Blog

  • How Much Of Our Brains Do We Actually Use?

    How Much Of Our Brains Do We Actually Use?

    We’ve all heard the seductive myth: “Humans only use 10% of their brains.” It’s a phrase that promises untapped genius, hidden potential, and near-magical cognitive abilities if we could only “unlock” the rest. But is there any scientific truth to this widely circulated claim?

    The idea that large portions of the brain sit idle has persisted in popular culture, self-help books, and even some motivational talks. It suggests that deep within our craniums lies a vast reserve of mental capacity waiting to be awakened. However, modern neuroscience, through decades of brain imaging, behavioral studies, and clinical observations, tells a far different — and more fascinating — story.

    This article explores how much of our brains we actually use, dismantling myths and replacing them with scientific clarity. Along the way, we’ll examine how different brain regions contribute to daily life, cognition, and creativity, drawing insights from scholars, neuroscience literature, and cutting-edge research. Understanding the truth doesn’t limit human potential — it enhances it.


    1- Origins of the 10% Myth

    The roots of the “10% brain” myth are murky but often traced back to misinterpreted statements by 19th and early 20th-century psychologists like William James, who said humans “only use a small part of their mental and physical resources.” This poetic musing was likely intended to inspire rather than inform. However, as Carl Sagan noted in The Dragons of Eden, “We use every part of the brain, and the evidence of over a century of neuroscience supports this.”

    The myth gained traction with the rise of pop psychology and became embedded in motivational rhetoric. Yet, it fails under scientific scrutiny. Techniques like functional magnetic resonance imaging (fMRI) clearly show activity across nearly the entire brain, even during sleep or simple tasks. The notion of 90% inactivity is not only inaccurate—it’s a profound underestimation of the brain’s complexity.


    2- The Brain’s Energy Consumption

    The human brain, while comprising just about 2% of total body mass, consumes nearly 20% of the body’s energy at rest. This metabolic demand would be biologically irrational if most of the brain were lying dormant. Nature, being ruthlessly efficient, does not invest energy into organs that serve no function.

    According to Principles of Neural Science by Eric Kandel, the brain’s energy expenditure supports synaptic activity, information processing, and neurotransmission — all occurring throughout the brain. This high level of consumption is one of many strong arguments against the 10% usage myth. Even tasks as basic as recognizing a face or forming a sentence require complex coordination between numerous regions.


    3- Brain Imaging and Functional Evidence

    Modern brain imaging tools like fMRI and PET scans have debunked the 10% myth in a conclusive fashion. These scans show that virtually every part of the brain has some function and becomes active at various times, depending on the task.

    For example, neuroscientist Barry Beyerstein pointed out that even simple motor or sensory tasks engage multiple areas. In his work and lectures, he often emphasized, “If 90% of the brain were useless, then damage to those areas should have no effect, yet this is clearly not the case.” Such imaging technologies have illuminated the distributed and dynamic nature of brain activity.


    4- Evolutionary Efficiency

    From an evolutionary standpoint, it would make no sense for humans to carry around 1.4 kilograms of mostly unused neural tissue. Evolution selects for efficiency, and brain tissue is among the most metabolically expensive in the body.

    David Eagleman, in The Brain: The Story of You, argues that the brain’s structure has evolved in response to environmental demands and problem-solving needs. Natural selection would not favor the retention of such an energy-intensive organ if most of it were vestigial. This reinforces the notion that the entirety of the brain serves purpose, even if we don’t yet understand every nuance.


    5- Brain Plasticity and Adaptation

    Brain plasticity — the capacity of the brain to rewire itself — is a key reason humans can learn languages, master instruments, or recover after injury. It indicates that various areas of the brain are in use and capable of adapting to new tasks.

    Neuroscientist Norman Doidge explores this in The Brain That Changes Itself, showing that even in cases of brain damage, other areas can take over lost functions. This remarkable adaptability is only possible because the brain is actively engaged and dynamic across its full extent.


    6- The Brain’s Division of Labor

    Different brain regions are responsible for different tasks. The frontal lobes handle decision-making and planning; the occipital lobes process vision; the temporal lobes manage auditory information and memory. Every region has a job.

    As outlined in Neuroscience: Exploring the Brain by Mark Bear, nothing in the brain is left to chance or dormancy. The architecture of the brain is designed to be utilized holistically, not fractionally. This functional specialization supports the view that we use all parts of the brain, just not simultaneously.


    7- Learning and Memory Use Broad Networks

    Learning isn’t localized to one area. Memory formation and retrieval involve complex neural networks including the hippocampus, prefrontal cortex, and amygdala. These systems interact dynamically based on emotional content, type of memory, and retrieval needs.

    Studies in cognitive neuroscience, such as those by Elizabeth Loftus, show how even a simple recollection activates multiple regions, demonstrating a web of neural engagement. Thus, even a basic act like remembering your lunch involves a cascade of brain activity.


    8- The Role of the Cerebellum

    Often underestimated, the cerebellum — once thought to manage only motor function — also contributes to cognitive processes like attention and language. It represents about 10% of brain volume but contains over 50% of its neurons.

    This insight, highlighted in works like Cognition, Brain, and Consciousness by Baars and Gage, shatters simplistic assumptions about brain use. It also emphasizes how interconnectivity between “motor” and “thinking” areas is far more profound than once believed.


    9- The Myth in Popular Culture

    Films like Lucy and Limitless propagate the idea that unlocking unused brainpower leads to superhuman abilities. While entertaining, these portrayals are more fiction than fact and risk misleading audiences about real neuroscience.

    Steven Pinker warns in How the Mind Works that “folk psychology and Hollywood” often misrepresent science for narrative appeal. The brain is amazing as it is — there’s no need to invent powers we don’t have to appreciate its full potential.


    10- Neurological Disorders and Brain Damage

    Neurological studies consistently demonstrate that damage to virtually any part of the brain leads to deficits, ranging from memory loss to impaired speech or paralysis. If vast regions were unused, such injuries would be benign.

    Oliver Sacks, in The Man Who Mistook His Wife for a Hat, illustrated how even subtle dysfunctions in specific regions result in dramatic behavioral and perceptual changes, underscoring that every part of the brain has a critical role.


    11- Cognitive Load and Mental Multitasking

    Even simple tasks require complex orchestration among different brain systems. Multitasking — though often inefficient — activates widespread networks across the prefrontal cortex, parietal lobes, and more.

    Daniel Kahneman, in Thinking, Fast and Slow, outlines how cognitive load taxes our brain’s bandwidth, confirming that we regularly stretch the brain’s processing capacity. That usage far exceeds the mythical 10%.


    12- Brain Use During Sleep

    Even during sleep, the brain remains highly active. It processes memories, manages bodily functions, and undergoes maintenance tasks. REM sleep, for instance, activates the visual cortex, limbic system, and brainstem.

    Matthew Walker in Why We Sleep explains that far from resting entirely, the brain at night is “buzzing with electrical activity” crucial for learning, emotional regulation, and physical health. Sleep is proof that our brains never truly shut down.


    13- Conscious vs. Unconscious Processing

    A significant portion of brain function is unconscious — regulating heart rate, digesting food, filtering sensory input. These automatic processes are coordinated across multiple regions.

    Freud once said, “The conscious mind is the tip of the iceberg,” and neuroscience validates this. The unconscious brain is not inactive; it is operating on a different level, as Antonio Damasio elaborates in Descartes’ Error.


    14- Neurogenesis and Lifelong Development

    Recent research shows that the brain continues to generate new neurons in certain regions even into adulthood. This contradicts older models that assumed a static brain after childhood.

    In Livewired, David Eagleman describes this dynamic system, emphasizing how the brain constantly reshapes itself in response to experience. The presence of neurogenesis underscores that the brain remains an active, evolving organ.


    15- Intelligence and Brain Utilization

    Intelligence is not about using more of the brain, but using it efficiently. Neural efficiency theory suggests that smarter individuals use fewer brain resources for the same task due to more optimized neural pathways.

    Research published in Nature Reviews Neuroscience supports this, showing that intelligent people often show less activation in brain scans for familiar tasks — not because they’re using less of their brains, but because their brains are working smarter.


    16- The Brain and Creativity

    Creativity engages both hemispheres and multiple networks, including the default mode network (DMN) and executive attention network. Far from being confined to “the right brain,” creativity involves a whole-brain process.

    As Scott Barry Kaufman describes in Wired to Create, the creative process taps into a rich, interconnected web of cognitive functions — memory, emotion, attention, and language. This coordination invalidates any simplistic “percentage use” assumptions.


    17- Role of Emotions in Brain Activity

    Emotions are processed in the limbic system but influence activity across the entire brain, including areas responsible for decision-making and learning. Emotional salience shapes memory and perception.

    Joseph LeDoux in The Emotional Brain reveals how emotional responses are deeply embedded in cognition. Emotions are not sidelined in brain function; they are central to it — further evidence that most of the brain is actively engaged.


    18- Impact of Meditation and Mindfulness

    Practices like meditation alter brain structure and function. Studies show increased grey matter density in areas responsible for learning, memory, and emotional regulation.

    Jon Kabat-Zinn’s work and books like The Mindful Brain by Daniel Siegel illustrate that mindfulness doesn’t unlock unused brain areas—it enhances the connectivity and function of what’s already in use, improving efficiency and clarity.


    19- Brain Training and Cognitive Enhancement

    While brain training apps and programs can boost certain skills, they don’t “unlock” unused regions. They help strengthen and fine-tune existing neural networks through repetition and engagement.

    Adrian Owen’s research warns against overpromising claims but acknowledges that targeted practice can lead to measurable gains in speed, memory, and reasoning — not by accessing new areas, but by refining use of all we already employ.


    20- Future of Brain Research

    As brain mapping technologies evolve, we’ll continue uncovering new functions and interconnections. The frontier is not discovering “unused” parts but understanding how the active brain works in concert.

    Books like Connectome by Sebastian Seung advocate for this future, focusing on how complex patterns of connectivity, not dormant regions, define the mind’s vast capabilities. The real mystery isn’t about unused portions — it’s about how the used ones work together.


    21- The 10% Myth

    The enduring belief that humans only use 10% of their brains is one of the most pervasive myths in neuroscience. Despite its popularity, this idea has been thoroughly discredited by the scientific community. Every modern neuroscientific study confirms that all parts of the brain have known functions, whether related to cognition, motor control, sensory input, or autonomic processes.

    Steven Novella, a neurologist at Yale, emphasizes, “The 10% myth is so wrong it’s almost laughable.” What persists, however, is the metaphorical appeal—that we have untapped potential. This appeal should instead be redirected toward understanding and maximizing real brain function, not chasing fictional limits.


    22- Brain Imaging Reveals Truth

    Functional imaging, such as fMRI and PET scans, has revolutionized our understanding of brain activity. These technologies show that even during rest, the brain is active in the default mode network (DMN), and during tasks, almost every part of the brain lights up based on need.

    As highlighted in Cognitive Neuroscience by Gazzaniga et al., these imaging studies offer concrete evidence that there’s no “silent” majority in the brain. Instead, the visual, motor, auditory, and association cortices work in seamless harmony across cognitive tasks, putting the 10% myth to rest.


    23- Continuous Brain Activity

    The brain never truly sleeps — not even during sleep. It is continuously processing sensory information, regulating bodily functions, and engaging in neural housekeeping, like clearing waste via the glymphatic system.

    Neuroscientist György Buzsáki in Rhythms of the Brain discusses how even the quietest mental states are accompanied by rhythmic neural activity. This persistent baseline proves that our brains are always in operation, continuously engaged in maintaining physical and cognitive equilibrium.


    24- Task-Specific Brain Regions

    Different cognitive and physiological tasks activate specific regions of the brain. Reading a sentence involves the visual cortex, Broca’s area, Wernicke’s area, and frontal lobe regions related to comprehension and prediction.

    This modular yet interconnected nature of brain function is explained in The Human Brain Book by Rita Carter. Each brain region contributes to a specific role, and none is truly redundant. Understanding these functions highlights the incredible specialization and integration within the brain.


    25- The Role of the Prefrontal Cortex

    The prefrontal cortex is the seat of higher-order thinking, responsible for executive functions like planning, decision-making, social behavior, and impulse control. Damage to this area can lead to profound personality and behavioral changes.

    Antonio Damasio, in The Feeling of What Happens, explains that the prefrontal cortex helps coordinate emotion with logic, making it vital to rational thought and social function. Far from being dormant, this area is among the most actively engaged in our daily lives.


    26- Neural Networks and Connectivity

    Rather than working in isolation, the brain operates through extensive neural networks. These interconnected circuits allow for parallel processing, enabling humans to combine emotion, logic, memory, and perception seamlessly.

    The connectome project, as explored by Sebastian Seung, illustrates how brain connectivity patterns—rather than isolated nodes—determine function. This holistic approach underscores how vast and interconnected our neural usage truly is.


    27- Energy Consumption

    The brain’s energy needs are staggering. It consumes around 20% of the body’s energy despite its small size. This energy is used for electrical signaling, neurotransmitter synthesis, and maintaining ionic gradients.

    In Energy and the Brain by Marcus Raichle, it’s revealed that even minimal mental tasks cause metabolic surges in specific brain areas, demonstrating constant and context-driven energy use. Such energy demand would be implausible for an organ that was 90% inactive.


    28- Motor and Sensory Functions

    The brain’s motor and sensory cortices are extensively mapped, with specific regions controlling precise body parts. These areas are continually active, whether you’re walking, typing, or simply adjusting posture.

    The somatosensory homunculus, a representation found in textbooks like Neuroscience by Dale Purves, visualizes this detailed control and feedback. The fine-tuned coordination of body and environment is another testament to the full use of our brains.


    29- Emotions and the Limbic System

    The limbic system, including the amygdala, hippocampus, and hypothalamus, plays a crucial role in regulating emotion, memory, and motivation. Emotional experience isn’t fringe to cognition—it’s central to how we process and react to the world.

    Paul Ekman, a leading expert on emotions, argues that “our feelings color our every thought and memory.” Neuroscience confirms this: emotional states alter neural activity across the brain, reinforcing that all areas are in constant flux.


    30- Subconscious Processing

    A significant portion of cognitive work occurs beneath our conscious awareness. Subliminal processing, intuition, and automatic judgments rely on deep brain structures like the basal ganglia and brainstem.

    Michael Gazzaniga’s split-brain studies highlight the power of unconscious cognition, where patients made decisions before being aware of them. The subconscious doesn’t suggest underuse—it illustrates that brain work continues even outside of our awareness.


    31- Plasticity and Brain Adaptation

    Neuroplasticity allows the brain to reorganize itself by forming new connections in response to learning or damage. This adaptability shows that the brain is not a static entity but a responsive, evolving system.

    In Soft-Wired by Michael Merzenich, the lifelong capacity for plasticity is detailed, showing how every learning experience reshapes the brain’s architecture. If we only used a small fraction, this remarkable capacity would be unnecessary.


    32- Learning and Brain Usage

    Learning activates networks across the brain, including those responsible for attention, memory, language, and motor function. Whether it’s learning a new language or how to dance, different systems are engaged simultaneously.

    As Howard Gardner states in Frames of Mind, intelligence is multi-faceted, involving a variety of skills and learning pathways. Each of these requires robust and broad brain engagement, contradicting any notion of partial brain usage.


    33- Memory Systems

    Memory is not localized to one spot but involves a network of systems. The hippocampus is crucial for forming new memories, while long-term storage involves the neocortex.

    Larry Squire’s work in Memory: From Mind to Molecules shows how different kinds of memory — episodic, procedural, semantic — rely on distributed processing across brain regions, all of which are indispensable.


    34- Brain Activity During Sleep

    During REM sleep, the brain’s activity mirrors wakefulness, particularly in areas associated with learning and emotional regulation. Sleep is not a period of inactivity—it is when the brain consolidates knowledge and resets.

    Walker’s Why We Sleep demonstrates that sleep is integral to memory formation and mental health. REM and non-REM phases show active, coordinated brain patterns, debunking the idea of dormancy.


    35- Creativity and Brain Integration

    Creativity arises from the interplay of multiple brain systems, particularly the default mode network and executive control network. This integration allows for divergent thinking and novel solutions.

    Scott Barry Kaufman notes that “creative cognition involves both spontaneous and controlled processing,” proving that the entire brain participates in the creative process—not just isolated regions like the right hemisphere.


    36- Reflexive and Automatic Responses

    Reflexes and automated actions, though rapid, still rely on complex neural circuits. The spinal cord, brainstem, and motor cortex all play roles in ensuring these responses are executed flawlessly.

    As shown in Principles of Neural Science, these “simple” tasks still involve sensory input, integration, and motor output — a three-stage process involving substantial brain infrastructure.


    37- Sensory Integration

    The brain must constantly synthesize data from multiple senses—sight, sound, touch, smell, and taste—to construct a coherent perception of reality. This integration occurs in the thalamus and association cortices.

    This multisensory processing is evident in disorders like sensory integration dysfunction, where a breakdown affects balance and attention. It emphasizes how seamlessly and continuously the brain blends information.


    38- Brain Regions and Language

    Language processing engages Broca’s area, Wernicke’s area, the auditory cortex, and motor planning regions. It is among the most complex tasks, activating networks across both hemispheres.

    Steven Pinker in The Language Instinct outlines how language is “an instinct” deeply embedded in our biology, requiring intense and distributed neural effort—far from a 10% operation.


    39- The Brain’s Role in Attention

    Attention is governed by a network that includes the prefrontal cortex, parietal lobes, and subcortical structures like the thalamus. This distributed system determines focus, alertness, and priority.

    The attentional spotlight metaphor, discussed in Cognitive Psychology by Eysenck and Keane, reveals the dynamic allocation of brain resources depending on context and need. Attention is a full-brain affair.


    40- Coordination and the Cerebellum

    The cerebellum not only coordinates movement but also contributes to cognitive processes like timing, prediction, and emotional modulation. It is highly active during both motor and non-motor tasks.

    Leiner et al., in The Cerebellum and Cognition, argue that cerebellar function is integral to smooth, adaptive behavior. Its neuron-rich structure further supports the argument that no brain region is wasted.


    41- Brain Function in Social Interaction

    Social cognition involves theory of mind, empathy, and interpretation of non-verbal cues. These functions activate the prefrontal cortex, amygdala, and temporoparietal junction.

    Simon Baron-Cohen’s work on autism reveals how deficits in social processing correspond to specific neural patterns, reinforcing that these abilities are both complex and neurologically rooted.


    42- Brain Stem’s Vital Functions

    The brainstem regulates heartbeat, respiration, and arousal—functions so essential they must operate flawlessly and continuously. Damage here is often fatal, emphasizing its indispensability.

    These involuntary functions demonstrate that even the “oldest” parts of the brain are always engaged, maintaining life itself around the clock.


    43- Multitasking and Brain Efficiency

    Multitasking engages multiple brain systems, often switching between tasks rapidly rather than processing them in parallel. This still requires activation in the prefrontal cortex and anterior cingulate.

    As Earl Miller of MIT says, “We’re not really multitasking—we’re rapidly shifting attention.” But each shift demands resources, showing that multitasking pushes the brain’s efficiency to the limit.


    44- Stress and Brain Activity

    Stress activates the hypothalamic-pituitary-adrenal (HPA) axis and influences the amygdala, hippocampus, and prefrontal cortex. Chronic stress can even alter brain structure and reduce neuroplasticity.

    Robert Sapolsky in Why Zebras Don’t Get Ulcers explains how psychological stress, though abstract, has concrete, brain-wide effects — reinforcing the full engagement of brain networks under pressure.


    45- Cognitive Reserve and Brain Health

    Cognitive reserve refers to the brain’s resilience against damage or aging. It’s built through education, complex tasks, and social engagement, and engages widespread neural circuits.

    Yaakov Stern’s research suggests that high cognitive reserve enables the brain to use alternate pathways, showing again how the whole brain adapts and compensates dynamically.


    46- Synaptic Connections and Learning

    Learning strengthens synaptic connections and forms new ones. This synaptic plasticity is the foundation of all cognitive growth and relies on coordinated neural activity.

    Hebbian theory, often summarized as “cells that fire together, wire together,” explains how experience literally rewires the brain — a system-wide process involving all relevant areas.


    47- Focused Attention and Brain Regions

    Sustained attention activates the anterior cingulate cortex, frontal eye fields, and parietal regions. This coordinated activity ensures we maintain focus on tasks and goals.

    The Neuroscience of Attention by Posner and Petersen details how this circuit is critical to performance and mental endurance, requiring full-system support.


    48- Distraction and Brain Function

    Distractions disrupt attention networks, decreasing performance. The default mode network, when not actively suppressed, contributes to mind-wandering, requiring regulatory effort from the prefrontal cortex.

    This dynamic of control and lapse again shows how brain activity isn’t limited—it fluctuates with internal and external stimuli, always requiring oversight from multiple regions.


    49- Using Almost All of the Brain

    Cumulatively, the evidence is clear: humans use virtually all parts of the brain. Not all regions are active at once, but over time and across functions, every area plays a vital role.

    This understanding replaces myth with marvel. Rather than seeking magical “unused” zones, we should marvel at how deeply integrated, responsive, and efficient the human brain already is.

    50- Holistic Brain Function and Human Potential

    The final synthesis of what neuroscience reveals is that the human brain functions holistically, with no truly inactive regions. From regulating heartbeat in the brainstem to contemplating abstract concepts in the prefrontal cortex, every part plays a role. Human potential, then, lies not in “unlocking” dormant sections of the brain, but in improving the coordination, efficiency, and adaptability of already active systems.

    Dr. V.S. Ramachandran emphasizes in The Tell-Tale Brain that “it’s not how much of the brain you use, but how you use it.” True cognitive excellence stems from strengthening connections between regions, improving neuroplasticity, and fostering environments that challenge and stimulate the mind. This is the path toward actualizing the brain’s full potential—grounded in science, not myth.

    Conclusion

    The myth that we use only 10% of our brains is a relic of misunderstood science and romanticized self-help rhetoric. In reality, neuroscience has firmly established that we use all regions of the brain, though not all at once or for the same tasks. Each area has its unique function and contributes to the symphony of human thought, emotion, and action.

    Dispelling the myth doesn’t reduce our potential — it elevates it. By understanding how our brains truly work, we empower ourselves to harness their full capabilities through learning, mindfulness, and creativity. The wonder of the brain is not in what is unused, but in how fully and beautifully it functions every day.

    Bibliography

    1. Gazzaniga, Michael S., Ivry, Richard B., & Mangun, George R. (2018). Cognitive Neuroscience: The Biology of the Mind (5th ed.). W.W. Norton & Company.
    2. Novella, Steven (2013). The 10 Percent Brain Myth. Neurologica Blog. Retrieved from https://theness.com
    3. Raichle, Marcus E. (2006). The Brain’s Dark Energy. Science, 314(5803), 1249–1250.
    4. Merzenich, Michael M. (2013). Soft-Wired: How the New Science of Brain Plasticity Can Change Your Life. Parnassus Publishing.
    5. Damasio, Antonio (1999). The Feeling of What Happens: Body and Emotion in the Making of Consciousness. Harcourt.
    6. Walker, Matthew (2017). Why We Sleep: Unlocking the Power of Sleep and Dreams. Scribner.
    7. Kandel, Eric R., Schwartz, James H., & Jessell, Thomas M. (2012). Principles of Neural Science (5th ed.). McGraw-Hill.
    8. Carter, Rita (2019). The Human Brain Book (2nd ed.). DK Publishing.
    9. Pinker, Steven (1994). The Language Instinct: How the Mind Creates Language. William Morrow and Company.
    10. Ekman, Paul (2003). Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life. Henry Holt and Co.
    11. Squire, Larry R., & Kandel, Eric R. (2008). Memory: From Mind to Molecules. Roberts & Company Publishers.
    12. Buzsáki, György (2006). Rhythms of the Brain. Oxford University Press.
    13. Kaufman, Scott Barry & Gregoire, Carolyn (2015). Wired to Create: Unraveling the Mysteries of the Creative Mind. Perigee Books.
    14. Leiner, Henrietta C., Leiner, Alan L., & Dow, R. S. (1993). The Cerebellum and Cognition. Academic Press.
    15. Baron-Cohen, Simon (2003). The Essential Difference: Male and Female Brains and the Truth About Autism. Basic Books.
    16. Sapolsky, Robert M. (2004). Why Zebras Don’t Get Ulcers (3rd ed.). Holt Paperbacks.
    17. Stern, Yaakov (2009). Cognitive Reserve. Neuropsychologia, 47(10), 2015–2028.
    18. Seung, Sebastian (2012). Connectome: How the Brain’s Wiring Makes Us Who We Are. Houghton Mifflin Harcourt.
    19. Gardner, Howard (1983). Frames of Mind: The Theory of Multiple Intelligences. Basic Books.
    20. Ramachandran, V.S. (2011). The Tell-Tale Brain: A Neuroscientist’s Quest for What Makes Us Human. W.W. Norton & Company.

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • The Best Ways To Celebrate Being Single

    The Best Ways To Celebrate Being Single

    Who says happiness hinges on a relationship status? In a world obsessed with coupledom, being single is often seen as a temporary stop rather than a destination worth embracing. But solitude, when chosen and cherished, is not loneliness—it is liberation. As social researcher Bella DePaulo writes in Singled Out, “People who are single are often happier and more self-sufficient than their coupled peers.”

    Far from being a time of waiting, singlehood can be a season of personal flourishing. It’s the perfect opportunity to rediscover your identity outside of societal expectations. With no compromises needed, single individuals can design their lives with complete autonomy—choosing their priorities, nurturing their passions, and exploring their values. It’s an era of sovereignty over one’s time, energy, and emotional investment.

    Whether by choice or circumstance, being single isn’t a status to mourn—it’s a space to celebrate. This article will take you through a curated list of the best ways to honor your independence, cultivate personal joy, and make the most of your solo journey. From self-investment to building community, each suggestion is a step toward a richer, more intentional life.


    1- Embrace Your Independence

    Celebrating independence means more than just enjoying quiet nights alone; it’s about consciously recognizing your power to make choices without external interference. Use this time to learn who you truly are—what drives you, what excites you, what calms you. Independent living sharpens decision-making skills and builds emotional resilience. As Viktor Frankl asserted in Man’s Search for Meaning, “When we are no longer able to change a situation, we are challenged to change ourselves.” Singlehood gives you the space to do exactly that.

    Moreover, autonomy fosters a level of personal growth that’s hard to achieve in a codependent setting. You can travel solo, manage your finances freely, or pursue career moves that best serve your vision. Living independently teaches you to thrive on self-validation rather than external affirmation—an invaluable skill in today’s hyperconnected yet often superficial world.


    2- Focus on Self-Improvement

    Without the daily compromises relationships require, you can pour your energy into self-mastery. Whether it’s enrolling in courses, learning a new language, or developing a creative skill, singlehood offers uninterrupted time for self-enrichment. As Aristotle wrote in Nicomachean Ethics, “Knowing yourself is the beginning of all wisdom.” This is the perfect time to invest in that knowledge.

    Additionally, self-improvement doesn’t just mean accumulating achievements—it involves emotional and psychological growth. Therapy, mindfulness practices, and journaling can help you process past relationships and establish healthy boundaries. These habits not only prepare you for future connections but also deepen your self-understanding, resulting in greater overall life satisfaction.


    3- Build a Rich Social Life

    Being single doesn’t equate to being isolated. In fact, many singles report having deeper friendships and wider social circles than their married counterparts. Cultivate friendships that nurture you intellectually and emotionally. Join book clubs, attend community events, or volunteer—activities that connect you with people based on shared interests rather than shared status.

    Philosopher Alain de Botton emphasizes in The Course of Love that romantic love is just one facet of the social experience. True richness in life often comes from platonic love—the kind that endures through seasons of change. Strengthening these bonds ensures that your social ecosystem is robust, fulfilling, and multidimensional.


    4- Travel Solo

    Solo travel isn’t just liberating; it’s transformative. With no compromises on itinerary or pace, you can craft a journey tailored precisely to your interests. Visiting new cultures and meeting people from different walks of life expands your worldview and builds inner confidence. As Pico Iyer notes, “Travel is not really about leaving our homes, but leaving our habits behind.”

    Moreover, solo travel fosters mindfulness. Without a partner’s influence, your observations, choices, and reactions are entirely your own. It’s a chance to truly encounter the world—and yourself—on your own terms. For deeper insight into this, consult The Art of Travel by Alain de Botton.


    5- Celebrate Small Wins

    Too often, single individuals wait for a major milestone—like a promotion or new relationship—to feel worthy of celebration. Flip the script by honoring your daily victories, however small. Cooked a new recipe? Completed a book? Navigated a difficult conversation with grace? These are all achievements worth recognizing.

    Celebrating yourself instills a sense of gratitude and presence. It helps you break free from the achievement treadmill and instead cultivate a mindset of appreciation. As Gretchen Rubin highlights in The Happiness Project, “The days are long, but the years are short.” Appreciating each day’s wins ensures that your journey feels meaningful at every step.


    6- Create a Self-Care Ritual

    Self-care is often reduced to bubble baths and spa days, but its true essence lies in sustained, intentional practices that support your wellbeing. Craft a morning or evening routine that centers you—be it yoga, reading, or silence. Having such rituals reinforces your worth and fosters internal balance.

    Mental health expert Dr. Kristin Neff emphasizes the importance of self-compassion in Self-Compassion: The Proven Power of Being Kind to Yourself. Engaging in daily rituals that affirm your value is a concrete act of kindness towards yourself. These consistent habits nurture emotional stability and deepen your sense of self-trust.


    7- Financial Freedom

    Being single offers unmatched financial flexibility. With no one else’s priorities to balance, you can tailor your spending and saving to your life goals. Build a budget, invest wisely, or fund a dream project without compromise. This is your chance to create a financial roadmap that mirrors your unique vision of success.

    As Suze Orman advises in Women & Money, financial independence is one of the truest forms of freedom. Take this time to understand your relationship with money, refine your financial literacy, and position yourself for long-term security and peace of mind.


    8- Cultivate a Hobby

    A rich life is one filled with passion pursuits. Whether it’s painting, gardening, coding, or learning a musical instrument, hobbies offer a form of self-expression that’s deeply satisfying. They connect you to your inner child and remind you that joy doesn’t need to be productive to be valuable.

    In Flow: The Psychology of Optimal Experience, psychologist Mihaly Csikszentmihalyi describes how engaging in activities that absorb our attention fully can dramatically increase happiness. Hobbies provide that focused engagement—a way to experience life more vividly and authentically.


    9- Redefine Success

    Society often equates success with couplehood or parenthood. Being single invites you to challenge that narrative. What does success look like on your terms? Is it freedom, peace, achievement, exploration? Allow yourself to rewrite the script.

    As Brené Brown points out in The Gifts of Imperfection, “Owning our story and loving ourselves through that process is the bravest thing we’ll ever do.” This phase of your life is an invitation to do just that—define success not by someone else’s standards, but by your own.


    10- Explore Your Spiritual Side

    Singlehood provides a unique space to delve deeper into spirituality, free from distractions. Whether through meditation, religious study, or quiet reflection, this is a time to connect with something larger than yourself. Spirituality can provide grounding, especially during transitional periods.

    As the mystic poet Rumi wrote, “The wound is the place where the Light enters you.” Exploring spiritual dimensions can turn solitude into sanctity. For deeper insight, explore The Untethered Soul by Michael A. Singer or The Power of Now by Eckhart Tolle.


