I Too Had A Love Story : Book Review

About the book

  • Title : I Too Had A Love Story
  • Author : Ravinder Singh
  • Genre : Romance
  • Year of publishing : 2008
  • Number of pages : 213

About the author

Ravinder Singh is an Indian software engineer and author of nine novels – I too had a love story, Can love happen twice? , Like it happened yesterday, Love stories that touched my heart, Tell me a love story, Your dreams are mine now, This love that feels right, Will you still love me , The Belated Bachelor Party.

Singh’s debut novel is based on his real-life incident when he met a girl, how his romance flourished and then how it came to an unfortunate end , before he could propose marriage to her.

After six- month search, an editing team sent the manuscript to the publisher Sristhi, who published the book.

“After the unfortunate incident, I was looking for a reason to live. And I started to pen down the moments I had been through.”

“I can’t deny that. I had to go back in time, close my eyes, relive the moments, tears rolled down and I wrote the words.”

Analysis of the book

“I Too Had A Love Story” is an English autobiographical novel written by Ravinder Singh. This was the debut novel of the author and was first published in 2008 by Srishti Publishers, in 2012 it was republished by Penguin India.

The book remained in the best-sellers list in Indian even after 6 years of its first publication.

This book is the real- life story of Ravinder Singh and this book is a simple and honest story. This book gives a heart- wrenching story which brings tears in eyes at the end.

“She died. I survived.

Because I survived, I died everyday.

I was bound by my stars to live a lonely life. Without her, I felt so alone. Though the fact is that it’s just she who is gone and everything else is the same. But this ‘everything else’ is nothing to me …”

Summary of the story

The story starts with the reunion of four friends in Kolkata. Ravin, the main protagonist of the story, along with his three college friends named Happy, Manpreet, and Amardeep have a reunion where they enjoy together after a long time. There they discuss that what they are going to do in their future and Happy suggests Ravin to create an account in the matrimonial site .

Ravin after returning to Bhubaneswar, where he used to work in Infosys, he created an account in a matrimonial site and after a few days, he gets a call from a girl named Khushi from the matrimonial site. After that both of them started talking and chatting all day long and became good friends.

Then slowly they realised that they were in love with each other. Ravin has to go abroad from some work but before that he went to meet Khushi and her parents. Again after returning to India, he visited Khushi and both of them decides to get engaged.

Then both Khushi and Ravin’s parents met with each other and fixed their engagement on 14th February. It was Khushi’s idea about the date because she wanted to become both girlfriend and fiancé of Ravin on Valentine’s Day. But three days before their engagement Khushi met with a serious accident and even after all treatments and everyone’s prayers she didn’t survive.

Her death left Ravin totally heartbroken and nothing excited him anymore . He can’t think of anything and was totally shattered.

Conclusion

Ravin lost his everything when he lost his Khushi. He suddenly became emotionless and there was nothing normal in his life anymore. He can’t find happiness in anything anymore. He went into a state of depression. For him, his life meant nothing without Khushi.

“NOT everyone in this world has the fate to cherish the fullest form of love.

some are born ,just to experience the abbreviation of it.”

“someday you might be sad, when you might wish to talk to me but i might not able to do so.”

https://www.goodreads.com/work/quotes/7364012-i-too-had-a-love-story

The Three Types of Hackers

The term “hacker” is commonly linked with hackers with bad intent, although it encompasses much more. A hacker is someone who uses their computer software and hardware skills to break down and circumvent security measures on a computer, device, or network. Hacking is commonly thought to be criminal on principle, although this isn’t the case if the system owner willingly and knowingly gives access. In reality, many private companies and government agencies engage hackers to assist them in maintaining the security of their systems.

The motivations of an individual and the legality of their acts are the two key criteria that determine what type of hacker they are. Hackers are classified as white, black, or grey hats, a naming scheme borrowed from classic western films in which protagonists wore white hats and villains wore black.

1. Black Hat

Malware, which is routinely used to enter computerized networks and systems, is usually created by black hat hackers. They’re usually driven by personal or financial gain, but they’ll also engage in espionage, protests, or just for the pleasure of it. Black hat hackers can range from inexperienced to highly skilled individuals with the goal of spreading malware and stealing private data such as login passwords, as well as financial and personal information. Black hat hackers can either steal, modify, or destroy system data after they gain access to their targets, depending on their motivations.

