View allAll Photos Tagged technologist

About Me:

 

I am Pranav Bhasin, a technologist by education, photographer by passion, cyclist and runner by desire, entrepreneur by choice and an ardent traveler.

 

My photography is an attempt to mirror the soul of places I have been to, people I have met and things I have experienced during my travels. Please visit Pranav Bhasin's Photo Gallery and Photo Blog for a collection of my best photos.

 

You can also connect with me at: My Product Management and Social Media Blog, Facebook, Twitter, LinkedIn, Pinterest, Foursquare.

 

In case you are interested in using my photos, please write to me and I would be happy to offer them for a price. Please do not use my photos without prior authorization from me. Thanks!

Women of Color in Tech stock images, Women in Tech stock images

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

David Miller, NASA Chief Technologist, center, speaks during a panel discussion about NASA's journey to Mars and the film "The Martian", Sunday, Sept. 27, 2015, at Columbia University in New York City. NASA scientists and engineers served as technical consultants on the film. The movie portrays a realistic view of the climate and topography of Mars, based on NASA data, and some of the challenges NASA faces as we prepare for human exploration of the Red Planet in the 2030s. Photo Credit: (NASA/Joel Kowsky)

Women of Color in Technology, Women of Color in Tech, Woman of Color in Tech

Women of Color in Tech stock images, Women in Tech stock images

Women of Color in Tech stock images, Women in Tech stock images

Master Corporal Karina Pelletier, Medical Laboratory Technologist, works at the COVID testing test station at the Saint-Jean Garrison laboratory in Saint-Jean-sur-Richelieu on February 16, 2022.

 

Photo: MCpl Nédia Coutinho, Canadian Armed Forces

~

La caporale-chef Karina Pelletier, technologue en laboratoire médical, se trouve à la station des tests de dépistage de la COVID au laboratoire de la Garnison Saint-Jean, à St-Jean sur Richelieu, le 16 février 2022.

 

Photo : Cplc Nédia Coutinho, Forces armées canadiennes

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

NASA Acting Chief Technologist Douglas Terrier gives a talk to teachers attending a professional development workshop held in tandem with the Intrepid Space & Science Festival, Saturday, Aug. 5, 2017 at the Intrepid Sea, Air & Space Museum in New York City. The week-long festival featured talks, films and cutting-edge displays showcasing NASA technology. Photo Credit: (NASA/Bill Ingalls)

I work as a Medical analyst (Medical laboratory technologist) and this is a part of what I do - work with bacteria. The agar plate in the front contains a genus called Haemophilus with a staphylococci line through the plate, used to identify the Haemophilus. The Haemophilus grows well on a blood agar when a Staphylococci is present. The plate in the back is a pneumococci identification, the zone around the pills indicates that this is Streptococcus pneumoniae....

Women of Color in Tech stock images, Women in Tech stock images

A tech worker in a window below a DOG sign downtown on Friday night.

 

Canon - IMG_6481

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

Women of Color in Tech stock images, Women in Tech stock images

Women of Color in Tech stock images, Women in Tech stock images

The Old Broken Hill Fire Station:

 

The former Broken Hill Fire Station was erected in 1892 and reconstructed in 1963, opening as the Charles Rasp Memorial Library in honour of the discoverer of the Broken Hill orebody. In 1908, the brigade boasted a fire car (which carried a small steam engine), two hose carts, a horse wagon, five horses, give permanent and eighteen volunteer firemen. Fires were common in Broken Hill and about 60 houses were burnt down each year in the early 1900s. There were also major fires in Argent Street in 1888 and 1892. Insufficient water pressure was the most significant problem until a second reservoir was completed in 1914.

