In order to prevent the infection of corona and prevent it to a certain level, all the countrymen are following the lock-down nowadays. Due to this type of lock-down, we are imprisoned in homes. All external activities have stopped in a way. This contrasting situation has affected our psychological aspect the most. If you talk to your neighbours, friends and distant relatives, you will find that they are all going through the same mental state – fear of boredom and survival.
When I say boredom, it simply means that we have nothing new to do. This is because we are not at home of our own free will, we have to stay for a long time without any plan and only when we have nothing new, we call our mood boredom in psychological language.
Let us understand the psychological reasons behind this. Most of us are accustomed to live life in a certain pattern. For example our daily behaviour, our jobs, our social responsibilities, shopping time and walking etc. In this way, our daily behaviour becomes the product of our fixed life pattern and whenever this pattern changes against our will, it has a direct effect on our behaviour and this is exactly the situation that we are facing right now.The second important thing is the possibility of a crisis in our existence at present. Today this apprehension has made a large population stressed. In this context, I would like to say that it seems that this virus has reached very close to our brain and the most contribution to this is the exaggerated news and analysis that we are seeing or hearing all the days and our mood accordingly is being made. We are forgetting why we are taking stress even when we are taking all precautions and are healthy. This is because we are creating this tension ourselves.
In this context, I recall a story by the Russian writer ‘Anton Chekhov’ – ‘The Bet’. The story is based on the condition of a lawyer and a banker. As the story opens, a banker misses the opportunity for a bet he made fifteen years ago. At the party they were hosting that day, all the guests got involved in the discussion of capital punishment. The banker saw it as more humane than life imprisonment, while a young lawyer disagreed, stating that he would choose life in prison rather than death. They agreed to a condition. If the lawyer can spend fifteen years in total isolation, the banker will pay him two million rubles. The lawyer has no direct contact with any other person, but he could communicate with the outside world and note down whatever he wishes.
Confined in a guest room on the banker’s property, the lawyer first experiences loneliness and depression but eventually begins to read and study in a wide range of subjects. As he takes advantage of the solitude to be educated and amuses himself in various ways over the years, the banker’s fortunes begin to wane. He realizes that if he loses, paying by stakes will go bankrupt. In the early hours of the day when the fifteen-year period is about to expire, the banker resolves to kill the lawyer, and one night goes to kill him but a note written by the lawyer on the table shows that he has chosen to relinquish the condition, knowing that material things are transitory and have the value of divine salvation more than money. The watchman then reports that the lawyer has gone out from the window and escaped with the property at stake. To prevent the spread of rumours, the banker locked the note in his vault.
Just today, this story can become an inspiration for us. First of all, for this time period, you need to move away from your fixed life pattern and make new work plans, such as spending personal time with parents and children. This will be a great experience for you. You can engage yourselves creatively by creating new projects for children. Every new task will fill you with a new kind of energy and yes, above all, it is time to make a harmony with nature, because at this time due to lack of human activities, nature is in its purest form, so the open air in the morning of your courtyard Go, see the beauty of the flowers of the garden. There was no time before in your fixed life pattern for this. Then your existence will never put you in crisis, but you will feel connected with your presence.
While the Novel coronavirus has caused a lot to the economy , the revival and growth of the Indian economy is the need of the hour. The government is trying it’s ways to revive the economy and get it back to the position it was in or even better than that. The Urban sector has been affected drastically and would take much longer to get back to normal. The Rural India on the other hand has been progressing positively in the recent times and also benefiting by the pandemic. This therefore, contributes to the Indian economy and will help it to move ahead.
While liquidity is today one of the biggest obstacles for the revival of business, we may find that even if credit is available, the problems of labour, high cost, social distancing and unstable demand discourages the business firms to restart their work . But, In Rural India the spread of the virus is least and also the lockdown risk is minimal ,so it is naturally easier to have physical distancing and outdoor work. The Rural India is in its raw form and can be manufactured to become the best possible product. The Urban India is already an existing product that needs improvement and upgradation.
In the lockdown period the demand for dairy products and vegetables was still the same. Even if the restaraunts did not make a demand for vegetables then too the supply of vegetables for the ordinary people continued and it was the most bought thing in the lockdown . Agriculture continued even in the lockdown period. So, while most of the other industries—automotive, textiles, real estate—have shut down, the farm industry has not, despite low support from a policy context. A farmer never will have to face a shortage of demand since the importance of food and food products will never end. Even if people don’t buy clothes they will buy vegetables. The negligence would cost much but if some important steps are taken Rural Economy would prove to be the best ever decision one could take .
MAHATMA GANDHI NATIONAL RURAL EMPLOYMENT GUARANTEE ACT (NREGA) – This scheme should be expanded and liberalised. The farmers must get a security in their jobs and not be completely wage labourers.
Finance farmers directly – It is absolutely critical that the government delivers finance directly to the farmers through the primary agricultural co-operative societies, commercial banks, a special line of credit, and Kisan credit cards. This would accelerate the credit and increase investments through savings from income.
Exports- The Indian Economy has been confined to exports in only secondary and tertiary sector. But, primary sector has been laid back. Although India has gained alot in it’s food supply chain and it must encourage the export of food products thus leading an encouragement in the agricultural sector.
The policy implementation has to be in its best position – Only talking about the policies will be of no help, what is important is it’s implementation that holistically improves the Rural sector . It is important to create credit and gain from it for the benefit of the economy as a whole.
While agriculture is certainly the primary engine of the rural economy, we also need to look at non-farm sectors like handlooms, handicrafts, and rural SMEs to unlock the full potential of employment and income generation.
Therefore, there is a great need for Research and Development. For something to reach heights it is important to strengthen its roots. And India was always an agrarian economy and if you strengthen its roots its branches will be spread widely.
Nelson Mandela is no stranger to Indians. India was in the forefront of support to the freedom struggle led by Mandela and the African National Congress (ANC). This struggle and the history of South Africa since the Dutch landed in 1652 has been vividly brought out by renowned author and biographer Dominique Lapierre in his book A Rainbow in the Night. The book is not just a historical account but it is an epic that captures the essence and romance of the birth of a nation and its people comprising whites, blacks and coloured races.
Dominique Lapierre is known to Indians as the author and co-author of two books on India: The City of Joy and & Freedom at Midnight, respectively. Both are highly acclaimed books and need no introduction. Lapierre’s books on India and his philanthropic work with Mother Teresa in the slums of Calcutta earned him the civilian honour Padma Bhushan in 2008.
‘A Rainbow in the Night’ is Lapierre’s second book about a nation’s freedom struggle (after Freedom at Midnight about India’s freedom movement). He traces South Africa’s history, the first landings by the Dutch and their establishing a white supremacist regime, the liberation struggle and freedom for blacks from their tormentors. While Mandela plays a dominant role in the book, it is not entirely about him. South Africa’s colonial history and hoary past are covered in fairly good measure, which rightly provides the context and perspective to understand the history and modern times of the nation. The premise, of course, is that to appreciate the present a correct understanding of the past is a must.
The book is structured into four parts or themes: In search of a promised land; The Prime Minister’s bulldozers; Helen and Chris: two lights in the darkness; and “God bless Africa”. The book will resonate well with Indians. The reasons are not far to seek. India’s interest in South Africa dates back to the time of the indentured labour that migrated to its shores. The surge in the freedom movement and its influence on Mahatma Gandhi, then a young and impressionable Mohandas Karamchand Gandhi, was an added impetus to the growing Indian interest in that nation.
The book does not delve in great detail to Gandhi’s travails in racist South Africa. Considering that it also has Indian readers in mind (the book’s publisher, Full Circle, is Indian), the book ought to have dealt with the effects of racism and South Africa’s initial pacifist struggle on young Gandhi’s mind, especially as it had made such an impression on him in later years as he led India’s freedom movement. The book does, however, cover race classification, the process of Indian, Malay and other races – including blacks – being grouped according to the colour of their skin.