2. White Hat

They’re also known as “ethical hackers,” and they’re frequently hired or hired by businesses and government agencies to operate as security specialists looking for flaws. While they use the same techniques as black hat hackers, they always receive authorization from the system’s owner, ensuring that their actions are fully legal. Penetration tests, monitoring in-place security systems, and vulnerability assessments are all tactics used by white hat hackers. Independent sources, training, conferences, and certifications can all be utilized to understand ethical hacking, which is the word used to define the nature of a white hat hacker’s conduct.

3. Grey Hat

As the term implies, these individuals combine elements of both black and white hat hackers, although they will frequently look for weaknesses in a system without the consent or knowledge of the owner. They’ll notify the owner of any problems they see, but they’ll also ask for money or an incentive. If the owner does not reply or rejects their proposal, a grey hat hacker may take advantage of the newly discovered problems. Grey hat hackers aren’t evil by nature, but they do want to be compensated for their services. Because grey hat hackers do not have authority from the system’s owner to access the system, their acts are ultimately regarded illegal, regardless of whatever disturbing findings they may uncover.

Influencer Marketing

What is influencer marketing?

Influencer marketing is a from of social media marketing also known as influence marketing involving products placements from influencers, who had a strong expert level of knowledge or social influence in their field. Influencer marketing is when a brand hired influencers who already established credibility and audience on social media platform to discuss the brand on a social media post.

What is Influencer?

Influencers are those (someone or something) who has the power to affect the buying habit of others by uploading something original or sponsored content to social media platform like – Instagram, snapchat, YouTube or any other online platform or online channels.

Identifying Influencers :-

(1). Connectors network with a variety of people and have a wide range.

(2). Influencers are essential to word-of-mouth communication.

(3). Influencers use information, shear with others and are insightful of trends.

(4). Influencers has tendency to others to imitate their behavior.

Social Influence and Influencers :-

Social influence mostly based on social persuasion and compliance. In influencer marketing influence is less about arguing for a point of view of products. Although influence is also equated with advocacy and it maybe negative.

Though social comparison theory influencer marketing is also important. As psychologist Chae reports, influencers serve as a comparison tool. Consumers may compare influencer lifestyles with their imperfections. As example promoted products may surve as a shortcut towards a complete lifestyle. As such they related their lifestyle and the status of influencer above themselves. When a brand using an influencer they may use consumers insecurities to its benefit. Influencer marketing may lead to faulty advertising for this reason.

Social Media platform and influencer :-

Social media has created new opportunities for marketers to expand their business. Social media and online activities can a play a central role in online decision making and allowing customers to research about the product.Critics of an online-intensive approach say that by researching exclusively online, consumers can overlook input from other influential individuals.

Many use influencer to increase the reach of their public marketing massages. Online influencers who curate personal brands have become marketing assets because of their relationship with their followers.The interactive and personal nature of social media allows parasocial relationships to form between influencers and their followers, which impacts purchase behavior and influencer marketing on social media reaches consumers who used ad-blockers.

Virtual Influencers :-

Virtual-influencer profiles do not correspond to real individuals and are not automated bots which generate fake likes, comments, or followers. Virtual influencers also sometimes considered as fake. The characters are usually identified as models, singers, or other celebrities. Their creators write their biographies, conduct interviews on their behalf, and act like the characters themselves. The characters internationally designed by 3D artists to look like real people in real situations.

Fake Influencers :-

Fake influencers have been around from as long as the real influencers are there. And all criteria used to determine the veracity of an influencer account can be fabricated. An analysis of over 7,000 influencers in the UK indicated that about half of their followers have up to 20,000 “low-quality” followers themselves, consisting of internet bots and other suspicious accounts. Over four in 10 engagements with this group of influencers are considered “non-authentic”. Third-party sites and apps sell services to individual accounts which include falsely increasing followers, likes, and comments. Instagram has failed to shut down all such websites.

Top 10 Social Media Influencer :-

(1). Markiplier . (2). Logan Paul. (3). Jenna Marbles. (4). King Bach. (5). Tyler Oakley. (6). Lele Pons. (7). Amanda Cerny. (8). Roman Atwood. (9). Miranda Sings. (10). Michelle Phan.

Regulations :-

In 2017, the FTC sent more than 90 educational letters to celebrity and athlete influencers with the reminder of the obligation to clearly disclose business relationships while sponsoring and promoting products. The same year, in response to YouTubers Trevor Martin and Thomas Cassell deceptively endorsing an online gambling site they owned, the FTC took three separate actions to catch the attention of influencers.In the United States, the Federal Trade Commission (FTC) treats influencer marketing as a form of paid endorsement. It is governed by the rules for native advertising, which include compliance with established truth-in-advertising standards and disclosure by endorsers (influencers) and is known as the Endorsement Guides.


