₦airaland Forum

Welcome, Guest: Join Nairaland / Login / Trending / Recent / New
Stats: 1333425 members, 1958442 topics. Date: Saturday, 28 March 2015 at 01:18 PM

TheArbiter's Posts

Nairaland Forum / TheArbiter's Profile / TheArbiter's Posts

(0) (1) (2) (3) (4) (5) (6) (of 7 pages)

Politics / Rich Kid Buying Nigerian As A Toy Was A Hoax By Stuppid.com by TheArbiter: 9:36am On Feb 12
Credit to King A-Maz for the heads-up

Last month, a story ran about a rich dad from Atlanta buying a Nigerian as a toy for his 13 year old son, and our Nigerian blogs ran with it.

However the story is a hoax and was reported by Stuppid.com, a website notorious for its hoaxes and satirical news stories. They even went as far to post a supposed picture of the kid and the ‘toy’.

The truth is Stuppid.com is just a satirical site. They make up stories they deem funny and publish. They are not an actual news reporting publication. Other stories on the site are just as ridiculous, e.g Alabama Church Converting Insects To Christianity; Texas Woman Pregnant With Satan’s Baby; and so on.

Original silly story here
Programming / List Of Freely Available And Downloadable Programming Books From The Internet by TheArbiter: 1:11pm On Feb 08
Zaheer Ahmed compiled a list of freely available and downloadable Programming languages books. The list contains almost all the programming languages and technologies.

The books are free as in FREE while a few might require email registration.

Most are downloadable pdf's while others are web books.

Download, learn and share.

Page link here

1 Like

Programming / American Company Pays Nigerians To Learn Computer Programming by TheArbiter: 8:13am On Dec 19, 2014
Source/Credit: Wired

Company Pays Nigerians to Learn Computer Programming

Yetunde Sanni, Nadayar Enegesi (standing), Kosi Anyanwu, and other participants of
Andela’s female-only Boot Camp. Mohini Ufeli

Chibuzor Obiora was an out-of-work TV news anchor in Lagos, Nigera when he came across a curious link on Twitter: a company was offering money to people willing to take a course in computer programming.

For Obiora, it sounded too good to be true. “I was always interested in learning [to code] because of the problem solving aspect of it,” he says, “and here was a firm that promised to pay you to learn.” But it turned out to be a very real opportunity.

The company is called Andela. It’s based in New York City, and it pays Nigerians to learn programming skills before putting them to work on projects that serve businesses back in the States. After about four months of training, Obiora now works under Andela as a web development contractor for an (unnamed) U.S. based organization—all without leaving Nigeria.

The ultimate aim is to tap the vast pool of talent found in countries that aren’t exactly known as technology hubs, including not only Nigeria but other parts of Africa. “We know that brilliance is relatively evenly distributed across the human population,” says Andela co-founder Jeremy Johnson. “In terms of pure aptitude, there are genius level people across the world. But what there’s not is equal opportunity.”

‘We know that brilliance is relatively evenly distributed across the human population’

Today, U.S. tech companies aren’t shy about saying they have trouble finding programming talent. Critics argue this talent shortage has more to do with stinginess and selective hiring practices than a real lack of qualified programmers, but regardless of the reasons, the need is there. As a result, a new wave of services are working to train enormous numbers of new programmers.

The operations range from online tutorial services like Codecademy to the dozens of “code bootcamps” that promise to get people job-ready in a matter of months. Andela puts a new twist on the bootcamp idea by moving them overseas—and paying people to participate.

The Test
Johnson, who previously founded the online education company 2U, launched Andela earlier this year, alongside Christina Sass, who has a background in non-government organizations, Iyinoluwa Aboyeji, a Nigerian entrepreneur who previously co-founded the online education companies Bookneto and Fora, and Ian Carnevale, who was also a co-founder of Fora.

Blessing Orazulume and other participants of Andela’s female-only Boot Camp.
Mohini Ufeli

To find good students, Andela gives people like Obiora an online aptitude test that gauges their reasoning and logic skills. Then it interviews the top 10 percent, accessing their “soft skills,” such as interpersonal communication. Those that pass this phase go on to a several-month training program, not unlike the code bootcamps in the U.S. But not many make it this far. “It’s the most selective training program on the African continent,” Johnson boasts, saying the company only accepts about 0.8 percent of applicants.

Those who are accepted get access to educational resources that are scarce in Nigeria. One student, Tolulope Komolafe, says her computer science courses in university didn’t involve any actual programming. The teachers just wrote code on a chalk board. “During the first two weeks of training I discovered that I actually knew nothing about coding,” she says.

The Guild Analogy
Students who finish at least 1,000 hours of training are then eligible to work as web developers for Andela’s clients, but they continue to learn new skills. Johnson says most students will spend about two-thirds of their time working for clients, and the remaining time on education. All told, both the students and staff work about sixty hours a week.

“It’s very similar to the way that guilds worked in the middle ages,” Johnson says. “You get paid a small amount as an apprentice, then you work as a journeyman with lots of other craftspeople, and eventually become a master.”

Johnson says the company charges clients about half of what they would pay a domestic developer, and that students are payed a middle class income in their home countries throughout the program, including during the training period. But he declined to provide specifics. Obiora says that the compensation is fair and that it’s more than he made at his previous job as a news anchor at a local television station.

A New Kind of Off-Shoring
Offshoring development work is nothing new. But Andela does things a bit differently. Instead of its students handling a client’s project on their own, they work hand-and-hand with workers inside the client company. Obiora, for example, participates in his client’s Slack chat room, uses the same project management tools they do, and he’s part of the same email conversations that drive those projects. Like other Andela students, he works the same hours as his U.S. counterparts.

As for the quality of the work, Andela’s developers are on par with local junior-level web developers, says Scott Gerber, founder of Young Entrepreneur Council, an invitation-only organization for entrepreneurs under 40 that hired Andela to help build new features for its web-based member services. “I was skeptical at first,” he says. “I thought: ‘Outsourcing development? I’ve seen this before, I know how it turns out.’ But I can’t speak highly enough of them.”

He says that he prefers to hire locally, and that he does have many developers in the U.S. But ultimately, he can’t find enough coders. “It’s very difficult to get developers at the caliber we need at a price we can afford,” he says. “We’re a multimillion dollar organization, but we still can’t compete with Google or Facebook for hiring.”

Update 3:15 PM EST 12/18/2014: This story has been updated to include mention of Andela’s fourth co-founder, Ian Carnevale.
Programming / Create Your Team & Join The World’s First Global Virtual #hackathon by TheArbiter: 5:46am On Oct 28, 2014
Link Here

Developers of the World Let's Hack Together!

Traditional hackathons are all about the location and although we love the good old fashioned way of hacking together an awesome project, our browsers are now strong enough that distance is of no consequence when it comes to creating awesome projects. We can and should get together to write code and create awesome projects, regardless of where we are.

Welcome to the World’s First Global Virtual Hackathon!

This event is intended to connect developers across the globe and get them to code together irrespective of their locations. You will problem solve and build with old or new team members and try to win!
How does it work?

