Monday 29 August 2016

How To install whatsapp on Mac OSX 10.9+

Whatsapp application which is a Phone application primarily developed to enhance communication like facebook, 2Go chat, Imo and all others messenger platforms has so far been gaining ground being the most widely used and user friendly phone application.


Upgrades in software development industry is a continual process and as a result, whatsapp is not left out. Its a common practice that one need to update his or her whatsapp at least once in two months.

Whatsapp now runs in computer system like every other system applications.
Many questions so far may be bodering your mind as in how can be using whatsapp on my computer system when its also installed in my phone. Do i need to change my number or use a different number.

I want to tell you that you don't have to change your number or get disconnected with your phone as install whatsapp on your system. Below is a guide on how to run whatsapp on your computer system. 

To install on Mac OSX 10.9+

  1. On your computer’s browser, navigate to the download page to download the .zip file.
  2. Once the download is complete, open the zip file to run WhatsApp.app.
  3. On your first install, the application will prompt if you would like to add WhatsApp to your Applications folder and your desktop dock.
  4. When the install is complete, launch WhatsApp on your computer and scan the QR code to log in.

To scan the QR code

  • On Android: Chats screen > Menu > WhatsApp Web.
  • On iPhone 8.1+: Settings > WhatsApp Web.
  • On Windows Phone 8.0+: Chats screen > Menu > WhatsApp Web.
Note: ARM processors and Linux based systems are not supported.

I hope this has been informative, Share with your friends

How to Install Whatsapp on Computer

Whatsapp application which is a Phone application primarily developed to enhance communication like facebook, 2Go chat, Imo and all others messenger platforms has so far been gaining ground being the most widely used and user friendly phone application.


Upgrades in software development industry is a continual process and as a result, whatsapp is not left out. Its a common practice that one need to update his or her whatsapp at least once in two months.

Whatsapp now runs in computer system like every other system applications.
Many questions so far may be bodering your mind as in how can be using whatsapp on my computer system when its also installed in my phone. Do i need to change my number or use a different number.

I want to tell you that you don't have to change your number or get disconnected with your phone as install whatsapp on your system. Below is a guide on how to run whatsapp on your computer system.

HOW TO INSTALL WHATSAPP ON COMPUTER SYSTEM

To provide you with a richer communication experience, WhatsApp is now accessible both on your phone and your computer concurrently . WhatsApp desktop app and WhatsApp Web are computer based extensions of the WhatsApp account on your phone. The messages you send and receive are fully synced between your phone and your computer, and you can see all messages on both devices. Any action you take on the phone will apply to WhatsApp on your computer and vice versa. Interesting right.

To install whatsapp on Window 8+    

  1. On your computer’s browser, navigate to the download page to download the .exe file.
  2. Once the download is complete, open WhatsApp.exe to install WhatsApp on your computer.
  3. When the install is complete, launch WhatsApp on your computer and scan the QR code to log in. 
To scan the QR code if you are an android user, open your whatsapp and click on Whatsapp web then use your phone to scan the QR code on the whatsapp desktop application.
Then your phone will be connected with the desktop whatsapp application.

Whatsoever you do on one will be reflected on the other.

I hope this have been informative, share with your friends.

Wednesday 17 August 2016

ALGAL BLOOM OPERATIONS AND RESULTS

Interest in Harmful Algal Bloom (HAB) detection has grown in recent years for scientific, commercial and public health reasons. Depending on the type of algae present, HABs have been shown to be dangerous to sea life and to human health.     There is a significant interest in identifying environmental factors that

EXISTING WORK IN SMALL AERIAL VEHICLES

2.7 EXISTING WORK IN SMALL AERIAL VEHICLES
The increased availability of small, low-cost autonomous and remote aerial vehicles has seen a surge in their use for various research and remote sensing applications. More advanced control methods for careful trajectory following and maneuvering have been explored under controlled environments where precision position sensing is available via a video tracking system or similar (Mellinger, 2012). Simultaneous localization and

OPERATION OF AQUATIC ROBOTS AUTONOMOUS VEHICLES

These aquatic robots can be instrumental in detecting occurs suns of invasive species into protected area, either organically over time or through attachment to the halls of ships that travel from other area where species is prevalent. Aquatic robots can deployed for standalone tasks such as ship hall inspection reef monitoring by common wealth Scientific and Industrial Research Organization (CSIRO) star bug or sample collecting by Monterey Bay Aquarium Research institute (MBARI) Gulper or be used along side static sensor net works such as data mules and mobile  nodes with high-value sensor payloads. A CSIRO ASV can be used as a mobile node for water quality monitoring to detect HAB in water storage reservoir connected to a longer, floating static sensor network.

