Thursday, October 31, 2019

Design (art and craft) innovation in Pakistan textile Literature review - 2

Design (art and craft) innovation in Pakistan textile - Literature review Example The British crown, which was colonizing Pakistan at the time of the rise of industrial revolution in the 19th century was pressurised to institute formal art and craft education in Pakistan by the Arts & Crafts Movement. This paved way for the first art and craft school in Pakistan; Mayo School of Industrial Art in1875. The industrial revolution replaced human labour with machineries, prompting the Arts & Crafts Movement in Pakistan to push for the development of formal education and skill in Design (art and craft) Education in Pakistan, to avoid machinery replacing human labour in the Pakistan textile industry. Universities such as University of Information and Technology, Hajvery University, University of engineering and Technology in Lahore, The University of Beaconhouse and the Textile university of Faisalabad have played an important role in offering design (art&craft) education. Pakistan institutions of higher learning are important contributors to the global textile industry advancement. This is achieved through offering design education and also promoting research in this field. Designers need to follow up the laid down needs of the customers to come up with a design process that will satisfy those needs effectively. The research stage is therefore the most important in the design process. In the period 1676-1820, design was characteristically utilitarian, comprising of targeting the functionality of the designs, as opposed to its aesthetic value. The role of design changed in the period between 1820 and 1910, when design education took centre stage, as opposed to the creation of designers through apprenticeship. Beyond 1930, design became mediatised, such that design education focused more on advertisement and aesthetic value. Design is a dynamic field and it has changed dramatically over the years. Starting with functional/utilitarian design, it progressed to aesthetic design and

Tuesday, October 29, 2019

Gender Roles And Media Portrayals Research Paper

Gender Roles And Media Portrayals - Research Paper Example Men were portrayed as dominant, strong, and independent providers. Most past television programs portrayed them as the dominant gender in the society. Men were free to choose what they felt was working for them at the expense of the opinions from the ladies. For example, in Mad Men, the executives treated their secretaries in the offices as objects rather than human beings. In fact, it is easy to observe how they disposed of them after having sexual encounters. In the end, women were not seen as having any value to the men. It is worth noting that the current television programs tend to bring out the rapid changes in the society. For example, in the television series, Modern Family, the role of the women and men in the family tends to change. Women start assuming significant roles, for example, some of them become breadwinners while men become domesticated by their wives. Rapid changes captured by these television series indicate how the society is changing. For instance, the concept of gay marriages is brought to the fore. Though it is difficult to accept at first, we eventually see a society that positions itself to accept these changes. In conclusion, there is nothing as inevitable as change. The television continues to influence the societal transformation through fostering progression of gender roles that took place in the past half century and today. In comparison to the past, there is a significant change in gender roles and various stereotypes in television today (Trier-Bieniek, 2014).

