Sunday, May 31, 2020
Various Themes In The Immortal Life of Henrietta Lacks - Free Essay Example
In the Afterword section of The Immortal Life of Henrietta Lacks story, written by Rebecca Skloot, it details the issues of taking human tissue samples and using them for research. There are numerous arguments relating to money, consent, specific people who have had their tissues tested and many others. Some people believe they should not have control over their tissues, while others do, and I am one of them. I believe people should have ownership over their tissue samples because our tissues are valuable and make us who we are, not just objects being tested for science, we should have consent on where and who they go to, our privacy should be protected, and no one should be making money off our samples. Ã Ã Ã Ã Ã Ã Ã The first part of the Afterword piece describes how our tissues are on file somewhere and we may or may not know it. They are also kept indefinitely, whether we are alive or dead. Our samples can be taken from examinations, operations, tests, procedures, clinical trials and bodily donations. On page 321, it states, I think people are morally obligated to allow their bits and pieces to be used to advance knowledge to help others. Since everybody benefits, everybody can accept the small risks of having their tissue scraps used in research (Skloot, 2011, p. 321). I do not agree with this point at all because we are not obligated to do anything we do not want to do. It is our body and we can choose to do what we want with it. After we are passed way it is a different story. Our lives are in the hands of our loved ones and significant others at that point. Ã Ã Ã Ã Ã Ã Ã Consequently, another reason we should have control over our tissues, is we should have consent over who they are going to and where they end up. There is a quote from page 317 that states, For most people, knowing if and how their tissues are being used in research is far bigger than profiting from them (Skloot, 2011, p 317). In addition, there is something known as the Common Rule which requires consent for human research. However, it is not federally funded, or the identity of the person is not identified, so it cannot be considered research on a human specimen. I do not agree with this though since regardless if the identity of the person is known or not, research is still being done on a human body, or part of one. It is even said that one hundred percent anonymity is not guaranteed because in todays world, genes can be put together and matched to the person being tested. Scientists and researchers do not take that fact into consideration. Ã Ã Ã Ã Ã Ã Ã Moreover, our privacy is another major factor in ownership of our tissues. A quote from page 318 says, Tissue-rights activists believe it is important for donors to be able to control who has access to their tissues, because they worry that information gathered from tissue samples might be used against them (Skloot, 2011, p 318). This is a key statement since in fact we should be able to have full control over who has a part of us. Also, as of 1996, there is now a federal law in place preventing privacy violation, like what happened to the Lacks family, known as the Health Insurance Portability and Accountability Act (HIPAA). This act is used everywhere in the medical profession, including pharmaceutical companies, doctor offices and hospitals. HIPAA is not only a law, but it is also a safeguard and security blanket to protect patients from having their medical information released without proper consent from the patient and or parent or guardian. Ã Ã Ã Ã Ã Ã Ã A final point about people having control over their tissues is a money factor. In past years, there have been patents created by the United Stated government to fund human gene testing for diseases and cancer such as Alzheimers, colon, breast and asthma. Human tissues and tissue research will always be commercialized and unfortunately, we cannot ignore the issue on who gets the money and what it is used for. There have been cases taken to court relating to financial agreements with people demanding money, but int turn tissue donors did not profit one penny. It is also illegal to sell human organs and tissues for transplants and medical treatments, but it is legal to give them away. This is a fact I did not understand while reading this part. Rebecca Skloot mentions in her book that we live in a market-driven society which involves science whether we like it or not. Although, ethical issues involving money, human tissues and rights remains an issue and ne eds a resolution. Ã Ã Ã Ã Ã Ã Ã Throughout the last section of the story, there are various points explaining tissue research and how they relate back to Henrietta Lacks HeLa cells being used for research without her or the families consent. The arguments of consent, money, and people who have had their tissues tested remain an issue. Our tissues are priceless and define us, not just entities being tested for science, we should have approval on where and who they go to, our privacy should be protected, and no one should be profiting off our samples. If researchers asked us to use our tissues, it would be different then just doing it without any kind of indication. Overall, our tissues belong to us and only we should have the control over them, regardless of what others think. Works Cited Skloot, R. (2010). The Immortal Life of Henrietta Lacks. New York: Broadway Books.