 

Charles Rasp:

 

Charles Rasp (1846 - 1907), prospector, was born on the 7th of October 1846 at Stuttgart, Duchy of Württemberg, where he was educated. A clerk in a chemical firm, he later trained as an edible-oil technologist with a large chemical manufacturing company in Hamburg, where he worked in the export department as he was fluent in English and French. Rasp was delicate and the bitter winter of 1868 brought on a serious lung weakness, so he decided to leave Germany for a warmer climate.

 

Rasp arrived in Melbourne in 1869 and found work pruning vines. After two years on agricultural properties he tried the Victorian goldfields but the days of the big strikes were over and the slushy diggings gave him a hacking cough. On advice from friends he moved to New South Wales. He worked on Walwa station, then wandered from place to place until engaged as a boundary rider on Mount Gipps station in the Barrier Ranges in the far west. After discoveries of silver at Silverton and Day Dream every station-hand in the area searched for indications of the metal.

 

When his duties led him to the 'hill', Rasp often examined the outcrop. No geologist, he was observant and on the 5th of September 1883 pegged the first block on the 'Broken Hill', which he thought was a mountain of tin. On advice of the Mount Gipps manager, George McCulloch, a 'syndicate of seven' was formed and seven blocks pegged to include the whole ridge. Each member subscribed £70 to the unregistered 'Broken Hill Mining Co.' and paid £1 a week towards working the claim.

 

The syndicate had little success for some months and the Adelaide analysts' reports were disappointing as they only tested for tin. The discovery of rich silver ore in 1885 led to the formation of the Broken Hill Proprietary Co., with a capital of 16,000 £20 shares, 14,000 of which went to the syndicate, and to a rapid growth of the mining industry at Broken Hill. Within five years Rasp had made a fortune.

 

He was prominently connected with Broken Hill for some years. With a large number of shares in the company, he moved to Adelaide when dividends were declared; he married Agnes Maria Louise Klevesahl there on the 22nd of July 1886. They bought a house, Willyama, where his wife entertained in the grand manner. Rasp preferred his library of French and German books. For some years he had mining interests in Western Australia.

 

Leaving an estate of £48,000, Rasp died suddenly from a heart attack at his residence on the 22nd of May 1907 and was buried in North Road cemetery, Adelaide. He was childless. In 1914 his widow married Count von Zedtwitz and died in Adelaide in 1936. Oil paintings of Rasp and his wife are in the Charles Rasp Memorial Library, Broken Hill.

 

Source: City Of Broken Hill & Australian Dictionary Of Biography.

 

Charles Rasp (1846 - 1907), Goldsucher, wurde am 7. Oktober 1846 in Stuttgart, Herzogtum Württemberg, geboren, wo er ausgebildet wurde. Als Angestellter in einem Chemieunternehmen absolvierte er später eine Ausbildung zum Speiseöltechnologen bei einem großen Chemieproduktionsunternehmen in Hamburg, wo er in der Exportabteilung arbeitete, da er fließend Englisch und Französisch sprach. Raspel war empfindlich und der bittere Winter von 1868 brachte eine schwere Lungenschwäche mit sich, so dass er beschloss, Deutschland in ein wärmeres Klima zu verlassen.

 

Raspel kam 1869 nach Melbourne und fand Arbeit beim Rebschnitt. Nach zwei Jahren auf landwirtschaftlichen Grundstücken probierte er die viktorianischen Goldfelder aus, aber die Tage der großen Streiks waren vorbei und die matschigen Ausgrabungen bereiteten ihm einen Husten. Auf Anraten von Freunden zog er nach New South Wales. Er arbeitete auf der Walwa Station, wanderte dann von Ort zu Ort, bis er als Grenzreiter auf der Mount Gipps Station in den Barrier Ranges im äußersten Westen engagiert wurde. Nach Silberfunden in Silverton und Day Dream suchte jede Station in der Gegend nach Hinweisen auf das Metall.

