Archiv pro měsíc: Leden 2016

Power Banks

 

What is Power Bank?

is a special  external battery  which works as a charger. That can be used for almost any USB-charged devices like smartphones,tablets,cameras, GoPros, portable speakers and many more. This is increasingly popular device. Power Banks allow us to store electrical energy and later use it to charge mobile and tablet. The best Power Bank are from brands:Dell,Asus,ConnectIT,Lenovo,Kingston,Samsung and HP.

It will lose charge if it is stored in a chilly place or under the scorching sun. Extreme heat or cold may even cause permanent damage to its battery. Power Bank needs to boost the voltage of its internal battery to 5 volts, and a special voltage boosting circuit is used for the purpose. Power Bank´s circuit is where some of the energy is lost, and the losses may exceed 10%, depending on the circuit’s efficiency.Most of that are designed to provide 2 amps of output current.Sometimes is good to discharge and recharge a power bank on a monthly basis.
How it works?

They work the way you would charge and use like a normal cell phone battery. Power banks capacities are quoted in milliamp-hours (Mah), If you will have higher Mah it will be better

How do I charge a Power Bank?Power Bank Charging Diagram

Power Banks must be charged to. Power Bank has a dedicated input socket for receiving power. This power can come from a USB socket on computer. Power Banks use a Mini or Micro-USB socket for charging, and full-sized USB sockets for discharging. it can use the same socket for input and output. This is rare and shouldn´t be assumed of any Power Bank. It can take a quite a while to fill up the Power bank. Some Power Banks don’t work  with high-capacity chargers (example is ipad). Most power banks are designed to provide 2 amps of output current
9

 

Types of Power Banks

There are 3 types of Power Banks:

  1. Universal Power Bank -it comes in many configurations and sizes. It can be tailored to your device requirements and to your budget.

2. Solar-Charged Power Bank – it has photovoltaic panals which . It´s not very fast,but you can use via cable.

3. battery case – this type of Power Banks  are handy and they can be narrow compability,but cable chick can´t stock.

How many times can I charge my mobile and tablet?

mobile has approximetly 1300 mah  and tablet approximatel 3000 mah. There are 6 Power Banks capacity options

  1. to 2999 ( you can charge your mobile 2 times to max battery and tablet 0 time to max battery)
  2. from 3000 Mah to 4999 Mah (you can charge your mobile 3 times to max battery and tablet 1 time to max battery)
  3. from 5000  Mah to 6999 Mah (you can charge your mobile 5 times to max battery and tablet 2 times to max battery)
  4. from 7000 Mah to 8999 Mah (you can charge your mobile 6 times and tablet 2 times to max battery)
  5. from 9000 Mah to 14999 Mah (you can charge your mobile 11 times and tablet 4 times to max battery)
  6.  from 15000  Mah and more 2,1 Mah (you can charge your mobile 16 times and tablet 7 times to max battery)

 

Sources:

http://www.instructables.com/id/PowerBanks-How-It-Works/

http://www.cablechick.com.au/blog/what-are-power-banks-and-how-do-they-work/

alza.cz

http://www.phonearena.com/news/Heres-why-power-banks-arent-as-big-as-they-seem-to-be_id67153#1jpCX13vROPM1aBA.99

 

Nespavost

Nespavost jinými slovy také insomnie je nejčastější skupina poruch spánku, jejíž hlavním příznakem je porucha usínání nebo průběh spánku (přerušovaný spánek, brzké probouzení).

PŘÍZNAKY INSOMNIE

  • obtížné noční usínání
  • brzké ranní probouzení bez schopnosti znovu usnout
  • časté noční probouzení
  • noční bdělost, záměna dne a noci

TYPY INSOMNIE – ROZDĚLENÍ

Za 1) PODLE PŘEVAŽUJÍCÍ PŘÍČINY

  • insomnie
  • hypersomnie (nadměrná spavost)
  • poruchy cirkadiánního rytmu (tj. poruchy střídání spánku a bdění, netolerance směnného režimu např. v povolání)
  • parasomnie (chorobné stavy a jevy vyskytující se v souvislosti se spánkem, např.   náměsíčnictví, mluvení ve spánku, noční křeče v lýtkách a mnoho dalších).

