Thứ Tư, 15 tháng 2, 2017

Waching daily Feb 15 2017

If all the bathtubs were galaxies and starships,

oh what a bath it would be.

Lush was founded in 1995 in Poole, Dorset.

That's in the U.K.

Lush co-founder Mo Constantine wanted to create a better bath,

one that wouldn't irritate the skin.

She combined essential oils with a little bit of fizz and the first bath bomb was born.

Now it's time for some cosmic color.

There's a yummy yellow

a pretty hot pink

and a beautiful, bold blue.

Each color is mixed with a luster to give it some added sparkle.

Luster is made with the same types of ingredients you would find in your favorite shimmery eye shadow.

For the blue hue, popping candy and an extra biodegradable gold glimmer are added.

The insert is the nucleus of this super cool space ball

and is made up of sodium bicarbonate or baking soda,

a snowflake luster,

a mixture of peppermint and cedarwood oil,

and a bubble mix which holds everything together.

The pressing team works together to press the bath bombs by hand.

One person takes the powder from the bomb and mixes it with citric acid.

The citric acid helps the bomb bind together when pressed.

Once they've mixed the two powder mixtures, they begin to build the bomb layer by layer.

First the blue,

then yellow,

then pink.

Then they press the bombs together using the two halves of the molds.

The extreme force squeezes out all the extra air and creates a perfect sphere of spacey delight.

After the pressing team works their magic,

the bombs sit in the molds overnight to dry.

The intergalactic bath bomb is the key to an interstellar tub party.

Relax, you deserve it.

Thanks for watching Refinery29.

For more videos like this, click here.

And to subscribe, click here.

For more infomation >> LUSH Intergalactic Bath Bombs Are Made In The Coolest Way | How Stuff Is Made | Refinery29 - Duration: 2:46.

-------------------------------------------

What is Submissive - BDSM101 - Duration: 6:51.

welcome to this week's episode of think

kink I'm Veronica Yahns founder of desires laid bare

where we teach fun, easy and

actionable kinky BDSM classes for

beginners and first-timers so what does

it mean when someone says they're

submissive in or out of the bedroom

why would anyone want to be submissive

what if you're a take-charge kind of

person

what if you run a business empire or

your head of your law firm can you still

be submissive be submissive then? All of these

questions and more will be answered in

our new dominance and Submission basic

series Within think kink. For this video we're

going back to super basics to answer the

very very core question of what does it

mean to be submissive and why is it so

attractive to some people

i'm super excited for this video because

pink in BDSM are vast and complex

creatures so I wanted to carve out a

little face so that we can break down

the complexities of what it means to be

a dominance and Submission relationship

either in the bedroom or both

I wanted to touch upon to submit the

side first because a lot of people

struggle with embracing this word and by

definition it means that someone is like

me can we can gospel and logically why

would anyone want to be this unless

you're playing like a victim mentality

or you feel like you're the victim type

of person most of us especially if

you're watching these videos from

desirably bear you know that I don't

tolerate victim mentality complexes and

so I know that there's no room for that

to be here if you have this mentality

and you like to blame your problems on

other people then kink and BDSM is not

right for you at this time because it's

just not face to me I feel people really

get hung up on the definition of being

submissive and while someone is

submissive to their partner it doesn't

mean that they can be weak or gospel or

meet because a lot of the submissions

that I know are extremely alpha they run

their own businesses like me they are

end of their practice whether it there

are doctors or lawyers or they are

stay-at-home moms who run the household

so well with three plus kids being

submissive get the bad rap because there

isn't an adequate word to describe who

we are the best way that people have

come to describe the other half was like

the Union yang is submission

so to answer this week's question of

what it means to be submissive but most

basic definition out there in the kink

world is that as a submissive you have

the desire for someone else to take

charge of the relationship or you have

the desire to have someone else call the

shots now

how much do you want someone to take

control or to call the shots or to leave

that is entirely up to you and your

partner to discuss let me give you some

examples of both in the bedroom and out

the bedroom because you may just be

interested in being submissive in the

bedroom to start and that's where you

feel most comfortable and then you may

find out that you and your partner

naturally have a possibly BS

relationship and want to pursue it

outside the bedroom so let me get all

the bases covered when you're submissive

in the bedroom and use that you like to

be on the bottom you like to be told

what you do you possibly like to get

pinned down so that your hands are bound

so that you don't have to worry about

whether or not you're pleasing your

partner well enough I know like for a

lot of people like me when we're in the

bedroom we're constantly worried

are we doing enough to clean their

partner are we doing a good enough job

is this adequate and so it's naturally

not because they're insecure it's

because we want to make sure that our

partners are happy and that we hold

ourselves to an extremely high standards

when you let someone else take control

the bedroom instead of your mind

worrying you can let go and relax and

have fun and enjoy the sensations of

what it means to have sex you instead of

worrying non-stop outside the

drunk i like to use food as an example

because its most widely understood and

can be easily adopted two different

areas of your life so to be submissive

in a relationship outside of the bedroom

an example with food could be you can

negotiate with your partner that you

don't want to decide what to cook or eat

for dinner every week

sure i have preferences and I have what

I like but i love all food so it's not a

big deal and if i do have preferences

but I feel like I want to eat italian

one day then ya say something and talk

to my partner

it's not a big deal but the stress and

pressure is off of me

in general I want to say this to make it

super clear you don't have to go all in

when you're in a d/s relationship you

can go in ten percent you can go on one

percent you can even just choose one

aspect of your life to be submitted in

because while diving in the deep end

sometimes is a good thing when it comes

to exploring a d/s relationship for the

first time between you and your partner

taking small steps is the best way to

figure out what works and what doesn't

so a lot of you and your partner watch

it and so long as you and your partner

or happy that's all that matters

and i also want to drill the sin being

submissive does not mean you can't think

for yourself

I know I can take care of myself i know

that i'm a very very independent and

self reliable person and I don't need to

be in a relationship with someone else

call the shots because let's be real

as an entrepreneur I call the shots

every day so I know how to call the

shots people who know they have control

over what happens in their lives live

such a more empowered life and it makes

the d/s relationship so much more

fulfilled

so what you think is being submissive in

the bedroom or out of the bedroom

something that appeals to you what

questions you have about it hit me up in

the car

and below and don't forget to a kinky if

you enjoy this episode shown some love

by subscribing to our Channel liking our

Facebook page signing up for email list

and following on Instagram you don't

step back to do that does not make any

sense

For more infomation >> What is Submissive - BDSM101 - Duration: 6:51.