AUTONOMOUS VEHICLES (AQUATIC ROBOTS) USED IN MONITORING AND DETECTING HARMFUL ALGAE BLOOMS

CHAPTER TWO

AUTONOMOUS VEHICLES (AQUATIC ROBOTS) USED IN MONITORING AND DETECTING HARMFUL ALGAE BLOOMS

There are some autonomous plate forms used for detecting and monitoring harmful algae bloom. These plate forms can be equipped with a wide range of sensors and varying levels of autonomy. Environmental sensory networks will often employ a combination of severs different plate forms to

Sample industrial Training Report in the Department of Applied Biology

EBONYI STATE UNIVERSITY
FACULTY OF SCIENCE
DEPARTMENT OF APPLIED BIOLOGY
A TECHNICAL REPORT ON
STUDENT INDUSTRIAL WORK EXPERIENCE SCHEME (SIWES)
HELD AT
FEDERAL  MINISTRY OF ENVIRONMENT, DEPARTMENT OF ENVIRONMENTAL ASSESSMENT, BROWN BUILDING CENTRAL  AREA, ABUJA

PRESENTED BY
....................................
EBSU/...................
Date


DEDICATION
This report is dedicated to God almighty for he has been my source of inspiration and wisdom


ACKNOWLEGDEMENT
I wish to thank God almighty for me given the opportunity to undergo a six months SIWES programme in federal ministry of environment.
 My sincere appreciation goes to my industrial based supervisors Engr W.C.G Gomwalk andMr Ebenike C. for their love , care and their immense contributions during the short period of my industrial attachment.
I will also like to use this medium to thank the general board of  Environmental Impact Assessment division (EIA) and the entire staff and management of the Fedral Ministry of Environment for giving me this opportunity to undergo my SIWES programme in the Ministry.

Friday 12 August 2016

Properties and Uses of Mild Steel


  • The calculated average industry grade mild steel density is 7,861.093kgm3. Its young’s modulus (a measure of its stiffness) is around 210,000 Mpa.
  • A moderate amount of carbon makes mild sleep different from

Passivation of Metals

The passivation of a metal as pertain to corrion refers to the formation of a protective layer of a creation product, which inhibits further reaction ion, the passivation of metals occurs in the presence of a particular conditions. Examples of metals that show passivation are stainless steal, nickel alloys.
These are two main conditions regarding the nature of the passive.

Significance of Corrosion

Corrosion of engineering materials especially mild steel poses serious concern to engineers, scientists, researchers and the general public. Corrosion has a huge economic and environmental impact on virtually all facets of the world’s infrastructure, from highways, bridges and buildings to oil and gas, chemical processing and water and wastewater systems. In addition to causing severe damage

What is Corrosion

Corrosion

Corrosion is the destruction or deterioration of metal by direct chemical and electrochemical reaction with its environment (Budinski, 1983). It is the gradual physiochemical destruction of materials by the action of environment. The word corrosion comes from the Latin word “corrodore”, which means to graw away. Corrosion usually begins at the surface of a material as a result of the combined action of atmospheric oxygen and water.

THE EFFECT OF AZADIRACHTA INDICA EXTRACT ON THE CORROSION BEHAVUIOUR OF DEAD MILD STEEL IN ACIDIC (H2So4), BASIC (NaCI) AND SEA WATER MEDIA

CHAPTER ONE
INTRODUCTION
1.1 Background of the Study
There has been growing efforts in the exploration of natural products origin as corrosion, inhibiting agents. This has gain prominence due principally to the low cost and eco-friendliness of these products; and this is fast replacing the synthetic and expensive harzadous organic inhibitors (Okafor, Ebenso, and Ekpe, (2010).

Tech Gadgets you Can Hardly Do Without

The evolvement of technology over the decades has made it compulsory to use them. These technologies which come in various forms, sizes and shapes simplify human functions and
activities thus making them indispensable. Most people are addicted to some of these gadgets to the point of the gadgets becoming an appendage. we have identifies five (5) gadgets you can hardly do without. Whilst some of these devices are fun to use, others are functionally for safety precautions.