First, sign up using the simple form above. We will send you a short questionnaire that will help us understand a little bit more about you and your team’s background. We promise to keep it short and sweet.

Applications can come from individuals or teams of up to 5, however each team member needs to be a contributing team member (writing code or designing). If you are an individual who is selected and are looking for team members, post a message on the #hackathon channel on Koding. Your post should clearly articulate what type of skill set you are looking for and what type of skill set you have. e.g.: I am a nodeJS developer looking for a backend database team member. Once you get a response, jump into private chats on Koding itself to discuss your ideas and start recruiting!

How do I get accepted?

We expect a lot of you to apply but to keep things sane, we will be limiting the final competition to 1000 teams. Our panel of judges will decide who will be part of the competition. Their decision will be based on factors like location, team size, project work on github, social presence, etc. Applications are being reviewed on a first come first serve basis so apply today and if approved, you will receive an email from us with further instructions. We will also let you know if your application is not approved.

What is the theme for the Hackathon?

We will provide a few themes for the hackathon. Your task will be to use publicly available resources (APIs, data sets, graphics, etc.) and your imagination to create a project that addresses one of the the themes of the event. You can expect the themes to revolve around topics like: Global finance, Education, Healthcare, Climate change, Travel, etc.

On Nov 21st, the hackathon themes will be announced on the #hackathon channel on Koding. We will also email the themes to all teams that are accepted into the event.

What are the rules?

Our goal is to ensure that all teams have a level playing field; therefore it is imperative that all code, design, assets, etc… must be created during the duration of the event. No exceptions. You can brainstorm ideas prior to the event, however any assets or code used as part of your submission must have been created during the event. The only exception to this rule is the usage of publicly available material. This includes: public code snippets, images, open source libraries and projects, public APIs, etc. You get the picture.

We will request a review of all the code you submit as part of your hackathon project to ensure that it has been created during the hackathon period (Dec 6th - Dec 7th). Being engineers ourselves we are savvy to what can and can't be created in 48 hours. smiley

Play fair!

What are the prizes?

$10,000 cash prize from Koding, split amongst the top 3 teams ($5k, $3k, $2k each).
Winners will be offered credits for services like DigitalOcean, Tutum and many more!
Winners will be offered interviews with investors on our judging panel.

Who will eventually own the projects created?

You will retain full ownership and rights to your creation. Be super awesome and have fun! Get creative, meet new people, make new friends and problem solve with them.
What is the schedule?

Now - Registration open.
Nov 21st, 1200 PDT - Applications are closed. Final notifications are sent to teams/individuals who were accepted and the Hackathon Theme is announced (on the #hackathon channel on Koding and via email to the accepted teams).
Dec 6th - Day 1 Let the hacking begin!
Dec 7th - Day 2 of the Hackathon
0000 – 2200 PDT Hacking continues
2330 – 2359 PDT Teams submit their projects to hackathon@koding.com (see section below on how to submit)
Dec 10th - Winners are notified via email and winning projects are listed for public viewing.

What is the judging process?

Due to the large number of teams and potential hosting pitfalls that can come with, we request that each team submit their project using a Koding VM. Don’t worry, you don’t need a paid account. If you submit your project and your VM is turned off due to inactivity, we will turn it on for you.

Judging will happen in three rounds:

Round 1: All projects submitted for this round are distributed (ad-hoc) to our judges panel and they will evaluate it based on API’s used, complexity of solution, adherence to the theme, team size, geolocation of team, etc. Selected projects move to round 2.
Round 2: Teams reaching this stage will have their projects evaluated on stricter versions of the same criteria above and will be exposed to our entire judging staff. Each judge gets to assign points (1-10) and the top 10 teams scoring the most move to the final round.
Round 3: Judges meet (virtually of course) for a live call to discuss and pick the final 3.

How to submit your project

Send the following details to hackathon@koding.com

Koding VM URL where the judges can see your project.
A brief description of your project (not more than 250 words).
A brief introduction to your team members (who did what).
How your project addresses the theme of the hackathon.
What tools did you use to collaborate.

Your submission should have a time label less than Dec 7th 2359 PDT. Submissions received after the deadline will not be considered. No exceptions.
Politics / Re: Seun: Solution To Tribalism, Trolling, Etc With No Loss In Traffic by TheArbiter: 6:42pm On Aug 21, 2014
@CyberG --> The first practical solution to the issue i have come across on Nairaland.

@Seun ---> The rabid tribalism, ignorance and crass stupidity exhibited by some members are a big turn off and limits my visits and interactions to the barest minimum in recent times . Excuse me if i'm mistaken, seems i did mention (some time ago) something to the effect that you could take a look at Reddit and implement some of the good things in use there. Reddit implements an algorithm some what similar to what @CyberG noted above. However, even the Reddit ranking system is not perfect (i know 'cause i'm active there) but you could work out your own implementation with a little effort.

1 Like

Health / Re: Nano-silver Nigerian Ebola Drug Is A Pesticide- US by TheArbiter: 10:51pm On Aug 15, 2014
Link Here.

Is using nano silver to treat Ebola misguided? by Andrew Maynard

On Thursday this week, the Wall Street Journal reported that Ebola victims in Nigeria’s commercial capital Lagos will receive Nano Silver in an attempt to treat the infection. The news comes hot on the heels of the World Health Organization’s decision to sanction the use of unlicensed Ebola drugs in West Africa on ethical grounds. It also coincides with a US Food and Drug Administration statement released yesterday warning against fraudulent Ebola treatment products.

Is the use of nano silver a legitimate application of on unlicensed treatment, or cynical exploitation of a mounting humanitarian crisis? Having studied and written about the biological impacts of nano silver for some years now, I must confess I was surprised by the Nigerian decision.
Silver as an antimicrobial

Silver has been used as an antimicrobial agent for thousands of years – the Romans used to use silverware to reduce food and drink-borne infection. More recently, nanoparticles of silver have been used in everything from food containers to socks in an attempt to imbue them with microbe-killing properties.

When used in the right way, the material certainly does exhibit antimicrobial properties. But there’s a massive jump from odor-resistant socks to curing Ebola patients.

An Open Letter on Ebola Treatment to Nigeria’s President

The Nigerian decision to treat patients with nano silver seems to stem from an open letter to President Goodluck Jonathan from one Dr Rima E. Laibow.

As Dr. Laibow writes in her letter,

“There is, in fact, a well-established, non-toxic anti-microbial, without any known side effects, available at remarkably low cost which – • Requires no refrigeration • Is self-sterilizing. • Is readily available • Has a very long shelf life • Is not subject to degradation under temperature and humidity extremes. That nutrient substance is Nano Silver.”

Dr. Laibow is Medical Director of an organization called the Natural Solutions Foundation. And one of the products this organization sells is colloidal nano silver.

Colloidal Nano Silver

Colloidal nano silver – nanometer-sized silver particles suspended in water – has been used by people to self-medicate innumerable conditions for around a century now. Although there is no clear evidence that it has beneficial health effect at low concentrations, it can cause the disease argyria at high concentrations.

