https://getcryptotab.com/1034194

Monday, December 28, 2015

Hard luck


My mind drops in turn full of care
As if it paces to exile in murky layer.
To be a soul in dazzling blaze
In motion to burn capacious haze.
To pass scorching aside the sun’s ray
For pushing hot air to the hectic way.
There is awfully a lack in human brains
To switch some what in unknown trends
No one knows what is in the perils of speed
To inform the world that precision instead.
A series of events crop up everywhere
To create panic and spoilage with flare
In toning all classes even lower animals
All shuddered with such collapsing reels
For thorough search in secret upcoming
In congestion of thoughts for logic in series
For Bomb blasts embedded in maiden beams
None excludes in bonds and leads
This is the plan which we see and hear
To punish the culprits whipping everywhere.


Modern database panaroma

There is no denying the fact that Computing technology has made a permanent change in the ways businesses work around the world. Information that was at one time stored in warehouses full of filing cabinets can now be accessed instantaneously at the click of a mouse button. Orders placed by customers in foreign countries can now be instantly processed on the floor of a manufacturing facility. Even though 20 years ago much of this information had been transported onto corporate mainframe databases, offices still operated in a batch-processing environment. If a query needed to be performed, someone notified the management information systems (MIS) department; the requested data was delivered as soon as possible. In addition to the development of the relational database model, two technologies led to the rapid growth of what are now called client/server database systems. The first important technology was the personal computer. Inexpensive, easy-to-use applications such as Lotus 1-2-3 and Word Perfect enabled employees (and home computer users) to create documents and manage data quickly and accurately. Users became accustomed to continually upgrading systems because the rate of change was so rapid, even as the price of the more advanced systems continued to fall.
The vital decision for a database designer, after the hardware platform and the RDBMS have been preferred, is the structure of the tables. Decisions made at this stage of the design can affect performance and programming later during the development process. The process of separating data into distinct, unique sets is called normalization. The next important technology was the local area network (LAN) and its integration into offices across the world. Although users were accustomed to terminal connections to a corporate mainframe, now word processing files could be stored locally within an office and accessed from any computer attached to the network. After the Apple Macintosh introduced a friendly graphical user interface, computers were not only inexpensive and powerful but also easy to use. In addition, they could be accessed from remote sites, and large amounts of data could be off-loaded to departmental data servers.
According to Dr. Codd, the term SQL can be confusing. The S, for Structured, and the L, for Language, is undemanding enough, but the Q is a little misleading. Q, of course, stands for "Query," which--if taken literally--would restrict you to asking the database questions. But SQL does much more than ask questions. With SQL you can also create tables, add data, delete data, splice data together, trigger actions based on changes to the database, and store your queries within your program or database. Unfortunately, there is no good substitute for Query. Obviously, Structured Add Modify Delete Join Store Trigger and Query Language (SAMDJSTQL) is a bit cumbersome. In the interest of harmony, we will stay with SQL. However, you now know that its function is bigger than its name. The most commonly used statement in SQL is the SELECT statement (see Day 2, "Introduction to the Query: The SELECT Statement"), which retrieves data from the database and returns the data to the user. The EMPLOYEE table example illustrates a typical example of a SELECT statement situation. In addition to the SELECT statement, SQL provides statements for creating new databases, tables, fields, and indexes, as well as statements for inserting and deleting records. ANSI SQL also recommends a core group of data manipulation functions. As you will find out, many database systems also have tools for ensuring data integrity and enforcing security (see Day 11, "Controlling Transactions") that enable programmers to stop the execution of a group of commands if a certain condition occurs.
The context phenomenon pioneers some of the more popular implementations of SQL, each of which has its own strengths and weaknesses. Where some implementations of SQL have been developed for PC use and easy user interactivity, others have been developed to accommodate very large databases (VLDB). This implemented context introduces selected key features of some implementations. In addition to serving as an SQL reference, this article also contains many practical software development examples. SQL is useful only when it solves your real-world problems, which occur inside your code. We use Microsoft Access, a PC-based DBMS, to illustrate some of the examples in this text. Access is very easy to use. We can use GUI tools or manually enter your SQL statements.
In view of the above discussion, it is obvious that in creating an object oriented programming software, the importance SQL is inevitable. In integrating parent-child relationship, SQL is very important. From SQL, Insert, Update and Delete Command are helpful. In a nut shell, we exercise Oracle7, which represent the larger corporate database world, to demonstrate command-line SQL and database management techniques. These techniques are imperative for the reason that the days of the standalone machine are drawing to an end, as are the days when expressive one database or one in commission system was enough. In command-line, simple stand+[cedilla]one SQL statements are entered into Oracle's SQL*Plus tool. This tool then returns data to the screen for the user to see, or it performs the apposite action on the database. Most examples are directed toward the beginning programmer or first-time user of SQL. We begin with the simplest of SQL statements and advance to the topics of transaction running and stored procedure programming. The Oracle RDBMS is circulated with a full complement of development tools. It comprises a C++ and Visual Basic language library (Oracle Objects for OLE) that can link an application to a Personal Oracle database. It also comes with graphical tools for database, user, and object administration, as well as the SQL*Loader utility, which is used to introduce internally and send abroad data to and from Oracle.



Her goal for expedition

Her goal for expedition

She was setting goals for future ahead
Her dreams never permits her to follow the path
Her eternity was hanging by poverty elapsed;
To fight shy of terrible walks in the journey.
She has orchestration to fly on the jump of perils
Prying into the beams of the glittering waves
In the fixing of the life's rays she has fallen
Into the depth sea of the arctic polar bears;
In the paws of the killer animals.
Being endangered from the fallen of a burnt child
Who is  priceless as if feeling of deadly hopes;
Never comes back for bright future intoning.

