Verifying your identity on Mastodon is for everyone. Based on open web standards, now and forever free. All you need is a personal website that people recognize you by. When you link to this website from your profile, we will check that the website links back to your profile and show a visual indicator on it.
Here’s how
Copy and paste the code below into the HTML of your website. Then add the address of your website into one of the extra fields on your profile from the “Edit profile” tab and save changes.
Terrarium tertutup adalah ekosistem mini yang bisa bertahan bertahun-tahun tanpa perawatan. Jika dibuat dengan benar, ia akan memiliki siklus air sendiri, tidak butuh penyiraman, dan bisa menjadi ekosistem mandiri yang menarik!
Cara Membuat Terrarium Tertutup dengan Ekosistem Mandiri 🌱
Terrarium tertutup adalah ekosistem mini yang bisa bertahan bertahun-tahun tanpa perawatan. Jika dibuat dengan benar, ia akan memiliki siklus air sendiri, tidak butuh penyiraman, dan bisa menjadi ekosistem mandiri yang menarik!
🌿 1. Siapkan Wadah Kaca Tertutup
Gunakan toples kaca, botol, atau akuarium kecil dengan tutup rapat.
Pilih yang transparan, agar cahaya bisa masuk untuk proses fotosintesis.
📌 Wadah harus bersih! Cuci dengan air panas dan keringkan sebelum digunakan untuk mencegah jamur.
🪴 2. Buat Lapisan Drainase (Agar Akar Tidak Busuk)
Lapisan ini membantu mengatur kelembapan dan mencegah pembusukan akar. Urutannya dari bawah ke atas:
1️⃣ Kerikil atau batu kecil → Drainase agar air tidak menggenang. 2️⃣ Arang aktif (karbon aktif) → Menyerap racun & mencegah bau/jamur. 3️⃣ Tanah khusus → Gunakan campuran tanah gambut, cocopeat, atau sphagnum moss.
🌱 3. Pilih Tanaman yang Tahan Kelembapan
Gunakan tanaman yang bisa hidup di lingkungan lembap dan rendah perawatan, seperti:
✅ Lumut (Java Moss, Sheet Moss, dll.) → Cocok untuk terrarium tertutup. ✅ Pakis mini (Asplenium, Adiantum) → Tahan kelembapan tinggi. ✅ Fittonia (Nerve Plant) → Daya tahan kuat & warna menarik. ✅ Peperomia → Cocok untuk ekosistem mandiri. ✅ Tanaman karnivora (Venus Flytrap, Cape Sundew) → Bisa menangkap serangga kecil sendiri.
📌 Hindari sukulen atau kaktus, karena mereka butuh lingkungan kering.
🦠 4. Tambahkan Ekosistem Mikro (Agar Mandiri & Tanpa Perawatan)
Untuk menjaga keseimbangan ekosistem dan menghindari jamur atau pembusukan, tambahkan:
🔹 Springtail (Serangga Mikro Pemakan Jamur) → Membersihkan jamur & sisa organik. 🔹 Isopod (Kutu Kayu Kecil) → Membantu mengurai daun mati & sisa bahan organik.
📌 Tanpa ini, terrarium bisa cepat berjamur dan busuk!
💧 5. Siram Air Secukupnya & Tutup Wadah
Gunakan air hujan atau air suling agar tidak ada zat kimia yang mengganggu keseimbangan.
Siram sedikit saja agar tanah lembap, tapi tidak terlalu basah.
Tutup rapat agar siklus air terbentuk.
☀️ 6. Letakkan di Tempat yang Tepat
Jangan kena sinar matahari langsung! Cahaya terlalu kuat bisa memicu kelembapan berlebih & jamur.
Taruh di tempat terang, tapi tidak terkena sinar matahari langsung (misal dekat jendela).
Jika ada terlalu banyak embun, buka tutupnya sebentar untuk ventilasi.
📆 7. Perawatan (Minimal atau Tanpa Perawatan)
✅ Tidak perlu disiram lagi! Air akan bersirkulasi sendiri. ✅ Jika ada jamur, bersihkan dengan kapas dan buka tutup sebentar. ✅ Jika tanaman tumbuh terlalu besar, pangkas sedikit agar tetap seimbang.
💡 Jika semua langkah benar, terrarium bisa bertahan bertahun-tahun tanpa perawatan!
🌿 Kesimpulan
✔ Terrarium tertutup adalah ekosistem mandiri yang bisa bertahan bertahun-tahun. ✔ Gunakan tanaman tropis yang tahan lembap seperti lumut & pakis mini. ✔ Tambahkan serangga mikro (springtail & isopod) agar bebas jamur & minim perawatan. ✔ Tempatkan di tempat terang tapi hindari sinar matahari langsung.
✨ Dengan cara ini, kamu bisa memiliki “hutan mini dalam botol” yang hidup sendiri tanpa perlu disentuh lagi! 🌍🌱
Ilmu di balik terarium tertutup
Terarium tertutup pada dasarnya adalah ekosistem mini, dan kemampuannya untuk mandiri bergantung pada prinsip-prinsip siklus air dan fotosintesis.
Siklus air: Seperti yang disebutkan sebelumnya, terarium tertutup menciptakan siklus air mini. Air menguap dari tanah dan tanaman, mengembun di kaca, dan jatuh kembali ke tanah. Siklus ini memungkinkan tanaman menerima air yang mereka butuhkan tanpa perlu penyiraman terus-menerus.