    11- Learn to Enjoy Solitude

    Solitude is not the absence of company, but the presence of self. Learning to enjoy your own presence is both an art and a practice. Take yourself to dinner, go on solo walks, or spend time with your thoughts without reaching for distractions. This intentional solitude fosters clarity and self-alignment.

    In Solitude: A Return to the Self, Anthony Storr argues that solitude is essential for creativity and self-understanding. Embracing it enhances your ability to regulate emotions, process experiences, and live with greater intentionality.


    12- Set Personal Goals

    Without shared goals or compromises, you have a blank canvas to paint your vision for the future. Set short- and long-term goals that speak to your desires, whether that’s writing a book, running a marathon, or launching a business. These goals give structure and purpose to your solo journey.

    Goal-setting theory, as outlined by Edwin Locke and Gary Latham, shows that clear, challenging goals enhance motivation and performance. Having personal milestones empowers you to live with direction and drive, making each day a deliberate step forward.


    13- Practice Gratitude

    Gratitude shifts your focus from what’s missing to what’s present. Maintaining a gratitude journal or simply reflecting on daily blessings can dramatically improve your mindset. It keeps your attention rooted in abundance, not lack.

    In Thanks!: How the New Science of Gratitude Can Make You Happier, Robert Emmons demonstrates how regular gratitude practice leads to better health, stronger relationships, and increased happiness. Being single gives you the freedom to fully appreciate your blessings without distraction.


    14- Volunteer and Give Back

    Contributing to others is one of the most profound ways to find fulfillment. Use your time and energy to volunteer for causes that align with your values. This outward focus balances the inward journey of self-growth.

    The philosopher Albert Schweitzer once said, “The purpose of human life is to serve, and to show compassion and the will to help others.” Service enriches not only the lives of others but deepens your own sense of purpose and connection.


    15- Invest in Learning

    Learning doesn’t end with school. Take up new courses, attend seminars, or read voraciously. The digital age offers countless opportunities for self-education. Feed your curiosity—it is the wellspring of creativity and innovation.

    In Mindset, psychologist Carol Dweck explains how a “growth mindset” leads to lifelong achievement. By continually learning, you stay agile, open, and intellectually nourished—vital traits for a thriving single life.


    16- Strengthen Emotional Intelligence

    Being single gives you the space to study your emotional patterns. You can observe, reflect, and recalibrate without the relational noise. Emotional intelligence—understanding and managing your emotions—directly correlates with life satisfaction and interpersonal success.

    Daniel Goleman, in Emotional Intelligence, argues that EQ often matters more than IQ in determining success. Investing in your emotional education now lays a strong foundation for all future relationships, personal or professional.


    17- Create a Vision Board

    A vision board is a visual reminder of your dreams and goals. Fill it with images, quotes, and symbols that inspire you. This exercise reinforces your intentions and keeps you motivated to live your best single life.

    Visualization is a powerful tool, as demonstrated in The Secret by Rhonda Byrne. Focusing daily on your aspirations primes your subconscious to take aligned action, helping you manifest a life rich in meaning and joy.


    18- Reconnect With Family

    Often, relationships can take time and energy away from family bonds. Use your singlehood to nurture those foundational relationships. Reconnect with parents, siblings, or extended relatives. These bonds form the emotional scaffolding of your life.

    Family relationships, though sometimes complicated, provide grounding. As therapist Esther Perel notes in The State of Affairs, strong familial ties enhance emotional resilience and give us a sense of belonging that romantic relationships can’t always provide.


    19- Organize Your Space

    Your environment reflects your mind. A well-organized, aesthetically pleasing space boosts mental clarity and productivity. Take time to declutter, redecorate, or create a sanctuary that reflects your personality and values.

    Marie Kondo’s The Life-Changing Magic of Tidying Up emphasizes how physical spaces affect emotional well-being. A tidy, intentional space isn’t just about looks—it’s about feeling at home with yourself.


    20- Celebrate Your Singleness

    Finally, mark your singleness with rituals and traditions that make it feel sacred. Throw a solo celebration, host a dinner in your honor, or create a personal holiday. Don’t wait for external validation—celebrate yourself now.

    As Maya Angelou once said, “I belong everywhere I go, no matter where it is.” Celebrate your journey, your growth, and your freedom. Because being single isn’t a pause—it’s a powerful, joyful chapter in your story.


    21- Make a Gratitude List

    Cultivating gratitude has profound effects on mental health and well-being. By maintaining a gratitude list, you create a tangible record of all the positive elements in your life, reinforcing an optimistic and resilient mindset. This practice helps shift focus from scarcity to abundance—a powerful perspective, particularly in singlehood.

    Leading researcher Dr. Robert Emmons emphasizes that gratitude “blocks toxic emotions, such as envy, resentment, and regret.” Writing down things you’re thankful for, whether big or small, builds psychological immunity and keeps your emotional compass calibrated toward joy.


    22- Ignore Your Phone Completely

    In a hyper-connected world, unplugging is a revolutionary act of self-respect. Constant digital interactions can clutter your mental space, preventing deep thought and self-connection. Setting aside your phone for an entire day allows for introspection, mindfulness, and presence.

    Cal Newport, in Digital Minimalism, argues that reclaiming your attention from technology is essential for living a focused and intentional life. Disconnecting allows you to reconnect with your inner self—without distractions or comparisons.


    23- Get Physical

    Physical activity isn’t just about aesthetics—it’s a celebration of vitality. Whether it’s yoga, hiking, weightlifting, or dancing, moving your body enhances mood, reduces stress, and reinforces self-empowerment. It reminds you that strength and joy reside within.

    According to Harvard Medical School, regular exercise improves cognitive function and emotional well-being. Embrace the endorphin rush as a symbol of self-love and commitment to your physical health—an investment that pays lifelong dividends.


    24- Do Good for Others

    Altruism enriches the soul. Acts of kindness—big or small—create a ripple effect of goodwill, enhancing not only others’ lives but your own. Volunteering or simply offering help boosts happiness and reinforces a sense of purpose.

    Research by Dr. Sonja Lyubomirsky, author of The How of Happiness, shows that consistent acts of kindness are among the most reliable ways to increase personal happiness. Doing good reminds us that meaning often lies in the service of others.


    25- Throw a Party

    Celebrating yourself shouldn’t be a quiet affair. Host a gathering that centers on joy, laughter, and community. A party is a public declaration that your life, as it is right now, is worth honoring—no relationship status needed.

    This can be a themed celebration, a dinner party, or even a low-key movie night. The point is to share your happiness. As Brené Brown notes, “Connection is why we’re here.” A well-thrown party celebrates not just you, but your ties with others.


    26- Redecorate Your Space

    Your environment affects your state of mind. Redecorating is more than aesthetic—it’s an act of self-definition. Choose colors, textures, and layouts that resonate with your current values and goals. Make your home a reflection of your liberated, intentional life.

    As author Terence Conran states in The House Book, “Your home should be a story of who you are, and be a collection of what you love.” A redesigned space can feel like a fresh chapter, invigorating your daily experience.


    27- Take Yourself on Dates

    There’s elegance in solitude. Dining alone, attending a concert, or visiting a museum by yourself allows for deep enjoyment without compromise. These solo outings nurture confidence, independence, and self-respect.

    As Julia Cameron writes in The Artist’s Way, “Solo dates are essential for creative recovery.” They affirm that your company is enough—and that joy need not be dependent on another’s presence.


    28- Get a Makeover

    Changing your appearance can be a revitalizing act of agency. Whether it’s a haircut, wardrobe upgrade, or skincare routine, a makeover aligns your external presentation with internal transformation.

    Self-renewal in this way can boost self-esteem and signal new beginnings. Psychologist Nancy Etcoff notes in Survival of the Prettiest that how we present ourselves impacts how we are perceived—and more importantly, how we perceive ourselves.


    29- Download a Dating App

    Even if you’re not seeking a relationship, engaging with dating apps can be a playful reminder of your desirability. Think of it as research, entertainment, or simply a way to practice connection.

    Use this opportunity to refine what you’re looking for—or confirm your preference to stay single. As Helen Fisher outlines in Anatomy of Love, digital dating has reshaped human courtship. Navigating this space consciously adds another layer to self-awareness.


    30- Take Up Space in Your Bed

    Literally and metaphorically, take up space. Sprawl out. Make your bed a sanctuary that celebrates your presence. There’s no need to leave room for anyone else when this chapter is about fully claiming your domain.

    This simple act reaffirms that you are enough. As the philosopher Epictetus once said, “No man is free who is not master of himself.” Taking up space is a quiet but powerful expression of freedom.


    31- Get Creative

    Creativity is a celebration of the human spirit. Paint, write, compose music, sculpt—whatever draws your attention. Expressing yourself without constraint can be deeply healing and fulfilling.

    In Big Magic, Elizabeth Gilbert writes that “A creative life is an amplified life.” Tapping into your artistic side reignites curiosity, playfulness, and joy—all key ingredients for thriving as a single individual.


    32- Try an Activity Your Ex Was Hesitant About

    Reclaim your individuality by pursuing interests that may have been suppressed. Whether it’s skydiving, salsa dancing, or joining a debate club—do it boldly. Rediscovering these passions is both freeing and empowering.

    This act serves as a personal renaissance. As Carl Jung noted, “The privilege of a lifetime is to become who you truly are.” Every new experience reinforces your ownership of this phase of life.


    33- Splurge on Something You’ve Wanted for a Long Time

    Invest in yourself materially by acquiring something meaningful—be it a designer piece, high-end gadget, or art. Such indulgences, when intentional, affirm your worth and celebrate your autonomy.

    Far from vanity, this is about value. As Suze Orman advocates in The Courage to Be Rich, money spent on your well-being and confidence is money well spent. Let your purchase symbolize growth, not impulse.


    34- Send Cards to Close Family and Friends

    Handwritten notes are rare gems in the digital age. Sending cards strengthens bonds and communicates gratitude in a deeply personal way. These gestures deepen connection and build emotional capital.

    Psychologist Barbara Fredrickson, in Love 2.0, emphasizes the power of micro-moments of connection. A simple card can be a bridge between solitude and intimacy, enriching both your life and that of others.


    35- Work on Your Personal Development

    Use this time for structured growth. Attend workshops, read self-help literature, or explore coaching. Clarify your vision, enhance skills, and build the life you want with clear, focused effort.

    Stephen Covey’s The 7 Habits of Highly Effective People provides a roadmap for intentional living. Singlehood offers the ideal context for practicing such habits without distraction.


    36- Round Up Some Friends

    Organize an outing or retreat with your closest allies. Community doesn’t need to center around coupledom. Friendships are powerful relationships that deserve celebration.

    As C.S. Lewis wrote, “Friendship is unnecessary…but it is one of those things which gives value to survival.” Celebrate the bonds that affirm your worth and enrich your journey.


    37- Buy Yourself Flowers

    A simple bouquet can lift your spirits and beautify your space. Buying flowers for yourself is an act of love, not lack. It signals you don’t need someone else to affirm your value.

    In The Book of Awakening, Mark Nepo suggests small acts of beauty are ways to reclaim presence. Let the fragrance and color of flowers remind you that joy often lies in the simplest gestures.


    38- Organize Your Space

    A repeat because it’s essential—organization enhances mental clarity. Decluttering makes room for new energy and opportunities. Let your space mirror the intentional life you’re building.

    Gretchen Rubin’s Outer Order, Inner Calm underscores how tidiness creates peace of mind. Cleaning up is a symbolic act of preparing for what’s next.


    39- Get Your Flirt On

    Flirting need not be goal-oriented. It can be fun, spontaneous, and self-affirming. Compliment someone. Smile. Engage playfully with the world. It’s a way of reminding yourself that you are charming and confident.

    Flirtation, as Esther Perel explores in Mating in Captivity, is a form of creative energy. Use it to feel alive, not to seek validation.


    40- Organize a Photo Shoot for Yourself

    Capture yourself in this vibrant season. Hire a photographer or set up a DIY shoot. These images celebrate your autonomy, evolution, and personal power.

    Photographs serve as both documentation and affirmation. As Susan Sontag wrote in On Photography, images allow us to “see the world, and ourselves, anew.” Celebrate the person you are becoming.


    41- Splurge on Beauty Treatments

    Whether it’s a spa day, facial, or massage, pampering yourself is an act of reverence. You deserve care—not as a reward, but as a birthright.

    Self-care, as Audre Lorde once said, “is not self-indulgence, it is self-preservation.” Beauty rituals connect you to your body in nourishing and affirming ways.


    42- Try Out a New Recipe

    Cooking for yourself can be a sacred act. Experiment with cuisines you’ve never tried. Transform your kitchen into a creative lab. Feed yourself with care.

    As Michael Pollan explores in Cooked, making your own food deepens your connection to life’s processes. Let the act of cooking be a celebration of nourishment and independence.


    43- Go Out Dancing

    Dancing frees the body and soul. Head to a club, a class, or your living room. Let movement express what words cannot. This is liberation in motion.

    In Dance as a Healing Art, Anna Halprin discusses how dance reconnects us with joy. Move without judgment. Just be.


    44- Go on a Solo Trip

    Reiterating for emphasis: travel alone. The freedom of solo exploration is incomparable. It reawakens wonder and hones your inner compass.

    Seek solitude in new landscapes. As Cheryl Strayed writes in Wild, “Alone had always felt like an actual place to me.” Go there.


    45- Marathon All the Series

    Let go. Binge guilt-free. Whether it’s a classic drama or guilty-pleasure reality show, immerse yourself in a story. It’s entertainment and emotional release in one.

    Narrative immersion can also be a form of emotional catharsis, as noted in The Storytelling Animal by Jonathan Gottschall. Give yourself permission to escape.


    46- Sleep In as Long as You Want

    No early obligations? Luxuriate in sleep. Let your body rest fully without guilt. Rest is radical self-care.

    Matthew Walker’s Why We Sleep emphasizes that good sleep is foundational to emotional, cognitive, and physical health. Sleep in—it’s medicine.


    47- Find Out What You Want

    Use this period to clarify your desires—career, lifestyle, values, love. Journal, meditate, and ask deep questions. Clarity is power.

    As Simon Sinek writes in Start With Why, knowing your “why” drives meaningful action. Begin within.


    48- Embrace Your Singleness

    Celebrate singlehood unapologetically. This is your time. Own it. Thrive in it. Revel in the beauty of a life not defined by relationship status.

    As DePaulo writes in How We Live Now, “Single life is a legitimate and meaningful way to live.” Embrace it fully.


    49- Remind Yourself That Sometimes It’s Better to Be Alone

    Solitude can shield you from compromise and mediocrity. Not every relationship improves your life. Remember that peace is better than forced companionship.

    Kahlil Gibran said, “Let there be spaces in your togetherness.” Sometimes, that space is all you need to breathe and become.


    50- Free Time is for Yourself Alone

    Protect your free time like the treasure it is. Say no when needed. Say yes to yourself. Use this space for rest, growth, or joy—without apology.

    Time is your most precious resource. Use it on what matters. As Annie Dillard reminds us in The Writing Life, “How we spend our days is, of course, how we spend our lives.”

    Conclusion

    Being single isn’t a deficit; it’s a distinctive chapter of opportunity, autonomy, and growth. By embracing independence, nurturing self-awareness, and intentionally investing in yourself and your community, you transform solitude into strength. Each of the twenty approaches presented here offers not just a means of celebration but a path to self-actualization.

    Celebrate your singleness not as a placeholder for something better but as a rich, complete experience in itself. Let it be a time of becoming—not waiting.

    Your single years are not a waiting room for partnership—they are a rich, expansive era for self-realization. By taking deliberate, joyful, and meaningful actions, you transform this time into one of the most powerful chapters of your life. Whether through solo adventures, creative pursuits, or personal rituals, every step you take affirms your autonomy and celebrates your existence.

    This is not about filling a void—it’s about expanding your life on your own terms. Embrace singlehood not as a gap to be filled but as a canvas to be painted with your boldest colors. Because the best relationship you’ll ever have begins—and ends—with yourself.

    Bibliography

    1. DePaulo, Bella. Singled Out: How Singles Are Stereotyped, Stigmatized, and Ignored, and Still Live Happily Ever After. St. Martin’s Press, 2007.
    2. Gilbert, Elizabeth. Big Magic: Creative Living Beyond Fear. Riverhead Books, 2015.
    3. Newport, Cal. Digital Minimalism: Choosing a Focused Life in a Noisy World. Portfolio, 2019.
    4. Brown, Brené. The Gifts of Imperfection: Let Go of Who You Think You’re Supposed to Be and Embrace Who You Are. Hazelden Publishing, 2010.
    5. Emmons, Robert A. Thanks! How the New Science of Gratitude Can Make You Happier. Houghton Mifflin Harcourt, 2007.
    6. Lyubomirsky, Sonja. The How of Happiness: A New Approach to Getting the Life You Want. Penguin Press, 2007.
    7. Perel, Esther. Mating in Captivity: Unlocking Erotic Intelligence. Harper, 2006.
    8. Walker, Matthew. Why We Sleep: Unlocking the Power of Sleep and Dreams. Scribner, 2017.
    9. Cameron, Julia. The Artist’s Way: A Spiritual Path to Higher Creativity. TarcherPerigee, 1992.
    10. Sinek, Simon. Start with Why: How Great Leaders Inspire Everyone to Take Action. Portfolio, 2009.
    11. Covey, Stephen R. The 7 Habits of Highly Effective People: Powerful Lessons in Personal Change. Free Press, 1989.
    12. Fredrickson, Barbara. Love 2.0: Finding Happiness and Health in Moments of Connection. Hudson Street Press, 2013.
    13. Halprin, Anna. Dance as a Healing Art: Returning to Health Through Movement. LifeRhythm, 2000.
    14. Strayed, Cheryl. Wild: From Lost to Found on the Pacific Crest Trail. Alfred A. Knopf, 2012.
    15. Gottschall, Jonathan. The Storytelling Animal: How Stories Make Us Human. Houghton Mifflin Harcourt, 2012.
    16. Pollan, Michael. Cooked: A Natural History of Transformation. Penguin Press, 2013.
    17. Sontag, Susan. On Photography. Farrar, Straus and Giroux, 1977.
    18. Etcoff, Nancy. Survival of the Prettiest: The Science of Beauty. Anchor Books, 2000.
    19. Conran, Terence. The House Book. Mitchell Beazley, 1974.
    20. Dillard, Annie. The Writing Life. Harper & Row, 1989.
    21. Lorde, Audre. A Burst of Light: Essays. Firebrand Books, 1988.
    22. Orman, Suze. The Courage to Be Rich: Creating a Life of Material and Spiritual Abundance. Riverhead Books, 1999.
    23. Nepo, Mark. The Book of Awakening: Having the Life You Want by Being Present to the Life You Have. Conari Press, 2000.
    24. Rubin, Gretchen. Outer Order, Inner Calm: Declutter and Organize to Make More Room for Happiness. Harmony Books, 2019.
    25. Gibran, Kahlil. The Prophet. Alfred A. Knopf, 1923.
    1. Strayed, Cheryl. Wild: From Lost to Found on the Pacific Crest Trail. Vintage, 2013.
    2. Walker, Matthew. Why We Sleep: Unlocking the Power of Sleep and Dreams. Scribner, 2017.
    3. Sinek, Simon. Start With Why: How Great Leaders Inspire Everyone to Take Action. Portfolio, 2009.
    4. Rubin, Gretchen. Outer Order, Inner Calm: Declutter and Organize to Make More Room for Happiness. Harmony Books, 2019.
    5. Pollan, Michael. Cooked: A Natural History of Transformation. Penguin Press, 2013.
    6. Perel, Esther. Mating in Captivity: Unlocking Erotic Intelligence. Harper, 2006.
    7. Orman, Suze. The Courage to Be Rich: Creating a Life of Material and Spiritual Abundance. Riverhead Books, 1999.
    8. Nepo, Mark. The Book of Awakening: Having the Life You Want by Being Present to the Life You Have. Conari Press, 2000.
    9. Newport, Cal. Digital Minimalism: Choosing a Focused Life in a Noisy World. Portfolio, 2019.
    10. Lyubomirsky, Sonja. The How of Happiness: A New Approach to Getting the Life You Want. Penguin Press, 2007.
    11. Lorde, Audre. A Burst of Light: And Other Essays. Firebrand Books, 1988.
    12. Jung, Carl. Modern Man in Search of a Soul. Routledge, 1933.
    13. Halprin, Anna. Dance as a Healing Art: Returning to Health Through Movement and Imagery. LifeRhythm, 2000.
    14. Gibran, Kahlil. The Prophet. Alfred A. Knopf, 1923.
    15. Gottschall, Jonathan. The Storytelling Animal: How Stories Make Us Human. Mariner Books, 2012.
    16. Gilbert, Elizabeth. Big Magic: Creative Living Beyond Fear. Riverhead Books, 2015.
    17. Fredrickson, Barbara L. Love 2.0: Creating Happiness and Health in Moments of Connection. Plume, 2013.
    18. Fisher, Helen. Anatomy of Love: A Natural History of Mating, Marriage, and Why We Stray. W. W. Norton & Company, 2016.
    19. Etcoff, Nancy. Survival of the Prettiest: The Science of Beauty. Anchor Books, 2000.
    20. Emmons, Robert A. Thanks! How Practicing Gratitude Can Make You Happier. Houghton Mifflin Harcourt, 2007.
    21. Dillard, Annie. The Writing Life. Harper Perennial, 1990.
    22. DePaulo, Bella. How We Live Now: Redefining Home and Family in the 21st Century. Atria Books, 2015.
    23. Covey, Stephen R. The 7 Habits of Highly Effective People: Powerful Lessons in Personal Change. Free Press, 1989.
    24. Conran, Terence. The House Book. Mitchell Beazley, 2006.
    25. Cameron, Julia. The Artist’s Way: A Spiritual Path to Higher Creativity. TarcherPerigee, 2002.

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Islamabad Reflections: Political Observations and Encounters by Rohan Khanna

    Islamabad Reflections: Political Observations and Encounters by Rohan Khanna

    This text recounts a trip to Islamabad, detailing meetings with various political figures and intellectuals. The author describes encounters with politicians, a former diplomat, and academics, discussing political stability, governmental support, and the state of Pakistani democracy. Observations on the political climate are interwoven with reflections on the author’s personal interactions. The author expresses concerns about the country’s political instability and contrasts it with a more ideal democratic system. Finally, the piece touches upon the historical context of political transitions in Pakistan.

    Study Guide: Analyzing a Political Commentary

    Quiz

    Instructions: Answer each question in 2-3 complete sentences.

    1. According to the text, what made the author’s visit to the Parliament House a bitter experience?
    2. What is the author’s interpretation of the former Secretary Kharja Dor Asad Majeed Khan’s actions regarding the cipher?
    3. How does the author describe the actions of the “political novice but World Cup winning player” regarding the cipher?
    4. What does the author mean by saying the “Darvesh” had the chance to commit “foul play?”
    5. What practice did the author describe that was once common between ambassadors from Pakistan and India that has now ceased?
    6. What two books were presented to Ummah Muslima by Dr. Khalid Masood, according to the text?
    7. What does the author suggest was painful and bloody regarding the history of Muhit and changes of government?
    8. How does the author portray the actions of PTI members during the speech of the ninth elected Prime Minister?
    9. What contradictions in the actions of the PTI party are questioned by the author?
    10. According to the author, why is the Republic of India so praiseworthy?

    Quiz Answer Key

    1. The author found the reception of the President cold and tasteless, and described the scene at the Parliament House as bitter and harsh, despite the mild cold and strong winds in the rain. This suggests a lack of warmth and political tension.
    2. The author implies that the former Secretary used the cipher for his own political gain, playing the role of a global leader by trying to overthrow the rule of America. In doing so, he did not uphold diplomatic ideals as he should have.
    3. The author describes the “political novice” as waving the cipher like Modi waves the tricolor, suggesting a lack of understanding of its sensitivity and importance, ultimately losing control of the situation and becoming a tragic character.
    4. The author implies that as a seasoned diplomat, he had access to sensitive information that he could have manipulated for his own gain but ultimately he did not.
    5. The author described a tradition where new ambassadors from Pakistan and India would meet with their neighboring counterparts for well-wishes and greetings, a practice that has ceased in the present situation.
    6. The text mentions that Dr. Khalid Masood presented his two new books on the subjects of terrorism and the political and legal problems facing the Muslim community to the Ummah Muslima.
    7. The author notes that the history of Muhit, and the change of government has been painful and full of bloodshed, implying a pattern of violence and instability throughout history.
    8. The author describes the PTI members as creating a ruckus and uproar during the Prime Minister’s speech, a moral choice the author says cannot be appreciated, noting instead that “tolerance, courage, humility and freedom of expression…should be appreciated.”
    9. The author questions why the PTI members took an oath of office and agreed to be a part of institutions if they believed the elections were rigged, highlighting a contradiction in their actions and claims. The author also questions the decision to allow a prime minister to take an oath based on an unconstitutional principle.
    10. The Republic of India is praised for its feat of thought and philosophy, suggesting that its democratic principles and governance model are worthy of admiration.

    Essay Questions

    Instructions: Write an essay addressing each prompt using evidence and examples from the source text.

    1. Analyze the author’s tone and attitude towards different political figures and parties in the text. How does this tone influence the reader’s understanding of the events?
    2. Discuss the significance of the cipher in the text and how its misuse impacted the actions and political standings of key players.
    3. Explore the author’s views on democracy and its application in the political situations described. Provide specific examples from the text to support your analysis.
    4. Examine the author’s perspective on the history of governmental change and transitions, particularly noting the ways in which political turmoil has taken place in the past.
    5. Compare and contrast the author’s depiction of political actors from different parties (e.g., PTI and others) and explore the author’s perspective on diplomatic relations and practices.

    Glossary of Key Terms

    Cipher: A coded message or communication; in this context, it refers to a specific, important document that became a point of political contention. Darvesh: A term meaning a humble, often ascetic, person; here, it refers to the author himself. Ummah Muslima: The global Muslim community; this phrase indicates a connection to the broader Muslim world. Bani Israel: A reference to the ancient Israelites; used here in a derogatory sense to describe someone who manipulates a situation. Al Muna: A tragic or doomed character; used here to describe the “political novice” as someone who did not achieve his intended results. Muhit: Refers to a specific period, often in history, or the circumstances of that period. PTI: A political party referred to in the text, known for causing disruption and questioning the legitimacy of elections. Tasar: A term referring to doubt or uncertainty; here it’s used in the context of adopting good ideas from any source, regardless of misgivings.

    Pakistan’s Political Crossroads

    Okay, here’s a briefing document summarizing the key themes and ideas from the provided text, including relevant quotes:

    Briefing Document: Analysis of “Pasted Text”

    Overall Theme: The text offers a commentary on the current political climate in Pakistan, focusing on recent government transitions, the role of key political figures, and reflections on the nature of democracy and diplomacy. It’s presented through a personal narrative, offering anecdotes and observations from meetings with various individuals. The tone is reflective, at times critical, and often employs a somewhat indirect, metaphorical style.

    Key Ideas & Facts:

    1. Political Transition & Disappointment: The author expresses a sense of disillusionment with the recent political events in Islamabad, particularly the transition of power.
    • Quote: “the reception of the President was cold and tasteless.”
    • Analysis: This sets the tone for a critical view of the political atmosphere, suggesting a lack of warmth and genuine acceptance in the recent change of leadership.
    1. The Cipher Controversy: The author revisits the infamous “cipher” incident involving a former Pakistani ambassador and a political leader (likely Imran Khan).
    • Quote: “When their written cipher fell into the hands of a political novice but World Cup winning player, he waved it like Modi ji waves his tricolor.”
    • Analysis: This uses a strong visual metaphor to describe how the cipher was misused for political gain. It highlights the irony of the situation, comparing it to a spectacle and the author is critical of the “political novice” who mishandled the document. The use of “Bani Israel Sakina Khiladi” is an unusual metaphor likening the figure to a tragic character who self-destructs, emphasizing the dramatic downfall.
    • Quote: “Dr. Asad Majeed By using this cipher of Khan in between, he was playing the role of a global leader in overthrowing the rule of America, today he is forced to lobby in expensive dollars to get blessings from the same guy of the same wire, how expensive!”
    • Analysis: This quote underscores the perceived hypocrisy of the political leader who once used the cipher to rally against US influence, but is now seeking support from the same actors. This suggests a lack of genuine conviction in the leader’s past stance.
    1. Diplomacy & the Role of Diplomats: The author shows respect for professional diplomats and their conduct.
    • Quote: “Those who appreciate diplomacy do not cross even the blue line, let alone the red one.”
    • Analysis: This shows the author’s understanding of the importance of restraint and caution in diplomacy, portraying the diplomat as someone who understands established boundaries and codes of conduct.
    • Quote: “a successful diplomat is one who debates for three hours. But it is a different matter that no useful thing should be allowed to reach or be taken care of by others.”
    • Analysis: This quote highlights the nature of diplomatic engagement. It acknowledges the importance of skillful negotiation and subtle maneuvering, where one can debate at length without actually revealing key information.
    1. Meetings with Key Figures: The narrative includes descriptions of meetings with several prominent personalities:
    • Asad Majeed Khan: Former Secretary Kharja Dor (Foreign Secretary), described as a seasoned diplomat who understands the nuances of diplomacy. The author was very interested in his private conversation and observations about international tensions.
    • Janab Asan Iqbal and Rana Tanveer Hussain: These meetings were noted as “pleasant and very interesting,” though their response to the question of government longevity was less central to the narrative.
    • Dr. Khalid Masood: A well-known research scholar, former chairman of Islamic Nazariya Council, and judge of the Federal Shariat Court. The author is impressed by his scholarly nature and work on the problems facing the Muslim community.
    • Waseem Altaf: A friend who recently returned from Europe; their discussions are implied to be important, but detail is omitted due to column space.
    • Ijaz Syed: A journalist from Jung and Geo, praised for his dedication to “friendship and peace”.
    • Shakeel Chaudhary, Sohail Chaudhary, Fad Shahbaz, Dr. Shabir Kallu, Aab Bhai and Sana Bhai: Thanks are given to these people for their friendship.
    1. Critique of Political Behavior: The author criticizes the behavior of certain political figures, particularly their conduct in Parliament.
    • Quote: “During the speech of the ninth elected Prime Minister in the parliament, the PTI members continued the ruckus and uproar”
    • Analysis: This is a critique of the opposition party’s (PTI) disruption of parliamentary proceedings during the Prime Minister’s address. The author notes that this behaviour, while not admirable, is still a sign of democracy.
    • Quote: “This friend of ours, who Prime Minister Azam shouted slogans of rigging, rigging They were calling the elections unconstitutional, just think, if this is rigged then why did you people take oath yourself and agree to be a part of these institutions, your leader got the unconstitutional prime minister to take oath under this principle and then 70 After that, which fair elections have been held here? “
    • Analysis: This questions the legitimacy of those who protested the election as rigged but still participated in the institution. The author also makes the argument that other elections in the past have also not been completely fair.
    1. Reflection on Democracy: The text acknowledges the positive and negative aspects of democracy.
    • Quote: “tolerance, courage, humility and freedom of expression, all of them are the blessings of democracy, which should be appreciated.”
    • Analysis: This highlights the positive aspects of democratic governance, despite the author’s critique of the chaotic political atmosphere. He stresses the importance of these values in a healthy democracy.
    • Quote: “Instead of taunting the institutions, would it not be better that you people make your requests within the limits of dignity and civility?”
    • Analysis: This shows a longing for a more measured approach to political engagement that shows respect for institutions.
    1. Historical Context & Lessons: The author draws historical comparisons, referencing “the 14 centuries” and the history of government transitions to emphasize a pattern of chaos and bloodshed when power changes hands. He emphasizes the importance of adopting “goodness” wherever it can be found, advocating for peace in transitions of power.