 

Wenn seine Aufgaben ihn zum Hügel führten, untersuchte Raspel oft den Aufschluss. Kein Geologe, er war aufmerksam und steckte am 5. September 1883 den ersten Block auf den 'Broken Hill', den er für einen Zinnberg hielt. Auf Anraten des Managers von Mount Gipps, George McCulloch, wurde ein 'Syndikat der Sieben' gebildet und sieben Blöcke an den gesamten Kamm gebunden. Jedes Mitglied hat £ 70 für die nicht registrierte 'Broken Hill Mining Co.' abonniert.' und zahlte £ 1 pro Woche für die Bearbeitung der Forderung.

 

Das Syndikat hatte einige Monate lang wenig Erfolg und die Berichte der Adelaide-Analysten waren enttäuschend, da sie nur auf Zinn testeten. Die Entdeckung von reichem Silbererz im Jahr 1885 führte zur Gründung der Broken Hill Proprietary Co., mit einem Kapital von 16.000 £ 20 Aktien, von denen 14.000 an das Syndikat gingen, und zu einem schnellen Wachstum der Bergbauindustrie in Broken Hill. Innerhalb von fünf Jahren hatte Rasp ein Vermögen gemacht.

 

Er war einige Jahre lang prominent mit Broken Hill verbunden. Mit einer großen Anzahl von Aktien an der Firma zog er nach Adelaide, als Dividenden erklärt wurden; Dort heiratete er am 22.Juli 1886 Agnes Maria Louise Klevesahl. Sie kauften ein Haus, Willyama, in dem seine Frau auf großartige Weise unterhielt. Rasp bevorzugte seine Bibliothek mit französischen und deutschen Büchern. Einige Jahre lang hatte er Bergbauinteressen in Westaustralien.

 

Rasp hinterließ einen Nachlass von £ 48,000, starb am 22. Mai 1907 plötzlich an einem Herzinfarkt in seiner Residenz und wurde auf dem North Road Cemetery in Adelaide beigesetzt. Er war kinderlos. 1914 heiratete seine Witwe Graf von Zedtwitz und starb 1936 in Adelaide. Ölgemälde von Rasp und seiner Frau befinden sich in der Charles Rasp Memorial Library in Broken Hill.

 

Quelle: Australisches Wörterbuch der Biographie.

Hundreds of leading activists, advocates, librarians, educators, lawyers, technologists, and more came together during the 2019 Creative Commons Global Summit in Lisbon for discussion and debate, workshops and planning, talks and community building. For more information: summit.creativecommons.org/

Women of Color in Tech stock images, Women in Tech stock images

This is an edited version of a talk I presented a talk of at Trampoline 2 [0] in Melbourne [1], Saturday 24th of October, 2009 called "Hacking People, Hacking Bullies". [2],[3],[4],[5],[6].

 

The talk was divided into three parts: a) "Know your Enemy, Hacking humans"; b) "In the field: real life examples"; and c) "Hacking Bullies". In this, the first part of the talk I identifying bullies and their modes of attack. The second will possibly never be written up for public consumption but it illustrated how bullies operate using using personal anecdotes. The last part of the talk I have already written up. It explains how you might go about Hacking Bullies [7] using network science concepts.

 

Preamble

My name is Peter. I'm a programmer. One of those gen-X slackers you hear about. My second computer was an Apple 2e clone shipped from Singapore in parts and hand assembled.

 

I'll be as lo-tech as you can get and read from sheets of paper. My talk is on bullies and what happens when they discover computers. I'm not a psychologist, I'm a technologist with crap social skills. I'm interested in how bullies are adapting to computers and network, how to identify and neutralise them.

 

The idea I want to explore, "Is there a better way to identify and disrupt Cyberbullies?". To do this we first must understand bullies and the mechanics of bullying.