Facebook and Instagram have a set of brand content policies for influencer marketing and endorsements. Branded content may only be posted through Instagram and Facebook, and require the business relationships between influencers and endorsers to be tagged when promoting branded content. As of August 2020, YouTube has updated the branded content policies. YouTube and Google’s ad policies require influencers to check a box titled paid promotion when publishing sponsored videos and provides instructions on how to set it up.

What is an IP Address? An Overview

A device on the internet or a local network is identified by its IP address, which is a unique address. The Internet Protocol (IP) is a set of rules that govern how data is transmitted across the internet or a local network. IP addresses, in essence, are the identifiers that allow data to be transmitted between devices on a network: they contain location information and make devices reachable for communication. The internet requires a method of distinguishing between various computers, routers, and webpages. IP addresses are a crucial aspect of how the internet operates and provide a means of doing so.

What is an IP?

A string of integers separated by periods makes up an IP address. IP addresses are made up of four numbers; for example, 192.158.1.38 is an example address. The set’s numbers can vary from 0 to 255. As a result, the entire IP addressing range is 0.0.0.0 to 255.255.255.255.

IP addresses are not generated at random. The Internet Assigned Numbers Authority (IANA), a part of the Internet Corporation for Assigned Names and Numbers, creates and assigns them mathematically (ICANN). ICANN is a non-profit organisation based in the United States that was founded in 1998 to assist keep the internet secure and accessible to everyone. Every time someone registers a domain name on the internet, they do so through a domain name registrar, who pays ICANN a nominal fee to do so.

How do IP addresses work

It helps to understand how IP addresses function if you want to figure out why a device isn’t connecting the way you want it to or if you want to troubleshoot why your network isn’t working. Internet Protocol communicates in the same manner that any other language does, by following a set of rules to convey information. This protocol is used by all devices to find, send, and share information with other connected devices. Any computer in any area can communicate with one another if they speak the same language.

IP addresses are most commonly used behind the scenes. The procedure is as follows:

  1. Your device connects to the internet indirectly by first connecting to a network linked to the internet, which then allows your device internet access.
  2. That network will most likely be your Internet Service Provider when you are at home (ISP). It will be your workplace network at work.
  3. Your Internet service provider (ISP) assigns an IP address to your device.
  4. Your internet activity passes through your ISP, which uses your IP address to deliver it back to you. It is their responsibility to issue an IP address to your device because they are providing you with internet connection.
  5. Your IP address, on the other hand, may change. Turning your modem or router on or off, for example, can make a difference. You can also contact your ISP and get it changed for you.
  6. Your home IP address does not go with you while you are out and about – for example, when you travel – and you take your device with you. This is because you will be accessing the internet through a different network (Wi-Fi at a hotel, airport, or coffee shop, for example) and will be allocated a different (temporary) IP address by the hotel, airport, or coffee shop’s ISP.

International day of Tropics

The serenity of the lulling ocean is a wondrous thing to behold..more precious than the gems coveted and covered in platinum or gold…

Oksana Rus

Introduction

International day of Tropics is observed every year on June 29th . This day is celebrated to highlight the different challenges and opportunities faced by the nation as well as by the people who lived in tropical areas .

Firstly , you want to know about things like :

What are tropics ?

Why we celebrate international day of Tropics ?

Or

Is it worth it to talk about these things and is it really important ?

Well hold your horses and try to calm .

What is tropic day and why we celebrate it ?

Well a tropic day is celebrated to highlight the importance of Tropics , it signifies extraordinary and astounding diversity of tropical nations .

The Tropic defined as a area /region between tropic of Cancer and tropic of Capricorn . The day aim at promoting tropical regions and awareness to the people about the diversity of these regions .

While these regions go through little seasonal changes on day to day basis because of some factors like tomography , climatic variation that causes changes in temperature and make these regions warm.

This day introduced to the world when in June 29th , 2014 twelve leading tropical research institutes come together and collaborate. The inaugural state of the Tropics report was launched . The report offers some unique perspective for the increasing the importance of these regions .

United Nations General Assembly adopted resolution A/RES/70/267 in 2016, which declared that 29 June of each year is to be observed as the International Day of the Tropics.

The International day of Tropics briefly explained the issues affecting the tropical zone’s all over the world. To raise awareness and important role the countries played to Sustainable goals .