The book is a fairly accurate – if not an academic or detailed – account of nearly 350 years of South Africa’s history. For students of politics and international relations, it provides a correct perspective on the tumultuous history, the birth of a new nation, segregation and apartheid. The book is eminently readable, racy and fast-paced.
In democratic countries, the media is known as the “fourth pillar” to monitor the activities of the legislature, executive, and judiciary. Since the 18th century, the media has played an important role in enabling and sensitizing the public, especially since the time of the American independence movement and the French Revolution. If the media plays a positive role then any person, institution, group, and country can be made economically, socially, culturally, and politically prosperous.
In the present time, the usefulness, importance, and role of media are continuously increasing. No society, government, class, institution, group person can move forward by ignoring the media. Media has become an unavoidable necessity in today’s life. If we look at what the society calls, then the fact comes out that we cannot call a crowd of people or unaffiliated people. Society means the fabrication of relationships, in which communities with intelligent and thoughtful humans exist.
Media is a comprehensive system that includes information like printing press, journalists, electronic mediums, radio, cinema, internet, etc. If we talk about the role of media in society, it means that what the media is, directly and indirectly, contributing to the society and what positive and negative impact it is having on society during the discharge of its responsibilities.
After considering the effect, it is clear that the increase in power, importance, and usability of the media in society has increased its positive effects considerably but at the same time, its negative effects have also emerged.
While the media has contributed to making the public fearlessly aware, exposing corruption, logical control overpowers and the promotion of public interest works, greed, fear, malice, competition, maliciousness, and tainted their role by being trapped in the trap of political intrigue Has also done. Adopting Yellow Journalism for personal or institutional vested interests, exploiting others by blackmail, sabotaging gossip news and twisting news, publishing news that provokes riots, making events and statements redundant, fear Or greedily flattering the ruling party, unnecessarily praising and glorifying someone and criticizing another is being done by the media nowadays. Exaggerating accident and sensitive issues, ignoring news related to ‘honesty, morality, dedication, and courage’ has become a common feature of media nowadays. This behavior of media creates a state of chaos and imbalance in society.
Print Media and TV And through cinema, western culture is coming and spreading, due to which there has been an increase in incidents like unnecessary fashion, obscenity, theft, hooliganism in society. Due to this collapse, the younger generation is also getting entangled in the pit of collapse.
Antisocial activities are reaching the youth through the Internet, due to which there is a continuous lack of morality, culture, and civilization. In view of all this, it has become necessary to discuss the role of media today.
The role of the media should be as a true information delivery agency. The society gets information about the events happening all over the world through the media. Therefore, there should be an effort of the media that this information should be realistic. There should not be any attempt to present information by distorting or corrupting it. For the benefit and information of the society, the information should be presented to the public in a just and pure form. The presentation of media should be such that it can guide society. Presentation of news and events in such a way that the public can be guided. Good articles, editorials, knowledgeable information, best entertainment, etc. should be included in the news, only then the right direction can be provided to the society.
Media provides leadership to society in many ways. This affects the ideology of society. Media should also be present in the role of motivator so that society and governments can get inspiration and guidance. Media is also the protector of the interests of different sections of society. He also plays the role of society’s policy, traditions, beliefs, and as a guardian of civilization and culture. Information about various events happening all over the world is available to different sections of society through media. Therefore, he should present the information objectively in the right perspective.
The media also plays a big role in the imbalance and balance of society through its news. Media can develop a sense of peace, harmony, harmony, and courtesy in society through its role. Media should act in a very restrained manner in times of social tension, conflict, differences, war, and riots. Media also plays an important role in instilling a sense of devotion and unity towards the nation. The media should actively participate in the broadcast of inspiring and encouraging news in honor of the martyrs. Media can also play the role of mobilizer through various social functions. At the time of the earthquake, flood or other natural or man-made disasters, public assistance can provide a great service to humanity. The media should also come forward to promote goodwill.
A Systems Analyst analyses, designs and implements the information gathered previously to a system, the final product which is a report of yearly sales, profits, etc. The first thing a Systems Analyst does is to interview the company which wants the report, (called the user) to find out what kind of report they want, format, etc. They must find whether the report is feasible or not, and to find out, they do an analysis of the project. To analyze the project, they must find out where are they going to get the information, how, when is the project going to be done, etc. They then design the system, which is to make a ‘skeleton’ of the project.
They write specifications, of what is to be in the final report. They do flowcharting, specifications for the programmers of the report, and development control. Development control is where the Systems Analyst works with the programmers along a critical path. A critical path is like a due date, if the report is to be done in thirty days, the Systems Analyst makes sure the report is done in thirty days. The Systems Analyst also follows the first analysis of when the project will be finished. The critical path also calculates how many man hours it will take to finish, etc. A critical path flowchart also helps the programmers along. After the development is finished and a prototype of the report is finished, the Systems Analyst helps the programmers in testing the program for bugs. This is similar to quality control. The Systems Analyst helps to makes sure the work is done until the final report is achieved. Once the final report is finished and free of bugs, it is sent to the user. The Systems Analyst has a big job to do, he/she is responsible for the design, the development, and implementation of the report, ie: what purpose will it serve, presentation, etc.
After the initiation and analysis phase, the system analyst will built a prototype requirement according to the design specifications. If everything goes well, the project will move to the development phase.A system analyst is required to have an intimate knowledge of the SDLC process. Since it will be the standard practice in project management field, this requirement comes with ability to perform the following functions, but not limited to writing reports, procedures and manuals. Most of the employers are looking for someone who has four years of college education and along with a couple years of working experience. This will ensure that the money being invested is not wasted for an unsatisfactory result. After the development phase, the implementation phase is very simple. It is like putting together a desktop computer you bought at a local Fry’s Electronics. The system analyst has to check for an operating system, appropriate drivers and internet connectivity. The goal of implementation phase is to make sure the subsystems are working properly. In the maintenance phase, the system analyst job is to provide user supports. This is often call help desk in the information system community.
Before needs to analyze and design a system, it is vital for a systems analyst to possess sufficient understanding of the various domains of knowledge is dependent mostly on the obligations and level of development of the system. Predicated on Vitalari (1985), there are six key concepts of the data bottom have emerge, specifically, core system evaluation domain name knowledge, high-rated domain name knowledge, application website knowledge, functional domains knowledge, organization specific knowledge and understanding of methods and techniques.
Vitari (1985) said that primary system analysis domains knowledge is vital components of system analyst’s knowledge to accomplish satisfactory degrees of performance. It is very important to meet the needs of an individual to guarantee the output of the system development will produce high satisfaction to the users. Important to realize that, systems analysts need to really know what commitments are expected from an individual and the user also knows what’s expected of the systems analyst. In addition, insurance firms this knowledge it help the system analyst to avoid committing blunders and delaying the project to be completed. Whereas high rated site knowledge is referred to the knowledge that distinguishes high graded experts from low ranked analysts. Application domain name knowledge is a knowledge related to many information system applications such as expert system, decision support system, deal control system and person computing.
Following is the main skills and competencies for a system analyst ——
Analytical skills
According to Misic and Graf (2002) in their article entitled “System analyst and skills in the millennium”, analytical skills were considered the main skills in the system development. Analytical skills can be explained as the capability to take a look at things critically and/or minutely, to separate the clear picture into its individual components (Misic and Graf, 2002). As indicated by Misic and Graf (2002), these skills provide the most important basis for a person to adapt to changes in technology and by focusing on the development of their current employees and / or recruiting new employees that strong analytical skills of focusing mainly on a technical track record, management information system will form a team development to be successful today and also when confronted with the next wave of unavoidable change and stress in their technical procedures. In addition they indicated that, this skill is applied in defining and analyzing requirements and insuring the fit within the organizations information system environment. In other hands, analytical skills were mixed up in examination process where it is the task to understand the whole of something by breaking it down into important components. By understanding its components and how they fit along in a larger whole, it leads to understand the complete better.