Nano silver has been on the radar of researchers and regulators for over a decade now as a substance that may be more toxic than originally thought. As a result, there has been an intense global research effort into its human and ecological toxicity in recent years. Studies have shown that nanoscale silver particles can be harmful if released into the environment in large quantities, and may possibly cause harm in unexpected ways in the human body under specific circumstances. Yet there’s been little published on the use of nano silver as a treatment for infectious diseases.

Despite this, Dr. Laibow writes on the Natural Solutions Marketplace website:

That is why we can say with confidence that Dr. Rima Recommends™ The Silver Solution (Nano Silver 10 PPM) has been shown to deal effectively with the Ebola virus.

In fact, every disease causing organism against which it has been tested, all around the world has been killed (bacteria, parasites) or inactivated (viruses) by this amazing solution.

How much do you need for yourself and your loved ones? Enter your email information and I will send you my Professional Protocol as my gift to you.

US Government Research on Nano Silver and Ebola

The source of Dr. Laibow’s optimism appears to be a 2009 presentation of research carried out by Janice Speshock and Saber Hussain at the US Air Force National Laboratory. A Powerpoint of this presentation has been declassified, and is currently doing the rounds on the internet.

The presentation reports on research into the effectiveness of silver nanoparticles in rendering hemorrhagic fever viruses like Ebola ineffective. The study was carried out using cell cultures, and a number of viruses and virus-like particles. It seemed to indicate that when the silver nanoparticles penetrated into cells along with the virus in sufficient quantities, they were effective at preventing the virus from being active once the cell had been exposed.

While it is impossible to interpret research findings from Powerpoint slides alone, the data do suggest that there are some unusual interactions between silver nanoparticles and Ebola-like viruses, although there are no data indicating whether similar interactions are also seen with other nanoparticles. More importantly, they do not indicate whether these same interactions would occur in an infected patient. They also do not indicate the quantity of silver nanoparticles someone wold need to take to render Ebola ineffective, or whether the necessary dose to have an effect would cause medical complications.

This presentation builds on previously published research by Speshock and Hussain that looked at Monkey Pox virus plaque formation inhibition by nano silver. Using cell cultures, the researchers found that nano silver and and silver ions were effective at reducing Monkey Pox Virus-induced plaques. However, they also concluded

“The present study demonstrates the feasibility of implementing the use, and characterizing the efficacy, of silver-based nanoparticles against [Monkey Pox Virus] infection in vitro. However, for nanoparticles to be used in therapeutic or prophylactic treatment regimens, it is critical to understand the in vivo toxicity and potential for long-term sequelae associated with exposure to these compounds.”

In 2010 Speshock and Hussain published research on the interaction of silver nanoparticles with Tacaribe virus. The research – published in the Journal of Nanobiotechnology – indicated that in cell cultures, the presence of silver nanoparticles increased the cell uptake of the virus, but also suppressed its activity once in cells. They concluded

“Due to the known toxicity of Ag- NPs [silver nanoparticles] in many human cell lines, and the short time limit of efficacy following infection, the Ag-NPs would likely make a more effective decontamination tool as opposed to an in vivo therapeutic agent. However, if the Ag-NPs do indeed facilitate the uptake of arenaviruses into the cell and inactivate the virus prior to cell entry, further studies should be performed to determine if Ag- NPs can prove to be an effective vaccine adjuvant.”

Speculative Studies and Clinical Use

These studies provide valuable insights into silve nanoparticle-virus interactions, and indicate that, with significantly more research, silver nanoparticles may have some role to play in preventing or managing infections. But the research does not support clinical applications at this stage. Even if there was proof that silver nanoparticles are effective in humans in suppressing viral activity (and there is not), there are critical questions over dose and delivery.

To be effective, there would need to be systemic uptake of nano silver within the body at doses that are sufficient to inhibit the Ebola virus, but low enough to prevent unacceptable harm. Currently, scientists have no ideas what an appropriate dose is.

Even if they did, it is not clear how the silver nanoparticles would be delivered. Taking the material orally – as would be expected of colloidal silver dietary supplements – is unlikely to be effective as silver nanoparticles dissolve in gastric juices. Nanoparticle uptake from the gut into the body is also very poor. Inhaling silver nanoparticles is likewise unlikely to lead to significant nano-silver distribution through the body. Which leaves direct injection of silver nanoparticles into the bloodstream – not an option to be undertaken lightly with an unproven and untested nanomaterial.

Given the commercial interests involved here and the paucity of evidence for nano-silver being in any way an appropriate treatment for Ebola, the wisdom of treating patients in Nigeria with the material has to be questioned on both medical and ethical grounds. There may be future treatments for infectious diseases that use nanoscale silver and other engineered nanomaterials. But this does not seem the time to be cynically jumping on the Ebola bandwagon to promote products that may offer false hope, but little else.

1 Like

Foreign Affairs / Re: Israel’s Mobile Missile Defence System: What Is The Iron Dome? by TheArbiter: 7:39am On Jul 18, 2014
Source Here

An Explanation of the Evidence of Weaknesses in the Iron Dome Defense System

Editor’s Note: Readerly response to a recent news story, “Israeli Rocket Defense System Failing at a Crucial Task, Expert Analysts Say,” where Ted Postol was quoted to say that Iron Dome was not effectively detonating warheads, was so negative, and angered so many people, particularly Israelis, that we asked Professor Postol to explain how he came to his conclusions and to show his data. He gracefully agreed. The following article represents his opinion, and is not necessarily the opinion of MIT Technology Review—and does not represent any collective assessment by MIT or one of its departments, labs, or centers. (That’s because we are editorially independent of the Institute.)


In the early weeks of July 2014 the conflict between Israel and Palestinians in Gaza has again flared up. This has resulted in a new round of large-scale rocket attacks launched by Hamas, operating from Gaza, against Israeli population centers. The last time such large-scale rocket attacks occurred between Hamas and Israel was in November 2012. During the November 2012 conflict a large number of photographs of Iron Dome interceptor contrails were observed in the sky. These contrails revealed that the Iron Dome interceptor rate was very low—perhaps as low as 5 percent or below.

This paper explains why the geometry of the contrails photographed in the sky indicates whether or not an Iron Dome intercept attempt had any chance of intercepting an artillery rocket target.

I will show sample pieces of data indicating that Iron Dome performance was very low in November 2012, and I will show similar data for July 2014, which indicates that Iron Dome performance almost a year and a half later has probably not improved.

At this time, collection of the data for July 2014 is still in progress. However, all the data I have so far collected indicates that the performance of Iron Dome has not improved.

One of the most demanding problems in intercepting an artillery rocket is that the interceptor must destroy the warhead on the rocket. If the interceptor hits the back end of the rocket, all that will happen is damage to the expended rocket motor tube, which is basically an empty pipe. Damaging the back end of the artillery rocket essentially has no effect on the outcome of the engagement. The pieces of the rocket will essentially fall in the same defendant area, and the warhead will almost certainly go on to the ground and explode. These facts mean that the only meaningful definition of a successful intercept is the destruction of the artillery rocket warhead. As will be shown in the discussion to follow, destroying the artillery rocket warhead is considerably more demanding than doing damage to other parts of the artillery rocket—or successfully damaging an aircraft, causing the failure of its mission.