International day of Tropics 2021

As per the state tropics report the theme of this year is “ THE DIGITAL DIVIDE IN THE TROPICS ”

With the record of sustainable development goals as well as developmental scope . The biodiversity of these regions are maximum and its loss is also greater there. Tropical regions comprise 98% world’s mangrove forests, and around 99% mangrove species.

Due to the subpolar zone the Sun is directly overhead which is one of the region of extinction of flora and fauna in the Tropics. The region is subjected to myriad and need immediate attention to ensure sustainable development.

More than 50% of renewable water resource could be founded their. But the threat lies which causes eviction of lives in the Tropics.

Importance :

Due to the problems it’s our duty as a human being to spread awareness about the implications in climate changes , deforestation , urbanization , global warming effect the biodiversity and lives in Tropics.

The International day of Tropics organize many events in which people share their stories , events and lives in these areas and formulate strategies to ensure the development of such regions .

You who sacrifice fortunes to see the luxuriance of the tropics or the polar lights of the arctic, must pay more dearly to see the One for whom the luxuriance of the tropics is poverty and the polar lights are a tallow candle.

Nikolaj Velimirović, Prayers by the Lake

Link:

DAD’S DAUGHTER- GRIEF OF A LITTLE GIRL

” The sight of my old pencil art of a little girl holding index finger of her dad made me to travel into my past. Dad saw true mastery in my scribblings. I think he is the only person who will be good to us. The doll becomes dull, in his absence. Girls are much connected to their dad but I had spent portable time with my dad. Every daughter feels her dad as a hero. In my issue he is not only a hero, but he is also a board of support, the spark in my gapes and shine in my smile. He is the man behind us as a guide and beside us as a friend.

Dad’s are not only heads of our family but also honey to our mom and king to his princess just like a nerve vagus in our body. Dad while remembering all the naughty things, a cute smile on my face suddenly disappeared when I turned the other page of my drawing book. The same art but with out you, tugged me back to reality. I do remember that day started pleasantly and ended with grief.

As soon as we came to know about the covid positive result of my dad, he isolated from us and maintained taking medication through online. Exactly after three days of his isolation he undergone into serious condition, that he is not able to take breathing properly and we admitted my dad in a hospital. We are in a hope that he will get cured soon and will return to our home but our expectations went wrong.

My mom received a call from the hospital after a day of admitting my dad which made my thoughts to run high. My breath stooped for a while before I complete my prayer. Dad, I saw you without any eternity in your body and that environment ceased my brain. It couldn’t send any messages to my tear glands. Suddenly my throat loaded and I felt heavy. I feared to see you like that dad. My mom hold me tightly. Tears gushed from one eye. My room knows how much I cried. It’s my palm that zipped my every killing tear.

I not only lose my dad but also my friend and my strength. It’s unfair dad, you must not leave your little girl. The three months of my journey with out you made me to feel alone. Please come back dad!! I need you . Society seems too outrageous, your girl is confronting with hurdles every day. Immense pain produce no rips, storing all the pain inside the flush box and pressed my expression with throated emotions. “

The above write-up is the pain of a little girl who lost her dad due to covid-19 pandemic. There are several families around us lost their loved ones because of this pandemic. The death one’s is one of the worst tragedies in life. The pain of those families is speech less.

Finally, I wish to say that we cannot bring back the people who left us physically but we can help their families by supporting them during the emotional hardship to make them feel safe and strong.

” PLEASE FOLLOW THE COVID-19 GUIDELINES STRICTLY TO STOP THE SPREAD OF VIRUS”

What is Dark Web? An Overview

The dark web is a section of the internet that requires special software to access and can be difficult to navigate once you do. Multiple layers of encryption allow people to browse and post information on the dark web with near anonymity, making it a go-to platform for buying and selling illicit goods and services.

What Are the Three Levels of the Internet?

Learning about the three levels of the internet might help you better understand what the dark web is.

Surface Web

The surface web, often known as the clear web, is the part of the internet that anyone can access using a web browser and a search engine. Search engines “crawl” the internet looking for new websites and pages to index. When you search for a website or term, the search engine returns results from its index that it believes are the most relevant to your search. The surface web includes news and informational websites (such as this blog), e-commerce sites, video-hosting platforms, and many other sorts of websites. While you may spend a lot of time on the surface web, it only accounts for roughly 4% of all internet traffic.

Deep Web

The majority of the internet is made up of the deep web, often known as the invisible or hidden web. These pages aren’t found in search engine results, but you probably visit them on a daily basis. The Deep Web includes:

Pages that need to be logged in to: The surface web includes home pages for social media sites, streaming services, email, and banking. You do, however, enter the deep web after you log in to your account.

