Make your own eBooks

Use our Remix App to mix & match content. In minutes make your own course packs, training bundles, custom travel guides, you name it. Even add your own title & cover.


Slices & Articles Get by the slice or add to your own ebook

Medium 9781937538460

40 Dark Field Martini Splash

Tilo Gockel Rocky Nook-IPS ePub

Two more cream splashes from the same shoot, captured using the parameters listed on page 255

Dark Field Martini Splash

Using a cross-beam sensor

Capturing a splash using dark field lighting

Dark field lighting is perfect for capturing objects made of glass or other highly reflective materials. The technique uses light from the side that grazes the surface of the object and produces an aesthetically pleasing look. This workshop combines dark field lighting techniques with splashes.

In this setup a large flag blocks the direct light from the flash and allows only diffuse, indirect light to reach the subject. This makes the glass look almost entirely black, with bright accents around the outline. To create the effect, bounce flash light off a reflector that is placed behind the glass, and insert a flag between the reflector and the subject. Additional reflectors on each side of the glass provide lateral accents.

See All Chapters
Medium 9780596804169

21. Project Management Is Problem Management

Barbee Davis O'Reilly Media ePub

IN THE BEST OF CIRCUMSTANCES, software project management is a challenging and complex endeavor. Yet, I often see PMs make it even more difficult by having the wrong set of expectations for the role.

Plain and simple, project management is problem management. Were that not the case, there would be no need for project managers. Rather, a request for execution would be made and all the pieces (resources, technology, requirements, timeline, etc.) would simply align and the work would proceed smoothly to completion without any need for shepherding.

The truth is, our role exists because that is not the reality. Resources are overallocated, technologies and skill sets are incompatible, requirements are unclear, and timelines are unrealistic. I frequently work with PMs who view those types of issues as inconveniences, annoyances, or "problems" caused by external forces that are interfering with their work. If only they had done this, if only they had thought that out better, if only they would give me more time, then all these needless complications would be gone and I could finally get on with the business of project management.

See All Chapters
Medium 9780596510480

A. VoIP Channels

Jim Van Meggelen O'Reilly Media ePub

VoIP channels in Asterisk represent connections to the protocols they support. Each protocol you wish to use requires a configuration file, containing general parameters defining how your system handles the protocol as well as specific parameters for each channel (or device) you will want to reference in your dialplan. In this appendix, well take an in-depth look at the IAX and SIP configuration files.

The IAX configuration file (iax.conf) contains all of the configuration information Asterisk needs to create and manage IAX protocol channels. The sections in the file are separated by headings, which are formed by a word framed in square brackets ([]). The name in the brackets will be the name of the channel, with one notable exception: the [general] section, which is not a channel, is the area where global protocol parameters are defined.

This section examines the various general and channel-specific settings for iax.conf. We will define each parameter and then give an example of its use. Certain options may have several valid arguments. These arguments are listed beside the option, separated with the pipe symbol (|). For example, bandwidth=low|medium|high means that the bandwidth option accepts one of the values low, medium, or high as its argument.

See All Chapters
Medium 9781855751118

CHAPTER NINE. Transference and countertransference Issues In the in-patient psychotherapy of traumatized children and adolescents

Karnac Books ePub

John Tsiantts


In this chapter, the phenomena of transference and countertransference observed during the application of psychoanalytic psychotherapy as part of the ln-patlent care of traumatized adolescents are presented and discussed.

My views represent an attempt to summarize some theoretical issues presented In the literature and to tender my observations made during the ln-patlent treatment of such children and adolescents (aged 8 to 15 years) in the ln-patlent unit of the Department of Psychological Paediatrics of the “Aghla Sophia” Children’s Hospital, Athens.

Laplanche and Pontalls, In The Language of Psychoanalysis, give the following definition of psychic trauma: “An event In the subject’s life defined by Its Intensity, by the subject’s Incapacity to respond adequately to It, and by the upheaval and long-lasting effects that It brings about In the psychical organisation” (1973, p. 465).