Fotosintesis: Fotosintesis adalah proses di mana tanaman menggunakan sinar matahari untuk menciptakan energi. Tanaman di dalam terarium tertutup dapat berfotosintesis, yang berarti mereka dapat menghasilkan makanan mereka sendiri menggunakan cahaya yang masuk ke dalam wadah. Tanaman menyerap karbon dioksida dan melepaskan oksigen, yang menciptakan lingkungan yang mandiri di dalam terarium.
Perawatan terarium tertutup
Meskipun terarium tertutup relatif mudah dirawat, terarium tetap memerlukan perhatian untuk memastikannya terus tumbuh subur. Berikut beberapa kiat untuk merawat terarium tertutup Anda:
1. Letakkan terarium tertutup Anda di area dengan cahaya terang dan tidak langsung, karena sinar matahari langsung dapat menyebabkan suhu di dalam wadah meningkat ke tingkat yang berbahaya bagi tanaman.
2. Pangkas daun yang mati atau menguning dari tanaman untuk mencegah pertumbuhan jamur atau mikroorganisme berbahaya lainnya.
3. Jika terjadi pengembunan di dalam terarium, angkat tutupnya hingga kaca menjadi bening untuk memungkinkan kelebihan air menguap.
4. Setelah menyiram terarium untuk pertama kalinya, amati dengan saksama. Tanaman dan lumut di dalamnya akan memberikan petunjuk visual yang menunjukkan kapan mereka membutuhkan lebih banyak air.
Terarium tertutup adalah contoh ekosistem miniatur yang menarik yang bergantung pada prinsip siklus air dan fotosintesis untuk dapat bertahan hidup sendiri. Memahami ilmu di balik taman miniatur ini dapat membantu Anda merawat terarium tertutup dengan lebih baik dan menghargai keindahan bentuk berkebun dalam ruangan yang unik ini.
寧願 再也記不起 I would rather never remember ning4jyun2 zoi3 jaa5 gei3 bat hei2 慢動作刪去 往日那些片段 Delete those fragments of the past in slow motion maan6 dung6zok3 saan1heoi3 wong5jat6 go2di1 pin3dyun6
明知 永遠戒不了 Knowing that I can never quit ming4 zi1wing5jyun5 gaai3 bat dou2 望著那煙圈繼續轉 Watching the smoke rings continue to rotate mong6zyu6 go2 go3 jin1 hyun1 gai3zuk6 zyun3 甚麼經得起時代幻變 回頭無限遠 What can withstand the changes of the times Looking back is infinite mat1je5 ging1dak1 hei2 si4doi6 waan6 bin3 wui4tau4 mou4haan6 jyun5
我已不太在乎日子怎樣走過 I don’t care how the days go by ngo5 ji5ging1 bat taai3zoi6fu4 jat6zi2 dim2joeng2 zau2 gwo3 永恆的工作 隨風飄泊 The eternal work drifts with the wind wing5hang4 ge3 gung1zok3 ceoi4fung1 piu1bok6 拼命看清楚 Try to see clearly ping3ming6 tai2 cing1co2
你流淚所以我流淚 You cry so I cry nei5 lau4leoi6 so2ji5 ngo5 lau4leoi6 未流淚的這些年 後悔到很累 In the new life ahead, please don’t break it by mistake mei6 lau4leoi6 ge3 ni1 gei2 nin4 hau6fui3 dou3 hou2leoi6 你的最新好友 不會問我是誰 Memories are dark streets and narrow alleys, not worth a look, only sigh nei5 ge3 zeoi3san1 hou2jau5 batwui5 man6 ngo5 hai6 bin1 go3 已經徹底洗去痕跡 怎麼搞亂思緒 If we meet again, no one is allowed to cry, and smiling may not be right ji5ging1 cit3dai2 sai2 heoi3 han4zik1 dim2joeng2 gaau2lyun6 si1soeng2
你流淚所以我流淚 You shed tears so I shed tears nei5 lau4leoi6 so2ji5 ngo5 lau4leoi6 在前面的新生活 你切勿錯手打碎 In the new life ahead, please don’t break it by mistake zoi2 cin4min6 ge3 san1 sang1wut6 nei5 cit3mat6 co3sau2 daa2 seoi3 回憶是暗街窄巷 不值一看 只得欷歔 Memories are dark streets and narrow alleys, not worth a look, only sighs wui4jik1 hai6 am3 gaai1 zaak3 hong6,bat zik6dak1 jat1 tai2,zi2dak1 hei1heoi1 再碰面 誰也不准哭 微笑也許都不對 If we meet again, no one is allowed to cry, and smiling may not be right zoi3 pung3min6 bin1 go3 dou1 bat zeon2 haam3 siu3 ho2nang4 dou1 bat ngaam1
如果 對你好一點 If you are a little better jyu4gwo2 deoi3 nei5 hou2 jat1 di1 就讓我走出你視線 Let me walk out of your sight zau6 dang2 ngo5 zau2ceot1 nei5 si6sin3 專心遮掩離愁別緒無謂留伏線 Concentrate on hiding the sadness of parting It doesn’t matter if you leave a clue zyun1sam1 ze1jim2 lei4sau4 bit6seoi5 mou4wai6 lau4fuk6sin3
我有一秒認為自己不用拯救 For a second I thought I didn’t need to be saved ngo5 jau5 jat1 miu5 jing6wai4 zi6gei2 batsai2 cing2gau3 以為可修正 重新適應 Thought it could be corrected Re-adapting ji5wai4 ho2ji5 sau1zing3 cung4san1 sik1jing3 卻未見出口 But I didn’t see the exit koek3 mei6 gin3 ceot1hau2