-------------------------------------------

One-Year Mission: A Year In Space. Man overboard - Episode 5 @ Science - Duration: 26:28.

A spacewalk, also called Extravehicular Activity, or EVA, is by far the most dangerous type of work on the ISS.

And today we will tell you how the cosmonauts prepare for this work and why they need to go outside in the first place…

You'll see where these temperature and radiationresistant space suits are made

and also how the crew recover after these difficult and demanding activities.

An acrobatic flip, just for you…

While we are used to calling it a "walk" in space, EVA is actually a practical necessity.

Without this work it would have been impossible to build the ISS and maintain it successfully for so many years.

Installation of new modules and equipment, a wide variety of scientific experiments and station repairs all require regular trips into the open space.

We will be going outside in our Russian space suits called Orlan-MK, which are now being prepared for donning.

Here on the inside you can see the life support systems. This blue layer is a liquid cooling garment that we wear inside the suit.

And now we are adjusting the size to fit each cosmonaut individually by using these straps to change the length of suit's arms and legs.

And we also choose gloves to fit.

In outer space human body can survive unprotected for less than a minute, exposed to temperature extremes

from minus 120 degrees Celsius in the shade to plus 140 in the sun, as well as vacuum and radiation.

Space suits allow cosmonauts to not only survive in such hostile environment but also to carry out scientific research and construction work.

Russian space suits are made at the Zvezda factory, based near Moscow.

This facility was kept top secret for a long time, while it manufactured some of the very first space garments,

including the one worn by Yuri Gagarin and the one worn by Alexei Leonov during the first spacewalk in human history.

A man has gone into space, a man has gone into space!..

From the time of those first spacewalks the design of space garments has, of course, evolved greatly,

and today an Orlan suit is an autonomous system that allows for up to 7 hours of working outside the space station.

Beginning to lift! Number three.. – Number three ready! – Close the hatch and lift platform to 550.

Vladimir, once again – how are you feeling?! – Ready to begin the experiment.

Before an Orlan suit is sent into space it goes through a multitude of checks and tests, both during the manufacturing stage and after the final assembly.

Each Orlan suit can be used for up to 15 spacewalks. All maintenance is performed on board so there's no need

to send the suits back to Earth between EVAs. Adjustable design means one suit can be used by two cosmonauts of different height and body type.

We store our space suits right here in the airlock that we use to go outside.

Before each EVA we follow a preparation sequence which includes opening the suits,

checking all systems, refilling oxygen bottles – both main and reserve, as well as lithium hydroxide canisters that remove carbon dioxide during a spacewalk.

We also install fluid collectors and new batteries. The suits are completely autonomous thanks to these special batteries that power all the systems inside.

I will now tell you a bit more about the preparation sequence.

On the back there is a door through which we get inside the suit.

One of the things we must inspect is this Liquid Cooling and Ventilation Garment, or LCVG, which regulates body temperature.

This is our communication helmet, and inside here are the glove liners… As for our suit gloves – we try to use a new pair every time, just to be on the safe side.

Most of the life support equipment is located under this cover here on the back panel.

And down there is where we will soon be installing the battery. Next to it is the main oxygen bottle,

and at the top here is the reserve one, together with lithium canister, fluid collector and cooling system water tank.

A space suit is like a thermos – impenetrable to both heat and cold, so without a special cooling garment it would be impossible to wear it for a long time.

When checking the Liquid Cooling and Ventilation Garment we must ensure that all this tubing is intact.

These inlet and outlet umbilicals connect the garment to the suit, and allow chilled water to circulate around the body, cooling it down.

There is also an option to warm up, if necessary, by adjusting the water flow with a special regulator located on the front.

And this is how it connects to the water cooling system…

Every cosmonaut is issued with a garment in their individual size, to ensure a good fit.

Also during preparation we must eliminate all air bubbles out of the water system… And this, for example, is an oxygen bottle, ready to be installed…

It will last for up to 8 hours of work. Reserve bottle is there for emergencies,

like if there is a tear in the suit we can use this table here to determine how long the reserve bottle will last – if a tear is small,

for example, and pressure is 400, one reserve bottle will give us 30 minutes, which is usually enough to get back to the airlock, close the hatch and re-pressurize it.

Preparation for each spacewalk takes about three weeks and includes multiple suit inspections,

setting up of the airlock, configuring the systems and equipment that will be used outside…

Everything is checked down to the smallest detail because the price of any mistake would be much too high.

We are now performing a pressure check on the suits.

They are all set up for the actual EVA, with necessary tools and equipment attached, and we are now pressurizing them to the required level...

– I have 0.2. – Great, let's run a check for any leaks now.

As part of their preparation Gennady Padalka and Mikhail Kornienko will run simulations of various planned and emergency situations.

Outside in the vacuum of space they must be ready for anything unexpected.

Today we have put together this tool set that we will be taking outside with us.

I know it looks a bit chaotic, but everything is actually very organized.

This tool box can be opened when wearing suit gloves...

And the tools inside, like this one, for example, are all attached to the special retractable tethers.

We have three collector blocks here that we will use outside to take samples of the exhaust from the Electron system valves and also from the station's engines.

These samples will then be sent back to Earth for analysis.

Also there is another little device attached to the outside of the tool box here – with these cleaning discs – for wiping the windows from the outside.

During the many years up in orbit the windows have accumulated a thin film of oily build-up of the engines' exhaust residue, and we will need to remove it.

And this is another tool set that we have prepared today. It contains special scissors for cutting cable,

some extra cable on a spool, and a spare antenna that we will be replacing outside…

Also there's a variety of fixtures and different clamping elements, very technical stuff… So these two packs are now ready to go.

And now we'll show you some of the equipment that is installed onto the suit before an EVA, including tethers, tools and so on…

This is the so-called Orlan Tethering Adapter that gets fixed firmly onto the front of the suit here, with this swing arm attached to it.

Then we install a small tool case onto the swing arm – to hold a variety of tools we will need to use, like this spanner, a cable plug,

a ratchet wrench for tightening nuts and bolts, all designed to be used while wearing gloves.

There's a selection of different size carabiners on retractable tethers so that things don't fly away.

For example we can attach it to a piece of equipment that we are installing, and then,

after installation's complete, we remove it. These big ones here are for larger equipment.

Another important tool during an EVA is a camera. It is attached to the suit right here on the front and it records everything we do outside.

To protect it from temperature extremes the camera is placed into this special housing, covered by a layer of screenvacuum thermal insulation, or SVTI.

Each suit has a camera like this, and also another one is usually installed on the helmet.