Za 2) Z HLEDISKA DÉLKY TRVÁNÍ

  • Přechodná insomnie je stav, který trvá zpravidla do jednoho týdne.
    • Obvykle bývá způsobený stresem
    • po nějaké době odezní sama (často po zmizení stresoru – vykonání zkoušky, pohovoru, atd.).
  • Akutní insomnie– trvání je do 1 měsíce.
    • Obvykle je vhodný zásah lékaře, který stav insomniaka zkontroluje a konstatuje, zda je nutná léčba.
  • Chronická insomnie může být primární (vznikla sama o sobě, např. kvůli organickému poškození), anebo sekundární (vzniká vlivem jiné nemoci, např. deprese).

⇒ Dlouhotrvající insomnie může mít vážné zdravotní následky.

PŘÍČINY INSOMNIE

  • stres, nadměrná psychická zátěž
  • nepravidelný spánkový režim
  • změna přirozeného biologického rytmu (např. při změně časového pásma – pásmová nemoc, přechod z letního na zimní čas apod.)
  • deprese
  • kofein a alkohol
  • užívání některých léků
  • špatné prostředí pro spánek
  • nemoc (zdravotní obtíže)
  • nedostatek pohybu během dne
  • nadměrná konzumace jídla nebo pití večer

DŮSLEDKY INSOMNIE

  • unavenost
  • malátnost
  • podrážděnost
  • zhoršená koncentrace
  • snížená pracovní výkonnost
  • špatná nálada
  • sklon k depresím

LÉČBA NESPAVOSTI

1) Spánková hygiena = vyřešení všech rizikových faktorů pro spánek a včasné řešení již nastalých problémů se spánkem.

2) Léčba vyvolávající příčiny

3) Vyřazení alkoholu, kávy, černého čaje, energetických nápojů,  omezit kouření, sportovní a jiné fyzicky náročné aktivity  vynechat minimálně 5 hodin před spánkem.

4) Naučit se zvládat stres

5) Léky na spaní

Network Security

Network security are rules, which are established by the network administrator for prevention and control of unauthorized access, abuses and adjust. Network security includes an access to datas, which control a network administrator. Users can choose their own ID and password, which allows them an acces to information and programs and not to anybody else.

Network security includes a set of networks; for example:  public and private which are daily use worldwide.

Basically network security provides network as well as the protection and supervision of operations carried in them. Everyone who wants to connect to this network needs to know the right password.

Antivirus software

What is it?

it is a computer software used to prevent malicious software.

Principles and functions: searches and checks data on the basis of the virus database. This virus database has been updated to users for download, which is usually done automatically.

Firewall

Firewall presents something like a „wall“ between a computer and network.  Firewall protects your computer before attacks of hackers and also controls datas.

Allows you to decide, if you permit to some programe ans access to the internet or not. Some firewalls warn a computer, if some program is running without your approval

Hardware

=external computer equipment

  • indicates all of the physically existing technical equipment of computer. Hardware are components of computer without which they wouldn’t be able to work. These are electronic components that are on the base unit, sometimes called a motherboard on mainboard. The motherboard is the basic hardware of the most computers. A source is a hardware powered from the electrical net, which dirrects a current to the base unit and to the other hardware components that are not directly involved to some of the buses on the base unit and need the power to run.

Typical parts of Hardware

processor, memory, display, keyboard, printer, diskettes, drives, CD-ROM drives, tape drives, speakers…

ProcesorHarddiskZákladní deskaSíťová kartaCD-mechanika

Software

= internal computer equipment

set of all computer programs, which are used in computers which provide some operation. Software can also provides an unintended operation and in this case we are talking about programming error or computer viruses, malware, spyware, trojan horses and similar unwanted software.

Software can be divided by functions:

  1. System software = allows effective usage of computer
  2. Firmware = software contained in Hardware (BIOS, firmware input-output divices)
  3. Operating system = manages computer (creates environment for programes
  4. System tools =  for the management of operating system
  5. Application software
  6. Graphics programs
  7. entertainment software: computer games…

http://hardwareasoftware.sweb.cz/

Free software vs Paid software

Free software

is computer software that gives users the freedom to run the software for any purpose as well as to study, change, and distribute the software and the adapted versions

Clearly said – Free software refers to a freedom, not to price.