An ideal Intranet atmosphere


            In recent times I have gone through an article on intranet where it has been reflected in the sense that an artistic method feasible to intranet can be put side by side to a composition process where we can endeavor to construct the roof of the house before we place the underpinning, and we may facade somber problems. Let us dispense the concrete for the foundation of the house before we put in the necessary plumbing for water and sewer access, and have to spend more money than we bulldoze for. We can build a house one footstep at a time and as such we can make certain the house which has a strong foundation. Buildings with strong nitty-gritty tending to a certain period. When we have more or less done with the frame of the house, we build a roof. Although the roof of the house is the top of the structure, we do not stop there. It takes more than a covered frame to make a house. We hire an electrician to do the wiring and bring back the plumber to finish the plumbing. Afterward, we hang plaster board, add insulation, finish the exterior, add fixtures, and before we know it, we have a house that we can call home. We build an intranet in the same way, one step at a time. We can initiate on the intranet is about as glamorous as the water and sewer pipes waiting for the foundation to be poured around them; for just when we are ready to roll back our sleeves and dive into the intranet creation process with both feet, we might discover we need to conduct research, planning, or consider the requirements of the intranet. When we finally flesh out the foundation of the intranet, we start to build the framework. The basic components of any intranet are the hardware and software that make it work. The hardware used in the intranet is focused to determine the way the intranet is operated.
            The software our intranet uses will determine what the intranet is used for. Eventually, we finish designing the intranet, but find we still have to develop the hot Java-powered applications for the intranet. Even when we have completed the design and development processes, the intranet still is not over and done with in order to check the structure of the work for flaws. We make sure we have used the right structure and created the best tools. Once all this is done, we finally have an intranet worthy of the CEO's wholehearted embrace. Try to build the whole house at once and we will be overwhelmed. The same is true for any creative process. When we are building our intranet and its applications, we need to manage many things on a level of general organization and on a more specific level. If we mismanage expectations, our intranet might not turn out as we plan. Our potential anticipation and the opportunity of our superiors might be totally different. Before we start to design the intranet and the Java-powered applications for the intranet, make sure our prospect and the expectations of our administrator network. A good way to do this is to ensure that the infrastructure channels are open and used.
            To make certain that our scheme is a devastating success; we should argue outlook throughout the progress of the intranet, principally as we develop our intranet applications. If we develop a rapid prototype of key applications, our superiors should be the ones to verify that the designs meet their expectations. If the model does not meet their outlook, maybe the prototypes were an example of what not to do, or maybe the expectations of management are unrealistic. If our prototypes meet or exceed the expectations of our superiors, we have a green light and our project is well on its way to a successful implementation. We should also manage our personal expectations for the intranet and its applications. Our expectations play a major role in the success of the intranet. Realistic expectations ensure the success of our intranet. If we perceive the intranet as an impossibly large undertaking, we might cripple by virtue of wide range of knowledge in this regard. If we perceive the intranet as a trivial undertaking, we will not produce the best possible structure and tools for our organization. It is best to find a balance in our perceptions about the intranet. As we begin to design the intranet, keep in mind that the intranet creation process is a team effort. Few individuals will be able to handle all aspects of creating the intranet and its applications. For this reason, we should have an accurate perception of our abilities and know when it is in the best interest of the project to delegate tasks.
            Generating an intranet is exhilarating and demanding and as such we have to break a new ground, making efforts for new things, and carry out research work with a new-fangled request. Managing the intranet is the creation of an amazing process in whatever way some one will motivate us. If one way of thinking about the intranet is not motivating we, change tactics. Do whatever it takes to get the job done. We do not limit a few strategies or stick with one strategy when it obviously is not working. Make a list of strategies. If one strategy is not working, switch to a new one. If we do not have a new one, create a new one. The strategy we use can be very basic. A great strategy to start with is to plan to work on the project every day until it is completed. In addition to this strategy, we should add planning to involve both management and users in the development process. The degree of participation for management and users might need to be adjusted throughout the development process. Our role in the project should be a part of our strategy. Initially, we might want to work closely with the development team. Later, we might discover that our best role is to manage the development at a higher level. Or if we are the top programmer or network administrator, we might find that we need to work on application design rather than the actual programming. Adapting our role as necessary can help the project flourishing.
            When we start working on the intranet design and creation process, one of the first things we should do is develop goals. Our goals should take into consideration the complexities and nuances of the intranet we plan to develop for our organization. Goals should be clear and relevant to the problem at hand. Set major goals relevant to the purpose, scope, and audience of the intranet. Also, set minor goals or milestones for the stages of the intranet development and its applications. Goals and milestones help define the intranet development process as a series of steps or achievements. One major goal could be to complete the planning of the intranet; another major goal could be to complete the design of the intranet. The series of steps necessary to complete the major goals are the minor goals or milestones. Our first milestone will be to start work on the intranet. Another milestone might be to select and purchase the necessary intranet software, such as Web server software, browser software, and a Java Development environment. Our goals are to complete the major steps of the development process, such as planning and design. In designing a constructive intranet system, the intranet designer may create or provide rules that pertain specifically to the intranet's law or scope of control, such as the Information Systems department that will have overall responsibility for the intranet after completion. As we start to create the intranet, these rules might seem perfectly acceptable. However, as we conduct planning for the intranet and its applications, we might find that the overall responsibility of the intranet should be divided amongst the departments that will set up intranet servers. If these early rules cannot be modified to fit the current situation, we will have problems. We might encounter delays due to loss of efficiency or the final product might not be what was expected.
