Encrypt eSign Presentation Later
Make the most out of your eSignature workflows with airSlate SignNow
Extensive suite of eSignature tools
Robust integration and API capabilities
Advanced security and compliance
Various collaboration tools
Enjoyable and stress-free signing experience
Extensive support
How To Use eSignature in ERP
Keep your eSignature workflows on track
Our user reviews speak for themselves
Encrypt eSign Presentation Later. Investigate by far the most consumer-warm and friendly knowledge about airSlate SignNow. Deal with your whole record handling and discussing process electronically. Range from handheld, paper-structured and erroneous workflows to automatic, digital and perfect. It is simple to generate, supply and sign any documents on any product anyplace. Ensure your essential company cases don't slide over the top.
Learn how to Encrypt eSign Presentation Later. Adhere to the easy manual to start:
- Build your airSlate SignNow profile in clicks or sign in along with your Facebook or Google bank account.
- Benefit from the 30-day time free trial offer or pick a pricing plan that's great for you.
- Find any legal format, construct on the web fillable varieties and reveal them safely.
- Use sophisticated features to Encrypt eSign Presentation Later.
- Indication, personalize signing buy and acquire in-individual signatures ten times quicker.
- Set up auto alerts and obtain notices at each move.
Moving your duties into airSlate SignNow is simple. What practices is a straightforward approach to Encrypt eSign Presentation Later, as well as recommendations to help keep your peers and companions for greater alliance. Encourage the employees together with the finest resources to be on the top of business processes. Boost productivity and range your small business quicker.
How it works
Rate your experience
-
Best ROI. Our customers achieve an average 7x ROI within the first six months.
-
Scales with your use cases. From SMBs to mid-market, airSlate SignNow delivers results for businesses of all sizes.
-
Intuitive UI and API. Sign and send documents from your apps in minutes.
A smarter way to work: —how to industry sign banking integrate
FAQs
-
How can I implement an online payment gateway in an Android app using CCAvenue?
>Integration with CCAvenue is possible using their Mobile Integration Kit. They provide sample code for iOS and Android which can be downloaded from here:https://mars.ccavenue.com/downlo...They describe two ways of integrating with their payment gateway, seamless and non-seamless. Either way requires you to redirect the user to a web page to complete the payment process or acquire authorisation from the users bank. Once done CCAvenue can redirect the user to whatever URL you prefer. This could be a website, merchant server API or a custom URI like myapp:// where you could handle the response locally.Seamless means you have the opportunity to present the payment options natively and collect all required fields first, then submit this to CCAvenue.Non-Seamless means you just pass the amount and currency to CCAvenue and the billing and payment details are collected from the redirected page.Either way will you require you to handle integration with CCAvenue with a separate WebView Activity to which CCAvenue provide sample code for.First of all, you need to set up a CCAvenue account. Go to the Sign Up page, choose the Startup Pro plan and fill out your details. On creating your account, you will recieve an e-mail on your entered e-mail address to verify your e-mail. Once you verify your e-mail, you will recieve an activation e-mail which will give you your CCAvenue Account Login ID and you will be required to set your password. Set your account password and make sure you read the e-mails that you receive thoroughly.Login to CCAvenue M.A.R.S Panel (Dashboard). In the Settings > API keys tab , you would get the Merchant ID , Access Code as well as the Working Key. The working key is also named as the encryption key in the dashboard provided to your from CCAvenue. Copy these keys to a safe place for later use.To secure the data transmitted from mobile while initiating the transaction, CCAvenue has implemented a time-based RSA key pair value which needs to be fetched uniquely for every transaction. These files should be uploaded on your web server.To download these files, Login to CCAvenue Dashboard. Now go to Resources > Mobile Integration Kit. Further click on RSA & Response Handling. Download the PHP files from here. You can also use the JSP and ASP .NET files but make sure your web server supports these functionalities before you use them. PHP is supported by every web server so I am using PHP.You will find 4 files on unzipping your PHP download. These are: cacert.pem, ccavResponseHandler.php, Crypto.php and GetRSA.php. You will find 4 files on unzipping your PHP download. These are: cacert.pem, ccavResponseHandler.php, Crypto.php and GetRSA.php. Now follow the following steps:(a) Upload these 4 files on your web server.(b) In the GetRSA.php file, put your access code in the 4th line like this: 'access_code'=>"XXXXXXXXXXXXXXXXXX",(c) In the 20th line, you need to put the path where you have uploaded your cacert.pem file. For example: curl_setopt($ch, CURLOPT_CAINFO, $_SERVER['DOCUMENT_ROOT'].'/RSA/cacert.pem');(d) In the ccavResponseHandler.php file, put your working key in the 6th line like this: $workingKey='105B05A21AD102EBA62C051720CC3FA2';That's all for the server part.(Source :: Internet)Thanks.
-
Did IAF really kill 300 terrorist in the air strike in 2019?
The question that everyone is asking. In this answer I will collect available evidence and check their veracity. This will be a long answer because I intend to be thorough. Because of this, I have added a list in the end summarizing the claims that have been made along with the evidence for or against them. You can go straight to the sunmary list if you wish.The conclusion will be a rather underwhelming ‘we don’t know’. I am leaning towards ‘there were deaths but few’ but really, there is not enough evidence to substantiate this conclusion.On the way, we will see how to examine news and identify what is well-substantiated and what the journalists may well have made up. My chief reason for writing this answer is to demonstrate how to critically examine news stories because clearly far too many people fall regularly for fake news.Let us proceed then, in the spirit of investigative analysis.The Early ReportsThe strikes happened at 3 Am on Tuesday morning. The first news of the airstrike came from Pakistan side.Indian Air Force violated Line of Control. Pakistan Air Force immediately scrambled. Indian aircrafts gone back. Details to follow.— Maj Gen Asif Ghafoor (@OfficialDGISPR) February 25, 2019 Indian aircrafts intruded from Muzafarabad sector. Facing timely and effective response from Pakistan Air Force released payload in haste while escaping which fell near Balakot. No casualties or damage.— Maj Gen Asif Ghafoor (@OfficialDGISPR) February 26, 2019 An official announcement from India’s side eventually came from foreign secretary Vijay Gokhale. The pertinent points made in the official announcement were:India had struck a big training camp of JeM in Balakot.“A very large number of JeM terrorists, trainers, senior commanders and groups of jihadis who were being trained for fidayeen action were eliminated.”This facility was headed by Yusuf Azhar, brother in law of Masood Azhar.Reports in Indian media added some further claims which were quoted as having come from ‘sources within the government’. Some of the things that one might have read that day would be:1000 kgs of bombs had been dropped. 