 

Introduction

The effects of bullying is enough of a problem for the United States Secret Service to carry out a threat assessment [8] to understand why so many school kids carried out "targeted violence" [9] in American schools? One of the findings: Bullying was identified as a major contributor in shootings in the United States secondary schools. [10] The number of reported bully attacks in lower level schools in Norway 1983 was 1 in 7. In the same country the number of reported attacks in lower schools in 2001, increased by 50%. And more worrying statistic, the number of students in the most serious forms, up 67%. [11]

 

Bullying has serious implications and it can be quantified. So what and who are these bullies?

 

Know your enemy

First some terminology. I want to use the word ATTACKER and TARGET to describe a "bully" and their "victim". I choose these words carefully to redefine the problem. People who are attacked, shouldn't be thought of as being helpless as the term "victim" implies. Neither, should bullies be described in favourable terms.

 

When I say ATTACKER, I want you to think "bully" and "looser". When I say TARGET I want you to think, "could this be me?".

 

What is bullying?

Bullying is any negative action that is intentional, systematic and repeated. The majority of bullying is by two to three ATTACKERs. [12] The TARGET is chosen for a number of reasons, but mostly because of some in-balance of social power. [13]

 

Recognition

The key to recognition, is realising an ATTACKER is someone who has a strong need for power and negative dominance. Recognition relies on understanding the psychology of the ATTACKER, not just their appearance. This makes recognition difficult.

 

Fighting style

When it comes to attacking men, women, girls and boys each have their own particular style. The simplest explanation I can think of is "Men attack like paratroopers. Women, special agents". Males are aggressive and physical. Why bother talking, when you push, shove, kick and punch your TARGET. As a rule, males tend to be regressive and overt. Males attack their TARGET directly just like Paratroopers. Violent, fast, no retreat, no prisoners.

 

"Men attack like paratroopers. Women, special agents"

 

Females are less physically able than males but can be just as aggressive and have a uniquely adapted fighting style. They excel at indirect attack. Indirect attacks are concealed and subtle, something males can't quite comprehend. This is why females are special agents. They can get in under your guard and deliver attacks just devastating as the male, undetected. Do not underestimate the arsenal female ATTACKER have at their disposal.

 

Males might take things from you, be physical, be overtly verbal, make threats and force you to do things. Female use of social exclusion, spreading rumours, lies and sophisticated use of language is relatively undetectable in comparison to crude methods used by Males. [14]

 

Hacking Humans

Why do ATTACKERS try to hack humans? How do they find their TARGET? Why do they engage an audience?

 

Weakness

How does an ATTACKER select a TARGET? It's not difficult. An ATTACKER will select a TARGET by identifying and exploiting weakness in certain individuals. An ATTACKER will try to ascertain if a person is more vulnerable than others using a wide variety of criteria. Is the person socially excluded? Are they introverted? Are they different? Some common ways to access weakness include: Gait, [15] blind spots [16] and asymmetry. [17]

 

An anatomy of an attack

When an attack occurs the ATTACKER and TARGET engage in a sort of choreographed dance. ATTACKER, TARGET, HENCHMEN and OUTSIDERs playing a defined but changeable role.

  

- SCAN The ATTACKER views the battlefield scanning for TARGETs. [18] Them things happen fast.

 

- SIGNAL The ATTACKER has signaled the TARGET. At this point if the battleground is public, onlookers are now involved.

 

- ATTACK The bully can now joined by HENCHMEN, followers of the bully who actively join in on the attack. The TARGET probably has no idea this is going to happen because of blind spots and will be stunned. Unable to respond. It's at this stage OUTSIDERs, people who happen to be in the battleground become involved.

 

- CHOOSING SIDES The ATTACKER needs OUTSIDERS to join in to re-inforce their social status. An OUTSIDER has multiple choices. They can support the ATTACKER and actively join in or remain passive. An OUTSIDER may choose not to get involved and watch. An OUTSIDER might choose to actively DEFEND or potentially DEFEND.

 

- OUTCOME The ATTACKER has bullied the TARGET. Depending on the circumstances HENCHMEN may have also joined in.

 

Intervention as a solution?