Music Player

Whether you carry a personal music player or listen to music straight off your computer, you'd probably miss your digital music if it suddenly disappeared. An added benefit is that music players promote harmony at the workplace. Employees can listen to their preferred tunes without annoying their workmates.

ATM/ATM MACHINE

Long lines at the banks are nobody's idea of a good time. With the Automated Teller Machine, you can perform a wide range of banking transactions such as making cash deposits, cash withdrawal, and account balance check at any time. ATMs give you access to 24-hour cash .

Computer

Office functions have been automated, thus most organizations can hardly work without computers. Same with individuals. This is because computers perform unlimited functions which can’t be done manually.

Smoke detector

The smoke detector has proven over and over again to be a life-saving gadget, and some people would literally not be alive without it. You will find it in many homes and offices. This is another essential device you can hardly do without.



Wednesday 10 August 2016

Revenue Allocation Under President Olusegun Obasanjo (1999-2007)

The proposed formular by Revenue mobilization allocation and fiscal commission gives:
- Federal government -41.3%
- State government – 31%
- Local government – 16%

THE SEARCH FOR EQUITABLE REVENUE ALLOCATION FORMULAR

The search for an equitable revenue allocation formular for the three levels of government in the country has remained contentions over the years. As the revenue mobilization, allocation and fiscal commission (RMAFC) reviews the country’s revenue allocation formular, one begins to wonder if there is, indeed, any justification for increased revenue to the states. And on account of very poor performance, justification for the existence of most local governments is a lot more difficult than

Revenue Allocation Under Abacha Regime 1994-1998

Abacha regime adopted and maintained the formular bequeathed to it by Babangide regime.  This formular is presented below:
- Federal government 48.5%
- State government 24%
- Local government 20%
- Special fund 7.5%

COMPONENTS OF REVENUE ALLOCATION FORMULAR IN NIGERIA

There are two components of the revenue allocation formular used for the disbursement of the federation account as indicate here:
1. Vertical Allocation formular
2. Horizontal Allocation formular

VERTICAL AND HORIZONTAL ALLOCATION FORMULAR

How Funds are allocated to LGAs in Nigeria

INTRODUCTION

Revenue allocation in Nigeria a central theme in government has a historical antecedent. In process, many commissions / committees have been set-up at different times in the Nigeria national history and were saddled with the responsibility of examining various fiscal issues and recommend the best principles and formulas in sharing national revenues to meet up with the challenges of the time.
Some of these commissions/committees are;
1. The Dina Interim Committee (1968)
2. The Raisman commission (1958)
3. The Hicks-phillipson commission (1951)

Friday 5 August 2016

CONCEPT OF OBSTETRIC RISKS OF HIGH PARITY

Primiparity, Multiparity, Grand multiparity, Great Grand Multiparity and Extreme Grand multiparity.
Parity, the number of deliveries by a woman after the gestational age of viability has been described using several terminologies which include Multiparity, primiparity, multiparity grand multiparity and great grand multiparityimplying increasing number of deliveries. These have sometimes been incorrectly applied by clinicians and midwives alike (Opara and Zaidi, 2007 in Umoh and Abah, 2012).

Thursday 4 August 2016

Research Questions on Evaluation of knowledge of Obstetric health problems associated with high parity among mothers in Ebonyi Local Government area of Ebonyi State.



  • What do women know about obstetric risks of high parity? 
  • What is the women’s perception of relationship between high parity and obstetric health problems? 
  • Is there relationship between women’s level of education and knowledge of obstetric risks of high parity? 

Scope of the Study

This study is delimited to the multiparous women that attends ante natal clinic at Ugbodo comprehensive health centre and Odomoke General hospital in Ebonyi local government Area.
Significance of the Study 

EVALUATION OF KNOWLEDGE OF OBSTETRIC HEALTH PROBLEMS ASSOCIATED WITH HIGH PARITY AMONG MOTHERS IN EBONYI LOCAL.....