Saturday, May 16, 2020
The Oreo Cookie 100 Years Old Tradition Essay - 1091 Words
The Oreo Cookie ââ¬â 100 Years Old Tradition Introduction If you were a product, would you want to have your own website and 26 million fans on Face book following your every move? That is exactly what has happened to the Oreo cookie. The Oreo cookie was created in 1912 by the creators at Nabisco. The cookie has seen many ownership changes in its life but has still kept the essence of its look and taste. According to Rosenberg (2014), there have been over 360 billion Oreo cookies sold worldwide making it the best cookie sold in the 20th century. It has been a mystery for over 100 years as to how Oreo actually got its name. There are several speculations and myth but no one really knows the real truth making the cookie even more intriguing toâ⬠¦show more contentâ⬠¦The embossed chocolate wafer has the brand name in the center of the cookie so no one would mistake it for another cookie. The cookie is known as an Oreo Sandwich resembling a two piece of bread with meat in the middle. The correlation is to identify the two wafers with cr à ¨me in the middle instead of an ordinary cookie. The crà ¨me is made from five main ingredients which include powered sugar, granulated sugar, vanilla extract, vegetable shortening, and water. The nutrition facts per serving consist of three cookies that have 160 calories, seven grams of total fat, 25 grams of carbohydrate, one gram of protein, 55 milligram of sodium, and 140 milligram of sodium. The serving size also contains six percent of iron. The original Oreo cookie has been transformed to different colors and flavors. For example, you can now get the Oreo cookie in orange for Halloween, red for Christmas, and winter white color for Canada. The cookie is also in flavors of vanilla, chocolate, and mint. All of these fascinating facts about the original Oreo cookie explain how the brand designed a cookie that is unique in taste and quality. The competitive advantage is that the Oreo cookie has been around for over 100 years, sold in more than 100 countries, and has over 26 million fans on Facebook from over 200 countries. Not only is the cookie world renown, but having its own website tops the competitors. Oreoââ¬â¢s website has stories from their customers talkingShow MoreRelatedbus330 final Essay1057 Words à |à 5 Pagesï » ¿Marketing Manager of Oreos Bus 330 Dr. Shiquita P. Blue 01/20/2014 Marketing Manager In this written assignment, I will be accepting the role of a marketing manager that will select a product (good or service) thatââ¬â¢s sold in the United States and has sales opportunities in a foreign market. The product I have chosen is Oreoââ¬â¢s, are the worldââ¬â¢s favorite cookie. Throughout this assignment, I will apply my critical thinking skills and the knowledge I have attained throughout this course to the productRead MoreOreo and Pt Danone Biscuit15809 Words à |à 64 PagesKid / Want Want) 21. PT Ichiya Indonesia (Kinh Do) 22. PT Furijaya Mitra Lestari (Fudo, Oriental) 23. PT Sinbad (Luxury / Munchyââ¬â¢s) 24. PT Koin Bumi / Mu Gung Hwa (Nong Shim) The operation of foreign producers of world major brands such as Oreo, Tim Tam, Ritz, etc. marked the start of foreign investment in biscuit industry in the country. Meanwhile, mergers between world class producers like Arnotts Biscuit Co. Ltd and local producer PT Helios Arnottââ¬â¢s Indonesia (Kalbe Group), and betweenRead MoreDominos Profile (History and Background)3831 Words à |à 16 PagesTom for a used Volkswagen Beetle. With Tom as the sole owner of the company, Dominicks Pizza became Dominos Pizza. In 1968, a fire destroyed the company headquarters and commissary. Although Dominos faced numerous other obstacles in the following years, including a 1975 trademark-infringement lawsuit by Amstar, maker of Domino sugar, the company expanded, and in 1978, the 200th Dominoââ¬â¢s franchise opened. At the prospect of potentially losing the right to use the Dominos Pizza brand name, Tom MonaghanRead MoreTrader Joes Internalization7066 Words à |à 29 Pagesbetween the two stores going on. The first store named Trader Joes opened its doors in 1967 in Pasadena, California. In response to the competition from 7-Eleven, the chain differentiated its stores offerings and doubled the floor space the same year. With the appointment of the new CEO, John Shields, in the late 80ââ¬â¢s the company started to expand to Arizona and the Pacific Northwest before opening its first stores on the East Coast in 1996. By multiplying its stores number at the end of the 90ââ¬â¢sRead MoreIce Lyli8461 Words à |à 34 PagesIce-Fili (à Ãâ¢Ã ¡-à ¸ÃËÃâºÃË) You cannot defeat a nation that enjoys ice cream at minus 40 Celsius. ââ¬â Winston Churchill To survive in Russiaââ¬â¢s ice cream industry during the 11 years since the collapse of the former Soviet Union was no small feat (see Exhibits 1 and 2). To be successful in these turbulent times was nothing short of amazing to industry observers. In 2002, Ice-Fili, a midsized Russian company with more than $25 million in sales, was Russiaââ¬â¢s top ice cream producer. Surprisingly, it hadRead MoreProcessed Cheese and Kraft Foods30876 Words à |à 124 Pagesevident through there many research and development facilities located throughout the world and their extensive product line. However, the company has some strategic issues that they must rectify to continue the success that they have had throughout the year. Due to the companyââ¬â¢s acquisition of Cadbury, they have increased their debt level which in turn has lowered their credit rating. Also, the company has failed to take full advantage to the changes in the consumerââ¬â¢s interest in healthier products. These
