Hemorrhoids and Anal Warts

It’s pretty bad when you find out you’ve got hemorrhoids, but it can be a lot worse if you get hemorrhoids confused with another health issue. I mean, the pain, anxiety and embarrassment of discovering something wrong in the anal area is bad enough, much less not knowing exactly what you’ve got. On the bright side, there aren’t too many health conditions that can come up in that area. One of the most common health conditions confused with hemorrhoids is anal warts. While neither is very much fun, they stem from entirely different causes and are treated in very different ways.

Anal warts, also known as condyloma acuminata, are caused by the human papilloma virus (HPV). This virus is highly contagious and most often transmitted through sexual intercourse. Some strains of HPV can lead to increased risk of cervical cancer, but these are not the same strains as the ones that cause anal warts. The virus gets into the skin or mucous tissue cells and starts making them grow in the distinctive wart pattern. HPV infection does not lead to hemorrhoids. Hemorrhoids originate from weak points in hemorrhoidal veins below the skin or mucous tissue. As the weak point gives way, it stretches out and takes surrounding tissue with it. Traumatized hemorrhoids may get infected with a variety of bacteria and/or viruses, but infection does not lead to hemorrhoids. That would be like putting the cart before the horse.

Anal warts and hemorrhoids can both feel like lumps or masses of tissue around the anal area. However, there are several differences that can lead to a proper identification upon close inspection. While doing a close inspection may not sound like fun, it’s much better than trying unsuccessfully to treat the wrong thing. Upon said close inspection, anal warts have a distinctive “rough” texture and range in size from the head of a pin to about the size of a pea and are rather hard to the touch. They occur in clusters around the anal opening and may sometimes continue up towards the genital area. They almost never occur alone. Hemorrhoids, on the other hand, have a smooth texture that’s identical to the tissue they originate from, whether that’s external skin or internal mucous membrane. They are often soft or “squishy” to the touch, and they range in size from the size of a pea to the size of a grape. You’ll never find them anywhere except right around the anal opening. In addition, warts almost never hurt, though they may itch a bit. External hemorrhoids, on the other hand, often hurt quite a lot.

Hemorrhoids are usually best treated at home through a high-fiber diet, a healthy amount of exercise, and easily obtained over the counter relief. Home remedies often work well on hemorrhoids and surgery is only rarely needed. Anal warts, on the other hand, always have to be treated surgically, usually on an outpatient basis. The warts will not go away on their own. Instead, a physician has to use liquid nitrogen to freeze them off. In addition, hemorrhoids can often be kept away by keeping the lifestyle changes that were made to help cure them. Anal warts will often come back for no reason under your control, because the virus can live dormant in your skin cells for a long time. One day that virus can wake up and bam, you’ve got anal warts again.

So, as you can see, getting anal warts confused with hemorrhoids can lead to some serious problems. At the least you’ll be stuck trying to treat a problem you don’t have for a while. Why waste all that time and discomfort? If you can’t figure out what you’ve got on your own, make a doctor’s appointment and get your diagnosis confirmed. It’ll save you a lot of trouble, pain and grief in the long run.

IPv4 Vs IPv6 (Advantages and Disadvantages)

We can see the rapid growth of internet users in last few years and this increase also create challenges for internet management groups, stake holders and service providers. Day by day infrastructure of internet is expanding and we can even enjoy the service of internet in villages and remote areas. Increased of usage also increase online devices. In start internet protocol addressing (a specific IP addressing for each online entity) was designed on 32 bit and this scheme IP version called IPv4.IPv4 addressing is like 203.128.076.001. decimal is used to make the IPv4 addresses more palatable for humans and a 32-bit address becomes 4 decimal numbers separated by the period (.) character. If we calculate these decimal values and we can get the total number of devices can be participate on this protocol (256x256x256x256) = allows for 4,294,967,296 addresses. It is about 4 billion of addresses and in early days of internet no one can think, 4 billion slot will be full. here we shall discus some disadvantages of IPv4 as we have seen addressing capability problem and after that we shall go through the solution which will replace IPv4 and addressing structure of the new addressing scheme. we shall go through some disadvantages of IPv4 and new features of IPv6.

Rapid Growth of the Internet and the Exhaustion of the IPv4 Addressing

IPv4 allows for 4,294,967,296 addresses which is about 4 billion and IP allocation limits the public IP addresses to a few hundred million. Cause of this limitation companies using NAT (Network Address Translator) to map single public IP to multiple private IP addresses.

IPv4 Security at IP Level

When we communicate at public medium we need to encrypt data to maintain security and privacy. After a passage of time we have now security for IPv4 packets. This security knows as internet protocol security or IPSec but this is an optional for IPv4.

Internet Backbone Maintaining Large Routing Tables

In IPv4 network IDs allocation is very critical and currently more than 87000 routes in the routing tables of internet backbone routers today. The routing infrastructure is based on flat and hierarchical routing.

Quality of Service Concern in IPv4

Now a days internet users are not only limited with browsing and searching data. Current users are well aware of text and voice and video chat and video conferences and online video libraries. This kind of communication need real time data transfer for quality of service. Normally for these kind of services we use UDP (User Data-gram Protocol) or TCP (Transmission Control Protocol).IPv4 TOS field has limited functionality and, over time, has been redefined and locally interpreted. Additionally, payload identification that uses a TCP or UDP port is not possible when the IPv4 packet payload is encrypted.