What about the OUTSIDERS? Why didn't they DEFEND? Why did some join the ATTACKERS side? The sad truth is most OUTSIDERs are of no help to the TARGET. [18]

 

Why don't OUTSIDERs choose to help a TARGET? The most common explanation is OUTSIDERs are fearful of loosing status or worry about getting hurt or can't decide and choose to remain passive. The ATTACKER asymmetrically takes control of a larger group even though OUTSIDERs potentially have numerical advantage. This is called the "Bystander Paradox". [19]

 

For the TARGET there is no easy way out of this situation. It is up to the OUTSIDERs to intervene. By taking a stand, OUTSIDERs have a chance to reduce or circumvent the cycle of bullying. How do you do this? Counter attack the ATTACKER. The single point of weakness an ATTACKER is lack of numerical force. If you can turn enough bystanders back onto the ATTACKER and HENCHMEN you may be able to blunt and reduce the ATTACK at the SIGNAL phase. [20]

 

What about the bullying on the Internet? Bullies have now discovered the Internet. Can you start Hacking Bullies. [21]

 

Reference

[0] Peter Renshaw, Trampoline 2, flickr, "My Trampoline 2 flickr set: Trampoline was an informal day of sharing ideas in Melbourne, Australia, Saturday 24th of October, 2009." [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/sets/72157622667018586/

 

[1] Peter Renshaw, Melbourne, Australia, flickr, "My Melbourne Flickr set showing images from around Melbourne CBD.", [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/sets/72157600195992630/

 

[2] Peter Renshaw, seldomlogical, "Hacking Bullies: 'is there a better way to identify and disrupt Cyber Bullies?'"., [Accessed Saturday, 13th March 2010]

http://seldomlogical.com/2010/03/13/hacking-bullies/

 

[3] At the time, I didn't mention the focus of the talk. I was thinking about what might happen when you try to replicate "social networks" on-line exclusively for women. This was unintentional and might have turned a few listeners off.

Wikipedia defines "social networks" as "... a physical description of how people organise themselves. The self organising nature of social networks appear to follow the rules of network science which allows the study of networks to be done using various mathematical techniques.", [Accessed Saturday, 13th March 2010]

http://en.wikipedia.org/wiki/Social_network

www.flickr.com/photos/bootload/4501255443/

[4] Looking at bullying from a specific gender viewpoint is interesting, because I suspect the more verbal culture women exhibit captured online can now more easily be analysed for signs of bullying. I tend to write about these ideas to look for new insights into problems. Bullying is a problem. I've experienced it first hand but not on-line. I see bullying on-line as an bigger problem. We are now in a period of time where "social software" is growing quickly and worth exploring further. See point [2].

 

[5] Paul Graham, paulgraham.com, "What you can't say: 'It seems to be a constant throughout history: In every period, people believed things that were just ridiculous, and believed them so strongly that you would have gotten in terrible trouble for saying otherwise.'", [Accessed Friday, 16th October 2009]

http://paulgraham.com/say.html

 

[6] Peter Renshaw, flickr, "2009AUG251053: SBS INSIGHT: girls, relationships & cattiness: Computers are powerful amplifiers, so small spats between individuals can become front page news. Tactics used by Women that might work face to face, have the potential to back-fire big time on the Internet. Anywhere computers come into the conversation, the resultant data can be stored, searched, retrieved and with the advent of social software this can now be done real time.", [Accessed Friday, 16th October 2009]

http://www.flickr.com/photos/bootload/3854522410/

 

[7] Peter Renshaw, seldomlogical, "Hacking Bullies: The idea, a simple hypothesis, 'Is there a better way to identify and disrupt Cyber Bullies?'", 13 March 2010, [Accessed Saturday, 13th March 2010]

seldomlogical.com/2010/03/13/hacking-bullies/

 