Sunday, October 27, 2019

Techniques and Types of Jailbreak

Techniques and Types of Jailbreak Mohammad Alfaifi Apple is a global company that produces devices such as iPhone, iPad, and iMac. Actually, it is specializing in Software and they have a system called IOS. With the technology evolution, hackers have advanced and find vulnerability in Apple software that allowed breaking the system. This way called jailbreak. This project includes a general review about jailbreak and the way it works. Also its development over the years and mention names of some organizations such as iPhone Dev team, Chronic-Dev, dream team, Pangu, Evad3rs, PP25 and Keen. Jailbreak is one of the words that grown fast recently. Apple prefers to design something and tell you, This is how it should be used. Apple came with the system that is fixed which mean you are not allowed to install tools thats help you with your needs and because of that Apple is one of a biggest secure system in the world. Some people feel that they cant do whatever they want with feeling that Apples operate system is like a jail. Jailbreak came to gives the people ability to break the operating system to do whatever they want whether to install tools or themes. Apple products are well-made but they had limitation. Jailbreaking breaks those limits and gives you more control in your device. 1.1. Is jailbreaking legal? United States of America has a rule that allowing the jailbreak and you can jailbreaking your smartphone or tablets you want[1]. Apple support center [2] published a clearance that jailbreak is legal but you will lose the support (warranty). If you install jailbreak in your Apple product, Apple will not sue you because of that and all what they can do is to stop supporting your device and if something happens it is under your responsibility. 2.1. Jailbreak types 2.1.1. Tethered In this type, Jailbreak is temporary. When you turn off your device you cant boot your device up without connect it to PC to delete the Jailbreak and then you are able to boot the device. In this Jailbreak you have to install it every time you turn off your device [3]. 2.1.2. Semi Tethered It looks like tethered jailbreak with addition thing that here you can turn off your device and boot it again without any problem. The features are limited [3]. 2.1.3. Untethered It is the common jailbreak and the new one. It gives the user ability to run all the tools and applications they downloaded anytime they want. In this type, you can turn off your device without fear of losing the jailbreak [3]. 2.2. Jailbreak teams There are many developers of a jailbreak, Cydia, and hackers of IOS system who have a wide fame in the community of iOS users and jailbreak system. These developers and hackers have great merit in making jailbreak a strong community. They have begun attacking the iOS system and deployment jailbreak since the early days of the issued of the first system for the iPhone. In July 2007, a few days after the release the iPhone system, a group of developers create the first tool of jailbreak, and shortly afterwards, there were many versions of tools for jailbreak. In the October 2007, they created the first jailbreak 1.0 which was also called (AppSnapp) 2.3. How jailbreak works 2.3.1. bootchain The bootchain [4] (also called chain of trust) is the system by Apple which can tries to ensure that only signed or trusted code is loaded on an iOS device. Figure 1: bootchain modulers       The bootchain consist couple of deferent modules that load each other and between the loadings there are check points that Apple put it in order to prevent unauthorized access to the code. Boot ROM is the first significant code that starts in the device. It is read-only which means it cant be modified by Apple when they release a device. This part is hard to Jailbreak because it connect with the hardware not the software it in the chip inside the device, but if someone Jailbreak this part, Apple cant stop the Jailbreak and they have to change the hardware next time they publish a new device. Low level Bootloader (LLB) which is a part of the software. It runs several setup routines. On firmware versions 2.0 and higher it checks the signature of Boot ROM before jumping to it. If someone found vulnerabilities and Jailbreak this part, Apple can close the vulnerabilities by releasing new software version (iOS firmware). iBoot is Apples stage 2 bootloader for all of the devices. It runs what is known as Recovery Mode. It has an interactive interface which can be used over USB or serial. IOS Kernel is using page verification. When you start application the Kernel will verify if the application has the code singing in tagged. If it has SHA1 verification it will pass the application to AMFI which is a Kernel extension. The Kernel doesnt verify if the applications signature is valid, it is only verified if the signature is exist. IOS apps are the phase after the Kernel boot. It goes hand to and with iOS Kernel. For iOS all applications have to be signed since the launch of the App Store (iOS 2.0), this includes all system binaries that come with iOS. For the end user. This code signing enforcement cannot be disabled, which makes that an end user can only install applications from the App Store. /private/etc/fstabis is where all the iOS files are stores and must be patched. fstab is like a switch that is giving you the ability to control the media partitions and the permissions. By default, fstab is setting as a read-only mode that letting you to read or view only without making any changes. To be able to make any modifications, you have to set the fstab as read-write mode. It is very important for your Apple device because it is controlling the permission of the media partition and the root. The big problem is to pass in all the files you need through the various checkpoints. The checkpoint is what Apple does in order to ensuring the file is legit or coming from a third party. Every file is signed by a key. The file will be through a way and be unusable if this file without kay. In short, we can access to the door if we either find a back door entry (bypass) or unlock the lock (patch all checkpoints). Patching is a difficult and mostly not worth the effort. So, most people who make the jailbreak will try to find a backdoor entry or a bypass. 2.3.2. Limera1n Exploit The limera1n exploit is the bootrom and iBoot exploit used to run unsigned code (and thereby jailbreak) the iPod touch 3rd Generation, the iPhone 3GS and all A4 chip devices. It was first used in the limera1n tool by geohot. It is used to perform a tethered jailbreak on the devices that mentioned above. The jailbreak can then be turned into an untethered jailbreak with other exploits, such as the 0x24000 Segment Overflow [5]. Limera1n is the final publicly disclosed bootrom exploit of any device. The last device released vulnerable to limera1n is the iPhone 4. 