IPv6

As we can see we have some basic problems in practice of IPv4 now we will check some new features of IPv6. here I like to describe the some of basic features of IPv6. Deployment of IPv6 is a big challenge for internet management groups, stake holders and service providers. It is difficult but not impossible. We can see benefits of IPv6 here. Biggest upgrade jump from IPv4 32 bit to IPv6 128 bit.

IPv6 Header Format

New header is designed to minimize header overhead. by moving both nonessential and optional fields to extension headers that are placed after the IPv6 header. IPv6 header is more efficiently processed at intermediate routers and that generates efficiency. IPv6 is 4 time larger than IPv4 and its header size is twice than older version.

IPv6 Large Addressing Space

In IPv6 source and destination addresses is based on 128 bit. 128 bit addressing can produce over 3.4 x 1038 possible combinations. Currently we can say this is enough but who know about future may be it also face same problem like IPv4 after some decades. 128 bit addressing allow us multiple levels of sub-netting and address allocation. So we can say that we have plenty of address for use in future.

Addressing and Routing Infrastructure Efficiency in IPv6

IPv6 designed to create an efficient, hierarchical, and summarize able routing infrastructure that is based on the common occurrence of multiple levels of Internet Service Providers. It reduce the size of routing table of backbone routers. Which is can cause of efficient internet experience.

Security features is now built-in

IPv6 has been design to support IPsec (AH and ESP header support required) also support mobility version Mobile IPv6. IPSec based on two types of extension headers and a protocol to negotiate security settings. The Authentication header (AH) provides data integrity, data authentication, and replay protection for the entire IPv6 packet. It is better form developers who built-in security features in development of IPv6 rather we bolt on later.

Quality of Service (QoS) of IPv6

As we have already seen about the UDP and TCP protocols for streaming and other multimedia services on internet. Cause the usage of these services are increasing day by day IPv6 have a flow level field in its header which make better and special handling for packets from source to destination. Data traffic is identified in the IPv6 header, support for QoS can be achieved even when the packet payload is encrypted with IPSec and ESP.

Thomas Nagel And His Article On Death

Thomas Nagel begins his collection of essays with a most intriguing discussion about death. Death being one of the most obviously important subjects of contemplation, Nagel takes an interesting approach as he tries to define the truth as to whether death is, or is not, a harm for that individual. Nagel does a brilliant job in attacking this issue from all sides and viewpoints, and it only makes sense that he does it this way in order to make his own observations more credible.

He begins by looking at the very common views of death that are held by most people in the world, and tells us that he will talk of death as the “unequivocal and permanent end to our existence” and look directly at the nature of death itself (1). The first view that Nagel decides to discuss is the view that death is bad for us because it deprives us of more life. Most people are in the view that life is good; even though some experiences in life can be bad, and sometimes tragic, the nature of life itself is a very positive state. Nagel also adds that when the experiences of life are put aside, this state is still positive, and not simply “neutral” (2).

Nagel goes further to point out some important observations about the value of life. Mere “organic survival” cannot be said to be a component of value (2). Nagel gives the example of death and being in a coma before dying. Both of these situations would be equally bad situations. Another observation is that “like most goods” the value can become greater with time (2).

Looking now at what is bad about death instead of what is good about life, Nagel presents some obvious thoughts regarding this point. Life is good because we have the conscious ability to experience and appreciate all that life has to offer. So death is bad because it deprives us of these experiences, not because the actual state of death is bad for us.

The next point that Nagel makes is that there are certain indications that show how people do not object to death simply because it “involves long periods of nonexistence” (3). It is said that people would not look at the temporary “suspension” of life as a terrible misfortune, because the fact that it is temporary tells us that this will ultimately bring the state back to that of conscious life. Also, we do not look at the state being before we are born as a misfortune, or deprivation of life, because that life has not yet begun and, (as Nagel states later), he refutes the possible argument that the person could have been born earlier and had more life, with the fact that if that person was born substantially earlier, he would cease to be that person, but instead someone else entirely.

Nagel discusses next three problems. The first is a view that there are no evils that are not rooted in a person consciously “minding” those evils. Nagel puts this view in to easier terms by saying that this is the same as saying “what you don’t know can’t hurt you” (4). There are several examples that can illustrate this theory. People who think this way would say that it is not a harm for a person to be ridiculed behind his back, if he doesn’t know about it. If he doesn’t experience the evil, it is not bad for him. Nagel thinks this view is wrong. The natural discovery here is that it is bad to be betrayed, this is what makes the whole situation unfortunate; not because the discovery of this betrayal makes us unhappy.

The second problem is that which has to do with who the subject of harm caused by death is, and when exactly this occurs. Harm can be experienced by a person before death, nothing can be experienced after death, so when is death itself experienced as a harm? The third problem deals with posthumous and prenatal existence.

Contemplating the good or bad aspects of death, Nagel observes that we must look at the possible circumstances surrounding a death, and the pertinent history of the person who dies. This is important because we miss a lot that is important to the argument if what we take into consideration is exclusively the state of the person at the moment of death. Nagel gives an example of a very intelligent man sustaining an injury that causes him to regress to the mental capacity of an infant. His needs can be fulfilled like those of an infant and be kept happy as long as simple needs are met. His family and friends would look at this as a terrible misfortune, even though the man himself is not aware of his loss. This situation is unfortunate because of the deprivation of what might have been had he not been injured in this way. He could have gone on to accomplish great things for the world and his family, and live out his life through old age as an accomplished and acclaimed individual. This would have lead him to great happiness, but it can be observed that this same man in a state of mental capacity to match that of a child is also happy, but Nagel agrees that what happened to this man is a tragedy because of the terrible loss of the life the intelligent man could have led. This situation can relate to death in this way of thinking about deprivation. Death is bad because it robs you of what could have been.