    Conclusion:

    The text provides a nuanced perspective on Pakistan’s current political situation. It is a personal reflection that moves between admiration for diplomacy, critique of the current political drama, and a deep appreciation for the ideals of democracy, even amidst its imperfections. The use of metaphors and historical context adds depth to the analysis, and the author’s underlying call for maturity, civility, and a focus on the “good” demonstrates a hope for a more stable and constructive political future.

    Islamabad’s Bitter Harvest: A Political Reflection

    Okay, here’s an 8-question FAQ based on the provided text:

    1. What is the author’s overall impression of the political atmosphere in Islamabad, particularly at the Parliament House?
    2. The author describes the political atmosphere in Islamabad as “bitter and harsh,” even more so than the cold and windy weather they experienced. They note a “cold and tasteless” reception of the President and imply a sense of tension and political maneuvering behind the scenes, contrasting with pleasant conversations with some individuals. The Parliament House is portrayed as a site of discord and unpleasantness, and it is implied that recent political events have created a difficult environment.
    3. What role did a cipher play in recent political events, and how was it handled?
    4. A cipher, likely a diplomatic communication, was acquired by a “political novice” and “World Cup winning player” (implied to be a political figure). This person is said to have waved it around “like Modi ji waves his tricolor” and then mishandled it, essentially causing it to lose its significance. This is described as a “melodrama” where the person who acquired the cipher became a “tragic character” rather than leveraging it effectively. It’s implied that this mishandling had negative consequences for the individual and potentially for the political climate.
    5. What is the author’s view on the actions and current situation of the “World Cup winning player” who mishandled the cipher?
    6. The author expresses a critical view of the “World Cup winning player,” suggesting that they used the cipher to appear as a global leader trying to overthrow the rule of America, but are now forced to lobby for support from the same entities they were publicly opposing. The author uses sarcastic phrasing, suggesting the situation is hypocritical and costly. There is a sense of disappointment that the figure didn’t act more strategically.
    7. How does the author describe the diplomatic community, and what shift has occurred in recent times?
    8. The author highlights the tradition of newly arrived ambassadors from Pakistan and India meeting each other as a gesture of goodwill. They note that this practice used to occur even when they were in Japan, emphasizing that it was a widespread norm. This tradition has unfortunately ceased in the current climate, indicating a breakdown in diplomatic relations between the two countries, something the author finds “regrettable.” This shift is attributed to underlying issues within society.
    9. What is the significance of the meetings with Dr. Asad Majeed Khan and Dr. Khalid Masood?
    10. The meetings with Dr. Asad Majeed Khan and Dr. Khalid Masood are presented as insightful and valuable. The author describes Dr. Asad Majeed Khan as a seasoned diplomat, whose private conversations were particularly informative and whose experience provided “ample opportunity to gain from it.” Similarly, the meeting with Dr. Khalid Masood, a research scholar, was intellectually stimulating and presented as a deep and vast experience where they discussed complex religious and political issues.
    11. What positive aspects of democracy does the author highlight, even amidst the current political turmoil?

    The author acknowledges the democratic principles in place within the country. Even though they are critical of the actions and rhetoric of some political figures, particularly the protests and disruptions in Parliament, they are careful to express appreciation for “tolerance, courage, humility and freedom of expression” as blessings of democracy. The author sees these as crucial, despite the unrest.

    1. What critique does the author level against the PTI (Pakistan Tehreek-e-Insaf) and their claims of election rigging?
    2. The author criticizes the PTI for their claims of election rigging, pointing out the hypocrisy of them participating in institutions formed by those elections and taking oath under the same process they are decrying as unconstitutional. They specifically question why the PTI leader took oath as Prime Minister under these circumstances, after that, taking part in further elections. It is further implied that these claims are a strategy, and they should act with “dignity and civility” and not just be making claims outside of the formal limits of the institution.
    3. What is the author’s broader reflection on the nature of political transitions in Pakistan and the concept of adopting goodness wherever it’s found?
    4. The author reflects on the history of violent and destructive political transitions, stating that “how painful and full of bloodshed is the date of the Muhit.” He juxtaposes this past experience with the teachings that one should adopt goodness regardless of its source. The author seems to lament the present state of politics, hoping for more peaceful and constructive approaches, highlighting the importance of learning and adapting positive practices, even when they come from different places or political positions. The author appears to be arguing for unity and maturity in the political sphere.

    Pakistan’s Political Instability

    The provided text discusses political instability in Pakistan, touching on several key points:

    • Government Instability and Power Dynamics: The text describes the political climate in Islamabad as “bitter and harsh,” noting a cold reception for the President [1]. It mentions meetings with government officials, including Janab Asan Iqbal and Rana Tanveer Hussain Sahib [1]. A question about the government’s stability and support is raised, suggesting uncertainty about its future [1]. The author indicates a concern that the same political lessons are being imposed on Pakistan [1].
    • Role of Diplomacy and International Relations: The text highlights the importance of diplomacy and the actions of diplomats, referencing former Secretary Kharja Dor Asad Majeed Khan [1]. The author discusses how a written cipher, when handled by a “political novice” and “World Cup winning player,” led to political turmoil [1]. This political novice used it to try to overthrow American influence and now must lobby for blessings from the same source [1]. The author also points out the tradition of meetings between ambassadors from Pakistan and India, which has now ceased [1]. This breakdown is attributed to emotional factors within society [1].
    • Internal Political Conflict and Protests: The text mentions the uproar caused by PTI members during the speech of the ninth elected Prime Minister in parliament [1]. These members were shouting slogans about rigging and unconstitutional elections, while they themselves have taken oath and participated in the institutions that emerged from these elections [1]. The author poses a rhetorical question asking why they have agreed to be part of these institutions if they believe the elections were rigged [1]. It notes that this behavior, although viewed as cruel, is a result of the tolerance, courage, humility and freedom of expression afforded by democracy [1]. The author also notes a concern that some party may now be on another 9th of May, referencing a previous day of civil unrest [1].
    • Historical Context of Instability: The author makes a general point that historically government changes in Muslim countries have been painful and full of bloodshed [1].
    • Critique of Political Actors: The text critiques the actions of political figures, particularly the “political novice” who mishandled the cipher and is now seeking favor from those they previously opposed [1]. The text also calls out political parties for protesting the institutions of power while participating in them [1].

    Overall, the text portrays a political landscape marked by instability, internal conflict, and questionable political tactics. The author uses historical allusions, critiques of political actors and analysis of international relations to highlight the challenges facing Pakistan and its political system.

    Pakistan’s Diplomacy: A Critical Analysis

    The provided text offers some insights into diplomatic relations, particularly concerning Pakistan’s interactions with other countries. Here’s a breakdown of the key points:

    • Importance of Diplomacy: The text emphasizes the significance of diplomacy and the role of diplomats. It references former Secretary Kharja Dor Asad Majeed Khan as an example of a seasoned diplomat, noting that they appreciate diplomacy and do not cross “even the blue line, let alone the red one” [1]. This highlights the careful and strategic nature of diplomatic practice. The author notes that a good diplomat can debate for 3 hours without letting anything useful be taken or received by others [1].
    • The Cipher Incident: The text describes a situation where a written cipher, presumably a diplomatic communication, fell into the hands of a “political novice” who then used it to try to overthrow American influence [1]. The political novice was described as a “World Cup winning player,” suggesting a lack of experience in diplomacy. This incident underscores the potential consequences of mishandling sensitive diplomatic information [1]. The person used the cipher “like Modi ji waves his tricolor” and then it was lost [1]. The author notes that the person is now forced to lobby in “expensive dollars to get blessings” from the same people he was opposing, indicating a failed attempt at diplomacy [1].
    • Pakistan-India Relations: The text mentions a tradition of meetings between newly appointed ambassadors from Pakistan and India, where they would express good wishes to each other [1]. This practice, which used to occur even when the author was in Japan, has now ceased [1]. The breakdown of this tradition is attributed to emotional factors within society [1]. The author notes that the former ambassador of Pakistan to the US is an important issue for the BJP’s Modi government, and that his standing with ruling governments in India is also important [1].
    • International Appeals: The text mentions that there were international appeals for the release of Madam Bhutto, Benazir, and Nawaz Sharif [1]. This suggests that international actors were involved in some of Pakistan’s internal affairs [1].
    • US Relations: The text indicates that Rakiba letters have been written, but Donald Bloom is ahead of Donald Low in giving official congratulations to Mr. Cherry Blossom [1].
    • Critique of Political Actors: The text implies that some political actors have acted in ways that have undermined diplomatic relations [1]. The author seems critical of the “political novice” for mishandling the cipher and for the consequences that resulted [1].

    Overall, the text suggests that diplomatic relations are complex and fragile, and can be affected by internal political dynamics, mishandling of information, and societal emotions. It also implies that actions taken by political actors can have major consequences on the international stage.

    Pakistan’s Political Instability

    Pakistani politics, as portrayed in the provided text, is characterized by instability, internal conflict, and complex international relations. Here’s a breakdown:

    • Government Instability: The political climate in Islamabad is described as “bitter and harsh,” with a cold reception for the President [1]. There’s uncertainty about the government’s stability and support, with a concern that the same political lessons are being imposed on Pakistan [1].
    • Internal Political Conflict and Protests: The text highlights the uproar caused by PTI members in parliament, who were protesting about rigging and the unconstitutional nature of the elections [1]. Despite their protests, these members have taken oaths and participated in the institutions formed by those elections [1]. The text suggests that this behavior is a result of the tolerance afforded by democracy, but it also implies hypocrisy [1]. The author also notes a concern that some party may now be on another 9th of May, referencing a previous day of civil unrest [1].
    • Critique of Political Actors: The text critiques the actions of a “political novice” and “World Cup winning player” who mishandled a written cipher, leading to political turmoil and causing that person to seek favors from the same people he was opposing [1]. The author is also critical of political parties for protesting the institutions of power while participating in them [1].
    • Historical Context of Instability: The text notes that throughout history, government changes in Muslim countries have been painful and full of bloodshed [1].
    • Diplomatic Relations: The text emphasizes the importance of diplomacy, referencing the actions of a seasoned diplomat [1]. It also describes a situation where a mishandled cipher led to political turmoil and an undermining of diplomatic relations [1]. The text mentions that the tradition of meetings between newly appointed ambassadors from Pakistan and India has ceased due to emotional factors within society [1].

    The text provides insight into the complex interplay between domestic politics and international relations in Pakistan, suggesting that internal conflicts and the actions of political actors can have significant consequences on the international stage.

    Pakistan’s Political Dynamics

    The provided text describes several government meetings and interactions, offering a glimpse into the political dynamics and diplomatic activities within Pakistan:

    • Meetings with Government Officials: The author mentions having “pleasant and very interesting” meetings with Janab Asan Iqbal and Rana Tanveer Hussain Sahib [1]. These meetings took place in the context of a “bitter and harsh” political climate in Islamabad, and were in contrast with the “cold and tasteless” reception of the President [1]. This suggests that while there is tension at the highest levels of government, there is still an attempt to maintain regular political activity and dialogue amongst some officials.
    • Meetings with Former Officials: The author also describes a meeting with former Secretary Kharja Dor Asad Majeed Khan [1]. This meeting was described as a “private conversation” and was very interesting [1]. The author notes that Asad Majeed Khan is a seasoned diplomat who appreciates diplomacy and doesn’t overstep boundaries [1]. The author implies that this is in contrast to some political actors who have mishandled diplomatic information [1].
    • Meetings Related to Diplomacy: The author notes that there used to be a tradition of meetings between newly appointed ambassadors from Pakistan and India [1]. These meetings were a way for the neighboring diplomats to express good wishes to each other [1]. The author notes that this tradition has stopped [1]. This breakdown is attributed to emotional factors within society [1].
    • Parliamentary Proceedings: The text describes the speech of the ninth elected Prime Minister in parliament [1]. During the speech, PTI members caused an uproar, shouting slogans about rigging and unconstitutional elections [1]. This highlights the internal conflict and instability within the Pakistani political system. The author contrasts this behavior to the tolerance, courage, humility and freedom of expression that democracy can offer [1].

    These meetings provide a window into the various levels of government interaction, ranging from routine meetings between officials, to diplomatic discussions, to contentious parliamentary sessions. The text also suggests a disconnect between these interactions, with some being described as pleasant and interesting, while others are described as bitter and harsh [1].

    Pakistan’s Democratic Quandary

    The provided text highlights several challenges facing democracy in Pakistan, as well as a positive aspect of it, which include:

    • Political Instability: The text portrays a political environment marked by instability and uncertainty [1]. There is a concern that the same political lessons are being imposed on Pakistan [1]. The cold reception of the President suggests a lack of unity and respect for democratic institutions at the highest levels of government [1]. The text refers to a “bitter and harsh” political climate in Islamabad, indicating significant challenges to the democratic process [1].
    • Internal Conflict and Protests: The text describes disruptive behavior by PTI members during the Prime Minister’s speech in parliament [1]. These members were protesting about alleged election rigging and the unconstitutional nature of the elections [1]. This internal conflict undermines the democratic process and suggests a lack of faith in the system by some political actors [1]. The author notes that it is ironic for those who have taken oath and participated in the institutions formed by these elections to now be protesting them [1]. The author is concerned that another day of civil unrest could be coming [1].
    • Misuse of Democratic Freedoms: While the author notes that the protests and disruptive behavior are a result of the tolerance, courage, humility and freedom of expression afforded by democracy, it also implies that such behavior is a misuse of these democratic freedoms [1].
    • Mishandling of Sensitive Information: The text describes how a “political novice” mishandled a written cipher, leading to political turmoil and an undermining of diplomatic relations [1]. This incident shows how a lack of experience, respect for diplomacy, and poor judgment can negatively affect the democratic process and a country’s standing on the world stage [1]. The author describes the “political novice” as a “World Cup winning player,” suggesting a lack of experience in diplomacy [1].
    • Lack of Respect for Institutions: The text critiques political parties for protesting the institutions of power while participating in them [1]. This behavior suggests a lack of respect for democratic institutions and processes, which is a major challenge for the system [1]. The author notes that the protesters’ behavior “cannot be appreciated in this foreign land,” and implies that it is a moral failing on the part of the protestors [1].
    • Historical Context: The author notes that government changes in Muslim countries have historically been painful and full of bloodshed [1]. This suggests that the problems that Pakistan is facing may be systemic, long-standing, and difficult to resolve [1].
    • A Positive Aspect: The author notes that tolerance, courage, humility and freedom of expression, all of them are the blessings of democracy, which should be appreciated [1].

    Overall, the text suggests that democracy in Pakistan faces numerous challenges, including political instability, internal conflict, mishandling of sensitive information, misuse of democratic freedoms, lack of respect for institutions, and historical trends of conflict.

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • ASP.NET jQuery Cookbook for Developers

    ASP.NET jQuery Cookbook for Developers

    This text provides excerpts from the second edition of the ASP.NET jQuery Cookbook, originally published in 2011 and updated in 2016 by Packt Publishing. It serves as a practical guide with recipes for integrating jQuery with ASP.NET web forms and MVC applications. Key topics covered include setting up and managing jQuery libraries, utilizing jQuery selectors to interact with controls, handling various events, manipulating the Document Object Model (DOM), adding visual effects, and performing Ajax calls. The book also guides readers on creating and using jQuery plugins, including leveraging NuGet for package management and debugging techniques within Visual Studio.

    Podcast

    Listen or Download Podcast – ASP.NET jQuery Cookbook for Developers

    Exploring jQuery in ASP.NET Applications

    Based on the provided sources, here is a discussion about jQuery:

    jQuery is a lightweight JavaScript library that has transformed the landscape of client scripting in web applications. Developed by John Resig in 2006, it quickly gained popularity due to its cross-browser compatibility and its ability to “get more done with less code”. The library is supported by an active community of developers and has grown significantly. Using jQuery simplifies many client scripting tasks, including event handling, embedding animations, and writing Ajax-enabled pages, contributing to a more interactive experience for the end-user. Its extensible plugin architecture also allows developers to build additional functionalities on top of the core library.

    The library consists of a single JavaScript (.js) file. At the time the source was written, jQuery was available in two major versions: Version 1.x and Version 2.x. While the Application Programming Interface (API) is the same for both, Version 2.x does not support older browsers like IE 6, 7, and 8, whereas Version 1.x continues to support them. You can download jQuery in either uncompressed format (for development and debugging) or compressed format (for production, also known as the minified version). The minified version uses optimization techniques like removing whitespaces and shortening variable names, making it smaller but harder to read. A map file (.min.map) is available to simplify debugging of the minified version by mapping it back to its unbuilt state.

    Including jQuery in an ASP.NET application can be done in several ways:

    • Downloading from jQuery.com and manually adding the file to your project.
    • Using a Content Delivery Network (CDN), which hosts the jQuery library on distributed servers. This can improve performance as users might already have the file cached from visiting other sites that use the same CDN. Available CDNs include jQuery’s CDN, Google CDN, Microsoft CDN, CDNJS CDN, and jsDelivr CDN. Using a CDN means linking directly to the library file hosted online instead of using a local copy. Note that CDNs might take a couple of days to update with the latest jQuery releases.
    • Using the NuGet Package Manager, available with Visual Studio, which simplifies installing and upgrading the library within your project. NuGet typically downloads the debug (.js), release (.min.js), Intellisense (.intellisense.js), and map (.min.map) files into the project’s Scripts folder.
    • Adding jQuery to an empty ASP.NET web project using a script block (<script>) by referencing the local file path. This method requires manual updates if the library version changes and manual switching between debug and release versions.
    • Adding jQuery to an empty ASP.NET web project using the ScriptManager control. This control helps manage script references, automatically switching between debug and release versions based on the <compilation debug=”true”/> setting in web.config. It can also be configured to load jQuery from a CDN if the EnableCdn property is set to true. The ScriptManager uses a ScriptResourceDefinition object, typically defined in the Global.asax file, to map a script name (like “jquery”) to its local and CDN paths for debug and release modes. It also includes a fallback mechanism to load the local copy if the CDN is unavailable.
    • Adding jQuery to an ASP.NET Master Page ensures that all content pages using that Master Page automatically include the library. This can be done by adding the <script> block or ScriptManager control to the Master Page.
    • Adding jQuery programmatically to a web form using the Page.ClientScript.RegisterClientScriptInclude method in the code-behind file. This method adds the script block within the <form> element.
    • In the default ASP.NET Web Application templates, jQuery is often included using the ScriptManager control in the Master Page, leveraging the Microsoft CDN by default, with mapping defined by the AspNet.ScriptManager.jQuery package. This mapping can be changed to use a different CDN, such as Google CDN, by updating the ScriptResourceMapping in the BundleConfig class.
    • In ASP.NET MVC applications, jQuery can be included using the <script> tag in views. A common method is using bundling, which combines multiple script files into a single file to reduce HTTP requests. Bundling is configured in the BundleConfig class using ScriptBundle. Bundling can also be configured to load jQuery from a CDN by setting the UseCdn property and providing the CDN path. A fallback mechanism should be included in the view to load the local file if the CDN fails.

    Once jQuery is included, you can write client-side code to interact with your web page. A common starting point is using the $(document).ready() function, which executes code when the Document Object Model (DOM) is fully loaded.

    jQuery provides powerful features for manipulating elements on a web page:

    • Selectors: These are jQuery constructs used to retrieve elements based on specified conditions. They can return single or multiple elements. Since ASP.NET controls are rendered as HTML elements, they can be selected using standard jQuery selectors. Types of selectors include Basic selectors (by tag, class, ID, or combination), Hierarchy selectors (selecting based on relationships like parent/child), Attribute selectors (selecting based on element attributes), Form selectors (working with form elements), and Position filters (selecting elements based on their position in a collection). Examples of selectors used in the sources include #identifier for selecting by ID, .class for selecting by CSS class, html_tag for selecting by HTML tag, [attribute*=”value”] for selecting by attribute containing a value, :first, :last, :odd, :even, :eq(i), :lt(i), :gt(i) for position filtering. The $(this) object refers to the current jQuery object in a chain or callback.
    • DOM Traversal: jQuery provides methods to navigate the DOM tree, such as accessing parent (.parent(), .parents()), child (.children(), .find()), and sibling (.siblings()) elements.
    • DOM Manipulation: Elements can be added (.append(), .prepend(), .appendTo()), removed (.remove()), or cloned (.clone()) at runtime using client code. Methods like .addClass() and .removeClass() are used to manage CSS classes.
    • Visual Effects and Animations: jQuery simplifies adding visual effects. Built-in methods include .show(), .hide(), .toggle() for displaying elements; .fadeIn(), .fadeOut(), .fadeTo(), .fadeToggle() for fading; and .slideUp(), .slideDown(), .slideToggle() for sliding effects. Custom animations can be created with .animate() by changing numeric CSS properties over time. Animations can be stopped using .stop() or .finish(). The duration of animations can be specified in milliseconds or using keywords like “slow” and “fast”. Specific applications of effects mentioned include animating Menu controls, creating digital clocks, animating AdRotator alt text, animating images in TreeView nodes, creating scrolling text, building vertical accordion menus, and showing/hiding GridView controls. The jQuery UI library provides additional effects like “explode” and enhanced easing methods like “easeOutBounce”.
    • Event Handling: Events occur when a user interacts with the page or during page milestones. An event handler is a function executed when an event occurs. jQuery 1.7+ recommends the .on() method for binding event handlers. It can attach single events, multiple events to one handler, or different events to different handlers. Event delegation is a technique where a single event handler is attached to a parent element to manage events for its children, including future children. This is possible due to event bubbling, where events in a child element travel up the DOM tree. Event bubbling can be stopped using .stopPropagation(). The .one() method attaches an event handler that executes at most once. Events can be triggered programmatically using .trigger(). Data can be passed with events, typically as a JSON string. Events can also use namespacing (e.g., click.myNamespace) to group handlers. Event handlers can be removed using .off(). Examples of events discussed include mouse events (mouseover, mouseout, click, dblclick, mousemove), keyboard events (keyup), and form events (focus, blur, change).
    • Working with Graphics: jQuery aids in integrating graphics by providing utilities for effects, animations, and event handlers on elements like <img>, ImageButton, and ImageMap. Examples include creating spotlight effects on images, zooming images on mouseover, building image scrollers, creating photo galleries (using z-index or ImageMap), using images in Menu controls, creating a 5-star rating control (as a User Control), and previewing image uploads in MVC. The File API (window.File, window.FileReader) and its onloadend event are used for previewing image uploads.
    • Ajax (Asynchronous JavaScript and XML): Ajax allows communication with the server without full page refreshes, updating parts of the page transparently. jQuery simplifies Ajax with methods like the generic .ajax() for various request types (GET, POST, etc.). Global default settings can be configured with .ajaxSetup(). Shortcut methods like .load() (for text/HTML content) and .getJSON() (for JSON data via GET) are also available. jQuery Ajax can be used to consume various server-side endpoints in ASP.NET, including page methods (static/shared methods marked with [WebMethod]), Web services (ASMX), WCF services (Ajax-enabled SVC), Web API (HTTP API), and generic HTTP handlers (ASHX). The $.getJSON() method is particularly useful for retrieving JSON data from endpoints like Web APIs. For WCF services and page methods expecting JSON input, contentType: “application/json; charset=utf-8” and data as a JSON string are used. Accessing returned data from Web Services, WCF Services, and Page Methods often involves accessing a .d property of the response object.
    • Plugins: jQuery’s plugin architecture allows extending the core library. Plugins are JavaScript files included alongside jQuery. They typically provide configurable functionalities. New plugins are published to the NPM (Node Package Manager) repository. Creating a plugin involves defining methods in the jQuery namespace (for utility functions like $.sampleMethod()) or on jQuery.fn (alias for jQuery.prototype, for methods callable on DOM elements like $(“#element”).myMethod()). Using a wrapping function (function($){…})(jQuery) allows using the $ alias safely within the plugin, even if $.noConflict() has been called elsewhere. Plugin methods often use .each() to ensure they operate correctly on collections of matched elements. Good practices for plugins include providing default options using $.extend() to allow customization and returning the this object (the jQuery object) to enable method chaining. Plugins can also define different actions or functionalities based on arguments passed to the method. The jQuery validation plugin is a popular example available from http://jqueryvalidation.org and downloadable via package managers like NuGet or Bower (which requires Node.js, NPM, and Git). This plugin provides methods like .validate() to validate forms based on defined rules and messages, and .resetForm() to clear validations. It offers features like custom error message placement and handling invalid forms.

    This book aims to impart the skill of learning jQuery and using it in ASP.NET applications by exploring diverse recipes for common problems in ASP.NET 4.6 applications. The examples are based on Visual Studio 2015 and jQuery 2.1.4 and were tested in Internet Explorer 11.0.96, Mozilla Firefox 38.0.1, and Google Chrome 47.0.2526. Familiarity with Visual Studio and MS SQL Server is preferred but not mandatory for the reader.

    jQuery and ASP.NET Development Guide

    Based on the sources you provided, ASP.NET is a framework used for creating web applications. The book specifically focuses on writing client script using jQuery in ASP.NET 4.6 applications. Sonal Aneel Allana, the author, has experience teaching in areas including .NET and ASP.NET.

    The sources describe how to integrate and use the jQuery library within ASP.NET Web Forms and MVC applications. The book covers various aspects of using jQuery with ASP.NET, including:

    • Getting Started with downloading and including jQuery in ASP.NET 4.6 Web and MVC projects. This involves understanding CDNs, using NuGet Package Manager, adding jQuery via script blocks, using the ScriptManager control, adding it to ASP.NET Master Pages, and adding it programmatically to web forms. The default Web Application template in ASP.NET also includes a reference to jQuery, typically using the ScriptManager control.
    • Using jQuery Selectors with ASP.NET Controls. When an ASP.NET page is viewed in a browser, controls are rendered as HTML elements, making them selectable with standard jQuery selectors. The book demonstrates selecting controls by ID, CSS class, HTML tag, attribute, or position in the DOM. Selectors can also be used in ASP.NET MVC applications.
    • Event Handling Using jQuery in ASP.NET. This includes responding to mouse, keyboard, and form events, as well as using event delegation and detaching events.
    • DOM Traversal and Manipulation in ASP.NET. Techniques covered include accessing parent, child, or sibling elements, refining selection using filters, and adding or removing elements at runtime.
    • Visual Effects in ASP.NET Sites. Recipes discuss creating animation effects on various ASP.NET controls like Panel, AdRotator, TreeView, Menu, and GridView.
    • Working with Graphics in ASP.NET Sites and MVC. This involves applying effects like zooming and scrolling to images and building components like image galleries, image previews, and rating controls using jQuery. ASP.NET server controls such as Image, ImageButton, and ImageMap, as well as plain HTML image elements in MVC, can be manipulated.
    • Ajax Using jQuery in ASP.NET. The book explains how to make Ajax calls to interact with server-side components such as page methods, Web services (.asmx), WCF services (.svc), Web API, MVC controllers, and HTTP handlers (.ashx).

    To work with the examples discussed, requirements include Visual Studio 2015, MS SQL Server 2014, the Northwind database, the jQuery library, the jQuery UI library, a web browser, NPM, and Bower. The book is aimed at ASP.NET developers who want to use jQuery to write client scripts for cross-browser compatibility. While familiarity with Visual Studio and MS SQL Server is preferred, it is not compulsory.

    Mastering jQuery Selectors in ASP.NET

    Based on the sources, jQuery selectors are fundamental constructs used to retrieve elements on a web page based on a specified condition. They provide a mechanism to access web page elements when writing client scripts, which is essential for manipulating these elements. While standard JavaScript allows accessing elements by their unique IDs using methods like document.getElementById(), selectors offer more flexibility, enabling developers to select elements based on attributes other than ID, or to retrieve and manipulate multiple elements simultaneously.

    Selectors are particularly relevant in the context of ASP.NET development because when an ASP.NET page is viewed in a browser, the server controls are rendered as HTML elements. This conversion means that standard jQuery selectors can be applied to manipulate these rendered ASP.NET controls just like any other HTML element. The sources provide a table illustrating the mapping of common ASP.NET controls to their rendered HTML elements and tags, such as GridView rendering as <table>, Button as <input type=”submit”/>, and Label as <span>. Selectors are also usable in ASP.NET MVC applications as they typically use raw HTML markups or HTML helper methods to render content.

    The sources classify jQuery selectors into several broad types:

    • Basic selectors: These are similar to CSS selectors and are used to retrieve elements based on their HTML tag, CSS class, element ID, or a combination. Examples include selecting all elements ($(“*”)), all <div> elements ($(“div”)), all elements with a specific CSS class ($(“.highlight”)), an element with a specific ID ($(“#footer”)), or a combination.
    • Hierarchy selectors: Also resembling CSS selectors, these are used to select child or descendant elements within the structure of the Document Object Model (DOM) tree. Examples include selecting all <p> elements inside <div>s ($(“div p”)) or immediate children <p> of <div>s ($(“div > p”)).
    • Attribute selectors: These selectors retrieve elements based on the attributes they possess. Examples include selecting all <a> elements with an href attribute ($(“a[href]”)), or those whose href attribute contains ($(“*=”)), starts with ($(“^=”)), or ends with ($(“$=”) a specific string.
    • Form selectors: Specifically designed to work with various form elements like inputs, checkboxes, and radio buttons. Examples include selecting elements by type ($(“:button”), “:checkbox”, “:radio”), all form elements ($(“:input”)), or elements based on state (“:checked”, “:selected”, “:enabled”, “:disabled”).
    • Position filters: These selectors retrieve elements based on their position within a collection, often relative to siblings. Examples include selecting the first element in a collection (:first), the last (:last), those at an odd or even index (:odd, :even), at a specific index (:eq(i)), or with an index less than (:lt(i)) or greater than (:gt(i)) a certain value.

    Anonymous functions are frequently used in conjunction with selectors, often passed as arguments to other functions that operate on the selected elements.

    The sources provide several recipes demonstrating the practical application of these selectors within ASP.NET applications:

    • Using the ID selector (#identifier) to access controls like TextBox, RadioButtonList, DropDownList, CheckBoxList, CheckBox, and Button in a web form. This often involves using the ASP.NET ClientID property to get the rendered HTML ID.
    • Employing the CSS class selector (.class) to work with controls like Image, Panel, and BulletedList.
    • Selecting controls like GridView by their rendered HTML tag ($(“html_tag”)), often combined with attribute filters or hierarchy selectors to target specific parts like rows (<tr>) or cells (<td>).
    • Accessing controls like Hyperlink based on their attributes, such as the href attribute rendered from the NavigateUrl property.
    • Selecting list items (<option> rendered from ListItem in ListBox or DropDownList) or other elements based on their position within the DOM, using position filters like :first-child, :last-child, :lt(), :gt(), and :nth-child.
    • Using selectors to dynamically enable or disable controls on a web form.
    • Demonstrating the use of various selectors within ASP.NET MVC applications.

