases by 65 percent to 107 million dollars. The IBM catapulted by 500 percent to $ 119,400,000.

Sunday, December 28, 2008

Disqualified Because Of Herpis

3.11 in tension

1914: New to the CTR - Thomas J. Watson Sr., in 1924 the company gave its name to IBM.
Watson was assigned when he joined the CTR a unique role: the different interests of the motley group company to consolidate. The tension has acted in the Watson, was loaded from Flint, the Group hobbyists, Hollerith, inventor of the idiosyncratic, and George W. Fairchild, providing the capital. Watson broke away from this conflict of interest by total concentration on the sale of punch-card systems, the services provided in 1924 some 25 percent of sales.
When Watson started in 1914 sales, there was already a competitor that better equipment sold cheaper. The Powers Company offered products that had unique advantages: automatic result print works and electric punch. During this fact-minded Hollerith ignored, Watson established the first crash program under the title "Department of demands of the future". Behind it hid nothing else than the competing product disassemble, analyze, and improve.

Saturday, December 27, 2008

Who Is Prepaid Legal Pros And Cons

3:10 Small punch-card Teaching


Photo: Raimund Vollmer, 2004: IBM museum in Sindelfingen

Who says IBM, says the market. Who calls the market, says IBM. The absolute dominance of the multinationals has always been founded less on an innovative edge that IBM had only rare, but more to the delay of market-oriented inventions. According to the saying that the "non-profit in their own country is one of" a young German-born mining engineer was in the final quarter of last century in the land of limited Unmlglichkeiten and distinguished himself as a people counter new nation. For this evaluation, designed this man called Hollerith Zählblättchen he advanced to punch cards. In 1884, he filed several patents for punched card technology, which he applied in 1890 for the eleventh census. From then on, the new Volkszählwerk went through the whole world.
The typical configuration of a punch card system was maintained for decades and changed only in the processing speeds. Basic items of equipment were the keypunch (holes) for data collection, the sorting machine for processing just lining up the data and computing tabulating the evaluation and collection of information.
Watson immediately recognized commercial value in use of this procedure.
At the beginning of the twenties was the punch card technology almost exclusively in the public sector. The first commercial application was the New York Central Railroad, which leased for cargo statistics and accounting an asset. The triumph of data processing and IBM began. At the same time there was the first market-sharing. While employed the Hollerith disciples Powers with the development of new machines on electro-mechanical way, Watson sat on the appeal of electromagnetic products. Although Powers won the prestigious project, the 13 pregnant Census, but he could not beat the market determining capital from it as it Watsons Sales methods had nothing to oppose.
Until the sixties of the 20th Century, dominated the hole, although a great wave of innovation had already set the sign of the computer age, the mass distribution of punch cards and punch card machines conserved over a decade across the tube era, the 1946 with the development of ENIAC was Remington Rand begun. Watson's rigid adherence to the principle of punch cards was still no damage. For his very clever market-based management, the delay tactics dominated excellent. When IBM came after years of using computers on the market, it was the easiest exercise for professionals from the hole card business, a new Success punch.

Friday, December 26, 2008

Disqualified Because Of Herpes

03.09 08.03 provincialism


group smith: Charles R. Flint (1925)

After the coup, which had a widespread impact on the result of the German-Americans founded in 1896, the Tabulating Machine Company for the commercial exploitation of its patents. The mass distribution but hesitated. Hollerith lacked the money. This was because he had organized the distribution amateurish. By 1911 his company had not a single vendor. This was the first time the deficiency, still suffering from the many competitors of IBM: the implementation of investments into cash. Hollerith, who had no seller, sold (and his idea) to C. Flint, one of the most outstanding personalities of the time.
Flint Watson created and therefore IBM.
Watson led the company from the provincialism Hollerith shear stamping the center of data processing. However he needed for almost ten years he spent in largely anonymous. Only with the renaming of CTR in 1924 in IBM flashed his name at large.