In addition to this, our spacewalk will be closely monitored by external cameras, located throughout the outside of the station

in places like Canadian manipulator arm, on the trusses and so on.

This camera can be used for both recording video and taking photographs. And, of course, it has its own little retractable tether.

This Velcro patch keeps it attached to the suit.

During an EVA it is installed up here, to allow for a better view of the work being performed.

I will now try to show you the pathways and working zones of this upcoming spacewalk.

We will go outside through Exit Hatch 1 of the Russian Orbital Segment, towards these railings, which will be used for tethering our tool bags and equipment.

You can also see the solar panel, where a flexible handrail will be added.

And from there we will be moving on towards the far end of the Service Module, where some antennas will be installed.

Right over there is where we will be working.

We can't see the other side of the Service Module from here but that's where the window is located that we need to clean.

Thousands of amazing photographs and videos are recorded through the windows of the Service Module.

Cleaning one of them is, of course, only a small part of this spacewalk's mission, which has been planned and prepared for well in advance back on Earth.

Shall we leave it like that?! – Yes..

Star City's hydrolab has a full-size mock-up of the Russian Orbital Segment submerged in a large swimming pool.

The underwater modules are the exact replica of the ones up on the ISS. EVA simulations here follow the mission plan of the actual scheduled spacewalk.

Weights are attached to the suits to help the cosmonauts achieve neutral buoyancy.

For every real-life spacewalk there are three training simulations in the hydrolab.

I can't even imagine going out into open space without practicing space suit operations under water first. It is all an integral part of our training, and it helps a lot!

Gennady Padalka, who is a more experienced spacewalker, is the first to exit the hatch.

It's his tenth EVA, while for Mikhail Kornienko this is only a second trip outside.

Cosmonauts tether themselves to the handrails as they move along their path.

Each suit has a couple of safety tethers, 1.5 and 2 meters long – a good safeguard against any undesirable journeys.

Even the slightest push against the hull can send you floating away, so you have to quickly grab onto the railing, which means extra effort.

If necessary, the medical team can give us some recovery time,

as we must preserve our strength to ensure we have enough energy for the entire duration of the spacewalk.

Mikhail Kornienko is approaching the window that requires cleaning. On the inside his crewmates are already standing by with a camera.

He is using a special cleaning tool to remove an oily film from the surface of the glass.

This film is a residue from the station's engines exhaust. Only a few minutes of cleaning – and the space dirt is gone!

All operations performed during an EVA are planned ahead down to the smallest detail.

They mainly include maintenance, installation of antennas and handrails, replacement or adjustments of external equipment.

Nothing grand, some might say, but without this work normal life on the ISS would be impossible.

In addition, Gennady Padalka and Mikhail Kornienko are following the program of the one-year expedition.

They take lots of photographs for a variety of experiments, collect samples to be sent back

to Earth for analysis, uninstall retired equipment and send it off on its own…

This video, recorded by the crew, shows how the station enters the Earth's shadow. At this point the temperature drops more than 200 degrees Celsius.

During this spacewalk the ISS made three full revolutions around our planet.

Gennady Padalka and Mikhail Kornienko accomplished all of their tasks ahead of schedule, spending a total of 5 hours and 34 minutes in the open space.

Inside the station Mikhail and Gennady are welcomed back by another Russian cosmonaut Oleg Kononenko.

We will get to know Oleg in the next episode of "A Year In Orbit" and see him participate in an experiment involving robots.

And for now – have a look at how these conquerors of open space are relaxing after all their hard work.

As you will see, even being very tired, they are always ready for all kinds of endeavours…

An acrobatic flip, just for you…

And this way too…

And some pull- ups…

On one arm!.. Now can you beat that?!

For more infomation >> One-Year Mission: A Year In Space. Man overboard - Episode 5 @ Science - Duration: 26:28.

-------------------------------------------

Who litters? Why? And how much is it costing you? - Duration: 1:24.

Transportation is asking for

your help to reduce litter along

highways.. It's a costly

problem from the taxpayers

and ODOT says the solution to

this major problem is simple.

First News reporter Alex George

is live at the salt dome in

Youngstown with what

you can do. [D10]20170215 ODOT

LITTER 5A-SG

[D11]20170215 ODOT LITTER

5A-LIVE.

Last year ODOT spent 4 million

dollars picking up other

peoples trash..

That's money that could be spent

to pave a 28 mile two lane road

OR nearly 30

NEW plow trucks. [D12]20170215

ODOT LITTER 5A-VO

State wide they picked up 400-

thousand bags of trash.

More than 25-thousand bags of

trash were collected in Trumbull

and

Mahoning counties. Not only is

it costly, but they have to pull

their crews from doing other

things such as road repair..

And they say the solution is

simple.. Don't throw things out

of your window.

[D13]20170215 ODOT LITTER 5A-SV

"ALSO IF YOU'RE HAULING

SOMETHING WHETHER IT BE A

TRASH HAULER OR JUST SOMEONE

WITH ITEMS IN YOUR PICK UP

TRUCK OR ITEMS IN YOUR CAR. MAKE

SURE YOU ARE SECURING THAT

LOAD SO THAT THE DEBRIS DOESN'T

FALL OUT ONTO THE ROADWAY."

ODOT relies on adopt a highway

groups to help pick up trash

across the buckeye

state. [D14]20170215 ODOT LITTER

5A-LIVE

Coming up in the 6 o'clock I'll

explain how that group works

and how you can get involved.

Live in Youngstown - Alex George

First

News this morning. [D15]20170215

PA WOLF EDU-RDR

Pennsylvania Governor Tom Wolf

is trying to sell his early

childhood education

programs. The governor wants to

For more infomation >> Who litters? Why? And how much is it costing you? - Duration: 1:24.

-------------------------------------------

Alix Chadwell discusses research that she is to present in Parliament - Duration: 2:04.

For more infomation >> Alix Chadwell discusses research that she is to present in Parliament - Duration: 2:04.

-------------------------------------------

Donald Trump is the 'poster child of sleep deprivation': Arianna Huffington | CNBC International - Duration: 7:31.

I just want to ask you now,

because you talked about,

obviously, the Huffington Post

and, even though you're not

there any more,

I'm sure that you're a very

keen observer of what's

happening in the news in terms

of social media

and fake news.

So what are the challenges now

with fake news?

How do media organizations

overcome that?

Well, we have the challenge

that people now trust

their peers more than they

trust established media

institutions and that

more and more people,

over half the people,

get their news from social

media.

But also it's very important to

remember that fake news is not

a new phenomenon.

Let me take you back to

the year before the invasion

of Iraq.

