0

Coolest Online Translator

I love online translator. This beautiful piece of technology makes our life easy and interesting. It’s not just a tool for translating language, but it is a great tool to learn new language also. Thanks to online-translator, now I can say – “hello”, “good morning” and “how are you” in more than 5 different major languages fluently.

Reliable Online Translator
Every body has their own choice. But still most people use Google or Bing when it comes to translate language. But there are other similar services is available also. So which one is a reliable online translator ? I decided to conduct some research on it.

** Please remember, purpose of this article is not to do marketing for any online-translating service.

How I conducted the research ?

  • My criteria : I start looking for online-translator service that support Bengali or other less known language.
  • Step 1: first I select Google and Bing, as they are the two most prominent online-translating service.
  • Step 2 :Then I use Google search engine with the following query “Online translator”. And I randomly selected few from the first page.
  • Step 3 : I open the each website (from step 2) and start exploring, how many of this online translator service support Bengali and other less known languages.

** Wikipedia link for Bengali

And these are my findings –

PROMPT online translator
Website: http://www.online-translator.com

prompt-online-translator

prompt-online-translator

PROMT is the company that created the “www.online-translator.com“. PROMT was founded in 1991 by two researcher from Herzen University (St. Petersburg, Russia). PROMT is marketing its software in Europe and the USA. The company has opened a subsidiary in Germany and is developing distribution networks in Germany, Austria, Switzerland, France, Spain, the United Kingdom, Portugal, Italy, the USA, Canada, and other countries. One thing I notice – some other online-translator service use PROMT’s translating engine.
PROMPT online translator do not support Bengali or other lesser known language. They support less than 20 different language.

 

Collins
Website : http://www.collinsdictionary.com/translator

Collins Online translator

Collins Online translator

Collins has been publishing educational and informative books for almost 200 years. They produce resources for UK and International curricula to support teachers and pupils at school and outside the classroom environment. This is one of the oldest running company who deals with education and language-translation related services. Their corporate website http://www.collins.co.uk/
Collins online translator do not support Bengali or other lesser known language.

 

Worldlingo
Website : http://www.worldlingo.com/products_services/worldlingo_translator.html

Worldlingo

Worldlingo online translator

Worldlingo support less than 20 different language. But also support on-request based translation. Their website did not mention clearly who they are and how long they are in the business. Worldlingo online translator do not support Bengali or other lesser known language.

 

 

 

Google

Google Online translator

Google Online translator

Google offers two different methods to translate language

  • Method 1 : You can go to https://translate.google.ca and translate language.
  • Method 2 : You type in the search box “Translate aeroplane ” and hit search. It will give you another search box and some options. Surprisingly Method 2 offers more options.

You can actually hear how the word is pronounced by different accent ! Something that no other online translator service offer. Yes – Google online translator support Bengali and many other lesser known language.

 

Microsoft Bing
Website : http://www.bing.com/translator

Bing online translator

Bing online translator

For the last few years Microsoft has been trying to make Bing a popular search engine. I must say they have made some significant improvement. But I was surprised to find one specific language that Bing online-translator service offers.

First of all – Yes Bing online translator support Bengali and some other lesser known language. And Microsoft Bing online translator is the only online translator that supports Klingon !!! Yes Klingon !!! This makes Bing online translator is most coolest online translator.

** Wikipedia link for Klingon

 

 


Conclusion
Language translation is in its advanced stage. But it is still evolving.Yes there are many other online-translator service available, but if you need to translate a language for professional or business purpose, then it is better to use a professional service. Must say again, it is a great tools to learn new language and words.

Phila futhi eside ube nempumelelo (Zulu)

Writer – Rubayat M.

0

Cellphone Encryption – do we need it or not

encryption-graphics-image

Encryption (Image Source PCMag)

Encryption is one of the most discussed topic through out the year 2016. At the beginning of 2016 tech giant Apple was involved in a legal battle with FBI regarding Apple’s encryption technology. This legal battle raises many questions and concerns about encryption.

We are here to shed some light on the encryption technology and to understand whether we need to encrypt our phone or not. Not to discuss about the legal battle.