Tuesday, December 23, 2008

How Much Weight Can I Lose From A Hydrocolonic

stories of DV

image: Herman Hollerith
This German (Hollerith was of German descent, d.Red.) Stood in the tradition of thinkers, which since 2600 BC with multinational the development of data processing employed. At that time, the mathematical geniuses invented Chinese Suan Pan. The Egyptian shoot invented 900 years later, the second generation of the prehistoric world market, more than 1300 years later Abax in Greece and the Romans turned up another 300 years later abacus perfected. Then: 1200 years of reflection. Only the Spaniards Lull ventured back to the 1275 draft thinking machine, which he needed for a large-scale proof of belief. Adam Riese (1520) and Wilhelm Schickard (1623) were the first Germans who intervened in the data processing business. Schickard is considered one of the fathers of computer engineering, whose six-digit addition and Subtraktionsmaschine The French philosopher Blaise Pascal extended by two points. The technological leap to a system that dominated all four basic arithmetic in theory, managed Gottfried Wilhelm von Leibniz. The Rev. Phillip M. Hahn, a Swabian inventor was, Leibniz into practice and built the first functioning 4-species calculator. This happened 1744th
This machine, which was refined by Joseph-Marie Jacquard for the first "punch card-driven process computers" and the idea of Charles Babbage was taken, was the basis for continuing to this day IBM's success, by Herman Hollerith introduced technological and Thomas J. Watson has been used commercially.
Hollerith, the inventor of data acquisition. He put everything on one card, which was dovetailed clear - through the hole. He had the New World under control. In the U.S. census in the 90 years of the 19th Century proved to be punch-card method for the first time in a mass test.

Monday, December 22, 2008

Hot Showers Seborrhea

3.7 Introduction to the punch card method

hero Herman Hollerith 1979: The Palatine and co-author Herman K. Reiboldt stayed on the 50th Anniversary of the death of his "compatriot" Herman Hollerith in the footsteps of the Palatine, who was born in 1860 in the U.S. but ...



Kaufman is a profession, the seller must be born. Watson was a salesman, He was appointed to the merchant. C. Flint, an entrepreneurial genius who knew the right time to close three of its different companies in a group together. The range of those companies will today as a model for crisis-proof diversification (as long as they are not involved in the IT sector) are valid. The spectrum ranged from slicers on computing scales, retail facilities and time clocks to. The really advanced the field was of a man brought into the profit community, who gave a method for decades a name, but had even the least financial benefit from it: Herman Hollerith.

Wednesday, April 30, 2008

Lookin For Trouble Brent Everett Limewire

Identity theft in federal

29.04.2008, Alexander Make up / Bruchlinien.de - article as PDF

Following a request of the Bundestag representative Carl-Ludwig Thiele (1) (FDP) were The Federal Ministry of the Interior for the loss of numerous computers and disks from federal authorities announced. Not only the "most federal agencies" have been sensitive and secret data stolen, but also some foreign diplomats used. About the actual extent of data loss, the Interior Ministry made no specifications. The Federal Data Protection Commissioner Peter Schaar (2) requires Therefore, further information and an improved detection of such low-tech events.

Carl-Ludwig Thiele, Vice Chairman of the FDP parliamentary group, is concerned about data security in federal agencies. His concern is the trigger data leakage incomprehensible in Britain and a slump in the Berlin apartment of Federal Justice Minister Brigitte Zypries, were stolen at the end of January 2008, two laptops.

Massive data loss British authorities

UK authorities for months with a data loss faced unimaginable scale. Had begun the series of glitches in May 2007. (3) The Driver and Vehicle Licensing Agency is a disk with data of three million learner drivers were stolen. The theft occurred at US-based Pearson Driving Assessment, edited the data on behalf of the British regulatory agency and managed. While the Transport Secretary Ruth Kelly reported to the House report (4), they also announced the loss of 7,500 vehicle owner data, which were sent by post from Northern Ireland to Wales.

That the Mail to send personal data seems highly inappropriate, had to HM Revenue and Customs on 18 .. Learn October 2007 (5) On that day, got the tax authority for an impact 25 million records of British child benefit recipients (6) To check the data stored on two CD's information was on the express service provider TNT-powered internal mail to the National Audit sent office and - never reached its recipient.