Unindexed content: A website, page, or piece of content may be excluded from the list that search engines crawl, and hence will not appear in the search results. If you know the URL or are linked to it from another page, you can still visit non-indexed pages.

Secure Storage: Photo, video, research papers, medical information, and other data that is stored online but only accessible with the correct credentials make up a large part of the deep web.

Intranets: Businesses, schools, and governments can have their own private networks that are created specifically for their needs but are also connected to the internet. Employees could use this intranet to communicate, save files, and access informational pages about corporate policies.

For how we utilize the internet, the distinction between the surface and deep web is critical. After all, you don’t want your bank statements to show up in a Google search. However, because the deep web is still connected to the internet, a hacker may compromise a company’s security mechanisms and gain access to your personal data through a data breach.

Dark Web

The dark web is a subset of the deep web that requires special tools, software, or authorization to access. Search engines, like the deep web, do not index data on the dark web. The black web, like the rest of the internet, does not refer to a specific site or page. Instead, it’s a darknet, a form of network. A darknet could be created by setting up a secret and secure network with a group of people.

What Is the Dark Web and How Does It Work?

When most people talk about the dark web, they’re referring to the Tor network, which is one of the largest and most well-known darknets.

Tor, which stands for “The Onion Router,” bounces data through a series of encrypted layers (like an onion) to provide greater anonymity to users. On the Tor network, there are onion sites and services, and page addresses end in. onion.

Download and instal the free Tor browser to gain access to the dark web. (You may use it to search the surface and deep webs as well.) It’s totally legal, and the Tor Project, which created the browser, receives a lot of funding from the US government.

However, having a browser is only the first step. The dark web, unlike the surface online, lacks good search engines. You might have to look up the address of an onion site on your own, and the names aren’t easy to remember. The onion address for the CIA, for example, is ciadotgov4sjwlzihbbgxnqg3xiyrg7so2r2o3lt5wz5ypk4sxyjstad.onion, while for the nonprofit newsroom ProPublica, it’s propub3r6espa33w.onion.

These are two examples of legal businesses with dark web presences. The dark web, on the other hand, is primarily recognized for the unlawful activities that occurs there.

Why Are Criminals So Attracted to the Dark Web?

The Tor network helps you disguise your identity and allows you to construct and host onion services anonymously. As a result, criminals frequently buy and sell illicit goods and services on the dark web. Limited-time specials, user reviews, and adverts for organic items can all be found on darknet marketplaces, which are surprisingly similar to sites found on the surface web. Criminals, on the other hand, use these marketplaces to sell illegal goods and services such as drugs, firearms, and hacking software. On the dark web, many identity thieves and hacker groups make money by selling the information they stole. Depending on what’s being sold, the value of the information can vary dramatically. Full profiles, also known as fullz, might include a name, Social Security number, date of birth, and account numbers, and can cost anything from $8 to $30 per profile.

Medical records in their whole are extremely desirable to identity thieves, and can fetch up to $1,000. Cryptocurrencies, such as Bitcoin, are the preferred payment method because they allow buyers and sellers to remain anonymous.

PRIDE MONTH

It takes no compromise to give people their rights…. It takes no money to respect the individual…it takes no political days to give people freedom… it takes no survey to remove repression. – Harvey Milk

As we all know June is celebrated as pride month.

So what is pride? Pride is about people coming towards to show dignity ,love ,care and affection to everyone. No matter how they look, what is their orientation, what is their gender etc.

we have to be an Ally ,being an means supporting equal rights for everyone- regardless of sexual orientation,race,gender or religion .

Global pride day is celebrated on 28 June.

Pride month dedicated to the LGBTQIA+ community and their right to live a dignified life.
LGBTQ stands for – lesbian, gay, bisexual, transgender, queer, intersex and asexual respectively.


Lesbian refers to a woman who is attracted towards other women.


Gay refers to a man attracted towards other man.


Bisexual refers to the people who sexually or emotionally attracted to both men and women.


Transgender refers to the people whose gender identity or expression differs from the sex they were assigned at birth.


Queer is an umbrella term referring to anyone who is not straight and not cisgender.


Intersex refers to the people who have biological traits such as genetic, hormonal differences that don’t fit in the typical definition of male and female.


Asexual refers to the people who do not experience sexual attraction or sexual interest/ desire for anyone

  • + Include at the end of acronym LGBTQIA+ in the condition of the multitude of identities that exist

LGBTQIA + ally is someone who stand up for, support, and encourage this community and try to make the world better place for the people of this community

We have to help, improve their quality of life in any way possible for us…

Lets free flow of colours on to the regular restricted repetitive patterns of society to make it beautiful for everyone……..