300–350 terrorists were killed.3 terror camps had been struck.In the terror camp in Balakot, terrorists were living with five star facilities including a swimming pool.Yusuf Azhar was killed, along with several other prominent JeM operatives. One could find 10–12 names of terrorists in media reports.Most reports said six bombs had been dropped. India Today reported four to five, The Hindu reported five.As we will keep seeing in this answer, information from ‘sources’ has to be viewed with skepticism in the absence of further evidence. Already one can see this - despite government announcement that only one camp was hit, various media outlets were quoting ‘sources’ to say 3 had been hit.[As an aside, let me note that the reporting was also very sloppy, to say the least. To give one example, India Today reported:Gokhale confirmed that the JeM terror facility on Jaba top was destroyed in the operation along with some control centres and an ammunition dump. The ammunition dump reportedly had more than 200 AK series rifles, hand grenades, explosives, and detonators.He had said nothing of that kind as you can check from the official announcement.]Meanwhile, Pakistan officials continued to maintain that no damage had been done.First News from groundA Pakistani student currently residing in US tweeted:So a friend from the area has confirmed that madressa Taleem-ul-Quran (it’s board says run by Hazrat Maulana Masood Azhar) at Mansehra (Balakot) was hit, & there are ~10 ambulances around. But the area is now sealed. Local students told him, ziada nahi marai bachatt hogae.— Syed (@gypsy_heart6) February 26, 2019 According to him, there was a Madrasa in the area run by Masood Azhar which had been hit. 10 ambulances were seen. Students of that Madrasa said that not many had died.By afternoon the first ground reports began emerging. The first ground report to come was from Reuters. The report said:Villagers confirmed that Jaish-e-Mohammad had been operating in the Balakot area for a long time. Jaish used to have a training camp which they later turned into a madrasa.This Jaish-run Madrasa stood on a hilltop and villagers said that they were not allowed close to it.Villagers heard four loud bangs in succession at around 3 AM.But none of the bombs hit the madrasa. Villagers claimed that they exploded about a kilometer away from the madrasa.By this time the area about the madrasa had been sealed by Pakistan army and according to reports, not even local police was allowed to enter.A report from BBC Hindi quoted Jaish-e-Mohammad sources who said that they no longer used that camp as a training area and Yusuf Azhar had not been present.This seemed to be the conclusion Western media had also drawn. For instance, NYT reported:The view that little had been damaged was supported by military analysts and two Western security officials, who said that any militant training areas at the site, in the Pakistani province of Khyber-Pakhtunkwha, had long since packed up or dispersed.Later that day, Pakistan admitted that four bombs had been dropped but none had done any damage.Preliminary conclusionsOnly a few of the claims made in the media were corroborated by more than one independent source.First, the existence of a Jaish-run madrasa. This was corroborated by both the Reuters report and the Pakistani student Syed who had tweeted from US. According to locals, it used to be a terrorist training camp. It appeared that this madrasa must have been the target of the strikes.If locals were to be believed, there were four strikes and all had missed. But if Syed was right, then the madrasa had been hit. There was a good chance of his telling the truth, first because he was a disinterested party and second because he had been the first to report the existence of this madrasa which was later confirmed by Reuters.But even if there was a successful strike, were terrorists present? Both Western officials and Jaish ‘sources’ said that they no longer ran any active camps there.Further News from ground and elsewhereSome more information about this mysterious madrasa came to light from different sources.A US Department of Defense memo dated January 31, 2004 that had been leaked by Wikileaks in 2011, indicated the existence of "a [JeM] training camp that offers both basic and advanced terrorist training on explosives and artillery" located near Jaba.Further, an article in Jaish-e-Mohammad publication Al Qalam mentioned an event in the same Madrasa in April 2018. It was reported that Yousuf Azhar attended this event and JeM leader Abdul Rauf Ashgar spoke in praise of Jihadi ideology:The youths of this madrasa have broken the arrogance of the Kashmiri mountains and have lit the torch of Jihad there, and will keep it alight.In the subsequent days, more reports from the ground started coming.There were reports from Reuters, Al jazeera and Pakistani anti-establishment journalist Hamid Mir. All reportedThe existence of four bomb sites in forest areas.That locals denied that anyone had been killed.The nearest hospital denied anyone had been brought there for treatment.These four bombs had clearly missed the target.What about the madrasa? It still remained sealed, two days after the bombing.Al Jazeera reported:"The madrassa [religious school] there, at the top of the mountain, that is a training camp for mujahideen [religious fighters]," said one resident, gesturing in the direction of the school. He spoke on condition of anonymity given the sensitivity of the subject."Everyone here knows there is a Jaish camp there, at the madrassa," said another 31-year-old local resident, also on condition of anonymity. "It is an active training centre, they teach people how to fight there."Others, however, disputed that claim.Signboard for the madrasa. It mentions Masood Azhar’s name as benefactor. The board was removed by the military.Al Jazeera reported that they had not managed to access the madrasa.The report by Reuters saidPeople in the area said Jaish-e Mohammad did have a presence, running not an active training camp but a madrassa, or religious school, about one km from where the bombs fell.“It is Taleem ul Quran madrassa. The kids from the village study there. There is no training,” said Nooran Shah.A sign which had been up earlier in the week identifying the madrassa’s affiliation to Jaish-e Mohammad had been removed by Thursday and soldiers prevented reporters from gaining access.But it was possible to see the structure from the back. It appeared intact, like the trees surrounding it, with no sign of any damage of the kind seen near the bomb craters.Meanwhile, Western officials maintained that there were no terror camps and the Indian reports were exaggerated.Reuters reports:Western diplomats in Islamabad also said they did not believe the Indian air force hit a militant camp.“There was no militant training camp there. It hasn’t been there for a few years – they moved it. It’s common knowledge amongst our intelligence,” said one of them.South Asia expert Michael Kugelman tweeted:Thanks for the offer :) But I've already seen plenty of credible reports on the ground (and there is also satellite imagery) that make quite clear that Indian claims of killing hundreds of terrorists-or even of destroying terrorist facilities-are spurious if not outright false. https://t.co/gOTVi1y1vp— Michael Kugelman (@MichaelKugelman) March 1, 2019 On being pressed for details, Indian Air Vice Marshall R.G.K Kapoor told media“There is fairly credible evidence with us which proves that there was damage to the camps. We hit the intended targets and caused the damage that was intended. However, it will be premature to say what is the number of casualties we have been able to inflict on those camps and the number of deaths. Whatever we intended to destroy we have got the result.”However India has not released those satellite images. There were some claims in the media that ‘sources’ said satellite images will prove damage done. Again, these are just claims.Ground reports from Far awayTwo ‘ground reports’ came from people far away.Rome based journalist Francesca Marino claimed that she had communicated with locals through ‘encrypted communication’ and reported