After making these observations, Nagel states that “This case should convince us that it is arbitrary to restrict the goods and evils that can befall a man to non-relational properties ascribable to him at particular times” (6). There are endless circumstances and happenings going on that affect a person’s fortune or misfortune. Many of these never coincide directly to the person’s life. We must consider that there is no way to pinpoint the exact position of a misfortune in a person’s life, nor a way to define the origin. People have dreams and goals in life that may or may not be fulfilled. There is no way to find all of the circumstances and possibilities that go into whether or not these hopes and dreams are eventually fulfilled, but Nagel tells us that we must simply accept that “If death is an evil, it must be accounted for in these terms, and the impossibility of locating it within life should not trouble us” (7).

There are some who view the time before birth and the time after death as the same. We exist in neither, though Nagel argues that there is a difference. This whole essay has expressed exactly his view that though we do not exist in either case, death deprives us of time that we could have been living our lives.

Nagel makes an interesting observation about whether we can assign as a misfortune an event or aspect of life which is normal to all humans in general. We all know that we all will die and that the maximum amount of life is somewhere around 100 years. So is it still plausible to say this is a misfortune? He also gives the example of moles, which are blind. It is not a misfortune for a mole to be blind because they are all blind, and they will never know sight and be able to appreciate it. But Nagel also presents the example of a situation in which everyone goes through six months of pain and anguish before dying. Everyone knows that this is going to happen, but does that make the event any less of an event to dread and fear?

We are brought into this world and brought up with aspects of our lives that we appreciate. The deprivation of these things that we learn to appreciate is a misfortune, because we have learned to live with these privileges. It is unfathomable for a human being to grasp the concept of a finite life, in the truest meaning of understanding. We do not think of our lives right now as a set out plan or a finite sequence of events. We do not live day to day thinking of what we should do according to how much time we have left. Our lives are essentially an open-ended sequence of good and bad circumstances and possibilities. Death is the abrupt interruption of this sequence that we cannot help but be in the mindset will never end. This is how death is a deprivation, and ultimately, a bad thing for a person.

In conclusion, Nagel offers a good argument in his essay on death about death itself being a harm. Whether a person believes in the immortal life or not, it must still be considered that dying deprives you of the goods and experiences of life. This view seems unavoidable. A person who dies at age 92 has lived a full life to the best of his ability and has experienced more than someone who dies at age 32. The person dying at age 32 had many things that he wished to accomplish and experience in his life, and since the event of death has taken away all possibility of any of these goals coming to pass, and undermines all the work that he has put forth up to that point in pursuit of his goals, death is a terrible tragedy for him.

Work Cited

Nagel, Thomas. Mortal Questions. Cambridge: Cambridge UP, 1979.

Easy Songs To Play On Guitar With 4 Simple Open Chords

Learning Chords

For most beginners at guitar playing, the first goal is to learn some easy songs to play on the guitar. And one of the main challenges here is learning all the guitar chords needed in order to be able to play those songs.

And that’s not always an easy thing to accomplish. Many songs uses chords that seem to have been invented for no other reason than to make it impossible to play. No wonder you give up on those songs. They have to wait until you get better at guitar playing.

G-Em-C-D

The Chord progression G-Em-C-D is a common (big understatement!) sequence all over the world, in all sorts of music styles. You can of course transpose to other chords, like C-Am-F-G or D-Bm-G-A and so on. Another way to “transpose” a song that not fits your voice is to use a capo at any fret you like.

I have compiled a little list of songs that I found that uses these chords. Many of them uses the progression all the way through the entire song, others are played with variations. And a few of them uses other chords as well.

The List

So here it is, my small gift to those of you who can’t find easy songs to play on guitar.

Here are the chords again, with two additional variations.

(C-Am-F-G), (G-Em-C-D), (D-Bm-G-A)

Stand by Me – Ben E. King

Heart and Soul – Hoagy Carmichael

The Thin Ice – Pink Floyd

Earth Angel – The Penguins (in family guy, back to the future etc.)

Donna – Ritchie Valens

Duke of Earl – Gene Chandler

Every Breath You Take – The Police

The Living Daylights – a-Ha

Last Kiss

Those Magic Changes and Beauty School Dropout – from Grease

Leader of the Pack

You Send Me

Blue Moon – Chris Isaak

Breaking Up Is Hard To Do – The Carpenters

Bubble Goose – Wyclef Jean

Teenager in Love – Dion & The Belmonts(?)

Fly On The Wings Of Love – The Olsen Brothers

Bus Station – Tom Russell

Heart Of Gold – Neil young

Stand By Me – Ben E King

Beautiful Girls – Sean Kingston

I’ve just seen a face – The Beatles

Last Kiss – Pearl Jam

Bleeding Love – Leona Lewis (I think?)

Single Ladies – Beyonce

Baby – Justin Bieber

Mary’s Song- Taylor Swift

Jump then Fall- Taylor Swift

Wrapped in your Arms- Fireflight

This magic moment

Up on the roof- The Drifters

Wonderful world – Herman Hermits

Lovers moon – Glenn Frye – My new favorite.