The fake news

then was on the front page

of The New York Times,

in stories by Judith Miller,

about their weapons of mass

destruction programs in Iraq.

All of them entirely fake.

And then they were amplified

on the morning Sunday shows

and by administration

officials.

But at the time they were

reporting

on what they were being told by

the administration.

But that's fake news because

the reporting- becoming a

mouthpiece for the

administration is promoting

fake news. And look at what it

led to. It led to the

most tragic foreign policy

mistake of the Western world in

our lifetime,

because a lot of the

consequences that follow that

we reading about every day in

the papers now including ISIS,

were the result of that

incredible destabilization

of the region because of

the invasion of Iraq

based on entirely fake

news, we should never forget

that.

So we've talked about that

relationship with fake news and

the administration that that

you're saying,

Arianna, bu what about the

administration now in the U.S.

with President Trump?

Because there's the

fake news, or is there, the

dossier that's being talked

about, the relationship that

he's having now with media

outlets. It's unprecedented.

He's accusing networks

and it's never happened before.

What do you make of it?

Well two things.

First of all Donald Trump

should be separated from his

phone at night.

Get a full night's sleep and

stop tweeting in the middle of

the night.

Yeah, because he's tweeting at

3 a.m.

Exactly. He's the poster child

of sleep deprivation.

He's exhausted.

How do you think it's affecting

him?

It's definitely- you can see

it's affecting him!

In what way?

It's affecting him in the sense

that,

even after he won,

he was basically taking

the bait constantly.

You would have thought after

your win you can just relax,

you're on top of the world,

you're going to be President of

the United States in a few

days.

And it's really

the opposite of my

greatest hero,

Marcus Aurelius who was Emperor

of Rome and a stoic

philosopher.

And really these are like two

examples,

polar opposites,

of leadership.

One is kind of unflappable

in the presence of any dangers,

accusations and leading

from a very centered,

responsible place and

the other, unfortunately,

is being affected by every

negative tweet and

portrayal on Saturday Night

Live that he doesn't like

and every thing

kind of makes him upset.

And I promise you, if he got

eight hours sleep

and did not

to eat in the middle of the

night, the next

four years it would be

infinitely better for the

world. So I highly recommend

that his advisers take the

phone away.

It was interesting because I

did see some

tweets that he directed

at you personally,

back in 2012,

and they were very harsh.

They- they were real personal

attacks on you.

But that's his style.

You know, that doesn't mean

anything. You know, he always

attacks people.

I think- right now I think

he has an opportunity to tap

into the best Donald Trump

there is.

Because I think we all have the

better angels of our nature and

the worst part of ourselves,

and we all have an interest for

him to tap into that part

because he is now the

president.

And I think it's incredibly

important for people,

good people,

to accept to be in his

administration. I'm a believer

in that because the more he

is surrounded by people who can

influence him in the right

direction,

the better off the world will

be. He- and

I also think on behalf of the

media,

it's terribly important that

they do not succumb

to stories and publish stories

as BuzzFeed did publish the

dossier before they verify

them. Because

otherwise the media are going

to lose their credibility when

they are real stories they

want to address and

they want to criticize the

administration on.

If you'd been at the Huffington

Post and the dossier had come

out would you have published?

Absolutely not.

Because nobody has been able to

verify it.

That's why CNN did not publish

it. That's why the New York

Times did not publish it.

Otherwise we fall into

the trap that happened during

the Obama years when the

right-wing press would

publish anything against Obama.

You know, that's how the

birther controversy started.

'He was not born in the United

States' - completely,

completely fake news

that was published by

his opponents because

they wanted to believe the

worst about him.

Arianna, do you think,

going back to the theme of

responsible leadership,

President Trump will be a

responsible leader?

We do not know.

We have a lot of reason to

worry,

and I believe now

he needs to be judged by

everything he does and not by

what he said during the

campaign.

And just finally,

what's next for you,

besides a good night sleep

tonight.

Well a great day ahead in Davos

that I'm really looking forward

to.

And I'm really looking

forward to what's next for

Thrive Global.

We are expanding around the

world with just closed joint

ventures in Italy, in India

with the Times of India,

in South Africa,

in Eastern Europe,

in Russia,

in Turkey.

The stress of-

the stress and burnout

pandemic is everywhere.

It's truly global and it's

having a huge impact on

both individual lives,

corporations and countries.

I mean, 75 percent

of our healthcare costs are

because of stress related,

preventable diseases.

So we need to address this head

on, it's a real public health

crisis.

And I'm definitely committed to

devoting the rest of my life to

it.

Still watching?

Perfect.

Click here to watch another

great video from CNBC

international.

Oh, and don't forget to

subscribe.

Thanks for watching.

For more infomation >> Donald Trump is the 'poster child of sleep deprivation': Arianna Huffington | CNBC International - Duration: 7:31.

-------------------------------------------

Mohraad ka Hathi Naach || ELEPHANT'S DANCE Sirmour - Duration: 3:15.

For more infomation >> Mohraad ka Hathi Naach || ELEPHANT'S DANCE Sirmour - Duration: 3:15.

-------------------------------------------

Glutathione Reductase, B Vitamins, and Glucose | Masterclass With Masterjohn 1.10 - Duration: 21:57.

Hi. I'm Dr. Chris Masterjohn of

chrismasterjohphd.com, and you are

watching Masterclass with Masterjohn.

And today we are in our tenth in a

series of lessons on the antioxidant

defense system. And what we're going to

be doing today is looking at how

glutathione transfers the burden of

supplying reducing power from the

antioxidant system to the system of

energy metabolism, and in doing so

implies everything that supports the

system of energy metabolism as equally

important to the antioxidant system as

everything in the antioxidant system.

Shown on the screen is a mini diagram

summarizing this principle. So 2 GSH can

be oxidized to form GSSG and the system

of energy metabolism is what recycles

GSSG back to GSH. Where this happens is

in an enzyme called glutathione

reductase; and in the diagram on the

screen glutathione reductase is shown in

blue and it is abbreviated GR. Glutathione

reductase requires two B vitamins for its

function. First of all, riboflavin

is connected to the nucleotide ADP in a

larger structure called FAD. And FAD can

carry two electrons and two hydrogen

ions. When it's carrying them, it's called

FADH2. We do the same thing for another

energy carrier called NADPH, and here we

have the B vitamin, niacin that's

connected to ribose, and ADP, and is

phosphorylated, and that's NADP+

when it's loaded with two hydrogen ions

and two electrons, it becomes NADPH and

one of those hydrogen ions is leftover

being carried in solution alongside it

ready to react with it.