Interpersonal skills and communication skills
Interpersonal and communication skills are other skills that required by every system analyst. Such skills are essential at various periods of the development process for interacting with the users and try to identify their requirements to be able to find out possible answers to that one problem. Social skills are related to individual skills had a need to interact with people that associated with an IS job. In other words, interpersonal skills can also be known as a behavior and behaviour of individual, social communication and group behaviour in the IS framework (Lerouge, Newton and Blanton, 2005). According to Lerouge, Newton and Blanton, (2005) in their research, IS professionals have viewed these skills as the most important place skills for a system analyst in impacting on IS success, whereas, for CIOs and end users indicated that technical skills were the most essential skills in successful of system development. Several creators indicated that behavioural, interpersonal, communication and soft skills are occasionally referred to social skills as its attribute represents the average person behaviours such as articulating and speaking skills to connect to the users, capacity to work in a team such as developers, analysts and other system professionals, personal inspiration and working separately, good listener, ability to write and many more.
Technical skills
There is no doubt that complex skills are areas commonly considered major to the computer related career including system analyst. According to Misic and Graf (2004) technical skills are the ability to use techniques like the development of systems of efficient decomposition, data flow diagrams, process specifications, object-oriented examination, data modeling, education, hardware and software knowledge and other tools that are proven to help in the introduction of something. Similar with Lerouge, Newton and Blanton (2005) technological skills referred to hardware, software and encoding aspects of information systems.
System analyst is a good position for those with interest in computer science, information technology, and management. However, the career often consists of long hours and high-stress situations. You work closely with a team to efficiently solve problems with the computer systems of large organizations.
Feminism has accomplished some great goals in its history. First and second wave feminism had a purpose and a really important goal to accomplish and it was effective in doing so. First wave feminism is responsible for women being considered people as opposed to objects that can be owned by a man which is very important and I’m thankful for the brave women who fought for that right. Second wave feminism is known for equality of women to each other for example, black women having equal rights to white women and females being granted the right to vote. There is a lot for feminists to be proud of. But contemporary feminism is a different thing altogether.
Normally, once a goal is accomplished a movement would dissolve and they would be content with their victory, but nope not feminism.
Now I have to concede that most feminists are normal people who are actually trying to help an issue that they see as important. But while most feminists aren’t crazy, some very prominent voices are. In general, American third wave feminism is stuck in an anachronistic belief that women continue to be an oppressed class. To feel worthy and pass their flaws off onto society they find problems–however petty and insignificant–and then offered themselves as the solution. A never-ending cycle that ensures the survival of a form of activism that has outlived its usefulness.
The first reason I oppose contemporary feminism is because it preaches equality yet the result it strives to deliver is actually quite sexist and therefore hypocritical. For example, feminists often generalize “men” into gross mischaracterization and stereotype. A viral Twitter thread asked women what they would do if men had 9pm curfew. One Tumblr user wrote: “night time would be so beautiful if all men [my emphasis] had a curfew, my mind runs wild thinking of all the things I’d do if there were no men [my emphasis] out after 9, I’d wear a pretty dress and walk.” Personally I feel bad for this girl because I’m sure she genuinely believes that she is unsafe and feels threatened by every man. Everyone knows, however, that one need not ban all men to create a safe environment. Yet when average men responded to statements like this via social media with #notallmen, feminists were outraged. While they may later argue that they only referring to “guilty men,” statements like these plainly paint a broad stereotype. Feminists don’t want to be generalized into what a stereotypical feminist is and yet they go out and create this exact problem for men; this is inherently hypocritical.
Take the example of rape culture: a hot-button issue in the eyes of feminists. Of course, rape is a terrible thing, but then feminists can be seen on social media encouraging false or exaggerated sexual assault claims. One current example of a way women do this is the #metoo movement. Females see all these other girls and famous women using this hashtag explaining some horrible situation. They decide to jump on the bandwagon and contribute their “unique” story of the time they were “victimized,” describing comparatively insignificant events like getting groped at a party. I feel like that should be somewhat expected and women should be able to assert themselves in the situation not just cry about it afterwards. Secondly, because it’s being shared online, I suspect it’s hard to resist embellishing the story to keep up with competing news and get the attention you think you deserve. Feminists claim to hate rape culture but by sharing all minor incidents of sexual assault they are contributing to rape culture and making actual cases of rape less significant.
Another thing that contributes to the sexism of feminism is how easily offended they get but how offensive they are to men. Examples of their thin-skin include how some feminists respond to “acts of chivalry” such as men holding the door for them. In a conversation with a man who works at my school, he told me about a time when he was in university and got reemed out for holding the door for a female student. If you think men wouldn’t actually have feminists flip out on them for this, think again, as you probably know someone who this has happened to as well.
In 2014, Girl Scouts made a petition to ban the word bossy, claiming that “When a little boy asserts himself, he’s called a ‘leader.’ Yet when a little girl does the same, she risks being branded ‘bossy.’” Girl Scouts wants ban this word because they are scared that is discourages middle school age girls from being leaders. Even though they have no way of doing this other than a pledge you can sign on their website, it further proves how sensitive and easily triggered feminists are.
Other extreme cases include air conditioning being complained about. An article in the Telegraph cites a study that showed “air conditioning units are designed for the body temperature and metabolism of men and leave most women shivering.” It’s the same women that complain about how AC units are designed for men that also complain about other insignificant “sexist” non-issues. The worst the same feminist that make these ridiculous claims such as being attacked by the word “too” are considered by themselves and others as “strong.” To me, someone who gets offended by little things is not strong; they are very weak.
Everyone has seen girls’ clothing that somehow displays the message of powerful women, such as “girls rock” or “girl power” or something along those lines–which, to begin with, is ridiculous. Why should anyone be proud of their gender–something they did nothing to earn. But it is doubly ridiculous considering that if a boy were wearing a shirt talking about how great his gender is, it would be considered “contributing to toxic masculinity.” This double standard held by feminists where it’s praised for a little girl to be proud of her gender but “problematic” for a little boy to be, should be considered sexist everyday of the week.
In addition to this ironic sexism of feminism, I also object to the way it encourages women to use “inequality” as an excuse for their own shortcomings. In job interviews, if a female candidate is against a male candidate and she does not earn the position, feminism allows her to believe that it is because she’s disadvantaged or she has not been treated fairly rather than allowing herself to take the loss and improve for next time. I find this mindset to be toxic and not an ideal that should be preached.
Thirdly, feminism does not empower women, but it can make them believe they are a victim. Growing up as a girl, the only time I’ve been told that I am a victim or will have a harder time because of my gender is by feminists. I would have never considered the idea that men are superior otherwise. Feminists will preach to young girls that they are “going to have to work harder for the same results as a man.” However, going into adulthood with a preconceived notion that society sees you as less deserving can never help you achieve your goals because it gives you a victim complex and overall sets you up to believe you’re going to fail which will result in real failure or the lack of will to even try.
We can all agree that men and women should be equal–and they are! When I was speaking to a friend who is a proud feminist about this article, the first argument she brought up supporting the need for feminism was catcalling. If a major complaint third wave feminists have to complain about is something as minor as unwanted compliments, then I think, for the most part, society has done a good job treating men and women equally. While life will never be entirely equal, it’s important to accept that there are slight advantages and disadvantages to each gender. Feminists need to stop crying about who got the slightly bigger slice of pie like 5-year-olds.