你流淚所以我流淚 You shed tears so I shed tears nei5 lau4leoi6 so2ji5 ngo5 lau4leoi6 在前面的新生活 你切勿錯手打碎 In the new life ahead, please don’t break it by mistake zoi2 cin4min6 ge3 san1 sang1wut6 nei5 cit3mat6 co3sau2 daa2 seoi3 回憶是暗街窄巷 不值一看 只得欷歔 Memories are dark streets and narrow alleys, not worth a look, can only sigh wui4jik1 hai6 am3 gaai1 zaak3 hong6,bat zik6dak1 jat1 tai2,zi2dak1 hei1heoi1 再碰面 誰也不准哭 微笑也許都不對 If we meet again, no one is allowed to cry, and smiling may not be right zoi3 pung3min6 bin1 go3 dou1 bat zeon2 haam3 siu3 ho2nang4 dou1 bat ngaam1
想到舊日紅著臉 不覺現在紅著眼 Thinking of the past, I blushed, but I don’t feel my eyes are red now nam2hei2 gau6jat6 hung4zyu6 lim6 batgok3 ji3ji4gaa1 hung4zyu6 ngaan5 秋風吹 冬霜降 結束一切聚散 Autumn wind blows, winter frost falls, ending all the gatherings and separations cau1fung1 ceoi1 dung1soeng1gong3 git3cuk1 jat1cai3 zeoi6saan3 不愛你慢慢能習慣 比捉緊你更簡單 I can get used to not loving you slowly Easier than holding on to you bat oi3 nei5 maan6 maan2 zaap6gwaan3 bei2 zuk1 gan2 nei5 gang3 gaan2daan1
你流淚所以我流淚 You shed tears so I shed tears nei5 lau4leoi6 so2ji5 ngo5 lau4leoi6 未流淚的這些年 後悔到很累 I regretted the years without tears mei6 lau4leoi6 ge3 ni1 gei2 nin4 hau6fui3 dou3 hou2leoi6 你的最新好友 不會問我是誰 Your new best friend won’t ask who I am nei5 ge3 zeoi3san1 hou2jau5 bat wui5 man6 ngo5 hai6 bin1 go3 已經徹底洗去痕跡 怎麼搞亂思緒 How can I mess up my thoughts when the traces have been completely washed away ji5ging1 cit3dai2 sai2 heoi3 han4zik1 dim2joeng2 gaau2lyun6 si1soeng2
你流淚所以我流淚 You shed tears so I shed tears nei5 lau4leoi6 so2ji5 ngo5 lau4leoi6 在前面的新生活 你切勿錯手打碎 In the new life ahead, please don’t break it by mistake zoi2 cin4min6 ge3 san1 sang1wut6 nei5 cit3mat6 co3sau2 daa2 seoi3 回憶是暗街窄巷 不值一看 只得欷歔 Memories are dark streets and narrow alleys, not worth a look, can only sigh wui4jik1 hai6 am3 gaai1 zaak3 hong6,bat zik6dak1 jat1 tai2,zi2dak1 hei1heoi1 再碰面 誰也不准哭 微笑也許都不對 If we meet again, no one is allowed to cry, and smiling may not be right zoi3 pung3min6 bin1 go3 dou1 bat zeon2 haam3 siu3 ho2nang4 dou1 bat ngaam1
太掛念 才決不肯講藏我心底的一句 I miss you so much that I won’t say what’s hidden in my heart taai3 gwaa3nim6 sin1kyut3 bat hang2 gong2 zong6 ngo5 sam1dai2 ge3 jat1geoi3
The ranking system for an emperor’s wives and consorts was detailed and varied across different Chinese dynasties. Here’s a more comprehensive breakdown, including variations from different dynasties like the Tang (618–907), Song (960–1279), Ming (1368–1644), and Qing (1644–1912) Dynasties.
Factors influencing rank:
Family background: Women from prominent families often received higher ranks.
Emperor’s favor: A concubine who gained the emperor’s favor could be elevated in rank.
Ability to bear children: Concubines who gave birth to the emperor’s heirs often received higher status.
1. Empress (皇后, Huánghòu) – First Rank
The highest-ranking wife of the emperor, his main consort.
She had authority over all the emperor’s consorts and the harem.
Wore the Phoenix Crown (凤冠, Fèngguān) as a symbol of power.
The Empress gave birth to the heir (Crown Prince) whenever possible.
2. Imperial Noble Consort (皇贵妃, Huáng Guìfēi) – Second Rank
Just below the empress but still held significant influence.
This rank was not always present in earlier dynasties but became common in the Ming and Qing Dynasties.
3. Noble Consort (贵妃, Guìfēi) – Third Rank
Higher than most other consorts but below the Imperial Noble Consort.
Usually, one or two women held this title.
4. Consort (妃, Fēi) – Fourth Rank
A mid-tier consort with noble status.
In the Qing Dynasty, there were typically four Consorts at a time.
5. Imperial Concubine (嫔, Pín) – Fifth Rank
A recognized consort but of lower status.
Had limited influence in court matters.
6. Noble Lady (贵人, Guìrén) – Sixth Rank
The lowest official rank in the imperial harem.
Some noble ladies could rise in rank if favored by the emperor.
7. First Attendant (常在, Chángzài) – Seventh Rank
Lower than a Noble Lady but still part of the emperor’s harem.
Had minimal influence but could be promoted.
8. Second Attendant (答应, Dāyìng) – Eighth Rank
The lowest recognized rank.
Mostly served the emperor without real power.
9. Palace Maids (宫女, Gōngnǚ) – Unranked
Not official consorts but worked in the inner palace.
Could sometimes be promoted if favored by the emperor.
Other Titles (Special Cases & Retired Consorts)
Empress Dowager (皇太后, Huáng Tàihòu) – The widow of a deceased emperor, often the mother of the new emperor.