    A link to http://api.jquery.com/category/selectors is mentioned as a resource to find out more about different types of jQuery selectors.

    jQuery Event Handling Fundamentals

    Based on the sources, event handling is a fundamental concept in client scripting using jQuery in ASP.NET applications.

    An event is defined as an action that occurs when the user interacts with the web page or when certain milestones are completed, such as a page loading in the browser. Examples include moving the mouse, pressing a key, clicking a button or link, keying in text in a field, or submitting a form. Events can be user- or system-initiated.

    An event handler is a function that is executed when a specific event occurs. Writing or binding an event handler for a particular event allows developers to program the desired actions in response to user or system interactions. jQuery eases client scripting tasks, including event handling, adding to the interactive experience for the end user.

    When working with events, event delegation is an important mechanism. It allows you to attach a single event handler to a parent element instead of attaching individual event handlers to each child element. This approach optimizes the number of event handlers on the page. Event delegation is also useful for wiring events to child elements that do not exist when the page initially loads but are added later at runtime.

    Event delegation is made possible because of event bubbling. Event bubbling is the process where an event occurring in a child element travels up the Document Object Model (DOM) tree to its parent, then to its parent’s parent, and so on, until it reaches the root element (the window). For example, a click event on a table cell (<td>) bubbles up through the table row (<tr>), the table (<table>), and eventually to the <body>, <html>, and window elements. The parent element can intercept the event as it bubbles up, allowing a single handler on the parent to manage events for its descendants. jQuery provides a .stopPropagation() method to prevent an event from bubbling further up the DOM tree.

    jQuery offers several methods for binding events. Prior to jQuery 1.7+, methods like .bind(), .live(), and .delegate() were used. However, these are now deprecated, and the .on() method is recommended for event binding in jQuery 1.7+.

    The .on() method can be used in various ways:

    • Attaching a single event to a handler: For example, $(“#btnTest”).on(“click”, function(){…});.
    • Attaching multiple events to a handler: The same handler can respond to multiple events listed with spaces, like $(“#imgTest”).on(“mouseover mouseout”, function(){…});.
    • Attaching different events to different handlers: An object can be passed mapping event names to handler functions, for example, $(“#imgTest”).on({ mouseover: function(){…}, mouseout: function(){…} });.
    • Event delegation: By specifying a selector as a second argument, the handler is attached to the parent element but only executed for descendant elements matching the selector. For example, $(“#tblTest”).on(“click”, “tr”, function(){…}); attaches the click handler to the table, but it only runs when a table row (<tr>) inside the table is clicked. This is demonstrated in a recipe to attach events to dynamically added rows.
    • Passing data to events: Data can be passed as a JSON string or other data types when binding the event, which can then be accessed in the event handler. This is demonstrated in a recipe using the .trigger() method.

    Specific types of events discussed in the sources include:

    • Mouse events: Such as mouseover (when the mouse pointer enters an element) and mouseout (when it leaves an element). The .hover() method is a shortcut for binding mouseover and mouseout handlers. A recipe demonstrates handling these events to display a custom tooltip for text boxes.
    • Keyboard events: Such as keyup (when a key is released). Other keyboard events mentioned are keydown and keypress. A recipe uses the keyup event to create a character count for a text area.
    • Form events: Such as focus (when an element receives focus) and blur (when an element loses focus). A recipe uses these events to apply styles and display background text or validation errors on form controls.

    In the context of ASP.NET, when a page is viewed in the browser, server controls are rendered as HTML elements. This means that standard jQuery event handling techniques, including the use of selectors and the .on() method, can be applied to these rendered HTML elements corresponding to ASP.NET controls.

    To ensure an event handler is executed at most once, the .one() method can be used. Once the event is triggered and the handler is executed, the handler is automatically detached from the element. This is shown in a recipe for a “See More…” link that should only work once.

    jQuery’s .trigger() method allows events to be invoked programmatically. This means client-side code can simulate user actions or system events. A recipe demonstrates using .trigger() to simulate a click on an “Edit” link in a GridView row when the user double-clicks the row itself.

    Events can also have event data passed along with them and can utilize event namespacing. Namespacing allows multiple handlers to be attached to the same event type for the same element without interfering with each other; handlers can then be triggered or detached based on their namespace. A recipe illustrates passing data as a JSON object and using namespacing (click.radioclick1, click.radioclick2) to trigger different alert or confirm boxes based on which radio button was clicked.

    Finally, the .off() method is used to detach event handlers from elements. It can remove specific handlers, all handlers for a particular event type, or all handlers (including namespaced ones) depending on how it is used. A recipe shows how to use .off() to remove focus and blur event handlers from text boxes when a checkbox is unchecked.

    DOM Traversal and Manipulation with jQuery

    Based on the sources, DOM manipulation is a key concept when working with client scripts like jQuery in ASP.NET applications.

    The Document Object Model (DOM) is presented as a representation of web pages in a structured, tree-like format. Each part of the web page is a node in this tree, and these nodes have properties, methods, and event handlers. The web page itself is the document object, accessible via window.document. HTML elements on the page become element nodes, such as <head> or <body>, which can have children nodes like <table>, <div>, or <input>. The DOM is described as an object-oriented model that is language-independent, offering a common Application Programming Interface (API) that allows programming languages like JavaScript to manipulate the style, structure, and content of web pages.

    jQuery provides many methods for interacting with the DOM, including manipulating elements.

    One specific aspect of DOM manipulation discussed is adding and removing DOM elements. jQuery offers methods to perform these actions at runtime using client code.

    The sources illustrate adding DOM elements using the .clone() method. This method creates a deep copy of the matched elements, including their descendants and text nodes. When cloning elements, it’s necessary to update properties like ID, name, and value of the cloned elements and their children to avoid duplicates. The cloned elements can then be added to the DOM using methods like .appendTo(), which inserts the elements at the end of a target element. A recipe demonstrates cloning a Panel control (addPanel CSS class) and its contents, updating the IDs and names of the cloned elements, and appending them to a container div.

    For removing DOM elements, the jQuery method .remove() is used. This method not only removes the matched elements but also their descendants, and it removes all related data and events associated with them. A recipe shows how to remove a dynamically added Panel control using its ID and the .remove() method after user confirmation.

    The sources also touch upon other manipulation strategies, such as adding items to controls at runtime. This involves using methods like .prepend() to insert content at the beginning of a matched element or .append() to insert content at the end. The $.map() function can be used to transform data (like an array of strings) into an array of DOM elements (<option> or <li>) before appending/prepending them. This is demonstrated in a recipe for adding items to ListBox, DropDownList, and BulletedList controls dynamically.

    While focusing on manipulation, the sources also reference DOM traversal as a related concept. Traversal methods allow accessing elements in the DOM tree, such as parent, child, or sibling elements. Examples of traversal methods mentioned or used in the context of accessing controls (though not explicitly manipulation methods) include .parent() to get the immediate parent, .children() for immediate descendants, .find() for descendants matching a filter, .siblings() for elements on the same level, .next() for the immediate sibling, and filtering selections using methods like .filter(). These traversal methods are often used before performing manipulation on the selected elements.

    Chapter 4 of the source material is specifically dedicated to “DOM Traversal and Manipulation in ASP.NET”, covering recipes on adding/removing elements, accessing parent/child controls, accessing sibling controls, refining selection using filters, and adding items to controls at runtime.

    Download PDF Book

    Read or Download PDF Book – ASP.NET jQuery Cookbook for Developers

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Al-Riyadh Newspaper, May 29, 2025: Hajj Pilgrimage,Religious Guidance, Economy, Technology, Cultural and Social Initiatives

    Al-Riyadh Newspaper, May 29, 2025: Hajj Pilgrimage,Religious Guidance, Economy, Technology, Cultural and Social Initiatives

    These sources offer a broad overview of various developments and events within Saudi Arabia, with a particular emphasis on the Hajj season and related services like transportation and accommodation, as well as religious guidance for pilgrims. Several pieces also discuss the Saudi economy, highlighting efforts to diversify beyond oil, growth in non-oil exports, and changes to the housing support system. Furthermore, the articles touch on advancements in technology, including digital litigation and internet penetration, alongside reporting on regional and international affairs, such as the conflict in Gaza and global energy markets. Finally, cultural and social initiatives, like museum activities and programs for protected bird species, are mentioned.

    Podcast

    Listen or Download Podcast – Al-Riyadh Newspaper, May 29, 2025

    Saudi Efforts in Managing Hajj Pilgrimage

    Based on the sources provided, the management of the Hajj pilgrimage involves extensive efforts and initiatives by the Kingdom of Saudi Arabia, aimed at facilitating a safe, comfortable, and spiritually enriching experience for pilgrims. The sources highlight the scale and uniqueness of the Hajj, describing it as the largest annual gathering on Earth, an experience that repeats yearly with evolving details.

    The overall goal of Hajj management is to realize the vision of the Kingdom, serve the guests of the Most Gracious, and ensure they can perform their rituals with ease and tranquility from the moment they leave their homes until they return. This is underpinned by the direct supervision and guidance of the wise Saudi leadership, demonstrating significant attention to all matters concerning the pilgrims.

    Several key entities and government agencies are involved, including the Supreme Hajj Committee, the Ministry of Islamic Affairs, Dawah and Guidance, the Ministry of Health, the Ministry of Transport, the Royal Commission for Makkah City and Holy Sites, the General Presidency for the Affairs of the Grand Mosque and the Prophet’s Mosque, the Ministry of Interior, municipalities (Amanat) in various regions like Makkah, Qassim, Najran, and the Eastern Region, and security forces.

    Specific services and initiatives mentioned in the sources include:

    • Digital Services: The introduction of digital services like the Nusuk card, which serves as a smart identity for each pilgrim containing their health, housing, and transportation information. The Nusuk app offers over 160 digital services. Digital awareness platforms and materials are also provided.
    • Transportation: Provision of over 3 million train seats (including the Haramain and Holy Sites trains), 2 million air travel seats, and over 25,000 equipped buses. The Holy Sites train transports over 2 million pilgrims between Mina, Muzdalifah, and Arafat. The Haramain High Speed Train connects Makkah, Jeddah, King Abdullah Economic City, and Madinah. The transport system is described as being fully ready, with extensive road maintenance and bridge inspection efforts. An electric scooter service is also offered for light mobility along designated paths for the second year.
    • Healthcare: Significant efforts are made in healthcare, with hospital capacity in the holy sites increased by 60% this year compared to the last. A new emergency hospital has been prepared in Muzdalifah, and there are 71 emergency centers strategically located along the routes. The comprehensive integrated health system includes field hospitals, air ambulance planes, equipped ambulances, and paramedics. Over 50,000 health services were provided via various entry points, including over 140 procedures.
    • Water and Environment: The Ministry of Environment, Water and Agriculture raises operational readiness in Makkah, focusing on developing slaughterhouses, livestock markets, and central markets. The national water company has completed water network projects in some areas to meet demand.
    • Housing and Facilities: Development works include multi-story tents and restrooms. Pedestrian paths have been enhanced with shading and rubber flooring in Muzdalifah.
    • Security and Regulation: The “No Hajj Without Permit” campaign emphasizes that system and security are the cornerstones for controlling entry and ensuring pilgrim safety. Pilgrims are urged to abide by regulations and instructions from competent authorities. The Ministry of Interior imposes penalties, including deportation and a 10-year entry ban, on violators.
    • Guidance and Awareness: The Ministry of Islamic Affairs deploys a large number of scholars, students, and preachers (300 for internal pilgrims) to provide guidance, religious lessons, and fatwas. They aim to spread a message based on moderation and ensure pilgrims understand the objectives of Hajj. Guidance centers and materials are available in multiple languages. The General Presidency for the Affairs of the Two Holy Mosques also provides guidance and emphasizes the spiritual aspects and sanctity of Hajj. The Women’s Affairs Agency launched an initiative focused on enhancing faith through scientific lessons.
    • Border Crossings: Regions like Al-Qassim prepare cities for land pilgrims. The Ministry of Islamic Affairs welcomes pilgrims at border crossings, providing gifts and awareness materials.
    • Guest Programs: The King Salman’s guests for Hajj program hosts pilgrims from various countries at the King’s personal expense. This year, the program hosts 2300 guests from over 100 countries.

    Despite these extensive efforts, the sources also touch upon challenges in Hajj management, particularly the issue of pilgrimage without proper permits. The presence of pilgrims without permits can lead to excessive crowding, strain healthcare services, and potentially disrupt the organized movement and work systems. Heat waves and the risk of heatstroke are highlighted as significant dangers, especially for elderly or chronically ill pilgrims who might not be included in the official healthcare planning due to lacking permits. The sources also mention concerns about fake Hajj campaigns.

    Historically, the sources note that significant expansions of the Grand Mosque occurred under Saudi rule after centuries of minimal changes. They also mention the Saudi government’s early calls for international cooperation in managing the Holy Sites since 1926, which received limited response, suggesting an implicit acknowledgment of the Kingdom’s sole right and responsibility in this regard. The number of pilgrims has increased dramatically over the decades under Saudi management.

    Overall, the sources portray Hajj management as a complex and continuously evolving operation, relying on integrated efforts across numerous governmental and non-governmental entities, driven by the leadership’s commitment to serving pilgrims and enhancing the quality of services provided.

    Saudi Vision 2030 Economic Diversification Strategies

    Based on the sources, economic diversification is a significant focus for the Kingdom of Saudi Arabia, particularly as a key objective of Vision 2030. The effort is described as enhancing the path of economic diversity and aiming to build a diverse and sustainable economy that relies less on oil. It involves moving from what is characterized as a rentier economy to a productive one.

    Key aspects and areas of economic diversification highlighted in the sources include:

    • Non-Oil Exports: The sources note a growth in non-oil exports, indicating progress in supporting national industries and expanding the export base. Chemicals are mentioned as topping the list of non-oil exported goods. Economic diversification is seen as contributing to stability and opening up avenues for local and foreign investment, particularly in the industrial and logistics sectors.
    • Digital Transformation and the Digital Economy: The Kingdom is undergoing a digital transformation supported by advanced digital infrastructure, high internet speeds, and wide usage across society. This is considered a fundamental pillar of Vision 2030. Initiatives like the Starlink satellite internet service are contributing to enhancing digital access. The goal is to build a prosperous digital economy and foster innovation.
    • Real Estate and Housing: Policies aimed at empowering citizens to own homes through adjusted regulations and more facilities are discussed. These policies are seen as stimulating the real estate development, construction, and finance sectors, contributing to the goals of Vision 2030 related to increasing home ownership. This is framed as supporting citizens and enhancing life quality, while also stimulating a non-oil sector.
    • Energy Sector Diversification (within the sector): Saudi Aramco is working to strengthen its position in the global natural gas (LNG) market, including signing significant agreements for purchasing and selling LNG. This effort is part of Aramco’s strategy for enhancing global energy security and diversifying its investment portfolio, aiming for a larger share of the global gas market and building a business portfolio in this sector.
    • Culture: Culture is no longer viewed as a side aspect but is at the heart of national development with the launch of Vision 2030. There is a focus on investing in culture to achieve strategic goals and sustainable development. This involves supporting arts, establishing cultural authorities, organizing festivals, and encouraging diversity, leveraging culture itself as an economic and social force.
    • Hajj and Umrah Management: The extensive efforts in managing the Hajj and Umrah pilgrimages, including significant infrastructure development and service provision, represent a major non-oil economic activity. Revenues from the Hajj season are noted to reach up to 12 billion dollars, with a significant portion of pilgrim expenditures benefiting the private sector. This underscores the economic importance of this sector within the diversification framework.

    The overall approach to economic diversification appears to be comprehensive, involving multiple sectors and integrated governmental efforts, driven by the leadership’s vision for a more competitive and sustainable economy.

    Saudi Digital Transformation: Vision 2030 and Economic Diversification

    Based on the sources, economic diversification is a significant focus for the Kingdom of Saudi Arabia, particularly as a key objective of Vision 2030. The effort is described as enhancing the path of economic diversity and aiming to build a diverse and sustainable economy that relies less on oil.

    A crucial aspect of this diversification is digital transformation, which is presented as a fundamental pillar of Vision 2030. The Kingdom is undergoing a significant digital transformation supported by advanced digital infrastructure, high internet speeds, and wide usage across society. The goal is to build a prosperous digital economy and foster innovation.

    The sources detail the evolution and current state of digital infrastructure and services:

    • Internet access began with Dial-up service, which caused phone line congestion and had limited speeds of around 40 kilobytes per second.
    • The DSL service, introduced around 2000, relied on copper wires and initially offered speeds of 64 kilobytes per second, later developing to about 50 megabytes per second.
    • A major leap occurred around 2009 with the launch of fiber optic internet (Optical Fiber), providing speeds exceeding 1 gigabit per second, representing a fundamental shift in user experience.
    • Today, network coverage has expanded across all parts of the Kingdom, including villages and centers, supported by technologies like fiber optics and the fifth generation (5G). This has contributed to providing high internet speeds and reliable connectivity throughout the Kingdom.

    The pace of digital transformation is reflected in various indicators:

    • The annual report of the Communications, Space and Technology Commission for 2024 highlighted that internet usage penetration in the Kingdom reached 99%.
    • The average monthly mobile internet data consumption per person reached 48 gigabytes, which is three times the global average.
    • The growth rate of Saudi domain names (.sa) registered a notable increase of 25%, indicating growing awareness of the importance of digital presence for institutions and individuals.
    • 48.6% of internet users in the Kingdom spend more than seven hours daily online, reflecting the deep integration of digital technologies into daily life.

    Digital transformation is being integrated across various sectors:

    • In Hajj management, digital services have seen significant expansion, including the introduction of the Nusuk card as a smart identity for pilgrims containing their health, housing, and transportation information. The Nusuk app offers over 160 digital services.
    • The healthcare sector is expanding the use of innovative health technologies as part of ongoing efforts to enhance public health, improve the quality of care, and ensure excellence in service delivery according to the highest global standards. This aligns with the goals of Vision 2030.
    • The judiciary has approved digital litigation rules in administrative courts, benefiting from emerging technologies to enhance the judicial process and facilitate procedures for litigants. 114 digital judicial circuits have been established in various regions.
    • The Ministry of Culture has launched initiatives like the “Hasana” incubator to empower cultural entities, which is framed within the context of the National Culture Strategy and Vision 2030, likely involving the digital modernization of this sector.

    Initiatives such as the Starlink satellite internet service within the Kingdom are contributing to enhancing access to the internet.

    Overall, the sources indicate that internet has become a fundamental pillar in the Kingdom. It is a principal driver of comprehensive development, stimulating the digital economy, empowering individuals to benefit from advanced digital services, enhancing the quality of life, and opening new avenues for innovation and entrepreneurship.

    Saudi Vision 2030 Healthcare Advancements

    Based on the sources and our previous conversation about economic diversification and digital transformation as key aspects of Vision 2030, healthcare advancements are also a significant area of focus and development in the Kingdom. The sources highlight several facets of progress in this sector:

    • The Saudi leadership places a high priority on the health aspect. This is evident in efforts like increasing hospital capacity in Mina by 60% and preparing a new emergency hospital there, along with other services aimed at enhancing the integrated health system according to the highest global standards. This attention to healthcare extends across all sectors related to serving Hajj pilgrims. Pilgrim health information is also integrated into the Nusuk card, a smart identity for pilgrims.
    • The Minister of Health, His Excellency Mr. Fahd Al-Jalajel, praised the Council of Ministers’ recognition of the health sector’s achievements. These achievements include qualitative initiatives that have contributed to improving the healthcare system and enhancing its comprehensiveness, aligning with the goals of Vision 2030. This commendation underscores the great support the health sector receives from the wise leadership.
    • Healthcare is identified as a key enabler of the “Vibrant Society” program within Vision 2030. The sector is undergoing a significant transformation via the Healthcare Transformation Program,. This program focuses on promoting individual and community health, facilitating access to healthcare services, and achieving efficiency in service delivery at the highest quality levels.
    • Continuous efforts are being made to enhance public health, raise efficiency, facilitate access to healthcare services, and expand the use of innovative health technologies to ensure excellence in healthcare provision according to the highest global standards and sustainability.
    • There is a strong focus on training and qualifying healthcare cadres. The Saudi Commission for Health Specialties works on developing postgraduate programs and the Saudi Board to qualify healthcare cadres with high competence. In 2024, they graduated the largest batch (5,125) since the Board’s establishment, and the training capacity increased to 7,057 seats. The Commission is implementing best global practices, including adopting the “Virtual Hospital” as a training center for the Saudi Board and activating digital and virtual education models to diversify educational methods and keep pace with global developments in health education. This is part of the Vision 2030 strategic pillars. The number of international trainees in the Saudi Board reached 764 from 38 countries.
    • Specialized medical conferences are being held, such as the International Dermatology Conference in Jeddah, which provides training hours accredited by the Saudi Commission for Health Specialties. Such events aim to renew medical knowledge, discuss the latest developments in various fields like aesthetic medicine and pediatric dermatology,, and enhance scientific communication and exchange expertise in vital medical areas. These initiatives contribute to achieving the highest levels of competence and excellence for medical cadres and supporting the localization of the health sector.
    • Community health initiatives, such as the Dentistry Caravan in Jazan, are being organized to provide free check-ups, health awareness, and primary care to enhance community health,,.
    • Specific rights and protections are highlighted, such as Saudi women enjoying full healthcare rights, including medical independence in treatment decisions,, and the right to comprehensive care without discrimination. Mandatory pre-marital screening for infectious and genetic diseases is noted as a state effort to protect families and society,.

    Overall, the sources demonstrate a multifaceted approach to healthcare advancements, involving significant investment in infrastructure, technology, professional development, and public health initiatives, driven by the objectives of Vision 2030,.

    Regional Conflicts and Global Impacts

    Based on the sources and our conversation history, the concept of regional conflict is specifically addressed in the context of current events in Gaza and the West Bank and Israeli actions in Yemen. The sources provide details on the ongoing situations in these areas and their impacts.

    In Gaza and the West Bank, the sources describe ongoing Israeli actions resulting in casualties and severe humanitarian consequences. It is reported that 23 citizens were killed and others injured in Israeli shelling across areas in northern, central, and southern Gaza, including children and women. Local sources reported two massacres by the occupation against two families, resulting in 15 deaths, including children and women. Incidents of shelling targeting specific homes and groups of citizens are detailed.

    The sources highlight the dire humanitarian situation in Gaza, stating that the occupation has put the sector into a stage of famine through the systematic policy of starving 2.4 million citizens by closing crossings to aid amassed at the borders, which has led to many deaths. The government media office is cited as stating that the occupation’s project to distribute aid via what are called “buffer zones” failed miserably, as shown by field reports and international experts’ testimonies. The office strongly rejected any project relying on “buffer zones” or “humanitarian corridors” under the occupation’s supervision, considering them a modern version of “apartheid ghettos” aimed at isolation and extermination, not relief or protection. They assert that what is happening is conclusive evidence of the occupation’s failure to manage the humanitarian situation it deliberately caused through a systematic policy of siege, starvation, shelling, and destruction, which constitutes a continuation of a crime of genocide with full elements under international law. Calls are made for the United Nations and the Security Council to bear their responsibilities and for urgent, effective action to stop the massacres in Gaza, open crossings immediately without restrictions, enable humanitarian organizations to work freely away from the occupation’s interference, and prevent the occupation from using food as a weapon in its bloody war. There is also a call to send independent international investigation committees to document crimes of starvation and genocide and bring the occupation’s leaders to international justice for war crimes and crimes against humanity.

    In the West Bank, the sources report an escalation of Israeli aggression. A young Palestinian was killed in Qalqilya amidst continuous raids and arrests in several cities and towns. Settler attacks are also noted, including burning vehicles and lands and writing racist slogans in areas like Ramallah and Nablus. The ongoing aggression in places like the Jenin camp is highlighted, mentioning significant destruction and displacement.

    In Yemen, the sources report that Israel has carried out strikes on Houthi targets at Sana’a airport as part of continuous Houthi attacks on Arab countries. The Israeli Defense Minister stated that strikes targeted Houthi terrorist targets and warned that ports and other strategic infrastructure used by the Houthis in Yemen will be severely damaged and repeatedly destroyed. A threat of a naval and air blockade is also mentioned. The Houthis, described as being supported by Iran, announced responsibility for previous attacks targeting Israeli airports.

    Beyond these specific conflicts, the sources also briefly mention the Russia-Ukraine conflict, noting rhetoric between leaders like Trump and Putin and discussing calls for summits and sanctions. Tensions related to energy resources in the Kurdistan region of Iraq are also noted, involving disputes over contracts between the regional government and Baghdad, with the US supporting the contracts.

    The sources indicate that regional conflicts and related geopolitical tensions, such as those involving Venezuela and Russia, have an impact on global energy markets, influencing oil and gas prices.

    While discussing regional conflicts, the sources also touch upon efforts related to regional security and stability. A meeting between the Saudi Minister of Defense and the UK National Security Advisor reviewed the strategic partnership and means to enhance cooperation regarding developments and situations in the region and the world to support security and stability. Furthermore, the extensive efforts by Saudi Arabia in managing the Hajj pilgrimage, a gathering of millions from around the world, involve significant security, organizational, and logistical measures, which could be seen as contributing to broader regional stability by ensuring safety and order during this major global event. The “Guests of the Custodian of the Two Holy Mosques” Hajj program is also presented as a humanitarian initiative hosting pilgrims from over 100 countries.

    Download PDF Newspaper

    Read or Download PDF Newspaper – Al-Riyadh Newspaper, May 29, 2025

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Beginning Windows 10: Productivity and Security

    Beginning Windows 10: Productivity and Security

    This extensive document serves as a comprehensive guide to Windows 10, focusing on its various features and functionalities. It covers everything from basic usage and personalization like navigating the Start Menu, Action Center, and File Explorer, to more advanced topics such as security, maintaining and backing up your computer, and installation methods. The text also details how to maximize productivity by managing applications, using built-in tools like Cortana and Office Mobile, and optimizing battery life, while also exploring entertainment aspects like gaming and media consumption, alongside accessibility options for users with different needs.

    Podcast

    Listen or Download Podcast – Beginning Windows 10: Productivity and Security

    Overview of Windows 10 Features

    Drawing on the provided sources and our conversation history, here is a discussion of Windows 10 features:

    Windows 10 is designed to be a connected operating system (OS) that simplifies and synchronizes life across various devices, including smartphones, Xbox consoles, Raspberry Pi, HoloLens, car systems, and ATMs. Microsoft announced it as the last “major” version of Windows, meaning the core interface is not expected to change dramatically over time. Instead of releasing new major versions every few years, new features and improvements will be delivered via Windows Update, alongside security and stability fixes.

    Windows 10 combines aspects from previous versions, bringing back the Start menu welcomed by many users who disliked the Start screen in Windows 8. It also retains successful elements from Windows 8.1, such as Live Tiles and touch features. The user experience is designed to be uniform across different device types, though there are understandable differences based on screen size and usage, such as apps running full screen on small tablets. The book “Beginning Windows 10” guides users through the OS, revealing capabilities and customization options to maximize productivity, enjoyment, and experience.

    Here are some of the key features of Windows 10 discussed in the sources:

    Key New Features & Enhancements:

    • Action Center: A central hub for notifications and quick access buttons (like Settings, Airplane mode, Wi-Fi) that pops out from the right side of the desktop or the top of a smartphone screen. Notifications are aggregated, interactive, and sync across devices.
    • Cortana: A personal assistant integrated into Windows for searching files and the Internet, setting reminders (by time, location, or person), tracking parcels/flights, identifying music, setting alarms, and managing calendar events. She can be activated by typing in the search box or via voice (“Hey Cortana”) and learns from user interaction. Reminders sync across all your Windows 10 devices. Cortana’s Smart File Search can search across local disks, OneDrive, OneDrive for Business, SharePoint, and other file stores.
    • Continuum: Automatically changes the OS mode (desktop or tablet) based on whether a keyboard and mouse are attached. In Tablet mode, the Start menu and apps can run full screen, and interface elements become larger. On compatible smartphones, it allows running a full Windows 10-like desktop experience when connected to a monitor, keyboard, and mouse.
    • Microsoft Edge: The next-generation web browser designed for faster page loading and better compatibility. It includes features for annotating and sharing web pages, a reading mode, and a Hub for favorites, reading lists, history, and downloads.
    • Multiple Desktop Support: Allows users to create multiple virtual desktop workspaces to organize different running apps and layouts. This helps rationalize open windows and improve focus.
    • Four-Way Snap: Improves on the Windows 7 Snap feature by allowing up to four windows to be snapped into the corners of the screen. It also suggests apps to fill available space and allows resizing of snapped windows.
    • Xbox Integration: Includes an Xbox app that manages Xbox Live accounts, allows recording and sharing gameplay with Game DVR, and most notably, permits streaming games directly from an Xbox One console to a Windows 10 PC or tablet to play using an Xbox controller.
    • Peer-to-Peer Updates: Windows 10 can distribute and obtain Windows updates via a local peer-to-peer network, saving Internet bandwidth, especially in workplaces.
    • Windows Hello: A biometric sign-in feature that allows unlocking the PC using facial recognition (with a compatible 3D camera) or fingerprint scanning (with a compatible reader).

    Interface & User Experience:

    • Start Menu: Returned to the desktop in Windows 10, combining a traditional app list with Live Tiles. It provides access to user accounts, most used apps, quick links (File Explorer, Settings), power controls (Shut down, Restart, Sleep), and the All Apps list. It can be resized and customized.
    • Taskbar: Located at the bottom of the screen, it allows pinning programs, viewing taskbar thumbnails, and using Jump Lists for quick access to recent files or program tasks. The system tray on the right shows icons for battery, network, volume, Action Center, and more. It can be customized to hide/show features like the search box or Task View icon.
    • File Explorer: Uses the Ribbon interface and provides features for organizing, searching, copying, and moving files and folders. It includes a Quick Access Toolbar, Navigation Pane, and Details pane.
    • Touch Support: Windows 10 fully embraces touch with intuitive gestures like tap, double-tap, drag, swipe from edges (for Action Center and Task View), pinch-zoom, and rotate. An onscreen keyboard is available with different layouts, including standard, split, written input, and full PC layouts.
    • Task View: Accessible from the taskbar icon or Win+Tab shortcut, it displays large thumbnail images of all running apps, making it easy to switch between or close them.

    Productivity, Organization, and Sharing:

    • OneDrive/OneDrive for Business Integration: Baked into Windows 10 for cloud backup and sync of files, folders, libraries, and settings across devices. Files stored only online can be accessed and opened as needed. Files can be shared directly from OneDrive.
    • Libraries: Aggregated storage locations for specific content types (Documents, Music, Pictures, etc.) that combine files from multiple folders. Hidden by default but can be shown in File Explorer.
    • Sharing: Enables sharing content directly between compatible Store apps. Supports sharing files, folders (with specific permissions), optical drives, and streaming media across networks. HomeGroup simplifies sharing on home networks.
    • Microsoft Office Mobile: Free preinstalled apps (Word, Excel, PowerPoint, OneNote) on Windows 10 devices with screens less than 10 inches, offering touch-optimized productivity with many features. Office 365 subscription is required for creation on larger screens.
    • Battery Life Management: Includes Battery Saver mode to restrict background tasks when the battery is low, tools to monitor battery usage by apps, and configurable power and sleep settings. Windows Mobility Center provides quick access to mobility-related settings like brightness and battery status.