Wednesday, May 6, 2020
Roleof Women in the Things They Carried - 2644 Words
The Rose of the World Why do we blame Helenââ¬â¢s beauty for the Trojan War or Eveââ¬â¢s curious nature for Adamââ¬â¢s choice to eat the apple, thus beginning the mortal human civilization? Throughout history men have found it convenient to hold women responsible for their own weaknesses and intolerance. The apathy of anti-feminist and conservative movements showcases the reality of the Stockholm syndrome and medieval serfdom. Men have been the captors and the masters of the women for time in antiquity, but we still see empathy in women. Henry Kissinger could not have summarized it any better when he said, ââ¬Å"Nobody will ever win the Battle of the Sexes. There is too much fraternizing with the enemy.â⬠Tim Oââ¬â¢Brienââ¬â¢s The Things They Carried is neitherâ⬠¦show more contentâ⬠¦One word is too often profaned For me to profane it; One feeling too falsely disdained For thee to disdain it; I can give not what men call love; But wilt thou accept not. The love stories of Jimmy Cross, Mark Fossie, and Henry Dobbins end in either rejection or despair. These stories are more about cathartic redemption and courage rather than failure and pain. Jimmy Cross is transformed into a dutiful and responsible leader after detaching himself from Martha. The author assumes an introspective tone as he discloses Lieutenant Crossââ¬â¢ transformation in the following excerpt: There was the new hardness in his stomach. He loved her but he hated herâ⬠¦No more fantasies, he told himself. He would accept the blame for what had happened to Ted Lavender. He would be a man about it. He would look them in the eyes, keeping his chin level, and he would issue the new SOPs in a calm, impersonal tone of voice, a lieutenantââ¬â¢s voice, leaving no room for argument and discussionâ⬠(Oââ¬â¢Brien 24-25). Henry Dobbins unlike Fossie, is able to keep himself together after his girlfriend leaves him, and now those stockings around his neck symbolize his resolve to withstand the pain of desertion and turn it into the strength to fight and stay alive in the war. Dobbinââ¬â¢s commendable light-heartedness after reading his girlfriendââ¬â¢s break-up letter is evident when he
Tuesday, May 5, 2020
Introduction to Software Engineering
Question: Discuss about the Introduction to Software Engineering. Answer: Software Project Failure There are different factors for which a software project can fail like short time, poor communication, insufficient budget, inadequate testing process, process progress never reviewed, lack of quality assurance, testing the product in live environment, not maintaining standardization, etc. It was found that the software projects that are developed only 16% of them get success and the a major 53% of the software products face challenges like content deficiency, cost overrun, budget failure etc. and the remaining 31% of the projects are discarded. Thus many of the software products in the IT industry face failures and many successful products are built taking ideas from the failed products. In the year 1980 a software product named TAURUS (Transfer and Automated Registration of Uncertificated Stock) was launched for transferring the stock exchange service of London to an automated system (Maas et al. 2016). The software product was launched to reduce the paper works of the stock exchange and thus reduce the cost and time. TAURUS was designed to bring the holdings of the investors of the London Stock Exchange in a centralized database (David and David 2016). All the records of the share holders, investors, market makers, brokers and the peoples associated with London stock exchange was to be stored electronically in the centralized database system. This would reduce the time required for the financial and legal steps that are required for the payment in the share market. TAURAS had small competition in the market but it was launched to manage bigger stock exchange but there was no to the point scope and it resulted in crawling for new scope and more investment cost. The manufacturer, designer and the peoples involved with TAURUS proposed some ideas and designers tried to implement the proposed idea on the live project but it was a failure and it costs a damage of 500 million pounds. TAURUS was discarded in 1993 and new software CREST took its place which was far more efficient than TAURUS (Savolainen Ahonen and Richardson 2012). The main reason for the failure of the TAURUS software was the increase of the complexity of the system and the involvement of the middle man in the development of the software (Maas et al. 2016). An U.S. software was bought and it was tried to be modified but a survey was made and it was found that to meet the requirement of the London Stock Exchange about 70% of the codes was required to be changed. Reason of Software Project Failure The two major reasons for the failure of the TAURUS are as follows. Creation of a centralized database: The first reason was the creation of a centralized database which requires a complete change in the business process of the share holders. TAURUS attempted to make a centralized hub