Protecting a population spread over defended areas from the hazards of such missile attacks must involve protection against falling debris, which can cause serious injuries to individuals who are not in protective shelters.

As I will discuss later in this article, Israel does in fact have an extremely effective missile defense. That defense is the early warning system that tells people on the ground a rocket is traveling in their direction, and the shelters that are arranged so that individuals can easily get to protection within tens of seconds of warning. In an article referenced later in this paper, it is shown that during the bombing of London by V-1 and V-2 rockets, seconds of early warning vastly reduced casualties and deaths from individual attacks.

In the particular case of rocket attacks against Israel, the overwhelming number of artillery rocket warheads are in the 10- to 20-pound range, which makes the effectiveness of shelters even greater.

These two factors, the small size of the warheads, and the warning and sheltering system completely explain why there have been no casualties from the rocket attacks.

Assessing Whether or Not an Iron Dome Intercept Attempt Is Successful from Photographs of Iron Dome Contrails

I will first show why the Iron Dome interceptor must approach the target artillery rocket from a frontal direction. I will then show that the Iron Dome interceptor has, for all practical purposes, no chance of destroying the warhead on incoming artillery rockets if the interceptor engages the rocket from the side or from the back.

I will then present photographic evidence of contrails in the sky, indicating that Iron Dome interceptors were mostly chasing or engaging artillery rockets in side-on geometries.

I do not know why the Iron Domes were not engaging most artillery rockets using the proper front-on geometry. However, it is clear that the Iron Dome radar tracking and guidance system is not working, as it is initially sending Iron Dome interceptors to intercept points that then result in the interceptor not being able to achieve the right geometry for a successful engagement against the artillery rockets.

I will show photographs of contrails from November 2012 and from July 2014 indicating that the Iron Domes are still behaving erratically—resulting in continued very low intercept rates.

Assessing the Meaning of Iron Dome Contrails

To understand why the Iron Dome interceptor must approach the artillery rocket from a frontal direction, it is necessary to have a rudimentary understanding of the Iron Dome interceptor.

Figure 1 below shows a conceptual picture of a front-on engagement by an Iron Dome interceptor against a Grad artillery rocket. The blue dashed line emanating from the forward section of the Iron Dome interceptor depicts the line of sight of what is called a “laser fuse.” The purpose of the laser fuse is to create a beam of light that will reflect off the front end of the artillery rocket so that the interceptor can determine that the target artillery rocket is in the process of passing the interceptor. As can be seen from the diagram, the warhead in the Iron Dome interceptor is placed well behind the fuse assembly, a distance of roughly three feet from the laser-fuse aperture. This gives the fuse enough time to determine where the front of the target rocket is, estimate how long it will take for the front of the artillery rocket to pass parallel to the artillery rocket’s warhead, and detonate the Iron Dome warhead.

The timing delay is quite critical to many variables. It must account not only for the location of the target rocket’s warhead but also for the speed of the fragments from the Iron Dome warhead, the miss distance, the off-parallel orientation of the Iron Dome interceptor relative to the artillery rocket, and the high passing speed of the Iron Dome interceptor and the artillery rocket.

Figure 2 shows how the fragments move, under the assumption that the crossing speed of the Iron Dome interceptor and artillery rocket is about 1,200 meters per second and the fragments from the Iron Dome warhead are projected at about 2,100 meters per second perpendicular to the axis of the Iron Dome interceptor. Because the Iron Dome interceptor is moving at 1,200 meters per second relative to the artillery rocket, the additional crossing speed needs to be added to the 2,100-meter-per-second lateral velocity of the fragments. The net direction of the cloud of fragments, as would be seen if an observer were sitting on the artillery rocket, is shown by the pale blue arrow that passes through both the Iron Dome warhead and the artillery rocket’s warhead.

Figure 3 shows the outcome if everything works as intended. However, there is a range of possible outcomes where success is very likely, and beyond that range, the possibility of success diminishes drastically.

As can be seen from the arrow marked “1,500 meters per second” in figures 2 and 3, the higher crossing speed can result in a significant change in the net direction of the cloud of fragments. Thus, the fuse must determine the best time to detonate the warhead based on the crossing speed, the distance of the artillery rocket target as it passes by the Iron Dome interceptor, and the various fusing delays associated with detonating the Iron Dome interceptor’s warhead.

Because of the uncertainties in the exact crossing speed and crossing geometry, even a perfect fuse may fail to put lethal fragments onto the artillery rocket’s warhead.

In addition, unless the distance between the Iron Dome warhead and the warhead of the artillery rocket is small (roughly a meter or so), there will be a greatly diminished chance that a fragment from the Iron Dome warhead will hit, penetrate, and cause the detonation of the artillery rocket warhead.

Thus, a front-on engagement does not guarantee that the Iron Dome interceptor will destroy the warhead on the artillery rocket.

Figure 4 and figure 4A show the consequences of a failure in the fuse timing in what was almost certainly an engagement between an Iron Dome interceptor and the artillery rocket shown on the ground in the photos. As can be seen by inspecting the photograph in figure 4, there is significant damage in the area where the rocket fell. This damage was almost certainly due to the detonation of the rocket’s small warhead. Figure 4A shows the magnified front end of the rocket, where holes can be seen in the expended and empty rocket motor casing that was immediately behind the warhead. This photograph therefore shows an example of what might have been a successful Iron Dome intercept attempt.

In this case, it is nearly certain that the artillery rocket was engaged by an Iron Dome interceptor that was properly approaching the artillery rocket front-on. Unfortunately, the timing commands from the fuse resulted in fragments from the exploding Iron Dome warhead hitting the artillery rocket after the warhead had passed. The relatively low density of holes in the artillery rocket’s afterbody suggests that the encounter also had a relatively high miss distance—possibly several meters.

This photograph illustrates how even when the Iron Dome interceptor is in a proper front-on trajectory, it can still fail to destroy the warhead of a target artillery rocket.

Figures 5, 6, 7, and 8 show detailed vector diagrams that indicate how the Iron Dome interceptor would perform if it engaged an artillery rocket from a variety of directions. In these diagrams the speeds are shown in feet per second, rather than the meters per second used in figures 1, 2, and 3.

Figure 5 shows a nearly front-on engagement direction (again, note that all the vector speeds are now in feet per second). A careful review of the geometry of the engagement will reveal that even a moderately skewed off-frontal direction of approach will drastically reduce the chances that fragments from the Iron Dome warhead could be sprayed onto the warhead of the artillery rocket. This therefore shows that the front-on geometry is very sensitive to small off-frontal errors that could be the result of faults by the master control system in the guidance and control of the Iron Dome interceptor.

This particular diagram (figure 5) demonstrates how important it is for the the master guidance and control system to place the interceptor in the right location before it begins the actual homing process against a target artillery rocket

Figures 6, 7, and 8 show detailed vector diagrams for interceptor engagements that approach the target artillery rocket from the side or from the back. A careful inspection of the geometry of the fuse-sensing beam and the spray pattern of the fragments from the Iron Dome warhead show that there are two very serious problems with these kinds of engagements.