            No rule should ever be considered absolutely and even the best of rules should be interpreted as guidelines that can vary depending on the situation. Rules for a complex project like our intranet should be flexible and make sense. A rule that conflicts with something we are trying to do should be reexamined. The rule might be inappropriate for the situation we are trying to apply it and as such our intranet will never be put into action if we avoid working on it. Putting off work until something is due is a poor practice. Relinquish when things do not go our way or when we seem to have a block is another poor practice. Even if we flourish on cut-off date, sketch to work toward intranet's goals and milestones regularly-every day if necessary and possible. We should also plan to work on the intranet and its applications during those times when our thoughts are not flowing. Everyone has bad days and good days. Some days we take more breaks. Some days we work straight through the day and into the night. We might tend toward other destructive behavior besides avoiding or putting off work. Sometimes programmers go to the opposite extreme. They tear things apart impulsively before letting the work cool off so they can look at it objectively. Never hack our code just because a few users didn't like our application's interface. Managing the aspects of the intranet's design and creation is only the beginning. The next step is to determine the best organization for our intranet. Over the years, three models have developed for information systems like our intranet: centralized, decentralized, and a combination of centralized and decentralized. The three computing models are really driven by the types of computers in use at an organization.
            Following the centralized model, all computer resources are centered in one location and under the management of one organization. When we think of centralized computing, think of mainframes and computer centers. With the introduction of file server and client server computing, most organizations moved away from the centralized model toward a decentralized model. In decentralized computing, computer resources are spread throughout the organization and under the management of the departments in which the computers are located. When we think of decentralized computing, think of the high-power workstations and servers. After the big move to decentralize computer resources and dismantle massive computer centers, many managers had a rude awakening to the anarchy decentralized computing can cause. Let us imagine an organization where each department sets the rules and decides the standards, like what hardware and software to purchase and how that hardware and software should be set up. Then imagine the nightmare of trying to support the gauntlet of software and hardware installed throughout an organization the size of AT&T. Because of a lack of control with decentralized computing, many organizations are moving to the happy middle ground of a mixed computing model. In this mixed model, a centralized Information Systems management sets broad policy, such as the direction and purpose of key computing initiatives, and the individual departments are free to work within those guidelines.
            As we thrash out the accomplishment of the intranet with management, we should consider keeping the three working out models in mind. While our organization might currently use a specific model, we can apply any of the models to the design of our intranet and should egg on administration to prefer the mock-up that wills finest hand round our institute. In an ideal world, the concluding pronouncement will be based on the necessary responsibility and control of the intranet resources. Subsequent a centralized model, a specific department within the organization will be responsible for the intranet. This identical division will be accountable for the setup, design, and administration of our intranet servers. The department will also be responsible for creating the necessary publications and applications based on user requests. With a centralized model, there will usually be a formal approval process for new publications, applications and services. This means that if the Human Resources department wanted an application to track employee files, a formal request would be required. Once the request is approved, the intranet developers would work with Human Resources to create the application. The problem with centralized control and formal approval processes is that they put creativity and timeliness in thumbscrews. Following a decentralized model, each department within the organization is responsible for its section of the intranet. All departments that want to create intranet services will have to set up, design and administer their own intranet servers. Each department will also be responsible for creating the publications and applications used by the department.
            When we can draw on a decentralized model, we hack out the prescribed endorsement procedure for new publications, applications, and services. This means anyone can create intranet resources. Greater freedom and few controls means that new services can be set up quickly by anyone who wants to set them up. This freedom and lack of controls can also lead to abuse of the intranet resources. When someone publishes potentially offensive material or when the usefulness of the intranet deteriorates because so much junk has been created? By adopting elements of both the centralized and decentralized model that fit the needs of the organization, we might be able to balance the need for strict control with our artistic self-determination. For paradigm, we could create an intranet with a centralized Web server that links together departmental servers. The IS staff would be responsible for maintaining the central server and updating links to resources throughout the organization. The individual departments would be responsible for maintaining their own servers. To ensure the intranet is not abused, one person within each department could be responsible for that department's intranet resources.
      The real stars on our intranet are the applications we plan to develop. Still, we will need content for our intranet. Most of our content will be in the form of hypertext documents that are served by our Web server and displayed by our chosen Web browser. As we consider the type of content we want to publish on our intranet, think about how we will organize that content. We can organize hypertext documents in many ways. The structure that is best for a particular document depends on the complexity of the material we plan to present. For a small document with limited complexity, a simple structure is often best. Simple structures include linear and linear with alternative paths. The simplest way to structure a hypertext document is in a linear fashion. Using a pure linear structure, we can create a hypertext publication with a structure resembling a traditional print publication. Readers move forward and backward in sequence through the pages of the publication. An alternative path structure gives readers more options or paths through a document. By providing alternative paths, we make the structure of the publication more flexible. Instead of being able to move only forward and backward through the publication, readers can follow a branch from the main path. In a linear structure the branches will rejoin the main path at some point. The hierarchical structure is the most logical structure for a publication of moderate complexity. In this structure, we organize the publication into a directory tree. Readers can navigate through the publication, moving from one level of the publication to the next, more detailed, level of the publication. They can also go up the tree from the detailed level to a higher level and possibly jump to the top level.