to record the transaction and record the data flow. It was made to avoid the middleman who had a major role in the trading process of the share. The result of introducing the system was a violent opposition by the registrars or the middleman who could not gain profit from the business anymore. For developing the software a time period of 5 years was taken but it could not change the business process and finally the approach of the software was discarded in the year 1989 (O'Regan 2012). The stock exchange began to develop new design for the software which would be acceptable to all the stakeholders. Complexity of the project: Secondly the complexity of the project increased due to the revised design of the software and involvement of the stakeholders in the meetings. The new design was implemented by modifying a part of the existing system that was bought from U.S. Modifying the software was a great challenge for the software developer because the codes of the bought project was unknown to the designer and the developer have to follow the British laws and regulation to change the software and act according to the London stock exchange policy. It was noted that to meet the requirement of the London stock exchange policy about 70% of the codes was needed to be changed and this change in the codes caused a loss of time and the value of the purchasing of the software. The date that was fixed for the implementation of the software got delayed for a number of times and the external factors affecting the project made the software product unusable and finally it was discarded in the yea r 1993. Thus the lack of the strategic decision and poor governance was the main cause for the failure of TAURUS. Waterfall Model Description of Each Phases of Waterfall Model The waterfall model is the first developed software improvement lifecycle that is implemented to develop software. The waterfall model consists of 6 phases like requirement specification and analysis, feasibility study, coding, design, and unit testing, Integration, system testing and maintenance. Requirement specification and Analysis: Requirement gathering and analysis: The purpose of this step is to accumulate all the related information concerning the product from the customer to be developed with a vision to undoubtedly understand the requirement of the customers and to face the inconsistencies and the incompleteness. Requirement specification: The customer requirement identified and gathered into a document known as SRS or Software Requirement Specification document. The vital components of the document are: Functional requirements: It involves the identification of the function to be supportive to the system. Non-Functional Requirement: It includes the maintenance of the performance and the standards. The document of SRS is written by the end-user language and must be understandable by the customer and if necessary it will be reviewed then approved by the customer. It works like an agreement or pact between the developer team and the customers. Feasibility Study In this step we need to determine whether it is financially technically and timely feasible or not. In this process the problems regarding the project is analysed and the data regarding the software product is collected. While collecting the data we need to follow the following steps: An abstract problem definition which includes important requirement only and ignores the unimportance Formulation of different solution strategies Analysing of alternate solutions and compare their benefits and disadvantages Coding and Unit Testing In this phase we interpret the software design into a source code. Each constituent of the design is executed as a module of program that is individually tested which is known as unit testing. Each unit is tested to check it is correctly working or not which an efficient way to debug the errors. Design In design phase the designer alters the requirement prcised in the document of SRS into a structure that is appropriate to be implemented using programming language. There are basically two types of approach for designing. Traditional Design Approach- There are two types of activities in this approach Structured analysis: Here the details regarding the structure of the problem are examined. Structured designed activity: Here the outcomes of structured analysis are changed into a software based design. In the design approach we need to use DFDs, ERDs. Object oriented design approach- This is a new system where the objects that arise in the solution domain and the crisis domain are recognized. The relationship exists among them are identified. The advantages of this approach are less development time and effort, better maintenance etc. Integration and system testing After the unit testing is over the modules are integrated in a systematic manner and the testing for the system is carried out. The purpose of this testing is ensuring a developed system is that is properly working or not and confirming the requirement of SRS document. Types of system testing Alpha Testing- In this case the system testing is executed by the developer team. Beta Testing- This type of system testing is executed by a friendly customer set. Acceptance Testing- The customer executes this testing by himself after the delivery of the product for determining whether the product would be accepted or rejected. Maintenance Sometimes maintenance needs much more effort