 

 

What is encryption

Before we go further, let me explain, what is encryption-
Encryption is the process of convert readable information in such a way that only authorized parties can read it. Here is a simple example:
Plain message “welcome to linkmeshin blog”
Encrypted message “w2345 5abbjdy3 tas563dfr afdrer 66ggww rt2swe”

Encryption is not a security tool like antivirus or firewall. Some one who do not have authority, will not be able to see the actual message. Authorized user will require another technology called “decryption” to convert the encrypted message to a plain message again. Encryption and decryption is an extremely complex algorithm. A topic that I will discuss in another article.

 

Who use encryption

Cell-phone

Cell phone

In past only government and large corporation used to use encryption in their devices. Present days most the latest mobile and non-mobile(laptop, desktop, tablet etc.) devices available for general consumers comes with encryption technology. If you use upgraded version of Windows 7 or upgraded version of Android or upgraded version OS Mac OS, then you already have the encryption technology in your possession.

 

 

 

Do you actually need encryption ?

For your cell phone – yes, as it the most common device people lost frequently or stolen frequently. For other device it is a personal choice. Here is the most important reason – encryption add protection in case your device is stolen. If your cell phone is stolen, the bad guy will have access to the following-

  • Private correspondence (your personal or business contact, email account)
  • Personal details (Your home address, personal and family picture)
  • Sensitive company information (if your work provide the phone)
  • Financial information ( Bank-account information, Credit-card information )
  • Social network information (Facebook, Instagram, snap chat and similar other)
  • Professional network information (LinkedIn, Twitter and other related network.)
  • Social Security numbers(if you save it in your phone)

Even though most thieves will not try too hard to break the encryption, as they are more interested in the device it self. So they will wipe the data and sale it. But still it is a good practice to encrypt the phone.

 

Final word
Encryption is a method to scramble information for protection. In case you lost your phone or some one stole your phone, your personal information will be safe if you encrypt your phone. Now a days most of us have a regular human life and then a digital life. We do everything to keep our regular life protected and safe. It is time to think seriously about the security of our digital life.

 

Writer – Rubayat M.

 

 

0

Tribute to Dennis Ritchie

dennis_ritchie

Dennis Ritchie

Every once in while human civilization get a forward leap by the work of some individual. In the past we had Galileo, Newton, Einstein and others. In our life time we have Hawkins. All these individuals had different work field and had significant impact in their own respective areas. Because of the nature of their work, it’s not possible to compare each person’s achievement or work with another. But their work impacted and shapes our life. They are all well-respected to all of us. We always wanted to be someone like them. One such unique Individual was Dennis Ritchie.

 

Short Bio
Dennis Ritchie was born in Bronxville, New York in September 9, 1941. His father Alistair E. Ritchie was a scientist at Bell Labs and co-author of The Design of Switching Circuits on switching circuit theory. Ritchie went to Summit High School and graduated from Harvard University with degrees in physics and applied mathematics. Even though he defended his PhD thesis in 1968 on “Program Structure and Computational Complexity” but never officially received his PhD.

In 1967, Ritchie began working at the Bell Lab’s Computing Sciences Research Center. Ritchie worked together with another legend Ken Thompson. Ken was the designer of the original UNIX operating system. Ritchie made some important contributions to UNIX. But his most significant work was creating the C programming language.

ken_thompson_dennis_ritchie

Ken Thompson & Dennis Ritchie

Ritchie wins numerous awards in his life. On April 21, 1999 he along with Thompson received the National Medal of Technology from President Bill Clinton. They were given the award because “their work led to enormous advances in computer hardware, software, and networking systems and stimulated growth of an entire industry, thereby enhancing American leadership in the Information Age”.

On October 12, 2011, Ritchie was found dead at his home. He was 70. Ritchie’s full name was “Dennis MacAlistair Ritchie” but was known by his username “dmr”.

Programming Language C

Ritchie’s most significant work was the development of the programming language C. C is relatively small and portable language (it means it can be written for one computer, but can be easily run on another computer, without making any major change). This is a versatile language. That means you can write code, to make changes in the computer hardware (commonly known as driver) and you can also write code to create user interface (commonly known as software).

Impact of his work
Ritchie was a very private person through his life. His death news did not create any significant impact in social media or any main stream news media. His death was like the “death news of some well-known person”. After Ritchie’s death,

Paul E. Ceruzzi (curator of Aerospace Electronics and Computing at the Smithsonian’s National Air and Space Museum in Washington, D.C) wrote “… his name was not a household name at all, but… if you had a microscope and could look in a computer, you’d see his work everywhere inside.”