In another world, I could see myself as a feminist. If feminists prioritized women in other countries, for example, Pakistan, where women aren’t allowed to be educated, leave the house after dark or drive, then I would be a proud feminist. If identifying as a feminist meant being against subjecting women to Sharia law, then I would be proud to call myself a feminist. The fact is that American feminists are for the most part not helping these issues. In fact, when a movement whose purpose it is to stand up for the rights of women fights for non-issues such as not being catcalled it takes away focus from real pressing issues elsewhere. Feminism is ultimately harming more than it is helping. Unfortunately, third wave feminism has completely tarnished the reputation of a movement that used to stand for equal rights but now exists as a sexist, hypocritical outlet for insecure women to find a target to blame their problems on.
Ladies and gentlemen, feminism has outlived its usefulness, now it’s just litter, strewn over our discourse like so much trash on the streets
This is the first time data thrown up by an official statistical survey has been entirely suppressed, with all the funds spent on the consumer expenditure survey going down the drain.
The National Statistical Office (NSO) has decided not to release the quinquennial survey data on consumer expenditure for 2017-18. This is because these data, leaked by TheBusiness Standard, show a drop of 3.7% in real per capita consumer expenditure between 2011-12 and 2017-18, from Rs 1,501 per month to Rs 1,446 per month (at 2009-10 prices).
An actual drop in per capita consumer expenditure is an extremely serious matter. Such a drop has occurred for the first time in over four decades; the previous occasion when a drop had occurred was in 1972-73, when a poor harvest had combined with the first oil shock by Organisation of Petroleum Exporting Countries (OPEC) to push up inflation and to squeeze drastically the real purchasing power in the hands of the people.
Those, however, had been erratic disturbances: either external factors (OPEC price-hike) or episodic factors (poor harvest) for which the government could not be held responsible, though it could, of course, be faulted for the way it handled these disturbances.
In 2017-18, there are no such erratic disturbances outside of the government’s control. The only disturbances that had shaken the economy during the 2017-18 survey period, were the demonetisation of currency notes and the rolling out of the Goods and Services Tax (GST), for both of which the Narendra Modi government was solely responsible.
To be sure, these disastrous decisions alone cannot explain the fall in per capita consumer expenditure.
The incidence of the fall has been particularly sharp in rural India where per capita expenditure has declined by 8.8% between 2011-12 and 2017-18, compared with a rise, though by a mere 2%, in urban India between these dates. And in rural India, signs of distress had been visible for quite some time, quite apart from demonetisation and GST. The latter, in short, acted on an already distressing situation to make it more distressing; but it is not as if the situation was tolerable otherwise.
The clearest proof of the distressing situation comes from production data. The government is claiming that production data run contrary to the data on consumer expenditure, but this is a false claim. If we take the current price net value added in “agriculture and allied activities”, which is the source of all incomes derived within this sector, and divide it by the agriculture-dependent population (estimated by assuming that its ratio in total population did change over a short period), then we find that, deflated by the consumer price index for rural India, the per capita real income of the agriculture-dependent population declined slightly between 2013-14 and 2017-18.
Since the agriculture-dependent population also includes landlords and agricultural capitalists, who have a large share despite being few in number and whose incomes could be safely assumed not to have fallen over this period, the decline for the bulk of the rural population, the working people of rural India, must have been sharper (And even if the ratio of the agriculture-dependent population in total population is assumed to have fallen over this period, the fall could not have been large enough to negate this conclusion).
The same conclusion holds if we change the terminal date from 2017-18 to 2016-17, i.e., before demonetisation could have had any impact. It follows that whatever impact demonetisation (and the GST) had, was superimposed upon an agrarian economy already in distress because of the neo-liberal policies being pursued by successive governments, and pursued with particularly ruthless single-mindedness by the Modi government.
The decline in food expenditure has been especially sharp, by as much as 10% in per capita terms between 2011-12 and 2017-18 in rural India. This must have increased the magnitude of poverty quite significantly.
Contrary to official claims, the magnitude of poverty, which is defined with respect to a calorie norm in India, had been rising both in urban and in rural areas over the period of neo-liberal policies. This is evident if we compare the figures for 1993-94 and 2011-12 (both quinquennial survey years). This magnitude must have got a further sharp upward push in 2017-18.
It is typical of the Modi government to suppress these data on consumer expenditure, which it finds uncomfortable. It had done the same with employment data before the Lok Sabha elections in May this year, which had shown an unemployment rate higher than ever before in the last 45 years; but these data at least were officially released afterwards.
With regard to the consumer expenditure data, however, the government has decided not to release these at all. It will wait till 2021-22 for the next quinquenninal survey, by which time it would have suitably modified the method of data collection to ensure that it gets a prettier picture, before it comes out with any figures on consumer expenditure.
The argument it has advanced for suppressing the consumer expenditure data are quite absurd: the “data quality” according to it, is “poor”. But this is a matter that could have been left to the researchers and the public at large, instead of being decided by a set of bureaucrats and hand-picked “experts”. The government could have just released the data and taken the stand that not much should be read into them because of poor “data quality”.
In fact, when the quinquennial survey on consumer expenditure in 2009-10 showed a substantial increase in poverty compared with 2004-05, the government of that time ordered a fresh large sample survey in 2011-12. The argument advanced was that the 2009-10 survey could not be taken seriously because it had been carried out during a drought year; but that did not prevent the government of the time from releasing the data for 2009-10. And indeed, 2011-12, which was a good crop year, showed a substantial increase in per capita consumer expenditure compared with 2009-10, though it did not negate the conclusion about a rising trend of poverty (in terms of calorie deprivation) in the neo-liberal period.
In fact, this is the first time that the data thrown up by an official statistical survey have been entirely suppressed, with all the expenditure undertaken for the survey going down the drain. For a government to waste so much of the nation’s resources, by commissioning a survey whose results are then suppressed, just because it does not want its hype about acchhe din destroyed, shows a level of megalomania that is unimaginable.
What is even more worrying is that the Centre’s megalomania would destroy the statistical system that the country had built up so painstakingly under the leadership of Professor P C Mahalanobis, when Jawaharlal Nehru was Prime Minister.
The National Sample Survey that Mahalanobis had set up was the largest sample survey in the world, a source of information unparalleled anywhere in the Third World, a matter of pride for the country, and an immensely valuable input for research. To muck about with it, to destroy this valuable source just so that the hollowness of the government’s claims about its “achievements” is not exposed, constitutes an instance of criminal callousness.
The government argues that the consumer expenditure data are not in keeping with other official indicators, and that this is the basis of its argument that the “data quality” is poor. But these data are completely in conformity with what one gleans from all other sources. They are in conformity with the unemployment data mentioned above. They are in conformity with the agricultural income figures mentioned above. They are in conformity with the massive downturn that the economy is experiencing at present, when not a day passes without some fresh news appearing about its miserable performance. The fact that the sales of even simple consumer items, such as biscuits, have been falling of late is in conformity with the absolute decline in per capita consumer expenditure.
When the nation is in the grip of a severe economic crisis, instead of using every bit of available information to understand the crisis, the Modi government is suppressing valuable information. This is the measure of its seriousness in overcoming the crisis.
Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.It’s predicted that by 2021 cybercrime will cost the world a figure in excess of $6 trillion. It is the fastest growing crime in the US and as it grows the attacks are increasing in size, sophistication and cost, making them all the more terrifying for their targets.The cybersecurity industry is rapidly growing every day. Although more resources are being deployed to counter cyber attacks, the nature of the industry still has a long way to go before we can, as a whole, catch up with these threats.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. In other words, in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.