The subsequent safety review of all authorities uncovered a new data leakage. (7) The nine administrative centers of the National Health System (NHS) were missing sudden patient data. Among others, the records of 160,000 children who had requested a hospital, lost in the supply channel. (8)

are set, the massive data loss British authorities continued in the new year (9). The Defence Minister Des Browne on 21 cleared January 2008, the Lower House about the theft of unencrypted data of 153,000 recruits and military service applicants and bank details of 3,700 persons. (10) Overnight, had robbed the unknown in a guarded military complex of the Royal Navy, a laptop are that a young officer was in the passenger seat of his locked car . Let Brown supplemented his report with the admission that the military had lost in 2005, two laptops in a similar manner, which were stored on the data of only 500 people.

The last became known data loss relates to the Home Office, which examines for information of the Guardian a low-tech event. (11) therefore had a computer shop received an order, one at eBay bought laptop back on the road. On 25 March saw a technician under the keyboard of the laptop with a CD marked "Home Office Confidential". were the words of a spokesman for the Ministry of Interior both laptop and CD have been encrypted.

Targeted slump Justice Minister Zypries

end of January broke unknown in the Steglitz apartment by Brigitte Zypries (SPD) a. The conditions were very favorable for this compromise: when the Federal Minister of Justice is away from home and not in the district was, could neither be guarding her apartment. Crime Scene Investigation, this practice seemed to have been known. With "surgical" precision, they could perpetrate their crimes, taking it only to the electronic Media the Minister had waived. The two missing laptop computers, which should have contained the material time, no sensitive data observed Zypries until days later. "A collapse in such an influential woman," one official explained to the Berliner Morgenpost, "will not commit on a whim. One can not exclude that it is a politically motivated crime is" (12).

low-tech threats

When it comes to data protection, many users tend to think about high-tech threats such as bots, Malware, Trojans, worms and others. But the theft of sensitive or classified information over the Internet, known as online identity theft is overrated. Far more common are low-tech threats. "Most personal data stolen in a very traditional way," said Ken Hunter (13), president of the Better Busines Bureau, has published with the U.S. market research firm Javelin Strategy & Research, a study on the subject. (14) When Offline Identity theft is about the theft of unattended or negligently transported notebooks, handheld organizers and smartphones, the disks sent to intercept unprotected Supply routes, the harvesting of carelessly discarded and not obliterated information from the household waste (Dumpster Diving); spying bona fide human (social hacking), or identity theft due to lost or stolen wallets.

data leaks in federal

"As it is with the security of data in Germany?" This question was the deputy leader of the FDP, Carl-Ludwig Thiele, and established on 6 March 2008 two questions to the federal government. (15) He wanted to Know if and how many computers are in federal agencies and have been lost in what authorities might happen this hardware losses. The answer came as a text message from the Federal Ministry of Interior. In the last three years about 500 laptops and computers "had been stolen, lost or untraceable" in the "most" federal authorities. Exact casualty figures to designate it, the request for short-term was not possible. The response has amazed Thiele yet "the number of PC's loss shows that in federal agencies deal with irresponsible media." (16) The undertaking by the federal interior ministry that the data on the missing disks "Protected absolutely sure" were, it sounds more like an obligatory appeasement formula. More information is called for urgently, "Thiele. To accelerate the discourse, he put on 28 March 2008, the Federal Government a small question with 28 questions before (17).

loss of secret government data

The two weeks later sent to the parliament secretariat response letter from the Federal Ministry of Interior (18) first informed about the number of employed in all German government computers. Accordingly, a total of 314 000 inpatient and 53 600 mobile computers in use. Since there is currently no central collection of computer and disk are lost, the information is based on the number of stolen or undetectable hardware to short-term research by the Federal Ministry of Interior. "Device and media losses [are] collected independently within the concerned authority or the affected division." Because of this collected information from the various authorities was as follows: "In the years 2005 - 2007 [are] in the German federal approximately 189 stationary personal computer, about 326 portable computers (notebooks), around 38 memory sticks, CDs... and DVDs and 271 mobile phones and Pocket PC word ("handheld organizer) stolen, lost or untraceable." On the information content of the lost lost data makes the Federal Ministry of Interior no details. The letter merely pointing out that "predominantly" open "data that is not sensitive or high conservation value were as eg presentations and statistics ", otherwise lost. One reason for complacency this alleged finding does not represent, because in the following sentences, the Interior Ministry some serious data breaches suggests.