CHAPTER ONE

INTRODUCTION

Background of the study

Pregnancy and childbirth devoid of any complication are source of joy and happiness not only to the immediate family members and relatives but to the entire community at large. The number of children a woman has or intends to have has been a topical issues in Nigeria for some time now not only because of population consideration but because of its implications for maternal health (Izugbara and Ezeh, 2011). 

HISTORICAL DEVELOPMENTS OF SIWES OPERATIONS

The vision of the Industrial Training Funds, when it initiated the Students Industrial Work Experience Scheme (SIWES) in 1973, was the provison of an avenue for students to acquire practical industrial exposure in their respectives disciplines during the

Descriptional features of fungal isolates

S/N
Colour
Consistency
Microscopy features
Lactophenol cotton blue 
Suspected fungal isolate

1
Nearly green
Grey fluffy mycelium
chains of single cell Conidia spherical, rod and regular in size
           +
Penicillium species

Characterization and identification of fungi isolate

The fungi isolate were identifed on the bases of colonial morphology followed by microscopic examination after lactophenol staining.

Things to note when looking for the Best Password Manager

I've long recommended password managers, but most of our readers always ask:
  • Which password manager is best?
  • Which password manager is the most secure? Help!
So, today I'm introducing you some of the best Password Manager currently available in the market for Windows, Linux, Mac, Android, iOS and Enterprise.

Before choosing a good password manager for your devices, you should check these following features:
  • Cross-Platform Application
  • Works with zero-knowledge model
  • Offers two-factor authentication (multi-factor authentication)
Note: Once adopted, start relying on your password manager because if you are still using weak passwords for your important online accounts, nobody can save you from malicious hackers.
Goooood Luck

How to Stay Secure/Safe Online?

About Password Manager
Security researchers have always advised online users to create long, complex and different passwords for their various online accounts. So, if one site is breached, your other accounts on other websites are secure enough from being hacked.


Ideally, your strong password should be at least 16 characters long, should contain a combination of digits, symbols, uppercase letters and lowercase letters and most importantly the most secure password is one you don't even know.

The password should be free of repetition and not contain any dictionary word, pronoun, your username or ID, and any other predefined letter or number sequences.

I know this is a real pain to memorize such complex password strings and unless we are human supercomputers, remembering different passwords for several online accounts is not an easy task.

The issue is that today people subscribe to a lot of online sites and services, and it's usually hard to create and remember different passwords for every single account.

But, Luckily to make this whole process easy, there's a growing market for password managers for PCs and phones that can significantly reduce your password memorizing problem, along with the cure for your bad habit of setting weak passwords.

What is Password Manager?

Password Manager software has come a very long way in the past few years and is an excellent system that both allows you to create complex passwords for different sites and remember them.

A password manager is just software that creates, stores and organizes all your passwords for your computers, websites, applications and networks.

Password managers that generate passwords and double as a form filler are also available in the market, which has the ability to enter your username and password automatically into login forms on websites.

So, if you want super secure passwords for your multiple online accounts, but you do not want to memorize them all, Password Manager is the way to go.


 How does a Password Manager work?

Typically, Password Manager software works by generating long, complex, and, most importantly, unique password strings for you, and then stores them in encrypted form to protect the confidential data from hackers with physical access to your PC or mobile device.

The encrypted file is accessible only through a master password. So, all you need to do is remember just one master password to open your password manager or vault and unlock all your other passwords.

However, you need to make sure your master password is extra-secure of at least 16 characters long.

How to Setup Password Manager in Computer and Devices

When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from cyber-threats. Its just a means to an End


Today majority of Internet users are vulnerable to cyber attacks, not because they aren't using any best antivirus software or other security measures, but because they are using weak passwords to secure their online accounts.

Passwords are your last lines of defense against online threats. Just look back to some recent data breaches and cyber attacks, including high-profile data breach at OPM (United States Office of Personnel Management) and the extra-marital affair site Ashley Madison, that led to the exposure of hundreds of millions of records online.

Although you can not control data breaches, it is still important to create strong passwords that can withstand dictionary and brute-force attacks. Yea, Brute-Force Attach.

You see, the longer and more complex your password is, the much harder it is crack.

However, you can stay safe online by abiding to some of these rules which include using of Password Manager to secure your account.

How to Set Up Google Prompt

You can enable google Prompt on your phone to notify you of any activity that is going on in your account.
You get notifies when you or someone logs into your email account in a form of text message.