Laplanche and Pontalls contend that, In his early writings, Freud tended to put the concept of trauma In an economic—that Is, quantitative—perspective. Freud later said (1916-17): “We apply It (the term trauma] to an experience which within a short period of time presents the mind with an Increase of stimulus too powerful to be dealt with or worked off In the normal way, and this must result In permanent disturbance of the manner In which energy operates.” To put It another way, the psychological trauma Is any psychological event that suddenly floods the ego, preventing It from securing a minimal sense of safety, and hindering the Intact and Integrated functioning of the ego. As a result, the ego is overwhelmed with anxiety, while the sense of complete helplessness that Is also present contributes to bringing about an almost Inevitable change In the psychological organization. In other words, the trauma leads to disturbance of the functions of the ego In that It narrows the range of techniques and patterns of behaviour available for dealing with objects and the environment (Furst, 1986). The following points regarding psychological trauma should also be noted as of great Importance In understanding and coping with psychopathologlcal phenomena. It is very often the case that a truly traumatic experience Is Invested with the fantasies already existing In the mind of the child or adolescent, and so an experience of physical violence or punishment, or a surgical operation, can be experienced as castration, as punishment, or as masochistic gratification. Here, the fantasies already present will appear to have been validated and reinforced, and the younger the child Is, the greater will be the confusion between fantasy and reality. As noted by Kris (1978), the trauma also tends to become bound up with the events subsequent to It. He also observes that children and adolescents tend to confuse trauma and punishment. Psychologically traumatized children and adolescents are often convinced that they are “very bad”, and they tend to be strongly inclined towards self-censure with resulting guilt and low self-esteem. They very often identify with the aggressor, and also with the guilt and defence mechanisms of the parents. As a result, adolescents who have been physically or sexually abused tend to repeat the same acts with other persons, while at the same time having shared fantasies and defences with the parents or others who abused them, with whom they enter into a conspiracy of silence. Another consequence of traumatic experience is regression to earlier developmental levels of organization. This regression can be in the services of development or can lead to libldinal and genetic fixation points. Nor should we forget that sensitivity to the trauma and the consequences of the trauma will vary in accordance with the stages of development that have already taken place. Furst also argues, in connection with the relationship between trauma and development, that the developmental tasks of each subsequent period will be affected. In the case of adolescence, he contends that while trauma will Interfere with the developmental tasks of adolescence in a general way, the following specific vulnerabilities should also be noted:

See All Chapters
Medium 9781576750155

Chapter VII: What Next?

Harrison H. Owen Berrett-Koehler Publishers ePub

It is my fondest hope that by 2010 (just to pick a date), Open Space, as a distinct methodology, will have disappeared from the face of the earth. It is not that I wish to rid the earth of Open Space, I simply hope that the methodology will have become so commonplace as to be invisible. I envision Open Space to be rather like accounting—something everybody does—noticed only when it is not done or done poorly.

This hope for the invisibility of Open Space Technology is not without foundation. If you will grant my strong suspicion that a majority of the truly workable aspects of our present organizations look much more like Open Space than the standard picture of command and control, we are already well on the way. Add the notion that the current high-stakes environment has created conditions fostering organizational evolution in the direction of Open Space, and 2010 may well be further into the future than Open Space Technology will extend.

No claim is made for the evolutionary cards being stacked in favor of Open Space, or alternatively, for having designed Open Space to fit current evolutionary trends. But I do not think it takes extreme perception to understand that organizations surviving with style in the next millennium will be flexible, fun, and hugely efficient in terms of human energy and Spirit—always enlarging their 102awareness of an enormously dynamic world—in short, living very intentionally in an expanding Now. The alternative is virtually instantaneous burnout, isolation, and obsolescence, none of which are particularly good for business. Open Space may be able to help in several areas.

See All Chapters

See All Slices