    Security and Privacy:

    • Security: Windows 10 is considered highly secure, building on features like User Account Control (UAC) from Windows Vista/8. It includes built-in anti-malware with Windows Defender. The Windows Firewall is powerful and configurable to control network traffic. UAC prompts protect against unauthorized changes.
    • Encryption: Offers Encrypting File System (EFS) for individual files/folders, and BitLocker drive encryption for full disks (available in Pro, Enterprise, and on Mobile/small tablets) which is enhanced by a Trusted Platform Module (TPM) chip. BitLocker To Go encrypts removable drives.
    • Biometric Devices: Supports Windows Hello for secure sign-in using face or fingerprint.
    • Privacy Controls: Extensive options in the Settings app to manage location tracking, advertising ID, access permissions for camera, microphone, account info, contacts, calendar, messaging, radios (Wi-Fi/Bluetooth), background apps, and feedback/diagnostics data shared with Microsoft.

    Maintenance, Recovery, and Configuration:

    • Windows Update: Automatically downloads and installs security/stability updates (Home edition). Pro/Enterprise editions have options to defer feature updates. Apps from the Windows Store are also automatically updated.
    • Reset: An easy-to-use feature that reinstalls Windows 10, replacing corrupt system files, while keeping personal files, settings, and Store apps intact. It can also be used to return the PC to a factory state (removing all files/accounts).
    • System Image Backup: Allows creating a complete snapshot of the Windows installation, installed software, settings, and user accounts (accessible from the Control Panel). Can be restored from a recovery drive or installation media.
    • File History: Provides local file backup and versioning to restore files if they are accidentally changed or deleted. Configurable via Settings and Control Panel.
    • Settings App: The primary location for day-to-day configuration and management options, consolidating many features previously found only in the Control Panel. Organized into logical categories (System, Devices, Accounts, Personalization, etc.).
    • Control Panel & Administrative Tools: Still exist for advanced configuration, troubleshooting, and system management. Includes tools like Device Manager, Disk Management, Event Viewer, Task Scheduler, and utilities for managing users, fonts, power options, and more.
    • Installation: Supports upgrading from Windows 7 or 8.1 (keeping files/settings/apps) or performing a clean install. Product keys are often tied to hardware for automatic activation on reinstall. Installation media can be created (USB/ISO). Cannot upgrade directly from Windows XP or Vista; a clean install is required. Includes partitioning tools during setup.

    Accessibility Features:

    • Windows 10 includes extensive accessibility tools in the Ease of Access settings, accessible from the sign-in screen and the Settings app. Features include:
    • Narrator: Reads screen elements aloud for visually impaired users, with keyboard and touch gesture support.
    • Magnifier: Zooms in on the screen.
    • High Contrast: Provides color schemes to improve visibility for visually impaired or colorblind users.
    • Keyboard & Mouse Options: Sticky Keys, Filter Keys, Mouse Keys, adjustable pointer size/color/speed, ClickLock, and Snap To assist users with motor skills difficulties.
    • Speech Recognition: Allows controlling the PC with voice commands.
    • Visual Alternatives for Sounds: Provides visual cues for system alerts.
    • Configurable text size and scaling for easier reading.

    Features Varying by Edition/Hardware:

    • Windows To Go and Hyper-V are available only in Pro and Enterprise editions (Hyper-V also requires compatible 64-bit hardware).
    • Workplace Join and Work Folders are Pro and Enterprise features.
    • Internet Explorer is included in Pro and Enterprise but not Home.
    • BitLocker is in Pro, Enterprise, and Mobile, and on tablets with screens larger than 10 inches that have a TPM chip. Device Encryption is on Mobile and small tablets (< 8 inches).
    • Group Policy is a Pro and Enterprise feature.
    • Windows Update deferral is available in Pro and Enterprise. LTSB (Long Term Servicing Branch) is Enterprise only.
    • Specific hardware like a TPM chip is required for full BitLocker encryption, compatible camera/scanner for Windows Hello, and certain features like Miracast and Wi-Fi Direct Printing require specific hardware.
    • Office Mobile apps are preinstalled on devices with screens smaller than 10 inches.
    • There is no desktop on tablets with screens smaller than 8 inches.
    • Many preinstalled apps and Settings options differ between Desktop (Home, Pro, Enterprise) and Mobile editions.

    Features Removed from Windows 10:

    • Desktop Gadgets (already removed in Windows 8.1).
    • DVD Playback (now available via a Store app).
    • Solitaire, Minesweeper, Hearts (now available as Store apps).
    • The Start Screen and Charms interface from Windows 8/8.1.
    • Windows Media Center.
    • XP Mode (already removed in Windows 8.1).

    Windows 10 Security and Privacy Features

    Windows 10 incorporates significant security and privacy features, building upon previous versions of the operating system. It is designed to be a highly secure platform, though comprehensive security requires a holistic approach, including user actions and third-party software.

    Core Security Features

    Windows 10 includes built-in tools to help protect your computer:

    • Windows Defender This is Windows 10’s integrated anti-malware program. It provides real-time protection, constantly scanning for malicious software. It uses cloud-based protection and sample submission to assist Microsoft and the user community by sending information about discovered threats. While some sources suggest third-party anti-malware may be more effective, Windows Defender is described as quite flexible for a lightweight package. It can be managed through the Settings app under Update & Security or the Control Panel applet for more advanced scans (quick, full, custom) and viewing update/history status. You should only turn off Windows Defender if you are using alternative anti-malware software.
    • Windows Firewall The Windows Firewall is a powerful component designed to control network traffic. It is configured primarily through the Control Panel, not the Settings app. The basic view shows the firewall status for your current network connection. You can allow or block specific applications, choosing whether they are permitted on Private (home/work) or Public (cafes/libraries) networks. You can manually add desktop programs, but not Store apps, to the allowed list. You can also turn the firewall on or off, although this is not recommended unless you are using a different firewall. The advanced firewall settings allow detailed configuration of inbound and outbound rules, connection security rules, and monitoring.
    • User Account Control (UAC) Introduced in Windows Vista and carried forward, UAC is a primary defense against unauthorized software installations and system changes. When an action requires administrator privileges, UAC switches the desktop to a secure mode and displays a prompt, preventing malware from automatically clicking through. The recommended setting is the default: “Notify me only when apps try to make changes to my computer”. This setting prompts you only when changes affecting other users are attempted. It is important to click “No” if a UAC prompt appears unexpectedly. UAC settings are in the Control Panel, not the Settings app.

    Encryption Technologies

    Windows 10 offers several methods to encrypt your data:

    • Encrypting File System (EFS) This allows for the encryption of individual files and folders. While it uses strong encryption, it has limitations. Encrypted file names remain visible, and the author advises against its use due to a perceived flaw and potential issues with backups on non-NTFS drives. EFS requires careful management of encryption keys, which should be backed up and stored securely away from the computer.
    • BitLocker Drive Encryption Available in Windows 10 Pro and Enterprise editions, BitLocker provides full-disk encryption for entire hard drives. For full hard drive encryption, it typically requires a Trusted Platform Module (TPM) chip on the motherboard. BitLocker is mandated on Windows 10 laptops and tablets with screens larger than 10 inches. It encrypts the drive in the background and pauses on shutdown. Files copied from a BitLocker-encrypted drive are automatically decrypted. BitLocker keys must be backed up (to a file, USB drive, or OneDrive) and kept in a safe location separate from the PC. It is recommended to decrypt drives before upgrading Windows, moving a disk, or sending a PC for repair. BitLocker does not work with dual-boot systems.
    • BitLocker To Go This feature, available in Pro and Enterprise editions (but not Home or Mobile), provides full-disk encryption for USB flash drives and external hard disks. It does not require a TPM chip and is compatible with various file formats. Access requires a password.
    • Device Encryption Found on Windows 10 Mobile and small tablets with screens 8 inches or less, this feature uses BitLocker technology to encrypt the entire device. It is activated with a simple on/off switch in Settings > System > Device Encryption and is considered just as secure as BitLocker.

    Encryption is strongly recommended for sensitive data, especially on portable devices which are prone to theft or loss. For businesses, encrypted backups stored offsite and encrypted cloud solutions are endorsed by data protection regulators.

    Sign-in Security

    Windows 10 offers various ways to secure your device access:

    • Password The standard sign-in method. Strong, secure passwords of at least 12 characters, using a mix of uppercase/lowercase letters, numbers, and symbols are recommended. A password reset disk can be created for local accounts, and Microsoft Account passwords can be reset online. It is always advisable to have a password set.
    • PIN A numeric code for quicker sign-in. While convenient, it is less secure than a strong password.
    • Picture password Allows signing in with three gestures on a chosen photograph. Easy-to-guess gestures should be avoided.
    • Windows Hello A biometric sign-in feature that uses facial recognition (with a compatible 3D camera) or fingerprint scanning (with a compatible reader). It is configured in Settings > Accounts > Sign-in options and is considered a very secure and convenient sign-in method.
    • Ease of Access Options on the sign-in screen allow enabling tools like Narrator, Magnifier, and Sticky Keys before logging in.

    Privacy Management

    Extensive privacy controls are available primarily in the Settings app under the Privacy section:

    • General Manage advertising ID, control the SmartScreen filter, and manage sharing handwriting recognition data with Microsoft.
    • Location Control location tracking (via GPS, cellular, or IP address), clear location history, and manage which Store apps have access to your location.
    • Camera and Microphone Control which Store apps have access to these devices.
    • Speech, inking & typing Control data sharing with Microsoft regarding your speech and handwriting to improve recognition (“Stop getting to know me”).
    • Account info, Contacts, Calendar, Messaging Control which Store apps have access to your account details, contacts, calendar, and text messages (on compatible devices).
    • Radios and Other devices Control which apps have access to wireless features like Wi-Fi and Bluetooth. Manage Trusted Devices that your PC has paired with.
    • Background apps (Mobile only) Choose which apps can run in the background, which can help extend battery life.
    • Feedback & diagnostics Configure how diagnostic data is sent to Microsoft, with explicit permission required for sending copies of files after a crash.
    • Notifications Control which apps display pop-up notifications (“toasts”), and manage notifications on the lock screen for privacy. Quiet Hours feature can silence notifications.

    Network and Online Safety

    Connecting to networks and the Internet requires caution:

    • Network Types Windows 10 distinguishes between Home, Work, and Public networks. When connecting to a network for the first time, choose the appropriate type. For public places, always select “Public” network and tell Windows not to find other PCs to maximize security.
    • Router Security On home networks, ensure your router has unique, strong passwords for both Wi-Fi access and the administration interface, different from default settings.
    • Wi-Fi Security Use strong encryption like WPA2 with a long, complex password for your Wi-Fi network. Avoid WEP and WPA as they are less secure.
    • Sharing Be mindful of sharing files and folders. HomeGroup simplifies sharing on home networks but is blocked on work/public networks. Advanced sharing settings allow granular control over user permissions. Sharing content directly between compatible apps is easy but carries the risk of accidental public sharing if website privacy settings are not strict.
    • Browser Safety Microsoft Edge and Internet Explorer include features to help identify safe websites (padlock icon, green address bar) and warn against potentially unsafe ones (amber/red address bar). Features like SmartScreen Filter, InPrivate browsing, and options to manage history, cookies, and tracking help enhance online privacy and safety.
    • Internet Threats Be aware of malware, phishing emails, and compromised websites. Never provide sensitive information in response to unsolicited emails, even if they appear to be from reputable companies.
    • Compatibility Using Windows 10 on a network with older, unsupported Windows versions like XP or Vista (support ended April 2014 and April 2017 respectively) is risky. XP machines should be completely sandboxed or denied network/Internet access. Be cautious sharing files with PCs running older or less secure operating systems.

    Windows 10 File Management and Security

    Windows 10 offers a variety of features and tools for managing your files and data, building on traditional methods while introducing new capabilities for organization, searching, and security. With users collecting ever-growing quantities of digital content, including photographs, music, videos, and documents, effective file management is crucial for finding and organizing information.

    Historically, organizing files primarily relied on folder structures. While user folders like Documents, Music, Pictures, and Videos still exist, Windows 10 provides more powerful ways to help you organize and access your files.

    Organizing Your Files

    Windows 10 provides several tools to help you structure and categorize your data:

    • Folders: The traditional method of organizing files into a hierarchical structure is still supported. You can navigate and manage folders using File Explorer.
    • Libraries: Although hidden by default in Windows 10, libraries still exist and can be very useful for aggregating files from multiple locations into a single view. You can show libraries in the Navigation pane of File Explorer. You can create your own custom libraries and add folders to them. Libraries can display content in ways that normal folders cannot, such as arranging files by tags.
    • Tags and Ratings: Tags are descriptive labels you can add to files to help categorize and find them later. Ratings use a one-to-five star system to indicate a file’s significance. Tags and ratings can be viewed and edited in the Details pane of File Explorer. Adding tags to documents as you create them is supported in Microsoft Office 2007 and later. Windows Photo Gallery can simplify adding tags and ratings to photos.

    Searching for Files

    Finding specific files among large collections is made easier with Windows 10’s search capabilities:

    • Cortana: The personal digital assistant can help you find files and content on your PC and online. You can type or speak search queries. Cortana can search across your hard disks, including OneDrive, OneDrive for Business, SharePoint, and company/college file stores. You can refine searches by relevance or recency. Cortana takes your privacy seriously, and you can manage permission for accessing personal information.
    • File Explorer Search: File Explorer has its own search box in the top right of the window. This search is often contextualized, prioritizing the type of content currently displayed in the window. The Search tab on the ribbon appears automatically when you type in the search box and offers various options to narrow your search. You can also view and clear recent searches here.
    • Advanced Query Syntax (AQS): For more precise searches in File Explorer, you can use AQS options. This allows filtering by properties such as Kind, Datemodified, Type, Name, Size, and includes Boolean operators like NOT, –, and OR.
    • File Index: Windows 10 uses an index database to speed up searches on internal storage. By default, it indexes content in your user folders and default libraries. You can add or remove folders and entire hard disks from the index. Advanced indexing options allow indexing of encrypted files. Searches of network locations are not indexed by default and may take longer.
    • Saved Searches: In File Explorer, you can perform a search and save it. These saved searches can effectively act like dynamic libraries that automatically update when opened. You can save searches and share them with others.

    Managing Files and Folders in File Explorer

    File Explorer is the primary tool for interacting with your files:

    • Interface: File Explorer features a ribbon interface with tabs like File, Home, Share, and View. It also has a Quick Access Toolbar, an address bar, and a Navigation pane. The status bar at the bottom provides basic information about the current folder.
    • Views: You can customize how files and folders are displayed using options on the View tab, including thumbnail sizes, list view, details view, tiles, and content view. You can also sort and group items by various criteria. Options exist to show or hide file extensions and hidden files.
    • File Operations: Common operations like Cut, Copy, Paste, Move, and Delete are available on the Home tab. The copy/move file dialog in Windows 10 is improved, showing all operations in one window and allowing pausing. The Replace or Skip Files dialog is also simpler to use. When deleting files, they are sent to the Recycle Bin. You can optionally re-enable warnings before deleting files.
    • Properties: You can view and edit file properties, such as tags and ratings, directly in the Details pane.
    • Context Menu Customization: You can add custom options to the right-click context menu in File Explorer, such as “Copy to folder” and “Move to folder” by editing the Windows Registry. You can also add a “Defragment” option for hard disks and “Command Prompt” to open a command window in the current folder location.
    • Drive Letter Display: You can control whether drive letters (C:, D:, etc.) are shown in File Explorer and even set them to appear before the volume name by modifying the Registry.
    • Adding Network Locations: You can add direct links to FTP sites in File Explorer to manage files as if they were on your local PC.

    Storage Management

    Managing your computer’s storage is essential for performance and organization:

    • Hard Disks and Partitions: Windows 10 supports using multiple hard disks and dividing them into partitions. The Disk Management console, accessible via the Win+X menu, allows you to partition drives, shrink/extend partitions, create/delete volumes, and assign/change drive letters. Keeping your files on a separate partition from your Windows installation is recommended for data security.
    • Storage Spaces: Available in Pro and Enterprise editions, Storage Spaces allows you to pool multiple hard disks into a single large storage location. It can provide built-in resiliency with mirroring or striping of data to prevent data loss. You can add disks of any size to Storage Spaces.
    • Disk Maintenance: Windows includes tools like Disk Cleanup and Disk Defragmenter to optimize storage. Disk Cleanup removes temporary and unwanted files, including previous Windows installations after an upgrade. Disk Defragmenter organizes files on mechanical hard disks for quicker access. Automatic maintenance includes these tasks.

    Backup and Recovery

    Protecting your files from loss or corruption is critical:

    • File History: This built-in tool keeps backup copies of files as you make changes, allowing you to restore previous versions or recover accidentally deleted files. It can be configured via Settings or Control Panel. You can choose which folders to back up and how often copies are saved. Backups can be stored on local internal disks, USB drives, or network locations. File History can be used to restore files after reinstalling Windows or moving to a new PC.
    • OneDrive: Microsoft’s cloud storage service is integrated into Windows 10. You can synchronize any files and folders on your PC with OneDrive. Files stored in OneDrive are accessible from any device when signed in with the same Microsoft account. You can choose which files and folders to sync locally, which is useful for devices with limited storage. OneDrive for Business offers larger storage capacity and is integrated for work accounts.
    • System Image Backup: This feature allows you to create a complete snapshot of your Windows 10 installation, including all software and settings. This image can be used to restore your PC to a previous working state if something goes wrong. System images can be stored on another hard disk, DVDs, or a network location.
    • Sync Center: Manages synchronization partnerships, particularly for keeping offline copies of files from a Windows Server.
    • Work Folders: A feature in Pro and Enterprise editions, Work Folders allows users to synchronize work files from a compatible Windows Server, storing them in a safe and encrypted container on their PC.

    File and Folder Security

    Windows 10 provides several methods to protect your files:

    • NTFS Permissions: You can control access to individual files and folders by setting permissions for specific users or groups. Permissions include Full Control, Modify, Read & Execute, List Folder Contents, Read, and Write. Advanced settings allow controlling inheritance of permissions and viewing effective access for a user. You can also manually take ownership of files or folders.
    • Encrypting File System (EFS): This allows encrypting individual files and folders using strong encryption. EFS is tied to your Windows user account on a specific PC and requires careful management and backup of encryption keys. Encrypted file names remain visible, and EFS requires NTFS-formatted drives, which can cause issues with backups on other file systems.
    • BitLocker Drive Encryption: Available in Windows 10 Pro and Enterprise editions, BitLocker provides full-disk encryption for entire hard drives. For internal drives, it typically requires a Trusted Platform Module (TPM) chip. BitLocker keys must be backed up securely. Files copied from a BitLocker-encrypted drive are automatically decrypted. It’s recommended to decrypt drives before upgrading Windows, moving a disk, or sending a PC for repair.
    • BitLocker To Go: A feature of Pro and Enterprise editions, this provides full-disk encryption for external drives like USB flash drives. Access requires a password.
    • Device Encryption: Available on Windows 10 Mobile and small tablets (8 inches or less). It uses BitLocker technology to encrypt the entire device and is activated with a simple switch in Settings.

    Windows 10 provides extensive capabilities for file management, from organizing and searching to securing and backing up your data, accommodating various user needs and technical abilities.

    Windows 10 Settings App Explained

    Drawing on the sources, we can discuss the System Settings within Windows 10, primarily focusing on the Settings app, which serves as the central location for configuring your PC’s settings.

    The Settings App: A Central Hub for Configuration

    The Settings app, refined in Windows 10 from its Windows 8 predecessor, is designed to contain most of the configuration and management options needed for day-to-day use. It presents these options in an easy-to-use, easy-to-navigate app format, suitable for casual or nontechnical users. While the traditional Control Panel still exists for more advanced configuration, the Settings app is intended as the primary interface for common settings adjustments.

    The app features an easy-to-read front screen with icons for different settings categories and includes a search box to help you find specific settings quickly. You can navigate back to previous pages within the app using a back button. The layout and category icons are generally consistent between the desktop version of Windows 10 and Windows 10 Mobile smartphones, although specific settings may vary by device type.

    The Settings app is organized into several key categories, each containing various configuration options:

    1. System: This category contains settings related directly to the Windows operating system itself. It includes options for managing notifications, apps, and power settings. You can also find information about your PC and its installed copy of Windows 10 here. Specific settings include:
    • Display (screen resolution, scaling text and apps).
    • Notifications and actions (quick action buttons, system tray icons, app notifications).
    • Phone (Mobile-only, e.g., auto-SMS replies).
    • Messaging (Mobile-only, e.g., text message backup).
    • Optional features (features available for your Windows version).
    • Multi-tasking (PC-only, e.g., Windows snap features).
    • Battery Saver (Mobile/Laptops/Tablets, restrict background activity).
    • Power & sleep (Desktops/Laptops/Tablets, screen timeout, sleep settings).
    • Storage (All devices, view drive fullness, change default save locations for new content). Note that changing save locations here does not move existing files or apps; you need to do that manually or uninstall/reinstall.
    • Device Encryption (Smartphones/small tablets only, full device encryption).
    • Default apps (Choose apps for common file types and protocols like email, photos, web browsing).
    • About (PC information, rename PC, join domain/Azure AD, links to admin tools).
    1. Devices: This section manages hardware devices connected to your PC. It offers a simpler way to manage devices compared to the full Device Manager. Settings include:
    • Printers and Scanners (Install/manage local and network printers/scanners). You can also control device updates over metered connections.
    • Connected Devices (Lists non-printer/scanner devices like Bluetooth or USB, allows removing them). Includes control for driver updates over metered connections.
    • Bluetooth (Manage Bluetooth connections, discovery, alerts). Additional options are available via a link to a separate applet.
    • NFC (If available, on/off switch, app permissions, tap-to-pay options).
    • Mouse/Mouse & touchpad (Primary button, scroll speed, additional accessibility options).
    • Typing (PC-only, autocorrect and spell-checker on/off).
    • AutoPlay (PC-only, choose what happens when media or devices are inserted). This can also be controlled more finely in the Control Panel.
    1. Network and Internet: This category handles network connections and settings:
    • Cellular & SIM (Mobile/SIM devices, manage data connections).
    • WiFi (All devices, list available networks, connect, Wi-Fi Sense for password sharing/auto-connecting, manage known networks).
    • Flight mode (Mobile/Laptops/Tablets, turn off all radio activity).
    • Data usage (All devices, monitor data usage by connection type and app).
    • VPN (Pro/Enterprise/Mobile, set up VPN connections).
    • Dial-up (Desktops/Laptops, modem settings, define connections).
    • Ethernet (Desktops/Laptops, view adapter properties).
    • Proxy (All devices, set proxy settings).
    1. Personalization: As discussed in Chapter 9, this section allows you to customize the appearance of Windows 10, including the Start menu, desktop background, color scheme, sounds (Mobile), themes, lock screen, and account picture.
    2. Accounts: This category manages user accounts and related settings:
    • Your account (Switch between Microsoft and Local accounts, change avatar, view linked accounts).
    • Sign-in options (Change password, set up PIN, Picture Password, Windows Hello).
    • Work access (Connect to workplace/school networks for BYOD).
    • Sync your settings (Choose which settings sync across your Windows 10 devices using a Microsoft account, e.g., theme, passwords, language).
    • Family & other users (PC/Laptops/Tablets, create/manage additional users, access Family Safety features).
    • Kid’s Corner (Mobile, custom Start screen for children).
    • Apps Corner (Mobile, custom Start screen for adults/demos), corresponding to Assigned Access on PCs.
    1. Time & language: This section configures settings related to time, date, region, language, and speech:
    • Date & time (Set time/date, number formats, enable auto-set). Additional format settings available via a link to the Control Panel.
    • Language/Region/Region & language (Choose region, add language packs, keyboard layouts). Covered in Chapter 9.
    • Keyboard (Mobile, add language packs).
    • Speech (Text-to-speech and speech recognition settings, used by Cortana). Includes options for recognizing non-native accents.
    1. Ease of Access: This category provides features to make Windows 10 easier to use, beneficial for people with disabilities or anyone seeking customization. Settings include:
    • Narrator (Text-to-speech).
    • Magnifier (Magnifies the screen).
    • High Contrast (Adjusts colors for better visibility).
    • Closed captioning (Video subtitles).
    • Keyboard (PC-only, sticky keys, onscreen keyboard).
    • Mouse (PC-only, pointer size/color, keyboard mouse control).
    • More options/Other options (Turn off desktop background/animations, control notification duration). Detailed accessibility features are in Chapter 10.
    1. Privacy: This section allows you to manage personal information and data sharing:
    • General (PC-only, advertising ID, SmartScreen).
    • Location (Control tracking for PC/apps).
    • Camera and Microphone (Control app access to camera/mic).
    • Motion (Mobile/some tablets, control app access to sensors).
    • Speech, inking, and typing (Control data shared with Microsoft for recognition improvement, option to stop tracking).
    • Account info, Contacts, Calendar, Messaging (Control app access to this data).
    • Radios (Control app access to Wi-Fi/Bluetooth, denying access can save battery).
    • Background apps (Mobile, choose which apps run in background to save battery).
    • Accessory apps (Control notifications/data for accessory apps).
    • Other devices (Includes Trusted Devices list of paired devices, allows disabling trust).
    • Feedback & diagnostics (Decide if/how diagnostic data is sent to Microsoft, explicit permission for file requests). Privacy features are detailed in Chapter 11.
    1. Update & security: This category manages Windows updates, security, and recovery:
    • Windows Update (Automatically installs updates in Home edition; Pro/Enterprise offer options to defer upgrades). Updates for Store apps come through the Store, not Windows Update.
    • Windows Defender (Built-in anti-malware controls).
    • Backup.
    • Recovery (Options to Reset your PC, access Advanced start-up). Reset allows reinstalling Windows while keeping or removing files and accounts.
    • Activation (Check status, change product key, link to Store for upgrades).
    • For developers (Tools for side-loading apps).
    1. Extras: This category includes optional features and maintenance tools:
    • Defragment and Optimize Drives (Manages defragmentation schedule for hard disks). You can exclude SSDs.
    • Disk Clean-up (Removes temporary and unwanted files, including previous Windows installations after an upgrade). Useful for freeing up space, especially on devices with limited storage.

    Overall, the Settings app in Windows 10 provides a comprehensive, user-friendly interface for managing most system settings, covering everything from basic personalization and device management to more involved privacy and update configurations.

    Windows 10 Hardware and Performance Management

    Based on the sources and our conversation, we can discuss Hardware and Performance in Windows 10, focusing on management tools, performance monitoring, system maintenance, and hardware considerations.

    Managing Hardware

    Windows 10 provides several ways to manage hardware devices connected to your PC, ranging from a simplified interface in the Settings app to more advanced tools.

    • The Devices section of the Settings app allows you to install and manage local and network printers and scanners, listing both USB and network-connected devices. You can also manage other connected devices like Bluetooth or USB peripherals here. Settings for Bluetooth, NFC (if available), mouse/touchpad, typing features (autocorrect/spell-checker), and AutoPlay for various media and devices are also found in the Devices settings. You can control if device updates are downloaded over metered connections from this section.
    • The traditional Control Panel still exists and offers more advanced configuration options compared to the Settings app. For hardware, the Control Panel includes items like AutoPlay options with finer control than the Settings app, default program settings for file types and protocols, and font management.
    • For in-depth hardware management and troubleshooting, the Device Manager is the primary tool. Accessible from the Administrative Tools or Control Panel, Device Manager shows a hierarchical list of all installed hardware devices. It highlights devices that are not properly installed, configured, or enabled with warning icons. Device Manager allows you to:
    • View system resources being used by hardware, such as I/O ports and IRQs, which can help identify conflicts.
    • View hidden devices, including system drivers and some hardware-related hidden devices.
    • Scan for hardware changes to detect new or reconnected devices.
    • Install, update, uninstall, disable, and roll back drivers for devices. This is crucial for resolving problems caused by faulty or incompatible drivers, which are a common cause of Windows instability.

    Performance Monitoring and Optimization

    Windows 10 provides several tools to monitor system performance and perform maintenance to keep your PC running smoothly.

    • The Task Manager is a versatile tool for monitoring running processes, apps, and resource usage. The Processes tab provides a heat-mapped display of current processor, memory, disk, and network usage, allowing you to quickly identify resource-hogging applications. The Performance tab shows live graphs for CPU, memory, hard disk(s), and network connections, offering a general overview of performance information. Task Manager also allows you to manage startup apps, showing their impact on boot time.
    • The Performance Monitor offers much more detailed live metrics about Windows and your hardware than Task Manager. You can add hundreds of counters to track specific aspects of system performance, helping to diagnose bottlenecks or issues.
    • The Resource Monitor provides even more granular real-time information about processes, including details on CPU, memory, disk, and network activity, which can be filtered to focus on specific items.
    • System Maintenance tools help keep the PC healthy, which impacts performance. Automatic Maintenance runs on a schedule to perform tasks like deleting temporary files, defragmenting hard disks, and installing updates.
    • The Disk Defragmenter and Optimize Drives tool helps improve hard disk access speed by consolidating file fragments. It’s set to run automatically but you can manage the schedule and exclude drives like SSDs, where defragmentation isn’t beneficial and can cause wear.
    • The Disk Clean-up tool removes temporary and unnecessary files, freeing up storage space which can improve performance, especially on drives with limited capacity. This tool can also delete previous Windows installations after an upgrade.
    • The Windows Memory Diagnostic tool can be used to check if your computer’s physical memory (RAM) has faults, which can cause instability and performance issues.
    • Managing Virtual Memory settings in the Advanced System Settings can impact performance, particularly on older PCs or those with limited RAM or SSDs. Manually setting the paging file size can prevent defragmentation on mechanical drives.

    Hardware Requirements and Feature Dependencies

    Windows 10 has relatively low minimum hardware requirements:

    • Processor: 1GHz or faster
    • Memory (RAM): 1GB (32-bit) or 2GB (64-bit)
    • Hard disk space: 16GB (32-bit) or 20GB (64-bit)
    • Graphics card: DirectX9 or later with WDDM 1.0 driver
    • Display: 800×600 pixels or greater (though 1024×600 is also mentioned).

    However, many Windows 10 features require specific hardware:

    • Windows Hello needs a compatible infrared camera or fingerprint scanner.
    • Device Guard requires newer hardware like a UEFI secure boot system, TPM 2.0 chip, and virtualization support.
    • Hyper-V requires processor virtualization support and is available only in 64-bit Pro and Enterprise editions.
    • BitLocker drive encryption often requires a Trusted Platform Module (TPM) chip, which is mandated by Microsoft on Windows 10 laptops and tablets with screens larger than 10 inches.
    • Miracast wireless display and Wi-Fi Direct/NFC Printing require compatible hardware on both the PC/device and the receiving display/printer.
    • Secure Boot requires UEFI firmware.
    • Instant Go and touch features require specific hardware.
    • Running 64-bit Windows is necessary to utilize more than ~4GB of RAM (including graphics memory).
    • 3D gaming and Virtual Reality require a screen with a high refresh rate (e.g., 120Hz) and a compatible graphics card.