Green Economics

Over the past five years or so the issue of climate change has moved from a peripheral concern of scientists and environmentalists to being a central issue in global policy making. It was the realization that the way our economy operates is causing pollution on a scale that threatens our very survival that first motivated the development of a green approach to the economy. We are in an era of declining oil supplies and increased competition for those that
remain. This raises concerns about the future of an economy that is entirely dependent on oil and a wider recognition of the importance of using our limited resources wisely. This was the other motivation for the development of green economics. In addition, green economists have been concerned about the way an economic system based on competition has led to widening inequalities between rich and poor on a global as well as a national scale, and the inevitable tension and conflict this inequality generates.

Green economics is a methodology of economics that supports the harmonious interaction between humans and nature and attempts to meet the needs of both simultaneously. Green economic theories encompass a wide range of ideas all dealing with the interconnected relationship between people and the environment. Green economists assert that the basis for all economic decisions should be in some way tied to the ecosystem, and that natural capital, such as water, gold, natural gas, silver, or oil, etc. and ecological services have economic value.

The term green economics is a broad one but it encompasses any theory that views the economy as a component of the environment in which it is based. The United Nations Environment Program(UNEP) defines a green economy as “low carbon, resource efficient, and socially inclusive.” As such, green economists generally take a broad and holistic approach to understanding and modeling economies, paying as much attention to the natural resources that fuel the economy as they do to the way the economy itself functions.

While the idea of an equitable economy powered by renewable energy sources is alluring, green economics has its share of critics. They claim that green economics’ attempts to decouple economic growth from environmental destruction have not been very successful. Most economic growth has occurred on the back of non-renewable technologies and energy sources. Weaning the world, especially developing economies, from them requires effort and has not been an entirely successful endeavor. The emphasis on green jobs as a social justice solution is also fallacious, according to some. The raw material for green energy in several cases comes from rare earth minerals mined in inhospitable conditions by workers who are paid cheaply. An example of this is electric car maker Tesla, whose car batteries are made using raw materials mined from Congo, a region wracked by civil war. Another criticism of green economics is that it is focused on a technological approach to solutions and, consequently, its market is dominated by companies with access to the technology.

DIABETES MELLITUS

• Chronic health condition – a metabolic disorder –
hyperglycemia.

• High blood glucose (blood sugar) level either due to
inadequate insulin production or the body’s
cells do not respond
properly to insulin or both.
 Over time leads to serious damage to nerves, blood vessels – heart disease, vision
loss, & kidney disease etc.

Source- made by canvas

• No cure – can only be controlled.
 Treatment of diabetes:
 Diet
 Physical activity
 Lowering of blood glucose
 Lowering the levels of other known risk factors that
damage blood vessels.

• Precaution – losing weight, eating healthy food, and being active.

WHO:
 In 2014 – 422 million people worldwide have diabetes.
 Majority living in low- and middle-income countries – India, Bangladesh, Bhutan, Pakistan, Sri Lanka, Philippines and Indonesia.
 Diabetes directly attributed to 1.6 million deaths each year.
 Deaths from diabetes increased by 70% globally between 2000 and 2019.
 80% rise in deaths among males.

My self made

• India – among the top 10 countries – second with
69.2 million people with diabetes.

• Global Non-Communicable Disease targets
 Globally agreed target to halt the rise in diabetes and obesity by 2025.

Gestational diabetes

• Impaired Glucose Tolerance (IGT) with onset or first recognition during pregnancy.

• Pregnant women without a previous diagnosis of
diabetes develop a high blood glucose level

. • Author – pregnancy is a diabetogenic stress.

• Usually goes away after baby is born.

Issues

 May lead to Type 2 diabetes.
 Women with it are at increased risk of complications during pregnancy and at delivery.
 Women and their children – increased risk of Type 2 diabetes in the future.
 Other health risks
 These conditions contribute to high maternal and new born morbidity
and mortality.

OPED article

• Women of Indian (South Asian) origin – considered
to be at highest risk of gestational diabetes.
 International Diabetes Federation – up to 25%
of pregnancies in South Asia may be affected by
hyperglycemia in pregnancy.
 India – 10% in rural areas and 30% in urban areas.

• Public awareness is very less.