2.4. Advantages of using jailbreak Jailbreak means that the user can download applications without the need of Apple store, and controls the tones and add modifications to the system. Also decoding constraint on company communications device, such as AT T or Verizon, it can go further than this when some people want to amendment on the phone. The majority is in the process of jailbreak for your iPhone, using Cydia to download the software tools to your device and install them. Cydia is an application or store tools allows owners devices that have been untying them to browse the applications and tools and carry it to the device without any restrictions 2.5. Disadvantages of using jailbreak There are many people prefer to stay away of Jailbreak their devices. When you Jailbreak your device that means your device is no longer under the Apple ensuring [2]. All tools and applications you download are not licensed by Apple and it may break your device because it is not secure. Also one of important things in the device is the battery. Jailbreak consumes a lot of power on your device which mean your battery couldnt stand long. 2.6. Risks of using Jailbreak Since jailbreaking a device bypasses all security measures of the device to allow developers and users more control over the applications and device respectively, it brings inherent risks which must not be ignored by both developers and users. Here are few dangers of jailbreaking a device [3] Many a times jailbreaking tools installs an SSH application by default on a device and default password for iOS device alpine is very well known. If a user does not change the default password, attackers can remotely control the operation of device. Since jailbreaking grants root access to any application running on a device, there is a risk of malicious application accessing sensitive information of other apps. 3.1. How to know if your device can jailbreak As a first step you have to know the version of your IOS system. Then search on Internet if this version has a Jailbreak or not. The best way to search is to get into the Jailbreak teams websites. Since Jailbreak is published by one team other teams published their copies too. All jailbreaking tools available to install in application called Cydia, which is similar to the Apple App Store but applications available on Cydia are not checked by Apple and developers can submit their applications to distribute through Cydia. Figure 2: Jailbroken IPhone with Cydia 4.1. History of Cydia Cydia is a third-party installer application for all Apple devices. Developed by Jay Freeman (Saurik), Cydia is similar to the official App Store. Cydia is a manager mobile application for IOS, which enables the user to find and install tools or software packages on jailbroken device. Its important for you to jailbreak your IOS device to get the Cydia. With Cydia everyone has the option of customizing their devices [6]. 4.2. Add or remove sources   Ã‚   Cydia is a store depends on the developers. The sources are small stores of the developers to upload their tools on it. Cydia came within BigBoss source. This source is built-in the Cydia because it is by the Cydia creator. If you want to install other developers sources follow these steps: Figure 3: iPhone Home Screen Find the Cydia application on your iPhones home screen and click on it. Figure 4: Cydia Screen Click on Sources in the bottom bar. The screen of the sources that been added shown. Click on edit and then add. Figure 5: Adding source screen Write the URL of the source and click on Add Source. Now the source will be add into your list of sources and can search on any tool in it and install whatever you want. 5.1. Security without jailbreak The security without Jailbreak is under Apple control. Apple has a store includes more than 2 million of applications [7]. These applications are not only for smartphones only. They support tablets, Apple TV and smart watches. Apple takes two days to approval a new application that uploaded from a developer [8]. These two days is giving Apple a time to review the app submitted to the App Store to determine whether it is perform as expected, reliable and is free of offensive material. Apple reviews every app submitted based on a set of technical, content, and design criteria. 5.2. Security with jailbreak We agree Jailbreak is a risk for your device. This is for people with no knowledge of technologies. Privacy is one of those things that most people will say they care about, but they really dont. However, if you truly do care about your privacy, device jailbreaking is a good way for that. Jailbreak is giving you tools to hide your information of others, even of Apple. There is another tool take care of your phone when it is stolen. When the criminal enter wrong password the tool take a selfie (photo from front camera) and send it to your E-mail with the location. Those are simples of thousands of tools give you a security more than device without Jailbreak [9]. [1]L. of C. U.S. Copyright Office, Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies. U.S. Copyright Office, Library of Congress., 28-Oct-2015. [2]Unauthorized modification of iOS can cause security vulnerabilities, instability, shortened battery life, and other issues, Apple Support. [Online]. Available: https://support.apple.com/en-sa/HT201954. [Accessed: 14-Jan-2017]. [3]R. Patel, Improving Security in Jailbroken iOS Devices, B. Thomas Golisano College of Computing and Information Sciences, Rochester, New York, 2016. [4]Apple, iOS Security. May-2016. [5]D. Keuper, XNU: a security evaluation, University of Twente and Certi_ed Secure, 2012. [6]D. Wicks, What is Cydia and Cydia Basics, IEEnews, Jul. 2016. [7]J. Golson, Apples App Store now has over 2 million apps, The Verge, 13-Jun-2016. [Online]. Available: http://www.theverge.com/2016/6/13/11922926/apple-apps-2-million-wwdc-2016. [Accessed: 29-Jan-2017]. [8]O. Raymundo, Apple is approving apps for the iOS App Store much faster now, Macworld, 12-May-2016. [Online]. Available: http://www.macworld.com/article/3070012/ios/apple-is-approving-apps-for-the-ios-app-store-much-faster-now.html. [Accessed: 28-Jan-2017]. [9]C. Lloyd, How Jailbreaking Makes Your iPhone More Secure Private, GottaBeMobile, 22-Oct-2015. [Online]. Available: http://www.gottabemobile.com/how-jailbreaking-makes-your-iphone-more-secure-private/. [Accessed: 03-Feb-2017].