[8] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Threat Assessment in Schools: A guide to managing threatening situations and to create safe school climates", United States Secret Service & United States Department of Education, Washington, D.C., 2002. (pdf, 754Kb), [Accessed Friday, 16th October 2009]

http://www.secretservice.gov/ntac/ssi_guide.pdf

 

[9] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Threat Assessment in Schools: A guide to managing threatening situations and to create safe school climates: 'Targeted violence' any incident of violence where a known or knowable attacker selects a 1 particular target prior to their violent attack.", P 3., Ibid, [Accessed Friday, 16th October 2009]

 

[10] Fein, R.A. Ph.D., Vossekuil, B., Pollack, W.S. Ph.D., Borum, R. Psy.D., Modzeleski W., Reddy M., Ph.D., "Chapter III - Key findings of the safe school initiative's study of targeted school violence: '... Many attackers felt bullied, persecuted, or injured by others prior to the attack ...'", P17., Ibid, [Accessed Friday, 16th October 2009]

 

[11] olweus.org, FAQ, "Question: How Common Is Bullying?",

[Accessed Friday, 16th October 2009]

http://www.olweus.org/public/faqs.page#Answer_numberCbQ7

 

[12] Center for the Study and Prevention of Violence, colorado.edu "Olweus Bullying Prevention Program (BPP): 'In the context of school bullying, the victim is usually a single student, who is generally harassed by a group of two or three students, often with a "negative leader." A considerable proportion of the victims, 20-40 percent, report, however, that they are mainly bullied by a single student.'", [Accessed Saturday, 13th March 2010]

http://www.colorado.edu/cspv/blueprints/modelprograms/BPP.html

 

[13] Center for the Study and Prevention of Violence, colorado.edu "Olweus Bullying Prevention Program (BPP): Prevalence of Bullying" Ibid, [Accessed Saturday, 13th March 2010]

 

[14] This is a gross generalisation but for the purposes of the talk it worked. It is interesting to read what Olweus has found looking at this issue. This is some of what he had to say:

"... This shows that it is boys who are more likely to be the perpetrators of what Olweus calls "direct" bullying, that is, bullying which involves direct physical or verbal attacks. He has concluded that girls are more likely to use indirect, subtle, social means to harass other girls. He refers to behaviour such as social exclusion, manipulation of friendship relationships, spreading rumours, etc. ..." (Olweus, D. 1993, Bullying at School: What We Know and What We Can Do. Oxford UK: Blackwell Publishers.)

 

Sudermann, Jaffe, Schieck, Watson, Lehmann, Greer "A School-based Anti-Violence Program", 1996, [Accessed Friday April 2, 2010]

http://www.lfcc.on.ca/bully.htm

 

[15] The study of Psychopaths has revealed interesting insights into possible ways TARGETS can be exploited for weakness by ATTACKERS. Weakness comes in many forms. One in particular is gait or the way people move. This helps explain how Bullies can scan for TARGETS so easily.

"Psychopaths target anything weak. They assess voice,

gait, circumstances, height, weight, etc. Yes fam with

gait studies"

 

Joe Navarro/@navarrotells, [Accessed Wednesday, 7th April 2010]

http://twitter.com/navarrotells/status/11069087171

 

Interested in spotting Psychopathic behaviour? Here are some further references:

 

a) Joe Navarro, "How to Spot a Psychopath", (Kindle Edition only), ASIN: B002TX70G8

[Accessed Wednesday, 7th April 2010]

www.amazon.com/How-Spot-Psychopath-ebook/dp/B002TX70G8/re...

b) Ian Walker, Fibro Majestic Film, "I, Psychopath: A 1hr documentary available on DVD who documents scientific testing 'Sam Vaknin' to see if he is in fact a Psychopath.", ASIN: B002W6ZI1Q, 2009. [Accessed Wednesday, 7th April 2010]

http://www.magicreal.com.au/filmandtv.php?film=4

www.amazon.com/I-Psychopath-Ian-Walker/dp/B002W6ZI1Q/ref=...