than developing the software. There are mainly three types of maintenance. Rectifying errors that are not revealed during the phase of product development is known as the corrective maintenance. For improving the execution of the system and to enhance the utility according to the customer requirement is known as perfective maintenance. Adaptive maintenance is known as for the porting the software to a new environment (a new platform or computer or a new operating system). Advantages of Waterfall Model and Examples The advantages of the classical model of waterfall are as follows: It is very simple to develop. It is easily manageable because the model is inflexible. It has a well defined inputs and outputs for every phase such as deliverables and milestones. It can be easily understood even by the non-technical persons (David and David 2016). It works well for smaller projects because the requirement is well understood by using this method. The classical waterfall model is appropriate for the small software projects where the requirement is clearly understood and less customer interaction is required for the development of the project. The project can be shown to the customer when the building of the software is completed. If there is any failure of the project the loss is very high as the whole project is required to be changed and thus it is applied for small scale software projects. Explanation of Main problems associated with Waterfall Model The main problem associated with the waterfall method is as follows: It cannot handle the risk that a real life project is subjected to. Since it is an idealistic model it assumes that the entire requirement should be clearly understood. There is no involvement of the user during the development phase. The user can only get to work once the system is fully developed since it is sequential in nature. The waterfall model is inappropriate for a large scale software project because if a requirement is changes by the user the designer and the software engineering have to begin the development from the early stage (Dingsyr et al. 2012). In practical scenario errors are identified much later during the development of the software product and if an error is identified in the later phase of development there is no way to get back to its immediate early phase to resolve the error. Thus it is difficult to handle large scale software project with the classical waterfall model. Consideration of Scenario In the practical environment the engineers face a large number of errors in almost every phase of the lifecycle. These faults usually get noticed much later in the lifecycle. Once a defect is noticed the engineers want to go back to the segment where the faults had taken place for reconstruction. Iterative waterfall model allows the engineers for going back to their particular phase using the feedback paths (Gandomani et al. 2013). The diagram of iterative model is very much similar to the classical waterfall model. In the classical waterfall model if an error is identified in the later stage there is no path to go back from that stage but this problem is conquered in the iterative model of waterfall by adding a feedback path to each of the stage (O'Regan 2012). If an error is identified in the requirement analysis and specification phase while the software engineers are working in the design phase; in classical waterfall model there was no way to modify the errors but in the iterati ve waterfall model the software engineers can go back to the requirement analysis and specification phase through the feedback path and solve the error (Balaji and Murugaiyan 2012). In the classical waterfall model if an error is identified in the design phase and the software engineers are working in the integration and system testing, they have to discard their workings and first solve the problem in the design phase and freshly start working on the later phases. Agile methods Summarising the Advantages of Incremental Delivery The incremental model is also known as Evolutionary Model (Bassil 2012). The software requirement is broken down into numerous modules in this model which can be incrementally developed step by step (Patel and Jain 2013). The different types of waterfall model are combined to form the incremental model. Firstly, the core modules are developed and the preliminary merchandise is refined into growing levels by addition of new functionalities. Each of the modules that are developed act as an independent module. Each evolutionary version is developed using the iterative waterfall model (Balaji and Murugaiyan 2012). The module acts as a standalone feature and can be delivered to the client and there is no interdependency between the modules. In case if an error is identified the error module is discarded and the whole project is saved. Figure 3: Incremental model for software development (Source: Created by author) There are several advantages of this model. The accuracy of the actual software product can be increased because there is a chance to experiment with the partially developed software (Bassil 2012). The core modules are tested again and again so that there is less chance of errors in the final product. Explanation on the way of first development that helps in understanding better The test first programming helps the developer to get a better idea about the software product the user wants from the developer. The developer first checks