Niacin is vitamin B3, riboflavin is vitamin B2.

Now NADPH is a diffusable energy carrier

that is not connected to the glutathione

reductase enzyme; whereas FAD is

covalently bonded to glutathione

reductase as what we call a prosthetic

group. If you imagine that you have a

prosthetic joint, that new hip is part of

you right, so FAD is the prosthetic

group of the glutathione reductase enzyme

and is part of the enzyme, it never leaves. So we could

say that the glutathione reductase

enzyme represents the interface between

the system of energy metabolism and the

antioxidant system. Glutathione is

properly part of the antioxidant system,

NADPH is properly part of the system

energy metabolism. It's carrying energy

from the system of energy metabolism,

bringing it to the glutathione reductase

enzyme, and FAD is standing at the

interface transferring that energy from

NADPH to glutathione. So the way this

happens, NADPH dumps off its reducing

power, FAD picks it up becomes FADH2,

FADH2 drops it off to GSSG, splits

that apart, reduces the sulfhydryl groups,

and generates 2 GSH. In order to

understand how NADPH is deriving the

energy from the system of energy

metabolism, we need to talk about what

NADPH is in a little bit more detail. Now

previously we talked about how we can

measure the reducing power of the

glutathione pool based on its redox

status measured in millivolts and the

more negative the number, the greater the

reducing power. And we talked about how

that was dependent on the concentrations

of glutathione and GSSG and their ratio.

We can apply that same principle of

redox status to looking at these energy

carriers such as NADPH, NADH, and FADH2;

And the first way

we can do that is to talk about their

standard redox potential, which is a way

of looking at the intrinsic reducing

power of the molecule itself. And when we

look at standard redox potentials, the

assumptions are listed at the bottom of

the screen, and they assume that we have

equal concentrations of the reduced and

oxidized form, technically one molar of

each; and they assume particular

temperature, pH, atmospheric pressure, and

so on.

We don't really care for the purposes of

this lesson about any of that stuff,

except to say that when we measure the

standard redox potential we are trying to

look at the intrinsic reducing power of

a molecule independent of its

concentrations.

So when we do that, we see that NADPH

and NADP+, has a standard redox

potential of negative 320 millivolts. NADH

and NAD+ has the same exact standard

redox potential, and the only

difference between those two molecules

is that NADPH or NADP+ has a phosphate

group added to it. So to say that the

intrinsic reducing power of each of

these redox couples is identical, is to

say that this phosphate group has no

effect on the intrinsic reducing power

of the molecule. If we compare them to

FAD, then FAD has a significantly less

negative reducing power. It has negative

two hundred twenty millivolts for a

standard redox potential. So if FAD

is less reducing, then it's not very

surprising that in the glutathione

reductase enzyme, the electrons flow from

NADPH, the more reducing of the two, to FAD, the

less reducing of the two. And then to

glutathione, even less reducing of the

three. The significance of the phosphate

on NADP is it allows our bodies to

regulate the pool of NADPH differently

from the pool of NADH. And to use a

totally different set of enzymes to

metabolize each one of those.

And so it allows a functional split

between the two redox couples, and the

NADP is typically maintained with, if we

take the cytosol of hepatocytes as an

example, liver cells, the NADP+ to NADPH ratio

tends to be about 0.1. That means there's

ten times more NADPH then NADP+. By

contrast, NAD+ to NADH ratio, in the same

compartment, tends to be about a thousand.

That means there's a thousand times more

NAD+ than NADH. That's a 10,000 fold difference

between the two ratios, where NADPH is

maintained primarily in the reduced form,

and NAD+ is maintained primarily in the

oxidized form. And what that does is

allow a split in functional purposes

where NADPH is used for reductive

anabolic purposes, and NAD+ is used for

oxidative catabolic purposes. That means

when we're breaking things down we're using

NAD+, and when we're building things up or when

we're recycling things, we're using NADPH.

Now this is going to be reflected in

their actual redox status. What I cited

before was the standard redox potential

that assumed equal concentrations one

molar of each. That's not the

concentrations that we find in liver

cells. And so just like we were talking

before, about how the cell can have

different redox status for different

pools of glutathione in different

compartments and those can change over

time based on the concentrations. The

same thing is true of NADPH; its true

redox status is going to depend on its

concentration at that moment, and it's

going to be very reducing. NAD+, its

true redox status is going to depend on

its concentration at that moment and

it's going to be very oxidizing. NADPH is

primarily getting its reducing power

from glucose through a shunt that is

split off from glycolysis. Shown on the

screen is a basic overview of what

happens in glycolysis. We have 10

enzymatic reactions that split the

glucose molecule in half, and oxidize it

to two molecules of pyruvate. Since those

molecules of pyruvate are oxidized,

what's doing the oxidizing is NAD+,

the oxidizing agent, the agent that splits

things apart like glucose is getting

split in half; and NADH is taking those

hydrogen ions and electrons and carrying

them to the electron transport chain to

produce ATP.

However, in glycolysis, we have the

opportunity for a shunt. And this term

shunt is taken from engineering. And if

you have a circuit where you leave the

circuit and you come back to the circuit,

that's a shunt. And so this can be called

the pentose phosphate pathway because

it's where we get pentose phosphates, or it

can be called the hexose monophosphate

shunt, because we take hexose phosphates

make pentose phosphates, and then

rearrange them and send them back to

glycolysis. And when it operates in that

closed circuit that's a shunt that

leaves glycolysis and comes back to

glycolysis. Whether you call it the hexose

monophosphate shunt, or the pentose

phosphate pathway, it's the same thing.

In this, which is summarized on the

screen, we're taking hexose phosphates to make

this is six-carbon sugar to make a

pentose phosphate which is a five-carbon

sugar. In the process, we're removing one

carbon dioxide and instead of oxidizing

the molecule with NAD, we use NADP+,

and in doing so, we make NADPH. And the

two NADPH that are formed in the

conversion of one hexose phosphate to a

pentose phosphate, is the major

overwhelmingly primary source of NADPH

in the cell. Now pentose phosphates serve a variety of

purposes. Our demands for five carbon

sugars include the ribose of RNA, the

deoxyribose of DNA, the five carbon sugars

are also found in all these energy

carriers that we were looking at before

like NAD, and FAD, ATP, NADP, coenzyme A,

which is a vitamin B5 derived molecule

that's shuttling around two carbon

units and other molecules. So we're

actually deriving two functions from

this pathway. One is to get NADPH, and

one is to get pentosases. The reason it

operates as a shunt is because what

happens when you need NADPH, but you

don't need any pentoses? NADPH is used not

only for the recycling of glutathione,

but also the recycling of folate, and the

recycling of vitamin K, and for the

synthesis of all kinds of things:

nucleotides, cholesterol, fatty acids.