First of all, if the fuse detects the artillery rocket, it has no way of determining where the warhead is on the artillery rocket. Second, it is nearly certain that even if the fuse detonates by chance at a time when the warhead might be in the spray pattern of the Iron Dome warhead, the distance between the Iron Dome warhead and the artillery rocket warhead will in almost all circumstances be very large, resulting in a very low density of fragments at the location of the artillery rocket warhead. Given the small number of fragments that can be dispersed by the Iron Dome warhead, this translates into a very high chance that no fragment will hit the warhead. Making matters even more difficult, the projected area of the warhead is very small, since it will be encountered from the front or back rather than from the side. Moreover, fragments are very likely to hit metal surfaces that are at very low grazing angles relative to the direction of the fragment motion. This will result in fragments’ tending to bounce off the shell or transmit almost no energy to a target. Hence, figures 6, 7, and 8 show that for all practical purposes, the probability that the Iron Dome interceptor can destroy the warhead of the engaged artillery rocket is essentially zero.

What does the data show about Iron Dome’s performance in November 2012 and July 2014?

Figures 9, 10, and 11 show contrails in the sky that indicate that Iron Dome interceptors were attempting to engage target artillery rockets either by chasing them from behind or by attacking them from the side.

The geometries of the engagement are easily established because the artillery rockets are falling at high elevation angles relative to the ground—perhaps 60 to 70 degrees relative to vertical. This reëntry angle is due to aerodynamic drag, which slows up the artillery rocket and eventually causes it to fall at a relatively steep angle.

Figures 12 and 13 show photographs that are supposed to have been taken in July 2014. I have found photographs from November 2012 that have been mislabeled as being from July 2012, so I am in the process of verifying that photographs collected were actually taken in the stated time frames. These two photographs have checked out as being from July 2014.

Figure 14 shows a very rough estimate based on my observations in November 2012, when I saw perhaps no more than 10 to 20 percent of Iron Dome contrails that indicated an engagement geometry that was front-on.

As shown in the performance “guesstimate,” if we assume that the engagement geometry and 20 percent of the engagements were front-on, then at that time I estimated the probability of destroying a SCUD warhead might be between 0.3 and 0.6. Thus, if all other engagements effectively resulted in a zero probability of intercept, then the intercept rate would be roughly

0.2 × (0.3 or 0.6) = 0.06 to 0.12

That is an intercept rate, defined as destruction of the artillery-rocket warhead, of between 6 and 12 percent.

My best estimate is that fewer than 20 percent of the engagements I was able to get data on were actually front-on, and I have no information about the actual miss distances or whether the engagement-attempt geometries were close to antiparallel. Thus the statement that the intercept performance of Iron Dome appears to be probably 5 percent or less.

A sample of such a calculation is shown in figure 14.

Why Are Israeli Casualties from Rocket Attacks so Low?

An article published in the journal Nature in 1993 addressed the debate over the performance of the Patriot missile defense in the Gulf War of 1991. At that time, the same questions were being raised—why was damage so low, and why were there so few casualties? (All reports now indicate that there was only one casualty from the direct effects of the SCUD attacks. This casualty was caused by a Patriot missile that dove to the ground in an attempt to intercept a SCUD missile.)

In the case of the SCUD attacks, there were many fewer rockets launched at Israel (perhaps around 40), but the warheads on the missiles were much larger—about 500 pounds. Nevertheless, many SCUD warheads fell in open areas, doing relatively little damage. In cases where warheads fell near buildings, the civil-defense measures essentially protected the population from the consequences of the SCUD impact.

Figures 15, 16, and 17 show damage in Israel from artillery rocket attacks during November 2012 and July 2014. As can be seen by inspecting the photographs, even when the rockets happen to hit buildings, the damage tends to be quite localized. This does not mean that individuals in the area of the rocket attack would not be injured or killed if they were close enough to the impact site, but it is very clear that the warheads are not of sufficient size to cause casualties or deaths to those who are properly sheltered.

In contrast, figures 17 and 18 show the results of bomb attacks in Gaza in July 2014. The exact yields of the bombs are uncertain, but it appears they are probably in the 1,000- to 2,000-pound category. In these cases, attempts at sheltering the population might well fail, as few shelters can sustain the level of damage that could be inflicted by such large bombs.

So again, this illustrates that the small size of the artillery rocket warheads and the ability to quickly warn populations of these arriving small warheads is an extremely capable defense that works far more effectively than Iron Dome.

Theodore Postol is Professor of Science, Technology and National Security Policy in the Program in Science, Technology, and Society at MIT.









Science/Technology / A Scientific Breakthrough Of 2013: The Real Reason Why We Need Sleep by TheArbiter: 2:18pm On Jan 03, 2014
Scientists discover the first real reason we need sleep:

The image above, from Xie et. al in Science, shows how when mice sleep, fluid-filled channels (pale blue) between neurons expand and flush out waste.

We know we need to sleep. We know our brains and bodies work better after sleep. But what we didn’t know, until now, was why.

Scientists have just reported the first major mechanical reason our brains need to sleep — certain cleaning mechanisms in the brain work better when we shut the brain down.

Just like how dump trucks take to the city streets during the pre-dawn hours because there’s less traffic, our brain’s cleaners also work best when there’s less going on.

“This study shows that the brain has different functional states when asleep and when awake,” study researcher Maiken Nedergaard, of the University of Rochester said.

“In fact, the restorative nature of sleep appears to be the result of the active clearance of the by-products of neural activity that accumulate during wakefulness.”

We’ve known that our brains consolidate memories during sleep and perform other important functions.

There are also benefits to the body during sleep — resting allows our muscles, bones, and organs to repair themselves.

It also keeps our immune system healthy.

We know that sleep has all of these benefits, but until now we didn’t know any of the specific changes that bring about these sleep benefits.

Charles Czeisler, a sleep researcher at Harvard Medical School in Boston, told Science Magazine’s Emily Underwood that this is the “first direct experimental evidence at the molecular level” for why we need to sleep.

The paper was published in the journal Science on Oct. 17.

Toxic cells

All of our cells accumulate waste while they are working, and these waste products can be toxic. If they aren’t removed they can build up and kill our cells. Throughout the rest of the body the lymphatic system washes these waste products away, but the brain is cut off from these actions because of the blood-brain barrier.

When the brain is sleeping, channels between cells grow. This allows cerebrospinal fluid into the depths of the brain tissues to flush out toxic proteins that build up during the day, including the kind that are responsible for neurodegenerative diseases like Alzheimer's.

The image above, from Xie et. al in Science, shows how when mice sleep, fluid-filled channels (pale blue) between neurons expand and flush out waste.

Credit Here.
Celebrities / Miley Cyrus Twerking Has Its Origins In Africa by TheArbiter: 12:37pm On Jan 03, 2014

These images of Miley Cyrus above do not depict the act of twerking.

Unfortunately, though, she is up for TIME's "Person of the Year" award, supposedly for her "twerk-filled performance at the 2013 MTV Video Music Awards," which "set off a chain of memorable entertainment moments."

But here's the thing: She's never actually twerked at all. And even if she had, there is a slim chance she understands the African roots of the dance that she's come to so shamelessly own.