    Battery Life Management (Performance on Mobile Hardware)

    For laptops, Ultrabooks, tablets, and smartphones, managing battery life is crucial and directly relates to hardware usage and performance. Windows 10 includes features to help:

    • Battery Saver mode restricts background app activity when the battery level drops below a certain percentage.
    • You can monitor battery usage to see which apps and services consume the most power.
    • Tips for maximizing battery life include adjusting screen brightness, using Battery Saver mode, disabling unnecessary startup apps/services, using Store apps instead of win32 apps (as Store apps suspend in the background), and adjusting power/sleep settings.
    • Turning off search indexing can sometimes significantly increase battery life on SSDs, especially on tablets.
    • The Windows Mobility Center provides quick access to settings like brightness and battery status. Advanced power settings in the Control Panel allow fine-tuning options like hard disk power down, USB selective suspend, and adaptive brightness.

    In summary, Windows 10 offers comprehensive tools for managing hardware and monitoring performance, from user-friendly Settings to powerful Administrative Tools like Device Manager, Task Manager, and Performance Monitor. While minimum requirements are low, many advanced features depend on specific underlying hardware capabilities. Effective management of drivers, system maintenance, and battery settings (on mobile devices) are key to ensuring stable and optimal performance.

    Download PDF Book

    Read or Download PDF Book – Beginning Windows 10: Productivity and Security

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Building Dynamic Responsive Web Applications with ASP.NET MVC

    Building Dynamic Responsive Web Applications with ASP.NET MVC

    This collection of text excerpts is from Jamie Munro’s book, “ASP.NET MVC 5 with Bootstrap and Knockout.js: Building Dynamic, Responsive Web Applications,” published by O’Reilly Media in 2015. The book provides a practical guide to building modern web applications using these three technologies. It covers foundational concepts such as MVC architecture, integrating Bootstrap for responsive design, and utilizing Knockout.js for dynamic client-side interactions. Later sections explore working with data, implementing robust code architecture with filters and services, and building a complete shopping cart application as a comprehensive example.

    Podcast

    Listen or Download Podcast – Building Dynamic Responsive Web Applications with ASP.NET MVC

    Building Responsive Web Applications with ASP.NET MVC 5

    Based on the sources provided, ASP.NET MVC 5 is a framework that implements the Model-View-Controller (MVC) architecture pattern. In the context of web development, MVC is described as an architecture pattern where the Model manages the application’s data, often representing database tables. The View contains the visual representation, typically using HTML, CSS, and JavaScript. The Controller acts as the middleman, requesting data from the Model and passing it to the View for display, or receiving data from the View and passing it to the Model for saving. The book uses ASP.NET MVC 5 (or the MVC framework) frequently, often just referring to it as MVC.

    The book utilizes ASP.NET MVC 5 for several key tasks in building dynamic, responsive web applications:

    • To build sophisticated server-side web applications.
    • To interact with a database.
    • To dynamically render HTML.

    ASP.NET MVC 5 has evolved significantly since its initial release in March 2009 and is now considered a technology leader with many useful features readily available.

    The book focuses on combining ASP.NET MVC 5 with Bootstrap (a front-end framework) and Knockout.js (a JavaScript library implementing the Model-View-ViewModel pattern). ASP.NET MVC 5 serves as the server-side component, interacting with a database and rendering dynamic HTML. Knockout.js enhances responsive web design by adding snappy client-side interactions driven by the server-side application built with ASP.NET MVC 5.

    The book guides the reader through using ASP.NET MVC 5 by starting with creating a new project using the MVC template in Visual Studio. This template preloads useful files and folders, including a default shared layout view and a HomeController with basic actions (Index, About, Contact). Controllers in ASP.NET MVC extend the base Controller class, and actions typically return an ActionResult type. The ViewBag property is introduced as a way to pass data dynamically from the Controller to the View. Views, often .cshtml files, contain a mix of HTML and C# using Razor syntax to render dynamic content. Shared layouts, like _Layout.cshtml, contain reusable HTML elements common across multiple pages, and views are inserted into this layout when the RenderBody function is called.

    URL routing in ASP.NET MVC 5 maps URLs to specific controllers and actions. A default route is configured when a project is created, following a {controller}/{action}/{id} pattern with defaults for Home controller and Index action. This can be configured in App_Start/RouteConfig.cs. Starting with MVC 5, attribute routing is also available, allowing routes to be defined directly on controller actions or controllers using the [Route] attribute. This approach can be beneficial for creating more convenient or SEO-friendly URLs. Attribute routing supports prefixes ([RoutePrefix]) and constraints (e.g., :int, :min(0)) to make routing more specific and intelligent.

    For data persistence, ASP.NET MVC projects commonly integrate with databases, often using an ORM like Entity Framework (EF). Visual Studio provides built-in support for EF when scaffolding controllers and views. Scaffolding is a feature that allows rapid creation of web pages with basic CRUD (Create-Read-Update-Delete) functionality based on a model and data context.

    The book also covers various global filters available in ASP.NET MVC 5, which allow applying consistent behavior across requests. These include:

    • Authentication filters: New in MVC 5, responsible for validating credentials.
    • Authorization filters: Determine if an authenticated user is allowed to access a resource.
    • Action filters: Execute code before or after a controller action.
    • Result filters: Execute code when a result is executing or has finished executing, before being returned.
    • Exception filters: Handle errors that occur during a request. These filters can be registered globally or applied using attributes on specific controllers or actions.

    ASP.NET MVC can be integrated with Web API, which is used for building RESTful web applications. Web API controllers extend the base ApiController class. When integrating Web API with MVC, the Web API controller often serves as the entry point for interacting with a resource (Model), and the View is typically a JSON or XML representation of the resource. This allows for dynamic updates to the user interface without full-page reloads, as demonstrated in updating the list of authors example. Web API controllers leverage HTTP Status Codes (like 2xx for success, 4xx for client errors, 5xx for server errors) to provide feedback on API requests.

    A key concept discussed in the book is the “fat model, skinny controller” approach, which aims to place business logic in the Model (or supporting layers like services and behaviors) rather than the Controller. This promotes reusability and maintainability. Layers like Services (middleman for data fetching/saving), Behaviors (logic execution), Repositories (common queries), Orchestrations (coordinating services), and Unit of Work (managing database transactions) can be used to achieve separation of concerns within the “fat model”. The example refactors the AuthorsController to use a separate AuthorService and QueryOptionsCalculator behavior to demonstrate this principle.

    The final part of the book demonstrates these concepts by building a shopping cart application, showcasing how ASP.NET MVC 5 works together with Bootstrap and Knockout.js to create dynamic and responsive web pages. This includes building data models, implementing layouts using partial views and HtmlHelper methods, displaying lists of books, and adding, updating, and deleting cart items with dynamic UI updates using Knockout.js and Web API [Chapters 14-18].

    Building Web Apps with Bootstrap and ASP.NET MVC

    Based on the sources provided, Bootstrap is an HTML, CSS, and JavaScript framework used to create consistent-looking, responsive websites. Its primary purpose is to help developers build sleek and responsive views that render well on a variety of modern devices. By combining Bootstrap with server-side ASP.NET MVC and client-side Knockout.js, the framework allows for the rapid development of complex, dynamic, and responsive web applications. The book focuses on using ASP.NET MVC 5 with Bootstrap and Knockout.js to bring dynamic server-side content and responsive web design together.

    Bootstrap provides a set of custom components that facilitate building an incredible user experience using easy-to-implement HTML, CSS, and JavaScript. Many common Bootstrap components are automatically installed with MVC 5 applications and are immediately seen in action within the default project layout.

    Specific components and features discussed include:

    • Responsive Layout: Bootstrap provides a responsive web layout that automatically adjusts pages based on screen resolution.
    • Menus: Bootstrap defines menu structures using div with the navbar class, ul with the nav class, and li tags for elements. It includes features like inverse coloring (navbar-inverse), fixing the menu to the top (navbar-fixed-top), responsive collapsing for small devices (navbar-collapse, collapse, navbar-toggle), drop-downs (dropdown, dropdown-toggle, dropdown-menu, divider), and integrating elements like search boxes (navbar-form, navbar-right). Different styles like “pill” menus (nav-pills) are also available.
    • Buttons: Bootstrap includes six different themed buttons: Default, Primary, Success, Info, Warning, and Danger, which are created using the btn class along with a theme-specific class like btn-success. These classes can be applied to button tags, links, or submit buttons. Buttons can also be grouped (btn-group) and include drop-downs.
    • Alerts: The framework provides styled alert messages (Success, Info, Warning, Danger) using the alert class and a theme-specific class. Alerts can optionally be made dismissible using the alert-dismissible class and a close button with data-dismiss=”alert”.
    • Forms: Bootstrap provides classes for styling form elements and integrates with MVC client-side validation using jQuery.
    • Tables: Classes like table-bordered, table-striped, and table-hover can be used to style tables for better readability.
    • Pagination: A pagination component is used to create navigation links like “Next” and “Previous”, including styling to disable links on the first or last page.
    • Modals: Bootstrap modals can be used to display content, such as delete confirmations, in a dialog window over the current page. They are structured with classes like modal, modal-dialog, modal-content, modal-header, modal-body, and modal-footer.
    • Glyphicons: Bootstrap provides a set of icons (glyphicons) that can be easily included using span tags with appropriate classes, such as glyphicon glyphicon-sort or glyphicon glyphicon-trash.
    • Jumbotron: This feature is used to create a prominent display area or call-to-action, often seen near the top of a page.

    A significant advantage of using Bootstrap is that the developers have already written, organized, and tested much of the repetitive CSS code across a variety of web browsers. This saves developers time and provides confidence that the website will work consistently, allowing them to focus on building more sophisticated application features. The implementation effort for features like alert messages is also greatly alleviated.

    Bootstrap is automatically installed with MVC 5 project templates and can be managed or updated using the NuGet Package Manager in Visual Studio. Its core CSS is typically located in Content/bootstrap.css. The book notes that some features demonstrated align with Bootstrap version 3.3 documentation.

    While the book explores many components, it mentions that its examples “barely scratch the surface” of the numerous components Bootstrap offers. More complex components requiring JavaScript interaction are often covered in conjunction with Knockout.js integration. Bootstrap theming customization is noted as being outside the book’s scope.

    Understanding Knockout.js for Dynamic Web UIs

    Based on the provided sources, Knockout.js is an open source JavaScript library that allows developers to create dynamic and rich web applications. It is built with the Model-View-ViewModel (MVVM) pattern, and its primary purpose is to provide data binding between your ViewModel and your user interface (the View).

    The sources emphasize several key aspects and benefits of using Knockout.js:

    • Purpose and Benefits:
    • Knockout.js helps implement a complex user interface that responds to user interactions.
    • It enhances responsive web design with snappy client-side interactions driven by the server-side ASP.NET MVC application.
    • It provides sophisticated logic to automatically update the user interface based on user interaction.
    • It is described as lightweight and doesn’t try to be an all-in-one framework; it serves the single purpose of data binding.
    • Accomplishing tasks with Knockout.js takes very little time compared to writing plain JavaScript.
    • Its features are thoroughly tested in a variety of browsers, offering confidence that the web application will work consistently.
    • Integrating Knockout.js with Web API for dynamic UI updates without full-page reloads results in a much smoother user interface.
    • MVVM Implementation:
    • Implementing Knockout involves three distinct things: a view (HTML/CSS/JavaScript), a ViewModel (JavaScript code containing data), and telling Knockout to perform the data binding (ko.applyBindings).
    • The ViewModel should be organized to make it easy to represent how your View uses the data, distinct from how data might be stored in a database Model.
    • Core Concepts:
    • Data Binding: Achieved using easy-to-implement HTML attributes like data-bind. Various bindings are discussed and demonstrated, including:
    • text: Updates the text content of an element.
    • value: Binds the value of form input elements.
    • submit: Binds the submit event of a form to a function in the ViewModel.
    • visible: Controls the visibility of an element.
    • foreach: Repeats a block of HTML for each element in an array.
    • attr: Sets any HTML attribute dynamically.
    • css: Dynamically adds or removes CSS classes.
    • textInput: Similar to value but tracks every character change.
    • Observables: Special JavaScript variables that Knockout tracks for changes. When an observable changes, any UI element bound to it is automatically updated, and vice versa. Observables are accessed as functions to get or set their value (variable()), although Knockout is intelligent enough to handle this automatically in some contexts (like checking truthiness). Being mindful of how many observables are created is mentioned as important.
    • Observable Arrays: Observable variables specifically for arrays, tracking when items are added, removed, or replaced. UI elements bound to an observable array (like with foreach) update automatically when the array changes.
    • Computed Observables / Pure Computed: Functions whose values are automatically calculated based on the values of other observables they depend on. They update data bindings whenever their dependencies change. pureComputed is noted for avoiding unnecessary re-evaluations. Examples include calculating totals or determining CSS classes based on state.
    • Custom Features:
    • Custom Extenders: Add reusable custom behavior to observable properties. They can perform calculations or other logic when the observable’s value changes. The subTotal extender is demonstrated.
    • Custom Bindings: Encapsulate reusable UI logic and interaction with the ViewModel that goes beyond the built-in bindings. They are registered using ko.bindingHandlers. The isDirty binding (showing a button when a value changes) and appendToHref binding (dynamically appending a value to a link’s href) are demonstrated.
    • Custom Components: Encapsulate both a piece of HTML (template) and its corresponding ViewModel into a reusable, self-contained unit. They are registered using ko.components.register and can accept parameters. The upsert-cart-item component is demonstrated.
    • Integration with ASP.NET MVC and Web API:
    • Knockout ViewModels often receive data from the server-side ASP.NET MVC application, typically by serializing MVC Models or ViewModels to JSON using Razor and a helper extension, and then instantiating the JavaScript ViewModel with this data.
    • AJAX calls, often to Web API controllers returning JSON, are used to dynamically update the data in the Knockout ViewModel, which in turn updates the UI without full page reloads. HTTP Status Codes from Web API provide feedback on these requests.
    • Usage and Best Practices:
    • Knockout.js is installed using the NuGet Package Manager in Visual Studio and its script is included in the HTML layout, often via bundling and minification.
    • Using var self = this; in JavaScript ViewModels is presented as a way to easily reference other methods or properties within the ‘class’.
    • Applying Knockout bindings to a limited scope (e.g., a specific HTML element) is possible and can be useful when adding multiple Knockout bindings on the same page.
    • While Knockout is capable of powering dynamic interfaces, it’s suggested to use it sparingly where dynamic interaction is required, rather than on every page, as standard MVC views with Razor are sufficient otherwise.
    • The concept of single-page web applications, often built with libraries like Knockout, is mentioned, along with the idea that they make sense in certain situations (single focus) but not others (when page context changes).

    In summary, Knockout.js is presented as a valuable JavaScript library that simplifies building dynamic and responsive user interfaces by implementing the MVVM pattern through data binding, observables, and reusable components, particularly when integrated with ASP.NET MVC and Web API for server-side data handling.

    ASP.NET Web API: Building RESTful Applications

    Drawing on the provided sources and our conversation history, Web API is a technology within the ASP.NET framework used to build RESTful web applications. In this context, REST is described as a software architecture pattern commonly used for creating APIs or client-server applications.

    Here’s a discussion of Web API based on the sources:

    • Purpose and Integration with MVC and Knockout.js: Web API is easily integrated into the MVC architecture pattern, allowing for reuse between your MVC and Web API projects. The book demonstrates combining ASP.NET MVC, Bootstrap, and Knockout.js to build dynamic and responsive web applications. Specifically, integrating Knockout.js with Web API allows for dynamic UI updates without full-page reloads. This results in a much smoother user interface because Web API returns only JSON data (or XML) which Knockout then uses to dynamically update UI elements by data binding to observable properties.
    • Views in Web API: Unlike traditional MVC views that render HTML, the View in Web API is often a JSON or XML representation of the resource being interacted with. Knockout works particularly well with JSON data.
    • ViewModels as a Prerequisite: ViewModels are a prerequisite for Web API controllers because models are often the view. Data models that contain a circular relationship (like an author having many books and a book having one author) cannot be used directly in the return from a Web API action.
    • Setup and Controllers:
    • Web API can be included when a new MVC project is created in Visual Studio by selecting the Web API checkbox.
    • If not included initially, it can be installed later via the NuGet Package Manager, for instance, by using the command Install-Package Microsoft.AspNet.WebApi.
    • Installing via NuGet requires manual configuration in the App_Start folder. A WebApiConfig.cs file must be created to register Web API routes, and the Global.asax.cs file needs to be updated to configure these routes on application start.
    • Web API controllers are classes that extend a base ApiController class, similar to how MVC controllers extend the Controller class.
    • Routing and HTTP Verbs:
    • A default route for Web API is configured, typically using a template like api/{controller}/{id}. This means all Web API URLs are often prefixed with api/.
    • Web API controllers utilize common HTTP verbs associated with RESTful applications, such as GET, POST, PUT, and DELETE. When interacting with a RESTful API, the URL often stays consistent, and the request type (verb) changes to indicate the desired operation (e.g., POST for creating, PUT for editing).
    • Attribute routing ([Route]) can also be applied to Web API actions.
    • HTTP Status Codes: RESTful applications built with Web API heavily rely on HTTP Status Codes to provide feedback to the integrator. Common successful requests include 200 OK, 201 Created, and 204 No Content (2xx range). Client error requests (4xx range) include 400 Bad Request (for invalid input data), 401 Unauthorized, 404 Not Found, and 405 Method Not Allowed, often accompanied by helpful error messages in the response body. Server error requests (5xx range) include 500 Internal Server Error, 501 Not Implemented, and 503 Service Unavailable, also potentially with error details.
    • Filters: Web API supports the creation of global filters, similar to MVC.
    • Action filters can be used for tasks like global Web API validation. An Action filter can check if the ModelState.IsValid and, if not, immediately terminate the request and return a 400 Bad Request with details about the validation issues.
    • Exception filters are used for error handling. A global Exception filter can intercept exceptions and build a new HTTP response with a specific HTTP Status Code and tailored content based on the type of exception that occurred (e.g., returning a 404 Not Found for an ObjectNotFoundException or a generic 500 Internal Server Error for unknown exceptions).
    • Usage in Examples: The sources demonstrate using Web API controllers for:
    • Updating the listing of authors, performing sorting and paging via an AJAX request to a Web API controller that returns only an updated list of authors (JSON data). This data is then used by Knockout bindings to dynamically redraw the table.
    • Handling the saving (add/edit) of author data via AJAX requests. These requests use the POST or PUT verbs and send data as JSON. The Web API controller accepts the ViewModel, maps it to the data model, saves it, and returns a result (like 204 No Content for updates or 201 Created with the new item’s ID for additions).
    • Handling the saving (add/update/delete) of shopping cart items via AJAX requests using POST, PUT, or DELETE verbs.

    Building Data Models with Entity Framework

    Based on the sources, data model building is a fundamental aspect of creating web applications, particularly within the Model-View-Controller (MVC) architecture pattern, where the Model manages the data for the application. In the context of the provided material, data model building is closely tied to using Entity Framework (EF), an ORM (Object-Relational-Mapper), to interact with a database. An ORM like Entity Framework simplifies database access by converting a database table into a model, allowing it to be used like any other class in a project.

    The sources outline three different workflows for setting up and using Entity Framework within a project, which influence how you build your data models:

    • Database First: This workflow is used when you have an existing database or want complete control over database creation and maintenance. You create an EDMX file that stores your data schema, data models, and their relationships in XML. Visual Studio provides a designer for this. Creating the database tables manually is required before generating the models from it. This approach is considered very convenient when you want full control over database changes while still using an ORM.
    • Model First: Similar to Database First, models and relationships are maintained in an EDMX file. However, you manually create the models and define relationships using the Visual Studio designer, and then tell EF to create the necessary database tables, columns, and keys based on this design.
    • Code First: With Code First, you manually create your Model classes, and Entity Framework can automatically create the database and tables based on these classes if a database does not exist. You can also use EF tools to create initial Code First classes from an existing database. The power of Code First Migrations is highlighted as extremely convenient for automatically updating your database when your models change. The book’s examples primarily use the Code First approach because it translates better for demonstration purposes.

    Regardless of the workflow chosen, interacting with your models (adding, editing, deleting, and fetching data) will be the same.

    Specific Data Models in the Shopping Cart Example: For the practical shopping cart example, five data models are defined using the Code First approach:

    • Author Model: Contains information like Id, FirstName, LastName, and Biography. It also includes a virtual ICollection<Book> Books for the relationship where an Author can have many Books. A new feature introduced is the [NotMapped] attribute, used for a FullName property that concatenates FirstName and LastName; EF knows not to persist this property to the database.
    • Book Model: Stores details about a book including Id, AuthorId, CategoryId, Title, Isbn, Synopsis, Description, ImageUrl, ListPrice, SalePrice, and a Featured boolean. It contains foreign key properties (AuthorId, CategoryId) and virtual navigation properties (virtual Author Author, virtual Category Category) representing the relationships where a Book has one Author and one Category.
    • Category Model: Contains an Id and Name. It also includes a virtual ICollection<Book> Books for the relationship where a Category can have many Books.
    • Cart Model: Includes an Id and a SessionId. The SessionId is a unique identifier for the user’s cart. This property is decorated with [Index(IsUnique=true)] to create a unique database index for performance when searching, and [StringLength(255)] because indices are not compatible with the default nvarchar(max) for string fields. It has a virtual ICollection<CartItem> CartItems relationship.
    • CartItem Model: Contains Id, CartId, BookId, and Quantity. It primarily consists of relationships to the Cart and Book models via foreign keys and virtual navigation properties (virtual Cart Cart, virtual Book Book).

    Data models typically represent one or more tables within a database. Fields named Id are automatically recognized by Entity Framework as primary keys by convention. Similarly, fields with a related class name and “Id” (like AuthorId) are created as foreign keys. Virtual properties in models, especially navigation properties, are common for enabling features like lazy loading, where related data is only fetched when it is actually accessed, reducing upfront querying.

    Usage of Data Models:

    • Controllers: Controllers interact with data models to fetch or save data, often via a Database Context (DbContext) or a Service layer. They might perform data sanitation and validation based on model properties.
    • ViewModels: Data models are distinct from ViewModels. ViewModels are organized based on how the View uses the data, whereas Models represent how data is stored (e.g., in a database). Controllers are responsible for converting data models to ViewModels for the View, and vice versa when processing input. Returning a data model with a circular relationship (like Author having many Books and Book having one Author) directly from a Web API action is not possible, highlighting the need for ViewModels in such cases.
    • Services and Repositories: In a “fat model, skinny controller” architecture, services and repositories handle the business logic and data access, working with data models. The BookContext (the EF DbContext) is often owned by the service layer in this pattern.

    In summary, data model building in this context involves defining classes that map to database structures, often using Entity Framework’s conventions and attributes, and understanding their role in the overall application architecture alongside controllers, services, and viewmodels.

    Download PDF Book

    Read or Download PDF Book – Building Dynamic Responsive Web Applications with ASP.NET MVC

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Mastering Access Databases: Design, Queries, Forms, and VBA

    Mastering Access Databases: Design, Queries, Forms, and VBA

    This text appears to be a comprehensive guide to using Microsoft Access, covering foundational concepts to advanced techniques. It explains how to get started with Access and manage tables, including design, data types, relationships, and importing/exporting data. A significant portion focuses on working with queries for selecting, analyzing, and transforming data, introducing SQL and various operators. The guide also explores creating and manipulating forms and reports for data presentation and entry, along with detailed explanations of controls and their properties. Finally, it introduces Access programming fundamentals using macros and VBA, including debugging and working with data access objects like ADO and DAO.

    Podcast

    Listen or Download Podcast – Mastering Access Databases: Design, Queries, Forms, and VBA

    Understanding Microsoft Access Queries

    Queries are fundamental tools in Microsoft Access database applications, serving to extract data from tables, combine it in useful ways, and present it to the user. Essentially, an Access query is a question you ask about the information stored in your database tables. The word “query” itself comes from the Latin quaerere, meaning “to ask or inquire”. Queries are what convert raw data into meaningful information.

    Access queries offer a wide range of capabilities:

    • You can choose tables to draw data from, whether a single table or multiple tables linked by common data.
    • You can select specific fields from these tables to include in your results.
    • You can provide criteria to filter records, ensuring only those that meet certain conditions are included.
    • You can sort records in a specific order to make the data easier to analyze.
    • Queries can perform calculations such as averages, totals, or counts on your data.
    • You can create new tables based on the data returned by a query (make-table queries).
    • Query results, known as recordsets, can be displayed on forms and reports.
    • A query’s recordset can serve as a source of data for other queries (subqueries).
    • Action queries allow you to make changes directly to data in tables, such as updating values, appending new data, or deleting obsolete information.

    When you run a query, Access combines the records and displays them in Datasheet view by default. The set of records returned is called a recordset. Unlike tables, the recordset returned by a query is typically not stored permanently within the database; only the query’s structure, which is the SQL syntax used to build it, is saved. This means that every time a query is executed, it reads the current data from the underlying tables, ensuring the recordset reflects any changes made since the last execution. A query’s recordset can be viewed as a datasheet, or used by forms, reports, macros, and VBA procedures.

    You typically create a query using the Query Design button on the Create tab of the Ribbon. This opens the Query Designer, along with the Show Table dialog box where you add the tables or queries you need. The Query Designer has three views: Design view (where you build the query), Datasheet view (displays the results), and SQL view (shows the underlying SQL statement). The Design view is divided into two main parts: the table/query pane at the top (showing the field lists of added sources) and the Query by Example (QBE) design grid at the bottom.

    Working with fields in the QBE grid involves adding fields from the table/query pane by double-clicking or dragging. Fields can be added one at a time, in groups, or all fields from a source using the asterisk (*). Using the asterisk includes all fields and automatically updates if the source table design changes, but offers less control over field order and might retrieve unnecessary data. The QBE grid includes rows to specify the field, its source table, sort order, whether to show the field in results, criteria, and ‘Or’ conditions. You run the query using the Run button on the Ribbon.

    You can modify fields in the QBE grid, such as rearranging their order by dragging columns, resizing columns, removing fields, or inserting new fields. You can also hide a field from the query results by unchecking its Show box; this is useful for fields used only for sorting or filtering. Hidden fields without criteria or sort order applied are typically removed by Access’s optimizer when the query is saved. Sorting records is done in the Sort row, selecting Ascending or Descending. Sorting on multiple fields is processed from left to right in the QBE grid.

    To add criteria to a query, you enter expressions in the Criteria row of the QBE grid. Criteria act as filtering rules. Access automatically adds delimiters like quotes for text strings or pound signs (#) for dates in simple criteria. You can use operators (mathematical, comparison, string, Boolean, etc.) and functions in criteria. The Like operator along with wildcards (*, ?, #, [], [!]) is used for pattern matching in text fields. You can specify non-matching values using Not or <> operators. For multiple criteria within a single field, you can use the “Or” keyword, enter criteria on separate ‘Or’ rows in the QBE grid, use the In operator for a list of values, use And for ranges, or use the Between…And operator for ranges. For criteria across multiple fields, conditions on the same row are combined with And, while conditions on different rows are combined with Or.

    Multi-table queries are used to retrieve information from several related tables. Relationships between tables, typically based on primary and foreign keys, are crucial for this. When related tables are added to the Query Designer, join lines often appear automatically. Join lines represent the relationship between tables in the query. There are three basic types of joins:

    • Inner joins: Return only records that have matching values in the joined field in both tables. This is the default join type in Access queries.
    • Outer joins: Return all records from one table and only matching records from the other. Left outer joins return all records from the left table, and right outer joins return all records from the right table. They are useful for finding records that may not have a match in the related table. You can change the join type or create ad hoc joins directly within the Query Designer.

    Beyond simply selecting data, Access offers more advanced query types:

    • Aggregate Queries (or Group-By queries) group and summarize data using functions like Sum, Avg, Count, Min, Max, etc.. They are activated using the Totals button in the Query Designer.
    • Action Queries perform operations on data. These include make-table queries (create new tables from results), delete queries (remove records), append queries (add records to existing tables), and update queries (modify existing records). Action queries cannot serve as data sources for forms or reports.
    • Crosstab Queries summarize data in a matrix format using row and column headings and an aggregated value. They require at least three fields. They can be created using the Crosstab Query Wizard or manually in the Query Design grid.
    • SQL-Specific Queries are action queries that cannot be created using the QBE grid and must be run from SQL view or code. Examples include UNION (merging results of two SELECT statements), CREATE TABLE (creating a new table structure), and Pass-through queries (sending SQL directly to an external database server for processing).

    Query performance is important, especially with large datasets. Access has a built-in query optimizer that tries to execute queries efficiently. Optimizing performance involves factors like normalizing your database design (using related tables instead of one large table), using indexes on fields frequently used for filtering, sorting, or joining, and improving query design practices (e.g., avoiding SELECT *, limiting fields in aggregate queries, hiding unused fields, using Between…And for ranges). Regularly compacting and repairing your database also helps by updating table statistics and allowing queries to be re-optimized.

    Additional related topics include using operators and expressions more deeply (Chapter 9), incorporating calculations and working with dates (Chapter 12), performing conditional analyses using parameter queries or functions like IIf and Switch (Chapter 13), understanding the fundamentals of SQL syntax (Chapter 14), and leveraging subqueries and domain aggregate functions for complex analysis layers within a single query (Chapter 15). Queries are also used extensively in data transformation tasks like finding/removing duplicates and manipulating text strings (Chapter 11).

    Understanding and Working with Access Tables

    Working with Access tables is foundational to database development, as tables serve as the primary containers for your raw information, often referred to as data. In essence, an Access database is largely an automated version of a manual filing system, where tables store different kinds of data in a carefully defined structure. Access is a relational database management system (RDBMS), which means it stores data in related tables.

    Here’s a discussion of understanding and working with Access tables, drawing from the provided sources:

    Fundamental Concepts

    • Tables as Containers: A table is like a folder in a manual filing system, serving as a container for raw information about a single topic, such as employees or products.
    • Records and Fields: Tables are organized into rows, called records, and columns, called fields. Each row (record) contains fields that are related to that specific record. Each column (field) represents an attribute and has properties that specify the type of data it holds and how Access should handle it. In other database systems, like Microsoft SQL Server, the term ‘column’ is often used interchangeably with ‘field’.
    • Values: The intersection of a record and a field holds a value, which is the actual data element.

    Relational Design and Multiple Tables

    • Benefits of Multiple Tables: In a relational database like Access, data for a single person or item is often stored in separate tables. For instance, customer contact information might be in one table, and their order history in another. Storing data in related tables simplifies data entry and reporting by reducing the need to input redundant information. This approach makes the system easier to maintain, as all records of a given type are in the same table.
    • Normalization: The process of separating data into multiple tables within a database is called normalization. The goal is to create tables that hold a minimum amount of information while remaining easy to use and flexible. The first three stages of normalization (First, Second, and Third Normal Form) are typically sufficient for most applications.
    • First Normal Form (1NF): Requires that each field contain only a single value and the table not contain repeating groups of data.
    • Second Normal Form (2NF): Achieved by splitting data into multiple tables, ensuring that non-key attributes are fully dependent on the primary key.
    • Third Normal Form (3NF): Requires removing fields that can be derived from data in other fields or tables.
    • Keys: To link related tables, you use key fields.
    • Primary Key: A field or combination of fields that uniquely identifies each record in a table. Access can create one automatically if you don’t specify one. The primary key field is always indexed.
    • Foreign Key: The corresponding field in a related table that refers back to the primary key in another table.
    • Composite Primary Keys: Primary keys made up of multiple fields. Using composite keys can add complexity without necessarily adding stability.
    • Table Relationships: These connect related tables, typically based on primary and foreign keys. The most common types are one-to-one, one-to-many, and many-to-many. Many-to-many relationships are modeled using a join table. Relationships are often visually represented by join lines in the Query Designer or Relationships window.
    • Referential Integrity: Access allows you to apply rules that protect data from loss or corruption by preserving relationships during data operations like updates and deletions. Enforcing referential integrity ensures that child records have a matching parent record, preventing “orphaned” records.