  • The freedom to run the program for any purpose
  • The freedom to study how the program works, and adapt it to your needs
  • The freedom to redistribute copies so you can help your co-worker
  • The freedom to improve the program and publish the improvements to them can benefit the whole community

Examples:

  • 7-Zip – Zipping and unzipping software that is truly free
  • Firefox, Chrome – browsers
  • VLC, MediaPlayerClassic – Video
  • Spotify – Music
  • Picasa – Photo Editor

http://www.gnu.org/philosophy/free-sw.cs.html

http://unlearner.com/toolbox/70-best-free-alternatives-to-paid-software/

http://lifehacker.com/paid-vs-free-software-your-best-arguments-870361592

https://cs.wikipedia.org/wiki/Svobodn%C3%BD_software

Paid Software

While the distinction between free and paid software almost seems irrelevant when you consider quality, it does matter in terms of support.

When you pay for software, you generally get the support systems that go with it — regular upgrades, software publishers who are more interested in what you want to do with the software than what they want to do with it, and more responsive technical support. Plus you get that God-given right to say „I’ve got a problem with your software, and I’d like your assistance in fixing it.“

There are exceptions to everything, of course. But in general, when it comes to software support systems, you get what you pay for.

Examples:

  • Microsoft Office
  • AutoDesk software
  • Adobe content creation software
  • MATLAB

Network attacks

Network attack is any attempt to destroy, change, stole or gain unauthorized access or unauthorized use of property by means of computer technology and computer networks.

Attack can be active or passive, inside or outside

By active attacks we are trying to change the system resources or affect their operation.

By passive attack, we are trying to learn or use the information from the system, but has no influence on system resources.

Types of attacks:

    • Network
      • wiretapping
      • Port scanner
      • Idle scan
  • Active
    • Denial-of-service attack
    • Spoofing
    • Network
      • Man in the middle
      • ARP poisoning
      • Ping flood
      • Ping of death
      • Smurf attack
  •  Host
  • Buffer overflow
  • Heap overflow
  • Stack overflow
  • Format string attack

 

Smartphone Lens Adapters

black-eye-promo-215111

Sál, Black Eye, Mobile net, 2015, Public domain

In today world of technology, people are coming up with new and innovative conveniences all the time. The huge computers had been replaced by small notebooks, tablets or smartphones. Also people invent modern versions of these devices. As we can see the world of technology is growing very fast. And as a result of it, lens adapters, that you might have seen used only with cameras, were adapted also for your smartphones.  Celý příspěvek

Autonomous cars

Autonomous cars

Autonomous cars are vehicles that are driverless, they don’t need a human input to be driven. They are sensing environment and feeling the surrounding with special techniques as computer vision, radars, GPS, odometer.

Advenced control system analyze the data from the sensors and calculate the best path for the vehicle. The sensor can identify obstacles, car can also identify traffic signs. As you go the car is watching the road, so it means if you go for example on a new road the car is updating its information about the road and maps. While driving you can set on the autonomous regime and the computer takes the control of the car, it will keep the speed limit, its watching all around the car so it knows where are other cars, if a car in front  of you is too slow the car check if it is possible to overtake the car.

bosch-autonomous-car-technology_100417251_m

What are the advantage  ?

The advantage is that you can enjoy the ride while the car is driving, or you can work while traveling or etc. In a future we can use them as a taxi services, it would be awesome, no more annoying taxi drivers and unfair costs. You can also save some money on a personal driver. Avoiding human mistakes like slow reactions, low percentage of aggressive drivers,

What are the disadvantages ? 

If you really love driving cars you can’t enjoy them properly. The computers can also make mistakes so we can’t trust the to one hundred percent.  They also don’t have the sixth sense that save lives to many people.

The transport system

In Eu ( Belgium, France, italy, UK ) are planning to have driverless cars,  the autonomous cars are allowed to be tasted in Germany, Netherland, Spain. In summer 2015 the France allowed to Peugeot and Citroen to test the autonomous cars in normal traffic. Also UK allowed the testing. The driverless car system that will be using in 2016 in France will be also used in Mercedes Benz, Audi.

Google car

Google car is probably the most developed autonomous car. The cars are developed in Google X which is an semi secret project of google developing self driving cars. Google use for the project these cars ( Toyota Prius, Audi TT, Lexus450h ) equipped with the self driving equipment.  Google also have their own cars that are assembled by Roush Enterprises and use equipment from Bosh, LG, Lenksysteme and Continental. Each car have in them equipment about 150 000$ and LIDAR system ( thats system that measure distance between cars ).