that thirty five had died. She wrote that her sources were local government employees and could not speak openly.Apart from the questionable credibility of ‘encrypted communication’, Marino is also known to be hostile to Pakistan, close to separatist Baloch leaders and had evicted been from Pakistan in 2011. Without independent corroborating her account can hardly be trusted. However the number she reports is consistent with ’10 ambulances’ reported by Syed.Exiled Pakistani journalist Taha Siddiqi posted an audio clip on Twitter which he claimed was a sermon in a JeM seminary:#Exclusive: In a sermon in #Pakistan, #JaisheMohammad leader accepts Indian planes were targeting their center in #Balakot. He criticizes @ImranKhanPTI for releasing #IndianAirForce pilot #Abhinandhan. He also calls Pakistanis for joining #jihad in Indian-administered #Kashmir pic.twitter.com/j4pQ4WG96T— Taha Siddiqui (@TahaSSiddiqui) March 2, 2019 Transcript:Indian planes did not bombard the headquarters of any (military) agency. Look at the the target of India’s bombs. What kind of place (makam) was it? Was it a place where agencies hold their meetings? Or was it a place where students in the light of the Quran and Sunnah, learned about jihad and helping Kashmiri Muslims as their duty? That is the place where it was attacked.The decision is in your hands. Will you still call it the jihad of the agencies, even when India has crossed from its territory, entered our country and attacked our centre (markaz) and has made jihad a reason to defend ourselves. It is said that when ants are near the end of their lives, they sprout wings and when hyenas know their end, they turn towards the city. Indian ants sprouted wings and flew to Balakot. Indian hyenas’ end is near and they turned towards the city of Balakot. Now it is up to lions like you whether you crush this ant under your feet or hunt the hyena or act like the Niazi rulers (hukmaran).Earlier, a Niazi gave away half of the country and 90,000 soldiers. Today, another Niazi after returning the Indian pilot has turned victory into loss, bowed his head down in front of the enemies and embarrassed the Muslim ummah.Satellite ImageryExperts were able to find the location of the bomb sites and the Madrasa on the map. You can look it up - the madrasa is at is 34.464042, 73.318427 (Google Earth link). (Note: An incorrect location had been identified as the Madrasa in another Quora answer).Nathan Ruser, a researcher at Australian Strategic Policy Institute’s International Cyber Policy Centre, studied Google satellite images from 27th Feb (after the strike) and claimedno evidence of damage to the facility or nearby areas is visible on the images.He was able to identify “three clear impact areas between 150 and 200 metres from the edge of the facility.”The same conclusion was signNowed by Michael Jakob Sheldon, a Digital Forensic Research Associate at the Atlantic Council’s Digital Forensic Research Lab.The takeaway is that while impact areas were the bombs fell could be identified, no damage to the facility nor any impact area close enough to it to have killed anyone were found by the experts.Final ConclusionsThere can be little doubt that the madrasa was the the target of the attack.Evidence from different sources suggest that the Madrasa was, at the very least, a place for dissemination of Jihadi ideology and a recruitment center. Whether it was a terrorist training camp or not is not confirmed, but it is plausible.All evidence suggests that four of the bombs certainly missed. How could highly accurate bombs miss is an open question. This highly informative twitter thread by an expert tries to shed some light on this.Finally, was the madrasa hit? Satellite image experts conclude that there was no damage done to the buildings or local vegetation comparable to the other bomb sites. Reuters report confirms that the madrasa was seen standing.On the other hand, Pakistan military have still not let anyone in that madrasa. What are they hiding, that too for so long? If there was some material that would prove it was a Jaish recruitment center that could be removed quickly enough.There must be something more incriminating. One possibility would be that there is some evidence that it had been used as a training ground in the recent past.The other is that there had been a bomb strike close to it.My speculation is that there was a smaller, fifth bomb. Not 200–225 kg like the others. This bomb hit close enough to the madrasa to do some damage. Not nearly as many deaths as Indian media reported, but enough to require 10 ambulances as Syed had reported.That’s my speculation, but there is very little to substantiate it. The proper answer is that the evidence is inconclusive.Claim: 3 areas were hit. Supported by : ‘sources'. Contradicted by: Official announcement by Indian govt, interviews of locals etc.Verdict: False. Only one area was hit.Claim: There was a madrasa ran by Jaish-e-Mohammad in the area where bombs were dropped.Supported by: Locals, a Pakistani student based in US called Syed who tweeted about it with info from his friend, Satellite imagery, signboard of the madrasa. (Syed's tweet was that the madrasa had been hit, 10 ambulances were in the scene and local students told his friend that not many had died.)Verdict: True.Claim: This madrasa used to be a terrorist training camp.Supported by: Locals, Western diplomats, A US defense memo leaked by Wikileak.Verdict: TrueClaim: This madrasa was an ideological recruitment center where the message of spreading Jihad to Kashmir was psignNowed.Supported by: Locals, an article in JeM publication, an audio recording of a JeM seminary presented by an exiled Pakistani journalist.Verdict: TrueClaim: This madrasa was still a terrorist training camp.Supp by: Some locals.Opposed by: Other locals, Western diplomats and officials whose intelligence reports suggested that terror camps had been moved from the area.Verdict: UnclearClaim: Terrorists were living in a 5 star level resort with swimming pools.Supp by: ‘Sources' of Indian media.Opp by: Satellite imagery, locals.Verdict: FalseClaim: India targeted this madrasaSupp by: Inference drawn from the true statements above, the audio clip of JeM seminary which directly mentioned this.Opp by: Pak govt claims that IAF fighters just dropped the payload randomly and left.Verdict: TrueClaim: 4 bombs missed any target, including the madrasa.Supported by: Locals, journalists who visited the area, satellite imagery analysis done by two independent experts from Aus and USA.Verdict: TrueClaim: The madrasa was hit and heavy damages were done.Supp by: Official announcement by Indian govt.Opp by: Satellite imagery which showed no substantial damage to the madrasa, locals, Syed's tweet which said not many had died.Claim: madrasa had not been hit.Supp by: locals, Reuters report which said it could be seen standing, Satellite imagery.Opp by: Indian government, Syed’s tweet, report by a Rome-based journalist who claimed to have communicated with locals from Rome. She said 35 were killed. However she is known to be anti-Pakistan.Verdict: UnclearClaim: Pakistani army is trying to hide something about the madrasa.Supp by: The fact that they have kept the madrasa sealed since the blast till date and have not allowed anyone in.Verdict: TrueClaim: The madrasa was hit by a smaller bomb and a small number were killed.Supp by: Syed's tweet, the secretive behaviour of Pakistan army around the madrasaOpposed by: Locals, lack of direct evidence from satellite imagery.Verdict: Unclear.Final verdict: The madrasa may or may not have been hit. If hit, it was either by a smaller bomb or by a bomb that hit close to the madrasa and a relatively small number of people died.(Note: After I was halfway through writing this I found this Wire article which did a better job at collecting and examining evidence. )
-
How did the WWII Navajo code talker program get up and running?