Upon request, the Federal Ministry of Defence announced that there are currently five cases because of the loss of media information with the "Confidential and higher classification level" contained, to be determined. Personal data should be stored only on one of those allegedly missing disks.

expressed more concrete, the Federal Office for Civil Services for its own data breach. Accordingly, the Authority, a laptop is stolen, have found themselves on the encrypted address data from 1200 community service a service region.

Even the Federal Ministry of Justice and a laptop is stolen been. On this were "connection for dial-up data in the Local Area Network (LAN). According to the authority was a "dial-in to the LAN is no longer possible," as an immediate closing of the UMTS card is initiated.

Lossy missions

lost According to interior ministry abroad 46 notebooks. On the status of these devices (stand-by mode or power-off mode) at the time of her disappearance and on the stored on the hard disks data obtained from the paper any information. It is only explained, such as laptops be run with foreign travel. Since there is always the possibility of unobserved access attempts by third parties, internal operating procedures to carry laptops always write before as hand luggage. Whether encrypted disks can be taken abroad, is made dependent on the particular entry requirements. In cases in which risk the disclosure of passwords, a seizure and a copy of the disks by the customs authorities of the destination country (see entry procedures of the United States) (19), are business travelers, particularly military personnel, provided with diplomatic immunity.

No reason to panic

The main thrust of the paper in relation to data protection is interpreted, according to the Federal Ministry of Interior no reason to panic. Most stolen, lost or untraceable computer and storage media which contained not only for third parties uninteresting data, but also enabled hard disk encryption, which made the obtaining of information content impossible. The fact that such techniques are (see the research of the Center for Information Technology Policy at Princeton University) (20), that the keys to the ciphers can be spied out, is not addressed in the paper.

Thiele: "A tangible scandal

It is tangible scandal, criticized Thiele," if the government must not even for the security of their information can she wears with her boundless acquisitiveness data together "(21). The deputy chairman of the parliamentary party Die Linke, Vice President of the German Bundestag, Petra Pau, expressed concern about the data leak in federal and administrative capacity: "The material damage of 540,000 € is fatal, but manageable. . The resulting loss of data, however, is unpredictable and therefore irresponsible "(22) was irresponsible as the current handling of this issue," Thiele, and called for further clarification: "The 14 part very short and evasive answers to the 28 individual questions of the Little request suggest that the federal government had to inform yourself first about what happened and the extent of the losses to the request of the FDP parliamentary group did not in the picture was. "(23) The attitude of the federal government makes it clear that a central controller all the data breach was urgently required. The Commissioner Peter Schaar supported, according to his spokesman, Dietmar Müller, the claim of the FDP MPs: ". show the incidents as important, the reporting of any such loss is determined so that we can" (24)

----------------------------------------- -----------

(1) Website of the Vice-Chairman of the FDP parliamentary group, Carl-Ludwig Thiele . [Cited 28/04/2008]

(2) Website of the B undesbeauftragten for Data Protection and Freedom of Information , Peter Schaar . [Cited 28/04/2008]
-
(3) See Heise online , British authorities will once again millions of lost data, 18.12.2007. [Cited 28/04/2008]

(4) Statement by the Secretary of State for Transport on Data Security , 17.12.2007. [Cited 28/04/2008]

(5) See Heise online, millions of British data breach affects 21.11.2007. [Cited 28/04/2008]

(6) See BBC News, Q & A: Child benefit records lost, 22.11.2007. [Cited 28/04/2008]

(7) See Heise online, data from hundreds of thousands of patients have been lost in the UK, 23.12.2007. [Cited 28/04/2008]

(8) See Sunday Mirror, 9 trust without files, 23.12.2007. [Cited 28/04/2008]

(9) See Heise online, data breach at the British military and U.S. credit card companies, 19.01.2008. [Cited 28/04/2008]

(10) See statement by Des Browne, Defence Secretary, to House Of Commons, 21.01.2008. [Cited 28/04/2008]

(11) See The Guardian , laptop sold on eBay hid confidential Home Office disc, 28.02.2008. [Cited 28/04/2008]

(12) Berlin Morgenpost , burglary at Zypries, 02/02/2008. [Cited 28/04/2008]

(13) Stern.de , most data is stolen online, 02/05/2005. [Cited 28/04/2008]

(14) See Better Business Bureau , New Research Shows That Identity Theft Is More Prevalent Offline with Paper than Online, 26.01.2005. [Cited 28/04/2008]

(15) See Spiegel Online , about 500 computers disappeared, 20.03.2008. [Cited 28/04/2008]

(16) Ibid.