Grand Empress Dowager (太皇太后, Tài Huáng Tàihòu) – The grandmother of the reigning emperor.
Virtuous Consorts (昭仪, Zhāoyí; 修仪, Xiūyí, etc.) – Titles used in some dynasties like the Tang, referring to special-ranked concubines with unique responsibilities.
Each dynasty had slight variations, but this structure provides a detailed view of the emperor’s wives’ ranks throughout Chinese history. Would you like information on a specific dynasty or any famous empresses? 😊
Mersenne Prime and Mersenne Twister are two distinct mathematical/computational concepts that share part of their name but serve completely different purposes. Here’s a breakdown of the differences:
1. Mersenne Prime
Definition: A Mersenne prime is a special type of prime number that can be expressed in the form:
Mn=2n−1
where nnn is a positive integer and MnM_nMn is prime.
Example: For n=2n = 2n=2, M2=22−1=3M_2 = 2^2 – 1 = 3M2=22−1=3 (which is prime). For n=3n = 3n=3, M3=23−1=7M_3 = 2^3 – 1 = 7M3=23−1=7 (which is also prime). However, not all numbers of the form 2n−12^n – 12n−1 are prime (e.g., 24−1=152^4 – 1 = 1524−1=15, which is not prime).
Applications:
Mersenne primes are closely related to perfect numbers, which are integers equal to the sum of their proper divisors.
They are of interest in number theory and are used in cryptographic algorithms.
In summary, while Mersenne primes are a special class of numbers studied in mathematics, the Mersenne Twister is a practical tool for random number generation in computing, inspired by the mathematical properties of Mersenne primes.
Why Are Mersenne Primes Special?
Rare: Not all numbers of the form 2n−12^n – 12n−1 are prime; nnn must itself be prime for 2n−12^n – 12n−1 to have a chance of being prime, but even then, not all such numbers are prime.
Connection to Perfect Numbers: Every Mersenne prime is associated with an even perfect number (a number equal to the sum of its proper divisors).
2. Mersenne Twister
Definition: The Mersenne Twister is a pseudorandom number generator (PRNG) developed by Makoto Matsumoto and Takuji Nishimura in 1997 and designed for generating sequences of random numbers with a very long period. It is named “Mersenne” because its period length is a Mersenne prime, specifically 219937−12^{19937} – 1219937−1.
Purpose: To generate sequences of numbers that approximate true randomness for applications in simulations, games, statistical sampling, and more.
Key Characteristics:
Period: Extremely long period (219937−12^{19937} – 1219937−1).
Speed: Very fast and efficient for generating random numbers.
Quality: Produces numbers with a uniform distribution and passes many statistical tests for randomness.
Applications:
Widely used in simulations, cryptographic applications (though not cryptographically secure), and any situation requiring high-quality random number generation.
Efficiency:
It is computationally efficient, capable of generating random numbers quickly, making it suitable for applications requiring large volumes of random data.
Quality of Randomness:
The Mersenne Twister passes most standard statistical tests for randomness, ensuring the generated sequences appear random and unbiased.
How Does It Work?
The Mersenne Twister works by maintaining an internal state array of size N=624N = 624N=624, with each element being a 32-bit integer. The generator progresses by:
Initialization:
The state array is initialized using a seed value (often a single integer).
Recurrence Relation:
The generator uses a linear recurrence relation to update its state. At each step, a new value is computed by combining elements of the state array using bitwise operations and a carefully chosen set of constants.
Tempering:
The output is “tempered” (processed further) to improve statistical properties and ensure the generated numbers are distributed uniformly.
Applications
Simulations:
Widely used in Monte Carlo simulations and scientific modeling where high-quality random numbers are required.
Games:
Randomness in video games, such as dice rolls, loot drops, or random events, often relies on the Mersenne Twister.
Statistical Sampling:
Random sampling from datasets in statistics and machine learning.
Randomized Algorithms:
Used in algorithms requiring randomness, such as quicksort or hash table probing.
Strengths
Extremely Long Period: The massive period ensures that the generator doesn’t repeat its sequence in realistic use cases.
Speed: Generates random numbers efficiently.
High Quality: It meets strict randomness requirements, making it suitable for most non-cryptographic applications.
Limitations
Not Cryptographically Secure:
The Mersenne Twister is predictable if an attacker knows part of its internal state or a sequence of generated numbers. For cryptographic purposes, use secure PRNGs like Cryptographically Secure PseudoRandom Number Generators (CSPRNGs).
Memory Usage:
The state array of size 624 integers (about 2.5 KB) is larger than simpler PRNGs like the Linear Congruential Generator (LCG).
Initialization Time:
Initializing the state array can be slower compared to simpler generators.
Variants
Several variants of the Mersenne Twister have been developed to address specific use cases:
MT19937:
The original 32-bit version of the Mersenne Twister.
MT19937-64:
A 64-bit version of the Mersenne Twister, designed for 64-bit systems.
TinyMT:
A smaller version with reduced state size, designed for embedded systems or applications with limited memory.
How to Use the Mersenne Twister in Programming
Most modern programming languages and libraries include the Mersenne Twister as the default or available PRNG:
Python
import random
random.seed(42) # Initialize the generator with a seed
print(random.random()) # Generate a random float between 0 and 1
C++
#include <random>
std::mt19937 mt(42); // Initialize with a seed
std::uniform_real_distribution<double> dist(0.0, 1.0);
double random_value = dist(mt); // Generate a random number
Key Differences
Aspect
Mersenne Prime
Mersenne Twister
Nature
Mathematical concept (prime number).
Algorithm for pseudorandom number generation.