  

[16] The ATTACKER simply exploits a vulnerability in how individuals view themselves. We may be able to understand how others view some of our personality traits, but not all of them.

 

[17] ATTACKERS will exploit a TARGETs disparity in size, strength or social status. ATTACKERS use superior force and peer pressure.

 

[18] Read through reference [15] to understand how ATTACKERS achieve this.

 

[19] Bystander paradox How can the TARGET decide what the roles OUTSIDERs choose? Are OUTSIDERs supporting the ATTACKER?, helping the TARGET?, or remaining neutral? The TARGET cannot tell. If you fight back and take on an ATTACKER and OUTSIDER can you justify both? This is the bystander paradox - the ability to justify the response when attacked. The ATTACKER has no such problem.

 

[20] Larry Abramson, NPR (National Public Radio), "Hit Back At Bullies? Not At This School", "That's why the Olweus Bullying Prevention Program tries to turn anti-bullying efforts into part of the school culture, rather than just the topic of an occasional assembly. The concepts are simple: Don't bully, help those who are being bullied and tell an adult what's going on. Pearre tries to reinforce the idea that the bully doesn't act alone. The community can take away the bully's power by refusing to cheer him on, by telling an adult, or perhaps the ultimate step: stepping in to help the victim."

 

http://www.npr.org/templates/story/story.php?storyId=125137071

 

[21] Peter Renshaw, seldomlogical, "Hacking Bullies: 'is there a better way to identify and disrupt Cyber Bullies?'"., Ibid. [Accessed Saturday, 13th March 2010]

 

next >>>

Buzz Aldrin is deploying the Solar Wind Collector (SWC), a foil sheet which he is pointing at the Sun. Note the word 'Shade' printed on the bottom of the back side. The word 'Sun' is printed on the sunward side. At the end of the EVA, after leaving the SWC exposed to the Sun for about 1 hour and 17 minutes, Buzz will roll up the foil and pack it in a bag for analysis back on Earth. Note the considerable clearance between the bottom of the Descent Engine bell and the surface beneath it. Little West Crater is near the horizon on the lefthand side of the image. Note the pattern of scratch marks running from the MESA toward the lower left that were created by the TV cable as Neil Armstrong took the camera away from the LM on the tripod. Neil's footprints are generally to the right of the cable scratches as he moved sideways out from the Lunar Module. Several potentially foot-grabbing loops remain in the cable. The rendezvous radar and various antennas on the top of the ascent stage are labeled in a detail ( 223k ).

 

To learn more about Apollo 11 go to: www.nasa.gov/externalflash/apollo11_40/

 

Credit: NASA/APOLLO 11

 

NASA Goddard Space Flight Center is home to the nation's largest organization of combined scientists, engineers and technologists that build spacecraft, instruments and new technology to study the Earth, the sun, our solar system, and the universe.

Women of Color in Tech stock images, Women in Tech stock images

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

i took this photo of my friend at " The 2nd Radiological Technologists conference" in the break time :P

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

This NASA image was taken on April 1, 1960 by TIROS 1. This was the first television picture of Earth from space.

 

Credit: NASA

 

To learn more about this image go to: www.nasa.gov/topics/earth/features/tiros1-50th.html

 

NASA Goddard Space Flight Center is home to the nation's largest organization of combined scientists, engineers and technologists that build spacecraft, instruments and new technology to study the Earth, the sun, our solar system, and the universe.

Draw By Night #42 (Oct '15) - The Skookums

 

What happens when you mix a roomful of artists, giant pieces of paper, and a crazy theme? If you’re Interactive Technologist and Instructor Christopher Quine, you turn those ingredients into Vancouver’s only bi-monthly drawing party. At Draw By Night, artists can work collaboratively on pieces, or by themselves on their own section. The only emphasis is on getting everyone drawing. Participants are encouraged to use Twitter or other social media to discuss the event and post pictures, allowing real-time engagement with the drawing community. They can also post ideas and comments that are often integrated into the next event.