(17) German Bundestag, Small request , computer losses in federal, Printed Matter 16/8673, 28.03.2008. [Cited 28/04/2008]

(18) of the Federal Government response to the inquiry by members of the Carl-Ludwig Thiele and others and the FDP, BT Frucksache 16/8673, 14.04. 2008th [Cited 28/04/2008]

(19) See Spiegel Online, U.S. tax collectors browse laptops and cell phones, 07.02.2008. Online in Internet. [Cited 28/04/2008]; see Heise online , suspicion basic laptop, 08.04.2008. [Cited 28/04/2008]

(20) See J. Alex Halderman, Seth D. Schoen, Nadia Heninger Others Lest We Remember: Cold Boot Attacks on Encryption Keys , Princeton University 02.04.2008. [Cited 28/04/2008] See website of the Center for Information Technology Policy Princeton University . [Cited 28/04/2008]

(21) FDP parliamentary group , too secret Information from data theft affected authorities, 21.04.2008. [Cited 28/04/2008]

(22) Petra Pau , data loss is incalculable, Press Release, 20.04.2008. [Cited 28/04/2008]

(23) FDP parliamentary group, also secret information from the data theft affected authorities, 21.04.2008. [Cited 28/04/2008]

(24) Netzzeitung.de , secret government data is gone, 19.04.2008. [Cited 28/04/2008]

Saturday, February 16, 2008

Where Can I Buy Otf Knives In Indiana

think is *

After the OECD (Organisation for Security and Cooperation in Europe) had in the summer of 2000, the first time the results of the initiated by it presented the Programme for International Student Assessment (PISA) to the world, triggered the disastrous performance of Germany a today ongoing discourse on education from. Did the political leaders attempted to manage the "German humiliation of PISA [1] the veil of oblivion to wide, by they wanted to placate the concerned public with the establishment and development of kindergartens and day schools, triggered more into a differentiated assessment the single cause dominated discourse.

This change in perception is due no doubt in the durability of the discourse: in a regular cycle of three years, the public here recalls that do not affect by the culture ministers at the beck and budgetary interests adopted education reforms, the real problem of education disaster . Is meant by the OECD almost monotonous sounding statement that the educational opportunities in Germany are unevenly distributed, that school success depends more on the social background of adolescents and that the differentiated system "almost perfect" [2] the social selection operates.

education reforms as part of educational research request they ask, in essence a strategic reorientation of public education dar. For expediency reasons, but not the current educational policy is on it and is rather past the real problems. The recently expressed by Federal Minister Dr. Annette Schavan standard saying that absolutely everything is being done to "create conditions for equal opportunity in education" the [3] deceptive, in short, over the fact that in this respect, hardly anything happens.

The permanent stress, the school system focus intensified action to voice integration with the aim to break the reproduction of social inequality, covered the learning and education in the schools aware of realities. The formation of the whole man is standing there not in the foreground to this "to the intellectual and moral autonomy" to educate and thus "make the system compulsory for" strong [4] .

One of the most beneficial educational freedom is contrary to the common sense of the Leviathan, which the individual submits its utilitarian and recovery criteria while allowing the person access to his table, which sees itself subordinate to the universal. A school that the company production plant functioning and should be submissive people will not realize a pedagogy that devotes itself to the special and free thinking.

think is to travel

The coming of age of the individual targets the aversion all limiting and engaging and put it in a position to be even unique - unique in thought, unique in the action. Uniqueness can not consume, as the culture industry deludes the people there. The individual must be free to enjoy themselves, must conquer their own unique self. This activity, however, requires the recognition that the mind knows what it really does conquer. A certain degree of awareness and self-reflection is essential. However, this raises the question of how the alienated thought comes to his senses.