• Low awareness and capacity within the health
systems for testing and providing care – despite
the availability of national guidelines and diagnosis
and management of gestational diabetes by MoHFW.
• Suggestion – implement the
recommendation of Diabetes Study Group of India, the Federation of Obstetric and
Gynaecological Societies of India and the South Asia Initiative for Diabetes In
Pregnancy.
 Observe a National Gestational Diabetes
Awareness Day on March 10 – birthday of Dr. V. Seshiah, service and contributed to the field of diabetes and
pregnancy for more than 40 years.

The six out of twelve jyotirlinga of lord Shiva

  1. Somnath Jyotirlinga, Gujarat: According to the Shiva Purana, the moon was married to 27 daughters of Daksha Prajapati, out of which he loved Rohini the most. Seeing his negligence towards the other wives, Prajapati cursed moon that it would lose all its radiance. A disturbed moon along with Rohini came to Somnath and worshipped the Sparsa Lingam after which he was blessed by Shiva to regain his lost beauty and shine. On his request, Lord Shiva assumed the name Somchandra and resided there eternally. He became famous by the name Somnath. it is very holy pilgrimage site.
  2.  Nageshwar Jyotirlinga, Gujarat: This Jyotirlinga holds special significance as it symbolises protection from all types of poison. According to the Shiva Purana, a Shiva devotee by the name Supriya was captured by the demon Daaruka. The demon imprisoned her with several others in his capital Daarukavana. Supriya advised all prisoners to chant “Aum Namaha Shivaya” which enraged Daaruka who ran to kill Supriya. Lord Shiva manifested in front of the demon and put an end to him. Thus the Nageshwar Jyotirlinga came into being.
  3. Kashi Vishwanath, Varanasi: It is believed that Banaras is the site at which the first Jyotirlinga manifested its supremacy over other gods, broke through the earth’s crust and flared towards heaven. This temple is said to be the dearest to Lord Shiva, and the people believe that those who die here achieve liberation.
  4. Mahakaleshwar Jyotrilinga, Madhya pradesh(Ujjain): According to the Puranas, there was a five-year-old boy Shrikar who was enthralled by the devotion of King Chandrasena of Ujjain towards Lord Shiva. Shrikar took a stone and started worshipping as Shiva. Many people tried to dissuade him in different ways, but his devotion kept growing. Pleased by his devotion, Lord Shiva assumed the form of a Jyotirlinga and resided in the Mahakal forest. The Mahakaleshwar Temple is considered significant by the Hindus for another reason. It is among one of the seven “Mukti-Sthal” – the place that can liberate a human.
  5. Kedarnath Jyotrilinga, Uttrakhand: According to the legends, pleased by the severe penance of the Nara and Narayana – two incarnations of Lord Vishnu, Lord Shiva took up permanent abode in Kedarnath in the form of this Jyotirlinga. People believe that praying at this site one gets all his desire fulfilled.
  6. Omkareshwar Jyotrilinga, Madhya pradesh: The word Omkareshwar means “Lord of Omkara” or the Lord of the Om Sound! According to the Hindu scriptures, once upon a time, there ensued a great war between the Devas and Danavas (Gods and Demons), in which the Danavas won. This was a major setback for the Devas who then prayed to Lord Shiva. Pleased with their prayer, Lord Shiva emerged in the form of Omkareshwar Jyotirlinga and defeated the Danavas. This place is thus considered to be highly sacred by the Hindus.

Web Development

Web Development refers to building and maintaining websites for the internet. It typically refers to web markup and coding. It encompasses everything from a simple page of HTML text to complex, feature-rich applications designed to be accessed from various Internet-connected devices. It makes perfect sense that one can learn how to build websites entirely online. From HTML tutorials to in-depth courses in responsive web design that combine HTML, CSS and JavaScript, individuals can learn the latest client and server-side coding practices. Discover the latest web design software and online web design courses including self-paced web programming courses taught by experts from Intel and the World Wide Web Consortium (W3C), the organization that develops and maintains web standards and guidelines.

Laundry in Space

Cleanliness is the half your health. But sadly this does not go well in space. Astronauts say they run through a pair of T-shirts and socks on a weekly basis. There’s no scope for laundry in space.

This unhygienic practice is not only affecting the astronaut’s health but also making a huge trash of cloths which are burnt up in the atmosphere. NASA has taken an initiative in order to bring a change in this. They have teamed up with Procter and Gamble Co. to find out the best remedies in cleaning astronaut’s cloths in space.