            The information bank tree intimately look a lot like the way we store files on our hard drive in a main directory with subdirectories leading to files. We could also think of the hierarchy as a representation of an actual tree. If we invert the tree, the trunk of the tree would be the top level of the publication. The trunk could be the overview of the publication. The large boughs leading from the trunk would be the next level of the document structure. The boughs could be chapter overview pages. Branches leading from the boughs would be the next level, or the pages within chapters. A combined linear and hierarchical structure is one of the most used forms for hypertext publications. This is because it is an extremely flexible, but still highly structured method. Readers can move forward and backward through individual pages. They can navigate through the various levels of the publication by moving up a level or descending to the next level. They can also follow parallel paths through the document. The most complex structuring method is the integrated web. This method lets the reader follow multiple paths from many options. This is a good method to use when we want the reader to be able to browse or wander many times through the publication we have created. Each time through the publication, readers will probably discover something new. After considering the various styles for hypertext documents, we should examine the various tools we will need to develop the intranet. A tool is anything that supports the task we are working on. The tools for unleashing the power of our intranet are based on the existing tools for the Internet itself, which includes protocols, resource tools, and information services. TCP/IP (Transmission Control Protocol Internet Protocol) is the foundation of the worldwide Internet. We must install TCP/IP on our network to enable intranet services. A protocol is a set of rules for programs communicating on the network. It specifies how the programs talk to each other and what meaning to give to the data they receive. Without TCP/IP setting the rules for our network communications, we cannot use Internet technologies. The good news is that if our organization already has access to the World Wide Web; we might already have the necessary TCP/IP structure in place. Additionally, TCP/IP is built in to some operating systems, including Windows 95, Windows NT, and most variants of UNIX. If we have an operating system where TCP/IP is not built in and do not have TCP/IP installed, we will need to purchase TCP/IP software. Fortunately, TCP/IP software is widely available from software vendors.
            An intranet without Web services is like a world without water. The key to the World Wide Web is the hypertext transfer protocol. HTTP offers a means of moving from document to document, or of indexing within documents. Accessing documents published on our intranet involves communications between browsers and servers. In a browser, such as the Netscape Navigator, the HTTP processes are virtually transparent to the user. All the user really has to do is activate links to move through our Web presentation. The browser takes care of interpreting the hypertext transfer commands and communicating requests. The mechanism on the receiving end, which is processing the requests, is a program called the Hypertext Transfer Protocol Daemon (HTTP). A daemon is a UNIX term for a program that runs in the background and handles requests. The HTTP daemon resides on our Web server. Before setting up or installing server software, we must determine what platform the Web server will run on. Until recently, our choices were limited, but this changed rapidly as the World Wide Web grew in popularity. Today, Web server software and server management tools are available for almost every platform. And, like other software developed for use on the Internet, this software is available as freeware, shareware, and commercial software. We will find that UNIX platforms have the most options for server software. Until recently, there was only one good choice for the Windows NT environment, but this has changed. There are now many excellent commercial and freeware choices for Windows NT. For other platforms, there is generally only one choice in server software. Having only one choice of server software for the Windows system which doesn't mean the quality of the server software is poor. Quite the contrary, the quality of the software is often quite good. Tools are an essential part of any operation. Resource tools provide the means for sending and retrieving information. There are three basic tools of intranet working:
            Electronic mail is a great way to communicate. Think of e-mail as a way to send letters to anyone within the company instantly. Many e-mail programs enable delivery of mail to single users or groups of users. Some e-mail programs even provide ways to automate responses. Most browser packages are packaged with e-mail software. File transfer protocol provides the basic means for delivering and retrieving files around the network. The files can be text, sound, or graphics. FTP provides a springboard for many information-based approaches to retrieving information. Many higher level tools that have friendlier interfaces use FTP or a protocol similar to FTP to transfer files. Just about every browser currently available supports FTP. Telnet lets our intensive log into another system and browse files and directories on that remote system. Telnet is valuable because it is easy to use and basic to the network. When we telnet to another computer, we can issue commands as if we were typing on the other computer's keyboard. On some platforms, like UNIX, telnet is a built-in resource. On other platforms, we will need a telnet tool. The basic resource tools are indispensable when used for the purpose that they were designed for. They even provide the fundamental basis for many high-level resource tools, but they simply weren't designed for the advanced manipulation of the wealth of information available on the Internet. This is why dozens of information resource tools have been designed to manipulate networked data.
            At this juncture, there will be a list of high-level resource tools we might want to use on our intranet: A system to automatically gather, index, and serve information on the Internet. Archie is a great tool for searching our intranet's file archives. Once we set up Archie services, users can access Archie resources with their browser. A distributed information service that enables us to move easily through complex webs of network resources. Gopher uses a simple protocol that enables a Gopher client to access information on any accessible Gopher server. Most browsers directly support Gopher. An automated mailing list distribution system. Users can subscribe to LISTSERV lists we set up on the intranet, which enables them to read e-mail posted to the list or to post e-mail to the list. Once we set up a LISTSERV server, users can join lists and participate in lists using standard Internet e-mail software. Most browser packages include e-mail software. A bulletin board system of discussion groups called newsgroups. Users can participate in newsgroups posting messages to the group and can read messages posted by other newsgroup members. Once we set up a newsgroup server, users can browse newsgroups and post information to newsgroups using a newsgroup reader. Most browser packages include a newsgroup reader. A distributed information service for searching databases located throughout the network. It offers indexed searching for fast retrieval and an excellent feedback mechanism that enables the results of initial searches to influence later searches. WAIS servers are best accessed via CGI scripts, which allow users to search databases using their browser. Using HTML development tools, we can quickly and easily create HTML documents for our intranet. HTML editors have features similar to our favorite word processor and enable us to easily create documents in HTML format. Typically, these editors enable us to select HTML elements from a pull-down menu. The menu has brief descriptions of elements we can add to the document. The editor places the element in the document in the proper format, which frees us from having to memorize the format. When creating complex forms, we 'all find HTML editors especially useful. HTML templates enable us to add the functionality of an HTML editor to our favorite word processor. The great thing about templates is that we can use all the word processor's features, which could include checking grammar and spelling.
                        In view of the above, it is evident; knowledge on the structure blocks for creating a perfect intranet is only the first step toward implementing our intranet. Our intranet will require content, which can be well thought-out in a diversity of approach and shaped with a variety of co-worker applications. We will also necessitate setting up basic networking protocols, like TCP/IP, and services like the WWW. Once we have selected the basic tools we have to create the intranet and measured how we will organize it, we can chart it all the way through achievement. More importantly, we 'all are using the familiar features of our word processor to add HTML formatting to our documents. Although the task of creating HTML code is fairly complex, some helper applications called converters try to automate the task. HTML converters convert our favorite document formats into HTML code and vice versa. At the touch of a button, we could transform a Word for Windows file into an HTML document. Converters are especially useful if we 're converting simple documents and are less useful when we 're exchanging documents with complex law its.