Maybe we need a local guide, pointing respectively. From locals who know to be based in thinking is taking excursions to the uninitiated, this leads into the thinking. A cartographer like he flies over the countryside, discovered this or that unknown, that arouses his interest and initiated him to stay at this or that unknown place to clear it. The low Let is never arrive, to a maximum of one being, short-lived. Similarly, the lifting of no division, but a going to maybe stop by again. Free as a bird travels the thinking spaces that have been created only with words and signs and measured.

construction of world literature as

How can children who spend their everyday lives mainly in digital worlds, motivated to read? The educationist Ben Bachmair advised to consider the media literacy of children and more instead of literary texts discontinuous texts, such as, for example, the advertising industry for specific target groups written to bring into the school reading. "This means, for example, to request the distribution of local advertising papers, placing them well at the school door." [5] no editing of these texts is important, but the "connection to the communication media consumption" [6] . Students should be given the opportunity to find their subjects in the school library. Solidified this connection but communication is not the alienation of children?

The impoverishment of the senses are the hallmarks of an increasingly technological, straight society. It creates within her the need to address the lack to compensate for unexpected impressions and information with new product innovations to do. With all the power it promotes the individualization, and ultimately the lonely, and uniform set of consumer loyalty. The modern (capitalist) media such as books that are "day by day in the sand written" [7] . They left no traces. But these tracks are the linchpin of thinking: they affect the mind to be in the midst of these tracks and remain so.

The thinking behind its mark, if it materializes. Materialization is the mapping of thought. It links Words into phrases, and names it misses the spiritual world. This creates a "text book" (Georges Perec), is a map, the orientation in a world of referral and relationship contexts. The map is not the terrain. The cartographer, it is not possible to list world en détail . For a card that would be a copy of the terrain would, therefore unnecessary.

deconstructions

Literature invites you to travel. The published book gives the reader the possibility to travel the world of the author and to discover. The traveler stays in this "Secondary world" because the laws of this world agree with what the author says. Breaks but the belief together because the differences have become too powerful katalpultiert it the traveler to the outdoor and the magic is gone. "If we are forced out of complacency or by other circumstances, this, turn the suspended disbelief (or disabled), otherwise this would further listening and watching unbearable." [ 8]

coercion to have to stop at places to contaminate the awareness and leave sooner rather than later behind would impose, German teachers often their students to the literature, such as inanimate objects treat . They are not holding on as navigators in a world unknown to the students, but to destroy its analysis and penetration methods, the openness of the map. The (inner) eye will never understand the importance of vision and therefore notice the mystery, that the terrain is home to far more detail than it first seems. affected

The Questionable, amazing, the mysterious and provoking thought, in the consciousness appearing to shed more light. This activity requires a pause - in contrast to the mindless, speedy passage through the text. The navigator keeps the students so on to reflect, explore the perceived, the experience of the meaning of the text to describe, to give an entirely different form. The design possibilities are endless. The fact that the reader is not passive consumers of texts, but rather its founder, shows uniqueness and diversity of standing in this regard intentional consciousness. Finally, the reflection supplied unthought, which manifests itself in the reflection has, even to the track within the text.

Alexander makeup





* Gilles Deleuze and Felix Guattari, A Thousand Plateaus, Capitalism and Schizophrenia, Berlin 1997, p. 668th

[1] Thomas Rausch, a plea for a new understanding of education, in: From Politics and History, 12/2005, p. 3

[2] Wolfgang Boettcher, social selection and education reform, in: From Politics and History, 12/2005, p. 7

[3] Press release (KMK) of 4 December 2007.

[4] Hartmut von Hentig think the new school, 264 Munich 1983, p.

[5] Ben Bachmair, migrant children, risk their reading and their media environment, in: From Politics and History, 28/2007, p. 33

[6] Ibid, p. 38

[7] Luciano De Crescenzo, says Heraclitus "Everything flows, 1 Edition, Munich 1997, p. 176

[8] JRR Tolkien, the good dragons are rare, 90 Stuttgart 1984, p.