It is difficult to fathom the impact of his work. Most of the major software and computer system ware created using Ritchie’s C programming language.

But before I write the list – let me know explain about the “kernel”. All operating system has kernel. Consider it as the muscle of human body. A human body has skeleton as the base structure(as hardwire) and then has the muscle(kernel) and other parts(software) on top of skeleton. And finally we have the outer skin(user interface) as protector.

Official Definition of Kernel
The core of an operating system of a computer, responsible for resource allocation, file management, and security.

Here is the list of some of the major software and computer system used by billions. Most of them written in C or different upgraded version of original C.

Operating System
What we use in our regular computer and handheld device as user interface.

Operating System Written in
Microsoft Windows Operating System kernel written in – C
Apple Operating System kernel written in – C
Linux Operating System kernel written in – C
Android Operating System Android is an edited version of Linux operating system. Therefore without the Linux, there is no Android.
Google Chrome Operating System kernel written in – C
Symbian Operating System Written in different upgraded version of original C (C++)

Major Browsers
Like the operating system, most of the major browsers are written in different upgraded version of original C.

Browsers Name Written in
Firefox browser Written in C and other upgraded version of original C (mostly C and C++)
Chrome browser Written in other upgraded version of original C (Objective-C and C++)
Safari browser Written in other upgraded version of original C (Objective-C and C++)
Internet Explorer browser Written in other upgraded version of original C (All C++)

Major Databases
Like the operating system, most of the major database is written in different upgraded version of original C. And these databases are used my all major and minor corporation and various governments.

Databases Name Written in
Oracle kernel is written in C
SAP – Sybase Adaptive Server Enterprise Written in C and other upgraded version of original C (C, C++)
Microsoft SQL Server Written in C and other upgraded version of original C. (C, C++).
MySQL Written in C and other upgraded version of original C.(C, C++)

Programming Language
Like the operating system, most of the Programming Language are written in C and other different upgraded version of original C.
Widely use languages are –
C++, C–, C#, Objective-C, Java, JavaScript, Perl, PHP, Python
Other languages are –
AMPL, AWK, csh, BitC, D, Go, Julia, Limbo, LPC, Pike, Processing, , Rust, Seed7, Vala, Verilog.

Other Hardware Devices
Our home internet router and many other devices like that is has tiny operating system or instruction set. Which was written using C or a different upgraded version of original C.

Our Tribute to Dennis Ritchie
Think about a world without computer, cell phone, internet? Our life and our modern economy are practically standing on this these. Our life would be completely different without these technologies and devices. Ritchie’s work shapes these technology and thus shapes our life. Famous tech giants and billionaires are actually standing on Ritchie’s shoulders. We are forever grateful to this person.

Writer – Rubayat M.

0

Government Relinquishes Control of Internet

ICANN

Internet Corporation for Assigned Names and Numbers

On October 1, 2016 ICANN or Internet Corporation for Assigned Names and Numbers went to private sector. That means ICANN is no longer governed by the NTIA (National Telecommunications and Information Administration) of United States Department of Commerce. Is that mean government relinquishes control of internet ?

Before I provide an answer for the question, there are few key players that you need to know.

IANA (Internet Assigned Numbers Authority) – responsible for the allocation of internet address and related system like IP address, domain naming system etc. IANA is a department of ICANN.

ICANN (Internet Corporation for Assigned Names and Numbers) – ICANN administer IANA’s activities and coordinates with NTIA.

NTIA (National Telecommunications and Information Administration) – executive branch agency that works as an adviser for the President of the United States. NTIA is part of the United States Department of Commerce.

ICANN and NTIA had a contract that let NTIA oversees ICANN’s activity and that contract ended in Oct 1, 2016.

History of ICANN
Before ICANN there was IANA. IANA works as a technical resource for the ARPANET (earlier version of today’s internet). ICANN was founded on September 18, 1998 and incorporated on September 30, 1998 in California USA as a nonprofit organization. It’s primary focus was to manage Internet protocol and Domain Name System. IANA became a part of ICANN.

What ICANN do –
Without using any technical or corporate jargon here in plain word-

Along with other responsibilities ICANN also maintain a global record book of internet address. And information of this record book is shared by the rest of world. So everybody knows who is who. This is how internet remains as a global entity.