She will be loved – Maroon 5

His Latest Flame – Elvis.

I Only Want To Be With You – Dusty Springfield.

End Of The Line – Traveling Wilburys.

Puff The Magic Dragon – Peter, Paul and Mary

Kumbayah

Where Have All The Flowers Gone? – Pete Seeger

Look at the first song in this list. In all its simplicity “Stand By Me” is a fantastic song, and it has travelled with me through all these years. And it’s a very easy song to play on guitar.

If you like that song I’ll show you a very special version of it, at my website.

Impotence, Infertility, and Sterility (Part 2)

Excessive ejaculation is very detrimental to overall optimal male health. Sperm contains the elixir of life (vitality) and constant loss of this special elixir causes a man to age prematurely. His hair thins, balds and turns grey, his teeth begin to fall out, his hearing and sight becomes bad, he’s constantly fatigued or feeling lethargic, and prone to many sicknesses that claim his health.

Celibacy or temporary periods of sexual (or ejaculatory) fasting allows the spark plugs of the genitals to recharge (rejuvenate and revitalize), in addition to allowing sperm count and production to increase. Celibacy is also warranted to help heal from STDs (sexually transmitted diseases), which is the number one cause of chronic degeneracy of the male sex gland and reproductive system. Chronic sores, bumps, blisters, inflammation, discharges, and rashes debilitate the physical makeup of the male (and female) sex glands or organs and entire reproductive system and are greatly implicated in sterility and infertility.

Most STDs are contracted from recreational sex. God, Biblically speaking, instructed us to have “procreational” sex, but as hypocrites (to God) and loyal imps of the Adversary and his Matrix, we love to pursue and engage in recreational sex. Recreational sex is “wreck creational” (to wreck creation) and that’s exactly what we are and have been foolishly doing – WRECKING God’s creation, especially when you women and girls get pregnant and run to the butcher shop and get an abortion (infanticide), that many of us males are the cause (and financiers) of. I’ll cover abortions and miscarriages in detail in a future article. However, you pay a hidden price for these government-approved acts of legalized murder euphemistically called “abortion” that I will pull your coat tail to (expose, bring to light).

The Adversary’s Matrix keeps us ignorant and unconscious to our lower nature and manipulates us through the imbalances of our lower charkas, especially the root chakra (located at the genitals) and the sacral chakra (located under the belly button). Why do you think its high fashion today for women to wear shirts (blouses) that reveal their belly buttons? By all means am not I telling any woman to stop wearing blouses or even the most revealing clothes. Djehuty is pro freedom, liberation and choice. You do what you want to do. I’m just asking the question “do you know why you’re doing what you do?” Do you know the science behind your fashion, styles, and habits? Do you know why you are piercing your belly buttons today? Do you know what the metals (gold, silver) do to your energy (including your sexual energy) and your sacral chakra? I’m simply asking a question!

Concurring with Author Stewart A. Swerdlow, blatant sexuality is all around us, from fashion to media to everyday speech. This sexuality is a deep, bright red that essentially pulls on your sexual charkas and opens them up. Using color, tone, and archetype (or symbol), these sexual chakras are systematically opened, fed, and energized, expanding them out of proportion until they have control over you. Then you are controlled and manipulated through these chakras.” But when certain people like myself suggest the use of earth’s crystals and gemstones that are naturally red in color and substance which balances and protects the sexual charkas, I’m called a diviner or a practitioner of divination, an occultist, etc.

Your religious leaders and institutions and the public fool (school) system have failed to teach you the metaphysics and metaphysical aspects of life that the Adversary uses against you. Do you deny the sexual perversity, decadence, immorality (fornication and adultery) that takes place in your religious institution or settings, even amongst the officials and leaders? Why do you think sex is so out of control today, but at the same time it’s used to control society (fear of contracting AIDS or STDs, fear of getting pregnant, etc.)?

Sex is connected to fear and fear is the greatest weapon of control on the masses of the people today. But moving along with our topic…

Healing Impotence

To combat or reverse impotence, eat a more vegan-vegetarian based diet and/or consume only sparse amounts of meat (white meat only). Eat plenty of green leafy vegetables, raw and organic fruit, plenty of seeds and nuts (think about it, male sperm is commonly known as “seed” i.e. “to plant seed in a woman”; and ejaculation is commonly referred to as a “nut” or “nutting”, i.e. to bust a nut). The best seeds for a man to eat are pumpkin seeds (papitas) and sunflower seeds due to their rich zinc content. The male prostate gland is chiefly comprised of zinc and with every ejaculation, a man losses vital zinc.

There are a plethora of male-specific hormonal herbs that greatly help heal impotence and degeneracy of the male organ and reproductive system. Yohimbe bark, a powerful African aphrodisiac herb, greatly helps to counteract impotence by its power of increasing and enhancing blood flow to the penis greatly enhancing girth and hang time of the penis. Lycii berry invigorates the blood and can help to increase sperm count and reproductive secretions. Epimedium (Horny Goat weed), a powerful Chinese herb, counteracts premature ejaculation and improves circulation to the penis by its action of dilating the capillaries and larger blood vessels (just like Yohimbe). They don’t call this herb Horny Goat weed for nothing. Epimedium has an effect that makes a man (and a woman) horny and lustful like a goat. Muira Puama, a South American herb commonly known as “potency wood”, is probably the best herb in counteracting im(potence). It has a libido enhancing effect and greatly supports organ regeneration.