Philip Johnston (1892 - 1978) thought up and presented the idea of the Navajo Code Talkers to the Marines. 29 Navajo with help from a Marine cryptographic officer created the code.Philip was the son of a missionary, William Johnston. His brought them from Kansas to the Leupp (Tsiizizii in Navajo), Arizona area in 1896 when Phillip was 4. It is on the Navajo Reservation east of Flagstaff. He learned Navajo from playing with Navajo kids. In that time and place almost all Navajo were Navajo as a first language, and most were not comfortable with English or did not speak it at all. The area was 98% or more Navajo.Phillip’s father helped broker a peace in the Padre Canyon Incident in 1899. This was when three white cowboys and county lawmen went off and killed two Navajo and one ranch hand was killed. This was on land that the Anglo cattle people moved into and were trying to take from the Navajo. Rev. Johnston acted as mediator between the Navajo and the authorities in Flagstaff. He promised the accused for Native American men that they would get an adequate defense.They surrendered and were brought trial at the Coconino County Courthouse in Flagstaff in September, 1900. On April 11, 1900 an indictment was handed down by the grand jury for the three surviving Navajos for the murder of Montgomery and the serious wounding of two of the posse members. U.S. Attorney for Arizona Territory Robert E. Morrison was assigned to defend the Navajo. He was assisted by E. S. Clark, an attorney provided by the Indian Rights Association of Philadelphia. District Attorney James Loy handled the prosecutionThe injured Navajo, Haastiin Biwoo Adini, addressed presiding territorial Judge Richard E. Sloan and Johnston's son, Philip, 9, translated the speech for the judge. Impressed with the Navajo's stature and words, Judge Sloan found all the Navajo men innocent. On Sept. 20, they were acquitted of all charges. They were acquitted in a town that was mostly made up of white ranchers and lumber people who had not looked favorably on the Indians prior to the trial. This gave the family, and Phillip, good will among the Navajo in the area.Here is Biwoo AdiniBelow 1904 picture with Biwoo Adini at far right with Rev. William Johnston next to him. Mrs. William Johnston is at far left with son Philip Johnston next to her on her right.The incident got national publicity. News went to Washington D.C. In October, Johnston and a contingent of interested parties, met with President Theodore Roosevelt. They carried a map showing where the Navajos lived and how long they could remember their ancestors being there. Philip Johnston translated the Navajo message for the president.The president issued an executive order on Nov. 14, 1901, setting aside the land between the Hopi reservation and the Colorado River and putting it into the Navajo reservation boundaries. These lands became known as the Leupp ExtensionIt was named in English for Francis E. Leupp who helped get the reservations lands increased in this area in 1901 (the the Leupp Extension). Leupp was a member of the Indian Rights Association, a former muckraking journalist, he was appointed Indian Commissioner by President Theodore Roosevelt in 1905. The Navajo name, , means “hair sack”. It was the Navajo name for a BIA official named Joseph E. Maxwell who was famous for his toupee.As a gesture of appreciation for Rev. Johnston's mediation efforts, Leupp residents invited him and his family to establish a mission settlement at Tolchaco, seven miles downstream from the present-day community of Leupp on the Little Colorado River. That is where Phillip spent the rest of his childhood.Phillip Johnston went the Northern Arizona Normal School,(now NAU). In 1918 he enlisted in the U.S. Army for WWI. He trained in Camp Fremont at Menlo Park, California and then went to France as part of the AEF. He might have heard about Comanches being used to talk on radios (not in code) in WWI France.After the war he went to USC and got a graduate degree in civil engineering degree in 1925. Then he worked for the city of Los Angeles water department.Here is Phillip JohnstonHe continued to keep contact with his Navajo friends both on the Navajo Nation and in the LA area. After the start of WWII and Pearl Harbor, Johnston heard of the American codes being broken. Secure front line radio communications quickly became an issue since many of the Japanese military were proficient at English and traditional codes were too slow and cumbersome for battlefield use and Japanese code breakers had success.He had the idea to use Navajo language. He was still fluent and knew that no one spoke it outside of America. He presented this idea to the Marine Corps. They asked for a demonstration. He recruited four Navajos who were working in the Los Angeles shipyards. By the end of the war, over 24,000 reservation Natives and another 20,000 off-reservation Natives had served. In addition, another 40,000 left the reservations to work in the defense industry.Here are some Native Americans in WWII.Philip’s idea at first was that Navajo language could be used unmodified to transmit military communications. Before the demonstration, after the four Navajo men got some sample messages, the Navajos said that the would need to use word and letter substitution methods to convey the messages. The men discussed it a while and came up with some agreed words.At the demonstration was Communications Officer Major James E. Jones, USMC at Camp Elliott (next to Camp Kearny, now Miramar) in San Diego and Pacific Fleet General Clayton Barney Vogel. The test was done by installing a telephone connection between two offices. Vogel wrote out six messages that were typical of ones during combat. One read "Enemy expected to make tank and dive bomber attack at dawn." This was transmitted as: "Enemy tank dive bomber expected to attack this morning." The remaining messages were translated with similar proficiency. It was done in a few minutes. The codes at the time took a long time with a code book on both ends. After the demonstration someone (it is not clear who) decided as coding system for Navajo had to be created instead of conversational Navajo.General Vogel was convinced and wanted to have the code made. He asked for the Marine Corps to recruit 200 Navajos. He was given authorization to recruit 30 for a pilot project. At the time, military field radios were not equipped with encryption/decryption technology. The enemy to listen to radio traffic. The Japanese were continually breaking the American codes, often with terrible results.In the letter above Vogel says they were the only "tribe that has not been infested with German students during the past twenty years. These Germans, studying the various tribal dialects under the guise of art students, anthropologists, etc., have undoubedtly obtained a good working knowledge of all tribal dialects except Navajo."Here is Phillip Johnston on a recruiting tour of the Navajo Nation in Oct 1942.Here are the first Navajos enlisting for the Code project 1942.Here is First 29 Code Talkers of 382nd Platoon after boot camp at Camp Pendleton in OceansideHere are some of the Navajo Marines at Camp Elliot where they worked out the Code.The first group of 29 that were recruited first did seven weeks of standard Marine recruit training (boot camp). The first all-Navajo Platoon 382 graduated from MCRD, SD on June 27, 1942. The Platoon was then sent to Camp Elliott for about eight weeks of basic communications training. In that time the men were to develop the code. Three more Navajo joined them. The men were guided by a cryptographic officer in the basics of employing letter and word substitution encryption methods. The 32 Navajo created the code.The names of the first 29 Navajo who used the code in battle are: Charlie Sosie Begay, Roy Begay, Samuel H. Begay, John Ashi Benally, Wilsie Bitsie, Cosey Stanley Brown, John Brown Jr., John Chee, Benjamin Cleveland, Eugene Crawford, David Curley, Lowell Damon, George Dennison, James Dixon, William McCabe, Carl Gorman, Oscar Ilthma, Allen June, Alfred Leonard, James Manuelito Sr., Chester Nez, Jack Nez, Lloyd Oliver, Frank Pete, Balmer Slowtalker, Nelson Thompson, Harry Tsosie, John Willfe Jr. and Yazzie William.The Navajo code had at its base a letter substitution code. A teaching code book was developed in San Diego, but it was never taken into the field. There was not code book to be captured. The Navajo had to memorize the whole code. Each letter in English had three possible English words that started with that letter. Then each word was translated into Navajo. For example, “A” was for ant, apple, or axe. That was translated into Navajo. In this example, “ant” was red ant = wóláchííʼ. “Axe” was tsénił. And “apple” was bilasáana. The words were randomly rotated for each letter. nahashchʼidí, shash, and tóshjeeh all translated to words that started with B in English (badger, bear, and barrel). The coders had to memorize 78 letter substitutions.Then, for some words, the translation being used was difficult to decide. For example one of the words for “D” was chʼįįdii. This is normally translated as ghost. It is the bad disease causing spiritual residue that remains on or near a person’s bones. It is a Navajo cultural idea. However, the coders used it for Devil=D. The others for D were bįįh=deer and łééchąąʼí =dog. Personally, I would have never guessed that a chindi stood for D.Then there were word substitutions to speed transmission. There were about 211 of these at first, and eventually 411 or so. For example, the word “submarine” was “metal