Pakistanis can now make money on YouTube

Youtube enables Monetisation in Pakistan. PHOTO: REUTER


YouTube content creators in Pakistan can now monetize their videos.

Ahead of YouTube’s planned launch event in Pakistan, it has been announced that content creators in the country can now make money on the video-sharing website. YouTube doesn’t allow monetization in all markets making this is a significant development towards Pakistan’s market.
However, only original videos can be monetized. Any violations, such as blatant copying of videos, may get your Adsense account banned as YouTube runs an algorithm that detects for any copyrighted videos/music.
In order to monetize your account, follow the following steps:
1) Visit https://www.youtube.com/features after logging in to your account.
2) Press the icon which says Enable “Monetization”.
3) Accept the terms and conditions and connect your Adsense account with YouTube.
Note: this is only available for users with an Adsense account.



Public Health Risk

UNNOTICED by many, their migration begins in the early hours of the morning every Eid-ul-Azha. Two distinct categories of individuals begin to descend upon Karachi in droves, occupying passages leading to mosques, graveyards, city intersections and near residences which appear more like livestock markets than human dwellings.


One of these is a group of professional beggars — a family business jointly operated by husbands, wives, children, uncles and grandparents. The other is an amateur group of clueless ‘one-day’ butchers — novices who are eager to make a one-time ‘killing’. This group is equipped with hurriedly assembled, mobile slaughter kits consisting of knives and machetes of various sizes.
The struggle to control and slaughter the helpless animals is initiated almost immediately after Eid prayers. A tussle that involves a disarrayed crowd grappling, restraining, lashing, collapsing and firmly holding the animal from all angles before the knives can finally get to the jugular. Unfortunately, these dithering part-time butchers greatly add to the brutality of the process and the suffering of the animals.
The physical act of slaughter is accomplished on an ‘as is, where is’ principle. There are no laws, norms or compulsions to restrain this uncontrolled, passionate spirituality. It can be performed inside or outside a residence, in front of one’s own or a neighbor's gate, on a sidewalk, a main road, an empty plot, a footpath or in the middle of a narrow street.
When performed at a raised or inclined location, the resultant fluids travel far beyond their intended coordinates. The gutters are either choked with coagulated blood or simply shift their high-protein burden into the nearest body of water, further harming an already distressed aquatic life.

Animal slaughter should be banned in public spaces.


In most Western (and, in fact, Muslim) countries, it is unlawful to slaughter animals in homes, on roads, in public spaces or residential areas. This can be done only in designated areas approved as slaughterhouses and located well away from human dwellings. These purpose-built premises include facilities for the housing and movement of the animals; veterinary care; professional slaughtering equipment and methods; and the segregation and disposal of waste and body parts such as blood, hides, hooves, heads, horns, offal and other inedible parts. Many of these are sold and recycled.
Slaughter in places other than approved and licensed locations carries many hygiene and public health risks. Recently gaining prominence is Crimean-Congo hemorrhagic fever (CCHF), having hit the headlines due to the growing incidence of this highly fatal disease. It is caused by a virus that is carried inside the Hyalomma tick, which lives on the skin of farm animals. Nonetheless, awareness of this risk has only reached a fraction of the people who are likely to acquire the infection. Thus, the vast number of adults and children who are in contact with cattle know or understand little — or wish not to know, trusting their lives to fate.
CCHF is just one of the many zoonotic diseases (infectious diseases transmitted from animal to man) commonly known to most lay persons or practicing doctors. There are at least several dozen viral, bacterial, fungal and protozoal infections that are responsible for serious infections in humans. These infections are difficult to diagnose and even more difficult to treat. Unrecognized and misdiagnosed illnesses lead to mistreatment, complications, and prolonged chronic illness.
This year’s Eidul Azha has come and gone. The rivers of blood have been washed away or, rather, may have been absorbed by the earth. Stray cats and dogs, crows and kites will scavenge the leftover flesh, and one may get accustomed to the city’s perpetual stink. Days, weeks, even months later, diseases will begin to surface. Unreported by the press, many adults and children will enter hospitals’ and clinics’ outpatient facilities with fever and body pain, perhaps bleeding from internal organs. Others may suffer from fever and liver disease due to parasitic hydatid disease; prolonged, indolent fever from brucella; pneumonia from Coxiella; bovine tuberculosis; chronic intestinal infections from parasitic worms; and skin infections from anthrax.
In Muslim countries like Saudi Arabia — where animals are sacrificed on a massive scale, particularly after Haj — roadside slaughter is unheard of. Gulf countries do not have CCHF or zoonotic infections because they handle animal slaughter in a coordinated and hygienic manner. Pakistan, too, could learn from their examples.
Keeping, breeding, even entry, let alone slaughter, of farm animals in or around residential areas, roadsides or public spaces ought to be declared unlawful. This would, however, call for establishing organized, scientific, licensed and hygienic abattoirs in all cities and urban centers
If our government is prudent regarding the health and hygiene of its citizens it could build abattoirs close to all urban residential areas in a manner that caters to both public health and convenience.