Illustrated below is how to setup your account so you get notified of any activity going on in that account.


Before enabling Google Prompt, first enable two-step verification for your Google account and you have already enabled two-step verification, you can skip this part.
  •  Go to myaccount.google.com and sign in to your Google account.
  • Select 'Signing in to Google,' using 2-Step Verification.
  • Click on 'Get started' and enter your password once again.
  • Now provide your phone number you want to use for authenticating, and choose either an SMS or phone call for verification, and click on 'Try it.'
  •  Enter the 6-digit code from the SMS or phone call and select 'Next.'
  • For setting up two-step verification, click 'Turn ON.'

How to get your Android Phone Alert you when someone logs into your account

Google has rolled out a new feature for Android users to keep its users account more secure:Native Android Push Notification when a new device accesses your Google account.

Google has already been offering email notification for newly added devices, but since people usually ignore emails, the tech giant will now send a push notification to your device screen, giving you a chance to change your password immediately before an intruder gets in.


Although it's a little change, the company believes people pay four times more attention on push notifications on their devices compared to email notification.


The new feature " increases transparency to the user of what actions they've performed and allows them to flag any suspicious activity they may be seeing on the device," the company says in its official blog post.



So, from now on, when a new device is added to your Google account, or, in other words, when a new device accesses your account, you will receive a push notification on your current Android device, asking:

Did you just sign in?"

If yes, you can just ignore the notification. But if the activity appears suspicious, you just have to tap the "Review account activity" button to know about the details of the new device.

You can immediately change your password and add two-factor authorization (2FA) if you are worried someone else has accessed your account.

The new feature is rolling out to users gradually, and it may take over two weeks to reach all the users across the world.


Recently, Google is taking several measures to secure its users' account privacy. Google also introduced " Google Prompt" that makes 2-Step Verification (2FV) process much easier for you, allowing you to log in with just a single tap instead of typing codes.

Blackberry Moves to Android

BlackBerry is switching to the Android OS since it's BlackBerry 10 OS is struggling to keep up with the trends in the smartphone industry.

The Device named the DTEK 50 will sport a
5.2-inch 1080p display, Snapdragon 617 processor, 3GB of RAM,
16GB of storage(expandable up to 2TB via microSD) and Android
6.0 Marshmallow. The 135g phone also comes with a 13MP rear-

facing camera and an 8MP front-facing flash camera, the only
downside to the specs is the battery, which has a 2,610mAh
battery capacity

The device is built by Alcatel even bears a similar
resemblance to the Alcatel idol 4s. Also, check out some of the
features that make the DTEK 50 the most secure smartphone:

Rapid Security Patching: BlackBerry has a record of being
the quickest to deliver security patches, setting the bar in
incident response and patch management to protect your
device from malicious threats.

DTEK™ by BlackBerry App: Enables users to automatically
monitor their OS and apps to know when their privacy could
be at risk and to take action to improve it. The DTEK app
also tracks applications and notifies you when someone is:
taking pictures or videos without your knowledge, turning
your microphone on, sending a text message, or accessing
your contacts or location.

Hardware Root of Trust: BlackBerry’s manufacturing
process uses a proprietary technique that adds security
from the start, allowing for the tracking, verification, and
provisioning of DTEK50.

Secure Boot Process: Starting with the root of trust, each
stage of DTEK50’s secure boot chain must first verify that
the next component is fully intact before proceeding,
ensuring your device has not been tampered with since the
last restart.

Android OS hardening: BlackBerry provides additional
security patches, improved random number, address space
generation and certificate pinning to make it more difficult
for attackers to target a device by scrambling application/
system memory.

FIPS 140-2 Compliant Full Disk Encryption: Protects your
private information, like pictures or bank information, from
being stolen if you were to lose your phone

The Device is to sell at $299.

Easy Way to Transfer Megabyte (MB) to your friends and Family

How to Transfer Megabyte (MB) to your friends and Family
Internet has become so cheap that its better to subscribe to one plan and share it with your loved once. Your Dady can share your data plan with you or vis versa.

In cooperate organizations, this can be obtainable just as most organizations subscribe for voice packages, they can as well subscribe for data package for their staffs.

Enumerated below are how to activate and Share DATA Bundles for all the Networks in Nigeria.