fish”= béésh łóóʼ. A fighter plane was a “hummingbird”= dahiitįhii. For a Navajo speaker who did not know the code, and there were a lot of other Navajo on the military in WWII, the code sounded like a long list of words with no grammar or verbs. For non-Navajo the phonemes and tones are very difficult. For speakers of Japanese or English it is hard to tell where one word ends and hard to verbally reproduce or write down.The insertion of code words instead of letters in places made it a little harder. So one would need to know that "cha" (beaver) did not stand for B but was for a cruiser (naval ship). And then one needed to tell it from “chʼah” which means hat and was one of the words for H. The others for “H” were atsiighaʼ (hair), and łįį́ʼ (horse).After the creation and memorizing of the Navajo code, about half the men were assigned to the 1st Marine Division, and 16 were assigned to the 6th Marines and the 2nd Signal Company of the 2nd Marine Division. Three men stayed in San Diego to recruit and train Navajos to become code talkers. Around 400 learned and used it over the war, occupation of Japan and into the Korean War.On Aug. 7, 1942, the first Marine division hit the beaches of Guadalcanal with 15 Navajo Code Talkers. This was the first offensive move in the Pacific arena. The battle was the first where the Navajo code would be tested in actual battle. The Coder worked in teams of two on each end of the radio. One to work the radio and one to transmit the code.“ The Code Talkers successfully translated, transmitted and re-translated a test message in two and a half minutes. Without using the Navajo code, it could take hours for a soldier to complete the same task....the Code Talkers were used in every major operation involving the Marines in the Pacific theater. Their primary job was to transmit tactical information over telephone and radio.During the invasion of Iwo Jima, six Navajo Code Talkers were operating continuously. They sent more than 800 messages. All of the messages were transmitted without error.The Navajo Code Talkers were treated with the utmost respect by their fellow marines. Major Howard Connor, who was the signal officer of the Navajos at Iwo Jima, said, “Were it not for the Navajos, the Marines would never have taken Iwo Jima.” From the CIA website—Navajo Code Talkers and the Unbreakable CodeMost the Navajo had traditional ceremonies done for them. These ceremonies are designed to protect them physically, emotionally and spiritually. A study found that “surprisingly little evidence of serious psychological problems or combat fatigue among the returning Navajo veterans. On the battlefield, they carried medicine pouches containing an arrowhead and corn pollen. Most prayed in Navajo every day.Philip Johnston was not yet on active duty with the USMC and was not present during the creation of the code even though it was his idea. He asked the USMC to serve in the Navajo Code Talking Program as a Staff Sergeant. He then served as a school administrator for the "confidential" program and a recruiter with a Navajo man, Corporal John A. Benally. The next all-Navajo platoon to go through boot camp was Platoon 297 in March 1943.The work of the Navajo Code Talkers was not recognized until after the declassification of the operation in 1968. until then the men were not allowed to even tell their families what the had done in WWII. For a lot of the 400 men who were Code Talkers, this was hard because the were not allowed to say what they had done in the war, even to family members, until 23 years after it ended. As of 2019 there are 5 still alive.When we got out, discharged, they told us this thing you that you guys did is going to be a secret. When you get home you don’t talk about what you did; don’t tell your people, your parents, family, don’t tell them what your job was. This is going to be a secret; don’t talk about it. Just tell them you were in the service, defend your country and stuff like that. But, the code, never, never, don’t mention; don’t talk about it. Don’t let people ask you, try to get that out of you what you guys did. And that was our secret for about 25, 26 years. Until August 16th, 1968. That’s when it was declassified; then it was open. I told my sister, my aunt, all my families what I really did. —Chester Nez, Navajo Code Talker, National Museum of the American Indian interview, 2004President Ronald Reagan gave the Code Talkers a Certificate of Recognition and declared August 14 “Navajo Code Talkers Day” in 1982.In 2000, the United States Congress passed legislation to honor the Navajo Code Talkers and provided them with special gold and silver Congressional Medals. The gold medals were for the original 29 Navajos that developed the code, and the silver medals for those that served later in the program. A statement in the Navajo language on the back of the medals translates to: “With the Navajo language they defeated the enemy.” President Bill Clinton signed the law which awarded the Congressional Gold Medals. President George W. Bush presented the medals to the four surviving Code Talkers at a ceremony held in the Capitol Rotunda in Washington in July 2001.Oh, yes, I’m proud of it, particularly when I shook hands with President Bush in Washington three years ago. He gave me the gold medal. He shook hands with me and then afterwards I spoke. So I spoke in English and then when I got through with my speech I spoke in Navajo, it amounted to about 3 minutes. I said, “You Navajo people that are now on the reservation between the four sacred mountains, I want the people should thank you for using our sacred language. This language was given to us by the Holy People, I don’t know how many thousand years ago,” I said. “We use it for they, to help win for the United States.”—John Brown, Jr., Navajo Code Talker, National Museum of the American Indian interview, 2004Here are some of the remaining Navajo code talkers in 2014. In 2018 some of the Navajo Code Talkers who were still alive included Thomas H. Begay, John Kinsel, Sr., Peter MacDonald, Samuel Sandoval and Joe Vandever, Sr. There were eight alive at that time.Here, below, is Chester Nez (1921 – 2014). He was the last surviving man of the original twenty-nine Navajo Code Talkers and one of the Code creators. He was born in Chichiltah, NM (Chéch'il Łání). He was Dibéłizhiní clan (Black Sheep), and born for Tsénahabiłnii clan (Sleep Rock).He was sent to boarding schools, where he’d had his mouth washed out with soap for speaking Navajo. At BIA boarding school in schools, in Tuba City, Arizona, Nez was recruited into the Marine Corps. He was 122 pounds in 10th grade, and he barely met the minimum weight requirement for the Marines. The volunteers went directly into basic training without any goodbyes. Nez left behind his sister Dora, his father and his grandmother, who wouldn’t know he was fighting until two years after he left.He saw combat first in Guadalcanal. He said that sometimes, on the battlefield, he could hear the bells of the sheep back home and knew people there were praying for him. Nez wrote in his memoir, “Their prayers were carried across the miles as the pure, bright chime of the bells.” When a battle was over, Marines in their division got R&R while Nez and his fellow code talkers shipped off to another battlefields: Bougainville, Guam, Peleliu. He was at the Battle of Bougainville in New Guinea on November 3, 1943, and then Guam on July 21, 1944, and then on to Peleliu and Angaur in September 1944. He was honorably discharged in 1945.When the Code Talkers got out of the service, “they told us not to talk about what we did,” Nez said. The mission was top secret. He couldn’t talk about it even with other Marines with whom he served; not with his family, even after the war; not with the paper-pusher back home who, when Nez applied for a civilian ID card, smugly told the decorated war veteran that he still was not a full citizen of the U.S.From 1946 to 1952, Nez used the GI Bill to attend the University of Kansas in Lawrence, Kan., to study commercial arts. Nez also served in the Marine Corps Reserves and returned to combat in the Korean War.He worked as a painter for 25 years at a V.A. hospital in Albuquerque. Nez retired in the mid-1970s and moved back to Chichiltah to help care for his sister, Dora. In his later years he lived in Albuquerque with his son Mike, daughter-in-law Rita, and their children.In 2001, Nez was one of the four of the five living code talkers who received the Congressional Gold Medal from President George W. Bush. He died at age 93 of kidney failure.Nez's story was published in the 2011 memoir, "Code Talker: The First and Only Memoir by One of the Original Navajo Code Talkers of WWII," which he wrote with author Judith Avila.“Writer Judith Schiess Avila met Nez in January 2007 “through the friend of a friend.” Their friendship grew and he shared his story with her. Captivated by his story, she asked Nez to let her help him write his biography.“He kept saying to me, ‘What if it’s not interesting? I just did my duty,’” she said. “After thinking about it for a couple of days, he agreed to tell his story.”In an earlier interview with ICTMN, Avila said, “I think it was hard for him to talk about himself. [During our interviews] he often stopped and reflected: Was he building himself up? Was he being fair to others? Was he being accurate?”Here is the Navajo Code Talker monument in Window Rock, the capital of the Navajo Nation. The s
-
Can I use my CBSE 10th class mark sheet for an identity card issued by a recognized educational institution for a PAN card?