The company has assured to send a pair of a Tide detergent and stain removal experiments to the space station. As weight is a big issue in rocket cargoes, P & G is planning to send up some customized detergents in December to see how the enzymes and other ingredients will react to the six months of weightlessness. After getting approval from scientists they will send the stain removal pens and wipes in the May. The company is also trying to design a washer-dryer combo that will operate in space using minimal amount of the recyclable laundry water and detergent. Officials expressed high hope in this diverse research.

Freedom of Speech Vs Nationalism

Freedom of expression is a crucial pillar of an independent government; without it, a free society’s constitution is broken, and torture takes place on its ruins. Every person has the right to freely express their opinions, thoughts, and ideas on any issue without fear of being harassed or censored by the government. In the Indian Constitution, Article 19, freedom of speech and expression is guaranteed.

Nationalism, on the other hand, is defined by Merriam Webster Dictionary as “a feeling that people often believe in their country and take pride in them that it is better and more important than other countries” or “a strong desire to unite people who share culture, history, language, and other characteristics to form a separate and independent nation.” “For the exchange of ideas between the right and wrong organizations” Due to the distress, a recent discussion in India pitted freedom of speech and expression against nationalism. The boundary between nationalism and jingoism is frequently blurred, and as a result, they trample on free expression.

‘Freedom of speech’ is a gradually evolving idea in European cognition. The Bill of Rights in England (1698) guaranteed “freedom of expression in parliament.” The statement of human rights and cultures adopted during the French Revolution in 1789 also influenced this concept. In India, the Rowlatt Act of 1919 provided the British government and police considerable powers, including limits on public assemblies, personal rights and freedoms, media and publication control, and so on. Mahatma Gandhi’s nonviolent civil disobedience movement in the country was inspired by the public’s objection to this act. The right to freedom of speech and expression is guaranteed by the Universal Declaration of Human Rights (UDHR) and the International Covenant on Civil and Political Rights (ICCPR). In this view, authority is significant because it promotes the realization of other human rights.

Individual and state-level freedom of expression are both protected. It can be comprehended around and around the world at the individual level, through the free exchange of ideas and information. People have the ability to express themselves irrespective of these rights, and the state protects and ensures them. On the other hand, from the standpoint of a state, freedom of speech becomes critical for the nation’s social, economic, and political growth.

This right allows honest people to administrate in all areas of government, including politics, bureaucracy, the court, and the media. It encourages residents to submit to these checks on a regular basis. Good governance emerges as a result of this process, which encourages public debate and discussion of policies, legislation, and government operations. It aids the transformation of public forums into a marketplace for ideas. It also allows for the implementation of human rights. The state-commissioned public inquiry of media and human rights, as well as the lapse, are highlighted.

Nationalism and freedom of speech and expression can coexist. They do not have to be mutually exclusive. However, red lines have been drawn on both sides. Speech and freedom of expression should not be suppressed by Jingwad or hyper nationalism. Similarly, freedom of expression is prohibited, and it must be compulsory to obey and voice slogans calling for India’s destruction. Finally, Pope John Paul II can be quoted: “Extensive nationalism is now linked to a slew of attacks and human aggressiveness, none of which saves anyone. The problem that we are currently facing has been accepted as reality. Doing is nothing more than a new type of slavery.”

Trainings and Internships In Technical Fields

In the early days of our university, we will all live in a fantasy world, where we will feel that we have everything we want. The future is bleak If we start the internship after the first year of study, whether it is a remote internship or a full-time internship, this situation can be easily resolved. Choose according to your convenience and university practice.

“Your greatest opportunity may be by your side”-Napoleon Hill

Your interns can choose from several trusted websites such as:

  • Internshala
  • Letsintern

In the college, we will have a group of friends and we will be happy to play with them. In the workplace, this may or may not happen, but you have to adapt to the environment as soon as possible to deal with different types of people. I’m sure some companies offer internship extensions and full-time performance based on the attitude of interns, depending on their Attitude Pages An easy process If this is a paid internship, you will understand the value of the funds you have used in the past, which will help you make better use of the economy. During the internship, you will need you to manage your studies, study and test results. Although once you have mastered the multitasking and time management skills that can be solved in real-time with World Problems , the process may seem daunting at first, but if your internship skills are not too passionate for Asmara, then your internship skills are also something Good things signal that they ignored the option very early. Work hard, study, and then forget to make the most of it. Don’t hesitate, don’t be afraid to start again. Because experts say you don’t start from scratch, but from experience.

You can learn how to apply the knowledge you have acquired during an internship to your future workplaces. In addition to this, it is an excellent learning curve for young graduates and students while meeting new people and making connections in the professional world