There Is A New Zodiac Sign


Ophiuchus holding the serpent, Serpens, as depicted in Urania’s Mirror, a set of constellation cards published in London c. 1825. Above the tail of the serpent is the now-obsolete constellation Taurus Poniatovii while below it is Scutum. (Source: Wikimedia commons)

The OSI Model's Seven Layers Defined and Functions Explained

The Open Systems Interconnect (OSI) model has seven layers. This article describes and explains them, beginning with the 'lowest' in the hierarchy (the physical) and proceeding to the 'highest' (the application). The layers are stacked this way:

  1. Application
  2. Presentation
  3. Session
  4. Transport
  5. Network
  6. Data Link
  7. Physical

  • PHYSICAL LAYER


The physical layer, the lowest layer of the OSI model, is concerned with the transmission and reception of the unstructured raw bit stream over a physical medium. It describes the electrical/optical, mechanical, and functional interfaces to the physical medium, and carries the signals for all of the higher layers. It provides:

  • Data encoding: modifies the simple digital signal pattern (1s and 0s) used by the PC to better accommodate the characteristics of the physical medium. It determines:
  • What signal state represents a binary 1
  • How the receiving station knows when a "bit-time" starts
  • How the receiving station delimits a frame
  • Physical medium attachment, accommodating various possibilities in the medium:
  • Transmission technique: determines whether the encoded bits will be transmitted by base band (digital) or broadband (analog) signaling.
  • Physical medium transmission: transmits bits as electrical or optical signals appropriate for the physical medium, and determines
  • What physical medium options can be used


  • DATA LINK LAYER

The data link layer provides error-free transfer of data frames from one node to another over the physical layer, allowing layers above it to assume virtually error-free transmission over the link. To do this, the data link layer provides: 

  • Link establishment and termination: establishes and terminates the logical link between two nodes.
  • Frame traffic control: tells the transmitting node to "back-off" when frame buffers are not available.
  • Frame sequencing: transmits/receives frames sequentially.
  • Frame acknowledgment: provides/expects frame acknowledgments. Detects and recovers from errors that occur in the physical layer
  • Frame delimiting: creates and recognizes frame boundaries.
  • Frame error checking: checks received frames for integrity.
  • Media access management: determines when the node "has the right" to use the physical medium.

  • NETWORK LAYER

The network layer controls the operation of the subnet, deciding which physical path the data should take based on network conditions, priority of service, and other factors. It provides: 

  • Routing: routes frames among networks.
  • Subnet traffic control: routers (network layer intermediate systems) can instruct a sending station to "throttle back" its frame transmission when the router's buffer fills up.
  • Frame fragmentation: if it determines that a downstream router's maximum transmission unit (MTU) size is less than the frame size, a router can fragment a frame for transmission and re-assembly at the destination station.
  • Logical-physical address mapping: translates logical addresses, or names, into physical addresses.


  • TRANSPORT LAYER

The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers. 

The transport layer provides:

  • Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message.
  • Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments.
  • Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.

  • SESSION LAYER

The session layer allows session establishment between processes running on different stations. It provides: 

  • Session establishment, maintenance and termination: allows two application processes on different machines to establish, use and terminate a connection, called a session.
  • Session support: performs the functions that allow these processes to communicate over the network, performing security, name recognition, logging, and so on.


  • PRESENTATION LAYER

The presentation layer formats the data to be presented to the application layer. It can be viewed as the translator for the network. This layer may translate data from a format used by the application layer into a common format at the sending station, then translate the common format to a format known to the application layer at the receiving station. 

The presentation layer provides:

  • Character code translation: for example, ASCII to EBCDIC.
  • Data conversion: bit order, CR-CR/LF, integer-floating point, and so on.
  • Data compression: reduces the number of bits that need to be transmitted on the network.
  • Data encryption: encrypt data for security purposes. For example, password encryption.

  • APPLICATION LAYER

The application layer serves as the window for users and application processes to access network services. This layer contains a variety of commonly needed functions: 

  • Resource sharing and device redirection
  • Remote file access
  • Remote printer access
  • Inter-process communication
  • Network management
  • Directory services
  • Electronic messaging (such as mail)
  • Network virtual terminals