Friday, October 25, 2019

Super Leadership :: Business, Creative Culture

Idea Generation and Creative Potential The global competitive forces are compelling organizations to develop highly innovative and creative environment, where idea generation is encouraged and serves as a live blood for organizational survival by creating a strong creative culture. Because of this pressure on organization to be more creative, they are turning towards idea generation and developing creative potential of employees. Idea generation is one of the coherent phases of the creative process (Kanter, 1988); (West & Farr, 1989). Similarly, it is argued that the creativity is nothing else but the generation of novel and useful ideas (Amabile T. , 1988). Likewise, it is commented that various scientists characterize creativity as a source of generating novel or useful ideas by individuals or teams members. This manifests that idea generation and creativity are two sides of a same coin (Greenberg & Baron, 2003). Moreover, creativity is a vital characteristic related to life that we act upon in daily routine. It covers a problem at workplace that become pleasure or an imagination that becomes a reality in a hi-tech world (Bonnardel, 1999). Creativity and productivity are highly correlated due to which firms strongly believe in the effects creativity has on better performance and due to this conviction, they spends a lot of money on creativity in firms (Dennard, 2000). However, in order to foster the idea generation and creative potential of employee in the organization are compelled to identify the underlying elements. For creating such environment, various factors have been identified & explored by the scholars (West M. A., Sparkling fountains or stagant ponds: An integrative model of creativity and innovation implementation in work groups, 2002a); (West M. A., Ideas are ten a penny: its team implementation not idea generation that count, 2002b); (Mumford, 2003); (Gilson & Shalley, 2004); (Amabile, Barsade, Mueller, & Staw, 2005); (Shin & Zhou, 2003), and (Cheng, 1994). More recently, in a study, it is substantiated the importance of interpersonal character of idea generation as highlighted in recent literature on creativity. Furthermore, it is argued that the creation of ideas instigates the interaction between the individual and its social environment (Zhou, 2008). For idea generation, the broader (organizational) context needs to stimulate interpersonal contacts as much as possible. An open, helpful, somewhat informal culture, in which people can easily call on others, facilitates formal and informal social connections and idea generation. Creative Culture Everybody has a role to play as citizens and consumers, culture and creativity, at the same time, help deliver new, more sustainable ways of living and working.