Please Note that you cannot transfer free data allocated to you . Only data that has
been purchased by you or a tweaked data.


For Airtel

 60MB:
*141*712*4*recipient number#

 25MB:
*141*712*9*recipient number#

For 10MB dial
*141*712*11*recipient number#.

*Your credit will be deducted for this transaction

ETISALAT
*229*Recipients No*Amount of Mb#
E.g *229*0809325689*10#
If you're asked for pin dial.
*229*recipient No*Amount Of
MB*pin#
Your Security Pin Is 0000.
After doing this, the total MB
Your Transaction Should Be Successful Now.

 GLO
*127*Plan Code*receiver's number# E.g
*127*54*0805002363#
 54 is representing  the data plan code


Dial
*131*2# to register.
Dial
131*2*2*0000* new pin* new pin# to change your pin.
You default pin is 0000.

Tuesday 2 August 2016

Things to Note before Buying Power Bank

5 Things Nigerians Should Know Before Buying a Power Bank


Power is yet to be regular or stable in Nigeria. Hence, Nigerians are searching for alternatives to keep their phones, laptops and other devices charged. Interestingly, it seems phones are getting more
attention as there are now power banks which you can use to charge your phone when there is prolonged lack of power. As power banks have become very useful, it is very important that users know some things when they are buying one. This is important because there are many complaints about power banks like it takes ages to charge, it is substandard and/or its efficiency is less than 50%. You don’t want to spend money on this.


Weight of the Power Bank


Power banks come in different sizes and weight. You buy a portable one over a bulky one so that it will not become a burden when moving around.

Brand of the Power Bank


The brand of a power bank is vital. You already know the reliable brands that are popular for quality, durability, and resale value. Some of these brands may be expensive but you are guaranteed that you will use it for a long time. Despite this, you still have to be careful so that the brand name is not different from the package. Hence, don’t patronize touts.

Power output of the Power Bank


The power output of a power bank is the reason you are buying it. If the power output is low, you don’t need to buy it. A power bank needs at least 2 amperages to charge. So you should check if the power bank is has 2.1 amp output.

Power capacity of the Power Bank


For every power bank you want to buy, it must be 2.5 times more than the capacity of your phone. In other words, if the battery of your phone is 4000mAh, you should buy a power bank that is 10,000 mAh. You will only use about 6,700 mAh to charge. This is better than buying the one with the same mAh with your phone.

Quality of the Power Bank


Nigeria has become a dumping ground for different substandard products including power banks. Besides buying a brand, it is important to be careful not to buy a fake one because you have many in the market.

Monday 1 August 2016

Scientific description of Shrimp

Penaeus aztecus is an edible crustacean which belongs to the kingdom animalia. Large specimens of P. aztecus mades attain adult size of approximately 195mm in length, while large female specimens may reach 236mm in length (Williams, 1955)  and become reproductive when grown to the size of 140mm (Renfro, 1964).

Scientific Classification

P. aztecus currently known as Farfantepenaeus aztecus is scientifically

THE STUDY OF FUNGAL QUALITY OF FRESH SHRIMP

THE STUDY OF FUNGAL QUALITY OF FRESH SHRIMP
ABSTRACT
Fungal quality of fresh shrimp collected from Ndibe-Beach in Afikpo North Local Government Area of Ebonyi State, Nigeria was investigated by standard microbiological procedures. The shrimp was found to be contaminated with five fungal isolates belonging to different genera at varying loads; Aspergillus species, Penicillium species, Mucor species, Fusarium species and Rhizopus species. Samples of the head, body and tail showed an average fungal load of 2.07x106, 0.39x106 and 0.79x106 respectively. The percentage of occurrence showed that Aspergillus species have the highest frequency of 8(25.0%) for vendor A, 7(28.0%) for vendor B and 7(27.0%) for vendor C while Rhizopus species have the lowest frequency of occurrence of 4(12.5%), 4(16.0%) and 3(11.5%) for vendors A, B and C

I HOPE THIS HAVE BEEN VERY INFORMATIVE,

Get the Full Material delivered to your Email, . Call us on 07034538881

Follow Us On Twitter,
Like Us On Facebook,
Join Our Cycle On Google+

we can keep u updated by subscribing for free using your email
For more clarification, Please Leave a comment.

Related Posts Plugin for WordPress, Blogger...