So many processes rely on NADPH, that our

needs for it are higher than our needs for the

pentoses. So what happens is when we don't

need the pentoses, what we do is just

send them back to glycolysis. Summarized on

the screen, we can have six pentoses if we

arrange them into four hexoses and two trioses.

We can send the hexoses back to

glycolysis here, we can send the trioses

back to glycolysis here, and all of those

can undergo the subsequent metabolism to

pyruvate, and we were able to gain NADPH

out of that process. So, if we need a lot

of NADPH, and we don't need a lot of

pentoses, we just continually operate

this in a shunt and go back-and-forth,

back-and-forth, back-and-forth producing

NADPH every time you run the cycle. The

regulation of this pathway is primarily

dependent on our need for NADPH, because

when we use NADPH at a high rate, it

could, it gets converted to NADP+. NADP+ is a

reactant in the conversion of hexose

phosphates to pentose phosphates, and the

rate of a chemical reaction is always

directly proportional to the

concentration of reactants. And so we have,

when we have more NADP+ that alone

is sufficient to drive this reaction

forward at a greater rate, and to make

more NADPH whenever we need more NADPH.

So to summarize what this means,

glucose is the ultimate antioxidant

because it is providing the reducing

power that used to recycle glutathione.

Glucose donates reducing power to NADP+,

itself becoming a pentose and converting

NADP+ to NADPH. NADPH donates reducing

power to FAD on the glutathione

reductase enzyme.

FAD becomes FADH2, and that enables the

glutathione reductase enzyme to take

GSSG and convert it to 2 GSH, then GSH can

continue to support all of its roles in

the antioxidant defense system. Now this

doesn't necessarily mean

that more carbohydrate is better. And

that's because when you have an excess

of carbohydrate beyond your capacity to

store it as glycogen, you convert the

carbohydrate to fat, and the conversion

of carbohydrate to fat, called de novo

lipogenesis, consumes NADPH. What's shown on the

screen is, uh I love the title of this

study, it's called: "Glycogen storage

capacity and de novo lipogenesis during

massive carbohydrate overfeeding in man."

And what they did in this study was they

took people, they put them on a

low-carbohydrate diet and exposed them to

a lot of high-intensity exercise. That

brought their glycogen stores down as

low as it could possibly go, and then

they switched them to an eighty-six

percent carbohydrate diet, that was it

wasn't just high-carbohydrate, it was

hyper caloric, so well beyond their

normal needs for calories, such that the

total amount of carbohydrate in the

diet exceeded their total needs for

calories.

And what you can see is that, over the

first couple of days what happens is

first of all, they start burning all of

their energy as carbohydrate. You can see

they're burning 500 grams a day, 500

grams a day of carbohydrate, that's like

2,000 calories. So they're deriving most

of their energy from carbohydrate and

they're starting to put the excess in

glycogen. You can see, over the course of

day three to day seven, glycogen storage

capacity tops off and after day 7

they're not storing anything else in

glycogen because it's full. As glycogen

starts to get maybe a third full, or

between a third and a half full,

de novo lipogenesis starts happening;

and it starts increasing as the glycogen

storage gets full. Once the glycogen storage

gets full, de novo lipogenesis just takes over.

So whatever they, whatever they can burn

for energy they burn for energy, and all of

the excess gets converted to fat. Now the

study that I showed on the screen is

extreme.

I can't think of many situations in real

life where your total carbohydrate

intake would exceed your total need for

calories. I can think of maybe a food

eating contest where you eat as many hot

dogs as you can that have a lot of hot

dog buns, and I can think of some tribal

rituals of intentional fattening; but for

the most part, when people are operating

in a eucaloric diet or a slight caloric excess,

de novo lipogenesis is a minor

pathway. If you take people on a standard

American diet, they're making one to two

grams per day of fat from carbohydrate.

That increases to three to six grams for females,

during certain parts of the menstrual

cycle, and if you look at obese people or

people with certain diseases, that

you can maybe get up to three to six grams per

day with those conditions as well. If you

were to eat a very high carbohydrate

diet, such as a 70-percent carbohydrate

diet, and it's not hypercaloric, you can

probably push de novo lipogenesis up to

10 grams per day. I don't know of any

evidence that that in and of itself

compromises antioxidant activity, but

certainly you could say that if you're

in the range were you are increasing

de nova lipogenesis with increased

carbohydrate intake, then it's unclear

whether you're getting any net benefit

to NADPH, given the fact that you're

consuming it in the process of de novo

lipogenesis. In addition, the more

carbohydrate you have, the more insulin

you have. And when I say insulin, I mean

the higher the ratio of insulin to

glucagon. And when you have a higher

ratio of insulin to glucagon, you have

high levels of intracellular insulin

signaling that cause you to burn

carbohydrate for energy. And you do that

through glycolysis. So insulin is causing

the downstream metabolism of glucose to

pyruvate, which actually detracts from the

glucose available for the NADPH

production. If you restrict carbohydrate,

you're going to have lower insulin

signaling, so you're going to get less

conversion of glucose to pyruvate, and

that's going to preserve hexose

phosphates for the production of pentose

phosphates, and for the production of

NADPH. Additionally, when you're

restricting carbohydrate, you have other

sources of glucose and that's mainly

amino acids, and most textbooks will only

tell you about amino acids. Maybe ten

percent of your needs during this time

are being met by fatty acids, but in the

process of gluconeogenesis you take

amino acids or fatty acids and you make

glucose. That glucose is now available for the

pentose phosphate pathway. So glucose is

the ultimate antioxidant, but there's

probably a very wide range of

carbohydrate intakes that would allow

you to have enough glucose for the

pentose phosphate pathway because when

you restrict carbohydrate, even to the

degree that we would call it a

low-carbohydrate diet, you have

gluconeogenesis that allows you to get

more glucose and you have a decrement

in insulin signaling which preserves

glucose for the pentose phosphate

pathway. On the other end of the spectrum,

when you provide more glucose, you

have more dietary glucose available for

the pentose phosphate pathway, but you're

also increasing insulin causing you to

burn it for energy. And eventually you

get to the point where you're increasing

the conversion of carbohydrates to fat

which itself consumes NADPH. So what is

the optimal amount of carbohydrate?