91% of attacks begin with email phishing Email phishing attacks are engineered to trick their unsuspecting targets into providing sensitive data and information. The majority of phishing attacks will be sent via spam which is why it’s so important that you implement effective anti-spam software such as MailCleaner for your business.
There is a hacker attack every 39 seconds A Clark School study at the University of Maryland is one of the first to quantify the near-constant rate of hacker attacks of computers with Internet access— every 39 seconds on average, affecting one in three Americans every year —and the non-secure usernames and passwords we use that give attackers more chance of success.
Cybercrime, also called computer crime, the use of a computer as an instrument to further illegal ends, such as committing fraud, trafficking in child pornography and intellectual property, stealing identities, or violating privacy. Cybercrime, especially through the Internet, has grown in importance as the computer has become central to commerce, entertainment, and government.
The average cost of an American corporate data breach is almost $8 million. Because of the early and widespread adoption of computers and the Internet in the United States, most of the earliest victims and villains of cybercrime were Americans. By the 21st century, though, hardly a hamlet remained anywhere in the world that had not been touched by cybercrime of one sort or another.
New technologies create new criminal opportunities but few new types of crime. What distinguishes cybercrime from traditional criminal activity? Obviously, one difference is the use of the digital computer, but technology alone is insufficient for any distinction that might exist between different realms of criminal activity. Criminals do not need a computer to commit fraud, traffic in child pornography and intellectual property, steal an identity, or violate someone’s privacy. All those activities existed before the “cyber” prefix became ubiquitous. Cybercrime, especially involving the Internet, represents an extension of existing criminal behaviour alongside some novel illegal activities.
Most cybercrime is an attack on information about individuals, corporations, or governments. Although the attacks do not take place on a physical body, they do take place on the personal or corporate virtual body, which is the set of informational attributes that define people and institutions on the Internet. In other words, in the digital age our virtual identities are essential elements of everyday life: we are a bundle of numbers and identifiers in multiple computer databases owned by governments and corporations. Cybercrime highlights the centrality of networked computers in our lives, as well as the fragility of such seemingly solid facts as individual identity.
An important aspect of cybercrime is its nonlocal character: actions can occur in jurisdictions separated by vast distances. This poses severe problems for law enforcement since previously local or even national crimes now require international cooperation. For example, if a person accesses child pornography located on a computer in a country that does not ban child pornography, is that individual committing a crime in a nation where such materials are illegal? Where exactly does cybercrime take place? Cyberspace is simply a richer version of the space where a telephone conversation takes place, somewhere between the two people having the conversation. As a planet-spanning network, the Internet offers criminals multiple hiding places in the real world as well as in the network itself. However, just as individuals walking on the ground leave marks that a skilled tracker can follow, cybercriminals leave clues as to their identity and location, despite their best efforts to cover their tracks. In order to follow such clues across national boundaries, though, international cybercrime treaties must be ratified.
In 1996 the Council of Europe, together with government representatives from the United States, Canada, and Japan, drafted a preliminary international treaty covering computer crime. Around the world, civil libertarian groups immediately protested provisions in the treaty requiring Internet service providers (ISPs) to store information on their customers’ transactions and to turn this information over on demand. Work on the treaty proceeded nevertheless, and on November 23, 2001, the Council of Europe Convention on Cybercrime was signed by 30 states. The convention came into effect in 2004. Additional protocols, covering terrorist activities and racist and xenophobic cybercrimes, were proposed in 2002 and came into effect in 2006. In addition, various national laws, such as the USA PATRIOT Act of 2001, have expanded law enforcement’s power to monitor and protect computer networks.
Cybercrime ranges across a spectrum of activities. At one end are crimes that involve fundamental breaches of personal or corporate privacy, such as assaults on the integrity of information held in digital depositories and the use of illegally obtained digital information to blackmail a firm or individual. Also at this end of the spectrum is the growing crime of identity theft. Midway along the spectrum lie transaction-based crimes such as fraud, trafficking in child pornography, digital piracy, money laundering, and counterfeiting. These are specific crimes with specific victims, but the criminal hides in the relative anonymity provided by the Internet. Another part of this type of crime involves individuals within corporations or government bureaucracies deliberately altering data for either profit or political objectives. At the other end of the spectrum are those crimes that involve attempts to disrupt the actual workings of the Internet. These range from spam, hacking, and denial of service attacks against specific sites to acts of cyberterrorism—that is, the use of the Internet to cause public disturbances and even death. Cyberterrorism focuses upon the use of the Internet by nonstate actors to affect a nation’s economic and technological infrastructure. Since the September 11 attacks of 2001, public awareness of the threat of cyberterrorism has grown dramatically.
Identity theft and invasion of privacy
Cybercrime affects both a virtual and a real body, but the effects upon each are different. This phenomenon is clearest in the case of identity theft. In the United States, for example, individuals do not have an official identity card but a Social Security number that has long served as a de facto identification number. Taxes are collected on the basis of each citizen’s Social Security number, and many private institutions use the number to keep track of their employees, students, and patients. Access to an individual’s Social Security number affords the opportunity to gather all the documents related to that person’s citizenship—i.e., to steal his identity. Even stolen credit card information can be used to reconstruct an individual’s identity. When criminals steal a firm’s credit card records, they produce two distinct effects. First, they make off with digital information about individuals that is useful in many ways. For example, they might use the credit card information to run up huge bills, forcing the credit card firms to suffer large losses, or they might sell the information to others who can use it in a similar fashion. Second, they might use individual credit card names and numbers to create new identities for other criminals. For example, a criminal might contact the issuing bank of a stolen credit card and change the mailing address on the account. Next, the criminal may get a passport or driver’s license with his own picture but with the victim’s name. With a driver’s license, the criminal can easily acquire a new Social Security card; it is then possible to open bank accounts and receive loans—all with the victim’s credit record and background. The original cardholder might remain unaware of this until the debt is so great that the bank contacts the account holder. Only then does the identity theft become visible. Although identity theft takes places in many countries, researchers and law-enforcement officials are plagued by a lack of information and statistics about the crime worldwide. Cybercrime is clearly, however, an international problem.
In 2015 the U.S. Bureau of Justice Statistics (BJS) released a report on identity theft; in the previous year almost 1.1 million Americans had their identities fraudulently used to open bank, credit card, or utility accounts. The report also stated that another 16.4 million Americans were victimized by account theft, such as use of stolen credit cards and automatic teller machine (ATM) cards. The BJS report showed that while the total number of identity theft victims in the United States had grown by about 1 million since 2012, the total loss incurred by individuals had declined since 2012 by about $10 billion to $15.4 billion. Most of that decline was from a sharp drop in the number of people losing more than $2,000. Most identity theft involved small sums, with losses less than $300 accounting for 54 percent of the total.
Internet fraud
Schemes to defraud consumers abound on the Internet. Among the most famous is the Nigerian, or “419,” scam; the number is a reference to the section of Nigerian law that the scam violates. Although this con has been used with both fax and traditional mail, it has been given new life by the Internet. In the scheme, an individual receives an e-mail asserting that the sender requires help in transferring a large sum of money out of Nigeria or another distant country. Usually, this money is in the form of an asset that is going to be sold, such as oil, or a large amount of cash that requires “laundering” to conceal its source; the variations are endless, and new specifics are constantly being developed. The message asks the recipient to cover some cost of moving the funds out of the country in return for receiving a much larger sum of money in the near future. Should the recipient respond with a check or money order, he is told that complications have developed; more money is required. Over time, victims can lose thousands of dollars that are utterly unrecoverable.