The Concept of Foreign Aid Account

The Concept of Foreign Aid Account

There is no denying the fact that subsequent to attainment a historic stature and declaring a carnival, the foreign exchange reserve position in Bangladesh is outwardly on its way to an immense slide. The existing account surplus spawn in last few years – cropping up mostly out of remittance inflows -- has drastically been diminished. The recompense due to the Asian Clearing Union (ACU) may deteriorate the circumstances supplementary. The recent import surge has been claiming a huge amount of foreign exchange than before. The shortage of dollar to make imports has been putting a pressure in the market leading to a depreciation of taka and appreciation of import costs. If continued unabated then, along with food inflation, the non-food inflation may go up causing sufferings for the people. By and large, the balance of payment pressure and the superficial consequences have apparently created a 'panic' in the business and banking circles. Ipso facto, it is significant to shed some light on some of the misplaced and misconceived accepted wisdom on the topic of balance of payments.

From our schooling in international economics, we come to know that a deficit in current account is not always a curse; nor the surplus always breeds blessings. The former may encroach benefits and the latter might claim some costs, at times. However, since the slide in the surplus in current account is raising storm over a cup of tea, we shall limit our comments on the issue of hugely growing demand for foreign exchange in the market. And, as readers might get fatigued with figures, we shall try to be qualitative in the total approach. A priori, we can hypothesize that the current deficit is a blessing, not a curse. We can also call it a 'growth-pain'. As an economy experiences a higher rate of growth, some of the side-effects are reflected in terms of inflation and foreign exchange shortage. The Bangladesh economy is expected to reach a growth rate of 6.7 per cent during the current fiscal year. Available indicators so far on agricultural, industrial and services sector show that the economy is poised to achieve the targeted growth rate This necessitates an investment rate of about 27 per cent of our gross domestic product (GDP).



To meet this investment target, import payments are likely to shoot up, especially in the face of import-intensive activities. For example: (a) imports of capital machinery and raw materials, needed for running the wheels of the economy, warrant huge imports; (b) if we allow rental power stations, for example, import bill on petroleum would increase, given its price; (c) to keep food inflation low, food grain imports also claim a part of the total import-pie. By and large, if the imports are used for productive purposes, the current pressure may yield short-term pains but bring long-term pleasure in terms of economic growth. Is there any indication to that? The quantum of industrial production index tends to show that it has significantly increased over time, pointing to increased imports being used to grease industrial production. In this context, one can possibly take into due cognizance the concern of the critics: a part of the supply of dollar could have been siphoned-off through over- and under-invoicing of imports and exports. This is an issue of rigorous research that falls outside the purview of the present write-up. The capital account in the balance of payments is called the mirror image of the current account. In other words, a deficit/surplus in the current account is duly matched by the surplus/deficit in the capital account. The moot question is: how much of the on-going current account deficit can be matched by the inflows in the capital account? In the capital account, there are many items but foreign aid and grants is obviously the most important ones. Available estimates show that aid inflow has decreased over the years. This year particularly, the construction of the Padma Bridge will bag in a substantial amount of foreign exchange. If that is so, much of the woes would be waned. However, the million dollar question that continues to hunt is the absorptive capacity of the economy in the utilization of foreign aid.




There are many reasons for which aid money can not be utilized on time and for which aid in the pipe line does not get disbursed. The following are the reasons as to why foreign money is not utilized on time:


(a) In funding a project, the requirements from donors' side become time consuming and tedious, taking much longer time than justified. Added to this is the conditionality imposed by the donors and Bangladesh's wrestling in reigning over their demands. The donors must shed their traditional mind-set to help Bangladesh achieve its development goals.


(b) The important constraint is the bureaucratic hurdle. Bangladesh's bureaucracy is infamously known as one of the most inefficient ones in talents, if not in making foreign trips. The bureaucrats sit on file related to development projects causing a dilly-dally. Thus, unless bureaucratic barricades can be bashed, the chances of more aid inflow would remain a remote possibility.


© Donors think that some of the projects are economically unsound and driven by political interests to negate any commitment of disbursement. And finally infrastructural problems and absence of good investment climate constrain inflow of foreign direct investment (FDI) which is another source of supply of foreign exchange. The on-going drive at meeting energy crisis and the reforms at governance should pay a dividend in the medium- to long-run.




By and large, given that already a huge amount of foreign exchange is in the pipe line and given that the constraints are reduced to make them available on time, the current crisis in the foreign exchange market is likely to witness a modicum of calm in the very near future. Meantime, the Bangladesh economy would have to pay price in terms of inflation and volatility in the foreign exchange market. But come what may, there is a little chance that the foreign exchange crisis would hit the bottom line when our foreign exchange reserve has to be ready to buy three-months' imports. Meantime, assuming no deep dip in remittances and assuming that imports capital goods and raw materials would enhance export earnings, the 'crisis' may turn into a comfort. The United States presidency is a complex role, encompassing both domestic and foreign policy responsibilities. As a major world power, the United States has a large role in the realm of foreign policy, and it is the duty of the president to assume the role of an international figurehead. Aside from being one of the most politically powerful nations, the United States enjoys its status as one of the wealthiest nations in the international system. However, immense political power and wealth have resulted in the need for the United States to devote a significant amount of its resources toward the assistance and development of those lesser-developed countries throughout the world.


The developing world constitutes a significant portion of our planet, with underdeveloped countries existing in almost every region of the world, including the Middle East, North Africa, Sub-Saharan Africa, Asia, Latin America, and the Caribbean. There is not one simple cause for underdevelopment in the Third World, and developing nations suffer from a host of developmental issues, such as poor governance, corruption, war and revolution, insufficient economic systems, and various public health crisis. As an international leader, the United States has traditionally accepted the responsibility to alleviate some of the suffering in the Third World and has allocated resources toward the development of poor nations. Within the United States government, agencies like the United States Agency for International Development (USAID), under the guidance of the U.S. State Department, have been established to develop and implement humanitarian and development projects to those countries most in need.


Furthermore, a major focus of the Bush administration was the notion of accountability. These two elements, security and accountability, played a critical role in the formation of developmental aid policy under the Bush administration. Ultimately, the key to assessing any policy decision is to examine to what extent the stated goals were achieved in practice. This chapter will examine the formation, details, methodology and goals of the central developmental assistance policy during the George W. Bush presidency – the Millennium Challenge Account. In addition, this chapter will examine how successful the Millennium Challenge Account was in achieving its goals of independence and wealth for the Third World, and security for the United States.


In February 2003, President Bush introduced legislation that proposed new methods for the delivery and implementation of developmental assistance for Third World nations. This proposed legislation would establish a new system for the selection, delivery and administration of developmental assistance. The stated goal of the legislation was to dramatically increase the level developmental assistance by $5 billion a year by fiscal year 2006, and to establish an account for developmental aid, the Millennium Challenge Account (MCA), which would be administered by a small government-run corporation known as the Millennium Challenge Corporation (MCC).2 Bush also outlined new criteria and standards for the administration of development assistance. According to the proposal, countries would be eligible for aid from the MCA if they met the new standards set forth by the MCC. For the distribution of developmental assistance, the Bush Administration believed that there was a direct link between financial accountability and developmental success; therefore, the standards set forth by Bush included a country’s ability to rule justly, to invest in its people, and to encourage economic freedom.3 Only those countries that satisfied those criteria would be eligible for increased aid and assistance from the MCA. Bush noted that the key to ending poverty throughout the world was tying increased assistance to performance and accountability, and that the MCA would promote the need for country ownership, financial oversight, and accountability.4 Rather than subscribing to older methods of distributing developmental aid, the Bush Administration had outlined clear guidelines that they believed would guarantee results in the Third World, ultimately ending, or at least drastically alleviating, the need for further U.S. assistance.