Simple example – when you type www.linkmeshin.com in your browser, your computer send the request to your local ISP (the company that you pay your internet bill). Your local ISP have the access the ICANN’s global address book (there are other technical thing happen in the back end), they collect the necessary information regarding your request and let your browser open the www.linkmeshin.com webpage in your computer screen.

What ICANN Cannot Perform

  • ICANN do not control content on the Internet.
  • ICANN cannot stop spam.
  • ICANN do not control the access of internet for general users.


What is the Importance of ICANN

Domain Name Services is one of the major service of ICANN. So what is Domain Name Services ?
Simple example – consider the domain name service as a phone book. Phone book contains name and phone number. You can remember names but not the number. So from your “phone book” you can select your friend’s name and your phone can call your friend by using the “number” associated with the name.

So a domain name services system contain something like this –

For Human For Computer
www.yahoo.com 98.138.253.109
www.amazon.com 54.239.26.128

Final Thought
Transitioned to private sector does not affect ICANN. ICANN will continue its core responsibility and functionality. Instead of government agency it will be managed by various volunteer-based community. Users will not see change or difference. Internet users and internet service provider company will continue following all the rules and policies that they used follow all these years.

Writer – Rubayat M.

0

Pokémon GO is Now Catching People

July 6, 2016 Pokemon GO was released in northern hemisphere and other countries. This is a cellphone or mobile device based game. Game’s idea is – when the player hold up the devices in various locations at various times, a digital monsters known as Pokémon will appear on screen of the mobile or cellphone and user have to catch it.

Pokemon GO

Pokemon GO

Soon after the release, Pokémon GO became an overnight hit. People of different age group started playing the game. Because of the way the game was designed (this is called augmented reality), the player needs to physically leave their house or couch go outside and look for monsters. Soon people walking in the street like zombies became a common sight. Even though the initial excitement has died down, but Pokémon GO still a very popular game.

I am not going to describe all the back end technical features of the game – because I am not here to talk about that. I am going to talk something different about the game. A week after the initial release of the game, we started hearing and reading interesting stories about Pokémon GO. I cannot help myself to include few of them here.

  • Quebec City (Canada) – Two police officers in Quebec City suffered minor injuries when a car reversed into their cruiser in a parking lot. The driver was playing Pokémon GO !
  • Utah (USA) – One teen with couple of his friends was seen playing the game in an abandoned grain silo.
  • Pennsylvania (USA) – A 15 year old girl was hit by a car while playing the game and crossing a busy highway ! The girl was lucky, she survived.
  • Missouri (USA) – Four men in Missouri have used the game to find players at a specific location. Then robbed them using a handgun. About eight or nine people have been robbed!
  • North San Diego County (USA)- Two men, who were in their early 20s fell off a bluff while playing Pokémon GO ! They had crossed a fenced area to get to the bluff. One man fell 75 to 100 feet and the other man was found unconscious 50 feet down the bluff.
  • Oregon (USA) – An Oregon man, who was visiting his family in New York, crashed his car while playing Pokémon GO and guess what- this guy is a former Marine !
  • And the last one is in Tokushima, (on the western Japanese island of Shikoku). This happens on August 25, 2016. A driver, playing Pokémon GO while driving hit two pedestrians when they were crossing the street. One died and another left with a broken hip. Driver did not see the pedestrians as he was busy looking for the monster.
  • Some law enforcement agencies in many countries had to issue warning notice about the dangers of playing Pokémon GO while on the go.

Despite all these above mention incidents, we must praise the Pokémon GO. At lease it managed to get people out of their house. And made them walk, which is a form of exercise. Even though I am not sure if we call slow walk and frequent stop and upper body movement an exercise or not, but still it counts. One psychologist even claims that the after playing the game – some people notice a significant positive change in their anxiety and depression levels.

All these events happens, for a video game. In the past we have seen people’s madness for new technology – like the long lineup for new iPhone. But Pokémon GO is definitely a new kind of madness.

Pokémon GO just proved one thing, technology can take over the control of human emotion and action. Losing control over action is a dangerous thing. We need to install some types of breaking mechanism in these sorts of  games. So if one unknowingly or deliberately put them self in a dangerous situation , then the game’s breaking mechanism will display a warning and then shutdown the game. Does not matter what ever your game score or level is, safety of human life and health always comes first.