 

Find out more about VFS's one-year Digital Design program at vfs.edu/programs/digital-design

 

Photos by Danny Chan

This area of Seville offers professionals, scientists, and technologists a place of excellence in which to work, with a new urban design, a design for the future. A unique creativity has been displayed in the buildings and spaces that have been constructed over recent years, as well as those that are currently being built. As well as aesthetic criteria, designs also include other valuable and indispensable features: energy efficiency and sustainability.

i took this photo of my friend at " The 2nd Radiological Technologists conference" in the break time :P

Women in Technology, Women in Tech, Woman in Tech

Today's scene: an arrogant technologist learns why one shouldn't antagonize a reality manipulator.

  

Starring S.K. Cosplay as the Scarlet Witch, and David Mansfied as Iron Man.

 

Women of Color in Tech stock images, Women in Tech stock images

Women of Color in Tech stock images, Women in Tech stock images

Women in Technology, Women in Tech, Woman in Tech

Dr. Alex MacDonald, Program Executive for Emerging Space, Office of the Chief Technologist, NASA, responds to a question during NASA's "Real Martians" event on Thursday, September 17, 2015 at NASA headquarters in Washington, DC. The event was held to acknowledge NASA staff that are contributing to scientific and technological advances that will enable the journey to Mars. Photo Credit: (NASA/Aubrey Gemignani).

Women in Technology, Women in Tech, Woman in Tech

Women in Technology, Women in Tech, Woman in Tech

Women in Technology, Women in Tech, Woman in Tech

Women of Color in Tech stock images, Women in Tech stock images

Women of Color in Tech stock images, Women in Tech stock images

David Miller, NASA Chief Technologist, center, speaks during a panel discussion about NASA's journey to Mars and the film "The Martian," Sunday, Sept. 27, 2015, at Columbia University in New York City. NASA scientists and engineers served as technical consultants on the film. The movie portrays a realistic view of the climate and topography of Mars, based on NASA data, and some of the challenges NASA faces as we prepare for human exploration of the Red Planet in the 2030s. Photo Credit: (NASA/Joel Kowsky)

NASA Chief Technologist Douglas Terrier talks about NASA's plans for going forward to the Moon and Mars during a Mars celebration Saturday, June 1, 2019, in Mars, Pennsylvania. NASA is in the small town to celebrate Mars exploration and share the agency’s excitement about landing astronauts on the Moon in five years. The celebration includes a weekend of Science, Technology, Engineering, Arts and Mathematics (STEAM) activities. Photo Credit: (NASA/Bill Ingalls)

Women in Technology, Women in Tech, Woman in Tech

Women in Technology, Women in Tech, Woman in Tech

About Me:

 

I am Pranav Bhasin, a technologist by education, photographer by passion, cyclist and runner by desire, entrepreneur by choice and an ardent traveler.

 

My photography is an attempt to mirror the soul of places I have been to, people I have met and things I have experienced during my travels. Please visit Pranav Bhasin's Photo Gallery and Photo Blog for a collection of my best photos.

 

You can also connect with me at: My Product Management and Social Media Blog, Facebook, Twitter, LinkedIn, Pinterest, Foursquare.

 

In case you are interested in using my photos, please write to me and I would be happy to offer them for a price. Please do not use my photos without prior authorization from me. Thanks!

Women of Color in Tech stock images, Women in Tech stock images

Women of Color in Tech stock images, Women in Tech stock images

Technologists John Kelton and Daniel Ray perform inspection of the Falling Particle Receiver during a cloud delay atop the National Solar Thermal Test Facility at Sandia National Laboratories.

 

Read more at bit.ly/2Z6lEVZ.

 

Photo by Randy Montoya.

1 2 ••• 5 6 8 10 11 ••• 79 80