Thursday, October 24, 2019

Capstone Project Essay

There is no more need to fight crowds, find a parking spot, and deal with traffic. The high street and mail order systems still have a place in the mix of purchase routes; however it is no longer the only method of making purchases. The Internet revolution has seen a massive increase in the long distance purchases made by consumers, as geographical barriers are no longer as important as they were. The lack of geographical importance has influenced the strategy of Internet companies. One of the first companies that took advantage of this was the online bookshop Amazon. om. Amazon. com is an organization that offers a broad range of services to consumers and is considered an online leader of pure-plays – pure online merchants. Amazon. com was founded in July of 1995 with a mission to fully utilize the Internet to make book buying fast, easy, and all in all, a very enjoyable experience. They currently have 29 million customers in 160 different countries, making Amazon. com one of the leading online merchants. It is rated third in business-to-consumer online revenue as of June 20, 2000. Amazon. com represents the ideal e-Commerce company. It was one of the first to demonstrate the potential for â€Å"virtual† upstarts and turned the market on end – even leading the â€Å"bricks and mortar† companies. Analyze the company’s mission and vision statements against the performance of the organization. Then, evaluate how well the company lives out its mission and vision statement. Provide support from the organization’s performance in your evaluation. Amazon’s company mission and vision statement is to continue to offer quality products and services using the best technology available and at a reasonable price. This results in highly loyal customers, while maintaining shareholders interest and company profits in mind. We also want to expand geographically, increasing the number of customers and to keep improving our main competitive advantage – infrastructure. By working hard and having fun we seek to offer the best working environment to our employees, promoting career opportunities, and to increase our responsibility towards environment and the society. (www. amazon. com). In basing that off of the performance of the company it can be concluded that they are living out their mission statement. As more retail categories get added, the opportunity will only expand Assess how the organization’s strategic goals link to the company’s mission and vision. The strategic goals of Amazon. com are very simple they work off of six basic principles which are the freely proffers products and services, the use a customer friendly interface, the company scales easily from small to large, they exploit its affiliate’s products and resources, the use existing communication systems, and finally Amazon utilizes universal behaviors and mentalities (www. arketingplan. com). Most of the marketing the Amazon does is indirect marketing where you probably will not see allot of ads for the company on billboards or during the commercial breaks of televisions shows, the company uses allot of online ploys and has very good relations with other partners they use these strengths to market themselves to a great amount of people. This goes hand in hand with their mission statement and vision which is increasing the number of customers and to keep improving our main competitive advantage, since the majority of society uses the internet for all of the business needs, this will work to the advantage of Amazon as they can link up with several of their business partners and even provide links on those pages that will take a potential customer directly to the website. Amazon rarely uses the offline marketing process; they use the motto â€Å"Since most people shop online that is where they will be†. (www. arketingplan. com). Also Amazon has a convenient way for customers to make their purchase more effectively and efficiently which is part of the marketing strategy of them focusing on being customer friendly. Amazon uses a streamlined ordering process that applies the most advanced technology to allow the customers to better navigate and explore online. Amazon uses a one click option once you have everything that you need, you place them in your basket and you pay for everything all at once without having to do multiple orders which make it convenient for the customers. Analyze the company’s financial performance to determine the link between the company’s strategic goals, strategy, and its financial performance. Detail your findings. One of the main strategic goals that Amazon has set with the company is offer quality products that bring in profits that sentiment is identified in the mission and vision statement and over time this company has been able to maximize their profits and minimize their expenses through the North American market as well as the international market as well. The earnings statement shows that Amazon has found a way to have increased sales performance through both of their selling markets. The North America segment consists of amounts earned from retail sales of consumer products (including from sellers) and subscriptions through North America-focused websites such as www. amazon. com and www. amazon. ca and include amounts earned from AWS. This segment includes export sales from www. amazon. com and www. amazon. ca. The International segment consists of amounts earned from retail sales of consumer products (including from sellers) and subscriptions through internationally focused locations.