One solution
Pokémon GO use device’s GPS application. Because of this Pokémon GO server or game engine can detect user’s physical location. So if Pokémon GO server or game engine detect that the user is close to a busy street, then the game engine can send a warning message to the user and then stop the game. I am sure smart people of  Nintendo can develop a smarter solution.

We the human creates and use technology. Not the other way. We can achieved anything using the limitless power of technology. But this has to be done in a controlled way. Otherwise one day, the very technology that we have created for us, will take over the control.

Writer – Rubayat M.

0

Hot Coffee can Cause Cancer

Tim Horton Coffee

Image source www.timhortons.com

A surprising fact, not beer but tea is world’s most popular drink. People have been drinking tea since 2700 BC.Some
ancient kings even consider it a healing drink. Coffee comes after that. According to U.N. Food and Agriculture Organization, mankind drinks about six billion cups of coffee a day !

 

 

 

But I am not here to discuss about what is the most popular drink of the world. I am here to discuss about a new report, that shows that hot beverages can cause cancer.
What is the report?
Report says – very hot beverages can contribute to cell injury in the esophagus and in long run can contribute to cancer formation. So why coffee becomes the villain then ? Very simple, coffee is one of the most popular hot beverages after tea. Billions of people drink coffee every day and if most of these people drink very hot coffee on a regular basis – then there is a good possibility that in the long run, some of these people may have esophagus cancer.

 

What is Esophagus
The esophagus is about 8 inches long muscular tube connecting the throat (pharynx) with the stomach. Esophagus runs behind the windpipe, heart, then in front of the spine and finally before entering the stomach, it passes through the diaphragm .

Human Esophagus

Human Esophagus. Image source www.webmd.com

 

 

 

 

 

 

 

 

 

 

 

 

Temperature
Any beverages that is hotter the 65 degrees Celsius or 149 degrees in Fahrenheit is consider “Very Hot”. So hot beverages should be consumed in a temperature lower then mention above.

 

Rising Risk
Once coffee used to consider a luxury or occasional drink in many countries. But it is a different scenario today. Because of the economic growth in many developing countries, coffee has become more affordable to general people or to be precious to the middle class. Also because of the change in work culture and globalization people are drinking more coffee than ever.  An alarming issue that we all need to be aware.

So before you sip your next favorite hot beverage – please make sure it is not too hot. I am adding some related information about the article, that may become handy someday  –

 

What is carcinogen?
In plain word a substance that is capable of causing cancer in living tissue. A good example – Overexposure to ultraviolet (UV) radiation from the sun.

 

IARC
The International Agency for Research on Cancer (IARC) is the specialized cancer agency of the World Health Organization. Agency’s goal is to identify the causes of cancer so that preventive measures may be adopted and the burden of disease and associated suffering reduced. Official website: http://www.iarc.fr

 

World Health Organization

World Health Organization

WHO is who ?
WHO or World Health Organization is a member of the United Nations Development Group. It is a specialized agency of the United Nations deals with international public health. Established on 7 April 1948, it’s headquarter is located in Geneva, Switzerland.

 

 

 

Writer – Rubayat M.

1

Nasa’s Fascinating Juno Mission

Juno spacecraft

Juno spacecraft

July 4 2016 at 11:54 PM Nasa’s Juno Mission tweets the following message -“Engine burn complete and orbit obtained. I’m ready to unlock all your secrets, #Jupiter. Deal with it.”

Juno is the second spacecraft to orbit Jupiter, after the Galileo.It was launched on August 5, 2011 from Cape Canaveral Air Force Station.

 

 

Mission
Giant Jupiter was formed four-and-a-half-billion years ago. Juno will try to unlocked the mystery of this planet by probing the deep interior and analyze the planet’s structure.

It will also try to test the theory- “Auroras over Jupiter’s poles is actually caused by the planet’s rapid rotation and volcanic material spewed out from Io. Io is the Jupiter’s fifth moon and the most volcanically active body in the solar system.”