Form
2n−12^n – 12n−1, where nnn is a positive integer and 2n−12^n – 12n−1 is prime.
Uses a long recurrence relation to generate random numbers.
Dalam bahasa Mandarin, kata “Dong” berarti “musim dingin” sementara “Zhi” berarti “kedatangan” yang memberikan arti harfiah dari festival ini “datangnya musim dingin”. Dongzhi merayakan titik balik matahari musim dingin, biasanya sekitar tanggal 21 hingga 23 Desember, dan dirayakan pada malam terpanjang dalam setahun. Melambangkan kemenangan cahaya atas kegelapan, Dongzhi, melambangkan bahwa hari-hari akan mulai bertambah panjang dan membawa rasa keseimbangan dan harmoni pada kehidupan manusia. Berdasarkan kepercayaan Tiongkok tentang yin yang, “Yang” melambangkan energi positif, kehangatan, dan cahaya. Setelah Festival Dongzhi, siang hari akan berangsur-angsur memanjang, karena “Yang” juga akan bertambah. Dipercaya oleh sebagian orang bahwa itu adalah hari ketika Dewa Dapur pergi ke surga untuk melaporkan kepada Kaisar Giok tentang perilaku sebuah keluarga.
Tang Yuan, bola-bola pangsit beras ketan, adalah minuman hangat tradisional yang terbuat dari jahe. Bola-bola ketan dalam wedang ronde biasanya berisi kacang tumbuk dan gula merah.
1. Apa itu Tang Yuan?
Tang Yuan (汤圆) adalah bola-bola tepung ketan yang biasanya direbus dan disajikan dalam kuah manis atau gurih. Tang Yuan memiliki makna simbolis dalam budaya Tionghoa:
Bentuk bulat: Melambangkan kebersamaan, keharmonisan, dan persatuan keluarga.
Rasa manis: Melambangkan kehidupan yang penuh berkah dan kebahagiaan.
2. Hubungan Tang Yuan dengan Festival Dong Zhi
Dong Zhi Festival (冬至), yang berarti “Musim Dingin Tiba,” adalah salah satu festival penting dalam budaya Tionghoa. Biasanya dirayakan sekitar 21-23 Desember, saat siang hari terpendek dalam setahun di belahan bumi utara. Pada festival ini, makan Tang Yuan menjadi tradisi untuk:
Menyambut perubahan musim.
Mempererat ikatan keluarga.
Melambangkan kedewasaan dan tahap kehidupan baru.
Tang Yuan disajikan dalam kuah jahe manis untuk menghangatkan tubuh selama musim dingin.
3. Tang Yuan dalam Tradisi Chinese Indonesia
Di Indonesia, tradisi makan Tang Yuan tidak hanya dilakukan pada Dong Zhi, tetapi juga dalam beberapa perayaan lain, seperti:
Imlek (Tahun Baru Imlek): Tang Yuan dimakan sebagai simbol keberuntungan dan kebersamaan keluarga.
Pernikahan atau Kelahiran: Disajikan sebagai doa untuk keharmonisan dan kebahagiaan keluarga.
Upacara Sembahyang Leluhur: Sebagai persembahan untuk leluhur, melambangkan doa untuk keberkahan keluarga.
4. Cara Membuat Tang Yuan
Bahan Utama:
Tepung ketan
Air
Pewarna makanan (opsional)
Gula merah atau jahe untuk kuah manis
Langkah-langkah:
Campur tepung ketan dengan sedikit air hingga menjadi adonan yang bisa dibentuk.
Bentuk adonan menjadi bola-bola kecil.
Rebus bola-bola dalam air mendidih hingga mengapung.
Sajikan dengan kuah manis yang terbuat dari gula merah, jahe, dan air.
5. Makna Filosofis Tang Yuan di Indonesia
Bagi komunitas Tionghoa Indonesia, makan Tang Yuan adalah cara untuk:
Menghormati tradisi leluhur: Merayakan kebersamaan dengan keluarga.
Menghubungkan generasi: Biasanya dibuat bersama-sama oleh keluarga, melibatkan orang tua, anak, dan cucu.
Melestarikan budaya: Sebagai salah satu bagian penting dari warisan budaya Tionghoa.
6. Variasi Tang Yuan di Indonesia
Di Indonesia, Tang Yuan sering dimodifikasi dengan cita rasa lokal:
Isi gula merah cair atau kacang tanah manis: Sebagai pengaruh budaya Nusantara.
Kuah santan: Menggunakan bahan khas Indonesia untuk memberikan rasa gurih-manis.
Kesimpulan
Festival Tang Yuan adalah bagian penting dari tradisi Tionghoa, baik di China maupun Indonesia. Dalam konteks Indonesia, Tang Yuan tidak hanya menjadi makanan tradisional tetapi juga simbol keharmonisan keluarga, kebahagiaan, dan keberuntungan. Dengan adaptasi lokal, Tang Yuan tetap menjadi salah satu elemen budaya yang dilestarikan oleh komunitas Tionghoa di Indonesia.
Here’s a concise guide to the various generations, organized by their approximate birth years:
1. The Silent Generation (1928–1945)
Characteristics: Known for their strong work ethic, loyalty, and traditional values. They experienced the Great Depression and World War II.
2. Baby Boomers (1946–1964)
Characteristics: Born post-World War II during a time of significant population growth. They value personal gratification and are associated with social movements like civil rights and feminism.
3. Generation X (1965–1980)
Characteristics: Often seen as the “middle child” generation, they value independence and self-reliance. They witnessed the rise of technology and changes in family dynamics.
4. Millennials (Generation Y) (1981–1996)
Characteristics: Digital natives who grew up during the internet explosion. They prioritize experiences over possessions and often value diversity and inclusivity.