In 2014 Google presented a new concept of their car that is without steering wheel and pedals, Google planed to test the vehicle in December 2015 at San Francisco  Bay Area roads. Google is planning make these vehicles available for public in 2020.

History

First test of autonomous car were in 1920s, they planned that first autonomous car will be in 1950 but truly self-sufficient car came on 1980 with Carnegie Mellon Universitys labsand then in 1984 with Mercedes Benz.

Legislation

In the United States, state vehicle codes are not necessarily prohibited highly for a automated vehicles. To clarify the legal status of and otherwise regulate such vehicles, several states have enacted or are considering specific laws. As of the end of 2013, four U.S. states, (Nevada, Florida, California, and Michigan), along with the District of Columbia, have successfully enacted laws addressing autonomous vehicles.

In 2011 the Nevada legislature passed the law of authorization of using autonomous cars.

In spring 2015 Switzerland allowed to test new autonomous passat at public roads at Zurich.

sources :

https://en.wikipedia.org/wiki/Google_self-driving_car

https://en.wikipedia.org/wiki/Lidar

https://en.wikipedia.org/wiki/Autonomous_car

https://www.google.com/selfdrivingcar/

 

Operating systems

477065467_Operating_SystemAn Operating System is low-level software that enables a user and higher-level application software to interact with a computer’s hardware and the data and other programs stored on the computer.

His basic function is to performs basic tasks, such as recognizing input from the keyboard, sending output to the display screen, keeping track of files and directories on the disk, and controlling peripheral devices such as printers.

Application programs 

Operating systems provide a software platform on top of which other programs, called application programs, can run.

The choice of operating system, therefore, determines to a great extent the applications a user can run. For example, the DOS operating system contains commands such as COPY and RENAME for copying files and changing the names of files. The commands are accepted and executed by a part of the operating system. Similarly, the UNIX operating system has commands like CP and MV to copy and rename.

UNIX

Unix was one of the first operating systems to be written, in 1971.   Advantages of UNIX are: 

  • Multitasking – multiple programs can run at one time.
  • Multi-user – allows more than a single user to work at any given time. This is accomplished by sharing processing time between each user.
  • Safe – prevents one program from accessing memory or storage space allocated to another program, and enables file protection, requiring users to have permission to perform certain functions, such as accessing a directory, file, or disk drive.

Types of OS

  • Microsoft Windows
  • Mainframe
  • DOS
  • OS/2
  • Linux
  • Mac OS
  • AmigaOS

Additional service of the operatig systems is for example the Program Execution,where OS provides an environment where the user can conveniently run programs while the user does not have to worry about memory allocation or CPU scheduling.

I/O Operations consist of each program that requires input and produces output. The OS hides some of the details of the underlying hardware for such I/O. All the user sees is that the I/O has been performed, without those details.

And In the end we have Communications, where the instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on different computers. The OS provides these services to application programs, making inter-process communication possible, and relieving the user of having to worry about how this accomplished.

Most popular operating systems:

  • Android has the largest it is the most popular OS in Asia and Africa, by web usage. Since 2013, devices running it have been selling more than Windows,iOS,and Mac OSX devices.

800px-Android_green_figure,_next_to_its_original_packaging

https://upload.wikimedia.org/wikipedia/commons/e/ee/Android_green_figure%2C_next_to_its_original_packaging.jpg

  •  Even Android the most popular smartphone operating system, on tablets iOS is still the most popular in that category.
  • On the other hand,most desktop and laptop computers use Microsoft Windows, while most supercomputers use Linux.

Citations:

„Computer Basics: Understanding Operating Systems.“ GCFLearnFree.org. N.p., 2015. Web. 12 Jan. 2016.

„What’s My OS? What Is My OS?“ What’s My OS? What Is My OS? N.p., n.d. Web. 12 Jan. 2016.

 

 

Eastern Ukraine crisis

Background:

The conflict takes place in Ukraine, Black sea and Russian Federation. It started on 26 February 2014 and is still ongoing. The leaders are Vladimir Putin for Russia, Petro Poroshenko for Ukraine.

What happened?