In 2002 the newly formed U.S. Internet Crime Complaint Center (IC3) reported that more than $54 million dollars had been lost through a variety of fraud schemes; this represented a threefold increase over estimated losses of $17 million in 2001. The annual losses grew in subsequent years, reaching $125 million in 2003, about $200 million in 2006, close to $250 million in 2008, and over $1 billion in 2015. In the United States the largest source of fraud is what IC3 calls “non-payment/non-delivery,” in which goods and services either are delivered but not paid for or are paid for but not delivered. Unlike identity theft, where the theft occurs without the victim’s knowledge, these more traditional forms of fraud occur in plain sight. The victim willingly provides private information that enables the crime; hence, these are transactional crimes. Few people would believe someone who walked up to them on the street and promised them easy riches; however, receiving an unsolicited e-mail or visiting a random Web page is sufficiently different that many people easily open their wallets. Despite a vast amount of consumer education, Internet fraud remains a growth industry for criminals and prosecutors. Europe and the United States are far from the only sites of cybercrime. South Korea is among the most wired countries in the world, and its cybercrime fraud statistics are growing at an alarming rate. Japan has also experienced a rapid growth in similar crimes.
ATM fraud Computers also make more mundane types of fraud possible. Take the automated teller machine (ATM) through which many people now get cash. In order to access an account, a user supplies a card and personal identification number (PIN). Criminals have developed means to intercept both the data on the card’s magnetic strip as well as the user’s PIN. In turn, the information is used to create fake cards that are then used to withdraw funds from the unsuspecting individual’s account. For example, in 2002 the New York Times reported that more than 21,000 American bank accounts had been skimmed by a single group engaged in acquiring ATM information illegally. A particularly effective form of fraud has involved the use of ATMs in shopping centres and convenience stores. These machines are free-standing and not physically part of a bank. Criminals can easily set up a machine that looks like a legitimate machine; instead of dispensing money, however, the machine gathers information on users and only tells them that the machine is out of order after they have typed in their PINs. Given that ATMs are the preferred method for dispensing currency all over the world, ATM fraud has become an international problem.
Malware attack is the most costly cyber attack Malware is software that has been designed to gain access to or cause damage to a computer without the knowledge of the operator. It’s normally sent via email as a link or an attachment. With a $2.4 million dollar average cost for companies, this is the most costly form of cyber attack.
Since COVID-19, the US FBI reported a 300% increase in reported cybercrimes As if a pandemic wasn’t scary enough, hackers leveraged the opportunity to attack vulnerable networks as office work moved to personal homes.
File sharing and piracy Through the 1990s, sales of compact discs (CDs) were the major source of revenue for recording companies. Although piracy—that is, the illegal duplication of copyrighted materials—had always been a problem, especially in the Far East, the proliferation on college campuses of inexpensive personal computers capable of capturing music off CDs and sharing them over high-speed (“broadband”) Internet connections became the recording industry’s greatest nightmare. In the United States, the recording industry, represented by the Recording Industry Association of America (RIAA), attacked a single file-sharing service, Napster, which from 1999 to 2001 allowed users across the Internet access to music files, stored in the data-compression format known as MP3, on other users’ computers by way of Napster’s central computer. According to the RIAA, Napster users regularly violated the copyright of recording artists, and the service had to stop. For users, the issues were not so clear-cut. At the core of the Napster case was the issue of fair use. Individuals who had purchased a CD were clearly allowed to listen to the music, whether in their home stereo, automobile sound system, or personal computer. What they did not have the right to do, argued the RIAA, was to make the CD available to thousands of others who could make a perfect digital copy of the music and create their own CDs. Users rejoined that sharing their files was a fair use of copyrighted material for which they had paid a fair price. In the end, the RIAA argued that a whole new class of cybercriminal had been born—the digital pirate—that included just about anyone who had ever shared or downloaded an MP3 file. Although the RIAA successfully shuttered Napster, a new type of file-sharing service, known as peer-to-peer (P2P) networks, sprang up. These decentralized systems do not rely on a central facilitating computer; instead, they consist of millions of users who voluntarily open their own computers to others for file sharing.
Understanding the cyber terminology, threats and opportunities is critical for every person in every business across all industries. By providing advanced cyber training and education solutions in all departments of your business, from marketing and sales to IT and InfoSec, you are investing in your company’s protection against cyber threats.
Recent times has been very horrifying for the world, not due to COVID-19 but because of some accidents happened based on colour discrimination. Peoples have been tortured due to their complexions. The crimes due to colour discrimination has seen a spike in recent years that too with some known personalities. Many has felt this issue at very high levels and have been vocal about this.
Black Lives Matter has been around since 2013, but there’s been a big shift in public opinion about the movement as well as broader support for recent protests. A deluge of public support from organizations like the N.F.L. and NASCAR for Black Lives Matter may have also encouraged supporters who typically would sit on the sidelines to get involved. On June 6, for example, at least 50,000 people turned out in Philadelphia, 20,000 in Chicago’s Union Park and up to 10,000 on the Golden Gate Bridge, according to estimates by Edwin Chow, an associate professor at Texas State University, and researchers at the Crowd Counting Consortium.
Setback
The problem they think is that they glorified the fair complex with another complex. But thing is not so simple. Also, problem is not with Bollywood instead this has been the impression of whole cinema across the globe. However, Things are getting simplified with better ways in other parts and countries of the world.
Recently after the incident of late George Floyd, whole world was shattered. Whole world stood united to trend and realise the fact that black lives does matters. Until now history has been suffering a lot due to such worst reasons. It is even disgusting to think the way those criminals that made them do such heinous crimes. In the 21st century, when we claim to be the most developed and progressive creature among all other species in universe.
Reasons
We have somehow been able to deal with racism and colour discrimination, but the crime rate has still not decreased. Crime has seen a surge; however general perception has definitely changed in peoples mind. There has been a notable change in the behaviour of public to such activities. Public has taken a brave step to reduce such happenings.
But the main perception still has been like #blackLivesmatter and quotes defining that they too are humans and they must be treated equally. They should get equalities in every manner all other complex peoples get.
But this idea has flaw because we have been taught to treat another complexion same as fair, but actually there should be point that colour does not matters at all. We should not just treat black peoples equally instead we should evolve to the thought of colours and complexion. We definitely have sense of that, but the idea has been restricted to give equal value. We have to stop judging the peoples on the basis of colour and also, we must realise that complex should not be criteria for anything. There should be the world where colour has no feature to be judged upon and it is person and personality that conquers everything in the world.
Chocolate is one of the favourite foods of human beings. A gift, a comfort food, a truce, you name it, chocolate has everything covered. And it is unanimously favourite in almost all the age groups, but more in the younger ones. All and all, chocolates’ demand isn’t going down anytime in the near future. And speaking of tasty treats, we are taught to share it with friends. But are they good for our furry, pet friends too? Actually they aren’t!
Animals, especially the commonly domesticated ones, are susceptible to chocolate poisoning. Chocolate contains a compound theobromine (C7H8N4O2), which is an alkaloid found in the cocoa trees. Apart from chocolate, this alkaloid is also found in tea leaves, kola nut, etc. It has resemblance to the stimulants like caffeine and theophylline, and can be classified as xanthine alkaloid. For now, the median lethal doses for the cats, dogs, rats and mices are commonly known.
Alkaloids are organic compounds with a typically basic chemistry, but they also contain some compounds with neutral, or even slightly acidic properties. They all, uniformly, have a bitter taste. In nature, bitter taste is a danger indicator, and hence, are produced in several plants, like cocoa plant, as a response to the avoid predators. Animals, under the usual circumstances, do not consume the cocoa seeds. Even if some animals consume the cocoa pods, they dispose of the cocoa seed, despite their fat content, most likely due to the high amounts of theobromine.
But, in chocolate, cocoa’s bitter flavour is partially or fully masked by the added sugar and fats. Hence the animals, especially the ones whose taste buds can detect sweetness, like dogs, have a tendency to consume them. Cats, on the other hand, due to absence of ability to detect sweetness, are not very prone to consuming chocolates accidently.