    Creating and Designing Tables

    • Creating a New Table: You typically create tables using the Table Design button on the Create tab of the Ribbon, which opens the table in Design view. You can also click the Table button to start in Datasheet view.
    • Design View: The Table Designer in Design view is divided into a field entry area (for name, data type, description) and a field properties area (for defining characteristics like field size, format, validation rules, etc.).
    • Naming Conventions: Adopting a naming convention (e.g., prefixing table names with tbl) is recommended for identifying database objects, especially as databases grow in size and complexity. While Access allows spaces in names, avoiding them is best practice, especially when working with code or external systems.
    • Field Properties: These are named attributes that modify a field’s characteristics (like size, format, caption) or behavior (like ‘Required’ or ‘Indexed’). They are enforced by the database engine. Examples include Field Size (for text/number fields), Format (how data appears), Input Mask (data entry format), Caption (label on forms/reports), Required (whether a value must be entered), and Indexed (for performance).
    • Data Types: Each field must be assigned a data type (Short Text, Long Text, Number, Date/Time, Currency, AutoNumber, Yes/No, OLE Object, Hyperlink, Attachment, Lookup Wizard). Choosing the correct data type is important for storage efficiency and data integrity.
    • Validation Rules: Criteria applied to data entry to ensure only data that passes certain tests gets into the system. You can set a rule for a single field or the entire table.

    Working with Data in Tables

    • Datasheet View: Tables can be viewed in a spreadsheet-like form called a datasheet. Datasheet view displays a table’s content in rows (records) and columns (fields). You can enter new data, change values, navigate records, sort, and filter directly in Datasheet view. You can also perform basic data aggregation directly in the datasheet.
    • Data Entry: While data can be entered directly into the datasheet, using forms is the recommended way as they can provide better structure, validation, and user guidance.

    Additional Table-Related Concepts

    • Indexing: Indexes are internal structures that speed up data access, querying, sorting, and grouping operations, especially in larger tables. Fields frequently used for filtering, sorting, or joining are good candidates for indexing.
    • Manipulating Tables: You can save, rename, delete, and copy tables using the Navigation pane or menu options. When copying, you can choose to copy only the structure, structure and data, or append data to an existing table.
    • Attachment Fields: A special field type that allows you to attach entire external files (like documents, images, audio, video) directly to records within an Access table.
    • Importing, Exporting, and Linking: Access allows you to bring data from external sources into new or existing tables (importing), send data to external files (exporting), or connect directly to data in external files without copying it locally (linking). Linking allows working with external data in place, but might have limitations compared to native Access tables.
    • Data Macros: Logic that can be attached to tables to enforce business rules or perform actions (like logging changes or validating data) when specific table events occur (like before/after changes or deletions).

    Understanding these aspects of Access tables, from their basic structure and design principles to how they are related and interact with other database objects and external data, is essential for effective database development in Access.

    Access Forms and Reports Explained

    Forms and reports are fundamental components within Microsoft Access databases, serving as the primary interface for users to interact with the data stored in tables. While tables hold the raw data, forms provide a structured way to view, enter, and modify that data, and reports offer a means to present data in a formatted, often summarized, view for printing or analysis.

    Here’s a discussion on creating and working with Access forms and reports based on the provided sources:

    Understanding the Role of Forms and Reports

    • Forms provide the most flexible way to view, add, edit, and delete data. They can be designed to resemble familiar paper documents, guiding the user through data entry and improving accuracy. Forms are also used for navigation (switchboards), dialog boxes, and displaying messages.
    • Reports present data in a formatted, often printable, output. They are used for viewing and analyzing data, often summarizing information through grouping, sorting, and calculations. Unlike forms, reports are generally for consumption of data, not entry or modification. Reports can combine data from multiple tables, typically through a query.

    Creating Forms

    Forms are typically created using the Forms group on the Create tab of the Ribbon. Several methods are available:

    • Form button: Creates a new form automatically bound to a table or query selected in the Navigation pane, opening in Layout view. This is useful for quickly getting a basic form with all fields.
    • Form Design button: Opens a new blank form in Design view, not automatically bound to a data source. This provides more control over the design process from the start.
    • Blank Form button: Creates a new blank form in Layout view, also not automatically bound to a data source. You add controls from the Field List.
    • Form Wizard: Guides you through selecting a data source, fields, and a basic layout (Columnar, Tabular, Datasheet, Justified).
    • More Forms button: Offers templates for specific form types like Multiple Items (tabular, shows multiple records), Datasheet (looks like a table datasheet), Split Form (shows datasheet and single-record form views simultaneously), and Modal Dialog (template for a pop-up dialog box).

    Working with Forms

    • Views: Forms can be displayed in Form View (for data entry/viewing), Datasheet View (row/column format), Layout View (adjust design while viewing data), and Design View (modify structure). You can switch views using the Views group on the Home tab or contextual tabs.
    • Data Entry and Modification: Data can be entered directly into controls in Form View. Access handles automatic data-type validation. Data is automatically saved when moving between records or closing the form. Some controls or fields may be non-editable (AutoNumber, Calculated, Locked).
    • Properties: Forms, sections, and controls have properties that define their appearance and behavior. These are accessed and modified via the Property Sheet. Properties are organized into tabs like Format, Data, Event, and Other. Examples include Caption (title bar text), RecordSource (links form to data), DefaultView (Single, Continuous, Datasheet, Split), AllowEdits/Deletions/Additions, PopUp, and Modal.
    • Sections: Forms can include a Form Header (top, displays once or with first record), Detail section (main area, shows data for each record), and Form Footer (bottom, displays once). Sections have properties like Visible, Height, Back Color, Special Effect, and Display When.
    • Layout: Layout View and Design View allow arranging controls. The Arrange tab on the Ribbon provides tools for aligning, sizing, and spacing controls. Tab order can be set for keyboard navigation.

    Creating Reports

    Reports can be created using the Reports group on the Create tab. They are typically based on a table or, more commonly, a query.

    • Report Wizard: Simplifies the process by asking questions about data source, fields, grouping, sorting, summary options, and layout.
    • Creating from Scratch: Using the Blank Report button opens a blank report in Layout View, which can then be switched to Design View. You add fields by dragging from the Field List.
    • Design View (Banded Design): Access reports use a banded design divided into sections: Report Header, Page Header, Group Header (for each defined group), Detail, Group Footer, Page Footer, and Report Footer. Each section prints at a specific time during the report generation process.
    • Page Setup: The Page Setup tab on the Ribbon controls report margins, orientation (Portrait/Landscape), and column settings (for snaking columns).
    • Grouping and Sorting: Data is organized using grouping and sorting options, often controlled via the Group, Sort, and Total pane. Groups can be based on entire values, prefixes, or date/numeric intervals. Sorting defines the order within groups or for the entire report.
    • Summaries: Group and Report footers are used for summary calculations (Sum, Avg, Count, etc.). The RunningSum property can create running totals or numbered lists.
    • Advanced Techniques: Reports support advanced formatting and behavior through properties and code. Examples include hiding repeating values (Hide Duplicates property), starting page numbers over for each group, creating bulleted lists, using the NoData event to handle empty reports, and controlling layout using the two-pass processing model.

    Shared Concepts: Controls and Properties

    Both forms and reports are built using controls, which are objects placed on the design surface.

    • Types: Common control types include Text Boxes (display/edit data, show expressions), Labels (static text), Command Buttons (run macros/VBA code), Check Boxes, Option Buttons, Option Groups, List Boxes, Combo Boxes, Images, and Lines/Rectangles (graphical elements). Subform/Subreport controls allow embedding other forms or reports.
    • Binding: Controls can be Bound to a field in the underlying data source, Unbound (not tied to a field), or Calculated (display results of an expression). Bound controls update the source data when edited on a form.
    • Adding Controls: Controls are added from the Controls group on the Ribbon or by dragging fields from the Field List (which automatically creates bound controls).
    • Properties: Each control has a set of properties defining its appearance (Format, Font, Color, Size, Position, Visible), data source (Control Source, Row Source for lists/combos), behavior (Required, Indexed, Enabled, Locked, Validation Rules, Input Mask), and responses to events (Event procedures).
    • Manipulation: Controls can be selected, moved, resized, aligned, and formatted. The Format Painter can copy formatting between controls. Default properties for control types can be set.

    Designing effective forms and reports is a crucial step in creating a user-friendly and powerful Access application, allowing users to easily interact with and understand the data stored in the database’s tables.

    VBA Data Access: ADO and DAO

    Accessing data with Visual Basic for Applications (VBA) is a core aspect of developing robust database applications in Microsoft Access, offering greater flexibility than simply relying on bound forms. While bound forms and controls can display and modify data linked directly to tables or queries, VBA code allows you to access and manipulate data programmatically.

    The primary tools for accessing data with VBA in Access are the ADO (ActiveX Data Objects) and DAO (Data Access Objects) object models. These object models are distinct from the Access object model itself, which includes user interface elements like forms and reports.

    Understanding ADO and DAO

    Both ADO and DAO provide ways to perform database operations such as:

    • Adding, modifying, and deleting data in tables.
    • Building and working with recordsets, which are structures containing rows (records) and columns (fields) of data from a table or query.
    • Populating forms or controls with data.

    ADO is the newer of the two syntaxes, based on Microsoft’s ActiveX technology. It features a relatively sparse and non-hierarchical object model, primarily revolving around the Connection, Command, and Recordset objects. ADO is often considered better suited for client-server databases like SQL Server because Microsoft provides a native ADO provider for SQL Server. Using ADO in VBA requires adding a reference to the Microsoft ActiveX Data Objects library and typically involves using the ADODB prefix for object types to avoid ambiguity.

    Key ADO concepts include:

    • Connection Object: Provides a link to a data source, necessary for any data operation. It holds information about the database connection in a connection string.
    • Command Object: Used to execute commands against a data source, such as running SQL statements or stored procedures. The output of a Command object can be directed into a recordset.
    • Recordset Object: A very versatile object often populated by executing a Command or directly using its Open method. You can open a recordset based on a table name, query name, or a SQL statement. Recordsets support navigation methods like MoveNext, MoveLast, MovePrevious, and MoveFirst. The EOF and BOF properties indicate the end or beginning of the recordset. Recordsets have a RecordCount property, though its availability depends on the CursorType setting.
    • Updating Data with ADO: Recordset objects allow you to update data. You use methods like Edit to begin changes and Update to save them. New records can be added using AddNew followed by Update. Records can be deleted using the Delete method. The Execute method of the Command object can also be used to run action queries (Update, Delete) directly without opening a recordset.
    • CursorType and LockType: ADO Recordsets have properties like CursorType (e.g., adOpenStatic for static data, adOpenDynamic for forward/backward movement, adOpenForwardOnly for forward movement only) and LockType (e.g., adLockOptimistic for optimistic locking, adLockReadOnly for read-only) which determine the recordset’s capabilities.

    DAO is the older data access model that has been part of Access since its inception. Unlike ADO, DAO has a more complex, hierarchical object model, starting with the DBEngine, which contains Workspace objects, which in turn contain Database objects. Database objects contain collections like TableDefs and QueryDefs, and you work with data through Recordset objects containing Field objects. With the introduction of Access 2007, Microsoft updated DAO to ACEDAO to support new data types like Attachment and Multi-value fields. ACEDAO is the default data access library in Access 2016. DAO is often considered simpler and faster for certain tasks and smaller datasets compared to ADO. Similar to ADO, DAO Recordsets provide methods for navigation, updating, adding, and deleting records.

    Choosing Between ADO and DAO

    The decision between using ADO or DAO often depends on the specific situation and the developer’s familiarity.

    • DAO: Generally easier and slightly faster for tasks involving local Access databases and smaller datasets, and it doesn’t require specifying a connection string explicitly when working with the current database (using CurrentDb).
    • ADO: Recommended when working with SQL Server due to native ADO providers. Also potentially better for complex operations across disparate data sources.

    Role of SQL

    Regardless of whether you use ADO or DAO, SQL (Structured Query Language) is fundamental. You often define the data you want to access or the action you want to perform by providing a SQL statement to an ADO Command object or when opening an ADO/DAO Recordset or QueryDef. Understanding basic SQL commands like SELECT (for retrieving data) and clauses like WHERE (for filtering) is essential for effective data access with VBA.

    VBA Data Access and the User Interface

    VBA code is frequently used to enhance user interaction with data displayed on forms. Instead of strictly relying on bound controls, you can use VBA to:

    • Retrieve data into a recordset and populate unbound controls on a form.
    • Perform complex validation or calculations before saving data.
    • Implement custom record navigation, such as using an unbound combo box to find a specific record using methods like RecordsetClone.FindFirst or Bookmark.
    • Apply or remove filters on forms using VBA code or parameter queries based on user input.

    In summary, accessing data with VBA provides a powerful and flexible way to interact with the data stored in Access tables or external data sources. By mastering ADO and DAO object models and leveraging SQL statements within your VBA code, you can build sophisticated applications that go far beyond the capabilities of bound forms and simple queries.

    Debugging and Error Handling in Access VBA

    Access applications, especially those incorporating significant amounts of Visual Basic for Applications (VBA) code, can be complex, making the process of identifying and fixing errors, known as debugging, challenging and time-consuming. Debugging involves finding and resolving problems when an application doesn’t run as intended.

    While some problems stem from poor database design, such as misrepresenting data in queries or issues with referential integrity rules, these are distinct from bugs that appear within your VBA code. Design errors often manifest clearly, like a query returning incorrect data or a form failing to open, with Access sometimes providing error messages as guidance. Code bugs, however, can be much more subtle, sometimes going unnoticed for months or years, and even poorly written code can run without obvious errors. To tackle these, Access provides a comprehensive suite of debugging tools within the Visual Basic Editor (VBE).

    Preventing Errors through Organization

    Adopting good coding habits and conventions is the first step in reducing the occurrence of coding errors. Simple conventions, such as using descriptive names for variables and procedures, can help eliminate many syntactical and logical errors. Keeping modules clean by including only related procedures enhances organization and can increase confidence that private variables are not misused.

    Traditional Debugging Techniques

    Two long-standing debugging techniques involve using built-in functions and methods to display information during code execution:

    • MsgBox: You can insert MsgBox statements into your code to display the value of variables, procedure names, or other strings at a specific point. MsgBox halts code execution and displays a message box that must be dismissed before the code continues. It’s easy to use and requires only a single line of code. However, it can be intrusive due to stopping execution and has limitations with displaying very long strings. For production applications, MsgBox statements used for debugging are typically suppressed using conditional compilation directives.
    • Debug.Print: This method outputs messages to the Immediate window in the VBE. Debug.Print statements do not stop code execution and are not visible to the end user since the output only goes to the Immediate window. This makes it useful for inspecting variable values or tracking code progress. Limitations include issues with long strings not wrapping in the Immediate window. While generally efficient, excessive use might potentially slow down an application, suggesting that surrounding them with compiler directives is also a good practice for distributed applications.

    Access Debugging Tools in the VBE

    The Visual Basic Editor (VBE) offers powerful tools for monitoring code execution and diagnosing problems:

    • Immediate Window (Debug Window): Accessible by pressing Ctrl+G or choosing View > Immediate. It allows you to execute single lines of code or entire procedures, inspect the values of variables, and view the output of Debug.Print statements.
    • Breakpoints: You can set a breakpoint on a specific line of code to intentionally halt execution when that line is reached. Set a breakpoint by clicking the gray margin indicator bar to the left of the code line or using the Breakpoint toolbar button. When execution stops, you can then use the Immediate window or other debugging tools to examine variables and the state of the application. Breakpoints are automatically removed when you close the application.
    • Stop Statement: Similar to a breakpoint, the Stop statement is an executable line of code that halts execution. However, unlike breakpoints, it must be manually removed or commented out from the code, or conditionally compiled out, to prevent the application from stopping unexpectedly for users.
    • Stepping Through Code: From a breakpoint, you can control the flow of execution one statement at a time:
    • Step Into (F8): Executes the current statement and moves to the next. If the statement calls another procedure, Step Into moves into that child procedure.
    • Step Over (Shift+F8): Executes the current statement. If the statement calls another procedure, Step Over executes that entire child procedure without stepping into it, and then stops on the line immediately after the procedure call in the current routine.
    • Auto Data Tips: When code execution is halted (in break mode), hovering the mouse cursor over a variable in the code window displays its current value in a small pop-up. This value updates dynamically as the variable’s value changes.
    • Locals Window: This window displays a list of all variables currently in scope for the procedure where execution is stopped, along with their current values. For object variables, you can expand the entry to see the object’s properties and contents. Note that global variables are not shown in the Locals window; you need to use the Immediate window or Auto Data Tips to inspect them.
    • Watches Window: Allows you to monitor the values of specific variables or expressions. You can add watches through the Debug menu or by right-clicking in the Watches window. You can specify the expression to watch, and optionally, limit the watch to a specific module or procedure. More powerfully, you can set conditional watches that cause execution to break when the watched expression evaluates to True (Break When Value Is True) or when the value of the variable or expression changes (Break When Value Changes). Watches are removed when you exit Access.
    • Call Stack Window: When execution is stopped at a breakpoint, the Call Stack window displays the sequence of procedures that were called to reach the current location. This is useful for understanding the flow of execution, especially in nested procedure calls, and diagnosing issues that might arise from how procedures are called. You can double-click entries in the call stack to navigate to that line of code in the respective procedure.

    Trapping Runtime Errors

    Even with thorough testing, unexpected errors (runtime errors) can occur during the execution of your code. Access provides mechanisms to handle these errors gracefully rather than crashing or displaying a confusing message to the user. The On Error statement is used to specify what action to take when an error occurs.

    • On Error Resume Next: Tells Access to ignore the error that just occurred and continue execution with the statement immediately following the one that caused the error. While useful for suppressing known, harmless errors, it makes debugging difficult as errors are silently skipped. It should be used carefully and typically reset using On Error Goto 0 afterwards.
    • On Error Goto 0: Resets Access’s error handling to its default behavior, which is to stop code execution and display an error message.
    • On Error Goto Label: Directs execution to a specified code label (ErrHandler: in the example) when an error occurs. This allows you to write custom error handling code within the procedure.
    • Resume Keyword: Used within an error handler to continue code execution. Resume (or Resume 0) attempts to re-execute the statement that caused the error. Resume Next continues with the statement immediately after the one that caused the error. Resume Label branches execution to a specified label.
    • Err Object: VBA creates the Err object whenever a runtime error occurs. This object contains information about the error, such as its Number and Description properties. The Number property is zero if no error has occurred. The Err object is frequently used within custom error handlers (On Error Goto Label) to display details about the error to the user or log the error information.

    Error handling is also available for macros using the OnError action and the MacroError object, which provides information similar to the VBA Err object. This was an improvement over older versions of Access where macros lacked robust error handling.

    By utilizing these debugging tools and implementing effective error trapping, developers can significantly improve the stability and reliability of their Access applications.

    Download PDF Book

    Read or Download PDF Book – Mastering Access Databases: Design, Queries, Forms, and VBA

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Sheikh Hasina: From Liberation to Oppression by Rohan Khanna India

    Sheikh Hasina: From Liberation to Oppression by Rohan Khanna India

    The text is a critical commentary on Sheikh Hasina’s leadership in Bangladesh. It accuses her of authoritarian actions, including suppressing opposition, restricting the media, and implementing unfair quota systems. The author highlights concerns about human rights abuses, particularly the violent crackdown on youth protests. The piece further argues that these actions threaten Bangladesh’s stability and democracy, potentially leading to regional instability and a humanitarian crisis. Ultimately, the text calls for a reevaluation of Hasina’s legacy and a consideration of the potential consequences of her policies.

    Study Guide: Analysis of Sheikh Hasina’s Leadership in Bangladesh

    Quiz

    Answer the following questions in 2-3 sentences each:

    1. According to the text, what are some of Sheikh Hasina’s positive accomplishments as a leader?
    2. What is the primary criticism leveled against Sheikh Hasina concerning her approach to the opposition?
    3. What is the first “mistake” the author attributes to Sheikh Hasina?
    4. What is the second major mistake, according to the text, that Sheikh Hasina committed?
    5. How did Sheikh Hasina reportedly respond to the protests against the quota system?
    6. What is the third “devastating blunder” the author claims Sheikh Hasina committed?
    7. How does the author connect Sheikh Hasina’s actions to her father, Sheikh Mujibur Rahman?
    8. What potential negative consequences does the author predict as a result of Sheikh Hasina’s actions?
    9. How does the author describe the Modi government’s position in regards to the political situation in Bangladesh?
    10. What does the author suggest is the “real challenge” for Bengali leadership?

    Quiz Answer Key

    1. The text praises Sheikh Hasina for her rapid economic progress, increasing exports, and providing employment for Bengali women, thereby making Bangladesh a significant part of the global economy. She is also credited for a growth rate that was ahead of India, and for her efforts toward a secular peaceful society.
    2. The text criticizes Sheikh Hasina for suppressing the opposition, not allowing it to have a voice in the political sphere. The author claims that she imposed restrictions on the media and internet, thus stifling dissenting opinions.
    3. The author considers Sheikh Hasina’s support of a bill against the wishes of the opposition as her first mistake, arguing that forcibly stopping opposition is a sign of weakness. He claims that she adopted the bill to strengthen her government, even though her opposition was against it.
    4. The second major mistake, according to the text, is the continuation of the quota system, which the author believes is unfair to other innocent children by limiting their rights. The author claims this is based on a racial and inherited basis that is needlessly continued.
    5. Instead of addressing the youth’s grievances, Sheikh Hasina, as the text says, threatened them in speeches on national media, even going so far as to suggest that their grievances are the complaints of ‘Razakars’ or traitors.
    6. The author claims the third, most devastating blunder, is the ruthless use of force against the youth protestors. He cites the government’s use of bullets and violence, referring to this as a massacre.
    7. The author argues that Sheikh Hasina’s actions have diminished her father’s legacy by turning him from a hero to a zero. The text notes that her father freed the people from problems that she is now re-enacting.
    8. The author suggests that Sheikh Hasina’s actions could lead to a rise in Islamic extremism and further unrest in the region, possibly causing a refugee crisis similar to the one in 1971.
    9. The author portrays the Modi government as caught in a difficult position, facing international scrutiny. The author claims the Modi government has no other option than to send her to a Muslim country in order to save its reputation.
    10. The “real challenge” for Bengali leadership, according to the text, is to navigate the current crisis and prevent further atrocities and violence, while also dealing with the potential rise of hatred and division within the country.

    Essay Questions

    1. Analyze the text’s portrayal of Sheikh Hasina’s leadership, focusing on the contradictions between her successes and failures as presented by the author.
    2. Explore the significance of the author’s emphasis on the “youth” of Bangladesh and how their experiences shape the author’s critique of Sheikh Hasina.
    3. Discuss the author’s use of historical context, including references to Sheikh Mujibur Rahman, the 1971 war, and the language movement, in their critique of Sheikh Hasina’s leadership.
    4. Evaluate the author’s argument that Sheikh Hasina’s actions are turning Bangladesh towards instability and the rise of extremism.
    5. How does the author use the Modi government’s position as a device to highlight the severity of the Sheikh Hasina’s actions?

    Glossary of Key Terms

    • Bangla Bandhu: (Bengali: বঙ্গবন্ধু) A title meaning “Friend of Bengal” given to Sheikh Mujibur Rahman, the first President of Bangladesh and the father of Sheikh Hasina.
    • Razakar: (Bengali: রাজাকার) A term used to refer to collaborators with the Pakistani army during the 1971 Liberation War of Bangladesh. The term has a negative connotation and implies treachery.
    • Quota System: A system of reserving positions in government jobs for specific communities, which is often done on the basis of a racial or inherited class.
    • Secular Society: A society that is based on the separation of state and religion. It does not have any official religious affiliations and treats all religious equally.
    • Musi Tiger: This term is used to describe Sheikh Hasina’s powerful leadership style.
    • Baba Qaum: A term referring to leaders who have taken on authoritarian or autocratic power.
    • Darvesh: This term is used to portray a person as having reached a level of truth or understanding and is used to show that Sheikh Hasina’s true nature has been exposed.

    Sheikh Hasina’s Bangladesh: Authoritarianism and Instability

    Okay, here’s a briefing document summarizing the key themes and ideas from the provided text, with quotes included for context:

    Briefing Document: Analysis of “Pasted Text” on Sheikh Hasina

    Subject: Assessment of Sheikh Hasina’s Leadership in Bangladesh

    Date: October 26, 2023

    Overview:

    This document analyzes a critical commentary on Sheikh Hasina’s leadership in Bangladesh. The text presents a mixed view of her rule, acknowledging her economic achievements while strongly condemning her authoritarian tendencies and treatment of the youth. The author uses strong language and emotive appeals, often framing arguments through the lens of historical injustices and potential future consequences. The analysis reveals deep concerns about the suppression of dissent, the abuse of power, and the potential for societal instability.

    Key Themes & Ideas:

    1. Economic Successes vs. Authoritarian Rule:
    • Economic Progress Acknowledged: The author recognizes Sheikh Hasina’s role in Bangladesh’s economic growth, specifically noting her efforts to boost exports and provide employment for women. “She did such things for the rapid progress and prosperity of her country which nobody else had been able to do before her.”
    • Authoritarianism Criticized: Despite this progress, the author accuses Sheikh Hasina of becoming a “cruel dictator.” The text highlights her suppression of the opposition, restriction of media freedoms, and the potential shutting down of the internet to silence dissenting voices. The author posits: “Despite believing in democracy, Sheikh Hasina never gave any attention to the opposition; she always kept it in line.” The author also highlights, “If you suppress the other point of view in such a blatant manner, then the opposing lava which gets ready like this or rather, which simmers inside and explodes, will take away a lot with it.”
    • Contradictory Legacy: The central conflict presented is between Hasina’s economic success and her authoritarian approach. She is painted as someone who initially did good for the country but, through her recent policies, has veered towards autocracy.
    1. The Issue of Quotas and the Youth:
    • Quota System Criticized: The author strongly criticizes the continuation of a quota system that favors descendants of freedom fighters. He argues it’s unfair to current generations. The author claims, “It was a simple matter if Sheikh Mujibur Rahman had attacked Baba Qaum in 1972 If this reward was given to those who sacrificed their lives for the freedom of their country, then it should have been limited to this generation only and not by applying it to their sons and grandsons on a racial and inherited basis.”
    • Youth Discontent: The author highlights the anger of young people, arguing that the quota system deprives them of opportunities and creates resentment. It is emphasized that this is not understood by the leadership: “it did not make any sense that a Of course you should have taken the court’s permission to continue Imtiaz and Narwa, or rather Jalmana Kadam, or instead of taking the credit for its abolition yourself, you should have unnecessarily given it to the judges of the Supreme Judiciary”
    • Insensitivity: Sheikh Hasina is castigated for calling protesters “Razakars” (collaborators with Pakistani forces in 1971), a deeply insulting term in Bangladesh. The author says that she was, “such a false accusation that it was an insult to the country You are a traitor, did you not know how cheap and trivial the word Razakar is for the Bengali community?”
    1. Use of Force and Suppression of Dissent:
    • Brutal Crackdown: The most damning accusation is the government’s violent suppression of youth protests, depicted as a “ruthless use of blind princely power against our youth”. The author describes government forces firing on protesters. He poses the question, “what else can be a dictatorship worse than this?”
    • Massacre Allegations: The text alleges the government acknowledged three deaths but suggests the real number may be much higher, characterizing the actions as a “massacre.” The author highlights that she is, “found praising this massacre and tells the IG that your action was very good.”
    • Loss of Respect: The author believes the use of violence has negated Sheikh Hasina’s accomplishments, even tarnishing the legacy of her father, Sheikh Mujibur Rahman: “not only taken away the empire of all your qualities and struggle but has also turned your respected father from a hero to a zero.”
    1. Historical Parallels & Warnings:
    • Language Movement Comparison: The author draws a parallel between the current situation and the 1952 Language Movement, suggesting that the suppression of youth voices could lead to another major upheaval.
    • 1971 Refugee Crisis: The author raises concerns that if the situation deteriorates, another refugee crisis similar to 1971 may occur, placing pressure on India.
    • Extremism Threat: The author worries that oppression of dissent could strengthen Islamic extremism: “In fact, those who trade in hatred in the name of Islam may emerge stronger and may make life difficult for people of other religions in Bangladesh.”
    1. Call to Action & Future Outlook:
    • Need for Change: The author urges a change in leadership to prevent further instability, suggesting Hasina should have sought asylum in a Muslim country to reflect on her actions.
    • Responsibility of the Modi Government: The author believes the Modi government in India has to play a crucial role in handling this situation to avoid a refugee crisis in the future. The text points out that, “To save its reputation, the Modi government has nothing else except this. There is no option to send you to a Muslim country with respect.”
    • Uncertain Future: The author expresses concerns about the future of Bangladesh’s democracy.

    Conclusion:

    The text paints a critical picture of Sheikh Hasina’s current leadership, arguing that her economic achievements have been overshadowed by an increasingly authoritarian rule, particularly her violent crackdown on youth protests. It emphasizes the risks of suppressing dissent and the potential for regional instability. The document serves as a harsh indictment of the current state of affairs in Bangladesh under Sheikh Hasina and suggests that her current path could lead to dangerous consequences for Bangladesh and its neighbors.

    Sheikh Hasina’s Leadership: A Critical Assessment

    Frequently Asked Questions about Sheikh Hasina’s Leadership in Bangladesh

    1. How has Sheikh Hasina contributed to Bangladesh’s economic growth and international standing?

    Sheikh Hasina has been credited with significant economic advancements in Bangladesh. She implemented policies that boosted exports, created employment opportunities, particularly for women, and propelled Bangladesh onto the world stage. The text suggests that under her leadership, the country experienced a growth rate that surpassed even India’s and achieved notable progress toward becoming an economic force in Asia. This economic success is often cited as one of her key achievements and something that had never been done before her.

    2. What criticisms are leveled against Sheikh Hasina regarding her treatment of the political opposition?

    The source indicates that, despite her belief in democracy, Sheikh Hasina consistently marginalized and suppressed the political opposition. It is argued that she did not give sufficient attention to the opposition and its voters, contributing to an environment where differing viewpoints were not welcome. This suppression, it’s claimed, created an imbalance in the democratic process and led to further discontent. The text suggests a democracy without a strong and vocal opposition is like a “cloudless sky” that dissolves into normalcy, not giving voice to other viewpoints.

    3. How has the media been affected by Sheikh Hasina’s rule?

    The FAQ suggests that Sheikh Hasina’s government has placed restrictions and bans on the media. It is implied these actions suppressed small voices in society and stifled other points of view. The text claims these restrictions, coupled with the threat of internet shutdowns, makes it difficult for dissenting opinions to be heard or for any form of opposition to emerge.