In 2001 Professor Stan Cowley and Professor Emma Bunce proposed this theory.
Learn more : http://www2.le.ac.uk/offices/press/think-leicester/science-and-environment/2016/juno-and-the-university-of-leicester

About Juno

Jupiter from Juno's Camera

Jupiter from Juno’s Camera

  • It was named after the Roman goddess and wife of Jupiter .
  • Juno cost about $1.1 billion(US). Original proposed cost was approximately US$700 million.
  • Launched August 5, 2011
  • Powered by solar arrays with the maximum speed of 38,000 km/h.
  • Has nine different instruments that will be use to conduct the analyzing.
  • It will fly 3,000 miles closer to the surface. No spacecraft has ever flown this close to Jupiter.

 

Juno and Jupiter Forever
Juno travelled 1.7 billion to reach Jupiter. But after it’s mission – Juno will not return to Earth. It will dive down to Jupiter’s atmosphere and live there forever.

Writer – Rubayat M.

1

Trivia about Computer Keyboard

The computer keyboard needs no introduction. We all know that the keyboard is an input device used  with the computer to aid in data input. Here are some trivia about computer keyboard.

1700 – 1800

Henry Mill's keyboard

Image:Henry Mill’s keyboard

The very first version closest to a keyboard was invented by a British Engineer Henry Mill. However, Mill’s invention didn’t manage to survive in society.

 

 

 

 

1800 – 1900

Christopher Sholes`s QWERTY layout keyboard

Image: Christopher Sholes`s QWERTY layout keyboard

Christopher Latham Sholes a newspaper publisher and politician from Wisconsin (US) came with his upgraded version of the typewriter. It was the very first version of QWERTY layout.

Sholes’ main reason behind this layout invention was to prevent ribbon damage in the keyboard/typewriter. Even with his invention undergoing numerous trials of modification; Sholes’ invention became a commercial success during 1870

 

 

1900 – Present

ENIAC Computer

Image: ENIAC Computer

Between 1940’s and 1950’s the earlier versions of computers (ENIAC, BINAC, and UNIVAC etc.) used the QWERTY keyboard layout invented by Sholes.

It was in the 80’s IBM set the keyboard to its glory by inventing the Model M which looked 90% similar to modern day keyboards.

Since then the keyboard kept evolving more and more giving its various forms of layout co-in siding well with the society’s languages; going from QWERTY to Dvorak Simplified layouts.

Interesting Fact

During the early 1800’s, an Italian inventor Pellegrino Turri invented a typewriter for his blind lover Countess Carolina Fantoni da Fivizzano. Their story became one of 2010’s novel “The Blind Contessa’s New Machine”.

By Sohana Akhter

0

Dating Website Hacked

Muslimmatch site hacked message

Muslim Match Hacked Homepage Message

A dating website called MulimMatch (www.muslimmatch.com) has been hacked. The breach was discovered by a cybersecurity alert website called “Have I been pwned (www.haveibeenpwned.com).

MulimMatch’s (www.muslimmatch.com) homepage said “We have been made aware of an alleged security breach and we are reviewing our systems as we work to remedy the situation and tighten our security.”

More than 150,000 members’ personal details have been posted online including 700,000 private messages between members. Other sensitive information like – personal preference also has been leaked.

Writer – Rubayat M.

 

 

 

1

Beware of GodLess Mobile Malware

Security alert

Security alert

A mobile malware called Godless has already affected over 850,000 Android devices worldwide.It has multiple rooting exploits in its possession. Which gives Godless the ability to target virtually any Android device running on Android 5.1 (Lollipop) or earlier versions.

How does it work
Godless is more like an exploit kit. in that it uses an open-source rooting framework called android-rooting-tools. Apps related to this threat can be found in Google Play and other app stores.

  • Godless hides inside an app.It get inside in the phone after user download the infected app.
  • Then it exploits the root files of the operating system of the infected phone.
  • This action creates full admin access to a device, allowing unauthorized apps to be installed without owner’s permission.

What is the problem
After taking over control of the phone, the malware can then receive remote instructions and it can then silently download and install any app it wants. Phone owner may have unwanted apps in their phone. Which may lead to unwanted add. And the worst  possible scenario is that this threat can install backdoor and spyware apps.

Solution
To check the version of your android device and if you notice your phone is running on Android 5.1 (Lollipop) or earlier then try to upgrade your android version. Download and install only well-known security program and run a complete scan. Keep check news updated related to this threat.

Global distribution of affected devices. Source : Trendmicro

Global distribution of affected devices. Source : Trendmicro

Writer – Rubayat M.