The legislation that followed, Millennium Challenge Act of 2003, largely reflected the goals that President Bush had laid out in his initial proposal. The Millennium Challenge Act and its stated goals and ideals appealed to both Democrats and Republicans in Congress, and the legislation passed by an overwhelming majority of 382 to 42 in the House of Representatives.5 As established in the legislative proposal, the Millennium Challenge Act of 2003 created the Millennium Challenge Corporation, which would be responsible for selecting and administering assistance and programs related to the MCA. Under the legislation, the Board of Directors would consist of the Secretary of State, the Secretary of the Treasury, the administrator for USAID, the chief executive officer of the MCC, and the U.S. Trade Representative.6 Four other members on the Board would be selected by the President from a pool of individuals nominated by the minority and majority leaders in both houses of Congress.7 The act also outlined many limitations for the uses of developmental assistance. According the to legislation, developmental assistance could not be allocated for military training, anything that may prove to hazardous to the environment, abortions and sterilization, or any project that may result in substantial U.S. job loss.8


Also contained within the Millennium Challenge Act of 2003 is the methodology for the distribution of MCA funds. Under the new plan, developmental aid would not be distributed to eligible countries in the form of a blank check to be utilized the way in which the recipient country sees fit. The Millennium Challenge Act of 2003 established the Millennium Challenge Compact, which were mutual agreements between the United States, specifically the MCC, and the recipient country outlining the stated goals and objectives for various development projects. Section 609 of the Millennium Challenge Act outlines the roles of these compacts:


The Board, acting through the Chief Executive Officer of the Corporation, may provide assistance for an eligible country only if the country enters into an agreement with the United States, to be known as a ``Millennium Challenge Compact'', that establishes a multi-year plan for achieving shared development objectives in furtherance of the purposes of this title. The compacts themselves carried a number of requirements. In total, the Millennium Challenge Act outlined eleven requirements that must be met as part of the compacts. For example, the compacts had to contain the specific objectives and responsibilities of both the recipient and the United States, benchmarks to monitor progress, a multi-year financial plan, a plan to ensure accountability, and a plan to demonstrate how the recipient country planned to continue developmental projects once the compact has expired.10 In addition to these requirements, recipient countries had to demonstrate that a national development strategy was in place. According to the legislation, a national development strategy meant,


…any strategy to achieve market-driven economic growth and eliminate extreme poverty that has been developed by the government of the country in consultation with a wide variety of civic participation, including nongovernmental organizations, private and voluntary organizations, academia, women's and student organizations, local trade and labor unions, and the business community.11


Undoubtedly, these Millennium Challenge Compacts were intended to ensure a holistic approach to development in each recipient country. Funding from the MCA was contingent upon each recipient country satisfying these strict requirements. These guidelines for funding fall in line with the Bush administrations desire for accountability. While the United States would maintain a position as a strong partner, the MCC left much of the responsibility to the countries themselves. By requiring recipients to establish plans for the continuation of development following the expiration of MCA compacts, the Bush administration was essentially forcing countries to take the reigns of their own projects and to truly work toward economic growth and independence.


The criteria for the selection of countries that would be eligible for developmental assistance from the MCA was the central and most innovative concept behind Bush’s newly adopted legislation. As established by the Millennium Challenge Act, the Board of Directors of the MCC would be assigned the task of establishing candidate countries and, out of those, selecting those that would be eligible for assistance. A country would be deemed eligible, if in relation to the other candidate countries, it could demonstrate that it possessed the criteria for eligibility, specifically its ability to rule justly, promote economic freedom and activity, and invest in its citizens.12 The primary methodology behind the selection of eligible countries was to compare the candidates to one another using a series of sixteen indicators.13 The indicators used by the Board of Directors corresponded to the three major criteria for selection – ruling justly, promoting economic activity, and investing in people. In the 2004 Criteria and Methodology report, the Board took into account indicators such as Civil Liberties, Political Rights, Voice and Accountability, Government Effectiveness, Rule of Law and Control of Corruption as they related to the notion of a country’s ability to rule justly.14 Related to a country’s encouragement of economic freedom, the Board used indicators such as the Country Credit Rating, 1-year Consumer Price Inflation, Fiscal Policy, Trade Policy, Regulatory Quality and Days to Start a Business.15 Lastly, with respect to investment in a country’s citizens, the indicators established were Public Expenditures on Health as a Percent of GDP, Immunization Rates, Public Primary Education Spending as a Percent of GDP and Primary Education Completion Rate.16 Clearly, these indicators represent many of the factors that are typically identified as the major causes for underdevelopment in the Third World. These indicators were intended to provide an objective basis upon which to compare all candidate countries. In order to be selected as eligible, a country had to be “above the median in relation to its peers on at least half of the indicators in each of the three policy categories and above the median on the corruption indicator.”17 However, even with these indicators in place, the Board of Directors still reserved the right to use discretion in interpreting and evaluating the information when making its final decisions.18


In subsequent years, the indicators for eligibility changed slightly as conditions in the Third World changed. For fiscal year 2005, the MCC substituted the indicator for Primary Education Completion rates for a more specific indicator, Girls’ Primary Education Completion Rates.19 The rationale behind the substitution was to not only demonstrate the need for eligible developing countries to closely invest in the education of its people, but to also stress the importance of women and girls and their capabilities as productive members of an economic system.20 As more and more reliable and consistent data became available to the MCC, further adjustments to the indicators were made in following fiscal years. In FY06, the Cost of Doing Business became a new indicator, replacing Country Credit Rating under the economic activity criterion. According to the MCC, the cost of doing business indicator proved to be stronger than the country credit rating indicator, as the cost of doing business is easily measurable and often results directly from government policy.21 For FY08, the MCC and the administration made several changes to the indicators and incorporated newer, more updated indicators as well. For instance, in order to strengthen the Economic Freedom category, the MCC combined Days to Start a Business and Cost to Start a Business into one indicator entitled Business Start-Up, utilizing data and statistical information from the International Finance Corporation of the World Bank.22 Additionally, the MCC included new factors, specifically related to natural resources and land, in its list of indicators. Falling under the criteria of Economic Freedom was a new indicator assessing Land Rights and Access. This new criterion was intended to assess a candidate government’s ability and willingness to “secure property rights and sound economic policy.”23 Lastly, Natural Resource Management was included under the criteria for Investing in People because, according to the MCC, the new indicator would assess the governments ability to invest in its resources, especially in ways which “will enable poor people, particularly poor women and children, to live health and productive lives.
Aid Modality and Fund Management of Health sector of Bangladesh