Twerking is a complex and challenging dance move that originated in West Africa in the 1990s. It does not involve simply bending over and shifting your booty from left to right. As Christiana Mbakwe wrote, "It takes tremendous skill and attention." Shannon Givens, 25, said that it's extremely difficult to master. "Cold fact. Miley Cyrus is not twerking. She is moving side to side."

Real twerking looks something like this:


It seems like a new trend, but it's been around for awhile. In the book Playing with Identities in Contemporary Music In Africa, author Simon Akindes writes that twerking has its roots in West Africa. In the Ivory Coast, it's known as mapouka, and and they've been dancing it since 1997 (at the latest), when it hit the dance and music scene. The government temporarily baned the dance from all media, deeming it too provactive. The ban was lifted in 1999 when a new government took power.

The New York Times wrote back in 2000, "Banned from Ivoirian television — chased away by officials in neighboring countries like Togo, Niger, Burkina Faso and Benin — mapouka spread nevertheless along the West African coast, from Dakar to Kinshasa, in the last couple of years. The dance — which focuses on, though is not limited to, the surprisingly difficult act of wiggling one's buttocks without moving one's hips — also became an endless source of discussions and newspaper ruminations on culture, sex, women and men, especially here in the Ivory Coast."


Givens, who lives in Harlem and is studying at Long Island University's school of public health, was born and raised in the Sumner, Mississippi. She said that twerking migrated from West Africa into Caribbean culture before making its way to the American South, where it mainly picked up in Atlanta and among the Louisiana Bounce music scene.

Mbakwe wrote, "I’ve seen variants of twerking my entire life. I remember watching the elderly women dance at the predominantly West African church I attended growing up. If the right 'praise' song was sung, they’d grab a white handkerchief and dance their way to the front of the church. They’d rotate their hips and bounce their bums until they were barely above the ground."

The dance is inextricably intertwined with music. In the book The Modernity Bluff: Crime, Consumption, and Citizenship in Cote D'Ivoire, author Sasha Newell claims that mapouka has its own musical genre.

In modern day American music, praisings of booty shaking are endless.

The band Queen declared that "fat-bottomed girls make the world go 'round." Rapper Mos Def dedicated his song "Ms. Fat Booty" to a woman whose posterior he praised for being "so fat that you could see it from the front." Eminem, in "Ass Like That," described — quite viscerally — his physical reaction to a seeing nice round behind. And who could forget, "Girl, shake that laffy taffy?" Sir Mix-a-Lot does not even need to be quoted; we know what he likes, (and he cannot lie.)

Women, too, are proud of their voluptuous behinds and understand their power. Beyonce coined the term "bootylicious," warning men that they weren’t ready for all her "jelly," and Fergie claimed that her "hump, [her] lovely lady lump" could get a man "love drunk."

The cultural ties to music and dance are undeniable, but a deeper look at the move reveals that its popularity has scientific roots as well.

Biologist Alfred Kinsey argued that a man’s passion for a woman’s rear end comes from the fact that the female buttocks is the primary visual feature during sex for primates, our close ancestors, who do the deed "doggystyle." Dr. Lionel Tiger, anthropology professor at Rutgers University, said, "The posterior view implies a level of intimacy." On the the pelvic rotation of the twerk, he said, "Primates like to see objects move." He believes that twerking is a way for the woman to signal to a man that she is primed for sex. "It’s very literal. We’re animals."

Another explanation is that voluptuous rear ends are a female-specific trait. They result from estrogen, which encourages the girl’s body, after puberty, to store fat in the hips and the butt, giving us girls all that "junk in the trunk" and "all that ass inside them jeans," to use Fergie’s poeticism. It’s a certain type of fat, though, containing adipose tissue, which stores energy for reproduction. Devendra Singh, a professor of psychology largely known for his work regarding the science of human attraction, wrote that — whereas a woman assesses a male’s desirability as a mate based on his control over resources — "physical attractiveness [for males] is largely a reflection of reliable cues to a woman’s reproductive success."

So a curvy behind signals to a male that the female is able to get pregnant, carry to term, and successfully lactate in order to feed the baby, hence, helping the male’s offspring survive. (What would Darwin say about twerking?)

This might explain why the New York Times wrote that in the Ivory Coast, "As young women sought to outperform one another, a large posterior became de rigueur." The dance "made plumpness fashionable even among Westernized young women who had toyed with slimness."

Twerking incorporates global cultures and histories, the freedom of sexual expression, and the evolutionary science of attraction. It transcends cultural boundaries and time periods.

It's too bad that it's been reduced to a Miley Cyrus joke. Especially when she wasn't even twerking to begin with.

Credits: Here.
Computers / Re: How Do I Recover My Lost Folder On External Hard Drive: Help by TheArbiter: 8:06pm On Dec 29, 2013

Try GetDataBack. It has both FAT and NTFS (file system) versions. It can recover files even from formatted drives with its 4 step process. Its disadvantage: it requires time to scan the drive on first use.The bigger the drive the longer it takes.

PM me if you cant get it and i'll see what i can do.

1 Like

Webmasters / Re: When And How To Deploy HTTPS For Web Pages by TheArbiter: 12:14pm On Dec 27, 2013
@ Love Decay

Did you you really read it through. In summary its a when and how scenario for DEPLOYING https and not detailed a explanation on installation.

Pertaining to SSL certificates, i posted a detailed step-by-step guide on how to obtain STARSSL certificates some weeks ago but an overzealous mod/bot, for an unknown reason, decided to deny potential webmasters access to the info by censoring it completely. A webmaster confidentially insinuated it may have been censored because most are unaware such a free service exist and a few are making pecuniary benefits from the ignorant.

So due to the current climate of mods censoring info at will, even if it does not violate posting guidelines, i dont think i will go to the trouble of posting detailed guides for some time.
Webmasters / When And How To Deploy HTTPS For Web Pages by TheArbiter: 6:54am On Dec 22, 2013
Guide Credit to EriK: http://erik.io/blog/2013/06/08/a-basic-guide-to-when-and-how-to-deploy-https/

Many web developers know about SSL, but it is very common to see it only partially deployed, or not deployed where it should be. This basic guide on when and how to deploy SSL will help you avoid the most common mistakes.

Key points

If you have any kind of confidential information, or if you have logins, even if they are just for admins, you should deploy HTTPS. The risks are not theoretical.

Never deploy HTTPS partially: use it for all content, or many risks are left open, like the interception of session IDs, which is almost as good as passwords.

When you deploy HTTPS, enforce all requests to be served over HTTPS, by redirecting any plain HTTP requests to HTTPS URLs.
Enable strict transport security (HSTS) to further reduce the opportunity for attacks.

Set the secure flag on your cookies, like the session cookie, to make sure they don’t leak out through plain HTTP requests.

What is HTTPS?

HTTPS refers to the layering HTTP on top of SSL/TLS. The end result is that the HTTP traffic, including requested URLs, result pages, cookies, media and anything else sent over HTTP, is encrypted. Someone interfering with the connection can neither listen in on traffic, nor change it. In addition to simply encrypting, the identity of the remote server is verified: after all, having an encrypted connection is a lot less useful if you don’t know who’s at the other end. The end result is that it becomes incredibly difficult to intercept the traffic. It might still be possible to know which websites a user is visiting, but no more than that.