Digital Documents Now Valid. Here's All You Need To Know About DigiLockerDigiLocker is a platform for issuance and verification of documents and certificates in a digital format, thereby eliminating the use of physical documents. Indian citizens who sign up for a DigiLocker account get a dedicated cloud storage space that is linked to their Aadhaar or UIDAI number.DigiLocker is a cloud-based digital locker to save documents online. They are now be officially acceptedNew Delhi:The government, on Thursday, issued an advisory to all states to accept documents in electronic form. With the idea of paperless governance, and an aim to make life simpler for citizens, the government announced that documents such as driving license, car registration, voter ID, PAN card, school and college certificates, and many other documents issued by the government will now be accepted, when presented in digital form. These documents can even be used for photo ID purposes at airports and railway stations.DigiLocker, as the name suggests, is a 'digital locker' for citizens to securely save copies of all their documents.DigiLocker is a platform for issuance and verification of documents and certificates in a digital format, thereby eliminating the use of physical documents. Indian citizens who sign up for a DigiLocker account get a dedicated cloud storage space that is linked to their Aadhaar or UIDAI number.Government departments and organisations which are registered with DigiLocker can push electronic copies of documents and certificates issued by them, directly into the citizens lockers. Citizens can also upload scanned copies of their documents in their accounts. These documents can be electronically signed as well, using the eSign facility.Here is all you need to know about DigiLocker, and how to use it:Q) What is DigiLocker, and how does it work?A) DigiLocker is a digital locker facility provided by the government. It allows all Indian citizens to store scanned or digital formats of their documents. The technology used by DigiLocker is Cloud computing, where all citizens are given 1 GB (gigabyte) of storage space on a secure and private cloud account. DigiLocker is part of the government's Digital India initiative.The project was launched by PM Modi in 2015, when it had a beta version. It is now completely ready, with the government telling all states to start officially recognising it. It is aimed at reducing the need to carry physical documents, while also aiding in paperless governance.How the DigiLocker system worksQ) What are the benefits of DigiLocker?A) Some of the benefits offered by DigiLocker include:Citizens can access their digital documents anytime, anywhere and share it online for their ease and convenience. This helps in saving time, paperwork, and helps people get their work done on the move.It reduces the administrative overhead of government departments by minimising the use of paper, thereby making it a hassle-free and more environment-friendly way of getting things done.DigiLocker makes it easier to validate the authenticity of documents as they are issued directly by the registered issuers. Since documents are verified by the concerned departments, it helps a user get many other tasks done, for eg: documents required for various banking purposes, or at airports and railway stations, where IDs are needed.Self-uploaded documents can be digitally signed using the eSign facility (which is similar to the process of self-attestation of documents). Documents can thereby be shared as and when required, without it having to be manually delivered or collected.All physical documents can then be kept in the safety of ones home, minimising the chance of ever losing them, or damaging them.Here is a video showing how DigiLocker helps in our daily lives:Q) How can I open a DigiLocker account? What do I need?A) The DigiLocker facility is available only for Indian citizens. To open a DigiLocker account, you must have an Aadhaar card (Aadhaar number). To activate the account, it is mandatory to link your DigiLocker account to your Aadhaar (UIDAI) number.Q) Is my data (certificates and documents) safe in DigiLocker?A) The government assures that DigiLocker is completely safe, with some of the best security features available on date. DigiLocker allows only the user to access their data and documents. The user gets a secure and private cloud account, which is password-protected. Security measures also include a 256 Bit SSL encryption and mobile authentication based sign up process (with OTP facility). DigiLocker also comes with a 'timed logout', which means it logs the user out if the individual leaves it open and idle.DigiLocker follows the best industry practices, and keeps data 100 per cent private, allowing only the user to share details and documents with others. DigiLocker is ISO certified, and has an ISO-27001 certified data centre.Some of the main security features include:Standard Practices: DigiLocker follows standard software development practices of uniform coding standards, guidelines and reviews. Every release is reviewed and tested internally for security and penetration vulnerabilities before getting deployed on our servers.256 Bit SSL Encryption: DigiLocker uses 256 bit secure socket layer (SSL) Encryption for information transmitted during any activity.Mobile Authentication based Sign Up: DigiLocker uses mobile authentication based signup via OTP (one time password) for authenticating users and allowing access to the platform.Aadhaar Authentication based Issued Document Access: To receive issued documents from registered issuers, citizens need to authenticate themselves using Aadhaar's Biometric or Mobile OTP authentication service.ISO 27001 certified Data Centre: The application is hosted in a ISO 27001 security certified data centre.Data Redundancy: Data is backed up in secure environment with proper redundancy.Timed Log Out: To protect citizen's account from unauthorized access, our system is designed to terminate session automatically if extended inactivity is detected.Security Audit: The DigiLocker application has been security audited by a recognized audit agency and the application security audit certificate has been obtained.User Consent Based System: The data from DigiLocker is shared only with the citizen's explicit consent. All sharing and access activities are logged and conveyed to the citizen. Organizations that need access to citizens' certificates need to register on DigiLocker and seek explicit consent from the citizen.To know full details about the technical specifications of DigiLocker, please click here.Q) Who are the key stakeholders in the DigiLocker system?A) DigiLocker has three stakeholders. They are:Issuer: Entity issuing e-documents to individuals in a standard format and making them electronically available eg: CBSE, Registrar Office, Income Tax department, RTO (transport office), etc.Requester: Entity requesting secure access to a particular e-document stored within a repository (eg: University, Passport Office, Regional Transport Office, etc.)Resident: An individual who uses the Digital Locker service based on their Aadhaar number.Q) What are the main technology components of the DigiLocker system?A) The main technology components of the DigiLocker system include:Repository: Collection of e-documents that is exposed via standard APIs for secure, real-time access.Access Gateway: Secure online mechanism for requesters to access e-documents from various repositories in real-time using URI (Uniform Resource Indicator).DigiLocker Portal: Dedicated cloud based personal storage space, linked to each resident's Aadhaar for storing e-documents, or URIs of e-documents.To know full details about the technical specifications of DigiLocker, please click here.Q) What is the sign-up and sign-in procedure for DigiLocker? Can I link my Google or Facebook to DigiLocker?A) While signing up for a DigiLocker account, it is mandatory for a user to have an Aadhaar (UIDAI) number. A one-time password or OTP is sent to the users Aadhaar-linked mobile number, which they need to sign-up.For log-ins thereafter, a user can set a password of their choice, or link the account to their Facebook or Google logins. The choice of linking DigiLocker with Google or Facebook is given to every user, and is left to their discretion. It is not necessary to link them.Here is video explaining the sign-in and sign-up processes:Q) Can an NRI (Non Resident Indian) sign up using a foreign mobile number?A) No, it is not possible. You can register in DigiLocker using an Indian mobile number only.Q) Once I sign-up for DigiLocker, How can I get my eAadhaar