Even in human beings, it can cause effects on consumption above a limit. The lethal dosage 50% (LD50), which happens to be the quantity that can kill 50% of the individuals of a particular species, in humans happens to be 1000mg/kg. At a consumption level of 0.8-1.5g/day, symptoms like sweating, headaches and trembling are observed. At 250mg/day, limited effects on the mood is observed. Along with human beings, rats and mices also have a good tolerance to theobromine, with the LD50 levels being 837 mg/kg and 1265 mg/kg respectively.
But, cats and dogs have comparatively lower quantities for LD50. The dogs drop down at the 300mg/kg level, while cats are at 200mg/kg. Hence, even a small amount of cocoa consumption can be harmful for them, especially for the smaller sized individuals. Also, the type of chocolate consumed is an important factor in the theobromine poisoning cases. The dark chocolate items contain a very high amount of theobromine concentration. In comparison to that, milk chocolate contains relatively smaller concentrations (10 times lesser than dark chocolate). Unsweetened cocoa powder is the most concentrated.
The early symptoms of chocolate poisoning include vomiting, nausea, diarrhea, increased urination and mood swings.Dogs and cats digest theobromine slower than the human beings, and hence, are susceptible to succumbing to chocolate poisoning. Clinical symptoms of poisoning can last upto 72 hours. More severe symptoms include epilrptic seizures, internal bleeding and cardiac arrests. All these can lead to an eventual death.
If identified early, chocolate poisoning is treatable. Veterinarians treat these cases by inducing vomiting within two hours of ingestion, and by administering benzodiazepines for seizures.
But whatever be the treatment, the ordeal is painful for the animals. And as the old saying goes around, “ Prevention is better than cure”. So, the least we can do for our beloved pets is to keep them safe from accidental consumption of harmful items.
Tolerance is the quality to accept and show proper respect to the opinion, beliefs & customs & habits of others. It’s akin to the motto to “Live & let live.” In a society & in a country where people are speaking in different languages, professing different religions & faiths, and clinging to different political views the necessity of tolerance is very high. They may not take the opinion of others but they should tolerate them. In a world, tolerance is based on proper adjustment, understanding, fellow feeling & cooperation among people of different castes and creeds, faiths, opinions & customs.
Tolerance is of utmost importance in all walks of life. Peace and prosperity of a family, of society, and even of a country or nation depends on it. All members of a family or society may be divided in their opinions but they must be sympathetic to the opinions and views of others. If a person cannot respect the opinion of the other & vice versa, then this may result in strain in relations causing it to be an unhealthy one. Again in a family, if the son & daughter don’t respect their parents & vice versa the family may turn into hell. Similarly, if the democracy is shattered to pieces if the members of a political party do not respect & tolerate each other’s views, then this may lead to unnecessary fighting, bloodshed & killing.
While India is famous for its democracy. The lack of tolerance of the opinions of other political parties leads to the dismemberment of Pakistan in the past. It has lead to the separation of sacred ties between many husbands & wives in Western countries. The system of divorce among husbands & wives is quite a common practice for intolerance. Marriage is a matter of pride of Indian religions, Aryan culture & civilization. But this concept is not appreciated in India. Even though ironically it is much criticized, the count is increasing with time.
When it comes to expanding a business geographically the first question comes in mind is whether to go with franchise or set up own infrastructure. First thing, do you really need geographical expansion, if you are a digital marketing firm or IT company or a BPO you don’t have to do geographically initially. Geographical expansion is more important in restraunt or cafe business or other like that. If you also want to expand your business make sure you are stable enough and having regular source of income. Sustainability is a must need requirement for scalability. Scaling without sustaining is a complete suicide. First of all be sure that you are ready for expanding and it is the right time now. Once you are confirmed that you are now ready to expand then look out some options you have. Whether your marketing is good enough to attract a franchisee what will be the terms and conditions between you and franchisee. If you don’t high amount of working capital and want have less stress and don’t have hire too many employees you can go with franchise model but if you have enough working capital and you areready to invest it and your organisation is having good leadership then you must go with setting up your own infrastructure.
In a world full of chaos you need to find things that call for some ME time. As an individual we find even the 24 hours of the day less to meet our targets and in the race of being on top we tend to forget that it is important to spare some time out of our busy schedule for our own self. Here is when hobbies come in the picture. A hobby can be anything that sets your soul free and makes you happy. Anything that distracts you from a busy life can be turned into a hobby. A lot of people like dancing when free, many love singing , many love painting, few play Casio or guitar or any other musical instrument of their choice.Some love poetry and are great poets. Hobbies can also turn into your careers and that is probably one of the best combination, when you enjoy your work, it always keeps you engaged and never gets you boring.
We have often heard “Khaali dimag, shaitaan ka ghar” so to avoid your khaali dimaag you must engage in a hobby. To be productive,instead of gossiping and bitching around and about people we must adapt habits which are useful. In today’s world where mobile phones have become an addiction it keeps you away from it for atleast a particular time, you forget about it and focus on your self. Mental health is one of the major issues people are facing today and having a hobby can be the purest form of cure for that.
As a person you become more interesting, innovative and creative. You have more ideas to share and more knowledge to gain. Hobbies help you become more patient. In order to develop a new hobby, you have to learn how to do something that is brand new to you. The odds are there will be a learning curve, and you will need to be patient in order to build your skills. It increases your self confidence and boosts your self esteem. It enriches your life and gives you a different perspective on things. No matter what type of hobby you choose, you will definitely be exposed to new ideas. Hobbies help you grow in various ways, including exposing you to new opinions and to new ways to look at life. Your perception about life can change, you can be more optimistic.
In today’s digitally progressive world if you post anything you are skilled at and if for once you get viral, you never know you can be the next “Rasode mei kaun tha ” sensation and in a day you would be a public figure. you post your dance,singing,cooking videos on youtube and earn likes .You have a collection of your hobbies at a particular place and it keeps you moving. you feel accomplished. You feel good. Even eating is a habit people enjoy, it may sound vague but it actually is a hobby. A hobby can be anything unless it is unethical or hurts somebody’s sentiments.
So discover new hobbies and develop existing ones. Create an impact. Get going!
“If you are losing your leisure, look out! — It may be you are losing your soul.” ― Virginia Woolf
Ever heard someone asking about the things you added into the food which you prepared? Feel a bit annoyed by that remark? Well, don’t be,cause even a small mistake may result as fatal for them..
What exactly are allergies?
The etymology of Allergy i.e ‘Allergie’ which was actually invented by a doctor who actually combined two Greek words, allow,meaning ‘strange’ and ergon which means ‘activity’. Which means that an allergy,if roughly explained,is any ‘strange activities in your body is an allergy.
Mechanism
So,your body contains some antibodies. What are antibodies? Well,whenever your body has any foreign organism inside it,your body starts to release something called antigens. These antigens have antibodies present on them which will bind the foreign material in order to destroys it. The difference? 1. Antigens are the substance which ‘induce’ the immune response of the body whereas antibodies are the proteins which actually recognise and bind them to the antigens.
2. Antigens maybe within the bodies of be added externally and the antibodies are always present in the bodies. Suppose you take a Red Blood Cell(RBCs),every blood cell has an antigen on them. Let’s imagine the blood cell to be of A+ve person and the antigen which is present on the cell be of a triangular shape.
O>.