When and why should I deploy HTTPS?

You should deploy HTTPS whenever your website has any kind of non-public information. That includes any website that has logins – after all, if it were public information, it would not need a login. It also includes logins only used by administrators, like in your typical Wordpress website.

You should deploy HTTPS because without it, even someone doing passive eavesdropping, i.e. just listening to the network traffic and not manipulating it, can read along with all HTTP traffic, including any passwords or authentication tokens.

This is not a theoretical attack. I have done this myself (with permission) several times – this is particularly easy on public hotspots. Public hotspots typically apply no wifi encryption, which makes it trivial to eavesdrop on all traffic. This is a very common setup in bars, hotels, trains, and other public places. In other words, if your users sometimes use your website from a public hotspot, and you do not use HTTPS, anyone in the vicinity can listen in on all their traffic. This isn’t the only case where eavesdropping might happen, but it is a very easy one.

What if I just use HTTPS for my login page?

No. Using HTTPS just for the login page will prevent your user’s passwords from being eavesdropped, but this is only part of the problem.

First of all, the less HTTPS on your website, the easier it becomes to do active interception: your login link might point to an HTTPS URL, but if I change that link before the user clicks on it, it will not help you. But, using HTTPS partially also leaves risks open for passive interception.

Verifying a username and password is only one part of authenticating users on the web: we also need to remember that a particular user was authenticated, and which account they authenticated with. The most common method is session cookies. Typically, this means the browser stores a long random string, the session ID, in a cookie. PHP for example, uses the PHPSESSID cookie for this. A database on the server side then knows that that random string belongs to a particular session, in which a particular user authenticated himself. If I somehow acquire the session ID of your session, after you login, I acquire all permissions you have: almost as good as having your password.

Knowing this risk, the session ID is very long and random, and has a limited lifetime, meaning I can’t just guess it: this is what makes it safe enough. But, due to the way cookies work, the browser includes the cookie in every request it makes to your website. So even long after login, every page I request, even if it is usually public, will result in my session cookie being sent by the browser. And if someone is eavesdropping at that point, they can still compromise my account.

The same can happen when you only place the administrator part of your website behind SSL: when you log in and later visit the non-SSL public part, the browser will still be sending the session cookie.

In short: as session cookies, which allow access to the user’s account, are sent in every request, simply securing the login page is absolutely insufficient.

How do I enable HTTPS properly?

Enforce HTTPS usage

Some websites buy an SSL certificate, configure it on their web server, and assume they’re done. But that just means you enabled the option of HTTPS – which users are unlikely to notice. To make sure everyone benefits from your HTTPS support, you should redirect all requests that come in on HTTP, to HTTPS. That means any user visiting your site will automatically be switched over to HTTPS, and from that point on their traffic is secure.

This still leaves a small gap: the first time the user makes a request to your website, they will use plain HTTP, and they may already transmit confidential information at that time. It also leaves a small man-in-the-middle hole open.

Strict transport security

For further tightening, enable HTTP strict transport security (HSTS). This is a special header that can be sent by the server, which indicates: for a defined time period, you must not access this website over plain HTTP, or access it over HTTPS when it has a dodgy certificate. Optionally, subdomains can be included as well.

It’s a simple server header, and trivial to configure. Note though that there is no way to revert the setting before the max-age has expired, so don’t make it too long. You use HSTS next to an HTTPS redirect, not in place of it.

Secure cookies

Cookies, including the session cookie, have an optional flag called secure. This basically means: “never send this cookie over a plain HTTP connection”. Enable this flag on your cookies, and they will not be sent with the HTTP request the browser does initially – but only once the connection switched to HTTPS, and can no longer be eavesdropped.

Can I just deploy SSL for authenticated users?

No. Once you’ve followed the guidelines above, at the moment a user makes a plain HTTP connection, you do not know whether they are authenticated. That’s the whole point: they should not transmit any secret information, like their session cookie, until they are on SSL.

Although I can imagine some ways to work around this, they might break at some point. As the cost of SSL is really quite low nowadays, it’s not worth it.
Politics / Re: Jonathan Launches First Nigerian-Built Drone by TheArbiter: 10:28am On Dec 18, 2013
Talking about drones. If this is a real drone

What do we call this?

My opinion: The officer who orchestrated this charade needs to be court martialed. Why ridicule your Commander-in-Chief with the commissioning of a mere prototype toy that can purchased in average toy stores abroad for a few dollars. A responsible serious weapons development section of the Air force, everywhere in the world, tasks a President to commission a fully operational vehicle and not a toy prototype.

Honestly, why did Prez Jonathan agree to this charade in the first place.
Education / Re: FG Pays N200b To CBN For ASUU by TheArbiter: 3:36pm On Dec 04, 2013
ASUU Strike: Presidency lied against ASUU, By Nasir Fagge

The letter from the Government, signed by Dr. Mac John Nwaobiala, was delivered at ASUU National Secretariat on 6th November, 2013. ASUU had made it clear to Government through the Minister of Education, and at the meetings held with Government’s representative, that our Union does not have an EXECUTIVE PRESIDENT who has the power to decide for the Union on crucial matters, including and especially on trade disputes and strikes. Similarly, the internal democracy of our Union does not permit the Principal Officers to make decisions on Union matters of trade disputes without advice from the National Executive Council. Allowing branches to meet, advise and take positions is the only way we know how to run a democratic organisation.

2. The content of ASUU’s reply

Here is the relevant portion of ASUU’s reply to government’s letter, as contained in Union’s letter of 22nd November, 2013 signed by Nasir F. Isa, President of ASUU:

“On behalf of NEC I hereby convey the Union’s appreciation of the expressed concern of Your Excellency to bring an end to the crisis occasioned by the poor implementation of the 2009 Agreement and the 2012 Memorandum of Understanding (MoU) arising therefrom through your personal intervention.

NEC would have taken a definitive decision on ending the strike, especially in view of Your Excellency’s intervention but for certain uncertainties, the clearance of which would have been decisive in making the relevant decision. These uncertainties involve issues on which ASUU members nationwide have strong feelings. They are about certain gaps evident in Government’s report as presented to our Union.

Specifically, our members are requesting that Your Excellency facilitates the resolution of the issues as a way of concretising their understanding of the agreed positions. This will involve the following:

(a) That the N200 billion agreed upon as 2013 Revitalisation Fund for public universities shall be deposited with the CBN and disbursed to the benefitting universities within two weeks.

(b) That the renegotiation of the 2009 Agreement in 2014 be included in the final document as agreed at the discussion with Your Excellency.

(c) That a Non-victimisation clause which is normally captured in all interactions of this nature be included in the final document and

(d) That a new Memorandum of Understanding shall be validly endorsed, signed by a representative of government, preferably the Attorney General of the Federation and a representative of ASUU, with the President of the Nigeria Labour Congress (NLC) as a witness.

Your Excellency please be assured that the Union is willing to do all that is needful to resolve the lingering crisis as soon as the expressed observations of our members are addressed.