5. Generation Z (1997–2012)
Characteristics: The first generation to grow up with smartphones and social media. They are known for their activism, awareness of social issues, and preference for authentic communication.
6. Generation Alpha (2010–mid-2020s)
Characteristics: The youngest generation, growing up in a fully digital world. They are likely to be more diverse and tech-savvy, with a focus on sustainability and social consciousness.
Summary of Characteristics by Generation:
Generation
Birth Years
Key Traits
Silent Generation
1928–1945
Traditional, hardworking, loyal
Baby Boomers
1946–1964
Socially active, idealistic, value personal growth
Generation X
1965–1980
Independent, pragmatic, adaptable
Millennials
1981–1996
Tech-savvy, experience-oriented, value diversity
Generation Z
1997–2012
Activist-minded, social media fluent, individualistic
Generation Alpha
2010–mid-2020s
Digital natives, environmentally conscious, diverse
Each generation has unique influences and characteristics shaped by the socio-economic, cultural, and technological contexts of their formative years.
Defining Generation Names and Dates
A generation is a group of people born at roughly the same time. They’re usually grouped by a 20-year time interval, says Deborah Carr, PhD, professor and chair of the sociology department of Boston University and author of Golden Years? Social Inequalities in Later Life.
“Generations take on special meaning because their members tend to experience critical life events and transitions at particular historical moments, and these moments define their lives,” says Dr. Carr. Indeed, generations influence everything from baby name trends to parenting styles.
Many experts, including Dr. Carr, agree that the most reliable and well-known generation timeline was identified by authors Neil Howe and William Strauss. However, the latest generational designations come from the Pew Research Center, a “nonpartisan fact tank that informs the public about the issues, attitudes, and trends shaping the world.”1
The Greatest Generation (GI Generation): Born 1901–1927
This generation lived through the Great Depression and then went off to fight in World War II. Notably, they popularized jazz and swing music, but don’t be fooled by the wild provocations of the cultural preferences of the times. Due to the current events of this generation, the challenge of raising a family put a premium on traits like hard work and grit.
The Silent Generation: Born 1928–1945
The silent generation famously got their name for being so conformist that they were silent through the MacCarthy era when the fear of Communism swept the country.2 During this era, kids were expected to earn their way through life using a strong work ethic.
Baby Boom Generation: Born 1946–1964
Gen Z may think of Baby Boomers as their out-of-touch grandparents (as in “OK, Boomer”), but this generation actually had a wild youth we often don’t talk about. Boomers are named for the population “boom” that occurred after WWII, and many young people of this generation defied their parents, protested the Vietnam War, and created the “Summer of Love.”
Boomer parents notably redefined parenting by being the first generation to look at their kids’ perspective of growing up, and they started the concept of having family meetings.
Generation X: Born 1965–1980
So often dismissed as the slacker generation, Generation X lived through the AIDS epidemic, MTV culture, and a shifting landscape that would give rise to LGBTQ+ rights.
Generation X parents were the first to use helicopter parenting styles. Unlike their Boomer parents, who famously let their kids stay outside until the streetlights came on, Gen X’ers tend to be far more involved with their children’s social and educational development.
Millennial Generation or Generation Y: Born 1981–1996
Millennials lived through 9/11, remember when Amazon only sold books, and are also the first generation to know a childhood both with and without the internet, which now plays a significant role in their personal lives.
While Boomers may accuse Millennials of being self-centered and impatient due to their excessive use of technology, this generation has proven to be incredibly community-oriented and environmentally conscious, which are traits being picked up by their children.
When it comes to parenting, millennials are more likely than prior generations to encourage their children to live as their authentic selves, and they’re leading the movement in helping gender non-conforming kids be happy with who they are, points out Carr. “Some millennial parents, who were ‘helicoptered over’ in their youth, are taking on a freer approach to parenting, allowing their children to explore and create without constant structure or supervision.”
Generation Z or iGen: Born 1997–2010
Generation Z kids are the first to be born into a world where they know nothing besides constant connection to one another, albeit through phones, screens, and tablets. However, like millennials before them, Gen Z’ers are often environmentally conscious, inclusive and accepting of others, and extremely politically aware—despite many of them not yet being of voting age.3
Generation Alpha: Born 2010-2024
Kids born between 2010 and 2024 are part of Generation Alpha.4 Generation Alpha is the first generation of kids who will never know a time when social media didn’t exist, and they are far more tech-savvy than any generation previously, which is a powerful tool that can change humanity in myriad positive ways.
It may be too soon to peg the Alphas as this or that based on how little we know about them so far. However, there are a few things we understand: Some Gen Alphas are the first to be born amid the COVID-19 pandemic, they’re more diverse than any other generation, and they’re more likely to be in a single-parent household.4
Like the generations that came before them, every passing year will shape the cultural perception of who they are. In the meantime, parents get the pride and honor to help guide them to making the best choices possible.
Web1, Web2, and Web3 are terms that describe the evolution of the internet, each phase marking a shift in how users interact with and experience the web. Here’s a breakdown of each:
1. Web 1.0 (The Static Web)
Web1, or the Static Web, refers to the early phase of the internet, which lasted from the 1990s to the early 2000s. This phase is characterized by:
Static content: Webpages were mostly read-only and provided information without any user interaction.
Personal websites and portals: Most websites were simple, static pages where users could access information but not contribute or interact with it.
Minimal user interaction: Users were passive consumers of content, as there were no platforms for collaboration or participation.
Basic technology: Web 1.0 primarily used HTML, images, and basic design elements.
Example: A typical Web1 site would be like an online brochure or a static information page, such as early personal websites or news portals.