Ashwagandha, a powerful Indian or Ayurvedic herb, promotes sexual organ health and regeneration and also has a libido enhancing affect. Damiana, a Mexican aphrodisiac herb, greatly enhances circulation to the penis and energizes the penis. Sarsaparilla nourishes the male sex gland and system and greatly helps reverse conditions of impotence and degeneracy. I could never forget about Stiffcock Strongback. The name says it all for this West Caribbean herb! It is great for a stiff “cock” (penis) in cases of impotence and also strengthens the back which becomes degenerate from a lot of humping. Ever wanted to know why a man was said to be “sowing his oats” in regards to having sex with a woman? This saying has to do with the herb Oat or Oatstraw. Goats are very sexual and lusty creatures, and what do goats in America eat? Oatstraw (grass)! Oatstraw is excellent for the improvement of the male regenerative system.

From time to time (every 4-6 months), I make a tea with all of the foregoing herbs and some other herbs not mentioned, for maintenance of my reproductive system (and one day is all I need). It actually takes control over your body and you almost have no control over your sex organ. The penis does have a mind all of its own. God’s herbs are far more effective than man’s pharmaceutical drugs’ (Cialis and Viagra).

I concocted an herbal compound that we sell at DHERBS called Jackrabbit to serve as a safer and saner alternative to these harmful pharmaceutical sex enhancing drugs. If you really want to conceive a child or just improve your sex life, start messing around these herbs and herbal concoctions (Jackrabbit, Male Hormonal Formula, Prostate Formula). Your impotence will be gone in a matter of days. You will become a hound dog and a lusty goat, hopefully under the right circumstances (like being in a monogamous relationship or married). You’ll read the Song of Solomon in the Bible and become aroused at all of its sexual innuendos.

After all, God made the herbs for the service of man (Psalms 104:14) and instructed man to be fruitful and to multiply and replenish the earth (Genesis 1:28). Now if God instructed us to be fruitful and to multiply and replenish the earth, and today we cannot do such because we are impotent as men (and sterile or infertile as women), what does this imply? Somewhere along the line we have deviated from God’s path and ordained way of life for us. The proof is in the pudding! Our sexual disorders are preventing us from adhering to God’s commandment. Could our modern day high meat, dairy and starch-filled diets and fast-paced and technological-based lifestyles have something to do with this?

It’s interesting in that after God instructed man and woman to be fruitful and to multiply and replenish the earth in Genesis 1:28, God comes behind this with an ordained diet for man and woman in Genesis 1:29 that is a fruitarian (fruit-based) diet:

“And God said, Behold, I have given you every herb bearing seed, which is upon the face of all the earth, and every tree, in the which is the fruit of a tree yielding seed; to you it shall be for meat.”

Now if God instructed us to eat fruit that contains seed, how come we are eating seedless fruit today, such as seedless watermelon, seedless grapes, seedless oranges, etc.? Again, we talk and profess God, but we are the most loyal imps of the Devil or Adversary and are too blind and self-righteous to know it, but are perplexed at our modern day pathologies and disorders. I truly understand how the devil came to God walking amongst the sons of God without the sons of God having a clue that the devil was with them:

“Now there was a day when the sons of God came to present themselves before the Lord, and Satan came also among them.” JOB 1:6

So getting back to our Genesis-based fruit-based diet, the terms “fruitful” and “seed” have to do with sexual reproduction. Does a man not have “seed”? Is not a woman “fruitful”? The term “infertility” derives from the Latin word infertilis, meaning “not fruitful” [in “not” and fertilis “fruitful”]. A woman who is not fruitful is said to be infertile which brings us to the topic of female infertility.

What is infertility?

Infertility (or infertile) is defined as: “The inability to produce offspring. This condition may be present in one or both sex partners and may be temporary and reversible. The cause may be physical, including immature sexual organs, abnormalities of the reproductive system, hormonal imbalance, and dysfunction or anomalies in other organ systems, or may result from psychological or emotional problems. The condition is classified as primary, in which pregnancy has never occurred, and secondary, when there have been one or more pregnancies.” SOURCE: Mosby’s Dictionary, 3rd Edition (1990)

Eat plenty of artichokes and asparagus (steam them). Eat plenty of pomegranates, berries (raspberries, Lycii, vitex or chaste tree, blueberries, Goji, etc.). Eat plenty of sunflower and pumpkin seeds (uterus food). These are your fertility enhancing foods.

Women, do you know how to bless your wombs? Do you know how to prevent the psychic attacks on your womb?

Your womb is a potential internal nursery for a Rosemary’s Baby which means your womb is used to produce a baby for the Devil (Adversary, Matrix). In the 1966 Roman Polanski movie “Rosemary’s Baby”, actress Mia Farrow unsuspectedly and unknowingly carried a baby for the Devil. These murderers, serial killers, drive-by shooters, cut-throats, and natural born killers, where did they come from? Answer: from the womb of a female!

Healing for Infertility (Frigidity)

Herbs that help a woman to heal from infertility include SQUAWVINE, DAMIANA, ASHOKA, FALSE UNICORN, SAW PALMETTO BERRIES, CHASTE TREE BERRIES, MACA MACA and BALA.