Many Ukrainians got angry with their formal president, Viktor Yanukovych. This action led to Ukrainian revolution (February 2014). Then series of changes happened in Ukraine’s political system. After the revolution, Russia refused to recognize and accept the new government that was created during the revolution.

Pro-Russian argument:

Russia’s main argument states that their only need is legitimately protect that region due to majority of Russian speaking people. Russia also says that the real reason is to protect the citizens of Russia in the Ukrainian area, especially the Crimea area and cities like Luhansk, Mariupol, Donetsk.

Pro-Ukrainian argument:

Very few people do not blame Russia for what is happening in Crimea and in Eastern Ukraine. Over 70% support keeping Ukraine united. Very few people in Ukraine see the issue of Russian language in Ukraine as needing urgent changes and also Ukrainians do not trust Russian officials.

Crimea must be reunited with Russia:

Historically, Crimea is Russian. Ethnically Crimea is nearly 60% Russian, 20% Ukrainian, who are mainly pro-Russian. Politically, Crimean people are stuck with Ukraine and most of them would like see Crimea as a part of Russia. If there was a democratic voting about the Crimea, the majority of people would definitely vote for joining with Russia.

Donetsk and Luhansk:

Even though those states are self-proclaimed, they should definitely not be called terrorist organizations. Luhansk and Donetsk are now recognized as self-proclaimed states and majority of citizens wants to see those two states joined with Russia, therefore there is no reason this should not happen. They have right to exist, unfortunately Ukraine consider them as terrorist and separatists due to their need to separate and cooperate with Russia.
Joining with Russia would benefit Russia and Ukraine equally, because the politics and economics are very problematic.

Sanctions:

United States and European Union put sanctions on Russian individuals and businesses. During the crisis the scope of the sanctions increased. Russian government responded in calmly did not fight against them, only put few sanctions back on USA and some european countries. These sanctions are not fair at all because they only create problem and do not solve the conflict.

Wikipedia. Wikimedia Foundation, n.d. Web. 12 Jan. 2016.
(https://en.wikipedia.org/wiki/Annexation_of_Crimea_by_the_Russian_Federation)

„Ukrainian Conflict (2013-present) • /r/UkrainianConflict.“ Reddit. N.p., n.d. Web. 12 Jan. 2016.
(https://www.reddit.com/r/ukrainianconflict)

„Ukraine Conflict: Why Is East Hit by Conflict? – BBC News.“ BBC News. N.p., n.d. Web. 12 Jan. 2016.
(http://www.bbc.com/news/world-europe-28969784)

USB interface – edit

USB is the most universal connection to connect devices into computer such as digital cameras, printers, scanners and external HDD. USB is supported by the most popular operating systems, so it is called cross platform technology. Development started in 1994 by a group of seven companies;  Compaq, DEC, IBM, Intel, Microsoft, NEC, and Nortel.

First USB that was widely used was called USB 1.1. It was released in September 1998. Speed was 12 Mbit/s and was intended for higher-speed devices like disk drives. 1.5 Mbit/s rate was much lower and was used for devices such as joysticks or gamepads. iMac played major role at popularizing the USB.

USB 2.0 was released in year 2000 and immediately became official standard. USB 2.0 had backwards compatibility with its predecessor USB 1.1. This means that if you have newer USB 2.0 port, USB 1.1 devices can still be plugged in and will work perfectly. USB 2.0 support plug and play capabilities for most of the multimedia and storage devices. Speed is 480 Mbit/s which is 40-times more than in the previous USB 1.1.

In year 2000 was also released USB flash drive, a rewritable plug and play storage device that was first sold by IBM and Trek Technology companies.

USB 3.0 is the latest version. Its super speed data transfer rate is up to 4.8 gigabits per second. It also offers backward compatibility with USB 2.0 and ports. If you plug USB 3.0 into USB 2.0 port, the super speed will not work because it requires and USB 3.0 in order to reach the super speed. First devices to support USB 3.0 were released in 2010.

Next generation of USB called USB 3.1 was released in year 2013. The main improvement was boost of data transfer of up to 10 gigabits per second. Also new improvements and features were added like improved data encoding and efficiency, doubling the speed of generation 1 standard. To make it clear. 50 gigabyte Blu-Ray disc could be transferred with USB 3.1 in just 38 seconds.