2. Web 2.0 (The Social and Interactive Web)
Web2, also known as the Social Web or Interactive Web, emerged in the early 2000s and continues today. It represents a more dynamic, user-focused web. Key characteristics of Web2 include:
User-generated content: Users could now create and share their own content, such as blogs, videos, and social media posts.
Interactivity and collaboration: Platforms allowed for two-way communication, with websites like Facebook, YouTube, and Wikipedia enabling users to interact and contribute.
Dynamic web applications: Webpages became more interactive, using technologies like AJAX, making them responsive and customizable without reloading entire pages.
Community-driven platforms: Websites became spaces for users to participate in discussions, share opinions, and collaborate with each other.
Data-driven business models: Platforms like Facebook, Twitter, and Google grew by collecting and monetizing user data, primarily through advertising.
Example: Platforms like Facebook, YouTube, Instagram, and collaborative tools like Google Docs are products of Web2.
3. Web 3.0 (The Decentralized Web)
Web3, often referred to as the Decentralized Web or Semantic Web, is the most recent and emerging phase of the internet. It emphasizes user control, decentralization, and improved intelligence. Key features include:
Decentralization: Web3 is powered by blockchain technology, which distributes control over data and applications across a peer-to-peer network, rather than being controlled by centralized entities (like large tech companies).
User data ownership: Unlike Web2, where platforms own user data, Web3 aims to give users full ownership of their data, with privacy and security being central concerns.
Smart contracts: Web3 enables smart contracts, which are self-executing agreements stored on the blockchain. These automate transactions without intermediaries.
Cryptocurrencies and digital economies: Web3 integrates digital assets like cryptocurrencies and tokens, allowing users to participate in decentralized finance (DeFi) and own unique digital items via NFTs (Non-Fungible Tokens).
Semantic Web: The goal is also to make the web more intelligent, allowing machines to better understand and process information, making searches and interactions more relevant and personalized.
Example: Decentralized platforms such as Ethereum, IPFS, Decentralized Finance (DeFi) applications, and NFT marketplaces represent the Web3 era.
Summary of Differences
Phase
Web 1.0
Web 2.0
Web 3.0
Era
1990s to early 2000s
Early 2000s to present
Emerging (2020s and beyond)
Content
Static, read-only
Dynamic, user-generated
Decentralized, user-controlled
Interaction
Passive
Interactive, social
Peer-to-peer, decentralized
Technology
HTML, basic webpages
AJAX, APIs, social media
Blockchain, smart contracts, AI
Data control
Owned by website owners
Controlled by large platforms
Controlled by users, decentralized
Web3 represents the future of the internet, focusing on decentralization, enhanced privacy, and user sovereignty over their data and digital assets.
A “996” work schedule refers to an unofficial work schedule (9a.m. ~ 9p.m., 6 days a week) that has been gaining in popularity. Serving a company that encourages the “996” work schedule usually means working for at least 60 hours a week.
996 work system: arrive at work at 9 am every day and work until 9 pm. Work 6 days a week.
955 work system: arrive at work at 9 am every day and work until 5 pm. Work 5 days a week.
944 work system: arrive at work at 9 am every day and work until 4 pm. Work 4 days a week.
The following list of companies basically do not belong to the 996 companies, and are relatively close to the 955/965 level, but it still depends on the department and region, and cannot be guaranteed to be completely accurate.
It cannot be guaranteed that all departments are at the level of 955/10-6-5/965/10-7-5
Even if the average level of the department is 955/10-6-5/965/10-7-5, you may still have to work overtime part of the time.
Some departments of some companies in the list may have 975 or even 985 students. Don’t generalize.
Some companies in the list may have some or even more departments with 945, 10-5-5 or 11-6-5, so we have included them in the list.
Currently, most of the companies on the list are in Shanghai because I am in Shanghai and have a relatively good understanding of the situation in Shanghai. This does not mean that most of the 955 companies are in Shanghai. You are welcome to continue voting, and I will add more companies based on the voting results.
About the future
Always know what you want.
What I want now is an environment where I can learn English and technology, so that my choices in the future will not be limited to China, but will be from all over the world.
If you are nostalgic for the high salaries of domestic large companies
If you are afraid of going to a strange place
If you seek stability and are unwilling to change
Please stay in the country, come on.
If you like a challenge
If you like to experience different life
If you yearn for equal human rights, freedom of speech, and a society ruled by law
The world is so big, go out and see it.
There are many things you can’t change, but you can choose to leave
Work System
Hours per Day
Days per Week
Example Company/Industry
Description
996
9 am – 9 pm
6
Some tech companies in China (e.g., Alibaba)
Long hours, prevalent in tech and startup culture in China.
955
9 am – 5 pm
5
Standard corporate companies worldwide
Standard work schedule in many countries.
944
9 am – 4 pm
4
Some creative agencies and consulting firms
Shorter workweek with slightly reduced daily hours.
888
8 am – 8 pm
4 (per week)
Manufacturing industry with rotating shifts
Longer daily hours, common in shift-based industries.
410
10 hours
4
Some government jobs and tech companies
Four-day workweek with 10-hour shifts.
987
9 am – 8 pm
7
Startups in high-growth phases
Intense schedule with no days off for quick scaling.
774
7 am – 7 pm
4
Healthcare workers and emergency services
Long shifts but three consecutive days off.
582
5 am – 8 pm
2
Part-time workers in retail or emergency services
Very long shifts with significant days off.
998
9 am – 9 pm
4 (per week)
IT support companies with alternate workweeks
Alternating week schedule with long daily hours.