the acceptance of the software to the users and which group of customers would use the software product. It helps in understanding the application program interface and the graphical user interface from the customer perspective like what should be the input elements and their need as an input (Gandomani et al. 2013). Next the integration testing of the software is done to check the individual module of the software code written by the developer. The test first development also helps to identify a feature of a product which is working or not and the riskiest part of the feature or any other feature that may be skipped by the developer. It also helps to build a quality product with minimizing the errors in the final software product developed by the software development team (Bassil, 2012). The test first development is used for complex projects and the developer can get an idea to write the next part of the code by testing the previous module (Bass 2015). It would be easy to understand from the diagram given below that shows the testing process of the software product before launching it or handing over to the client. Figure 4: The test process (Source: Agiledata.org. 2016) Suggesting Three Reasons The productivity rate of two programmers working together is more than the programmers individually working (Patel and Jain 2013). This is because the programmers working together have greater responsibility towards the system as they have common responsibility. This process is also known as the pairing program. This is used to get a better output from the software developers working on the same software product (Gandomani et al. 2013). The line of codes written by the programmer is looked up two times and thus the errors can be identified more quickly and resolved. They switch their roles simultaneously such that errors or mistake made by one individual can be identified by the other one. The two software engineers work as a team and there is a continuous transfer of knowledge between them this helps them to overcome any problem that may arise during the software development process (Savolainen Ahonen and Richardson 2012). The two programmers can discuss among themselves about a part of the project that is not understood by them and thus a false start can be avoided from this (Patel and Jain 2013). The programmers working together have a mental satisfaction after developing a quality product this increases the confidence of the programmer. The programmers can rearrange the internal components of the software product to improve the development process of the software (Bassil, 2012). There may be three types of pairing like both the developers are experts, one of the developer is expert and another is novice or both the developers are novice. Project Scheduling Activity Network Chart without Milestone The network activity diagram is shown below. Figure 4: Network activity diagram (Source: Created by author) Gantt Chart Figure 5: Gantt chart showing earliest start and finish time (Source: Created by author using Excel) Staff Allocation Chart Here three developers are assumed to work on a project named Bob, Sue and Ann. They are assigned with one task each and the tasks are divided among them to complete the project in a shortest period of time. The graph below shows the staff allocation chart and the red bars are the critical path of the project. Figure 6: Staff allocation chart (Source: Created by author) References Agiledata.org. (2016).Introduction to Test Driven Development (TDD). [online] Available at: https://agiledata.org/essays/tdd.html [Accessed 23 Jul. 2016]. Savolainen, P., Ahonen, J.J. and Richardson, I., 2012. Software development project success and failure from the supplier's perspective: A systematic literature review.International Journal of Project Management,30(4), pp.458-469. Maas, M., Asanovi, K., Harris, T. and Kubiatowicz, J., 2016, March. Taurus: A Holistic Language Runtime System for Coordinating Distributed Managed-Language Applications. InProceedings of the Twenty-First International Conference on Architectural Support for Programming Languages and Operating Systems(pp. 457-471). ACM. O'Regan, G., 2012.A practical approach to software quality. Springer Science Business Media. Balaji, S. and Murugaiyan, M.S., 2012. Waterfall vs. V-Model vs. Agile: A comparative study on SDLC.International Journal of Information Technology and Business Management,2(1), pp.26-30. Bassil, Y., 2012. A simulation model for the waterfall software development life cycle.arXiv preprint arXiv:1205.6904. Patel, U.A. and Jain, N.K., 2013, April. New Idea In Waterfall Model For Real Time Software Development. InInternational Journal of Engineering Research and Technology(Vol. 2, No. 4 (April-2013)). ESRSA Publications. Gandomani, T.J., Zulzalil, H., Ghani, A.A.A., Sultan, A.B.M. and Nafchi, M.Z., 2013. Obstacles in moving to agile software development methods; at a glance.Journal of Computer Science,9(5), p.620. Bass, J.M., 2015. How product owner teams scale agile methods to large distributed enterprises.Empirical Software Engineering,20(6), pp.1525-1557. Dingsyr, T., Nerur, S., Balijepally, V. and Moe, N.B., 2012. A decade of agile methodologies: Towards explaining agile software development.Journal of Systems and Software,85(6), pp.1213-1221. David, F. and David, F.R., 2016. Strategic Management: A Competitive Advantage Approach, Concepts and Cases.
Subscribe to:
Posts (Atom)