Development of similar USB 3.1 has started in year 2014 and is called USB Type-C. It is a new small reversible-plug connector for USB devices. Type-C is supposed to be future-proof, comparing to Apple’s Lighting and Thunderbolt, it has the same idea. Type-C devices also has its power currents of 1.5 A and 3.0 A over the 5 V power bus in addition to baseline 900 mA. Type-C cables are meant to be active, electronically marked cables which contain a chip with an ID function based on the configuration data channel. This new type of USB is meant to be very popular in the close future.

Wikipedia. Wikimedia Foundation, n.d. Web. 12 Jan. 2016.
(https://en.wikipedia.org/wiki/USB)

„USB History.“ USB History. N.p., n.d. Web. 12 Jan. 2016.
(http://www.allusb.com/usb-history)

„USB 1.0 vs USB 2.0.“ – Difference and Comparison. N.p., n.d. Web. 12 Jan. 2016.
(http://www.diffen.com/difference/USB_1.0_vs_USB_2.0)

„USB 3.1 Have You Confused? Here’s Everything You Need to Know about the Standard.“ Digital Trends. N.p., 26 Sept. 2015. Web. 12 Jan. 2016.
(http://www.digitaltrends.com/computing/what-is-usb-3-1-when-will-it-be-released-and-what-will-it-do-for-pcs/)

Camera lenses

In another word known as photographic lens or objective is an optical lens used in conjunction with a camera body. It is a mechanism that make images of objects.

What is focal length?

The focal length of the lens is distance between the lens and the image sensor, the distance is in millimeters. Most of the people think that focal length is a measure of how long or short a lens is physically, but as I said it is a distance between the optical center of a lens and the imagining sensor.

What is the connections between focal length and angle of view?

When you take a picture you should definitely pay attention to focal length and angle of view. The focal length is a picture that has part of the picture thrown away and the viewing angle is similar to the portion of the scene that the lens can capture it is measured in degrees. If your lens is more angular then the portion of the scene is greater.

What is Crop Factor?

Lenses usually have circular image and the sensor records a rectangular portion of the scene and the rest of the image is not important, it is cut from the photo and this is known as Crop Factor. The opposite of crop factor is full-frame picture, it is a picture that has the full picture that was taken, nothing was taken off from the picture.

What is Optical Zoom?

Optical zoom is usually used on digital cameras. It is a essential part of a camera and it helps to take a closer picture of an object. It allows you to zoom in or out.

What is Aperture?

It is an opening of a lens, gap through which light passes in a lens. The lens aperture influences depth of field but it also affects image quality. Every lens have two or three aperture settings that can improve the final image and make it the sharpest image that you can make from your camera. It is also important which camera you buy because every camera has different aperture, more expensive cameras have better aperture which provides a better quality picture.

How to take the best night shot you can

It is really difficult to take a perfect picture when it is dark outside, everything is transformed into a glittering spectacle. For taking photos of the night sky you have to switch your camera into night photography, this settings will help you to take the best picture of the night sky, but only if your camera has this type of mode, if it does not I would recommend you to buy a new camera, which has these modes. Another great tool you need to have is a tripod, which can help you to take a really sharp picture. If you attach your camera to a tripod it is easier because when your hands can shake while you are taking a picture and the final picture is terrible. Another tip is to choose a good location usually somewhere on the hill or high ground. Enable mirror lock-up for sharp picture because your camera can shake and the mirror lock-up avoid potential pitfall. You can find this function in your setting.

What is depth of field?

For photographers it is very important to understand the depth of field. It is a connections of aperture, focal length and focusing and all together they affect the depth and control sharp of your photos. Every photographer knows that camera can only focus its lens on one single point, but the depth of field is a area of a photo that stretches of and behind focus point and is still sharp. It can be described also as shallow in which only a narrow zone appears sharp or also known as deep – more of the photo appears sharp.

Sources:

Sources
Sources2
Sources3

 

USA, New York, Manhattan, Midtown

USA, New York, Manhattan, Midtown

Language is language

I have a very strong connection to all kind of languages and I would eally love to learn more languages and get better and better.

Hands the main source of language > Speaking hands By NPS Graphics, converted by User:ZyMOS [Public domain or Public domain], via Wikimedia Commons

But one of my favorite languages is SIGN LANGUAGE… And I am going to tell you something about my experience.

Celý příspěvek