1045
10 am – 4 pm
5
Freelancers and part-time workers
Shorter daily shifts for a flexible schedule.
663
6 am – 6 pm
3
Oil and gas industry workers, emergency responders
Intensive shifts with more days off.
964
9 am – 6 pm
4
Innovative tech companies focusing on work-life balance
Balanced workweek for better work-life balance.
9969
9 am – 9 pm
6 (for 9 months)
Construction projects, startups with intense deadlines
Every year, people around the world lose millions of dollars to a sophisticated scam known as “the pig butchering romance scam”.
The Pig Butchering Scam (also known as “Sha Zhu Pan” 殺豬盤/杀猪盘 or “slaughtering the pig”) is a type of financial scam that originated in China and has since spread globally. It is a long-con romance and investment scam where the victim (referred to as the “pig”) is “fattened up” emotionally and psychologically by the scammer over time before being “butchered,” meaning they are coerced into investing large sums of money into fake investment schemes.
How the Scam Works:
Initial Contact and Relationship Building:
Scammers typically approach victims through dating apps, social media, or cold messaging on platforms like WhatsApp.
They spend weeks or months building a fake relationship, gaining the victim’s trust by pretending to be romantically interested, showing care, or posing as a friend.
Introducing the Fake Investment:
Once trust is established, the scammer introduces the victim to a fake investment opportunity. This could be a cryptocurrency investment, forex trading, or any high-return scheme.
The scammer shows supposed “evidence” of their own profits and convinces the victim that they, too, can make money quickly.
Small Returns to Gain Trust:
Victims are often persuaded to invest a small initial amount, and the scammer may provide fake returns to make the investment seem legitimate and lucrative.
This initial success motivates the victim to invest more money.
The Big Loss – Butchering the Pig:
Once the victim has invested a large sum, the scammer disappears with the money or prevents the victim from withdrawing their funds.
The victim is left with no access to their “investment,” which in reality never existed.
Characteristics of the Scam:
Long-term Manipulation: The scam takes time, as the scammer “fattens up” the victim by developing a deep emotional connection.
High Returns Promised: Victims are usually promised high or guaranteed returns, making the scam seem like a “once in a lifetime” opportunity.
Use of Fake Investment Platforms: The scam often involves convincing the victim to invest through fake websites or apps that appear legitimate, complete with customer support and live dashboards to show false profits.
Withdrawal Blockage: When the victim tries to withdraw their funds, they may be told there are “fees” or “taxes” to pay, which are just tactics to extract more money before the scammer vanishes.
How to Avoid Pig Butchering Scams:
Be Wary of Strangers Online: Be cautious about people who approach you on dating apps or social media, especially if they bring up financial opportunities.
Do Not Share Personal Information: Avoid sharing sensitive personal details or financial information with people you haven’t met in person.
Research Investment Opportunities Thoroughly: If someone suggests an investment platform, research it thoroughly. Be skeptical of high returns or “no risk” opportunities.
Avoid Transferring Money Quickly: Do not send money to someone you just met online or invest in schemes you don’t fully understand.
The Pig Butchering Scam is a sophisticated, emotionally manipulative con, preying on vulnerable individuals who trust the scammer. By being aware of the tactics used, you can better protect yourself and others from falling victim to this type of fraud.
The scam takes its name from the victims, who the scammers call “pigs” that they “fatten up” before slaughter. It usually begins with a text message that appears to be a wrong number. People who respond are lured into a long conversation with a good-looking and wealthy stranger who eventually offers to teach them how to make money with crypto investments. The investments are (of course) fake, and once victims send enough of their money, the scammers disappear. Victims frequently lose their life savings, and often the crime goes unreported because the victim is so embarrassed by what happened. A Kansas banker embezzled almost $50 million dollars from his bank as part of a pig-butchering scam, leading to the bank’s failure.
List of Common Terms
Investors need to understand the common terms related to Pig Butchering scams in order to protect themselves from being financially victimized.
Cryptocurrency – A digital currency in which transactions are verified and records maintained by a decentralized system using cryptography, rather than by a centralized authority.
Dating Apps – An application that enables people to meet for a date and possible lasting relationship (i.e., Tinder, Bumble, eHarmony).
Emotions – A natural instinctive state of mind deriving from one’s circumstances, mood, or relationships with others.
Encrypted messaging applications – Provide end-to-end encryption for user-to-user text
messaging. Encrypted messaging prevents anyone from monitoring your text conversations.
Fake Profiles – A profile where someone is pretending to be something or someone that doesn’t exist.
Fake trading platform – Binary options trading platforms manipulate the trading software to distort binary options prices and payouts. For example, when a customer’s trade is “winning,” the countdown to expiration is extended arbitrarily until the trade becomes a loss.
Investing scam – Happens when people try to trick you into investing money. A scammer may lie to you or give you fake information about a real investment.
Love Bombing – The action or practice of lavishing someone with attention or affection, especially to influence or manipulate them.
Manipulation – To control or play upon by artful, unfair, or insidious means especially to one’s own advantage.
The Red Flags
Out of the blue text message from wrong number.
Builds a relationship over time.
Encourages potential victim to start investing in cryptocurrency.
Quickly switches from one platform to another to avoid detection.
Don’t Be a Victim!
Have you been using social media apps that you don’t understand?
Did you give/share your personal or financial information with someone you just met?
Did you invest with an online app and can’t get your money back?
We are Here to Help!
Do you think you are a victim of a Pig Butchering scam, financial fraud or investment fraud?
Act quick, get help and stop any wiring/transferring of money or cryptocurrencies.
Make detailed notes and keep all documentation relating to the transaction.
Call your local police, law enforcement office, or the Securities Division to file a report.