Thank you

Yours in the struggle

Naisr F. Isa, Ph.D

Software/Programmer Market / Gamemaker Studio Standard Edition Is Free For A Limited Time by TheArbiter: 7:45am On Nov 27, 2013
By Russ Boswell

Source Link here

Have you ever wanted to design a game? It's a difficult process, just ask anyone who has ever stepped foot into the business, but that doesn't mean you should give up on your dreams of porting something to the masses. There are a lot of useful tools out there that can help you breath life into your gaming ideas, but some of them will set you back quite a bit, and some are complex and difficult to maneuver.

GameMaker Studio from YoYo Games is not a traditional tool, but is instead an easy-to-use program that can help you quickly create two-dimensional Indie-style games. The best part? You can get it for free.

You're not going to crank out a AAA-title with this creator, but you'll "get a feel" for game design, and you can have a fully-functioning game within weeks according to the company's website. This is a great place to learn the process, and there are hundreds of tutorials online that can help you use GameMaker like a pro.

GameMaker Studio: Standard Edition would normally set you back around $50, but YoYo Games is giving would-be developers a free copy of their popular tool for a "limited time." To get yours, you'll need to go to the following page and download the free edition of the software. Once downloaded and installed, a box will pop up asking you which "update stream" you want to use. Choose the beta stream, and let the program update itself. Once it's all finished you'll be able to upgrade to the Standard Edition, and will be sent an activation code.

We don't know exactly how long this offer will be around, so be sure to secure your copy ASAP.
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 4:20pm On Oct 04, 2013

This is definitely not a campaign thread. If i were a moderator, i would have censored your statements and that of @Dike Chimezie. Isn't there a motivation or inspiration that made millions of youths to vote for the current President in office?

Thats what i'm interested in learning.
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 3:58pm On Oct 04, 2013
@Dike Chimezie
And what if i may ask would be the motivation or inspiration for the enmasse voting; governance deliverables or raw emotions like @donphilopus.
Did any youth in this country really vote based on subjective governance deliverables or just sentiments?
Dike Chimezie:
Stop blabbing! Come 2015 we will dissapoint u.Because enmasse we will vote GEJ again.

Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 3:49pm On Oct 04, 2013
Don't be hasty in jumping to conclusions. I'm being objective here and not taking sides. Speak reason and many will be willing to listen. Why not convince me to see things your way with arguments devoid of abuse. The contents of the thread speaks for itself.
donphilopus: i bet you that most of the people that voted him in then regretted voting for him.
They voted him because most of them didn't his true being then

Politics / Re: On the Dangerous Gulf Emerging Amongst Nigerians by TheArbiter: 3:10pm On Oct 04, 2013
Government of the people, for the people, by the people.

Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 2:55pm On Oct 04, 2013
@Dike Chimezie
An interesting perspective. While not all leaders are politicians, most politicians are leaders in their own right. But what about gonvernance deliverables. Any expectations? It seems all the views so far with the exception of @abuayman have any focus on deliverables as a yard stick of governance.
Dike Chimezie: Interesting question indeed.
We realised that he is more a leader than a politician.
"By their fruit we shall know them".He is a responsible POLITICIAN hence worthy of a LEADER.
I have more reasons for not only supporting but liking GEJ.
I rest my case.
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 2:50pm On Oct 04, 2013
You are the first dissenting voice. Hmmm, your reasons seem far-fetched. If he were prone to wrong decisions won't it have been obvious to the electorate. Anyways, its just one (your) opinion. Lets see what others have to say.
donphilopus: The reason why i didn't vote him and will not vote for him is because he takes the wrong decision, he can't differentiate between good and bad.
To round it off he's too cold and Clueless..
Sorry To Say
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 1:23pm On Oct 04, 2013
Good looks are assets to politicians all over the world. As a matter of fact most politicians are good looking. So you were enamored by his looks and not governance deliverables. Interesting.
egift: Because he have an innocent look face and a smile of deception to go with it. Is that good enough?
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 12:03pm On Oct 04, 2013
A reasonable motivation. But Rome was not built in day (4give the adage). Surely projects of such magnitude require time to implement. With the university as u say, you are one satisfied voter.
abuayman: All state will have a federal university and domestic airport but up till now, my state Kogi is still there without airport, at least the University is there sha

Was that statement made before the elections? Its a reasonable motivation for voting if i may say.
kokoA: "Terrorist attacks happen everywhere in the world, Nigeria is not an exception..." And "we are on top of the situation"
Politics / Re: Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 11:47am On Oct 04, 2013
@ demmie1
Do you imply ur motivation is none other than to have a non-northerner as president. So if things go good or bad you are indifferent? A very interesting perspective.
demmie1: anti-northern sentiments.
I only chose btw two evils.........

Good governance in what aspect? Kindly explain what your expectations were?
slimming: For good governance
Webmasters / Re: 53rd Independence Day Ebook Request Galore by TheArbiter: 10:47am On Oct 04, 2013
@ Ayam Kay

Your download links have been up for 15hrs (since 8pm yesterday). They will expire after the next 9hrs.
Politics / Re: Federal Government Is Broke-adams Oshiomhole by TheArbiter: 10:37am On Oct 04, 2013
Fractious politics aside. Its becoming highly probable that Nigeria could be broke. Billions in bugdet arrears to states, Oil theft, strikes over money/unpaid salaries (ASUU, ASUP,etc), expensive bokoharam war, etc. It takes no brainer to realize money could be short. The sooner it sinks into the thick skulls of Nigerians the better.
Politics / Whats Your Motivation And Inspiration For Voting President Jonathan? by TheArbiter: 10:19am On Oct 04, 2013
Watching the verbal tussles on Nairaland for and against President Jonathan is sometimes apalling. But governments the world over have never been (generally) much loved even after they were overwhelmingly elected by voters.

But one aspect is undeniable, election campaigns grants access and insights into the aspiring candidates unlike everyday experiences. You listen to speeeches and debates which motivates and inspires you to vote for the candidates.

It would be nice to hear from Nairalanders which, of President Jonathan's speeches, debates and policies inspired and motivated them to vote him during the last election.

It will offer an insight into whether the verbal dissafection is from failed promises by the President or just impatience for the changes promised.

Please lets be civil; no vulgar language or abuse.

1 Like

Programming / Re: Help On Database Management System For A Hospital : Urgent by TheArbiter: 1:55pm On Oct 03, 2013
For Open Source software check out this page:


Take a look at this one on Sourceforge:


Check this link for a review of some open source alternatives:


Download and test the softwares. You might just find one that fully or partially meets your needs.

1 Like

(0) (1) (2) (3) (4) (5) (6) (of 7 pages)

(Go Up)

Sections: politics (1) business autos (1) jobs (1) career education (1) romance computers phones travel sports fashion health
religion celebs tv-movies music-radio literature webmasters programming techmarket

Links: (0) (1) (2) (3) (4) (5) (6) (7) (8) (9)

Nairaland - Copyright © 2005 - 2015 Oluwaseun Osewa. All rights reserved. See How To Advertise. 437
Disclaimer: Every Nairaland member is solely responsible for anything that he/she posts or uploads on Nairaland.