How will the antigen be of that cell? The antibody which the body will produce will be exactly opposite,let’s imagine the antibody like a circular or anything which is not triangular intially the antibodies of ‘B’ blood group. Why is it so? So that they don’t fit together! So will the ‘B’ blood group cells make the antibodies of A blood group. What happens if they fit together? The cells die. Which is why people from blood banks are really specific about the ‘blood group’ which the patient belong to. But then..what happens in the case of ‘O’ blood group? The cells from ‘O’ blood group do not have antigens at all! So what kind of antibodies will the body produce? The perish with ‘O’ positive blood produces antibodies of both ‘A’ and ‘B’ blood group. Wait….this is all getting very confusing. How am I exactly supposed to know which blood group produces which antibody or whatever it is?!? Well,let’s see below.
Human blood is made of several groups. Not all blood groups are same. What is different in blood group is usually the antibodies. How are they divided? Let’s see!
A blood group- Has antigens of A blood group-But has antibodies of B blood group
B blood group- Has antigens of B blood group-But has antibodies of A blood group
AB blood group-Has antigens of both A and B blood group-but has no antibodies
O blood group- has no antigens-but has antibodies of both A and B blood groups
Now,you might have many questions regarding the above explanations. Don’t worry,every question will be cleared!
O blood group has both that antigens.Supposing,if we are to transfuse the blood to a person with A blood group,why doesn’t the antibody not kill the cell?
The answer can be derived with two possibilities. Firstly,whenever there is a transfusion of blood,it is very rare that antibodies get transfused. So, normally it is quite safe. Secondly,even if the antibody did manage to get inside,the antibody will die soon due to the difference,maybe from the environment of the other factors affecting it.
Photo by Amornthep Srina from Pexels
How is the blood group negative or positive determined? Whether the blood group is positive or negative is determined through something called the Antigen D. The presence of this antigen D means that the blood is positive and if the presence is not seen,then the blood is said to be negative. Hematology (the study of blood) is quite complicated and even today,many mysteries are yet to be disclosed. Why so? Did you think that only 8 blood groups exist?( A+ve,A-ve,B+ve,B-ve,AB+ve,AB-ve,O+ve,O-ve)
Then you are quite wrong,because according to a research,around 400 types of blood groups have been found till today,and the hematologists,are still studying very hard about the various properties of our blood and the various elements it contains.
Now,how does this affect allergies?
Antibodies,also known as Immunoglobulins are the ones which are sent when there is an foreign material identified by the body. It is very helpful due to its immunological memory which remembers the foreign organism for a long time,and when the same material again comes in contact with the material,the body knows how to kill it. This is extremely smart in the cases of pathogens(disease causing microbes). The problem arises when a micro organism is repaired by,let’s take pollen grain for example. Pollen grains are freely present in the atmosphere. When the pollen is inhaled through respiration,the body thinks the pollen to be a foreign material and produces large amounts of antibodies. This antibodies rush towards,where the pollen is present. Its main motive is to either destroy or remove the foreign material form the body. So the antibodies bind the pollen,and during this process,many side effects take place for eg. rashes,runny nose, constant sneezing(because the body wants the pollen out of the it’s system) etc. These are just minor allergies,some may develop some major effects which may be drastic enough to make one hospitalized. It may also be the case when an object,which was previously in contact with the body may suddenly be recognised as a foreign body and again,the process repeats. Some allergies may even turn out to be hereditary.
One is always advise to consult a doctor if suffering through any unusual reactions after the contact of anything. If not,one must make a note about what exactly is the factor which is causing the body to react as such,and try to avoid it
The concept which was written over here are usually temporary and soon the body adapts itself. But if you experience constant trouble with any material,try to avoid the contact with it and consult a doctor to prevent any further consequences
The research is still going on about what exactly does our body heal ourself,or why our brain releases certain fluids at certain situations,but these are are speculations and theories and are believed to make and define things in an easier way. There might be a time in future when we crack the code and get to know what exactly happens inside our bodies. Till then,to wonder is all we can do!!
The flow of technology is as strong as a flooded river that no court can embark on such a vast flow of technology but still seeks to prevent damage by making proper dams by actively participating in the electronic maintenance of court records, allowing or even requiring electronic filing of pleadings and orders, and building high-tech court.
Good technology in our courts will make it more efficient to proceed. Electronic displays provide for adequate visualization and analysis of the exhibits. Technology can boost procedural control capabilities, identify deadlines and decide on matters quickly. Judges can place more time constraints on attorneys, provided that technology is more ready to present. You can access, analyze and use technology to inquire into previous cases for lawyers. Lawyers can complete openings, closings, direct questions and cross-examinations in less time than is needed to use paperwork with stable additions or diagrams. The technology in court halls helps lawyers clarify and synthesize courtroom information to increase the jury’s curiosity, comprehension and memory retention. online application and consultation can make their court experience smooth, quick and hazel free. It would also create transparency.
E-justice is seen and performed as an e-government agency. The Indian judiciary consisted of 15,000 judges in 2,500 districts. Since 1990, computerisation has taken place. Under the National EGP, the Mission Mode Project (MMP) was established for court computerization, and the introduction of IT and communication technology in three phases over a period of five years..
The MMP’s key goals are to:
1. To help court judicial administration streamline their day-to-day operations.
2. To support the courts in raising number of pending cases.
3. Providing litigants with accuracy of the facts.
4. Providing Judges with access to legal and judicial resources.
The project was launched in December 2004 and an e-committee was created to oversee its implementation. The E-Committee formulated a regional strategy and action plan. 700 courts in metro cities and 900 courts in capital cities with the exception of North East, Ahmedabad and Patna have been protected to this day.
The NIC has been extremely associated to the Indian judge for the past eleven years. Back in 1990, the task of NIC was initiated to support the legal community through IT.
Through NICNET satellite-based electronic communication network, all the High Courts were computerised and interconnected. Curtis project was commissioned to streamline the different court records. NIC took COURTIS on behalf of all legal system stakeholders, including judges, prosecutors, litigants, legal firms, government departments, researchers and the general public. Forensic and cyber tracing Forensic and cyber tracking data has played a major role in judicial investigation and enquiry. These made investigation smoother and allowing police and judiciary to pin down violator easily.
It requires the use of IT infrastructure in the judicial administration sector. It requires the use of satellite technology, video or intranet technology to communicate. Today, many judicial officers use video conferencing every day and it is connected to prisons. The accused can now be present by tele-justice through a video connection installed on ISDN lines between the prison and the trial. Indian states today have already adopted tele-justice, including Maharashtra, Andhra Pradesh, Tamil Nadu, Gujarat, and Bihar. In Maharashtra, for example, by video conferencing, more than 40 prisons in and around Mumbai are linked to district courts.
Over many years now, courts in the United States have been using Information Technology extensively.
Throughout the United Kingdom, computer software production at the subordinate court level was developed extensively. The Local County Court Management System (LOCCS) for example used in England
In Australia, “Cyber Tribunals” have extensively utilized the technology in the legal arena at all phases, thereby significantly reducing delays.
In Singapore, the courts use their time and resources to ensure that cases are handled effectively and effectively. The use of technology goes beyond computer use for Singapore courts. The use of video cameras in prisons and court premises dramatically decreases the chances of moving the accused and witnesses in criminal trials within the country and from outside.
While we have come a long way in advancing technology, we still have scope for improvement. On-line database program with precedents, citations, rules, laws and case statistics. Word processing with standard templates including notification/process creation. Lack of professional support expertise and a non-flexible budget in the modernisation process
There is no question that technology will profoundly affect future courtroom and litigation procedures, but the degree to which change will occur is subject to an unprecedented amount of problem anticipation and convenience due to what is now referred to as disruptive technologies, that is, innovations that are yet to be developed that will reshape our lives and alter our way of living. However, there are a large number of barriers that need to be addressed in order for the judiciary to operate to its full potential by using information and communication technology. If our judiciary is completely efficient in using new technologies, justice for everyone can be achieved easily and efficiently. It should be our primary objective to give justice quickly and correctly.
You must be logged in to post a comment.