linked with my account?A) Here are the steps to get eAadhaar in DigiLocker:Login to DigiLocker with your credentials.After logging into DigiLocker, you will see a dialog box with a message to get your eAadhaar.Click on "Click here" link.An OTP box will appear in the dialog.You will receive an OTP on your mobile number linked to Aadhaar.Enter this OTP in the OTP box and click "Verify OTP" button.On successful validation of the OTP you will be redirected to "Issued Document" page where URI for eAadhaar will be listed.Click on "Save" icon next to Aadhaar Card on "Issued Document" page. Your eAadhaar will be saved to "Uploaded Document" section.Q) Is DigiLocker only accessible through a web browser? Does DigiLocker have a Mobile App? What platforms is it available on?A) DigiLocker is available both for the web, as well as mobile. This means, a user can access their DigiLocker account both, from a web or mobile browser, as well as the DigiLocker Mobile App.The DigiLocker Mobile App (mobile application) is available on Google Play Store and iOS App Store. Click on the links in this answer, while on your mobile phone, to download the DigiLocker App.Q) What are the rules and amendments to use DigiLocker?A) To know all about the rules and amendments of DigiLocker, please click here. The first 8 pages are in Hindi. For English, please go straight to page 9.Q) How do I upload and e-sign documents on DigiLocker?A) Here is a video explaining the entire process of uploading and e-signing documents on DigiLocker:Q) How do I get documents issued on DigiLocker?A) Here is a video explaining the entire process of getting documents issued on DigiLocker:Q) What is DigiLocker integration with Ministry of Road Transport and Highways (MoRTH). What are the benefits of this integration for citizens?A) DigiLocker has partnered with the Ministry of Road Transport and Highways for making available digital driving license and vehicle registration certificates to Indian citizens. Under this partnership, DigiLocker is now directly integrated with the National Register, which is the national database of driving license and vehicle registration data across the country. Henceforth, DigiLocker users will be able to access their digital RC and DL both on desktop computers and on mobile devices.Here are the benefits of this integration:Paperless Services: Digital driving license and vehicle registration will minimize the use of physical documents.Authentic Records: Citizens can share the authentic digital certificates directly from the data source with other departments as identity and address proof resulting in reduction of administrative overhead.Spot Verification: The digital RC and DL in a DigiLocker account can be spot verified for authenticity either by validating the Digital Signature of MoRTH on the PDF copy of the document or by scanning the QR code on digital documents by using the QR scan facility on DigiLocker mobile app.Q) What is the process of getting my digital DL (driving license) and RC (registration certificate) in DigiLocker?A) For getting the digital RC and DL, users should ensure their Aadhaar number is linked with their DigiLocker account. Once this is done, they can go to the "Pull Partner Documents" section, select the issuer and document type and enter the document details asked for. This will allow them to fetch their document from the transport ministry database. Once the document is fetched, users can save a permanent link (URI) to this digital document in their "Issued Documents" section for later reuse.While fetching the transport ministry digital records in DigiLocker, your name in your Aadhaar card should match your name in the RC and DL database of the National Register. This ensures that only the rightful owner of the documents is able to fetch the digital DL and RC.Please click here to get a step by step demo for the process of getting the digital RC and DL.Citizens can get their Digital RC and DL on both desktop and on mobile devices (Android only at present, iOS coming soon.)Q) How can I be sure that the Digital RC and DL in DigiLocker is indeed coming from the transport ministry database? Are these digital records authentic and legally valid under Indian laws?A) The digital RC and DL in DigiLocker is digitally signed by Ministry of Road Transport and Highways. It is fetched in real-time directly from the National Register database and has a timestamp for record keeping purposes. This digital document is a legally valid document under the Indian IT Act 2000.Q) How can a CBSE Class XII student get access to their digital mark sheet on DigiLocker?A) DigiLocker has partnered with CBSE for issuing digital mark sheets to 2016 Class XII students. Students who have registered their mobile number with CBSE would receive their DigiLocker account credentials through SMS, while those who don't have their mobiles registered with CBSE would need to create a DigiLocker account with their mobile number, sync with their Aadhaar number and then pull their mark sheet from the CBSE databases.For step by step instructions on how to do this, please click here.Q) What are issued documents and what are uploaded documents?A) Issued documents are e-documents issued by various government agencies in electronic format directly from the original data source and the URI (link) of these documents is available in the issued documents section of DigiLocker. Whereas uploaded documents are those e-documents uploaded directly by the DigiLocker user.Q) What is the maximum allowed file size that can be uploaded?A) Maximum allowed file size is 10MB.Q) What type of files can be uploaded?A) File types that can be uploaded - pdf, jpeg & png.Q) What is the meaning of URI?A) A URI is a Uniform Resource Identifier generated by the issuer department, which is mandatory for every e-document of the DigiLocker system. This unique URI can be resolved to a full URL (Uniform Resource Locator) to access the actual document in its appropriate repository.Q) What departments under the government have linked themselves to DigiLocker so far? What advisory has the government given to the states to officially recognise soft copies (on DigiLocker)?A) Here is the letter or advisory that the government has issued to all the states to officially recognise documents of citizens uploaded or fetched on DigiLocker. The letter also lists all the government departments that have linked themselves to DigiLocker.
-
What mathematical realization most excited you?
I actually had 2 such events. The first was in Calculus 3 as an engineering student who, back in the 70s, had gone to a high school without any calculus program in high school. Cal 1 was tough for me and Cal 2 was a bit easier but about 2 weeks into Cal 3 - it was like I was instantly one with Cal 3. It was so fascinating to suddenly realize that I could create a math equation for any shape in 3D space and rotate it around a central line or around another line equation and make any 3D shape I could imagine. I started looking at all kinds of plastic bottles and imagining what the equation would be that would define that shape and if I used the same equation but a few thousandths of an inch inside of the first equation I could actually calculate the volume of plastic used in making the bottle. This was too cool. Instantly I started skipping class and still making 100s on all the exams. It was like the world of calculus just opened up before me.The second one was a few years later in Intermediate Partial Diff equations when the instructor spent the first 3 classes writing this massive equation that covered almost every square inch of the black board and he described every variable and every term in great detail. On the final night of this exercise he let us know what it was all about. It was his PhD thesis where he had modeled the population growth of the planet from the time of Noah forward in time. Each variable had covered everything you could think of from disasters to plagues to cures for the plagues to wars of every magnitude and the impact it had on the lost men in a society and the time delay before the birth/death ratio began to right itself. At that time, his model calculated the population to within 1% of the current population. As I reflected back on that it became clear - you really could write a math equation that represented anything BUT BUT BUT you had to concentrate very hard and think through EVERY aspect and every detail and test and retest your results. As computers have matured they do make the math easier and easier but they still cannot account for all the variables. They are still limited to exactly what data we feed into them.