The following essential oils may be burned in a diffuser, added to bath water, or inhaled throughout to help enhance fertility: CLARY SAGE, JASMINE, YLANG YLAND COMBAVA, ROSE ABSOLUTE and TUBEROSE.

Crystals and gemstones such as ROSE QUARTZ, CARNELIAN, CHRYSOPRASE, MOLDAVITE, ZINCITE, MOONSTONE, CINNABAR (DRAGON’S BLOOD), RHODOLITE GARNET, JADE, THULITE, RHODONITE, RHODOCHROSITE and PEARL all enhance fertility

Formulas that will aid and assist in impotence and infertility include: JACKRABBIT, FEMALE HORMONAL, MALE HORMONAL, YONI, STD-RID, AND PROSTATE.

My Relationship with my Parents

I truly value my relationship with my parents. The role of my parents and my siblings in my life can hardly ever be overstated. To begin with, I should state that my parents have always provided me with support. Their opinion has always played a significant role in my decision making process. Whenever I had a problematic situation over the course of my life I would necessarily talk to my parents about an issue that generated a seemingly irresolvable dilemma. I could go talk to my father about almost anything. When I was in high school and actually all my way through college my parents used to give my valuable advices as to what kind of men I should choose for relationships, what classes I should take and what cloths I should put on. They always taught me something. I cannot say that I necessarily followed their advice. The ultimate source that I always refer to when I have to make an important decision is my own brain. I believe that I am smart enough as well as experienced enough to make my own decisions. However, it is always important to consult my parents simply because they might give me a different perspective that I would never think of on my own. Even though their opinion might not be exactly what I am looking for at a particular point in my life, their contribution is extremely valuable. It is hard to explain but sometimes when I get in a really complex position and I feel that I know the answer to a question that torments me I go talk to my parents anyway. Most of the time I am totally positive that I will not take their advice and that my own decision will the one that I will take eventually but it is just important for me to have my parents hear my story and contribute to my decision. In other words there are times when I need someone to talk to. My parents and my siblings are the only people that I will select for that role.

My parents and siblings provide a great deal of moral support at times of trouble. However, the role of those people in my life is not confined to comforting me when I cannot find a way out of a complex situation. My relationship with my brother and sister is somewhat different. Of course my brother and sister support me a lot in almost any situation and I am sure that they are the people that I can count on in case I have a dilemma to deal with. However, there has always been tremendous competition among us in the family. It was always vital for me to excel my siblings in almost every aspect of life. Back when I was a high school student I felt like I needed to pick better grades in all the classes that we took together. When it was time for me to pick a university to apply to I always had to know what schools my brother and sister applied to so that I could apply to a better one. That ultimate desire to be the best in the family has always dominated my personality. At this point I cannot say for sure whether it is a good or bad thing. Sometimes I happened to excel in something and that brought me enormous satisfaction. Other times I would sustain a considerable failure and that would just devastate me completely. Nevertheless, now that I can take a look back at my entire life and consciously evaluation everything I ever did I can confidently state that I would not have accomplished most of the things that I have ever done in my life had I not have my siblings. They were the source of my energy and my drive that motivated and inspired me to persevere and keep going even when a situation was bleak and hopeless. My brother and sister are that people that I have to thank for almost everything that I have achieved over the course of my life. I did not realize that when I was younger. Now I can clearly see their role in my life.

3 Nutrition Facts All Coaches Need to Know

Coaches are often the first people to provide any nutritional guidance to athletes. Unfortunately, many coaches are ill-prepared to provide such guidance and, under most state laws, are not authorized to provide nutritional direction. However, when it comes to sports nutrition, many coaches and players simply focus on weight and muscle gain. This “plan” lacks research-based information.

Below are 3 key nutritional facts that all athletes and coaches should be aware of.

· Hydration. Coaches and athletes should all understand the proper hydration entails a lot more than water breaks during practice. Maintaining proper hydration can be complicated based on the intensity of the sport, the environment and each individual. A distinct problematic scenario revolves around the classroom setting. While athletes progress throughout their day, a stop at the water fountain between classes can go a long way towards aiding hydration levels. Poor hydration leads to fatigue, weight loss, and, contrary to popular belief, is the primary culprit behind muscle cramps. Athletes should maintain proper hydration levels throughout the day. During practice in warmer areas (in a gym, outside during spring and summer, etc.) they should drink water incrementally.

· Carbohydrates. Glycogen is the primary fuel source for the body. Carbohydrates are easily turned into glycogen and without enough, you’ll see slow, sluggish performance. Eating an ample amount of carbohydrates throughout the day will replace muscle energy lost in workouts and keep the body from robbing the muscles of protein for energy. A goal for athletes should be to intake about 50 grams of carbohydrates 30 to 45 minutes post-workout. This could include a bagel with peanut butter, a banana and a cup of chocolate milk or a cup of Greek yogurt with a handful of granola. Remember chocolate milk – it’s one of the absolute best post workout drinks you can find.

· Protein. The amount and timing of protein are equally important when an athlete wants to increase muscle mass and strength. Protein builds muscle and repairs muscles damaged during exercise. When an athlete conducts a strenuous workout, tough practice and lengthy games, a large amount of stress is placed on muscles. If total protein consumption is too low, muscles will not be able to properly recover, new muscle will not form, and athletes may experience an increase in soreness, as well as delayed recovery time. Timing: After a workout, practice or game 20 to 30 grams of protein within 30 to 45 minutes post-workout should be consumed. Amount: An athlete intent on increasing muscle mass or strength should intake 1.2 to 1.4 grams of protein per pound of bodyweight in a day. This will ensure enough protein is synthesized to illicit repair and growth of the muscles. As a general rule, 20-30 grams of protein should be eaten at each meal. This will leave time for protein supplementation throughout the day. That level of protein can take the form of a piece of meat the size of a deck of cards, a protein shake or three eggs.