In the current mechanism, World Bank (WB) administers the pooled funds on behalf of all the pool donors. Ministry of finance (MoF) uses the current FOREX account with Bangladesh Bank. The aid modality for HNPSDP will follow the current mechanism with some modifications considering the experiences to date, and at the same time further discussion will continue to find out alternative options of fund management to increase government ownership in the program. The modified version will encompass joint analytical work, joint financing arrangement (JFA) between Development Partners and GOB, the establishment of a Pooled Funding Committee including GOB representatives, open eligible expenditure criteria, modified performance-based financing arrangement and procurement pre-review with threshold revisited and streamlining the process. A TA should be engaged from the beginning to manage the fund and develop the capacity of the FMAU.

The process for fund release, expenditure, accounting and reporting of the pooled fund and the subsequent replenishment of the pooled fund will remain same as HNPSP, i.e. FMAU will compile and verify the reconciled SoE sent by the Line Directors and send to the disbursement office for reimbursement.

In view of the above it is evident that when probing the plight of nations of the third world, a simplistic approach to solving some of the developmental challenges would be to allocate money and resources to the poorest and most depraved nations; however, development is not this simple, as the challenges are complex and the solutions are not always clear. Building upon the institutions and methodologies of the past, the Bush Administration ushered in a new era of international development and foreign aid policy. Prior to Bush, it was often assumed that money was flowing into developing countries, but was ultimately ending up in the hands of corrupt government leaders who were using it for less-than-honorable purposes. Especially following the September 11th attacks, the Bush Administration began to focus on international development as a national security issue. As noted by Bush in regards to his development programs, “We also work for prosperity and opportunity because they help defeat terror.”1 According to the administration, without a properly function government and thriving economy, Third World countries would theoretically become more susceptible to becoming havens for terrorists.





Her lost fortune

Her lost fortune
The girl was standing inside the line of the train
She was alongside walking with her parents;
The parents were absorbed in scatterbrained fracture
Like lackluster stock still allied in the sky
For being in the castles in the air and the watery
Leaves like the fallen baby, she did know the
Path to harvest his future at an early age.
She was flamed with burning of resentment in thoughts
For everlasting the growth in due sense and idea.
The train came nearer with whistling sound
In the face of the girl towards the corner
In the road laden with hedges, shrubs and creepers\
For being whispered that the death is closing
Suddenly a mad man ran towards her to save
The bewildered girl who was at a loss.
The parents dis not like her as if she is step
But rotten ideas and glassy beam of the sun
The girls was six only at her bay
In the moment of playing sports and games
Intoning her dreams to be great in future ahead.


Sunday, December 20, 2015

War against crime




There is no denying the fact that the problem of our modern dilemma lies with the wrestle against the illicit drug trafficking and the spread of drug addiction. Nowadays this difficulty is extremely heightened and as such it is openly connected with the success of the fight against crime, or failure if we poorly fight the phenomenon which is the burning question of the day and indeed a whole variety of social and economic issues. And of course it is most strongly knotted with the number one theme in the world – the struggle against terrorism. 

 Narco-business is one of the financial sources for terrorist groups and bandit gangs. It is well known that 80 percent of heroin is supplied to the world market from some sources involving in terrorism and social immoral activities. And gunmen of certain movements control drug transfer from there to Central Asia and on to Europe through Russia. Terrorism and drugs are absolutely kindred phenomena. They have common roots and similar destructive power. Terrorism, just as narco-business, has a ramified international network and without doubt bears a transnational character. Narco-business also has a pronounced economic aspect. For this reasons, drug addiction as a medical and social phenomenon doesn’t exist without a criminal narco-market network as well as drug sales.