Wednesday, October 23, 2019

Part Six Chapter II

II The policewoman had been gentle and kind, in the cluttered cottage by the river, where dank water now covered blankets, chintzy chairs and worn rugs. The old lady who owned the place had brought a hot-water bottle and a cup of boiling tea, which Sukhvinder could not lift because she was shaking like a drill. She had disgorged chunks of information: her own name, and Krystal's name, and the name of the dead little boy that they were loading onto an ambulance. The dog-walker who had pulled her from the river was rather deaf; he gave a statement to the police in the next room, and Sukhvinder hated the sound of his bellowed account. He had tethered his dog to a tree outside the window, and it whined persistently. Then the police had called her parents and they had come, Parminder knocking over a table and smashing one of the old lady's ornaments as she crossed the room with clean clothes in her arms. In the tiny bathroom, the deep dirty gash on Sukhvinder's leg was revealed, peppering the fluffy bath mat with black spots, and when Parminder saw the wound she shrieked at Vikram, who was thanking everyone loudly in the hall, that they must take Sukhvinder to the hospital. She had vomited again in the car, and her mother, who was beside her in the back seat, had mopped her up, and all the way there Parminder and Vikram had kept up a flow of loud talk; her father kept repeating himself, saying things like ‘she'll need a sedative' and ‘that cut will definitely need stitches'; and Parminder, who was in the back seat with the shaking and retching Sukhvinder, kept saying, ‘You might have died. You might have died.' It was as if she was still underwater. Sukhvinder was somewhere she could not breathe. She tried to cut through it all, to be heard. ‘Does Krystal know he's dead?' she asked through chattering teeth, and Parminder had to ask her to repeat the question several times. ‘I don't know,' she answered at last. ‘You might have died, Jolly.' At the hospital, they made her undress again, but this time her mother was with her in the curtained cubicle, and she realized her mistake too late when she saw the expression of horror on Parminder's face. ‘My God,' she said, grabbing Sukhvinder's forearm. ‘My God. What have you done to yourself?' Sukhvinder had no words, so she allowed herself to subside into tears and uncontrollable shaking, and Vikram shouted at everyone, including Parminder, to leave her alone, but also to damn well hurry up, and that her cut needed cleaning and she needed stitches and sedatives and X-rays †¦ Later, they put her in a bed with a parent on each side of her, and both of them stroked her hands. She was warm and numb, and there was no pain in her leg any more. The sky beyond the windows was dark. ‘Howard Mollison's had another heart attack,' she heard her mother tell her father. ‘Miles wanted me to go to him.' ‘Bloody nerve,' said Vikram. To Sukhvinder's drowsy surprise, they talked no more about Howard Mollison. They merely continued to stroke her hands until, shortly afterwards, she fell asleep. On the far side of the building, in a shabby blue room with plastic chairs and a fish tank in the corner, Miles and Samantha were sitting on either side of Shirley, waiting for news from theatre. Miles was still wearing his slippers. ‘I can't believe Parminder Jawanda wouldn't come,' he said for the umpteenth time, his voice cracking. Samantha got up, moved past Shirley, and put her arms around Miles, kissing his thick hair, speckled with grey, breathing in his familiar smell. Shirley said, in a high, strangled voice, ‘I'm not surprised she wouldn't come. I'm not surprised. Absolutely appalling.' All she had left of her old life and her old certainties was attacking familiar targets. Shock had taken almost everything from her: she no longer knew what to believe, or even what to hope. The man in theatre was not the man she had thought she had married. If she could have returned to that happy place of certainty, before she had read that awful post †¦ Perhaps she ought to shut down the whole website. Take away the message boards in their entirety. She was afraid that the Ghost might come back, that he might say the awful thing again †¦ She wanted to go home, right now and disable the website; and while there, she could destroy the EpiPen once and for all †¦ He saw it †¦ I know he saw it †¦ But I'd never have done it, really. I wouldn't have done it. I was upset. I'd never have done it †¦ What if Howard survived, and his first words were: ‘She ran out of the room when she saw me. She didn't call an ambulance straight away. She was holding a big needle †¦' Then I'll say his brain's been affected, Shirley thought defiantly. And if he died †¦ Beside her, Samantha was hugging Miles. Shirley did not like it; she ought to be the centre of attention; it was her husband who was lying upstairs, fighting for his life. She had wanted to be like Mary Fairbrother, cosseted and admired, a tragic heroine. This was not how she had imagined it – ‘Shirley?' Ruth Price, in her nurse's uniform, had come hurrying into the room, her thin face forlorn with sympathy. ‘I just heard – I had to come – Shirley, how awful, I'm so sorry.' ‘Ruth, dear,' said Shirley, getting up, and allowing herself to be embraced. ‘That's so kind. So kind.' Shirley liked introducing her medical friend to Miles and Samantha, and receiving her pity and her kindness in front of them. It was a tiny taste of how she had imagined widowhood †¦ But then Ruth had to go back to work, and Shirley returned to her plastic chair and her uncomfortable thoughts. ‘He'll be OK,' Samantha was murmuring to Miles, as he rested his head on her shoulder. ‘I know he'll pull through. He did last time.' Shirley watched little neon-bright fish darting hither and thither in their tank. It was the past that she wished she could change; the future was a blank. ‘Has anyone phoned Mo?' Miles asked after a while, wiping his eyes on the back of one hand, while the other gripped Samantha's leg. ‘Mum, d'you want me to – ?' ‘No,' said Shirley sharply. ‘We'll wait †¦ until we know.' In the theatre upstairs, Howard Mollison's body overflowed the edges of the operating table. His chest was wide open, revealing the ruins of Vikram Jawanda's handiwork. Nineteen people laboured to repair the damage, while the machines to which Howard was connected made soft implacable noises, confirming that he continued to live. And far below, in the bowels of the hospital, Robbie Weedon's body lay frozen and white in the morgue. Nobody had accompanied him to the hospital, and nobody had visited him in his metal drawer.