I don't know the answer to that, but I suspect

that there is none in the sense that

there's probably an extraordinarily

large range of carbohydrate intakes that

can support the pentose phosphate

pathway, and it's only at the extremes of

either intake where you can start to

develop a problem. However, insulin

signaling itself plays an independent

role in increasing glutathione synthesis as

discussed before. So carbohydrate intake

is going to be more important to

antioxidant defense because it provides

the signal of insulin to make glutathione.

And variations of carbohydrate

intakes across the spectrum of what most

people are eating are probably going to be

much less important as influencers of

the glucose available for the pentose

phosphate pathway. Nevertheless,

we can look at things like niacin and

riboflavin and see that they are making

critical contributions to antioxidant

status. In the next lesson, we'll also come

back to look at how thiamine is another

B vitamin that's important for

supporting the pentose phosphate pathway

and energy metabolism in general. And

how even ATP production and everything that

supports that is critical to the

antioxidant defense system.

Alright, I hope you enjoyed this lesson.

Signing off, this is Chris Masterjohn of

chrismasterjohphd.com. And you have been

watching Masterclass with Masterjohn.

For more infomation >> Glutathione Reductase, B Vitamins, and Glucose | Masterclass With Masterjohn 1.10 - Duration: 21:57.

-------------------------------------------

This is the Fruit That Will Make Your Liver 20+ Years Younger ! - Duration: 2:22.

This is the Fruit That Will Make Your Liver 20+ Years Younger !.

The liver is an organ that if treated unproperly can affect the entire body and lead to serious

illness.

With the help of vitamin K, the liver produces proteins that are important in blood clotting.

It is also one of the organs that break down old or damaged blood cells.

The liver plays a central role in all metabolic processes in the body.

In fat metabolism the liver cells break down fats and produce energy.

The liver can regenerate on it's own.

It's a strong and very important organ in our bodies.

Treating it right and keeping it healthy isn't hard at all.

There are so many diseases and illnesses you can be diagnosed with if you haven't taken

take care of this organ.

Usually eating a bad diet, being overweight, excessive alcohol consumption, and even some

medications can damage the liver and lead to even worse problems.

The tamarind fruit is great for eliminating fat in your liver and can treat almost all

liver problems.

The fruit will detox your body, improve your digestion, protect the liver, lower cholesterol,

cure any problems with the bile and improve your overall health.

Here's how to use it to heal fatty liver disease and hepatitis:

Put 2 handfuls of peeled tamarind and put them in a blender with a liter of water, then

mix well, strain the mixture and drink the liquid during the day.

To prepare tamarind tea, put 25 well-washed tamarind leaves in a pot with 1 l. of water,

then boil the mixture for 15-20 minutes and leave it to cool down afterwards.

Add some honey and brown sugar if you like, although we recommend drinking the tea unsweetened.

Drinking it twice a day (in the morning and evening) will cure any problems with your

liver and improve your health.

For more infomation >> This is the Fruit That Will Make Your Liver 20+ Years Younger ! - Duration: 2:22.

-------------------------------------------

Where is cybercrime really coming from? | Caleb Barlow - Duration: 14:28.

Translator: Leslie Gauthier Reviewer: Camille Martínez

Cybercrime is out of control.

It's everywhere.

We hear about it every single day.

This year,

over two billion records lost or stolen.

And last year, 100 million of us, mostly Americans,

lost our health insurance data to thieves -- myself included.

What's particularly concerning about this is that in most cases,

it was months before anyone even reported that these records were stolen.

So if you watch the evening news,

you would think that most of this is espionage or nation-state activity.

And, well, some of it is.

Espionage, you see, is an accepted international practice.

But in this case,

it is only a small portion of the problem that we're dealing with.

How often do we hear about a breach

followed by, "... it was the result of a sophisticated nation-state attack?"

Well, often that is companies not being willing to own up

to their own lackluster security practices.

There is also a widely held belief

that by blaming an attack on a nation-state,

you are putting regulators at bay --

at least for a period of time.

So where is all of this coming from?

The United Nations estimates that 80 percent of it

is from highly organized and ultrasophisticated criminal gangs.

To date,

this represents one of the largest illegal economies in the world,

topping out at, now get this,

445 billion dollars.

Let me put that in perspective for all of you:

445 billion dollars is larger than the GDP

of 160 nations,

including Ireland, Finland, Denmark and Portugal,

to name a few.

So how does this work?

How do these criminals operate?

Well, let me tell you a little story.

About a year ago,

our security researchers were tracking

a somewhat ordinary but sophisticated banking Trojan called the Dyre Wolf.

The Dyre Wolf would get on your computer

via you clicking on a link in a phishing email

that you probably shouldn't have.

It would then sit and wait.

It would wait until you logged into your bank account.

And when you did, the bad guys would reach in,

steal your credentials,

and then use that to steal your money.

This sounds terrible,

but the reality is, in the security industry,

this form of attack is somewhat commonplace.

However, the Dyre Wolf had two distinctly different personalities --

one for these small transactions,

but it took on an entirely different persona

if you were in the business of moving large-scale wire transfers.

Here's what would happen.

You start the process of issuing a wire transfer,

and up in your browser would pop a screen from your bank,

indicating that there's a problem with your account,

and that you need to call the bank immediately,

along with the number to the bank's fraud department.

So you pick up the phone and you call.

And after going through the normal voice prompts,

you're met with an English-speaking operator.

"Hello, Altoro Mutual Bank. How can I help you?"

And you go through the process like you do every time you call your bank,

of giving them your name and your account number,

going through the security checks to verify you are who you said you are.

Most of us may not know this,

but in many large-scale wire transfers,

it requires two people to sign off on the wire transfer,

so the operator then asks you to get the second person on the line,

and goes through the same set of verifications and checks.

Sounds normal, right?

Only one problem:

you're not talking to the bank.

You're talking to the criminals.

They had built an English-speaking help desk,

fake overlays to the banking website.

And this was so flawlessly executed

that they were moving between a half a million

and a million and a half dollars per attempt

into their criminal coffers.

These criminal organizations operate

like highly regimented, legitimate businesses.

Their employees work Monday through Friday.

They take the weekends off.

How do we know this?

We know this because our security researchers see

repeated spikes of malware on a Friday afternoon.

The bad guys, after a long weekend with the wife and kids,

come back in to see how well things went.

The Dark Web is where they spend their time.

That is a term used to describe the anonymous underbelly of the internet,

where thieves can operate with anonymity

and without detection.

Here they peddle their attack software

and share information on new attack techniques.

You can buy everything there,

from a base-level attack to a much more advanced version.

In fact, in many cases, you even see

gold, silver and bronze levels of service.

You can check references.