    4. What is the controversy surrounding the quota system and its impact on Bangladeshi youth?

    One of the key criticisms of Sheikh Hasina, as outlined in the text, is her continuation of a quota system. This system allegedly favors the children and descendants of those who fought for Bangladesh’s independence. It’s suggested that this has led to resentment among youth who feel they are being unfairly deprived of opportunities based on inherited privilege, and are thus unfairly discriminated against. The author claims that Sheikh Hasina insulted those protesting the quota system by suggesting that if quotas are not given to freedom fighters’ children, it would go to the children of “Razakars”. The term “Razakar” being considered insulting to most Bengalis.

    5. What are the accusations of excessive force and violence directed at the youth of Bangladesh?

    The text accuses Sheikh Hasina of ruthlessly employing state power against the youth in Bangladesh. It cites incidents where the government is accused of using arms and violence against protestors. The author describes the use of force against protestors as a “massacre” and suggests that the government is actively suppressing dissent through violence and force. This is deemed as an extremely devastating blunder by the author that has severely tarnished Sheikh Hasina’s legacy.

    6. How does the author compare Sheikh Hasina to her father, Sheikh Mujibur Rahman?

    The source draws a stark contrast between Sheikh Hasina and her father, Sheikh Mujibur Rahman, a revered figure in Bangladesh’s history. While Rahman is remembered as a hero, Sheikh Hasina is depicted as having “turned your respected father from a hero to a zero” through her actions. The author notes that Sheikh Hasina, once the daughter of an oppressed leader, is now considered a “cruel Kasab” for the Bengalis for allegedly using excessive force against her people and that she has become like a dictator.

    7. What international implications are mentioned due to Sheikh Hasina’s policies?

    The text suggests that Sheikh Hasina’s actions are creating diplomatic challenges for other countries. It specifically mentions the potential strain on relations with America and Europe, who may find it difficult to support a leader accused of oppressing and killing her people. The author speculates that Sheikh Hasina’s actions may result in her being forced to take refuge in a Muslim country and implies she has put India in a difficult diplomatic position, which has limited options to respond to this situation.

    8. How does the author frame the potential for future instability in Bangladesh?

    The author expresses concern about the potential for future instability and a resurgence of violence within Bangladesh. There is concern that the oppression of youth could lead to a repeat of past conflicts and could potentially reignite regional tensions. The text specifically fears the possibility of a refugee crisis akin to 1971. It suggests that those who “trade in hatred” could take advantage of the instability which could have dangerous consequences for the whole population and not only the current government.

    Sheikh Hasina’s Rule: Progress and Authoritarianism in Bangladesh

    Sheikh Hasina’s rule in Bangladesh is viewed with both praise and criticism in the provided source [1].

    Here’s a breakdown of the key points:

    Positive Aspects:

    • Economic Progress: Sheikh Hasina is credited with making significant strides in the rapid progress and prosperity of Bangladesh [1]. She took steps to increase exports and provide employment for Bengali women, integrating Bangladesh into the world economy [1].
    • Growth: The text suggests that the economic growth rate of Bangladesh under Sheikh Hasina was ahead of India [1]. She was called the “Musi Tiger of Asia” [1].
    • Secular Society: Sheikh Hasina is described as moving ahead very well in the economy and in creating a secular and peaceful society [1].

    Criticisms and Concerns:

    • Suppression of Opposition: Despite believing in democracy, Sheikh Hasina is criticized for not giving attention to the opposition, keeping it “in line” [1]. This is described as leading to the dissolution of democracy [1].
    • Restrictions on Media: The source notes that she imposed restrictions and bans on the media, and was ready to shut down the internet, making it difficult for small voices to emerge [1].
    • Suppression of Dissent: The text claims that by suppressing opposing viewpoints, she has created a simmering anger that will eventually explode [1].
    • Religious Bill: Sheikh Hasina is criticized for adopting a bill to strengthen her government despite opposition, suggesting this was not a sign of strength but weakness [1].
    • Quota System: The continuation of a “shameful quota system” is described as a major mistake [1]. This system, intended to reward those who sacrificed for the country’s freedom, was seen as unfairly extending to their descendants, depriving other innocent children of their rights [1].
    • Insensitivity to Youth: The author suggests that Sheikh Hasina insulted the youth fighting for their rights by suggesting that if special quotas were not given to the children of freedom fighters then they would be given to the children of Razakars [1]. The author describes this as a false accusation and an insult to the country [1].
    • Use of Force: The text strongly criticizes the use of “blind princely power” against the youth, claiming that her actions have turned her respected father from a hero to a zero [1]. She is described as having “bullets fired on their chests” and then praising the massacre [1].
    • Dictatorial Tendencies: The author questions what dictatorship is worse than the actions of Sheikh Hasina [1].
    • International Relations: The source questions how America and Europe will give shelter to a “murderer of their children,” and points out that the Modi government is in a difficult position due to her actions [1].
    • Historical Parallels: The author draws parallels to the 1971 situation and warns that a similar scenario may occur if the situation in Bangladesh worsens [1]. They question whether India will have to face another influx of refugees and if the history of General Arora and General Niazi will be repeated [1].

    In conclusion, the source presents a complex picture of Sheikh Hasina’s rule, acknowledging her economic achievements while strongly criticizing her authoritarian tendencies and suppression of dissent [1]. The author sees her actions as a betrayal of her father’s legacy and a potential threat to the stability of the region [1].

    Sheikh Hasina’s Rule in Bangladesh: A Critical Analysis

    The provided source and our conversation history offer insights into the political landscape of Bangladesh, particularly focusing on the rule of Sheikh Hasina. Here’s an overview of the key aspects:

    • Sheikh Hasina’s Rule: The primary focus is on Sheikh Hasina’s leadership, which is presented with both positive and negative aspects [1].
    • Economic Achievements: She is credited with significant economic progress, increasing exports, and creating employment opportunities for Bengali women, which led to recognition of Bangladesh on the world stage and a growth rate that surpassed India [1].
    • Authoritarian Tendencies: Despite her economic successes, Sheikh Hasina is criticized for her authoritarian rule, including suppression of the opposition, media restrictions, and the use of force against dissent [1].
    • The source suggests that she did not give attention to the opposition and kept it in line [1].
    • The author claims she imposed restrictions and bans on the media and was prepared to shut down the internet, which made it difficult for dissenting voices to be heard [1].
    • Her suppression of opposing viewpoints is portrayed as a trigger for simmering anger that could explode [1].
    • Controversial Policies: She is criticized for continuing a “shameful quota system” that was meant to reward those who sacrificed for the freedom of the country but was seen as unfairly extending to their descendants [1].
    • The author states that Sheikh Hasina insulted the youth by saying that if special quotas were not given to the children of freedom fighters, then they would be given to the children of Razakars, describing this as a false accusation and an insult to the country [1].
    • Use of Force: The source expresses strong criticism regarding the use of “blind princely power” against the youth, claiming that her actions have tarnished her father’s legacy [1]. The author claims that she had “bullets fired on their chests” and then praised the massacre [1].
    • Dictatorial Actions: The text questions what dictatorship is worse than Sheikh Hasina’s actions [1].
    • Historical Context: The source draws parallels to the 1971 situation and suggests that similar events may occur if the situation in Bangladesh worsens. The text notes the possibility of another influx of refugees into India, and references the historical figures of General Arora and General Niazi [1].
    • Political Instability: The author warns of a potential for political instability, pointing to the hatred of Bengali youth toward Sheikh Hasina’s government. There is a concern that those who trade in hatred in the name of Islam may gain power and make life difficult for people of other religions in Bangladesh [1].
    • International Implications: The text questions how America and Europe will give shelter to a “murderer of their children,” and notes the Modi government is in a difficult position due to Sheikh Hasina’s actions [1]. The author suggests that if the situation in Bangladesh worsens, the Modi government may have to act to resolve the situation [1].

    In conclusion, the political landscape of Bangladesh, according to the source, is marked by a complex interplay of economic progress and authoritarian rule under Sheikh Hasina’s leadership. This has resulted in growing internal dissent and potential regional instability [1].

    Youth Oppression Under Sheikh Hasina

    The source highlights significant concerns about youth oppression under Sheikh Hasina’s rule in Bangladesh [1]. Here’s a breakdown of the key points related to this issue:

    • Use of Force: The text strongly criticizes the use of “blind princely power” against the youth [1]. It claims that Sheikh Hasina has used excessive force, having “bullets fired on their chests,” and then praising the massacre [1]. This suggests a brutal suppression of youth dissent.
    • Suppression of Dissent: The source indicates that the government’s response to youth protests is not to address their concerns, but to suppress their voices and crush their emotions [1]. The author notes that the youth are aware of “cheap and blatant use of arms and gunpowder” against them, and states that the government is unable to understand why they are protesting [1].
    • Insensitivity to Youth Concerns: The author emphasizes Sheikh Hasina’s insensitivity to the problems of the youth, highlighting the issue of unemployment [1]. They point out that despite knowing the anger among the youth regarding the quota system, she continued it, and they claim she insulted them by suggesting that if special quotas were not given to the children of freedom fighters then they would be given to the children of Razakars [1]. This is described as a false accusation and an insult to the country and to the youth fighting for their rights [1].
    • Disregard for Legitimate Grievances: The source describes how the youth are fighting for their legitimate rights and against the unjust quota system [1]. The author argues that Sheikh Hasina has not addressed their concerns, but instead has used her power to suppress them [1].
    • Potential for Backlash: The text suggests that the simmering anger and frustration of the youth is likely to explode [1]. The author draws a parallel to the 20th century when the youth protested against the imposition of Urdu, and notes that the current government’s actions might lead to a similar reaction [1].
    • Erosion of Legacy: The author argues that by using such force and by suppressing the youth, Sheikh Hasina has tarnished her father’s legacy, turning him from a hero to a zero [1].

    In summary, the source portrays a dire situation of youth oppression in Bangladesh under Sheikh Hasina’s rule. It highlights the use of excessive force, suppression of dissent, and disregard for legitimate youth concerns, which has led to widespread anger and frustration. The author suggests this has created an unstable environment and has damaged the legacy of her father [1].

    Bangladesh Quota System and Sheikh Hasina’s Governance

    The source and our conversation history discuss the quota system in Bangladesh as a significant point of contention and criticism against Sheikh Hasina’s government. Here’s a breakdown of the key points:

    • Shameful and Unjust System: The quota system is described as “absolutely shameful” [1]. The author suggests it is a major mistake by Sheikh Hasina [1]. It is presented as an unjust system that continues to exist [1].
    • Purpose and Flaws: The quota system was initially intended to reward those who sacrificed their lives for the freedom of Bangladesh [1]. However, the author criticizes its extension to the descendants of these individuals, specifically their “sons and grandsons,” on a “racial and inherited basis” [1]. This is seen as unfairly depriving other innocent children of their rights [1].
    • Intergenerational Injustice: The system is criticized for being applied to subsequent generations rather than being limited to the generation that fought for independence [1]. The author contends that by extending it to the children and grandchildren of freedom fighters, it is mercilessly depriving other innocent children of the community of their rights [1].
    • Youth Anger: The source emphasizes that there was significant anger among the youth against this system [1]. The author notes that Sheikh Hasina herself had acknowledged the seriousness of the issue and the rising anger among the youth in 2018 [1]. Despite this, she continued with the system [1].
    • Insensitivity and Insult: The author argues that Sheikh Hasina insulted the youth fighting for their legitimate rights by suggesting that if special quotas were not given to the children of freedom fighters, then they would be given to the children of Razakars [1]. This is described as a false accusation and an insult to the country [1]. The term “Razakar” is described as cheap and trivial for the Bengali community [1].
    • Missed Opportunity: The author suggests that Sheikh Hasina missed an opportunity to address the issue and gain the support of the youth [1]. Instead of taking credit for abolishing the system herself, she could have given credit to the judges of the Supreme Judiciary [1]. The author suggests she could have hugged the youth and announced that the oppression of the quota system would not continue, which might have been a better course of action [1].
    • Continuing the System: The text criticizes Sheikh Hasina for continuing the quota system, even though she knew the youth were angry about it [1]. The source says that instead of dealing with the problem, she is giving threats in her speeches on national media [1].

    In conclusion, the source presents the quota system as a major source of grievance and a significant political misstep by Sheikh Hasina. The system, initially designed to reward freedom fighters, is seen as unfairly disadvantaging other segments of the population and as a key driver of youth anger and discontent [1].

    Sheikh Hasina’s Rule: A Dictatorship?

    The source strongly criticizes Sheikh Hasina’s rule, characterizing it as dictatorial and accusing her of exhibiting various traits associated with a dictatorship [1]. Here’s a breakdown of the accusations:

    • Suppression of Opposition: The source states that Sheikh Hasina never gave any attention to the opposition and always kept it in line, suggesting a lack of tolerance for dissenting voices [1].
    • Media Restrictions: The author claims that Sheikh Hasina imposed various restrictions and bans on the media and was prepared to shut down the internet [1]. These actions are seen as attempts to silence opposing viewpoints and control the flow of information [1].
    • Use of Force: The source highlights the use of “blind princely power” against the youth, asserting that Sheikh Hasina had “bullets fired on their chests” and then praised the massacre [1]. Such actions are portrayed as characteristic of a dictator who is willing to use excessive force to suppress dissent [1].
    • Disregard for Democracy: Despite believing in democracy, Sheikh Hasina is accused of not giving any attention to the opposition and suppressing other points of view [1]. This is seen as a contradiction of democratic principles. The source claims that democracy always dissolves when there is no one to stop or interrupt a leader, and that this has happened in Bangladesh [1].
    • Insensitivity to Public Grievances: The author highlights the fact that Sheikh Hasina ignored the anger over the quota system and instead made insulting accusations [1]. This lack of concern for the people’s opinions and grievances is presented as a hallmark of dictatorial rule [1].
    • Contradiction of Legacy: The source argues that Sheikh Hasina’s dictatorial actions have tarnished the legacy of her father, Sheikh Mujibur Rahman, and turned him “from a hero to a zero” [1]. This underscores the severity of the accusations and suggests that her actions are seen as a betrayal of her father’s principles [1].
    • Questioning of Leadership: The text asks, “Bibi Sheikh Hasina ji, what else can be a dictatorship worse than this?” [1] This rhetorical question emphasizes the author’s belief that her actions are unequivocally dictatorial.
    • Loss of International Support: The source notes that her actions have jeopardized international support, asking how the US and Europe will shelter a “murderer of their children” [1]. This underscores the severity of the accusations and their impact on international relations [1].

    In summary, the source presents a strong case against Sheikh Hasina, accusing her of dictatorial behavior based on her suppression of opposition, restrictions on the media, use of force against the youth, and disregard for democratic principles [1]. The author’s accusations are not only aimed at criticizing her rule but also at portraying her as a leader who has betrayed her father’s legacy [1].

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog

  • Designing and Building the 21st Century Robot

    Designing and Building the 21st Century Robot

    This compilation of texts focuses on the 21st Century Robot Project, spearheaded by Brian David Johnson, a futurist and science fiction author. It explores the transition from science fiction concepts of robots to their real-world realization, particularly focusing on the development of a social, open-source robot named Jimmy. The sources discuss the philosophical underpinnings and technical challenges of creating robots designed for interaction and companionship, rather than solely for industrial tasks. Included are excerpts from a manifesto, science fiction stories featuring Jimmy and his creator, and details about the collaborative process involving engineers, artists, and even first-grade students in designing and building these robots. The overarching goal presented is the democratization of robotics, making it accessible for anyone to imagine, design, and build their own robot.

    Podcast

    Play or Download The Podcast Audio – 21st Century Robot

    Science Fiction Prototyping

    Science Fiction Prototyping is an unconventional tool used by Brian David Johnson, a professional futurist. It involves using science fiction stories, often based on research, to explore what it will feel like to live 10, 15, or even 20 years in the future and how people will act and interact with technology. According to Johnson, science fiction provides a language to talk about the future.

    In the context of the 21st Century Robot project, the walking, talking robot named Jimmy and other 21st Century Robots were first born in science fiction stories about a decade before the book was written. Johnson used his imagination to create these stories, which in turn fired up the imaginations of the scientists, engineers, academics, and designers who helped bring Jimmy to life. Weaving fiction with reality is part of how Johnson came to create the 21st Century Robot Collective.

    The Creative Science Foundation, a group of researchers and professors including Dr. Simon Egerton, collaborated on this new kind of robot, with science fiction at the center of their research. They used the stories as prototypes that allowed them to understand what it might be like to interact and live with these robots. These stories helped move their research forward, envision the new kind of robot, and led to new approaches in software and artificial intelligence (AI). This process was iterative: each story led to a new breakthrough and more research, which then led to another story, building upon the previous one. This iterative process, building off open source sharing, is described as where things “get really interesting”. The book itself is presented as a mix of science fiction stories and nonfiction chapters, reflecting this approach.

    The idea of imagining first is crucial to the 21st Century Robot Manifesto. Science fiction stories, comics, and movies are seen as powerful tools to help you imagine your robot. It is suggested that science fiction, based on science fact, can be used to design robots and even shared as a technical requirements document. This aligns with the broader idea that we must be able to imagine the future so we can then build it.

    Building Your 21st Century Robot

    Building robots, particularly the kind envisioned by professional futurist Brian David Johnson in the context of the 21st Century Robot Project, is presented as a process that is now accessible to almost anyone, in contrast to the 20th century when it was largely confined to universities and corporations. The project aims to make the production and use of robots as common as caring for a family pet. The goal is simple: to create 7 billion robots, making them as common as smartphones, tablets, and TVs.

    The method for achieving this goal is elaborate and involves several key steps and philosophies:

    1. Imagination First: The most important skill needed to build a robot is imagination. Nothing built by humans was not imagined first. This involves envisioning the robot’s personality, name, how it will interact, and what unique things it will do. Science fiction stories, comics, and movies are powerful tools to help imagine your robot. This aligns with Brian David Johnson’s use of science fiction prototyping, an unconventional tool that uses stories based on research to explore future interactions with technology and how people will feel and act. Science fiction, based on science fact, can even be used to design robots and shared as a technical requirements document. This is fundamental to the idea that we must be able to imagine the future so we can then build it. The fictional robots in the 21st Century Robot project were first born in science fiction stories about a decade before the book detailing their creation was written.
    2. Design: Once imagined, the robot needs to be designed. The physical creation often starts with illustrations and digital design tools [28, 3D printing section]. The design process gives form to the robot and helps refine its functionality. The design includes both the exoskeleton (the outer shell) and the endoskeleton (the internal structure). The exoskeleton contributes significantly to the robot’s personality and how people perceive it. The design needs to consider practical aspects like balance and weight. Digital design files, sometimes generic to start with, can be modified using software like Autodesk’s 123D or more complex tools. Sharing these designs is encouraged to foster collaboration and building upon others’ ideas. Different design approaches can result in varying levels of complexity and functionality, as seen in the different motor configurations explored by the Olin College students (4, 7, 18, and 24 motors).
    3. Building the Body (Construction): Building the physical body involves assembling the endoskeleton, which consists of frames and brackets, and incorporating the necessary components like servo motors, wires, and internal workings. Servo motors act like the robot’s muscles, enabling movement and are often intelligent, tracking their own state. Simple movements may use single servos, while more complex motions, like those in the ankle or hip, require multiple servos in a double-axis configuration, connected by frames and brackets. Key areas like the feet, legs, hips, torso, arms, head, and neck require specific arrangements of servos and brackets. The torso typically houses the main electronics. The exoskeleton, often 3D printed from the design files, forms the outer shell and protects the internal components while expressing the robot’s look. Kits, like those from Trossen Robotics or ArcBotics, provide all the necessary parts for assembly and often include instructions or tutorials.
    4. Programming the Brain (Software): The robot’s brain consists of hardware and software, known as artificial intelligence (AI). The 21st Century Robot Project models the robot brain on the human brain, splitting it into three parts: the autonomic system (handling low-level functions like walking and balance), the conscious mind (personality and higher-level thinking), and the reflex core (managing communication between the two). The AI software is structured in layers, such as the action primitives layer (controlling basic movements), the social primitives layer (handling social interactions like listening and gesturing), the character layer (defining personality and vocabulary), and the app layer (allowing customization through application programming interfaces or APIs). The development and sharing of this software, particularly through open source platforms like ROS (Robot Operating System) and DARwin-OP, are crucial to the project’s goal of accessibility. An environment called “Your Robot” is provided for exploring and developing the robot’s brain, including programming movements and downloading apps. Robots can also be given a voice with customizable volume, pitch, and speed.
    5. Iteration and Sharing: The process of building is intentionally iterative, involving repeating the process to make multiple versions and build upon previous learning and designs. Open source sharing is fundamental, allowing people to modify and build upon others’ ideas. The collective efforts of scientists, engineers, academics, designers, makers, and even first-grade students contribute to the project, refining designs and developing new approaches.

    Once a robot is built, there is a process for booting it up and ensuring all components are working correctly, sometimes involving a diagnostic check like the HELLO! Protocol. Troubleshooting resources are available to help navigate potential problems.

    Ultimately, building robots in this context is not about creating one “best robot ever,” but empowering everyone to create their best robot ever, leading to a future with seven billion unique robots.

    Anatomy of the 21st Century Robot Brain

    Drawing on the information in the sources and our conversation history, let’s discuss the concept of Robot Brains within the context of Brian David Johnson’s 21st Century Robot Project.

    In this project, building a robot, particularly its brain, is presented as something now accessible to nearly anyone, a significant shift from the 20th century when it was primarily the domain of universities and corporations. The foundation of this accessibility lies in the idea that imagination is the most important skill needed to build your robot. As we discussed, this connects directly to the unconventional tool of Science Fiction Prototyping, where science fiction stories based on research are used to explore how people will interact with technology in the future. These stories, in fact, acted as prototypes that helped researchers envision the new kind of robot and led to new approaches in software and artificial intelligence (AI).

    The robot’s brain, consisting of hardware and software known as artificial intelligence (AI), is modeled on the human brain [Source from our previous conversation history, 196]. This approach was inspired by Dr. Simon Egerton’s research into designing social robots meant to operate in complex environments like human homes, by taking inspiration from human behavior and how our brains work.

    The robot brain is conceptually split into three parts:

    1. The Autonomic System (or subconscious): This part handles the crucial, low-level functions automatically, freeing up the rest of the brain for more complex tasks. In the context of the 21st Century Robot, this includes controlling walking and balance, communicating with the servo motors through a microcontroller.
    2. The Conscious Mind: This is where the robot’s personality and character reside, and where higher-level thinking occurs.
    3. The Reflex Core: Acting as a translator and traffic cop, this thin strip allows signals to move between the conscious mind and the autonomic system, using primitives to speed up the transfer of information.

    A key insight from Simon Egerton’s research that influenced the robot brain’s architecture was the idea of allowing robots to make both good and bad decisions. Just as humans learn by making mistakes, the belief was that allowing robots to do so would accelerate their learning process. This complexity required a new system architecture.

    This new architecture emerged from the collaboration of Simon Egerton, Vic Callaghan, and Graham Clarke, drawing on the concept of multiple personalities or personas from psychoanalytic theory. This persona-based approach illuminates how humans adapt to changing contexts by switching between different sets of behaviors (personas). Applying this to AI meant envisioning the robot’s intelligence as a collection of different actions or behaviors.

    This concept led to a significant breakthrough: the realization that these personas could be grouped together and that new behaviors could be generated or downloaded, much like apps on a smartphone. This made programming and personalizing social robots easier for everyone. As stated, “Our robots became smartphones with legs”.

    The software that powers the robot’s brain is structured in four layers, built upon open source principles (using platforms like ROS and DARwin-OP) to promote accessibility and sharing:

    1. Action Primitives Layer: This layer operates at the bridge between the conscious and autonomic parts of the brain, controlling low-level motor functions and enabling basic movements like walking.
    2. Social Primitives Layer: Unlike traditional robots focused on physical manipulation, 21st Century Robots are designed to be social. This layer simplifies the complexities of social interaction, handling basic behaviors like listening, gesturing, and talking. It helps the robot figure out where to stand, when to make eye contact, and how to use gestures appropriately.
    3. Character Layer: This layer defines the robot’s personality and behaviors, determining how it will respond in different situations and what vocabulary it will use. It uses the social and action primitives to interact with the subconscious part of the brain.
    4. App Layer: This layer allows users to customize their robot by writing or downloading applications (apps) using application programming interfaces (APIs). These apps can transform the robot into various tools or companions, such as an alarm clock or a game machine, with its function influenced by its personality.

    A development environment called “Your Robot” is provided to allow individuals to explore and develop their robot’s brain, including programming movements and downloading apps. Additionally, robots can be given a voice with customizable attributes like volume, pitch, and speed.

    The open source nature of the software means that anyone can access and modify the code, from the low-level primitives to the personality layer and apps, fostering collaboration and building upon others’ ideas. This accessibility to designing and programming the robot brain is central to the project’s goal of empowering everyone to create their best robot ever.

    Creating Our Social Robot Companions

    Drawing on the information in the provided sources and our conversation history, Social Robots are a central concept within Brian David Johnson’s 21st Century Robot Project. The project champions a radical shift in how robots are perceived and created, moving them from the confines of universities and corporations in the 20th century to becoming accessible companions for nearly anyone in the 21st century. The core goal is to make the production and use of robots as common as caring for a family pet.

    The 21st Century Robots are intentionally designed to be fiercely social. Unlike traditional robots often relegated to industrial tasks (sometimes referred to as “Dirty, Dangerous, Dull” or 3D tasks) or locked away in labs, these new robots are primarily designed to act and interact with people. They are envisioned as companions and friends, not just servants. The project aims for a future where robots are as common and normal as smartphones, tablets, and TVs, becoming a part of our daily lives.

    The journey to creating social robots begins with imagination. You must first envision the robot’s personality, name, and how it will interact with people. Science fiction, grounded in science fact, serves as a powerful tool and even a technical requirements document to help imagine and design these social robots. The fictional robots in the project, like Jimmy, were first conceived in science fiction stories.

    Design plays a crucial role in a social robot’s reception. The exoskeleton, or outer shell, is significant in conveying personality and influencing how people perceive the robot. Designers deliberately aimed for a look that was cute, approachable, and friendly, like Jimmy, drawing inspiration from characters like E.T. to avoid scaring people. The design needs to ensure the robot looks like it wants to be your friend. The question of whether a robot is a boy, girl, or neither is also relevant to social design, often depending on context, story, and how humans generally perceive machines (often defaulting to male unless cues like color are added). Children, notably Ms. Moore’s first-grade class, instinctively imagine these robots as friends and companions, desiring interactions like playing, dancing, and helping with chores, rather than seeing them as servants.

    The robot’s brain, the artificial intelligence (AI), is key to its social capabilities and is modeled on the human brain. This architecture includes an autonomic system (for low-level functions like movement), a conscious mind (for personality and higher-level thinking), and a reflex core connecting the two. Inspired by research into enabling robots to make both good and bad decisions (like humans) to accelerate learning, a new persona-based architecture was developed. This approach views the robot’s intelligence as a collection of actions or behaviors that can be grouped and added, much like apps on a smartphone, making it easier for anyone to program and personalize a social robot. As one collaborator noted, “Our robots became smartphones with legs”.

    The software enabling social interaction is structured in layers:

    • The Action Primitives Layer handles basic movements necessary for a robot to operate in a physical, social environment, freeing up the rest of the brain.
    • The Social Primitives Layer simplifies the complexities of social interaction, managing behaviors like listening, gesturing, talking, deciding where to stand, and making eye contact in a socially appropriate manner. This layer allows the robot to react naturally without extensive processing.
    • The Character Layer defines the robot’s personality, behaviors, and vocabulary, using the primitives to guide interactions.
    • The App Layer allows users to customize their robot through applications (apps) and APIs, enabling it to function as different tools or companions (like an alarm clock or game machine), with the robot’s personality influencing how the app is performed.

    The open source nature of the software and hardware is fundamental to making social robots accessible. It allows individuals to access, modify, share designs and code, fostering collaboration and innovation within a community of builders worldwide. This collective effort, from scientists and engineers to makers and first-grade students, drives the project forward.

    Ultimately, social robots are seen as more than just machines; they are viewed as companions that can form relationships with humans. There can be bonds developed between humans and robots, even in professional settings. The project aims to empower everyone to create their best robot ever, resulting in seven billion unique, social robots filled with humanity and dreams. These robots are intended to be extensions of ourselves, reflecting our hopes and dreams, and helping us explore our own humanity and relationships.

    The Open Source 21st Century Robot Project

    Based on the provided sources and our conversation history, let’s discuss Open Source within the context of Brian David Johnson’s 21st Century Robot Project.

    The concept of open source is a fundamental principle of the 21st Century Robot Project. The underlying idea is that people should have control over the technology we use. This means we should have the ability to build it, modify it, and share it. This practice and community became popular around the end of the 20th century with the growth of the internet and software like the open source operating system Linux.

    The 21st Century Robot Project embraces this philosophy fully:

    • A 21st Century Robot is completely open source.
    • This starts with the 3D design files for the robot’s body, allowing everyone to design and customize their own robot.
    • The software that runs the robot and makes up its brain is free and open.
    • Users are encouraged to play with the operating system and design different apps for their robot.
    • A core aspect is the encouragement to share designs with others. If you create a cool new leg design or app, you should share it so others can use and build upon it.
    • The production of these robots is also open, enabling people all over the world to collaborate to build better, smarter, funnier, and more exciting robots.

    This open source approach is seen as a key factor in removing the barriers that had previously limited robot creation primarily to large universities and corporations in the 20th century. Technological advances combined with open source software and hardware have made it possible for anyone to imagine, design, build, and program their own robot in the 21st century. Open source hardware taps into the creativity of millions of smart developers and non-traditional builders.

    The software powering the robot’s brain is structured in layers (Action Primitives, Social Primitives, Character, and App layers). This software runs on open source operating systems like ROS (Robot Operating System) and DARwin-OP, which were developed by universities to advance robotics and artificial intelligence. The open source nature of these platforms means you can see and change the code if you want to. Both ROS and DARwin-OP have large communities of students, inventors, and makers who actively share ideas and solve problems online, which is a significant benefit of this approach. The project provides a development environment called “Your Robot” and encourages users to play with the code, whether it’s low-level functions, personality layers, or developing/downloading apps. The website http://www.21stCenturyRobot.com is a hub for accessing the software and connecting with the community.

    The open source initiative in robotics is specifically aimed at lowering the barrier to entry and making it easier for people to get started. This accessibility is crucial for allowing the tremendous potential of robots to be realized, by getting them everywhere and letting people build them. It is believed that the amazing ideas will come from these new points of view.

    Ultimately, the goal of the 21st Century Robot Project is not to build one “best robot ever”. Instead, through open source design and the creativity it enables, everyone can take what others have done and modify it to make their best robot ever. The project aims to provide the tools, materials, design files, and code necessary for everyone to imagine, design, build, program, and share their own robots. This collective effort, driven by open source principles, is intended to lead to a future with seven billion best robots ever, each reflecting the unique humanity and dreams of its creator. As illustrator Sandy Winkelman noted, he’s most excited to see what people do when they start creating their own robots.

    Download PDF Book

    Read or Download The PDF Book – 21st Century Robot

    By Amjad Izhar
    Contact: amjad.izhar@gmail.com
    https://amjadizhar.blog