In recent survey it has been detected many countries have today become a colossal user of the narco-potion. Today, according to official data alone, there are about 269,000 drug addicts and there exists more than the actual figure for drug users is much higher. Moreover, the narco-market structure is changing. The drug producers have a conspicuous growth of the share of highly concentrated drugs, and in the first place Afghan heroin, the proportion of which in total drug use constitutes 28 percent out. In the hyper critical state of Modern world, there grows local drug production in the country, including that of synthetic drugs, cheap and producing instant dependence. What’s particularly dangerous is that the number of such laboratories by some expert estimates has greatly increased in Russia in recent years. Unfortunately, the social base of drug addiction is expanding. Today this disease has percolated to all sections of society, encompassing the territory – world wide, especially the depressed areas. This is leading to an avalanche-like spread of AIDS. By experts’ estimates as revealed so far in the world statistics, 90 percent of the HIV-infected catch the virus precisely through intravenous drug use. As before, most of the drug addicts – up to 53 percent – are persons with no definite occupation. It is they who strengthen the army of distributors now as well, which in its turn gives go up to a crime flare.
The melancholic strain is that drug addiction has got much younger. The total number of sick persons has increased by nine times over the recent period, and among adolescents by 17 times. The “average age” of those who have for the first time tasted drugs barely exceeds 14 years. In drug trafficking In this context, it is evident from the recent survey, Russia is not only a “terminal,” but also a transshipment point. Drug syndicates have undertaken a real expansion in Russia. It has become a favorable transit passageway for them.
By experts’ estimates, one dollar invested in a narcotic – for example, in Afghanistan – grows into super profits after the sale of the drug item in European countries. And the overall volume of your and our market – the Russian market – exceeds 1 billion dollars. Power agencies obviously put up with the brunt of the fight against the drug mafia. Here we will inevitably have to strengthen, both financially and with cadres, all of the services that are associated with this kind of activity – the fight against the drug mafia. By the detention of drug goods alone we cannot solve this problem. Only a small part of merchandise gets confiscated. Experience shows that the detainees are mostly petty retailers, and sometimes also those who need being treated themselves.
In this connection it is time in general to revise the criteria of work in this direction. We must put up a barrier to all the ways for drug penetration into illegal trade, smash the infrastructure of drug networks and eliminate demand. The reasons for the powerful drug “invasion” lie not only in the proximity of the countries of the Golden Crescent. For it there are loopholes in Russia itself – financial, legal, and administrative and, of course, social. In addition to one more important aspect of the problem – the attitude to this question of society itself. Drugs are percolating even to social institutions which are responsible for the upbringing of young people baptized to serve as an blockage to drug pushers, the enlightening institutions, regrettably, are fetching a bridgehead for drug allocation. We’re encountering the indifference of both the school and parents. Today every fifth recruit brings to the army with him an experience of drug use with all the ensuing consequences for security agencies.
Drug use should not be allowed to become a subculture or fashion. Unfortunately, we’re observing signs of this. Even worse, books are being freely sold that propagate a “narcotic lifestyle.” All of these manifestations of a grave social disease have to be fought by legal and administrative and educational methods. Here a substantial workload falls on legislators, legislation in all-purpose, and law enforcement practice. Changes ought to be directed toward stiffening criminal responsibility for the most dangerous narco-crimes. Thought should also be given to the introduction of a practice of replacing punishment with coercive treatment for drug addicts.
Marijuana and hashish are those drugs produced from the plant Indian hemp and accordingly, visible effects of the drugs including reddening of the eyes caused by distention of blood vessels, and enlargement of the pupils. Effects on the mind vary and in general visual awareness is increased and ideas flow more quickly. These drugs are not addictive and there is no evidence that they harm the body. There is a jeopardy, however, that the drug taker’s sense of judgment will be distorted so that reckless or foolish behavior can result. Lysergic acid DI-ethyl amide (LSD) is an example of a hallucinogenic drug, so called because it gives rise to dramatic eccentricity. The effects of LSD trip are erratic and seem to depend upon the mood of the user without more ado before taking the drug. It could for instance intensify awareness and perception to the point at which the user undergoes mystical experiences or it may intensify a depressed, fearful or agitated mood with horrendous results. One more problem with LSD is that very miniature quantities have powerful effects, and since illegitimately formed drugs vary in quality drug takers can never be sure how much they are taking. An overdose of LSD can result in insanity or death. Another problem with LSD is that very small quantities have powerful effects, and since illegally produced drugs are extracted from the seed capsules of the opium poppy. Opiates are medically important as painkillers. But drug takers use them because they give rise to approach of well beings, pleasure, and power. It may be apologetic to articulate when the effects wear off the taker becomes anxious and depressed and is tempered to take another dose to restore a good mood, a course that can lead to addiction. Morphine, heroine, and other drugs that are often injected involve the risk of infection from dirt hypodermic needles. Besides this, Barbiturates and amphetamines are used immediately to relieve anxiety and as sleeping pills. But they are dangerous because the dosage must be continually increased to be effective. Barbiturates are often used in combination with amphetamines and other stimulants. These reduce the sleepiness induced by barbiturates with a feeling of mental alertness. Amphetamines harm the health by reducing the appetite, by causing sleeplessness, and by reducing the body’s ability to fight infection. Hence it is clear that the drug as have been reflected so far is illegal unless they are used under medical supervision. The illegal use or sale of these drugs can result in colossal punishment under the enactment of the government as implied.
In view of the above it is evident that the possibility of providing castigation for drug advocacy needs to be geared up. The state parties ought not to limit to isolated establishments, every one on behalf of the state need to create a network of healing centers where up-and-coming methods of treatment and return of people to a normal social life should be the prime factor. Regrettably, drug addiction has ceased to be a “disease of the rich only,” and hence we must expand the network of state institutions for the poor. But at the same time we need to develop and create a transparent legal base for the work of private sectors. An important set of tasks is connected with the eradication of financial channels for narco-business, which can be cut off not only by fighting against unlawful elements, but also through the use of a whole system of special measures as a tentative flow.

A dream of a freedom fighter by Kh. Atiar Rahman

Type of the poem: This is an allegorical poem which deals with a critical time where the freedom fighters have faced lots of troubles to fight against the foes. The nature has done its duty as the sun rises and the setting the sun has been completed.
Elaborate history: Bangladesh came into being in the world map after 9 months struggle. This is a history that as a nation we are free from all sorts of mistrust, prideness and freedom of speech.


Like a habitual shooting eye, his mind is drifting
For his disabled and mental picking poisoning,
To falsify the rhyme of human race;
He has pending elongated quick look in the base.
For scatterbrained dreams not being born to the noise,
To trash the jeopardized and utmost poise.
His joys are melded like a decaying clad
To have plummet look from the core of blood.
He has a mere soldier who has weapons to fight
For thorough search and pumping rite.
I have seen the guy from near and distant drill
He has charms but palsied to hike in the hill.
He is so sure that death lies in icy hand
Where gain or loss entails equal band.
In respect of high or low
For significant change in human row.
Forever love and fraternity in human soul
He has dreams of glow to play in the role
To cross the ocean by the strength of mind
To have tastes of life by lagging behind.

Sunday, November 29, 2015

A boy sitting on a wheel chair



Like the dew drops falling on the grass
Glittering in the dazzling rays of the sun
She has smiles dramatic all over the world
To give impression of love at the amazing sky.
She knows no indulgence even any discord
Not even banned certainty laid the blame on,
She is clear like the shower of rain;
Who has weapons to banish the insignificant change?
She has eyes all around in the dark cloud
Like the flies to clasp in the world so high;
To eliminate shyness, murky and evils of mind,
To gather significant change of life.
Like the roses, she is scattering every side
To pact a series of beams in the sun,
To scatter the light of knowledge and skills
To inform the world that precision exists.
Her jollity reflecting like the light of the moon
To have bustling the world forthwith change
In quicker form to survive on earth
Telling of fraternity, love and peace.


Raja Ram Mohan Roy

There is no denying the fact that Raja Ram Mohan Roy had had the recognition as the 'Maker of Modern India'. He was the founder ...