You can even buy attacks

that come with a money-back guarantee --

(Laughter)

if you're not successful.

Now, these environments, these marketplaces --

they look like an Amazon or an eBay.

You see products, prices, ratings and reviews.

Of course, if you're going to buy an attack,

you're going to buy from a reputable criminal with good ratings, right?

(Laughter)

This isn't any different

than checking on Yelp or TripAdvisor before going to a new restaurant.

So, here is an example.

This is an actual screenshot of a vendor selling malware.

Notice they're a vendor level four,

they have a trust level of six.

They've had 400 positive reviews in the last year,

and only two negative reviews in the last month.

We even see things like licensing terms.

Here's an example of a site you can go to

if you want to change your identity.

They will sell you a fake ID,

fake passports.

But note the legally binding terms for purchasing your fake ID.

Give me a break.

What are they going to do -- sue you if you violate them?

(Laughter)

This occurred a couple of months ago.

One of our security researchers was looking

at a new Android malware application that we had discovered.

It was called Bilal Bot.

In a blog post,

she positioned Bilal Bot as a new, inexpensive and beta alternative

to the much more advanced GM Bot

that was commonplace in the criminal underground.

This review did not sit well with the authors of Bilal Bot.

So they wrote her this very email,

pleading their case and making the argument

that they felt she had evaluated an older version.

They asked her to please update her blog with more accurate information

and even offered to do an interview

to describe to her in detail

how their attack software was now far better than the competition.

So look,

you don't have to like what they do,

but you do have to respect the entrepreneurial nature

of their endeavors.

(Laughter)

So how are we going to stop this?

It's not like we're going to be able to identify who's responsible --

remember, they operate with anonymity

and outside the reach of the law.

We're certainly not going to be able to prosecute the offenders.

I would propose that we need a completely new approach.

And that approach needs to be centered on the idea

that we need to change the economics for the bad guys.

And to give you a perspective on how this can work,

let's think of the response we see to a healthcare pandemic:

SARS, Ebola, bird flu, Zika.

What is the top priority?

It's knowing who is infected and how the disease is spreading.

Now, governments, private institutions, hospitals, physicians --

everyone responds openly and quickly.

This is a collective and altruistic effort

to stop the spread in its tracks

and to inform anyone not infected

how to protect or inoculate themselves.

Unfortunately, this is not at all what we see in response to a cyber attack.

Organizations are far more likely to keep information on that attack

to themselves.

Why?

Because they're worried about competitive advantage,

litigation

or regulation.

We need to effectively democratize threat intelligence data.

We need to get all of these organizations to open up and share

what is in their private arsenal of information.

The bad guys are moving fast;

we've got to move faster.

And the best way to do that is to open up

and share data on what's happening.

Let's think about this in the construct of security professionals.

Remember, they're programmed right into their DNA to keep secrets.

We've got to turn that thinking on its head.

We've got to get governments, private institutions

and security companies

willing to share information at speed.

And here's why:

because if you share the information,

it's equivalent to inoculation.

And if you're not sharing,

you're actually part of the problem,

because you're increasing the odds that other people could be impacted

by the same attack techniques.

But there's an even bigger benefit.

By destroying criminals' devices closer to real time,

we break their plans.

We inform the people they aim to hurt

far sooner than they had ever anticipated.

We ruin their reputations,

we crush their ratings and reviews.

We make cybercrime not pay.

We change the economics for the bad guys.

But to do this, a first mover was required --

someone to change the thinking in the security industry overall.

About a year ago,

my colleagues and I had a radical idea.

What if IBM were to take our data --

we had one of the largest threat intelligence databases in the world --

and open it up?

It had information not just on what had happened in the past,

but what was happening in near-real time.

What if we were to publish it all openly on the internet?

As you can imagine, this got quite a reaction.

First came the lawyers:

What are the legal implications of doing that?

Then came the business:

What are the business implications of doing that?

And this was also met with a good dose

of a lot of people just asking if we were completely crazy.

But there was one conversation that kept floating to the surface

in every dialogue that we would have:

the realization that if we didn't do this,

then we were part of the problem.

So we did something unheard of in the security industry.

We started publishing.

Over 700 terabytes of actionable threat intelligence data,

including information on real-time attacks

that can be used to stop cybercrime in its tracks.

And to date,

over 4,000 organizations are leveraging this data,

including half of the Fortune 100.

And our hope as a next step is to get all of those organizations

to join us in the fight,

and do the same thing

and share their information

on when and how they're being attacked as well.

We all have the opportunity to stop it,

and we already all know how.

All we have to do is look to the response that we see

in the world of health care,

and how they respond to a pandemic.

Simply put,

we need to be open and collaborative.

Thank you.

(Applause)

For more infomation >> Where is cybercrime really coming from? | Caleb Barlow - Duration: 14:28.

-------------------------------------------

FTCC is a Military Friendly College - Duration: 2:04.

♪ MUSIC ♪

Fayetteville Technical Community College was designated

a 2017 Military friendly school by Victory Media.

First published in 2009, the publisher of G.I. Jobs,

STEM Jobs SM, and Military Spouse, created a comprehensive,

and powerful resource for veterans, service members,

and their families to select the best colleges, universities,

or trade schools to receive the education and training needed

to pursue a civilian career.

Institutions earning the Military Friendly Designation

were evaluated based upon their ability to meet the threshold

of student retention, graduation, job placement,

loan repayment, and persistence.

As well as the dedication and support provided by leaders

in higher education, and military recruitment.

Fayetteville Technical Community College serves over 40,000

students annually.

Providing over 200 occupational, technical general education,

college transfer, and continuing education programs to meet

student career goals, and community need.

FTCC proudly earned recognition as a military friendly

institution for the last eight years.

Visit www.faytechcc.edu for more information.

For more infomation >> FTCC is a Military Friendly College - Duration: 2:04.

-------------------------------------------

33 - Skirt from the past - Duration: 6:09.

For more infomation >> 33 - Skirt from the past - Duration: 6:09.

-------------------------------------------

Horace, Odes 1.9 - Duration: 1:31.

You see that Soracte shines bright with snow,

And the working woods does not already sustain the burden,

and the rivers have stood still with sharp frost.

Release the cold by generously replacing logs upon

the hearth and more kindly bring the four-winter wine,

oh Thaliarchus, from the Sabine jar.

For more infomation >> Horace, Odes 1.9 - Duration: 1:31.

-------------------------------------------

Carrera Pink Bed - Duration: 0:21.

♪ [ upbeat music ]

Không có nhận xét nào:

Đăng nhận xét