Here are four quick and easy post-practice recovery meals:

– 1 cup vanilla low-fat Greek yogurt with ½ cup granola

– Smoothie with 1 cup vanilla Greek yogurt, 1 cup water and 2 cups frozen blueberries

– Protein shake blended with 1 cup strawberries, 1 cup blueberries and 1 banana

– 3 eggs and 1 cup rolled oats

Activity Diagrams – Advantages, Disadvantages and Applications of Use

Activity diagrams describe the actual work flow behavior of a system in Information Technology. These diagrams are very similar to state Diagrams because activities are the actual state of doing something. These diagrams describe the actual state of activities of a system by showing all the sequence of activities performed. Also, these diagrams can show activities that are conditional or parallel.

When to Use: Activity Diagrams

Activity diagrams should be used in alignment with other modeling techniques like interaction diagrams and State diagrams. The main reason behind using these diagrams is to model the work flow behind the system being designed. these Diagrams are also useful for analyzing a use case by describing what actions need to take place and when they should occur, describing a complicated sequential algorithm and modeling applications with parallel processes.

Activity diagrams’ advantages:

  • UML modeling language included that these diagrams are normally easily comprehensible for both analysts and stakeholders.
  • In UML for the IT Business Analyst, “The activity diagram is the one most useful to the IT BA for depicting work flow [because] it is simple to understand-both for BAs and end-users.”
  • Since they are among the most user-friendly diagrams available, they are generally regarded as an essential tool in an analyst’s repertoire.
  • Additionally, as stated above, activity diagrams allow an analyst to display multiple conditions and actors within a work flow through the use of swimlanes. Swimlanes, however, are optional as a single condition or actor is normally displayed without them.

Activity diagrams’ disadvantages:

UML modeling language include that these diagrams have the potential to become overly complex because their user-friendly nature may lend itself to an all-inclusive description. In other words, since it is so simple to display the information related to the project, why not include all of it? When an analyst has a large project, creating a single, overly complex diagram can be a temptation.

However, as one author notes, “if you are using activity diagrams to define the structure of a work flow, you should not attempt to explore several levels of activity graphs down to their most ‘atomic’ level”. Instead, an analyst should try to present a new diagram for each work flow, or if more applicable, to use swimlanes to present different actors within the same work flow.

Another aspect of these diagrams is that they may not be used in lieu of a state diagram or sequence diagram because “activity diagrams do not give detail about how objects behave or how objects collaborate.” This is not a disadvantage per se, but it is important for an analyst to keep in mind when applying diagrams to their work.

In conclusion, activity diagrams are fairly easy to get the hang of, and will be useful for most projects because they plainly and moderately clearly demonstrate how things work.” Unlike many diagramming techniques, these diagrams also enable the depiction of multiple choices and actors within a work flow, and they are easy for even non-technical users to follow

Applications of activity diagram:

This diagram has been extended to specify flows among steps that transmit physical matter (e.g., gasoline) or energy (e.g., torque, pressure).

  • Additional changes allow the diagram to better support continuous behaviors and continuous data flows.
  • The UML 2 specification significantly prolonged the features and scale of activity diagrams beyond their earlier classification as a special case of state diagrams.
  • Today, activity diagrams can be thought of as flow charts for the 21st century, and UML modelers use activity diagrams to describe it.
  • Also, these diagrams are useful in following methods:
  • Business Rules
  • Functions that occur in parallel
  • Complex chain of multiple use cases
  • Software flows and logic control configurations
  • Procedures with judgment points and alternate flows
  • Single use cases

Spyware, Viruses, Malware, Worms, Trojan Horses, and Adware: Symptoms, Solutions, and Prevention

Virus:

A Virus or Computer Virus is a self-replicating program or piece of script or code that make copies of itself and then either attaches itself to an existing file on the infected system or store copies of itself on the system with innocuous sounding names like ‘repair tool’.

The virus is limited to spread itself only by either being transmitted or sent by an unwitting user or carried on a portable storage medium from one system to another. However, if a virus gets embedded somewhere on a network drive then anyone who opens or clicks on the infected document or file can end up getting infected as well.

Spyware:

Spyware is software that gathers information about a users Internet habits, browsing patterns, email passwords, usernames and even credit card information, in essence, ‘spying’ on the hapless user. This type of software usually gets installed without the knowledge of the user and can transmit the collected data to a third party over the Internet secretly as well.

Malware:

Malware can refer to any number of malicious forms of software or code that has been intentionally designed to perform one or more of the following malicious acts:

> Infiltrate a users computer system without their consent.

> Gather sensitive personal information such as credit card numbers, social security numbers, birth dates, or system passwords.

> Create back doors or remote entry points to allow hackers access to the system.

> The destruction of critical data and/or corruption of system files.

Malware is a general term and is commonly used to include, Viruses, Worms, Spyware, Trojan Horses, and some forms of Adware. The actual intention of malware can vary but by definition it is any software that is destructive by nature. Because the term Malware is so broad it is hard to cite one specific source for the most infections.