-
How many people actually know (deeply) how computers work? Roughly how many people working in I.T. or programming know exactly h
I knew how computers worked down to the silicon. My bachelor's program taught us how transistors work. THen they taught us how those transistors are put together to form logic gates. They taught us how logic gates are used to do arithmetic operations. They taught us architecture of the 8080 microprocessor. They taught us von Nuemann architecture, and what goes on down to the level of the electron. They taught us how databases are designed and various data structures used in construction of a database. They taught us the TCP/IP stack down to the level of the protocols used at every level. They taught us how Operating systems are designed. They taught us how compilers convert programs to machine code. They taught us what the machine does with the machine code down to the signals being sent on each pin, and the state of each register when a particular command is sent This was all before we wrote a single line of code. I expect any decent bachelor's degree in Computer Science would cover this. So, I expect that every programmer who has a Bachelor's in Engineering to have this kind of knowledge. Engineers are suppossed to know how things really work, dammit!HoweverA lot of things have changed in the 20 years since I was in college. Microprocessors are quite different now. For one we had single core microprocessors. Multi-core microprocessors weren't even in the radar. I have a general idea of how threading works, but not to the level of the silicon. I know enough to get things done. There was no Wi-Fi back then. I have no idea how Wi-Fi protocols work at the level of the wire. I could explain to you how LAN protocols work, but Wi-Fi is a black box to me. I have a general idea of what it does, though. Enough to get things done.I have forgotten a lot of things. For example, I couldn't tell you the exact design of a NAND gate out of the top of my head. I can look up the resources online and teach myself everything again pretty quickly. I can safely say that I know more than most people I work with. Most programmers purge this information out of their heads when they start working. I also try to analyze the same program in different ways, going down to the level of silicon. There are very few people who do this that I know of.
-
How do I start a blog and what are the best blogging platforms available?
A lot of “marketing gurus” have been psignNowing that “blogging is dead.” The truth is that it’s not: blogging has simply morphed and changed into a much broader category. Where and how you start your blog has become very different than what it used to be.Challenges faced in bloggingThe reason why internet marketers say blogging “is dead” is because people are still spending time and energy writing blog posts on their personal website but not getting the organic traffic that they’re used to. There’s nothing wrong with having a blog on a personal website--I have one. But the problem is that nobody knows how to drive traffic to their site to read their writing in the first place. Nobody is doing the work to master the art of SEO, or Facebook dark posts, or Pinterest, or answering questions on Quora or anything else that can drive to their personal blog or website.Social networking as a blogThink about it: Starting a blog has never been easier with Snapchat, Twitter, Facebook, and Medium.Social media has become a new version of blogging. Take Twitter for example. Twitter was known flatout as a microblogging platform. Now people are using platforms like Facebook, Instagram, and Medium to get them more exposure than a just posting on a personal website does. As a matter of fact, I’m even asking people to write book reviews on Instagram for the #AskGaryvee Book instead of on their personal blog. My advice would be to try putting out native content on the platforms that make most sense for you and your audience. Then, start engaging with those who you think should see it.Driving Traffic to your BlogWhat has happened over the last decade is that the attention graph, the visualization of where people’s attention is right at this very moment and where can you meet them, is shifting. People’s willingness to jump somewhere to consume content is certainly not down, but their willingness to leave the platform they are already engaging on (Facebook, Twitter, Snapchat) is. To get them to click out, you have to be smart. Really smart.Jab,Jab,Jab, Right Hook - Being Smart about itSomething I’m really passionate about (and I’d like to think my book Jab, Jab, Jab, Right Hook helped with this) is that social shouldn’t be used purely for awareness. It’s true that that’s part of what social media is there for, and that’s great, and it’s fun to create “viral content”, but it’s massively naive for companies to ignore social’s DR and sales capabilities. I’m excited to see more and more brands throwing right hooks (which is to say going in for the ask) and treating social media as a way to funnel in viewers, and not just broad awareness platforms. It’s not about putting out as much content out there as you can. It’s about learning what drives your users. Find out what they care about and engage with them.Remember: Just because you jab and jab and jab, doesn’t mean you’re automatically going to drive audience members to your blog. It just allows you to have the audacity to drive them there. Putting out great content and see what resonates with your audience.To Sum it all up, while the term “blogging” has evolved to become more than just having a personal blog or website, don’t feel like you need to abandon traditional blogging. Instead, learn how you can use these social media to drive traffic to your site. Try engaging your audience using social media to really understand what drives your users. Start by putting out great content nuggets on the platforms that make the most sense for you and your audience. Test headlines, test out different syndication platforms. The bottom line is that you can’t just blog and expect people to come to you. The key is that you need to start engaging with those who you think should see it.
Trusted esignature solution— what our customers are saying
Get legally-binding signatures now!
Related searches to Encrypt eSign Presentation Later
Frequently asked questions
How do i add an electronic signature to a word document?
How to change password esign for pdf?
When i sign up for stuff with my e-mail address it keeps telling me it don't exsite or not valiod?
Get more for Encrypt eSign Presentation Later
- How Do I Electronic signature Massachusetts Plumbing Word
- How Do I Electronic signature Massachusetts Plumbing Word
- How To Electronic signature Massachusetts Plumbing Word
- How To Electronic signature Massachusetts Plumbing Word
- Help Me With Electronic signature Massachusetts Plumbing Word
- Help Me With Electronic signature Massachusetts Plumbing Word
- How Can I Electronic signature Massachusetts Plumbing Word
- Can I Electronic signature Massachusetts Plumbing Word
Find out other Encrypt eSign Presentation Later
- Printed circuit board worksheet imagesfedexcom form
- Page 1 of 5 concept bspecialb brisksb ltd wwwbspecialb brisksbbcob form
- Sample resident bed bug reporting form extension entm purdue
- Overnight guest form 2015 2016docx baruch cuny
- Date of lease form
- Albert j hamilton post 7 thanksgiving basket sponsor sheet form
- Acknowledgement of receipt of privacy noticedoc form
- Campbellsville university pre participation physical exam form
- Grant application amp guidelines south jordan form
- Dodea pacific substitute packet dodea form
- Lab 177 form
- Notice of divorce hearing the north carolina court system nccourts form
- Earnings garnishment packet bkansasb judicial branch home page kscourts form
- Aw8p booklet r 2017 2019 form
- Application for employment horseshoe bay resort form
- Metric measurement lab print version troy high school troy k12 ny form
- Buffalo concussion bike test bcbt instruction manual form
- Da 5513 form 2016 2019
- Omb no 3220 0138 form
- Talent consent and release form