Worm:

A Worm or Computer Worm is a self-replicating piece of computer code that uses a computer network to spread copies of itself to the other nodes on the network. Unlike the Virus a Worm can accomplish this without any intervention or help from the user. Also unlike a Computer Virus the Worm does not have to attach itself to an existing computer program or file.

Many times a Worm will also be used to carry a ‘payload’. The ‘payload’ is code that is designed to perform some specific function. In some cases the payload allows the Worm to send documents through the email accounts of the infected system attaching itself and its payload to the email as an attachment. When the unsuspecting recipient of the email opens the attachment the process starts again.

Trojan Horse:

A Trojan or Trojan Horse Virus is a program that usually gets downloaded installed and executed on a computer system which then appears to be performing some useful function but is unknowingly allowing unauthorized access to the user’s computer system at the same time.

Hackers use Trojans to gain access to a user’s computer remotely and then perform any number of malicious activities. These nefarious activities can include but certainly are not limited to:

> Data Theft.

> Keystroke Logging.

> Downloading or Uploading Files.

> Viewing the Victims Screen.

> Crashing the Users System.

Adware:

Adware is advertiser supported software that displays, plays or downloads advertisements either onto the computer desktop or into the computers web browser as a condition of the software installation. Most Adware is free to use as long as you don’t mind annoying pop-up windows appearing at random intervals advertising some product or another. I have seen some Adware that opened a new window about every 1 to 2 minutes, making it nearly impossible to use the system at all until the software had to be removed.

Additionally, Adware will almost always be collecting data about your Internet habits and browsing behavior to tailor ads specifically to best match the data recovered. In that respect it is actually very similar to many types of Spyware. In most cases Adware is simply a way to place advertisements in the face of the user although it’s a fine line before you could also classify it as Spyware.

With Adware however, in some cases you may actually be given a chance to review and choose whether or not to accept the terms and conditions associated with the software before installing it.

IT WOULD BE ADVISABLE TO READ THESE TERMS VERY CAREFULLY BEFORE CHOOSING TO ACCEPT.

Symptoms of Infection:

> Very sluggish computer performance.

> Random system lockups or crashes.

> Browser redirection – you are taken to websites you were not searching for while browsing the Internet.

> Excessive number of popup windows appearing at random while surfing the Internet.

> You are informed that your system has ‘hundreds’ of active infections and you are redirected to a website that insists you pay for and download their specific software package to remove the infections.

Solution:

There are many good anti-virus / anti-spyware products on the market designed to detect and remove these types of infections. McAfee and Kapersky are good but AVG and Avast! have similar products and offer a free downloadable version. Be sure to complete a ‘Full’ system scan and quarantine and remove all active infections. Configure your anti-virus software to perform ‘active’ scanning or real-time system monitoring.

Prevention:

> Do not install software you have downloaded from the Internet unless it has come from a known, reliable source.

> Use caution if using file sharing platforms such as LimeWire or torrent sites to download files.

> Do not open any email attachments from unknown sources.

> Use a good anti-virus/anti-spyware application and scan your system at least weekly. Be sure your anti-virus software is totally up to date with the latest virus definitions.

> For Windows users: Be sure to visit the Microsoft update site and download all the latest Microsoft security patches.

What is a Line Cook and the Responsibilities That Come With the Job?

Fire, a term used to get ready to starting an order that the waiter just placed in. The guest have probably been waiting for at least ten minutes from the time that they first sat down at their table, and are now waiting for that meal that the kitchen staff will prepare.

The front line in the kitchen is where most of the food is fired. It is divided and usually consists of a saute section, a broiler, a grill, a deep fryer, a salamander, cold reach-ins or drawers, and hot water wells. One that works on this line, which may consist of 2 to 3 even 4, depending on the size of the restaurant or the menu, are called line cooks. Sometimes the chef likes to get in on the action.

As a line cook you need to be prepared, you need to know the menu, all the different recipes, have all your tools on hand, have all your ingredients in the menu on the line, and of course you need the skills of cooking.

Being mentally prepared, by far, is one of the most important ingredient a line cook should have. One must be able to concentrate on the task at hand over all the hustle and bustle in the kitchen. the chef would be calling out orders, waitstaff are asking all kinds of questions, you maybe working on maybe three or more things at once, and timing is crucial, everyone on the line must be in sync. With all these distractions one must keep his composure. Getting stressed, or angry doesn’t help but it does happen. Waitstaff asking you how much longer, chef telling you to fire one more thing from another order, your saute cook is a little behind, it’s been almost an hour since this chaotic mess started and your wondering when will it end. Temperatures rise on the front line and I don’t mean the burners.

After all is said and done, there are no complaints, no one waiting long for their meal, guests are happy, a few compliments, waitstaff got their tips, line cooks getting ready to clean the line, and making a list of the prep that needs to be done when they return the next day. Everyone gets a pat on the back, job well done. That is the reward and one of the goals of the front line cook.

Guest satisfaction is the priority of the front line cook. The quality of the meal is your number one concern along with presentation. All the ingredients must be fresh, every cook must be on the same page as far as the recipes go, there needs to be consistency making sure that what you cooked today, will taste the same tomorrow or next week. This is what brings in repeat customers, this is what a restaurant focuses on and depends on. The line cook along side the rest of the kitchen staff strive to do this daily. As a line cook you need to take pride in your job, because if you do, that pride will certainly reflect on the meals you prepare.